2020
DOI: 10.1080/01605682.2020.1740621
|View full text |Cite
|
Sign up to set email alerts
|

Assessing road network vulnerability: A user equilibrium interdiction model

Abstract: The version in the Kent Academic Repository may differ from the final published version. Users are advised to check http://kar.kent.ac.uk for the status of the paper. Users should always cite the published version of record.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 70 publications
(65 reference statements)
0
3
0
Order By: Relevance
“…All these three measures use the full scan analysis methodology for ranking links where links are removed one by one, and a performance measure (usually a function of travel time) is calculated in each step, and the links are ranked based on the changes in value of the selected measure. Most of the published research proposing new vulnerability measures have used at least one of these three measures as benchmarks ( 8 , 26 , 30 ) as they are extremely accurate, albeit time consuming and not applicable for full-scan analysis on large-scale networks. It is worth mentioning that if a link’s removal results in a disconnected network, such a link is automatically categorized as highly critical (although in large-scale transportation networks removal of a single link is highly unlikely to lead to a disconnected network, since multiple paths exist between each origin–destination pair).…”
Section: Methodsmentioning
confidence: 99%
“…All these three measures use the full scan analysis methodology for ranking links where links are removed one by one, and a performance measure (usually a function of travel time) is calculated in each step, and the links are ranked based on the changes in value of the selected measure. Most of the published research proposing new vulnerability measures have used at least one of these three measures as benchmarks ( 8 , 26 , 30 ) as they are extremely accurate, albeit time consuming and not applicable for full-scan analysis on large-scale networks. It is worth mentioning that if a link’s removal results in a disconnected network, such a link is automatically categorized as highly critical (although in large-scale transportation networks removal of a single link is highly unlikely to lead to a disconnected network, since multiple paths exist between each origin–destination pair).…”
Section: Methodsmentioning
confidence: 99%
“…More closely relevant to this paper is the line of research that studied interdiction and fortification in demand-based networks, while customizing more generic models by incorporating features typical of transportation systems. Alderson et al [46] and Starita and Scaparra [47] assess vulnerabilities in road networks by studying interdiction problems that account for congestion on the roads, using the popular Bureau of Public Records (BPR) formula. Küçükaydın and Aras [48] study an interdiction model for railways, where both stations and tracks are capacitated and subjected to disruption.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Some questioned that this might disregard the possibility for the network to adapt and function normally even after a link is disrupted [16]. Therefore, recent studies have predicted the amount of damage for a certain area, for the case of a disconnected network, by calculating the difference between the performance functions before and after removing the links [26][27][28][29]. The consequence of a road disruption indicates the magnitude of the true impact, which affects the accessibility of road users in reaching their destination [30].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Vulnerability measures often rank the infrastructure assets according to a proposed vulnerability metric. Most critical assets identified from these rankings, called the vulnerability index, are then proposed to decision-makers to build contingency plans, or to design network enhancements [28]. The vulnerability index can be calculated in many ways, showing the critical state of a link relative to another.…”
Section: Literature Reviewmentioning
confidence: 99%