2010
DOI: 10.1287/ijoc.1090.0365
|View full text |Cite
|
Sign up to set email alerts
|

The Valve Location Problem in Simple Network Topologies

Abstract: To control possible spills in liquid or gas transporting pipe systems, the systems are usually equipped with shutoff valves. In case of an accidental leak these valves separate the system into a number of pieces limiting the spill effect. In this paper, we consider the problem, for a given edge-weighted network representing a pipe system and for a given number of valves, to place the valves in the network in such a way that the maximum possible spill, i.e. the maximum total weight of a piece, is minimized. We … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0
1

Year Published

2014
2014
2018
2018

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 13 publications
0
9
0
1
Order By: Relevance
“…First, if the set of node structures  is closed under inclusion (i.e., if T 1 ⊆ T 2 and T 2 ∈  , then T 1 ∈  ), constraints (13) will suffice because any solution  with overlapping critical node structures can be transformed into a solution  ′ with disjoint critical node structures (see the proofs of Theorems 1 and 2 in the Appendix A for the clique and star cases). On the contrary, if  is not closed under inclusion, constraints [13] can be replaced by the following constraints.…”
Section: General Formulationsmentioning
confidence: 99%
See 3 more Smart Citations
“…First, if the set of node structures  is closed under inclusion (i.e., if T 1 ⊆ T 2 and T 2 ∈  , then T 1 ∈  ), constraints (13) will suffice because any solution  with overlapping critical node structures can be transformed into a solution  ′ with disjoint critical node structures (see the proofs of Theorems 1 and 2 in the Appendix A for the clique and star cases). On the contrary, if  is not closed under inclusion, constraints [13] can be replaced by the following constraints.…”
Section: General Formulationsmentioning
confidence: 99%
“…The idea behind this variant coincides with the one of the ordinary path constraints (6) in which if no node structure T ∈  having nodes along a path P ∈  is removed from G, such a path also exists in G[V ⧵ V()], implying that nodes i and j remain connected after the set of critical node structures  is removed from G. The relationship between variables x and z given by constraints (13) implies that any solution (x, y, z) for the CNP connectivity measure (or (x, y, z, u) for the LC connectivity measure) satisfying constraint (37) satisfies constraint (6) as well. To see this, simply replace (13) in (6) for any given path…”
Section: Path Constraints Revisitedmentioning
confidence: 99%
See 2 more Smart Citations
“…Все последние десятилетия и до настоящего времени проблеме исследования мер целостности графов уделяется особое внимание, поскольку она связана с вопросами анализа и синтеза отказоустойчивых сложных технических систем, включая вычислительные системы, коммуникационные и транспортные сети, трубопроводные системы [4,26,41]. Для таких систем отказоустойчивость, как правило, является важнейшим показателем качества функционирования [2,4,5,10].…”
unclassified