Back to Search Start Over

Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application.

Authors :
Gedik, Ridvan
Medal, Hugh
Rainwater, Chase
Pohl, Ed A.
Mason, Scott J.
Source :
Transportation Research Part E: Logistics & Transportation Review. Nov2014, Vol. 71, p45-57. 13p.
Publication Year :
2014

Abstract

In this paper, we present a two-stage mixed integer programming (MIP) interdiction model in which an interdictor chooses a limited amount of elements to attack first on a given network, and then an operator dispatches trains through the residual network. Our MIP model explicitly incorporates discrete unit flows of trains on the rail network with time-variant capacities. A real coal rail transportation network is used in order to generate scenarios to provide tactical and operational level vulnerability assessment analysis including rerouting decisions, travel and delay costs analysis, and the frequency of interdictions of facilities for the dynamic rail system. [ABSTRACT FROM AUTHOR]

Details

Language :
English
ISSN :
13665545
Volume :
71
Database :
Academic Search Index
Journal :
Transportation Research Part E: Logistics & Transportation Review
Publication Type :
Academic Journal
Accession number :
99334373
Full Text :
https://doi.org/10.1016/j.tre.2014.06.017