Railoads, Business logistics
Industrial Engineering | Mechanical Engineering
In this paper, we present a two-stage mixed integer programming (MIP) interdiction model in which an interdictor chooses a limited amount of elements to attack first on a given network, and then an operator dispatches trains through the residual network. Our MIP model explicitly incorporates discrete unit flows of trains on the rail network with time-variant capacities. A real coal rail transportation network is used in order to generate scenarios to provide tactical and operational level vulnerability assessment analysis including rerouting decisions, travel and delay costs analysis, and the frequency of interdictions of facilities for the dynamic rail system.
Creative Commons License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.
Gedik, Ridvan; Medal, Hugh; Rainwater, Chase; Pohl, Edward A.; and Mason, Scott J., "Vulnerability Assessment and Re-routing of Freight Trains Under Disruptions: A Coal Supply Chain Network Application" (2014). Mechanical and Industrial Engineering Faculty Publications. 27.
Gedik, R., Medal, H., Rainwater, C., Pohl, E. A., & Mason, S. J. (2014). Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application. Transportation Research Part E: Logistics and Transportation Review, 71, 45-57.
Available for download on Wednesday, September 27, 2017