Document Type

Article

Publication Date

11-2014

Subject: LCSH

Railoads, Business logistics

Disciplines

Industrial Engineering | Mechanical Engineering

Abstract

In this paper, we present a two-stage mixed integer programming (MIP) interdiction model in which an interdictor chooses a limited amount of elements to attack first on a given network, and then an operator dispatches trains through the residual network. Our MIP model explicitly incorporates discrete unit flows of trains on the rail network with time-variant capacities. A real coal rail transportation network is used in order to generate scenarios to provide tactical and operational level vulnerability assessment analysis including rerouting decisions, travel and delay costs analysis, and the frequency of interdictions of facilities for the dynamic rail system.

Comments

This is the authors' accepted version of the article published in Transportation Research Part E: Logistics and Transportation Review. The version of record appears at http://dx.doi.org/10.1016/j.tre.2014.06.017

DOI

10.1016/j.tre.2014.06.017

Creative Commons License

Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Publisher Citation

Gedik, R., Medal, H., Rainwater, C., Pohl, E. A., & Mason, S. J. (2014). Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application. Transportation Research Part E: Logistics and Transportation Review, 71, 45-57.

Available for download on Wednesday, September 27, 2017

Share

COinS