Document Type

Article

Publication Date

11-2014

Subject: LCSH

Railoads, Business logistics

Disciplines

Industrial Engineering | Mechanical Engineering

Abstract

In this paper, we present a two-stage mixed integer programming (MIP) interdiction model in which an interdictor chooses a limited amount of elements to attack first on a given network, and then an operator dispatches trains through the residual network. Our MIP model explicitly incorporates discrete unit flows of trains on the rail network with time-variant capacities. A real coal rail transportation network is used in order to generate scenarios to provide tactical and operational level vulnerability assessment analysis including rerouting decisions, travel and delay costs analysis, and the frequency of interdictions of facilities for the dynamic rail system.

Comments

This is the authors' accepted version of the article published in Transportation Research Part E: Logistics and Transportation Review. The version of record appears at http://dx.doi.org/10.1016/j.tre.2014.06.017

DOI

10.1016/j.tre.2014.06.017

Creative Commons License

Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License.

Publisher Citation

Gedik, R., Medal, H., Rainwater, C., Pohl, E. A., & Mason, S. J. (2014). Vulnerability assessment and re-routing of freight trains under disruptions: A coal supply chain network application. Transportation Research Part E: Logistics and Transportation Review, 71, 45-57.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.