SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Gedik R, Medal H, Rainwater C, Pohl EA, Mason SJ. Transp. Res. E Logist. Transp. Rev. 2014; 71: 45-57.

Copyright

(Copyright © 2014, Elsevier Publishing)

DOI

10.1016/j.tre.2014.06.017

PMID

unavailable

Abstract

In this paper, we present a two-stage mixed integer programming (MIP) interdiction model in which an interdictor chooses a limited amount of elements to attack first on a given network, and then an operator dispatches trains through the residual network. Our MIP model explicitly incorporates discrete unit flows of trains on the rail network with time-variant capacities. A real coal rail transportation network is used in order to generate scenarios to provide tactical and operational level vulnerability assessment analysis including rerouting decisions, travel and delay costs analysis, and the frequency of interdictions of facilities for the dynamic rail system.

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print