File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: A Continuum Modeling Approach for Network Vulnerability Analysis at Regional Scale

TitleA Continuum Modeling Approach for Network Vulnerability Analysis at Regional Scale
Authors
KeywordsVulnerability analysis
Regional model
Continuum modeling approach
Issue Date2013
PublisherElsevier BV. The Journal's web site is located at http://www.elsevier.com/wps/find/journaldescription.cws_home/718288/description#description
Citation
The 20th International Symposium on Transportation and Traffic Theory (ISTTT), Noordwijk, Netherlands, 16-19 June 2013. In Procedia: Social and Behavioral Sciences, 2013, v. 80, p. 846-859 How to Cite?
AbstractVulnerability analysis is crucial in strategic planning and highway maintenance to ensure a robust transportation system. Owing to the characteristics of network-modeling framework, traditional vulnerability analyses may not be able to realistically model the impacts of network degradations. This paper presents an application of the continuum traffic equilibrium model for network vulnerability analysis that aims to resolve the critical issues faced by the network-modeling framework. The continuum traffic equilibrium model treats the road system as a continuum over which the demands are continuously dispersed. In this study, a bi-level model is set up for finding the most vulnerable location(s) in the study region. At the lower-level model, a set of differential equations is constructed to describe the traffic equilibrium problem under capacity degradation. In the upper-level model, a constrained minimization problem is set up to find the most vulnerable location(s) that minimizes the accessibility index of the study region. A sensitivity-based solution algorithm that adopts the finite element method (FEM) is proposed to solve the bi-level model. Numerical examples are presented to demonstrate the characteristics of the proposed continuum vulnerability analysis and the efficiency of the proposed solution algorithm.
DescriptionPoster Presentations
Persistent Identifierhttp://hdl.handle.net/10722/190278
ISSN
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorHo, HWen_US
dc.contributor.authorSumalee, Aen_US
dc.contributor.authorLam, WHKen_US
dc.contributor.authorSzeto, WYen_US
dc.date.accessioned2013-09-17T15:17:01Z-
dc.date.available2013-09-17T15:17:01Z-
dc.date.issued2013en_US
dc.identifier.citationThe 20th International Symposium on Transportation and Traffic Theory (ISTTT), Noordwijk, Netherlands, 16-19 June 2013. In Procedia: Social and Behavioral Sciences, 2013, v. 80, p. 846-859en_US
dc.identifier.issn1877-0428-
dc.identifier.urihttp://hdl.handle.net/10722/190278-
dc.descriptionPoster Presentations-
dc.description.abstractVulnerability analysis is crucial in strategic planning and highway maintenance to ensure a robust transportation system. Owing to the characteristics of network-modeling framework, traditional vulnerability analyses may not be able to realistically model the impacts of network degradations. This paper presents an application of the continuum traffic equilibrium model for network vulnerability analysis that aims to resolve the critical issues faced by the network-modeling framework. The continuum traffic equilibrium model treats the road system as a continuum over which the demands are continuously dispersed. In this study, a bi-level model is set up for finding the most vulnerable location(s) in the study region. At the lower-level model, a set of differential equations is constructed to describe the traffic equilibrium problem under capacity degradation. In the upper-level model, a constrained minimization problem is set up to find the most vulnerable location(s) that minimizes the accessibility index of the study region. A sensitivity-based solution algorithm that adopts the finite element method (FEM) is proposed to solve the bi-level model. Numerical examples are presented to demonstrate the characteristics of the proposed continuum vulnerability analysis and the efficiency of the proposed solution algorithm.-
dc.languageengen_US
dc.publisherElsevier BV. The Journal's web site is located at http://www.elsevier.com/wps/find/journaldescription.cws_home/718288/description#description-
dc.relation.ispartofProcedia: Social and Behavioral Sciencesen_US
dc.subjectVulnerability analysis-
dc.subjectRegional model-
dc.subjectContinuum modeling approach-
dc.titleA Continuum Modeling Approach for Network Vulnerability Analysis at Regional Scaleen_US
dc.typeConference_Paperen_US
dc.identifier.emailSzeto, WY: ceszeto@hku.hken_US
dc.identifier.authoritySzeto, WY=rp01377en_US
dc.description.naturelink_to_OA_fulltext-
dc.identifier.doi10.1016/j.sbspro.2013.05.046-
dc.identifier.hkuros223259en_US
dc.identifier.volume80-
dc.identifier.spage846-
dc.identifier.epage859-
dc.identifier.isiWOS:000360732900044-
dc.publisher.placeNetherlands-
dc.identifier.issnl1877-0428-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats