SlideShare a Scribd company logo
1 of 1
Download to read offline
RESEARCH POSTER PRESENTATION DESIGN © 2012
www.PosterPresentations.com
Numerical experiments were conducted in order to evaluate the performance of the
method and observe the results. The designer and adversary level algorithm were
coded and solved using MATLAB, and the user level algorithm was implemented in
C++. The method was processed on a computer with an Intel i7-960 processor and
24GB of RAM. The Sioux Falls network was selected, which consists of 76 links, and
24 nodes which are also defined as the demand origin/destinations. It is assumed that
all the links in the initial network have three lanes. The links attributes and OD trips
were adopted from (Suwansirikul et al., 1987). Two scenarios were performed on this
network using different budgets available to the adversary: adversary entity can
damage 1 link and 2 links.
Figure 2 Links Included in Expansion, highlighted with green color (Left), and
improvement of the capacity expanded network compare to the initial conditions for
adversary budget of one (Right).
Figure 3 Individuals solutions at by the two objectives of the designer at the 100st
generation for adversary budget equal to two.
Figure 4 the optimal decisions of the attacker for the initial (Left) and improved
network (Right), and for adversary budget of two.
In today’s congested transportation networks, disturbances like crashes may
cause unexpected and significant delays. All transportation networks are
vulnerable to disruptions, to some extent, with temporary or permanent effects.
Vulnerability is more important in urban transportation networks, due to heavy
use and road segments that are close to each other. Small disturbances on an
urban transportation network segment can have a huge impact on its
accessibility. Intelligent adversaries may take advantage of these vulnerable
parts of the network in order to disrupt the transportation operations, and
increase the overall transportation cost for the users.
Often, the decision of improving the networks in transportation planning and
management tasks are made without adequately taking into account the
possible vulnerabilities. By considering the factor of vulnerability in their
decision, planners could prevent severe unforeseen disruptions in the future.
This study proposes an innovative model for designing robust networks against
intelligent attackers. In the model, three decision makers are considered: the
network manager/designer, the adversary (intelligent attacker) and the users of
the network. Numerical experiments were conducted, and the results proved the
potential benefits of the proposed model.
Abstract
Objectives
The vulnerability can be evaluated by measuring the increase in the total system travel time
(TSTT). This way, the damage due to the disturbance are viewed over the whole system.
Concentrating on reducing the effects of potential disruptions to the network, may distract
the investments from the definite reduction of the total system cost under normal
conditions, and to invest on infrastructures that might never be beneficial (if no disruptions
occur in future). Hence, an intellectual approach would be considering both aspects of
reducing the system-wide cost, and the potential vulnerabilities simultaneously. The aim of
the designer/defender is to invest on projects such that the social welfare and robustness of
the network are maximized simultaneously. Since the value of the payoff considered as the
increase in total system travel time, the adversary can look for the damage which results in
the maximum possible travel time of users of the system. In this case, at the designer level,
two objective functions will form: the total system cost before the disruptions, and after the
disruptions by the attacker under his constraints. Therefore, the designer can pursue
improving the current performance of the system, and at the same time, tries to alleviate the
possible system-wide costs as a result of intelligent disruptions. The general formulation of
this model is presented in equations (1) through (5).
On this assumption, the designer possibly would face a set of solutions.
Figure 1 Flowchart of the Solution Approach
The designer of the network as the first mover, should search over the best possible
solutions for the design of the network while the adversary should move after the designer
and search to find the most crucial links of the network to be degraded or completely
disabled. And the last move is done by the users of the network who individually search for
the best route for themselves in terms of the least travel time. The overall flowchart of the
solution algorithms for the three decision makers is presented in Figure 1. It should be
noted that to keep the diagram simple, the convergence criteria for user-level problems is
not demonstrated in this figure.
Methodology
Results
Conclusions
A quantitative method for ranking the projects for budget allocation is essential
for transportation agencies. This problem can be addressed using NDP methods
to improve various performance measures. Numerical experiments with
vulnerability concerns showed the potential power of reduction of the future
hazards’ effects. The objective of allocation of these resources can generally be
the maximization of social welfare. An intelligent adversary may look for
vulnerabilities in the network to degrade its performance. At the planner’s level,
allocating resources without considering the potential of disruptions by the
intelligent adversary, may not help reduce the vulnerabilities, or similarly
increase the robustness of the network.
To address this issue, models were presented for designing robust networks.
The models were formed in multi-level optimization, considering flows of
decisions are to be made in sequence. Therefore, a hierarchy structure of the
movements is presented. The planner of the network is assumed to look for
investing the assigned budget on the links/projects of the network, while the
enemy was assumed to damages/disable links. The results showed that the
proposed model can search over the possible results for the designer and choose
the most robust solution to compare to the other possible solutions. Results
showed promising achievements in terms of increasing the robustness of the
network against intelligent disruptions, and also improving other system-wide
performance measures as presented in the bi-objective robust network design
problem model. Other objectives can be defined for the designer and the
adversary level.
References
1. Allsop, R.E., 1974. Some possibilities for using traffic control to influence trip distribution
and route choice, in: Transportation and Traffic Theory, Proceedings.
2. Dziubiński, M., Goyal, S., 2013. Network design and defence. Games Econ. Behav. 79,
30–43. doi:10.1016/j.geb.2012.12.007
3. Gershwin, S.B., Tan, H.-N., others, 1979. Hybrid Optimization: control of traffic networks
in equilibrium.
4. Konur, D., Golias, M.M., Darks, B., 2013. A mathematical modeling approach to resource
allocation for railroad-highway crossing safety upgrades. Accid. Anal. Prev. 51, 192–201.
doi:10.1016/j.aap.2012.11.011
5. Leblanc, L.J., 1973. Mathematical programming algorithms for large scale network
equilibrium and network design problems.
6. Marcotte, P., 1983. Network Optimization with Continuous Control 17, 181–197.
7. Marcotte, P., 1986. Network design problem with congestion effects: A case of bilevel
programming. Math. Program. 34, 142–162.
8. Marcotte, P., Marquis, G., 1992. Efficient implementation of heuristics for the continuous
network design problem. Ann. Oper. Res. 34, 163–176.
9. Marcotte, P., Zhu, D.L., 1996. Exact and inexact penalty methods for the generalized
bilevel programming problem. Math. Program. 74, 141–157. doi:10.1007/BF02592209
10. Martin, P.A.S., Thesis, 2007. TRI-LEVEL OPTIMIZATION MODELS TO DEFEND
CRITICAL INFRASTRUCTURE.
11. Murray, A.T., Davis, R., Stimson, R.J., Ferreira, L., 1998. Public Transportation Access.
Transp. Res. Part D Transp. Environ. 3, 319–328. doi:10.1016/S1361-9209(98)00010-8
12. Murray-Tuite, P., Mahmassani, H., 2004. Methodology for Determining Vulnerable Links
in a Transportation Network. Transp. Res. Rec. 1882, 88–96. doi:10.3141/1882-11
13. Snelder, M., n.d. Designing Robust Road Networks.
14. Steenbrink, P.A., 1974. Optimization of transport networks. New York.
15. Suwansirikul, C., Friesz, T.L., Tobin, R.L., 1987. Equilibrium Decomposed Optimization:
A Heuristic for the Continuous Equilibrium Network Design Problem. Transp. Sci. 21,
254–263. doi:10.1287/trsc.21.4.254
The objective and main contribution of this research is to provide a new
methodology for designing robust networks strategically, by considering an
intelligent adversary entity, who attempts to exploit the vulnerabilities of the
network to the maximum of his or her capabilities.
An appropriate way to model the vulnerabilities as a result of intelligent
disruptions, could be to model them as a player in a game that tries to achieve
his or her objective(s). Some of the studies focused on operational network
design. However, the strategic network design against vulnerabilities needs to
be further studied. In addition, despite the works that have been done to design
robust networks against stochastic vulnerability, this approach could provide
new ways to analyze the vulnerabilities in networks in a higher level of detail.
Since three decision makers are considered in this study, the possibly associated
models and objectives are reviewed. From a design point of view, the designer
may have multiple objectives when improving the performance of a network
such as total system cost, robustness against reliability and vulnerability and
reduction of pollution emission. On the other hand, from a user perspective,
they look for their optimal route choice, mode, and destination. From an
adversary viewpoint, the objective is to degrade the performance of the network
to the maximum of his capabilities. Hence, a design for a robust network must
consider the alleviation of potential disruptions.
Naimi, A.; Golias, M. M.; Higgs, B.; Mishra, S.
An innovative approach to solve the network design
problem concerning intelligent vulnerabilities
𝑚𝑖𝑛
𝑦
𝐷(𝑥(𝑦), 𝑦) (1)
𝑚𝑖𝑛
𝑦
𝐷′(𝑥′(𝑦, 𝑧(𝑦)), 𝑦, 𝑧(𝑦)) (2)
s.t. 𝑚𝑎𝑥
𝑧
𝐴(𝑥′(𝑧), 𝑦, 𝑧) (3)
𝑚𝑖𝑛
𝑥
𝑈(𝑥, 𝑦) (4)
s.t. 𝑚𝑖𝑛
𝑥′
𝑈′(𝑥′, 𝑦, 𝑧) (5)
1
Start
End
Converged?
User Level
User Equilibrium
Traffic Assignment
Investment Function
Convergence Criteria
OD Matrix
Network Data
Designer Level
Minimize TSTT
Minimize Vulnerabilities
Adversary Level
Maximize Damage
z y , y
Yes
𝑥(y, z(y))
𝑥(y, z(y))
No
𝑧(𝑥, 𝑦)
Yes
y
Converged?
No
Alternative User Level w/o Disruptions
User Equilibrium
Traffic Assignment
Link Capacity
Flows
Cost of Construction
𝑧(𝑥, 𝑦) , 𝑥 y, z ,
𝑥(y) 𝑥(y)
zz
0
1
1
0 2.00
1 2
3 4 5 6
789
101112
13
14 15
16
17
18
19
2021
2223
24
zz
e
1
1
0 2.00
1 2
3 4 5 6
789
101112
13
14 15
16
17
18
19
2021
2223
24

More Related Content

What's hot

Integrative Model for Quantitative Evaluation of Selection Telecommunication ...
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...Integrative Model for Quantitative Evaluation of Selection Telecommunication ...
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...TELKOMNIKA JOURNAL
 
Throughput in cooperative wireless networks
Throughput in cooperative wireless networksThroughput in cooperative wireless networks
Throughput in cooperative wireless networksjournalBEEI
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksIJERA Editor
 
Integrating Network Discovery and Community Detection (IRE IIITH) Team 24
Integrating Network Discovery and Community Detection (IRE IIITH) Team 24Integrating Network Discovery and Community Detection (IRE IIITH) Team 24
Integrating Network Discovery and Community Detection (IRE IIITH) Team 24Nikhil Daliya
 
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelA Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelEswar Publications
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...IJCNCJournal
 
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...Dr. Amarjeet Singh
 
On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...IJCNCJournal
 
LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
 LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
LCF: A Temporal Approach to Link Prediction in Dynamic Social NetworksIJCSIS Research Publications
 
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICINGA NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICINGIJNSA Journal
 
Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Editor IJARCET
 
Towards an adaptable spatial processing architecture
Towards an adaptable spatial processing architectureTowards an adaptable spatial processing architecture
Towards an adaptable spatial processing architectureArmando Guevara
 
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...IJCNCJournal
 

What's hot (18)

Integrative Model for Quantitative Evaluation of Selection Telecommunication ...
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...Integrative Model for Quantitative Evaluation of Selection Telecommunication ...
Integrative Model for Quantitative Evaluation of Selection Telecommunication ...
 
Throughput in cooperative wireless networks
Throughput in cooperative wireless networksThroughput in cooperative wireless networks
Throughput in cooperative wireless networks
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Centrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social NetworksCentrality Prediction in Mobile Social Networks
Centrality Prediction in Mobile Social Networks
 
Integrating Network Discovery and Community Detection (IRE IIITH) Team 24
Integrating Network Discovery and Community Detection (IRE IIITH) Team 24Integrating Network Discovery and Community Detection (IRE IIITH) Team 24
Integrating Network Discovery and Community Detection (IRE IIITH) Team 24
 
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth LevelA Proposed Algorithm to Detect the Largest Community Based On Depth Level
A Proposed Algorithm to Detect the Largest Community Based On Depth Level
 
Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...Probability Density Functions of the Packet Length for Computer Networks With...
Probability Density Functions of the Packet Length for Computer Networks With...
 
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...
Harmony Search Algorithmic Rule for Optimum Allocation and Size of Distribute...
 
On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...On the development of methodology for planning and cost modeling of a wide ar...
On the development of methodology for planning and cost modeling of a wide ar...
 
Predicting Budget from Transportation Research Grant Description: An Explorat...
Predicting Budget from Transportation Research Grant Description: An Explorat...Predicting Budget from Transportation Research Grant Description: An Explorat...
Predicting Budget from Transportation Research Grant Description: An Explorat...
 
LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
 LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
LCF: A Temporal Approach to Link Prediction in Dynamic Social Networks
 
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICINGA NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING
A NOVEL SCHEME FOR DEVIATION DETECTION IN ASYNCHRONOUS DISTRIBUTED PRICING
 
Mep last.docx (1)
Mep last.docx (1)Mep last.docx (1)
Mep last.docx (1)
 
Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008Volume 2-issue-6-2005-2008
Volume 2-issue-6-2005-2008
 
Atva05
Atva05Atva05
Atva05
 
Towards an adaptable spatial processing architecture
Towards an adaptable spatial processing architectureTowards an adaptable spatial processing architecture
Towards an adaptable spatial processing architecture
 
Impact of Graphs and Network in Minimizing Project and Product Cost
Impact of Graphs and Network in Minimizing Project and Product CostImpact of Graphs and Network in Minimizing Project and Product Cost
Impact of Graphs and Network in Minimizing Project and Product Cost
 
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
IMPLEMENTATION OF A CONTEXT-AWARE ROUTING MECHANISM IN AN INEXPENSIVE STANDAL...
 

Similar to An innovative approach to solve the network design problem concerning intelligent vulnerabilities

WMNs: The Design and Analysis of Fair Scheduling
WMNs: The Design and Analysis of Fair SchedulingWMNs: The Design and Analysis of Fair Scheduling
WMNs: The Design and Analysis of Fair Schedulingiosrjce
 
The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...IJECEIAES
 
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerMaximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerIOSR Journals
 
Electrical distribution system planning
Electrical distribution system planningElectrical distribution system planning
Electrical distribution system planningpradeepkumarchilakal
 
Power Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETPower Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETIOSR Journals
 
Analysis and assessment software for multi-user collaborative cognitive radi...
Analysis and assessment software for multi-user collaborative  cognitive radi...Analysis and assessment software for multi-user collaborative  cognitive radi...
Analysis and assessment software for multi-user collaborative cognitive radi...IJECEIAES
 
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...IJCNCJournal
 
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...IJCNCJournal
 
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...IJMER
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Saad Bare
 
DYNAMIC ASSIGNMENT OF USERS AND MANAGEMENT OF USER’S DATA IN SOCIAL NETWORK
DYNAMIC ASSIGNMENT OF USERS AND MANAGEMENT OF USER’S DATA IN SOCIAL NETWORK DYNAMIC ASSIGNMENT OF USERS AND MANAGEMENT OF USER’S DATA IN SOCIAL NETWORK
DYNAMIC ASSIGNMENT OF USERS AND MANAGEMENT OF USER’S DATA IN SOCIAL NETWORK ijiert bestjournal
 
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...csandit
 
The Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium PosterThe Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium PosterTanner Massahos
 
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...Mumbai Academisc
 
Accident Prediction System Using Machine Learning
Accident Prediction System Using Machine LearningAccident Prediction System Using Machine Learning
Accident Prediction System Using Machine LearningIRJET Journal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 

Similar to An innovative approach to solve the network design problem concerning intelligent vulnerabilities (20)

WMNs: The Design and Analysis of Fair Scheduling
WMNs: The Design and Analysis of Fair SchedulingWMNs: The Design and Analysis of Fair Scheduling
WMNs: The Design and Analysis of Fair Scheduling
 
C017641219
C017641219C017641219
C017641219
 
The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...The impact of channel model on the performance of distance-based schemes in v...
The impact of channel model on the performance of distance-based schemes in v...
 
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of JammerMaximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
Maximizing Efficiency Of multiple–Path Source Routing in Presence of Jammer
 
Electrical distribution system planning
Electrical distribution system planningElectrical distribution system planning
Electrical distribution system planning
 
Power Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANETPower Optimization in MIMO-CN with MANET
Power Optimization in MIMO-CN with MANET
 
2. visualization in data mining
2. visualization in data mining2. visualization in data mining
2. visualization in data mining
 
Analysis and assessment software for multi-user collaborative cognitive radi...
Analysis and assessment software for multi-user collaborative  cognitive radi...Analysis and assessment software for multi-user collaborative  cognitive radi...
Analysis and assessment software for multi-user collaborative cognitive radi...
 
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
DDOS ATTACKS DETECTION USING DYNAMIC ENTROPY INSOFTWARE-DEFINED NETWORK PRACT...
 
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
DDoS Attacks Detection using Dynamic Entropy in Software-Defined Network Prac...
 
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
A New Bi-level Program Based on Unblocked Reliability for a Continuous Road N...
 
Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...Jamming aware traffic allocation for multiple-path routing using portfolio se...
Jamming aware traffic allocation for multiple-path routing using portfolio se...
 
DYNAMIC ASSIGNMENT OF USERS AND MANAGEMENT OF USER’S DATA IN SOCIAL NETWORK
DYNAMIC ASSIGNMENT OF USERS AND MANAGEMENT OF USER’S DATA IN SOCIAL NETWORK DYNAMIC ASSIGNMENT OF USERS AND MANAGEMENT OF USER’S DATA IN SOCIAL NETWORK
DYNAMIC ASSIGNMENT OF USERS AND MANAGEMENT OF USER’S DATA IN SOCIAL NETWORK
 
Ijetcas14 488
Ijetcas14 488Ijetcas14 488
Ijetcas14 488
 
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
 
publish research
publish researchpublish research
publish research
 
The Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium PosterThe Spring 2018 Undergraduate Symposium Poster
The Spring 2018 Undergraduate Symposium Poster
 
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
Bra a bidirectional routing abstraction for asymmetric mobile ad hoc networks...
 
Accident Prediction System Using Machine Learning
Accident Prediction System Using Machine LearningAccident Prediction System Using Machine Learning
Accident Prediction System Using Machine Learning
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 

More from alienaimi

Alireza Naimi PhD Degree
Alireza Naimi PhD DegreeAlireza Naimi PhD Degree
Alireza Naimi PhD Degreealienaimi
 
HCA Webinar Certificate-Naimi.pdf
HCA Webinar Certificate-Naimi.pdfHCA Webinar Certificate-Naimi.pdf
HCA Webinar Certificate-Naimi.pdfalienaimi
 
Synchro Intermediate_Advanced_Naimi - 06.29.2023-06.30.2023-8hr.pdf
Synchro Intermediate_Advanced_Naimi - 06.29.2023-06.30.2023-8hr.pdfSynchro Intermediate_Advanced_Naimi - 06.29.2023-06.30.2023-8hr.pdf
Synchro Intermediate_Advanced_Naimi - 06.29.2023-06.30.2023-8hr.pdfalienaimi
 
Synchro Intermediate Advanced Naimi - 06.29.2023 - 06.30.2023
Synchro Intermediate Advanced Naimi - 06.29.2023 - 06.30.2023Synchro Intermediate Advanced Naimi - 06.29.2023 - 06.30.2023
Synchro Intermediate Advanced Naimi - 06.29.2023 - 06.30.2023alienaimi
 
PTV Vissim for Reviewers Training Completion Certificate
PTV Vissim for Reviewers Training Completion CertificatePTV Vissim for Reviewers Training Completion Certificate
PTV Vissim for Reviewers Training Completion Certificatealienaimi
 
Synchro Intermediate Advanced Naimi
Synchro Intermediate Advanced NaimiSynchro Intermediate Advanced Naimi
Synchro Intermediate Advanced Naimialienaimi
 
PTOE License - Alireza Naimi #4419
PTOE License - Alireza Naimi #4419PTOE License - Alireza Naimi #4419
PTOE License - Alireza Naimi #4419alienaimi
 
Alireza Naimi Professional Transportation Planner (PTP) License
Alireza Naimi Professional Transportation Planner (PTP) LicenseAlireza Naimi Professional Transportation Planner (PTP) License
Alireza Naimi Professional Transportation Planner (PTP) Licensealienaimi
 
THE ROBUST URBAN TRANSPORTATION NETWORK DESIGN PROBLEM
THE ROBUST URBAN TRANSPORTATION NETWORK DESIGN PROBLEMTHE ROBUST URBAN TRANSPORTATION NETWORK DESIGN PROBLEM
THE ROBUST URBAN TRANSPORTATION NETWORK DESIGN PROBLEMalienaimi
 

More from alienaimi (9)

Alireza Naimi PhD Degree
Alireza Naimi PhD DegreeAlireza Naimi PhD Degree
Alireza Naimi PhD Degree
 
HCA Webinar Certificate-Naimi.pdf
HCA Webinar Certificate-Naimi.pdfHCA Webinar Certificate-Naimi.pdf
HCA Webinar Certificate-Naimi.pdf
 
Synchro Intermediate_Advanced_Naimi - 06.29.2023-06.30.2023-8hr.pdf
Synchro Intermediate_Advanced_Naimi - 06.29.2023-06.30.2023-8hr.pdfSynchro Intermediate_Advanced_Naimi - 06.29.2023-06.30.2023-8hr.pdf
Synchro Intermediate_Advanced_Naimi - 06.29.2023-06.30.2023-8hr.pdf
 
Synchro Intermediate Advanced Naimi - 06.29.2023 - 06.30.2023
Synchro Intermediate Advanced Naimi - 06.29.2023 - 06.30.2023Synchro Intermediate Advanced Naimi - 06.29.2023 - 06.30.2023
Synchro Intermediate Advanced Naimi - 06.29.2023 - 06.30.2023
 
PTV Vissim for Reviewers Training Completion Certificate
PTV Vissim for Reviewers Training Completion CertificatePTV Vissim for Reviewers Training Completion Certificate
PTV Vissim for Reviewers Training Completion Certificate
 
Synchro Intermediate Advanced Naimi
Synchro Intermediate Advanced NaimiSynchro Intermediate Advanced Naimi
Synchro Intermediate Advanced Naimi
 
PTOE License - Alireza Naimi #4419
PTOE License - Alireza Naimi #4419PTOE License - Alireza Naimi #4419
PTOE License - Alireza Naimi #4419
 
Alireza Naimi Professional Transportation Planner (PTP) License
Alireza Naimi Professional Transportation Planner (PTP) LicenseAlireza Naimi Professional Transportation Planner (PTP) License
Alireza Naimi Professional Transportation Planner (PTP) License
 
THE ROBUST URBAN TRANSPORTATION NETWORK DESIGN PROBLEM
THE ROBUST URBAN TRANSPORTATION NETWORK DESIGN PROBLEMTHE ROBUST URBAN TRANSPORTATION NETWORK DESIGN PROBLEM
THE ROBUST URBAN TRANSPORTATION NETWORK DESIGN PROBLEM
 

Recently uploaded

COMPOSTING : types of compost, merits and demerits
COMPOSTING : types of compost, merits and demeritsCOMPOSTING : types of compost, merits and demerits
COMPOSTING : types of compost, merits and demeritsCherry
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.Cherry
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Serviceshivanisharma5244
 
ONLINE VOTING SYSTEM SE Project for vote
ONLINE VOTING SYSTEM SE Project for voteONLINE VOTING SYSTEM SE Project for vote
ONLINE VOTING SYSTEM SE Project for voteRaunakRastogi4
 
LUNULARIA -features, morphology, anatomy ,reproduction etc.
LUNULARIA -features, morphology, anatomy ,reproduction etc.LUNULARIA -features, morphology, anatomy ,reproduction etc.
LUNULARIA -features, morphology, anatomy ,reproduction etc.Cherry
 
Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.
Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.
Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.Cherry
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusNazaninKarimi6
 
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIACURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIADr. TATHAGAT KHOBRAGADE
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsSérgio Sacani
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learninglevieagacer
 
Pteris : features, anatomy, morphology and lifecycle
Pteris : features, anatomy, morphology and lifecyclePteris : features, anatomy, morphology and lifecycle
Pteris : features, anatomy, morphology and lifecycleCherry
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Cherry
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learninglevieagacer
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .Poonam Aher Patil
 
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Cherry
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceAlex Henderson
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxMohamedFarag457087
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....muralinath2
 

Recently uploaded (20)

COMPOSTING : types of compost, merits and demerits
COMPOSTING : types of compost, merits and demeritsCOMPOSTING : types of compost, merits and demerits
COMPOSTING : types of compost, merits and demerits
 
POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.POGONATUM : morphology, anatomy, reproduction etc.
POGONATUM : morphology, anatomy, reproduction etc.
 
BHUBANESHWAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND ...
BHUBANESHWAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND ...BHUBANESHWAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND ...
BHUBANESHWAR ODIA CALL GIRL SEIRVEC ❣️ 72051//37929❣️ CALL GIRL IN ODIA HAND ...
 
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort ServiceCall Girls Ahmedabad +917728919243 call me Independent Escort Service
Call Girls Ahmedabad +917728919243 call me Independent Escort Service
 
ONLINE VOTING SYSTEM SE Project for vote
ONLINE VOTING SYSTEM SE Project for voteONLINE VOTING SYSTEM SE Project for vote
ONLINE VOTING SYSTEM SE Project for vote
 
LUNULARIA -features, morphology, anatomy ,reproduction etc.
LUNULARIA -features, morphology, anatomy ,reproduction etc.LUNULARIA -features, morphology, anatomy ,reproduction etc.
LUNULARIA -features, morphology, anatomy ,reproduction etc.
 
Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.
Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.
Genome Projects : Human, Rice,Wheat,E coli and Arabidopsis.
 
development of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virusdevelopment of diagnostic enzyme assay to detect leuser virus
development of diagnostic enzyme assay to detect leuser virus
 
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIACURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
CURRENT SCENARIO OF POULTRY PRODUCTION IN INDIA
 
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune WaterworldsBiogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
Biogenic Sulfur Gases as Biosignatures on Temperate Sub-Neptune Waterworlds
 
module for grade 9 for distance learning
module for grade 9 for distance learningmodule for grade 9 for distance learning
module for grade 9 for distance learning
 
Pteris : features, anatomy, morphology and lifecycle
Pteris : features, anatomy, morphology and lifecyclePteris : features, anatomy, morphology and lifecycle
Pteris : features, anatomy, morphology and lifecycle
 
Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.Porella : features, morphology, anatomy, reproduction etc.
Porella : features, morphology, anatomy, reproduction etc.
 
Module for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learningModule for Grade 9 for Asynchronous/Distance learning
Module for Grade 9 for Asynchronous/Distance learning
 
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY // USES OF ANTIOBIOTICS TYPES OF ANTIB...
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY  // USES OF ANTIOBIOTICS TYPES OF ANTIB...ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY  // USES OF ANTIOBIOTICS TYPES OF ANTIB...
ABHISHEK ANTIBIOTICS PPT MICROBIOLOGY // USES OF ANTIOBIOTICS TYPES OF ANTIB...
 
Factory Acceptance Test( FAT).pptx .
Factory Acceptance Test( FAT).pptx       .Factory Acceptance Test( FAT).pptx       .
Factory Acceptance Test( FAT).pptx .
 
Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.Reboulia: features, anatomy, morphology etc.
Reboulia: features, anatomy, morphology etc.
 
FAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical ScienceFAIRSpectra - Enabling the FAIRification of Analytical Science
FAIRSpectra - Enabling the FAIRification of Analytical Science
 
Digital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptxDigital Dentistry.Digital Dentistryvv.pptx
Digital Dentistry.Digital Dentistryvv.pptx
 
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
Human & Veterinary Respiratory Physilogy_DR.E.Muralinath_Associate Professor....
 

An innovative approach to solve the network design problem concerning intelligent vulnerabilities

  • 1. RESEARCH POSTER PRESENTATION DESIGN © 2012 www.PosterPresentations.com Numerical experiments were conducted in order to evaluate the performance of the method and observe the results. The designer and adversary level algorithm were coded and solved using MATLAB, and the user level algorithm was implemented in C++. The method was processed on a computer with an Intel i7-960 processor and 24GB of RAM. The Sioux Falls network was selected, which consists of 76 links, and 24 nodes which are also defined as the demand origin/destinations. It is assumed that all the links in the initial network have three lanes. The links attributes and OD trips were adopted from (Suwansirikul et al., 1987). Two scenarios were performed on this network using different budgets available to the adversary: adversary entity can damage 1 link and 2 links. Figure 2 Links Included in Expansion, highlighted with green color (Left), and improvement of the capacity expanded network compare to the initial conditions for adversary budget of one (Right). Figure 3 Individuals solutions at by the two objectives of the designer at the 100st generation for adversary budget equal to two. Figure 4 the optimal decisions of the attacker for the initial (Left) and improved network (Right), and for adversary budget of two. In today’s congested transportation networks, disturbances like crashes may cause unexpected and significant delays. All transportation networks are vulnerable to disruptions, to some extent, with temporary or permanent effects. Vulnerability is more important in urban transportation networks, due to heavy use and road segments that are close to each other. Small disturbances on an urban transportation network segment can have a huge impact on its accessibility. Intelligent adversaries may take advantage of these vulnerable parts of the network in order to disrupt the transportation operations, and increase the overall transportation cost for the users. Often, the decision of improving the networks in transportation planning and management tasks are made without adequately taking into account the possible vulnerabilities. By considering the factor of vulnerability in their decision, planners could prevent severe unforeseen disruptions in the future. This study proposes an innovative model for designing robust networks against intelligent attackers. In the model, three decision makers are considered: the network manager/designer, the adversary (intelligent attacker) and the users of the network. Numerical experiments were conducted, and the results proved the potential benefits of the proposed model. Abstract Objectives The vulnerability can be evaluated by measuring the increase in the total system travel time (TSTT). This way, the damage due to the disturbance are viewed over the whole system. Concentrating on reducing the effects of potential disruptions to the network, may distract the investments from the definite reduction of the total system cost under normal conditions, and to invest on infrastructures that might never be beneficial (if no disruptions occur in future). Hence, an intellectual approach would be considering both aspects of reducing the system-wide cost, and the potential vulnerabilities simultaneously. The aim of the designer/defender is to invest on projects such that the social welfare and robustness of the network are maximized simultaneously. Since the value of the payoff considered as the increase in total system travel time, the adversary can look for the damage which results in the maximum possible travel time of users of the system. In this case, at the designer level, two objective functions will form: the total system cost before the disruptions, and after the disruptions by the attacker under his constraints. Therefore, the designer can pursue improving the current performance of the system, and at the same time, tries to alleviate the possible system-wide costs as a result of intelligent disruptions. The general formulation of this model is presented in equations (1) through (5). On this assumption, the designer possibly would face a set of solutions. Figure 1 Flowchart of the Solution Approach The designer of the network as the first mover, should search over the best possible solutions for the design of the network while the adversary should move after the designer and search to find the most crucial links of the network to be degraded or completely disabled. And the last move is done by the users of the network who individually search for the best route for themselves in terms of the least travel time. The overall flowchart of the solution algorithms for the three decision makers is presented in Figure 1. It should be noted that to keep the diagram simple, the convergence criteria for user-level problems is not demonstrated in this figure. Methodology Results Conclusions A quantitative method for ranking the projects for budget allocation is essential for transportation agencies. This problem can be addressed using NDP methods to improve various performance measures. Numerical experiments with vulnerability concerns showed the potential power of reduction of the future hazards’ effects. The objective of allocation of these resources can generally be the maximization of social welfare. An intelligent adversary may look for vulnerabilities in the network to degrade its performance. At the planner’s level, allocating resources without considering the potential of disruptions by the intelligent adversary, may not help reduce the vulnerabilities, or similarly increase the robustness of the network. To address this issue, models were presented for designing robust networks. The models were formed in multi-level optimization, considering flows of decisions are to be made in sequence. Therefore, a hierarchy structure of the movements is presented. The planner of the network is assumed to look for investing the assigned budget on the links/projects of the network, while the enemy was assumed to damages/disable links. The results showed that the proposed model can search over the possible results for the designer and choose the most robust solution to compare to the other possible solutions. Results showed promising achievements in terms of increasing the robustness of the network against intelligent disruptions, and also improving other system-wide performance measures as presented in the bi-objective robust network design problem model. Other objectives can be defined for the designer and the adversary level. References 1. Allsop, R.E., 1974. Some possibilities for using traffic control to influence trip distribution and route choice, in: Transportation and Traffic Theory, Proceedings. 2. Dziubiński, M., Goyal, S., 2013. Network design and defence. Games Econ. Behav. 79, 30–43. doi:10.1016/j.geb.2012.12.007 3. Gershwin, S.B., Tan, H.-N., others, 1979. Hybrid Optimization: control of traffic networks in equilibrium. 4. Konur, D., Golias, M.M., Darks, B., 2013. A mathematical modeling approach to resource allocation for railroad-highway crossing safety upgrades. Accid. Anal. Prev. 51, 192–201. doi:10.1016/j.aap.2012.11.011 5. Leblanc, L.J., 1973. Mathematical programming algorithms for large scale network equilibrium and network design problems. 6. Marcotte, P., 1983. Network Optimization with Continuous Control 17, 181–197. 7. Marcotte, P., 1986. Network design problem with congestion effects: A case of bilevel programming. Math. Program. 34, 142–162. 8. Marcotte, P., Marquis, G., 1992. Efficient implementation of heuristics for the continuous network design problem. Ann. Oper. Res. 34, 163–176. 9. Marcotte, P., Zhu, D.L., 1996. Exact and inexact penalty methods for the generalized bilevel programming problem. Math. Program. 74, 141–157. doi:10.1007/BF02592209 10. Martin, P.A.S., Thesis, 2007. TRI-LEVEL OPTIMIZATION MODELS TO DEFEND CRITICAL INFRASTRUCTURE. 11. Murray, A.T., Davis, R., Stimson, R.J., Ferreira, L., 1998. Public Transportation Access. Transp. Res. Part D Transp. Environ. 3, 319–328. doi:10.1016/S1361-9209(98)00010-8 12. Murray-Tuite, P., Mahmassani, H., 2004. Methodology for Determining Vulnerable Links in a Transportation Network. Transp. Res. Rec. 1882, 88–96. doi:10.3141/1882-11 13. Snelder, M., n.d. Designing Robust Road Networks. 14. Steenbrink, P.A., 1974. Optimization of transport networks. New York. 15. Suwansirikul, C., Friesz, T.L., Tobin, R.L., 1987. Equilibrium Decomposed Optimization: A Heuristic for the Continuous Equilibrium Network Design Problem. Transp. Sci. 21, 254–263. doi:10.1287/trsc.21.4.254 The objective and main contribution of this research is to provide a new methodology for designing robust networks strategically, by considering an intelligent adversary entity, who attempts to exploit the vulnerabilities of the network to the maximum of his or her capabilities. An appropriate way to model the vulnerabilities as a result of intelligent disruptions, could be to model them as a player in a game that tries to achieve his or her objective(s). Some of the studies focused on operational network design. However, the strategic network design against vulnerabilities needs to be further studied. In addition, despite the works that have been done to design robust networks against stochastic vulnerability, this approach could provide new ways to analyze the vulnerabilities in networks in a higher level of detail. Since three decision makers are considered in this study, the possibly associated models and objectives are reviewed. From a design point of view, the designer may have multiple objectives when improving the performance of a network such as total system cost, robustness against reliability and vulnerability and reduction of pollution emission. On the other hand, from a user perspective, they look for their optimal route choice, mode, and destination. From an adversary viewpoint, the objective is to degrade the performance of the network to the maximum of his capabilities. Hence, a design for a robust network must consider the alleviation of potential disruptions. Naimi, A.; Golias, M. M.; Higgs, B.; Mishra, S. An innovative approach to solve the network design problem concerning intelligent vulnerabilities 𝑚𝑖𝑛 𝑦 𝐷(𝑥(𝑦), 𝑦) (1) 𝑚𝑖𝑛 𝑦 𝐷′(𝑥′(𝑦, 𝑧(𝑦)), 𝑦, 𝑧(𝑦)) (2) s.t. 𝑚𝑎𝑥 𝑧 𝐴(𝑥′(𝑧), 𝑦, 𝑧) (3) 𝑚𝑖𝑛 𝑥 𝑈(𝑥, 𝑦) (4) s.t. 𝑚𝑖𝑛 𝑥′ 𝑈′(𝑥′, 𝑦, 𝑧) (5) 1 Start End Converged? User Level User Equilibrium Traffic Assignment Investment Function Convergence Criteria OD Matrix Network Data Designer Level Minimize TSTT Minimize Vulnerabilities Adversary Level Maximize Damage z y , y Yes 𝑥(y, z(y)) 𝑥(y, z(y)) No 𝑧(𝑥, 𝑦) Yes y Converged? No Alternative User Level w/o Disruptions User Equilibrium Traffic Assignment Link Capacity Flows Cost of Construction 𝑧(𝑥, 𝑦) , 𝑥 y, z , 𝑥(y) 𝑥(y) zz 0 1 1 0 2.00 1 2 3 4 5 6 789 101112 13 14 15 16 17 18 19 2021 2223 24 zz e 1 1 0 2.00 1 2 3 4 5 6 789 101112 13 14 15 16 17 18 19 2021 2223 24