Document Type : Research Paper

Authors

1 Azad Islamic university South Tehran Branch

2 Department of Industrial Engineering, South Tehran Branch, Islamic Azad University, Tehran, Iran

Abstract

Today, vital infrastructure of security systems, are at risk of deliberate attacks and to provide the necessary preparations and an appropriate response to the attacks, strengthening the vital infrastructure is considered. In this paper, a special type of strengthening the vital infrastructure is discussed that in which before they are constructed, there would be planning about strengthening them. The case is formulated as a two-level planning that in high level, the defender is looking for minimizing the total cost, considering which facilities are built, and each facility, in terms of pre-attack, services which costumer and in terms of post-attack, how many defenders assigned to each facility. While at a low level, (the attacker) is looking for imposing the maximum cost to the system considering which facility and at what level of severity, is attacked. To resolve the case, a meta-heuristic ways based on simulated annealing method suggested and by solving an example and compare its results with the results of the exact solution, the effectiveness of the method has been tested.

Keywords

-         اکبری، مریم، جعفرآبادی، محمود جانلو، مهدی، جامیری، عاطفه، ارائه یک مدل سه سطحی مکان یابی تسهیلات در مسأله R- میانه ممانعتی، هشتمین کنفرانس بین المللی انجمن ایرانی تحقیق در عملیات، دانشگاه فردوسی مشهد، مشهد، 1394
-         پرواسی، سیدپارسا، بشیرزاده، رضا، خوش الحان، فرید، ارائهیکمدلپوششیمستحکمسازیبهمنظورمحافظتازتسهیلاتدر معرضاختلالدرمسئلةr میانهممانعتیبارویکردبازیاستکلبرگ، نشریه تخصصی مهندسی صنایع، دوره51، شماره 1، 1396، 45-58
-         جبل عاملی، محمد سعید، شهانقی، کامران، حسنوی، رضا، نصیری، محمدرضا، ارائه مدل ترکیبی مکانیابی تسهیلات حساس، نشریه بین المللی مهندسی صنایع و مدیریت تولید، دوره 20، شماره4، 1388، 65-76
-         کمالی، سیده فرزانه، ویسی، گلاره، ارائه ی روشی نوین مبتنی بر تئوری بازی های غیرهمکارانه برای حل مسئله ی تخصیص محافظ، کنفرانس بین المللی پژوهش‌های نوین در علوم مهندسی،1395
-         محمودجانلو، مهدی، خادمی، علیرضا، ارائه یک مدل ریاضی دوسطحی جدید جهت مکانیابی ومستحکم سازی تسهیلات خدمات رسان درمساله R-میانه ممانعتی، اولین همایش ملی پژوهش های مهندسی صنایع، 1393
-        یقینی، مسعود، اخوان کاظم زاده, محمد رحیم، الگوریتمهای بهینهسازی فراابتکاری، انتشارات جهاد دانشگاهی، دانشگاه صنعتی امیر کبیر، تهران، 1395
-       Aksen, D, leng, S., & Aras, N, (2014),” A bilevel partial interdiction problem with capacitated facilities and demand outsourcing”, Computers & Operations Research, Vol41, p. 346-358.
-       Aksen, D, Piyade, N., & Aras, N, (2010), “The budget constrained r-interdiction median problem with capacity expansion,” Springer-Verlag, p. 269-291.
-       Albareda, M ,Yolanda, H., Justo, P, (2015), “The reliable p-median problem with at-facility service”, European Journal of Operational Research, Vol 245 , p. 656–666.
-       Hegeman, J, Peidro, D, Alemany, M., & Manuel, M, (2014),” A Decentralized Production and Distribution Planning Model in an Uncertain Environment”, Supply Chain Management Under Fuzziness, Studies in Fuzziness and Soft Computing, Vol 313, 318-330.
-       Jairo, R. Montoya, T, Diego, A., & Ortiz,V, (2014),” Collaboration and information sharing in dyadic supply chains: A literature review over the period 2000–2012” , Estudios Gerenciales, Vol  30, p. 343–354.
-       Khalili, K., & Ghasemi, P, (2016), ” Uncertain Centralized/Decentralized Production-Distribution Planning Problem in Multi-Product Supply Chains: Fuzzy Mathematical Optimization Approaches”,Industrial Engineering & Management Systems , Vol.15 p.156-172
-       Konak ,A,  Sadan, K , Lawrence V., & Snyder, F, (2015),” A Game-Theoretic Genetic Algorithm for the reliable server assignment  problem under attacks”, Computers & Industrial Engineering, Vol 85 ,p. 73–85
-      Liberatore, F, Scaparra, M, Daskin, P., & Mark S, (2011), "Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R- interdiction median problem with fortification," Computers & Operations Research 38, p. 357–366.
-       Losada, C, Scaparra, M, Paola, C., & Richard L., (2010) "On a bi-level formulation to protect uncapacitated p-median systems with facility recovery time and frequent disruptions," Electronic Notes in Discrete Mathematics 36, p. 591–598.
-       Losada, C, Scaparra, M, Paola, C, Richard L., & Mark S., (2012), “The stochastic interdiction median problem with disruption intensity levels,” Springer Science+Business Media,  p. 345-365.
-       Scaparra, S, Maria P., Church, D., & Richard L., (2008),  “A bilevel mixed-integer program for critical infrastructure protection planning,” Computers&Operations Research 35, p. 1905 – 1923.
-       Zhu, Y, Zheng, Z., Zhang, X., & Cai K., (2013), “The r-interdiction median problem with probabilistic protection and its solution algorithm,” Computers&OperationsResearch 40,p.451-462.