1 A Game Theory Approach for the Measurement of Transport Network Vulnerability from the System Prospective Wenxin Qiaoa,*, Yang Lu b, Chenfeng Xiongc and Ali Haghanid a MOE Key Laboratory for Urban Transportation Complex Systems Theory and Technology, School of Traffic and Transportation, Beijing Jiaotong University, Beijing, China b Singapore-MIT Alliance for Research and Technology (SMART), Singapore cd Department of Civil and Environmental Engineering, University of Maryland, College Park, U.S.A. ABSTRACT Measuring the transport network vulnerability has become an important research issue recently. With the increase on the road user’s value of time, users are now not only concerned about taking the shortest route to save travel times, but also decrease the variances by choosing a route that is more reliable to arrive at the destination within acceptable time frame. Ensuring a reliable network and providing alternative options under network breakdowns are very important to reduce the network vulnerability. This paper proposed a computationally efficient approach to measure system-level network vulnerability through a game theory approach. The most vulnerable link is indicated by link failure probabilities and the overall vulnerability measure of the network is represented by the expected total travel time. The performances are compared and discussed through the numerical results from several reliability improvement strategies. Key words: game theory, vulnerability, network, system perspective
Introduction Network reliability refers to the ability of the network to maintain an acceptable level of performance when network failure occurs. Improving the transport network reliability has been an extensively studied research problem. Great efforts had been involved to identify and measure the performance reliability of the transport network in the purpose of construct and maintain a robust, reliable network for the benefits of road users. With the rapid economic growth, the value of time of the trip makers has raised significantly. Road users are not only concerned about taking the shortest route to save the travel times, but also choosing a route that is more reliable to arrive at the destination within acceptable time frame. Ensuring a reliable network and providing alternative options under network breakdowns and disruptions are very important issues now. As road users are trying to save travel time and decrease the variability at the same time, the sources of the variances need to be identified first. Variances or uncertainties in the network may come from both demand and supply sides (Lam et al. 2008). The variances in supply side may come from various network disturbances such as accident, road work or adverse weather that result in capacity reduction. For the demand side, the variances may come from the variations in day-to-day travel demand or special events. Many networks are designed to offer alternative routes considering the risk of single or several components failures. Methodologies to identify the most vulnerable links, whose failure would cause the most damage to the network performance, would be very useful. The
*Corresponding Author. Email:
[email protected]
2 network is robust if the links with a large potential impact on the network have low probability of failure. Game theory was introduced to provide mathematical background for the analysis of interactive processes for decision making (Neumann and Morgenstern, 1944). Applications of game theory to transportation systems have addressed a variety of problems including: network design, pricing and reliability evaluation, competition between transport modes, dynamic traffic assignment on urban networks and so on. Two main applications are: application to the traffic user equilibrium problems and application to reliability problems. The user equilibrium problem can be defined as determining the traffic flow on every link of network. Wardrop (1952) was the first person to provide a theoretical framework for formulating this problem. Later on, research indicated that his principles resembled a Nash Equilibrium and the Game Theory gave transportation researchers a new way of looking at the traffic user equilibrium problem (Boyce et al. 2005). This research will focus on a two-player non-cooperative zero sum game between the network user seeking a path to minimize the expected trip cost and a demon choosing link performance scenarios to maximize the expected trip cost. A minmax optimization model is proposed to evaluate the network vulnerability through game theory approach. Numerical example is provided for discussions on possible approaches to reduce the network vulnerability. Literature Review The network reliability problems have been studied over the decades and the research work can be summarized in two folds (Bell, 2000): the network connectivity and performance reliability. Earlier work on reliability problems had focused on the connectivity issues when network becomes disconnected from link failure that one cannot reach his destination (Iida and Wakabayashi, 1989; Du and Nicholson, 1997). On the other hand, a connected network may not always provide sufficient road capacity or service level to ensure the users to arrive their destination on time, which leads to the discussion of the network performance reliability. One approach to study network performance reliability is to first gather the link performance statistical distributions; then study the impact of link performance variation on network performance (Bell et al., 1999). However, there are limitations in insufficient data and the stability issues for this approach. Other than connectivity and capacity measures, as in Bell’s paper (Bell, 2003), an alternative method is proposed that seeks to identify the links whose failure would impair the network performance the most, which is to measure the vulnerability of networks. Also, Berdica (2002) discussed various other definition of network vulnerability. More recently, Igor et al. (2010) measured the vulnerability of complex networks with different topologies through game theoretic approach and indicated the vulnerability heavily depends on topology. Chen et al. (2012) discussed a network vulnerability index called “impact area” vulnerability which is obtained by evaluating the consequence of each link closure on the overall network performance within a reasonable “sub network” defined as impact area. Szeto and Sumalee (2009) used a game theoretical model to identify routing and scheduling decisions for multiple hazmat carriers through a zero sum game. While the majority of traditional definitions of network vulnerability were based on topology, connectivity, or capacity, this paper defined vulnerability alternatively as the system-level total travel cost at the optimum
3 state, following Bell’s measurement of vulnerability (Bell 2003). Compared to other measures, this measure can be more conveniently calculated. When the model is potentially applied to any network models, the implementation of the proposed approach is of less computational burden. It is worth noting that the link failure probabilities are used to indicate the most critical links for the network performance in order for the decision-makers to determine strategies accordingly and achieve more reliable system-level outcome. The network reliability is a research topic drawing increasing concern from transportation communities. The definition of network reliability or network vulnerability also varies among different studies. Broadly speaking, network reliability definitions from previous studies can be grouped into the following three categories: (1) Network connectivity reliability. The connectivity reliability defines the reliability of a transportation network to be the probability of connectivity between different O-D pairs to remain intact given particular links is disrupted (Wakabayashi and Iida, 1992). The main problem with connectivity definition is that the method does not consider the capacity and travel time of different links. (2) Capacity reliability. The capacity reliability takes into the account of link capacities within the network and defines the network reliability as the probability of the transportation network accommodates a certain level of demand with acceptable level of service quality. Relevant works include Chen et al., 2002. (3) Travel time reliability. Under the travel time reliability concept, the network reliability is measured by the expected travel time between O-D pair considering the possibility of link capacity drop. Also the concept of travel time can be further generalized into travel cost which considers the monetary cost of the transportation. Therefore this group of study can be also named as travel cost reliability. Since travel time or travel cost is the most popular measurement of network service quality, the travel cost reliability received high degree of interests among researchers and practitioners. Based on how the disturbance probability of each link is computed, travel time reliability studies can be further categorized into two branches. The first group intends to investigate the adverse impact of rare incidents on the network performance. Rare incidents include traffic accidents, traffic flow breakdown, harsh weather, etc. These incidents happen at low probability but can potentially cast huge negative impact to the network. For example, Dalziell and Nicholson (2001) developed link failure duration probability distributions for hazards using Monte Carlo simulation method. Regarding this group of models, link failure probabilities are required inputs which are difficult to obtain unless there is a comprehensive historical incident database. The second branch along this direction is the game theory approach. Different from other approaches, game theoretical formulation of network reliability, which is first introduced by Bell (2000), is based on concept of depicting the expected network condition as the outcome of a game between two players: network users and hypothetical demon (or network tester). The hypothetical demon, which is also called network tester, seeks to maximize the total network travel cost by adjusting the disturbance probability of each link; on the other hand, users makes their own route choice usually in a non-cooperative way to minimize their respective travel time. Bell (2000) first formulated the problem considering one driver and one demon. In his study, the travel time of the disrupted link becomes ten times longer
4 compared with its usual travel time. Following the same path, Bell and Cassir (2002) enhance the model to include multiple drivers and demons. Since the demon is allowed to degrade any link, the game theory model provides “pessimistic” estimation of network travel cost. Therefore the outcome of the model describes the vulnerability of transportation network. Bell (2003, 2006, 2008) presented a series of research revolving this topic and named the model as “attacker-defender” model. Relevant studies along this direction also include Szeto et al. (2006, 2007), Szeto and Sumalee (2009) and Szeto (2011, 2013). The game between the network tester and drivers in this type of model is often transformed into a bi-level optimization problem in which the upper level is controlled by the hypothetical demon who attempts to maximize the expected total network travel cost while the lower level is controlled by the network users who want to minimize their own travel costs. And based on the definition of players, the game theory formulation may vary between different studies. For interested readers, there are also more comprehensive introduction of game theory method, for example Cassir and Bell (2001). Hollander and Prashker (2006) conducted an extensive literature review on the applicability of non-cooperative game theory in transport analysis. Due to the complex nature of bi-level optimization formulation, effective solution algorithms need to be developed. A solution method which iterates between upper and lower level problem was proposed by Yang (1995) in order to solve the bi-level O-D flow estimation problem considering user equilibrium assignment. Bell and Cassir (2002) proposed a risk averse equilibrium assignment algorithm based on MSA (Method of Successive Average). Also similar approach was also adopted in Bell (2003) and Bell and Kanturska (2008). Also based on game theoretical modelling approach, several studies were reported on optimal design of the transportation network from reliability point of view, such as Chen et al (2007) and Bianco et al. (2009). In this study, we developed a new game theoretical formulation for network vulnerability from a system perspective, thus in order to minimize the adverse impact from the demon, a network dispatcher is assumed to adjust the link flows according to the strategy of the hypothetical network disrupter. A zero sum game between these two entities is formulated in this study. Compared with previous studies, drivers no longer make their route choice only considering their own utility but rather controlled by the network dispatcher. Such kind of system optimal assignment is adopted to counter the link disturbances from the network tester. Then the system vulnerability is estimated by computing the expected total travel time of network users. Also in this study, the travel time of each link is modelled as non-linear function of link flow (BPR function) to better measure the impact of traffic volume on the vulnerability of the network. The sensitivity of link capacity and traffic volume is investigated using the proposed game theory formulation. A heuristic solution algorithm is also proposed based on MSA principle. Finally the application of the proposed model is presented and discussed using numerical examples.
Problem Statement and Solution Methodology In this paper, a game theoretical model is used to estimate the network vulnerability. The game theoretical model is formulated as a minmax problem following the original “attackerdefender” model proposed by Bell (2000, 2002, 2003, 2006 and 2008). The network vulnerability is considered as an equilibrium outcome of a two player non cooperative zero sum game: the first player is a network coordinator who tries to minimize the total cost of the
5 network by controlling the flow assignment on each link subject to OD flow constraints; the other player is a hypothetical demon who attempts to maximize the total network cost by disrupting a particular link of the network. In the remaining part of this paper, these two players are referred as network coordinator and network tester respectively. In this study, we emphasize on predicting the network vulnerability using the equilibrium outcome of above two-player zero sum game considering the non-linear relationship between demand flow volume and travel time. In this study, the correlation between link flow x and link travel time t is modeled by the following BPR function form, x β (1) t(x) = t f (1 + α ( ) ) c tf and c are respectively free flow travel time and link capacity; α and β are shape parameters of the function. Consider a general transport network represented by a directed graph where M and N are node and link set, the notations used in this paper are given as follows: xi the traffic flow on link i; yj probability of link j to be disturbed by the network tester; X is the link flow volume vector determined by the network dispatcher; Y is the link disturbance probability vector determined by the demon or network tester; t ij (xi ): the travel time of link i under the scenario when link j is disrupted. t ij is a function of both link flow xi and disturbance strategy of the demon. Since a link is either disturbed or not disturbed, therefore tij takes the following form: β xi (2) t ij (xi ) = fij (1 + α ( ) ) cij where fij is the free flow travel time of link i in scenario j, cij is the capacity of link i in scenario j and α and β are parameters; dm : the demand generation or absorption of node m; δim : Node-link incidence matrix defined by the following expression, 1 if link i is the incoming link of node m (3) δim = {−1 if link i is the outgoing link of node m 0 if link i is not connected with node m In this study, the status of each link is either disturbed or not disturbed. When the link is not disturbed, it remains its original capacity ci; otherwise when the link is disrupted, its capacity will be reduced to a significantly lower level γci where γ is a fraction between zero and one. Therefore when a particular link is disturbed, the travel time of all paths using the link will increase depending on the volume passing the link. Therefore the two player zero sum game is formulated as a minmax problem presented in P1, the network coordinator tries to minimize the total network flow cost by adjusting xi , i = 1,2, … , N; on the other hand, the network tester aims at maximizing the total network flow cost by changing yj , j = 1,2, … , N; Note that we assume only one link is degraded by the demon under one scenario. Due to the property of zero-sum game, the payoff of the network coordinator and the demon sums up to zero, namely the game is a zero sum game. pc = ∑ ∑ xi t ij (xi )yj i
j
(4)
6 (5)
pd = − ∑ ∑ xi t ij (xi )yj i
j
(6)
pc + pd = 0
Where pc and pd are the expected payoff of network coordinator and tester respectively. Given above notations, this two-player zero sum game can be formulated into the following minmax problem (P1). P1:
N
N
(7)
minmax ∑ ∑ xi t ij (xi )yj xi ,yj
i=1 j=1
s.t.
N
(8)
∑ yj = 1 j=1
N
(9)
∑ xi δik + dk = 0, k = 1,2, … , M i=1
xi ≥ 0, yj ≥ 0 (10) Above minmax problem can then be transformed into the following bi-level optimization problem (P2): P2: Upper level:
N
N
max ∑ ∑ xi t ij (xi )yj yj
s.t.
(11)
i=1 j=1 N
∑ yj = 1, yj ≥ 0
(12)
j=1
Lower level:
N
N
min ∑ ∑ xi t ij (xi )yj xi
s.t.
i=1 j=1
(13)
N
∑ xi δik + dk = 0, k = 1,2, … , M i=1
(14)
xi ≥ 0
In the upper level of P2, given fixed link flows xi , the network tester attempts to maximize the expected total network travel time by adjusting link disturbance probabilities Y; on the lower level, the network dispatcher performs a system optimal assignment given link disturbance probabilities given by the upper level problem. The existence of the solution of problem P2 is proved by Proposition 1. For each set of given link disturbance probabilities, the lower level optimization problem is proved to be a non-linear minimization problem with
7 convex objective function and convex constraints under certain assumption of the shape of link cost functions. Proposition 1: If all link cost functions are continuous and differentiable functions that satisfy condition (15), then for each set of link disturbance probabilities yj j=1,2,...,N, the lower level optimization problem of P2 is a convex optimization problem with unique solution: ∂t ij (xi )
2
xi + 2
∂xi2
∂t ij (xi ) > 0 ∀ i, j ∂xi
(15)
Proof The Hessian matrix of objective function of lower level is computed as follows, N ∂ ∑N i=1 ∑j=1 xi t ij (xi )yj
∂xm ∂xr
N
∑[
2 ∂t mj (xm ) ∂t mj (xm ) ∑[ x + 2 ] yj , if m = r m 2 ={ ∂xm ∂xm
(16)
j=1
0 o. w. ∇2
∂t1j (x1 )
j=1
=
N
2
∂x12
x1 + 2
∂t1j (x1 ) ] yj ∂x1
⋯
0 (17)
⋮
⋱
0
⋮
N
2
⋯ ∑[
[
j=1
∂t nj (xn ) ∂t nj (xn ) x + 2 ] yj n ∂xn2 ∂xn
]
Hence the determinant of Hessian matrix is given by Eq. (18) N
Det(∇
2)
N
= ∏∑[ i=1 j=1
∂t ij (xi )
2
xi + 2
∂xi2
∂t ij (xi ) ] yj ∂xi
(18)
We will show that if the link cost function takes the form of BPR function, then the above determinant is strictly larger than zero. Since β−1
∂t ij (xi ) αβ xi = ( ) ∂xi cij cij Then 2 ∂t ij (xi ) ∂xi2
,
∂t ij (xi ) ∂xi2
2
β−2
∂t ij (xi ) αβ(β − 1) xi xi + 2 = ( ) ∂xi cij cij2 β−1
=
αβ(β + 1) xi ( ) cij cij
β−2
αβ(β − 1) xi = ( ) cij cij2
(19)
β−1
αβ xi xi + 2 ( ) cij cij
(20)
8 Because α, β and cij > 0 , the value of
αβ(β+1) ckj
xk
(c )
β−1
kj
is strictly larger than zero for any link
i. Therefore, N N 2 2 ∂t ij (xi ) ∂t ij (xi ) ∂t ij (xi ) ∂t ij (xi ) ∑[ x + 2 ] y > 0, 𝑖 = 1,2, … 𝑁 → ∏ ∑ [ x + 2 ] yj i j i ∂xi ∂xi ∂xi2 ∂xi2 N
j=1
(21)
i=1 j=1
>0 More generally, N N 2 2 ∂t ij (xi ) ∂t ij (xi ) ∂t ij (xi ) ∂t ij (xi ) xi + 2 > 0 𝑓𝑜𝑟 𝑎𝑙𝑙 𝑖 𝑎𝑛𝑑 𝑗 → ∏ ∑ [ xi + 2 ] yj 2 2 ∂xi ∂xi ∂xi ∂xi
(22)
i=1 j=1
>0
Therefore, if the link cost functions of the network satisfies condition (15), then the lower optimization problem of P2 is a minimization problem with convex objective function and convex constraints. A unique global solution exists. Essentially, the lower level of P2 is a system optimal traffic assignment given modified link capacities given by link disturbance probabilities from the network tester. Therefore there exists a single set of optimal link flows which minimize the total network travel time. Such property of the model allows us to construct a heuristic algorithm which is discussed in the next section. Solution Algorithm The solution method developed in this section resembles to the iterative solution method proposed by Yang (1995). The basic idea is to iterate between upper and lower level problem until the stopping criteria is met. Let X (k) and Y (k) , k = 1,2, … , K be the estimated link flow and disturbance probability vector after kth iteration. And ̃ X (k) and ̃ Y (k) are the auxiliary link flows and disturbance probability vector at iteration k. The solution procedure is summarized here. 1 (0) (0) (0) 1) Step 1, initialization: Let y1 = y2 = ⋯ = yN = N, then solve X (0) using system optimal assignment method given Y (0) . 2) Step 2, determine the auxiliary link disturbance probability ̃ Y (k) : based on link volumes from previous iteration, X (k−1) , determine the optimal disturbing strategy of the network tester by finding the scenario with highest marginal increase of expected network travel time. Thus, find j which maximize the following expression, N
max ∑ xi t ij (xi ) j
i=1
̃ (k) is a vector whose jth element is And auxiliary link disturbance probability vector Y one while all remaining elements are zero. 3) Step 3, update Y (k) using moving successive average (MSA) method, 1 (k) ̃ − Y (k−1) ] Y (k) = Y (k−1) + [Y k 4) Step 4, update link flows. Given Y (k) , the network dispatcher solve for a set of new auxiliary link flows ̃ X (k) using system optimal assignment principle. Then update network link flows using MSA.
9 1 (k) ̃ − X (k−1) ] X (k) = X (k−1) + [X k 5) check stop criteria: if |Y (k) − Y (k−1) | ≤ ε and |X (k) − X (k−1) | ≤ ε then stop computation, return to step 2 otherwise. Here ε is the pre-defined tolerance. Numerical Example In the process of transport network design, it is an important practical problem to establish the performance reliability of a transport network. There are various approaches to enhance the network reliability such as enhancing the link component strength, performing preventive maintenance work, improving network structure, and having alternative route choices for the users. In the network design problems, Braess presented an example demonstrating where adding a new route can increase travel time for all, called the Braess Paradox. Similarly, there is phenomenal that increasing capacity to an existing link in a congested network may not necessarily improve the overall network performance which is referred as the “Pigou-KnightDowns paradox” by Arnott and Small (1994) and may actually increase the travel time (Yang, 1997). Yang and Bell (1998) introduced the capacity paradox and demonstrated that creating a new link in a network may actually reduce the potential capacity of the network and proposed the concept of network reserve capacity to avoid this capacity paradox. In this paper, some possible approaches to improve the road network vulnerability are discussed through several numerical examples and the performance test results under different improvement strategies are analyzed. Network Setup The network structures of the numerical examples are designed to test the impact of various planning and policy strategies on the system-level vulnerability performance measures. Two types of networks are specified in this section, as illustrated in Figures 1(a) and 1(b). The two networks are used in Scenario A and Scenario B, respectively. On Scenario A network, a number of incremental link capacity levels are defined and tested. For Scenario B, the addition of a new roadway segment is defined based on the network for Scenario A. Both networks consider a 4-node system with single origin-destination (OD) pair (origin: Node 1, destination: Node 4). The demands are set to be external and constant in the numerical example for illustrative purposes.
10
1
Origin
Origin 3
2
4
2
3
1
2
3
5
6
8
5
7 4
3
2
4 1
1
Destination
a. Scenario A
6
Destination
7 4
b. Scenario B and C
Figure 1. Numerical example networks The above two networks have similar link setups. Links 1 to 7 are identical in Figures 1(a) and 1(b). The Scenario network in Figure 1(a) has only one “express” link connecting Node 1 and 4 directly, while in Figure 1(b), Link 8 is added as the new expressway to the Scenario A network. And the impacts of its capacity variations on the performance of network reliability are examined in Scenario B and C. This example seeks answer to the empirical question that through which way one can more efficiently enhance the system reliability, capacity expansion (i.e. increase the capacity of existing links) or infrastructure expansion (i.e. add more links on the system). The BPR volume-delay function is used to compute travel time for simplicity. For each case, it is assumed that the capacity of one link is decreased to 10% if the demon selects that specific link to disrupt. Detailed link properties are provided in Table 1 below. Table 1. Link setup of the numerical example Link
Free-flow time (minutes) Capacity (vph) Scenario A Scenario B Scenario C Scenario A Scenario B Scenario C 1 30 30 30 2500 – V 1250 V 2 20 20 20 800 800 800 3 25 25 25 500 500 500 4 10 10 10 500 500 500 5 10 10 10 600 600 600 6 30 30 30 1000 1000 1000 7 30 30 30 600 600 600 8 n/a 30 30 n/a 1250 – V 2500 – V The capacity variables tested by the three scenario setups are denoted by V. Link 1 capacity in Scenario A is set always equal to the total capacity of Link 1 and 8 in Scenario B in order to make the expressways in these two cases comparable (Link 1 in Scenario A v.s. Link 1 and 8 in Scenario B). Scenario C assumes that the total capacity of link 1 and 8 remains the same and seeks the optimal capacity design.
11 In Scenario A, the analysis of a series of capacity decreases is conducted. First, the “donothing” scenario is studied and the most vulnerable link is identified, based on which we designed various capacity scenarios. The solution results are provided in the Figure 2. The two numbers shown in bracket on each link indicate the percentage of the optimal volume and the disturbance probability, respectively. 1
Origin
(0.25,0.27)
(0.17,0.15)
(0.01,0) (0.58,0.58)
2
3
(0.04,0) (0.28,0)
(0.14,0) 4
Destination
Figure 2. The Results to the “Do Nothing” Scenario Based on the result, Link 1 is identified as the most vulnerable link since it attracts the highest traffic volume and has the highest failure probability. This result is as expected since link 1 is set to be a relatively faster (with capacity: 2500 vph) freeway connecting the origin and the destination directly. In this case, one key operations and planning question regarding reliability is, what if the capacity of this vulnerable link drops significantly due to an unexpected event such as a severe incident. In Scenario A, capacity decrease scenarios of the link 1 are specified, varying the capacity for 0 to 50% decrease (capacity varies from 2500 vph to 1250 vph) in a uniform step size. In Scenario B we try to explain the impact of link addition on an existing Scenario A network and compare this policy strategy with Scenario A. For comparison purposes, the total capacity and the capacity decrease between the origin and destination are kept the same in the two scenario setups. For instance, if link 1 capacity is set to drop by 250 vph (10% decrease, from 2500 vph to 2250 vph) in Scenario A, the corresponding Scenario B case is to set link 8 capacity to drop from its original 1250 vph down to 1000 vph while link 1 capacity (1250 vph) remains unchanged. When the capacity decrease is set to 1250 vph, the two scenarios are identical. The solutions are presented in Figure 3. By comparing these two scenarios, we can gain some insights in the vulnerability of the two network designs when the capacity drops to a certain level. In Scenario C, we try to obtain the optimal capacity given that the sum of Link 1 and Link 8 capacity is set at a certain level. This scenario helps answer network design questions, such as: (1) how many links should it build to meet the predetermined travel demand; (2) What is the optimal capacity for each of the links. Results To solve this network problem, the authors employed the proposed bi-level optimization and iterative solution algorithm. An interesting question that arises naturally is how the proposed algorithm performs compared to other algorithms. To demonstrate the contribution in terms
12 of computational efficiency, the proposed method is compared with the MultiStart Algorithm (Ugray, et al., 2007). This heuristic endeavors to find the global optima by seeking a series of local solutions from a subset of n starting points. The search from multiple starting points which are defined on the feasible region improves the heuristic’s efficiency in finding the best local optimum. And this algorithm can run in parallel, distributing start points to multiple processors for local solution. This method is still an approximation to the global optimum. Both algorithms are employed to solve the problem raised in Scenario B. Comparing the two algorithms, it is clear that Bi-level optimization and iterative solution algorithm performs as good as the Multi-Start Algorithm. The average computational time for the proposed algorithm is 118.7 seconds compared to 547.3 seconds for the Multi-Start Algorithm (both experiments conducted on a computer with Intel Core-i7 CPU 2.90 GHz and 4G RAM). The results are compared in Appendix. More rigorous discussion on algorithms to solve this proposed system optimization model can be a direction for future studies. The results of these scenarios are presented in Figure 3(a), 3(b), 3(c), and 3(d). The X axis of Figures 3(a), 3(b), and 3(c) represents the amount of capacity decrease. The Y axis of Figure 3(a) represents the system-level reliability measure (i.e. the expected total travel time, in minutes). We consider the network more robust with lower value of the reliability measure. Figure 3(a) indicates that capacity expansion of an existing roadway (Scenario A) is not always a desirable network development option. In some cases, infrastructure expansion (Scenario B) can be more efficient in reducing system vulnerability. Figure 3(b) illustrates different performance measures of Scenario A and B. We employ the difference of the system expected total travel times of Scenario A and Scenario B as the measure of travel time savings from infrastructure expansion when compared with capacity expansion. When there is no capacity drop at point 0, the vulnerability measure of the infrastructure expansion case (Scenario B) is 32.5% lower than that of Scenario A. The percentage of travel time savings gradually decreases when the capacity drops in Scenario A and B. However, in terms of absolute travel time saving, it is observed that when Link 8 capacity decreases to 350, the infrastructure expansion achieves the highest total travel time savings when compared to Scenario A. Figure 3(c) illustrates the expressway volume. When the capacity drops, the number of vehicles served by expressways also decreases. Compared with the expressway link in Scenario A, the expressway links in Scenario B can serve more travel demand. Figure 3(d) illustrates the system-level vulnerability measures of Scenario C. It indicates that the optimal design whence the total capacity of expressway link 1 and 8 is set to 2500 vph is 1250 vph for each expressway link. And the optimal total expected travel time is about 30% lower than that of the do-nothing scenario (point zero in Scenario C). 8
7
x 10
15
x 10
0.5
9
Scenario B Time Saving (min.) Scenario B Time Saving (%)
8 7 6 5 4 3 2
12
0.4
9
0.3
6
0.2
3
0.1
Scenario B Travel Time Saving (%)
Scenario A Scenario B
Scenario B Travel Time Saving (min.)
System Expected Total Travel Time (min.)
10
1 0
0
125
250
375
500
625
750
875
1000
1125
1250
Capacity Decrease
a. System-level vulnerability measure (Scenario A and B)
0 125 5
250 10
375 15
500 20 625 25 750 30 Capacity Decrease
875 35
1000 40
1125 45
1250 50
b. Travel time saving from infrastructure expansion (Scenario A and B)
13 8
2.5
Scenario A Scenario B Link 1 & 8 Capacity
2250
2000
1750
1500
System Expected Total Travel Time (min.)
Volume of Link 1 and 8 (vph)
2500
1250
x 10
Scenario C
2
1.5
1
0.5
0
125
250
375
500
625
750
875
1000
1125
1250
Capacity Decrease
250
500
750
1000
1250
1500
1750
2000
2250
2500
Capacity of Link 1
c. Expressway Traffic Volume d. Expressway Traffic Volume (Scenario A and B) (Scenario C) Figure 3. The comparison results from scenario A and B In this numerical example, the results of capacity variation and adding infrastructure vary drastically with respect to the system-level reliability measures. Planning strategies should be carefully examined since it can be detrimental if the capacity expansion is intended to accommodate a future fast-growing demand for travel. The implication of this comparison is that the network travel time reliability should be considered in the decision making process in network infrastructure design. Compared to Scenario A, evidently, the addition of link 8 results in a significant improvement of the network reliability. Scenario C further demonstrates that an optimal design of the network can be derived through this analysis. Overall, these three scenarios are designed for illustration purposes, demonstrating the capability of the model in supporting decision-making processes. More general conclusions should be carefully drawn based on a complete scenario analysis with the specifications of various supply- and demand-side uncertainties. Conclusion and Direction for Future Research This paper proposed a more computationally efficient approach to measure system-level network vulnerability. The first contribution of the paper was the originality of the model. It formulated a game theoretical model to solve the network vulnerability problem and the reliability performances are compared and discussed through the results from several reliability improvement strategies. Also, link-level BPR functions were built in the model formulation to reflect network traffic details. The paper also contributed to the state-of-the-practice in how to solve this type of minmax problems. Solving the problem in its original form can be computationally extensive. The paper transformed the problem into a bi-level optimization model. Then a heuristic algorithm that iteratively solves the bi-level optimization model is also discussed and compared with multi-start algorithm in the numerical example. The model has its practical value in various decision-support applications, including identifying the most vulnerable network link(s), achieving a more reliable system through network design strategies, among others. As demonstrated by the numerical example, the model is capable in analyzing system-level reliability measures under various planning and policy scenarios. Using a simple network example, this paper illustrated that the expansion to the capacity of existing road may actually reduce the network reliability at certain service level. This situation could be detrimental if the network improvement plan such as expanding
14 one lane for existing freeway corridor is designated to accommodate future potential high travel demands. The second scenario further indicates that the addition of a new “express” road almost always improves the network reliability, as the users of the most vulnerable link (link 1) are provided with an alternative route (link 8). It is worth noting that the expansion to the existing network may or may not be a wise choice because of the possible existence of the capacity paradox (Yang and Bell, 1998) and the stochastic Braess’ paradox (Szeto, 2011). For future research, first, more rigorous discussion on algorithms to solve this proposed system optimization model can be future studied. Second, the network reliability measure can be extended to be time-dependent. Finally, the potential integration of this model with other network and/or demand models may be studied to provide a more insightful suggestion to this research issue. REFERENCES Arnott, R. and Small, K. (1994) The economics of traffic congestion. American Scientist 82, 446-455. Bell, M.G.H. and Cassir, C., (2002) Risk-Averse User Equilibrium Traffic Assignment: An Application of Game Theory. Transportation Research, Vol. 36B, pp. 671-681. Bell, M.G.H., Cassir, C., Iida, Y., and Lam, W.H.K., (1999) A sensitivity based approach to network reliability assessment. Proceedings of the 14th International Symposium on Transportation and Traffic Theory, Pergamon, Oxford, pp. 283-300. Bell, M.G.H., Kanturska, U., Schmocker, J.D. and Fonzone, A., (2008) Attacker-defender models and road network vulnerability. Philosophical Transactions of the Royal Society a-Mathematical Physical and Engineering Sciences, 366, pp. 1893-1906. Bell, M.G.H., (2000) A game theory approach to measuring the performance reliability of transport networks. Transportation Research Part B: Methodological 34, no. 6 (August): 533-545. Bell, M.G.H., (2003) The use of game theory to measure the vulnerability of stochastic networks. IEEE Transactions on Reliability. 52, no. 1: 63-68. Bell, M.G.H., (2006) Mixed Route Strategies for the Risk-Averse Shipment of Hazardous Materials. Networks & Spatial Economics 6, no. 3/4: 253-265. Berdica, K., (2002) An introduction to road vulnerability: what has been done, is done and should be done. Transport Policy, 9, pp. 117-127. Bersani, C. (2008). "Finding Solutions to Mixed Route Strategies for Transporting Hazardous Materials." Advanced Technologies and Methodologies for Risk Management in the Global Transport of Dangerous Goods, vol. 45, p. 133. Boyce, D.E., Mahmassani, H.S. and Nagurney, A., (2005) A retrospective on Beckmann, McGuire and Winsten's Studies in the Economics of Transportation. Regional Science
15 84, no. 1: 85-103. Bianco, L., Caramia, M. and Giordani, S. (2009). "A bilevel flow model for hazmat transportation network design." Transportation Research Part C: Emerging Technologies, 17(2), 175-196. Cassir, C. and Bell, M. (2001). RELIABILITY OF TRANSPORT NETWORKS. CHAPTER 7. THE N+ M PERSON GAME APPROACH TO NETWORK VARIABILITY. Chen A., Kim J., Zhou, Z. and Chootinan, P., (2007) Alpha Reliable Network Design Problem, Transportation Research Record: Journal of the Transportation Research Board, No. 2029, pp.49-57. Chen, A., Yang, H., Lo, H.K. and Tang, W.H., (2002). Capacity reliability of a road network: an assessment methodology and numerical results. Transportation Research Part B 36(3), 225-252. Chen, B.Y., Lam, W.H.K., Sumalee, A., Li, Q. and Li, Z.C., (2012) Vulnerability analysis for large-scale and congested road networks with demand uncertainty. Transportation Research Part A-Policy and Practice, 46, pp. 501-516. Dalziell, E.P. and Nicholson, A.J., (2001) Risk and impact of natural hazards on a road network. ASCE Journal of Transportation Engineering, 127(2), 159-166. Du, Z.P. and Nicholson, A.J., (1997) Degradable transportation systems: sensitivity and reliability analysis. Transportation Research B 31 (3), 225-237. Hillier, F.S. and Lieberman, G.J., (1990) Introduction to Operations Research. McGraw-Hill, New York. Hollander, Y. and Prashker, J., (2006) The applicability of non-cooperative game theory in transport analysis. Transportation 33:481–496 Igor, M., Filiposka, S., Gramatikov, S., Trajanov D. and Kocarev, L., (2010) Game Theoretic Approach for Discovering Vulnerable Links in Complex Networks, Novel Algorithms and Techniques in Telecommunications and Networking, 211-216. Iida, Y. and Wakabayashi, H., (1989) An approximation method of terminal reliability of road network using partial minimal path and cut set. In: Proceedings of the Fifth World Conference, vol. IV. Yokohama, Japan, pp. 367-380. Neumann, J. and Morgenstern, O., (1944) Theory of Games and Economic Behavior. Princeton University Press. Lam, W.H.K., Shao, H. and Sumalee, A., (2008) Modeling impacts of adverse weather conditions on a road network with uncertainties in demand and supply. Transportation Research Part B 42 890-910. Szeto, W. (2013). "Routing and scheduling hazardous material shipments: Nash game approach." Transportmetrica B: Transport Dynamics, 1(3), 237-260.
16
Szeto, W.Y., (2011) Cooperative game approaches to measuring network reliability considering paradoxes, Transportation Research Part C 19, 229-241. Szeto, W.Y., O’Brien, L. and O’Mahony, M. (2006). Risk-averse traffic assignment with elastic demands: NCP formulation and solution method for assessing performance reliability. Network and Spatial Economics 6 (3), 313–332. Szeto, W.Y., O’Brien, L. and O’Mahony, M. (2007). Generalisation of risk averse traffic assignment. In: Allsop, R.E., Bell, M.G.H., Heydecker, B.G. (Eds.), Transportation and Traffic Theory. Elsevier Science, Amsterdam, pp. 127–153 Szeto, W.Y. and Sumalee, A., (2009) A Game Theoretic Approach to Routing and Scheduling Hazardous Materials in Transport Networks with Multiple Origin-Destination Pairs. Transportation Research Board Annual Meeting, Washington D.C. Ugray, Z., Lasdon, L., Plummer, J., Glover, F., Kelly, J., and Martí, R., (2007) Scatter Search and Local NLP Solvers: A Multistart Framework for Global Optimization. INFORMS Journal on Computing, 19 (3): 328–340. Wakabayashi, H. and Iida, Y., (1992) Upper and lower bounds of terminal reliability of road networks: an efficient method with Boolean algebra. Journal of Natural Disaster Science, 14, 29-44. Wardrop, J.G., (1952) Some Theoretical Aspects of Road Traffic Research. In Proceedings of the Institute of Civil Engineers, 1:325-362. Greenford, UK. Watling, D.P. and Cantarellab, G.E., (2013). Modelling sources of variation in transportation systems: theoretical foundations of day-to-day dynamic models. Transportmetrica B: Transport Dynamics, 1 (1), 3-32 Yang, H. and Bell, M.G.H., (1998) A Capacity Paradox in Network Design and How to Avoid it, Transpn Res.-A, Vol. 32, No. 7, pp. 539-545 Yang, H. (1995). Heuristic algorithms for the bilevel origin-destination matrix estimation problem. Transportation Research Part B: Methodological, 29(4), 231-242. Yang, H. (1997) Sensitivity analysis for the elastic-demand network equilibrium problem with applications, Transportation Research 31B, 55-70.
17 Appendix Table A1: Experimental Results Using the Bi-level Optimization and Iterative Solution Algorithm
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25
Scenario B Obj. Function Value BiMultiLevel Start 1.3445 1.3440 1.3778 1.3775 1.4126 1.4124 1.4486 1.4482 1.4855 1.4855 1.5237 1.5235 1.5628 1.5628 1.6039 1.6035 1.6459 1.6459 1.6896 1.6892 1.7366 1.7364 1.7821 1.7815 1.8299 1.8293 1.8798 1.8795 1.9323 1.9320 1.9848 1.9846 2.0411 2.0406 2.0965 2.0964 2.1581 2.1578 2.2200 2.2196 2.2838 2.2838 2.3504 2.3504 2.4194 2.4194 2.4911 2.4911 2.5651 2.5651
Computational Time BiMultiLevel Start 123.2 585.1 119.2 575.6 122.0 557.0 112.9 592.7 118.8 539.3 113.7 534.6 115.7 531.9 117.1 531.2 116.2 521.7 121.2 543.5 113.3 526.4 114.6 525.7 113.0 530.0 113.3 530.5 123.5 524.4 126.8 521.0 128.5 547.1 114.0 543.5 112.0 525.3 112.4 555.0 110.5 530.5 109.7 556.3 119.7 540.9 110.6 555.9 112.2 531.5
26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50
Scenario B Obj. Function Value BiMultiLevel Start 2.6432 2.6431 2.7240 2.7235 2.8074 2.8074 2.8940 2.8933 2.9859 2.9847 3.0793 3.0789 3.1772 3.1770 3.2795 3.2790 3.3857 3.3853 3.4965 3.4965 3.6120 3.6120 3.7326 3.7326 3.8587 3.8587 3.9908 3.9902 4.1277 4.1277 4.2714 4.2710 4.4214 4.4211 4.5786 4.5783 4.7429 4.7427 4.9149 4.9149 5.0952 5.0952 5.2842 5.2842 5.4824 5.4824 5.6911 5.6907 5.9092 5.9086
Computational Time BiMultiLevel Start 115.3 522.2 111.3 522.1 111.1 562.8 109.7 525.5 115.8 530.5 111.2 573.7 120.7 522.2 127.0 578.7 120.3 521.3 118.9 543.6 120.0 536.4 116.5 534.2 123.3 542.0 128.7 547.9 134.7 545.5 123.4 542.2 114.8 597.7 114.0 557.1 120.9 563.4 118.2 571.6 115.1 580.6 125.7 564.3 129.2 567.3 131.8 567.2 136.8 581.3