SlideShare a Scribd company logo
1 of 99
Download to read offline
Discrete Optimization Models for Homeland Security
and Disaster Management
Laura Albert McLay
University of Wisconsin-Madison
Industrial and Systems Engineering
laura@engr.wisc.edu, @lauramclay
This work was funded by the National Science Foundation [Awards 1444219, 1541165]. The views and conclusions contained in
this document are those of the author and should not be interpreted as necessarily representing the oļ¬ƒcial policies, either
expressed or implied, of the National Science Foundation.
Laura Albert McLay () Disaster Management tutORial 2015 1 / 97
Goal of this tutORial
The goal is to
a) introduce you to research in optimization research in disasters and
homeland security.
b) introduce you to important issues for doing research in optimization
research in disasters and homeland security (modeling and data).
Not a comprehensive review of all research models in disasters!
Laura Albert McLay () Disaster Management tutORial 2015 2 / 97
Thank you National Science Foundation!
Enabling the Next Generation of Hazards and Disasters Researchers,
2009-2010.
This work was funded by the National Science Foundation Awards
1444219, 1541165.
Laura Albert McLay () Disaster Management tutORial 2015 3 / 97
Discrete optimization can be used to address many types
of disasters, includingā€œacts of Godā€ and acts of terrorism
Laura Albert McLay () Disaster Management tutORial 2015 4 / 97
Types of hazards we can address
Courtesy of FEMA
Laura Albert McLay () Disaster Management tutORial 2015 5 / 97
Types of hazards we can address
Courtesy of FEMA
Laura Albert McLay () Disaster Management tutORial 2015 6 / 97
Scales of disasters
Disaster metrics must capture the magnitude and scope of physical impact
and social disruption.
Community, regional, or societal levels
Not at the individual level
Laura Albert McLay () Disaster Management tutORial 2015 7 / 97
Emergency
An event with local eļ¬€ects that can be managed at the local level.
Examples: bus crash, local ļ¬‚oods, building collapses, etc.
Laura Albert McLay () Disaster Management tutORial 2015 8 / 97
Disaster
A severe event that aļ¬€ects a region but whose damaging eļ¬€ects are not
national in scope. The event can be managed with local, regional, and
some national resources.
Examples: Hurricane Irene (2011), tornadoes, pandemic ļ¬‚u
Laura Albert McLay () Disaster Management tutORial 2015 9 / 97
Catastrophe
A severe event that aļ¬€ects an entire nation and where the local and
regional responses are inadequate or impossible due to aļ¬€ected critical
infrastructure. The event threatens the welfare of a substantial number of
people for an extended amount of time, and therefore, necessitates a
national or international response.
Examples: Massive New Madrid zone earthquake, Spanish ļ¬‚u, 9/11,
Hurricane Katrina, 1976 Tang-Shen earthquake in China.
Laura Albert McLay () Disaster Management tutORial 2015 10 / 97
Extinction level event
Results (or could result) in the loss of all human life. No eļ¬€ective response
is available.
Examples: Massive meteorite strike, Yellowstone Caldera super explosion
(maybe), bi-national or multinational thermonuclear warfare, zombie
outbreak.
Laura Albert McLay () Disaster Management tutORial 2015 11 / 97
A note about terminology
While we use the term disasters generically in this paper to refer to
intentional (man-made) and natural disasters with varying scopes of
damage, we note that there are diļ¬€erent scales associated with these
events
Laura Albert McLay () Disaster Management tutORial 2015 12 / 97
Disaster: Joplin, Missouri
Courtesy of Jose Holguin-Veras at Rensselaer Polytechnic Institute
Laura Albert McLay () Disaster Management tutORial 2015 13 / 97
Disaster: Joplin, Missouri
Courtesy of Jose Holguin-Veras at Rensselaer Polytechnic Institute
Laura Albert McLay () Disaster Management tutORial 2015 14 / 97
Disaster: F-4 Tornado in Illinois, 11/17/2013
Courtesy of Jose Holguin-Veras at Rensselaer Polytechnic Institute
Laura Albert McLay () Disaster Management tutORial 2015 15 / 97
Catastrophe: Minami Sanriku, Japan
Courtesy of Jose Holguin-Veras at Rensselaer Polytechnic Institute
Laura Albert McLay () Disaster Management tutORial 2015 16 / 97
Catastrophe: Minami Sanriku, Japan
Courtesy of Jose Holguin-Veras at Rensselaer Polytechnic Institute
Laura Albert McLay () Disaster Management tutORial 2015 17 / 97
Catastrophe: Japan
Laura Albert McLay () Disaster Management tutORial 2015 18 / 97
Critical infrastructure: The U.S. PATRIOT Act
ā€œSystems and assets, whether physical or virtual, so vital to the
United States that the incapacity or destruction of such systems
and assets would have a debilitating impact on security, national
economic security, national public health or safety, or any
combination of those matters.ā€
Laura Albert McLay () Disaster Management tutORial 2015 19 / 97
Disasters cycles
Courtesy of FEMA
Laura Albert McLay () Disaster Management tutORial 2015 20 / 97
Disasters Lifecycle
Vulnerability
Mitigation
Preparedness
Emergency response
Recovery
The NAE notes that classiļ¬cation schemes are based on various
characteristics of disasters, such as their length of forewarning,
detectability, speed of onset, magnitude, scope, and duration of impact.
Additionally, the NAE recommends that willful acts of terrorism are
included in this lifecycle.
Laura Albert McLay () Disaster Management tutORial 2015 21 / 97
Disasters Lifecycle: Vulnerability
Vulnerability is the potential for physical harm and social disruption.
Physical harm represents the damage and threat of damage to physical
infrastructures and the natural environment. Social disruption and
vulnerability represent threats to human populations, such as death, injury,
morbidity, and disruption to behavior and social functioning.
Note: vulnerability does not lend itself to optimization.
Laura Albert McLay () Disaster Management tutORial 2015 22 / 97
Disasters Lifecycle: Mitigation
Mitigation includes actions taken prior to a disaster to prevent or reduce
the potential for harm, physical vulnerability, and social disruption.
Mitigation can be structural, which involves designing, constructing,
maintaining, and renovating physical infrastructure to withstand the
impact of a disaster, or nonstructural, which involves reducing exposure of
human populations and physical infrastructure to hazard conditions.
Examples
Checkpoint screening for security
Network design and fortiļ¬cation
Pre-locating medical facilities and response stations
Laura Albert McLay () Disaster Management tutORial 2015 23 / 97
Disasters Lifecycle: Preparedness
Preparedness includes actions taken prior to a disaster to aid in response
and recovery during and after a disaster. Preparedness actions often
include the development of formal disaster plans and the maintenance of
resources that are used in response and recovery.
Examples
Pre-positioning crews and supplies in advance of a disaster
Evacuation planning
Emergency crew scheduling
Laura Albert McLay () Disaster Management tutORial 2015 24 / 97
Disasters Lifecycle: Emergency response
Emergency response includes actions during and after a disaster to
protect and maintain systems, rescue and respond to casualties and
survivors, and restore essential public services.
Examples
Urban search and rescue
Routing and distribution of supplies and commodities
Hospital evacuation
Laura Albert McLay () Disaster Management tutORial 2015 25 / 97
Disasters Lifecycle: Recovery
Recovery includes eļ¬€orts to reestablish pre-disaster systems and services
through restoration and repair of infrastructure and social and economic
routines, such as education, consumption, and healthcare.
Examples
Debris clean up and removal
Roads, bridge, and facility repair and restoration
Replanting and restoration of forests and wetlands aļ¬€ected by a
natural disaster.
Laura Albert McLay () Disaster Management tutORial 2015 26 / 97
Who manages disasters?
Department of Homeland Security (DHS) manages disasters in the U.S.
DHS directorates manage diļ¬€erent hazards and disasters, including
transportation security (Transportation Security Administration
(TSA)),
nuclear security (Domestic Nuclear Detection Oļ¬ƒce),
border security (Customs and Border Protection (CBP)),
maritime security (U.S. Coast Guard),
all natural hazards and disasters (Federal Emergency Management
Agency (FEMA)).
Laura Albert McLay () Disaster Management tutORial 2015 27 / 97
Who manages disasters?
Military organizations such as the National Guard and the U.S. Coast
Guard provide support during disasters.
Numerous non-governmental organizations (NGOs) are also involved in
disasters.
The Red Cross, etc.
Usually, many organizations work together.
Laura Albert McLay () Disaster Management tutORial 2015 28 / 97
Discrete optimization is a good tool for disasters
Eļ¬€orts to improve disaster management often involve managing limited
resources, such as
pre-locating scarce resources and supplies
routing response vehicles
scheduling recovery crews
Disaster management often involves discrete choices
But we do not end up with textbook problems
Laura Albert McLay () Disaster Management tutORial 2015 29 / 97
Timeframe over which we model and inform decisions
Diļ¬€erent types of disasters and times
Hurricane and wildļ¬res give advanced warning
Climate change vs. tornado timeframes (slow / fast)
Mitigation vs. response (data collection ahead of time / on-the-ļ¬‚y)
Laura Albert McLay () Disaster Management tutORial 2015 30 / 97
Discrete optimization has its challenges
Challenges:
informational uncertainties in terms of supply and demand
damage to critical infrastructure and transportation networks
limited resources
challenges in communication between organizations providing aid and
between those who need help
data!
Laura Albert McLay () Disaster Management tutORial 2015 31 / 97
I recognize that disaster problems are ā€œwickedā€ problems
There are tame problems
Some problems need just operations research solutions
And then there are wicked problems
Problems that have a strong social, legal, and political components
Many stakeholders, incomplete, contradictory, and changing
requirements that are often diļ¬ƒcult to recognize
Laura Albert McLay () Disaster Management tutORial 2015 32 / 97
I recognize that disaster problems are ā€œwickedā€ problems
There are tame problems
Some problems need just operations research solutions
And then there are wicked problems
Problems that have a strong social, legal, and political components
Many stakeholders, incomplete, contradictory, and changing
requirements that are often diļ¬ƒcult to recognize
Russell Ackoļ¬€: ā€œEvery problem interacts with other problems and is
therefore part of a set of interrelated problems, a system of problems...I
choose to call such a system a mess.ā€
Laura Albert McLay () Disaster Management tutORial 2015 32 / 97
Now letā€™s introduce some models
Laura Albert McLay () Disaster Management tutORial 2015 33 / 97
Disaster mitigation
Focuses on preventing a disaster or reducing the harmful eļ¬€ects of a
disaster
We focus on
1 Screening and pre-screening problems in homeland security
applications that seek to reduce harm through detection and
prevention, and
2 Network interdiction and fortiļ¬cation models
Laura Albert McLay () Disaster Management tutORial 2015 34 / 97
Checked baggage security
Early discrete optimization research dates back prior to September 11,
2001
Checked baggage for high-risk passengers screened for explosives
selectee and non-selectee screening
Goal was how to optimally deploy and use limited baggage screening
devices.
Laura Albert McLay () Disaster Management tutORial 2015 35 / 97
Checked baggage security: covering models
Deļ¬nitions:
Station = set of airport facilities that share security resources
Flight segment = ļ¬‚ight between takeoļ¬€ and landing of an aircraft
A ļ¬‚ight segment is:
uncovered if 1+ bags on the ļ¬‚ight has not been screened
covered if all selectee bags on it have been screened
Baggage screening performance measures developed in conjunction with
the Federal Aviation Administration:
1 Uncovered ļ¬‚ight segments (UFS), which captures the total number of
uncovered ļ¬‚ights.
2 Uncovered passenger segments (UPS), which captures the total
number of passengers on uncovered ļ¬‚ights.
3 Uncovered baggage segments (UBS), which captures the total
number of unscreened selectee bags (regardless of ļ¬‚ight).
Laura Albert McLay () Disaster Management tutORial 2015 36 / 97
Checked baggage security: covering models
Side note: coverage is a useful objective
in low-data situations,
when better data collection is cumbersome (e.g., subject matter
experts)
when objectives are not clear
for mitigation (want to ā€œtouchā€ as many vulnerable parts of a system)
Second side note: we have limited resources:
Maximal coverage subject to budget or cardinality constraints
Laura Albert McLay () Disaster Management tutORial 2015 37 / 97
Checked baggage security: parameters
F = {f1, f2, ..., fn} = a set of n ļ¬‚ights.
C(fi ) = the number of selectee bags on ļ¬‚ight fi , i = 1, 2, ..., n.
N(fi ) = the number of passengers on ļ¬‚ight fi , i = 1, 2, ..., n.
S = the upper bound on the number of bags that can be screened.
Laura Albert McLay () Disaster Management tutORial 2015 38 / 97
Checked baggage security
The Uncovered Flight Segment Problem (UFSP): Find a subset of
ļ¬‚ights F āˆˆ F such that fi āˆˆF C(fi ) ā‰¤ S and the number of ļ¬‚ights |F |
is maximized.
Laura Albert McLay () Disaster Management tutORial 2015 39 / 97
Checked baggage security
The Uncovered Flight Segment Problem (UFSP): Find a subset of
ļ¬‚ights F āˆˆ F such that fi āˆˆF C(fi ) ā‰¤ S and the number of ļ¬‚ights |F |
is maximized.
The Uncovered Passenger Segment Problem (UPSP): Find a subset
of ļ¬‚ights F āˆˆ F such that fi āˆˆF C(fi ) ā‰¤ S and fi āˆˆF N(fi ) is
maximized.
The Uncovered Baggage Segment Problem (UBSP): Find a subset of
ļ¬‚ights F āˆˆ F such that fi āˆˆF C(fi ) ā‰¤ S and fi āˆˆF C(fi ) is maximized.
Laura Albert McLay () Disaster Management tutORial 2015 39 / 97
Checked baggage security: multiple stations
New parameters include:
m = the number of screening stations.
Fi āˆˆ F = the set of ļ¬‚ights that are associated with station
i = 1, 2, ..., m, where F1, F2, ..., Fm are a partition of F.
Three models address general allocation sizes. Here is the model
associated with the UPS measure.
The Multiple Station Passenger Segment Security Allocation and
Screening Problem with General Allocation Sizes: Find the subsets of
ļ¬‚ights Fi āˆˆ Fi , i = 1, 2, ..., m and a set of baggage screening security
device capacity allocations Si , i = 1, 2, ..., m that maximizes
m
i=1 fi āˆˆFi
N(fi ) such that m
i=1 Si ā‰¤ S and fi āˆˆFi
C(fi ) ā‰¤ Si ,
i = 1, 2, ..., m.
Laura Albert McLay () Disaster Management tutORial 2015 40 / 97
Checked baggage security: predetermined allocation sizes
Requires capacity to be assigned to stations in ļ¬xed, discrete amounts.
New parameters include:
A = {a1, a2, ..., a } = set of available security device allocations.
W (aj ) = the capacity associated with security device allocation aj ,
j = 1, 2, ..., .
The Multiple Station Passenger Segment Security Allocation and
Screening Problem with Predetermined Allocation Sizes: Find the
subsets of ļ¬‚ights Fi āˆˆ Fi , i = 1, 2, ..., m and a partition {Ai , A2, ..., Am} of
security device allocations A to stations that maximizes
m
i=1 fi āˆˆFi
N(fi ) such that m
i=1 fi āˆˆFi
C(fi ) ā‰¤ aj āˆˆA W (aj ).
Laura Albert McLay () Disaster Management tutORial 2015 41 / 97
Checked baggage security: uncovered targets
Extension to consider weapons of mass destruction (WMD), not just
conventional weapons
scope of damage not just the airplane and its passengers
1 Uncovered targets (UT), which captures the total number of
uncovered targets (e.g., destination cities), where a target is covered
if all ļ¬‚ights to the target are covered.
Leads to goal programming models that balance the UT measure with the
UPS, UFS, and UBS measures.
Laura Albert McLay () Disaster Management tutORial 2015 42 / 97
Risk-based methods for screening passengers
Laura Albert McLay () Disaster Management tutORial 2015 43 / 97
Aviation passenger checkpoint security
Risk-based multilevel screening considers
2+ levels of security to screen passengers
Passenger risk assessments
Static vs. dynamic security
This research provided the fundamental technical analysis for risk-based
security, which in led to TSA PreCheck.
Laura Albert McLay () Disaster Management tutORial 2015 44 / 97
Static checkpoint security: parameters and decision
variables
N = number of passengers.
M = number of screening classes.
ATj = assessed threat value of passenger j = 1, ..., N, a risk
assessment of passenger j returned by a passenger prescreening
system.
Li = the security level achieved by screening a passenger with
screening class i = 1, ..., M.
FCi = the ļ¬xed cost associated with screening class i = 1, ..., M.
MCi = the marginal cost of screening a passenger with screening
class i = 1, ..., M.
B = the screening budget to be used for the time horizon.
yi = 1 if screening class i is used and 0 otherwise, i = 1, 2, ..., M.
xij = 1 if passenger j is screened by class i and 0 otherwise,
i = 1, 2, ..., M, j = 1, 2, ..., N.
Laura Albert McLay () Disaster Management tutORial 2015 45 / 97
Static checkpoint security: model
max
M
i=1
N
j=1
Li ATj xij (1)
subject to
M
i=1
N
j=1
MCi xij +
M
i=1
FCi yi ā‰¤ B (2)
M
i=1
xij = 1, j = 1, 2, . . . , N (3)
xij āˆ’ yi ā‰¤ 0, j = 1, 2, ..., N, i = 1, 2, . . . , M (4)
yi āˆˆ {0, 1}, i = 1, 2, . . . , M (5)
xij āˆˆ {0, 1}, i = 1, 2, . . . , M, j = 1, 2, . . . , N. (6)
Laura Albert McLay () Disaster Management tutORial 2015 46 / 97
Static checkpoint security: model
max
M
i=1
N
j=1
Li ATj xij (1)
subject to
M
i=1
N
j=1
MCi xij +
M
i=1
FCi yi ā‰¤ B (2)
M
i=1
xij = 1, j = 1, 2, . . . , N (3)
xij āˆ’ yi ā‰¤ 0, j = 1, 2, ..., N, i = 1, 2, . . . , M (4)
yi āˆˆ {0, 1}, i = 1, 2, . . . , M (5)
xij āˆˆ {0, 1}, i = 1, 2, . . . , M, j = 1, 2, . . . , N. (6)
Insight: passengers tend to be assigned to few classes, with expedited
screening of the lower risk passengers.
Laura Albert McLay () Disaster Management tutORial 2015 46 / 97
Other risk based screening papers
How to optimally use security devices that are shared across security
classes
Consider trade-oļ¬€s between false alarm rate (proxy for passenger
inconvenience) and number of screeners needed
How to sequentially ā€œscoreā€ passengers and group passengers
according to their scores based on cumulative device responses
Laura Albert McLay () Disaster Management tutORial 2015 47 / 97
Dynamic aviation passenger checkpoint security
Dynamic passenger screening provide insight into real-time screening
decisions.
Modeled in the literature as a sequential process
Each passengerā€™s risk level becomes known upon arrival to a security
checkpoint
Markov decision process models for assigning passengers (in
real-time) to aviation security resources.
Selectee/nonselectee vs. multi-level screening
Two-stage models for device purchase/usage decisions
Laura Albert McLay () Disaster Management tutORial 2015 48 / 97
Cargo security
A stream of literature focuses on how to screen cargo containers for
nuclear material at ports of entry in a risk-based environment.
Ninety-ļ¬ve percent of international goods that enter the U.S. come
through one of the ports of entry
Early screening was performed by physically unpacking cargo containers
and inspecting their contents.
Laura Albert McLay () Disaster Management tutORial 2015 49 / 97
Cargo security
Eļ¬€ort to develop more eļ¬€ective screening methods based on imaging or
passive radiation detection to eļ¬ƒciently screen more containers.
Nearly all cargo containers are screened by radiation portal monitors
(RPMs)
Advanced screening methods such as imaging and physical inspection
used more sparingly and targeted at high-risk containers
Automated Targeting System (ATS) performs a risk assessment on
cargo containers that can aid in designing risk-based screening
systems.
Primary screening vs. secondary screening
Laura Albert McLay () Disaster Management tutORial 2015 50 / 97
Cargo security models
Linear programming model for performing primary screening on cargo
containers exiting a security checkpoint based on sensor responses
Which containers should be selected for secondary screening?
Linear programming models for selecting the right mix of primary
screening devices for each risk group
Integrated model for primary and secondary screening
Secondary screening depends on the mix of primary screening devices
that alarm
Large-scale linear programming model to sequence screening tests for
screening cargo containers.
How to supplement risk assessments with radiography-based images to
identify potential containerized threat scenarios
Laura Albert McLay () Disaster Management tutORial 2015 51 / 97
Network design and fortiļ¬cation
Network models address the need to design and fortify parts of a network
to mitigate vulnerabilities
Network interdiction models focus on worst-case failures
Failures could be due to natural or intentional causes
Does not model random component failure or reliability
Nearly all network interdiction problems modeled as Stackelberg games
Leader acts ļ¬rst by interdicting components of the network (e.g.,
lengthening arcs)
Follower acts second by performing recourse actions (e.g., selecting a
shortest path from the source to the sink).
Laura Albert McLay () Disaster Management tutORial 2015 52 / 97
Several classes of network interdiction models that are
well-studied in the literature
Shortest-path network interdiction: the operator seeks to ļ¬nd the
shortest path from a source to a sink after the leader lengthens arcs
in the network,
Maximum reliability network interdiction: the operator seeks to
maximize the probability of evading detection after the leader reduces
the evasion probability on some of the arcs in the network,
Maximum ļ¬‚ow interdiction: the operator seeks to maximize the
ļ¬‚ow achievable on the network after the leader reduces some of the
arc capacities, and
p-median network interdiction: the operator seeks to minimize the
total worst-case distance from the customers to the nearest facility
after the leader removes some of the facilities.
The interdiction model literature considers applications in transportation,
power, and other networks.
Laura Albert McLay () Disaster Management tutORial 2015 53 / 97
Network design and interdiction
Facility location interdiction support disaster mitigation eļ¬€orts: p-median
and covering.
Parameters:
F = set of existing facilities.
I = set of demand locations.
ai = demand at location i āˆˆ I.
dij = shortest distance between i and j, i āˆˆ I, j āˆˆ F.
r = number of facilities to be interdicted or eliminated.
Tij = {k āˆˆ F|k = j and dik > dij } = set of existing sites (not
including j) that are as far or farther than j is from demand i.
Ni āŠ‚ F = set of facility sites that cover demand i, i āˆˆ I.
Laura Albert McLay () Disaster Management tutORial 2015 54 / 97
Network design and interdiction
The r-interdiction median problem admits the following decision variables:
sj =
1 if facility j is eliminated, j āˆˆ F
0 otherwise
xij =
1 if demand i is assigned to a facility at j, i āˆˆ I, j āˆˆ F
0 otherwise
Laura Albert McLay () Disaster Management tutORial 2015 55 / 97
r-interdiction median problem integer programming model
z = max
iāˆˆI jāˆˆF
ai dij xij (7)
subject to
jāˆˆF
sj = r (8)
jāˆˆF
xij = 1, i āˆˆ I (9)
kāˆˆTij
xik ā‰¤ sj , j āˆˆ F (10)
xij āˆˆ {0, 1}, i āˆˆ I, j āˆˆ F (11)
sj āˆˆ {0, 1}, j āˆˆ F (12)
The objective function (7) seeks to maximize the resulting total weighted
distance between demand locations and facilities that have not been
interdicted.
Laura Albert McLay () Disaster Management tutORial 2015 56 / 97
r-interdiction covering problem
A demand location is no longer covered if all of the facilities that cover the
location have been interdicted.
New decision variables in addition to sj , j āˆˆ J:
yi =
1 if demand i is no longer covered
0 otherwise
Laura Albert McLay () Disaster Management tutORial 2015 57 / 97
r-interdiction covering problem integer programming model
z = max
iāˆˆI
ai yi (13)
subject to
jāˆˆF
sj = r (14)
yi ā‰¤ sj , i āˆˆ I, j āˆˆ Ni āˆ© F (15)
yi āˆˆ {0, 1}, i āˆˆ I (16)
sj āˆˆ {0, 1}, j āˆˆ F (17)
The objective function seeks to maximize the resulting total demand that
is uncovered after interdiction.
Laura Albert McLay () Disaster Management tutORial 2015 58 / 97
Network design and fortiļ¬cation
Fortiļ¬cation: allow a decision-maker to ļ¬rst make some facilities immune
to failure
Fortiļ¬cation is one way to mitigate the worst-case vulnerabilities in these
two base models
This results in the r-interdiction median problem with fortiļ¬cation
Model has same parameters and decision variables as the r-interdiction
median problem with a new set of decision variables:
zj =
1 if facility j is fortiļ¬ed, j āˆˆ F
0 otherwise
Laura Albert McLay () Disaster Management tutORial 2015 59 / 97
r-interdiction median problem with fortiļ¬cation
Formulated as a bi-level programming model.
Upper level problem captures fortiļ¬cation:
min H(z) (18)
subject to
jāˆˆF
zj = k (19)
zj āˆˆ {0, 1}, j āˆˆ F (20)
Lower level problem (next slide) captures interdiction of non-fortiļ¬ed
facilities.
Laura Albert McLay () Disaster Management tutORial 2015 60 / 97
r-interdiction median problem with fortiļ¬cation
Lower level problem captures worst-case interdiction:
H(z) = max
iāˆˆI jāˆˆF
ai dij xij (21)
subject to
jāˆˆF
sj = r (22)
jāˆˆF
xij = 1, i āˆˆ I (23)
hāˆˆTij
xih ā‰¤ sj , j āˆˆ F (24)
sj ā‰¤ 1 āˆ’ zj , j āˆˆ F (25)
xij āˆˆ {0, 1}, i āˆˆ I, j āˆˆ F (26)
sj āˆˆ {0, 1}, j āˆˆ F (27)
Note: a fortiļ¬ed facility cannot be interdicted
Laura Albert McLay () Disaster Management tutORial 2015 61 / 97
Network design and fortiļ¬cation
Solving the bi-level programming model is hard.
Decomposition, duality, or reformulation are not suitable for solving the
r-interdiction median problem with fortiļ¬cation due to the structure of the
lower level problem.
Scaparra and Church introduce an implicit enumeration algorithm to solve
the r-interdiction median problem with fortiļ¬cation.
A stream of papers examine algorithms and new models
Laura Albert McLay () Disaster Management tutORial 2015 62 / 97
Interdicting a nuclear weapons project
Attacker wishes to create a ļ¬ssion weapon as quickly as possible
Interdictor seeks to delay the completion of the project for as long as
possible by delaying certain activities needed to create a nuclear weapon.
The attackerā€™s model is a project management (critical shortest path)
problem
Precedence constraints and sequencing tasks
Attacker can expedite (shorten) tasks by using additional resources
Interdictor can delay the project by delaying certain tasks subject to
an interdiction constraint
Solved by Benders decomposition and implement the algorithm using
oļ¬€-the-shelf project-management software.
Brown et al [2009]
Laura Albert McLay () Disaster Management tutORial 2015 63 / 97
Disaster preparedness
addresses planning that is done prior to a disaster that is implemented
when the disaster is imminent.
We focus on
1 pre-positioning supplies, and
2 Evacuation planning
Note: Pre-positioning way in advance is more on the mitigation side.
Laura Albert McLay () Disaster Management tutORial 2015 64 / 97
Pre-positioning resources for a large-scale emergency
The resulting models can be used to pre-locate ambulances (facilities) at
pre-selected stations.
Jia et al. [2007] illustrate the models with examples that include a dirty
bomb attack, a terrorist attack using anthrax, and a terrorist attack using
smallpox.
The models provide insight into identifying tailored hospital locations for
large-scale emergencies that take into account the unique attributes of
these emergencies.
Laura Albert McLay () Disaster Management tutORial 2015 65 / 97
Pre-positioning resources for a large-scale emergency:
parameters
J = set facility locations.
I = set of demand locations.
K = set of possible emergency situations.
Mi = population of location i āˆˆ I.
eik = the weight of location i under emergency scenario k,
i āˆˆ I, k āˆˆ K.
Ī²ik = the likelihood that location i suļ¬€ers large-scale emergency
scenario k, i āˆˆ I, k āˆˆ K.
pjk = degree of disruption of facility j under emergency scenario k
with 0 ā‰¤ pjk ā‰¤ 1, j āˆˆ J, k āˆˆ K.
dij = distance from demand location i to j, i āˆˆ I, j āˆˆ J.
Qi = minimum number of facilities that must be assigned to location
i for it to be considered covered, i āˆˆ I.
P = the maximal number of facilities to locate.
Laura Albert McLay () Disaster Management tutORial 2015 66 / 97
Pre-positioning resources for a large-scale emergency
The decision variables are as follows:
xj =
1 if a facility is located at site j āˆˆ J
0 otherwise
zij =
1 if location i is assigned to a facility at j, i āˆˆ I, j āˆˆ F
0 otherwise
Laura Albert McLay () Disaster Management tutORial 2015 67 / 97
p-median model for emergency scenario k āˆˆ K
Zk = min
iāˆˆI jāˆˆJ
Ī²ikeikMi dij zij (28)
subject to
jāˆˆJ
xj = P (29)
jāˆˆJ
zij pjk = Qi , i āˆˆ I (30)
zij ā‰¤ xj , i āˆˆ I, j āˆˆ J (31)
zij āˆˆ {0, 1}, i āˆˆ I, j āˆˆ J (32)
xj āˆˆ {0, 1}, j āˆˆ J (33)
The model minimizes the demand-weighted distance between the demand
locations and the opened facilities.
Laura Albert McLay () Disaster Management tutORial 2015 68 / 97
Pre-positioning resources for a large-scale emergency:
coverage
Let Ni = {j|dij ā‰¤ Di } be the set of facilities that cover (service) demand
location i āˆˆ I
Di is the longest distance from demand point i a facility may be to cover
iā€™s demand.
New decision variables (in addition to xj , j āˆˆ J):
uj =
1 if location j is covered, i āˆˆ I
0 otherwise
Laura Albert McLay () Disaster Management tutORial 2015 69 / 97
Covering model for emergency scenario k āˆˆ K
Zk = max
iāˆˆI
Ī²ikeikMi ui (34)
subject to
jāˆˆJ
xj ā‰¤ P (35)
jāˆˆNi
xj pjk ā‰„ Qi ui , i āˆˆ I (36)
ui āˆˆ {0, 1}, i āˆˆ I (37)
xj āˆˆ {0, 1}, j āˆˆ J (38)
The model maximizes weighted coverage.
Laura Albert McLay () Disaster Management tutORial 2015 70 / 97
Evacuation
Evacuation is needed for many disasters:
hurricanes
tropical storms
wildļ¬res
ļ¬‚oods
nuclear emergencies
Evacuation starts with the decision to evacuate
Evacuation models must yield detailed plans for evacuation guide the ļ¬‚ow
of traļ¬ƒc.
Evacuation and routing use maximum ļ¬‚ow networks models, facility
location models, the traveling salesman problem, and the vehicle routing
problem.
Laura Albert McLay () Disaster Management tutORial 2015 71 / 97
Disaster response
Focuses on preventing a disaster or reducing the harmful eļ¬€ects of a
disaster
We focus on
1 response,
2 relief, and
3 routing
Laura Albert McLay () Disaster Management tutORial 2015 72 / 97
Emergency response to routine emergencies
Emergency response to routine emergencies that arise from 911 calls for
ļ¬re, police, or emergency medical service (EMS) service has been an active
area of research since the early 1970s.
The most relevant papers seek to assign vehicles to calls in real-time as
calls for service arrive to the system.
Few papers in this area focus on large-scale emergencies.
The ideas and methods translate to disasters since both focus on
delivering time-sensitive service to customers.
Both focus on public welfare and equity
Laura Albert McLay () Disaster Management tutORial 2015 73 / 97
Emergency response: limitations
All of the papers for routine emergencies implicitly assume that
data are available and
data are accurate
system experiences low traļ¬ƒc (i.e., long queues do not form)
These assumptions are not valid for disaster response!
Laura Albert McLay () Disaster Management tutORial 2015 74 / 97
Routing for relief
Routing for relief and delivering aid requires delivering time-sensitive
commodities to customers.
Ozdamar et al. [2004] integrates the multi-commodity network ļ¬‚ow
problem and the vehicle routing problem (VRP) and seeks to deliver aid on
a multi-modal transportation network
Mete and Zabinsky [2010] propose a stochastic optimization model for
pre-locating (preparedness) and distributing (response) medical supplies
after a disaster
Laura Albert McLay () Disaster Management tutORial 2015 75 / 97
Routing for relief
Campbell et al. [2008] provide two routing models for routing supplies for
relief eļ¬€orts that are variants of the TSP and VRP.
(1) a minsum objective that minimizes the sum of arrival times
(2) a minmax objective that captures the beginning time of the last
customer
Classic routing models such as the traveling salesman problem (TSP) and
the VRP do not reļ¬‚ect the operations and priorities in the aftermath of a
disaster.
Laura Albert McLay () Disaster Management tutORial 2015 76 / 97
Routing for relief: parameters
N = {1, ..., n} = set of customers (nodes).
N0 = N āˆŖ {0} = total set of nodes including the depot (0).
tij = travel time between the nodes i and j in N0.
T = a suļ¬ƒciently large number.
The decision variables include:
xij =
1 if the vehicle travels from i to j.
0 otherwise.
ai = the arrival time at customer i.
Laura Albert McLay () Disaster Management tutORial 2015 77 / 97
Routing for relief: model with minsum objective
z = min
iāˆˆN
ai (39)
subject to
jāˆˆN0
xij = 1, i āˆˆ N (40)
jāˆˆN0
xij āˆ’
jāˆˆN0
xji = 0, i āˆˆ N0 (41)
tij + ai ā‰¤ aj + T(1 āˆ’ xij ), i, j āˆˆ N (42)
ai ā‰„ t0i x0i , i āˆˆ N (43)
xij āˆˆ {0, 1}, i, j āˆˆ N0 (44)
The objective function (39) is the minsum objective that captures the sum
of the arrival times.
The model can be reformulated to capture the minmax objective by
introducing auxiliary variable ĀÆa to capture the last delivery time.
Laura Albert McLay () Disaster Management tutORial 2015 78 / 97
Disaster recovery
helping the system eļ¬ƒciently return to its pre-disaster capabilities
We focus on
1 Network recovery, and
2 Interdependent infrastructure
Laura Albert McLay () Disaster Management tutORial 2015 79 / 97
Recovery
Disaster recovery models focus on helping the system eļ¬ƒciently return to
its pre-disaster capabilities.
Most of the optimization models in this area focus on networks and model
commodities such as transportation, water, power, and communications.
How can we schedule the installation of arcs in a network over time in a
multicommodity ļ¬‚ow model? (Nurre et al [2012])
Flow can be directed over the new components once the installed
components become operational
The objective is to maximize the cumulative ļ¬‚ow on the network over
a ļ¬xed time horizon.
Laura Albert McLay () Disaster Management tutORial 2015 80 / 97
Network recovery: parameters
G = (N, A) = a network with nodes N and arcs A.
A = set of arcs that can be installed on the network.
K = the number of parallel identical work groups that can install
network components
S āŠ‚ N = set of supply nodes with supply si , i āˆˆ S.
D āŠ‚ N = set of demand nodes with demand di , i āˆˆ D.
wi = weight associated with a unit of ļ¬‚ow that arrives at demand
node i āˆˆ D.
uij = arc capacity for arc (i, j) āˆˆ A āˆŖ A .
pij = processing time to install arc (i, j) āˆˆ A .
T = length of the time horizon.
Āµt = weight associated with the performance of the network at time
t = 1, 2, ..., T.
Laura Albert McLay () Disaster Management tutORial 2015 81 / 97
Network recovery: decision variables
The decision variables include:
1 xijt = the amount of ļ¬‚ow on arc (i, j) āˆˆ A āˆŖ A at time t = 1, ..., T.
2 vit = the amount of demand met at node i āˆˆ D at time t = 1, ..., T.
3 Ī²ijt =
1 if arc (i, j) āˆˆ A is operational at time, t = 1, ..., T.
0 otherwise.
4 Ī±ijkt =
1 if workgroup k completes arc (i, j) āˆˆ A in time period , t = 1, ...
0 otherwise.
Laura Albert McLay () Disaster Management tutORial 2015 82 / 97
Network recovery: model (Part 1)
z = max
T
t=1 iāˆˆD
Āµtwi vit (45)
subject to
(i,j)āˆˆAāˆŖA
xijt āˆ’
(j,i)āˆˆAāˆŖA
xjit ā‰¤ si , i āˆˆ S, t = 1, ..., T (46)
(i,j)āˆˆAāˆŖA
xijt āˆ’
(j,i)āˆˆAāˆŖA
xjit = 0, i āˆˆ N{S āˆŖ D}t = 1, ..., T(47)
(i,j)āˆˆAāˆŖA
xijt āˆ’
(j,i)āˆˆAāˆŖA
xjit = āˆ’vit, i āˆˆ D, t = 1, ..., T (48)
0 ā‰¤ vit ā‰¤ di , i āˆˆ D, t = 1, ..., T (49)
0 ā‰¤ xijt ā‰¤ uij , (i, j) āˆˆ A, t = 1, ..., T (50)
0 ā‰¤ xijt ā‰¤ uij Ī²ijt, (i, j) āˆˆ A , t = 1, ..., T (51)
Laura Albert McLay () Disaster Management tutORial 2015 83 / 97
Network recovery: model (Part 2)
(i,j)āˆˆA
min{T,t+pij āˆ’1}
s=t
Ī±kijs ā‰¤ 1, k = 1, ..., K, t =, ..., T (52)
Ī²ijt āˆ’
t
s=1
K
k=1
Ī±kijs ā‰¤ 0, (i, j) āˆˆ A , t = 1, ..., T (53)
pij āˆ’1
t=1
Ī²ijt = 0, (i, j) āˆˆ A (54)
K
k=1
pij āˆ’1
t=1
Ī±kijt = 0, (i, j) āˆˆ A (55)
Ī±kijt, Ī²ijt āˆˆ {0, 1}, (i, j) āˆˆ A , k = 1, ..., K, t = 1, ..., T. (56)
Laura Albert McLay () Disaster Management tutORial 2015 84 / 97
Data, information, and modeling challenges
Laura Albert McLay () Disaster Management tutORial 2015 85 / 97
New criteria
Traditional criteria:
Quality
Proļ¬t
Cost
Distance
Disasters criteria:
Loss of life
Morbidity
Coverage
Delivery of critical time-sensitive
commodities
Discrete optimization models for disasters are not merely traditional
discrete optimization models with new objective functions
Laura Albert McLay () Disaster Management tutORial 2015 86 / 97
Mechanisms for new structural model components
1. several agencies often work together to respond to and deliver
commodities after a disaster
multiple decision-makers with limited control over certain parts of the
operations
2. issues such as fairness often emerge in models for disasters.
Lots of ways to model equity
3. traditional models often implicitly assume the network components are
reliable
may not be valid when facilities are damaged and may not be fully
operational
Laura Albert McLay () Disaster Management tutORial 2015 87 / 97
Vulnerability
Models for disasters almost always focus on events with high consequences
There is often an interest in vulnerability and events that overwhelm the
resources and capacities in the system.
Vulnerability can be modeled with:
max-min models to capture worst-case performance
the inclusion of uncertain and unpredictable demands and system
failures.
models with cascading failures
Laura Albert McLay () Disaster Management tutORial 2015 88 / 97
Resource allocation
In a disaster setting, resources may include:
1. new resources speciļ¬c to the disaster at hand
e.g., anthrax vaccines dispensed after an anthrax attack
2. resources used for non-disaster scenarios that may be used in new ways
during disaster management
e.g., ambulances that evacuate hospital patients after a hurricane
resource deployment strategies during and after disaster events may
diļ¬€er from those used for routine operations (e.g., reactive
deployment of ļ¬rst responders after a large-scale emergency)
Laura Albert McLay () Disaster Management tutORial 2015 89 / 97
Data collection is hard
Getting data is hard.
This is true for many application areas, but it is particularly true for
disasters applications.
Data may be impractical to collect when events are rare (e.g., terrorist
attacks)
Data may not come from usual sources (e.g., the number of evacuees in
shelters).
Data may be perishable and therefore must be collected in a timely manner
Laura Albert McLay () Disaster Management tutORial 2015 90 / 97
Data collection sometimes cannot be done in advance
Laura Albert McLay () Disaster Management tutORial 2015 91 / 97
Data have bad quality
Data that are collected may be inaccurate and incomplete.
Censored data
E.g., If there are communications failures after a hurricane strikes and
patients cannot call 911 for service, the calls may not be entered into
call logs.
Data incorrectly characterized
Computer aided dispatch software used by 911 centers do not have
codes for large-scale emergencies, such as carbon monoxide poisoning
caused by generators used during power outages. Instead, these 911
calls are mapped to codes used for typical emergencies (e.g.,
overdose).
Laura Albert McLay () Disaster Management tutORial 2015 92 / 97
Data challenges
1. Data can be used in a static manner, where it is collected and used to
parameterize the models that are solved ahead of time.
2. Models that address response and recovery may include real-time
decision making and may integrate data from multiple sources (variety)
that arrive in real-time (velocity).
ā€œBig Dataā€ issues are a national research priority.
Laura Albert McLay () Disaster Management tutORial 2015 93 / 97
Conclusions
Managing disasters and improving homeland security involve using
scarce resources and weigh multiple criteria.
OR is a good tool!
Many of the problems involve discrete decisions such as location,
assignment, and network ļ¬‚ows.
Discrete optimization is a good tool!
Important problems across the disasters lifecycle and across diļ¬€erent
types of disasters.
Models for homeland security and disaster problems generally cannot
use canonical discrete optimization models
Laura Albert McLay () Disaster Management tutORial 2015 94 / 97
Resilience analytics
Data-driven interdependent physical, service, and community networks
before, during, and after a disruption.
Descriptive analytics: what is happening?
Predictive analytics: what will happen?
Prescriptive analytics: what do we do about it?
For more: http://resilienceanalytics.com
Laura Albert McLay () Disaster Management tutORial 2015 95 / 97
Thank you!
Additional reading from Punk Rock OR:
my national academies committee experience and risk-based ļ¬‚ood
insurance
operations research, disasters, and science communication
staying safe from tornadoes
the forecasting models behind the power outages forecasts for
Hurricane Sandy
rivisiting September 11, 2001 fourteen years later
aviation security, there and back again
Laura Albert McLay () Disaster Management tutORial 2015 96 / 97

More Related Content

What's hot

The precautionary principle pp2
The precautionary principle pp2The precautionary principle pp2
The precautionary principle pp2Elsa von Licy
Ā 
DISASTER FOLLOWING NATURAL EVENTS-PREVENTION AND MANAGEMENT OF DISASTER
DISASTER FOLLOWING NATURAL EVENTS-PREVENTION AND MANAGEMENT OF DISASTERDISASTER FOLLOWING NATURAL EVENTS-PREVENTION AND MANAGEMENT OF DISASTER
DISASTER FOLLOWING NATURAL EVENTS-PREVENTION AND MANAGEMENT OF DISASTERIAEME Publication
Ā 
Disaster Management (ANP, MSC PREVIOUS)
Disaster Management (ANP, MSC PREVIOUS)Disaster Management (ANP, MSC PREVIOUS)
Disaster Management (ANP, MSC PREVIOUS)Divyesh Pal Singh
Ā 
Evolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disasterEvolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disasterNicholas Kman, MD, FACEP
Ā 
Pangkomunidad na paghahanda at pagsasanay sa sakuna para sa bgy banawang
Pangkomunidad na paghahanda at pagsasanay sa sakuna para sa bgy banawangPangkomunidad na paghahanda at pagsasanay sa sakuna para sa bgy banawang
Pangkomunidad na paghahanda at pagsasanay sa sakuna para sa bgy banawangMavic Pineda
Ā 
Disaster Mangement process with Uttarakhand Case Study
Disaster Mangement process with Uttarakhand Case StudyDisaster Mangement process with Uttarakhand Case Study
Disaster Mangement process with Uttarakhand Case StudyAvinash Chavan
Ā 
effective disaster management by efficient usage of resources
effective disaster management by efficient usage of resourceseffective disaster management by efficient usage of resources
effective disaster management by efficient usage of resourcesINFOGAIN PUBLICATION
Ā 
Role of government in disaster management at central tam 2013-20
Role of government in disaster management at central tam 2013-20Role of government in disaster management at central tam 2013-20
Role of government in disaster management at central tam 2013-20Vijay Kumar
Ā 
Disaster management
Disaster managementDisaster management
Disaster management982665379
Ā 
Disaster management
Disaster managementDisaster management
Disaster managementShimil Abraham
Ā 
UNITAR-certificate3-15
UNITAR-certificate3-15UNITAR-certificate3-15
UNITAR-certificate3-15William Tarpai
Ā 

What's hot (13)

The precautionary principle pp2
The precautionary principle pp2The precautionary principle pp2
The precautionary principle pp2
Ā 
DISASTER FOLLOWING NATURAL EVENTS-PREVENTION AND MANAGEMENT OF DISASTER
DISASTER FOLLOWING NATURAL EVENTS-PREVENTION AND MANAGEMENT OF DISASTERDISASTER FOLLOWING NATURAL EVENTS-PREVENTION AND MANAGEMENT OF DISASTER
DISASTER FOLLOWING NATURAL EVENTS-PREVENTION AND MANAGEMENT OF DISASTER
Ā 
Disaster Management (ANP, MSC PREVIOUS)
Disaster Management (ANP, MSC PREVIOUS)Disaster Management (ANP, MSC PREVIOUS)
Disaster Management (ANP, MSC PREVIOUS)
Ā 
Evolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disasterEvolving a strategy for emergency response to natural disaster
Evolving a strategy for emergency response to natural disaster
Ā 
Pangkomunidad na paghahanda at pagsasanay sa sakuna para sa bgy banawang
Pangkomunidad na paghahanda at pagsasanay sa sakuna para sa bgy banawangPangkomunidad na paghahanda at pagsasanay sa sakuna para sa bgy banawang
Pangkomunidad na paghahanda at pagsasanay sa sakuna para sa bgy banawang
Ā 
Ch 17
Ch 17Ch 17
Ch 17
Ā 
Disaster Mangement process with Uttarakhand Case Study
Disaster Mangement process with Uttarakhand Case StudyDisaster Mangement process with Uttarakhand Case Study
Disaster Mangement process with Uttarakhand Case Study
Ā 
effective disaster management by efficient usage of resources
effective disaster management by efficient usage of resourceseffective disaster management by efficient usage of resources
effective disaster management by efficient usage of resources
Ā 
Role of government in disaster management at central tam 2013-20
Role of government in disaster management at central tam 2013-20Role of government in disaster management at central tam 2013-20
Role of government in disaster management at central tam 2013-20
Ā 
Disaster management
Disaster managementDisaster management
Disaster management
Ā 
Disaster management
Disaster managementDisaster management
Disaster management
Ā 
Fema slides
Fema slidesFema slides
Fema slides
Ā 
UNITAR-certificate3-15
UNITAR-certificate3-15UNITAR-certificate3-15
UNITAR-certificate3-15
Ā 

Viewers also liked

Integer programming for locating ambulances
Integer programming for locating ambulancesInteger programming for locating ambulances
Integer programming for locating ambulancesLaura Albert
Ā 
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...Laura Albert
Ā 
Operations Research for Homeland Security and Beyond!
Operations Research for Homeland Security and Beyond!Operations Research for Homeland Security and Beyond!
Operations Research for Homeland Security and Beyond!Laura Albert
Ā 
Spring new educators orientation
Spring new educators orientationSpring new educators orientation
Spring new educators orientationLaura Albert
Ā 
Wicked problems in operations research
Wicked problems in operations researchWicked problems in operations research
Wicked problems in operations researchLaura Albert
Ā 
Bracketology talk at the Crossroads of ideas
Bracketology talk at the Crossroads of ideasBracketology talk at the Crossroads of ideas
Bracketology talk at the Crossroads of ideasLaura Albert
Ā 
engineering systems: critical infrastructure and logistics
engineering systems: critical infrastructure and logisticsengineering systems: critical infrastructure and logistics
engineering systems: critical infrastructure and logisticsLaura Albert
Ā 
Should a football team run or pass? A linear programming approach to game theory
Should a football team run or pass? A linear programming approach to game theoryShould a football team run or pass? A linear programming approach to game theory
Should a football team run or pass? A linear programming approach to game theoryLaura Albert
Ā 
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001Laura Albert
Ā 
So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...Laura Albert
Ā 
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...Laura Albert
Ā 
Delivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreachDelivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreachLaura Albert
Ā 
Filipino noli-me-tangere kab1-64
Filipino  noli-me-tangere kab1-64Filipino  noli-me-tangere kab1-64
Filipino noli-me-tangere kab1-64Eemlliuq Agalalan
Ā 
Varayti ng wika.updated ShS (Techvoc) 1 week
Varayti ng wika.updated  ShS (Techvoc) 1 weekVarayti ng wika.updated  ShS (Techvoc) 1 week
Varayti ng wika.updated ShS (Techvoc) 1 weekallan capulong
Ā 
Florante at laura buod
Florante at laura buodFlorante at laura buod
Florante at laura buodmaricar francia
Ā 
FLORANTE AT LAURA KABANATA 1 TO 64
FLORANTE AT LAURA KABANATA 1 TO 64FLORANTE AT LAURA KABANATA 1 TO 64
FLORANTE AT LAURA KABANATA 1 TO 64asa net
Ā 

Viewers also liked (17)

Integer programming for locating ambulances
Integer programming for locating ambulancesInteger programming for locating ambulances
Integer programming for locating ambulances
Ā 
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
2015 Fuzzy Vance Lecture in Mathematics at Oberlin College: Locating and disp...
Ā 
Operations Research for Homeland Security and Beyond!
Operations Research for Homeland Security and Beyond!Operations Research for Homeland Security and Beyond!
Operations Research for Homeland Security and Beyond!
Ā 
Spring new educators orientation
Spring new educators orientationSpring new educators orientation
Spring new educators orientation
Ā 
Wicked problems in operations research
Wicked problems in operations researchWicked problems in operations research
Wicked problems in operations research
Ā 
Bracketology talk at the Crossroads of ideas
Bracketology talk at the Crossroads of ideasBracketology talk at the Crossroads of ideas
Bracketology talk at the Crossroads of ideas
Ā 
engineering systems: critical infrastructure and logistics
engineering systems: critical infrastructure and logisticsengineering systems: critical infrastructure and logistics
engineering systems: critical infrastructure and logistics
Ā 
Should a football team run or pass? A linear programming approach to game theory
Should a football team run or pass? A linear programming approach to game theoryShould a football team run or pass? A linear programming approach to game theory
Should a football team run or pass? A linear programming approach to game theory
Ā 
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Screening Commercial Aviation Passengers in the Aftermath of September 11, 2001
Ā 
So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...So you're thinking about graduate school in operations research, math, or eng...
So you're thinking about graduate school in operations research, math, or eng...
Ā 
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Women in engineering luncheon presentation at CASE 2013 (IEEE conference on a...
Ā 
Delivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreachDelivering emergency medical services: research, application, and outreach
Delivering emergency medical services: research, application, and outreach
Ā 
Filipino noli-me-tangere kab1-64
Filipino  noli-me-tangere kab1-64Filipino  noli-me-tangere kab1-64
Filipino noli-me-tangere kab1-64
Ā 
FLORANTE at LAURA
FLORANTE at LAURAFLORANTE at LAURA
FLORANTE at LAURA
Ā 
Varayti ng wika.updated ShS (Techvoc) 1 week
Varayti ng wika.updated  ShS (Techvoc) 1 weekVarayti ng wika.updated  ShS (Techvoc) 1 week
Varayti ng wika.updated ShS (Techvoc) 1 week
Ā 
Florante at laura buod
Florante at laura buodFlorante at laura buod
Florante at laura buod
Ā 
FLORANTE AT LAURA KABANATA 1 TO 64
FLORANTE AT LAURA KABANATA 1 TO 64FLORANTE AT LAURA KABANATA 1 TO 64
FLORANTE AT LAURA KABANATA 1 TO 64
Ā 

Similar to Discrete Optimization Models for Homeland Security and Disaster Management

Disaster Management Organization
Disaster Management OrganizationDisaster Management Organization
Disaster Management OrganizationHeather Dionne
Ā 
Disaster management Project For Class 9
Disaster management Project For Class 9 Disaster management Project For Class 9
Disaster management Project For Class 9 RkleoantonyRkleoanto
Ā 
ERM 1200 Introduction to Emergency ManagementModule 1 Chapter
ERM 1200 Introduction to Emergency ManagementModule 1 ChapterERM 1200 Introduction to Emergency ManagementModule 1 Chapter
ERM 1200 Introduction to Emergency ManagementModule 1 ChapterTanaMaeskm
Ā 
Disaster management with case study
Disaster management with case studyDisaster management with case study
Disaster management with case studyAkash Rana
Ā 
Running Head Emergency Management Event Analysis 2Hu.docx
Running Head Emergency Management Event Analysis 2Hu.docxRunning Head Emergency Management Event Analysis 2Hu.docx
Running Head Emergency Management Event Analysis 2Hu.docxsusanschei
Ā 
Mailcom 2010 Las Vegas Ss278
Mailcom 2010 Las Vegas Ss278Mailcom 2010 Las Vegas Ss278
Mailcom 2010 Las Vegas Ss278dflora
Ā 
AUVSI 2012 - Natural Disasters: A Future View in the Use of RPAS
AUVSI 2012 - Natural Disasters: A Future View in the Use of RPASAUVSI 2012 - Natural Disasters: A Future View in the Use of RPAS
AUVSI 2012 - Natural Disasters: A Future View in the Use of RPASLaura SamsĆ³, MSc
Ā 
Responding to Mass Casualty Incidents
Responding to Mass Casualty IncidentsResponding to Mass Casualty Incidents
Responding to Mass Casualty IncidentsLea Alayon
Ā 
Disaster management
Disaster managementDisaster management
Disaster managementparul1218
Ā 
Disaster management project
Disaster management projectDisaster management project
Disaster management projecthemant sonawane
Ā 
Mention and discuss the stages of disaster management.pdf
Mention and discuss the stages of disaster management.pdfMention and discuss the stages of disaster management.pdf
Mention and discuss the stages of disaster management.pdfbkbk37
Ā 
10.11770002716205285404 604MarchTHE ANNALS OF THE AMERICAN AC.docx
10.11770002716205285404 604MarchTHE ANNALS OF THE AMERICAN AC.docx10.11770002716205285404 604MarchTHE ANNALS OF THE AMERICAN AC.docx
10.11770002716205285404 604MarchTHE ANNALS OF THE AMERICAN AC.docxhyacinthshackley2629
Ā 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform MovementJennifer Reither
Ā 
Fema And The Federal Emergency Management Agency
Fema And The Federal Emergency Management AgencyFema And The Federal Emergency Management Agency
Fema And The Federal Emergency Management AgencyDenise Enriquez
Ā 
Reconstitution of emergency operations center.docx
Reconstitution of emergency operations center.docxReconstitution of emergency operations center.docx
Reconstitution of emergency operations center.docxsodhi3
Ā 
Rondeaupanel2009spring (1)
Rondeaupanel2009spring (1)Rondeaupanel2009spring (1)
Rondeaupanel2009spring (1)Don L Rondeau
Ā 

Similar to Discrete Optimization Models for Homeland Security and Disaster Management (20)

Disaster Management Organization
Disaster Management OrganizationDisaster Management Organization
Disaster Management Organization
Ā 
Disaster management Project For Class 9
Disaster management Project For Class 9 Disaster management Project For Class 9
Disaster management Project For Class 9
Ā 
ERM 1200 Introduction to Emergency ManagementModule 1 Chapter
ERM 1200 Introduction to Emergency ManagementModule 1 ChapterERM 1200 Introduction to Emergency ManagementModule 1 Chapter
ERM 1200 Introduction to Emergency ManagementModule 1 Chapter
Ā 
Disaster management with case study
Disaster management with case studyDisaster management with case study
Disaster management with case study
Ā 
Running Head Emergency Management Event Analysis 2Hu.docx
Running Head Emergency Management Event Analysis 2Hu.docxRunning Head Emergency Management Event Analysis 2Hu.docx
Running Head Emergency Management Event Analysis 2Hu.docx
Ā 
Mailcom 2010 Las Vegas Ss278
Mailcom 2010 Las Vegas Ss278Mailcom 2010 Las Vegas Ss278
Mailcom 2010 Las Vegas Ss278
Ā 
Disaster management
Disaster managementDisaster management
Disaster management
Ā 
Chapter One
Chapter OneChapter One
Chapter One
Ā 
AUVSI 2012 - Natural Disasters: A Future View in the Use of RPAS
AUVSI 2012 - Natural Disasters: A Future View in the Use of RPASAUVSI 2012 - Natural Disasters: A Future View in the Use of RPAS
AUVSI 2012 - Natural Disasters: A Future View in the Use of RPAS
Ā 
Responding to Mass Casualty Incidents
Responding to Mass Casualty IncidentsResponding to Mass Casualty Incidents
Responding to Mass Casualty Incidents
Ā 
Essay On Coping With Disaster
Essay On Coping With DisasterEssay On Coping With Disaster
Essay On Coping With Disaster
Ā 
disaster.ppt
disaster.pptdisaster.ppt
disaster.ppt
Ā 
Disaster management
Disaster managementDisaster management
Disaster management
Ā 
Disaster management project
Disaster management projectDisaster management project
Disaster management project
Ā 
Mention and discuss the stages of disaster management.pdf
Mention and discuss the stages of disaster management.pdfMention and discuss the stages of disaster management.pdf
Mention and discuss the stages of disaster management.pdf
Ā 
10.11770002716205285404 604MarchTHE ANNALS OF THE AMERICAN AC.docx
10.11770002716205285404 604MarchTHE ANNALS OF THE AMERICAN AC.docx10.11770002716205285404 604MarchTHE ANNALS OF THE AMERICAN AC.docx
10.11770002716205285404 604MarchTHE ANNALS OF THE AMERICAN AC.docx
Ā 
Sputnik Education Reform Movement
Sputnik Education Reform MovementSputnik Education Reform Movement
Sputnik Education Reform Movement
Ā 
Fema And The Federal Emergency Management Agency
Fema And The Federal Emergency Management AgencyFema And The Federal Emergency Management Agency
Fema And The Federal Emergency Management Agency
Ā 
Reconstitution of emergency operations center.docx
Reconstitution of emergency operations center.docxReconstitution of emergency operations center.docx
Reconstitution of emergency operations center.docx
Ā 
Rondeaupanel2009spring (1)
Rondeaupanel2009spring (1)Rondeaupanel2009spring (1)
Rondeaupanel2009spring (1)
Ā 

More from Laura Albert

Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research Laura Albert
Ā 
Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...Laura Albert
Ā 
On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...Laura Albert
Ā 
Volleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chainsVolleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chainsLaura Albert
Ā 
2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit Overview2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit OverviewLaura Albert
Ā 
Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience Laura Albert
Ā 
Modeling Service networks
Modeling Service networksModeling Service networks
Modeling Service networksLaura Albert
Ā 
Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...Laura Albert
Ā 
Delivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and applicationDelivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and applicationLaura Albert
Ā 
Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!Laura Albert
Ā 
Technical writing tips
Technical writing tipsTechnical writing tips
Technical writing tipsLaura Albert
Ā 

More from Laura Albert (11)

Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research Optimization with impact: my journey in public sector operations research
Optimization with impact: my journey in public sector operations research
Ā 
Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...Should a football team go for a one or two point conversion? A dynamic progra...
Should a football team go for a one or two point conversion? A dynamic progra...
Ā 
On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...On designing public sector systems in emergency medical services, disaster re...
On designing public sector systems in emergency medical services, disaster re...
Ā 
Volleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chainsVolleyball analytics: Modeling volleyball using Markov chains
Volleyball analytics: Modeling volleyball using Markov chains
Ā 
2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit Overview2018 INFORMS Government & Analytics Summit Overview
2018 INFORMS Government & Analytics Summit Overview
Ā 
Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience Designing emergency medical service systems to enhance community resilience
Designing emergency medical service systems to enhance community resilience
Ā 
Modeling Service networks
Modeling Service networksModeling Service networks
Modeling Service networks
Ā 
Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...Translating Engineering and Operations Analyses into Effective Homeland Secur...
Translating Engineering and Operations Analyses into Effective Homeland Secur...
Ā 
Delivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and applicationDelivering emergency medical services:Research, theory, and application
Delivering emergency medical services:Research, theory, and application
Ā 
Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!Advanced analytics for supporting public policy, bracketology, and beyond!
Advanced analytics for supporting public policy, bracketology, and beyond!
Ā 
Technical writing tips
Technical writing tipsTechnical writing tips
Technical writing tips
Ā 

Recently uploaded

Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queensdataanalyticsqueen03
Ā 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxUnduhUnggah1
Ā 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsVICTOR MAESTRE RAMIREZ
Ā 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
Ā 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.natarajan8993
Ā 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
Ā 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
Ā 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPramod Kumar Srivastava
Ā 
原ē‰ˆ1:1å®šåˆ¶å—åå­—ę˜Ÿå¤§å­¦ęƕäøščƁļ¼ˆSCUęƕäøščƁļ¼‰#ę–‡å‡­ęˆē»©å•#ēœŸå®žē•™äæ”å­¦åŽ†č®¤čƁę°øä¹…å­˜ę”£
原ē‰ˆ1:1å®šåˆ¶å—åå­—ę˜Ÿå¤§å­¦ęƕäøščƁļ¼ˆSCUęƕäøščƁļ¼‰#ę–‡å‡­ęˆē»©å•#ēœŸå®žē•™äæ”å­¦åŽ†č®¤čƁę°øä¹…å­˜ę”£åŽŸē‰ˆ1:1å®šåˆ¶å—åå­—ę˜Ÿå¤§å­¦ęƕäøščƁļ¼ˆSCUęƕäøščƁļ¼‰#ę–‡å‡­ęˆē»©å•#ēœŸå®žē•™äæ”å­¦åŽ†č®¤čƁę°øä¹…å­˜ę”£
原ē‰ˆ1:1å®šåˆ¶å—åå­—ę˜Ÿå¤§å­¦ęƕäøščƁļ¼ˆSCUęƕäøščƁļ¼‰#ę–‡å‡­ęˆē»©å•#ēœŸå®žē•™äæ”å­¦åŽ†č®¤čƁę°øä¹…å­˜ę”£208367051
Ā 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptSonatrach
Ā 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfchwongval
Ā 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxEmmanuel Dauda
Ā 
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”soniya singh
Ā 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSINGmarianagonzalez07
Ā 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxdolaknnilon
Ā 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]šŸ“Š Markus Baersch
Ā 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptxthyngster
Ā 
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...soniya singh
Ā 

Recently uploaded (20)

Top 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In QueensTop 5 Best Data Analytics Courses In Queens
Top 5 Best Data Analytics Courses In Queens
Ā 
MK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docxMK KOMUNIKASI DATA (TI)komdat komdat.docx
MK KOMUNIKASI DATA (TI)komdat komdat.docx
Ā 
E-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptxE-Commerce Order PredictionShraddha Kamble.pptx
E-Commerce Order PredictionShraddha Kamble.pptx
Ā 
Advanced Machine Learning for Business Professionals
Advanced Machine Learning for Business ProfessionalsAdvanced Machine Learning for Business Professionals
Advanced Machine Learning for Business Professionals
Ā 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
Ā 
RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.RABBIT: A CLI tool for identifying bots based on their GitHub events.
RABBIT: A CLI tool for identifying bots based on their GitHub events.
Ā 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Ā 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Ā 
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptxPKS-TGC-1084-630 - Stage 1 Proposal.pptx
PKS-TGC-1084-630 - Stage 1 Proposal.pptx
Ā 
原ē‰ˆ1:1å®šåˆ¶å—åå­—ę˜Ÿå¤§å­¦ęƕäøščƁļ¼ˆSCUęƕäøščƁļ¼‰#ę–‡å‡­ęˆē»©å•#ēœŸå®žē•™äæ”å­¦åŽ†č®¤čƁę°øä¹…å­˜ę”£
原ē‰ˆ1:1å®šåˆ¶å—åå­—ę˜Ÿå¤§å­¦ęƕäøščƁļ¼ˆSCUęƕäøščƁļ¼‰#ę–‡å‡­ęˆē»©å•#ēœŸå®žē•™äæ”å­¦åŽ†č®¤čƁę°øä¹…å­˜ę”£åŽŸē‰ˆ1:1å®šåˆ¶å—åå­—ę˜Ÿå¤§å­¦ęƕäøščƁļ¼ˆSCUęƕäøščƁļ¼‰#ę–‡å‡­ęˆē»©å•#ēœŸå®žē•™äæ”å­¦åŽ†č®¤čƁę°øä¹…å­˜ę”£
原ē‰ˆ1:1å®šåˆ¶å—åå­—ę˜Ÿå¤§å­¦ęƕäøščƁļ¼ˆSCUęƕäøščƁļ¼‰#ę–‡å‡­ęˆē»©å•#ēœŸå®žē•™äæ”å­¦åŽ†č®¤čƁę°øä¹…å­˜ę”£
Ā 
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.pptdokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
dokumen.tips_chapter-4-transient-heat-conduction-mehmet-kanoglu.ppt
Ā 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdf
Ā 
Customer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptxCustomer Service Analytics - Make Sense of All Your Data.pptx
Customer Service Analytics - Make Sense of All Your Data.pptx
Ā 
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Call Girls in Defence Colony Delhi šŸ’ÆCall Us šŸ”8264348440šŸ”
Ā 
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
2006_GasProcessing_HB (1).pdf HYDROCARBON PROCESSING
Ā 
Call Girls in Saket 99530šŸ” 56974 Escort Service
Call Girls in Saket 99530šŸ” 56974 Escort ServiceCall Girls in Saket 99530šŸ” 56974 Escort Service
Call Girls in Saket 99530šŸ” 56974 Escort Service
Ā 
IMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptxIMA MSN - Medical Students Network (2).pptx
IMA MSN - Medical Students Network (2).pptx
Ā 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
Ā 
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptxEMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM  TRACKING WITH GOOGLE ANALYTICS.pptx
EMERCE - 2024 - AMSTERDAM - CROSS-PLATFORM TRACKING WITH GOOGLE ANALYTICS.pptx
Ā 
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...
High Class Call Girls Noida Sector 39 Aarushi šŸ”8264348440šŸ” Independent Escort...
Ā 

Discrete Optimization Models for Homeland Security and Disaster Management

  • 1. Discrete Optimization Models for Homeland Security and Disaster Management Laura Albert McLay University of Wisconsin-Madison Industrial and Systems Engineering laura@engr.wisc.edu, @lauramclay This work was funded by the National Science Foundation [Awards 1444219, 1541165]. The views and conclusions contained in this document are those of the author and should not be interpreted as necessarily representing the oļ¬ƒcial policies, either expressed or implied, of the National Science Foundation. Laura Albert McLay () Disaster Management tutORial 2015 1 / 97
  • 2. Goal of this tutORial The goal is to a) introduce you to research in optimization research in disasters and homeland security. b) introduce you to important issues for doing research in optimization research in disasters and homeland security (modeling and data). Not a comprehensive review of all research models in disasters! Laura Albert McLay () Disaster Management tutORial 2015 2 / 97
  • 3. Thank you National Science Foundation! Enabling the Next Generation of Hazards and Disasters Researchers, 2009-2010. This work was funded by the National Science Foundation Awards 1444219, 1541165. Laura Albert McLay () Disaster Management tutORial 2015 3 / 97
  • 4. Discrete optimization can be used to address many types of disasters, includingā€œacts of Godā€ and acts of terrorism Laura Albert McLay () Disaster Management tutORial 2015 4 / 97
  • 5. Types of hazards we can address Courtesy of FEMA Laura Albert McLay () Disaster Management tutORial 2015 5 / 97
  • 6. Types of hazards we can address Courtesy of FEMA Laura Albert McLay () Disaster Management tutORial 2015 6 / 97
  • 7. Scales of disasters Disaster metrics must capture the magnitude and scope of physical impact and social disruption. Community, regional, or societal levels Not at the individual level Laura Albert McLay () Disaster Management tutORial 2015 7 / 97
  • 8. Emergency An event with local eļ¬€ects that can be managed at the local level. Examples: bus crash, local ļ¬‚oods, building collapses, etc. Laura Albert McLay () Disaster Management tutORial 2015 8 / 97
  • 9. Disaster A severe event that aļ¬€ects a region but whose damaging eļ¬€ects are not national in scope. The event can be managed with local, regional, and some national resources. Examples: Hurricane Irene (2011), tornadoes, pandemic ļ¬‚u Laura Albert McLay () Disaster Management tutORial 2015 9 / 97
  • 10. Catastrophe A severe event that aļ¬€ects an entire nation and where the local and regional responses are inadequate or impossible due to aļ¬€ected critical infrastructure. The event threatens the welfare of a substantial number of people for an extended amount of time, and therefore, necessitates a national or international response. Examples: Massive New Madrid zone earthquake, Spanish ļ¬‚u, 9/11, Hurricane Katrina, 1976 Tang-Shen earthquake in China. Laura Albert McLay () Disaster Management tutORial 2015 10 / 97
  • 11. Extinction level event Results (or could result) in the loss of all human life. No eļ¬€ective response is available. Examples: Massive meteorite strike, Yellowstone Caldera super explosion (maybe), bi-national or multinational thermonuclear warfare, zombie outbreak. Laura Albert McLay () Disaster Management tutORial 2015 11 / 97
  • 12. A note about terminology While we use the term disasters generically in this paper to refer to intentional (man-made) and natural disasters with varying scopes of damage, we note that there are diļ¬€erent scales associated with these events Laura Albert McLay () Disaster Management tutORial 2015 12 / 97
  • 13. Disaster: Joplin, Missouri Courtesy of Jose Holguin-Veras at Rensselaer Polytechnic Institute Laura Albert McLay () Disaster Management tutORial 2015 13 / 97
  • 14. Disaster: Joplin, Missouri Courtesy of Jose Holguin-Veras at Rensselaer Polytechnic Institute Laura Albert McLay () Disaster Management tutORial 2015 14 / 97
  • 15. Disaster: F-4 Tornado in Illinois, 11/17/2013 Courtesy of Jose Holguin-Veras at Rensselaer Polytechnic Institute Laura Albert McLay () Disaster Management tutORial 2015 15 / 97
  • 16. Catastrophe: Minami Sanriku, Japan Courtesy of Jose Holguin-Veras at Rensselaer Polytechnic Institute Laura Albert McLay () Disaster Management tutORial 2015 16 / 97
  • 17. Catastrophe: Minami Sanriku, Japan Courtesy of Jose Holguin-Veras at Rensselaer Polytechnic Institute Laura Albert McLay () Disaster Management tutORial 2015 17 / 97
  • 18. Catastrophe: Japan Laura Albert McLay () Disaster Management tutORial 2015 18 / 97
  • 19. Critical infrastructure: The U.S. PATRIOT Act ā€œSystems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.ā€ Laura Albert McLay () Disaster Management tutORial 2015 19 / 97
  • 20. Disasters cycles Courtesy of FEMA Laura Albert McLay () Disaster Management tutORial 2015 20 / 97
  • 21. Disasters Lifecycle Vulnerability Mitigation Preparedness Emergency response Recovery The NAE notes that classiļ¬cation schemes are based on various characteristics of disasters, such as their length of forewarning, detectability, speed of onset, magnitude, scope, and duration of impact. Additionally, the NAE recommends that willful acts of terrorism are included in this lifecycle. Laura Albert McLay () Disaster Management tutORial 2015 21 / 97
  • 22. Disasters Lifecycle: Vulnerability Vulnerability is the potential for physical harm and social disruption. Physical harm represents the damage and threat of damage to physical infrastructures and the natural environment. Social disruption and vulnerability represent threats to human populations, such as death, injury, morbidity, and disruption to behavior and social functioning. Note: vulnerability does not lend itself to optimization. Laura Albert McLay () Disaster Management tutORial 2015 22 / 97
  • 23. Disasters Lifecycle: Mitigation Mitigation includes actions taken prior to a disaster to prevent or reduce the potential for harm, physical vulnerability, and social disruption. Mitigation can be structural, which involves designing, constructing, maintaining, and renovating physical infrastructure to withstand the impact of a disaster, or nonstructural, which involves reducing exposure of human populations and physical infrastructure to hazard conditions. Examples Checkpoint screening for security Network design and fortiļ¬cation Pre-locating medical facilities and response stations Laura Albert McLay () Disaster Management tutORial 2015 23 / 97
  • 24. Disasters Lifecycle: Preparedness Preparedness includes actions taken prior to a disaster to aid in response and recovery during and after a disaster. Preparedness actions often include the development of formal disaster plans and the maintenance of resources that are used in response and recovery. Examples Pre-positioning crews and supplies in advance of a disaster Evacuation planning Emergency crew scheduling Laura Albert McLay () Disaster Management tutORial 2015 24 / 97
  • 25. Disasters Lifecycle: Emergency response Emergency response includes actions during and after a disaster to protect and maintain systems, rescue and respond to casualties and survivors, and restore essential public services. Examples Urban search and rescue Routing and distribution of supplies and commodities Hospital evacuation Laura Albert McLay () Disaster Management tutORial 2015 25 / 97
  • 26. Disasters Lifecycle: Recovery Recovery includes eļ¬€orts to reestablish pre-disaster systems and services through restoration and repair of infrastructure and social and economic routines, such as education, consumption, and healthcare. Examples Debris clean up and removal Roads, bridge, and facility repair and restoration Replanting and restoration of forests and wetlands aļ¬€ected by a natural disaster. Laura Albert McLay () Disaster Management tutORial 2015 26 / 97
  • 27. Who manages disasters? Department of Homeland Security (DHS) manages disasters in the U.S. DHS directorates manage diļ¬€erent hazards and disasters, including transportation security (Transportation Security Administration (TSA)), nuclear security (Domestic Nuclear Detection Oļ¬ƒce), border security (Customs and Border Protection (CBP)), maritime security (U.S. Coast Guard), all natural hazards and disasters (Federal Emergency Management Agency (FEMA)). Laura Albert McLay () Disaster Management tutORial 2015 27 / 97
  • 28. Who manages disasters? Military organizations such as the National Guard and the U.S. Coast Guard provide support during disasters. Numerous non-governmental organizations (NGOs) are also involved in disasters. The Red Cross, etc. Usually, many organizations work together. Laura Albert McLay () Disaster Management tutORial 2015 28 / 97
  • 29. Discrete optimization is a good tool for disasters Eļ¬€orts to improve disaster management often involve managing limited resources, such as pre-locating scarce resources and supplies routing response vehicles scheduling recovery crews Disaster management often involves discrete choices But we do not end up with textbook problems Laura Albert McLay () Disaster Management tutORial 2015 29 / 97
  • 30. Timeframe over which we model and inform decisions Diļ¬€erent types of disasters and times Hurricane and wildļ¬res give advanced warning Climate change vs. tornado timeframes (slow / fast) Mitigation vs. response (data collection ahead of time / on-the-ļ¬‚y) Laura Albert McLay () Disaster Management tutORial 2015 30 / 97
  • 31. Discrete optimization has its challenges Challenges: informational uncertainties in terms of supply and demand damage to critical infrastructure and transportation networks limited resources challenges in communication between organizations providing aid and between those who need help data! Laura Albert McLay () Disaster Management tutORial 2015 31 / 97
  • 32. I recognize that disaster problems are ā€œwickedā€ problems There are tame problems Some problems need just operations research solutions And then there are wicked problems Problems that have a strong social, legal, and political components Many stakeholders, incomplete, contradictory, and changing requirements that are often diļ¬ƒcult to recognize Laura Albert McLay () Disaster Management tutORial 2015 32 / 97
  • 33. I recognize that disaster problems are ā€œwickedā€ problems There are tame problems Some problems need just operations research solutions And then there are wicked problems Problems that have a strong social, legal, and political components Many stakeholders, incomplete, contradictory, and changing requirements that are often diļ¬ƒcult to recognize Russell Ackoļ¬€: ā€œEvery problem interacts with other problems and is therefore part of a set of interrelated problems, a system of problems...I choose to call such a system a mess.ā€ Laura Albert McLay () Disaster Management tutORial 2015 32 / 97
  • 34. Now letā€™s introduce some models Laura Albert McLay () Disaster Management tutORial 2015 33 / 97
  • 35. Disaster mitigation Focuses on preventing a disaster or reducing the harmful eļ¬€ects of a disaster We focus on 1 Screening and pre-screening problems in homeland security applications that seek to reduce harm through detection and prevention, and 2 Network interdiction and fortiļ¬cation models Laura Albert McLay () Disaster Management tutORial 2015 34 / 97
  • 36. Checked baggage security Early discrete optimization research dates back prior to September 11, 2001 Checked baggage for high-risk passengers screened for explosives selectee and non-selectee screening Goal was how to optimally deploy and use limited baggage screening devices. Laura Albert McLay () Disaster Management tutORial 2015 35 / 97
  • 37. Checked baggage security: covering models Deļ¬nitions: Station = set of airport facilities that share security resources Flight segment = ļ¬‚ight between takeoļ¬€ and landing of an aircraft A ļ¬‚ight segment is: uncovered if 1+ bags on the ļ¬‚ight has not been screened covered if all selectee bags on it have been screened Baggage screening performance measures developed in conjunction with the Federal Aviation Administration: 1 Uncovered ļ¬‚ight segments (UFS), which captures the total number of uncovered ļ¬‚ights. 2 Uncovered passenger segments (UPS), which captures the total number of passengers on uncovered ļ¬‚ights. 3 Uncovered baggage segments (UBS), which captures the total number of unscreened selectee bags (regardless of ļ¬‚ight). Laura Albert McLay () Disaster Management tutORial 2015 36 / 97
  • 38. Checked baggage security: covering models Side note: coverage is a useful objective in low-data situations, when better data collection is cumbersome (e.g., subject matter experts) when objectives are not clear for mitigation (want to ā€œtouchā€ as many vulnerable parts of a system) Second side note: we have limited resources: Maximal coverage subject to budget or cardinality constraints Laura Albert McLay () Disaster Management tutORial 2015 37 / 97
  • 39. Checked baggage security: parameters F = {f1, f2, ..., fn} = a set of n ļ¬‚ights. C(fi ) = the number of selectee bags on ļ¬‚ight fi , i = 1, 2, ..., n. N(fi ) = the number of passengers on ļ¬‚ight fi , i = 1, 2, ..., n. S = the upper bound on the number of bags that can be screened. Laura Albert McLay () Disaster Management tutORial 2015 38 / 97
  • 40. Checked baggage security The Uncovered Flight Segment Problem (UFSP): Find a subset of ļ¬‚ights F āˆˆ F such that fi āˆˆF C(fi ) ā‰¤ S and the number of ļ¬‚ights |F | is maximized. Laura Albert McLay () Disaster Management tutORial 2015 39 / 97
  • 41. Checked baggage security The Uncovered Flight Segment Problem (UFSP): Find a subset of ļ¬‚ights F āˆˆ F such that fi āˆˆF C(fi ) ā‰¤ S and the number of ļ¬‚ights |F | is maximized. The Uncovered Passenger Segment Problem (UPSP): Find a subset of ļ¬‚ights F āˆˆ F such that fi āˆˆF C(fi ) ā‰¤ S and fi āˆˆF N(fi ) is maximized. The Uncovered Baggage Segment Problem (UBSP): Find a subset of ļ¬‚ights F āˆˆ F such that fi āˆˆF C(fi ) ā‰¤ S and fi āˆˆF C(fi ) is maximized. Laura Albert McLay () Disaster Management tutORial 2015 39 / 97
  • 42. Checked baggage security: multiple stations New parameters include: m = the number of screening stations. Fi āˆˆ F = the set of ļ¬‚ights that are associated with station i = 1, 2, ..., m, where F1, F2, ..., Fm are a partition of F. Three models address general allocation sizes. Here is the model associated with the UPS measure. The Multiple Station Passenger Segment Security Allocation and Screening Problem with General Allocation Sizes: Find the subsets of ļ¬‚ights Fi āˆˆ Fi , i = 1, 2, ..., m and a set of baggage screening security device capacity allocations Si , i = 1, 2, ..., m that maximizes m i=1 fi āˆˆFi N(fi ) such that m i=1 Si ā‰¤ S and fi āˆˆFi C(fi ) ā‰¤ Si , i = 1, 2, ..., m. Laura Albert McLay () Disaster Management tutORial 2015 40 / 97
  • 43. Checked baggage security: predetermined allocation sizes Requires capacity to be assigned to stations in ļ¬xed, discrete amounts. New parameters include: A = {a1, a2, ..., a } = set of available security device allocations. W (aj ) = the capacity associated with security device allocation aj , j = 1, 2, ..., . The Multiple Station Passenger Segment Security Allocation and Screening Problem with Predetermined Allocation Sizes: Find the subsets of ļ¬‚ights Fi āˆˆ Fi , i = 1, 2, ..., m and a partition {Ai , A2, ..., Am} of security device allocations A to stations that maximizes m i=1 fi āˆˆFi N(fi ) such that m i=1 fi āˆˆFi C(fi ) ā‰¤ aj āˆˆA W (aj ). Laura Albert McLay () Disaster Management tutORial 2015 41 / 97
  • 44. Checked baggage security: uncovered targets Extension to consider weapons of mass destruction (WMD), not just conventional weapons scope of damage not just the airplane and its passengers 1 Uncovered targets (UT), which captures the total number of uncovered targets (e.g., destination cities), where a target is covered if all ļ¬‚ights to the target are covered. Leads to goal programming models that balance the UT measure with the UPS, UFS, and UBS measures. Laura Albert McLay () Disaster Management tutORial 2015 42 / 97
  • 45. Risk-based methods for screening passengers Laura Albert McLay () Disaster Management tutORial 2015 43 / 97
  • 46. Aviation passenger checkpoint security Risk-based multilevel screening considers 2+ levels of security to screen passengers Passenger risk assessments Static vs. dynamic security This research provided the fundamental technical analysis for risk-based security, which in led to TSA PreCheck. Laura Albert McLay () Disaster Management tutORial 2015 44 / 97
  • 47. Static checkpoint security: parameters and decision variables N = number of passengers. M = number of screening classes. ATj = assessed threat value of passenger j = 1, ..., N, a risk assessment of passenger j returned by a passenger prescreening system. Li = the security level achieved by screening a passenger with screening class i = 1, ..., M. FCi = the ļ¬xed cost associated with screening class i = 1, ..., M. MCi = the marginal cost of screening a passenger with screening class i = 1, ..., M. B = the screening budget to be used for the time horizon. yi = 1 if screening class i is used and 0 otherwise, i = 1, 2, ..., M. xij = 1 if passenger j is screened by class i and 0 otherwise, i = 1, 2, ..., M, j = 1, 2, ..., N. Laura Albert McLay () Disaster Management tutORial 2015 45 / 97
  • 48. Static checkpoint security: model max M i=1 N j=1 Li ATj xij (1) subject to M i=1 N j=1 MCi xij + M i=1 FCi yi ā‰¤ B (2) M i=1 xij = 1, j = 1, 2, . . . , N (3) xij āˆ’ yi ā‰¤ 0, j = 1, 2, ..., N, i = 1, 2, . . . , M (4) yi āˆˆ {0, 1}, i = 1, 2, . . . , M (5) xij āˆˆ {0, 1}, i = 1, 2, . . . , M, j = 1, 2, . . . , N. (6) Laura Albert McLay () Disaster Management tutORial 2015 46 / 97
  • 49. Static checkpoint security: model max M i=1 N j=1 Li ATj xij (1) subject to M i=1 N j=1 MCi xij + M i=1 FCi yi ā‰¤ B (2) M i=1 xij = 1, j = 1, 2, . . . , N (3) xij āˆ’ yi ā‰¤ 0, j = 1, 2, ..., N, i = 1, 2, . . . , M (4) yi āˆˆ {0, 1}, i = 1, 2, . . . , M (5) xij āˆˆ {0, 1}, i = 1, 2, . . . , M, j = 1, 2, . . . , N. (6) Insight: passengers tend to be assigned to few classes, with expedited screening of the lower risk passengers. Laura Albert McLay () Disaster Management tutORial 2015 46 / 97
  • 50. Other risk based screening papers How to optimally use security devices that are shared across security classes Consider trade-oļ¬€s between false alarm rate (proxy for passenger inconvenience) and number of screeners needed How to sequentially ā€œscoreā€ passengers and group passengers according to their scores based on cumulative device responses Laura Albert McLay () Disaster Management tutORial 2015 47 / 97
  • 51. Dynamic aviation passenger checkpoint security Dynamic passenger screening provide insight into real-time screening decisions. Modeled in the literature as a sequential process Each passengerā€™s risk level becomes known upon arrival to a security checkpoint Markov decision process models for assigning passengers (in real-time) to aviation security resources. Selectee/nonselectee vs. multi-level screening Two-stage models for device purchase/usage decisions Laura Albert McLay () Disaster Management tutORial 2015 48 / 97
  • 52. Cargo security A stream of literature focuses on how to screen cargo containers for nuclear material at ports of entry in a risk-based environment. Ninety-ļ¬ve percent of international goods that enter the U.S. come through one of the ports of entry Early screening was performed by physically unpacking cargo containers and inspecting their contents. Laura Albert McLay () Disaster Management tutORial 2015 49 / 97
  • 53. Cargo security Eļ¬€ort to develop more eļ¬€ective screening methods based on imaging or passive radiation detection to eļ¬ƒciently screen more containers. Nearly all cargo containers are screened by radiation portal monitors (RPMs) Advanced screening methods such as imaging and physical inspection used more sparingly and targeted at high-risk containers Automated Targeting System (ATS) performs a risk assessment on cargo containers that can aid in designing risk-based screening systems. Primary screening vs. secondary screening Laura Albert McLay () Disaster Management tutORial 2015 50 / 97
  • 54. Cargo security models Linear programming model for performing primary screening on cargo containers exiting a security checkpoint based on sensor responses Which containers should be selected for secondary screening? Linear programming models for selecting the right mix of primary screening devices for each risk group Integrated model for primary and secondary screening Secondary screening depends on the mix of primary screening devices that alarm Large-scale linear programming model to sequence screening tests for screening cargo containers. How to supplement risk assessments with radiography-based images to identify potential containerized threat scenarios Laura Albert McLay () Disaster Management tutORial 2015 51 / 97
  • 55. Network design and fortiļ¬cation Network models address the need to design and fortify parts of a network to mitigate vulnerabilities Network interdiction models focus on worst-case failures Failures could be due to natural or intentional causes Does not model random component failure or reliability Nearly all network interdiction problems modeled as Stackelberg games Leader acts ļ¬rst by interdicting components of the network (e.g., lengthening arcs) Follower acts second by performing recourse actions (e.g., selecting a shortest path from the source to the sink). Laura Albert McLay () Disaster Management tutORial 2015 52 / 97
  • 56. Several classes of network interdiction models that are well-studied in the literature Shortest-path network interdiction: the operator seeks to ļ¬nd the shortest path from a source to a sink after the leader lengthens arcs in the network, Maximum reliability network interdiction: the operator seeks to maximize the probability of evading detection after the leader reduces the evasion probability on some of the arcs in the network, Maximum ļ¬‚ow interdiction: the operator seeks to maximize the ļ¬‚ow achievable on the network after the leader reduces some of the arc capacities, and p-median network interdiction: the operator seeks to minimize the total worst-case distance from the customers to the nearest facility after the leader removes some of the facilities. The interdiction model literature considers applications in transportation, power, and other networks. Laura Albert McLay () Disaster Management tutORial 2015 53 / 97
  • 57. Network design and interdiction Facility location interdiction support disaster mitigation eļ¬€orts: p-median and covering. Parameters: F = set of existing facilities. I = set of demand locations. ai = demand at location i āˆˆ I. dij = shortest distance between i and j, i āˆˆ I, j āˆˆ F. r = number of facilities to be interdicted or eliminated. Tij = {k āˆˆ F|k = j and dik > dij } = set of existing sites (not including j) that are as far or farther than j is from demand i. Ni āŠ‚ F = set of facility sites that cover demand i, i āˆˆ I. Laura Albert McLay () Disaster Management tutORial 2015 54 / 97
  • 58. Network design and interdiction The r-interdiction median problem admits the following decision variables: sj = 1 if facility j is eliminated, j āˆˆ F 0 otherwise xij = 1 if demand i is assigned to a facility at j, i āˆˆ I, j āˆˆ F 0 otherwise Laura Albert McLay () Disaster Management tutORial 2015 55 / 97
  • 59. r-interdiction median problem integer programming model z = max iāˆˆI jāˆˆF ai dij xij (7) subject to jāˆˆF sj = r (8) jāˆˆF xij = 1, i āˆˆ I (9) kāˆˆTij xik ā‰¤ sj , j āˆˆ F (10) xij āˆˆ {0, 1}, i āˆˆ I, j āˆˆ F (11) sj āˆˆ {0, 1}, j āˆˆ F (12) The objective function (7) seeks to maximize the resulting total weighted distance between demand locations and facilities that have not been interdicted. Laura Albert McLay () Disaster Management tutORial 2015 56 / 97
  • 60. r-interdiction covering problem A demand location is no longer covered if all of the facilities that cover the location have been interdicted. New decision variables in addition to sj , j āˆˆ J: yi = 1 if demand i is no longer covered 0 otherwise Laura Albert McLay () Disaster Management tutORial 2015 57 / 97
  • 61. r-interdiction covering problem integer programming model z = max iāˆˆI ai yi (13) subject to jāˆˆF sj = r (14) yi ā‰¤ sj , i āˆˆ I, j āˆˆ Ni āˆ© F (15) yi āˆˆ {0, 1}, i āˆˆ I (16) sj āˆˆ {0, 1}, j āˆˆ F (17) The objective function seeks to maximize the resulting total demand that is uncovered after interdiction. Laura Albert McLay () Disaster Management tutORial 2015 58 / 97
  • 62. Network design and fortiļ¬cation Fortiļ¬cation: allow a decision-maker to ļ¬rst make some facilities immune to failure Fortiļ¬cation is one way to mitigate the worst-case vulnerabilities in these two base models This results in the r-interdiction median problem with fortiļ¬cation Model has same parameters and decision variables as the r-interdiction median problem with a new set of decision variables: zj = 1 if facility j is fortiļ¬ed, j āˆˆ F 0 otherwise Laura Albert McLay () Disaster Management tutORial 2015 59 / 97
  • 63. r-interdiction median problem with fortiļ¬cation Formulated as a bi-level programming model. Upper level problem captures fortiļ¬cation: min H(z) (18) subject to jāˆˆF zj = k (19) zj āˆˆ {0, 1}, j āˆˆ F (20) Lower level problem (next slide) captures interdiction of non-fortiļ¬ed facilities. Laura Albert McLay () Disaster Management tutORial 2015 60 / 97
  • 64. r-interdiction median problem with fortiļ¬cation Lower level problem captures worst-case interdiction: H(z) = max iāˆˆI jāˆˆF ai dij xij (21) subject to jāˆˆF sj = r (22) jāˆˆF xij = 1, i āˆˆ I (23) hāˆˆTij xih ā‰¤ sj , j āˆˆ F (24) sj ā‰¤ 1 āˆ’ zj , j āˆˆ F (25) xij āˆˆ {0, 1}, i āˆˆ I, j āˆˆ F (26) sj āˆˆ {0, 1}, j āˆˆ F (27) Note: a fortiļ¬ed facility cannot be interdicted Laura Albert McLay () Disaster Management tutORial 2015 61 / 97
  • 65. Network design and fortiļ¬cation Solving the bi-level programming model is hard. Decomposition, duality, or reformulation are not suitable for solving the r-interdiction median problem with fortiļ¬cation due to the structure of the lower level problem. Scaparra and Church introduce an implicit enumeration algorithm to solve the r-interdiction median problem with fortiļ¬cation. A stream of papers examine algorithms and new models Laura Albert McLay () Disaster Management tutORial 2015 62 / 97
  • 66. Interdicting a nuclear weapons project Attacker wishes to create a ļ¬ssion weapon as quickly as possible Interdictor seeks to delay the completion of the project for as long as possible by delaying certain activities needed to create a nuclear weapon. The attackerā€™s model is a project management (critical shortest path) problem Precedence constraints and sequencing tasks Attacker can expedite (shorten) tasks by using additional resources Interdictor can delay the project by delaying certain tasks subject to an interdiction constraint Solved by Benders decomposition and implement the algorithm using oļ¬€-the-shelf project-management software. Brown et al [2009] Laura Albert McLay () Disaster Management tutORial 2015 63 / 97
  • 67. Disaster preparedness addresses planning that is done prior to a disaster that is implemented when the disaster is imminent. We focus on 1 pre-positioning supplies, and 2 Evacuation planning Note: Pre-positioning way in advance is more on the mitigation side. Laura Albert McLay () Disaster Management tutORial 2015 64 / 97
  • 68. Pre-positioning resources for a large-scale emergency The resulting models can be used to pre-locate ambulances (facilities) at pre-selected stations. Jia et al. [2007] illustrate the models with examples that include a dirty bomb attack, a terrorist attack using anthrax, and a terrorist attack using smallpox. The models provide insight into identifying tailored hospital locations for large-scale emergencies that take into account the unique attributes of these emergencies. Laura Albert McLay () Disaster Management tutORial 2015 65 / 97
  • 69. Pre-positioning resources for a large-scale emergency: parameters J = set facility locations. I = set of demand locations. K = set of possible emergency situations. Mi = population of location i āˆˆ I. eik = the weight of location i under emergency scenario k, i āˆˆ I, k āˆˆ K. Ī²ik = the likelihood that location i suļ¬€ers large-scale emergency scenario k, i āˆˆ I, k āˆˆ K. pjk = degree of disruption of facility j under emergency scenario k with 0 ā‰¤ pjk ā‰¤ 1, j āˆˆ J, k āˆˆ K. dij = distance from demand location i to j, i āˆˆ I, j āˆˆ J. Qi = minimum number of facilities that must be assigned to location i for it to be considered covered, i āˆˆ I. P = the maximal number of facilities to locate. Laura Albert McLay () Disaster Management tutORial 2015 66 / 97
  • 70. Pre-positioning resources for a large-scale emergency The decision variables are as follows: xj = 1 if a facility is located at site j āˆˆ J 0 otherwise zij = 1 if location i is assigned to a facility at j, i āˆˆ I, j āˆˆ F 0 otherwise Laura Albert McLay () Disaster Management tutORial 2015 67 / 97
  • 71. p-median model for emergency scenario k āˆˆ K Zk = min iāˆˆI jāˆˆJ Ī²ikeikMi dij zij (28) subject to jāˆˆJ xj = P (29) jāˆˆJ zij pjk = Qi , i āˆˆ I (30) zij ā‰¤ xj , i āˆˆ I, j āˆˆ J (31) zij āˆˆ {0, 1}, i āˆˆ I, j āˆˆ J (32) xj āˆˆ {0, 1}, j āˆˆ J (33) The model minimizes the demand-weighted distance between the demand locations and the opened facilities. Laura Albert McLay () Disaster Management tutORial 2015 68 / 97
  • 72. Pre-positioning resources for a large-scale emergency: coverage Let Ni = {j|dij ā‰¤ Di } be the set of facilities that cover (service) demand location i āˆˆ I Di is the longest distance from demand point i a facility may be to cover iā€™s demand. New decision variables (in addition to xj , j āˆˆ J): uj = 1 if location j is covered, i āˆˆ I 0 otherwise Laura Albert McLay () Disaster Management tutORial 2015 69 / 97
  • 73. Covering model for emergency scenario k āˆˆ K Zk = max iāˆˆI Ī²ikeikMi ui (34) subject to jāˆˆJ xj ā‰¤ P (35) jāˆˆNi xj pjk ā‰„ Qi ui , i āˆˆ I (36) ui āˆˆ {0, 1}, i āˆˆ I (37) xj āˆˆ {0, 1}, j āˆˆ J (38) The model maximizes weighted coverage. Laura Albert McLay () Disaster Management tutORial 2015 70 / 97
  • 74. Evacuation Evacuation is needed for many disasters: hurricanes tropical storms wildļ¬res ļ¬‚oods nuclear emergencies Evacuation starts with the decision to evacuate Evacuation models must yield detailed plans for evacuation guide the ļ¬‚ow of traļ¬ƒc. Evacuation and routing use maximum ļ¬‚ow networks models, facility location models, the traveling salesman problem, and the vehicle routing problem. Laura Albert McLay () Disaster Management tutORial 2015 71 / 97
  • 75. Disaster response Focuses on preventing a disaster or reducing the harmful eļ¬€ects of a disaster We focus on 1 response, 2 relief, and 3 routing Laura Albert McLay () Disaster Management tutORial 2015 72 / 97
  • 76. Emergency response to routine emergencies Emergency response to routine emergencies that arise from 911 calls for ļ¬re, police, or emergency medical service (EMS) service has been an active area of research since the early 1970s. The most relevant papers seek to assign vehicles to calls in real-time as calls for service arrive to the system. Few papers in this area focus on large-scale emergencies. The ideas and methods translate to disasters since both focus on delivering time-sensitive service to customers. Both focus on public welfare and equity Laura Albert McLay () Disaster Management tutORial 2015 73 / 97
  • 77. Emergency response: limitations All of the papers for routine emergencies implicitly assume that data are available and data are accurate system experiences low traļ¬ƒc (i.e., long queues do not form) These assumptions are not valid for disaster response! Laura Albert McLay () Disaster Management tutORial 2015 74 / 97
  • 78. Routing for relief Routing for relief and delivering aid requires delivering time-sensitive commodities to customers. Ozdamar et al. [2004] integrates the multi-commodity network ļ¬‚ow problem and the vehicle routing problem (VRP) and seeks to deliver aid on a multi-modal transportation network Mete and Zabinsky [2010] propose a stochastic optimization model for pre-locating (preparedness) and distributing (response) medical supplies after a disaster Laura Albert McLay () Disaster Management tutORial 2015 75 / 97
  • 79. Routing for relief Campbell et al. [2008] provide two routing models for routing supplies for relief eļ¬€orts that are variants of the TSP and VRP. (1) a minsum objective that minimizes the sum of arrival times (2) a minmax objective that captures the beginning time of the last customer Classic routing models such as the traveling salesman problem (TSP) and the VRP do not reļ¬‚ect the operations and priorities in the aftermath of a disaster. Laura Albert McLay () Disaster Management tutORial 2015 76 / 97
  • 80. Routing for relief: parameters N = {1, ..., n} = set of customers (nodes). N0 = N āˆŖ {0} = total set of nodes including the depot (0). tij = travel time between the nodes i and j in N0. T = a suļ¬ƒciently large number. The decision variables include: xij = 1 if the vehicle travels from i to j. 0 otherwise. ai = the arrival time at customer i. Laura Albert McLay () Disaster Management tutORial 2015 77 / 97
  • 81. Routing for relief: model with minsum objective z = min iāˆˆN ai (39) subject to jāˆˆN0 xij = 1, i āˆˆ N (40) jāˆˆN0 xij āˆ’ jāˆˆN0 xji = 0, i āˆˆ N0 (41) tij + ai ā‰¤ aj + T(1 āˆ’ xij ), i, j āˆˆ N (42) ai ā‰„ t0i x0i , i āˆˆ N (43) xij āˆˆ {0, 1}, i, j āˆˆ N0 (44) The objective function (39) is the minsum objective that captures the sum of the arrival times. The model can be reformulated to capture the minmax objective by introducing auxiliary variable ĀÆa to capture the last delivery time. Laura Albert McLay () Disaster Management tutORial 2015 78 / 97
  • 82. Disaster recovery helping the system eļ¬ƒciently return to its pre-disaster capabilities We focus on 1 Network recovery, and 2 Interdependent infrastructure Laura Albert McLay () Disaster Management tutORial 2015 79 / 97
  • 83. Recovery Disaster recovery models focus on helping the system eļ¬ƒciently return to its pre-disaster capabilities. Most of the optimization models in this area focus on networks and model commodities such as transportation, water, power, and communications. How can we schedule the installation of arcs in a network over time in a multicommodity ļ¬‚ow model? (Nurre et al [2012]) Flow can be directed over the new components once the installed components become operational The objective is to maximize the cumulative ļ¬‚ow on the network over a ļ¬xed time horizon. Laura Albert McLay () Disaster Management tutORial 2015 80 / 97
  • 84. Network recovery: parameters G = (N, A) = a network with nodes N and arcs A. A = set of arcs that can be installed on the network. K = the number of parallel identical work groups that can install network components S āŠ‚ N = set of supply nodes with supply si , i āˆˆ S. D āŠ‚ N = set of demand nodes with demand di , i āˆˆ D. wi = weight associated with a unit of ļ¬‚ow that arrives at demand node i āˆˆ D. uij = arc capacity for arc (i, j) āˆˆ A āˆŖ A . pij = processing time to install arc (i, j) āˆˆ A . T = length of the time horizon. Āµt = weight associated with the performance of the network at time t = 1, 2, ..., T. Laura Albert McLay () Disaster Management tutORial 2015 81 / 97
  • 85. Network recovery: decision variables The decision variables include: 1 xijt = the amount of ļ¬‚ow on arc (i, j) āˆˆ A āˆŖ A at time t = 1, ..., T. 2 vit = the amount of demand met at node i āˆˆ D at time t = 1, ..., T. 3 Ī²ijt = 1 if arc (i, j) āˆˆ A is operational at time, t = 1, ..., T. 0 otherwise. 4 Ī±ijkt = 1 if workgroup k completes arc (i, j) āˆˆ A in time period , t = 1, ... 0 otherwise. Laura Albert McLay () Disaster Management tutORial 2015 82 / 97
  • 86. Network recovery: model (Part 1) z = max T t=1 iāˆˆD Āµtwi vit (45) subject to (i,j)āˆˆAāˆŖA xijt āˆ’ (j,i)āˆˆAāˆŖA xjit ā‰¤ si , i āˆˆ S, t = 1, ..., T (46) (i,j)āˆˆAāˆŖA xijt āˆ’ (j,i)āˆˆAāˆŖA xjit = 0, i āˆˆ N{S āˆŖ D}t = 1, ..., T(47) (i,j)āˆˆAāˆŖA xijt āˆ’ (j,i)āˆˆAāˆŖA xjit = āˆ’vit, i āˆˆ D, t = 1, ..., T (48) 0 ā‰¤ vit ā‰¤ di , i āˆˆ D, t = 1, ..., T (49) 0 ā‰¤ xijt ā‰¤ uij , (i, j) āˆˆ A, t = 1, ..., T (50) 0 ā‰¤ xijt ā‰¤ uij Ī²ijt, (i, j) āˆˆ A , t = 1, ..., T (51) Laura Albert McLay () Disaster Management tutORial 2015 83 / 97
  • 87. Network recovery: model (Part 2) (i,j)āˆˆA min{T,t+pij āˆ’1} s=t Ī±kijs ā‰¤ 1, k = 1, ..., K, t =, ..., T (52) Ī²ijt āˆ’ t s=1 K k=1 Ī±kijs ā‰¤ 0, (i, j) āˆˆ A , t = 1, ..., T (53) pij āˆ’1 t=1 Ī²ijt = 0, (i, j) āˆˆ A (54) K k=1 pij āˆ’1 t=1 Ī±kijt = 0, (i, j) āˆˆ A (55) Ī±kijt, Ī²ijt āˆˆ {0, 1}, (i, j) āˆˆ A , k = 1, ..., K, t = 1, ..., T. (56) Laura Albert McLay () Disaster Management tutORial 2015 84 / 97
  • 88. Data, information, and modeling challenges Laura Albert McLay () Disaster Management tutORial 2015 85 / 97
  • 89. New criteria Traditional criteria: Quality Proļ¬t Cost Distance Disasters criteria: Loss of life Morbidity Coverage Delivery of critical time-sensitive commodities Discrete optimization models for disasters are not merely traditional discrete optimization models with new objective functions Laura Albert McLay () Disaster Management tutORial 2015 86 / 97
  • 90. Mechanisms for new structural model components 1. several agencies often work together to respond to and deliver commodities after a disaster multiple decision-makers with limited control over certain parts of the operations 2. issues such as fairness often emerge in models for disasters. Lots of ways to model equity 3. traditional models often implicitly assume the network components are reliable may not be valid when facilities are damaged and may not be fully operational Laura Albert McLay () Disaster Management tutORial 2015 87 / 97
  • 91. Vulnerability Models for disasters almost always focus on events with high consequences There is often an interest in vulnerability and events that overwhelm the resources and capacities in the system. Vulnerability can be modeled with: max-min models to capture worst-case performance the inclusion of uncertain and unpredictable demands and system failures. models with cascading failures Laura Albert McLay () Disaster Management tutORial 2015 88 / 97
  • 92. Resource allocation In a disaster setting, resources may include: 1. new resources speciļ¬c to the disaster at hand e.g., anthrax vaccines dispensed after an anthrax attack 2. resources used for non-disaster scenarios that may be used in new ways during disaster management e.g., ambulances that evacuate hospital patients after a hurricane resource deployment strategies during and after disaster events may diļ¬€er from those used for routine operations (e.g., reactive deployment of ļ¬rst responders after a large-scale emergency) Laura Albert McLay () Disaster Management tutORial 2015 89 / 97
  • 93. Data collection is hard Getting data is hard. This is true for many application areas, but it is particularly true for disasters applications. Data may be impractical to collect when events are rare (e.g., terrorist attacks) Data may not come from usual sources (e.g., the number of evacuees in shelters). Data may be perishable and therefore must be collected in a timely manner Laura Albert McLay () Disaster Management tutORial 2015 90 / 97
  • 94. Data collection sometimes cannot be done in advance Laura Albert McLay () Disaster Management tutORial 2015 91 / 97
  • 95. Data have bad quality Data that are collected may be inaccurate and incomplete. Censored data E.g., If there are communications failures after a hurricane strikes and patients cannot call 911 for service, the calls may not be entered into call logs. Data incorrectly characterized Computer aided dispatch software used by 911 centers do not have codes for large-scale emergencies, such as carbon monoxide poisoning caused by generators used during power outages. Instead, these 911 calls are mapped to codes used for typical emergencies (e.g., overdose). Laura Albert McLay () Disaster Management tutORial 2015 92 / 97
  • 96. Data challenges 1. Data can be used in a static manner, where it is collected and used to parameterize the models that are solved ahead of time. 2. Models that address response and recovery may include real-time decision making and may integrate data from multiple sources (variety) that arrive in real-time (velocity). ā€œBig Dataā€ issues are a national research priority. Laura Albert McLay () Disaster Management tutORial 2015 93 / 97
  • 97. Conclusions Managing disasters and improving homeland security involve using scarce resources and weigh multiple criteria. OR is a good tool! Many of the problems involve discrete decisions such as location, assignment, and network ļ¬‚ows. Discrete optimization is a good tool! Important problems across the disasters lifecycle and across diļ¬€erent types of disasters. Models for homeland security and disaster problems generally cannot use canonical discrete optimization models Laura Albert McLay () Disaster Management tutORial 2015 94 / 97
  • 98. Resilience analytics Data-driven interdependent physical, service, and community networks before, during, and after a disruption. Descriptive analytics: what is happening? Predictive analytics: what will happen? Prescriptive analytics: what do we do about it? For more: http://resilienceanalytics.com Laura Albert McLay () Disaster Management tutORial 2015 95 / 97
  • 99. Thank you! Additional reading from Punk Rock OR: my national academies committee experience and risk-based ļ¬‚ood insurance operations research, disasters, and science communication staying safe from tornadoes the forecasting models behind the power outages forecasts for Hurricane Sandy rivisiting September 11, 2001 fourteen years later aviation security, there and back again Laura Albert McLay () Disaster Management tutORial 2015 96 / 97