April  2015, 11(2): 595-617. doi: 10.3934/jimo.2015.11.595

Bilevel multi-objective construction site security planning with twofold random phenomenon

1. 

Business School, Sichuan University, Chengdu 610064, China

2. 

State Key Laboratory of Hydraulics and Mountain River Engineering, Sichuan University, Chengdu 610064

3. 

Decision Sciences Department, LeBow College of Business, Drexel University, Philadelphia, PA 19104, United States, United States

4. 

China Three Gorges Corporation, Yichang 443001, China

Received  November 2012 Revised  May 2014 Published  September 2014

The lack of early security arrangements during the construction period can increase the vulnerability of construction project. To support current construction security standards, this paper proposes a bilevel multi-objective model for construction site security problem (CSSP). In contrast to prior studies of CSSP, the bilevel relationship and twofold random phenomenon are considered. Specifically, the upper level programming denotes that project security officer must first decide which facilities to be secured under limited funds whilst maximizing the efficiency of the construction facilities system and minimizing the countermeasure cost and economic loss. The lower level programming denotes that the attacker will destroy a subset of the facilities to inflict maximum loss of efficiency in the construction facilities system. To deal with the uncertainties, expected value method and chance constraint method are introduced to transform the uncertain model into a calculable one. Thereafter, a stochastic simulation based constraint checking procedure is designed. Plant Growth Simulation Algorithm (PGSA) is applied to solve this model. Finally, the approach is carried out in the Longtan hydropower construction project to illustrate the efficiency of the proposed model and algorithm.
Citation: Zongmin Li, Jiuping Xu, Wenjing Shen, Benjamin Lev, Xiao Lei. Bilevel multi-objective construction site security planning with twofold random phenomenon. Journal of Industrial and Management Optimization, 2015, 11 (2) : 595-617. doi: 10.3934/jimo.2015.11.595
References:
[1]

Construction Industry Institute (CII), Implementing Project Security Practices, Implementation resource BMM-3, Benchmarking and Metrics, CII, University of Texas at Austin, USA, 2005.

[2]

Federal Aviation Administration (FAA), Recommended Security Guidelines for Airport Planning, Design and Construction, Report No DOT/FAA/AR-00/52, U.S. Dept. of Transportation, Washington, D.C, 2001.

[3]

Foreign Affairs Manual (FAM), Construction security certification program, manual 12 FAM 360, Foreign Affairs Manual, Chapter 12- Diplomatic Security, U.S. Department of State, 2002.

[4]

Presidential Executive Order (PEO), National industrial security program, Federal Register, 58 (1993), 1-6.

[5]

Y. Q. Bai and C. H. Guo, Doubly nonnegative relaxation method for solving multiple objective quadratic programming problems, Journal of Industrial and Management Optimization, 10 (2014), 543-556. doi: 10.3934/jimo.2014.10.543.

[6]

R. A. Blais, M. D. Henry, S. R. Lilley, J. A. Pan, M. Grimes and Y. Y. Haimes, Risk-based methodology for assessing and managing the severity of a terrorist attack, In Systems and Information Engineering Design Symposium, SIEDS'09., 2009 (2009), 171-176.

[7]

K. Branch and K. Baker, Security during the construction of critical infrastructure in the post 9/11 context in the U.S, 8th Annual Conference on Human Factors and Power Plants, Institute of Electrical and Electronics Engineers (IEEE), Monterey, CA, USA, 2007.

[8]

J. Cai, Hydropower in China, Department of Technology and Built Environment, University of Gavle, 2009, Master's Thesis in Energy System.

[9]

O. Chadli, H. Mahdioui and J. C. Yao, Bilevel mixed equilibrium problems in Banach spaces: Existence and algorithmic aspects, Journal of Industrial and Management Optimization, 1 (2011), 549-561.

[10]

A. Charnes and W. W. Cooper, Chance-constrained programming, Management Science, 6 (1959), 73-79. doi: 10.1287/mnsc.6.1.73.

[11]

R. L. Church, M. P. Scaparra and R. S. Middleton, Identifying critical infrastructure: The median and covering facility interdiction problems, Annals of the Association of American Geographers, 94 (2004), 491-502.

[12]

M. R. Hallowell and J. A. Gambatese, Construction safety risk mitigation, Journal of Construction Engineering and Management, 135 (2009), 1316-1323.

[13]

A. Khalafallah and K. El-Rayes, Minimizing construction-related security risks during airport expansion projects, Journal of Construction Engineering and Management, 134 (2008), 40-48.

[14]

T. Li, C. Wang, W. Wang and W. Su, A global optimization bionics algorithm for solving integer programming-Plant Growth Simulation Algorithm, in Proceedings of International Conference of Management Science and Engineering, (2005), 13-15.

[15]

T. F. Liang and H. W. Cheng, Multi-objective aggregate production planning decisions using two-phase fuzzy goal programming method, Journal of Industrial and Management Optimization, 7 (2011), 365-383. doi: 10.3934/jimo.2011.7.365.

[16]

F. Liberatore, M. P. Scaparra and M. S. Daskin, Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification, Computers & Operations Research, 38 (2011), 357-366. doi: 10.1016/j.cor.2010.06.002.

[17]

B. D. Liu, Theory and Practice of Uncertain Programming, Springer Verlag, 2009.

[18]

G. S. Liu and J. Zhang, Decision making of transportation plan, a bilevel transportation problem approach, Journal of Industrial and Management Optimization, 1 (2005), 305-314. doi: 10.3934/jimo.2005.1.305.

[19]

B. Matthews, J. R. Sylvie, S. Lee, S. R. Thomas, R. E. Chapman and G. E. Gibson, Addressing security in early stages of project life cycle, Journal of Management in Engineering, 22 (2006), 196-202.

[20]

B. Merz, H. Kreibich and A. Thieken, et al., Estimation uncertainty of direct monetary flood damage to buildings, Natural Hazards and Earth System Science, 4 (2004), 153-163.

[21]

J. R. O'Hanley and R. L. Church, Designing robust coverage networks to hedge against worst-case facility losses, European Journal of Operational Research, 209 (2011), 23-36. doi: 10.1016/j.ejor.2010.08.030.

[22]

J. Peng and B. D. Liu, Birandom variables and birandom programming, Computers & Industrial Engineering, 53 (2007), 433-453.

[23]

R. S. Rao, S. V. L. Narasimham and M. Ramalingaraju, Optimal capacitor placement in a radial distribution system using Plant Growth Simulation Algorithm, Electrical Power and Energy Systems, 33 (2011), 1133-1139.

[24]

J. A. Rice, Mathematical Statistics and Data Analysis, 2007, Duxbury press.

[25]

H. Said and K. El-Rayes, Optimizing the planning of construction site security for critical infrastructure projects, Automation in Construction, 19 (2010), 221-234.

[26]

A. K. Sarma and K. M. Rafi, Optimal selection of capacitors for radial distribution systems using Plant Growth Simulation Algorithm, International Journal of Advances in Science and Technology, 30 (2011), 43-54.

[27]

M. P. Scaparra and R. L. Church, A bilevel mixed-integer program for critical infrastructure protection planning, Computers & Operations Research, 35 (2008), 1905-1923.

[28]

M. Simaan and J. B. Cruz, On the Stackelberg strategy in nonzero-sum games, Journal of Optimization Theory and Applications, 11 (1973), 533-555. doi: 10.1007/BF00935665.

[29]

S. Simpson, Airport Security During Construction, presentation in: 4th Annual International Airfield Operations Area Expo & Conference, Airport Consultants Council (AAC), Milwaukee, WI, USA, 2008.

[30]

C. J. Tarr, CLASP: A computerised aid to cost effective perimeter security, in Security Technology 28th International Carnahan conference, Institute of Electrical and Electronics Engineers (IEEE), Atlanta, GA, USA, (1992), 164-168.

[31]

T. M. Toole, Construction site safety roles, Journal of Construction Engineering and Management, 128 (2002), 203-210.

[32]

T. Uno and H. Katagiri, Single-and multi-objective defensive location problems on a network, European Journal of Operational Research, 188 (2008), 76-84. doi: 10.1016/j.ejor.2007.04.003.

[33]

L. N. Vicente and P. H. Calamai, Bilevel and multilevel programming: A bibliography review, Journal of Global Optimization, 5 (1994), 291-306. doi: 10.1007/BF01096458.

[34]

G. H. Walker, Securing the construction site, presentation in: 28th IRMI Construction Risk Conference, IRMI, Las Vegas, VA, USA, 2008.

[35]

C. Wang and H. Cheng, Transmission network optimal planning based on Plant Growth Simulation Algorithm, European Transactions on Electrical Power, 19 (2009), 291-301.

[36]

J. P. Xu and C. Ding, A class of chance constrained multiobjective linear programming with birandom coeffcients and its application to vendors selection, International Journal of Production Economics, 131 (2011), 709-720.

[37]

J. P. Xu and Z. M. Tao, A class of multi-objective equilibrium chance maximization model with twofold random phenomenon and its application to hydropower station operation, Mathematics and Computers in Simulation, 85 (2012), 11-33. doi: 10.1016/j.matcom.2012.09.010.

[38]

J. P. Xu, Y. Tu and Z. Q. Zeng, A nonlinear multi-objective bilevel traffic assignment model with complex random coefficients in large-scale construction project, Mathematical Problems in Engineering, 2012 (2012), Article ID 463976, 40 pages. doi: 10.1155/2012/463976.

[39]

J. P. Xu and P. Wei, Production-distribution planning of construction supply chain management under fuzzy random environment for large-scale construction project, Journal of Industrial and Management Optimization, 9 (2013), 31-56. doi: 10.3934/jimo.2013.9.31.

[40]

J. P. Xu and L. M. Yao, Random-Like Multiple Objective Decision Making, 2011, Springer.

[41]

L. Zhang and S. Y. Wu, Robust solutions to Euclidean facility location problems with uncertain data, Journal of Industrial and Management Optimization, 6 (2010), 751-760. doi: 10.3934/jimo.2010.6.751.

show all references

References:
[1]

Construction Industry Institute (CII), Implementing Project Security Practices, Implementation resource BMM-3, Benchmarking and Metrics, CII, University of Texas at Austin, USA, 2005.

[2]

Federal Aviation Administration (FAA), Recommended Security Guidelines for Airport Planning, Design and Construction, Report No DOT/FAA/AR-00/52, U.S. Dept. of Transportation, Washington, D.C, 2001.

[3]

Foreign Affairs Manual (FAM), Construction security certification program, manual 12 FAM 360, Foreign Affairs Manual, Chapter 12- Diplomatic Security, U.S. Department of State, 2002.

[4]

Presidential Executive Order (PEO), National industrial security program, Federal Register, 58 (1993), 1-6.

[5]

Y. Q. Bai and C. H. Guo, Doubly nonnegative relaxation method for solving multiple objective quadratic programming problems, Journal of Industrial and Management Optimization, 10 (2014), 543-556. doi: 10.3934/jimo.2014.10.543.

[6]

R. A. Blais, M. D. Henry, S. R. Lilley, J. A. Pan, M. Grimes and Y. Y. Haimes, Risk-based methodology for assessing and managing the severity of a terrorist attack, In Systems and Information Engineering Design Symposium, SIEDS'09., 2009 (2009), 171-176.

[7]

K. Branch and K. Baker, Security during the construction of critical infrastructure in the post 9/11 context in the U.S, 8th Annual Conference on Human Factors and Power Plants, Institute of Electrical and Electronics Engineers (IEEE), Monterey, CA, USA, 2007.

[8]

J. Cai, Hydropower in China, Department of Technology and Built Environment, University of Gavle, 2009, Master's Thesis in Energy System.

[9]

O. Chadli, H. Mahdioui and J. C. Yao, Bilevel mixed equilibrium problems in Banach spaces: Existence and algorithmic aspects, Journal of Industrial and Management Optimization, 1 (2011), 549-561.

[10]

A. Charnes and W. W. Cooper, Chance-constrained programming, Management Science, 6 (1959), 73-79. doi: 10.1287/mnsc.6.1.73.

[11]

R. L. Church, M. P. Scaparra and R. S. Middleton, Identifying critical infrastructure: The median and covering facility interdiction problems, Annals of the Association of American Geographers, 94 (2004), 491-502.

[12]

M. R. Hallowell and J. A. Gambatese, Construction safety risk mitigation, Journal of Construction Engineering and Management, 135 (2009), 1316-1323.

[13]

A. Khalafallah and K. El-Rayes, Minimizing construction-related security risks during airport expansion projects, Journal of Construction Engineering and Management, 134 (2008), 40-48.

[14]

T. Li, C. Wang, W. Wang and W. Su, A global optimization bionics algorithm for solving integer programming-Plant Growth Simulation Algorithm, in Proceedings of International Conference of Management Science and Engineering, (2005), 13-15.

[15]

T. F. Liang and H. W. Cheng, Multi-objective aggregate production planning decisions using two-phase fuzzy goal programming method, Journal of Industrial and Management Optimization, 7 (2011), 365-383. doi: 10.3934/jimo.2011.7.365.

[16]

F. Liberatore, M. P. Scaparra and M. S. Daskin, Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification, Computers & Operations Research, 38 (2011), 357-366. doi: 10.1016/j.cor.2010.06.002.

[17]

B. D. Liu, Theory and Practice of Uncertain Programming, Springer Verlag, 2009.

[18]

G. S. Liu and J. Zhang, Decision making of transportation plan, a bilevel transportation problem approach, Journal of Industrial and Management Optimization, 1 (2005), 305-314. doi: 10.3934/jimo.2005.1.305.

[19]

B. Matthews, J. R. Sylvie, S. Lee, S. R. Thomas, R. E. Chapman and G. E. Gibson, Addressing security in early stages of project life cycle, Journal of Management in Engineering, 22 (2006), 196-202.

[20]

B. Merz, H. Kreibich and A. Thieken, et al., Estimation uncertainty of direct monetary flood damage to buildings, Natural Hazards and Earth System Science, 4 (2004), 153-163.

[21]

J. R. O'Hanley and R. L. Church, Designing robust coverage networks to hedge against worst-case facility losses, European Journal of Operational Research, 209 (2011), 23-36. doi: 10.1016/j.ejor.2010.08.030.

[22]

J. Peng and B. D. Liu, Birandom variables and birandom programming, Computers & Industrial Engineering, 53 (2007), 433-453.

[23]

R. S. Rao, S. V. L. Narasimham and M. Ramalingaraju, Optimal capacitor placement in a radial distribution system using Plant Growth Simulation Algorithm, Electrical Power and Energy Systems, 33 (2011), 1133-1139.

[24]

J. A. Rice, Mathematical Statistics and Data Analysis, 2007, Duxbury press.

[25]

H. Said and K. El-Rayes, Optimizing the planning of construction site security for critical infrastructure projects, Automation in Construction, 19 (2010), 221-234.

[26]

A. K. Sarma and K. M. Rafi, Optimal selection of capacitors for radial distribution systems using Plant Growth Simulation Algorithm, International Journal of Advances in Science and Technology, 30 (2011), 43-54.

[27]

M. P. Scaparra and R. L. Church, A bilevel mixed-integer program for critical infrastructure protection planning, Computers & Operations Research, 35 (2008), 1905-1923.

[28]

M. Simaan and J. B. Cruz, On the Stackelberg strategy in nonzero-sum games, Journal of Optimization Theory and Applications, 11 (1973), 533-555. doi: 10.1007/BF00935665.

[29]

S. Simpson, Airport Security During Construction, presentation in: 4th Annual International Airfield Operations Area Expo & Conference, Airport Consultants Council (AAC), Milwaukee, WI, USA, 2008.

[30]

C. J. Tarr, CLASP: A computerised aid to cost effective perimeter security, in Security Technology 28th International Carnahan conference, Institute of Electrical and Electronics Engineers (IEEE), Atlanta, GA, USA, (1992), 164-168.

[31]

T. M. Toole, Construction site safety roles, Journal of Construction Engineering and Management, 128 (2002), 203-210.

[32]

T. Uno and H. Katagiri, Single-and multi-objective defensive location problems on a network, European Journal of Operational Research, 188 (2008), 76-84. doi: 10.1016/j.ejor.2007.04.003.

[33]

L. N. Vicente and P. H. Calamai, Bilevel and multilevel programming: A bibliography review, Journal of Global Optimization, 5 (1994), 291-306. doi: 10.1007/BF01096458.

[34]

G. H. Walker, Securing the construction site, presentation in: 28th IRMI Construction Risk Conference, IRMI, Las Vegas, VA, USA, 2008.

[35]

C. Wang and H. Cheng, Transmission network optimal planning based on Plant Growth Simulation Algorithm, European Transactions on Electrical Power, 19 (2009), 291-301.

[36]

J. P. Xu and C. Ding, A class of chance constrained multiobjective linear programming with birandom coeffcients and its application to vendors selection, International Journal of Production Economics, 131 (2011), 709-720.

[37]

J. P. Xu and Z. M. Tao, A class of multi-objective equilibrium chance maximization model with twofold random phenomenon and its application to hydropower station operation, Mathematics and Computers in Simulation, 85 (2012), 11-33. doi: 10.1016/j.matcom.2012.09.010.

[38]

J. P. Xu, Y. Tu and Z. Q. Zeng, A nonlinear multi-objective bilevel traffic assignment model with complex random coefficients in large-scale construction project, Mathematical Problems in Engineering, 2012 (2012), Article ID 463976, 40 pages. doi: 10.1155/2012/463976.

[39]

J. P. Xu and P. Wei, Production-distribution planning of construction supply chain management under fuzzy random environment for large-scale construction project, Journal of Industrial and Management Optimization, 9 (2013), 31-56. doi: 10.3934/jimo.2013.9.31.

[40]

J. P. Xu and L. M. Yao, Random-Like Multiple Objective Decision Making, 2011, Springer.

[41]

L. Zhang and S. Y. Wu, Robust solutions to Euclidean facility location problems with uncertain data, Journal of Industrial and Management Optimization, 6 (2010), 751-760. doi: 10.3934/jimo.2010.6.751.

[1]

Min Zhang, Gang Li. Multi-objective optimization algorithm based on improved particle swarm in cloud computing environment. Discrete and Continuous Dynamical Systems - S, 2019, 12 (4&5) : 1413-1426. doi: 10.3934/dcdss.2019097

[2]

Tone-Yau Huang, Tamaki Tanaka. Optimality and duality for complex multi-objective programming. Numerical Algebra, Control and Optimization, 2022, 12 (1) : 121-134. doi: 10.3934/naco.2021055

[3]

Maedeh Agahgolnezhad Gerdrodbari, Fatemeh Harsej, Mahboubeh Sadeghpour, Mohammad Molani Aghdam. A robust multi-objective model for managing the distribution of perishable products within a green closed-loop supply chain. Journal of Industrial and Management Optimization, 2021  doi: 10.3934/jimo.2021107

[4]

Alireza Eydi, Rozhin Saedi. A multi-objective decision-making model for supplier selection considering transport discounts and supplier capacity constraints. Journal of Industrial and Management Optimization, 2021, 17 (6) : 3581-3602. doi: 10.3934/jimo.2020134

[5]

Xiliang Sun, Wanjie Hu, Xiaolong Xue, Jianjun Dong. Multi-objective optimization model for planning metro-based underground logistics system network: Nanjing case study. Journal of Industrial and Management Optimization, 2021  doi: 10.3934/jimo.2021179

[6]

Lin Jiang, Song Wang. Robust multi-period and multi-objective portfolio selection. Journal of Industrial and Management Optimization, 2021, 17 (2) : 695-709. doi: 10.3934/jimo.2019130

[7]

Zhongqiang Wu, Zongkui Xie. A multi-objective lion swarm optimization based on multi-agent. Journal of Industrial and Management Optimization, 2022  doi: 10.3934/jimo.2022001

[8]

Masoud Mohammadzadeh, Alireza Arshadi Khamseh, Mohammad Mohammadi. A multi-objective integrated model for closed-loop supply chain configuration and supplier selection considering uncertain demand and different performance levels. Journal of Industrial and Management Optimization, 2017, 13 (2) : 1041-1064. doi: 10.3934/jimo.2016061

[9]

Jian Xiong, Zhongbao Zhou, Ke Tian, Tianjun Liao, Jianmai Shi. A multi-objective approach for weapon selection and planning problems in dynamic environments. Journal of Industrial and Management Optimization, 2017, 13 (3) : 1189-1211. doi: 10.3934/jimo.2016068

[10]

Dušan M. Stipanović, Claire J. Tomlin, George Leitmann. A note on monotone approximations of minimum and maximum functions and multi-objective problems. Numerical Algebra, Control and Optimization, 2011, 1 (3) : 487-493. doi: 10.3934/naco.2011.1.487

[11]

Hamed Fazlollahtabar, Mohammad Saidi-Mehrabad. Optimizing multi-objective decision making having qualitative evaluation. Journal of Industrial and Management Optimization, 2015, 11 (3) : 747-762. doi: 10.3934/jimo.2015.11.747

[12]

Yuan-mei Xia, Xin-min Yang, Ke-quan Zhao. A combined scalarization method for multi-objective optimization problems. Journal of Industrial and Management Optimization, 2021, 17 (5) : 2669-2683. doi: 10.3934/jimo.2020088

[13]

Xia Zhao, Jianping Dou. Bi-objective integrated supply chain design with transportation choices: A multi-objective particle swarm optimization. Journal of Industrial and Management Optimization, 2019, 15 (3) : 1263-1288. doi: 10.3934/jimo.2018095

[14]

Shungen Luo, Xiuping Guo. Multi-objective optimization of multi-microgrid power dispatch under uncertainties using interval optimization. Journal of Industrial and Management Optimization, 2021  doi: 10.3934/jimo.2021208

[15]

Adriel Cheng, Cheng-Chew Lim. Optimizing system-on-chip verifications with multi-objective genetic evolutionary algorithms. Journal of Industrial and Management Optimization, 2014, 10 (2) : 383-396. doi: 10.3934/jimo.2014.10.383

[16]

Tien-Fu Liang, Hung-Wen Cheng. Multi-objective aggregate production planning decisions using two-phase fuzzy goal programming method. Journal of Industrial and Management Optimization, 2011, 7 (2) : 365-383. doi: 10.3934/jimo.2011.7.365

[17]

Han Yang, Jia Yue, Nan-jing Huang. Multi-objective robust cross-market mixed portfolio optimization under hierarchical risk integration. Journal of Industrial and Management Optimization, 2020, 16 (2) : 759-775. doi: 10.3934/jimo.2018177

[18]

Qiang Long, Xue Wu, Changzhi Wu. Non-dominated sorting methods for multi-objective optimization: Review and numerical comparison. Journal of Industrial and Management Optimization, 2021, 17 (2) : 1001-1023. doi: 10.3934/jimo.2020009

[19]

Liwei Zhang, Jihong Zhang, Yule Zhang. Second-order optimality conditions for cone constrained multi-objective optimization. Journal of Industrial and Management Optimization, 2018, 14 (3) : 1041-1054. doi: 10.3934/jimo.2017089

[20]

Danthai Thongphiew, Vira Chankong, Fang-Fang Yin, Q. Jackie Wu. An on-line adaptive radiation therapy system for intensity modulated radiation therapy: An application of multi-objective optimization. Journal of Industrial and Management Optimization, 2008, 4 (3) : 453-475. doi: 10.3934/jimo.2008.4.453

2021 Impact Factor: 1.411

Metrics

  • PDF downloads (132)
  • HTML views (0)
  • Cited by (5)

[Back to Top]