April  2015, 11(2): 595-617. doi: 10.3934/jimo.2015.11.595

Bilevel multi-objective construction site security planning with twofold random phenomenon

1. 

Business School, Sichuan University, Chengdu 610064, China

2. 

State Key Laboratory of Hydraulics and Mountain River Engineering, Sichuan University, Chengdu 610064

3. 

Decision Sciences Department, LeBow College of Business, Drexel University, Philadelphia, PA 19104, United States, United States

4. 

China Three Gorges Corporation, Yichang 443001, China

Received  November 2012 Revised  May 2014 Published  September 2014

The lack of early security arrangements during the construction period can increase the vulnerability of construction project. To support current construction security standards, this paper proposes a bilevel multi-objective model for construction site security problem (CSSP). In contrast to prior studies of CSSP, the bilevel relationship and twofold random phenomenon are considered. Specifically, the upper level programming denotes that project security officer must first decide which facilities to be secured under limited funds whilst maximizing the efficiency of the construction facilities system and minimizing the countermeasure cost and economic loss. The lower level programming denotes that the attacker will destroy a subset of the facilities to inflict maximum loss of efficiency in the construction facilities system. To deal with the uncertainties, expected value method and chance constraint method are introduced to transform the uncertain model into a calculable one. Thereafter, a stochastic simulation based constraint checking procedure is designed. Plant Growth Simulation Algorithm (PGSA) is applied to solve this model. Finally, the approach is carried out in the Longtan hydropower construction project to illustrate the efficiency of the proposed model and algorithm.
Citation: Zongmin Li, Jiuping Xu, Wenjing Shen, Benjamin Lev, Xiao Lei. Bilevel multi-objective construction site security planning with twofold random phenomenon. Journal of Industrial & Management Optimization, 2015, 11 (2) : 595-617. doi: 10.3934/jimo.2015.11.595
References:
[1]

Construction Industry Institute (CII), Implementing Project Security Practices,, Implementation resource BMM-3, (2005).   Google Scholar

[2]

Federal Aviation Administration (FAA), Recommended Security Guidelines for Airport Planning, Design and Construction,, Report No DOT/FAA/AR-00/52, (2001).   Google Scholar

[3]

Foreign Affairs Manual (FAM), Construction security certification program,, manual 12 FAM 360, (2002).   Google Scholar

[4]

Presidential Executive Order (PEO), National industrial security program,, Federal Register, 58 (1993), 1.   Google Scholar

[5]

Y. Q. Bai and C. H. Guo, Doubly nonnegative relaxation method for solving multiple objective quadratic programming problems,, Journal of Industrial and Management Optimization, 10 (2014), 543.  doi: 10.3934/jimo.2014.10.543.  Google Scholar

[6]

R. A. Blais, M. D. Henry, S. R. Lilley, J. A. Pan, M. Grimes and Y. Y. Haimes, Risk-based methodology for assessing and managing the severity of a terrorist attack,, In Systems and Information Engineering Design Symposium, 2009 (2009), 171.   Google Scholar

[7]

K. Branch and K. Baker, Security during the construction of critical infrastructure in the post 9/11 context in the U.S, 8th Annual Conference on Human Factors and Power Plants,, Institute of Electrical and Electronics Engineers (IEEE), (2007).   Google Scholar

[8]

J. Cai, Hydropower in China, Department of Technology and Built Environment,, University of Gavle, (2009).   Google Scholar

[9]

O. Chadli, H. Mahdioui and J. C. Yao, Bilevel mixed equilibrium problems in Banach spaces: Existence and algorithmic aspects,, Journal of Industrial and Management Optimization, 1 (2011), 549.   Google Scholar

[10]

A. Charnes and W. W. Cooper, Chance-constrained programming,, Management Science, 6 (1959), 73.  doi: 10.1287/mnsc.6.1.73.  Google Scholar

[11]

R. L. Church, M. P. Scaparra and R. S. Middleton, Identifying critical infrastructure: The median and covering facility interdiction problems,, Annals of the Association of American Geographers, 94 (2004), 491.   Google Scholar

[12]

M. R. Hallowell and J. A. Gambatese, Construction safety risk mitigation,, Journal of Construction Engineering and Management, 135 (2009), 1316.   Google Scholar

[13]

A. Khalafallah and K. El-Rayes, Minimizing construction-related security risks during airport expansion projects,, Journal of Construction Engineering and Management, 134 (2008), 40.   Google Scholar

[14]

T. Li, C. Wang, W. Wang and W. Su, A global optimization bionics algorithm for solving integer programming-Plant Growth Simulation Algorithm,, in Proceedings of International Conference of Management Science and Engineering, (2005), 13.   Google Scholar

[15]

T. F. Liang and H. W. Cheng, Multi-objective aggregate production planning decisions using two-phase fuzzy goal programming method,, Journal of Industrial and Management Optimization, 7 (2011), 365.  doi: 10.3934/jimo.2011.7.365.  Google Scholar

[16]

F. Liberatore, M. P. Scaparra and M. S. Daskin, Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification,, Computers & Operations Research, 38 (2011), 357.  doi: 10.1016/j.cor.2010.06.002.  Google Scholar

[17]

B. D. Liu, Theory and Practice of Uncertain Programming,, Springer Verlag, (2009).   Google Scholar

[18]

G. S. Liu and J. Zhang, Decision making of transportation plan, a bilevel transportation problem approach,, Journal of Industrial and Management Optimization, 1 (2005), 305.  doi: 10.3934/jimo.2005.1.305.  Google Scholar

[19]

B. Matthews, J. R. Sylvie, S. Lee, S. R. Thomas, R. E. Chapman and G. E. Gibson, Addressing security in early stages of project life cycle,, Journal of Management in Engineering, 22 (2006), 196.   Google Scholar

[20]

B. Merz, H. Kreibich and A. Thieken, et al., Estimation uncertainty of direct monetary flood damage to buildings,, Natural Hazards and Earth System Science, 4 (2004), 153.   Google Scholar

[21]

J. R. O'Hanley and R. L. Church, Designing robust coverage networks to hedge against worst-case facility losses,, European Journal of Operational Research, 209 (2011), 23.  doi: 10.1016/j.ejor.2010.08.030.  Google Scholar

[22]

J. Peng and B. D. Liu, Birandom variables and birandom programming,, Computers & Industrial Engineering, 53 (2007), 433.   Google Scholar

[23]

R. S. Rao, S. V. L. Narasimham and M. Ramalingaraju, Optimal capacitor placement in a radial distribution system using Plant Growth Simulation Algorithm,, Electrical Power and Energy Systems, 33 (2011), 1133.   Google Scholar

[24]

J. A. Rice, Mathematical Statistics and Data Analysis,, 2007, ().   Google Scholar

[25]

H. Said and K. El-Rayes, Optimizing the planning of construction site security for critical infrastructure projects,, Automation in Construction, 19 (2010), 221.   Google Scholar

[26]

A. K. Sarma and K. M. Rafi, Optimal selection of capacitors for radial distribution systems using Plant Growth Simulation Algorithm,, International Journal of Advances in Science and Technology, 30 (2011), 43.   Google Scholar

[27]

M. P. Scaparra and R. L. Church, A bilevel mixed-integer program for critical infrastructure protection planning,, Computers & Operations Research, 35 (2008), 1905.   Google Scholar

[28]

M. Simaan and J. B. Cruz, On the Stackelberg strategy in nonzero-sum games,, Journal of Optimization Theory and Applications, 11 (1973), 533.  doi: 10.1007/BF00935665.  Google Scholar

[29]

S. Simpson, Airport Security During Construction,, presentation in: 4th Annual International Airfield Operations Area Expo & Conference, (2008).   Google Scholar

[30]

C. J. Tarr, CLASP: A computerised aid to cost effective perimeter security,, in Security Technology 28th International Carnahan conference, (1992), 164.   Google Scholar

[31]

T. M. Toole, Construction site safety roles,, Journal of Construction Engineering and Management, 128 (2002), 203.   Google Scholar

[32]

T. Uno and H. Katagiri, Single-and multi-objective defensive location problems on a network,, European Journal of Operational Research, 188 (2008), 76.  doi: 10.1016/j.ejor.2007.04.003.  Google Scholar

[33]

L. N. Vicente and P. H. Calamai, Bilevel and multilevel programming: A bibliography review,, Journal of Global Optimization, 5 (1994), 291.  doi: 10.1007/BF01096458.  Google Scholar

[34]

G. H. Walker, Securing the construction site,, presentation in: 28th IRMI Construction Risk Conference, (2008).   Google Scholar

[35]

C. Wang and H. Cheng, Transmission network optimal planning based on Plant Growth Simulation Algorithm,, European Transactions on Electrical Power, 19 (2009), 291.   Google Scholar

[36]

J. P. Xu and C. Ding, A class of chance constrained multiobjective linear programming with birandom coeffcients and its application to vendors selection,, International Journal of Production Economics, 131 (2011), 709.   Google Scholar

[37]

J. P. Xu and Z. M. Tao, A class of multi-objective equilibrium chance maximization model with twofold random phenomenon and its application to hydropower station operation,, Mathematics and Computers in Simulation, 85 (2012), 11.  doi: 10.1016/j.matcom.2012.09.010.  Google Scholar

[38]

J. P. Xu, Y. Tu and Z. Q. Zeng, A nonlinear multi-objective bilevel traffic assignment model with complex random coefficients in large-scale construction project,, Mathematical Problems in Engineering, 2012 (2012).  doi: 10.1155/2012/463976.  Google Scholar

[39]

J. P. Xu and P. Wei, Production-distribution planning of construction supply chain management under fuzzy random environment for large-scale construction project,, Journal of Industrial and Management Optimization, 9 (2013), 31.  doi: 10.3934/jimo.2013.9.31.  Google Scholar

[40]

J. P. Xu and L. M. Yao, Random-Like Multiple Objective Decision Making,, 2011, ().   Google Scholar

[41]

L. Zhang and S. Y. Wu, Robust solutions to Euclidean facility location problems with uncertain data,, Journal of Industrial and Management Optimization, 6 (2010), 751.  doi: 10.3934/jimo.2010.6.751.  Google Scholar

show all references

References:
[1]

Construction Industry Institute (CII), Implementing Project Security Practices,, Implementation resource BMM-3, (2005).   Google Scholar

[2]

Federal Aviation Administration (FAA), Recommended Security Guidelines for Airport Planning, Design and Construction,, Report No DOT/FAA/AR-00/52, (2001).   Google Scholar

[3]

Foreign Affairs Manual (FAM), Construction security certification program,, manual 12 FAM 360, (2002).   Google Scholar

[4]

Presidential Executive Order (PEO), National industrial security program,, Federal Register, 58 (1993), 1.   Google Scholar

[5]

Y. Q. Bai and C. H. Guo, Doubly nonnegative relaxation method for solving multiple objective quadratic programming problems,, Journal of Industrial and Management Optimization, 10 (2014), 543.  doi: 10.3934/jimo.2014.10.543.  Google Scholar

[6]

R. A. Blais, M. D. Henry, S. R. Lilley, J. A. Pan, M. Grimes and Y. Y. Haimes, Risk-based methodology for assessing and managing the severity of a terrorist attack,, In Systems and Information Engineering Design Symposium, 2009 (2009), 171.   Google Scholar

[7]

K. Branch and K. Baker, Security during the construction of critical infrastructure in the post 9/11 context in the U.S, 8th Annual Conference on Human Factors and Power Plants,, Institute of Electrical and Electronics Engineers (IEEE), (2007).   Google Scholar

[8]

J. Cai, Hydropower in China, Department of Technology and Built Environment,, University of Gavle, (2009).   Google Scholar

[9]

O. Chadli, H. Mahdioui and J. C. Yao, Bilevel mixed equilibrium problems in Banach spaces: Existence and algorithmic aspects,, Journal of Industrial and Management Optimization, 1 (2011), 549.   Google Scholar

[10]

A. Charnes and W. W. Cooper, Chance-constrained programming,, Management Science, 6 (1959), 73.  doi: 10.1287/mnsc.6.1.73.  Google Scholar

[11]

R. L. Church, M. P. Scaparra and R. S. Middleton, Identifying critical infrastructure: The median and covering facility interdiction problems,, Annals of the Association of American Geographers, 94 (2004), 491.   Google Scholar

[12]

M. R. Hallowell and J. A. Gambatese, Construction safety risk mitigation,, Journal of Construction Engineering and Management, 135 (2009), 1316.   Google Scholar

[13]

A. Khalafallah and K. El-Rayes, Minimizing construction-related security risks during airport expansion projects,, Journal of Construction Engineering and Management, 134 (2008), 40.   Google Scholar

[14]

T. Li, C. Wang, W. Wang and W. Su, A global optimization bionics algorithm for solving integer programming-Plant Growth Simulation Algorithm,, in Proceedings of International Conference of Management Science and Engineering, (2005), 13.   Google Scholar

[15]

T. F. Liang and H. W. Cheng, Multi-objective aggregate production planning decisions using two-phase fuzzy goal programming method,, Journal of Industrial and Management Optimization, 7 (2011), 365.  doi: 10.3934/jimo.2011.7.365.  Google Scholar

[16]

F. Liberatore, M. P. Scaparra and M. S. Daskin, Analysis of facility protection strategies against an uncertain number of attacks: The stochastic R-interdiction median problem with fortification,, Computers & Operations Research, 38 (2011), 357.  doi: 10.1016/j.cor.2010.06.002.  Google Scholar

[17]

B. D. Liu, Theory and Practice of Uncertain Programming,, Springer Verlag, (2009).   Google Scholar

[18]

G. S. Liu and J. Zhang, Decision making of transportation plan, a bilevel transportation problem approach,, Journal of Industrial and Management Optimization, 1 (2005), 305.  doi: 10.3934/jimo.2005.1.305.  Google Scholar

[19]

B. Matthews, J. R. Sylvie, S. Lee, S. R. Thomas, R. E. Chapman and G. E. Gibson, Addressing security in early stages of project life cycle,, Journal of Management in Engineering, 22 (2006), 196.   Google Scholar

[20]

B. Merz, H. Kreibich and A. Thieken, et al., Estimation uncertainty of direct monetary flood damage to buildings,, Natural Hazards and Earth System Science, 4 (2004), 153.   Google Scholar

[21]

J. R. O'Hanley and R. L. Church, Designing robust coverage networks to hedge against worst-case facility losses,, European Journal of Operational Research, 209 (2011), 23.  doi: 10.1016/j.ejor.2010.08.030.  Google Scholar

[22]

J. Peng and B. D. Liu, Birandom variables and birandom programming,, Computers & Industrial Engineering, 53 (2007), 433.   Google Scholar

[23]

R. S. Rao, S. V. L. Narasimham and M. Ramalingaraju, Optimal capacitor placement in a radial distribution system using Plant Growth Simulation Algorithm,, Electrical Power and Energy Systems, 33 (2011), 1133.   Google Scholar

[24]

J. A. Rice, Mathematical Statistics and Data Analysis,, 2007, ().   Google Scholar

[25]

H. Said and K. El-Rayes, Optimizing the planning of construction site security for critical infrastructure projects,, Automation in Construction, 19 (2010), 221.   Google Scholar

[26]

A. K. Sarma and K. M. Rafi, Optimal selection of capacitors for radial distribution systems using Plant Growth Simulation Algorithm,, International Journal of Advances in Science and Technology, 30 (2011), 43.   Google Scholar

[27]

M. P. Scaparra and R. L. Church, A bilevel mixed-integer program for critical infrastructure protection planning,, Computers & Operations Research, 35 (2008), 1905.   Google Scholar

[28]

M. Simaan and J. B. Cruz, On the Stackelberg strategy in nonzero-sum games,, Journal of Optimization Theory and Applications, 11 (1973), 533.  doi: 10.1007/BF00935665.  Google Scholar

[29]

S. Simpson, Airport Security During Construction,, presentation in: 4th Annual International Airfield Operations Area Expo & Conference, (2008).   Google Scholar

[30]

C. J. Tarr, CLASP: A computerised aid to cost effective perimeter security,, in Security Technology 28th International Carnahan conference, (1992), 164.   Google Scholar

[31]

T. M. Toole, Construction site safety roles,, Journal of Construction Engineering and Management, 128 (2002), 203.   Google Scholar

[32]

T. Uno and H. Katagiri, Single-and multi-objective defensive location problems on a network,, European Journal of Operational Research, 188 (2008), 76.  doi: 10.1016/j.ejor.2007.04.003.  Google Scholar

[33]

L. N. Vicente and P. H. Calamai, Bilevel and multilevel programming: A bibliography review,, Journal of Global Optimization, 5 (1994), 291.  doi: 10.1007/BF01096458.  Google Scholar

[34]

G. H. Walker, Securing the construction site,, presentation in: 28th IRMI Construction Risk Conference, (2008).   Google Scholar

[35]

C. Wang and H. Cheng, Transmission network optimal planning based on Plant Growth Simulation Algorithm,, European Transactions on Electrical Power, 19 (2009), 291.   Google Scholar

[36]

J. P. Xu and C. Ding, A class of chance constrained multiobjective linear programming with birandom coeffcients and its application to vendors selection,, International Journal of Production Economics, 131 (2011), 709.   Google Scholar

[37]

J. P. Xu and Z. M. Tao, A class of multi-objective equilibrium chance maximization model with twofold random phenomenon and its application to hydropower station operation,, Mathematics and Computers in Simulation, 85 (2012), 11.  doi: 10.1016/j.matcom.2012.09.010.  Google Scholar

[38]

J. P. Xu, Y. Tu and Z. Q. Zeng, A nonlinear multi-objective bilevel traffic assignment model with complex random coefficients in large-scale construction project,, Mathematical Problems in Engineering, 2012 (2012).  doi: 10.1155/2012/463976.  Google Scholar

[39]

J. P. Xu and P. Wei, Production-distribution planning of construction supply chain management under fuzzy random environment for large-scale construction project,, Journal of Industrial and Management Optimization, 9 (2013), 31.  doi: 10.3934/jimo.2013.9.31.  Google Scholar

[40]

J. P. Xu and L. M. Yao, Random-Like Multiple Objective Decision Making,, 2011, ().   Google Scholar

[41]

L. Zhang and S. Y. Wu, Robust solutions to Euclidean facility location problems with uncertain data,, Journal of Industrial and Management Optimization, 6 (2010), 751.  doi: 10.3934/jimo.2010.6.751.  Google Scholar

[1]

Didier Bresch, Thierry Colin, Emmanuel Grenier, Benjamin Ribba, Olivier Saut. A viscoelastic model for avascular tumor growth. Conference Publications, 2009, 2009 (Special) : 101-108. doi: 10.3934/proc.2009.2009.101

[2]

Yila Bai, Haiqing Zhao, Xu Zhang, Enmin Feng, Zhijun Li. The model of heat transfer of the arctic snow-ice layer in summer and numerical simulation. Journal of Industrial & Management Optimization, 2005, 1 (3) : 405-414. doi: 10.3934/jimo.2005.1.405

[3]

Palash Sarkar, Subhadip Singha. Verifying solutions to LWE with implications for concrete security. Advances in Mathematics of Communications, 2021, 15 (2) : 257-266. doi: 10.3934/amc.2020057

[4]

J. Frédéric Bonnans, Justina Gianatti, Francisco J. Silva. On the convergence of the Sakawa-Shindo algorithm in stochastic control. Mathematical Control & Related Fields, 2016, 6 (3) : 391-406. doi: 10.3934/mcrf.2016008

[5]

Dmitry Treschev. A locally integrable multi-dimensional billiard system. Discrete & Continuous Dynamical Systems - A, 2017, 37 (10) : 5271-5284. doi: 10.3934/dcds.2017228

[6]

Demetres D. Kouvatsos, Jumma S. Alanazi, Kevin Smith. A unified ME algorithm for arbitrary open QNMs with mixed blocking mechanisms. Numerical Algebra, Control & Optimization, 2011, 1 (4) : 781-816. doi: 10.3934/naco.2011.1.781

[7]

Christina Surulescu, Nicolae Surulescu. Modeling and simulation of some cell dispersion problems by a nonparametric method. Mathematical Biosciences & Engineering, 2011, 8 (2) : 263-277. doi: 10.3934/mbe.2011.8.263

[8]

Carlos Fresneda-Portillo, Sergey E. Mikhailov. Analysis of Boundary-Domain Integral Equations to the mixed BVP for a compressible stokes system with variable viscosity. Communications on Pure & Applied Analysis, 2019, 18 (6) : 3059-3088. doi: 10.3934/cpaa.2019137

[9]

Elvise Berchio, Filippo Gazzola, Dario Pierotti. Nodal solutions to critical growth elliptic problems under Steklov boundary conditions. Communications on Pure & Applied Analysis, 2009, 8 (2) : 533-557. doi: 10.3934/cpaa.2009.8.533

[10]

Hong Seng Sim, Wah June Leong, Chuei Yee Chen, Siti Nur Iqmal Ibrahim. Multi-step spectral gradient methods with modified weak secant relation for large scale unconstrained optimization. Numerical Algebra, Control & Optimization, 2018, 8 (3) : 377-387. doi: 10.3934/naco.2018024

[11]

Hyeong-Ohk Bae, Hyoungsuk So, Yeonghun Youn. Interior regularity to the steady incompressible shear thinning fluids with non-Standard growth. Networks & Heterogeneous Media, 2018, 13 (3) : 479-491. doi: 10.3934/nhm.2018021

[12]

Jan Prüss, Laurent Pujo-Menjouet, G.F. Webb, Rico Zacher. Analysis of a model for the dynamics of prions. Discrete & Continuous Dynamical Systems - B, 2006, 6 (1) : 225-235. doi: 10.3934/dcdsb.2006.6.225

[13]

Johannes Kellendonk, Lorenzo Sadun. Conjugacies of model sets. Discrete & Continuous Dynamical Systems - A, 2017, 37 (7) : 3805-3830. doi: 10.3934/dcds.2017161

[14]

Ondrej Budáč, Michael Herrmann, Barbara Niethammer, Andrej Spielmann. On a model for mass aggregation with maximal size. Kinetic & Related Models, 2011, 4 (2) : 427-439. doi: 10.3934/krm.2011.4.427

[15]

Martin Bohner, Sabrina Streipert. Optimal harvesting policy for the Beverton--Holt model. Mathematical Biosciences & Engineering, 2016, 13 (4) : 673-695. doi: 10.3934/mbe.2016014

[16]

Juan Manuel Pastor, Javier García-Algarra, Javier Galeano, José María Iriondo, José J. Ramasco. A simple and bounded model of population dynamics for mutualistic networks. Networks & Heterogeneous Media, 2015, 10 (1) : 53-70. doi: 10.3934/nhm.2015.10.53

[17]

Chin-Chin Wu. Existence of traveling wavefront for discrete bistable competition model. Discrete & Continuous Dynamical Systems - B, 2011, 16 (3) : 973-984. doi: 10.3934/dcdsb.2011.16.973

[18]

Michael Grinfeld, Amy Novick-Cohen. Some remarks on stability for a phase field model with memory. Discrete & Continuous Dynamical Systems - A, 2006, 15 (4) : 1089-1117. doi: 10.3934/dcds.2006.15.1089

[19]

Alba Málaga Sabogal, Serge Troubetzkoy. Minimality of the Ehrenfest wind-tree model. Journal of Modern Dynamics, 2016, 10: 209-228. doi: 10.3934/jmd.2016.10.209

[20]

Paula A. González-Parra, Sunmi Lee, Leticia Velázquez, Carlos Castillo-Chavez. A note on the use of optimal control on a discrete time model of influenza dynamics. Mathematical Biosciences & Engineering, 2011, 8 (1) : 183-197. doi: 10.3934/mbe.2011.8.183

2019 Impact Factor: 1.366

Metrics

  • PDF downloads (76)
  • HTML views (0)
  • Cited by (5)

[Back to Top]