Giter Site home page Giter Site logo

adi10hero / network_interdiction_model Goto Github PK

View Code? Open in Web Editor NEW

This project forked from pmr123/network_interdiction_model

0.0 2.0 0.0 58 KB

Implementation of a network analysis model to identify critical acrs to prevent network interdictions

Jupyter Notebook 100.00%

network_interdiction_model's Introduction

Network Interdiction Model

Effective Relocation of resources using Maximal-Minimal flow in Network Interdiction.

Need of this Model :

During emergencies like a terrorist attack, people want to get away from the terrorists and security and help forces(ambulances,etc) want to get as close to the site as possible in the least amount of time possible.
More often than not, a single mishap like an accident or roadblock is enough to cause massive disruptions in the flow of people due to heavy traffic.
This enables the terrorists to cause more damage as people take more time to flee while aid comes slowly.

Solution Proposed :

  1. During emergencies like a terrorist attack, people want to get away from the terrorists and security and help forces(ambulances,etc) want to get as close to the site as possible in the least amount of time possible.
  2. More often than not, a single mishap like an accident or roadblock is enough to cause massive disruptions in the flow of people due to heavy traffic.
  3. This enables the terrorists to cause more damage as people take more time to flee while aid comes slowly.

Algorithm Used :

Dijkstra's algorithm (or Dijkstra's Shortest Path First algorithm, SPF algorithm) is a “Greedy Algorithm” which fixes a single node as the "source" node and finds shortest paths from the source to all other nodes in the graph, producing a shortest-path tree.
Benders decomposition (or Benders' decomposition) is a divide-and-conquer algorithm that divides the original problem into subsets, iteratively solves these subsets adding more constraints till no new constraint can be added.

Flow of Program :

  1. Our program works on the principle of finding the optimal Bender’s cut(arc to be interdicted) at every iteration and then finding the new shortest path from the source to the destination aiming to find how to maximize the shortest path from source(where the aid is coming from) to the destination(where the terrorist attack is taking place) while applying the least resources possible.

  2. This allows us to determine which arcs(roads) the terrorists are likely to interdict so that they can cause maximum disruptions while spending minimal resources.

  3. These risky arcs will be reported as arcs whose infrastructure needs to be upgraded to increase interdiction cost or need to be constantly guarded to avoid interdiction.

network_interdiction_model's People

Contributors

adi10hero avatar pmr123 avatar

Watchers

 avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.