主管:中国科学院
主办:中国优选法统筹法与经济数学研究会
   中国科学院科技战略咨询研究院

中国管理科学 ›› 2025, Vol. 33 ›› Issue (9): 109-120.doi: 10.16381/j.cnki.issn1003-207x.2023.0357

• • 上一篇    下一篇

基于网络阻断理论的交通安检网络设计与资源调度模型

项寅1, 滕辰妹2(), 王雪3, 张文静1   

  1. 1.苏州科技大学商学院,江苏 苏州 215009
    2.苏州大学政治与公共管理学院,江苏 苏州 215000
    3.温州大学商学院,浙江 温州 325035
  • 收稿日期:2023-03-06 修回日期:2023-05-07 出版日期:2025-09-25 发布日期:2025-09-29
  • 通讯作者: 滕辰妹 E-mail:tcmtcz@163.com
  • 基金资助:
    国家自然科学基金青年项目(72104170);国家自然科学基金青年项目(72474151);教育部人文社会科学青年项目(21YJC630141)

Traffic Security Network Design and Resource Coordination Based on Network Interdiction

Yin Xiang1, Chenmei Teng2(), Xue Wang3, Wenjing Zhang1   

  1. 1.School of Business,University of Science and Technology of Suzhou,Suzhou 215009,China
    2.School of Politics and Public Administration,Soochow University,Suzhou 215000,China
    3.College of Business,Wenzhou University,Wenzhou 325035,China
  • Received:2023-03-06 Revised:2023-05-07 Online:2025-09-25 Published:2025-09-29
  • Contact: Chenmei Teng E-mail:tcmtcz@163.com

摘要:

重大赛事、会议等特殊时期,安检机构可通过合理设计交通安检网络来降低入侵者(袭击者、不法分子等)潜入活动地点的概率。然而,不同于现有网络阻断问题的研究,本文考虑了节点阻断模式,将传统0-1阻断变量松弛为整数变量,增加了节点间的资源调度决策,并深入考虑了入侵者具有多起点和多终点、阻断者同时调度“现存”和“新增”资源、入侵者对阻断者资源分布具有不完全信息等拓展情形。上述问题被构建为非线性双目标双层规划模型。为求解模型,设计了一类集成ε-约束和Benders分解的混合求解方法。最后,以中国-亚欧博览会为背景开展算例分析,结果验证了模型和算法的有效性。

关键词: 交通安检, 节点阻断, 网络设计, 资源调度, Benders分解算法

Abstract:

In recent years, with its rising international status, China has hosted an increasing number of major events (2008 Beijing Olympics, 2022 Beijing East Olympics, 2023 Hangzhou Asian Games) and conferences (2010 Shanghai World Expo, 2016 Hangzhou G20 Summit). However, this also provides opportunities for various types of intruder (e.g. terrorist) who deliberately infiltrate the event sites and attempt to launch riots. In this context, during major events, how security agencies can reduce the intrusion probability of intruders through the design of traffic security network has become a significant research problem.Research on network interdiction problems provides theoretical and technical support for optimize the above problems.The network interdiction problem, usually based on leader-follower games, concerns how to monitor or halt adversary behaviors in a network.Although there have been an increasing number of studies on network interdiction problems in recent years, most of them provide solutions based on assumptions that fail to address real-life problems. Such assumptions include (1) only arcs can be interdicted, (2) interdiction is a binary decision, (3) the interdict effect is exogenous, and (4) resource sharing is not allowed.In this context, a novel network interdiction problem is presented, for which the nodal interdiction pattern is considered, the interdict variable is defined as an integer variable (representing the amount of interdict resources), resource sharing between nodes is allowed, it is assumed that the interdict effect is no longer an exogenously given parameter but determined by the amount of resources on the node, and further the expansion of the situation such as multi-source and multi-sink nodes is considered, the defender (e.g. security agencies) dispatches both existing and new resources, and the intruder has some incomplete information. These problems are addressed as some novel defender–attacker bilevel models. The upper-level program belongs to the defender, who optimizes the resource-sharing strategy and improves the interdict effect of some critical nodes, whereas the lower-level program refers to the attacker who responds to find a maximal reliable path between a given pair of source and sink nodes. To solve the models, a hybrid method integrating ε-constraint and Benders decomposition is designed.Finally, numerical studies are carried out with the background of China-Eurasia Expo, and the results verify the effectiveness of the model and the algorithm.

Key words: traffic security, node interdiction, network design, resource scheduling, benders decomposition algorithm

中图分类号: