Preview

Maximal Covering Location Problem with Different Levels of interdiction

Powerful Essays
Open Document
Open Document
9584 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Maximal Covering Location Problem with Different Levels of interdiction
European Journal of Operational Research 217 (2012) 519–530

Contents lists available at SciVerse ScienceDirect

European Journal of Operational Research journal homepage: www.elsevier.com/locate/ejor

Production, Manufacturing and Logistics

Optimizing system resilience: A facility protection model with recovery time
Chaya Losada, M. Paola Scaparra ⇑, Jesse R. O’Hanley
Kent Business School, University of Kent, CT2 7PE Canterbury, UK

a r t i c l e

i n f o

Article history:
Received 30 November 2010
Accepted 26 September 2011
Available online 1 October 2011
Keywords:
OR in strategic planning
Location
Protection
Bilevel programming
Decomposition

a b s t r a c t
Optimizing system resilience is concerned with the development of strategies to restore a system to normal operations as quickly and efficiently as possible following potential disruption. To this end, we present in this article a bilevel mixed integer linear program for protecting an uncapacitated median type facility network against worst-case losses, taking into account the role of facility recovery time on system performance and the possibility of multiple disruptions over time. The model differs from previous types of facility protection models in that protection is not necessarily assumed to prevent facility failure altogether, but more precisely to speed up recovery time following a potential disruption. Three different decomposition approaches are devised to optimally solve medium to large problem instances. Computational results provide a cross comparison of the efficiency of each algorithm. Additionally, we present an analysis to estimate cost-efficient levels of investments in protection resources.
Ó 2011 Elsevier B.V. All rights reserved.

1. Introduction
In this paper, we consider the problem of reducing the impact of component failures on service and supply systems. Our specific aim is to decide which components to harden or protect, not necessarily with the

You May Also Find These Documents Helpful

  • Better Essays

    concern of this domain. This domain needs to be protected by securing the physical access to computer rooms and a disaster recovery plan (DRP) should be created including the backup of data. Plan, configure, maintain, and improve all network servers and implements all standards including the Acceptable Use Policy…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Appendix D IT244

    • 827 Words
    • 4 Pages

    The Mission Critical business systems that need protection the most in the event of a disaster are first going to be the computers in each branch, followed by the servers in the central hub for intranet finances, web, inventory as well as HR services. Customers are the life blood of Sunica Music and if we cannot provide our service to them then critical business has stopped, for this our central financial software has to be running in order to record finances and communicate to the new inventory system which orders alongside the financial system.…

    • 827 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    CIS590: Project Plan Paper

    • 4496 Words
    • 18 Pages

    Addressing the need for a network topology that will address security, resiliency and business continuity challenges both day-to-day and in the event of a man-made (i.e., hacker) or natural (earth quake) disaster.…

    • 4496 Words
    • 18 Pages
    Powerful Essays
  • Powerful Essays

    The hospital’s backbone network structure for the entire hospital is 1000Base T. Some of the other individual sections of the departmental network use different standards such as 1000Base F. The areas that use the 1000Base T are responsible for the administrative side of things. These areas are: hospital executive management, human resources, operations, facilities, finance, and IT data center. The areas that use the 1000Base F are responsible for the clinical areas. They include: radiology, operating rooms, wards, ICU’s, emergency rooms, labs, and pharmacy. For a failsafe, the entire hospital has a complete power backup system that automatically cuts over to a large diesel motor generator set.…

    • 3074 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    FXT2 Task 1

    • 1206 Words
    • 7 Pages

    -- Document all hardware associated with ECP/DRP and its readiness as well keep ECP/DRP up to date.…

    • 1206 Words
    • 7 Pages
    Satisfactory Essays
  • Better Essays

    Supply Disruption  Customer Disruption  Employee Disruption Communication Utilities Contingency Planning Process High Level Contingency and Disaster Recovery Planning Strategy • Develop the Business Contingency Planning • • • • • • • Policy and Business Process Priorities Conduct a Risk Assessment Conduct the Business Impact Analysis (BIA) Develop Business Continuity and Recovery Strategies Develop Business Continuity Plans Conduct awareness, testing, and training of the DRP Conduct Disaster Recovery Plan maintenance and exercise Identify business processes Industry Standards ISO 27001 : Requirements for Information Security Management Systems. Section 14 addresses business continuity management.…

    • 1114 Words
    • 10 Pages
    Better Essays
  • Good Essays

    Is411 Study Guide

    • 2595 Words
    • 11 Pages

    Resiliency is a term used in IT to indicate how quickly the IT infrastructure can recover. Pg 279. The Recovery Time Objective (RTO) is the…

    • 2595 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    JIT2 Risk Management

    • 2004 Words
    • 9 Pages

    The goal is to minimize the impact of any disruption by containing it within a predictable and predetermined period of time. To do this, I recommend that this plan be developed and implemented with as many preventative controls, contingency resources, and procedures designed to allow the organization to quicky bounce back from any long-term business interruption. With this document I’ll present a workable DR plan that focuses not only on safeguarding critical data but also on the restoration of all normal business functions.…

    • 2004 Words
    • 9 Pages
    Powerful Essays
  • Best Essays

    Information Security Policy

    • 3396 Words
    • 14 Pages

    Sunica Music and Movies is a company that currently has four locations. This business is ready to improve the way they do business by implementing a computerized network that will allow for centralized accounting and inventory as well as starting a web-based e-commerce site. The following document provides an in-depth look at the implementation of policy and procedures that will help this transition to become successful.…

    • 3396 Words
    • 14 Pages
    Best Essays
  • Good Essays

    The key elements of a disaster recovery plan are to keep computers running, meeting all agreements between customers and suppliers, and being proactive rather than reactive. Keeping the computers and systems running is an essential element to the disaster recovery plan. The systems and computers are the link to the services they provide. The business relies on the internet for their marketing or sales needs, especially in today’s world of business. Meeting the agreements between customers and suppliers is essential because they trust your business will deliver these services. Being proactive rather than reactive is always a good thing for a business to have. The employees or personnel should already know what to do when…

    • 665 Words
    • 3 Pages
    Good Essays
  • Good Essays

    3. CRS Report for Congress, (2004). Order Code RL32561, Risk Management and Critical Infrastructure Protection retrieved from http://www.au.af.mil/au/awc/awcgate/crs/rl32561.pdf…

    • 951 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    business

    • 279 Words
    • 2 Pages

    6. How would you design and develop risk management and contingency plans, and cater for any OHS issues?…

    • 279 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    To assess risks and vulnerabilities with the operating IT facilities we must create a mitigation plan. The mitigation plan will ensure what actions or steps to take when a risk were to occur. If the company were to experience risk such as fire, users outages, remote access, opening unknown e-mail attachment or have equipment failure, the mitigation plan will let you know…

    • 622 Words
    • 3 Pages
    Good Essays
  • Good Essays

    A disaster is defined as a sudden, unplanned catastrophic event that renders the organizations ability to perform mission-critical and critical processes, including the ability to do normal production processing of systems that support critical business processes. A disaster could be the result of significant damage to a portion of the operations, a total loss of a facility, or the inability of the employees to access that facility. The disaster recovery process consists of defining rules, processes, and disciplines to ensure that the critical business processes will continue to function if there is a failure of one or more of the information processing or telecommunications resources upon which their operations depends. In the case of Sunica Music and Movies restoring the internet is a priority so the stores can communicate with the inventory and accounting databases not to mention the new emphasis on e-commerce. Without these three critical business processes all of the stores will not be able to operate.…

    • 914 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    What needs to be identified are ways that the project team and organization will establish a plan of procedure to resolve any issues that may arise or as soon as possible as to not cause a loss in availability and reliability. During any unplanned outages, you risk the obligations you have established with your clients and also stated in an SLA (Service Level Agreement) that defines the percentage of the amount of time that the systems and services must be available. One way for our organizations risk mitigation strategy, we will implement a hot site. A hot site is defined as a central location that has all systems with matching back up configurations to the current operational system so there will be no down time for the clients and the services. If the main system was to fail, the hot site will kick in to operation and take over all services until the main system is properly resolved. To help and prevent any possible down time for the main system, the organization could apply weekly patches that are configured to identify and react to any known and potential attacks that will cause the system to fail. These patches can be schedule and coordinated with the clients so we may decide on the least active time that the services are being used that we offer to the client so we can have planned and scheduled down time to apply the patches and…

    • 3705 Words
    • 15 Pages
    Powerful Essays

Related Topics