The dual decomposition method and its application to an interdicted network.
Gannon, Timothy Paul
Bailey, Michael P.
Parry, Samuel H.
MetadataShow full item record
This paper introduces the dual decomposition method for determining the distribution of an optimal objective function for a network problem. The objective function is to minimize the shortfall of demands to prioritized sinks for a four day period over a network that is subject to interdiction. The requirements of the model are that the upper and lower bounds on the capacities of the arcs and nodes of the network and the probabilities of interdiction are known. The dual decomposition method is an iterative approach to enumerating the possible instances of capacities in a capacitated network, based on the dual variables of the pervious iteration. The purpose of the procedure is to determine the distribution of the shortfall of demands so that logistics planners can predict the performance of a supply distribution system over a short period of time.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Santos, Christopher P. (Monterey, California: Naval Postgraduate School, 2016-03);The U.S. military has supported U.S. law enforcement in counter drug-trafficking efforts since the 1980s; the interagency counterdrug approach developed during that period—and still used today—focuses primarily on interdiction ...
Choi, Byung Kwon (Monterey, California. Naval Postgraduate School, 1989);In this thesis, we use simulation to study the probabilistic dynamics of a road transportation network when the network is subjected to interdiction by aircraft. We consider several road interdiction schemes. The simulation ...
Zimmerman, Douglas W.; Davis, Ian S.; Worth, Carrie L. (Monterey, California. Naval Postgraduate School, 2010-12);This study presents a theory of dark network design and answers two fundamental questions about illuminating and interdicting dark networks: how are they configured and how are they vulnerable? We define dark networks as ...