Anda di halaman 1dari 8

the International Journal Volume 8

on Marine Navigation Number 4


http://www.transnav.eu and Safety of Sea Transportation December 2014

DOI:10.12716/1001.08.04.12

Graph Theory Approach to Transportation Systems


Design and Optimization
S.Guze
GdyniaMaritimeUniversity,Gdynia,Poland

ABSTRACT:Themainaimofthepaperistopresentgraphtheoryparametersandalgorithmsastooltoanalyze
and to optimise transportation systems. To realize these goals the 01 knapsack problem solution by SPEA
algorithm,methodsandproceduresforfindingtheminimalspanningtreeingraphsanddigraphs,domination
parametersproblemsaccuratetoanalysethetransportationsystemsareintroducedanddescribed.Possibility
of application of graph theory algorithms and parameters to analyze exemplary transportation system are
shown.

1 INTRODUCTION toindentifyimportantassets,
to analyze a risk based on major threat scenarios
Nowadays,researchers have two main problems. On andthevulnerabilityofeachasset,
theonehandpeoplearedependentoncriticalsystems to indentify, select and make prioritisation of
such as transportation, electricity, water supply, countermeasuresandprocedures.
sewage, ICT. According to the official definition, the Thesegoalsarecommonforallfacilitiespresented
criticalinfrastructureisatermusedtodescribeassets above. It is very important to keep these systems in
that are essential for the functioning of a society and goodconditions[8],[9].Thus,the risk and reliability
economy. The following facilities are related to this analyses is needed to understand the impact of
subject[1]: threats and hazards [4], [5], [8]. Unfortunately, these
electricity and heating generation, transmission problems are more and more complex, because of
anddistribution; existing strong interdependencies both within and
gasandoilproduction,transportanddistribution; betweeninfrastructuresystems.
telecommunication;
watersupply; Thesecondproblemisfindingoptimalsolutions.It
agriculture,foodproductionanddistribution; is met in many areas of modern science, technology
publichealth(hospitals,ambulances); and economics. For example, the navigators main
transportation systems (fuel supply, railway aimisoptimizingtherouteoftheshipduetosafety,
network,airports,harbours,inlandshipping); timeofpassage,fuelandcosts[16],[21].Thesolving
financialservices(banking); of these reallife problems is looking for a
securityservices(police,military). mathematical model or function that best
approximates or fit to the data collected during the
There are several regional criticalinfrastructure operation process or experiment [11]. If we can
protectionprogrammes,whichmainaimsare: specifythreeelements:amodelofthephenomenonof

571
distinguished decision variables, objective function X parameter(variable)space,
also known as a quality criterion and limitations, y objectivevector,
eachofthesecanbe(generally)formulatedstrictlyas Y objectivespace.
an optimization problem [3]. This approach can be
apply to reliability, safety and risk analysis [3], [4]. The set of multiobjective optimization problem
But,becauseofthecurrentcomplexityofthetechnical solutionsconsistsofalldecisionvectorsforwhichthe
systems [9] the criteria for their safe and reliable corresponding objective vectors cannot be improved
operations are made important more and more [11], in any dimension without degradation in another.
[12]. This implies that more than one object is taken These vectors are known as Pareto optimal, what is
into account for solving the optimization problems relatedtotheconceptofdominationvectorbyvector.
([3], [5], [10], [12], [14], [16], [20], [22] [23]). Some It is simple to explain after introduce following
tools for solving the problems of complex technical definitions.
systems operation, reliability, availability, safety and
cost optimization are presented in [10] [12]. The Definition1
methodsofthereliabilitypredictionandoptimization
of complex technical systems related to their Let us take into account a maximization problem
operationprocessesareintroducedin[10]. andconsider two decision vectors a, b X , then a
issaidtodominate b ifandonlyif
The methods of operational research can be
classified as deterministic or nondeterministic [15],
i {1, 2,..., n} : fi (a ) fi ( b)
[18],[20], [22]. There are many publications concerns
into deterministic or nondeterministic optimization (3)
methodsforengineeringandmanagement[20][23]. j {1, 2,..., n} : fj (a ) fj ( b).
The methods for solving the maritime transportation
optimization problems, i.e. weather routing or
minimizing fuel consumption are introduced in [14],
[21],respectively. Definition2
In this paper the review of known graph theory All decision vectors which are not dominated by
algorithms and parameters [2] [7], [13], [15], [17] anotherdecisionvectorarecallednondominated.
[19],[23]whichcanbeappliedtodesign,analyzeand
When the decision vectors are nondominated
optimizeoftransportationsystemsisdone.
within the entire search space, they are denoted as
Whereas, the presented approach can be used to Paretooptimal(Paretooptimalfront).
anyoflistedabovefacilities.
These general formulations for single and multi
objective optimization problem are common for
differenttypesofengineeringproblems,whichcanbe
2 MULTICRITERIAOPTIMIZATIONMETHODS related to different optimization problems presented
REVIEW onFigure1.

Inthegeneralwords,thesingleobjectedoptimization
problem is defined as following mathematical model
(minimizingormaximizingproblem):

F(x i ) min or F(x i ) max,


(1)
l j (x i ) 0, l j (x i ) 0, x i 0, i, j 1, 2,..., n

where
x i decisionvariables, i 1,2,..., n ;
F ( x i ) goalfunction;
l j ( xi ) limits function (low or high) for decision Figure1.Differenttypesofproblemrelatedtooptimization
problems[3],[15].
variables, i, j 1,2,..., n .
Whereas, the multiobjective (multicriteria) The basic classification of the optimization
optimization model can be described as a vector methodsconsistsintheirdivisionduetothenumber
function f that maps a tuple of m decision of criteria (one or multicriteria). As it is shown on
variables to a tuple of n objectives. The formal Figure2,thereispossibilitytodistinguishsevenmost
notationisasfollows[12]: frequently used methods of multicriteria
optimizationandthreeforonecriterion[3].
y f(x) f1 (x), f2 (x), , fn (x) min/ max
subjectto
(2)
x x1 , x 2 , , x m X,
y y 1 , y 2 , , y n Y,

where
x decisionvariable,

572
N populationsize,
N maximumsizeofexternalset,
T maximumnumberofgenerations,
pc crossingprobability,
pm mutationprobability,
Asetofnondominatedsolutions.
The Strength Pareto Evolutionary Algorithm is as
follows[3],[23]:

Step1.Initialization:
The initial population P0 is generated according
Figure2.Chosenoptimizationmethods[3]. toprocedure:
1 Togetitemi.
Thesemethodsrepresentsomegeneralapproaches 2 Toadditemitoset P0 .
foroptimization,i.e.: Next, the empty external set P0 is generated,
deterministic, wheret=0.
nondeterministic,
heuristic,
evolutionary/genetic. Step2.Thecomplementoftheexternalsetisdone.
The above approaches can provide general tools Let P = Pt
for solving optimization problems to obtain a global
optimum. In second case the best way is using the 1 To copy nondominated items from population
evolutionary or genetic algorithms. The schema of Pt topopulation P .
basicgeneticalgorithmispresentedonFigure3. 2 Toremovedominateditemsfromset P .
3 To reduce the cardinality of the set P to value
General operation of genetic or evolutionary N , using clustering and the solution give into
algorithms is based on the following steps (see Pt 1 .
Figure3)[3]:
1 Initialization.
2 Calculatefitness. Step3.Determinationfitfunction.
3 Selection/Recombination/Mutations (parents and
The value of the fit function F for items from sets
children).
Pt i Pt can be found according to following
4 Finished.
procedure:
Therealvalue S [0,1) isassignedforeveryitem
i Pt (called power). This value is proportional to
number of items j Pt , which represents the
solutionsdominatedbyitemi.
Theadaptationofitem jiscalculatedassumofall
items from external set, represents solution
dominatedbyitemj,increasedby1.
Theaimofaddition1istoensurethatitems i Pt
willhavebettervalueoffitfunctionthanitemsfrom
set Pt ,i.e.

n
S(i) , (4)
N1
Figure3.Basicgeneticalgorithm[3],[22].
where:
The each chromosome of the genetic or
evolutionary algorithm is represented as a string of
S (i ) powerofitemi,
n number of items in population dominated by
bits.
itemi.
In the paper the Strength Pareto Evolutionary
Itisassumedthatvalueoffitfunctionforitemiis
Algorithm(SPEA)isconsidered[3],[23].
equaltohispower,i.e.
The basic notations for above algorithm are as
follows: F (i ) S (i ) . (5)
tnumberofgeneration,
Pt populationingenerationt,
Pt externalsetingenerationt,
P temporaryexternalset, Step4.Selection
P temporarypopulation.
Let P =.
Additionally, it is necessary to give following
Fori=1,2,kdo
inputparameters:
1 Tochooserandomlytwoitems i, j Pt Pt .

573
2 If F (i ) F ( j ) then P P {i} Definition3
else P P { j} ,underassumptionthatvalueof
fitisminimizing. A set DI V (G ) is an independent dominating
set of G if no two vertices of DI are connected by
any edge of G . The minimum cardinality of an
Step4.Recombination. independent dominating set of G is the
independentdominationnumber I (G ).
Let P =.
Fori=1,2,N/2do:
1 To choose two items i, j P and to remove it
from P .
2 Tocreateitems: k, l bycrossingtheitems i , j .
3 Toadditems k, l toset P withprobability pc ,
elseadditems i , j toset P .

Step5.Mutation
Let P =.
Foreveryitem i P do:
1 To create item j by mutation the item i with
probability pm .
2 Toadditemjtoset P .
Figure3.Theexemplaryundirectedgraph G .

Step6.Finished Fortheexemplarygraph G presentedinFigure3


the particular domination sets and numbers
Let Pt 1 P and t t 1 . (Definitions13)areasfollows:
If t T then return A nondominated solution
frompopulation Pt andfinishelsebacktoStep2. D {5, 6}, (G) 2;
D {1, 2, 5}, c (G) 2;
D {2, 3}, I (G) 2.
3 REVIEWOFGRAPHTHEORYTOPICS
The above definitions refer to the general concept
Bellow chapter is showing general definitions, of undirected graphs. There are topics related to
parameters and algorithms of the domination in weight functions, what allows defined the vertex
graph theory and other related topics. Let weightedgraph([4],[6],[7]).
G (V , E ) be a connected simple graph (Figure 1)
where V setofnvertices, E setofmedges. The
set of neighbors of vertex v in G is denoted Definition4
by N G (v ). A vertexweighted graph (G, wv ) is defined as a
graph G together with a positive weightfunction
onitsvertexset wv : V (G ) R 0.
3.1 Basicsondominationinundirectedgraphs
According to above definition we get next
Inthefollowing,thedifferenttypeofdominationsets definitions.
and numbers definitions will be introduced, i.e.
general, connected and independent for undirected
graphs[4],[6],[7]. Definition5
The weighted domination number w (G ) of
(G, wv ) is the minimum weight
Definition1
A set D V (G) is the dominating set of G if
w( D ) v D
w ( v ) of a set D V (G) such that
everyvertex x V ( D) D hasaneighborin D .
for any v V either v D or N G (v ) D .
Thedominationnumber (G ) ofagraph G isthe
minimumcardinalityofadominatingsetof G . Definition6
The weighted connected domination number
Cw (G ) of (G, wv ) is the minimum weight
w( D C ) vD w(v ) of a set DC V (G) such that
Definition2
A set DC V (G) is a connected dominating set everyvertexof V \ DC isadjacenttoavertexin DC
C

of G if every vertex of V \ DC is adjacent to a andthesubgraphinducedby DC isconnected.


vertex in DC and the subgraph induced by DC is
connected. The minimum cardinality of a connected
dominating set of G is the connected domination Definition7
number c (G ). The weighted independent domination number
Iw (G ) of (G, wv ) is the minimum weight
w( D I ) vD w(v ) of a set DI V (G) such that if
I

574
notwo vertices of DI are connected by any edge of nodethespanningtreeisproposed.Itcanbedonefor
(G, w) . bothundirectedanddirectedcases.
Similarly,itcanbedonefordirectedgraphs.
Taking into account the complexity of the Definition8
minimum dominating set, we should state, that in The spanning tree T of a connected, undirected
general is NPhard problem. Efficient approximation graph G is a tree composed of all the vertices and
algorithms do exist under assumption that any some(orperhapsall)oftheedgesofG.
dominating set problem can be formulated as a set
covering problem. Thus, the greedy algorithm for Informally, a spanning tree of G is a selection of
finding domination set is an analog of one that has edges of G that form a tree spanning every vertex. It
been presented in [4], [18]. This algorithms is means,thateveryvertexliesinthetree,butnocycles
formulatedasfollows([4],[18]): (orloops)areformed[4].
According to Definition 5, the edgeweighted
Algorithm1: graphisintroduced.

1 Let V {1,..., n}, anddefine D .


2 Greedy add a new node to D in each iteration, Definition9
until D formsadominatingset. An edgeweighted graph (G, we ) is defined as a
3 Anode j ,issaidtobecoveredif j D orifany graph graph G together with a positive weight
neighborof j isin D .Anodethatisnotcovered functiononitsedgeset we : E (G ) R 0.
issaidtobeuncovered.
4 In each iteration, put into D the least indexed Furthermore, for edgeweighted graphs it is
node that covers the maximum number of possible to find minimum spanning tree, which is
uncoverednodes. definedasfollows.
5 Stopwhenallthenodesarecovered.
For graph in Figure 1, Greedy will return Definition10
D {1,2}.
A minimum spanning tree (MST) of an edge
Incaseoftheminimumconnecteddominationset, weightedgraphisaspanningtreewhoseweight(the
theGreedyalgorithmisalsoused.However,todefine sumoftheweightsofitsedges)isnogreaterthanthe
themsomepreliminariesarenecessary[4],[19]. weightofanyotherspanningtree.
We consider graph G and subset C of vertices It can be done according to two wellknown
in G .Wecandividedallverticesintothreeclasses: algorithms:KruskalsandPrims.Theycanbeshown
belongto C arecalledblack vb ; asfollows[2],[4]:
not belong to C but adjacent to C are called
gray v g ;
notin C andnotadjacentto C arecalledwhite Algortihm3(Kruskals)
v w . 1 Find the cheapest edge in the graph (if there is
Under assumption that C is connected morethanone,pickoneatrandom).Markitwith
dominatingsetifandonlyifthereisnowhitevertex anygivencolour,sayred.
and the subgraph induced by black vertices is 2 Findthecheapestunmarked(uncoloured)edgein
connected. The sum of the number of white vertices the graph that doesnt close a coloured or red
and the number of connected components of the circuit.Markthisedgered.
subgraph induced by black vertices (black 3 RepeatStep2untilyoureachouttoeveryvertexof
components) equals 1. The greedy algorithm with thegraph(oryouhaven1colourededges).
potential function equal to the number of white The red edges form the desired minimum
vertices plus number of black components is as spanningtree.
follows[4],[19].

Algortihm4(Prims)
Algorithm2:
1 Pickanyvertexasastartingvertex v start .Mark
Set w : 1; itwithanygivencolour(red).
while w 1 do 2 Find the nearest neighbor of v start (call it P1).
Ifthereexistsawhiteorgrayvertexsuchthat Mark both P1 and the edge v start P1 red. Cheapest
coloringitinblackanditsadjacentwhite unmarked (uncoloured) edge in the graph that
verticesingraywouldreducethevalueof doesnt close a coloured circuit. Mark this edge
potential function withsamecolourofStep2.
thenchoosesuchavertextomakethevalueof 3 Find the nearest uncoloured neighbor to the red
potentialfunctionreduceinamaximumamount subgraph(i.e.,theclosestvertextoanyredvertex).
elseset w : 0; Mark it and the edge connecting the vertex to the
redsubgraphinred.
4 RepeatStep3untilallverticesaremarkedred.
3.2 Spanningtrees
Theredsubgraphisaminimumspanningtree.
The appropriate tool for the transportation system
analysisintermsofitsinfrastructureconnectingeach

575
Theaboveknowledge(Sections3.1and3.2)canbe
applied to analyze transportation systems,
particularly its infrastructure (even critical). For
instance it is useful to choose the routes and nodes
classified as critical infrastructures [4], [8]. To show
possible applications of discussed methods, the
academicexampleisshownbellow.

Example
Let us consider the hypothetic map of road
connections, what is given by schema presented in
Figure4.Wechooseelevennodesanddescribethem
the consecutive number and the time of red light (in
seconds).Theedgesbetweenthenodesaredescribed Figure6.Minimalweightedindependentdominationset.
bythenumberofkilometers.

3.3 Introductiontotheknapsackproblem
One of the most known problem in graph theory is
theknapsackproblem.Ithasbeenstudiedsince1897
and is combinatorial optimization problem. General
descriptionisbasedongivenasetofitems,eachwith
a mass and a value [3]. There is determined the
numberofeachitemtoincludeinacollectionsothat
the total weight is less than or equal to a given limit
andthetotalvalueisaslargeaspossible(accordingto
(1)).Theknapsackproblemhasmanymodifiedforms,
i.e.toformofthe01knapsackproblem.Inthiswayis
formulated as multiobjective optimization
problem[3].

Generalassumptionabouta01knapsackproblem
Figure4.Theexemplaryschemeofroadinfrastructure.
is it consists of a set of items, weight and profit
associated with each item, and an upper bound for
Our main goal is to choose the minimal spanning thecapacityoftheknapsack.Wewantfindasubsetof
tree and minimal independent domination set, i.e. items which maximizes the profits and all selected
findinganindependentdominationnumber. itemsfitintotheknapsack,i.e.,thetotalweightdoes
According the Kruskals Algorithm, the minimal notexceedthegivencapacity[23].
spanningtreeisgiveninFigure5asthesetofdouble Afterassuminganarbitrarynumberofknapsacks,
edges. the singleobjective problem is extended directly to
themultiobjectivecase.Formally,themultiobjective
01knapsackproblemcanbedefinedinthefollowing
way[23]:
Given a set of m items and a set of n
knapsacks,with
pi , j profitofitem j accordingtoknapsack i ,
wi , j weightofitem j accordingtoknapsack i ,
c i capacityofknapsack i ,
findavector x x1 , x 2 , , x m 0,1 , suchthat
m

m
i {1, 2,..., n} : w i,j x j c i (6)
Figure5.Minimalspanningtree(KruskalsAlgortihm) j1

In this way, the minimal number of kilometers is and for which f ( x ) f 1 ( x ), f 2 ( x ), , f n ( x ) is


equalto134[km].AccordingtoAlgorithm1,thetime maximum,where
ofredlightsisequaledto430[seconds].Itisminimal
dominatingset,whatismarkedinFigure6withblack m
nodes(vertices). fi ( x ) pi,j x j (7)
j1

and x j 1 ifandonlyifwhenitem j ischosen.


Nowadays,thebestsolutionsofknapsackproblem
are described in terms of a genetic methods. As it is

576
shown in [3] it can be very useful tool for multi Definition14
objectiveoptimizationoftransportationsystems.
The value of flow f uv
isthesourceof Gst .
v:( s , v ) A
f sv , where s

3.4 Flowsintransportationsystems Generally, the main problem in traffic flows is


maximize value of f uv , which is called maximum
The graph theory is the basis for analyzing a traffic flow problem. One of the solutions is using residual
flow in transportation systems and networks [13], network,whichisdefinedasfollows[17].
[17]. In section 3 the definition of undirected graph
was introduced. But, for more detailed analysis of
traffic flows, the digraphs should be defined. Thus, Definition15
thegraph G (V , A) isdirectedgraphordigraph
d
For given G st and flow fuv , we define the
with a set V, whose elements are called vertices or
residualnetwork G st asfollows:
nodes and set A of ordered pairs of vertices, called f
1 Thenodesetof Gst isthesameasthatof Gst ;
arcs,directededges,orarrows(Figure7).
2 Each edge e (u , v ) of Gst is with capacity
f

ce f e ;
3 Each edge e (v, u ) of Gst is with capacity
f

fe .
Furthermore c p min{cuv : (u , v)f p}
f f
is
residualcapacityofpathpinnetwork Gst .
According to above definitions, the algorithm of
finding the maximal flow in network is given as
follows[13],[17].

Algorithm5(FordFulkerson)
Foreachedge e (u , v ) do
Begin
f uv =0
Figure7.Theexemplarydirectedgraph G . f vu =0
End
ThemainreasonforthecreationofthisSubsection Whileexistspath p from s do t in Gstf do
is fact that transportation engineers need know the Begin
c p min{cuv : (u , v) p}
f f
trafficflowtheoryasatoolthathelpsunderstandand
express the problems of evaluating the capacity of Foreach e (u , v ) p do
existing roadways or designing new ones. Thus, the begin
f
followingdefinitionsareimportant[17]. f uv = fuv + c p
f vu = fuv
End
Definition11 End
Let Gst (V , A, s, t ) be a network with Returnf.
s, t A being the source and the sink of Gst Based on algorithm 5, the exemplary residual
respectively. networkisproposedinFigure8.

Definition12
The capacity of an edge of network Gst is

mapping c : A R , which represents the
maximum amount of flow that can pass through an
edge.Itisdenotedas cuv , where u , v A.

Definition13
A flow in network Gst is mapping
f uv : A R , where u , v A, whichsubjectstothe
followingtwoconstrains:
1 f uv cuv , (capacity constraint: the flow of
( u , v ) A
anedgecannotexceeditscapacity)
2
vV \{ s , t }
of

f u:( u , v ) A f vu , (conservation
u :( u , v ) A uv
flows: the sum of the flows entering a node
must equal the sum of the flows exiting a node,
exceptforthesourceandthesinknodes).


Figure8. Exemplary original and residual network, where
s:=1,t:=6.

577
4 CONCLUSION [9]Koowrocki, K. (2004). Reliability of Large Systems.
Elsevier, Amsterdam Boston Heidelberg London
NewYorkOxfordParisSanDiegoSanFrancisco
Inthepaper,theconceptofcriticalinfrastructureshas
SingaporeSydneyTokyo.
been presented. Some review and classifications of [10]Koowrocki, K. & Soszyska, J. (2010). Optimization of
wellknown information about optimization, graph complextechnicalsystemsoperationprocesses.Maintenance
theoryandnetworkflowtheoryhavebeendone.The Problems,No1,3140,Radom.
SPEA algorithm has been described stepbystep and [11]Koowrocki,K.&SoszyskaBudny,J.(2011).Reliability
the knapsack problem with its binary modification and Safety of Complex Technical Systems and Processes,
has been presented. It has also been used the SPEA Modeling Identification Prediction Optimization,
algorithm to solve the 01 knapsack problem. SpringerVerlag.
Furthermore,theselecteddefinitions,parametersand [12]Koowrocki, K. SoszyskaBudny, J. (2013). Reliability
algorithmsofgraphtheoryhavebeenintroducedand predictionandoptimizationofcomplextechnicalsystemswith
applied to system transportation analysis. As the application in port transport. Journal of Polish Safety and
Reliability Association, Summer Safety and Relibility
example of possible application, the road Seminars SSARS 2013, Volume 3, Number 12, 263
transportation system with the shortest time of red 279,GdaskSopot.
light in nodes and the shortest kilometers have been [13]Leeuwen,Van,J.(1986).GraphAlgorithms.Book.
determined. The examples, from Section 3, are only [14]Marie, S. & Courteille, E. (2009) MultiObjective
showing potential applications of methods, Optimization of Motor Vessel Route. TransNav, The
algorithms and parameters, which are described in International Journal on Marine Navigation and Safety
thearticle. ofSeaTransportation,Vol.3,No.2,133141,Gdynia.
[15]Martello, S. & Toth, P. (1990). Knapsack Problems:
Algorithms and Computer Implementations. Chichester,
U.K.:Wiley.
REFERENCES [16]MingHua, L., JungFa, T. and ChianSon Y. (2012), A
Review of Deterministic Optimization Methods in
Engineering and Management, Mathematical Problems in
[1]COMMISSION OF THE EUROPEAN COMMUNITIES Engineering,Volume2012.
(2006), Communication from the Commission on a [17]Newell, G. F. (1980). Traffic flow on transportation
European Programme for Critical Infrastructure networks. MIT Press Series in transportation studies,
Protection,Brussels. Monograph5.
[2]Cormen, T. H. & al. (2009). Introduction to Algorithms, [18]Parekh, A. K. (1991). Analysis of Greedy Heuristic for
Third Edition. MIT Press, ISBN 0262033844. Section Finding Small Dominating Sets in Graphs. Information
23.2:ThealgorithmsofKruskalandPrim,pp.631638. ProcessingLetters,Volume39,Issue5,pp.237240.
[3]Guze,S.(2014).Applicationoftheknapsackproblemto [19]Ruan, L. & al., (2004). A greedy approximation for
reliability multicriteria optimization. Journal of Polish minimum connected dominating sets. Theoretical
Safety and Reliability Association, Summer Safety and ComputerScience,Volume329,Issues13,pp325330.
ReliabilitySeminars,Vol.5,No1,pp.8590. [20]Sun,W.andYuan,Y.X.(2006).Optimizationtheoryand
[4]Guze, S. (2014). The graph theory approach to analyze methods:nonlinearprogramming.SpringerVerlag.
criticalinfrastructuresoftransportationsystems.Journal [21]Szapczyska, J. (2013). Multicriteria Evolutionary
of Polish Safety and Reliability Association, Summer Safety Weather Routing Algorithm in Practice. TransNav, the
andReliabilitySeminars,Vol.5,No2,pp.5762. International Journal on Marine Navigation and Safety
[5]Guze, S. Smolarek, L. (2011). Methods for risk minimizing ofSeaTransportation,Vol.7,No.1,6165,Gdynia.
intheprocessofdecisionmakingunderuncertainty.Journal [22]Venter, G. (2010). Review of Optimization Techniques,
ofPolishSafetyandReliabilityAssociationJPSRA,Vol. Encyclopedia of Aerospace Engineering, John Willey and
2,Number1,123128,GdaskSopot. Sons,Ltd.
[6]Harary, F. (1969). Graph Theory. AddisonWesley, [23]Zitzler,E.&Thiele,L.(1999).MultiobjectiveEvolutionary
Reading. Algorithms: A Comparative Case Study and the Strength
[7]Haynes T. W., Hedetniemi, S., Slater, P. (1988). Pareto Approach. IEEE Transactions on Evolutionary
FundamentalsofDominationinGraphs.CRCPress. Computation,VOL.3,NO.4.,257271.
[8]Koowrocki, K. (2013). Safety of critical infrastructures.
JournalofPolishSafetyandReliabilityAssociation,Summer
SafetyandReliabilitySeminars,Vol.4,No.1,pp.5174.

578

Anda mungkin juga menyukai