DOI:10.12716/1001.08.04.12
ABSTRACT:Themainaimofthepaperistopresentgraphtheoryparametersandalgorithmsastooltoanalyze
and to optimise transportation systems. To realize these goals the 01 knapsack problem solution by SPEA
algorithm,methodsandproceduresforfindingtheminimalspanningtreeingraphsanddigraphs,domination
parametersproblemsaccuratetoanalysethetransportationsystemsareintroducedanddescribed.Possibility
of application of graph theory algorithms and parameters to analyze exemplary transportation system are
shown.
1 INTRODUCTION toindentifyimportantassets,
to analyze a risk based on major threat scenarios
Nowadays,researchers have two main problems. On andthevulnerabilityofeachasset,
theonehandpeoplearedependentoncriticalsystems to indentify, select and make prioritisation of
such as transportation, electricity, water supply, countermeasuresandprocedures.
sewage, ICT. According to the official definition, the Thesegoalsarecommonforallfacilitiespresented
criticalinfrastructureisatermusedtodescribeassets above. It is very important to keep these systems in
that are essential for the functioning of a society and goodconditions[8],[9].Thus,the risk and reliability
economy. The following facilities are related to this analyses is needed to understand the impact of
subject[1]: threats and hazards [4], [5], [8]. Unfortunately, these
electricity and heating generation, transmission problems are more and more complex, because of
anddistribution; existing strong interdependencies both within and
gasandoilproduction,transportanddistribution; betweeninfrastructuresystems.
telecommunication;
watersupply; Thesecondproblemisfindingoptimalsolutions.It
agriculture,foodproductionanddistribution; is met in many areas of modern science, technology
publichealth(hospitals,ambulances); and economics. For example, the navigators main
transportation systems (fuel supply, railway aimisoptimizingtherouteoftheshipduetosafety,
network,airports,harbours,inlandshipping); timeofpassage,fuelandcosts[16],[21].Thesolving
financialservices(banking); of these reallife problems is looking for a
securityservices(police,military). mathematical model or function that best
approximates or fit to the data collected during the
There are several regional criticalinfrastructure operation process or experiment [11]. If we can
protectionprogrammes,whichmainaimsare: specifythreeelements:amodelofthephenomenonof
571
distinguished decision variables, objective function X parameter(variable)space,
also known as a quality criterion and limitations, y objectivevector,
eachofthesecanbe(generally)formulatedstrictlyas Y objectivespace.
an optimization problem [3]. This approach can be
apply to reliability, safety and risk analysis [3], [4]. The set of multiobjective optimization problem
But,becauseofthecurrentcomplexityofthetechnical solutionsconsistsofalldecisionvectorsforwhichthe
systems [9] the criteria for their safe and reliable corresponding objective vectors cannot be improved
operations are made important more and more [11], in any dimension without degradation in another.
[12]. This implies that more than one object is taken These vectors are known as Pareto optimal, what is
into account for solving the optimization problems relatedtotheconceptofdominationvectorbyvector.
([3], [5], [10], [12], [14], [16], [20], [22] [23]). Some It is simple to explain after introduce following
tools for solving the problems of complex technical definitions.
systems operation, reliability, availability, safety and
cost optimization are presented in [10] [12]. The Definition1
methodsofthereliabilitypredictionandoptimization
of complex technical systems related to their Let us take into account a maximization problem
operationprocessesareintroducedin[10]. andconsider two decision vectors a, b X , then a
issaidtodominate b ifandonlyif
The methods of operational research can be
classified as deterministic or nondeterministic [15],
i {1, 2,..., n} : fi (a ) fi ( b)
[18],[20], [22]. There are many publications concerns
into deterministic or nondeterministic optimization (3)
methodsforengineeringandmanagement[20][23]. j {1, 2,..., n} : fj (a ) fj ( b).
The methods for solving the maritime transportation
optimization problems, i.e. weather routing or
minimizing fuel consumption are introduced in [14],
[21],respectively. Definition2
In this paper the review of known graph theory All decision vectors which are not dominated by
algorithms and parameters [2] [7], [13], [15], [17] anotherdecisionvectorarecallednondominated.
[19],[23]whichcanbeappliedtodesign,analyzeand
When the decision vectors are nondominated
optimizeoftransportationsystemsisdone.
within the entire search space, they are denoted as
Whereas, the presented approach can be used to Paretooptimal(Paretooptimalfront).
anyoflistedabovefacilities.
These general formulations for single and multi
objective optimization problem are common for
differenttypesofengineeringproblems,whichcanbe
2 MULTICRITERIAOPTIMIZATIONMETHODS related to different optimization problems presented
REVIEW onFigure1.
Inthegeneralwords,thesingleobjectedoptimization
problem is defined as following mathematical model
(minimizingormaximizingproblem):
where
x i decisionvariables, i 1,2,..., n ;
F ( x i ) goalfunction;
l j ( xi ) limits function (low or high) for decision Figure1.Differenttypesofproblemrelatedtooptimization
problems[3],[15].
variables, i, j 1,2,..., n .
Whereas, the multiobjective (multicriteria) The basic classification of the optimization
optimization model can be described as a vector methodsconsistsintheirdivisionduetothenumber
function f that maps a tuple of m decision of criteria (one or multicriteria). As it is shown on
variables to a tuple of n objectives. The formal Figure2,thereispossibilitytodistinguishsevenmost
notationisasfollows[12]: frequently used methods of multicriteria
optimizationandthreeforonecriterion[3].
y f(x) f1 (x), f2 (x), , fn (x) min/ max
subjectto
(2)
x x1 , x 2 , , x m X,
y y 1 , y 2 , , y n Y,
where
x decisionvariable,
572
N populationsize,
N maximumsizeofexternalset,
T maximumnumberofgenerations,
pc crossingprobability,
pm mutationprobability,
Asetofnondominatedsolutions.
The Strength Pareto Evolutionary Algorithm is as
follows[3],[23]:
Step1.Initialization:
The initial population P0 is generated according
Figure2.Chosenoptimizationmethods[3]. toprocedure:
1 Togetitemi.
Thesemethodsrepresentsomegeneralapproaches 2 Toadditemitoset P0 .
foroptimization,i.e.: Next, the empty external set P0 is generated,
deterministic, wheret=0.
nondeterministic,
heuristic,
evolutionary/genetic. Step2.Thecomplementoftheexternalsetisdone.
The above approaches can provide general tools Let P = Pt
for solving optimization problems to obtain a global
optimum. In second case the best way is using the 1 To copy nondominated items from population
evolutionary or genetic algorithms. The schema of Pt topopulation P .
basicgeneticalgorithmispresentedonFigure3. 2 Toremovedominateditemsfromset P .
3 To reduce the cardinality of the set P to value
General operation of genetic or evolutionary N , using clustering and the solution give into
algorithms is based on the following steps (see Pt 1 .
Figure3)[3]:
1 Initialization.
2 Calculatefitness. Step3.Determinationfitfunction.
3 Selection/Recombination/Mutations (parents and
The value of the fit function F for items from sets
children).
Pt i Pt can be found according to following
4 Finished.
procedure:
Therealvalue S [0,1) isassignedforeveryitem
i Pt (called power). This value is proportional to
number of items j Pt , which represents the
solutionsdominatedbyitemi.
Theadaptationofitem jiscalculatedassumofall
items from external set, represents solution
dominatedbyitemj,increasedby1.
Theaimofaddition1istoensurethatitems i Pt
willhavebettervalueoffitfunctionthanitemsfrom
set Pt ,i.e.
n
S(i) , (4)
N1
Figure3.Basicgeneticalgorithm[3],[22].
where:
The each chromosome of the genetic or
evolutionary algorithm is represented as a string of
S (i ) powerofitemi,
n number of items in population dominated by
bits.
itemi.
In the paper the Strength Pareto Evolutionary
Itisassumedthatvalueoffitfunctionforitemiis
Algorithm(SPEA)isconsidered[3],[23].
equaltohispower,i.e.
The basic notations for above algorithm are as
follows: F (i ) S (i ) . (5)
tnumberofgeneration,
Pt populationingenerationt,
Pt externalsetingenerationt,
P temporaryexternalset, Step4.Selection
P temporarypopulation.
Let P =.
Additionally, it is necessary to give following
Fori=1,2,kdo
inputparameters:
1 Tochooserandomlytwoitems i, j Pt Pt .
573
2 If F (i ) F ( j ) then P P {i} Definition3
else P P { j} ,underassumptionthatvalueof
fitisminimizing. A set DI V (G ) is an independent dominating
set of G if no two vertices of DI are connected by
any edge of G . The minimum cardinality of an
Step4.Recombination. independent dominating set of G is the
independentdominationnumber I (G ).
Let P =.
Fori=1,2,N/2do:
1 To choose two items i, j P and to remove it
from P .
2 Tocreateitems: k, l bycrossingtheitems i , j .
3 Toadditems k, l toset P withprobability pc ,
elseadditems i , j toset P .
Step5.Mutation
Let P =.
Foreveryitem i P do:
1 To create item j by mutation the item i with
probability pm .
2 Toadditemjtoset P .
Figure3.Theexemplaryundirectedgraph G .
574
notwo vertices of DI are connected by any edge of nodethespanningtreeisproposed.Itcanbedonefor
(G, w) . bothundirectedanddirectedcases.
Similarly,itcanbedonefordirectedgraphs.
Taking into account the complexity of the Definition8
minimum dominating set, we should state, that in The spanning tree T of a connected, undirected
general is NPhard problem. Efficient approximation graph G is a tree composed of all the vertices and
algorithms do exist under assumption that any some(orperhapsall)oftheedgesofG.
dominating set problem can be formulated as a set
covering problem. Thus, the greedy algorithm for Informally, a spanning tree of G is a selection of
finding domination set is an analog of one that has edges of G that form a tree spanning every vertex. It
been presented in [4], [18]. This algorithms is means,thateveryvertexliesinthetree,butnocycles
formulatedasfollows([4],[18]): (orloops)areformed[4].
According to Definition 5, the edgeweighted
Algorithm1: graphisintroduced.
Algortihm4(Prims)
Algorithm2:
1 Pickanyvertexasastartingvertex v start .Mark
Set w : 1; itwithanygivencolour(red).
while w 1 do 2 Find the nearest neighbor of v start (call it P1).
Ifthereexistsawhiteorgrayvertexsuchthat Mark both P1 and the edge v start P1 red. Cheapest
coloringitinblackanditsadjacentwhite unmarked (uncoloured) edge in the graph that
verticesingraywouldreducethevalueof doesnt close a coloured circuit. Mark this edge
potential function withsamecolourofStep2.
thenchoosesuchavertextomakethevalueof 3 Find the nearest uncoloured neighbor to the red
potentialfunctionreduceinamaximumamount subgraph(i.e.,theclosestvertextoanyredvertex).
elseset w : 0; Mark it and the edge connecting the vertex to the
redsubgraphinred.
4 RepeatStep3untilallverticesaremarkedred.
3.2 Spanningtrees
Theredsubgraphisaminimumspanningtree.
The appropriate tool for the transportation system
analysisintermsofitsinfrastructureconnectingeach
575
Theaboveknowledge(Sections3.1and3.2)canbe
applied to analyze transportation systems,
particularly its infrastructure (even critical). For
instance it is useful to choose the routes and nodes
classified as critical infrastructures [4], [8]. To show
possible applications of discussed methods, the
academicexampleisshownbellow.
Example
Let us consider the hypothetic map of road
connections, what is given by schema presented in
Figure4.Wechooseelevennodesanddescribethem
the consecutive number and the time of red light (in
seconds).Theedgesbetweenthenodesaredescribed Figure6.Minimalweightedindependentdominationset.
bythenumberofkilometers.
3.3 Introductiontotheknapsackproblem
One of the most known problem in graph theory is
theknapsackproblem.Ithasbeenstudiedsince1897
and is combinatorial optimization problem. General
descriptionisbasedongivenasetofitems,eachwith
a mass and a value [3]. There is determined the
numberofeachitemtoincludeinacollectionsothat
the total weight is less than or equal to a given limit
andthetotalvalueisaslargeaspossible(accordingto
(1)).Theknapsackproblemhasmanymodifiedforms,
i.e.toformofthe01knapsackproblem.Inthiswayis
formulated as multiobjective optimization
problem[3].
Generalassumptionabouta01knapsackproblem
Figure4.Theexemplaryschemeofroadinfrastructure.
is it consists of a set of items, weight and profit
associated with each item, and an upper bound for
Our main goal is to choose the minimal spanning thecapacityoftheknapsack.Wewantfindasubsetof
tree and minimal independent domination set, i.e. items which maximizes the profits and all selected
findinganindependentdominationnumber. itemsfitintotheknapsack,i.e.,thetotalweightdoes
According the Kruskals Algorithm, the minimal notexceedthegivencapacity[23].
spanningtreeisgiveninFigure5asthesetofdouble Afterassuminganarbitrarynumberofknapsacks,
edges. the singleobjective problem is extended directly to
themultiobjectivecase.Formally,themultiobjective
01knapsackproblemcanbedefinedinthefollowing
way[23]:
Given a set of m items and a set of n
knapsacks,with
pi , j profitofitem j accordingtoknapsack i ,
wi , j weightofitem j accordingtoknapsack i ,
c i capacityofknapsack i ,
findavector x x1 , x 2 , , x m 0,1 , suchthat
m
m
i {1, 2,..., n} : w i,j x j c i (6)
Figure5.Minimalspanningtree(KruskalsAlgortihm) j1
576
shown in [3] it can be very useful tool for multi Definition14
objectiveoptimizationoftransportationsystems.
The value of flow f uv
isthesourceof Gst .
v:( s , v ) A
f sv , where s
ce f e ;
3 Each edge e (v, u ) of Gst is with capacity
f
fe .
Furthermore c p min{cuv : (u , v)f p}
f f
is
residualcapacityofpathpinnetwork Gst .
According to above definitions, the algorithm of
finding the maximal flow in network is given as
follows[13],[17].
Algorithm5(FordFulkerson)
Foreachedge e (u , v ) do
Begin
f uv =0
Figure7.Theexemplarydirectedgraph G . f vu =0
End
ThemainreasonforthecreationofthisSubsection Whileexistspath p from s do t in Gstf do
is fact that transportation engineers need know the Begin
c p min{cuv : (u , v) p}
f f
trafficflowtheoryasatoolthathelpsunderstandand
express the problems of evaluating the capacity of Foreach e (u , v ) p do
existing roadways or designing new ones. Thus, the begin
f
followingdefinitionsareimportant[17]. f uv = fuv + c p
f vu = fuv
End
Definition11 End
Let Gst (V , A, s, t ) be a network with Returnf.
s, t A being the source and the sink of Gst Based on algorithm 5, the exemplary residual
respectively. networkisproposedinFigure8.
Definition12
The capacity of an edge of network Gst is
mapping c : A R , which represents the
maximum amount of flow that can pass through an
edge.Itisdenotedas cuv , where u , v A.
Definition13
A flow in network Gst is mapping
f uv : A R , where u , v A, whichsubjectstothe
followingtwoconstrains:
1 f uv cuv , (capacity constraint: the flow of
( u , v ) A
anedgecannotexceeditscapacity)
2
vV \{ s , t }
of
f u:( u , v ) A f vu , (conservation
u :( u , v ) A uv
flows: the sum of the flows entering a node
must equal the sum of the flows exiting a node,
exceptforthesourceandthesinknodes).
Figure8. Exemplary original and residual network, where
s:=1,t:=6.
577
4 CONCLUSION [9]Koowrocki, K. (2004). Reliability of Large Systems.
Elsevier, Amsterdam Boston Heidelberg London
NewYorkOxfordParisSanDiegoSanFrancisco
Inthepaper,theconceptofcriticalinfrastructureshas
SingaporeSydneyTokyo.
been presented. Some review and classifications of [10]Koowrocki, K. & Soszyska, J. (2010). Optimization of
wellknown information about optimization, graph complextechnicalsystemsoperationprocesses.Maintenance
theoryandnetworkflowtheoryhavebeendone.The Problems,No1,3140,Radom.
SPEA algorithm has been described stepbystep and [11]Koowrocki,K.&SoszyskaBudny,J.(2011).Reliability
the knapsack problem with its binary modification and Safety of Complex Technical Systems and Processes,
has been presented. It has also been used the SPEA Modeling Identification Prediction Optimization,
algorithm to solve the 01 knapsack problem. SpringerVerlag.
Furthermore,theselecteddefinitions,parametersand [12]Koowrocki, K. SoszyskaBudny, J. (2013). Reliability
algorithmsofgraphtheoryhavebeenintroducedand predictionandoptimizationofcomplextechnicalsystemswith
applied to system transportation analysis. As the application in port transport. Journal of Polish Safety and
Reliability Association, Summer Safety and Relibility
example of possible application, the road Seminars SSARS 2013, Volume 3, Number 12, 263
transportation system with the shortest time of red 279,GdaskSopot.
light in nodes and the shortest kilometers have been [13]Leeuwen,Van,J.(1986).GraphAlgorithms.Book.
determined. The examples, from Section 3, are only [14]Marie, S. & Courteille, E. (2009) MultiObjective
showing potential applications of methods, Optimization of Motor Vessel Route. TransNav, The
algorithms and parameters, which are described in International Journal on Marine Navigation and Safety
thearticle. ofSeaTransportation,Vol.3,No.2,133141,Gdynia.
[15]Martello, S. & Toth, P. (1990). Knapsack Problems:
Algorithms and Computer Implementations. Chichester,
U.K.:Wiley.
REFERENCES [16]MingHua, L., JungFa, T. and ChianSon Y. (2012), A
Review of Deterministic Optimization Methods in
Engineering and Management, Mathematical Problems in
[1]COMMISSION OF THE EUROPEAN COMMUNITIES Engineering,Volume2012.
(2006), Communication from the Commission on a [17]Newell, G. F. (1980). Traffic flow on transportation
European Programme for Critical Infrastructure networks. MIT Press Series in transportation studies,
Protection,Brussels. Monograph5.
[2]Cormen, T. H. & al. (2009). Introduction to Algorithms, [18]Parekh, A. K. (1991). Analysis of Greedy Heuristic for
Third Edition. MIT Press, ISBN 0262033844. Section Finding Small Dominating Sets in Graphs. Information
23.2:ThealgorithmsofKruskalandPrim,pp.631638. ProcessingLetters,Volume39,Issue5,pp.237240.
[3]Guze,S.(2014).Applicationoftheknapsackproblemto [19]Ruan, L. & al., (2004). A greedy approximation for
reliability multicriteria optimization. Journal of Polish minimum connected dominating sets. Theoretical
Safety and Reliability Association, Summer Safety and ComputerScience,Volume329,Issues13,pp325330.
ReliabilitySeminars,Vol.5,No1,pp.8590. [20]Sun,W.andYuan,Y.X.(2006).Optimizationtheoryand
[4]Guze, S. (2014). The graph theory approach to analyze methods:nonlinearprogramming.SpringerVerlag.
criticalinfrastructuresoftransportationsystems.Journal [21]Szapczyska, J. (2013). Multicriteria Evolutionary
of Polish Safety and Reliability Association, Summer Safety Weather Routing Algorithm in Practice. TransNav, the
andReliabilitySeminars,Vol.5,No2,pp.5762. International Journal on Marine Navigation and Safety
[5]Guze, S. Smolarek, L. (2011). Methods for risk minimizing ofSeaTransportation,Vol.7,No.1,6165,Gdynia.
intheprocessofdecisionmakingunderuncertainty.Journal [22]Venter, G. (2010). Review of Optimization Techniques,
ofPolishSafetyandReliabilityAssociationJPSRA,Vol. Encyclopedia of Aerospace Engineering, John Willey and
2,Number1,123128,GdaskSopot. Sons,Ltd.
[6]Harary, F. (1969). Graph Theory. AddisonWesley, [23]Zitzler,E.&Thiele,L.(1999).MultiobjectiveEvolutionary
Reading. Algorithms: A Comparative Case Study and the Strength
[7]Haynes T. W., Hedetniemi, S., Slater, P. (1988). Pareto Approach. IEEE Transactions on Evolutionary
FundamentalsofDominationinGraphs.CRCPress. Computation,VOL.3,NO.4.,257271.
[8]Koowrocki, K. (2013). Safety of critical infrastructures.
JournalofPolishSafetyandReliabilityAssociation,Summer
SafetyandReliabilitySeminars,Vol.4,No.1,pp.5174.
578