Next Article in Journal
Environmental Impact of Burning Composite Materials Used in Aircraft Construction on the Air
Next Article in Special Issue
Understanding the Resilience of Different Farming Strategies in Coping with Geo-Hazards: A Case Study in Chongqing, China
Previous Article in Journal
Factors Influencing Unintended Pregnancies amongst Adolescent Girls and Young Women in Cambodia
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Risk-Averse Shelter Location and Evacuation Routing Assignment Problem in an Uncertain Environment

1
School of Economics & Management, Tongji University, Shanghai 200092, China
2
School of Business Planning, Chongqing Technology and Business University, Chongqing 400067, China
3
Department of Geographical Sciences, University of Maryland, College Park, MD 20742, USA
*
Author to whom correspondence should be addressed.
Int. J. Environ. Res. Public Health 2019, 16(20), 4007; https://0-doi-org.brum.beds.ac.uk/10.3390/ijerph16204007
Submission received: 5 September 2019 / Revised: 11 October 2019 / Accepted: 16 October 2019 / Published: 19 October 2019
(This article belongs to the Special Issue Managing Disaster Risk in a Changing World)

Abstract

:
Disasters such as hurricanes, earthquakes and floods continue to have devastating socioeconomic impacts and endanger millions of lives. Shelters are safe zones that protect victims from possible damage, and evacuation routes are the paths from disaster zones toward shelter areas. To enable the timely evacuation of disaster zones, decisions regarding shelter location and routing assignment (i.e., traffic assignment) should be considered simultaneously. In this work, we propose a risk-averse stochastic programming model with a chance constraint that takes into account the uncertainty in the demand of disaster sites while minimizing the total evacuation time. The total evacuation time reflects the efficacy of emergency management from a system optimal (SO) perspective. A conditional value-at-risk (CVaR) is incorporated into the objective function to account for risk measures in the presence of uncertain post-disaster demand. We resolve the non-linear travel time function of traffic flow by employing a second-order cone programming (SOCP) approach and linearizing the non-linear chance constraints into a new mixed-integer linear programming (MILP) reformulation so that the problem can be directly solved by state-of-the-art optimization solvers. We illustrate the application of our model using two case studies. The first case study is used to demonstrate the difference between a risk-neutral model and our proposed model. An extensive computational study provides practical insight into the proposed modeling approach using another case study concerning the Black Saturday bushfire in Australia.

1. Introduction

Whether they are natural or man-made, disasters such as hurricanes, earthquakes and terrorist attacks inflict serious risk on humankind. In 2010, the Haitian government reported that that an estimated 316,000 people had died, 300,000 had been injured and 1,000,000 were homeless as a result of the Haiti earthquake. This caused a massive level of devastation and imposed enormous operational challenges on the humanitarian agencies and government. Scientific and reasonable shelter assignment and evacuation routing planning are two important safeguards to minimize the loss from disasters.
Different types of disasters require different types of shelter assignments and evacuation planning. For example, earthquakes require emergency evacuation while typhoons allow early evacuation. By means of modern information technology, the relevant government department can analyze and forecast the path and intensity of a typhoon, which can give people sufficient time to evacuate. However, scientists cannot yet calculate when there will be a major earthquake. When an earthquake comes, many people need to evacuate immediately. To promote the efficiency of disasters rescue and reduce life and economic losses, shelter location is significant to the reasonable planning at the pre-disaster phase and evacuation plans are carried out relying upon the information gained (e.g., earthquake magnitude, volcanic eruptive intensity, fire dangerous grade, etc.) when disasters happen. Topics regarding shelter or evacuation, important aspects of disaster relief, have been frequently considered by researchers, and have appeared in emergency supply planning [1,2], shelter location problems [3,4,5], emergency evacuation planning problems [4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26] and shelter location and evacuation routing assignment problems [4,5,8,9,10,11,12,16,27,28].
Shelter location and evacuation routing operations rely on the boundary between disaster preparedness and disaster response. In line with the framework proposed by [4], we assume that shelter location and evacuation routing assignments are disaster response operations.
A shelter is a safe facility that protects people from possible damaging effects of a disaster. It can provide people with necessary living conditions (e.g., food, water, medicine, etc.). People usually start leaving their own houses to seek shelters with a sense of panic when they either face or are experiencing dangerous circumstances. Under those circumstances, people may choose the same path to the shelters. This will reduce the traffic capacity of those roads and delay the time taken to reach the shelter. In addition, space within shelters is limited. Overcrowded shelters cause people who may arrive later to seek a new one. This will further aggravate the condition of people who were wounded by the disaster.
The existing evacuation planning and management models are mostly based on traffic assignment models [29], such as the user equilibrium (UE), the system optimal (SO) and the nearest allocation (NA) approaches. Recently, the Constrained System Optimal (CSO) model [4,5] was developed to provide a compromise between the SO and UE/NA approaches. The UE approach assumes that the evacuees act selfishly and have full information about the traffic conditions on every possible route in the evacuation network. Based on these assumptions, in the UE model, every evacuee can find the optimal route to their destination using an objective function of minimizing their travel time. Clearly, the perfect information assumption in the UE approach is strong and may not be valid in the case of a natural disaster, as the real traffic demand is unusual, and it is difficult for evacuees to guess the congestion level on a path. In the NA model, each evacuee uses the shortest path to reach the nearest open shelter sites, whereas this short-sighted assignment will lead to a poor system performance.
The main goal of evacuation agencies and the governments, however, is to avoid congestion and enable the evacuation of the disaster area in a timely manner. This can be achieved through effective planning strategies, the SO model, which distributes traffic over the road network, and shelter assignment. In the SO model, evacuees are assigned to designated safety and evacuation routes as soon as possible to minimize the total evacuation time. The SO solution may not favor the preferences of some evacuees to the benefit of the other evacuees. For example, some evacuees may be allocated to shelters much further away than they would like to go or to routes much longer than they would normally take.
In this article, we focus on emergency evacuation planning operations for a disaster response, which consists of shelter location decisions and evacuation routing assignments in an SO fashion. In this work, evacuation demand is an uncertain parameter, as shelter location decisions should be made before disasters happen. Contrary to the general expectation-based (i.e., risk-neutral) stochastic model, a risk-averse version that incorporates a risk measure called Conditional Value-at-Risk (CVaR) is established to capture the random parameters to minimize the total evacuation time and associated risk. Considering the utilization balance among shelters in uncertain contexts, on the other hand, chance constraints are introduced to ensure that the utilization level of shelters is not less than a threshold within a given level of reliability.
To summarize, the contribution of the present work is four-fold:
(i)
A two-stage stochastic programming shelter location and evacuation routing assignment (SLERA) model with a chance constraint is developed, in which the demand for evacuees is regarded as random. In the first stage, location decisions are made following some possible demand scenarios. The second-stage decision considers specific evacuation routing assignments concerning available shelters as the actual realization of demand.
(ii)
Considering the uncertainty of the demand, a risk measure (CVaR) is introduced into the stochastic model to balance the expectations related to the total evacuation time and inherent risk.
(iii)
To handle the non-linearity objective function of the traffic flow, a second-order cone programming (SOCP) approach is used.
(iv)
Extensive numerical experiments are carried out to provide practical insight into the proposed modeling approach.
The remainder of this work is organized as follows: Section 2 reviews some related work on emergency management, especially related to the disaster response, such as shelter locations and evacuation routing. Expectation-based and risk-averse mathematical models for the SLERA problem are given in Section 3. The solution approach is detailed in Section 4. We present the computational results of the case study in Section 5. Finally, Section 6 concludes this work and indicates some future research directions.

2. Literature Review

In this section, we provide a brief introduction to the existing literature, including evacuation planning, shelter location, and an integrated approach of both. Table 1 gives an overview of these works.

2.1. Emergency Evacuation Planning Problem

In contrast to conventional emergency evacuation plans that often assign evacuees to fixed routes or shelters, Han et al. [6] proposed a static model that decides on the shelter and route assignment simultaneously by not constraining evacuees to pre-specified shelter sites to ensure the quality of plans while roads are disturbed. In [18], optimal evacuation destination, traffic assignment, and evacuation departure schedule decisions were integrated into a unified optimal traffic flow optimization model.
To represent the time-varying characteristics of the evacuation traffic conditions, dynamic network flow models were employed in the evacuation planning problem [17,20,30]. Specifically, Lim et al. [20] presented a capacity-constrained network flow optimization approach for finding evacuation paths, flows and schedules to maximize the total number of evacuees for short notice evacuation planning against hurricanes. In [17], a conflict-based path-generation approach was proposed for the evacuation planning problem by decomposing the problem into a master and a sub-problem. The sub-problem generates new evacuation paths for each evacuate area, while the master problem optimizes the flow of evacuees and produces an evacuation plan. In [15], the demand management strategies of aggregate-level staging and routing were studied in an attempt to manage large regional evacuations against disaster events by reducing or eliminating congestion in the evacuation network. In [22], the dynamic resource allocation problem was addressed for transportation evacuation planning on large scale networks. In a system optimal dynamic traffic assignment problem, Tuydes-Yaman and Ziliaskopoulos [23] focused on modeling demand management strategies regarding to the optimal departure time, optimal destination choice and optimal evacuation zone scheduling (also known as staggered evacuation) under a given fixed evacuation time assumption.
Most existing evacuation planning problems (i.e., traffic assignment problems) assume that the input parameters, such as evacuation demand and capacity, are deterministic. Notably, some works have accounted for uncertainties in parameters under stochastic settings such as stochastic programming [7], robust optimization [19,24] and chance constraint programming [30,31].

2.2. Shelter Site Location Problem

Recently, Mostajabdaveh et al. [14] studied a stochastic scenario-based problem involving the determination of a set of shelter locations in the preparedness stage for natural disasters, which takes into consideration the equity quantified by Gini’s Mean Absolute Difference (called Gini index) under uncertainty. For large-scale problems, a genetic algorithm to solve the sub-problem by mixed-integer programming was proposed.
Motivated by the realization that shelters are shared facilities between the source (relief supply) and demand sides, designing a strategic preparedness network consisting of the evacuation source, shelters and distribution centers [1] naturally integrates the evacuation and relief distribution problem at the strategic and tactical levels simultaneously. Their formulation can make strategic and tactical decisions at the same time before a foreseen disaster, such as a hurricane reaches the area. A benders decomposition approach is used because of the complexity of the integrated model.

2.3. Shelter Location and Evacuation Routing Assignment Problem

Within the emergency management context, the shelter location and evacuation routing problems have been studied by numerous optimization researchers, either in a separate or integrated fashion. Bi-level programming, in which shelter location decisions and route assignments are given at the upper and low levels respectively, is one of the most common approaches to address the above two problems separately in the early period [9,10,16,27,28].
Specifically, Kongsomsaksakul et al. [27] studied an optimal shelter location problem for flood evacuation planning with the assumption that the planning authority can control the traffic in certain parts of the evacuation network comprising the evacuation routes of evacuees. Bi-level programming was deployed to model this problem, where the upper lever minimized the total evacuation time and the evacuees’ decisions (e.g., shelter assignment) at the lower level were formulated by a combined distribution and assignment model in line with the shelter location information of the upper level. Similarly, Ng and Waller [16] developed a hybrid bi-level model solved using a simulated annealing algorithm to balance the optimal system and individual components, where the shelter assignment is made first in a system optimal manner and then evacuees are free to choose the optimal route to reach their assigned shelter. Furthermore, bi-level programming was extended to a stochastic context by [10,28] in which a scenario-based shelter location model was proposed to identify a set of robust shelter locations during hurricane events. In [10], user equilibrium-based traffic dynamics were incorporated into the optimization of shelter locations under uncertainty to identify a set of robust shelter locations. The objective of the upper level was to minimize the weighted sum of the expected unmet shelter demand and the expected total travel time of network users. By confining the uncertain demand to an uncertainty set, Kulshrestha et al. [9] presented a robust optimization approach for both shelter location and capacity decisions under demand uncertainty and their proposed model was formulated as a mathematical program with complementarity constraints and was solved using a cutting-plane algorithm.
In order to balance different performance criteria or take into account diverse interest stakeholders, multi-objective models are always formulated [8,11,12,32,33]. A multi-objective shelter location and evacuation routing for an urban evacuation planning problem was proposed by [32], in which primary and secondary routes for evacuees are identified simultaneously. These optimization approaches are embedded into a Geographic Information System-based decision support system so planners can access them via the Internet. In [8], a three-stage multi-objective programming model was used to design a centralized emergency supply network for emergency logistics operations. A shelter network for evacuation was designed in the first-stage phase with a minimized total travel distance.
In contrast to the separate optimization method, the integrated shelter location and evacuation routing problems have received recent attention [4,5,11,12,33,34]. In the realm of emergency evacuation planning under urban area circumstances, multi-criteria optimization models were developed in [11,33]. In particular, Coutinho-Rodrigues et al. [33] introduced a multi-objective location-routing model based on the work proposed by [32] to identify the locations of shelters and evacuation paths for urban evacuation planning. The factors considered in this model are six-fold and include the total travel distance, evacuee risk, total evacuation time, and so on. This model was tested for a simulated fire situation and solved by an off-the-shelf optimization solver. In [11], a comprehensive optimization model based on the multiple commodities flow problem using public and private transport was presented to address the location and routing problems simultaneously. A genetic algorithm based on nondominated sorting genetic algorithm-II (NSGA-II) was designed to solve the multi-objective mixed-integer program, in which the authors modeled the dynamic aspects of an evacuation process and took into account the total evacuation time, risk of the evacuees, and number of shelters to be opened simultaneously. In [4,5], a non-linear mixed-integer model was presented for vehicle-evacuation toward shelter destinations, in which a constrained system optimization (CSO) methodology was introduced to guarantee a level of tolerance so that evacuees are willing to accept the travel routes, even though the assigned routes to shelters are not the shortest ones. The objective of the problem was to minimize the total evacuation time of the entire system, which was modeled through a non-linear function of traffic flow. To handle the non-convex effects of the non-linear objective function, a second-order cone programming (SOCP) method was deployed by transferring the non-linear part of the objective function to a constraint.
Furthermore, Bayram and Yaman [4] extended the CSO shelter location and routing assignment problem based on [5] to a scenario-based stochastic case where the evacuation demand and the potential alterations to the network infrastructure are uncertain before a disaster occurred. The benders decomposition algorithm with diverse cut strategies and the cutting plane algorithm was developed to deal with large-scale problems. In [34], the Turkish Red Crescent (TRC) approach, which is used to address the temporary shelter location and self-evacuation problem, was improved by developing a mathematical model to select the best shelter area locations from a set of criteria. The aim of this model is to determine the best shelter location sites and match evacuation zones to shelter sites while taking into account the utilization of shelters. Focusing on a specific category of support evacuation of late evacuees, in [12], a bi-objective integer programming model was developed to support shelter location and routing decisions during short-notice evacuations. For this model, the support of public authorities is required, and the model is solved by an ϵ -constrained algorithm with two conflicting objectives: maximizing the number of evacuees and minimizing the utilization of resources.

3. Problem Description and Model Formulation

The aim of our emergency evacuation planning problem is to decide the location of S shelters among the potential sites at the tactical level and the routing assignment of evacuees from stricken regions to safe destinations operationally so that the disaster areas are evacuated as quickly as possible. In this work, we focus on evacuation with private vehicles (i.e., car-based evacuation). Figure 1 illustrates the evacuation network. The objective of our problem is to minimize the total evacuation time on all road segments.
Before introducing the mathematical model of the SLERA problem, we first detail how to model the travel time. It is generally known that there is a positive and monotonically increasing relationship between travel time and traffic flow, as a large traffic volume will lead to congestion and increase the travel time on roads. Getting a reasonable estimate of the entire evacuation time is the main reason for modeling traffic time on road segments in accordance with corresponding traffic flows. In the literature, there are different functional forms that model the relationship between travel time and traffic flow on a road segment. In particular, the U.S. Bureau of Public Roads (BPR) function has been extensively adopted in evacuation models to estimate the traffic times, for example, in [4,5]. Thus, the BPR function is applied in this work as well. In BPR function, the travel time t is not constant, as the level of congestion has an impact on the travel speed of vehicles, especially during disaster evacuation. According to [5], travel time t ( x ) is a monotonically increasing function of the traffic flow x. The relationship between travel time and traffic flow is formulated as
t ( x ) = t 0 1 + γ x c β
where t ( x ) is the travel time when the traffic volume on the road is x, c denotes the maximum flow capacity, t 0 is the free-flow travel time at zero volume. The parameters γ 0 and β 0 are the tuning coefficients, which determine the shape of the function. The exact values of the coefficients are defined in accordance with the road characteristics, and they are generally taken as 0.15 and 1–5, respectively. When higher flows occur on the link, the coefficient β determines the threshold at which the BPR function rises significantly [35]. Considering that the evacuated tool is the same type of vehicle, a reasonable smaller value of β is preferred. So, we use β = 2 in this work.

3.1. Notation

The notation used throughout the paper is summarized as follows.
Sets:
  • I: The set of demand nodes where the population at risk is to be evacuated, indexed by i.
  • J: The set of destination nodes (potential shelter sites) where evacuees reach safety, indexed by j.
  • R: The set of all evacuation routes.
  • R i j : The set of alternative routes from demand point i I to shelter j J , indexed by r.
  • L: The set of all road segments in the evacuation network, indexed by l.
  • R l : The set of routes passing through road l, indexed by r.
  • Ω : The set of possible scenarios in a disaster event, indexed by ω .
Parameters:
  • d i ( ω ) : The population of evacuees at demand node i I in scenario ω Ω .
  • p ( ω ) : The probability of scenario ω Ω .
  • c l : The capacity of road segment l L .
  • b j : The capacity of shelter j J .
  • S: The number of possible shelters.
  • t l 0 : The free-flow travel time of road l L in zero traffic.
  • θ : The utilization rate of shelters, where θ [ 0 , 1 ] .
  • ϵ : A small value greater than 0.
Variables:
  • y j : = 1, if a shelter is located/opened at alternative shelter site j J ; = 0, otherwise.
  • x i j r ( ω ) : the number of individuals that evacuate from demand node i I to shelter j J via route r R in scenario ω Ω .
  • f l ( ω ) : the traffic flow on road l L in scenario ω Ω .

3.2. Expectation-Based Model

Based on the above definition and travel time estimation Equation (1), firstly, the mathematical formulation of the expectation-based problem is written as follows:
( M 1 ) min ω Ω p ( ω ) l L t l 0 1 + γ f l ( ω ) c l β f l ( ω )
s.t.
j J y j = S
x i j r ( ω ) d i ( ω ) y j , i I , j J , r R i j , ω Ω
i I r R i j x i j r ( ω ) b j y j , j J , ω Ω
P i I r R i j x i j r ( ω ) θ b j y j 1 ϵ , j J , ω Ω
j J r R i j x i j r ( ω ) = d i ( ω ) , i I , ω Ω
i I j J r R i j R l x i j r ( ω ) = f l ( ω ) , l L , ω Ω
y j { 0 , 1 } , j J
x i j r ( ω ) Z + i I , j J , r R , ω Ω
0 f l ( ω ) , l L , ω Ω .
The objective Function (2) minimizes the expected total evacuation time spent by the evacuees in the network. Constraint (3) limits the number of open shelters to a pre-specified number S. Constraint (4) ensures that evacuees are not assigned to a non-open shelter. Constraint (5) guarantees that the capacity of each opened shelter is not exceeded. The minimum utilization rate of each opened shelter j is constrained by chance Constraint (6), which ensures that the utilization rate is not less than a threshold value θ with a specified high probability of 1 ϵ . Constraint (7) ensures that every evacuee from every origin i is assigned to a shelter and a route leading to that shelter. The set of Constraint (8) computes the traffic flow on every road segment l L . Finally, the domains of the variables are restricted by Constraints (9)–(11).
In M1, the objective criterion is expectation-based (i.e., risk-neutral), and the objective function value entirely depends on the scenario set Ω , which captures the randomness under a finite sample distribution space assumption. The expectation-motivated objective function is reasonable and reliable only if the number of realizations of random demand is large enough. In practice, however, it is difficult to take a large number of scenarios into consideration, due to the restriction of solution techniques. Unavoidably, a case exists where the solutions obtained according to the expectation-based model do not perform well in some extreme demand cases, which does not occur in scenario set Ω . To determine the risk of solutions performing badly in exceptional cases, the introduction of a risk measure method to assess the expectation-based objective value is preferred.

3.3. Risk Measure by CVaR

In this subsection, we briefly introduce the concept of CVaR and present a linear programming formulation of CVaR under the assumption that the distribution space of random variables is finite. We recommend readers to refer to [36,37,38] for more details.
As a modeling method, it should be noted that the expectation-based objective Function (2) only accounts for random scenarios in a finite set Ω . The performance of solutions obtained from given scenarios will not be guaranteed under certain realizations of random parameters. To ensure an efficient emergency response operation in which optimal decisions present relatively good stability even in worst-scenarios, especially in the context of disaster management, authors have applied indicators such as the Mean-Variance [39] and CVaR [38] as risk measures. In particular, CVaR has gradually been adopted in pre-disaster relief network design problems [40], emergency logistics planning problems during disasters [2] and disaster location and allocation problems [41]. In these works, risk measure was adopted to avoid a case where the solutions provided by the risk-neutral model might perform poorly in extreme scenarios (e.g., a very high level of unsatisfied demand under certain realizations of random data).
We firstly introduce the concept of the mean-risk model in relation to general two-stage stochastic programming model considering risk aversion. Then, we present the risk measure definition and the risk-averse model, and finally, we conclude this subsection with a linear representation of the risk measure.
( Ω , F , P ) denotes an abstract probability space, in which Ω is the sample space, F is a σ -algebra on Ω , and P is a probability measure on Ω . In the general risk-neutral two-stage stochastic model, (i.e., expectation-based), the sample space Ω is taken as a finite probability distribution where Ω = { ω 1 , , ω N } . Then, the common expression form of the expectation-based stochastic linear programming problem is written as
min x X E ( f ( x , ω ) ) = min x X c T x + E ( Q ( x , ξ ( ω ) ) )
where f ( x , ω ) = c T x + Q ( x , ξ ( ω ) ) is the total cost function of the first-stage problem and Q x , ξ ( ω ) is the optimal value of the second-stage problem (also known as the recourse function), which is formulated as
Q x , ξ ( ω ) = min y ( ξ ) { q ( ξ ) T y ( ξ ) : T ( ξ ) x + W ( ξ ) y ( ξ ) = h ( ξ ) , y ( ξ ) 0 } .
In the above-mentioned problem, “ x ” is the first-stage decision variable vector (also referred to as a here-and-now decision), such as the location decision variables in this work, which is made before the realization of the actual random parameter ξ ( ω ) for the elementary event ω Ω ; “ y ” is the second-stage variable vector, like the routing assignment variables, that occurs after a realization of ξ ( ω ) has been identified. Indeed, this risk-neutral approach that optimizes the cost c T x of the first-stage decision plus the expected cost of the recourse function does not take the risk element into account. The mean-risk model is one of the classical approaches to incorporate the risk measure into a general two-stage stochastic programming model while simultaneously minimizing the risk function. The risk-neutral two-stage framework can be extended to the risk-averse mean-risk version formulated below:
min x X ( 1 λ ) E [ f ( x , ω ) ] + λ CVaR α ( f ( x , ω ) )
where λ is a non-negative trade-off coefficient representing the exchange rate between the mean value and risk, called the risk coefficient or risk level. Specially, the objective Function (14) is risk-neutral when λ = 0 . For the random variable f ( x , ω ) , CVaR α denotes the conditional value-at-risk of f ( x , ω ) at a given confidence level α . The mean-risk model minimizes both the expected cost E ( · ) and risk measure function CVaR α ( · ) . The relevant definitions of the risk measure CVaR are presented as follows:
Definition 1.
Let F Z ( · ) represent the cumulative distribution function of a random variable Z. According to [36], the value-at-risk (VaR) at a given confidence level α, denoted by VaR α ( Z ) , is defined as
V a R α ( Z ) = inf η R { F Z ( η ) α }
where α ( 0 , 1 ] .
The conditional value-at-risk at a given confidence level α is related to the expectation of Z under the condition that it exceeds the α -quantile threshold. Its definition is formulated as
CVaR α ( Z ) = E ( Z | Z V a R α ( Z ) ) .
CVaR can capture a wide range of risk preferences by altering another risk coefficient α , in particular, the risk-neutral case ( α = 0 ) and the pessimistic worst-case for a sufficiently large value of α 1 . Z is a random variable that obeys a discretion distribution with finite realizations { z 1 , , z N } and corresponding probabilities { p 1 , , p N } . An alternative definition of CVaR α ( Z ) , which gives a linearization description of CVaR, is restated below [36].
Definition 2.
The conditional value-at-risk of random variable Z at the confidence level α is given as
C V a R α ( Z ) = inf η R η + 1 1 α E ( [ Z η ] + )
where [ Z η ] + : = max { 0 , Z η } and α ( 0 , 1 ] . By means of linearizing the term ( [ Z η ] + ) in Equation (17), the conditional value-at-risk of random variable Z at the confidence level α can be rewritten as
C V a R α ( Z ) = inf η R η + 1 1 α E ( v )
= min η + 1 1 α n = 1 N p n v n
subject to
z n η v n , n = 1 , 2 , , N 0 v , n = 1 , 2 , , N η R .

3.4. Risk-Averse Model

Given the definition of risk measure, a mathematical formulation of the stochastic version considering risk measures can be represented as follows. This is based on model M1 and Equations (14) and (18)–(20):
( M 2 ) min ( 1 λ ) ω Ω p ( ω ) l L t l 0 1 + γ f l ( ω ) c l β f l ( ω ) + λ η + 1 1 α ω Ω p ( ω ) v ( ω )
subject to
constraints (3)–(11)
l L t l 0 1 + γ f l ( ω ) c l β f l ( ω ) η v ( ω ) , ω Ω
0 v ( ω ) , ω Ω
η R .
In this risk-averse model, smaller values of the risk measure part are preferred, as this indicates the corresponding risk value of the solution’s performance loss in exceptional demand cases. λ and α are two important coefficients that are used to tune the risk preferences for decision makers or the uncertainty level of the decision environment. However, we cannot directly solve this risk-averse stochastic model, because the objection function contains a cubic item f l β + 1 ( ω ) , which is a nonlinear objective function. Heuristic techniques or the piecewise linear approximation method are frequently used to handle related nonlinear objective functions occurring in mixed-integer programming (MIP) models. Recently, motivated by the advances in second-order cone programming (SOCP), the nonlinear MIP models were reformulated as corresponding second-order conic mixed-integer programs and then directly solved by off-the-shelf solvers (e.g., CPLEX, Gurobi). In the following section, we describe the SOCP solution approach to problems with the nonlinear objective function.

4. Solution Approach

In this section, we first give a brief review of second-order cone programming and provide the mixed-integer SOCP formulation of our model. Then, a sample average approximation of the uncertain problem as well as the sample based mixed-integer linear programming (MILP) reformulation of the non-convex chance constraint are presented.

4.1. Second-Order Cone Programming Approach

Conic optimization refers to the optimization of a linear function over conic inequalities. With the large number of practical applications and efficient algorithms (e.g., interior algorithms), SOCP has become a state-of-the-art technique used in commercial solvers such as CPLEX. With the availability of commercial solvers, conic integer models have recently started to be used in airline scheduling problem applications [42] and emergency response planning for disasters [4,5].
By employing SOCP, the nonlinearity in the objective function is transferred to the constraint set in the form of second-order quadratic constraints. One of the common uses of conic quadratic inequalities is to represent a hyperbolic inequality, as in the form of Equation (25) (please refer to [43] for more details):
u 2 v 1 v 2 , u , v 1 , v 2 0 .
Then, each hyperbolic inequality can easily be transformed into a second-order cone inequality, as follows:
2 u , v 1 v 2 v 1 + v 2 .
Here, | | · | | denotes the Euclidean norm.
In our work, we define an auxiliary variable π l for each l L , and the expectation part of the objective function becomes
( 1 λ ) ω Ω l L p ( ω ) t l 0 f l ( ω ) + t l 0 γ c l β π l ( ω ) .
The road characteristic coefficient β is generally adopted in a range [1, 5], which is explained in Equation (1). In this work, β = 2 is adopted to represent f l 3 ( ω ) π l ( ω ) with hyperbolic inequalities of the form
f l 2 ( ω ) m l ( ω ) h l ( ω ) , l L , ω Ω
m l 2 ( ω ) π l ( ω ) f l ( ω ) , l L , ω Ω
h l = 1 , m l ( ω ) , π l ( ω ) , f l ( ω ) 0 , l L , ω Ω
where m l , π l , μ l are auxiliary variables that are used to define hyperbolic inequalities. These hyperbolic inequalities are represented by their respective quadratic cone constraints:
2 f l ( ω ) , m l ( ω ) h l ( ω ) m l ( ω ) + h l ( ω ) , l L , ω Ω
2 m l ( ω ) , π l ( ω ) f l ( ω ) π l ( ω ) + f l ( ω ) , l L , ω Ω
h l ( ω ) = 1 , m l ( ω ) , π l ( ω ) , f l ( ω ) 0 , l L , ω Ω .
Despite the problem still being a nonlinear programming problem in which the nonlinearity element is transferred to the constraint set, it can be solved efficiently when represented as a SOCP. Note that SOCP problems are solved with the barrier algorithm in CPLEX. The resulting conic problem with SOCP constraints is given below:
( M 3 ) min ( 1 λ ) ω Ω l L p ( ω ) t l 0 f l ( ω ) + t l 0 γ c l β π l ( ω ) + λ η + 1 1 α ω Ω p ( ω ) v ( ω )
s.t.
constraints (3)–(11)
f l 2 ( ω ) + ρ l 2 ( ω ) ϕ l 2 ( ω ) , l L , ω Ω
m l 2 ( ω ) + τ l 2 ( ω ) φ l 2 ( ω ) , l L , ω Ω
2 f l ( ω ) f l ( ω ) = 0 , l L , ω Ω
m l ( ω ) ρ l ( ω ) = 1 , l L , ω Ω
m l ( ω ) ϕ l ( ω ) = 1 , l L , ω Ω
2 m l ( ω ) m l ( ω ) = 0 , l L , ω Ω
π l ( ω ) f l ( ω ) τ l ( ω ) = 0 , l L , ω Ω
π l ( ω ) + f l ( ω ) φ l ( ω ) = 0 , l L , ω Ω
l L t l 0 f l ( ω ) + t l 0 γ c l β π l ( ω ) η v ( ω ) , ω Ω
0 m l ( ω ) , π l ( ω ) , f l ( ω ) , m l ( ω ) , ϕ l ( ω ) , φ l ( ω ) , l L , ω Ω
ρ l ( ω ) , τ l ( ω ) R , l L
0 v ( ω ) , ω Ω
η R .

4.2. Sample Average Approximate Algorithm and MILP Reformulation of Chance Constraint

The sample average approximate (SAA) algorithm is one of the predominantly used solution methods to tackle random characteristics in stochastic programming. The basic idea of this approach is to replace the original distribution of a random parameter d with a sample Ω of size | Ω | = N , that is, d ( ω ) , ω { 1 , 2 , , N } , where N is much smaller than the real number of scenarios of d . In SAA, Monte Carlo simulation is used to generate scenarios to represent the demand for evacuees. It is assumed that the demand in a disaster zone is a multivariate uniform distribution U( μ , ∑), where μ and ∑ are the mean and covariance matrix of the random parameter, respectively. | Ω | scenarios are generated after the Monte Carlo simulation has been run, and each scenario has the same probability 1 | Ω | .
After the | Ω | scenarios are generated, the expected objective Function (34) is estimated by the sample average Function (48)
min ( 1 λ ) ω Ω l L 1 | Ω | t l 0 f l ( ω ) + t l 0 γ c l β π l ( ω ) + λ η + 1 1 α ω Ω 1 | Ω | v ( ω ) .
On the other hand, in line with [44], the chance Constraint (6) can be estimated by an indicator function 1 | Ω | n = 1 | Ω | I ( 0 , ) i I r R i j x i j r ( ω ) θ b j y j ϵ , which requires a certain percentage of the samples to satisfy the chance constraint, where I ( 0 , ) ( · ) is an indicator function denoted as
I ( 0 , ) ( x ) = 0 , i f x ( 0 , ) ; 1 , i f x ( 0 , ) .
The corresponding problem based on the sample average approximate algorithm (refer to as the SAAP) is formulated as follows:
( S A A P ) min ( 1 λ ) ω Ω l L 1 | Ω | t l 0 f l ( ω ) + t l 0 γ c l β π l ( ω ) + λ η + 1 1 α ω Ω 1 | Ω | v ( ω )
s.t.
constraints (3)–(11), (35)–(47).
1 | Ω | n = 1 | Ω | I ( 0 , ) i I r R i j x i j r ( ω ) θ b j y j ϵ , j J , ω Ω .
Although the chance constraint is converted to a form involving the indicator Function (50) in the SAAP, it is still difficult to be solved directly, as it is not convex. To solve the sample-based chance constraint directly, an equivalent mixed-integer linear programming formulation is deployed to substitute Equation (50) into the SAAP. For a given sample of size | Ω | , auxiliary binary decision variables z ( ω ) , ω Ω are introduced. For each scenario ω , z ( ω ) = 0 if the chance constraint is feasible or z ( ω ) = 1 , otherwise. Additionally, a big constant number “M” is used to model the case when the chance constraint is violated. Therefore, the function of the chance constraint is realized by limiting the sum of binary variable z ( ω ) , ω Ω . Finally, the equivalent expression of the chance Constraint (50) is
θ b j y j i I r R i j x i j r ( ω ) M z ( ω ) , j J , ω Ω
ω = 1 | Ω | z ( ω ) | Ω | ϵ , ω Ω
z ( ω ) { 0 , 1 } , ω Ω .
Then, the ultimate formulation of the SAA problem can be written as follows:
min S A A P
s.t.
constraints (3)–(11), (35)–(47), (51)–(53).

5. Computational Results

In this section, we describe computational experiments that were carried out for two case studies. In the first part of the computational study, we investigate the comparison results with the risk-neutral model to provide insight into our proposed model considering the risk measure. In the second part, we show the effectiveness of the modeling approach and conduct a sensitivity analysis of the risk parameters. In this work, we considered the evacuation pattern as recommended for the movement of victims toward a safe place with the support of vehicles, which should be planned systematically. We coded the proposed model using MATLAB 2018b and solved it using CPLEX solver 12.8 on a DELL PC with a CPU capacity of 4.00 GHz and 32G RAM.

5.1. Instance Data

We solved the risk-averse model with different test networks. The test problems we used were from two sources. The first instance, called Sioux Falls, was inherited from [5], which comes from an online library called the Transportation Network Test Problems. Sioux Falls were downloaded from [45], and this instance was used to provide results comparisons and contrasts with the risk-neutral model in the literature [4]. We focused on the second case that was originally developed by [12] to determine the location and evacuation of a bushfire in Australia. In this case study, the region was represented by a network consisting of 11 nodes and 90 links. The detailed information related to instance cases are presented in Appendix A, and the associated codes can be downloaded from the following link: https://pan.baidu.com/s/1QrG2auqDfCbKepnh8EIWOQ.

5.2. Comparison of the Results between Risk-Averse and Risk-Neutral Models

Sioux Falls comprises 24 nodes and 76 arches. The details of the network are presented in Appendix A, Table A1. In line with [5], we set nine potential shelter sites (i.e., destination nodes) at nodes 2, 6–8, and 16–20, and the other nodes were sites affected by disaster (i.e., origin/demand nodes). So, there were 135 |O-D| pairs in total. For each |O-D| pair, there were many possible evacuation routes. It was difficult to solve this problem as all available routes were taken into account. Therefore, we chose K shortest paths for each |O-D| pair by the Deletion Algorithm [46], which is based on the classical Dijkstra Algorithm. We determined the demand for each origin node randomly between 200 and 600, and we assumed that the maximum traffic flow rate (capacity) of the road segment was 60 vehicles per hour with a free flow speed of 80 km/h in an uninterrupted traffic flow. We considered three types of facility capacity (1000, 2000, and 3000), and the detailed capacity of potential shelter sites was [3000 2000 1000 1000 3000 3000 2000 2000 1000].
In the risk aversion setting, the solution performance under some worst demand scenarios is emphasized so that the obtained solutions are more conservative than those obtained with the risk-neutral setting in the literature [4]. To illustrate this difference, we compared the proposed risk-averse model with the risk-neutral (i.e., expectation based) approach presented in [4]. The experiment setting was S { 3 , 4 , 5 , 6 } and three types of risk coefficients were used to reflect different risk preference levels λ { 0 , 0.1 , 0.5 , 0.9 } . Note that the risk-averse model is transferred into the risk-neutral one when λ = 0 . Firstly, we took | Ω | = 10 as the scenario’s sample size to generate the shelter location decisions for both the risk-averse and risk-neutral models. The corresponding results of the shelter usage rate is reported in Table 2, Table 3 and Table 4. Then, to measure the performance of the obtained solutions in a bigger sample space, we applied the Monte Carlo simulation to generate a bigger sample to test the performance of solutions over a wide range of situations. These simulation results are presented in Table 5. Intuitively, a sound solution not only performs better in a small sample space, but is also guaranteed under general circumstances.
The utilization rate of opened shelters is summarized in Table 2 and Table 3. The column “#shelter” lists the particular opened shelters, and the symbol “-” indicates that the corresponding utilization rate is 0 or the alternative shelter site is not chosen as opened shelter. As shown in Table 2 and Table 3, we can observe that the shelter site with a bigger capacity is preferred when the risk coefficient λ increases such that it exceeds a threshold value. For example, in S = 5 , as the risk parameter λ increases to 0.1, compared with the location decision of the risk-neutral model, shelter #2, which has a capacity of 3000, is more preferred over shelter #6, which has a capacity of 2000. Moreover, in the risk-neutral model, when λ takes a value of 0.5, shelter site #16, which has a capacity of 3000, is chosen as an open shelter to substitute shelter #17 and λ = 0.1 . Turning to the objective values presented in Table 4, the total evacuation time of the risk-averse model is greater than that of the risk-neutral one, and it increases without decreasing as the risk coefficient λ increases. In addition, the time spent on evacuation decreases as the number of open shelters increases. However, based on the effect of S on the total evacuation time, what can be estimated is that establishing one more shelter adds little to the evacuation of the entire system when the available number of safety facilities is greater than 6. On the other hand, as shown in the right part of Table 4, the CVaR of total evacuation time decreases as λ increases. This means that the risk that the obtained solutions will perform poorly under other unexpected scenarios is relatively reduced.
In light of the location decisions of λ = 0.5 and λ = 0.9 being identical, we carried out a simulation of cases of “risk-neutral” and “risk-averse” where λ { 0.1 , 0.5 } . Table 5 presents the simulation results for the total evacuation time under sample sizes of | Ω | { 50 , 100 , 200 } . From Table 5, we can observe that the risk-averse model performed slightly better than the risk-neutral one, as the total evacuation time generated by the simulation of the risk-averse approach was less than that of the risk-neutral approach. This rightly correlates with the results of CVaR for the total evacuation time (TET) shown in Table 4, whereby the solution quality is guaranteed in more general scenarios.

5.3. Effectiveness and Sensitivity Analysis

In this section, we reference the instance of a bushfire event in Australia that was presented in [12] using their network structure. The Shire of Murrindindi, which experienced a series of bushfires on 7 February 2009, Black Saturday, is located approximately 100 km northeast of Melbourne in Victoria, Australia. It covers an area of 3889 km 2 and includes the towns of Alexandra, Buxton, Eildon, Flowerdale, Kinglake, Marysville, Molesworth, Strath Creek, Taggerty, Yarck, and Yea. The study area consists of six main townships which suffer from fire risk: Narbethong i 1 , Marysville i 2 , Taggerty i 3 , Buxton i 4 , Cambarville i 5 , and Rubicon i 6 . In [12], the demand of evacuees was regarded as deterministic, as given in Table 6. Conversely, we assumed that the actual demands in terms of disaster zones were random and independent. We used the deterministic demand reported in Table 6 as the expectation d of uncertain demand.
Five shelters in adjacent townships (destinations) were nominated by Country Fire Authority (CFA): Goughs Bay Fire Station in Alexandra j 1 , a recreation reserve oval in Thornton j 2 , a basketball court in Eildon j 3 , a skate park in Yea j 4 , and a racecourse track in Yarra Glen j 5 . Figure A2 in Appendix A gives the location distribution of these disaster regions and safe destinations. Each shelter has a maximum capacity for evacuees; these capacity values are reported in Table 6. The details of the road segments and road network information are provided in Appendix A, Table A1 and Table A2. We set the capacity for each road segment randomly with a maximum traffic flow rate of 30 vehicles per minute and a free flow speed of 100 km/h. To balance the utilization rates among opened shelters, we set θ = 0.2 , and the reliability level was ϵ = 0.1 . Note that despite a much smaller value of ϵ than 0.1 being desirable, we chose ϵ = 0.1 as a result of the limited solution ability in this work. Specifically, the reliable level ϵ depends on the sample size of | Ω | in the sample-based chance Constraint (50), so the larger | Ω | is, the smaller ϵ can be, for example, ϵ = 0.05 was feasible since the sample size was | Ω | > 20 .

5.3.1. Effectiveness Analysis

To illustrate the validity of our proposed model, it is necessary to compare the output of computation results with real evacuation outcome. However, it is difficult to obtain the real evacuation schemes used in the bushfire disaster event, as the features of evacuation activity were real-time and spontaneous. In general emergency evacuation events, the nearest allocation (NA) fashion is mostly used to assign shelters and corresponding paths to evacuees, as the information on path lengths or free-flow travel time is more accessible to evacuees compared with actual travel times in a disaster [4]. On the other hand, in an emergency or chaotic environment, it is easy for evacuation personnel to self-select the shortest route based on the distance/travel time to reach a safe destination as quick as possible. Therefore, we used the calculation results generated by the NA approach to approximate what happened in real evacuation case and compared the computational results between our model and the NA method to test the validity of our model.
We assumed that demand distribution of origin nodes was uniform with the means given in Table 6, and the distribution interval was [ ( 1 e ) d , ( 1 + e ) d ] where 0 < e < 1 . Taking e { 0.1 , 0.3 , 0.5 } to capture different demand fluctuations, we randomly generated 4 scenarios for each distribution pattern with different numbers of opened shelters S { 2 , 3 , 4 , 5 } . The set of total evacuation times is summarized in Table 7. We can make several observations from the table:
(1)
Our proposed model outperforms the NA approach for real evacuation case, as the total evacuation time in our model is far less than that of the NA. Specifically, the maximum and minimum values of the total evacuation time generated by our model are 233,274 and 63,634, respectively. In contrast, the associated values of the NA method are, respectively, 309,844 and 2,612,969.
(2)
In terms of the number of opened shelters, the total evacuation time of evacuees decreases as the number of available open shelters increases. Moreover, the contribution of adding one more opened shelter to the reduction in evacuation time shows a marginal diminishing trend in our model. Furthermore, the total evacuation time under the NA case conversely increases as the S exceeds 4, which means the open shelters exceed redundancy and a reasonable S exists.
(3)
In regard to the influence of demand fluctuation, we can see that except for scenario #2, the larger e is, the shorter the evacuation time required is.
In order to gain insight into the performance difference, Figure 2 and Figure 3 presents the traffic flow distribution in the evacuation process. Compared with Figure 2 and Figure 3, we can see that the traffic flow in the evacuation paths generated by our model is evenly distributed, and the upper bound of flow in each road segment is less than 250. However, in the traffic flow distribution of NA, road segments 2, 6, 10, 12, and 17 are the main converging roads to safe destinations and road segments 27–42 are idle. Certainly, compared with Figure 2, the probability and severity of traffic congestion in the real evacuation case on road segments 2, 6, 10, 12, and 17 is large, as the traffic flow exceeds the road capacity. The unbalanced distribution of traffic flow directly results in poor system efficiency during emergency evacuations.

5.3.2. The Impact of Risk Coefficients on CVaR and the Total Evacuation Time

In the risk-averse shelter location and routing assignment problem, the parameter λ and the confidence level α are two key coefficients related to shelter location decisions and emergency evacuation planning. For example, a higher λ indicates that more emphasis is placed on the risk part and the corresponding decisions tend to be more conservative to avoid cases of extreme demand. In this part of the computational study, we analyzed the results based on the bushfire evacuation problem with | Ω | = 10 and the risk parameters λ { 0.1 , 0.2 , 0.3 , 0.4 , 0.5 , 0.6 , 0.7 , 0.8 , 0.9 } , α = {0.6, 0.7, 0.8, 0.9, 0.95, 0.99} under different numbers of available shelters S = { 1 , 2 , 3 , 4 , 5 } . We assumed that the uncertain demand of evacuees is a uniform distribution of [ ( 1 e ) d , ( 1 + e ) d ] , where e = 0.3 .
Table 8 and Table 9 report the impacts of risk parameters on the expected total evacuation time and CVaR. Figure 4 and Figure 5 give graphic illustrations of the impacts of λ on the trade-off between the expected total evacuation time ( T E T ) and the associated CVaR under different available shelter cases. Figure 6 and Figure 7 show the impacts of the confidence level α on the risk and objective function value. Figure 8 represents an efficient frontier of risk and expectation.
In the risk-averse model, higher values of λ and α indicate a more conservative decision preference and suggest that more attention should be paid to some extreme realizations of uncertain demand to avoid loss of performance in the solutions. Thus, increasing risk parameter λ brings about more weight to the risk measure value (i.e., CVaR) of the total evacuation time at the expense of increasing the expected T E T . As shown in Figure 4 and Figure 5 (as well as Table 8 and Table 9), the CVaR of T E T decreases and gradually converges to a fixed value as λ increases, while the expectation of T E T increases. These increments, shown in Figure 5 and Table 8, become more pronounced when the number of opened shelters S is small, such as S 3 . In addition, we can also observe that the graphs of the expected T E T and corresponding CVaR of larger S values are always below those of the smaller S values, which implies that improvements in CVaR, and thus the level of compromise from the expectation, increase with S. Besides, it is obvious that increasing the number of opened shelters will not promote a significant decrease in the total evacuation time once S is greater than 3. In contrast, it is resource-wasteful.
Turning to Figure 6, we can observe that a higher α value leads to a greater CVaR, which illustrates that CVaR is a non-decreasing function of α . Similarly, the same relationship is valid for the objective function value graphs in Figure 7. This consequence can be explained by the definition of CVaR in which a smaller confidence level α indicates a worse realization. According to both figures, we can say that the influence of the risk coefficient λ becomes more significant as larger α values are given. Figure 6 and Figure 7 further confirm that the contribution to improving the emergency evacuation effect of simply increasing the number of shelters is small when S exceeds 4.
Furthermore, to facilitate the decision makers who are seeking to reach the right balance between expectation of T E T and accompanying risk, Figure 8 lists solutions to the expected T E T and corresponding risk with different S values when α = 0.95 . As shown in Figure 8, along with the left tails of curves (starting from smaller λ values), the CVaR of T E T decreases significantly at the cost of increasing the expected T E T . On the other hand, it is obvious that the right tails of these curves tend to be flat. This means that higher compromises from the expected T E T are required, especially in the case where the risk coefficient λ is close to 1, to further decrease the risk.

6. Conclusions

In this work, we studied a shelter location and routing assignment problem under random demand circumstances and introduced a risk-averse stochastic programming optimization model. Our aim was to minimize the total evacuation time using a system optimal style. To handle the non-linearity in the objective value arising from using a traffic assignment model, second-order cone programming was deployed to transfer the non-linearity from the objective function to constraints. In addition, we performed a series of numerical analyses to validate our proposed model and the impacts of key features were discussed for decision making purposes. This emergency management strategy involving risk measure is valuable as it could support plan making on both tactical and operational levels.
There are some further research improvements that could be made. For example, we adopted a system optimal method, in which we assumed that evacuees would comply with the guidelines released by the central authority. In practice, however, the system optimal routing assignment results may be unfavorable to some evacuees, and people’s behaviors in unusual circumstances are ignored. Thus, the incorporation of human behaviors into the optimization model deserves investigation. On the other hand, more scenarios used to describe randomness for which the use of efficient solution algorithms (both exact and heuristic) to handle large-scale scenarios should be captured.

Author Contributions

Conceptualization, B.L. and D.Y.; methodology, B.L. and D.Y.; software, X.Q. and T.T.; validation, B.L., D.Y., X.Q. and T.T.; formal analysis, T.T.; investigation, B.L.; resources, D.Y.; data curation, X.Q.; writing–original draft preparation, B.L. and D.Y.; writing–review and editing, B.L. and D.Y.; visualization, X.Q. and T.T.; supervision, X.Q. and T.T.; project administration, X.Q.; funding acquisition, X.Q.

Funding

This research was funded by National Natural Science Foundation of China (NSFC) (Grant Nos.71432007, 71802031 and 71972146); Basic Research and Frontier exploration Program of Chongqing Science & Technology Commission (No.cstc2018jcyjAX0801), Scientific and Technological Research Program of Chongqing Municipal Education Commission (No.KJ1706160); Chongqing Engineering Research Center for Processing, Storage and Transportation of Characterized Agro-Products (No.KFJJ2018054); Research Program of the Chongqing Technology and Business University (No.1752010) and the Youth Program of Philosophy and Social Science Planning in Shanghai (No.2018EGL013).

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A

Figure A1. Case study 1—Sioux Falls network.
Figure A1. Case study 1—Sioux Falls network.
Ijerph 16 04007 g0a1
Table A1. Road segment data from case study 2.
Table A1. Road segment data from case study 2.
CodeRoad NameTravel TimeCodeRoad NameTravel Time
(min)(min)
L1Eildon-Warburton, Eildon Jamieson Rd132L23Stony Creek75
L2Goulburn Valley Hwy (B340)11L24Maroondah Hwy (B360)23
L3Back Eildon Rd11L25Healesville-Yarra Glen Rd (C726)13
L4Rubicon Rd12L26Healesville-Kinglake Rd (C724)17
L5Blue Range Rd16L27Melba Hwy (B300)14
L6Taggerty-Thornton Rd (C515)4L28Healesville-Kinglake Rd (C724)7
L7Bulls Ln10L29Melba Hwy (B300)13
L8Blue Range Rd52L30Murrindindi Rd66
L9Lake Mountain-Royston River Rd68L31Black Range Rd70
L10Marysville-Woods Point Rd (C512)19L32Cameron Rd55
L11Mount Margaret Rd49L33Simmonds Track20
L12Taggerty-Thornton Rd (C515)6L34Myles Rd15
L13Goulburn Valley Hwy (B340)11L35Murrindindi Rd7
L14Breakaway Rd-Hoban Rd12L36Melba Hwy (B300)14
L15Maroondah Hwy (B360)8L37Limestone-Ginter Rd53
L16Maroondah Hwy (B360)6L38Scrubby-Black Range Rd45
L17Maroondah Hwy (B360)8L39Whanregarwen Rd12
L18Buxton-Marysville Rd (C508)3L40Whanregarwen Rd11
L19Buxton-Marysville Rd (C508)9L41Goulburn Valley Hwy (B340)13
L20Maroondah Hwy (B360)12L42Goulburn Valley Hwy (B340)10
L21Marysville Rd (C512)10L43Rubicon Rd3
L22Plantation Rd25
Figure A2. Case study 2—Murrindindi Shire, Victoria, Australia
Figure A2. Case study 2—Murrindindi Shire, Victoria, Australia
Ijerph 16 04007 g0a2
Table A2. Network information for case study 2.
Table A2. Network information for case study 2.
FromToRoute 1Route 2Route 3
Road SegmentsTravel TimeDistanceRoad SegmentsTravel TimeDistanceRoad SegmentsTravel TimeDistance
(min)(km)(min)(km)(min)(km)
NarbethongYeaL24-L26-L28-L29-L367485L22-L30-L35-L3611263L20-L17-L14-L41-L426369.4
AlexandraL20-L17-L16-L153447L21-L19-L18-L17-L16-L144852L20-L17-L12-L6-L134150.7
ThorntonL20-L17-L12-L63038L21-L19-L18-L17-L12-L64045L21-L19-L11-L8-L7-L613465.1
EildonL20-L17-L12-L6-L24152L21-L19-L18-L17-L12-L6-L25158L21-L10-L116190.5
YarraL24-L253635L24-L26-L28-L276162L23-L7-L279942.9
MarysvilleYeaL19-L18-L17-L16-L14-L39-L40-L427171L19-L18-L17-L16-L15-L41-L425773L19-L18-L32-L33-L3714069.2
AlexandraL19-L18-L17-L16-L153442L19-L18-L17-L12-L6-L134145L19-L11-L8-L7-L6-L1313565.5
ThorntonL19-L18-L17-L12-L63033L19-L11-L8-L7-L612453L19-L18-L17-L16-L14-L134952.8
EildonL19-L18L17-L12-L6-L24146L10-L11917L19-L11-L8-L7-L6-L213566.5
YarraL21-L24-L254647L21-L24-L26-L28-L277174L21-L23-L28-L2710658.8
BuxtonYeaL17-L16-L14-L39-L40-L425959L16-L15-L41-L423749L32-L33-L377534.4
AlexandraL17-L16-L152230L17-L12-L6-L132933L32-L38-L3911252.3
ThorntonL17-L12-L61821L17-L16-L15-L133342L18-L11-L8-L10-L612762.3
EildonL17-L12-L6-L22934L17-L16-L14-L13-L24854.4---
YarraL20-L24-L254853L19-L21-L24-L256766L20-L23-L28-L2710864.1
TaggertyYeaL16-L15-L41-L423749L16-L14-L39-L40-L425148L17-L32-L33-L3713669
AlexandraL16-L151418L16-L141817L12-L6-L132121.8
ThorntonL12-L6109.4L16-L15-L132531L16-L14-L132929.4
EildonL12-L6-L32121L12-L6-L22123L16-L15-L13-L23643.9
YarraL17-L20-L24-L255664L17-L20-L24-L28-L277867.2L16-L15-L42-L41-L36-L29-L2778107
CambarvilleYeaL10-L19-L18-L17-L16-L15-L41-L427689L9-L8-L7-L12-L16-L15-L41-L42163101L10-L19-L18-L23-L33-L3717981.6
AlexandraL10-L19-L18-L17-L16-L155358L9-L8-L7-L6-L1314564L1-L2-L1315487.5
ThorntonL10-L19-L18-L17-L12-L64950L9-L8-L7-L613452L1-L214375.1
EildonL10-L19-L18-L17-L12-L6-L26063L113262L9-L8-L3-L6-L314671.6
YarraL10-L21-L24-L256564L10-L21-L26-L28-L276770L10-L21-L23-L28-L2712575.6
RubiconYeaL43-L4-L13-L424740.6L43-L4-L13-L39-L40-L425958L43-L4-L6-L12-L16-L15-L39-L40-L427273
AlexandraL43-L4-L132627L43-L4-L6-L12-L16-L153942---
ThorntonL43-L41515------
EildonL43-L414776L43-L4-L22628---
YarraL43-L4-L6-L12-L17-L20-L24-L258188L43-L5-L8-L11-L19-L21-24-L25176107L43-L4-L13-L41-L42-L36-L29-L2790116

References

  1. Üster, H.; Dalal, J. Strategic emergency preparedness network design integrating supply and demand sides in a multi-objective approach. IISE Trans. 2017, 49, 395–413. [Google Scholar] [CrossRef]
  2. Alem, D.; Clark, A.; Moreno, A. Stochastic network models for logistics planning in disaster relief. Eur. J. Oper. Res. 2016, 255, 187–206. [Google Scholar] [CrossRef]
  3. Kınay, Ö.B.; Kara, B.Y.; Saldanha-da Gama, F.; Correia, I. Modeling the shelter site location problem using chance constraints: A case study for Istanbul. Eur. J. Oper. Res. 2018, 270, 132–145. [Google Scholar] [CrossRef]
  4. Bayram, V.; Yaman, H. Shelter location and evacuation route assignment under uncertainty: A Benders decomposition approach. Transp. Sci. 2017, 52, 416–436. [Google Scholar] [CrossRef]
  5. Bayram, V.; Tansel, B.Ç.; Yaman, H. Compromising system and user interests in shelter location and evacuation planning. Transp. Res. Part B Methodol. 2015, 72, 146–163. [Google Scholar] [CrossRef]
  6. Han, L.D.; Yuan, F.; Chin, S.M.; Hwang, H. Global optimization of emergency evacuation assignments. Interfaces 2006, 36, 502–513. [Google Scholar] [CrossRef]
  7. Goerigk, M.; Deghdak, K.; ŤKindt, V. A two-stage robustness approach to evacuation planning with buses. Transp. Res. Part B Methodol. 2015, 78, 66–82. [Google Scholar] [CrossRef] [Green Version]
  8. Sheu, J.B.; Pan, C. A method for designing centralized emergency supply network to respond to large-scale natural disasters. Transp. Res. Part B Methodol. 2014, 67, 284–305. [Google Scholar] [CrossRef]
  9. Kulshrestha, A.; Wu, D.; Lou, Y.; Yin, Y. Robust shelter locations for evacuation planning with demand uncertainty. J. Transp. Saf. Secur. 2011, 3, 272–288. [Google Scholar] [CrossRef]
  10. Li, A.C.; Nozick, L.; Xu, N.; Davidson, R. Shelter location and transportation planning under hurricane conditions. Transp. Res. Part E 2012, 48, 715–729. [Google Scholar] [CrossRef]
  11. Goerigk, M.; Deghdak, K.; Heßler, P. A comprehensive evacuation planning model and genetic solution algorithm. Transp. Res. Part E 2014, 71, 82–97. [Google Scholar] [CrossRef] [Green Version]
  12. Shahparvari, S.; Chhetri, P.; Abbasi, B.; Abareshi, A. Enhancing emergency evacuation response of late evacuees: Revisiting the case of Australian Black Saturday bushfire. Transp. Res. Part E 2016, 93, 148–176. [Google Scholar] [CrossRef]
  13. Kimms, A.; Maiwald, M. Bi-objective safe and resilient urban evacuation planning. Eur. J. Oper. Res. 2018, 269, 1122–1136. [Google Scholar] [CrossRef]
  14. Mostajabdaveh, M.; Gutjahr, W.J.; Sibel Salman, F. Inequity-averse shelter location for disaster preparedness. IISE Trans. 2019, 51, 809–829. [Google Scholar] [CrossRef]
  15. Bish, D.R.; Sherali, H.D. Aggregate-level demand management in evacuation planning. Eur. J. Oper. Res. 2013, 224, 79–92. [Google Scholar] [CrossRef]
  16. Ng, M.; Waller, S.T. Reliable evacuation planning via demand inflation and supply deflation. Transp. Res. Part E 2010, 46, 1086–1094. [Google Scholar] [CrossRef]
  17. Pillac, V.; Van Hentenryck, P.; Even, C. A conflict-based path-generation heuristic for evacuation planning. Transp. Res. Part B Methodol. 2016, 83, 136–150. [Google Scholar] [CrossRef] [Green Version]
  18. Chiu, Y.C.; Zheng, H.; Villalobos, J.; Gautam, B. Modeling no-notice mass evacuation using a dynamic traffic flow optimization model. IIE Trans. 2007, 39, 83–94. [Google Scholar] [CrossRef]
  19. Yao, T.; Mandala, S.R.; Do Chung, B. Evacuation transportation planning under uncertainty: A robust optimization approach. Netw. Spat. Econ. 2009, 9, 171. [Google Scholar] [CrossRef]
  20. Lim, G.J.; Zangeneh, S.; Baharnemati, M.R.; Assavapokee, T. A capacitated network flow optimization approach for short notice evacuation planning. Eur. J. Oper. Res. 2012, 223, 234–245. [Google Scholar] [CrossRef]
  21. Göttlich, S.; Kühn, S.; Ohst, J.P.; Ruzika, S. Evacuation modeling: A case study on linear and nonlinear network flow models. EURO J. Comput. Opt. 2016, 4, 219–239. [Google Scholar] [CrossRef]
  22. He, X.; Zheng, H.; Peeta, S. Model and a solution algorithm for the dynamic resource allocation problem for large-scale transportation network evacuation. Transp. Res. Procedia 2015, 7, 441–458. [Google Scholar] [CrossRef]
  23. Tuydes-Yaman, H.; Ziliaskopoulos, A. Modeling demand management strategies for evacuations. Ann. Oper. Res. 2014, 217, 491–512. [Google Scholar] [CrossRef]
  24. Ben-Porath, E.; Gilboa, I.; Schmeidler, D. On the measurement of inequality under uncertainty. J. Econ. Theory 1997, 75, 194–204. [Google Scholar] [CrossRef]
  25. Li, J.; Ozbay, K. Evacuation planning with endogenous transportation network degradations: A stochastic cell-based model and solution procedure. Netw. Spat. Econ. 2015, 15, 677–696. [Google Scholar] [CrossRef]
  26. Zhang, H.; Wang, F.; Tang, H.; Dong, Y. An Optimization-Based Approach to Social Network Group Decision Making with an Application to Earthquake Shelter-Site Selection. Int. J. Environ. Res. Public Health 2019, 16, 2740. [Google Scholar] [CrossRef]
  27. Kongsomsaksakul, S.; Yang, C.; Chen, A. Shelter location-allocation model for flood evacuation planning. J. East. Asia Soc. Transp. Stud. 2005, 6, 4237–4252. [Google Scholar]
  28. Li, A.C.; Xu, N.; Nozick, L.; Davidson, R. Bilevel optimization for integrated shelter location analysis and transportation planning for hurricane events. J. Infrastruct. Syst. 2011, 17, 184–192. [Google Scholar] [CrossRef]
  29. Bayram, V. Optimization models for large scale network evacuation planning and management: A literature review. Surv. Oper. Res. Manag. Sci. 2016, 21, 63–84. [Google Scholar] [CrossRef]
  30. Lim, G.J.; Rungta, M.; Davishan, A. A robust chance constraint programming approach for evacuation planning under uncertain demand distribution. IISE Trans. 2019, 51, 589–604. [Google Scholar] [CrossRef]
  31. Yazici, M.A.; Ozbay, K. Impact of probabilistic road capacity constraints on the spatial distribution of hurricane evacuation shelter capacities. Transp. Res. Rec. 2007, 2022, 55–62. [Google Scholar] [CrossRef]
  32. Alçada-Almeida, L.; Tralhao, L.; Santos, L.; Coutinho-Rodrigues, J. A multiobjective approach to locate emergency shelters and identify evacuation routes in urban areas. Geogr. Anal. 2009, 41, 9–29. [Google Scholar] [CrossRef]
  33. Coutinho-Rodrigues, J.; Tralhão, L.; Alçada-Almeida, L. Solving a location-routing problem with a multiobjective approach: The design of urban evacuation plans. J. Transp. Geogr. 2012, 22, 206–218. [Google Scholar] [CrossRef]
  34. Kılcı, F.; Kara, B.Y.; Bozkaya, B. Locating temporary shelter areas after an earthquake: A case for Turkey. Eur. J. Oper. Res. 2015, 243, 323–332. [Google Scholar] [CrossRef]
  35. Maerivoet, S.; De Moor, B. Transportation planning and traffic flow models. arXiv 2005, arXiv:physics/0507127. [Google Scholar]
  36. Rockafellar, R.T.; Uryasev, S. Optimization of conditional value-at-risk. J. Risk 2000, 2, 21–42. [Google Scholar] [CrossRef]
  37. Rockafellar, R.T.; Uryasev, S. Conditional value-at-risk for general loss distributions. J. Bank. Financ. 2002, 26, 1443–1471. [Google Scholar] [CrossRef]
  38. Rockafellar, R.T. Coherent approaches to risk in optimization under uncertainty. In OR Tools and Applications: Glimpses of Future Technologies; Informs: Catonsville, MD, USA, 2007; pp. 38–61. [Google Scholar]
  39. Wang, Q.; He, L. Managing risk aversion for low-carbon supply chains with emission abatement outsourcing. Int. J. Environ. Res. Public Health 2018, 15, 367. [Google Scholar] [CrossRef]
  40. Elçi, Ö.; Noyan, N. A chance-constrained two-stage stochastic programming model for humanitarian relief network design. Transp. Res. Part B Methodol. 2018, 108, 55–83. [Google Scholar] [CrossRef]
  41. Noyan, N. Risk-averse two-stage stochastic programming with an application to disaster management. Comput. Oper. Res. 2012, 39, 541–559. [Google Scholar] [CrossRef]
  42. Aktürk, M.S.; Atamtürk, A.; Gürel, S. Aircraft rescheduling with cruise speed control. Oper. Res. 2014, 62, 829–845. [Google Scholar] [CrossRef]
  43. Lobo, M.S.; Vandenberghe, L.; Boyd, S.; Lebret, H. Applications of second-order cone programming. Linear Algebra Appl. 1998, 284, 193–228. [Google Scholar] [CrossRef] [Green Version]
  44. Luedtke, J.; Ahmed, S. A sample approximation approach for optimization with probabilistic constraints. SIAM J. Opt. 2008, 19, 674–699. [Google Scholar] [CrossRef]
  45. Transportation Networks for Research. Available online: https://github.com/bstabler/TransportationNetworks (accessed on 10 July 2019).
  46. Yen, J.Y. Finding the k shortest loopless paths in a network. Manag. Sci. 1971, 17, 712–716. [Google Scholar] [CrossRef]
Figure 1. Illustration of the evacuation network.
Figure 1. Illustration of the evacuation network.
Ijerph 16 04007 g001
Figure 2. Traffic flow of the road segments using the proposed model.
Figure 2. Traffic flow of the road segments using the proposed model.
Ijerph 16 04007 g002
Figure 3. Traffic flow of the road segments using the NA approach.
Figure 3. Traffic flow of the road segments using the NA approach.
Ijerph 16 04007 g003
Figure 4. CVaR under different risk coefficients λ ( α = 0.95 ).
Figure 4. CVaR under different risk coefficients λ ( α = 0.95 ).
Ijerph 16 04007 g004
Figure 5. Total evacuation time under different risk coefficients λ ( α = 0.95 ).
Figure 5. Total evacuation time under different risk coefficients λ ( α = 0.95 ).
Ijerph 16 04007 g005
Figure 6. CVaR value of the total evacuation time with different risk coefficients λ ( S = 1 ).
Figure 6. CVaR value of the total evacuation time with different risk coefficients λ ( S = 1 ).
Ijerph 16 04007 g006
Figure 7. Objective value with different risk coefficients λ ( S = 1 ).
Figure 7. Objective value with different risk coefficients λ ( S = 1 ).
Ijerph 16 04007 g007
Figure 8. Expected total evacuation time vs. CVaR value with λ { 0.1 , 0.2 , , 0.9 } and α = 0.95 .
Figure 8. Expected total evacuation time vs. CVaR value with λ { 0.1 , 0.2 , , 0.9 } and α = 0.95 .
Ijerph 16 04007 g008
Table 1. Overview of the literature review.
Table 1. Overview of the literature review.
AuthorTraf. Assign.Shel. Utili.UncertaintyRisk-AverseRoute Assign.Shel. loc.Solution Method
[6]SO××××Simulation-based
[18]SO××××Commercial solver
[20]SO××××Dijkstra’s algo, greedy algo
[17]SO××××Column generation
[15]SO××××Exact, heuristic
[21]SO××××Exact
[22]SO××××Benders decomposition
[23]SO××××Tabu search
[19]SO×××Ant colony algo
[16]SO×××Commercial solver
[25]SO×××Sample average approximation
[3]×××Commercial solver
[27]SO; UE×××Genetic algo
[8]××××Commercial solver
[5]CSO×××SOCP, commercial solver
[9]UE×××Cutting plane algo
[10]SO; UE××Lagrangian relax
[11]SO×××NSGA-ii@
[12]×××× ϵ -constrained algo
[4]CSO××SOCP, Benders decomposition
[14]××××Genetic algo
This workSOSOCP, approximation
Table 2. Utilization rate of open shelters under risk-neutral and risk aversion settings ( S { 3 , 4 } ).
Table 2. Utilization rate of open shelters under risk-neutral and risk aversion settings ( S { 3 , 4 } ).
S = 3 S = 4
#ShelterRisk-NeutralRisk Aversion#ShelterRisk-NeutralRisk Aversion
λ = 0.1 λ = 0.5 λ = 0.9 λ = 0.1 λ = 0.5 λ = 0.9
2--62.1%61.8%2--59.7%59.7%
699.3%98.8%--698.2%97.6%--
1679.8%78.8%80.8%80.8%1661.8%61.5%64.8%64.5%
1975.4%77.2%80.0%80.3%1953.3%54.4%58.0%59.0%
-----20100.0%100.0%98.9%98.1%
Table 3. Utilization rate of open shelters under risk-neutral and risk aversion settings ( S { 5 , 6 } ).
Table 3. Utilization rate of open shelters under risk-neutral and risk aversion settings ( S { 5 , 6 } ).
S = 5 S = 6
#ShelterRisk-NeutralRisk Aversion#ShelterRisk-NeutralRisk Aversion
λ = 0.1 λ = 0.5 λ = 0.9 λ = 0.1 λ = 0.5 λ = 0.9
2-50.1%49.1%48.4%2-49.2%49.3%49.1%
679.6%---677.3%---
-----746.1%46.6%45.3%45.2%
886.6%88.4%86.4%83.1%858.2%66.9%62.3%62.1%
16--50.9%51.0%16--49.2%49.3%
1750.0%50.9%--1749.2%49.3%--
1949.2%51.7%53.2%56.2%1948.8%48.8%51.1%51.6%
2094.3%93.7%95.8%94.8%2084.5%82.2%83.4%83.5%
Table 4. Total evacuation time and corresponding Conditional Value-at-Risk (CVaR).
Table 4. Total evacuation time and corresponding Conditional Value-at-Risk (CVaR).
SExpected Total Evacuation Time (TET)CVaR of TET
Risk-NeutralRisk AversionRisk-NeutralRisk Aversion
λ = 0.1 λ = 0.5 λ = 0.9 λ = 0.1 λ = 0.5 λ = 0.9
36,630,3986,677,7217,188,6177,449,398-8,822,6577,852,5257,744,518
45,963,4886,010,1206,491,5666,720,137-7,374,0746,504,9966,414,576
55,720,9575,753,6146,025,6196,314,789-6,927,3506,228,6706,197,845
65,677,4415,752,0445,960,5136,238,642-6,641,0295,967,1015,901,922
Table 5. Monte Carlo simulation of the evacuation time.
Table 5. Monte Carlo simulation of the evacuation time.
S | Ω | = 50 | Ω | = 100 | Ω | = 200
Risk-NeutralRisk AversionRisk-NeutralRisk AversionRisk-NeutralRisk Aversion
λ = 0.1 λ = 0.5 λ = 0.1 λ = 0.5 λ = 0.1 λ = 0.5
36,844,8136,844,8136,750,0866,823,5506,823,5506,664,9416,868,3686,868,3686,757,147
46,185,9326,185,9325,812,2456,249,5126,249,5126,051,3886,100,3236,100,3236,074,580
55,758,6365,626,7345,605,6485,932,8005,835,6225,783,7925,870,2885,828,7495,717,690
65,798,8785,669,1835,489,3755,834,5115,833,9135,800,9195,814,7115,725,4535,777,178
Table 6. The case study demand and capacity data.
Table 6. The case study demand and capacity data.
Index iEvacuation NodesDemand ( d i )Index jSheltersCapacity ( b j )
1Narbethong2401Yea1500
2Marysville2602Alexandra500
3Taggerty1703Thornton500
4Buxton1304Eildon1000
5Cambarville1105Yarra Glen1000
6Rubicon190
Table 7. Computation results of the model and real evacuation case.
Table 7. Computation results of the model and real evacuation case.
eSScenario #1Scenario #2Scenario #3Scenario #4
ModelNAModelNAModelNAModelNA
0.12197,5621,675,112214,9041,890,489181,9861,451,272207,5811,711,341
3150,207713,215162,734769,519138,477653,297157,078754,420
4132,548877,519142,299984,507122,061789,196137,270922,060
5129,972952,549139,5491,076,953119,591854,861134,5621,002,812
0.32171,1341,517,710222,0622,207,604130,294942,740196,1571,604,709
3133,512618,941170,368806,720102,109459,105150,727721,702
4119,562719,198148,6061,053,06790,991501,065131,155829,372
5117,286776,878145,8421,162,79188,993538,252128,529903,243
0.52149,9861,392,877233,2742,612,96889,529565,754186,8441,508,880
3120,224552,166181,197891,25472,416308,340145,627700,811
4109,426593,075157,9911,172,87165,200292,294126,431746,900
5107,425634,276155,2091,301,35663,634309,844123,790813,580
Table 8. Expected total evacuation time.
Table 8. Expected total evacuation time.
S α λ
0.100.200.300.400.500.600.700.800.90
20.60222,277226,809213,374216,567219,922223,513225,850225,705231,960
0.70203,786208,836213,434216,737219,640222,360225,387228,950232,450
0.80203,799208,495213,124216,875219,852222,283224,977228,695232,920
0.90203,784208,443213,121216,877219,824222,245224,890228,565233,150
0.95203,802208,499213,124216,875219,826222,248224,890228,565233,140
0.99203,788208,486213,124216,877219,824222,245224,893228,565233,140
30.60155,109156,859159,541162,675165,168166,470168,940170,150172,230
0.70154,796156,328160,073161,607164,670167,555168,590170,635173,040
0.80154,848157,061159,374162,102164,814167,263168,843170,385173,300
0.90154,297156,110158,689162,370163,952167,258168,847170,565172,310
0.95153,946157,124159,649162,375164,168166,360169,127170,835173,360
0.99155,089156,598160,019162,375164,766166,393169,127170,525173,050
40.60142,463144,243145,770147,507151,934152,878156,070159,135160,860
0.70142,189144,325146,656148,263149,748153,478155,467157,170160,150
0.80142,893144,391146,811147,492150,618153,790154,840158,525161,000
0.90142,987143,008144,779148,577151,074150,250154,453158,800159,810
0.95141,773144,334147,500148,263151,216152,960155,437157,250160,580
0.99141,553144,849145,374147,252149,890152,505154,627157,250160,580
50.60136,120141,029142,881146,360147,220149,663153,127155,405158,300
0.70139,809143,095143,404146,298146,858151,343152,813155,005159,730
0.80136,463142,401143,231146,298149,464149,748153,590157,050159,730
0.90136,906143,096142,211147,120148,138150,555154,250156,410159,730
0.95139,217141,880143,717146,298147,346150,240153,587157,050159,730
0.99137,277143,096142,923145,507148,676150,248153,767157,050159,730
Table 9. Conditional value-at-risk (CVaR) of the total evacuation time.
Table 9. Conditional value-at-risk (CVaR) of the total evacuation time.
S α λ
0.100.200.300.400.500.600.700.800.90
20.60409,540382,085313,290307,288303,164300,223298,931297,724301,001
0.70360,180330,580316,367310,113306,534304,287302,666301,455300,832
0.80360,190332,660318,560311,450307,742305,738304,297303,039302,288
0.90360,140332,575318,567311,448307,784305,787304,370303,129302,318
0.95360,190332,725318,560311,450307,782305,785304,370303,133302,274
0.99360,140332,685318,560311,448307,784305,787304,367303,119302,308
30.60241,560225,195218,010213,398210,322208,533207,479207,081206,684
0.70241,970234,500219,293214,740211,562209,538208,470208,073207,678
0.80241,980226,930219,940215,423212,414210,402209,187208,725208,304
0.90250,160238,245232,963215,423212,414210,402209,189208,725208,306
0.95241,980227,235219,940215,423212,414210,402209,187208,726208,304
0.99241,980226,930219,807215,423212,414210,402209,187208,725208,304
40.60238,290209,915202,370198,495195,640193,680192,359191,561191,169
0.70243,200210,025202,883198,845196,108194,068192,716191,864191,451
0.80241,510208,740202,760198,845196,108194,068192,707191,746191,211
0.90224,350209,990202,763198,843196,108194,138192,716191,866191,451
0.95223,900209,990202,763198,845195,994194,070192,707191,865191,450
0.99240,950208,740202,760198,843195,994194,068192,716191,865191,450
50.60225,070207,265201,503197,433194,748192,742191,329190,388189,821
0.70223,040207,820202,070198,110195,100193,158191,811190,860190,300
0.80242,500207,765201,853198,110195,102193,190191,863190,926190,343
0.90225,390207,815201,853197,985195,100193,238191,859190,919190,343
0.95225,380209,165201,853198,110195,186193,243191,864190,926190,343
0.99223,020207,815201,853198,110195,186193,238191,859190,926190,343

Share and Cite

MDPI and ACS Style

Liang, B.; Yang, D.; Qin, X.; Tinta, T. A Risk-Averse Shelter Location and Evacuation Routing Assignment Problem in an Uncertain Environment. Int. J. Environ. Res. Public Health 2019, 16, 4007. https://0-doi-org.brum.beds.ac.uk/10.3390/ijerph16204007

AMA Style

Liang B, Yang D, Qin X, Tinta T. A Risk-Averse Shelter Location and Evacuation Routing Assignment Problem in an Uncertain Environment. International Journal of Environmental Research and Public Health. 2019; 16(20):4007. https://0-doi-org.brum.beds.ac.uk/10.3390/ijerph16204007

Chicago/Turabian Style

Liang, Bian, Dapeng Yang, Xinghong Qin, and Teresa Tinta. 2019. "A Risk-Averse Shelter Location and Evacuation Routing Assignment Problem in an Uncertain Environment" International Journal of Environmental Research and Public Health 16, no. 20: 4007. https://0-doi-org.brum.beds.ac.uk/10.3390/ijerph16204007

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop