Applied Soft Computing 68 (2018) 343–359
Contents lists available at ScienceDirect
Applied Soft Computing
journal homepage: www.elsevier.com/locate/asoc
A bi-objective partial interdiction problem considering different
defensive systems with capacity expansion of facilities under
imminent attacks
Amir Mohammad Fathollahi Fard, Mostafa Hajiaghaei-Keshteli
∗
Department of Industrial Engineering, University of Science and Technology of Mazandaran, Behshahr, Iran
a r t i c l e i n f o
Article history:
Received 1 December 2017
Received in revised form 2 March 2018
Accepted 11 April 2018
Available online 13 April 2018
Keywords:
Partial interdiction problem
Defensive systems
Capacity expansion
Demand outsourcing
Bi-level metaheuristic
a b s t r a c t
Nowadays, the disordered caused by terrorist attacks is considered as a major treat by governments and
international comities. Meanwhile, different types of defensive systems are to develop and to focus on
protecting the critical system services in recent years. By this motivation and contrary to previous works,
this study firstly proposes a bi-objective, bi-level formulation for the partial interdiction problem con-
sidering different defensive systems. In the developed model, defender as a leader tries to optimize the
two objectives i.e. different types of defensive systems to protect the facilities as well as the total cost for
supply the demands of customers and outsourcing, simultaneously. Besides, the attacker seeks to maxi-
mize destroy for the customers’ service system. Due to the nature of the problem, the solution approach
is based on a nested approach, namely, bi-level metaheuristic. Accordingly, this study not only uses the
old and the recent algorithms, but also utilizes two new hybrid algorithms according to the benefits of
both groups. The performance of the algorithms is enhanced by Response Surface Method (RSM) to set
the proper values for algorithms’ parameters. Finally, the approaches are evaluated by different criteria
to identify the performance of algorithms as well as a set of sensitivity analyses are done to approve the
efficiency of the proposed model.
© 2018 Elsevier B.V. All rights reserved.
1. Motivation and literature review
Todays, by advancing, expansion and diversification of defen-
sive systems, the world has become an arena for militant groups to
achieve a series of perverse ideals. In addition, the ease of com-
mitting terrorist acts is resulted in increasing of the number of
deliberate civilian and the military attacks in the current century.
The attacks are cleverly designed to aim the most sensitive and
critical facilities. With an increasing of the variety of different tech-
niques and plans, this has made it more difficult to fight to the
terrorism. The leading countries in fighting terrorism such as the
United States, have utilized different defense and military systems
to deal with terrorism in recent years [1].
Recent years have seen a numerous incidents of bombings in
Palestine, Turkey, India, Afghanistan, etc. which shows the multi-
plicity, complexity and sensitivity of planning to deal with these
events [2]. The mentioned examples are numerous, where terror-
ists (the attackers) try to stop services providing, create chaos and
∗
Corresponding author.
E-mail address: mostafahaji@mazust.ac.ir (M. Hajiaghaei-Keshteli).
to kill people. Accordingly, they choose the most sensitive facil-
ities [3]. So, the role of defensive systems to protect the service
systems is very strategic for defender’s level. A robust defense
budget and policy strengthens the nations are so significant. A
well-equipped defense enhances capabilities of governments and
influences across virtually all other elements of national power:
the economy, the diplomacy, the alliances, and the credibility and
influence in the world. Conversely, an underestimated resourced
national defense threatens to diminish government’s power across
all of these other dimensions. A strong system of defense is thus
indispensable for a peaceful, successful, and free world if a shot is
never fired.
1
This is the main motivation of this study to get closer
to real-world applications. So, this paper adds different defensive
systems into the proposed model by considering a probabilistic
protection of critical facilities and also a distinguished objective
function for the defender’s level.
It is estimated that after the attack on the World Trade Cen-
ter in 2001, using operation research models to plan security
1
http://index.heritage.org/military/2016/essays/role-of-a-strong-national-
defense/.
https://doi.org/10.1016/j.asoc.2018.04.011
1568-4946/© 2018 Elsevier B.V. All rights reserved.