ArticlePDF Available

A deterministic approach for rapid identification of the critical links in networks

PLOS
PLOS One
Authors:

Abstract and Figures

We introduce a rapid deterministic algorithm for identification of the most critical links which are capable of causing network disruptions. The algorithm is based on searching for the shortest cycles in the network and provides a significant time improvement compared with a common brute-force algorithm which scans the entire network. We used a simple measure, based on standard deviation, as a vulnerability measure. It takes into account the importance of nodes in particular network components. We demonstrate this approach on a real network with 734 nodes and 990 links. We found the worst scenarios for the cases with and without people living in the nodes. The evaluation of all network breakups can provide transportation planners and administrators with plenty of data for further statistical analyses. The presented approach provides an alternative approach to the recent research assessing the impacts of simultaneous interruptions of multiple links.
This content is subject to copyright.
RESEARCH ARTICLE
A deterministic approach for rapid
identification of the critical links in networks
Rostislav Voda
´k
1,2
, Michal
´lID
1
*, Toma
´s
ˇSvoboda
1,3
, Zuzana Křiva
´nkova
´
1
,
Jan Kubeček
1‡
, Toma
´s
ˇRebok
4‡
, Petr Hliněny
´ID
5‡
1CDV–Transport Research Centre, Brno, Czech Republic, 2Faculty of Science, Palacky
´University,
Olomouc, Czech Republic, 3CESNET, Prague, Czech Republic, 4CERIT-SC, Institute of Computer
Science, Masaryk University, Brno, Czech Republic, 5Faculty of Informatics, Masaryk University, Brno,
Czech Republic
These authors contributed equally to this work.
These authors also contributed equally to this work.
*michal.bil@cdv.cz
Abstract
We introduce a rapid deterministic algorithm for identification of the most critical links which
are capable of causing network disruptions. The algorithm is based on searching for the
shortest cycles in the network and provides a significant time improvement compared with a
common brute-force algorithm which scans the entire network. We used a simple measure,
based on standard deviation, as a vulnerability measure. It takes into account the impor-
tance of nodes in particular network components. We demonstrate this approach on a real
network with 734 nodes and 990 links. We found the worst scenarios for the cases with and
without people living in the nodes. The evaluation of all network breakups can provide trans-
portation planners and administrators with plenty of data for further statistical analyses. The
presented approach provides an alternative approach to the recent research assessing the
impacts of simultaneous interruptions of multiple links.
Introduction
Modern society is highly dependent on various types of networks, among which road networks
occupy the most prominent place. People would not be able to utilize even the most basic ser-
vices, such as medical care, without a functioning road network. An efficient road network
thus ranks among the priorities for any society. Its serviceability can be affected, however, by
various types of events which originate within the transport system (such as traffic accidents,
congestions, technical failures, etc.) but also by events caused by external forces (such as floods,
landslides, heavy snowfalls, storms, wildfires, earthquakes, etc.). The most challenging issue
for road administrators is the development of methods which can help in dealing with and pre-
venting critical situations when both types of events occur.
Identification of critical road links is part of vulnerability analysis of transportation net-
works. This analysis pays attention to particular links and evaluates their importance within
the whole network. The manner in which reduced capacity of a link or its complete blockage
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 1 / 18
a1111111111
a1111111111
a1111111111
a1111111111
a1111111111
OPEN ACCESS
Citation: Voda
´k R,
´l M, Svoboda T, Křiva
´nkova
´Z,
Kubeček J, Rebok T, et al. (2019) A deterministic
approach for rapid identification of the critical links
in networks. PLoS ONE 14(7): e0219658. https://
doi.org/10.1371/journal.pone.0219658
Editor: David M. Levinson, University of Sydney,
AUSTRALIA
Received: March 11, 2019
Accepted: June 28, 2019
Published: July 17, 2019
Copyright: ©2019 Voda
´k et al. This is an open
access article distributed under the terms of the
Creative Commons Attribution License, which
permits unrestricted use, distribution, and
reproduction in any medium, provided the original
author and source are credited.
Data Availability Statement: All relevant data are
within the manuscript and its Supporting
Information files.
Funding: This work was financed by project
‘RESILIENCE 2015: Dynamic Resilience Evaluation
of Interrelated Critical Infrastructure Subsystems’
(No. VI20152019049), supported by the Ministry
of the Interior of the Czech Republic.
Competing interests: The authors have declared
that no competing interests exist.
will affect the functioning of the entire network is often studied. A large number of road links
are sometimes interrupted concurrently for various reasons. Such a situation can lead to cas-
cading effects when other links collapse and the overall impact on the network performance is
enormous. It is therefore important to analyze impacts of as many as possible combinations of
concurrently interrupted links. Such an analysis is, however, computationally demanding. It
requires the application of additional restrictions on the set of analyzed links. These restric-
tions often encompass certain properties which are common for the set of the links in ques-
tion. This means, for instance, that the links are located in the same region and are therefore
close to one another.
In this paper, we focus our attention on disasters when the road links are completely inter-
rupted and a road network is disintegrated into several isolated parts. Such a situation can
result in a number of people cut-off from sources of food, water and medical treatment. When
such events occur, a rescue effort related to the reconnection of isolated components with a
high number of people has the highest priority. We thus introduce a simple but practical mea-
sure evaluating network disintegration based on the overall number of people isolated from
the primary network.
We introduce, in this work, a novel deterministic algorithm, based on cycles in graphs,
which enables the identification of the most critical links and reduces computational demands.
The suggested algorithm thus identifies all possible road network break-ups caused by up to 9
concurrently interrupted links. Identification of all the decompositions of the network, for the
defined number of interrupted links and their evaluation, is the aim of this work.
Literature review
The importance of networks in everyday life leads to the need to study their properties. Ser-
viceability, accessibility and vulnerability rank among the most prominent concepts at present
[15]. In this paper we pay attention to vulnerability. The first definition of vulnerability in the
road transportation system is based upon a susceptibility to events (incidents) that result in
considerable reductions in road network serviceability [6]. From the definition it follows that
vulnerability includes probabilities of individual road link interruption, by, e.g., landsliding
[79], capacity reduction [10] and demand variation [11]. It should be pointed out that an
approach based upon such probabilities requires a sufficient amount of data which may not
always be available [10]. This is specifically valid for extreme natural events which are rare
[12]. We also refer the reader to [13] for the development of link failure duration probability
distribution based upon the Monte Carlo simulation method. In these situations, the second
definition of vulnerability, which does not require any specific value of probability, comes into
play. Throughout the paper, we use the second definition which means the identification and
evaluation of such combination of road links whose disruption has the largest negative impact
on the functioning of the network despite the low probability of such an event [6]. The useful-
ness of the study of the problem was pointed out in [2] (see also [14,15]). We call the links
which correspond to the worst cases critical. The concept of criticality corresponds to the con-
cept of importance developed in [1416]. We thus follow the path where the reliability and the
vulnerability of the network are related to its connectivity [17,18] and where any combination
of links should be studied [19,20]. The problem is also important for networks of any size [16].
For further discussion concerning the terms we refer the reader to [1] and [21].
The first issue is how to evaluate various combinations of interrupted road links. One can
draw inspiration from the vast source of literature covering vulnerability measures. The work
[22] provides a solid starting point as they present tests of several measures. We also refer the
reader to [23] and [6] for a comprehensive review about vulnerability. A discussion about the
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 2 / 18
connection between reliability and vulnerability together with an analysis of several indices
can be found in [24]. The vulnerability measures can be related to numerous things which are
of importance for users and/or for the network administrators. In [25], the authors used four
centrality indices to analyze the network structure. [14] suggest measures based upon travel
costs and unsatisfied demands. The measures can be understood as a generalization of the con-
cepts based upon travel-time costs and travel time [26,27]. Additional important measures are
based upon accessibility or s-t path availability [2,28,29]. By the s-t path we mean the shortest
path connecting nodes sand t. A simple but effective measure uses the shortest paths among
the nodes [30]. Another network vulnerability index based upon the impact area was intro-
duced in [19]. If we do not know whether the road links will be interrupted or only partially
damaged, we can use methods comprising the capacity reduction approach [31,32] or the mac-
roscopic fundamental diagram [16]. A recent paper [33] draws attention to the accessibility of
emergency services and can be applied to a disintegrated network as well. The advantage of
most of the above-mentioned measures is that they can be applied to worst-case scenarios to
improve the resilience of a network [34,35]. An interesting approach to the network vulnera-
bility is based upon the game theory [36,37]. A number of studies can also be found on road
network performance in terms of vulnerability and robustness [2,3,14,15,2628,31,3845].
The recent book [46] reviews the range of existing approaches to network vulnerability with
their application to transport networks.
Another issue is the identification of the worst-case scenarios. This is difficult, however, to
solve due to high computational demands. For instance, if a network consists of 1,000 road
links and we plan to evaluate all combinations for 3 concurrently interrupted links, we have to
process 166,167,000 combinations. The number of combinations rises to 41,417,124,750 for 4
links. These numbers suggest that the respective state space (all possible combinations of inter-
rupted road links) is extremely large and that to evaluate any combination of disrupted road
links using a brute-force examination is beyond the scope of current-day computers (see for
instance [2] for a brute-force simulation-based approach). This is the reason why, despite the
fact that some of the vulnerability measures can be applied to any combination of interrupted
road links, many of the above papers only pay attention to one affected link. Other papers try
to reduce the burdensome computation by pre-selecting potential vulnerable links [47,48] or
by reducing the area influencing vulnerability index [19]. Only a limited number of works
cover the case with 2 or more concurrently interrupted links. These papers are mostly devoted
to analyses of the impacts of natural disasters [3,4951]. Apart from the paper [51], the above-
mentioned papers compared pre- and post-catastrophic scenarios and measured their impacts.
[51] analyzes several scenarios caused by a small number of interrupted links. These links
were, however, restricted to a fairly small area given by a predefined grid representing the
extent of natural disaster. The approach excludes, however, many events including natural
disasters [12]. The scenarios do not take into account, for instance, the simultaneous occur-
rence of other events such as traffic accidents which can cause the road link disruption (or
blockage) in other parts of the network. In addition, links whose interruption can cause the
largest damage to the network need not be found in the same area but can be distributed
within the network [12]. Certain links (or in some special cases nodes) can then, for example,
be the target of a terrorist attack [52,53]. One of the first attempts in the area is the paper [20],
where attention was paid to identification of vulnerable links in transportation networks. The
vulnerability is measured by total travel costs and the problem is formulated as a mixed-integer
nonlinear problem with equilibrium constraints. The approach is demonstrated on small net-
works with combinations of up to three interrupted links. The links causing the disintegration
of the network are, however, excluded. The idea of the approach is to identify critical links
without the need to explore all combinations of links. The idea is further developed in [54],
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 3 / 18
where the upper and lower bounds of transportation network vulnerability are obtained using
a binary integer bi-level program. The approach also includes the use of the virtual link capac-
ity-based maximum flow and the virtual link cast-based shortest paths problem formulation.
The developed mathematical model must be further linearized in order to be solved by com-
mercial software. The results are demonstrated on very small network (6 nodes and 16 links)
but time of the computation is not provided. Further approaches based upon the game theo-
retic approach and sensitivity and uncertainty analyses can be found in [5557] and
[21,58,59], respectively.
In this paper, attention is thus paid to network disintegration into several parts caused by
concurrent interruption of several road links. This issue of finding the most critical links is
related to the problem of generating the partitions of a graph into a fixed number of cuts evalu-
ated by a function. A cut (or cut-set) in a graph is defined in graph theory as a set of links parti-
tioning the graph into two disjoint node subsets. End nodes of the links in the cut are in the
different subsets. A minimum cut of a graph is a cut of minimum total weight. In the case of the
disintegration of the network into more than two components, we can similarly introduce a k-
cut and a minimum k-cut of a graph. For a brief review about recent developments in this field,
we refer the reader to [60] for the minimum 3-cut problem, [61] for the minimum 3- and
4-cut problem and [62] for the minimum 5- and 6-cut problem. Further deterministic algo-
rithms, based upon the cactus representation or maximum flow computation, can be found in
[6365]. In case of an interest in network disintegrations for a given number of links, the
approach based on minimum k-cuts is not applicable because in many road networks it would
lead to finding only the nodes with one link connecting them to the rest of the network. More-
over, according to the above papers, it seems that the techniques developed for minimum
3-cuts and 4-cuts are not simply extensible for higher cuts and are not suitable for minimiza-
tion of a loss function. Another related problems are so-called (s,t)-cuts, i.e., the cuts which
contain nodes sand tin different components, and their generalizations (S,T)-cuts for a set of
nodes Sand T[66]. Another interesting approach is based on spectral analysis. It requires
computation of the second eigenvalue of the graph Laplacian. The method provides informa-
tion on how the particular clusters are connected in the network [67,68]. The approach enables
the identification of bottlenecks in the network if the capacities of the links are known [5]. For
further applications of this method we refer to [69,70].
In our algorithm we do not take into account any flows in the network (see for instance
[7174]) because they are dramatically changed during many events with a larger number of
interrupted links. The common traffic pattern [7578] completely disappears as well and the
standard traffic control begins to be useless. The situation is also much more serious than the
common congestions [79] and the transportation system is far out of its equilibrium [80]. In
addition, the measure, which we introduce in this paper, also enables the reader to easily verify
the results. On the other hand, more sophisticated measures working with flows, demands and
supplies information can be useful in many break-ups with a limited influence on the entire
network and can be part of the analysis based upon our algorithm.
Methods
In this section, a network vulnerability measure, represented by a suitable loss function, is
introduced along with a new rapid and efficient deterministic algorithm.
For the purpose of this paper we modified the definitions of cuts and minimum cuts. By a
cut we mean any set of links whose concurrent interruption leads to the disintegration of the
network into two parts. It should be pointed out that it is not necessary for all the links to par-
ticipate in the disintegration, i.e., if some of the links are made passable, there is still a cut. By a
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 4 / 18
minimum cut we mean a cut where all the links participate in the disintegration, i.e., if any of
the links is made passable, no cut exists. The definitions of k-cuts and minimum k-cuts are then
similar. The difference between a k-cut and a minimum k-cut is demonstrated in Fig 1.
Algorithm
The proposed deterministic algorithm makes possible finding all disintegrations of a network
for a given number of links in a reasonable time without complete examination of the large
state space of the road network. This algorithm is able to examine all minimum k-cuts of the
given network under the predefined numbers of cut-set links and components or further
limitations.
To describe the algorithm, we use the standard notation in graph theory, namely G= (V,E)
denotes the graph representing the road network, where Vis a set containing all nodes and Eis
a set of all links. By a closed walk we mean the sequence of nodes and links
W¼v0;e1;v1;e2;. . . ;en;vn;
where v
i
2V,e
j
2Eand v
0
=v
n
. A cycle is a closed walk with at least three links where the nodes
and links appear only once except for the first and the last node.
The idea of the algorithm is as follows. Assume there is a link and its ending nodes. If a
cycle containing the link exists for the nodes, the nodes belong to the same component. Other-
wise, they belong to different components. Part of the cycle then indicates a detour. To the
best of our knowledge, no algorithm based upon searching for cycles (see below for a more
detailed description) has ever been used for an analysis of a disintegrated network.
We now provide a precise description of the algorithm using the following pseudocode. A
spanning tree T of an undirected graph Gis a special form of a subgraph with minimum possi-
ble number of links and all the nodes of G. The transformation of the graph into a spanning
tree is not a key part of our algorithm but enables to reduce the number of links in step 1
which the algorithm has to go through.
Input conditions:
graph Connected graph
maxLinks Integer number within interval [1, |E|] denotes the maximum number of links
in the found cut-sets.
maxComponents Integer number within interval [2, maxLinkss+1] denotes the maximum
number of components generated by the found cuts.
Algorithm 1: findMinimalCutSets(graph,maxLinks,maxComponents)
// initialization
global graph,maxLinks,maxComponents
global spanningTree =getSpanningTree(graph)
CS =;
Fig 1. An example of a cut and minimum cut for 3 interrupted links.
https://doi.org/10.1371/journal.pone.0219658.g001
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 5 / 18
// processing
for every link link2spanningTree do
CS =CS[findCutSets(1,;,link)
endfor
// filtering not minimal cut-sets
minCS =;
for every cut-set cs2CS do
if isMinimalCutSet(cs)do
minCS =minCS[{cs}
endif
endfor
return minCS
Algorithm 2: findCutSets(level,restrictedLinks,link)
restrictedLinks =restrictedLinks[link
foundCS =;
cycle =findShortCycle(link,restrictedLinks)
if cycle exists then
if |restrictedLinks|<maxLinks then
for every link c2cycle do
foundCS =foundCS[findCutSets(level,restrictedLinks,c)
endfor
endif
else
foundCS =foundCS[{restrictedLinks}
if |restrictedLinks|<maxLinks AND level+1<maxComponents do
for every link f2spanningTree\restrictedLinks do
foundCS =foundCS[findCutSets(level+1,restrictedLinks,f)
endfor
endif
endif
return foundCS
Algorithm 3: findShortCycle(link,restrictedLinks)
E0=E
graph
\restrictedLinks
G0= (V
graph
,E0)
// node v
1
and v
2
are both nodes of the link
node v1¼linkv1;node v2¼linkv2
path =findShortPath(G0,v
1
,v
2
)
return path
Algorithm 1 begins by determining all the cuts incorporating the links belonging to the
graph’s spanning tree (since all the cuts have to incorporate a spanning-tree link). The cuts
generated by more links (and containing the particular link) are then found by recursive calls
of the findCutSets (level,restrictedLinks,link) function (see Algorithm 2), which employs the
graph cycles to identify the links belonging to the searched cuts (since every link of a cut has to
reduce the number of cycles containing the link in the graph). If such a cycle is not available, a
cut-set determined by the restrictedLinks set has been found and the algorithm may continue
by looking for the cuts disjointing the graph into more components. Once all the cuts are
found, all the non-minimal cut-sets are filtered out (see the end part of the Algorithm 1).
Finally, we describe two auxiliary functions: the function findShortPath(G’,v
1
,v
2
)(see Algo-
rithm 3) finds a path between two nodes v
1
,v
2
using a graph algorithm which finds the shortest
path in the graph G0(we employ the breadth-first search algorithm), while the function get-
SpanningTreeLinks(Graph) computes the minimum spanning tree in graph Gand returns a
subset of links from Ewhich form the minimum spanning tree (employing Kruskal’s algo-
rithm for this purpose). A significant advantage of the algorithm is that it can be easily
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 6 / 18
prepared for a parallel implementation, because more computational threads can concurrently
process the links stored in the spanningTree set (Algorithm 1).
Fig 2 demonstrates how the algorithm works on a small network.
In the beginning of the process, a spanning tree of the original graph is generated. Since, in
general, a graph may have several spanning trees, any of them can be used for the computation.
There is a need to examine all the spanning tree links. One by one, links are inserted into the
Fig 2. The process of identification of a cut.
https://doi.org/10.1371/journal.pone.0219658.g002
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 7 / 18
set of restricted links. This step is illustrated with link Iin Fig 2. The shortest path between the
ending nodes of the link is found, different than just link I. The found path together with the
link forms a cycle. In the illustrative case from Fig 2, the cycle is {I,D,C}. In the next step, a
link from the shortest path is added to the restricted links set. Again, the shortest path is found
between the ending nodes of the newly added link. This time, the path must not contain any of
the links in the restricted links set {I,D}. For link D, the cycle {D,E,F} is found. The process
continues by adding another link to the restricted links set, until no path between its nodes
exists. At this moment, a cut-set is identified, which is identical with the set of restricted links
{I,D,E}.It is further demonstrated that the algorithm actually finds all the minimum k-cuts for
the given number of interrupted links. It is based on the proof for minimum cuts, i.e., the dis-
integration of a graph into two components. The characterization of the disintegration is the
non-existence of any path among the nodes in different components. This means that if two
nodes in different components were originally connected with a link, there is no alternative
path between them without the link. On the other hand, if two nodes lie in the same compo-
nent, there is an alternative path which together with the link forms a cycle. This does not
apply for dead-end links, however, where the cut appears right after interrupting the link.
When interrupting the links on cycles, we thus interrupt alternative paths between the nodes.
It is apparent in Fig 3 that by cutting the links on the cycles repeatedly, not only alternative
paths for nodes 3 and 4 are interrupted, but also for nodes 1 and 2, etc.
In the end, a minimum cut appears because no alternative path exists for any of the nodes
(nodes 1 and 2 in Fig 3). A cut which is not minimal can appear if, for instance, while searching
for all disintegrations caused by 5 interrupted links, the disintegration is caused only by 3 of
the interrupted links and none of the remaining two links causes separation of another
component.
The algorithm is applied recursively on the components which appear after the first run, in
order to obtain the minimum k-cuts.
Measure of network vulnerability
Our primary focus is on such events where a road network breaks up into several isolated
parts. We are therefore interested, in the first instance, in the number of people cut off from
the main network. These people can also be cut off from basic resources such as food, water
and medical treatment. It is natural in this case to expect that the worst-case scenario is repre-
sented by the state of the network after its disintegration into the maximum number of com-
ponents with the same number of people living within them. This means that the
disintegration of the network into 3 components with the same number of people is worse
than the disintegration into 2 components with the same number of people. This is due to the
fact that in the first case there is a need to ensure two entries into the components without
resources. The suitable loss function representing this vulnerability measure can be defined as
Fig 3. An example of cycles and their interruptions.
https://doi.org/10.1371/journal.pone.0219658.g003
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 8 / 18
follows:
F Gm
ð Þ ¼ ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
Pmþ1
i¼1ðPi hP2
m
sð1Þ
where mis the given number of interrupted links, m+1 is thus the maximal number of compo-
nents which the network can disintegrate into, G
m
is a graph with mdisrupted links, P
i
is the
number of people living with the i-th component and
hPi ¼ 1
mþ1X
mþ1
i¼1
Pi:
If there are only m’,m’ <m+1, components, then P
i
= 0 for i>m’. It is apparent that the
defined loss function satisfies the above-mentioned requirements.
The values of P
i
,i= 1,. . .,m+1, need not only represent the number of people. If we put P
i
equal to the number of nodes in i-th component, we obtain the disintegration of the network
into the components with ideally the same number of nodes which relates to the problem of
graph partitioning [81]. P
i
can also represent the demand or more generally the importance of
the i-th component.
This is not, however, the only way to define the vulnerability measure. The measures in
other papers can be used as well or new measures can be developed based upon the require-
ments of the contracting authorities. The measures affect the total time of computation but are
not incorporated into the algorithm. The process of evaluation of minimum k-cuts proceeds as
follows (assume minterrupted links):
1. Put j= 2
2. If jm+1 compute all minimum j-cuts and evaluate them using (1). The information about
the number of people in the particular components is found using the breadth-first search.
Put j=j+ 1 and repeat the step. Stop otherwise.
3. Order all evaluated minimum k-cuts.
Analysis of performance of the algorithm
In this section, the performance of the algorithm on the real network of the Zlı
´n region, which
consists of 990 links and 734 nodes, is demonstrated.
It is apparent that there is no possibility to evaluate all the combinations for larger number
of concurrently interrupted links. For many networks, the number of break-ups is, however,
much smaller. Table 1 provides a comparison of the number of break-ups and the number of
combinations of interrupted links.
The primary contribution of this paper is a proposal of a novel algorithm which is able to
efficiently find and evaluate network cuts with a predefined number of concurrently
Table 1. The state space for the Zlı
´n region.
Number of concurrently interrupted links Number of break-ups Number of all combinations of links Ratio
1 143990 0.14000
2 10,376 489,555 0.02000
3 510,220 161,226,780 0.00300
4 19,154,308 39,782,707,965 0.00048
This number indicates all dead-end links
https://doi.org/10.1371/journal.pone.0219658.t001
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 9 / 18
interrupted network links. The principal difference between the proposed algorithm and the
brute-force approach is the speed of the computation. Table 2 provides a comparison of the
brute-force algorithm with the algorithm employing the cycles approach (during the tests we
used 16 CPUs Intel Xeon E7 2.27 GHz, 150 GB RAM).
The shaded table cell represents an estimation of the expected running time of the brute-force
approach determining all the cuts generated by 4 interrupted links as it was impossible to mea-
sure it precisely. To compute the estimation, we use the number of combinations of 3 and 4 links
and the computational time for 3 links. It is apparent that it is impossible to evaluate the scenarios
with more than 3 concurrently interrupted links using the brute-force approach. In addition, the
Zlı
´n region ranks among the smallest ones in the Czech Republic (only approximately 1,000 road
links) and therefore computation of the same scenario for larger regions is not possible.
Results
In this section, we present the results from the application of the proposed algorithm under
various limitations for the Zlı
´n region (Czech Republic) with a population of 587,624 people.
Disintegration with limitations on the number of components and
interrupted links limited to the internal subnetwork
This section examines the internal disintegration of the network since actual networks are usu-
ally parts of a larger network (e.g., a network of a region is connected at its borders to the net-
work of the entire country). In order to prevent access to the isolated parts from neighboring
regions, we only admit interruption of internal links, i.e., the links which do not lie on the bor-
ders of the particular region.
All links which have to be open, in order to study the internal subnetwork, are marked. The
algorithm then omits all results related to the combinations of links containing at least one of
the marked links.
In the example we restrict our attention to the disintegrations of up to 5 components caused
by up to 4 links in the Zlı
´n region which seemed to be more interesting than other cases. The
results are summarized in Table 3. In Fig 4 we present the case which we consider most interest-
ing, i.e., which do not contain only a node with the largest population and the rest of the network.
Fig 4 represents the second worst-case scenario with 29,532 cut-off people (5.0%) after the
interruption of four links. The network disintegrates in this case into two components. It is
apparent that the case would be difficult to find without computers because it is not concen-
trated in the area with sparse road network.
Disintegration with limitations on the number of components, interrupted
links and the number of people living in nodes limited to the internal
subnetwork
This section assumes the same limitations as in the previous one but there is now only one
individual living in a node. The results provide us with more information about the spatial
Table 2. Duration of the computation for the Zlı
´n region.
Number of concurrently interrupted links Brute-force algorithm Algorithm–Cycles
1 1 s 1 s
2 30 s 14 s
3 10.25 hrs 4 min
4 105 days 11.5 hrs
https://doi.org/10.1371/journal.pone.0219658.t002
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 10 / 18
structure of the networks than the previous ones. The results concerning the worst-case sce-
narios can be found in Table 4 and Fig 5 under the requirement of the maximum number of 5
components and 4 links. Only the most interesting case from the visual point of view is
depicted here.
If we focus on the number of nodes as inputs into the loss function, the results will look dif-
ferent. The area of the inaccessible part of the network would be larger (see Fig 5) than those
only taking into account the number of inhabitants (Fig 4). In this case the results are much
more intuitive because they are concentrated in the areas with a sparse road network.
Discussion and conclusion
As can be seen in the examples above, the algorithm is able to compute the disintegration of
the network under various restrictions such as the number of components, the number of
interrupted links and the limitation on internal disintegrations. The loss function can also be
easily modified because P
i
can be understood as weights of components, which measure their
importance in the network.
Table 3. The worst-case scenarios for the Zlı
´n region.
Rank Number of components Value of the loss function Inhabitants in components Ratio of inhabitants cut off from the main component
1 2 245,391 555,800; 31,824 5.4%
2 2 246,616 558,092; 29,532 5.0%
3 2 247,323 559,410; 28,214 4.8%
4 3 247,384 559,779; 21,511; 6,334 4.7%
5 2 247,592 559,910; 27,714 4.7%
6 2 247,594 559,914; 27,710 4.7%
7 2 247,618 559,958; 27,666 4.7%
8 3 247,800 560,543; 20,747; 6,334 4.6%
9 2 248,280 561,190; 26,434 4.5%
10 2 248,301 561,228; 26,396 4.5%
https://doi.org/10.1371/journal.pone.0219658.t003
Fig 4. The second-worst-case scenario for the Zlı
´n region. A node diameter represents proportionally the number of inhabitants.The worst scenario is not
shown here because it is represented by only one cut-off node, the center of the city of Zlı
´n. This case is more illustrative.
https://doi.org/10.1371/journal.pone.0219658.g004
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 11 / 18
To exemplify all the properties of the algorithm and to justify the used number of inter-
rupted links we took data from the Zlı
´n region for 917 days which indicate that the probability
of occurrence of a scenario, when four and more road links are concurrently interrupted, is
20% (see Fig 6). These closures were results of various causes, e.g., traffic accidents, planned
road maintenance, as well as local road disruptions due to partial flooding.
The vast majority (87%) of break-up scenarios are caused by interruptions of dead-end
links and their combinations. The algorithm is also able, however, to find combinations of the
links, which are only involved in hundreds of break-ups (see Fig 7).
To demonstrate the necessity of a new fast algorithm we indicated the comparison of the
computation time of our algorithm and the brute-force algorithm. As we have presented, the
algorithm represents a significant improvement in the computation of network disintegra-
tions. The proposed algorithm was able to compute all the break-ups over 11.5 hours com-
pared with 105 days for the brute-force algorithm (see Table 3).
Despite the ability of the algorithm to noticeably reduce the state space, it nevertheless has
to analyze a vast number of combinations which have to be evaluated and saved. The
Table 4. The worst-case scenarios for the Zlı
´n region.
Rank Number of components Value of the loss function Number of nodes
in components
Ratio of nodes cut off the main component
1 2 304.8 691; 43 5.9%
2 2 305.3 692; 42 5.7%
3 3 305.8 693; 38; 3 5.6%
4 3 305.8 693; 38; 3 5.6%
5 3 305.8 693; 38; 3 5.6%
6 3 305.8 693; 38; 3 5.6%
7 3 305.8 693; 38; 3 5.6%
8 3 305.8 693; 38; 3 5.6%
9 2 305.9 693; 41 5.6%
10 2 305.9 693; 41 5.6%
https://doi.org/10.1371/journal.pone.0219658.t004
Fig 5. The second-worst-case scenario for the Zlı
´n region. This network disintegration leaves 42 from the 731 nodes (5.7%) out ofconnection.
https://doi.org/10.1371/journal.pone.0219658.g005
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 12 / 18
disadvantage can be compensated by the fact that we can compare the current state of a net-
work with all the combinations of interrupted links causing a break-up computed beforehand.
In real time we can consequently obtain an alert if a worst-case scenario might occur in the
Fig 6. Histogram shows the number of concurrently interrupted links in the Zlı
´n region and their frequencies for
917 days over the years 2014–2016.
https://doi.org/10.1371/journal.pone.0219658.g006
Fig 7. Road links ranked downwards according to frequency of interruptions andthe frequency of their
occurrence in break-ups. The links which cause the worst break-ups only participate in hundreds of cases.
https://doi.org/10.1371/journal.pone.0219658.g007
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 13 / 18
network. We can also identify the links which have to be preserved as operational in order to
avoid certain forms of traffic collapse. The links are not usually the same ones as in the worst-
case scenarios but can still have a large impact on the network. The principal advantage of our
algorithm is its deterministic nature. This means that it is able to precisely identify all the pos-
sible scenarios, unlike the stochastic approaches. The suggested approach can only be applied
to network of a sufficient size. Despite the fact that it is able to identify all the break-ups, many
combinations exist for larger networks and therefore there is also a certain limit related to
computer performance. This limitation could be overcome using a stochastic approach.
We have further introduced a vulnerability measure based on the number of isolated people
as a loss function which evaluates the impact of a given combination of interrupted links on
the network (Results section). This approach shall be used during events which result in the
disintegration of the network or in the phases of planning for the worst case scenarios. Addi-
tional measures evaluating the actual state of the network can be used as well. Several other
vulnerability measures can also be used.
The main aim of the paper was to introduce a novel algorithm for computation of mini-
mum k-cuts for a given number of interrupted links. This was the reason why we restricted
our attention to the relatively simple vulnerability measure which can cover only several
aspects of the impact of an event. It could be interesting in the next phase of the research to
employ other vulnerability measures and analyze the disintegration of the network from the
point of view of accessibility and connectivity.
This work adds to the current state of the art:
1. It introduces a new deterministic algorithm based upon the searching for the shortest cycles
in order to identify all break-ups of a given network which are further evaluated by a vul-
nerability measure. It is demonstrated that this algorithm is much faster than any brute-
force algorithm.
2. The algorithm represents an alternative approach to the lower and upper estimates of trans-
portation network vulnerability ([54]) and spectral analysis ([5]). Compared to these
papers, we are able to compute the precise value of a vulnerability measure and all the
break-ups for a given number of interrupted links.
3. The algorithm is also able to provide results for large transportation networks correspond-
ing to administrative units in reasonable time (compare to [20]).
Based on the arguments above, we believe that the incorporation of the algorithm into an
online warning system as a tool for decision makers will have a significant positive impact on
transportation security and could contribute to early warning before states of emergency.
Supporting information
S1 File. Data. An archive file with the program. It contains all the code files in java, libraries
used and the Zlı
´n region network files.
(ZIP)
Acknowledgments
The access to the CERIT-SC computing and storage facilities provided under the program
Center CERIT Scientific Cloud, part of the Operational Program Research and Development
for Innovations, reg. no. CZ.1.05/3.2.00/08.0144 is greatly appreciated. We would further like
to thank M. Moris
ˇfor consultation on algorithms and J. Sedonı
´k for help with preparation of
the figures.
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 14 / 18
Author Contributions
Conceptualization: Michal
´l, Toma
´s
ˇRebok, Petr Hline
ˇny
´.
Data curation: Zuzana Křiva
´nkova
´, Jan Kubeček.
Funding acquisition: Michal
´l.
Investigation: Michal
´l.
Methodology: Rostislav Voda
´k, Toma
´s
ˇRebok, Petr Hline
ˇny
´.
Project administration: Michal
´l.
Resources: Michal
´l.
Software: Toma
´s
ˇSvoboda.
Writing original draft: Rostislav Voda
´k, Michal
´l, Zuzana Křiva
´nkova
´.
Writing review & editing: Rostislav Voda
´k, Michal
´l, Zuzana Křiva
´nkova
´.
References
1. Berdica K. An introduction to road vulnerability: what has been done, is done and should be done.
Transport Policy. 2002; 9: 117–127.
2. Taylor MAP, Sekhar SVC and D’Este GM. Application of Accessibility Based Methods for Vulnerability
Analysis of Strategic Road Networks. Networks and Spatial Economics. 2006; 6: 267–291.
3. Sohn J. Evaluating the significance of highway network links under flood damage: An accessibility
approach. Transportation Research Part A: Policy and Practice. 2006; 40: 491–506.
4. Taylor MAP. Critical transport infrastructure in urban areas: impacts of traffic incidents assessed using
accessibility-based network vulnerability analysis. Growth Change. 2008; 39(4): 593–616.
5. Bell MGH, Kuaruchi F, Perera S, Wong W. Investigating transport network vulnerability by capacity
weighted spectral analysis. Transp. Res. Part B. 2017; 99: 251–266.
6. Mattsson LG, Jenelius E. Vulnerability and resilience of transport systems–A discussion of recent
research. Transportation Research Part A: Policy and Practice. 2015; 81: 16–34.
7. Michael-Leiba M, Baynes F, Scott G, Granger K. Regional landslide risk to the Cairns community. Natu-
ral Hazards. 2003; 30(2): 233–249.
8. Jaiswal P, van Westen CJ, Jetten V. Quantitative assessment of landslide hazard along transportation
lines using historical records. Landslides. 2011; 8(3): 279–291.
9.
´l M, Kubeček J, Andra
´s
ˇik R. An epidemiological approach to determining the risk of road damage due
to landslides. Natural Hazards 2014; 73(3): 323–1335.
10. Bell MGH, Cassir C, Iida Y, Lam WHK. A sensitivity based approach to network reliability assessment.
Proceedings of the 14th International Symposium on Transportation and Traffic Theory. Pergamon,
Oxford. 1999; 283–300.
11. Qiao WX, Lu Y, Xiong CF, Haghani A. A game theory approach for the measurement of transport net-
work vulnerability from the system prospective. Transportmetrica B: Transport Dynamics. 2004; 2(3):
188–202.
12.
´l M, Voda
´k R, Kubeček J,
´lova
´M, Sedonı
´k J. Evaluating road network damage caused by natural
disasters in the Czech Republic between 1997 and 2010. Transportation Research Part A: Policy and
Practice. 2015; 80: 90–103.
13. Dalziell EP, Nicholson AJ. Risk and impact of natural hazards on a road network. ASCE Journal of
Transportation Engineering. 2001; 127(2): 159–166.
14. Jenelius E, Pettersen T, Mattson LG. Importance and exposure in road network vulnerability analysis.
Transportation Research Part A: Policy and Practice. 2006; 40: 537–560.
15. Jansuwan S, Chen A. Considering Perception Errors in Network Efficiency Measure: An Application to
Bridge Importance Ranking in Degradable Transportation Networks. Transportmetrica A: Transport Sci-
ence. 2015; 11(9): 793–818.
16. Kim S, Yeo H. Evaluating link criticality of road network based on the concept of macroscopic funda-
mental diagram. Transportmetrica A: Transport Science. 2017; 12(2): 162–193.
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 15 / 18
17. Iida Y, Wakabayashi H. An approximation method of terminal reliability of road network using partial
minimal path and cut set. Proceedings of the Fifth World Conference on Transport Research.Yoko-
hama, Japan. 1989;4: 367–380.
18. Du ZP, Nicholson AJ. Degradable transportation systems: sensitivity and reliability analysis, Transpor-
tation Research B: Methodological. 1997; 31(3): 225–237.
19. Chen BY, Lam WHK, Sumalee A, Li Q, Li ZC. Vulnerability analysis for large-scale and congested road
networks with demand uncertainty. Transportation Research Part A: Policy and Practice. 2012; 46:
501–516.
20. Wang DZW, Liu H, Szeto WY, Chow AHF. Identification of critical combination of vulnerable links in
transportation networks–a global optimisation approach. Transportmetrica A: Transport Science. 2016;
12(4): 346–365.
21. Chen A, Yang H, Lo HK, Tang WH. Capacity Reliability of a Road Network: An Assessment Methodol-
ogy and Numerical Results. Transportation Research Part B: Methodological. 2002; 36(3): 225–252.
22. Knoop VL, Snelder M, van Zuylen HJ, Hoogendoorn SP. Link-level vulnerability indicators for real-world
networks. Transportation Research Part A: Policy and Practice. 2012; 46: 843–854.
23. Murray AT, Matisziw TC, Grubesic TH. A methodological overview of network vulnerability analysis.
Growth Change. 2008; 39(4): 573–592.
24. de Oliveira EL, Portugal LD, Junior W. Indicators of reliability and vulnerability: Similarities and differ-
ences in ranking links of a complex road system. Transportation Research Part A: Policy and Practice.
2016; 88: 195–208.
25. Crucitti P, Latora V, Porta S. Centrality measures in spatial networks of urban streets. Physical Review
E. 2006; 73: 1–5.
26. Scott DM, Novak DC, Aultman-Hall L, Guo F. Network Robustness Index: A new method for identifying
critical links and evaluating the performance of transportation networks. Journal of Transport Geogra-
phy. 2006; 14: 215–227.
27. Jenelius E. Network structure and travel patterns: explaining the geographical disparities of road net-
work vulnerability. Journal of Transport Geography. 2009; 17: 234–244.
28. Chen A, Yang C, Kongsomsaksakul S, Lee M. Network-based Accessibility Measures for Vulnerability
Analysis of Degradable Transportation Networks. Networks and Spatial Economics. 2007; 7: 241–256.
29. Matisziw TC, Murray AT. Modeling s-t path availability to support disaster vulnerability assessment of
network infrastructure. Computers and Operations Research. 2009; 36: 16–26.
30. Hong-ying Y, Li-gun X. Measuring the Structural Vulnerability of Road Network: A Network Efficiency
Perspective. J. Shanghai Jiaotong Univ. (Sci.). 2010; 15(6): 736–742.
31. Sullivan JL, Novak DC, Aultman-Hall L, Scott DM. Identifying critical road segments and measuring sys-
tem-wide robustness in transportation networks with isolating links: A link-based capacity-reduction
approach. Transportation Research Part A: Policy and Practice. 2010; 44:323–336.
32. Watling D, Milne D, Clark S. Network impacts of a road capacity reduction: Empirical analysis and
model predictions. Transportation Research Part A: Policy and Practice. 2012; 46: 167–189.
33. Novak DC, Sullivan JL. A link-focused methodology for evaluating accessibility to emergency services.
Decision Support Systems. 2014; 57: 309–319.
34. Peeta S, Salman FS, Gunnec D, Viswanath K. Pre-disaster investment decisions for strengthening a
highway network. Computers and Operations Research. 2010; 37: 1708–1719.
35. Reggiani A. Network resilience for transport security: Some methodological considerations. Transport
Policy. 2013; 28: 63–68.
36. Bell MGH. The use of game theory to measure the vulnerability of stochastic networks. IEEE Transac-
tions on Reliability. 2003; 52(1): 6368.
37. Igor M, Filiposka S, Gramatikov S, Trajanov D, Kocarev L. Game Theoretic Approach for Discovering
Vulnerable Links in Complex Networks. In Sobh T, Elleithy K Mahmood A (eds). Novel Algorithms and
Techniques in Telecommunications and Networking. 2010; 211–216.
38. Berdica K, Mattsson LG. Vulnerability: A Model-based Case Study of the Road Network in Stockholm.
In: Murray AT, Grubesic TH (eds). Critical Infrastructure: Reliability and Vulnerability. Advances in Spa-
tial Science. Springer, Berlin, Heidelberg. 2007; 81–106.
39. Jenelius E. User Inequity Implications of Road Network Vulnerability. Journal of Transport and Land
Use. 2010; 2(3): 57–73.
40. Jenelius E, Cats O. The Value of New Public Transport Links for Network Robustness and Redundancy.
Transportmetrica A: Transport Science. 2015; 11(9): 819–835.
41. Nagurney A, Qiang Q. Fragile Networks: Identifying Vulnerabilities and Synergies in an Uncertain
World. Hoboken, NJ. John Wiley & Sons. 2009.
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 16 / 18
42. Ortigosa J, Menendez M. Traffic Performance on Quasi-grid Urban Structures. Cities. 2014; 36: 18–27.
43. Snyder L, Daskin M. Models for Reliable Supply Chain Network Design. In: Murray AT, Grubesic TH.
(eds). Critical Infrastructure: Reliability and Vulnerability. Advances in Spatial Science. Springer, Ber-
lin, Heidelberg. 2007; 257–289.
44. Taylor MAP, D’Este GM. Transport Network Vulnerability: A Method for Diagnosis of Critical Locations
in Transport Infrastructure Systems. In: Murray AT, Grubesic TH (eds). Critical Infrastructure: Reliability
and Vulnerability. Advances in Spatial Science. Springer, Berlin, Heidelberg. 2007; 9–30.
45. Taylor MAP, Susilawati S. Remoteness and accessibility in the vulnerability analysis of regional road
networks. Transportation Research Part A: Policy and Practice. 2012; 46(5): 761–771. https://doi.org/
10.1016/j.tra.2012.02.008
46. Taylor MAP. Vulnerability Analysis for Transportation Networks. Elsevier. Amsterdam, Netherlands.
2017.
47. D’Este GM, Taylor MAP. Network vulnerability: an approach to reliability analysis at the level of national
strategic transport networks. In: Iida Y, Bell MGH (eds). The Network Reliability of Transport. Perga-
mon-Elsevier, Oxford, 2003; 23–44.
48. Taylor MAP, D’Este GM. Critical infrastructure and transport network vulnerability: developing a method
for diagnosis and assessment. In: Proceedings of Second International Symposium on Transportation
Network Reliability. Christchurch and Queenstown, New Zealand. 2004; 96–102.
49. Bono F, Gutie
´rez E. A network-based analysis of the impact of structural damage on urban accesibility
following a disaster: the case of the seismically damaged Port Au Prince and Carrefour urban road net-
works. Journal of Transport Geography. 2011; 19: 1443–1455.
50. Chang SE, Nojima N. Measuring post-disaster transportation system performance: the 1995 Kobe
earthquake in comparative perspective. Transportation Research Part A: Policy and Practice. 2001; 35:
475494.
51. Jenelius E, Mattsson LG. Road network vulnerability analysis of area-covering disruptions: A grid-
based approach with case study. Transportation Research Part A: Policy and Practice. 2012; 46(5):
746–760.
52. Latora V, Marchiori M. How the science of complex networks can help developing strategies against ter-
rorism. Chaos, Solitons and Fractals. 2004; 20: 69–75.
53. Wang S, Hong L, Ouyang M, Zhang J, Chen X. Vulnerability analysis of interdependent infrastructure
systems under edge attack strategies. Safety Science 2013; 51: 328–337.
54. Xu X, Chen A, Yang C. An optimization approach for deriving upper and lower bounds of transportation
network vulnerability under simultaneous disruptions of multiple links. Transportation Research Part C.
2018; 94: 338–353.
55. Bell MGH. A game theory approach to measuring the performance reliability of transport networks,
Transp. Res. Part B. 2000; 34(6): 533–545.
56. Bell MGH, Cassir C. Risk-averse user equilibrium traffic assignment: an application of game theory.
Transp. Res. Part B. 2002; 36: 671–681.
57. Szeto WY, O’Brien L, O’Mahony M. Generalisation of risk averse traffic assignment. In: Allsop RE, Bell
MGH, Heydecker BG (eds). Transportation and Traffic Theory. Elsevier Science, Amsterdam. 2007;
127–153.
58. Nicholson A, Du ZP. Degradable transportation systems: an integrated equilibrium model. Transp. Res.
Part B. 1997; 31(3): 209–223.
59. Luathep P, Sumalee A, Ho HW, Kurauchi F. Large-scale road network vulnerability analysis: a sensitiv-
ity analysis based approach. Transportation. 2011; 38(5): 799–817.
60. Burlet M, Goldschmidt O. A new and improved algorithm for the 3-cut problem. Operations Research
Letters. 1997; 21: 225–227.
61. Nagamochi H, Ibaraki T. A fast algorithm for computing minimum 3-way and 4-way cuts. Mathematical
Programming, Ser. A. 2000; 88: 507–520.
62. Nagamochi H, Katayama S, Ibaraki T. A faster algorithm for computing minimum 5-way and 6-way cuts
in graphs. Journal of Combinatorial Optimization. 2000; 4: 151–169.
63. Dinitz EA, Karzanov AV, Lomonosov MV. On the structure of a family of minimum weighted cuts in a
graph. In: Fridman AA (Ed.). Studies in Discrete Optimization. 1976; 290–306. Nauka, Moscow, Original
article in Russian, English translation from www.loc.gov or www.nrc.ca/cisti
64. Kamidoi Y, Wakabayashi S, Yoshida N. A divide-and-conquer approach to the minimum k-way cut prob-
lem. Algorithmica. 2002; 32: 262–276.
65. Reinelt G, Wenger KM. Generating partitions of a graph into a fixed number of minimum weight cuts.
Discrete Optimization. 2010; 7: 1–12.
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 17 / 18
66. Papadimitriou CH, Steiglitz K. Combinatorial Optimization: Algorithms and Complexity. Prentice-Hall,
Englewood Cliffs, NJ. 1982.
67. Spielman DA. Spectral Graph Theory. 2015. http://www.cs.yale.edu/homes/spielman/561/.
68. Tsiatas A, Saniee I, Narayan O, Andrews M. Spectral analysis of communication networks using Dirich-
let eigenvalues. Proceedings of the 22nd International Conference on World Wide Web. ACM.
2013:1297–1306.
69. Ma YY, Chiu YC, Yang XG. Urban traffic signal control network automatic partitioning using laplacian
eigenvectors. 12
th
International IEEE Conference on Intelligent Transportation Systems. 2009: 1–5.
70. Martinez S, Chatterji G., Sun D, Bayen AM. A weighted-graph approach for dynamic airspace configura-
tion. Proceedings of the AIAA Conference on Guidance, Navigation and Control (GNC). American Insti-
tute of Aeronautics and Astronautics. 2007.
71. Louail T, Lenormand M, Picornell M, Cantu
´OG, Herranz R, Frias-Martinez E, et al. Uncovering the spa-
tial structure of mobility networks. Nature communications. 2015;6.
72. Gallotti R, Barthelemy M. The Multilayer Temporal Network of Public Transport in Great Britain, Scien-
tific Data. 2015; 2. https://doi.org/10.1038/sdata.2014.56 PMID: 25977806
73. Lenormand M, Louail T, Cantu
´-Ros OG, Picornell M, Herranz R, Arias J M, et al. Influence of sociode-
mographic characteristics on human mobility. ArXiv. 2014;1411.7895v1.
74. Lenormand M, Picornell M, Cantu
´-Ros OG, Tugores A, Louail T, Herranz R, et al. Cross-checking differ-
ent sources of mobility information. PLoS One. 2014; 9(8): e105184. https://doi.org/10.1371/journal.
pone.0105184 PMID: 25133549
75. Gottlich S, Klar A. Modeling and Optimization of Scalar Flows on Networks. In: Ambrosio L, Bressan A,
Helbing D, Klar A, Zuazua E. Modelling and Optimisation Of Flows On Networks. Cetraro, Italy.
2009;2062: 395–461.
76. Lammer S, Kori H, Peters K, Helbing D. Decentralised control of material or traffic flows in networks
using phase-synchronisation. Physica A: Statistical Mechanics and its Applications. 2006; 363(1): 39–
47.
77. Helbing D. Order and disorder in traffic and self-driven many-particle systems. In: Boccaletti S, Gluck-
man BJ, Kurths J, Pecora LM, Spano ML. Experimental Chaos. 2002; 622: 239–250.
78. Traffic Helbing D. and related self-driven many-particle systems. Reviews of Modern Physics. 2001; 73
(4): 1067–1141.
79. Treiber M, Hennecke A, Helbing D. Congested traffic states in empirical observations and microscopic
simulations. Physical Review E. 2000; 62(2): 1805–1824.
80. Kurauchi F, Uno N, Sumalee A, Seto Y. Network evaluation based on connectivity vulnerability. In: Lam
HK, Wong SC, Lo HK (eds). Transportation and Traffic Theory 2009: Golden Jubilee. Springer. 2009;
637–649.
81. Garey MR, Johnson DS, Stockmeyer L. Some Simplified NP-Complete Graph Problems. Theoretical
Compuer Science. 1976; 1: 237–267.
Critical links in networks
PLOS ONE | https://doi.org/10.1371/journal.pone.0219658 July 17, 2019 18 / 18
... Where possible, we compared the results of the algorithms based on the previously mentioned heuristics with the results of the parallelized deterministic algorithm (PDA) (Vodák et al., 2019). This algorithm is based on a process of removing cycles from the network and was developed for searching and evaluating the disintegrations of the network. ...
... Some measures only pay attention to the topology of the network (Ellens and Kooij, 2013). Others include further information such as traffic flow (Sohn, 2006), capacities of links (Sullivan et al., 2010;Watling et al., 2012), the number of people living in nodes (Vodák et al., 2019), the presence of important facilities in nodes (Novak and Sullivan, 2014), etc. ...
... At the same time, due to the large number of interrupted links and used heuristics, the loss function should be evaluated as rapidly as possible. We therefore decided to use the simple loss function (also see Vodák et al., 2019): ...
Article
Full-text available
The identification of a combination of links which can cause the gravest impact on network performance, when interrupted simultaneously, is of great practical importance. The links can be spatially dispersed due to an event such as an earthquake or due to a combination of accidents and disasters. This task is, thus, extremely computationally demanding when applied to real-world networks. We focused on approaches which are both capable of accomplishing this task and where the computational time is acceptable for application in practice. We tested three algorithms based on known heuristic methods: Simulated Annealing (SA), Guided Local Search (GLS) and Variable Neighborhood Search (VNS). The algorithms were modified in the sense of adjusting the searching neighborhood. All the algorithms were subsequently applied to four actual road networks in order to evaluate the impacts of complete simultaneous blockage of four and ten links. The results suggest that the modified SA algorithm identified scenarios with worse consequences than the algorithms based on GLS and VNS. The SA results, for the setting with four interrupted links, were even comparable with those obtained from a deterministic algorithm (which evaluates the entire state space). The algorithm based on SA was also performing best for situations with ten concurrently blocked links. The approach based on SA is thus suitable when modeling the potential impacts of events where a large number of concurrently blocked links is expected. Network managers will thus be able to monitor the immediate state of the network and potential risks related to network disintegration.
... It uses the change of the total network capacity as an evaluation measure. Vodák et al. [11] introduced a rapid deterministic algorithm for identification of the most critical links which are capable of causing network disruptions. Feng et al. [12] proposed a novel identification method of critical roads based on the combination of GPS trajectory data and directed weighted complex network. ...
Article
Full-text available
In urban stochastic transportation networks, there are specific links that hold great importance. Disruptions or failures in these critical links can lead to reduced connectivity within the road network. Under this circumstance, this manuscript proposed a novel identification of critical links mathematical optimization model based on the optimal reliable path with consideration of link correlations under demand uncertainty. The method presented in this paper offers a solution to bypass the necessity of conducting a full scan of the entire road network. Due to the non-additive and non-linear properties of the proposed model, a modified heuristic algorithm based on K-shortest algorithm and inequality technical is presented. The numerical experiments are conducted to show that improve a certain road link may not necessarily improve the overall traffic conditions. Moreover, the results indicate that if the travel time reliability is not considered, it will bring errors to the identification of key links.
... The proposed method was an integrated Geographic Information System (GIS) and Multi-Criteria Decision Making (MCDM) approach to sort data, identify evaluation criteria and rank links using the Analytic Hierarchy Process (AHP) technique. Vodák et al. (2019) introduced a deterministic algorithm designed to identify the most critical links within the network. The proposed algorithm was centered on the search for the shortest cycles and introduced a measure based on standard deviation to assess the vulnerability of a link. ...
... The underlying idea is that the critical links of a network should be the links whose failures will decrease its robustness in the face of perturbations [20], [21]. In recent years, many researchers have applied network theories to detect critical links in transportation networks by investigating the networks' performance such as the overall travel cost [22], the total demand losses [23], decreased network capacity [24], etc. ...
Article
Full-text available
In an airway network, some critical links exist that are vital for the structural integrity and performance of the network. The detection of such links may assist with improving the imbalance between the limited airspace capacity and the ever-increasing traffic demand, which elicit flight delays, significant economic losses, etc. However, it is challenging to identify such links as they evolve (both in space and time) with changing traffic flow dynamics. This paper proposes a complex network approach for spatial-temporal critical links detection in a given airway network. First, flight track data is employed to characterize the airway network as weighted spatial-temporal networks. Then edge centrality and network percolation metrics are adopted to detect the critical links in each snapshot of the spatial-temporal networks. Afterward, the critical links detected by the two metrics are spatially overlapped to determine the final critical links over time. To examine the operational validity of the proposed method, we carry out a case study on the Southeast Asia airway network derived from one-month flight track data. Results demonstrate that the spatial distribution of the critical links varies over different traffic scenarios, and most of the identified critical links are found in the transition sectors with complex traffic situations. Four links, which are parts and at crosses of major trunk airways connecting to major navigation aids (VOR/DME) in the studied network, appear highly in all examined traffic scenarios. The unavailability of such links may lead to traffic flow disruptions. Observations by subject matter experts from air-traffic data visualizations demonstrate that the complex network-based methods can dynamically identify airway links that are operationally critical under time-evolving air-traffic scenarios. With good traffic flow prediction tools in the future, this method can be adopted to predict critical links in airway networks to better assist controllers in real-time air traffic management.
... Vodák, Bíl [30] developed a deterministic algorithm to find the most crucial links in the network. Their algorithm, instead of searching the whole network, just searches for the shortest cycles. ...
Article
Full-text available
Traffic congestion is one of the main reasons for the unsustainability of an urban transportation network. Changes in travel demand and streets' capacity lead to traffic congestion in urban transportation networks, which is known as recurrent traffic congestion. This study aims to assess the performance reliability of urban transportation networks subject to recurrent traffic congestion conditions in order to help travelers to find alternative non-congested routes. A non-congested route is a route without any congested link. The network reliability is defined and modeled as two different scenarios; users' unawareness of the network's traffic congestion and users' ongoing awareness of the network's traffic congestion. In addition, a reliable network design model is provided to optimize the reliability of the network taking into account street widening policy and budget constraints. Lastly, a Quantum-Inspired Evolutionary Meta-Heuristic Algorithm is adopted; while maintaining accuracy, to reduce problem-solving time and providing the possibility of solving large-scale problems for real networks. To show the applicability of the proposed models and algorithm, they have been implemented on the Sioux Falls transportation network. The results indicate users' awareness of traffic congestion in the network increases its reliability, and centrally located links are the first candidates for street widening.
... (4) Existing studies have mainly focused on approaches for the identification of critical links in potential breakups such as from disasters (Sohn 2006;Kim and Yeo 2017;Vodák et al. 2019;Yang et al. 2016a, b;Wang et al. 2020). We found that there would be a sudden change in network functions with a continuous increase in precipitation intensity. ...
Article
Full-text available
With worsening global climate change, we still do not fully understand how to cope with possible extreme precipitation events or secondary disasters on highway networks. Correctly estimating the impact on the highway network from extreme precipitation plays a vital role in decision making regarding future highway investment. This study uses datasets from 21 NASA Earth Exchange Global Daily Downscaled Projections (NEX-GDDP) under the RCP (Representative Concentration Pathway) 4.5 and RCP8.5 scenarios. We use the percentile method to select the extreme precipitation threshold. A set of system performance measures for an impact analysis of Chinese highways under different scenarios is developed from the perspectives of physical exposure, network function and sensitivity analyses for high-impact areas in China. The results show that the intensity of extreme precipitation will increase in the future. More than 10,000 km and at least 4,000 intersections will be affected by extreme precipitation in 2030 and 2050. Based on a functional analysis of the highway network in Guangdong and Guangxi, more than 80% of the mileage of highways in Guangdong and Guangxi will be exposed to extreme precipitation. The network function of Chinese highways will dramatically decrease when precipitation reaches a critical value, which will shed light on highway fortification standards and planning.
... For example, Rehak et al. [145] introduced the cascading impact assessment method (CIA) to identify the most critical links. Vodak et al. [146] studied the criticality by formulating a rapid deterministic algorithm. Furthermore, Zhang et al. [134] focused on characteristics that are highly correlated for traffic flow in order to create a verification method, capable of specifying the most critical links in road network. ...
Article
Full-text available
Road networks are considered as one of the most important transport infrastructure systems , since they attain the economic and social prosperity of modern societies. For this reason, it is vital to improve the resiliency of road networks in order to function normally under daily stressors and recover quickly after natural disasters such as an earthquake event. In the last decades, vulnerability assessment studies for road networks and their assets gained great attention among the research community. This literature review includes a brief introduction about seismic vulnerability assessment, followed by the roadway assets damage and their damage states, and then the main typologies for the vulnerability assessment of roadway assets. Moreover, it focuses on available assessment methods, which were proposed to quantify the vulnerability of road networks and its assets. These methods are divided into two main categories, physical and traffic-based approaches. Methods based on fragility functions and vulnerability indexes were investigated in physical approach for roadways and its assets. On the other hand, accessibility and link importance index were explored in traffic-based approach for road networks. This paper reviews and comments the most common vulnerability assessment methods for road networks and its assets and points out their advantages and disadvantages. The main gaps and needs are identified and recommendations for future studies are provided.
... Second, the exposure of road networks to such events is investigated. Results aid in the identification of critical links within the network system that are highly susceptible to such disruptions (Vodák et al., 2019;Gauthier et al., 2018). Third, impacts resulting from the interruption of critical links are assessed. ...
Thesis
Full-text available
Road infrastructure networks are complex interconnected systems that serve as vital backbones of society. Therefore, upholding traffic safety and fluidity as well as network availability is of core importance, with implications derived therefrom affecting many spheres of life. In the face of climate change, extreme weather events are expected to increase in both intensity and frequency. Hence, ensuring reliability and resilience of road infrastructure is of particular importance during periods of inclement weather, since these conditions exert amplified strain to both infrastructure assets and traffic participants. In this thesis, selected aspects related to the impacts of adverse weather on road infrastructure networks in the Alps are analyzed using a data-driven approach. One statistical peculiarity that emerges across the multifaceted research aspects under consideration is that the quantities of interest, which are usually the target variables considered in statistical models, are related to extreme events. While extreme events are seldom by nature, they contain important information that is essential for any statistical analysis. This thesis comprises six articles on statistical modeling of extreme events, natural hazards and imbalanced data sets in the context of Alpine road networks. Four main research aspects are investigated. First, spatial and temporal uncertainties of road safety data are analyzed. Numerical and graphical illustrations reveal distinct patterns that emerge with respect to accident time and location, thereby highlighting the uncertainties inherent to commonly used data sources. Second, a comparative assessment framework for different approaches to extreme value analysis is proposed. Its core element is a novel model performance metric specifically tailored to the upper tail of the extreme value distribution, which may support diagnosis of the extreme value series. Third, landslide-transport network interactions in a changing climate are assessed in a quantitative way. On the one hand, this is achieved by investigating the development of potentially landslide-triggering rainfall events throughout the 21st century. On the other hand, the societal impacts of road network interruptions are analyzed by means of agent-based traffic simulation. The approach uses network interruptions based on a susceptibility map derived from historic landslide event data and geophysical properties of the area under consideration. Fourth, the potential of using high-resolution road safety data for accident prediction modeling is investigated. The major challenge of dealing with an extremely imbalanced data set was overcome by combining synthetic minority oversampling and maximum dissimilarity undersampling. Subsequently, a number of different machine learning classifiers were applied and contrasted with respect to their predictive performance. While statistical applications are demonstrated on the nexus between transportation and natural hazards, methodological innovations and approaches presented in this thesis are naturally transferable to various other domains of research beyond a geosciences context.
Article
Full-text available
A common argument for introducing new links or services to transport networks is that they will contribute to greater capability to withstand system breakdowns. This paper presents a methodology for assessing the value of new links for public transport network robustness, considering disruptions of other lines and links as well as the new links themselves. The value is evaluated in terms of passenger welfare under disruptions and can be compared to traditional welfare benefits and investment costs. Distinction is made between the value of robustness, defined as the change in welfare during disruption compared to the baseline network, and the value of redundancy, defined as the change in welfare losses due to disruption. The paper introduces the total values of robustness and resilience by considering a full space of scenarios and their respective frequencies. Using a model that considers passengers' dynamic travel choices, stochastic traffic conditions, timetables and capacity constraints, results are more nuanced than analyses based only on network topology and other static attributes. A new cross-radial light rail transit line in Stockholm, Sweden is evaluated. The new link increases welfare levels under all scenarios and has a positive value of robustness. However, disruption costs increase under some scenarios and the value of redundancy is negative. In general, the value of redundancy depends on the new link's role as complement or substitute and passengers' ability to utilize spare capacity during short-term unexpected disruptions.
Article
Full-text available
This paper aims to develop an optimization approach for deriving the upper and lower bounds of transportation network vulnerability under simultaneous disruptions of multiple links without the need to evaluate all possible combinations as in the enumerative approach. Mathematically, we formulate the upper and lower bounds of network vulnerability as a binary integer bi-level program (BLP). The upper-level subprogram maximizes or minimizes the remaining network throughput under a given number of disrupted links, which corresponds to the upper and lower vulnerability bounds. The lower-level subprogram checks the connectivity of each origin-destination (O-D) pair under a network disruption scenario without path enumeration. Two alternative modeling approaches are provided for the lower-level subprogram: the virtual link capacity-based maximum flow problem formulation and the virtual link cost-based shortest path problem formulation. Computationally, the BLP model can be equivalently reformulated as a single-level mixed integer linear program by making use of the optimality conditions of the lower-level subprograms and linearization techniques for the complementarity conditions and bilinear terms. Numerical examples are also provided to systematically demonstrate the validity, capability, and flexibility of the proposed optimization model. The vulnerability envelope constructed by the upper and lower bounds is able to effectively consider all possible combinations without the need to perform a full network scan, thus avoiding the combinatorial complexity of enumerating multi-disruption scenarios. Using the vulnerability envelope as a network performance assessment tool, planners and managers can more cost-effectively plan for system protection against disruptions, and prioritize system improvements to minimize disruption risks with limited resources.
Book
Vulnerability Analysis for Transportation Networks provides an integrated framework for understanding and addressing how transportation networks across all modes perform when parts of the network fail or are substantially degraded, such as extreme weather events, natural disasters, road crashes, congestion incidents or road repair. The book reviews the range of existing approaches to network vulnerability and identifies the application of each approach, illustrating them with case studies from around the world. The book covers the dimensions of time (hours, days, weeks, months and years), spatial coverage (national networks, regional areas, metropolitan and urbanized areas) and modes (road, urban public transport and national railway systems). It shows how the provided framework can be used to indicate the most suitable accessibility tools and metrics for a particular application. Vulnerability Analysis for Transportation Networks is for academics and researchers in transportation networks and for practicing professionals involved in the planning and management of transportation networks and services. Presents the most current, complete and integrated account of transport network vulnerability analysis Includes numerous case studies from around the world Compares alternative approaches to vulnerability analysis for multiple modes and the applicability of each Shows how academic transport network planning and management research development can be applied to actual practice, with special focus on socio-economic and environmental impacts.
Article
This paper aims to develop an optimization approach for deriving the upper and lower bounds of transportation network vulnerability under simultaneous disruptions of multiple links without the need to evaluate all possible combinations as in the enumerative approach. Mathematically, we formulate the upper and lower bounds of network vulnerability as. a binary integer bi-level program (BLP). The upper-level subprogram maximizes or minimizes the remaining network throughput under a given number of disrupted links, which corresponds to the upper and lower vulnerability bounds. The lower-level subprogram checks the connectivity of each origin-destination (O-D) pair under a network disruption scenario without path enumeration. Two alternative modeling approaches are provided for the lower-level subprogram: the virtual link capacity-based maximum flow problem formulation and the virtual link cost-based shortest path problem formulation. Computationally, the BLP model can be equivalently reformulated as. a single-level mixed integer linear program by making use of the optimality conditions of the lower-level subprograms and linearization techniques for the complementarity conditions and bilinear terms. Numerical examples are also provided to systematically demonstrate the validity, capability, and flexibility of the proposed optimization model. The vulnerability envelope constructed by the upper and lower bounds is able to effectively consider all possible combinations without the need to perform a full network scan, thus avoiding the combinatorial complexity of enumerating multi-disruption scenarios. Using the vulnerability envelope as. a network performance assessment tool, planners and managers can more cost-effectively plan for system protection against disruptions, and prioritize system improvements to minimize disruption risks with limited resources.
Article
Transport networks operating at or near capacity are vulnerable to disruptions, so flow bottlenecks are potent sources of vulnerability. This paper presents an efficient method for finding transport network cuts, which may constitute such bottlenecks. Methods for assessing network vulnerability found in the literature require origin-destination demands and path assignment. However, in transport network planning and design, demand information is often missing, out of date, partial or inaccurate. Capacity weighted spectral partitioning is proposed to identify potential flow bottlenecks in the network, without reference to demand information or path assignments. This method identifies the network cut with least capacity, taking into account the relative sizes of the sub-networks either side of the cut. Spectral analysis has the added advantage of tractability, even for large networks, as shown by numerical examples for a five-node illustrative example, the Sioux Falls road network and the Gifu Prefecture road network.
Conference Paper
Good clustering can provide critical insight into potential locations where congestion in a network may occur. A natural measure of congestion for a collection of nodes in a graph is its Cheeger ratio, defined as the ratio of the size of its boundary to its volume. Spectral methods provide effective means to estimate the smallest Cheeger ratio via the spectral gap of the graph Laplacian. Here, we compute the spectral gap of the truncated graph Laplacian, with the so-called Dirichlet boundary condition, for the graphs of a dozen communication networks at the IP-layer, which are subgraphs of the much larger global IP-layer network. We show that i) the Dirichlet spectral gap of these networks is substantially larger than the standard spectral gap and is therefore a better indicator of the true expansion properties of the graph, ii) unlike the standard spectral gap, the Dirichlet spectral gaps of progressively larger subgraphs converge to that of the global network, thus allowing properties of the global network to be efficiently obtained from them, and (iii) the (first two) eigenvectors of the Dirichlet graph Laplacian can be used for spectral clustering with arguably better results than standard spectral clustering. We first demonstrate these results analytically for finite regular trees. We then perform spectral clustering on the IP-layer networks using Dirichlet eigenvectors and show that it yields cuts near the network core, thus creating genuine single-component clusters. This is much better than traditional spectral clustering where several disjoint fragments near the network periphery are liable to be misleadingly classified as a single cluster. Since congestion in communication networks is known to peak at the core due to large-scale curvature and geometry, identification of core congestion and its localization are important steps in analysis and improved engineering of networks. Thus, spectral clustering with Dirichlet boundary condition is seen to be more effective at finding bona-fide bottlenecks and congestion than standard spectral clustering.
Article
A measure related to resilience and vulnerability can be useful in supporting decision-making process for maintenance and repair strategies. The existing measures have been focusing on large-scale road networks like highways between cities, although urban-scale networks are equally important. This study proposes a new methodology for evaluating link criticality of urban road network based on the concept of macroscopic fundamental diagram (MFD). Such operational measure is derived by comparing the MFD behaviour in normal condition and the behaviour in event condition, in which a link of a road network is disabled by an extreme event. A simulation study for testing the proposed measure is practiced on the road network of Gangnam district, Seoul, South Korea. The results show that the measure can help us observe the different patterns of network flow reduction by different traffic states. This work provides a new perspective of investigating link criticality of road networks.
Article
This article investigates two performance attributes of road networks, reliability and vulnerability, analyzing their similarities as well as the differences that justify distinct definitions, based on consolidation of recent studies. We also discuss the indicators found in the literature for these two performance attributes. Since various authors treat vulnerability as an aspect of reliability instead of a specific attribute, we carried out an application to a complex road network representative of the city of Rio de Janeiro to check the suitability of this approach. The results show that the vulnerability indicators are more strongly affected by the characteristics of alternative routes while the reliability metrics are more sensitive to the congestion level. The conclusion is that reliability and vulnerability should be treated distinctly for evaluating the performance of road network links.