Passenger-centered vulnerability assessment of railway networks

Journal Article (2020)
Author(s)

Christopher Szymula (Technische Universität Dresden, Student TU Delft)

N Besinovic (TU Delft - Transport and Planning)

Transport and Planning
Copyright
© 2020 Christopher Szymula, Nikola Bešinović
DOI related publication
https://doi.org/10.1016/j.trb.2020.03.008
More Info
expand_more
Publication Year
2020
Language
English
Copyright
© 2020 Christopher Szymula, Nikola Bešinović
Transport and Planning
Volume number
136
Pages (from-to)
30-61
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The performance and behaviour of critical infrastructure in case of disruptions is an important topic and we are still lacking of insights. Due to disruptions, infrastructure becomes unavailable and may force the trains and passengers to adapt. In this paper, we introduce a problem of railway network vulnerability from the perspective of passenger flows and train operations. We propose a new Railway Network Vulnerability Model (RNVM) to assess the vulnerability of the system by finding the critical combination of links, which cause the most adverse consequences to passengers and trains. To solve this challenging problem, we present a RNVM framework, which combines two heuristics based on column and row generation with mixed integer linear programming, to efficiently model alternative passenger flows and infrastructure constraints. The developed framework provides the critical combination of links, the corresponding passenger flows, train routes and timetables. We demonstrate the performance of the RNVM framework on the real-world instance of a part of the Dutch railway network. The results show that the RNVM framework can efficiently reassign passenger flows and reroute trains during disruptions. The results also reveal that the critical links are highly demand dependent rather than a static feature of the networks topology. Finally, the computation times remain small when increasing the number of disrupted links as well as the size of the passenger demand, which allows fast and efficient network vulnerability assessment.

Files

License info not available