Project management in a competitive environment: interdicting a CPM based project and its implications
RAIRO. Operations Research, Tome 55 (2021), pp. S365-S384

There are two opponents in a classic network interdiction problem, network owner/defender and interdictor/attacker. Each side has enough information about the other’s possible courses of action. While the network user wishes to run the network in an optimal way, the attacker with the limited resources tries to prevent the optimal operation of the network by interdicting the arcs/nodes of the network. In this study, we investigate project management in a competitive environment using a network interdiction approach. We assume that the project owner/manager strives to minimize the completion time of a Critical Path Method (CPM) based project while an opponent attempts to maximize the minimum completion time by inflicting some delays on project activities with available interdiction resources. Considering both discrete and continuous delay times, we develop two bi-level mixed-integer programming models for the interdictor. Using duality, we then convert the bi-level models to standard single-level models, which are solvable through standard optimization packages. We extend these models to find efficient solutions in terms of project completion time and interdiction resources from the interdictor’s perspective. In this respect, we develop an algorithm to find an efficient solution set for the interdictor. Next, from project manager’s standpoint, we discuss the earliest and latest scheduling times of activities in case of interdiction. Finally, we apply the developed techniques in a marketing project aiming at introducing a new product. The findings may enhance a better project management in an environment where an opponent can adversely affect the project management process by delaying some activities.

DOI : 10.1051/ro/2019089
Classification : 90B50, 90B10
Keywords: Bi-level programming, project management, project scheduling, network modeling, network interdiction, integer programming
@article{RO_2021__55_S1_S365_0,
     author = {Kasimo\u{g}lu, Fatih and Akg\"un, \.Ibrahim},
     title = {Project management in a competitive environment: interdicting a {CPM} based project and its implications},
     journal = {RAIRO. Operations Research},
     pages = {S365--S384},
     year = {2021},
     publisher = {EDP-Sciences},
     volume = {55},
     doi = {10.1051/ro/2019089},
     mrnumber = {4237384},
     zbl = {1479.90120},
     language = {en},
     url = {https://www.numdam.org/articles/10.1051/ro/2019089/}
}
TY  - JOUR
AU  - Kasimoğlu, Fatih
AU  - Akgün, İbrahim
TI  - Project management in a competitive environment: interdicting a CPM based project and its implications
JO  - RAIRO. Operations Research
PY  - 2021
SP  - S365
EP  - S384
VL  - 55
PB  - EDP-Sciences
UR  - https://www.numdam.org/articles/10.1051/ro/2019089/
DO  - 10.1051/ro/2019089
LA  - en
ID  - RO_2021__55_S1_S365_0
ER  - 
%0 Journal Article
%A Kasimoğlu, Fatih
%A Akgün, İbrahim
%T Project management in a competitive environment: interdicting a CPM based project and its implications
%J RAIRO. Operations Research
%D 2021
%P S365-S384
%V 55
%I EDP-Sciences
%U https://www.numdam.org/articles/10.1051/ro/2019089/
%R 10.1051/ro/2019089
%G en
%F RO_2021__55_S1_S365_0
Kasimoğlu, Fatih; Akgün, İbrahim. Project management in a competitive environment: interdicting a CPM based project and its implications. RAIRO. Operations Research, Tome 55 (2021), pp. S365-S384. doi: 10.1051/ro/2019089

[1] R. K. Ahuja, T. L. Magnanti and J. B. Orlin, Network Flows: Theory, Algorithms, and Applications. Prentice Hall, New Jersey (1993). | MR | Zbl

[2] İ. Akgün, B. Ç. Tansel and R. K. Wood, The multi-terminal maximum flow network interdiction problem. Eur. J. Oper. Res. 211 (2011) 241–251. | MR | Zbl | DOI

[3] G. Anandalingam and V. Apprey, Multi-level programming and conflict resolution. Eur. J. Oper. Res. 51 (1991) 233–247. | Zbl | DOI

[4] N. Assimakopoulos, A network interdiction model for hospital infection control. Comput. Biol. Med. 17 (1987) 413–422. | DOI

[5] M. G. Ashtiani, A. Makui and R. Ramezanian, A robust model for a leader-follower competitive facility location problem in a discrete space. Appl. Math. Model. 37 (2013) 62–71. | MR | Zbl | DOI

[6] M. S. Bazaraa, J. J. Jarvus and H. D. Sherali, Linear Programming and Network Flows. John Wiley & Sons, New Jersey (2005). | MR | Zbl

[7] D. Bertsimas, E. Nasrabadi, J. B. Orlin, On the power of randomization in network interdiction. Oper. Res. Lett. 44 (2016) 114–120. | MR | Zbl | DOI

[8] G. Brown, M. Carlyle, D. Diehl, J. Kline and R. K. Wood, A two-sided optimization for theater-ballistic missile defense. Oper. Res. 53 (2005) 745–763. | MR | Zbl | DOI

[9] G. Brown, M. Carlyle, J. Royset and R. K. Wood, On the complexity of delaying an adversary’s project. In: The Next Wave in Computing, Optimization and Decision Technologies. Springer, New York (2005) 3–17.

[10] G. Brown, M. Carlyle, J. Salmeron and R. K. Wood, Defending critical infrastructure. Interfaces 36 (2006) 530–544. | DOI

[11] G. Brown, M. Carlyle, R. Harney, E. Skroch and R. K. Wood, Interdicting a nuclear weapons project. Oper. Res. 57 (2009) 866–877. | Zbl | DOI

[12] J. F. Camacho-Vallejo, A. E. Cordero-Franco and R. G. González-Ramírez, Solving the bilevel facility location problem under preferences by a stackelberg-evolutionary algorithm. Math. Prob. Eng. 2014 (2014) 430243. | MR | Zbl | DOI

[13] S. R. Chestnut and R. Zenklusen, Hardness and approximation for network flow interdiction. Networks 69 (2017) 378–387. | MR | Zbl | DOI

[14] R. L. Church, M. P. Scaparra and R. S. Middleton, Identifying critical infrastructure: the median and covering facility interdiction problems. Ann. Assoc. Am. Geographers 94 (2004) 491–502. | DOI

[15] H. W. Corley and D. Y. Sha, Most vital links and nodes in weighted networks. Oper. Res. Lett. 1 (1982) 157–160. | MR | Zbl | DOI

[16] K. J. Cormican, Computational methods for deterministic and stochastic network interdiction problems. Masters thesis. Naval Post Graduate School, Monterey, CA (1995).

[17] K. J. Cormican, D. P. Morton and R. K. Wood, Stochastic network interdiction. Oper. Res. 46 (1998) 184–197. | Zbl | DOI

[18] Y. Disser and J. Matuschke, The complexity of computing a robust flow. Preprint arXiv:1704.08241 (2017). | MR | Zbl

[19] S. Fang, P. Guo, M. Li and L. Zhang, Bilevel multiobjective programming applied to water resources allocation. Math. Prob. Eng. 2013 (2013) 837919. | MR | DOI

[20] L. R. Ford and D. R. Fulkerson, Flows in Networks. Princton University, Princton, NJ (1962). | MR | Zbl

[21] D. R. Fulkerson and G. C. Harding, Maximizing the minimum source-sink path subject to a budget constraint. Math. Prog. 13 (1977) 116–118. | MR | Zbl | DOI

[22] GAMS Development Corporation, General Algebraic Modeling System (GAMS). Rev 146 (2006).

[23] P. M. Ghare, D. C. Montgomery and T. M. Turner, Optimal interdiction policy for a flow network. Nav. Res. Logist. Q. 18 (1971) 37–45. | MR | Zbl | DOI

[24] B. Golden, A problem in network interdiction. Nav. Res. Logist. Q. 25 (1978) 711–713. | Zbl | DOI

[25] R. L. Helmbold, A Counter Capacity Network Interdiction Model. Report R-611-PR, RAND Corporation: Santa Monica, CA (1971).

[26] E. Israeli, System interdiction and defense. Doctoral dissertation Naval Postgraduate School, Monterey, CA (1999).

[27] E. Israeli and R. K. Wood, Shortest-path network interdiction. Networks 40 (2002) 97–111. | MR | Zbl | DOI

[28] U. Janjarassuk and T. Nakrachata-Amon, A simulated annealing algorithm to the stochastic network interdiction problem. In: Proceedings of IEEE International Conference on Industrial Engineering and Engineering Management (2016) 230–233.

[29] V. V. Kalashnikov, S. Dempe, G. A. Pérez-Valdés, N. I Kalashnykova and J. F. Camacho-Vallejo, Bi-level programming and applications. Math. Prob. Eng. 2 (2015) 1–16. | MR | Zbl | DOI

[30] T. Kim, S. J. Wright, D. Bienstock and S. Harnett, Analyzing vulnerability of power systems with continuous optimization formulations. IEEE Trans. Network Sci. Eng. 3 (2016) 132–146. | MR | DOI

[31] S. H. Lubore, H. D. Ratliff and G. T. Sicilia, Determining the most vital link in a flow network. Nav. Res. Logist. Q. 17 (1971) 497–502. | MR | Zbl | DOI

[32] R. M. Lusby, J. Larsen and S. Bull, A survey on robustness in railway planning. Eur. J. Oper. Res. 266 (2018) 1–15. | MR | Zbl | DOI

[33] K. Malik, A. K. Mittal and S. K. Gupta, The k most vital arcs in the shortest path problem. Oper. Res. Lett. 8 (1989) 223–227. | MR | Zbl | DOI

[34] A. W. Mcmasters and T. M. Mustin, Optimal interdiction of a supply network. Nav. Res. Logist. Q. 17 (1970) 261–268. | Zbl | DOI

[35] J. R. Meredith and S. J. Mantel, Project management: a managerial approach. John Wiley & Sons, Inc., New Jersey (2003).

[36] H. D. Ratliff, G. T. Sicilia and S. H. Lubore, Finding the n most vital links in flow networks. Manage. Sci. 21 (1975) 531–539. | MR | Zbl | DOI

[37] C. Rocco and J. E. Ramirez-Marquez, A bi-objective approach for shortest path network interdiction. Comput. Ind. Eng. 59 (2010) 232–240. | DOI

[38] J. O. Royset and R. K. Wood, Solving the bi-objective maximum flow network interdiction problem. INFORMS J. Comput. 19 (2007) 175–184. | MR | Zbl | DOI

[39] J. Salmeròn, R. K. Wood and R. Baldick, Analysis of electric grid security under terrorist threat. IEEE Trans. Power Syst. 19 (2004) 905–912. | DOI

[40] J. Salmeròn, R. K. Wood and R. Baldick, Worst case interdiction analysis of large-scale electric power grids. IEEE Trans. Power Syst. 24 (2009) 96–104. | DOI

[41] M. Simaan and J. B. Cruz, On the Stackelberg strategy in nonzero-sum games. J. Optim. Theory App. 11 (1973) 533–555. | MR | Zbl | DOI

[42] J. C. Smith, Basic interdiction models. In: Wiley Encyclopedia of Operations Research and Management Science. John Wiley & Sons, Hoboken (2011).

[43] K. Sundar, C. Coffrin, H. Nagarajan and R. Bent, Probabilistic N - k failure-identification for power systems. Networks 71 (2018) 302–321. | MR | DOI

[44] M. T. Tabucanon, Multiple Criteria Decision Making in Industry. Elsevier, Amsterdam (1988).

[45] H. Von Stackelberg, The Theory of the Market Economy. William Hodge & Co., London, German (1952).

[46] U.-P. Wei, C. Zhu, K. Xiao, Q. Yin and Y. Zha, Shortest Path network interdiction with goal threshold. IEEE Access 6 (2018) 29332–29343. | DOI

[47] U.-P. Wen and S.-T. Hsu, Linear bi-level programming problems – a review. J. Oper. Res. Soc. 42 (1991) 125–133. | Zbl

[48] W. L. Winston, Operations Research Applications and Algorithms. Brooks/Cole, Cengage Learning, Belmont (2004).

[49] R. Wollmer, Some Methods for Determining the Most Vital Link in a Railway Network. Rand Corporation, Santa Monica, CA (1963).

[50] R. Wollmer, Removing arcs from a network. Oper. Res. 12 (1964) 934–940. | MR | Zbl | DOI

[51] R. K. Wood, Deterministic network interdiction. Math. Comput. Model. 17 (1993) 1–18. | MR | Zbl | DOI

[52] R. K. Wood, Bi-level network interdiction models: formulations and solutions. In: Wiley Encyclopedia of Operations Research and Management Science. John Wiley & Sons, Hoboken (2011). | DOI

[53] P. Zhang and N. Fan, Analysis of budget for interdiction on multicommodity network flows. J. Global Optim. 67 (2016) 1–31. | MR | Zbl

Cité par Sources :