Identifying critical and vulnerable links: A new approach using the Fisher information matrix

Beatriz Martinez-Pastor*, Maria Nogal, Alan O'Connor, Rui Teixeira

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

3 Citations (Scopus)
16 Downloads (Pure)

Abstract

In traffic networks, some elements are more prone to suffer or to create disruptive situations, and the identification of these elements becomes a challenge due to the large number of possible threats. The following paper presents two new methodologies to identify and rank vulnerable and critical links of traffic networks. These methodologies use the Fisher Information Matrix, and the analysis of eigenvalues and eigenvectors, to systematically rank the links of a network. The identification is done by using traffic variables, such as the demand, the travel time, and the network's flow. For the ranking of the links, disruptions are considered in all the possible locations of the network, and the effects are systematically evaluated. In addition, the evaluation of traffic resilience is included in the process to validate the results. Finally, both methodologies are tested in a real network to infer on the validity of the results.

Original languageEnglish
Article number100570
Number of pages14
JournalInternational Journal of Critical Infrastructure Protection
Volume39
DOIs
Publication statusPublished - 2022

Bibliographical note

Green Open Access added to TU Delft Institutional Repository ‘You share, we take care!’ – Taverne project https://www.openaccess.nl/en/you-share-we-take-care Otherwise as indicated in the copyright section: the publisher is the copyright holder of this work and the author uses the Dutch legislation to make this work public.

Keywords

  • Critical links
  • Fisher matrix
  • Principal components
  • Transport network resilience
  • Vulnerability
  • Vulnerable links

Fingerprint

Dive into the research topics of 'Identifying critical and vulnerable links: A new approach using the Fisher information matrix'. Together they form a unique fingerprint.

Cite this