An integrated approach of train scheduling and rolling stock circulation with skip-stopping pattern for urban rail transit lines

2021 ◽  
Vol 128 ◽  
pp. 103170
Author(s):  
Shuo Zhao ◽  
Hai Yang ◽  
Yinghui Wu
2018 ◽  
Vol 118 ◽  
pp. 193-227 ◽  
Author(s):  
Yihui Wang ◽  
Andrea D’Ariano ◽  
Jiateng Yin ◽  
Lingyun Meng ◽  
Tao Tang ◽  
...  

2015 ◽  
Vol 60 ◽  
pp. 1-23 ◽  
Author(s):  
Yihui Wang ◽  
Tao Tang ◽  
Bin Ning ◽  
Ton J.J. van den Boom ◽  
Bart De Schutter

2019 ◽  
Vol 11 (22) ◽  
pp. 6322 ◽  
Author(s):  
Annunziata Esposito Amideo ◽  
Stefano Starita ◽  
Maria Paola Scaparra

Urban rail transit systems are highly prone to disruptions of various nature (e.g., accidental, environmental, man-made). Railway networks are deemed as critical infrastructures given that a service interruption can prompt adverse consequences on entire communities and lead to potential far-reaching effects. Hence, the identification of optimal strategies to mitigate the negative impact of disruptive events is paramount to increase railway systems’ resilience. In this paper, we investigate several protection strategies deriving from the application of either single asset vulnerability metrics or systemic optimization models. The contribution of this paper is threefold. Firstly, a single asset metric combining connectivity, path length and flow is defined, namely the Weighted Node Importance Evaluation Index (WI). Secondly, a novel bi-level multi-criteria optimisation model, called the Railway Fortification Problem (RFP), is introduced. RFP identifies protection strategies based on stations connectivity, path length, or travel demand, considered as either individual or combined objectives. Finally, two different protection strategy approaches are applied to a Central London Underground case study: a sequential approach based on single-asset metrics and an integrated approach based on RFP. Results indicate that the integrated approach outperforms the sequential approach and identifies more robust protection plans with respect to different vulnerability criteria.


2017 ◽  
Vol 61 ◽  
pp. 112-123 ◽  
Author(s):  
Yihui Wang ◽  
Zhibin Liao ◽  
Tao Tang ◽  
Bin Ning

Sign in / Sign up

Export Citation Format

Share Document