Road network vulnerability analysis: Conceptualization, implementation and application
•A three-step process for road network vulnerability analysis is described.•First, we define conceptual vulnerability measures.•Second, we derive and implement practical indicators and algorithms.•Third, we apply the methodology in case studies of the Swedish road network.•Considering the whole proc...
Saved in:
Published in | Computers, environment and urban systems Vol. 49; pp. 136 - 147 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Elsevier Ltd
01.01.2015
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | •A three-step process for road network vulnerability analysis is described.•First, we define conceptual vulnerability measures.•Second, we derive and implement practical indicators and algorithms.•Third, we apply the methodology in case studies of the Swedish road network.•Considering the whole process connects different domains of research.
The paper describes a process for road network vulnerability analysis, from (i) the conceptual definition of vulnerability measures, through (ii) the derivation of practical indicators and models adapted to available data and their implementation in computational procedures, to (iii) the application of the methodology in case studies. In the first step, the vulnerability concept is defined and quantified formally, and distinct user and technological perspectives are highlighted. In the second step, the conceptual measures are adapted and calculated according to the conditions, requirements and goals of a particular analysis. The paper describes practical indicators and algorithms developed for large-scale vulnerability analyses. For the third step, the paper analyzes both single link closures and area-covering disruptions and the distribution of impacts among different regions in a case study on the Swedish road transport system. The spatial patterns are put in connection with the regional variations in location and travel patterns and network density. Finally, the implications for policy and possible approaches to vulnerability management are discussed. |
---|---|
ISSN: | 0198-9715 1873-7587 1873-7587 |
DOI: | 10.1016/j.compenvurbsys.2014.02.003 |