This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Two-stage Robust Optimization Approach for Enhanced Community Resilience Under Tornado Hazards

Mehdi Ansari
American Airlines
Fort Worth, TX
[email protected] &Juan S. Borrero
School of Industrial Engineering and Management
Oklahoma State University
[email protected] &Andrés D. González
School of Industrial and Systems Engineering
University of Oklahoma
[email protected]
Abstract

Catastrophic tornadoes cause severe damage and are a threat to human wellbeing, making it critical to determine mitigation strategies to reduce their impact. One such strategy, following recent research, is to retrofit existing structures. To this end, in this article we propose a model that considers a decision-maker (a government agency or a public-private consortium) who seeks to allocate resources to retrofit and recover wood-frame residential structures, to minimize the population dislocation due to an uncertain tornado. In the first stage the decision-maker selects the retrofitting strategies, and in the second stage the recovery decisions are made after observing the tornado. As tornado paths cannot be forecast reliably, we take a worst-case approach to uncertainty where paths are modeled as arbitrary line segments on the plane. Under the assumption that an area is affected if it is sufficiently close to the tornado path, the problem is framed as a two-stage robust optimization problem with a mixed-integer non-linear uncertainty set. We solve this problem by using a decomposition column-and-constraint generation algorithm that solves a two-level integer problem at each iteration. This problem, in turn, is solved by a decomposition branch-and-cut method that exploits the geometry of the uncertainty set. To illustrate the model’s applicability, we present a case study based on Joplin, Missouri. Our results show that there can be up to 20% reductions in worst-case population dislocation by investing $15 million in retrofitting and recovery; that our approach outperforms other retrofitting policies, and that the model is not over-conservative.

Keywords Robust Optimization  \cdot Column and constraint generation  \cdot Tornado  \cdot Community Resilience

1 Introduction

Tornadoes are vertical columns of rotating air that are spawned from supercell thunderstorms caused by rotating updrafts that form because of the shear in the environmental wind field [NOAA, 2022d]. Catastrophic tornadoes are common natural disasters that happen in many populated regions around the world and are particularly concerning in dense high-risk urban areas because of their damage potential. On average, more than 1200 tornadoes happen in the US annually which cause around 60 fatalities [NOAA, 2022a]. Tornadoes have caused damage costs that range between $183 million to $9.493 billion per year in the US within the past two decades [NOAA, 2022e]. The intensity of tornadoes is measured by the Enhanced Fujita (EF) scale, which ranks a tornado from 0 (weakest) through 5 (most violent) based on an estimation of their average wind speed. The average wind speed, in turn, is estimated by comparing the observed tornado damages with a list of Damage Indicators and Degrees of Damage [NOAA, 2022f].

Fatalities and injuries from tornadoes have decreased in the past few decades thanks to warning systems based on weather forecasts [Standohar-Alfano et al., 2017, Koliou and van de Lindt, 2020]. For example, the Storm Prediction Center at the National Weather Service keeps a Day 1-8 Convective Outlook for all the US and issues watches or warnings based on the possibility or observation of tornadoes [NOAA, 2022b]. Tornado warnings are issued as soon as a rotating supercell has been identified by a weather radar; these warnings instruct people in the affected area to take shelter immediately. Even though the warning systems have caused a great reduction in fatalities [FEMA, 2022a], their short lead times (of the order of minutes) do not allow to prevent physical structures from possible destruction. This is further aggravated by the fact that more than 80% of building stocks in the US are wood-frame buildings that are highly vulnerable to wind damage [van de Lindt and Dao, 2009].

Besides weather forecasting, other alternatives can be employed to reduce the impact of tornadoes. In the past decade, several studies have shown that retrofitting strategies with simple and inexpensive actions, e.g., improving the roof cover or enhancing the roof sheathing nailing pattern of a house, can improve building codes to make wood-frame buildings more resistant to tornado damage, particularly from damaging tornadoes of EF2 intensity or less [Simmons et al., 2015, Ripberger et al., 2018, Masoomi et al., 2018, Koliou and van de Lindt, 2020, Wang et al., 2021]. In particular, Ripberger et al. [2018] shows that a 30% or more reduction in lifetime damage can be expected by enhancing existing wood-frame buildings with simple retrofitting actions. Similarly, recent research has studied different recovery strategies and has shown that they have the potential to significantly improve the restoration time and reduce population dislocation [Masoomi and van de Lindt, 2018, Farokhnia et al., 2020, Koliou and van de Lindt, 2020].

At the federal level in the US, the use of retrofitting has been identified as a valuable strategy to reduce the impact of natural disasters [FEMA, 2021, 2022b, The White House, 2022]. At the local level, however, such strategies have not been implemented yet. In fact, there are federal programs that provide general guidelines for local administrators (e.g., the emergency management agencies of cities and towns) to design and fund retrofitting plans [FEMA, 2021]. Motivated by this need, the main goal of this paper is to present a model to guide retrofitting and recovery investments in order to enhance the community resilience of an urban area subject to tornado hazards. Here, community resilience is understood as “the ability to prepare for anticipated hazards, adapt to changing conditions, and withstand and recover rapidly from disruptions” [McAllister et al., 2015].

Specifically, we assume that there is a decision-maker (a government agency or a public-private consortium; for instance the emergency management department of a city and home insurance companies) that can invest a limited budget to retrofit and recover structures across a geographical area of interest, in order to maximize the community resilience due to an uncertain tornado. We model this decision problem as a two-stage robust optimization model. The first-stage decisions are made before the realization of a tornado and determine what structures have to be retrofitted and to what extent. The second-stage decisions determine recovery strategies for the locations that are damaged by the tornado. Without loss of generality, in this article we consider total population dislocation, which is the involuntary movement of people from their residential sites after a severe tornado, as a metric for community resilience to be minimized (therefore, maximizing community resilience would be equivalent to minimizing population dislocation). Our proposed formulation, however, allows for other metrics that assess community resilience.

We formulate the first- and second- stage problems as integer programming problems (IP) whose decision variables select retrofitting strategies and recovery strategies, respectively, for each location. Both stages share the same budget, which models that, at least a priori, the decision-maker does not know what proportion of the budget should be spent on retrofitting and what proportion on recovery. On the other hand, as an accurate prediction of the location/time where a tornado forms, the motion direction, and its magnitude, is out of reach of the current technology [NOAA, 2022c], we approach the uncertainty using a robust lens. That is, we assume that given any retrofitting plan, the corresponding worst-case tornado damage happens. In order to have an adequate balance between accuracy and tractability, we model tornado paths as arbitrary line segments on the plane and assume that an area is affected by the tornado if it is sufficiently close to the line segment. This modeling approach results in a mixed-integer non-linear uncertainty set.

In order to solve the problem, we employ an exact column-and-constraint generation (C&CG) algorithm based on the method discussed by Zeng and Zhao [2013]. Here, at each iteration, a master problem solves a relaxation of the original problem over a subset of possible tornado scenarios. New scenarios are iteratively generated in a subproblem and added to the master until the objective value does not change. In contrast with previous models that employ the C&CG algorithm, for instance  Zeng and Zhao [2013], Yuan et al. [2016], Velasquez et al. [2020], our subproblem is a challenging max-min non-linear integer problem that cannot be solved by standard ‘dualize and combine’ techniques. Thus, the subproblem is solved by a decomposition branch-and-cut algorithm that exploits the geometric properties of the uncertainty set. Particularly, we derive ‘double’ and ‘triple’ conflict constraints to define the master relaxation and we check the feasibility of master solutions by using a stabbing line algorithm and a continuous non-convex optimization problem.

Using geographical and population data from IN-CORE [2022], we use the proposed model to determine optimal retrofitting and recovery actions in Joplin, MO. The results of the case study show that retrofitting actions should be performed in most locations in the geographical center of the city, which are also the locations with higher population density. They also show that spending budget in retrofitting is prioritized over recovery, and that only when a ‘critical’ set of locations in the center of the city are retrofitted, there should be expenditures in recovery. By performing simulations we also show that the proposed model outperforms other retrofitting policies, and that the model is not over-conservative: the optimal worst-case population dislocation can be within 10% of the maximum population dislocation observed in the simulations.

To summarize, in this paper we make the following contributions:

  • We propose a novel two-stage optimization model under uncertainty to aid decision-makers in the allocation of resources to retrofit and recover residential wood-frame buildings in tornado-prone regions.

  • We explicitly model tornado paths as arbitrary line segments on the plane and formulate the problem as a two-stage robust optimization problem with integrality requirements in the first and second stages and in the uncertainty set.

  • We develop an exact algorithm that embeds a decomposition branch-and-cut algorithm within a column-and-constraint generation method. By exploiting the geometric properties of line segments, we develop initialization and separation procedures to effectively implement the embedded decomposition branch-and-cut algorithm.

  • Using real data we provide optimal retrofitting and recovery strategies for Joplin, MO. The results show that there can be up to 20% reductions in worst-case population dislocation by investing $15 million; that our approach outperforms other retrofitting policies, and that the model does not suffer from over-conservativeness.

The remainder of this paper is organized as follows. Section 2 reviews the literature. Section 3 describes the two-stage robust optimization problem. Section 4 presents a customized version of the C&CG algorithm. We describe the decomposition branch-and-cut method to solve the subproblem in C&CG algorithm in Section 5. In Section 6, we conduct the numerical experiments on Joplin data as our case study. Lastly, Section 7 concludes the paper.

2 Literature review

2.1 Optimization models to retrofit and recover under tornado hazards

The determination of retrofitting and recovery strategies for tornado hazards, particularly using optimization, is a relatively new topic in the literature. Wen [2021] proposes a multi-objective optimization model to retrofit against tornado hazards. Their model, however, is single-stage, does not considers recovery, does not consider uncertain tornado paths, and aggregates all of the uncertainty of the problem into the parameters of the deterministic model. Simulation, on the other hand, is more commonly used to study the behavior of tornadoes, particularly to evaluate the impact of retrofitting strategies, see for example Strader et al. [2016], Wang et al. [2017], Masoomi and van de Lindt [2018], Fan and Pang [2019], Wang et al. [2021], Stoner and Pang [2021]. These works, however, do not explicitly consider the decision problem of allocating resources to retrofit and recover.

The closest models in the literature to the present work are two-stage robust optimization models for (general) disaster planning, see Yuan et al. [2016], Ma et al. [2018], Matthews et al. [2019], Velasquez et al. [2020], Cheng et al. [2021]. These models, however, are geared towards supply and distribution problems in networks and do not capture the specific patters of the disasters (such as, e.g., paths or ripple effects). Consequently, these models cannot be adapted to deal with tornadoes and the specific retrofitting and recovery setting we study here.

2.2 Robust optimization

Robust optimization methods have been extensively developed in the past two decades to mathematically model and study different systems under uncertainty. Standard robust optimization models assume that the uncertain parameters belong to a convex set [Ben-Tal and Nemirovski, 1999, Bertsimas and Sim, 2004], which have many applications such as scheduling [Lin et al., 2004], supply chain [Ben-Tal et al., 2011], transportation [Yao et al., 2009], power system problems [Xiong et al., 2017], among others. Mixed-integer version of uncertainty sets have also been studied. Exact methods to solve a general robust optimization problem with a mixed-integer uncertainty set are similar to the integer L-shaped method [Laporte and Louveaux, 1993] in which a master problem iteratively solves a restricted version of the original problem under a few uncertain scenarios and for the solution vector. Here, a subproblem generates a new scenario by finding the worst-case of objective within a mixed-integer uncertainty set [Mutapcic and Boyd, 2009, Ben-Tal et al., 2015, Ho-Nguyen and Kılınç-Karzan, 2018, Borrero and Lozano, 2021, Ansari et al., 2022].

Ben-Tal et al. [2004] extend the scope of standard single-stage robust optimization problems by introducing the adjustable robust optimization methodology, where a part of decision variables must be determined before the realization of the uncertainty set. The rest of the decision variables are chosen when the uncertain parameters are revealed. The two-stage approach provides a less conservative framework to deal with the uncertainty and it can model a broad range of applications in different areas such as transportation [Gabrel et al., 2014], networks [Atamtürk and Zhang, 2007], investment [Takeda et al., 2008], power systems problems [Shams et al., 2021, Li et al., 2021], among others.

In general, two-stage robust optimization problems are computationally expensive. To efficiently solve them, decomposition methods are widely employed, under the assumption that the second-stage problem is a linear programming problem [Thiele et al., 2009, Zhao and Zeng, 2012, Jiang et al., 2012, Gabrel et al., 2014]. Zeng and Zhao [2013] presents the column and constraint generation method (C&CG) as an alternative to address this class of robust problems. They showed the C&CG can outperform previous decomposition for many problem settings. The C&CG approach has become a popular tool to solve two-stage robust optimization in the past decade [An et al., 2014, An and Zeng, 2015, Jabr et al., 2015, Neyshabouri and Berg, 2017, Ding et al., 2017, Yuan et al., 2016, Matthews et al., 2019, Velasquez et al., 2020, Cheng et al., 2021]. An important feature of existing applications of the C&CG method is that the second-stage optimization problem is convex. In contrast, in our problem the second-stage problem is an IP problem and the uncertainty set is mixed-integer non-linear. Therefore, the standard ‘dualize and combine’ approach that is used in the literature to solve the subproblem in the C&CG does not apply to our case.

3 Model formulation

Next, we define the two-stage robust optimization model to minimize the total population dislocation under an uncertain tornado and present a mathematical formulation of the problem.

3.1 Two-stage robust optimization formulation

Recall that the first stage decisions seek to determine what locations to retrofit before the realization of a tornado. The second stage decisions, that happen after the uncertainty is revealed, select what recovery strategies should be implemented in the locations that are affected by the tornado.

Formally, suppose SS denotes the set of retrofitting strategies and PP denotes the set of recovery plans. We consider a set of locations of interest LL, hereafter referred to as locations for simplicity, which are placed in a 2-dimensional plane. Let wsw_{\ell s} be the population dislocation estimation pre-tornado at location L\ell\in L under retrofitting strategy sSs\in S (in most cases ws=0w_{\ell s}=0) and let gspg_{\ell sp} be the population dislocation post-tornado at location L\ell\in L assuming that the retrofitting strategy sSs\in S is used and that the recovery plan is pPp\in P.

We assume that the decision-maker has a limited budget of A0A\geq 0 to invest in the retrofitting and recovery plans. This assumption allows the model to allocate the budget endogenously, rather than having the decision-maker setting the proportions before hand. If required, the model is able to handle fixed budgets by adding a linear constraint in the first-stage problem. Let dsd_{\ell s} be the retrofitting cost of all the buildings in location L\ell\in L under strategy sSs\in S, and let cspc_{\ell sp} denote the cost of using recovery plan pPp\in P on the buildings in location L\ell\in L if the retrofitting strategy sSs\in S is applied. All parameters in both stages are computed in Section 6.1 in a real example, by using the publicly available data and engineering models for wood-frame buildings in the literature.

Define the decision variables fsf_{\ell s} and rspr_{\ell sp} as

fs={1, if the buildings in location L are retrofitted using strategy sS0, otherwise,f_{\ell s}=\begin{cases}1,&\text{ if the buildings in location $\ell\in L$ are retrofitted using strategy $s\in S$}\\ 0,&\text{ otherwise},\end{cases}
rsp={1, if the buildings in L are retrofitted with strategy sS and recovered with plan pP0, otherwise,r_{\ell sp}=\begin{cases}1,&\text{ if the buildings in $\ell\in L$ are retrofitted with strategy $s\in S$}\\ &\text{ and recovered with plan $p\in P$}\\ 0,&\text{ otherwise},\end{cases}

and let zz_{\ell}, L\ell\in L, be the binary variables that represent the coverage of a tornado across the locations, that is:

z={1 if location L is affected by the tornado0 otherwise.z_{\ell}=\begin{cases}1\text{ if location $\ell\in L$ is affected by the tornado}\\ 0\text{ otherwise}.\end{cases}

Then, the two-stage robust optimization model is defined as follows

v=min\displaystyle v=\min LsSwsfs+maxz𝒰Q(z,f)\displaystyle\sum_{\ell\in L}\sum_{s\in S}w_{\ell s}f_{\ell s}+\max_{z\in\mathcal{U}}Q(z,f) (1a)
s.t. sSfs=1\displaystyle\sum_{s\in S}f_{\ell s}=1 L\displaystyle\forall\ell\in L (1b)
f{0,1}|L||S|,\displaystyle f\in\{0,1\}^{|L||S|}, (1c)

where the second stage problem Q(z,f)Q(z,f) for given z=(z:L)z=(z_{\ell}:\ell\in L) and f=(fs:L,sS)f=(f_{\ell s}:\ell\in L,s\in S) is

Q(z,f)=min\displaystyle Q(z,f)=\min LzsSpPgsprsp\displaystyle\sum_{\ell\in L}z_{\ell}\sum_{s\in S}\sum_{p\in P}g_{\ell sp}r_{\ell sp} (2a)
s.t. LsSpPcsprspALsSdsfs\displaystyle\sum_{\ell\in L}\sum_{s\in S}\sum_{p\in P}c_{\ell sp}r_{\ell sp}\leq A-\sum_{\ell\in L}\sum_{s\in S}d_{\ell s}f_{\ell s} (2b)
pPrsp=fs\displaystyle\sum_{p\in P}r_{\ell sp}=f_{\ell s} L,sS\displaystyle\forall\ell\in L,s\in S (2c)
r{0,1}|L||S||P|.\displaystyle r\in\{0,1\}^{|L||S||P|}. (2d)

The first term of the objective function (1a) measures the pre-tornado dislocation across all locations due to implementing the retrofitting strategies. The second term measures the population dislocation after the worst-case tornado with respect to the retrofitting strategies selected at the first stage. Constraint (1b) ensures that each location picks exactly one retrofitting strategy. We make the assumption that there is a “do-nothing” strategy in SS with zero cost.

The second stage optimization problem (2) selects the recovery plans that minimize the population dislocation given a retrofitting strategy vector ff and the tornado coverage vector zz. The budget constraint (2b) ensures that the overall cost for the execution of recovery and retrofitting strategies is AA. Constraint (2c) forces each location to pick exactly one recovery strategy corresponding to the selected retrofitting strategy. As before, we assume there exist a “do-nothing” strategy in PP with zero cost. Next, we model tornado paths by ensuring that the decision vector zz belongs to the uncertainty set 𝒰{0,1}|L|\mathcal{U}\subseteq\{0,1\}^{|L|} which contains all feasible tornado damages over locations in LL.

3.2 Uncertainty set formulation

We make three assumptions to model a tornado and its associated damage:

  • A.1.

    Tornado paths are represented by line segments of at most a length EE in the (real) plane; E>0E>0 is a parameter set by the decision maker, and can be easily modified to study the effects of different tornado lengths.

  • A.2.

    Each location L\ell\in L represents a cluster of buildings that are geographically close. Such clusters can depict individual buildings, blocks, neighborhoods, counties, or any other arrangement of interest to the decision-maker.

  • A.3.

    A location L\ell\in L is damaged by the tornado if an aggregate measure of the coordinates of all buildings in \ell (e.g., the centroid of all the coordinates of the buildings in that location), is within Δ\Delta units of the tornado path, Δ>0\Delta>0 being a parameter set by the decision-maker.

Assumption A.1. follows from considering historical records of tornadoes, such as evidenced in Figure 1, which depicts the tornado paths in Oklahoma County between 1950 and 2020. Observe that, with a few exceptions, the paths can be adequately approximated by line segments. This behavior is also observed across the US, not only Oklahoma, see the damage assessment tool in NOAA [2023]. Whereas A.1. might be seen as restrictive, it is a reasonable and uncluttered mathematical representation of a complex weather phenomenon.

Refer to caption
Figure 1: Map of Oklahoma County tornado paths between 1950-2020 [NWC, 2023].

Assumption A.2. is made to avoid politically inviable policies. Allowing full granularity (by associating a location with each building) might result in policies that prescribe retrofitting and recovery actions for a given building, but no retrofitting nor recovery to its immediate neighbors. Clearly, such a policy might raise fairness concerns, particularly if the decision-maker is a public entity. We note that our model works for any clustering approach; all clustering information required by the model is summarized via the parameters of the model.

Assumption A.3. defines the damage due to the tornado. Considering the variable nature of tornado damage, Δ\Delta can be seen as an upper-bound on the width observed in historical data for a given area to study the worst-case scenario. Due to the uncertain nature of tornado behavior, defining specific rules for modeling the coverage during a tornado remains a challenging task.

We assume that the length of tornado qq is at most a given parameter EE, and that the two endpoints of qq are located within a sufficiently large rectangle R=[RL(1),RU(1)]×[RL(2),RU(2)]2R=[R_{L}^{(1)},R_{U}^{(1)}]\times[R_{L}^{(2)},R_{U}^{(2)}]\subseteq\mathbb{R}^{2} that contains all locations in LL. Let e0=(e0x,e0y)Re_{0}=(e_{0}^{x},e_{0}^{y})\in R and e1=(e1x,e1y)Re_{1}=(e_{1}^{x},e_{1}^{y})\in R be the endpoints of line segment qq (see Figure 2). The uncertainty set 𝒰\mathcal{U} can be defined by the following mixed-integer non-linear programming (MINLP) formulation

𝒰={z{0,1}\displaystyle\mathcal{U}=\bigg{\{}z\in\{0,1\} :|L|e0,e1R,t|L|,{}^{|L|}:\exists e_{0},e_{1}\in R,t\in\mathbb{R}^{|L|}, (3a)
e0+t(e1e0)(x,y)Δ+M(1z),L,\displaystyle\|e_{0}+t_{\ell}(e_{1}-e_{0})-(x_{\ell},y_{\ell})\|\leq\Delta+M_{\ell}(1-z_{\ell}),\ \forall\ell\in L, (3b)
0t1,L,\displaystyle 0\leq t_{\ell}\leq 1,\ \forall\ell\in L, (3c)
e0e1E},\displaystyle\|e_{0}-e_{1}\|\leq E\bigg{\}}, (3d)

where .\|.\| calculates the Euclidean distance between the vector coordinates and where (x,y)(x_{\ell},y_{\ell}) denote the coordinates of location L\ell\in L on the plane.

Refer to caption
Figure 2: The line segment qq represents a tornado central line. Locations within Δ\Delta distance of the line segment (stars) are covered by the tornado.

The value of e0+t(e1e0)(x,y)\|e_{0}+t_{\ell}(e_{1}-e_{0})-(x_{\ell},y_{\ell})\| in Constraint (3b) calculates the distance between a point e0+t(e1e0)e_{0}+t_{\ell}(e_{1}-e_{0}) on the line segment qq and location \ell. This constraint defines zz-variables such that if z=1z_{\ell}=1 for some L\ell\in L, then the location \ell is covered by tornado. The value of MM_{\ell} is sufficiently large to ensure the constraint is trivially satisfied if z=0z_{\ell}=0 (the value of MM_{\ell} is set to be the largest value among the Euclidean distances from location L\ell\in L to the corners of rectangle RR). Constraint (3c) enforces the range of continuous variable tt_{\ell} to be between 0 and 1, which indicates that qq is a finite segment and not an infinite line. Constraint (3d) also ensures that the length of a tornado, which is the Euclidean distance between the two endpoints, does not exceed EE. Note that the problem maximizes over the zz-variables and that all of them have non-negative coefficients in the objective function. This observation and Constraint (3b) imply that z=1z_{\ell}=1 if and only if location L\ell\in L is covered by the tornado path.

Remark 1.

The parameters Δ\Delta, EE, RL(i)R_{L}^{(i)}, and RU(i)R_{U}^{(i)}, i=1,2i=1,2, are selected by the decision-maker. Also, we note that E=E=\infty is a valid choice for the length of the tornado path. In this case we refer to the path as a line rather than by a segment. This assumption represents situations where the path is sufficiently long to traverse the entire region of interest. In this case, constraints (3c) and (3d) are not necessary in the formulation of 𝒰\mathcal{U}.

We close this section by noting that problem (1) belongs to the class of NP-hard problems, see Proposition 3 in Appendix 1. The proof follows by a reduction from the well-known knapsack problem and applies even if there is only one tornado path.

4 A Solution Method Based on the C&CG Framework

We present a method to solve the two-stage robust optimization problem (1), based on the C&CG algorithm in Zeng and Zhao [2013]. First, we provide a linear one-level reformulation of problem (1) by means of an epigraphic reformulation of the worst-case second-stage objective. To this end, note that 𝒰\mathcal{U} is a finite set and write it as 𝒰={z1,,zn}\mathcal{U}=\{z^{1},\ldots,z^{n}\}, where n1n\geq 1 is the cardinality of 𝒰\mathcal{U} and suppose rir^{i} is the vector of second-stage variables corresponding to scenario ziz^{i}. The one-level linear mixed-integer programming (MIP) reformulation of (1) is:

v=min\displaystyle v=\min LsSwsfs+θ\displaystyle\sum_{\ell\in L}\sum_{s\in S}w_{\ell s}f_{\ell s}+\theta (4a)
s.t. sSfs=1\displaystyle\sum_{s\in S}f_{\ell s}=1 L\displaystyle\forall\ell\in L (4b)
θLzisSpPgsprspi\displaystyle\theta\geq\sum_{\ell\in L}z^{i}_{\ell}\sum_{s\in S}\sum_{p\in P}g_{\ell sp}r_{\ell sp}^{i} i\displaystyle\forall i\in\mathcal{I} (4c)
LsSpPcsprspi+LsSdsfsA\displaystyle\sum_{\ell\in L}\sum_{s\in S}\sum_{p\in P}c_{\ell sp}r^{i}_{\ell sp}+\sum_{\ell\in L}\sum_{s\in S}d_{\ell s}f_{\ell s}\leq A i\displaystyle\forall i\in\mathcal{I} (4d)
pPrspi=fs\displaystyle\sum_{p\in P}r^{i}_{\ell sp}=f_{\ell s} L,sS,i\displaystyle\forall\ell\in L,s\in S,i\in\mathcal{I} (4e)
f{0,1}|L||S|\displaystyle f\in\{0,1\}^{|L||S|} (4f)
ri{0,1}|L||S||P|\displaystyle r^{i}\in\{0,1\}^{|L||S||P|} i,\displaystyle\forall i\in\mathcal{I}, (4g)

where =[n]:={1,,n}\mathcal{I}=[n]:=\{1,\ldots,n\}. Constraint (4c) implies that the minimum value of θ\theta is equal to the maximum population dislocation among all tornadoes in 𝒰\mathcal{U}. Constraint (4d) and (4e) ensure that the recourse vectors rir^{i} corresponding to each scenario, meet the constraints of the second stage.

Remark 2.

Solving problem (4) directly is not practical in general, given that the uncertainty set 𝒰\mathcal{U} might have a large number of scenarios in terms of the number of locations. If E=E=\infty, then there is a polynomial number of scenarios in 𝒰\mathcal{U} which can be constructed based on the stabbing line algorithm in Section 5.3.1 (in this case, nevertheless, using (4) to directly solve the problem remains impractical because there would be at least a quadratic number of scenarios in terms of the number of locations). If E<E<\infty, it remains an open question to determine whether there are polynomially many scenarios in 𝒰\mathcal{U}.

We employ a modified version of the C&CG to solve formulation (4). The algorithm is set to iteratively solve a relaxation of (4) over a subset k\mathcal{I}^{k}\subseteq\mathcal{I} of scenarios at iteration kk to obtain an optimal solution (θk,fk)(\theta^{k},f^{k}). If given fkf^{k}, there exists a tornado coverage zik𝒰z^{i_{k}}\in\mathcal{U} that produces a dislocation greater than θk\theta^{k}, then we add scenario zikz^{i_{k}} to the master problem at the next iteration. Scenario iki_{k} is found by solving the following subproblem, evaluated at fkf^{k}:

Φ(f)=maxz𝒰min{LzsSpPgsprsp:r(f)},\displaystyle\Phi(f)=\max_{z\in\mathcal{U}}\min\left\{\sum_{\ell\in L}z_{\ell}\sum_{s\in S}\sum_{p\in P}g_{\ell sp}r_{\ell sp}:r\in\mathcal{R}(f)\right\}, (5)

where (f)\mathcal{R}(f) is the set of feasible solutions of problem Q(z,f)Q(z,f); see constraints (2b)–(2d). Specifically, if the optimal solution is such that Φ(fk)>θk\Phi(f^{k})>\theta^{k}, then zikz^{i_{k}} is the tornado coverage zz that attains Φ(fk)\Phi(f^{k}). Note that when the variables and constraints associated with scenario iki_{k} are added at iteration k+1k+1, the solution (θk,fk)(\theta^{k},f^{k}) is no longer feasible in the master relaxation.

Let vkv^{k} be the value of the master problem at iteration kk, that is, problem (4) with \mathcal{I} replaced by k\mathcal{I}^{k}, with k={i0,i1,,ik1}\mathcal{I}^{k}=\{i_{0},i_{1},\ldots,i_{k-1}\} and let Φ(fk)\Phi(f^{k}) be the subproblem for the retrofitting strategy fkf^{k} found at iteration kk of the algorithm. The C&CG method is presented in Algorithm 1.

Data: Set 𝒰,L,S\mathcal{U},L,S, and PP
Result: fkf^{k}
1 Set k=0k=0, 1={i0}𝒰\mathcal{I}^{1}=\{{i_{0}}\}\subseteq\mathcal{U}, LB=LB=-\infty, and UB=UB=\infty;
2 while UBLB>0UB-LB>0 do
3       Set k=k+1k=k+1 ;
4       Solve the master MIP vkv^{k} and let fkf^{k} be the optimal retrofitting strategy. Update LB=vkLB=v^{k};
5       Solve the subproblem Φ(fk)\Phi(f^{k}) and let ik{i_{k}} be the index of the zz-optimal solution in \mathcal{I}. Update UB=min{UB,LsSwsfsk+Φ(fk)UB=\min\{UB,\sum_{\ell\in L}\sum_{s\in S}w_{\ell s}f^{k}_{\ell s}+\Phi(f^{k})} and k+1=k{ik}\mathcal{I}^{k+1}=\mathcal{I}^{k}\cup\left\{{i_{k}}\right\};
6 end while
Algorithm 1 C&CG algorithm to solve vv

Algorithm 1 begins with an arbitrary feasible scenario i0{i_{0}}\in\mathcal{I}. In each iteration kk, the relaxed MIP problem vkv^{k} is solved. The value of vkv^{k} then provides a lower bound for the value of vv. We note that the values of vkv^{k}, k0k\geq 0, are non-decreasing in kk. Then, the subproblem Φ(fk)\Phi(f^{k}) generates a new feasible scenario ik{i_{k}} for the next iteration and updates the upper bound. The algorithm terminates when the subproblem does not find a scenario that violates the lower bound value, which implies the upper bound is equal to the lower bound. Zeng and Zhao [2013] prove that the C&CG algorithm converges in finite time.

Note that Step 1 in Algorithm 1 is expensive computationally because it requires solving the MINLP problem Φ(f)\Phi(f) in (5). The approach to solve the subproblem in standard applications of the C&CG relies on using duality or the Karush Kuhn Tucker (KKT) conditions on the second-stage problem [Zeng and Zhao, 2013]. Notice that Φ(f)\Phi(f) is a bilevel problem with integrality requirements at both levels. Therefore, we cannot use either of these approaches. Alternatively, we propose a decomposition branch-and-cut method next.

5 A Decomposition Branch-and-Cut (DBC) Algorithm to Solve Φ(f)\Phi(f)

The DBC method is based on a one-level reformulation of Φ(f)\Phi(f). We replace the min\min in the objective by its epigraphic reformulation and replace the uncertainty set requirements in terms of linear (although exponentially many in the worst-case) constraints. Next, we discuss how to initialize the constraints in the master problem and how to perform the “two types” of separations.

5.1 Overview of the DBC algorithm

Suppose 𝒞\mathcal{C} is the set of combinations of locations that cannot be covered by a tornado path , i.e., for each z𝒰z\notin\mathcal{U}, there exists a set of locations C={L:z=1}𝒞C=\{\ell\in L:z_{\ell}=1\}\in\mathcal{C}. A one-level linear reformulation of Φ(f)\Phi(f) is given by:

Φ(f)=max\displaystyle\Phi(f)=\max\ η\displaystyle\eta (6a)
s.t. ηLzsSpPgsprsp\displaystyle\eta\leq\sum_{\ell\in L}z_{\ell}\sum_{s\in S}\sum_{p\in P}g_{\ell sp}r_{\ell sp} r(f)\displaystyle\forall r\in\mathcal{R}(f) (6b)
Cz|C|1\displaystyle\sum_{\ell\in C}z_{\ell}\leq|C|-1 C𝒞\displaystyle\forall C\in\mathcal{C} (6c)
z{0,1}|L|.\displaystyle z\in\{0,1\}^{|L|}. (6d)

The correctness of the reformulation follows from the maximization sense in (6). Note that rr in (6b) represents a fixed value (not a variable); and that there is such an rr for each element of (f)\mathcal{R}(f).

Observe that (f)\mathcal{R}(f) and 𝒞\mathcal{C} are finite sets with potentially exponentially many elements, thus Φ(f)\Phi(f) cannot be solved directly by a commercial solver. The DBC starts with a relaxation of Φ(f)\Phi(f) by replacing (f)\mathcal{R}(f) and 𝒞\mathcal{C} with subsets 0(f)\mathcal{R}^{0}(f) and 𝒞0\mathcal{C}^{0}, respectively. The resulting problem is referred as the master relaxation. The standard branch-and-cut (BC) algorithm then starts solving the master and prunes nodes by bound and infeasibility. When at some node hh an integral solution zhz^{h} is found (i.e., a solution that is feasible in the master), its feasibility with respect to the original formulation in (6) must be verified.

To this end, Algorithm 2 takes the master feasible solution (ηh,zh)(\eta^{h},z^{h}) at node hh of the BC tree and verifies its feasibility: first, it checks whether zhz^{h} satisfies all 𝒞\mathcal{C}-constraints (6c), i.e., it checks if zh𝒰z^{h}\in\mathcal{U}. If zhz^{h} does not pass the first check, then let Ch={L:zh=1}C^{h}=\{\ell\in L\colon z_{\ell}^{h}=1\} be the active locations in zhz^{h}. Observe that ChC^{h} is a combination of locations that cannot be covered by a tornado path, thus a cut (6c) with C=ChC=C^{h} is added on the fly. If zhz^{h} passes the first check, then the algorithm checks whether zhz^{h} satisfies all (f)\mathcal{R}(f)-constraints (6b). If zhz^{h} also passes the second check, then zhz^{h} is feasible in Φ(f)\Phi(f); if not, then a cut (6b) with r=rhr=r^{h} is added on the fly, rhr^{h} being the optimal solution of the second-stage problem associated with ff and zhz^{h}. The performance of Algorithm 2 depends on the quality of 𝒞0\mathcal{C}^{0} and 0(f)\mathcal{R}^{0}(f) and on having fast separation routines. We discuss these issues next.

Data: Master feasible solution (ηh,zh)(\eta^{h},z^{h})
Result: Generating cuts on the fly, if (ηh,zh)(\eta^{h},z^{h}) is infeasible
1 if zh𝒰z^{h}\notin\mathcal{U} then
2       Define Ch={L:zh=1}C^{h}=\{\ell\in L:z_{\ell}^{h}=1\};
3       Add constraint (6c) with C=ChC=C^{h} on the fly;
4      
5 else if ηh>Q(zh,f)\eta^{h}>Q(z^{h},f) then
6       Define rh=argmin{LzhsSpPgsprsp:r(f)}r^{h}=\arg\min\{\sum_{\ell\in L}z^{h}_{\ell}\sum_{s\in S}\sum_{p\in P}g_{\ell sp}r_{\ell sp}:r\in\mathcal{R}(f)\};
7       Add constraint (6b) with r=rhr=r^{h} on the fly;
8      
9 else
10       (ηh,zh)(\eta^{h},z^{h}) is feasible.
11 end if
Algorithm 2 Separation Procedure for the DBC

5.2 Definition of 𝒞0\mathcal{C}^{0}

The set 𝒞0\mathcal{C}^{0} is constructed by identifying pairs and triples of locations that cannot be covered by a single tornado path. It is worth mentioning that the valid constraints associated with these infeasible cases can also be used to tighten the relaxation of 𝒰\mathcal{U} by the elimination of potentially many infeasible fractional solutions for zz-variables; we evaluate the performance of DBC with 𝒰\mathcal{U} enhanced by these valid cuts in Appendix 5.

5.2.1 Cuts from infeasible pairs.

Because the length of a tornado is at most EE and only locations within a distance of Δ\Delta from a tornado line segment are covered, a tornado cannot cover two locations 1,2L\ell_{1},\ell_{2}\in L if they are at a distance of more than E+2ΔE+2\Delta. Consequently we have the following result:

Proposition 1.

Let Ω={(1,2)L2:(x1,y1)(x2,y2)>2Δ+E}\Omega=\left\{(\ell_{1},\ell_{2})\in L^{2}:\|(x_{\ell_{1}},y_{\ell_{1}})-(x_{\ell_{2}},y_{\ell_{2}})\|>2\Delta+E\right\} be the set of infeasible pairs. Then any z𝒰z\in\mathcal{U} satisfies that

z1+z21(1,2)Ω.z_{\ell_{1}}+z_{\ell_{2}}\leq 1\qquad\forall(\ell_{1},\ell_{2})\in\Omega. (7)

The proof of Proposition 1 is given in Appendix 2.

5.2.2 Infeasible triple cuts.

We also identify infeasible triples of locations that cannot be covered by a tornado path. To introduce the infeasible set of triples, we assume E=E=\infty which implies a line representation for a tornado path. Observe that if a line does not cover a subset of locations ZLZ\subseteq L, then there is no segment of the line to cover the locations in ZZ either. For any locations 1\ell_{1} and 2\ell_{2}, the analysis below partitions the plane (2)({\mathbb{R}}^{2}) in two regions, denoted by R1,2R^{\prime}_{\ell_{1},\ell_{2}} and R1,2′′R^{\prime\prime}_{\ell_{1},\ell_{2}}. Region R1,2R^{\prime}_{\ell_{1},\ell_{2}} is the set of points 2\ell\in\mathbb{R}^{2} for which there exist a line that covers 1,2\ell_{1},\ell_{2} and \ell, and R1,2′′=2R1,2R^{\prime\prime}_{\ell_{1},\ell_{2}}=\mathbb{R}^{2}\setminus R^{\prime}_{\ell_{1},\ell_{2}}. For simplicity, in the next discussion we interchangeably refer to a point in 2{\mathbb{R}}^{2} by its name, as 2\ell\in{\mathbb{R}}^{2}, or by its two-dimensional coordinates, as in (x,y)2(x_{\ell},y_{\ell})\in{\mathbb{R}}^{2}.

Observe that a line λ2\lambda\subset\mathbb{R}^{2} covers both 1\ell_{1} and 2\ell_{2} if and only if λB1\lambda\cap B_{1}\not=\emptyset and λB2\lambda\cap B_{2}\not=\emptyset, where BiB_{i} is the ball with center i\ell_{i} and radius Δ\Delta, i=1,2i=1,2. Let 1,2\mathcal{L}_{\ell_{1},\ell_{2}} be the collection of these lines, and let P1,2P_{\ell_{1},\ell_{2}} be the set of points that belong to any such line:

P1,2={2:λ1,2 s.t. λ}.P_{\ell_{1},\ell_{2}}=\{\ell\in\mathbb{R}^{2}\colon\exists\lambda\in\mathcal{L}_{\ell_{1},\ell_{2}}\text{ s.t. }\ell\in\lambda\}. (8)

For any set T2T\subseteq\mathbb{R}^{2} let T(Δ)T(\Delta) be the set of points that are at a distance at most Δ\Delta from TT, that is

T(Δ)={(x,y)2:(xt,yt)T s.t. (x,y)(xt,yt)Δ}.T(\Delta)=\{(x_{\ell},y_{\ell})\in\mathbb{R}^{2}\colon\exists(x_{t},y_{t})\in T\text{ s.t. }||(x_{\ell},y_{\ell})-(x_{t},y_{t})||\leq\Delta\}. (9)

It is readily seen that R1,2=P1,2(Δ)R^{\prime}_{\ell_{1},\ell_{2}}=P_{\ell_{1},\ell_{2}}(\Delta).

Now, the set P1,2P_{\ell_{1},\ell_{2}} can be characterized by the four lines τ1\tau_{1}, τ2\tau_{2}, σ1\sigma_{1} and σ2\sigma_{2} that are tangent to both C1C_{1} and C2C_{2}, where C1C_{1} and C2C_{2} are the circles enclosing B1B_{1} and B2B_{2}, see Figure 3(a). Specifically, let P~1,2\tilde{P}_{\ell_{1},\ell_{2}} be the set enclosed by these tangents, see Figure 3(b), we next show that P~1,2=P1,2\tilde{P}_{\ell_{1},\ell_{2}}=P_{\ell_{1},\ell_{2}}.

Refer to caption
(a) C1C_{1} and C2C_{2} are circles centered at 1\ell_{1} and 2\ell_{2}, respectively, with radius Δ\Delta; τ1\tau_{1}, τ2\tau_{2}, σ1\sigma_{1}, and σ2\sigma_{2} are the (only) lines that are tangent to both C1C_{1} and C2C_{2}.
Refer to caption
(b) The region P~1,2\tilde{P}_{\ell_{1},\ell_{2}} is enclosed by the orange lines.
Figure 3: Tangent lines to circles centered at 1\ell_{1} and 2\ell_{2} with radius Δ\Delta

Indeed, let λ0\lambda_{0} be the line that passes through 1\ell_{1} and 2\ell_{2} and suppose that a point \ell is in between τ1\tau_{1} and τ2\tau_{2}. Then, the line λ\lambda that passes through \ell and is parallel to λ0\lambda_{0} intersects both B1B_{1} and B2B_{2}. Suppose that \ell belongs to the region left of 1\ell_{1} between τ2\tau_{2} and σ2\sigma_{2}. Then, the line λ\lambda that passes through \ell and the point σ2C2\sigma_{2}\cap C_{2} intersects both B1B_{1} and B2B_{2}. Notice that this argument can be repeated for the remaining regions of P~1,2\tilde{P}_{\ell_{1},\ell_{2}}, and thus we can conclude that P~1,2P1,2\tilde{P}_{\ell_{1},\ell_{2}}\subseteq P_{\ell_{1},\ell_{2}}.

Conversely, let P1,2\ell\in P_{\ell_{1},\ell_{2}} and let λ1,2\lambda\in\mathcal{L}_{\ell_{1},\ell_{2}} be the line intersecting B1B_{1} and B2B_{2} such that λ\ell\in\lambda. If λ\lambda is one of the tangents, then it is clear that λP~1,2\lambda\subseteq\tilde{P}_{\ell_{1},\ell_{2}} and it follows that P~1,2\ell\in\tilde{P}_{\ell_{1},\ell_{2}}. Thus, assume that λ\lambda is not one of the tangents and let p1p_{1} and p2p_{2} be two arbitrary elements of λB1\lambda\cap B_{1} and λB2\lambda\cap B_{2}. Observe that the segment ss of λ\lambda between p1p_{1} and p2p_{2} must be completely contained in between τ1\tau_{1} and τ2\tau_{2}. Moreover, as λ\lambda is not one of the tangents, ss intersects both σ1\sigma_{1} and σ2\sigma_{2}. Because two straight lines can intersect at most once, the previous observations imply that the λ\lambda cannot intersect σ1\sigma_{1} nor σ2\sigma_{2} at any point left of p1p_{1} and right of p2p_{2}; in other words, it must be the case that λ\lambda is completely contained in P~1,2\tilde{P}_{\ell_{1},\ell_{2}}, which implies that P~1,2\ell\in\tilde{P}_{\ell_{1},\ell_{2}}, as desired.

Given the previous considerations, in order to characterize R1,2R^{\prime}_{\ell_{1},\ell_{2}} it is necessary to characterize P~1,2(Δ)\tilde{P}_{\ell_{1},\ell_{2}}(\Delta). From the shape of P~1,2\tilde{P}_{\ell_{1},\ell_{2}}, it is clear that P~1,2(Δ)\tilde{P}_{\ell_{1},\ell_{2}}(\Delta) looks very similar to P~1,2\tilde{P}_{\ell_{1},\ell_{2}}, with the difference that its border starts Δ\Delta units up and Δ\Delta units down, see Figure 4(a)

Refer to caption
(a) The region P~1,2(Δ)\tilde{P}_{\ell_{1},\ell_{2}}(\Delta) is enclosed by the orange lines. The tangents τ1\tau_{1}, τ2\tau_{2}, σ1\sigma_{1}, and σ2\sigma_{2}, as well as the circles C1C_{1} and C2C_{2} are shown in dashed lines. The circles D1D_{1} and D2D_{2} centered at 1\ell_{1} and 2\ell_{2}, respectively, have radius 2Δ2\Delta.
Refer to caption
(b) The lines λi\lambda_{i}, i=0,,6i=0,\ldots,6, that define the region P~1,2(Δ)\tilde{P}_{\ell_{1},\ell_{2}}(\Delta). The smaller circles are C1C_{1} and C2C_{2}, the larger circles are D1D_{1} and D2D_{2}.
Figure 4: The region P~1,2(Δ)\tilde{P}_{\ell_{1},\ell_{2}}(\Delta).

Next, we use geometric facts to derive an explicit equation for lines defining the boundaries of P~1,2(Δ)\tilde{P}_{\ell_{1},\ell_{2}}(\Delta) for a given 1\ell_{1} and 2\ell_{2}. For ease of exposition hereafter we assume that x1x2x_{\ell_{1}}\leq x_{\ell_{2}} and y1y2y_{\ell_{1}}\leq y_{\ell_{2}}. Define θ=arctany2y1x2x1\theta=\arctan{\frac{y_{\ell_{2}}-y_{\ell_{1}}}{x_{\ell_{2}}-x_{\ell_{1}}}} to be the angle of slope of the line λ0\lambda_{0} which connects 1\ell_{1} and 2\ell_{2} with respect to the horizontal axis and let α=arcsin2ΔD(1,2)\alpha=\arcsin{\frac{2\Delta}{D(\ell_{1},\ell_{2})}}, where D(1,2)D(\ell_{1},\ell_{2}) is the Euclidean distance between 1\ell_{1} and 2\ell_{2}. Then we have that P~1,2(Δ)={(x,y)2:\widetilde{P}_{\ell_{1},\ell_{2}}(\Delta)=\{(x,y)\in\mathbb{R}^{2}\colon Eqs (10a)–(10f) hold}\}, where

y\displaystyle y tanθ(xx1)+y1+2Δcosθ\displaystyle\leq\tan{\theta}\cdot(x-x_{\ell_{1}})+y_{\ell_{1}}+\frac{2\Delta}{\cos{\theta}} (λ1)\displaystyle(\lambda_{1}) (10a)
y\displaystyle y tanθ(xx1)+y12Δcosθ\displaystyle\geq\tan{\theta}\cdot(x-x_{\ell_{1}})+y_{\ell_{1}}-\frac{2\Delta}{\cos{\theta}} (λ2)\displaystyle(\lambda_{2}) (10b)
y\displaystyle y tan(θ+α)(xx1)+y1\displaystyle\leq\tan{(\theta+\alpha)}\cdot(x-x_{\ell_{1}})+y_{\ell_{1}} (λ3)\displaystyle(\lambda_{3}) (10c)
y\displaystyle y tan(θ+α)(xx2)+y2\displaystyle\geq\tan{(\theta+\alpha)}\cdot(x-x_{\ell_{2}})+y_{\ell_{2}} (λ4)\displaystyle(\lambda_{4}) (10d)
y\displaystyle y tan(θα)(xx2)+y2\displaystyle\leq\tan{(\theta-\alpha)}\cdot(x-x_{\ell_{2}})+y_{\ell_{2}} (λ5)\displaystyle(\lambda_{5}) (10e)
y\displaystyle y tan(θα)(xx1)+y1\displaystyle\geq\tan{(\theta-\alpha)}\cdot(x-x_{\ell_{1}})+y_{\ell_{1}} (λ6).\displaystyle(\lambda_{6}). (10f)

The lines λi\lambda_{i}, i=0,,6i=0,\ldots,6 defined in Equations (10a)– (10f) are depicted graphically in Figure 4(b).

Now, let

Γ1,2={L{1,2}:(x,y)2P~1,2(Δ)}.\Gamma_{\ell_{1},\ell_{2}}=\bigl{\{}\ell\in L\setminus\{\ell_{1},\ell_{2}\}:(x_{\ell},y_{\ell})\in\mathbb{R}^{2}\setminus\tilde{P}_{\ell_{1},\ell_{2}}(\Delta)\bigr{\}}. (11)

The previous discussion is summarized in the following result, which states that if a location belongs to the infeasible set Γ1,2\Gamma_{\ell_{1},\ell_{2}} then at most two locations among 1,2\ell_{1},\ell_{2}, and 3\ell_{3} can be chosen to be covered by a tornado. A more formal proof of this result is given in Appendix 3.

Proposition 2.

Let 1\ell_{1} and 2\ell_{2} be two elements of LL and suppose that D(1,2)>2ΔD(\ell_{1},\ell_{2})>2\Delta. Then any z𝒰z\in\mathcal{U} satisfies that

z1+z2+z2Γ1,2.z_{\ell_{1}}+z_{\ell_{2}}+z_{\ell}\leq 2\qquad\forall\ell\in\Gamma_{\ell_{1},\ell_{2}}. (12)

It is worth mentioning that we do not need to consider all possible combinations of locations to construct the infeasible triple cuts because if 3Γ1,2\ell_{3}\in\Gamma_{\ell_{1},\ell_{2}}, then 1Γ2,3\ell_{1}\in\Gamma_{\ell_{2},\ell_{3}} and 2Γ1,3\ell_{2}\in\Gamma_{\ell_{1},\ell_{3}}. Also, we note that the pair-wise and triple valid constraints introduced so far do not completely characterize 𝒰\mathcal{U}, as shown in the next remark. However, they can be used to define the initial subset 𝒞0𝒞\mathcal{C}^{0}\subseteq\mathcal{C} of the master relaxation in the DBC as follows:

𝒞0={(1,2)Ω}{(1,2,3):3Γ1,2,1,2L,D(1,2)>2Δ}.\mathcal{C}^{0}=\big{\{}(\ell_{1},\ell_{2})\in\Omega\big{\}}\cup\big{\{}(\ell_{1},\ell_{2},\ell_{3}):\ell_{3}\in\Gamma_{\ell_{1},\ell_{2}},\ell_{1},\ell_{2}\in L,D(\ell_{1},\ell_{2})>2\Delta\big{\}}. (13)
Remark 3.

Define 𝒱={z{0,1}|L|:Cz|C|1,C𝒞0}\mathcal{V}=\{z\in\{0,1\}^{|L|}:\sum_{\ell\in C}z_{\ell}\leq|C|-1,\forall C\in\mathcal{C}^{0}\}. The set 𝒱\mathcal{V} does not necessarily determine all the feasible solutions in the uncertainty set 𝒰\mathcal{U}; specifically 𝒰𝒱\mathcal{U}\subset\mathcal{V} and in general there exist points in 𝒱\mathcal{V} that do not belong to 𝒰\mathcal{U}. For example, consider a case of three locations 1,2\ell_{1},\ell_{2}, and 3\ell_{3} with coordinates (0,0),(4,0)(0,0),(4,0), and (2,1.1)(2,1.1) on a plane under a tornado with the maximum length of E=2E=2 and the width of Δ=1\Delta=1 (See Figure 5). It can be easily observed that there exists no tornado path that covers all three locations because the only tornado path covering 1\ell_{1} and 2\ell_{2} is the line segment with endpoints (1,0)(1,0) and (3,0)(3,0). Obviously, the location (2,1.1)(2,1.1) is not covered by this path. However, z1=z2=z3=1z_{\ell_{1}}=z_{\ell_{2}}=z_{\ell_{3}}=1 is a feasible solution in 𝒱\mathcal{V} because it satisfies both the infeasible pair and triple cuts.

Refer to caption
Figure 5: The only possible tornado path covering buildings (0,0)(0,0) and (4,0)(4,0).

5.3 Feasibility check in 𝒞\mathcal{C}

Next, we present a method to determine whether a master feasible solution zhz^{h} belongs to 𝒰\mathcal{U}. We start our analysis for the case when E=E=\infty and then present a method for the case when E<E<\infty.

5.3.1 Feasibility check for E=E=\infty using the stabbing line algorithm (SLA).

The stabbing line problem consists of a collection of (disjoint) circles 𝒪={O1,O2,,On}\mathcal{O}=\{O_{1},O_{2},\ldots,O_{n}\} and the objective is to find the line on the plane that intersects the most circles. The SLA is an algorithm that solves this problem and reports c(𝒪)c(\mathcal{O}): the maximum number of circles in 𝒪\mathcal{O} that can be intersected with a line. Consider the collection of circles 𝒪h\mathcal{O}^{h} with centers at the locations in ChC^{h} and radius Δ\Delta. Observe that a tornado path with E=E=\infty covers all locations in ChC^{h} if and only if the c(𝒪h)=|Ch|c(\mathcal{O}^{h})=|C^{h}| (see Figure 6). Therefore, if c(𝒪h)<|Ch|c(\mathcal{O}^{h})<|C^{h}|, then zh𝒰z^{h}\not\in\mathcal{U} whereas if c(𝒪h)=|Ch|c(\mathcal{O}^{h})=|C^{h}| then zh𝒰z^{h}\in\mathcal{U}.

Refer to caption
Figure 6: Finding the locations that are covered by a tornado within distance Δ\Delta is equivalent to finding a line that stabs the circles centered at the locations with radius Δ\Delta.

We explain next the SLA following Saba [2013]. Assume first a set of disjoint circles 𝒪={O1,O2,,Om}\mathcal{O}=\{O_{1},O_{2},\ldots,O_{m}\}, m>0m>0. Given any two disjoint circles OaO_{a} and ObO_{b}, find the two external and two internal tangent lines to each pair of circles (Oa,Ob)(O_{a},O_{b}) and record the intersection points on both circles; see Figure 7. Let pabE,qabEp_{ab}^{E},q_{ab}^{E} and pabI,qabIp_{ab}^{I},q_{ab}^{I} be the intersection points of these external and internal tangent lines, respectively, with OaO_{a}. Note that a tangent line to OaO_{a} that touches any point pp in the arc [pabE,pabI][p_{ab}^{E},p_{ab}^{I}] (or [qabI,qabE][q_{ab}^{I},q_{ab}^{E}]) intersects ObO_{b}, see Figure 7.

Refer to caption
Figure 7: Four tangent lines and the intersection points for a pair of circles (Oa,Ob)(O_{a},O_{b}) are shown. A tangent line at any point pp on the arc [pabE,pabI][p_{ab}^{E},p_{ab}^{I}] also intersects ObO_{b}.

Given OaO_{a}, the SLA computes the arc-intervals [pabE,pabI][p_{ab}^{E},p_{ab}^{I}] and [qabI,qabE][q_{ab}^{I},q_{ab}^{E}] for all bab\not=a; note there exist exactly 2(m1)2(m-1) such intervals for OaO_{a}. Let πa\pi_{a} be an endpoint of any such arc-intervals that belong to the maximum amount of arc-intervals. Then, the tangent line that touches OaO_{a} at πa\pi_{a} is a line intersecting OaO_{a} that intersects the most circles in 𝒪\mathcal{O}. Iterating this process starting from each a=1,,ma=1,\ldots,m, will determine a line that intersects the most circles. The SLA can be implemented O(m2logm)O(m^{2}\log m) time; see Saba [2013] for further details on the algorithm.

In our case the circles in 𝒪h\mathcal{O}^{h} might be non-intersecting, as the locations in ChC^{h} might be at a distance less than 2Δ2\Delta. We thus adapt the SLA, noting that if OaObO_{a}\cap O_{b}\not=\emptyset then the internal tangents are not necessary and that doing the analysis with the arc-interval [pabE,qabE][p_{ab}^{E},q_{ab}^{E}] is sufficient for this case.

5.3.2 Feasibility check if E<E<\infty.

In this case, if c(𝒪h)<|Ch|c(\mathcal{O}^{h})<|C^{h}|, then we can again conclude that there is no finite line segment that covers ChC^{h} and thus zh𝒰z^{h}\not\in\mathcal{U}. Otherwise, if c(𝒪h)=|Ch|c(\mathcal{O}^{h})=|C^{h}|, then there is an infinite line that covers all locations in ChC^{h}, but there is no guarantee that a line segment of length at most EE covers all locations of ChC^{h}. Thus, we complete the feasibility check in two steps: first, we use the line resulting from the SLA and projection ideas to determine whether the line can be trimmed to be of length EE without compromising its coverage, the details are in Appendix 4. If even after this step the feasibility of zhz^{h} cannot be guaranteed, then we check the feasibility of zhz^{h} algebraically using a simplified version of 𝒰\mathcal{U}.

Specifically, consider the set 𝒰~h\tilde{\mathcal{U}}^{h} defined as

𝒰~h={(e0,e1)\displaystyle\tilde{\mathcal{U}}^{h}=\bigg{\{}(e_{0},e_{1})\in R2:t[0,1]|Ch|,e0e1E\displaystyle R^{2}:\exists t\in[0,1]^{|C^{h}|},\|e_{0}-e_{1}\|\leq E (14a)
e0+t(e1e0)(x,y)Δ,Ch}.\displaystyle\|e_{0}+t_{\ell}(e_{1}-e_{0})-(x_{\ell},y_{\ell})\|\leq\Delta,\ \forall\ell\in C^{h}\bigg{\}}. (14b)

Observe that zh𝒰z^{h}\in\mathcal{U} if and only if 𝒰~h\tilde{\mathcal{U}}^{h}\not=\emptyset and that (14) is far simpler than 𝒰\mathcal{U} because it has fewer variables and does not involve binary variables nor ‘big-M’ values. Checking whether 𝒰~h\tilde{\mathcal{U}}^{h} is non-empty can be done using a quadratic (non-convex) continuous optimization solver. The such check can be significantly speed-up by adding linear cuts in 𝒰~h\tilde{\mathcal{U}}^{h}, see the details in Appendix 4.

5.4 Definition of 0(f)\mathcal{R}^{0}(f) and feasibility check for (f)\mathcal{R}(f)

To initialize the master problem we assume that 0(f)={r0}\mathcal{R}^{0}(f)=\{r^{0}\} where r0r^{0} is an optimal solution for the second-stage problem Q(z,f)Q(z,f) assuming no location is hit, i.e., r0r^{0} is a solution of Q(𝟎,f)Q(\mathbf{0},f). On the other hand, once it has been checked that zh𝒰z^{h}\in\mathcal{U}, we check that zhz^{h} satisfies all (f)\mathcal{R}(f)-constraints in (6b) by solving the second-stage problem evaluated at zhz^{h}, i.e., by solving Q(zh,f)Q(z^{h},f). Let rhr^{h} be an optimal solution of Q(zh,f)Q(z^{h},f). If ηh>Q(zh,f)\eta^{h}>Q(z^{h},f) then (ηh,zh)(\eta^{h},z^{h}) is not feasible in (6b) and we add the constraint ηLzsSpPgsprsph\eta\leq\sum_{\ell\in L}z_{\ell}\sum_{s\in S}\sum_{p\in P}g_{\ell sp}r_{\ell sp}^{h} at all active nodes of the BC tree. Conversely, if ηhQ(zf,f)\eta^{h}\leq Q(z^{f},f), then (ηh,zh)(\eta^{h},z^{h}) is a feasible solution of (6) and node hh is pruned by feasibility after updating the lower bound of the BC. Observe that the initialization and separation procedure involve solving the NPNP-hard problem Q(z,f)Q(z,f); however, this problem is relatively simple and can be solved quickly using commercial MIP solvers, see our computational results in Section 6.

6 Case study: retrofitting/recovery residential buildings in Joplin, MO

Next, we perform several numerical experiments with the proposed model. Our objectives are to study the performance of the two-stage optimization problem, to analyze how the optimal solutions change with the length of the path, to gather high-level insights into the optimal retrofitting and recovery activities, and to compare the optimal policies with other benchmark policies. The experiments are based on location and cost data from Joplin, MO. Joplin was the location of one of the most severe tornadoes in US history that occurred on May 22, 2011. The tornado was rated EF-5 with an average speed of more than 200 mph and crossed 22.1 miles on the ground with a width of one mile. This catastrophe caused the loss of 161 lives and more than a thousand injuries. The total damage was approximated at 3 billion dollars as around 7500 residential structures were destroyed [Kuligowski et al., 2014].

6.1 Definition of Parameters

The geographic and demographic data are based on information from Joplin and extracted from the online platform IN-CORE [2022]. Particularly, this dataset divides buildings in about 1500 “block IDs” (which are contiguous blocks of the city) and includes over 20,000 buildings. For our experiments, we use only the single or multi-story residential wood-frame building archetypes.

We assume an EF-2 tornado with a wind speed of 134 mph, a width of 0.75 miles (thus Δ\Delta=0.75/2), and a length of 5 and \infty miles. Following Wang et al. [2021], we consider the retrofitting strategies presented in Table 1; these strategies are analyzed in Masoomi et al. [2018] with respect to the component fragility of wood-frame residential building archetypes. The retrofitting activities in Table  1, have minimal impact in the livability of the buildings; thus we assume that the first stage population dislocation parameter is zero for all locations and strategies, that is, ws=0w_{\ell s}=0 for all L,sS\ell\in L,s\in S. This assumption, however, does not change the complexity of solving the problem, and if necessary could be relaxed to better depict a particular context or instance of interest.

Table 1: Retrofitting strategies for the experiments.
Strategy ss Description
R1R_{1} Roof covering with asphalt shingles, using 8d nails to attach roof deck sheathing panel to rafters spaced at 6/12 inch, and the selection of two 16d toenails for roof-to-wall
R2R_{2} Roof covering with asphalt shingles, using 8d nails to attach roof deck sheathing panel to rafters spaced at 6/6 inch, and the selection of two H2.5 clips for roof-to-wall
R3R_{3} Roof covering with clay tiles, using 8d nails to attach roof deck sheathing panel to rafters spaced at 6/6 inch, and the selection of two H2.5 clips for roof-to-wall.

The cost of implementing these strategies are computed from the data of  IN-CORE [2022]. As mentioned in Section 3, a ‘do-nothing’ strategy with zero cost is also included in the retrofitting strategy set SS, that is, SS={do-nothing, R1, R2, R3}. On the other hand, only two recovery strategies are assumed in our experiment, namely, recover (p=1p=1) and do-nothing (p=0p=0); thus P={0,1}P=\{0,1\}.

The second stage population dislocation parameters, gspg_{\ell sp}, are defined as the expected population dislocation 6060 days after the tornado (Appendix 6 has additional experiments for 30 days of recovery). These values are evaluated based on the state of damage dDd\in D immediately after the tornado hits, where DD is the set of damage states. Let XX_{\ell} be the random variable denoting the functionality of \ell after 60 days; where X=0X_{\ell}=0, only if \ell reaches 100% functionality after 6060 days (no dislocation) and X=1X_{\ell}=1 otherwise (dislocation). Also, let YDY_{\ell}\in D be the random variable representing the damage at \ell immediately after the tornado, and let σ\sigma_{\ell} denote the retrofitting strategy. Then, the expected population dislocation after recovery is

gs1=N×E[X|σ=s],g_{\ell s1}=N_{\ell}\times E[X_{\ell}|\sigma_{\ell}=s], (15)

where NN_{\ell} is the population of location L\ell\in L. Since the value of XX_{\ell} depends on YY_{\ell}, using conditional probability and the (reasonable) assumption that XX_{\ell} is independent of σ\sigma_{\ell} given the knowledge of YY_{\ell}, we have that

E[X|σ=s]=dDP[X=1|Y=d]P[Y=d|σ=s].E[X_{\ell}|\sigma_{\ell}=s]=\sum_{d\in D}P[X_{\ell}=1|Y_{\ell}=d]P[Y_{\ell}=d|\sigma_{\ell}=s]. (16)

Following Koliou and van de Lindt [2020], the damage states are given by D={D=\{Minor, Moderate, Extensive, Complete}\}. We compute P[X=u|Y=d]P[X_{\ell}=u|Y_{\ell}=d] using the repair time distributions described in FEMA [2003]. These distributions are lognormal and their parameters can be found in Koliou and van de Lindt [2020]. The probabilities P[Y=d|σ=s]P[Y_{\ell}=d|\sigma_{\ell}=s] are computed from the building-level tornado fragility-curves for wood-frame residential buildings in Masoomi et al. [2018], Koliou and van de Lindt [2020].

The cost of recovery cs1c_{\ell s1} is the expected percentage of the total location replacement cost: suppose RR_{\ell} is the area of location L\ell\in L and α\alpha is the cost of replacement per m2m^{2}. For the wood residential archetype, we set α=$862.0/m2\alpha=\$862.0/m^{2} and, the percentage of the location replacement cost to be rminor=0.5%r_{minor}=0.5\%, rmoderate=2.3%r_{moderate}=2.3\%, rextensive=11.7%r_{extensive}=11.7\%, and rcomplete=23.4%r_{complete}=23.4\%, see Koliou and van de Lindt [2020]. The following formula is used to compute the cost of recovery for location \ell if it is retrofitted by strategy ss:

cs1=α×R×dDrdP[Y=d|σ=s].c_{\ell s1}=\alpha\times R_{\ell}\times\sum_{d\in D}r_{d}P[Y=d|\sigma=s]. (17)

We assume the decision-maker takes charge of all recovery expenses.

On the other hand, if a location does not receive resources from the decision-maker, then the population dislocation will be higher and depends on the resident’s actions. We assume the population dislocation for the do-nothing strategy is a factor of the population dislocation resulting from the recovery actions of the decision-maker, i.e.,

gs0=μsgs1L,sS.g_{\ell s0}=\mu_{\ell s}g_{\ell s1}\quad\forall\ell\in L,s\in S. (18)

The factor μs\mu_{\ell s} can vary such that gs0[gs1,N]g_{\ell s0}\in[g_{\ell s1},N_{\ell}]: gs0=gs1g_{\ell s0}=g_{\ell s1} implies that the residents pay a full amount of expenses by themselves to recover their buildings as quickly as the decision-maker, and gs0=Ng_{\ell s0}=N_{\ell} means that the residents take no recovery action on their own and therefore the whole population is dislocated from location \ell. For our experiments, we fix gs0=(gs1+N)/2g_{\ell s0}=(g_{\ell s1}+N_{\ell})/2 which is the midpoint in the range. Note that the cost of the do-nothing strategy is cs0=0,L,sSc_{\ell s0}=0,\forall\ell\in L,s\in S from the decision-maker’s point of view.

We remark that various parameters of our case study we selected rather arbitrarily; for instance, the assumption that recovery means that the building recovers 100% functionality; that the last day of recovery is 60 days; or that ‘half’ the residents recover their property without assistance. These are reasonable values that are selected for illustration purposes and can be changed by the decision-maker as desired. Generally, modifications of these parameters should not impact the model’s performance, and as long as there is data available that account for the modifications, our model should be able to run; see for example Appendix 6 where experiments with a recovery time of 30 days are reported.

6.2 Robust retrofitting and recovery strategies in Joplin, MO

We implement the proposed two-stage optimization model to find robust retrofitting and recovery strategies for locations in Joplin. All algorithms are coded in Python 3.9 and solved using Gurobi Optimizer 9.1.1 on a 64-bit Windows operating system with Intel(R) Core(TM) i7-8550U CPU and 8.00 GB of RAM under a time limit of 3600 seconds. The source code is available in online repository Ansari [2023]. We use Algorithm 1, along with the DBC method described in Section 5 with the setup that yields the best performance; see our comparative experiments in Table 6 in Appendix 5.

In order to define the locations in LL, we group Joplin “block IDs” in 100 center locations using the kk-means method [MacQueen, 1967] and aggregate the data accordingly. Particularly, we assume that when the tornado hits a location then all of its buildings are hit, and that the tornado hits a location only if the location’s centroid is within Δ\Delta units of the path. Table 2 compares the population dislocation for when the tornado length is E=5E=5 miles or \infty and the budgets are A=0,15,30A=0,15,30 million USD. Columns 1 and 2 in Table 2 show EE and AA. Column 3 has the optimal population dislocation under the worst-case tornado for each set of parameters. Columns 4 and 5 report the CPU run time of C&CG Algorithm 1 in seconds and its number of iterations, respectively. Column 6 shows the CPU runtime of the DBC method in seconds to solve subproblem Φ(f)\Phi(f). Column 7 compares the CPU time that the DBC algorithm spends in a callback function to verify the feasibility of integral solutions. Column 8 shows the total CPU time to find a feasible solution in the set 𝒰~h\tilde{\mathcal{U}}^{h}. Columns 9 and 10 present the proportion of the total budget that is spent for retrofitting and recovery, respectively.

Table 2: Solving the two-stage robust optimization model with different parameters of tornado length and available budget, after 60 days of recovery for 100 locations group in Joplin, MO.

Length Budget Population CCG CCG DBC Callback 𝒰~h\tilde{\mathcal{U}}^{h} feasibility Retrofitting cost Recovery cost ($) dislocation run time (sec.) iteration run time (sec.) run time (sec.) run time (sec.) /budget /budget 5 0 M 16318 127 2 126 3 1 - - 15 M 13408 307 3 306 11 6 0.6 0.4 30 M 13091 300 3 300 11 5 0.3 0.7 \infty 0 M 17293 568 2 568 3 0 - - 15 M 14236 716 2 716 5 0 0.6 0.4 30 M 13839 986 3 985 5 0 0.4 0.6

Table 2 shows that the solver is able to find optimal solutions for every experiment in at most 986 seconds. It also shows that solving the subproblems is the most time-consuming step (which is virtually 99% of the total runtime). In general, the algorithm solves the subproblem for 5 miles line segment faster than the (infinite) line; this fact can be justified by the effect of the conflict constraints (7) which are not present when E=E=\infty. In addition, for all experiments, the callback function (i.e., Algorithm 2) is very fast, which implies that the bottleneck of the entire algorithm is the branch-and-bound that solves the relaxation of the subproblem. As expected, for the infinite line, the results show zero seconds to check the feasibility using 𝒰~h\tilde{\mathcal{U}}^{h}, because in this case, the SLA alone can verify the feasibility.

For both tornado lengths, there are decreases in the dislocation by increasing the budget because decision-makers are able to retrofit and recover more locations. For example, increasing the budget from $0 to $15M results in around 3000 fewer dislocations in damaged neighborhoods. Note that this translates in reductions of around 20% in population dislocation for both tornado lengths by investing $15M. However, adding another $15 million will reduce dislocations only by around 500 people because of the great cost of recovery. In fact, the relationship between budget and dislocation exhibits a clear diminishing returns behavior, see Figure 8, where it can be seen that after around $10M there is a small decrease in population dislocation. From a decision-making point of view, these results implies that it is not reasonable to spend more than $10M-$15M in retrofitting and recovery, as the return of investment is not worth it.

Refer to caption
Figure 8: Budget vs population dislocation for a path length of E=5E=5 miles.

More details on the optimal strategies can be found in Figure 9, which maps the locations, their optimal strategies, and the worst-case tornado scenarios for various budgets. It shows that in all experiments the decision-maker uses most of the extra amount of budget from $15M to $30M to recover a few locations rather than in retrofit locations that are not in the path of the worst-case tornado. Notice that recovery costs are generally more expensive than retrofitting costs. For example, the recovered location in the \infty-$15M map in Figure 9 has 470 residents; 382 of which are estimated to be dislocated by spending $194K for retrofitting. However, the decision-maker has to spend $5.5M in recovery to further reduce the estimated dislocation to 295 people for this location. Columns 9-10 in Table 2 show that the proportion of the budget that is assigned to recovery increases by having more budget. In addition, we can observe in Figure 9 that the path of worst-case tornadoes does not change by much in different experiments, suggesting that the location of the tornado path is largely driven by the population density in the city center area.

Refer to caption
Figure 9: Maps of 100 locations and their retrofitting and recovery strategies under the worst-case tornado scenario for six parameter settings in Table 2. When retrofitting, the selected strategy is almost exclusively R3R_{3}, which is the best, but most expensive, strategy.

These results suggest, from a worst-case perspective, that it is optimal to invest only in locations in or close to where the worst-case tornado hits and that it is better to invest both in retrofitting and recovery, rather than just in retrofitting. The results are somewhat surprising in the sense that, at least a priori, it would be reasonable to invest all budget in retrofitting across a wider area (particularly because recovery is much more expensive than retrofitting). As such, the results suggest that there is a critical set of clustered locations, in this case the densely populated center of the city, where most of the investments must be concentrated. We suspect, however, that there is a different structure for the optimal actions in data sets with a more homogeneous population distribution.

6.3 Advantages of robust retrofitting

In this section we compare the optimal two-stage robust retrofitting and recovery strategies against a policy that makes retrofitting and recovery decisions at random. We assume a E=5E=5 miles tornado path and a total budget of A=A=$15 million. The decision-maker is allowed to spend $0, $3, $9, and $15 million of the budget in each experiment to randomly retrofit locations with random selections in set SS; the remaining budget is reserved for the recovery actions. Once a retrofitting strategy ff is determined, then the corresponding worst-case second-stage happens (i.e., the value of Φ(f)\Phi(f) is determined, see Equation (5)). Table 3 compares the average, maximum, minimum, and standard deviation of population dislocation for 10 random replications. Note that for the $0M case, we do not need multiple replications.

Table 3: Comparison of population dislocation statistics for 10 random retrofitting plans with spending a certain amount of budget out of a total $15M.

Budget to randomly retrofit Population Dislocation Average Maximum Minimum Standard deviation $0M (0%) 16318 - $3M (20%) 16057 16263 15717 163 $9M (60%) 15596 15905 15306 196 $15M (100%) 15143 15451 14764 189 Robust optimal retrofitting 13408 -

Refer to caption
Figure 10: Box and Whisker plots for Table 3 experiments. It shows the reduction trend for population dislocation by considering more budget for retrofitting.

The results in Table 3 show that with random policies the average, maximum, and minimum dislocation after the corresponding worst-case tornado decrease with the percentage of the budget spent in retrofitting. These results are depicted graphically in the Box plots in Figure 10. Note that the proposed robust optimization model results in 13408 dislocations, which is noticeable better than the random policies. To further emphasize the value of optimization, recall that the optimal solution with our proposed method in Table 2 spends $9M out of $15M (60% of budget) in retrofitting. By contrast, even the minimum population dislocation with random retrofitting using the same budget proportion is 15306 (a 14% increase).

We conduct additional simulations to randomly retrofit locations with the full amount of $15M and $30M budget as before, but this time the worst-case tornado found in Section 6.2 is used. The results across 10 replications are shown in Table 4, which shows that for both cases the robust optimal population dislocation is significantly less than the minimum of population dislocation with random retrofitting. The plot in Figure 11 provides a visualization of the significant gap between robust optimal value (stars) and the distribution of values for random retrofitting plans. We can also observe that population dislocation reduces by increasing the amount of budget.

Table 4: Comparison of population dislocation statistics using ten different random retrofitting plans and budgets of $15M and $30M.

Budget Population dislocation Robust optimal retrofitting Average Maximum Minimum Standard deviation $15M 13408 15314 15941 14545 331 $30M 13091 14795 15248 14145 294

Refer to caption
Figure 11: Box and Whisker plots for Table 4 experiments. It shows the gap between the robust optimal plan (stars) and the population dislocation of the random retrofitting strategies for the base worst-case tornado.

The results of this section show that deciding using the proposed two-stage robust method yields significant reductions in population dislocation against random policies when evaluating in terms of worst-case outcomes. In the next section we complement these experiments by analyzing how the optimal policy behaves when random tornadoes, instead of the worst-case scenario, happen.

6.4 Robust strategies in random scenarios

In this section we fix the optimal retrofitting-recovery plan and compare the robust population dislocation values resulting from having 10 simulated 5-miles tornadoes, see Table 5 and Figure 12.

Table 5: Comparison of population dislocation statistics for the worst-case tornado and simulated tornadoes by using the optimal retrofitting plan

Budget Population dislocation Worst-case tornado Average Maximum Minimum Standard deviation $0M 16318 10324 13201 5233 2835 $15M 13408 9634 12720 5031 2679 $30M 13091 9416 12480 4900 2607

Refer to caption
Figure 12: Box and Whisker plots for Table 5 experiments. It shows the distribution of dislocation values for simulated tornadoes and the gap to the worst-case tornado.

The results for $0M in Table 5 and Figure 12 show that there is a large gap between the worst-case tornado 16318 (blue star) and the maximum value among simulation results which is 13201. As expected, by having more budget, the average population dislocations in the simulations reduce from 10324 to 9643 for $15M and to 9416 for $30M. In addition, the gap between the robust and maximum simulation values for $15 and $30M are noticeable smaller than the gap for the no-budget case.

These observations show the following about the optimal retrofitting-recovery policy: first, that there can be a large variability for population dislocation assuming any tornado is possible. Second, that the variability seems to decrease as more budget is available, and third, that the worst-case scenario is not that far way from simulated scenarios. This last point is further emphasized by the fact that only 10 tornadoes are simulated; one should expect that with more simulated tornadoes the gap between the worst-case and the maximum dislocation observed reduces even more. Further, this last point also shows that the worst-case is not as rare as one might anticipate, and thus that the proposed robust optimization model does not suffer from ‘over-conservatism,’ which is a common drawback of deciding in a robust manner.

7 Conclusions

Motivated by the need of data-driven methods to allocate resources in retrofitting for tornado-prone areas, we consider a two-stage robust optimization model to determine retrofitting and recovery strategies before and after the realization of an uncertain tornado disaster. We assume that the decision-maker (a combination of public-private agencies) has to allocate a budget in retrofitting and recovery actions, to minimize population dislocation. We propose a two-stage optimization model where the first-stage variables determine the retrofitting strategies and the second-stage variables determine the recovery strategy, assuming that for any retrofitting action, the corresponding worst-case tornado happens. Given that the uncertainty corresponds to the possible tornado paths, the resulting problem is a two-stage mixed-integer robust optimization problem with a mixed-integer non-linear uncertainty set.

We show that the proposed problem is NP-hard. A standard approach to solve the problem is a column-and-constraint generation algorithm that needs to solve a max-min subproblem at each iteration. We embed a decomposition branch-and-cut algorithm in the column-and-constraint solution method to address the non-convex structure of the bilevel subproblem. We propose two sets of conflict constraints and a custom separation procedure to implement the decomposition branch-and-cut algorithm. Using data from INCORE, we use our model to provide the optimal retrofitting and recovery strategies for the city of Joplin, Missouri against the worst-case scenario. The results show that the optimal policy exhibits a diminishing returns behavior that sets-in quickly; prioritizes the high-density city center; and prefers to retrofit and recover than to only retrofit. The proposed policy also outperforms other benchmark and does not suffer from ‘over-conservatism.’

Future work will focus on modeling tornado damages assuming that there might be several levels of disruptions. Additionally, future research would analyze other social vulnerability indices to measure community resilience under the risk of a tornado. One line of research might study the population dislocation in residential areas with different income levels after certain days of a tornado occurrence, in order to recognize more vulnerable locations that require immediate agencies’ attention. Another line of research might take our proposed framework to study other natural disasters like hurricanes with minor modifications in the uncertainty model and the set of retrofitting strategies.

Acknowledgment

This research is partially funded by the National Science Foundation (NSF) (Awards ENG/CMMI # 2145553 and GEO/RISE # 2052930) and by the Air Force Office of Scientific Research (AFORS) (Award # FA9550-22-1-0236). This research was also partially funded by the National Institute of Standards and Technology (NIST) Center of Excellence for Risk-Based Community Resilience Planning through a cooperative agreement with Colorado State University [Awards # 70NANB20H008 and 70NANB15H044]. The contents expressed in this paper are the views of the authors and do not necessarily represent the opinions or views of the National Institute of Standards and Technology (NIST), the National Science Foundation (NSF), or the Air Force Office of Scientific Research (AFORS).

References

  • An and Zeng [2015] Y. An and B. Zeng. Exploring the modeling capacity of two-stage robust optimization: Variants of robust unit commitment model. IEEE Transactions on Power Systems, 30(1):109–122, 2015. doi: 10.1109/TPWRS.2014.2320880.
  • An et al. [2014] Y. An, B. Zeng, Y. Zhang, and L. Zhao. Reliable p-median facility location problem: two-stage robust models and algorithms. Transportation Research Part B: Methodological, 64:54–72, 2014.
  • Ansari [2023] M. Ansari. Github repository. Online at https://github.com/mehdi-ansari/Two_Stage_Robust_Tornado_Problem, Accessed September 2023, September 2023.
  • Ansari et al. [2022] M. Ansari, J. S. Borrero, and L. Lozano. Robust minimum-cost flow problems under multiple ripple effect disruptions. INFORMS Journal on Computing, 2022.
  • Atamtürk and Zhang [2007] A. Atamtürk and M. Zhang. Two-stage robust network flow and design under demand uncertainty. Operations Research, 55(4):662–673, 2007.
  • Ben-Tal and Nemirovski [1999] A. Ben-Tal and A. Nemirovski. Robust solutions to uncertain linear programs. Operations Research Letters, 25:1–13, 1999.
  • Ben-Tal et al. [2004] A. Ben-Tal, A. Goryashko, E. Guslitzer, and A. Nemirovski. Adjustable robust solutions of uncertain linear programs. Mathematical programming, 99(2):351–376, 2004.
  • Ben-Tal et al. [2011] A. Ben-Tal, B. Do Chung, S. R. Mandala, and T. Yao. Robust optimization for emergency logistics planning: Risk mitigation in humanitarian relief supply chains. Transportation research part B: methodological, 45(8):1177–1189, 2011.
  • Ben-Tal et al. [2015] A. Ben-Tal, E. Hazan, T. Koren, and S. Mannor. Oracle-based robust optimization via online learning. Operations Research, 63(3):628–638, 2015.
  • Bertsimas and Sim [2004] D. Bertsimas and M. Sim. The price of robustness. Operations Research, 52(1):35–53, 2004.
  • Borrero and Lozano [2021] J. S. Borrero and L. Lozano. Modeling defender-attacker problems as robust linear programs with mixed-integer uncertainty sets. INFORMS Journal on Computing, 33(4):1570–1589, 2021.
  • Cheng et al. [2021] C. Cheng, Y. Adulyasak, and L.-M. Rousseau. Robust facility location under demand uncertainty and facility disruptions. Omega, 103:102429, 2021.
  • Ding et al. [2017] T. Ding, C. Li, Y. Yang, J. Jiang, Z. Bie, and F. Blaabjerg. A two-stage robust optimization for centralized-optimal dispatch of photovoltaic inverters in active distribution networks. IEEE Transactions on Sustainable Energy, 8(2):744–754, 2017. doi: 10.1109/TSTE.2016.2605926.
  • Fan and Pang [2019] F. Fan and W. Pang. Stochastic track model for tornado risk assessment in the us. Frontiers in built environment, 5:37, 2019.
  • Farokhnia et al. [2020] K. Farokhnia, J. W. van de Lindt, and M. Koliou. Selection of residential building design requirements to achieve community functionality goals under tornado loading. Practice Periodical on Structural Design and Construction, 25(1):04019035, 2020.
  • FEMA [2003] FEMA. Multi-hazard loss estimation methodology: Earthquake model. Hazus MH 2.1. 2003.
  • FEMA [2021] FEMA. Natural hazard retrofit program toolkit. https://www.fema.gov/sites/default/files/documents/fema_natural-hazards-retrofit-program-tookit.pdf, Accessed January 2023, February 2021.
  • FEMA [2022a] FEMA. Tornado–alerts and warnings. Online at https://community.fema.gov/ProtectiveActions, Accessed November 2022, November 2022a.
  • FEMA [2022b] FEMA. Resources for repairing, retrofitting and rebuilding after a tornado. https://www.fema.gov/fact-sheet/resources-repairing-retrofitting-and-rebuilding-after-tornado-0, Accessed January 2023, March 2022b.
  • Gabrel et al. [2014] V. Gabrel, M. Lacroix, C. Murat, and N. Remli. Robust location transportation problems under uncertain demands. Discrete Applied Mathematics, 164:100–111, 2014.
  • Ho-Nguyen and Kılınç-Karzan [2018] N. Ho-Nguyen and F. Kılınç-Karzan. Online first-order framework for robust convex optimization. Operations Research, 66(6):1670–1692, 2018.
  • IN-CORE [2022] IN-CORE. Interdependent networked community resilience modeling environment. https://incore.ncsa.illinois.edu/, Accessed October 2022, October 2022.
  • Jabr et al. [2015] R. A. Jabr, I. Džafić, and B. C. Pal. Robust optimization of storage investment on transmission networks. IEEE Transactions on Power Systems, 30(1):531–539, 2015. doi: 10.1109/TPWRS.2014.2326557.
  • Jiang et al. [2012] R. Jiang, M. Zhang, G. Li, and Y. Guan. Benders’ decomposition for the two-stage security constrained robust unit commitment problem. In IIE Annual Conference. Proceedings, page 1. Institute of Industrial and Systems Engineers (IISE), 2012.
  • Koliou and van de Lindt [2020] M. Koliou and J. W. van de Lindt. Development of building restoration functions for use in community recovery planning to tornadoes. Natural Hazards Review, 21(2):04020004, 2020.
  • Kuligowski et al. [2014] E. D. Kuligowski, F. T. Lombardo, L. Phan, M. L. Levitan, and D. P. Jorgensen. Final report, national institute of standards and technology (nist) technical investigation of the may 22, 2011, tornado in joplin, missouri. 2014.
  • Laporte and Louveaux [1993] G. Laporte and F. V. Louveaux. The integer L-shaped method for stochastic integer programs with complete recourse. Operations Research Letters, 13:133–142, 1993.
  • Li et al. [2021] Y. Li, F. Zhang, Y. Li, and Y. Wang. An improved two-stage robust optimization model for cchp-p2g microgrid system considering multi-energy operation under wind power outputs uncertainties. Energy, 223:120048, 2021.
  • Lin et al. [2004] X. Lin, S. L. Janak, and C. A. Floudas. A new robust optimization approach for scheduling under uncertainty: I. bounded uncertainty. Computers & chemical engineering, 28(6-7):1069–1085, 2004.
  • Ma et al. [2018] S. Ma, B. Chen, and Z. Wang. Resilience enhancement strategy for distribution systems under extreme weather events. IEEE Transactions on Smart Grid, 9(2):1442–1451, 2018.
  • MacQueen [1967] J. MacQueen. Classification and analysis of multivariate observations. In 5th Berkeley Symp. Math. Statist. Probability, pages 281–297, 1967.
  • Masoomi and van de Lindt [2018] H. Masoomi and J. W. van de Lindt. Restoration and functionality assessment of a community subjected to tornado hazard. Structure and Infrastructure Engineering, 14(3):275–291, 2018.
  • Masoomi et al. [2018] H. Masoomi, M. R. Ameri, and J. W. van de Lindt. Wind performance enhancement strategies for residential wood-frame buildings. Journal of Performance of Constructed Facilities, 32(3):04018024, 2018.
  • Matthews et al. [2019] L. R. Matthews, C. E. Gounaris, and I. G. Kevrekidis. Designing networks with resiliency to edge failures using two-stage robust optimization. European Journal of Operational Research, 279(3):704–720, 2019.
  • McAllister et al. [2015] T. P. McAllister et al. Community resilience planning guide for buildings and infrastructure systems, volume i. 2015.
  • Mutapcic and Boyd [2009] A. Mutapcic and S. Boyd. Cutting-set methods for robust convex optimization with pessimizing oracles. Optimization Methods & Software, 24(3):381–406, 2009.
  • Neyshabouri and Berg [2017] S. Neyshabouri and B. P. Berg. Two-stage robust optimization approach to elective surgery and downstream capacity planning. European Journal of Operational Research, 260(1):21–40, 2017.
  • NOAA [2022a] NOAA. National centers for environmental information, tornadoes statistics. Online at https://www.ncei.noaa.gov, Accessed September 2022, September 2022a.
  • NOAA [2022b] NOAA. Storm predication center - national weather service. Online at https://www.spc.noaa.gov/, Accessed October 2022, October 2022b.
  • NOAA [2022c] NOAA. Tornadoes frequently asked questions. Online at https://www.weather.gov/lmk/tornadoesfaq, Accessed November 2022, November 2022c.
  • NOAA [2022d] NOAA. Supercells. Online at https://www.spc.noaa.gov/misc/AbtDerechos/supercells.htm, Accessed November 2022, November 2022d.
  • NOAA [2022e] NOAA. Weather related fatality and injury statistics. Online at https://www.weather.gov/hazstat/, Accessed November 2022, November 2022e.
  • NOAA [2022f] NOAA. National weather service, the enhanced fujita scale (ef scale). https://www.weather.gov, Accessed September 2022, September 2022f.
  • NOAA [2023] NOAA. Damage assessment toolkit. Online at https://apps.dat.noaa.gov/stormdamage/damageviewer/, Accessed March 2023, March 2023.
  • NWC [2023] NWC. Historical data of oklahoma county tornadoes. Online at https://www.weather.gov/oun/tornadodata-county-ok-oklahoma, Accessed January 2023, January 2023.
  • Ripberger et al. [2018] J. T. Ripberger, H. C. Jenkins-Smith, C. L. Silva, J. Czajkowski, H. Kunreuther, and K. M. Simmons. Tornado damage mitigation: Homeowner support for enhanced building codes in oklahoma. Risk analysis, 38(11):2300–2317, 2018.
  • Saba [2013] S. Saba. Line intersecting maximal number of circles (circle “stabbing” problem). https://sahandsaba.com/line-intersecting-maximal-number-of-circles.html, Accessed October 2022, October 2013.
  • Shams et al. [2021] M. H. Shams, M. Shahabi, M. MansourLakouraj, M. Shafie-khah, and J. P. Catalão. Adjustable robust optimization approach for two-stage operation of energy hub-based microgrids. Energy, 222:119894, 2021.
  • Simmons et al. [2015] K. M. Simmons, P. Kovacs, and G. A. Kopp. Tornado damage mitigation: Benefit–cost analysis of enhanced building codes in oklahoma. Weather, climate, and society, 7(2):169–178, 2015.
  • Standohar-Alfano et al. [2017] C. D. Standohar-Alfano, J. W. van de Lindt, and B. R. Ellingwood. Vertical load path failure risk analysis of residential wood-frame construction in tornadoes. Journal of Structural Engineering, 143(7):04017045, 2017.
  • Stoner and Pang [2021] M. Stoner and W. Pang. Tornado hazard assessment of residential structures built using cross-laminated timber and light-frame wood construction in the us. Natural Hazards Review, 22(4):04021032, 2021.
  • Strader et al. [2016] S. M. Strader, T. J. Pingel, and W. S. Ashley. A monte carlo model for estimating tornado impacts. Meteorological Applications, 23(2):269–281, 2016.
  • Takeda et al. [2008] A. Takeda, S. Taguchi, and R. Tütüncü. Adjustable robust optimization models for a nonlinear two-period system. Journal of Optimization Theory and Applications, 136(2):275–295, 2008.
  • The White House [2022] The White House. Fact sheet: Biden–harris administration launches initiative to modernize building codes, improve climate resilience, and reduce energy costs. https://www.whitehouse.gov/briefing-room/statements-releases/2022/06/01/fact-sheet-biden-harris-administration-launches-initiative-to-modernize-building-codes-improve-climate-resilience-and-reduce-energy-costs/, June 2022.
  • Thiele et al. [2009] A. Thiele, T. Terry, and M. Epelman. Robust linear optimization with recourse. Rapport technique, pages 4–37, 2009.
  • van de Lindt and Dao [2009] J. W. van de Lindt and T. N. Dao. Performance-based wind engineering for wood-frame buildings. Journal of Structural Engineering, 135(2):169–177, 2009.
  • Velasquez et al. [2020] G. A. Velasquez, M. E. Mayorga, and O. Y. Özaltın. Prepositioning disaster relief supplies using robust optimization. IISE Transactions, 52(10):1122–1140, 2020.
  • Wang et al. [2017] J. Wang, S. Cao, W. Pang, and J. Cao. Experimental study on effects of ground roughness on flow characteristics of tornado-like vortices. Boundary-Layer Meteorology, 162:319–339, 2017.
  • Wang et al. [2021] W. Wang, J. W. Van De Lindt, N. Rosenheim, H. Cutler, B. Hartman, J. Sung Lee, and D. Calderon. Effect of residential building wind retrofits on social and economic community-level resilience metrics. Journal of Infrastructure Systems, 27(4):04021034, 2021.
  • Wen [2021] Y. Wen. Development of Multi-Objective Optimization Model of Community Resilience on Mitigation Planning. PhD thesis, University of Oklahoma, 2021.
  • Xiong et al. [2017] P. Xiong, P. Jirutitijaroen, and C. Singh. A distributionally robust optimization model for unit commitment considering uncertain wind power generation. IEEE Transactions on Power Systems, 32(1):39–49, 2017.
  • Yao et al. [2009] T. Yao, S. R. Mandala, and B. Do Chung. Evacuation transportation planning under uncertainty: a robust optimization approach. Networks and Spatial Economics, 9(2):171, 2009.
  • Yuan et al. [2016] W. Yuan, J. Wang, F. Qiu, C. Chen, C. Kang, and B. Zeng. Robust optimization-based resilient distribution network planning against natural disasters. IEEE Transactions on Smart Grid, 7(6):2817–2826, 2016.
  • Zeng and Zhao [2013] B. Zeng and L. Zhao. Solving two-stage robust optimization problems using a column-and-constraint generation method. Operations Research Letters, 41(5):457–461, 2013.
  • Zhao and Zeng [2012] L. Zhao and B. Zeng. Robust unit commitment problem with demand response and wind energy. In 2012 IEEE power and energy society general meeting, pages 1–8. IEEE, 2012.

APPENDIX

1 Proof of NPNP-hardness

Proposition 3.

The optimization problem (1) is NP-hard.

Proof: Consider an arbitrary instance of the knapsack problem with NN items, weights bi,iNb_{i},\forall i\in N, values qi,iNq_{i},\forall i\in N, capacity BB, and value QQ. We build an instance of problem (1) that is equivalent to the knapsack problem. Consider an instance of problem (1) with |S|=1|S|=1 and |P|=2|P|=2. Observe that because |S|=1|S|=1, ff has to be equal to a vector of ones. Suppose that the coordinates of the locations and the values of EE and Δ\Delta are such that z=1z_{\ell}=1 for all L\ell\in L is feasible in 𝒰\mathcal{U}. For simplicity, we drop index ss from the notation. Also, note that r2r_{\ell 2} can be replaced by 1r11-r_{\ell 1} for all L\ell\in L because only two recovery strategies are assumed. The specific case of the problem can be rewritten as

v=min\displaystyle v=\min L(g1g2)r1+L(w+g2)\displaystyle\sum_{\ell\in L}(g_{\ell 1}-g_{\ell 2})r_{\ell 1}+\sum_{\ell\in L}(w_{\ell}+g_{\ell 2}) (19a)
s.t. L(c1c2)r1AL(d+c2)\displaystyle\sum_{\ell\in L}(c_{\ell 1}-c_{\ell 2})r_{\ell 1}\leq A-\sum_{\ell\in L}(d_{\ell}+c_{\ell 2}) (19b)
r1{0,1}|L|.\displaystyle r_{\ell 1}\in\{0,1\}^{|L|}. (19c)

Consider the example of problem (19) where L=NL=N, c1c2=bc_{\ell 1}-c_{\ell 2}=b_{\ell} and g2g1=qg_{\ell 2}-g_{\ell 1}=q_{\ell} for each item L\ell\in L, and AL(d+c2)=BA-\sum_{\ell\in L}(d_{\ell}+c_{\ell 2})=B. The answer of knapsack problem for some instance LNL^{*}\subseteq N is YES (i.e., iLqiQ\sum_{i\in L^{*}}q_{i}\geq Q), if and only if vL(w+g2)Q{v}\leq\sum_{\ell\in L}(w_{\ell}+g_{\ell 2})-Q.  

2 Proof of Proposition 1

Proof: Suppose (1,2)Ω(\ell_{1},\ell_{2})\in\Omega, and for the sake of contradiction that z1=z2=1z_{\ell_{1}}=z_{\ell_{2}}=1. For the constraint in (3b), we have

(1t1)e0+t1e1(x1,y1)Δ\displaystyle\|(1-t_{\ell_{1}})e_{0}+t_{\ell_{1}}e_{1}-(x_{\ell_{1}},y_{\ell_{1}})\|\leq\Delta (20a)
(1t2)e0+t2e1(x2,y2)Δ.\displaystyle\|(1-t_{\ell_{2}})e_{0}+t_{\ell_{2}}e_{1}-(x_{\ell_{2}},y_{\ell_{2}})\|\leq\Delta. (20b)

The sum of two above inequalities results

(1t1)e0+t1e1(x1,y1)+(x2,y2)(1t2)e0t2e12Δ,\|(1-t_{\ell_{1}})e_{0}+t_{\ell_{1}}e_{1}-(x_{\ell_{1}},y_{\ell_{1}})\|+\|(x_{\ell_{2}},y_{\ell_{2}})-(1-t_{\ell_{2}})e_{0}-t_{\ell_{2}}e_{1}\|\leq 2\Delta, (21)

and by applying the triangle inequality X+YX+Y\|X+Y\|\leq\|X\|+\|Y\|, we conclude that

(x2x1,y2y1)+(t2t1)(e0e1)2Δ.\|(x_{\ell_{2}}-x_{\ell_{1}},y_{\ell_{2}}-y_{\ell_{1}})+(t_{\ell_{2}}-t_{\ell_{1}})(e_{0}-e_{1})\|\leq 2\Delta. (22)

Finally, we employ the fact that XYXY\|X\|-\|Y\|\leq\|X-Y\| to reach

(x2x1,y2y1)(t1t2)(e0e1)2Δ.\|(x_{\ell_{2}}-x_{\ell_{1}},y_{\ell_{2}}-y_{\ell_{1}})\|-\|(t_{\ell_{1}}-t_{\ell_{2}})(e_{0}-e_{1})\|\leq 2\Delta. (23)

Now, we show (23) cannot be true because (1,2)Ω(\ell_{1},\ell_{2})\in\Omega, i.e.,

(x2x1,y2y1)>2Δ+E.\|(x_{\ell_{2}}-x_{\ell_{1}},y_{\ell_{2}}-y_{\ell_{1}})\|>2\Delta+E. (24)

By constraint (3d) and using aY=|a|Y\|aY\|=|a|\|Y\|, we have

(t1t2)(e0e1)=|t1t2|e0e1|t1t2|EE.\|(t_{\ell_{1}}-t_{\ell_{2}})(e_{0}-e_{1})\|=|t_{\ell_{1}}-t_{\ell_{2}}|\|e_{0}-e_{1}\|\leq|t_{1}-t_{2}|E\leq E. (25)

Note that |t1t2|1|t_{1}-t_{2}|\leq 1. So, the two above inequalities imply that

{(x2x1,y2y1)>2Δ+E(t1t2)(e0e1)1E\displaystyle\begin{cases}\|(x_{\ell_{2}}-x_{\ell_{1}},y_{\ell_{2}}-y_{\ell_{1}})\|>2\Delta+E\\ -\|(t_{1}-t_{2})(e_{0}-e_{1})\|_{1}\geq-E\end{cases} (26)
(x2x1,y2y1)(t1t2)(e0e1)>2Δ.\displaystyle\quad\implies\|(x_{\ell_{2}}-x_{\ell_{1}},y_{\ell_{2}}-y_{\ell_{1}})\|-\|(t_{\ell_{1}}-t_{\ell_{2}})(e_{0}-e_{1})\|>2\Delta.

Observe that (23) violates the true inequality (LABEL:contradiction_res). Therefore, the cut z1+z21z_{\ell_{1}}+z_{\ell_{2}}\leq 1 is valid because z1=z2=1z_{\ell_{1}}=z_{\ell_{2}}=1 is an infeasible solution under the assumption (1,2)Ω(\ell_{1},\ell_{2})\in\Omega.  

3 Proof of Proposition 2

This section provides a more detailed discussion (and a more detailed proof) for Proposition 2. Proof: We are interested to identify the division of space RR into feasible (R1,2R_{\ell_{1},\ell_{2}}^{\prime}) and infeasible (R1,2′′R_{\ell_{1},\ell_{2}}^{\prime\prime}) subspaces for two locations 1\ell_{1} and 2\ell_{2} with coordinates (x1,y1)(x_{\ell_{1}},y_{\ell_{1}}) and (x2,y2)(x_{\ell_{2}},y_{\ell_{2}}), respectively. For the sake of simplicity, we assume that x1x2x_{\ell_{1}}\leq x_{\ell_{2}} throughout the proof; the results can be easily extended to the case x1>x2x_{\ell_{1}}>x_{\ell_{2}}.

Lemma 1.

Lines λ1,,λ6\lambda_{1},\ldots,\lambda_{6} in (10a)-(10f) determine boundaries of subspaces.

Proof: We find feasible slope mm and y-intercept qq of lines in the form of y=mx+qy=mx+q with a distance Δ\Delta from both locations 1\ell_{1} and 2\ell_{2} which means the following equalities must simultaneously hold,

|y1mx1q|1+m2=Δ,\displaystyle\frac{|y_{\ell_{1}}-mx_{\ell_{1}}-q|}{\sqrt{1+m^{2}}}=\Delta, (27a)
|y2mx2q|1+m2=Δ.\displaystyle\frac{|y_{\ell_{2}}-mx_{\ell_{2}}-q|}{\sqrt{1+m^{2}}}=\Delta. (27b)

The above equalities imply two possible cases:

|y1mx1q|1+m2\displaystyle\frac{|y_{\ell_{1}}-mx_{\ell_{1}}-q|}{\sqrt{1+m^{2}}} =|y2mx2q|1+m2\displaystyle=\frac{|y_{\ell_{2}}-mx_{\ell_{2}}-q|}{\sqrt{1+m^{2}}} (28)
\displaystyle\implies {y1mx1=y2mx2(Case 1)y1mx1q=mx2+qy2(Case 2).\displaystyle\begin{cases}y_{\ell_{1}}-mx_{\ell_{1}}=y_{\ell_{2}}-mx_{\ell_{2}}\ (\textbf{Case 1})\\ y_{\ell_{1}}-mx_{\ell_{1}}-q=mx_{\ell_{2}}+q-y_{\ell_{2}}\ (\textbf{Case 2})\end{cases}.

Case 1.

m=y2y1x2x1=tan(θ)(by the definition).m=\frac{y_{\ell_{2}}-y_{\ell_{1}}}{x_{\ell_{2}}-x_{\ell_{1}}}=\tan(\theta)\ (\text{by the definition}). (29)

By replacing m=tan(θ)m=\tan(\theta) in (27a), we will have

|y1tan(θ)x1q|1+tan2(θ)=Δ\displaystyle\frac{|y_{\ell_{1}}-\tan(\theta)x_{\ell_{1}}-q|}{\sqrt{1+\tan^{2}(\theta)}}=\Delta (30a)
\displaystyle\implies |y1tan(θ)x1q||cos(θ)|=Δ\displaystyle|y_{\ell_{1}}-\tan(\theta)x_{\ell_{1}}-q||\cos(\theta)|=\Delta (1+tan2(θ)=1|cos(θ)|)\displaystyle(\sqrt{1+\tan^{2}(\theta)}=\frac{1}{|\cos(\theta)|}) (30b)
\displaystyle\implies |y1tan(θ)x1q|=Δcos(θ)\displaystyle|y_{\ell_{1}}-\tan(\theta)x_{\ell_{1}}-q|=\frac{\Delta}{\cos(\theta)} (x1x2cos(θ)0)\displaystyle(x_{\ell_{1}}\leq x_{\ell_{2}}\implies\cos(\theta)\geq 0) (30c)
\displaystyle\implies {q=y1tan(θ)x1Δcos(θ)q′′=y1tan(θ)x1+Δcos(θ)\displaystyle\begin{cases}q^{\prime}=y_{\ell_{1}}-\tan(\theta)x_{\ell_{1}}-\frac{\Delta}{\cos(\theta)}\\ q^{\prime\prime}=y_{\ell_{1}}-\tan(\theta)x_{\ell_{1}}+\frac{\Delta}{\cos(\theta)}\end{cases} (30d)

So, the tornado paths with formulations

y=tan(θ)(xx1)+y1Δcos(θ),\displaystyle y=\tan(\theta)(x-x_{\ell_{1}})+y_{\ell_{1}}-\frac{\Delta}{\cos(\theta)}, (31a)
y=tan(θ)(xx1)+y1+Δcos(θ),\displaystyle y=\tan(\theta)(x-x_{\ell_{1}})+y_{\ell_{1}}+\frac{\Delta}{\cos(\theta)}, (31b)

are two boundaries that cover both locations (observe that any other qq between qq^{\prime} and q′′q^{\prime\prime} (qqq′′q^{\prime}\leq q\leq q^{\prime\prime}) corresponding to the slope m=tanθm=\tan\theta forms a tornado path that has a distance at most Δ\Delta to the locations 1\ell_{1} and 2\ell_{2}). The tornado in (31a) covers all locations in distance Δ\Delta between the lines y=tanθ(xx1)+y12Δcosθy=\tan\theta(x-x_{\ell_{1}})+y_{\ell_{1}}-\frac{2\Delta}{\cos\theta} (see (10b) for line λ2\lambda_{2}) and y=tanθ(xx1)+y1y=\tan\theta(x-x_{\ell_{1}})+y_{\ell_{1}}. Similarly, the tornado (31b) covers all points between y=tanθ(xx1)+y1y=\tan\theta(x-x_{\ell_{1}})+y_{\ell_{1}} and y=tanθ(xx1)+y1+2Δcosθy=\tan\theta(x-x_{\ell_{1}})+y_{\ell_{1}}+\frac{2\Delta}{\cos\theta} (see (10a) for line λ1\lambda_{1}).

Replacing m=tanθm=\tan\theta in (27b) will give the same boundaries as (27a).
Case 2.

q=y1+y2m(x1+x2)2.q=\frac{y_{\ell_{1}}+y_{\ell_{2}}-m(x_{\ell_{1}}+x_{\ell_{2}})}{2}. (32)

By replacing q=y1+y2m(x1+x2)2q=\frac{y_{\ell_{1}}+y_{\ell_{2}}-m(x_{\ell_{1}}+x_{\ell_{2}})}{2} in (27a), we have

|y1mx1y1+y2m(x1+x2)2|1+m2=Δ\displaystyle\frac{|y_{\ell_{1}}-mx_{\ell_{1}}-\frac{y_{\ell_{1}}+y_{\ell_{2}}-m(x_{\ell_{1}}+x_{\ell_{2}})}{2}|}{\sqrt{1+m^{2}}}=\Delta (33)
\displaystyle\implies |y2y1m(x2x1)|1+m2=2Δ\displaystyle\frac{|y_{\ell_{2}}-y_{\ell_{1}}-m(x_{\ell_{2}}-x_{\ell_{1}})|}{\sqrt{1+m^{2}}}=2\Delta

Instead of solving (33) for mm which leads to a complicated quadratic equation, we exploit the form of equality to compute possible values of mm. Observe that (33) can be interpreted as a line passing through the origin and has a distance 2Δ2\Delta from the point (x2x1,y2y1)(x_{\ell_{2}}-x_{\ell_{1}},y_{\ell_{2}}-y_{\ell_{1}}) (see Figure 13).

Refer to caption
Figure 13: Two lines passing the origin and have a distance 2Δ2\Delta from the point (x2x1,y2y1)(x_{\ell_{2}}-x_{\ell_{1}},y_{\ell_{2}}-y_{\ell_{1}})

Now, we discuss that the angles corresponding to the possible slopes of mm must be

m=tan(arctany2y1x2x1+arcsin2Δd),\displaystyle m^{\prime}=\tan{\left(\arctan{\frac{y_{\ell_{2}}-y_{\ell_{1}}}{x_{\ell_{2}}-x_{\ell_{1}}}}+\arcsin{\frac{2\Delta}{d}}\right)}, (34)
m′′=tan(arctany2y1x2x1arcsin2Δd),\displaystyle m^{\prime\prime}=\tan{\left(\arctan{\frac{y_{\ell_{2}}-y_{\ell_{1}}}{x_{\ell_{2}}-x_{\ell_{1}}}}-\arcsin{\frac{2\Delta}{d}}\right)}, (35)

where arctany2y1x2x1=θ\arctan{\frac{y_{\ell_{2}}-y_{\ell_{1}}}{x_{\ell_{2}}-x_{\ell_{1}}}}=\theta and arcsin2ΔD(1,2)=α\arcsin{\frac{2\Delta}{D(\ell_{1},\ell_{2})}}=\alpha by the definition. Therefore,

m=tan(θ+α),\displaystyle m^{\prime}=\tan{(\theta+\alpha)}, (36)
m′′=tan(θα).\displaystyle m^{\prime\prime}=\tan{(\theta-\alpha)}. (37)

So, the resulting tornado paths are

y\displaystyle y =tan(θ+α)x+y1+y2tan(θ+α)(x1+x2)2\displaystyle=\tan(\theta+\alpha)x+\frac{y_{\ell_{1}}+y_{\ell_{2}}-\tan(\theta+\alpha)(x_{\ell_{1}}+x_{\ell_{2}})}{2} (38)
=tan(θ+α)(xx1+x22)+y1+y22\displaystyle=\tan(\theta+\alpha)(x-\frac{x_{\ell_{1}}+x_{\ell_{2}}}{2})+\frac{y_{\ell_{1}}+y_{\ell_{2}}}{2}
y\displaystyle y =tan(θα)x+y1+y2tan(θα)(x1+x2)2\displaystyle=\tan(\theta-\alpha)x+\frac{y_{\ell_{1}}+y_{\ell_{2}}-\tan(\theta-\alpha)(x_{\ell_{1}}+x_{\ell_{2}})}{2} (39)
=tan(θα)(xx1+x22)+y1+y22\displaystyle=\tan(\theta-\alpha)(x-\frac{x_{\ell_{1}}+x_{\ell_{2}}}{2})+\frac{y_{\ell_{1}}+y_{\ell_{2}}}{2}

Observe that these tornado paths pass through the midpoint (x1+x22,y1+y22)(\frac{x_{\ell_{1}}+x_{\ell_{2}}}{2},\frac{y_{\ell_{1}}+y_{\ell_{2}}}{2}). So, two edges of the tornado path in (38) with distance Δ\Delta will be y=tan(θ+α)(xx1)+y1y=\tan(\theta+\alpha)(x-x_{\ell_{1}})+y_{\ell_{1}} and y=tan(θ+α)(xx2)+y2y=\tan(\theta+\alpha)(x-x_{\ell_{2}})+y_{\ell_{2}} (see lines λ3\lambda_{3} and λ4\lambda_{4} in (10c) and (10d)). Likewise, the Δ\Delta edges of (39) are y=tan(θα)(xx1)+y1y=\tan(\theta-\alpha)(x-x_{\ell_{1}})+y_{\ell_{1}} and y=tan(θα)(xx2)+y2y=\tan(\theta-\alpha)(x-x_{\ell_{2}})+y_{\ell_{2}} (see lines λ5\lambda_{5} and λ6\lambda_{6} in (10e) and (10f)). Replacing qq in (27b) leads to the same equality in (33), and so the same conclusions.  

In the following, we determine the feasible pair (β,q(β))(\beta,q(\beta)) for the line y=tan(β)x+q(β)y=\tan(\beta)x+q(\beta) to cover both locations 1\ell_{1} and 2\ell_{2} within the distance Δ\Delta, where β=arctan(m)\beta=\arctan(m) is the angle of the slope of the line and q(β)q(\beta) is the yy-intercept of the line given angle β\beta. It can be shown that any feasible slope angle β\beta must be inside the interval [θα,θ+α][\theta-\alpha,\theta+\alpha] as follows.

|y1tan(β)x1q(β)|1+tan2βΔ,\displaystyle\frac{|y_{\ell_{1}}-\tan(\beta)x_{\ell_{1}}-q(\beta)|}{\sqrt{1+\tan^{2}\beta}}\leq\Delta, (40a)
|y2tan(β)x2q(β)|1+tan2βΔ.\displaystyle\frac{|y_{\ell_{2}}-\tan(\beta)x_{\ell_{2}}-q(\beta)|}{\sqrt{1+\tan^{2}\beta}}\leq\Delta. (40b)

The summation of (40a) and (40b) results in

|y1+tan(β)x1+q(β)|+|y2tan(β)x2q(β)|1+tan2β2Δ\frac{|-y_{\ell_{1}}+\tan(\beta)x_{\ell_{1}}+q(\beta)|+|y_{\ell_{2}}-\tan(\beta)x_{\ell_{2}}-q(\beta)|}{\sqrt{1+\tan^{2}\beta}}\leq 2\Delta (41)

By the triangle inequality X+YX+Y\|X+Y\|\leq\|X\|+\|Y\|, we conclude

|y2y1tan(β)(x2x1)|1+tan2β2Δ.\frac{|y_{\ell_{2}}-y_{\ell_{1}}-\tan(\beta)(x_{\ell_{2}}-x_{\ell_{1}})|}{\sqrt{1+\tan^{2}\beta}}\leq 2\Delta. (42)

Based on Case 2 in the proof of Lemma 1, (42) implies that β[θα,θ+α]\beta\in[\theta-\alpha,\theta+\alpha].

Now, we compute the feasible q(β)q(\beta) for given β[θα,θ+α]\beta\in[\theta-\alpha,\theta+\alpha]. From (40a) and (40b), we have

y1tan(β)x1Δ|cos(β)|q(β)y1tan(β)x1+Δ|cos(β)|\displaystyle y_{\ell_{1}}-\tan(\beta)x_{\ell_{1}}-\frac{\Delta}{|\cos(\beta)|}\leq q(\beta)\leq y_{\ell_{1}}-\tan(\beta)x_{\ell_{1}}+\frac{\Delta}{|\cos(\beta)|} (43a)
y2tan(β)x2Δ|cos(β)|q(β)y2tan(β)x2+Δ|cos(β)|.\displaystyle y_{\ell_{2}}-\tan(\beta)x_{\ell_{2}}-\frac{\Delta}{|\cos(\beta)|}\leq q(\beta)\leq y_{\ell_{2}}-\tan(\beta)x_{\ell_{2}}+\frac{\Delta}{|\cos(\beta)|}. (43b)

Note that 1+tan2β=1/|cos(β)|\sqrt{1+\tan^{2}\beta}=1/{|\cos(\beta)|}. For the sake of simplicity, we assume hereafter that θ+α<π/2\theta+\alpha<\pi/2 and θα>π/2\theta-\alpha>-\pi/2 (which implies cos(β)>0\cos(\beta)>0) and then discuss two cases for a feasible q(β)q(\beta) followed by the inequalities (43a) and (43b):

  1. 1.

    θβθ+αtan(θ)tan(β)y2y1x2x1tan(β)\theta\leq\beta\leq\theta+\alpha\implies\tan(\theta)\leq\tan(\beta)\implies\frac{y_{\ell_{2}}-y_{\ell_{1}}}{x_{\ell_{2}}-x_{\ell_{1}}}\leq\tan(\beta):

    y1tan(β)x1Δcos(β)q(β)y2tan(β)x2+Δcos(β).y_{\ell_{1}}-\tan(\beta)x_{\ell_{1}}-\frac{\Delta}{\cos(\beta)}\leq q(\beta)\leq y_{\ell_{2}}-\tan(\beta)x_{\ell_{2}}+\frac{\Delta}{\cos(\beta)}. (44)
  2. 2.

    θαβθtan(θ)tan(β)y2y1x2x1tan(β)\theta-\alpha\leq\beta\leq\theta\implies\tan(\theta)\geq\tan(\beta)\implies\frac{y_{\ell_{2}}-y_{\ell_{1}}}{x_{\ell_{2}}-x_{\ell_{1}}}\geq\tan(\beta):

    y2tan(β)x2Δcos(β)q(β)y1tan(β)x1+Δcos(β).y_{\ell_{2}}-\tan(\beta)x_{\ell_{2}}-\frac{\Delta}{\cos(\beta)}\leq q(\beta)\leq y_{\ell_{1}}-\tan(\beta)x_{\ell_{1}}+\frac{\Delta}{\cos(\beta)}. (45)

Figure 14 visualizes an example of the feasible ranges (44) and (45) for q(β)q(\beta) given angle β[θα,θ+α]\beta\in[\theta-\alpha,\theta+\alpha].

Refer to caption
Figure 14: The admissible yy-intercept q(β)q(\beta) according to slope angle β\beta for two locations located at (1,1)(1,1) and (5,4)(5,4) with given Δ=1\Delta=1. Note that θ=arctan(3/4)\theta=\arctan(3/4) and α=arcsin(2/5)\alpha=\arcsin(2/5).

Inequalities (44) and (45) imply line y=tan(β)x+q(β)y=\tan(\beta)x+q(\beta) for given β[θα,θ+α]\beta\in[\theta-\alpha,\theta+\alpha] is feasible (covers 1\ell_{1} and 2\ell_{2} within a distance of Δ\Delta), if and only if a point (x¯,y¯)(\bar{x},\bar{y}) on the line meets

{β[θ,θ+α]:y¯[tan(β)(x¯x1)+y1Δcos(β),tan(β)(x¯x2)+y2+Δcos(β)],β[θα,θ]:y¯[tan(β)(x¯x2)+y2Δcos(β),tan(β)(x¯x1)+y1+Δcos(β)].\begin{cases}\beta\in[\theta,\theta+\alpha]:\bar{y}\in[\tan(\beta)(\bar{x}-x_{\ell_{1}})+y_{\ell_{1}}-\frac{\Delta}{\cos(\beta)},\tan(\beta)(\bar{x}-x_{\ell_{2}})+y_{\ell_{2}}+\frac{\Delta}{\cos(\beta)}],\\ \beta\in[\theta-\alpha,\theta]:\bar{y}\in[\tan(\beta)(\bar{x}-x_{\ell_{2}})+y_{\ell_{2}}-\frac{\Delta}{\cos(\beta)},\tan(\beta)(\bar{x}-x_{\ell_{1}})+y_{\ell_{1}}+\frac{\Delta}{\cos(\beta)}].\end{cases} (46)
Remark 4.

Given the angle β[θα,θ+α]\beta\in[\theta-\alpha,\theta+\alpha], a feasible line y=tan(β)x+q(β)y=\tan(\beta)x+q(\beta) covers a point (x0,y0)(x_{0},y_{0}) within the distance Δ\Delta, if and only if

{β[θ,θ+α]:y0[tan(β)(x0x1)+y12Δcos(β),tan(β)(x0x2)+y2+2Δcos(β)],β[θα,θ]:y0[tan(β)(x0x2)+y22Δcos(β),tan(β)(x0x1)+y1+2Δcos(β)].\begin{cases}\beta\in[\theta,\theta+\alpha]:y_{0}\in[\tan(\beta)(x_{0}-x_{\ell_{1}})+y_{\ell_{1}}-\frac{2\Delta}{\cos(\beta)},\tan(\beta)(x_{0}-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\beta)}],\\ \beta\in[\theta-\alpha,\theta]:y_{0}\in[\tan(\beta)(x_{0}-x_{\ell_{2}})+y_{\ell_{2}}-\frac{2\Delta}{\cos(\beta)},\tan(\beta)(x_{0}-x_{\ell_{1}})+y_{\ell_{1}}+\frac{2\Delta}{\cos(\beta)}].\end{cases} (47)

Regarding Remark 47, to obtain an inclusive set of feasible coverage for any line y=tan(β)x+q(β)y=\tan(\beta)x+q(\beta) where β[θα,θ+α]\beta\in[\theta-\alpha,\theta+\alpha], define

I(x)=θβθ+α[tan(β)(xx1)+y12Δcos(β),tan(β)(xx2)+y2+2Δcos(β)],I(x)=\bigcup_{\theta\leq\beta\leq\theta+\alpha}[\tan(\beta)(x-x_{\ell_{1}})+y_{\ell_{1}}-\frac{2\Delta}{\cos(\beta)},\tan(\beta)(x-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\beta)}],

and

J(x)=θαβθ[tan(β)(xx2)+y22Δcos(β),tan(β)(xx1)+y1+2Δcos(β)].J(x)=\bigcup_{\theta-\alpha\leq\beta\leq\theta}[\tan(\beta)(x-x_{\ell_{2}})+y_{\ell_{2}}-\frac{2\Delta}{\cos(\beta)},\tan(\beta)(x-x_{\ell_{1}})+y_{\ell_{1}}+\frac{2\Delta}{\cos(\beta)}].

A point (x,y)(x,y) is covered within distance Δ\Delta of some feasible line if and only if yI(x)J(x)y\in I(x)\cup J(x).

In the following, we find the upper and lower bounds of the set I(x)J(x)I(x)\cup J(x) to create the set of infeasible Γ1,2\Gamma_{\ell_{1},\ell_{2}} for some location b3Lb_{3}\in L which yb3I(xb3)J(xb3),β[θα,θ+α]y_{b_{3}}\notin I(x_{b_{3}})\cup J(x_{b_{3}}),\forall\beta\in[\theta-\alpha,\theta+\alpha]. First, the upper bound of set I(x)I(x) is discussed as follows.

Define

xuI=x22Δ(1+tan2(θ+α)1+tan2(θ)tan(θ+α)tan(θ)),x^{I}_{u}=x_{\ell_{2}}-2\Delta\left(\frac{\sqrt{1+\tan^{2}(\theta+\alpha)}-\sqrt{1+\tan^{2}(\theta)}}{\tan(\theta+\alpha)-\tan(\theta)}\right),

which is the intersection of two extreme lines λ1\lambda_{1} and λ3\lambda_{3} (see Lemma 1 and note that y=tanθ(xx2)+y2+2Δcosθy=\tan\theta(x-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos\theta} and y=tan(θ+α)(xx2)+y2+2Δcos(θ+α)y=\tan(\theta+\alpha)(x-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\theta+\alpha)} are other representations of λ1\lambda_{1} and λ3\lambda_{3}). We claim that line λ1\lambda_{1} for xxuIx\leq x^{I}_{u} and line λ3\lambda_{3} for xxuIx\geq x^{I}_{u} are the upper bounds of I(x)I(x).

Lemma 2.

Function f(z)=1+tan2z1+tan2atanztanaf(z)=\frac{\sqrt{1+\tan^{2}z}-\sqrt{1+\tan^{2}a}}{\tan z-\tan a} is strictly increasing.

Proof: We show the derivative of f(z)f(z) is strictly positive:

f(z)=\displaystyle f^{\prime}(z)= tanzsec2z1+tan2z(tanztana)sec2z(1+tan2z1+tan2a)(tanztana)2\displaystyle\frac{\frac{\tan z\sec^{2}z}{\sqrt{1+\tan^{2}z}}(\tan z-\tan a)-\sec^{2}z(\sqrt{1+\tan^{2}z}-\sqrt{1+\tan^{2}a})}{(\tan z-\tan a)^{2}} (48)
=\displaystyle= sec2z(1+tan2z)(tanztana)2\displaystyle\frac{\sec^{2}z}{(\sqrt{1+\tan^{2}z})(\tan z-\tan a)^{2}}
×(tan2ztanztana1tan2z+1+tan2z+tan2a+tan2ztan2a)\displaystyle\ \times(\tan^{2}z-\tan z\tan a-1-\tan^{2}z+\sqrt{1+\tan^{2}z+\tan^{2}a+\tan^{2}z\tan^{2}a})
=\displaystyle= sec2z(1+tan2z)(tanztana)2\displaystyle\frac{\sec^{2}z}{(\sqrt{1+\tan^{2}z})(\tan z-\tan a)^{2}}
×((1+tanztana)2+tan2z+tan2a2tanztanatanztana1)\displaystyle\ \times(\sqrt{(1+\tan z\tan a)^{2}+\tan^{2}z+\tan^{2}a-2\tan z\tan a}-\tan z\tan a-1)
=\displaystyle= sec2z(1+tan2z)(tanztana)2\displaystyle\frac{\sec^{2}z}{(\sqrt{1+\tan^{2}z})(\tan z-\tan a)^{2}}
×((1+tanztana)2+(tanztana)2(tanztana+1))>0.\displaystyle\ \times(\sqrt{(1+\tan z\tan a)^{2}+(\tan z-\tan a)^{2}}-(\tan z\tan a+1))>0.

 

Using Lemma 2, we conclude:

  1. 1.

    xxuIx\leq x^{I}_{u}:

    x\displaystyle x x22Δ(1+tan2(θ+α)1+tan2(θ)tan(θ+α)tan(θ))\displaystyle\leq x_{\ell_{2}}-2\Delta\left(\frac{\sqrt{1+\tan^{2}(\theta+\alpha)}-\sqrt{1+\tan^{2}(\theta)}}{\tan(\theta+\alpha)-\tan(\theta)}\right) (49)
    x22Δ(1+tan2(β)1+tan2(θ)tan(β)tan(θ))\displaystyle\leq x_{\ell_{2}}-2\Delta\left(\frac{\sqrt{1+\tan^{2}(\beta)}-\sqrt{1+\tan^{2}(\theta)}}{\tan(\beta)-\tan(\theta)}\right) β[θ,θ+α]\displaystyle\forall\beta\in[\theta,\theta+\alpha]
    \displaystyle\implies tan(θ)(xx2)+y2+2Δcos(θ)tan(β)(xx2)+y2+2Δcos(β)\displaystyle\tan(\theta)(x-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\theta)}\geq\tan(\beta)(x-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\beta)}\quad β[θ,θ+α]\displaystyle\forall\beta\in[\theta,\theta+\alpha]
  2. 2.

    xxuIx\geq x^{I}_{u}:

    x\displaystyle x x22Δ(1+tan2(θ+α)1+tan2(θ)tan(θ+α)tan(θ))\displaystyle\geq x_{\ell_{2}}-2\Delta\left(\frac{\sqrt{1+\tan^{2}(\theta+\alpha)}-\sqrt{1+\tan^{2}(\theta)}}{\tan(\theta+\alpha)-\tan(\theta)}\right) (50)
    x22Δ(1+tan2(θ+α)1+tan2(β)tan(θ+α)tan(β))\displaystyle\geq x_{\ell_{2}}-2\Delta\left(\frac{\sqrt{1+\tan^{2}(\theta+\alpha)}-\sqrt{1+\tan^{2}(\beta)}}{\tan(\theta+\alpha)-\tan(\beta)}\right) β[θ,θ+α]\displaystyle\forall\beta\in[\theta,\theta+\alpha]
    \displaystyle\implies tan(θ+α)(xx2)+y2+2Δcos(θ+α)tan(β)(xx2)+y2+2Δcos(β)\displaystyle\tan(\theta+\alpha)(x-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\theta+\alpha)}\geq\tan(\beta)(x-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\beta)}\quad β[θ,θ+α]\displaystyle\forall\beta\in[\theta,\theta+\alpha]

Hence, the upper bound of I(x)I(x) will be (see Figure 15)

{tan(θ)(xx2)+y2+2Δcos(θ) (line λ1)xxuItan(θ+α)(xx2)+y2+2Δcos(θ+α) (line λ3)xxuI\begin{cases}\tan(\theta)(x-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\theta)}\text{ (line }\lambda_{1})&x\leq x^{I}_{u}\\ \tan(\theta+\alpha)(x-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\theta+\alpha)}\text{ (line }\lambda_{3})&x\geq x^{I}_{u}\end{cases} (51)
Refer to caption
Figure 15: For xxuIx\leq x^{I}_{u}, the boundary line λ1\lambda_{1} and for xxuIx\leq x^{I}_{u}, the boundary line λ3\lambda_{3} restrict any given line tan(β)(xx2)+y2+2Δcos(β),β[θα,θ+α]\tan(\beta)(x-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\beta)},\forall\beta\in[\theta-\alpha,\theta+\alpha].

Likewise, upper bound of J(x)J(x) can be determined by defining:

xuJ=x12Δ(1+tan2(θ)1+tan2(θα)tan(θ)tan(θα)),x^{J}_{u}=x_{\ell_{1}}-2\Delta\left(\frac{\sqrt{1+\tan^{2}(\theta)}-\sqrt{1+\tan^{2}(\theta-\alpha)}}{\tan(\theta)-\tan(\theta-\alpha)}\right),

as the intersection of lines λ1\lambda_{1} and λ5\lambda_{5}. Employing Lemma 2, similarly it is concluded that the upper bound of J(x)J(x) will be

{tan(θ)(xx1)+y1+2Δcos(θ) (line λ1)xxuJtan(θα)(xx1)+y1+2Δcos(θα) (line λ5)xxuJ\begin{cases}\tan(\theta)(x-x_{\ell_{1}})+y_{\ell_{1}}+\frac{2\Delta}{\cos(\theta)}\text{ (line }\lambda_{1})&x\geq x^{J}_{u}\\ \tan(\theta-\alpha)(x-x_{\ell_{1}})+y_{\ell_{1}}+\frac{2\Delta}{\cos(\theta-\alpha)}\text{ (line }\lambda_{5})&x\leq x^{J}_{u}\end{cases} (52)

The lower bounds of I(x)I(x) and J(x)J(x) can be determined with a similar approach. Define

xlI=x1+2Δ(1+tan2(θ+α)1+tan2(θ)tan(θ+α)tan(θ)),x^{I}_{l}=x_{\ell_{1}}+2\Delta\left(\frac{\sqrt{1+\tan^{2}(\theta+\alpha)}-\sqrt{1+\tan^{2}(\theta)}}{\tan(\theta+\alpha)-\tan(\theta)}\right),

and

xlJ=x2+2Δ(1+tan2(θ)1+tan2(θα)tan(θ)tan(θα)).x^{J}_{l}=x_{\ell_{2}}+2\Delta\left(\frac{\sqrt{1+\tan^{2}(\theta)}-\sqrt{1+\tan^{2}(\theta-\alpha)}}{\tan(\theta)-\tan(\theta-\alpha)}\right).

Then, the lower bound of I(x)I(x) will be

{tan(θ)(xx1)+y12Δcos(θ) (line λ2)xxlItan(θ+α)(xx1)+y12Δcos(θ+α) (line λ4)xxlI,\begin{cases}\tan(\theta)(x-x_{\ell_{1}})+y_{\ell_{1}}-\frac{2\Delta}{\cos(\theta)}\text{ (line }\lambda_{2})&x\geq x^{I}_{l}\\ \tan(\theta+\alpha)(x-x_{\ell_{1}})+y_{\ell_{1}}-\frac{2\Delta}{\cos(\theta+\alpha)}\text{ (line }\lambda_{4})&x\leq x^{I}_{l},\end{cases} (53)

and for the lower bound of J(x)J(x), we have

{tan(θ)(xx2)+y22Δcos(θ) (line λ2)xxlJtan(θα)(xx2)+y22Δcos(θα) (line λ6)xxlJ.\begin{cases}\tan(\theta)(x-x_{\ell_{2}})+y_{\ell_{2}}-\frac{2\Delta}{\cos(\theta)}\text{ (line }\lambda_{2})&x\leq x^{J}_{l}\\ \tan(\theta-\alpha)(x-x_{\ell_{2}})+y_{\ell_{2}}-\frac{2\Delta}{\cos(\theta-\alpha)}\text{ (line }\lambda_{6})&x\geq x^{J}_{l}.\end{cases} (54)

In conclusion, for given location (xb3,yb3)(x_{b_{3}},y_{b_{3}}) if it is located above the upper bounds in (51) and (52) which means

{yb3>tan(θ)(xb3x1)+y1+2Δcos(θ)(=tan(θ)(xb3x2)+y2+2Δcos(θ)),yb3>tan(θ+α)(xb3x2)+y2+2Δcos(θ+α)(=tan(θ+α)(xb3x1)+y1),yb3>tan(θα)(xb3x1)+y1+2Δcos(θα)(=tan(θα)(xb3x2)+y2),\begin{cases}y_{b_{3}}>\tan(\theta)(x_{b_{3}}-x_{\ell_{1}})+y_{\ell_{1}}+\frac{2\Delta}{\cos(\theta)}(=\tan(\theta)(x_{b_{3}}-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\theta)}),\\ y_{b_{3}}>\tan(\theta+\alpha)(x_{b_{3}}-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\theta+\alpha)}(=\tan(\theta+\alpha)(x_{b_{3}}-x_{\ell_{1}})+y_{\ell_{1}}),\\ y_{b_{3}}>\tan(\theta-\alpha)(x_{b_{3}}-x_{\ell_{1}})+y_{\ell_{1}}+\frac{2\Delta}{\cos(\theta-\alpha)}(=\tan(\theta-\alpha)(x_{b_{3}}-x_{\ell_{2}})+y_{\ell_{2}}),\end{cases} (55)

OR below the lower bounds in (53) and (54) which implies

{yb3<tan(θ)(xb3x1)+y12Δcos(θ)(=tan(θ)(xb3x2)+y22Δcos(θ)),yb3<tan(θ+α)(xb3x1)+y12Δcos(θ+α)(=tan(θ+α)(xb3x2)+y2),yb3<tan(θα)(xb3x2)+y2+2Δcos(θα)(=tan(θα)(xb3x1)+y1),\begin{cases}y_{b_{3}}<\tan(\theta)(x_{b_{3}}-x_{\ell_{1}})+y_{\ell_{1}}-\frac{2\Delta}{\cos(\theta)}(=\tan(\theta)(x_{b_{3}}-x_{\ell_{2}})+y_{\ell_{2}}-\frac{2\Delta}{\cos(\theta)}),\\ y_{b_{3}}<\tan(\theta+\alpha)(x_{b_{3}}-x_{\ell_{1}})+y_{\ell_{1}}-\frac{2\Delta}{\cos(\theta+\alpha)}(=\tan(\theta+\alpha)(x_{b_{3}}-x_{\ell_{2}})+y_{\ell_{2}}),\\ y_{b_{3}}<\tan(\theta-\alpha)(x_{b_{3}}-x_{\ell_{2}})+y_{\ell_{2}}+\frac{2\Delta}{\cos(\theta-\alpha)}(=\tan(\theta-\alpha)(x_{b_{3}}-x_{\ell_{1}})+y_{\ell_{1}}),\end{cases} (56)

then yb3I(x)J(x)y_{b_{3}}\notin I(x)\cup J(x). The set of infeasible locations for 1\ell_{1} and 2\ell_{2}, Γ1,2\Gamma_{\ell_{1},\ell_{2}}, includes locations in LL that meet (55) or (56), i.e.,

Γ1,2\displaystyle\Gamma_{\ell_{1},\ell_{2}} ={biL{1,2}:ybiI(xbi)J(xbj)}\displaystyle=\{b_{i}\in L\setminus\{\ell_{1},\ell_{2}\}:y_{b_{i}}\notin I(x_{b_{i}})\cup J(x_{b_{j}})\} (57)
={biL{1,2}:(xbi,ybi)R1,2′′}.\displaystyle=\{b_{i}\in L\setminus\{\ell_{1},\ell_{2}\}:(x_{b_{i}},y_{b_{i}})\in R^{\prime\prime}_{\ell_{1},\ell_{2}}\}.

Therefore, locations in Γ1,2\Gamma_{\ell_{1},\ell_{2}} cannot be covered by a line that has a distance at most Δ\Delta from two locations 1\ell_{1} and 2\ell_{2}, and so z1+z2+zb31z_{\ell_{1}}+z_{\ell_{2}}+z_{b_{3}}\leq 1 for b3Γ1,2b_{3}\in\Gamma_{\ell_{1},\ell_{2}} is a valid cut.

Remark 5.

The boundaries of the cases θ+απ/2\theta+\alpha\geq\pi/2 or θαπ/2\theta-\alpha\leq-\pi/2 can be easily obtained by rotating coordinates to get θ\theta^{\prime} such that θ+α<π/2\theta^{\prime}+\alpha<\pi/2 and θα>π/2\theta^{\prime}-\alpha>-\pi/2 the same as the conditions in the proof.

 

4 Details on the Feasibility Check when E<E<\infty

Next we detail the feasibility check of the DBC for a given integer solution zhz^{h} for the case where E<E<\infty and that the solution of the SLA generates a line of length greater than EE. Let CLC\subseteq L be a subset of locations in LL and let λ\lambda be a line in 2\mathbb{R}^{2}. We say that λ\lambda is a covering line for CC if the distance from λ\lambda to any C\ell\in C is at most Δ\Delta. Similarly, we will refer to a finite segment ξ\xi that covers all locations in CC a covering segment for CC; the length of segment ξ\xi will be denoted by uξu_{\xi}. For any a,bLa,b\in L, let λa\lambda_{a} and λb\lambda_{b} the projections of aa and bb in λ\lambda, respectively.

Lemma 3.

Let CLC\subseteq L be given and let λ\lambda be a covering line for CC. If D(λa,λb)ED(\lambda_{a},\lambda_{b})\leq E for all a,bCa,b\in C, then there exists a covering segment ξ\xi of CC such that uξEu_{\xi}\leq E.

Proof: Let w,wargmax{D(v,v):v=λa,v=λb,a,bC}w,w^{\prime}\in\operatorname{arg\,max}\{D(v,v^{\prime})\colon v=\lambda_{a},v^{\prime}=\lambda_{b},a,b\in C\}. That is, ww and ww^{\prime} are the projections of the points in CC on λ\lambda that attain the maximum distance. If ξ=[w,w]\xi=[w,w^{\prime}], then clearly ξ\xi covers CC and uξEu_{\xi}\leq E.  

Let CLC\subseteq L be given and let λ\lambda be a covering line of CC. We denote by Cλ,ECC_{\lambda,E}\subseteq C the set of building pairs in CC whose projections in λ\lambda are at a distance of more than EE, i.e.,

Cλ,E={(a,b)C×C:D(λa,λb)>E}.C_{\lambda,E}=\bigl{\{}(a,b)\in C\times C\colon D(\lambda_{a},\lambda_{b})>E\bigr{\}}. (58)

For any L\ell\in L let δ=D(,λ)\delta_{\ell}=D(\ell,\lambda_{\ell}) and let ξ=Δ2δ\xi_{\ell}=\sqrt{\Delta^{2}-\delta_{\ell}}. For any (a,b)Cλ,E(a,b)\in C_{\lambda,E} let λa=λa+ξa(λbλa)\lambda_{a}^{\prime}=\lambda_{a}+\xi_{a}(\lambda_{b}-\lambda_{a}) and λb=λb+ξb(λaλb)\lambda_{b}^{\prime}=\lambda_{b}+\xi_{b}(\lambda_{a}-\lambda_{b}). Note that both λa\lambda_{a}^{\prime} and λb\lambda_{b}^{\prime} are points in λ\lambda.

Lemma 4.

Let CBC\subseteq B be given and let λ\lambda be a covering line for CC. If D(λa,λb)ED(\lambda_{a}^{\prime},\lambda_{b}^{\prime})\leq E for all a,bCλ,Ea,b\in C_{\lambda,E} then there exist a covering segment ξ\xi of CC such that uξEu_{\xi}\leq E.

Proof: By construction, for any (a,b)Cλ,E(a,b)\in C_{\lambda,E}, both λa\lambda_{a}^{\prime} and λb\lambda_{b}^{\prime} are elements of λ\lambda and D(λa,a)=D(λb,b)=ΔD(\lambda_{a}^{\prime},a)=D(\lambda_{b}^{\prime},b)=\Delta, thus the segment [λa,λb][\lambda_{a}^{\prime},\lambda_{b}^{\prime}] covers both aa and bb. Let w,wargmax{D(λa,λb):a,bCλ,E}w,w^{\prime}\in\operatorname{arg\,max}\{D(\lambda_{a}^{\prime},\lambda_{b}^{\prime})\colon a,b\in C_{\lambda,E}\}, then by definition D(λa,λb)D(w,w)D(\lambda_{a}^{\prime},\lambda_{b}^{\prime})\leq D(w,w^{\prime}) for all a,bCλ,Ea,b\in C_{\lambda,E} and, moreover, [w,w][w,w^{\prime}] covers CC. Because D(w,w)ED(w,w^{\prime})\leq E then ξ=[w,w]\xi=[w,w^{\prime}] is a covering segment of CC with uξEu_{\xi}\leq E.  

Step 2 in Algorithm 2 which checks the feasibility of solution zhz^{h} in 𝒰\mathcal{U}, can be reframed as finding two endpoints e0e_{0} and e1e_{1} of some covering segment ξ\xi for ChC^{h} with uξEu_{\xi}\leq E. To accelerate the search for two endpoints in step 2, we implement SLA for ChC^{h} along with two lemmas 3 and 4 as shown in Algorithm 3.

Data: Set 𝒰~h,Ch,E\tilde{\mathcal{U}}^{h},C^{h},E
Result: feasiblefeasible
1 set feasible=FALSEfeasible=FALSE;
2 run SLA for locations in ChC^{h}. Let λMAX\lambda_{MAX} be the line intersecting maximal number of circles and ξMAX\xi_{MAX} be the shortest covering segment;
3 if maximum coverage with λMAX=|Ch|\lambda_{MAX}=|C^{h}| then
4       if uξMAXEu_{\xi_{MAX}}\leq E then
5             feasible=TRUEfeasible=TRUE
6       end if
7      else
8             if 𝒰~h\tilde{\mathcal{U}}^{h}\neq\emptyset then
9                   feasible=TRUEfeasible=TRUE
10             end if
11            
12       end if
13      
14 end if
Algorithm 3 Feasibility check for solution zhz^{h} if E<E<\infty

Algorithm 3 executes SLA for the set of circles with centers in ChC^{h} and radius Δ\Delta (step 3). If the maximal stabbing line λMAX\lambda_{MAX} does not cover locations in ChC^{h}, then no segment produces the exiting solution which means zhz^{h} is infeasible. Else, using the discussion in Lemmas 3 and 4, we check whether the shortest covering segment of λMAX\lambda_{MAX}, denoted as ξMAX\xi_{MAX}, has a length at most EE (step 3). If so, we recognize zhz^{h} feasible by ξMAX\xi_{MAX}. If the length of the segment is greater than EE, we find a feasible solution in 𝒰~h\tilde{\mathcal{U}}^{h}. If set 𝒰~h\tilde{\mathcal{U}}^{h} is not empty, then there are feasible endpoints for a segment covering ChC^{h} (step 3).

In step 3 we further enhance the tractability of 𝒰~h\tilde{\mathcal{U}}^{h} by restricting the search in ranges for feasible endpoints as follows. Let i\ell_{i} and j\ell_{j} be two extreme locations that have the maximum distance among all pairs of locations in ChC^{h}. Then, the endpoints of the line segment e0e_{0} and e1e_{1} must be within distance Δ\Delta from each i\ell_{i} and j\ell_{j}. Particularly, points e0e_{0} and e1e_{1} should satisfy that (see Figure 16):

xiΔe0xxi+Δ\displaystyle x_{\ell_{i}}-\Delta\leq e^{x}_{0}\leq x_{\ell_{i}}+\Delta (59a)
yiΔe0yyi+Δ\displaystyle y_{\ell_{i}}-\Delta\leq e^{y}_{0}\leq y_{\ell_{i}}+\Delta (59b)
xjΔe1xxj+Δ\displaystyle x_{\ell_{j}}-\Delta\leq e^{x}_{1}\leq x_{\ell_{j}}+\Delta (59c)
yjΔe1yyj+Δ.\displaystyle y_{\ell_{j}}-\Delta\leq e^{y}_{1}\leq y_{\ell_{j}}+\Delta. (59d)

The enhancement, therefore, adds the inequalities (59) in the definition of 𝒰~h\tilde{\mathcal{U}}^{h}. The enhanced definition is solved significantly faster.

Refer to caption
Figure 16: Two endpoints e0e_{0} and e1e_{1} are within circles centered at locations i\ell_{i} and j\ell_{j} with radius Δ\Delta. These two circles are inside squares which are added to restrict the search ranges for endpoints by linear constraints.

5 Performance of Subproblem Methods

We compare three different methods to address the one-level subproblem Φ(f)\Phi(f) in Algorithm 1:

  1. 1.

    ORG: solves the subproblem with original set 𝒰\mathcal{U} (instead of using (6c)) by DBC and only updates (f)\mathcal{R}(f) on the fly,

  2. 2.

    AVC: adds valid cuts for infeasible combinations in 𝒞0\mathcal{C}^{0} to 𝒰\mathcal{U} to enhance ORG performance while updates (f)\mathcal{R}(f) on the fly,

  3. 3.

    DEC: replace 𝒰\mathcal{U} by conflict constraints (6c) and update 𝒞\mathcal{C} and (f)\mathcal{R}(f) on the fly as described in Section 5.1.

Table 6 compares the three approaches in terms of optimality gap, solution time, number of iterations, subproblem run time, and its callback function run time. We generate a testbed of 5 sample problems in which 10 blocks in Joplin are randomly selected as locations. Column 2 shows the method that is implemented to solve the subproblem. Columns 3, 4, and 5 present the best objective value (expected population dislocation), the best lower bound, and the optimality gap found within the time limit of one hour, respectively. Columns 6 and 7 show the CPU run time of C&CG Algorithm 1 in seconds and its number of iterations, respectively. Column 8 compares the CPU run time of the DBC method in seconds for each selection of subproblems. Column 9 also presents the total amount of time that the DBC spends in the callback function to generate cuts on the fly with Algorithm 2; note that the callback run time for ORG and AVC methods does not include the time of checking feasibility in 𝒰\mathcal{U} as we directly use the original feasible solution.

Sample # Subproblem method Best objective Best bound Gap CCG run time (sec.) CCG iteration DBC run time (sec.) Callbacks run time (sec.) 1 ORG 365 - - 3600 1 3600 42 AVC 185 185 0% 6 3 6 0 DEC 185 185 0% 1 3 1 1 2 ORG 161 153 5% 4012 2 4012 1 AVC 153 153 0% 26 3 26 1 DEC 153 153 0% 1 3 1 0 3 ORG 178 178 0% 4484 3 4484 1 AVC 178 178 0% 9 3 9 0 DEC 178 178 0% 2 3 1 1 4 ORG 56 - - 3600 1 3600 0 AVC 75 75 0% 3549 3 3549 1 DEC 75 75 0% 1 3 1 1 5 ORG 103 - - 3600 1 3600 0 AVC 65 65 0% 36 3 36 1 DEC 65 65 0% 1 3 1 0

Table 6: Comparing C&CG performance for 3 different methods to solve the subproblem

The results in Table 6 show that the ORG method is not able to solve any sample with only 10 locations within the one-hour time limit. Also, based on the results, solving the master problem and the second stage recovery problem in the callback function is very fast and almost all the run time in ORG is spent on solving the MINLP subproblem (5). For samples 1, 4, and 5 the subproblem was not solved to optimality in one hour. For some samples, the ORG method exceeds the time limit while solving the MINLP subproblem. In these cases, we wait until the subproblem finishes its execution before terminating the algorithm, which results in some computational times reported being larger than the one-hour time limit (italic values in the table).

Adding infeasible pairs and triples cuts in AVC significantly reduces the computation times by as much as two orders of magnitude, resulting in all the samples being solved in less than one hour. However, AVC can be potentially time-consuming for problems such as sample 4 in the experiment. The DEC method greatly outperforms the other two methods as it solved all samples within a few seconds. The subproblem runtime for DEC shows how fast the subproblem can lead to finding optimal tornado paths. The callbacks’ runtime also emphasizes that the feasibility check with Algorithm 3 in Appendix 4 which is equipped by the polynomial stabbing line algorithm is a quick task.

6 Additional Experiments for 30 Days of Recovery

We conduct more experiments for locations in Joplin to study the population dislocation after 30 days of recovery. The results are shown in Table 7.

Table 7: Solving the two-stage robust optimization model with different parameters of tornado length and available budget, after 30 days of recovery for 100 locations group in Joplin, MO.

Length Budget Population CCG CCG DBC Callback 𝒰~h\tilde{\mathcal{U}}^{h} feasibility Retrofitting cost Recovery cost ($) dislocation run time (sec.) iteration run time (sec.) run time (sec.) run time (sec.) /budget /budget 5 0 M 16465 153 2 153 5 2 - - 15 M 14847 194 2 193 5 2 0.6 0.4 30 M 14688 162 2 161 5 1 0.3 0.7 \infty 0 M 17449 361 2 360 3 0 - - 15 M 15742 527 2 527 5 0 0.6 0.4 30 M 15582 500 2 500 3 0 0.3 0.7

Compared with the results in Table 2, we observe more population dislocation for each set of parameters because of the shorter period to recover the damaged locations. Despite this difference in the magnitude of population dislocation, it is important to note that the information, clarifications, and examinations between both Table 2 and 7 remain consistent. Therefore, Table 7 provides numerical experiments with a focus on the impact of shorter recovery times, complementing the information presented in Table 2 in the main body of the paper.