This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Simulation-Assisted Optimization for Large-Scale Evacuation Planning with Congestion-Dependent Delays

Kazi Ashik Islam    Da Qi Chen    Madhav Marathe    Henning Mortveit    Samarth Swarup&Anil Vullikanti Biocomplexity Institute, University of Virginia {ki5hd, wny7gj, marathe, henning.mortveit, swarup, vsakumar}@virginia.edu
Abstract

Evacuation planning is a crucial part of disaster management. However, joint optimization of its two essential components, routing and scheduling, with objectives such as minimizing average evacuation time or evacuation completion time, is a computationally hard problem. To approach it, we present MIP-LNS, a scalable optimization method that utilizes heuristic search with mathematical optimization and can optimize a variety of objective functions. We also present the method MIP-LNS-SIM, where we combine agent-based simulation with MIP-LNS to estimate delays due to congestion, as well as, find optimized plans considering such delays. We use Harris County in Houston, Texas, as our study area. We show that, within a given time limit, MIP-LNS finds better solutions than existing methods in terms of three different metrics. However, when congestion dependent delay is considered, MIP-LNS-SIM outperforms MIP-LNS in multiple performance metrics. In addition, MIP-LNS-SIM has a significantly lower percent error in estimated evacuation completion time compared to MIP-LNS.

1 Introduction

Evacuation plans are essential to ensure the safety of people living in areas that are prone to disasters such as floods, hurricanes, tsunamis and wildfires. Large-scale evacuations have been carried out during the past hurricane seasons in Florida, Texas, Louisiana, and Mississippi. Examples of hurricanes when such evacuations were carried out include, Katrina & Rita (2005), Ike & Gustav (2008), Irma & Harvey (2017), Laura (2020), Ida (2021), and Ian (2022). For instance, about 2.5 million individuals were evacuated from the coastal areas of Texas Carpender et al. (2006) before the landfall of Hurricane Rita. The most recent category four hurricane, Ian, caused 119119 deaths in the state of Florida alone of Law Enforcement (2022). To ensure people can evacuate in a safe and orderly manner, a good evacuation plan needs to have two essential components: (ii) Evacuation Routes, i.e. what roads to take, and (iiii) Evacuation Schedule i.e. when to leave.

The focus of our paper is on jointly optimizing the routes and schedules. Informally, the idea is to find a schedule of when individuals can begin evacuation (within a given time window) and a route that would be used to evacuate, so as to minimize the objective functions capturing the system level evacuation time (see Section 3 for formal definition of the problems). Jointly optimizing over the routes and schedule is significantly harder from a computational standpoint (See Section 4 for hardness results). Existing methods, even those designed to find bounded sub-optimal solutions, do not scale to city or county level planning problems. Thus, finding good evacuation routes and schedule within a reasonable amount of time, for a city or county with a large population, remains an open problem.

Moreover, during evacuations, large number of people try to egress out of an area in a relatively small amount of time. This results in traffic congestion and huge delays in the evacuation process. It is crucial to consider and model such delays during the planning phase. However, most of the existing works on finding optimized evacuation plans do not consider the slowdown of traffic caused by high traffic density. For instance, Even et al. (2015); Romanski and Van Hentenryck (2016); Hafiz Hasan and Van Hentenryck (2021) all consider a constant travel time on each road, no matter how high (or low) the traffic density is on those roads. To overcome this, we treat the travel time on each road, as a parameter. We then utilize agent-based simulation, which is capable of modeling the complex relationship among the traffic density and speed on different roads, to learn the parameter values.

Our Contributions

First, we present MIP-LNS, a scalable optimization method that can find solutions to a class of evacuation planning problems, while optimizing for a variety of objectives (Section 5). It is designed based on the Large Neighborhood Search (LNS) framework. In this paper, we work with three objectives: minimizing (ii) average evacuation time, (iiii) evacuation completion time, and (iiiiii) average evacuation time of ‘non-outlier’ evacuees. We show that all of these three optimization problems are hard to approximate within a logarithmic factor. In MIP-LNS, we model the problems as Mixed Integer Programs (MIP) and then find solutions to these programs using a combination of heuristic search and mathematical optimization. A key technical challenge involves modeling flows over time; this is best achieved using time expanded graphs. But it also leads to substantial increase in the size of the MIP and results in a significant increase in computing resources (time and space). This necessitates the need to combine heuristic search methods developed in the AI literature with MIP techniques developed in the OR literature.

Second, we illustrate how our approach can scale to large problem sizes and can be applied to realistic real-world problems. We choose Harris county in Houston, Texas as our study area and apply MIP-LNS. The county has about 1.51.5 million households, spans an area of 1,7781,778 square miles, and has been affected by several hurricanes in the past. We use real-world road network data and a synthetic population data to construct a realistic problem instance. It is ten times larger (in terms of the size of the time expanded graph, and the number of evacuating vehicles) than the problem instance of our baseline Hafiz Hasan and Van Hentenryck (2021). We show that, within a given time limit, MIP-LNS finds solutions for our problem instance that are on average 13%13\%, 20.7%20.7\% and 58.43%58.43\% better than the baseline method in terms of average evacuation time, evacuation completion time and optimality guarantee of the solution, respectively (Section 7.2).

Finally, we present MIP-LNS-SIM, where we treat the travel time on each edge as a delay parameter and utilize agent-based simulation to learn the parameter values (Section 6). The MIP model, with the learned parameter values, is then solved to find optimized evacuation plans. Agent-based simulations provide a natural approach to capture the delays one incurs due to congestion – dynamic flow problems cannot capture these delays. Our approach is an example of methods that combine simulation and optimization methods (SO) Gosavi and others (2015); Amaran et al. (2016) considered in OR and has become increasingly popular in AI Van Hentenryck (2013); Kambhampati (2020); Doppa (2021). Through our experiments, we show that MIP-LNS-SIM outperforms MIP-LNS in terms of average evacuation time, evacuation completion time, and average time spent on the road (10%,17%,77%10\%,17\%,77\% improvement respectively) when delay due to congestion is considered (Section 7.3). In addition, MIP-LNS-SIM has a significantly lower percent error (6%6\%) in estimated evacuation completion time compared to MIP-LNS (76%76\%), demonstrating the efficacy of MIP-LNS-SIM in evacuation planning subject to congestion constraints.

2 Related Work

Researchers have approached the evacuation planning problem in different ways in the past. Hamacher and Tjandra (2002) formulated it as a dynamic network flow optimization problem and introduced the idea of time expanded graphs to solve it using mathematical optimization methods. However, their method had prohibitively high computational cost, which paved the way to several heuristic methods Lu et al. (2005); Kim et al. (2007); Shahabi and Wilson (2014). These methods solve the routing problem only – they either do not consider the scheduling problem at all or propose simple schemes such as letting evacuees leave at a constant rate. On the other hand, Even et al. (2015); Romanski and Van Hentenryck (2016); Hafiz Hasan and Van Hentenryck (2021) have considered the joint optimization problem of routing and scheduling. They formulated the problem as Mixed Integer Programs and used decomposition techniques Benders (1962); Magnanti and Wong (1981) to separate the route selection and scheduling process. However, none of these works consider the slowdown of traffic at high traffic densities. A review of existing works on evacuation planning can be found in the survey paper Bayram (2016).

The use of convergent evacuation routes has been explored in the literature Even et al. (2015); Romanski and Van Hentenryck (2016); Hafiz Hasan and Van Hentenryck (2021), where all evacuees coming to an intersection follow the same path afterwards. This is also known as confluent flow Chen et al. (2006). Golin et al. (2017) investigated the single-sink confluent quickest flow problem where the goal is minimizing the time required to send supplies from sources to a single sink. They showed that the problem is hard to approximate within a logarithm factor. We prove that all the planning problems considered in this paper are also hard to approximate.

We use the most recent method (Benders Convergent or BC) by Hafiz Hasan and Van Hentenryck (2021) as our baseline and show that MIP-LNS finds better solutions in terms of three different metrics. In addition, we provide direct MIP formulations for three different objectives, all of which can be optimized using MIP-LNS (as well as MIP-LNS-SIM) without needing any modifications.

Heuristic search methods are generally applied to problems that are computationally intractable. The goal is to find good solutions in a reasonable amount of time. The Large Neighborhood Search (LNS) framework Shaw (1998) has been successfully applied to various hard combinatorial optimization problems in the literature Pisinger and Ropke (2018). Recently, Li et al. (2021) applied the LNS framework to find solutions for the Multi-Agent Path Finding Problem where the goal is to find collision free paths for multiple agents.

Simulation models have been used in the literature for finding optimal decision variables for a given objective function Dangelmaier et al. (2006); Sajedinejad et al. (2011); Osorio and Bierlaire (2013); Teufl et al. (2018). This is useful especially when the objective function’s closed form is unknown or is too complex, but the function’s value can be evaluated through (possibly time-expensive) simulation. In such cases, simulation models have been utilized as fitness functions within heuristic search and meta-heuristic algorithms Sajedinejad et al. (2011); Teufl et al. (2018). Existing research works have also proposed constructing a representative function, often termed as a metamodel, of the actual objective function by using its calculated values from the simulation model Osorio and Bierlaire (2013); do Amaral et al. (2022). Parameters of the metamodel are learned by methods such as regression, artificial neural networks Gosavi and others (2015). Metamodels are mainly constructed because it is possible or easier to optimize these models. To fulfill our goal to find optimized evacuation plans considering congestion-dependent delays, we use our MIP model as a metamodel and use agent-based simulation to learn its parameter values. Both parameter learning and metamodel optimization are performed within MIP-LNS-SIM.

3 Problem Formulation

In this section, we introduce some preliminary terms that we use in our problem formulation.

Definition 3.1.

A road network is a directed graph 𝒢=(𝒩,𝒜)\mathcal{G}=(\mathcal{N},\mathcal{A}) where every edge e𝒜e\in\mathcal{A} has (ii) a capacity cec_{e}, representing the number of vehicles that can enter the edge at a given time and (iiii) a travel time TeT_{e} representing the time it takes to traverse the edge.

Definition 3.2.

Given a road network, a single dynamic flow is a flow ff along a single path with timestamps ava_{v}, representing the arrival time of the flow at vertex vv that obeys the travel times. In other words, avauTuva_{v}-a_{u}\geq T_{uv} for edge (u,v)(u,v). A valid dynamic flow is a collection of single dynamic flows where no edge at any point in time exceeds its edge capacity.

Definition 3.3.

An evacuation network is a road network that specifies ,𝒮,𝒯𝒩\mathcal{E},\mathcal{S},\mathcal{T}\subset\mathcal{N}, representing a set of source, safe and transit nodes respectively. Furthermore, for each source node kk\in\mathcal{E}, let W(k)W(k) and dkd_{k} represent the set of evacuees and the number of evacuees at source kk respectively. Let WW denote the set of all evacuees.

For scheduling an evacuation, we observe that once an evacuee has left their home, it is difficult for them to pause until they reach their destination. We also assume that people from the same location evacuate to the same destination. Similarly, we assume that if two evacuation routes meet, they should both be directed to continue to the same location.

Definition 3.4.

Given an evacuation network, we say a valid dynamic flow is an evacuation schedule if the following are satisfied:

  • all evacuees end up at some safe node,

  • no single dynamic flow has any intermediary wait-time (i.e. avau=Tuva_{v}-a_{u}=T_{uv} and,

  • the underlying flow (without considering time) is confluent, where if two single dynamic flows use the same vertex (possibly at different times), their underlying path afterwards is identical.

Two natural objectives to minimize are the average evacuation time of the evacuees and the evacuation completion time. To define these formally, let tit_{i} denote the evacuation time of evacuee ii. We then formally define the following problems:

Problem 1.

Average Dynamic Confluent Flow Problem (a-dcfp). Given an evacuation network, let TmaxT_{max} represent an upper bound on evacuation time. Find an evacuation schedule such that all evacuees arrive at some safe node before time TmaxT_{max} while minimizing 1|W|iWti\frac{1}{|W|}\sum_{i\in W}t_{i}.

Problem 2.

Completion Time Dynamic Confluent FLow Problem (ct-dcfp). Given an evacuation network, find an evacuation schedule such that all evacuees arrive at some safe node while minimizing maxiWti\max_{i\in W}t_{i}.

We define a third problem, Outlier Average Dynamic Confluent Flow Problem (o-dcfp), where the goal is to minimize average evacuation time of ‘non-outlier’ evacuees. For brevity, its formal definition is provided in the supplementary materials Islam et al. (2023).

3.1 Time Expanded Graph for Capturing Flow Over Time

Joint routing and scheduling over networks requires one to study flows over time, as static flows make the unrealistic assumption that flows travel instantaneously (detailed discussion in the supplementary materials Islam et al. (2023)). For this purpose, researchers have defined dynamic flows (Skutella (2009); Ford and Fulkerson (2015)) and used time expanded graphs to solve dynamic flow problems (Romanski and Van Hentenryck (2016); Hafiz Hasan and Van Hentenryck (2021)). In this paper, we also use a time expanded graph (TEG) to capture the flow of evacuees over time.

Refer to caption
(a) Sample Evacuation Network. Edges are labeled with travel time and flow capacity respectively. Source, safe and transit nodes are denoted by squares, triangles, and circles respectively. Source nodes are labeled with number of evacuees.
Refer to caption
(b) Time Expanded Graph (TEG) for the Sample Network. Edges are labeled with capacity. Construction of this TEG sets an upper bound of 3 time units for evacuation completion.
Figure 1: Sample Problem Instance

Time expanded graph is a directed graph denoted by 𝒢x=(𝒩x=x𝒯x𝒮x,𝒜x\mathcal{G}^{x}=(\mathcal{N}^{x}=\mathcal{E}^{x}\cup\mathcal{T}^{x}\cup\mathcal{S}^{x},\mathcal{A}^{x}). To construct it, we first fix a time horizon \mathcal{H} and discretize the temporal domain into discrete timesteps of equal length. Then we create copies of each node at each timestep within \mathcal{H}. After that, for each edge e(u,v)e(u,v) in the road network, we create edges in the TEG as et(ut,vt+Te)e_{t}(u_{t},v_{t+T_{e}}) for each tTet\leq\mathcal{H}-T_{e} where the edges ete_{t} have the same flow capacity as ee. Finally, we add a super sink node vtv_{t} that connects to the nodes utu_{t} for each u𝒮u\in\mathcal{S} and each tt\leq\mathcal{H}. Edges to the super sink node are assigned an infinite amount of capacity. Note that, when creating the time expanded graph, we are adding an additional dimension (i.e. time) to the road network. The size of the TEG is about \mathcal{H} times as large as the road network in terms of number of nodes and edges. – yielding a substantially larger problem representation.

A sample evacuation network and its corresponding TEG with time horizon =3\mathcal{H}=3 are shown in Figure (1(a)-1(b)). The source, safe and transit nodes are denoted by squares, triangles, and circles respectively. In the TEG, there may be some nodes that are (ii) not reachable from the source nodes, or (iiii) no safe node can be reached from these nodes within the time horizon. These nodes are greyed out in Figure 1(b). An optimal solution of a-dcfp (and ct-dcfp) for this sample problem instance is to use the routes 02A0\rightarrow 2\rightarrow A from source node 0 and 12A1\rightarrow 2\rightarrow A from source node 11, where the evacuee at source node 0 and 11 leave at timestep 11 and 0 respectively.

3.2 Mixed Integer Program (MIP) Model

Now, we present the Mixed Integer Program (18) that we use to represent a class of evacuation planning problems. We can have different objectives in the program (Objective 1), each representing a certain planning problem. We use two types of variables: (ii) Binary variable xe,e𝒜x_{e},\forall e\in\mathcal{A}, which will be equal to one if and only if the edge ee is used for evacuation. Otherwise, it will be zero. (iiii) Continuous variable ϕet,et𝒜x\phi_{e_{t}},\forall e_{t}\in\mathcal{A}^{x}, which denotes the flow of evacuees on edge ee at timestep tt.

Constraint (2) ensures that there is exactly one outgoing edge from each evacuation node. Constraint (3) ensures that at each transit node, there is at most one outgoing edge. Constraint (4) enforces that the total flow coming out of every evacuation node is equal to the number of evacuees at the corresponding node. Constraint (5) ensures flow conservation in the time-expanded graph; here, δ(i)\delta^{-}(i) and δ+(i)\delta^{+}(i) denote the set of incoming and outgoing edges to/from node ii, respectively. Constraint (6) allows flow on chosen edges only; it also enforces flow capacity on each edge of the time-expanded graph. Constraint (7) defines ϕ\phi as continuous and non-negative variable; constraint (8) defines xx as binary variable. The constraint that evacuation completion time needs to be less than the given upper bound is implicit in the model, as we set the time horizon of the TEG to this upper bound.

Objective to Optimize (1)
s.t.eδ+(k)xe=1\displaystyle s.t.\sum_{e\in\delta^{+}(k)}x_{e}=1 k\displaystyle\forall k\in\mathcal{E} (2)
eδ+(i)xe1\displaystyle\sum_{e\in\delta^{+}(i)}x_{e}\leq 1 i𝒯\displaystyle\forall i\in\mathcal{T} (3)
eδ+(k)tϕet=dk\displaystyle\sum_{e\in\delta^{+}(k)}\sum_{t\leq\mathcal{H}}\phi_{e_{t}}=d_{k} k\displaystyle\forall k\in\mathcal{E} (4)
eδ(i)ϕe=eδ+(i)ϕe\displaystyle\sum_{e\in\delta^{-}(i)}\phi_{e}=\sum_{e\in\delta^{+}(i)}\phi_{e} i𝒯x𝒮x\displaystyle\forall i\in\mathcal{T}^{x}\cup\mathcal{S}^{x} (5)
ϕetxecet\displaystyle\phi_{e_{t}}\leq x_{e}c_{e_{t}} e𝒜,t\displaystyle\forall e\in\mathcal{A},t\leq\mathcal{H} (6)
ϕe0\displaystyle\phi_{e}\geq 0 e𝒜x\displaystyle\forall e\in\mathcal{A}^{x} (7)
xe{0,1}\displaystyle x_{e}\in\{0,1\} e𝒜\displaystyle\forall e\in\mathcal{A} (8)

To solve a-dcfp using model (18), we represent the total evacuation time using the variables xx and ϕ\phi as follows:

Total Evacuation Time=eδ(vt)ϕets(e)\displaystyle\text{Total Evacuation Time}=\sum_{e\in\delta^{-}{(v_{t})}}\phi_{e}t_{s}(e) (9)

Here, ts(e)t_{s}(e) denotes the timestep of the starting node of edge ee. Note that, minimizing the average evacuation time and the total evacuation time are equivalent. So, the a-dcfp objective would be: minx,ϕeδ(vt)ϕets(e)\min_{x,\phi}\sum_{e\in\delta^{-}{(v_{t})}}\phi_{e}t_{s}(e).

We have just provided details on how to formulate a-dcfp as a MIP. Details on ct-dcfp and o-dcfp are provided in the supplementary materials Islam et al. (2023).

4 Inapproximability Results

In this section, we show that the problems we consider are not only NP-hard but also hard to approximate. A summary of the hardness results is found in Table 1.

Hardness Problems
a-dcfp ct-dcfp o-dcfp
O(logn)O(\log n)-hard to approx. Thm. 1 See Golin et al. (2017) Thm. 1
Table 1: Summary of Hardness
Theorem 1.

For a-dcfp and o-dcfp with many sources and one safe node, it is NP-hard to approximate within a factor of O(logn)O(\log n).

The proof of Theorem 1 is provided in the supplementary materials Islam et al. (2023). In addition, we show that all the three problems remain NP-hard even when we consider the road network GG to be a sub-graph of a grid and all destinations are along the border. Street networks in several city neighborhoods resemble such networks.

5 Heuristic Optimization

In this section, we present the method MIP-LNS where we use MIP solvers in conjunction with heuristic search.

Input: Initial solution: sol, Time Expanded Graph: TEGTEG, Time horizon: TT, Model to optimize: modelmodel, (%) of routes to update: pp, Number of Iterations: nn, Positive number: pincp_{inc}
Output: Solution of modelmodel
1 for 1 to n  do
2       Select (100p)%(100-p)\% of the source locations uniformly at random. Let their set be SS.
3       Fix the routes from the source locations in SS. Set xe=1x_{e}=1 if ee is on any of the routes from SS in sol.
4       sol \leftarrow Solution of modelmodel from a MIP solver
5       TT^{\prime} \leftarrow evacuation completion time for solution sol
6       if TT>+thresholdT-T^{\prime}>+threshold then
7             Update the modelmodel by setting the time horizon to TT^{\prime}. Prune TEGTEG and modelmodel by removing:
8             (ii) nodes that are unreachable from the evacuation nodes within time horizon TT^{\prime}, and
9             (iiii) nodes from which none of the safe nodes can be reached within time horizon TT^{\prime}
10      pp+pincp\leftarrow p+p_{inc}
11      
return sol
Algorithm 1 MIP-LNS Method

Within MIP-LNS, we first calculate an initial feasible solution in two steps: (ii) calculating an initial convergent route set, and (iiii) calculating the schedule that minimizes the target objective using the initial route set. For (i)(i), we take a shortest path from each source to its nearest safe node by road. This is done using Algorithm 3 (in the supplementary materials Islam et al. (2023)) to make sure the route set is convergent. For (ii)(ii), we use the just calculated route set to fix the binary variables xex_{e} in model (1-8). This gives us a linear program that can be solved optimally to get the schedule.

Next, we search for better solutions in the neighborhood of the solution at hand (Algorithm 1). Here, we run nn iterations. In each iteration, we select q=(100p)%q=(100-p)\% of sources uniformly at random and keep their routes fixed. This reduces the size of the MIP as we have fixed values for a subset of the variables. We then optimize the ‘reduced’ MIP model using a MIP solver Gurobi Optimization, LLC (2023). Essentially, we are searching for a better solution in the neighborhood where the selected q%q\% routes are already decided. Any solution found in the process will also be a feasible solution for the original problem. If we find a better solution with an evacuation completion time TT^{\prime} that is less than the current time horizon (TT), then we also update the model by setting the time horizon to TT^{\prime}. When resetting the time horizon, we prune the TEG and the MIP model (lines 11). This reduces the number of variables in the MIP model and simplifies the constraints. At the end of each iteration, we increase the value of pp by pincp_{inc} amount. Note that, when p=100p=100, we will be solving the original optimization problem. In our experiments, we start with p=75p=75 and set pinc=0.5p_{inc}=0.5.

When solving the reduced problem in each iteration (line 1), we use (ii) a time limit, and (iiii) a parameter threshold_gapthreshold\_gap to decide when to stop. MIP solvers keep track of an upper bound (ZUZ_{U}) (provided by the current best solution) and a lower bound (ZLZ_{L}) (obtained by solving relaxed LP problems) of the objective value. We stop the optimization when the relative gap (ZUZL)/ZU(Z_{U}-Z_{L})/Z_{U} becomes smaller than the threshold_gapthreshold\_gap. In our experiments, we set this to 5%5\%. In total, MIP-LNS has four parameters: nn, pp, pincp_{inc}, and threshold_gapthreshold\_gap.

6 Simulation-Assisted Model for Optimization (MIP-LNS-SIM)

In our formulation (Section 3), we assume the travel time on each edge to be a constant. However, in practice, travel time on a road is affected by the number of vehicles on it (i.e. traffic density). Moreover, travel time on an edge also affects how many cars can enter it in a given amount of time (i.e. the flow capacity) (Mannering and Washburn, 2020, Chapter 5). We, therefore, treat the edge travel times as ‘parameters’ and aim to learn suitable values of these parameters to realistically model congestion-dependent delays.

To estimate the parameters, we use the agent-based queuing network simulation system QueST Islam et al. (2020) with the logistic traffic model. The simulator is able to model the complex relationship between traffic density and effective speed of vehicles on the road. Given the routes and schedule, we simulate the evacuation process using QueST and determine the average travel time on each edge used during evacuation. This provides us a reasonable estimate of travel time on the edges when certain routes and schedule are used. However, simulating the evacuation of the entire population is a time consuming task. Therefore, we only simulate the evacuation of a certain percentage (pe)(p_{e}) of the evacuees at each source. To be more precise, we simulate the departure of the first pe%p_{e}\% of the evacuees from each source, following the evacuation schedule. Our intuition is: congestion faced by the first pe%p_{e}\% of evacuees provides us a good estimation of the overall congestion faced by all evacuees throughout the entire evacuation. This is because people who leave first should not overlap too much with people who leave much later.

Input: Evacuation network: 𝒢\mathcal{G}, Initial solution: sol, Number of iterations: mm, Percentage of Evacuees to simulate: pep_{e}
Output: Evacuation routes and schedule.
1 for each edge e𝒜e\in\mathcal{A} do
2       TeT_{e}\leftarrow Time it takes to traverse ee at speed limit.
3       cec_{e}\leftarrow Updated flow capacity of ee.
4for 11 to mm do
5       TEGTEG\leftarrow Time expanded graph of 𝒢\mathcal{G} with current travel time and capacity values of the edges.
6       modelmodel\leftarrow MIP model (18) from 𝒢\mathcal{G} and TEGTEG.
7       solsol\leftarrow Solution of modelmodel from MIP-LNS.
8       Simulate evacuation of first pe%p_{e}\% evacuees at each source with routes and schedule from solsol.
9       for each edge e𝒜e\in\mathcal{A} used in solsol do
10             TeT_{e}\leftarrow Avg. travel time on ee from simulation.
11             cec_{e}\leftarrow Updated flow capacity of ee.
return sol
Algorithm 2 MIP-LNS-SIM Method

Based on the above idea, we present the method MIP-LNS-SIM (Algorithm 2). Initially, we assume that vehicles travel on each edge at the maximum speed allowed and calculate the travel time (i.e. the parameters) and flow capacity accordingly (line 22). We then create the time-expanded graph based on these values and construct the MIP (i.e. our metamodel). Next, We solve the MIP using MIP-LNS. We use the routes and schedule given by the solution to simulate the evacuation of first pe%p_{e}\% of the evacuees at each source. From the simulation results, we calculate the average travel time on each edge used in the solution and update the travel time as well as the flow capacity of these edges (details in supplementary materials Islam et al. (2023)). We do this iteratively for mm times. In our experiments, we have used pe=5,10p_{e}=5,10 and m=10m=10. Note that, both parameter estimation (line 2) and the metamodel optimization (line 2) are performed within MIP-LNS-SIM.

7 Experiments

In this section, we present details of our problem instance and our experiment results.

7.1 Problem Instance

We use Harris County in Houston, Texas as our study area. We have used data from HERE maps HERE (2023) to construct its road network. The network contains roads of five (1 to 5) different function classes, which correspond to different types of roads. For instance, function class 1 roads are major highways, and function class 5 roads are residential roads.

For our experiments, we consider the nodes which connect and lead from function class 3/4 roads to function class 1/2 roads as the start/source locations of the evacuees. We then consider the problem of (ii) when should evacuees target to enter the function class 1/2 roads and (iiii) how to route them through the function class 1/2 roads to safely. As safe locations, we selected six locations at the periphery of Harris County which are on major roads. A visualization of the dataset is presented in Figure 2. Additional details regarding the problem instance are provided in Table 2.

Refer to caption
Figure 2: Harris County Problem Instance
# of nodes, edges in the road network 1338,17511338,1751
# of (evacuee) source locations 374374
# of Households in the study area 1.5\sim 1.5M
Time Horizon 1515 Hours
Length of one time unit 22 minutes
# of nodes, edges in the TEG 684.7684.7K, 841.6841.6K
# of binary, continuous variables in
a-dcfp MIP
17511751, 843.7843.7K
# of Constraints in a-dcfp MIP 1.41.4M
Table 2: Problem Instance Details

We use a synthetic population Adiga et al. (2015) to find the location of the households. We then assign the nearest exit ramp to each household as their source location. We assume that one vehicle is used per household for evacuation.

7.2 MIP-LNS Results and Baseline Comparisons

We performed all our experiments and subsequent analyses on a high-performance computing cluster, with 128GB RAM and 4 CPU cores allocated to our tasks. In addition to MIP-LNS, we used two more methods to solve a-dcfp. We used a time limit of one hour for each method and compared the best solutions found within this time. The three methods we experimented with are described here.

Baseline MIP-LNS Improvement
Avg. Std. Dev. Over Baseline (%)
Average evacuation time (hours)
2.54 2.21 0.06 13
Evacuation completion time (hours)
7.83 6.21 0.35 20.69
Optimality guarantee (%)
20.47 8.51 2.43 58.43
Table 3: MIP-LNS results for a-dcfp over ten experiment runs and comparison with the baseline method in terms of three metrics: average evacuation time, evacuation completion time and optimality guarantee. On average, we see a 13%\sim 13\%, 21%\sim 21\%, and 58%\sim 58\% improvement in the three metrics respectively.
  1. 1.

    Gurobi In this experiment, we used Gurobi to directly solve model (1-8) with the a-dcfp objective. Gurobi was not able to find any feasible solution within the time limit. However, Gurobi was able to come up with a lower bound for the objective value. We used the lower bound to calculate the optimality guarantee of the solutions.

  2. 2.

    Benders Decomposition Hafiz Hasan and Van Hentenryck (2021) presented Benders Convergent (BC) method to solve the ‘Convergent Evacuation Planning’ problem. Their problem is similar to a-dcfp, differing in the objective function, which is maximizing flow of evacuees instead of minimizing average evacuation time. We repurposed their method and used it as our baseline.

  3. 3.

    MIP-LNS In our experiments with MIP-LNS, for a-dcfp, we used thirty iterations (i.e. n=30n=30 in Algorithm 1 line 1). Also, since we have a random selection process within MIP-LNS, we ran ten experiment runs with different seeds.

To compare the quality of our solutions with the baseline, we use three metrics: average evacuation time, evacuation completion time, and optimality guarantee. Optimality guarantee is defined as follows: let the objective value of the solution sol be zsolz_{sol} and the optimal objective be zoptz_{opt}. Then, the optimality guarantee of sol is (zsolzopt)/zsol(z_{sol}-z_{opt})/z_{sol}, i.e. the smaller the value of optimality guarantee, the better. If zoptz_{opt} is unknown, we can use a lower bound of it. Table 3 shows a comparison of our solutions with the baseline in terms of the three metrics.

Let the value of a metric mm for the baseline and the MIP-LNS solution be mbasem_{base} and mlnsm_{lns} respectively. Then, we quantify the improvement over the baseline as (mbasemlns)/mbase(m_{base}-m_{lns})/m_{base}. On average, we see an improvement of 13%13\%, 21%21\%, and 58%58\% over the baseline in the three above-mentioned metrics respectively. This indicates that MIP-LNS finds better solutions than the baseline within the given time limit.

We also applied MIP-LNS to find solutions of ct-dcfp and o-dcfp for our problem instance. Due to limited space, we provide the results in the supplementary materials Islam et al. (2023). In general, the experiment results show that MIP-LNS can effectively solve the problems with different objectives.

7.3 MIP-LNS-SIM Results

Within MIP-LNS-SIM, we set the parameter m=10m=10. We then experimented with two values for the parameter pep_{e}, which are 5,105,10. We refer to these two settings as MIP-LNS-SIM-5%5\% and MIP-LNS-SIM-10%10\%. We ran MIP-LNS-SIM with the two settings and found two different solutions. We then performed agent-based simulations of the entire evacuation process (i.e. evacuate 100%100\% of the evacuees) using a solution of MIP-LNS and then also using solutions from MIP-LNS-SIM-5%5\% and MIP-LNS-SIM-10%10\%. We used the QueST simulator with the logistic traffic model here. We now compare the simulation results.

Refer to caption
(a) Departure rate of evacuees. We observe that in the MIP-LNS solution, evacuees leave very early compared to the solutions from MIP-LNS-SIM-5%5\% and MIP-LNS-SIM-10%10\%.
Refer to caption
(b) Arrival rate of evacuees at safe locations. MIP-LNS-SIM-10%10\% has the best evacuation rate and evacuation completion time, followed by MIP-LNS-SIM-5%5\% and then MIP-LNS.
Figure 3: Comparison of MIP-LNS, MIP-LNS-SIM-5%5\%, and MIP-LNS-SIM-10%10\% in terms of departure rate from sources and arrival rate at safe nodes. Even though MIP-LNS-SIM-5%5\%, and MIP-LNS-SIM-10%10\% regulates the departure of evacuees, they evacuate everyone faster than MIP-LNS.
Refer to caption
(a) Boxplots showing average traffic density (NO. of vehicles per lane per km) on edges over the evacuation time period. Average traffic density is considerably low in the MIP-LNS-SIM-10%10\% and MIP-LNS-SIM-5%5\% solutions compared to MIP-LNS.
Refer to caption
(b) Boxplots showing time spent on the road by evacuees. Due to congestion (as in seen Figure 4(a)), evacuees spend a significantly larger amount of time on the road in the MIP-LNS solution, compared to MIP-LNS-SIM-10%10\%, MIP-LNS-SIM-5%5\% solutions.
Figure 4: Congestion on the roads in terms of traffic density and time spent on the road by evacuees.

Figure (3(a)) shows the departure rate of the evacuees from their initial locations, in the final solution of the three settings. We observe that, MIP-LNS-SIM-5%5\%, and MIP-LNS-SIM-10%10\% regulates the departure of evacuees to a significant extent (compared to MIP-LNS). As evacuees leave late in these solutions, we might expect the evacuation completion time to be higher in these solutions compared to MIP-LNS. Surprisingly, we observe in Figure (3(b)) that the evacuation completion time is actually smaller in MIP-LNS-SIM-5%5\%, and MIP-LNS-SIM-10%10\% compared to MIP-LNS. This implies that although evacuees left early in the MIP-LNS solution, they could not reach safety early due to the resulting congestion on the roads. In the MIP-LNS-SIM-5%5\% and MIP-LNS-SIM-10%10\% solutions, evacuees departed from their initial location over a longer period of time. This way there was less congestion on the road and the evacuation was completed early even though many people started late.

Figure 4 verifies our last statement. We see that traffic density on the edges (i.e. number vehicles per lane and per km) is higher in the MIP-LNS solution (than MIP-LNS-SIM-5%5\%, MIP-LNS-SIM-10%10\%) throughout the evacuation time period. The higher traffic density then causes the evacuees to spend more time on the road. In summary, MIP-LNS-SIM is better than MIP-LNS in terms of average evacuation time, evacuation completion time, and average time spent on the road (10%,17%,77%10\%,17\%,77\% improvement respectively, detailed results in the supplementary materials Islam et al. (2023)). These results indicate that MIP-LNS-SIM is better at evacuation planning than MIP-LNS in terms of reducing congestion on the roads.

Algorithm Estimated
ECT (hrs)
Simulated
ECT (hrs)
Percent
Error
Baseline 7.83 30.28 74.14
MIP-LNS 5.77 24.29 76.25
MIP-LNS-SIM-5%5\% 18.43 22.2 16.98
MIP-LNS-SIM-10%10\% 18.97 20.15 5.86
Table 4: Estimated and simulated Evacuation Completion Time (ECT) in hours for the three settings and the baseline. The percent error of the estimated ECT decreases significantly with pe=5,10p_{e}=5,10. This shows the effectiveness of MIP-LNS-SIM in capturing delays due to congestion.

Finally, Table 4 shows the estimated and the simulated evacuation completion time for Baseline Hafiz Hasan and Van Hentenryck (2021), MIP-LNS, MIP-LNS-SIM-5%5\%, and MIP-LNS-SIM-10%10\%. For instance, MIP-LNS predicts that when using the routes and schedule provided by its solution, the evacuation will be completed within 5.775.77 hours. However, when simulated, it actually took 24.2924.29 hours to evacuate everyone. We also observe that the percent error in estimation decreases considerably in MIP-LNS-SIM-5%5\% and MIP-LNS-SIM-10%10\% where we have used pe=5p_{e}=5 and 1010 respectively. The lower percent error is earned at a cost of higher algorithm run time (MIP-LNS-SIM-5%5\%: 6.5\sim 6.5 hours, and MIP-LNS-SIM-10%10\%: 7.55\sim 7.55 hours).

8 Conclusion

In this paper, we have presented an optimization method MIP-LNS to solve a class of evacuation planning problems. We demonstrated its efficacy by applying it on our study area of Harris county, Houston, Texas. We showed that, for our problem instance, MIP-LNS finds better solutions than the baseline method in terms of three different metrics. We have also presented MIP-LNS-SIM to capture congestion-dependent delays. Through our experiments we have showed that MIP-LNS-SIM outperforms MIP-LNS in terms of multiple metrics when congestion-dependent delay is considered. Our method can be incorporated into disaster management systems for effective evacuation planning. Additionally, it can help assess social vulnerability111https://www.atsdr.cdc.gov/placeandhealth/svi/index.html of regions.

Acknowledgments

This work was partially supported by University of Virginia Strategic Investment Fund SIF160, the NSF Grants: CCF-1918656, OAC-1916805, RISE-2053013, and the NASA Grant 80NSSC22K1048.

References

  • Adiga et al. [2013] Abhijin Adiga, Madhav Marathe, Henning Mortveit, Sichao Wu, and Samarth Swarup. Modeling urban transportation in the aftermath of a nuclear disaster: The role of human behavioral responses. In The Conference on Agent-Based Modeling in Transportation Planning and Operations, Blacksburg, VA, Sep 30 - Oct 2 2013.
  • Adiga et al. [2015] Abhijin Adiga, Aditya Agashe, Shaikh Arifuzzaman, Christopher L. Barrett, Richard J. Beckman, Keith R. Bisset, Jiangzhuo Chen, Youngyun Chungbaek, Stephen G. Eubank, Sandeep Gupta, Maleq Khan, Christopher J. Kuhlman, Eric Lofgren, Bryan L. Lewis, Achla Marathe, Madhav V. Marathe, Henning S. Mortveit, Eric Nordberg, Caitlin Rivers, Paula Stretz, Samarth Swarup, Amanda Wilson, and Dawen Xie. Generating a synthetic population of the United States. Technical Report NDSSL 15-009, Network Dynamics and Simulation Science Laboratory, 2015.
  • Amaran et al. [2016] Satyajith Amaran, Nikolaos V Sahinidis, Bikram Sharda, and Scott J Bury. Simulation optimization: a review of algorithms and applications. Annals of Operations Research, 240(1):351–380, 2016.
  • Bayram [2016] Vedat Bayram. Optimization models for large scale network evacuation planning and management: A literature review. Surveys in Operations Research and Management Science, 21(2):63–84, December 2016.
  • Benders [1962] Jacques F Benders. Partitioning procedures for solving mixed-variables programming problems. Numerische mathematik, 4(1):238–252, 1962.
  • Carpender et al. [2006] S Kay Carpender, Paul H Campbell, Barbara J Quiram, Joshua Frances, and Jill J Artzberger. Urban evacuations and rural america: lessons learned from hurricane rita. Public Health Reports, 121(6):775–779, 2006.
  • Chen et al. [2006] Jiangzhuo Chen, Rajmohan Rajaraman, and Ravi Sundaram. Meet and merge: Approximation algorithms for confluent flows. Journal of Computer and System Sciences, 72(3):468–489, May 2006.
  • Chuzhoy et al. [2017] Julia Chuzhoy, David HK Kim, and Rachit Nimavat. New hardness results for routing on disjoint paths. In Proceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing, pages 86–99, 2017.
  • Dangelmaier et al. [2006] Wilhelm Dangelmaier, Kiran R Mahajan, Thomas Seeger, Benjamin Klopper, and Mark Aufenanger. Simulation assisted optimization and real-time control aspects of flexible production systems subject to disturbances. In Proceedings of the 2006 winter simulation conference, pages 1785–1795. IEEE, 2006.
  • do Amaral et al. [2022] João Victor Soares do Amaral, José Arnaldo Barra Montevechi, Rafael de Carvalho Miranda, and Wilson Trigueiro de Sousa Junior. Metamodel-based simulation optimization: A systematic literature review. Simulation Modelling Practice and Theory, 114:102403, January 2022.
  • Doppa [2021] Janardhan Rao Doppa. Adaptive experimental design for optimizing combinatorial structures. In IJCAI, pages 4940–4945, 2021.
  • Even et al. [2015] Caroline Even, Victor Pillac, and Pascal Van Hentenryck. Convergent plans for large-scale evacuations. In Proceedings of the AAAI Conference on Artificial Intelligence, volume 29, 2015.
  • Ford and Fulkerson [2015] Lester Randolph Ford and Delbert Ray Fulkerson. Flows in networks. In Flows in Networks. Princeton university press, 2015.
  • Fortune et al. [1980] Steven Fortune, John Hopcroft, and James Wyllie. The directed subgraph homeomorphism problem. Theoretical Computer Science, 10(2):111–121, 1980.
  • Golin et al. [2017] Mordecai J. Golin, Hadi Khodabande, and Bo Qin. Non-approximability and polylogarithmic approximations of the single-sink unsplittable and confluent dynamic flow problems. In ISAAC, 2017.
  • Gosavi and others [2015] Abhijit Gosavi et al. Simulation-based optimization. Springer, 2015.
  • Gurobi Optimization, LLC [2023] Gurobi Optimization, LLC. Gurobi Optimizer Reference Manual. https://www.gurobi.com, 2023. Accessed: 2023-05-25.
  • Guruswami et al. [2003] Venkatesan Guruswami, Sanjeev Khanna, Rajmohan Rajaraman, Bruce Shepherd, and Mihalis Yannakakis. Near-optimal hardness results and approximation algorithms for edge-disjoint paths and related problems. Journal of Computer and System Sciences, 67(3):473–496, 2003.
  • Hafiz Hasan and Van Hentenryck [2021] Mohd Hafiz Hasan and Pascal Van Hentenryck. Large-scale zone-based evacuation planning—Part I: Models and algorithms. Networks, 77(1):127–145, 2021.
  • Hamacher and Tjandra [2002] H. Hamacher and S. Tjandra. Mathematical modeling of evacuation problems: A state of the art. Pedestrian and Evacuation Dynamics, 2002, 01 2002.
  • HERE [2023] HERE. HERE Map Data. https://www.here.com/platform/map-data, 2023. Accessed: 2023-05-25.
  • Islam et al. [2020] Kazi Ashik Islam, Madhav Marathe, Henning Mortveit, Samarth Swarup, and Anil Vullikanti. A simulation-based approach for large-scale evacuation planning. In 2020 IEEE International Conference on Big Data (Big Data). IEEE, December 2020.
  • Islam et al. [2023] Kazi Ashik Islam, Da Qi Chen, Madhav Marathe, Henning Mortveit, Samarth Swarup, and Anil Vullikanti. Simulation-assisted optimization for large-scale evacuation planning with congestion-dependent delays, 2023. arXiv:2209.01535.
  • Kambhampati [2020] Subbarao Kambhampati. Challenges of human-aware AI systems: AAAI presidential address. AI Magazine, 41(3):3–17, 2020.
  • Kim et al. [2007] Sangho Kim, Betsy George, and Shashi Shekhar. Evacuation route planning: Scalable heuristics. In Proceedings of the 15th Annual ACM International Symposium on Advances in Geographic Information Systems, GIS ’07, pages 20:1–20:8, New York, NY, USA, 2007. ACM.
  • Li et al. [2021] Jiaoyang Li, Zhe Chen, Daniel Harabor, Peter J. Stuckey, and Sven Koenig. Anytime multi-agent path finding via large neighborhood search. In Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence. International Joint Conferences on Artificial Intelligence Organization, August 2021.
  • Lu et al. [2005] Qingsong Lu, Betsy George, and Shashi Shekhar. Capacity constrained routing algorithms for evacuation planning: A summary of results. In Proceedings of the 9th International Conference on Advances in Spatial and Temporal Databases, SSTD’05, pages 291–307, Berlin, Heidelberg, 2005. Springer-Verlag.
  • Magnanti and Wong [1981] T. L. Magnanti and R. T. Wong. Accelerating benders decomposition: Algorithmic enhancement and model selection criteria. Operations Research, 29(3):464–484, June 1981.
  • Mannering and Washburn [2020] Fred L Mannering and Scott S Washburn. Principles of highway engineering and traffic analysis. John Wiley & Sons, 2020.
  • Naves et al. [2010] Guyslain Naves, Nicolas Sonnerat, and Adrian Vetta. Maximum flows on disjoint paths. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, pages 326–337. Springer, 2010.
  • of Law Enforcement [2022] Florida Department of Law Enforcement. Update: Florida medical examiners commission hurricane ian deaths, Oct 2022. https://www.fdle.state.fl.us/News/2022/October/Update-Florida-Medical-Examiners-Commission-H-(15), [Online; Accessed 28 Oct 2022].
  • Osorio and Bierlaire [2013] Carolina Osorio and Michel Bierlaire. A simulation-based optimization framework for urban transportation problems. Operations Research, 61(6):1333–1345, December 2013.
  • Pisinger and Ropke [2018] David Pisinger and Stefan Ropke. Large neighborhood search. In Handbook of Metaheuristics, pages 99–127. Springer International Publishing, September 2018.
  • Robertson and Seymour [1995] Neil Robertson and Paul D Seymour. Graph minors. xiii. the disjoint paths problem. Journal of combinatorial theory, Series B, 63(1):65–110, 1995.
  • Romanski and Van Hentenryck [2016] Julia Romanski and Pascal Van Hentenryck. Benders decomposition for large-scale prescriptive evacuations. In Thirtieth AAAI Conference on Artificial Intelligence, 2016.
  • Sajedinejad et al. [2011] Arman Sajedinejad, Soheil Mardani, Erfan Hasannayebi, S. Ahmad Reza Mir Mohammadi K., and Alireza Kabirian. SIMARAIL: Simulation based optimization software for scheduling railway network. In Proceedings of the 2011 Winter Simulation Conference (WSC). IEEE, December 2011.
  • Shahabi and Wilson [2014] Kaveh Shahabi and John P. Wilson. CASPER: Intelligent capacity-aware evacuation routing. Computers, Environment and Urban Systems, 46:12–24, July 2014.
  • Shaw [1998] Paul Shaw. Using constraint programming and local search methods to solve vehicle routing problems. In Principles and Practice of Constraint Programming — CP98, pages 417–431. Springer Berlin Heidelberg, 1998.
  • Skutella [2009] Martin Skutella. An introduction to network flows over time. In Research trends in combinatorial optimization, pages 451–482. Springer, 2009.
  • Teufl et al. [2018] Sabine Teufl, Kayode Owa, Dirk Steinhauer, Elkin Castro, Graham Herries, Robert John, and Svetan Ratchev. Optimised–developing a state of the art system for production planning for industry 4.0 in the construction industry using simulation-based optimisation. Transdisciplinary Engineering Methods for Social Innovation of Industry 4.0, pages 731–740, 2018.
  • Van Hentenryck [2013] Pascal Van Hentenryck. Computational disaster management. In Twenty-third international joint conference on artificial intelligence, 2013.

Appendix A Time Expanded Graph for Capturing Flow Over Time

Joint routing and scheduling over networks requires one to study flows over time, as static flows make the unrealistic assumption that flows travel instantaneously.

Refer to caption
(a) Sample Evacuation Network. Edges are labeled with travel time and flow capacity respectively. Source, safe and transit nodes are denoted by squares, triangles, and circles respectively. Source nodes are labeled with number of evacuees.
Refer to caption
(b) Time Expanded Graph (TEG) for the Sample Network. Edges are labeled with capacity. Construction of this TEG sets an upper bound of 3 time units for evacuation completion.
Figure 5: Sample Problem Instance

For instance, let us consider the sample evacuation network shown in Figure 5(a). All three edges in this network have a capacity of 11, which means 11 car can enter the link in a single timestep. However, sending flow from both sources (0 and 11) at a rate of 11 evacuee per timestep will not work because then two evacuees will reach node 22 at the same timestep but only one evacuee will be able to enter edge (2,A)(2,A). The main issue here is that we need to keep track of available capacity on the edges at different points in time. We cannot do it using static flows because static flows have the underlying assumption that flows travel instantaneously. For this purpose, researchers have defined dynamic flows (Skutella [2009]; Ford and Fulkerson [2015]) and used time expanded graphs to solve dynamic flow problems (Romanski and Van Hentenryck [2016]; Hafiz Hasan and Van Hentenryck [2021]). In this paper, we have also used a time expanded graph (TEG) to capture the flow of evacuees over time.

Appendix B Formulating ct-dcfp and o-dcfp as Mixed Integer Programs

In this section, we present the details of how we formulate ct-dcfp and o-dcfp as MIPs. Note that, both of these problems can be solved using MIP-LNS without making any changes to the algorithm.

B.1 ct-dcfp

Evacuation completion time cannot be represented as a linear function of the variables x,ϕx,\phi. To optimize for this objective we modify the time expanded graph as follows: we add a new node ztz_{t} for each timestep tt\leq\mathcal{H}. Then, we add an edge from each safe node (node,t)𝒮x(node,t)\in\mathcal{S}^{x} to the node ztz_{t}. Finally, we add add an edge from node zt,tz_{t},\forall t\leq\mathcal{H} to the super-sink (vt)(v_{t}). Figure 6 shows an example with two safe nodes on how to do this construction.

Refer to caption
Figure 6: Modification of the time expanded graph for minimizing evacuation completion time. In this example, we have two safe nodes A and B. Blue nodes and edges are newly added to the TEG. Edges are labeled with their capacity.

With the new time expanded graph, we can represent the evacuation completion time (ECT) as follows:

ECT=maxeδ(vt)𝟙[ϕe>0]ts(e)\displaystyle\text{ECT}=\max_{e\in\delta^{-}(v_{t})}\mathbbm{1}[\phi_{e}>0]t_{s}(e) (10)

Here, ts(e)t_{s}(e) denotes the timestep of the starting node of edge ee. 𝟙\mathbbm{1} denotes the indicator function, i.e.

𝟙[ϕe>0]={1 if ϕe>00 otherwise\displaystyle\mathbbm{1}[\phi_{e}>0]=\begin{cases}1&\text{ if }\phi_{e}>0\\ 0&\text{ otherwise}\end{cases}

As (10) contains the indicator function, we introduce binary variables ye,eδ(vt)y_{e},\forall e\in\delta^{-}(v_{t}) and enforce that: ϕe>0ye=1{\phi_{e}>0\iff y_{e}=1}. We can do it by adding the following constraints to model (18):

ϕeϵM(1ye)\displaystyle\phi_{e}\geq\epsilon-M(1-y_{e}) eδ(vt)\displaystyle\forall e\in\delta^{-}(v_{t}) (11)
ϕeMye\displaystyle\phi_{e}\leq My_{e} eδ(vt)\displaystyle\forall e\in\delta^{-}(v_{t}) (12)

Here, ϵ\epsilon is a small positive constant (e.g. 0.0010.001) and MM is a positive constant which is equal to the total number of evacuees. With these new variables and constraints, we can now represent ECT as:

ECT=maxeδ(vt)yets(e)\displaystyle\text{ECT}=\max_{e\in\delta^{-}(v_{t})}y_{e}t_{s}(e) (13)

By minimizing (13) with model (28,1112) we can achieve the goal of minimizing evacuation completion time.

B.2 o-dcfp

Minimizing the Average/Total Evacuation Time of pp-fraction of the evacuees: In evacuation scenarios, some evacuees may be in such a situation that the cost of evacuating them may dramatically increase the overall evacuation objective, e.g. the average evacuation time. We consider such evacuees as ‘outliers’. A common way to handle outliers is to optimize the desired objective for the ‘non-outlier’ evacuees, while taking into consideration that the ‘outlier’ evacuees will also evacuate and use the same road network. We formally define the problem as follows:

Problem 3.

Outlier Average Dynamic Confluent Flow Problem (o-dcfp). Given an evacuation network, let TmaxT_{max} represent an upper bound on evacuation time. Given p[0,1]p\in[0,1], find an evacuation schedule SS such that all evacuees arrive at some safe node before time TmaxT_{max} while minimizing 1|Wp|iWpti\frac{1}{|W_{p}|}\sum_{i\in W_{p}}t_{i} where WpW_{p} is the set of pp-fraction of the evacuees with the lowest evacuation time in schedule SS.

To optimize the objective of o-dcfp, we extend the time expanded graph (TEG) as follows: First, we add a new ‘bypass’ node (A,0)(A^{\prime},0) to the TEG. Then, from each safe node s𝒮xs\in\mathcal{S}^{x}, we add an edge to (A,0)(A^{\prime},0) with infinite capacity. Finally, we add an edge from (A,0)(A^{\prime},0) to the super-sink (vtv_{t}) with capacity (kdk)(1p)(\sum_{k\in\mathcal{E}}d_{k})*(1-p). Figure 7 shows the newly constructed time expanded graph for our sample problem instance. With this new TEG, minimizing objective (9) will give us the desired solution. Here, the model solver will decide which (1p)(1-p) fraction of the evacuees are the outliers and then direct them through the ‘bypass’ node. As the timestep of this bypass node is zero, the cost for the outlier evacuees will not be added to the final objective. However, as they still have to reach the safe nodes through the road network, they will contribute to the congestion on the road.

Refer to caption
Figure 7: Extension of the time expanded graph for minimizing Average/Total Evacuation Time of p%p\% of the evacuees. The blue node denotes the ‘bypass’ node. Edges are labeled with their capacity. MM denotes the total number of evacuees.

Appendix C Algorithms

We use Algorithm 3 to calculate the initial feasible solution for our heuristic search method MIP-LNS.

Input: Road Network Graph: 𝒢(𝒩,𝒜)\mathcal{G}(\mathcal{N},\mathcal{A})
Output: A Convergent Route set
1 𝒜{e(v,u)|e(u,v)𝒜}\mathcal{A}^{\prime}\leftarrow\{e(v,u)|e(u,v)\in\mathcal{A}\}
2 Construct the graph 𝒢(𝒩,𝒜)\mathcal{G}^{\prime}(\mathcal{N},\mathcal{A}^{\prime}).
3 Add a node vsinkv_{sink} to 𝒢\mathcal{G}^{\prime}.
4 Add edges e(vsink,v)e(v_{sink},v) to 𝒢,v𝒮\mathcal{G}^{\prime},\forall v\in\mathcal{S} with Te=0T_{e}=0.
5 Calculate shortest paths in 𝒢\mathcal{G}^{\prime} from vsinkv_{sink} to all nodes v𝒩v\in\mathcal{N} using a single source shortest path algorithm.
6 routeset \leftarrow Shortest paths from vsinkv_{sink} to all nodes vv\in\mathcal{E}.
7 Reverse the direction of each path in routeset and remove node vsinkv_{sink}.
return routeset
Algorithm 3 Calculate Initial Convergent Route Set

Appendix D MIP-LNS Progress Over Iterations for a-dcfp

To visualize the progress of MIP-LNS over the iterations for a-dcfp, we look at the experiment run (out of the ten experiment runs) that returned the best solution. Figure 8 shows the average evacuation time of the evacuees at different iterations of MIP-LNS . At iteration zero, we have our initial solution that has an average evacuation time of 3.363.36 hours and an evacuation completion time of 13.513.5 hours. After thirty iterations, MIP-LNS returned a solution with an average evacuation time of 2.122.12 hours and an evacuation completion time of 5.775.77 hours.

Refer to caption
Figure 8: Average evacuation time over iterations. The decrease in average evacuation time indicates improvement of the objective over the iterations.

Appendix E ct-dcfp and o-dcfp Solutions

In this section, we provide experiment results on the ct-dcfp and o-dcfp problems.

We ran ten experiment runs (with different random seeds) of MIP-LNS for both ct-dcfp and o-dcfp. We again used the one hour time limit for these experiment runs. Figures 9(a), 9(b), 9(c) shows a comparison of the a-dcfp, ct-dcfp, and o-dcfp solutions in terms of the three metrics: average evacuation time, evacuation completion time, and non-outlier average evacuation time. Note that, these metrics are also the objectives of a-dcfp, ct-dcfp, and o-dcfp respectively.

From the box-plots we observe that, in general, a-dcfp, ct-dcfp, and o-dcfp solutions are superior compared to the other solutions in terms of the objective they are designed to optimize, respectively. For instance, a-dcfp solutions are, in general, superior than ct-dcfp and o-dcfp solutions in terms of average evacuation time, but worse in terms of the other two objectives. This shows the effectiveness of MIP-LNS and of our formulation in solving evacuation planning problems, while optimizing for different objectives.

Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Figure 9: Box-plots showing comparison of MIP-LNS solutions for a-dcfp, ct-dcfp and o-dcfp over ten experiment runs. Figures 9(a), 9(b), 9(c) show the comparison in terms of the three metrics average evacuation time, evacuation completion time, and non-outlier average evacuation time, respectively. We observe that the a-dcfp, ct-dcfp, and o-dcfp solutions are superior compared to the other solutions in terms of the objective they are designed to optimize, respectively.

Appendix F Calculating Flow Capacity of Edges

Traffic flow, vehicle speed and traffic density are related by the following equation (Mannering and Washburn [Mannering and Washburn, 2020, Chapter 5, Equation 5.14]):

q=uk\displaystyle q=uk (14)

where:

q\displaystyle q =Traffic flow (vehicles per time unit)\displaystyle=\text{Traffic flow (vehicles per time unit)}
u\displaystyle u =vehicle speed (km per time unit)\displaystyle=\text{vehicle speed (km per time unit)}
k\displaystyle k =Traffic density (vehicles per km)\displaystyle=\text{Traffic density (vehicles per km)}

For an edge ee, let:

le\displaystyle l_{e} =length of edge e (km)\displaystyle=\text{length of edge $e$ (km)}
ne\displaystyle n_{e} =Number of lanes in edge e\displaystyle=\text{Number of lanes in edge $e$}
k^e\displaystyle\hat{k}_{e} =Number of vehicles per lane per km on edge e\displaystyle=\text{Number of vehicles per lane per km on edge $e$}

Then, we have:

ke\displaystyle k_{e} =k^ene\displaystyle=\hat{k}_{e}n_{e} (15)

We assume that the maximum value of k^\hat{k} for all edges is:

k^max=250\displaystyle\hat{k}_{max}=250 [vehicles per lane per km] (16)
\displaystyle\implies kmax=250ne\displaystyle k_{max}=250n_{e} (17)

Given a constant travel time tet_{e} for edge ee, speed on the edge will be:

ue=lete\displaystyle u_{e}=\frac{l_{e}}{t_{e}} (18)

Then, from Equation 14:

qmax=uekmax\displaystyle q_{max}=u_{e}k_{max} (19)

Given a constant travel time for an edge, we use Equation 18 and 19 to calculate the flow capacity of the edge.

Appendix G Comparison of MIP-LNS-SIM and MIP-LNS Considering Congestion Dependent Delays

To compare the evacuation plans returned by MIP-LNS-SIM and MIP-LNS with the consideration of congestion dependent delays, we run agent-based simulation of the entire evacuation (i.e. evacuate 100%100\% of the evacuees) using each of these plans. Here, we use the QueST simulator Islam et al. [2020] with the logistic traffic model. From the simulation results, we calculate the three metrics: average evacuation time, evacuation completion time, and average time spent on the road by evacuees. Table 5 shows a comparison of MIP-LNS-SIM-10%10\% and MIP-LNS solutions in terms of these metrics. We can readily see that MIP-LNS-SIM-10%10\% outperforms MIP-LNS by 10%,17%,77%10\%,17\%,77\% in terms of the three metrics, respectively.

MIP-LNS MIP-LNS-SIM-10%10\% Improvement (%)(\%)
Average evacuation time (hours)
9.45 8.47 10.37
Evacuation completion time (hours)
24.29 20.15 17.04
Average time spent on the road (hours)
8.01 1.85 76.88
Table 5: MIP-LNS-SIM-10%10\% outperforms MIP-LNS in terms of the average evacuation time, evacuation completion time, and average time spent on the road.

Appendix H Proof of Hardness

In this section, we show that the problems we consider are not only NP-hard but also hard to approximate. Even when we consider special planar graphs that perhaps is closer to a city’s road network where GG is a subgraph of a grid and all destinations are along the border, these problems remain NP-hard. A summary of the hardness results is found in Table 6.

Underlying Hardness Problems
Graph a-dcfp ct-dcfp o-dcfp
Subgrid / Planar NP-hard Thm. 2 Thm. 2 Thm. 2
General with Two Sources / Sinks (3/2ϵ)(3/2-\epsilon)-hard to approx. Thm. 3 See Golin et al. [2017] Thm. 3
General O(logn)O(\log n)-hard to approx. Thm. 1 See Golin et al. [2017] Thm. 1
Table 6: Summary of Hardness
Theorem 2.

Problems a-dcfp, ct-dcfp and o-dcfp are NP-hard even If GG is a subgraph of a grid and all safety destinations are along the outer boundary.

Theorem 3.

For any ϵ>0\epsilon>0, it is NP-hard to approximate a-dcfp and o-dcfp to a factor of (3/2ϵ3/2-\epsilon) of the optimum, even when there are only two sources and one safe node.

To prove Theorem 2, we rely on the general kk-Node-Disjoint Path Problem:

Problem 4 (kk-Node-Disjoint Path Problem (kNDP)).

Given a graph GG, a set of kk source-sink pairs si,tis_{i},t_{i}, find node-disjoint paths from each source sis_{i} to sink tit_{i}.

The above problem was proven to be hard even when GG is a subgraph of a grid Chuzhoy et al. [2017].

Theorem 4.

The kk-Node-Disjoint Path Problem is hard to approximate to a factor of 2Ω(logn)2^{\Omega(\sqrt{\log n})} even when the graph is a subgraph of a grid and all sources lie on the outer boundary.

We point out that ct-dcfp is equivalent to the Confluent Quickest Flow Problem in Golin et al. [2017], which the authors have shown the above inapproximability result. In addition, they have also provided a bicriteria hardness result where it is not possible to approximate the completion time within some constant factor even when satisfying only some constant fraction of the demand. For o-dcfp, note that it is a generalization of Problem a-dcfp where p=1p=1. Therefore, any hardness result for a-dcfp also holds for o-dcfp. Thus, we focus on the following two theorems:

The approximation hardness proof of a-dcfp is similar to the one in Golin et al. [2017]. The main difference is in its analysis since the objective in the two problems differ. For brevity and completeness, we outline the reductions but omit certain proofs and ask the readers to refer to Golin et al. [2017] for more details.

The approximation hardness result relies on the NP-hardness of the capacitated version Two Distinct Path Problem.

Problem 5 (Two Distinct Path Problem).

Let GG be a graph with two sources x1,x2x_{1},x_{2} and two sinks y1,y2y_{1},y_{2}. Every edge is labelled with either 11 or 22. Determine if there exists two edge-disjoint paths P1,P2P_{1},P_{2} such that PiP_{i} is a path from xix_{i} to yiy_{i} for i=1,2i=1,2 and P2P_{2} only uses edges with label 22 (P1P_{1} can use any edge).

The above problem is known to be NP-hard Guruswami et al. [2003]. Other variations of the problem such as uncapacitated, undirected/directed, edge/node-disjoint paths are also known to be hard (see e.g. Fortune et al. [1980], Naves et al. [2010] and Robertson and Seymour [1995]).

Proof of Theorem 3.

Given an instance \mathcal{I} of the Two Disjoint Path Problem, consider constructing the following graph GG where we attach safe node tt to y1,y2y_{1},y_{2} with an edge of capacity 1,21,2 respectively. For i=1,2i=1,2, we also add a source sis_{i} and attach it to xix_{i} with an edge of capacity ii. Every edge with label ii also has capacity ii. Source sis_{i} has MiM*i evacuees for some large MM and each edge has a travel time of 11. The upperbound completion time is set to be M2nM^{2}n.

If there exists two disjoint paths in \mathcal{I}, then a valid schedule simply sends ii evacuees at every time step, where the last group of people leaves their sources at time MM. Since each path has length at most n=|V(G)|n=|V(G)|, the ii evacuee that left source sis_{i} at time kk is guaranteed to arrive by time k+nk+n. Then, the total evacuation time is at most k=1M3(k+n)=3M2/2+3M/2+3Mn\sum_{k=1}^{M}3(k+n)=3M^{2}/2+3M/2+3Mn, resulting in an average evacuation time of roughly M/2M/2.

If \mathcal{I} does not have two disjoint paths, then consider the two paths P1,P2P_{1},P_{2} in a solution to a-dcfp in GG. If P1,P2P_{1},P_{2} intersects before tt, since it is a confluent flow, the edge following their node of intersection is a single-edge cut that separates the sources from the sink. If the two paths only intersects at tt, since we are in a NO-instance of \mathcal{I}, P2P_{2} must have used an edge of capacity 11. Then, deleting that edge along with s1x1s_{1}x_{1} also separates the sources from the sink. Note that in both cases, the cut has capacity at most 22. Then, at every time step, at most 22 evacuees can cross the cut. Thus, for all 3M3M evacuees to cross the cut, it takes at least 3M/23M/2 time steps. Due to this bottleneck, it follows that the smallest total evacuation time is at least k=13M/22(k+n)9M2/4\sum_{k=1}^{3M/2}2(k+n)\geq 9M^{2}/4, giving an average of at least 3M/43M/4.

Since the two instances has a gap of 3/2ϵ3/2-\epsilon where ϵ\epsilon depends on the choice of MM, our result follows. ∎

The proof of Theorem 1 follows a similar structure. We use the same setup as the proof of log\log-hardness of Quickest Flow Time in Adiga et al. [2013] (Theorem 7) with an arbitrarily large upperbound on completion time. Refer to Adiga et al. [2013] for more details. Note that the resulting graph contains NN sources, one safe node and a total of M2lognM^{2}\log n evacuees. We can similarly show that a YES-instance of the Two-Disjoint Path problem leads to an average evacuation time of at most M2/2M^{2}/2. Meanwhile, if it is a NO-instance, then by Lemma 23 in Adiga et al. [2013], there is cut of capacity at most 2, creating a bottleneck. Using similar analysis as before, one can show that the average evacuation time is at least M2logN/4M^{2}\log N/4. Then, theorem 1 follows immediately.

Proof of Theorem 2.

The proofs for all three problems are similar and hence we only focus on a-dcfp here. Given an instance of kkNDP where GG is a subgraph of a grid and k=O(n)k=O(n), we first swap the location of the sources and sinks such that all sinks lie on the outer boundary. One can easily check that subdividing any edge and adding a leaf to any vertex of degree less than 44 still ensures that GG remains a subgraph of a grid. Then, we claim that without loss of generaltiy, we can assume that all sources and sinks are degree-11 vertices. This can be accomplished by first subdivide every edge and shift the sources/sinks to an edjacent newly added vertex. Then, add a single edge to it and shift the source/sink to the new pendant vertex. This ensures that every source and sink is incident to only one edge. For any edge incident to a source sis_{i} or a sink tit_{i}, assign it a capacity of ii; every other edge has a capacity of kk. Each source sis_{i} has demand MiM*i where Mn3M\geq n^{3}. This means in total, there are Mk2/2M*k^{2}/2 evacuees.

In a YES-instance, every source follows its designated path. At every timestep, each source sis_{i} sends ii people, ensuring a total of k2/2k^{2}/2 people leaves the sources every timestep. Since each disjoint path has length at most nn, anyone leaving at time tt is guaranteed to arrive by time t+nt+n. This implies that the last group, leaving at time MM also arrives by time M+nM+n, achieving an average arrival time of at most 1Mk2/2(k2/2)t=1M(t+n)M/4+n\frac{1}{M*k^{2}/2}(k^{2}/2)*\sum_{t=1}^{M}(t+n)\leq M/4+n.

In a NO-instance, in a solution to a-dcfp, consider the cut formed by the edges incident to the sinks. We claim that the amount of flow through this cut at any point in time is at most k2/21k^{2}/2-1. Assume for the sake of contradiction that there exists some point in time where the flow across the cut is at least k2/2k^{2}/2. Since the total capacity of the cut is k2/2k^{2}/2, then every edge is used at full capacity at that point in time; in particular, every sink is used in the final routing. Since the routes are confluent, every source is matched to a distinct route. Since we are in a NO-instance, there exists i,ji,j such that source sis_{i} is routed to sink tjt_{j} and i<ji<j. Since source sis_{i} can send at most ii flow at any point in time, sink tjt_{j} can never receive its full capacity of jj, a contradiction.

Then, at any point in time, at most k21k^{2}-1 people can arrive at the destinations. This implies we need at least T=Mk2/(2(k21))T=M*k^{2}/(2(k^{2}-1)) rounds and thus a total evacuation time of at least (T2/2)(k21)(T^{2}/2)(k^{2}-1). This implies an average evacuation time of at least Mk2/(4(k21))=M/4+M/(4(k21))Mk^{2}/(4(k^{2}-1))=M/4+M/(4(k^{2}-1)). By our choice of MM, M/(4(k21))nM/(4(k^{2}-1))\geq n, causing a gap between the YES and NO instances, proving our theorem. ∎