<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>On a Problem of the Utility Network Design ?</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gulzhigit Y. Toktoshov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anastasiya N. Yurgenson</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Denis A. Migov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Computational Mathematics and Mathematical Geophysics of SB RAS</institution>
          ,
          <addr-line>prospekt Akademika Lavrentieva 6, 630090, Novosibirsk</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>385</fpage>
      <lpage>395</lpage>
      <abstract>
        <p>An adoptable location of utility network elements for processing and distribution of resources between consumers is a complex technical and economic problem. For its solution, it is necessary to take into account both the resource constraints as well as a plan of processing and distributing the resources among consumers, thus providing an e cient scheme for the functioning of a network to be designed. In this study the problem of the utility network design is treated by the hypernet approach according to the compatibility of di erent types of resources with allowance for their laying in the same track. Also, we study the reliability aspect of the designed utility network for obtaining the optimal laying of a reliable enough utility network on a given area with minimal costs. The performed numerical experiments show how the method proposed works.</p>
      </abstract>
      <kwd-group>
        <kwd>Multilayer network</kwd>
        <kwd>Utility network</kwd>
        <kwd>Deployment area</kwd>
        <kwd>Track</kwd>
        <kwd>Graph</kwd>
        <kwd>Hypergraph</kwd>
        <kwd>Hypernet</kwd>
        <kwd>Connectivity</kwd>
        <kwd>Network relia- bility</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Utility network is a composite geographically distributed system that performs
such vital functions as providing consumers with energy and water resources,
communication facilities, information, route network, tra c, and other services.
It includes local authorities, economic objects and consumers, and, also,
considers the nature of the relationship between them.</p>
      <p>
        Currently, there is a signi cant number of published works related to
design and construction of networks for various purposes [
        <xref ref-type="bibr" rid="ref10 ref11 ref13 ref14 ref16 ref2 ref22 ref26 ref28 ref3 ref7 ref8 ref9">8, 2, 14, 16, 10, 9, 26, 28,
3, 13, 11, 22, 7</xref>
        ]. In particular, in [
        <xref ref-type="bibr" rid="ref14 ref16">14, 16</xref>
        ] the authors consider the search for the
optimal routes for laying of the utility networks. The task of locating the
construction objects on a given territory is solved in [
        <xref ref-type="bibr" rid="ref10 ref9">10, 9</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref26 ref28">26, 28</xref>
        ] the possibility
? Supported by Russian Foundation for Basic Research under grants 17-07-00775,
1807-00460
Copyright c by the paper's authors. Copying permitted for private and academic purposes.
      </p>
      <p>
        In: S. Belim et al. (eds.): OPTA-SCL 2018, Omsk, Russia, published at http://ceur-ws.org
of GIS-technologies applying in tracing and placing of linear objects is studied.
An application of splines in the optimization of the car roads tracing is treated
in [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Moreover, problems of the utility networks optimization also arise in other
adjacent areas, such as the placement of logistics facilities [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] and power
supply systems [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], design and reconstruction of transport networks [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], and the
routing of service networks [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>In all the above mentioned papers, the utility network is considered to be
a two-dimensional object located on a plane. However, such a two-dimensional
representation of networks does not completely correspond to reality, since as
the basis of the design and construction of the utility network underlies the
interaction of, at least, two interrelated objects. Unlike its predecessors, in this
work a utility network is treated as a hierarchical system, in which resources
(gas, oil, water, etc.) are transferred from producers to consumers through the
points of processing via communication (transport channels). Such systems are
characterized by the existence of the so-called xed costs, which must be done
regardless of the volume of production and processing of products.</p>
      <p>
        For the simulation of various network objects, graphs and hypergraphs are
commonly used. As was mentioned above, in many areas of applications there
is a bunch of interconnected networks, forming a hierarchical structure. In such
cases it is completely inconvenient to use graphs and hypergraphs. Instead of
them, other network models are used [
        <xref ref-type="bibr" rid="ref1 ref12 ref19 ref2 ref21 ref29 ref8">8, 2, 21, 12, 19, 29, 1</xref>
        ]. For instance, there
are such mathematical objects as nested graphs [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], layered complex networks
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], hypernets [
        <xref ref-type="bibr" rid="ref1 ref19 ref29">19, 29, 1</xref>
        ].
      </p>
      <p>
        For the problems of a utility network design we use the hypernet approach,
which makes it possible to operate with hierarchical, multilevel, and
heterogeneous networks. More speci cally, we study a simple case of hypernet | the
two-level network. It consists of a primary network, which represents a physical
network, and a secondary network, which represents a logical network,
embedded into a primary network. Our previous results on the hypernet using for the
utility network design are presented in [
        <xref ref-type="bibr" rid="ref30 ref31">30, 31</xref>
        ]. A of nodes of a secondary
network is a subset of nodes of a primary network, whereas each secondary network
edge is a chain in a primary network, i.e. a sequence of the adjacent edges. For
the sake of de niteness, we call edges of a primary network as branches. Note
that each branch can be included into several edges.
      </p>
      <p>
        Based on the hypernet approach, we solve the task of providing the
connectivity of given consumers with given sources on a given area with minimization
of laying and maintenance costs and within given constraints. As a result, we
propose a new method for the selection of routes for the laying of the utility
networks taking into account the compatibility of di erent types of resources for
placing them in the same track. For example, in one collector it is possible to
lay in one direction the heat communications, pressure water pipes and sewerage
systems, over ten communication cables and power cables with voltage up to 10
kV. However, the joint laying of gas pipelines and pipelines with combustible
substances is not permitted due to the fact that the distance between
communications of di erent purposes is normalized according to building codes and
regulations [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Also, we introduce an algorithm for obtaining not only the cheapest solution,
but reliable enough as well. Note that reliability analysis of hypernets is not a new
task, see, for example [
        <xref ref-type="bibr" rid="ref24 ref25">25, 24</xref>
        ]. As a reliability measure, the hypernet analogue of
the 2-terminal reliability is considered, under assumption that failures occur in a
primary network, and nodes in a secondary network should be connected. In this
case we design a utility network, in which each consumer should be connected
with the necessary suppliers with probability no less than a given reliability
threshold 0 &lt; R0 1. For solving this problem, we introduce the ant colony
algorithm. Unlike the existing optimization techniques, the procedure proposed
makes it possible to obtain the variant of the utility network placement in a
given area, which would be appropriate in terms of reliability and minimum
total costs.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>De nitions and Notations</title>
      <p>
        We use the classical de nitions from the hypernet theory [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]:
      </p>
      <p>De nition: hypernet is represented by the four sets: HN = (X; V; R; F ),
where:
X = fx1; x2; :::; xng { a set of nodes;
V = fv1; v2; :::; vgg X X { a set of branches;
R = fr1; r2; :::; rmg { a set of edges;
F : R ! 2V { a mapping associating each item r 2 R with a path F (r) V .</p>
      <p>These four sets determine the two graphs:
P N = (X; V ) { a graph of a primary network;
W N = (X; R) { a graph of a secondary network.</p>
      <p>It is assumed that for the utility network laying, the following objects are
given:
D { s two-dimensional placement area;
Ysource D { a set of point objects, which represents sources;
Yconsumer D { a set of point objects, which represents consumers;
Y = Ysource [Yconsumer { a set of point objects to be connected by linear facilities
of various assignment.</p>
      <p>Let us describe the utility network in terms of the hypernet theory.</p>
      <p>In a primary network P N = (X; V ) we assume that:
(v) { the length of v 2 V ;
a(v) { the land cost (rent, taxes, etc.) of v 2 V ;
b(v) { the cost of constructing (excavation) of v 2 V ;</p>
      <p>1 { a discount factor of building costs (this factor is for bringing economic
indicators of di erent years to comparable values).</p>
      <p>In a secondary network W N = (Y; R) we assume the following:
(r) = Pv2F (r) (v) { the length of r 2 R;
c(r) { the cost of r 2 R, including its installation and laying between the
corresponding elements of D;</p>
      <p>2 { a discount factor of equipment costs;
dv(r) { maintenance costs of linear facilities on plots v 2 F (r) for a chosen edge
(route) r;
T { a set of all types of utility resources. Thus, each edge r has the type
type(r) 2 T .</p>
      <p>As was said above, di erent resource types may be incompatible with each
other for their laying in the same track. For the description of the compatibility
of di erent types of resources, we introduce the following notation:</p>
      <p>A binary relation CT 2 T T is de ned by the rule: if (t1; t2) 2 CT , then
these types of resources can be placed in the same track, i.e. both of them can
include the same branch.</p>
      <p>Let M inCT (t1; : : : ; th) be the minimum number of disjoint subsets into which
a subset of types ft1; : : : ; thg can be divided.</p>
      <p>For example, if there are types ft1; t2; t3g such that (t1; t2); (t2; t3) 2 CT , but
(t1; t3) 2= CT , then M inCT (t1; t2; t3) = 2, since these types can be divided into
the subsets ft1; t2g and ft3g.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Problem Statement</title>
      <p>In the general case, the task of a utility network design can be formulated as
a problem of providing the connectivity of given objects from Y = Ysource [
Yconsumer with minimization of the laying and maintenance costs. The obtained
con guration determines the topology of the designed utility network.</p>
      <p>As we said above, we use the hypernet approach, so the network structure
is separated into a primary and a secondary networks. As a primary network,
we consider a discrete analogue of the placement area D for the utility network.
As a secondary network, we consider routes through branches for the laying of
various utility systems.</p>
      <p>The problem is to nd the hypernet HN , i.e. embed each path r 2 R in W N
into the edges of the graph P N in such a way that all conditions and restrictions
imposed on the utility network be met, and the functional below would take the
minimum value:</p>
      <p>Q(HN ) = X
v2V 0
a(v) + b(v)
1
(v) M inCT (v) +
(1)
+ X c(r) +
r2R</p>
      <p>X
where v 2 V 0 V if 9r 2 R such that v 2 F (r). Let v 2 V 0 and v 2 F (ri); i =
1; h (r1; : : : ; rh 2 R), then M inCT (v) = M inCT (type(r1); : : : ; type(rh)).</p>
    </sec>
    <sec id="sec-4">
      <title>The Two-Stage Algorithm</title>
      <p>This Section proposes an algorithm for obtaining an approximate solution of the
problem stated. The basic idea of our algorithm is to nd an initial estimation of
HN , its total cost (1), and to improve it further. The initial estimation is found
by the \greedy" algorithm or the Floyd algorithm, which is commonly used for
nding the shortest paths.</p>
      <p>The cost of v 2 V is (a(v) + b(v) 1 + c(r) 2 + dv(r)) (v) (for the
sake of simplicity c(r) 2 + dv(r) = const, 8r) for the Floyd and the Dijkstra
algorithms in the primary network P N .</p>
      <p>Below we outline the steps of the algorithm:
Algorithm</p>
      <sec id="sec-4-1">
        <title>Stage 1 (Greedy)</title>
        <p>Divide a set of types into incompatible subsets.
repeat</p>
        <p>Choose a subset of types T 0 with the maximum number of edges (return the
values a(v), b(v) for all v 2 F (r) in the graph P N ).</p>
        <p>repeat</p>
        <p>Find all the shortest paths (xi; xj) i; j = 1; n, i 6= j in the graph P S = (X; V )
by the Floyd algorithm (type(xi; xj) 2 T 0).</p>
        <p>Choose the minimal value from a set of the shortest paths, where (xi; xj) 2 R
in the graph W N (the path (xi; xj) is not assigned for any r 2 R).</p>
        <p>Assign the edge r 2 R to the shortest path (xi; xj) in the graph P N .
a(v) := 0, b(v) := 0 for all v 2 F (r) in the graph P N (the costs of branches
are zero for assigning a path).</p>
        <p>until 8r 2 R in the graph W N , there is an assigned path (xi; xj) in the graph
P N .
until T 0 6= ;.</p>
        <p>The greedy algorithm is approximate, therefore the solutions obtained are
not always optimal. We can improve it if for an edge r 2 R we reassign new
paths F (r). For example, a new path F (r) is cheaper if it includes a greater
number of branches v 2 F (r) with zero cost (branches that have already been
used for other edges r 2 R).</p>
        <p>
          We can order the edges by a certain technique. Earlier we have considered
a few techniques [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ], for example, ordering by the inclusion of the most rarely
used branches. However, on the average, the results obtained did not strongly
depend on the ordering method used.
        </p>
        <p>We can use some iterations of the Stage 2 algorithm for nding better results.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Results of Numerical Experiments</title>
      <p>For numerical experiments we have chosen the 10x10 grid as a primary network
P N . The number of edges in W N for laying in P N varied from 10 up to 4000</p>
      <sec id="sec-5-1">
        <title>Algorithm Stage 2 (Improvement)</title>
        <p>Order ri 2 R by decreasing the costs (renumber them) and obtain the new list frig.
repeat</p>
        <p>\Delete" ri from the graph HS according to the list (i.e. 8vk 2 F (r), restore for
a(vk) and b(vk) the initial values if vk is not included into other edges).</p>
        <p>Find a new shortest path for ri in the graph P N by the Dijkstra algorithm.
Assign it for ri.</p>
        <p>a(v) := 0, b(v) := 0 for all v 2 F (ri) in the graph P N .</p>
        <p>until All edges frig from the list are updated.
(the abscissae axis). For a chosen number of edges nedges, we randomly place
in the grid nedges sources and nedges consumers. As a result, a grid node can
contain more than one object: source(s) and consumer(s). The random placement
is carried out 10 times for a given nedges value. As a laying cost for nedges we
take the average among the 10 values found.</p>
        <p>We consider the set of resource types which has been mentioned as the
example in the Section 2. Thus, we assume that there three di erent types of
edges.</p>
        <p>In Figure 1 the normalized costs are shown (i.e. we nd minimal cost and
divide all the obtained values by it). The results show that the Greedy algorithm
is more convenient for a small number of edges; otherwise the Floyd algorithm
gives a better solution.</p>
        <p>
          In Figure 2 we show the results of the previous numerical experiments for the
case of compatibility of all resources type for laying in same track [
          <xref ref-type="bibr" rid="ref31">31</xref>
          ].
Performing Improvement stage with di erent orders of branches leads us to techniques
Improve1 and Improve2. The results are very similar with the numerical
experiment 1.
6
        </p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Utility Network Laying with Reliability Constraint</title>
      <p>
        In this Section, we improve the algorithm proposed in order to obtain not only
the cheapest, but also reliable enough solution. Most of the results presented
coincide with those from our previous publication [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ].
      </p>
      <p>
        Random graphs are commonly used for modeling the networks whose
elements are subject to random failures [
        <xref ref-type="bibr" rid="ref15 ref17 ref18 ref20 ref23 ref27 ref5">5, 15, 17, 18, 27, 23, 20</xref>
        ]. As a rule, the
network reliability is de ned as some connectivity measure. The most common
reliability measure of such networks is the probability that all terminal nodes
in a network can keep being connected together, given the reliability of each
network node and edge. The problem of calculation of the network probabilistic
connectivity is known to be NP-hard [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Nevertheless, it is possible to do the
exact calculation of reliability for networks with a dimension of practical interest
by taking into consideration some special features of real network structures and
based on modern supercomputers [
        <xref ref-type="bibr" rid="ref15 ref17 ref18">15, 17, 18</xref>
        ].
      </p>
      <p>
        Another well-accepted network reliability measure is the 2-terminal
probabilistic connectivity [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]. The average pairwise connectivity [
        <xref ref-type="bibr" rid="ref20 ref23">23, 20</xref>
        ] is the
average between all 2-terminal probabilistic connectivities of the network. The later
parameter demonstrates the network reliability from the point of connectivity
between a pair of nodes even if a network is disconnected.
      </p>
      <p>Let us assume that branches (edges of the primary network) are subject to
random failures that occur statistically independently with known probabilities
pi, 1 i g.</p>
      <p>The reliability of an edge r 2 R we de ne as</p>
      <p>Rr(HN ) =</p>
      <p>Y</p>
      <p>If for an edge r 2 R the path F (r) has the endpoints a and b, we use the
notation Rab(HN ) instead Rr(HN ). If for the nodes a and b there are more
than one of such edges, we choose one with a maximum reliability value.</p>
      <p>We consider the following reliability measure R(HN ), taking into account
the fact that failures occur in the primary network, and all consumers should be
connected with the corresponding sources:</p>
      <p>R(HN ) = minfRab(HN )g; a 2 Ysource; b 2 Yconsumer:
Therefore, R(HN ) is the minimum among all 2-terminal probabilistic
connectivities Rab(HN ), where b is a consumer and a is a corresponding source.</p>
      <p>Based on the two-stage algorithm, we propose a new algorithm with a
reliability constraint. It is assumed that we are given a reliability threshold 0 &lt; R0 1.
The objective is to nd a su ciently reliable solution of problem (1). In other
words, we nd a solution HS of problem (1) such that R(HS) R0.
7</p>
    </sec>
    <sec id="sec-7">
      <title>Ant Colony Algorithm for the Reliable Utility Network</title>
    </sec>
    <sec id="sec-8">
      <title>Design</title>
      <p>
        In the case of the reliability constraint, we use the Ant Colony Algorithm [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]
instead of the Floyd Algorithm in the two-stage algorithm. For each edge, we
create l ants acting according to the following rules:
{ The probability of an ant moving to the next vertex at the iteration of t is
de ned as:
(2)
(3)
{ Every ant li (0 &lt; i
      </p>
      <p>Pij (t) =</p>
      <p>ij ij
P</p>
      <p>ij ij
l) has TimeToLive label (T T L(li))</p>
      <p>T T L(li) =</p>
      <p>Y
v2P ath(li)
p(v);
where P ath(li) is the path of the ant li. If T T L(li) &lt; R0, then ant li dies.
{ After nding an edge, each ant lays the pheromone on a branch. ij (t) =</p>
      <p>Q=length(t)
{ In a set of the most frequent routes we nd the minimum and x it, so we
decrease the cost of branches of the primary network.</p>
    </sec>
    <sec id="sec-9">
      <title>Numerical Results for the Reliable Utility Network</title>
    </sec>
    <sec id="sec-10">
      <title>Design</title>
      <p>Below in Figure 3 we present the numerical results of the algorithm proposed
for pi = 0:99; 1 i g, R0 = 0:9. For the primary network P N we consider the
10x10 grid (jXj = 100), := 1; := 3; 0 := 1; Q := 50.</p>
      <p>The number of edges was from 10 up to 100 in W N (the abscissae axis). Axis
of ordinate is cost Q(HN ). The rst and the second algorithms are the Floyd
and the Greedy respectively, without constraint (2). Therefore, the found value
Q(HN ) is less than the result of FloydProb and AntColony (FloydProb is the
Floyd algorithm with constraint (2)). Figure 2 shows that the AntColony results
are better than the FloydProb results only for a small number of edges.
The new approach to the utility network design has been studied. Based on the
hypernet theory, we consider a natural-technical system of a land plot and a
utility network within the framework of the uni ed mathematical model. As a
result, we propose the new method to provide the connectivity between given
consumers and corresponding sources with minimization of laying and
maintenance costs and within given constraints. This method gives an appropriate
solution with allowance for the compatibility of di erent types of resources for
placing them in the same track.</p>
      <p>For ensuring the reliability of a designed utility network, we, also, introduce
the method for obtaining not only a cheap solution, but a reliable enough one
as well assuming that failures occur in a primary (physical) network. As a
reliability measure we consider the minimum among all 2-terminal probabilistic
connectivities between each consumer and corresponding sources.</p>
      <p>The conducted numerical experiments which show the applicability of the
methods proposed are presented.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Akhmediyarova</surname>
            ,
            <given-names>A.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuandykova</surname>
            ,
            <given-names>J.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kubekov</surname>
            ,
            <given-names>B.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Utepbergenov</surname>
            ,
            <given-names>I.T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Popkov</surname>
            ,
            <given-names>V.K.</given-names>
          </string-name>
          :
          <article-title>Objective of modeling and computation of city electric transportation networks properties</article-title>
          .
          <source>In: Int. Conf. on Information Science and Management Engineering</source>
          . pp.
          <volume>106</volume>
          {
          <fpage>111</fpage>
          .
          <string-name>
            <surname>Destech Publications</surname>
          </string-name>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Belotti</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Malucelli</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Row-column generation for multilayer network design</article-title>
          .
          <source>In: Int. Network Optimization Conf</source>
          . pp.
          <volume>422</volume>
          {
          <fpage>427</fpage>
          . Lisbon, Portugal (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Boikov</surname>
            ,
            <given-names>V.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shumilov</surname>
            ,
            <given-names>B.M.:</given-names>
          </string-name>
          <article-title>The Splines in the Routing of Roads (in Russian)</article-title>
          .
          <source>Tomsk</source>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <source>Building Norms and Rules</source>
          <volume>2</volume>
          .
          <fpage>07</fpage>
          .
          <fpage>01</fpage>
          -
          <lpage>89</lpage>
          *.
          <article-title>Urban development planning and development of urban and rural settlements (in Russian)</article-title>
          .
          <source>Gorstroy of Russia</source>
          , Moscow (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Colbourn</surname>
          </string-name>
          , Ch. J.:
          <source>The Combinatorics of Network Reliability</source>
          . Oxford University Press, New York (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Dorigo</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Swarm intelligence, ant algorithms and ant colony optimization</article-title>
          .
          <source>In: Reader for CEU Summer University Course \Complex System"</source>
          . pp.
          <volume>1</volume>
          {
          <fpage>38</fpage>
          .
          <string-name>
            <surname>Budapest</surname>
          </string-name>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Erzin</surname>
            ,
            <given-names>A.I.</given-names>
          </string-name>
          , Kochetov, Ju.A.:
          <article-title>Routing Problems: A Textbook (in Russian)</article-title>
          . Novosibirsk State University, Editorial and Publishing Center of NSU,
          <string-name>
            <surname>Novosibirsk</surname>
          </string-name>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Kaneda</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uyematsu</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nagatsu</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sato</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Network design and cost optimization for label switched multilayer photonic IP networks</article-title>
          .
          <source>J. IEEE Journal on Selected Areas in Communications 23(8)</source>
          ,
          <volume>1612</volume>
          {
          <fpage>1619</fpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Kochetov</surname>
          </string-name>
          , Ju.A.:
          <article-title>The problem of (r,p)-centroid (in Russian)</article-title>
          .
          <source>In: International conference on Optimization Problems and Economic Applications</source>
          . pp.
          <fpage>68</fpage>
          .
          <string-name>
            <surname>Omsk</surname>
          </string-name>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Kolokolov</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kosarev</surname>
            ,
            <given-names>N.A.</given-names>
          </string-name>
          :
          <article-title>Banderses clipping research for the problem of pmedian (in Russian)</article-title>
          .
          <source>In: International conference on Optimization Problems and Economic Applications</source>
          . pp.
          <fpage>96</fpage>
          .
          <string-name>
            <surname>Omsk</surname>
          </string-name>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Kosyakov</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          :
          <article-title>Soft computing in mapping zoning by parameters of power supply systems (in Russian)</article-title>
          .
          <source>In: International scienti c-technical conference on The State and Prospects of Development of Electrotechnology</source>
          . pp.
          <volume>338</volume>
          {
          <fpage>341</fpage>
          .
          <string-name>
            <surname>Ivanovo</surname>
          </string-name>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Kurant</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thiran</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          :
          <article-title>Layered complex networks</article-title>
          .
          <source>J. Phys. Rev. Lett</source>
          .
          <volume>96</volume>
          ,
          <fpage>138701</fpage>
          - 1-138701-
          <lpage>4</lpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Lempert</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kazakov</surname>
            ,
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bukharov</surname>
            ,
            <given-names>D.S.</given-names>
          </string-name>
          :
          <article-title>Mathematical model and software system for the solution of location problems of logistics objects (in Russian)</article-title>
          .
          <source>J. Management of big systems 41</source>
          , 270{
          <fpage>284</fpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Lotarev</surname>
          </string-name>
          , D.T.:
          <article-title>Unformal descriptive models of transport communications, transport networks and territory in the problem of construction of ways and communications (in Russian)</article-title>
          .
          <source>In: Proceedings of the Institute of Informatics Systems of the Russian Academy of Sciences</source>
          . vol
          <volume>46</volume>
          ., pp.
          <volume>259</volume>
          {
          <fpage>273</fpage>
          .
          <string-name>
            <surname>Moscow</surname>
          </string-name>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Martinez</surname>
            ,
            <given-names>S.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Calvino</surname>
            ,
            <given-names>B.O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rocco</surname>
            ,
            <given-names>S.C.M.</given-names>
          </string-name>
          :
          <article-title>All-terminal reliability evaluation through a Monte Carlo simulation based on an MPI implementation</article-title>
          .
          <source>In: European Safety and Reliability Conference: Advances in Safety, Reliability and Risk Management (PSAM 2011/ESREL</source>
          <year>2012</year>
          ). pp.
          <volume>1</volume>
          {
          <fpage>6</fpage>
          .
          <string-name>
            <surname>Helsinki</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Melkumov</surname>
            ,
            <given-names>V.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>I.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kuznetsov</surname>
            ,
            <given-names>R.N.</given-names>
          </string-name>
          :
          <article-title>Determination of the optimal route of the gas pipeline on the basis of the factors a ecting the value of cards (in Russian)</article-title>
          .
          <source>J. Scienti c bulletin of the Volgograd State University of Architecture and Civil Engineering - Construction and Architecture</source>
          <volume>1</volume>
          (
          <issue>13</issue>
          ),
          <volume>21</volume>
          {
          <fpage>27</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Migov</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodionov</surname>
            ,
            <given-names>A.S.:</given-names>
          </string-name>
          <article-title>Parallel implementation of the factoring method for network reliability calculation</article-title>
          .
          <source>In: ICCSA-2014. LNCS</source>
          . vol.
          <volume>8584</volume>
          (
          <issue>4</issue>
          ), pp.
          <volume>654</volume>
          {
          <fpage>664</fpage>
          . Springer, Heidelberg (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Nesterov</surname>
            ,
            <given-names>S.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Migov</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          :
          <article-title>Parallel calculation of diameter constrained network reliability</article-title>
          .
          <source>In: PACT-2017. LNCS</source>
          , vol.
          <volume>10421</volume>
          , pp.
          <volume>473</volume>
          {
          <fpage>479</fpage>
          . Springer, Heidelberg (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Popkov</surname>
            ,
            <given-names>V.K.</given-names>
          </string-name>
          :
          <article-title>On modeling city tra c systems with hypernetworks</article-title>
          .
          <source>J. Automation and Remote Control</source>
          <volume>72</volume>
          (
          <issue>6</issue>
          ),
          <volume>1309</volume>
          {
          <fpage>1318</fpage>
          (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Potapov</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Goemann</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wingender</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>The pairwise disconnectivity index as a new metric for the topological analysis of regulatory networks</article-title>
          .
          <source>J. BMC Bioinformatics</source>
          <volume>9</volume>
          (
          <issue>1</issue>
          ),
          <volume>1</volume>
          {
          <fpage>15</fpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Poulovassilis</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levene</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A nested-graph model for the representation and manipulation of complex objects</article-title>
          .
          <source>J. ACM Trans. Inf. Syst</source>
          .
          <volume>12</volume>
          ,
          <issue>35</issue>
          {
          <fpage>68</fpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Prilutskiy</surname>
            ,
            <given-names>M.X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Afraiymovich</surname>
            ,
            <given-names>L.G.</given-names>
          </string-name>
          :
          <article-title>Distribution of Resources in Hierarchical Systems of the Transport Type (in Russian)</article-title>
          .
          <source>Nizhny Novgorod</source>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Rodionov</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodionova</surname>
            ,
            <given-names>O.K.</given-names>
          </string-name>
          :
          <article-title>Exact bounds for average pairwise network reliability</article-title>
          .
          <source>In: 7th ACM Int. Conf. on Ubiquitous Information Management and Communication</source>
          , Kota Kinabalu, Malaysia, article no.
          <issue>45</issue>
          , ACM New York, USA (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24.
          <string-name>
            <surname>Rodionov</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodionova</surname>
            ,
            <given-names>O.K.</given-names>
          </string-name>
          :
          <article-title>Using random hypernets for reliability analysis of multilevel networks</article-title>
          .
          <source>In: 1st Int. Conf. on Mathematical Methods and Computational Techniques in Science and Engineering (MMCTSE</source>
          <year>2014</year>
          )
          <article-title>, ser</article-title>
          .
          <source>Mathematical Methods in Science and Engineering</source>
          . pp.
          <volume>119</volume>
          {
          <fpage>121</fpage>
          . Athens, Greece (
          <year>2014</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Rodionov</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rodionova</surname>
            ,
            <given-names>O.K.</given-names>
          </string-name>
          :
          <article-title>Random hypernets in reliability analysis of multilayer networks</article-title>
          .
          <source>J. Lecture Notes in Electrical Engineering</source>
          <volume>343</volume>
          , 307{
          <fpage>315</fpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Sarychev</surname>
            ,
            <given-names>D.S.</given-names>
          </string-name>
          :
          <article-title>Modern information systems for utility networks (in Russian)</article-title>
          .
          <source>J. Bulletin of Tomsk State University</source>
          <volume>280</volume>
          , 358{
          <fpage>361</fpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Shooman</surname>
            ,
            <given-names>A.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kershenbaum</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Exact graph-reduction algorithms for network reliability analysis</article-title>
          .
          <source>In: IEEE Global Telecommunications Conference GLOBECOM' 91</source>
          . pp.
          <volume>1412</volume>
          {
          <fpage>1420</fpage>
          . IEEEP Press, New York (
          <year>1991</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Skvortsov</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          :
          <article-title>Development geographic information and utility systems at the faculty of informatics in Ltd. \Indorsoft" (in Russian)</article-title>
          .
          <source>J. Bulletin of Tomsk State University</source>
          <volume>280</volume>
          , 346{
          <fpage>349</fpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Sokolova</surname>
            ,
            <given-names>O.D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yurgenson</surname>
            ,
            <given-names>A.N.</given-names>
          </string-name>
          :
          <article-title>Using graph, hypergraph and hypernet models for network analysis problems</article-title>
          .
          <source>In: 7th IEEE Forum on Strategic Technology</source>
          . pp.
          <volume>1</volume>
          {
          <issue>4</issue>
          .
          <string-name>
            <surname>Tomsk</surname>
          </string-name>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Toktoshov</surname>
            ,
            <given-names>G.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monakhov</surname>
            ,
            <given-names>O.G.</given-names>
          </string-name>
          :
          <article-title>Models and algorithms of evolutionary synthesisfor optimization of engineering networks</article-title>
          .
          <source>In: Proc. of International Multi-Conference on Engineering, Computer and Information Sciences. IEEE SIBIRCON-2017</source>
          . pp.
          <volume>167</volume>
          {
          <fpage>171</fpage>
          .
          <string-name>
            <surname>Novosibirsk</surname>
          </string-name>
          ,
          <string-name>
            <surname>Russia</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Toktoshov</surname>
            ,
            <given-names>G.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yurgenson</surname>
            ,
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Migov</surname>
            ,
            <given-names>D.A.</given-names>
          </string-name>
          :
          <article-title>Design of Utility Network Subject to Reliability Constraint</article-title>
          .
          <source>In: Proc. of International Multi-Conference on Engineering, Computer and Information Sciences. IEEE SIBIRCON-2017</source>
          . pp.
          <volume>172</volume>
          {
          <fpage>175</fpage>
          .
          <string-name>
            <surname>Novosibirsk</surname>
          </string-name>
          ,
          <string-name>
            <surname>Russia</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>