Next Article in Journal
Study of Building Demand Response Method Based on Indoor Temperature Setpoint Control of VRV Air Conditioning
Next Article in Special Issue
Influence of Organisational Culture on Total Quality Management Implementation in the Australian Construction Industry
Previous Article in Journal
Analytical Pushover Curves for X-Concentric Braced Steel Frames
Previous Article in Special Issue
A Conceptual Framework for Implementing Lean Construction in Infrastructure Recovery Projects
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Post-Disaster Temporary Shelters Distribution after a Large-Scale Disaster: An Integrated Model

by
Zahra Gharib
1,
Reza Tavakkoli-Moghaddam
1,
Ali Bozorgi-Amiri
1 and
Maziar Yazdani
2,*
1
School of Industrial Engineering, College of Engineering, University of Tehran, Tehran 1439957131, Iran
2
School of Built Environment, University of New South Wales, Sydney 2052, Australia
*
Author to whom correspondence should be addressed.
Buildings 2022, 12(4), 414; https://doi.org/10.3390/buildings12040414
Submission received: 28 January 2022 / Revised: 14 March 2022 / Accepted: 23 March 2022 / Published: 29 March 2022
(This article belongs to the Special Issue Construction Management and Disaster Risk Management)

Abstract

:
This paper develops an integrated model for the distribution of post-disaster temporary shelters after a large-scale disaster. The proposed model clusters impacted areas using an Adaptive Neuro-Fuzzy Inference System (ANFIS) method and then prioritizes the points of clusters by affecting factors on the route reliability using a permanent matrix. The model’s objectives are to minimize the maximum service time, maximize the route reliability and minimize the unmet demand. In the case of ground relief, the possibility of a breakdown in the vehicle is considered. Due to the disaster’s uncertain nature, the demands of impacted areas are considered in the form of fuzzy numbers, and then the equivalent crisp counterpart of the non-deterministic is made by Jimenez’s method. Since the developed model is multi-objective, the Non-dominated Sorting Genetic Algorithm (NSGA-II) and Multi-Objective Firefly Algorithm (MOFA) are applied to find efficient solutions. The results confirm higher accuracy and lower computational time of the proposed MOFA. The findings of this study can contribute to the growing body of knowledge about disaster management strategies and have implications for critical decision-makers involved in post-disaster response projects. Furthermore, this study provides valuable information for national decision-makers in countries with limited experience with disasters and where the destructive consequences of disasters on the built environment are increasing.

1. Introduction

There is a growing consensus that disasters do not occur naturally but rather due to poor planning [1]. The rising frequency and severity of disasters pose a severe threat to human society and the built environment [2], resulting in large-scale population displacement. Almost 42 million people were forced to abandon their homes due to natural hazards in 2010 alone [3]. After a disaster, a large number of people are left without a place to live, and one of the most obvious consequences is damage to housing [4]. Damaged houses require extensive repair and reconstruction. As a result, providing emergency shelter to those in need takes precedence over all other actions. Communities that have been affected by natural disasters can resume their daily routines in temporary shelter units, which provide them with the necessary protection while they await the completion of the reconstruction process [5]. Prefabricated units and other forms of temporary shelters are designed for short-term occupants after a disaster event to serve the displaced communities [6,7]. However, many logistical issues can arise when providing temporary shelters for displaced people in the immediate aftermath of natural disasters.
The literature on disaster risk management in construction and the built environment has received insufficient attention [8]. Following a disaster, the construction industry is often called upon to provide various crucial services, including temporary shelters in the immediate aftermath and permanent shelter reconstruction [5,9]. A lack of planning and administration can exacerbate the difficulties inherent in reconstruction projects, which can be further compounded by international aid organizations’ lack of expertise in dealing with such matters [10].
This article focuses on the response phase and the problem of the distribution of post-disaster temporary shelters after a large-scale disaster. In this problem, we encounter impacted areas where the vehicles should serve them and then return to the shelter’s warehouse with the lowest possible cost. In times of crisis, we strive to reduce total travel time to provide shelters faster for the impacted people. The number of warehouses (e.g., without, single warehouse, and multiple warehouses) in a transportation system, the number of periods (e.g., single and multiple), the type of fleet (e.g., heterogeneous and non-heterogeneous), and the type of transportation (e.g., single and multiple) are all influencing factors on a distribution system’s agility and performance. The presence of an open or closed vehicle routing problem can also significantly impact the speed and security of distribution operations.
Designers of distribution networks of post-disaster temporary shelters are generally looking for quick and equitable distribution [11]. In order to achieve this goal, it is crucial to identify and cluster areas that have similar needs and features. ANFIS can cluster the impacted areas [12]. In a crisis, having a secure transportation network is critical, and considering secure and safe routes appears to be a very reasonable action [13]. These issues prevent unanticipated delays, ensure the safety of drivers and relief personnel, allow for the safe transport of vehicles, and ensure the timely arrival of temporary shelters. As a result, this can be accomplished by weighing the impacted areas concerning some influencing criteria on the road reliability. It is also possible to specify the priority of each impacted point using various Multi-Criteria Decision-Making (MCDM) methods [14,15]. Because of the nature of the disasters and a lack of reliable information, there is uncertainty in demand, supply, transportation time, etc.
On the other hand, the distribution of temporary shelters and equipment will be complex because infrastructure and routes may be disrupted. Disorders are expected during the response phase, following a crisis and the implementation of distribution operations [16]. These disruptions are sometimes the result of unexpected events, such as vehicle breakdowns. As a result, some impacted areas cannot receive services from that vehicle, and even active vehicles, due to driver shift exchange or completion of the defined time, cannot deliver the remaining shelters of the broken-down vehicle to the impacted areas, leaving them unserved. As a result, there is a shortage in the distribution system. This shortage (i.e., unmet demand) is minimised in this study. The primary objective of this study is to develop an integrated model and an advanced computational approach to assist decision-makers in addressing the challenges associated with the distribution of post-disaster temporary shelters that many communities face following the occurrence of a destructive large-scale disaster. The specific research objectives of this study are as follows:
  • Analyzing initial requirements to develop an integrated model for distributing temporary shelters following a large-scale disaster.
  • Developing an integrated model to aid in distributing temporary shelters following a large-scale destructive disaster.
This paper proposes a mathematical multi-objective model (i.e., minimisation of the maximum serving time, maximisation of route reliability, and minimisation of unmet demand) for a disrupted VRP in which impacted areas are first clustered (by applying the ANFIS). These points are then prioritised based on the factors that influence reliability (applying a graph theoretical-matrix permanent method). Diverse vehicles and depots in multi-mode (i.e., ground and air) transportation are used in temporary shelter distribution operations during the disaster response phase.
The remainder of the paper is organised as follows: Section 2 contains a review of the literature. Section 3 explains and formulates the proposed model, including clustering impacted areas using ANFIS, reliable route selection, modelling, and the proposed augmented ε -constraint method. Section 4 and Section 5 present two multi-objective metaheuristics algorithms and analyses their results. Finally, the conclusion in Section 6 brings the paper to a close.

2. Literature Review

This section investigates several streams of previous related research in the literature and research gaps in two separate sub-sections.

2.1. Disaster Risk Management

Disaster management aims to reduce or avoid the potential losses from hazards, assure prompt and appropriate assistance to disaster victims, and achieve rapid and effective recovery [17,18]. Disaster Risk Management (DRM) consists of processes for designing, implementing, and evaluating strategies, policies, and measures to improve our understanding of disaster risk, promote disaster risk reduction and transfer and stimulate a continuous improvement in disaster mitigation, preparedness, response and recovery activities [19,20]. Disaster risk management comprises four activities that are often considered as part of ongoing and interconnected processes [19]. These four activities are mitigation, preparedness, response and recovery [19], which are described by The United Nations International Strategy for Disaster Reduction (UNISDR) as follows:
  • Mitigation: “The lessening or minimizing of the adverse impacts of a hazardous event./The adverse impacts of hazards, in particular natural hazards, often cannot be prevented fully, but their scale or severity can be substantially lessened by various strategies and actions. Mitigation measures include engineering techniques and hazard-resistant construction as well as improved environmental and social policies and public awareness [21].”;
  • Preparedness: “The knowledge and capacities developed by governments, response and recovery organizations, communities and individuals to effectively anticipate, respond to and recover from the impacts of likely, imminent or current disasters [21].”;
  • Response: “Actions taken directly before, during or immediately after a disaster in order to save lives, reduce health impacts, ensure public safety and meet the basic subsistence needs of the people affected. /Disaster response is predominantly focused on immediate and short-term needs and is sometimes called disaster relief. Effective, efficient and timely response relies on disaster risk-informed preparedness measures, including the development of the response capacities of individuals, communities, organizations, countries and the international community [21].”;
  • Recovery: “The restoring or improving of livelihoods and health, as well as economic, physical, social, cultural and environmental assets, systems and activities, of a disaster-affected community or society, aligning with the principles of sustainable development and “build back better”, to avoid or reduce future disaster risk [21].
Although disaster risk management has evolved into much more than what was earlier envisaged, many parts, such as distribution routing planning of shelters or temporary housing, have received less attention.

2.2. Disaster Distribution Routing Planning

The first studies in this field were conducted by Haghani and Oh [22] and Haghani [23], who proposed a multi-objective model for commodity distribution in which a transportation network with various fleet types distributes various types of goods. Until 2010, studies focused on other routing parameters such as multi-mode distribution, multiple products, clustering, and multi-objectivity. Özdamar et al. [24] developed a model with multiple relief modes for distributing multi-type products over time. They used a Lagrangian relaxation method to solve the model. Despite the critical importance of instant response in a routeing problem and goods distribution, particularly in times of emergency, a few researchers considered a model that would meet this requirement.
Dondo and Cerdá [25] considered demand point clustering in non-crisis fields and assigned heterogeneous vehicles to each cluster. He et al. [26] proposed a vehicle routeing model under non-crisis conditions using a heuristic algorithm and designing a goods distribution network by clustering demand points using a balanced k-means algorithm to distribute goods to demand points. However, the approach used to cluster demand points in crisis conditions (i.e., damaged points) in the ANFIS network structure is fuzzy c-means, which is not found in any research with this content. From 2010 to early 2016, papers took on a new shape, and previously unaddressed efficient and effective routeing factors were incorporated into mathematical models. Vehicle heterogeneity, multi-mode and multi-period distribution operations, uncertainty, disruption, reliability, and other efficient factors have been considered in these studies. Although reliability is critical in ensuring relief goods’ safe and timely delivery, it has received little attention in studies. Some researchers have recently considered and applied this concept to the design of distribution networks.
Vitoriano et al. [27] proposed a goal programming model for relief distribution that considered reliability and route safety factors, with relief goods delivered to heterogeneous vehicles from multiple depots to damaged areas. Torabi et al. [28] also proposed a location-routing model at a conference, in which infrastructure disruption (e.g., roads) was considered, and relief goods from multiple depots were delivered to affected areas to maximise route reliability. Hamedi et al. [29] developed a multi multi-depot multi-objective function and designed a road disruption product distribution network. Nasiri and ShisheGar [30], on the other hand, proposed a model for rapid and secure response after a crisis in which damaged points are prioritised based on affecting factors on route reliability. Heterogeneous vehicles are in charge of providing relief batches to damaged points.
Among the papers reviewed, the subject of distribution network disruption has been studied under normal conditions rather than in times of crisis. According to these studies, disruption can occur in a variety of ways. For example, road breakdowns, facility and equipment failures, vehicle breakdowns, and bad weather conditions cause problems in the humanitarian relief logistics goods distribution system, which can be fixed by using different methods and reprogramming. Although vehicle breakdowns are a significant disruption in the routeing and distribution problem, only a few researchers addressed this issue in the literature. In the non-crisis situations, for example, Wang et al. [31] introduced vehicle breakdown as a disruption in serving demand points and assumed that in the case of vehicle breakdown throughout goods distribution, other vehicles could do their serving duties before finishing their serving operation, leaving no demand points unsatisfied. Mu and Eglese [32], and Mamasis et al. [33] proposed disrupted routeing models in separate papers, in which the vehicle fails during goods distribution and the absence of the immobilised vehicle is covered by rerouting of other vehicles, and its corresponding demand points are satisfied, and thus the cost of delay is reduced. Gharib et al. [34] presented a three-stage integrated model for a cluster-based emergency vehicle routing problem in disaster considering reliability. Current study is the extended version of this study. Jiang et al. [35] introduced the problem of delayed distribution and decreased service level to customers (in the case of vehicle breakdown) and the concept of disruption management in a VRP and presented a prioritising method for customer serving in a time period.
This study tries to develop a multi-objective mathematical model for the response phase, in which land and air fleet are deployed in a temporary shelter distribution system. Multiple depots were considered as distribution centres, and impacted areas were clustered using the ANFIS method to speed up distribution operations. Damaged points in each cluster are prioritised by affecting factors on reliability, using an integration method of graph theory-MCDM-permanent matrix, to ensure perfect and on-time delivery to these areas. The probability of breakdown has been considered in the cluster related to ground relief, and we are looking to minimise the shortage of temporary shelters at the impacted areas caused by this disruption and try to reduce the current disruption, based on produced scenarios, by minimising unmet demand (i.e., undelivered goods to the damaged points).

3. Proposed Framework for a Disaster Response Strategy

The following three steps outline the procedure for developing the model in this study. Step 1 involves the clustering and prioritisation of impacted areas, while Step 2 involves presenting all stages of the mathematical model design. After that, two multi-objective metaheuristic algorithms are presented to solve the problem. This is illustrated schematically in Figure 1.

3.1. Clustering Impacted Areas Using ANFIS

By clustering the impacted areas, response strategies for sending shelters to impacted areas can be accelerated. Therefore, this study uses Adaptive Neuro-Fuzzy Inference System (ANFIS), which has shown acceptable performance in clustering problems [36]. ANFIS combines the FIS with a backpropagation algorithm used for neural network training [37]. This inference-based structure has three components depending on the selection of fuzzy rules, database (i.e., membership determination), and argument or inference on rules and obtaining the appropriate output [38]. Chu [39] proposed a neural learning method with an adaption for the FIS modelling process for information learning (i.e., ANFIS), which is the best generator for FIS. This structure is a multi-layer feed-forward network that uses neural network learning algorithms and fuzzy logic for mapping an input space to an output space, and by embedding this adapted network in the Sugeno fuzzy model, the model learning is facilitated [40]. The general structure of this method is shown in Figure 2.
In this structure, the adapted nodes (i.e., squares) are the set of adjustable parameters, while fixed nodes (i.e., circles) present constant parameters in the model. The previous layer’s output is used as input of the next layer [40]. According to Figure 2, two input variables x 1 and x 1 and output y are considered to define two rules as follows [41]
  • Rule 1: If x 1 is A 1   and   x 2   is   B 1   then   Y 1 = 𝓅 1 x 1 + 𝓆 1 x 2 + 𝓇 1
  • Rule 2: If x 1 is A 2   and   x 2   is   B 2   then   Y 2 = 𝓅 2 x 1 + 𝓆 2 x 2 + 𝓇 2
In the current paper, for example, the first rule states that if the road slope is low, the weather is normal, the crisis severity is high, and the road risk is moderate, then the intended damaged point belongs to cluster 1. If the road slope is moderate, the weather is normal, the crisis severity is very high, and the road risk is moderate, the intended damaged point falls into cluster 2, and so on. The ANFIS determines the output value using five layers.
Layer 1. This layer maps input variables x 1 and x 2 to fuzzy sets A = A 1 ,   A 2 ,   B 1 ,   B 2 through the fuzzification method (A and B are verbal tags, like high and low). Each node in this layer is an adapted node with n function nodes that the bell or Gaussian membership function can produce. In fact, each node is used for one membership function [41].
O = μ x
Layer 2. After generating membership functions, each node in this layer is a fixed (i.e., constant) node, and the output is the multiplication of all inputted signals that represent the Firing Strength of each fuzzy rule. In this layer, after the combination of fuzzy sets of each input, the Firing Strength is applied, and determination of output is used from norm operator or the fuzzy letter “and” [40].
O = 𝓌 i = μ x 1 μ x 2
Layer 3. Each node in this layer is a fixed layer that calculates the Firing Strength rate for each rule and divides it by all rules’ Firing Strengths. Actually, the rate of the i -th rule is calculated.
O = 𝓌 i * = 𝓌 i 𝓌 1 + 𝓌 2   i = 1 , 2
Layer 4. Each node in this layer represents an adapted node with a function node, and the contribution of each rule to the total output is calculated. It means that the output of the previous layer is multiplied by a function of the Sugeno fuzzy rule. In other words, defuzzification is done, and the output values are obtained from fuzzy inference rules, in which 𝓇 i , 𝓆 i   and   𝓅 i are consequent parameters.
O = 𝓌 i · x · 𝒻 = 𝓌 i * 𝓅 i x 1 + 𝓆 i x 2 + 𝓇 i
Layer 5. The single node of this layer is a fixed layer that indicates the total output to the sum of all signals. Actually, this non-adapted node obtains the total output by summing all signals [38]
O = 𝓌 i * · x · 𝒻 = i 𝓌 i · 𝒻 i 𝓌 i
The parameters in the ANFIS network are non-linear (in the premise section) and linear (in the consequent section). There are different methods for optimisation of these parameters, such as the gradient or slope descent. Of course, the blended learning method is more efficient in this technique. The layer output forward to layer four and least square estimation is used for consequent parameter adjustment in feed-forward movement. However, in backward movement, the error signals return to layer one and update premise parameters by using gradient descent [41]. Sometimes, the ANFIS method has constraints for large-scale data and is not efficient. Hence, we seek newly developed algorithms that resolve this deficiency. The fuzzy c-mean (FCM) can be mentioned as an alternative method [42]. This unsupervised algorithm is applied for clustering the N data points to c clusters by initialisation. Its purpose is to minimise the existing errors (i.e., the weighted distance of each point with all c means of clusters) [43]. Then, it is applied for minimising the following objective function:
Min   𝒥 F C M = c = 1 C i = 1 N W i c 𝓅 x i 𝓋 c 2 s . t .
c = 1 C W i c = 1 ; i = 1 , 2 , , N
where 𝓅   ( 𝓅 > 1 ) is the fuzzifier operator, N is the number of data points, c is the number of clusters, w ic is the measure of belonging data point i to cluster c , V is the cluster mean, and x is the input data. 𝓌 i c is computed by [44].
W i c = 1 l = 1 c 𝒹 i c 2 𝒹 i 𝒿 2 1 𝓅 1 ;     i = 1 , 2 , . , N ;   c = 1 , 2 , , C
The cluster means are recalculated at the next stage of initialisation using the following formula:
V c = 𝒿 = 1 N W 𝒿 c 𝓅 × x j 𝒿 = 1 N W 𝒿 c 𝓅 ;   c = 1 , 2 , , C ; 1 < 𝓅 < N
Finally, the algorithm reaches convergence condition stops [38]. To summarise, this algorithm is carried out in four steps: (1) random selection of a cluster centre from among the n points, (2) calculation of the membership function, (3) calculation of the cost function using the above formula and terminating the procedure if this value is less than a specified threshold, and (4) calculation of new cluster centres (recalculation). Finally, the termination condition is convergence; otherwise, it returns to Step 2 [43].
This paper employs an ANFIS method with ten neurones in a hidden layer for 20 damaged points and a binary output (i.e., cluster 1 or cluster 2). The output layer’s transformation function is linear, while the hidden layer’s function is tangent sigmoid. The type of training algorithm, on the other hand, is LM-BP. Table 1 shows an example of the above-mentioned data. This table also includes verbal tags for the membership functions for each input variable. Table 1 shows how 20 damaged points are divided into two clusters. Cluster 1 includes the points where the corresponding road is in good condition, and the relief operation takes place on the ground or in the air. Cluster 2, on the other hand, contains points where the corresponding road is broken down, and the relief operation can only take place in the air mode. Table 1 lists the clustering measures, some of which are deterministic and some of which are fuzzy. This table also includes the clustering results of 20 damaged points.

3.2. Reliable Route Selection

Road networks now require a high degree of reliability to ensure drivers’ travel and avoid delays because of disruption in the network [45]. In the present paper, applying a permanent matrix in a graph theory and MCDM, we determine the most reliable route. Rao and Padmanabhan [46] presented a graph theory and its applications in the field of decision making and application of the graph theory. The graph theory and matrix method include graph representation, matrix representation, and permanent function representation. That is, first, the representation of variables and their dependencies is presented and then formulated mathematically and finally, a numerical index is identified by a permanent function [47]. Clusters obtained by the ANFIS method are prioritised by affecting factors on route reliability to find the most reliable route for distributing temporary shelters to these points using this theory. Road type (e.g., autobahn and highway), mountainous rate, and geographical characteristics all have an impact on the reliability of cluster 1 (i.e., ground and air relief). The severity of the crisis, the regional context (rural or urban), the conditional weather, the population of the region, and the distance of the air vehicle depot and damaged points all have an impact on the reliability of cluster 2 (i.e., air relief).
Step 1 (identification of criteria, sub-criteria, and alternatives of the problem): Identification of the affecting factor on the process using the available data in the literature or conducting a survey of experts [48] is presented by representing graph and their dependencies. The reliability affecting factors have been described before. In the representation of the graph, as shown in Figure 3, there is a set of nodes and a set of directed edges. Each node 𝓃 i is the identifier of the i -th criterion for alternative selection and the edges represent the relative importance of criteria, in which the number of nodes and alternatives are identical. In alternative selection, if node i is more important than node 𝒿 , a directed edge is drawn from i to 𝒿 ( i 𝒿 ) and vice versa [46]. An example of the decision-making structure by the use of the permanent matrix is given in Figure 3.
Step 2 (definition of the relative importance of criteria and alternatives score): In this step, if the criterion is qualitative, the values of the alternatives score can be calculated by rating a scale from zero to one [30], as shown in Table 2.
If the criterion is quantitative, it should be normalised. Therefore, if 𝓋 i is the criteria value of alternative i and 𝓋 𝒿 is the criteria value of alternative 𝒿 , 𝓋 i 𝓋 𝒿 should be normalised [47]. After calculating all the criteria values for each alternative, we define the ratio criteria matrix for them.
ψ = 𝒞 11 0 0 0 𝒞 22 0 0 0 𝒞 𝓃 𝓃
On the other hand, the relative importance between criteria ( 𝓇 i 𝒿 ) can get the values between zero and one. The relationship between 𝓇 i 𝒿 and 𝓇 𝒿 i is not necessarily a compensatory relationship. It can be 𝓇 𝒿 i = 1 𝓇 i 𝒿 as shown in Table 3.
The relative importance matrix is defined at the end of this step as:
β = 0 𝓇 12 𝓇 i 𝓃 𝓇 21 0 𝓇 2 𝓃 𝓇 𝓃 1 0
Step 3 (calculation of the alternative evaluation matrix): In this step, after identifying β and ψ , the alternative evaluation matrix ξ is calculated by:
ζ = ψ + β = 𝒞 1 𝓇 12 𝓇 13 𝓇 1 𝓃 𝓇 21 𝒞 2 𝓇 23 𝓇 2 𝓃 𝓇 31 𝓇 32 𝒞 3 𝓇 3 𝓃 𝓇 𝓃 1 𝓇 𝓃 2 𝓇 𝓃 3 𝒞 i 𝓃
The permanent of this matrix is the criteria function of alternative selection [30]. This value gives a grade for the alternatives that must be dissentingly sorted, and the alternative with the largest permanent value will be the best alternative (the most reliable route) [49]. The following equation represents the function for calculating the permanent value.
per ( ξ ) = i = 1 N c i + i , 𝒿 N ( 𝓇 i 𝒿 . 𝓇 𝒿 i ) . c 𝓀 . c 𝓁 c N + i , 𝒿 N ( 𝓇 i 𝒿 . 𝓇 𝒿 𝓀 . 𝓇 𝓀 i + 𝓇 i 𝓀 . 𝓇 𝓀 𝒿 . 𝓇 𝒿 i ) . c 𝓁 . c 𝓃 c N + { { i , j N ( 𝓇 i 𝒿 . 𝓇 𝒿 i ) ( 𝓇 𝓀 𝓁 . 𝓇 𝓁 𝓀 ) . c 𝓃 . c 𝓂 . c N + i , 𝒿 N ( 𝓇 i 𝒿 . 𝓇 𝒿 𝓀 . 𝓇 𝓀 𝓁 . 𝓇 𝓁 i + 𝓇 i 𝓁 . 𝓇 𝓁 𝓀 . 𝓇 𝓃 𝒿 . 𝓇 𝒿 i ) . c 𝓃 . c 𝓂 . c N } + [ i , 𝒿 N ( 𝓇 i 𝒿 . 𝓇 𝒿 i ) ( 𝓇 𝓀 𝓁 . 𝓇 𝓁 𝓃 . 𝓇 𝓃 𝓀 ) . c 𝓂 . c c N + i , 𝒿 N ( 𝓇 i 𝒿 . 𝓇 𝒿 𝓀 . 𝓇 𝓀 𝓁 . 𝓇 𝓁 𝓃 . 𝓇 𝓃 i + 𝓇 i 𝓃 . 𝓇 𝓃 𝓁 . 𝓇 𝓁 𝓀 . 𝓇 𝓀 𝒿 . 𝓇 𝒿 i ) . c 𝓂 . c c N ] +

3.3. Modelling and the Proposed Solving Method

Consider a disaster-affected area. Humanitarian organisations have a plan to send temporary shelters to the affected areas using trucks and helicopters in response to this disaster. Multiple depots are considered in response operations, including the depot of heterogeneous trucks and the hangers of heterogeneous helicopters. It should be noted that the vehicle depot also serves as a shelter warehouse. These vehicles should deliver temporary shelters to demand points. However, due to the severity of the disaster, some infrastructures, including access roads to some of these points, have been disrupted, making ground delivery to these points impossible. As a result, the affected areas have been divided into two clusters in order to reduce the time it takes to send shelters. Because of the disruptions in the access roads, the affected points in one cluster can receive shelters in both ground and air modes, while the points in the other cluster can only receive shelters in an air mode due to the breakdown of their road. The points in each cluster are then prioritised separately by the key factors on route reliability. That is, in each cluster, the shelters are distributed first to the most reliable route, and the vehicles serve from the most reliable routes. On the other hand, during the distribution of shelters, the ground vehicle (e.g., truck) breaks down, causing its service areas to be served late and causing disruption in the distribution system (Figure 4 shows a schematic sample of the problem).
Mathematical modelling approaches can effectively condense and highlight the most important aspects of our understanding of real-world decision-making problems. These problems, however, are frequently complex. Real-world problems can be too complex or challenging to model if all details are taken into account, so it is important to keep this in mind when developing models. Therefore, effective models rely heavily on assumptions that reduce complexity while retaining the system’s fundamental properties. Because of this, it is crucial to simplify assumptions in order to keep models tractable and true to the underlying system. These assumptions lead to a highly effective mathematical model, as shown by the following:
  • There is a limitation in the number of vehicles, and various types are used to transport shelters to affected areas.
  • All vehicles’ starting points are known and defined, as is which vehicle belongs to which depot.
  • All vehicles should be utilised in the event of a large-scale disaster.
  • Each affected point is served by a single-vehicle.
  • The depot inventory is sufficient to respond to the affected areas.
  • The location of any affected area is known, as is its distance from depots.
  • The amount of demand is known at each affected point.
  • Each vehicle returns to its starting place at the end of the operation.
  • The affected points are divided into two clusters, and all impacted areas in each cluster are prioritised based on reliability-affecting factors.
  • The broken-down vehicle cannot be repaired in a reasonable amount of time so that it can be used again.
  • The problem is scenario-based, and the vehicle’s failure time is known under various scenarios.
  • If the product is delivered to the affected point, the service is completed, and the shortage is avoided. After the vehicle fails, the other vehicle should not perform its serving duties and must follow their specified plan.
  • The affected areas’ demand is fuzzy, with a triangular fuzzy number.
  • Each affected area’s demand can be partially met, and a shortage is acceptable.

3.3.1. Mathematical Model of the Disrupted and Clustered MDVRPHF

The mathematical model is developed using the variables and parameters listed below.
Notations and sets
𝓋 Set of land vehicles
𝓋 Set of aerial vehicles
Set of the impacted areas with a passable road
Set of the impacted areas with a damaged road
𝒹 Set of the ground vehicle depots
𝒹 Set of the helicopter hangars
V Set of vehicles
S Set of scenarios
N Number of all nodes
𝓃 𝓋   Number of trucks
𝓃 𝓋 Number of helicopters
𝓃 Number of impacted areas with a passable road
𝓃 Number of impacted areas with a damaged road
𝓃 𝒹 Number of truck depots
𝓃 𝒹 Number of helicopter hangars
Parameters
χ 𝓋 The capacity of vehicle v
Dem i ˜ The demand of shelters for node i (impacted area)
𝓉 𝓋 i 𝒿 Travel time from node i to 𝒿 for vehicle 𝓋
𝓇 i 𝒿 The permanent value of node i to 𝒿 based on the reliability index
𝒰 𝓋 i The auxiliary and sequential variable that shows the number of nodes being visited with vehicle 𝓋 in sub-tour elimination constraints
𝒯 i 𝓋 Arrival time of vehicle 𝓋 to node i
θ i 𝒿 Travel time of a vehicle from node i to node 𝒿
Decision Variable
x 𝓋 i 𝒿 = { 1 if   vehicle   𝓋   travel   from   node   i   to   node   𝒿 0 otherwise
𝓎 i 𝓈 = { 1 if   the   shelter   is   not   delivered   to   impacted   area   𝒿   under   scenario   𝓈 0 otherwise
Model Formulation
The following is a mathematical formulation of the suggested model:
Min   ( Max i 𝒿 𝒥 𝓋 𝒱 𝓉 𝓋 i 𝒿 x 𝓋 i 𝒿 )
Min   ( i 𝒿 𝒥 𝓋 𝒱 𝓇 i 𝒿 x 𝓋 i 𝒿 )
Min   s i 𝓃 𝓃 𝓎 i s   ×   dem i ˜
s . to .
i 𝓃 𝒻 𝓋 , i x 𝓋 𝒿 i   =   i 𝓃 𝒻 𝓋 , i x 𝓋 𝒿 i , 𝒿 𝓃 , v 𝓃 𝓋
i 𝓃 𝓃 𝒻 𝓋 , i x 𝓋 i 𝒿   =   i 𝓃 𝓃 𝒻 𝓋 , i x 𝓋 𝒿 i , 𝒿 𝓃 𝓃 , v 𝓃 𝒹
i f v , i 𝒿 𝓃 x 𝓋 i 𝒿 = 1 , v 𝓃 𝓋 , 𝒻 𝓋 , i
i f v , i 𝒿 𝓃 𝓃 x 𝓋 i 𝒿 = 1 , v 𝓃 𝒹
i 𝓃 𝒿 𝒻 𝓋 , i x 𝓋 i 𝒿 = 1 , v 𝓃 𝓋
i 𝓃 𝓃 𝒿 𝒻 𝓋 , i x 𝓋 i 𝒿 = 1 , v 𝓃 𝒹
𝓋 𝓃 𝓋   𝒿 𝓃 x 𝓋 i 𝒿 + v 𝓃 𝓋   𝒿 𝓃 𝓃 𝒻 𝓋 , i x 𝓋 i 𝒿 = 1 , i 𝓃
𝓋 𝓃 𝓋   𝒿 𝓃 𝓃 𝒻 𝓋 , i x 𝓋 i 𝒿 = 1 , i 𝓃
𝒿 𝓃 𝒻 𝓋 , i i 𝓃 x 𝓋 i 𝒿 × dem i ˜ χ 𝓋 , 𝓋 𝓃 𝒹 𝓃 𝒹
𝒿 𝓃 𝓃 i 𝓃 𝓃 x 𝓋 i 𝒿 × dem i ˜ χ 𝓋 , 𝓋 𝓃 𝓋
U 𝓋 i U 𝓋 𝒿 + 𝓃 x 𝓋 i 𝒿 𝓃 1 , 𝓋 𝓃 𝓋 , i 𝓃 , i 𝓃
U 𝓋 i U 𝓋 𝒿 + 𝓃 x 𝓋 i 𝒿 𝓃 1 , 𝓋 𝓃 𝓋 , i 𝓃 𝓃 , i 𝓃 𝓃
U 𝓋 i 𝓃 , 𝓋 𝓃 𝓋 , i 𝓃
U 𝓋 . 𝒻 𝓋 , i = 0 , 𝓋 𝓃 𝓋   , i 𝓃
U 𝓋 i 𝓃 𝓃 , 𝓋 𝓃 𝓋 , i 𝓃 𝓃
U 𝓋 . 𝒻 𝓋 , i = 0 , 𝓋 𝓃 𝓋 , i 𝓃 𝓃
𝓋 T i 𝓋 = 0 , 𝒻 𝓋 , i
T 𝒿 𝓋 = 𝒿 𝓃 𝓃 x 𝓋 i 𝒿 × T i 𝓋 + θ i 𝒿 , i 𝓃 𝓃
bigM 1 𝓎 i 𝓈 T i 𝓋 φ 𝓋 𝓈 , i 𝓃 𝓃 , 𝓈 S , 𝓋 𝓃 𝓋
U 𝓋 i = 0 , 1 , 2 , .
x 𝓋 i 𝒿 0 , 1 , 𝓋 , i , 𝒿
T i 𝓋 0
φ 𝓋 𝓈     0
θ i 𝒿 0
𝓎 i 𝓈 0 , 1
The objective function (14) minimises the maximum of the transportation time of vehicle v between nodes i and j. The objective function (15) maximises the reliability of routes by maximising the sum of the permanent of each route. The objective function (16) minimises the unmet demand at impacted area i under scenario s. Constraint (17) guarantees the flow balance for the impacted areas with reliable road and ground vehicles. That is, each truck, after entering the node and servicing the area, leaves the node. Constraint (18) guarantees the balance of flow for healthy and not-healthy areas and for helicopters. In other words, the helicopters leave the node after its entrance. Constraint (19) indicates that the start point of any truck is known to be from what depot, while constraint (20) is the constraint on the start point of helicopters. Constraints (21) and (22) guarantees that any vehicles (i.e., truck and helicopter) after servicing any nodes must come back to the start point and the route is closed. Constraint (23) ensures that each vehicle (i.e., helicopter or truck) only serve one node (for points that their leading road is healthy). Consequently, constraint (24) identifies that each vehicle (i.e., helicopter) serve only one not healthy node (the impacted area that its leading road is damaged). Constraints (25) and (26) are the capacity limitation of trucks and helicopters. The part considered as a sub-tour constraint is represented in Constraints (27) to (32), in which Constraints (27) and (28) are the sub-tour elimination constraints for trucks and helicopters. Following that, Constraints (29) and (30) are the sub-tour elimination constraints for axillary variables U i 𝒿 and U 𝓋 𝒻 𝓋 , i for trucks. Constraints (31) and (32) are the sub-tour elimination constraints for axillary variables U 𝓋 i   and U 𝓋 𝒻 𝓋 , i for helicopters. Constraint (33) ensures that all vehicles depart from the depots. Constraint (34) calculates the reaching time of the vehicle to the demand centre or impacted areas. Constraint (35) identifies whether the shortage is present under the given scenarios or not. In other words, whether the shelters delivered to impacted areas under the different scenarios or not (if the product has been delivered to the impacted area means that the vehicle has not been failed before serving the impacted area and the shortage has not incurred). If T i 𝓋 φ 𝓋 𝓈 > 0 means that the failure time of vehicle is after the failure time at scenario s. Consequently, the shortage will occur, and the vehicle is not arrived to the impacted area. Otherwise, the vehicle has break downed after serving and all the goods are delivered to the affected areas and are not faced with shortage (to identify the shortage, we calculate the time of serving each point). Constraints (36) and (37) refer to the sequential 𝓊 i 𝓋 and binary variables x 𝓋 i 𝒿 , respectively. Constraint (38) implies to the arriving time of vehicle v to node i, which is a non-negative value. Constraint (39) implies the failure time of vehicle v under scenario s that is a non-negative. Constraint (40) identifies the vehicle travel time and transfers from node i to node j, a non-negative value. Constraint (41) is a binary variable that identifies the presence or absence of shortage.

3.3.2. Converting the Multi-Objective Model to a Single Objective Model by the Augmented ε-Constraint Method

Among the available techniques in the transformation of the multi-objective problem to a single objective problem, the augmented ε-constraint method is applied. This method is one of the efficient methods in looking for Pareto optimised solutions, in which the first objective function is optimised, and other objectives are being added to the constraints [50]. In the general, the other name of the ε-constraint method is a trade-off or ε-constraint method [51]. Consider a multi-objective programming, where p is the number objectives, f i x   i = 1 , 2 , , 𝓅 and x 𝒮 is the decision variable, which S is the feasible space. Now, we suppose that all objective functions are maximisation without a loss of generality. When we apply the ε-constraint method, we must consider one of the objective functions as the main objective and add others to the constraints. Following is the structure of Formula (41) [52].
max 𝒻 1 x
s . to .
𝒻 2 x ε 2
𝒻 3 x ε 3
. .
𝒻 𝓅 x ε 𝓅
x 𝒮
The other objective functions with permissible values ε i , are constrained (so that i   ϵ   1 , 2 , , 𝓂   \ 𝓃 ,   𝓃 is the index of the main objective function) [51]. The Pareto-optimal values are obtained by adding the right-hand side of new constraints (ε vector) [53]. When this method is used, the region of at least p-1 objective function, for the definition of grid points, must be defined for each ε i . An efficient method for identification of this region is to apply a payoff table for each objective function, which the difference between the minimum value ( 𝒻 i min ) and the maximum value ( 𝒻 i max ) constitute the region.
𝓇 i = 𝒻 i m a x 𝒻 i m i n
Then, this region for each objective function is divided into equal intervals and according to the following formula: the set of 𝓆 i + 1 grid points is calculated.
ε i 𝓀 = 𝒻 i m a x 𝓇 i 𝓆 i 𝓀 , 𝓀 = 0 , 1 , , 𝓆 i
i = 2 𝓅 ( 𝓆 i + 1 ) single optimisation sub-problem must be produced from the multi-objective problem, which any sub-problem has a Pareto-optimal solution. Because of adding objective functions, the constraints may be infeasible. One drawback of this method is that it may produce inefficient solutions [52]. Different versions of the ε-constraint method are developed for producing more efficient solutions. To overcome this drawback, an augmented ε-constraint method is proposed, in which changing the constraints of the objective functions, by using of slack or surplus variables, is suggested, and the main objective function is augmented by the sum of slack or surplus values. We have the following model [53]:
Max   𝒻 1 x + δ 𝓈 2 + 𝓈 3 + + 𝓈 𝓅 }
S . t .
𝒻 2 x = ε 2 𝓈 2
𝒻 3 x = ε 3 𝓈 3
. .
𝒻 𝓅 x = ε 𝓅 𝓈 𝓅
x X , 𝓈 i R +
where the δ value is a small number between 10−6 and 10−3.

3.3.3. Uncertainty and Defuzzification

In the proposed model, due to the uncertainty in an emergency situation and becoming closer to reality, the demand of the impacted areas is fuzzy numbers (parameter D e m i is considered a triangle fuzzy number). Because of the applicability and simplicity in calculations, a symmetrical triangle distribution is considered for specifying of the fuzzy parameter [54,55]. To transform a linear mathematical model to its corresponding deterministic model, the Jimenez method is applied because of the high efficiency [56]. The membership function of the fuzzy parameter is as follows [57]:
μ c ˜ x = f c x = x c p c 𝓂 c p i f   c p x c 𝓂 1 i f   x = c 𝓂 g c x = c 0 x c 0 c 𝓂 i f   c 𝓂 x c 0 0 i f   x c p   o r   x c 0
Also, for fuzzy number 𝒶 ˜ and 𝑏 ˜ the degree of being greater is defined by:
μ M 𝒶 ˜ , 𝒷 ˜ = 0 i f   E 2 0     E 1 𝒷 0 E 2 𝒶 E 1 𝒷 E 2 𝒶 E 1 𝒷 E 1 𝒶 E 2 𝒷 i f   E 1 𝒶 E 2 𝒷 0 E 2 𝒶 E 1 𝒷 1 i f   E 1 0 E 2 𝒷 0
μ M 𝒶 ˜ , 𝒷 ˜ Identifies the degree that 𝒶 ˜ is greater than 𝒷 ˜ . When μ M 𝒶 ˜ , 𝒷 ˜ α , it is said that 𝒶 ˜ is greater than 𝒷 ˜ at least by degree α” [56]. Consider the mathematical model with fuzzy parameters as follows:
Min Z = C ˜ t 𝑥
S . t .
𝑋 𝐴 ˜ = { 𝑥 R n | a ˜ i 𝑥 b ˜ i , i   =   1 , , m ,   𝑥     0
where 𝒷 ˜ = ( 𝒷 ˜ 1 , 𝒷 ˜ 2 , …, 𝒷 ˜ 𝓃 ), c ˜ = ( c ˜ 1 , c ˜ 2 , …, c ˜ 𝓃 ) and A ˜ = 𝒶 ˜ i 𝒿 𝓂   ×   𝓃   are the objective functions and constraints’ parameters [58]. Applying the Jimenez method, the above model is transformed to the deterministic parametric linear programming method.
m i n z   =   c ˜ 𝓉 x s . t . 𝒶 ˜ i x 𝒷 ˜ i 𝒶 ˜ 𝒿 x = 𝒷 ˜ i x 0  
Equivalent   crisp - parametric   model   α
min z = EV ( c ˜ ) x s . t [ ( 1 α ) E 2 𝒶 𝒿 + α E 1 𝒶 i ] x α E 2 𝒷 𝒿 + ( 1 α ) E 1 𝒷 𝒿 [ ( 1 α 2 ) E 2 𝒶 𝒿 + α E 1 𝒶 𝒿 ] x α 2 E 2 𝒷 𝒿 + ( 1 α 2 ) E 1 𝒷 𝒿 [ ( α 2 ) E 2 𝒶 𝒿 + ( 1 α 2 ) E 1 𝒶 𝒿 ] x ( 1 α 2 ) E 2 𝒷 𝒿 + α 2 E 1 𝒷 𝒿 x 0
where α is the possibility level of non-deterministic data and expected interval (EI( c ˜ )) and expected value (EV( c ˜ )) are defined by [28].
E I c ¯   =   E 1 c . E c 2   =   0 1 f c 1 x d x , 0 1 g c 1 x d x   =   1 2 c 𝑝   +   c 𝓂 , 1 2 c 𝓂   +   c 0
E v c ¯   =   E 1 + 0 E 2 0 2   =   c 𝑝   +   2 c 𝓂   +   c 0 4
And, if the fuzzy number c is a triangle fuzzy number, the expected interval can be easily stated by [56].
E 1 c ¯   =   E 1 0 , E 2 0   =   c 𝑝   +   c 𝓂 2 , c 𝓂   +   c 0 2
If the equation has smaller than and equal constraints, its augmented model can be displayed as follows:
1     𝒶 E 1 𝒶   +   𝒶 E 2 𝒶 x     𝒶 E 1 𝒷   +   1     a E 2 𝒷   ,   i   =   1 , , 𝓂 , x     0 , 𝒶 0 , 1
And, if the relationship has equal constraints, we have:
1 𝒶 2 E 1 𝒶 + 𝒶 2 E 2 𝒶 x 𝒶 2 E 1 𝒷 + 1 𝒶 2 E 2 𝒷 , i = 1 , , 𝓂 , x 0 , 𝒶 0 , 1
1 𝒶 2 E 1 𝒶 + 𝒶 2 E 2 𝒶 x 𝒶 2 E 1 𝒷 + 1 𝒶 2 E 2 𝒷 , i = 1 , , 𝓂 ,   x 0 , 𝒶 0 , 1
According to what we have discussed, changes in the objective function and constraints take place according to the following equations:
Min   ( Max 𝓉 i 𝒿 𝓋 x 𝓋 i 𝒿
Max   i I 𝒿 J 𝓋 V 𝓇 i 𝒿 x 𝓋 i 𝒿
Min   𝓎 i 𝓈 × ( d e m i 1 + 2 d e m i 2 + d e m i 3 4 )
s.to.
Constraints   ( 9 ) ( 16 )
𝒿 𝓃 𝒻 𝓋 , i i n e x 𝓋 i 𝒿 × α d e m i 1 + d e m i 2 2 + 1 α d e m i 2 + d e m i 3 2     χ 𝓋
𝒿 𝓃 𝓃 i 𝓃 𝓃 x 𝓋 i 𝒿 × α dem i 1 + dem i 2 2 + 1 α dem i 2 + dem i 3 2     χ 𝓋
Constraints   ( 19 ) ( 23 ) .
The Jimenez method is implemented in three stages described below:
Stage 1: The provided auxiliary deterministic model (Equation (71)) is solved for each   α k . In this way, space O   =   x 0 α 𝓀 , 𝜆 ϵ M is obtained from the optimal solution with degree α k and corresponding possibility distribution with objective value   Z ˜ 0 α 𝓀   =   C ˜ x 0 α 𝓀 , which is shown in Figure 5.
For acquiring a decision vector that satisfies the decision maker’s expectation, two factors must be considered: (1) the degree of feasibility and (2) reaching the acceptable value for the objective function. After the observation of the obtained information of Z ˜ 0 𝒶 𝓀 , the decision-maker is asked to select an objective G and tolerance limit G ¯ . Accordingly, if Z G ¯ , is totally satisfactory; however, if Z G ¯ , its satisfaction level is zero. The objective is stated by fuzzy set Z ˜ 0 𝒶 𝓀 , whose membership function is as follows:
μ G ( Z ) = 0 if   Z G ¯ η 0 , 1 decreasing   on   G ¯ Z G ¯ 1 if   Z G ¯
The decision-maker wants to acquire the maximum satisfaction level. However, a lower level of constraint establishment is obtained for the optimal objective value. With this explanation, the decision-maker may want a lower level of satisfaction to better establish the constraints. Figure 5 show the different Z ˜ 0 and objective Z ˜ 0 𝒶 𝓀 . The objective is to find a definitive solution x * so that the decision maker’ expectation is satisfied.
Stage 2: The satisfaction level of the fuzzy objective Z ˜ 0 𝒶 𝓀 under each optimal solution with acceptance degree α, which the membership function of each fuzzy number Z ˜ 0 𝒶 𝓀 to the fuzzy set Z ˜ 0 𝒶 𝓀 that the method was proposed by [59] is applied here.
𝓀 G ˜ ( Z 0 ( α ) ) = μ Z ˜ 0 α ( Z ) μ G ˜ α ( Z ) dz μ Z ˜ 0 α ( Z ) dz
In this equation, the dominator identifies the area under the μ Z 0 α Z curve and the numerator is the possibility of μ Z 0 α Z for any deterministic value Z weighted by its satisfaction level.
Stage 3: We search for finding a balanced solution between the degree of feasibility and satisfaction. Hence, the optimal solution space with acceptance degree α and two fuzzy sets F ˜ and S ˜ is considered, whose membership function is as follows:
μ S ˜ x 0 ( α 𝓀 )   =   𝓀 G ˜ z ˜ 0 α 𝓀   and   μ F ˜ x 0 α 𝓀   =   α 𝓀 .
Therefore, the fuzzy decision vector D ˜ = F ˜ S ˜ is defined by [60]:
μ D ˜ x 0 α 𝓀   =   α 𝓀   ×   𝓀 G ˜ z ˜ 0 α 𝓀
where * is a t norm   that can be minimised. Hence, when we have a deterministic decision vector and, it will be known as a solution for the main fuzzy linear model in Equation (70) if x * O   is the solution with the most membership degree in the fuzzy decision vectors:
μ D ˜ x *   =   Max λ 𝓀 M λ 𝓀   ×   𝓀 G ˜ z ˜ 0 α 𝓀

4. Multi-Objective Metaheuristics Algorithms

Finding optimum solutions to problems that have more than one objective function is difficult [61,62]. Many real-world optimisation problems may pursue different goals, which increases the problem’s complexity [63]. For these challenging problems, metaheuristic algorithms may be used [64]. There are some benefits to using metaheuristic algorithms [65]. They can be applied to any problem that can be expressed as a function optimisation problem [66], are typically easier to understand and implement [67], can solve larger problems faster [68], are simple to design and implement [69], are very flexible [70], and can be combined with other techniques [71]. To the problem in this study, two multi-objective metaheuristic algorithms, NSGA-II [72] and Multi-objective firefly algorithm [73] are employed. The next section delves into the algorithm’s characteristics and pseudo-code.

4.1. NSGA-II

A Non-Dominated Sorted Genetic Algorithm (NSGA-II) is a common and strong method based on the genetic algorithm (GA). Deb, Pratap, Agarwal and Meyarivan [72] proposed this multi-objective algorithm that, instead of a particular solution, identifies a set of solutions as Pareto-front solutions that no one has absolute domination to others. This algorithm is an expert-based multi-objective evolutionary algorithm that maintains the dominant solution with a good strategy and assigns population members by a dominance rank according to non-dominated sorting. Actually, by adding these two important features to the usual genetic algorithm, a set of solutions (i.e., Pareto front) are obtained [74]. Three major operators of this algorithm are selection, mutation and crossover. The selection operator selects the independent parameters among the different parameters to be utilised in mutation and crossover operators. Therefore, setting an appropriate coding is very important to minimise these independent parameters, as the correct selection of genetic operators is also vital for this coding [72] all the duties are done in population generation sections. The crossover and mutation are integrated, then non-dominated sorting is done according to the rank and crowding distance, and finally redundant parts are eliminated [74].
First, a random population of is generated, and each function’s value is computed for each member of the initial population. Following the computation of the objective functions, the non-dominance sorting is applied to the. In this manner, population members with varying degrees of non-domination are classified into several fronts. A non-dominated set of solutions is formed by population members who are not dominated at all (i.e., Pareto front). A secondary measure (namely crowding distance) is used to sort solutions that have the same rank and are in the same non-dominance level. This crowding distance for solution I is an estimate of the diameter of a rectangle, the vertices of which are the closest neighbour solutions to it in its front. The crossover operator is applied to a subset of the current population at each iteration, and new solutions are generated. Each member of the new population is given the value of each objective function. To select parent solutions, a binary tournament selection was used. Algorithm 1 presents the steps of any iteration of the NSGA-II. When a user-specified number of iterations is reached, the algorithm is completed.
Algorithm 1: NSGA-II Algorithm.
Initialization of generation A ξ ;
Initialization of iteration ξ = 1 ;
while generation  ξ ξ m a x
  Crossover and mutation on A ξ  to get new population B ξ ;
  Merge A ξ  and B ξ  as total population T ξ ;
  Rank population T ξ in Pareto front;
  Select best N p  population from T ξ  as A ξ + 1 with crowding distance function;
   Increment generation ξ = ξ + 1
end

4.2. Multi-Objective Firefly Algorithm

Firefly algorithm was proposed by Yang [75]. The fireflies generate short and rhythmic flashes (with unique pattern) the flashing light is generated by a procedure of bioluminescence [76]. With chemical changes in them, these insects flash to attract a mating partner or protect themselves. There are three rules in this algorithm, which are as follows:
  • A firefly can attract another firefly regardless of their gender (all fireflies are unisex).
  • The brighter firefly attracts the other one (the dependence of attraction rate of fireflies to their brightness). The brightness and attractiveness increase with distance reduction.
  • The more bright the firefly is, the more objective function it has. Thus, the obtained solution will be better. To find the brightness value of these insects, we can use the objective function [77]. In other words, the objective function of this algorithm is the same as the fitness function of the genetic algorithm [78].
To better understand this concept, consider that the butterfly’s attractiveness is defined by its brightness. For a maximisation problem, the brightness (illumination) of a firefly ( I ) located at point x is equivalent to I x 𝒻 x [75]. The attractiveness is relative meaning that other fireflies should judge it. So, it will differ with the distance of two fireflies i and j ( r i j ). By this explanation, the firefly attractiveness is obtained from the following equation:
β 𝓇   =   β 0 e     γ 𝓇 2
where β 0 is the initial attractiveness of firefly at distance 𝓇 = 0. In more detailed explanation, this equation identifies that at a given distance   =   1 / γ , the attractiveness changes remarkably from β 0 to   β e 1 . The distance of two fireflies is located at points x i and x 𝒿 . x i , 𝓀 is the k-th factor of the spatial coordinates of the i-th firefly. Of course, with regard to the research problem’s nature, other metrics (e.g., Manhattan distance or Mahalanobis distance) can be considered for identifying the distance [79]. If γ 0 ,   β = β 0 ; hence the firefly’s attractiveness value is close to zero (if that is seen by other firefly) if γ ,   β = 0 . That means any firefly moves in the random route and the other firefly has not seen [80]. If the firefly i is attracted to the brighter firefly j, its movement is calculated by [73].
x i 𝓉 + 1 = x i 𝓉 + β 0 × e γ 𝓇 i 𝒿 2 × x 𝒿 𝓉 x i 𝓉 + α 𝓉 × ϵ i 𝓉
The second statement identifies the attractiveness, and the third statement has been randomised with random parameter α 𝓉 (randomisation) and ϵ i 𝓉 is the produced vector of Gaussian or Uniform distribution function. This statement generates random number with control parameter α t that the most applicable parameters value is when β 0 = 1 and 0 , 1 . By this explanation, the following equation can be written.
x i 𝓉 + 1 = x i 𝓉 + β 0 × e γ 𝓇 i 𝒿 2 × x 𝒿 𝓉 x i 𝓉 + α 𝓉 × rand 1 2
In conclusion, it can be said that four stages are designed for applying this algorithm. In Stage 1, the generation of an initial population of fireflies is taken place. Then, their fitness or light intensity is evaluated to the objective function. In Stage 3, this fitness value is updated. In the final stage, the fireflies are ranked, and their states are updated. [73] developed the original FA for multi-objective problems by applying three rules and characteristics. Actually, this algorithm is the adjusted firefly algorithm [81]. According to the emitted light from firefly, this algorithm reproduces the attractiveness rate between them. Therefore, the brightest firefly attracts at least one firefly. In the optimisation problem, each firefly represents a solution to the problem, and the lighter firefly has better quality [82]. The pseudo-code of the multi-objective firefly algorithm (MOFA) can be explained in two stages. As shown in Algorithm 2, in the first stage, after the completion of initialisation, the first firefly that is less bright moves to the brighter one. In other words, all fireflies are compared to fireflies that are smaller than or equal to them by ε, and if one of them dominate others by ε, the firefly with the least brightness approaches the brightest one. if the obtained firefly is better than the original firefly with respect to dominance, it is replaced with it. In fact, in this stage, the moved fireflies to the better ones are counted to identify whether the population has encountered with stagnant or not. The times in which fireflies have encountered stagnant have unsuccessful attempts for evolution. In the second stage, it is identified whether the population is being encountered with stagnant or not. According to the moved fireflies and their limit values, when the number of fireflies approached to the brighter one is less than StageCont, the population is deemed to be stagnated and if their limit values are greater than LimitF, replaced with new random fireflies. At the end of each generation, the validated members of the population are stored in DS Archive to new appropriate solutions [82].
Algorithm 2: MOFA.
NF     Number of fireflies.
NDS Archive    
# Initialization.
Fireflies     Generate NF random fireflies.
Generations     Number of iterations of the algorithm.
Fmoved     Number of fireflies moved in each generation.
StagCont     Percentage of fireflies for stagnation control.
LimitF     Maximum number of times that a firefly tries unsuccessfully to evolve.
fori = 1 to generations
# Evolution of the swarm
Fmoved     0
for j = 1 to NF
  FireflyA     Fireflies[j]
  for k = 1 to NF
   fireflyB     fireflies[k]   #fireflyB≠fireflyA
   if fireflyA ε fireflyB
    fireflyR     bringcloser(fireflyB,firefly)
    if fireflyR fireflyB
     Fireflies[k]     fireflyR
     Fmoved     Fmoved +1
     else
      incrementLimit(Fireflies[k],1)
     end
    end
   end
end
# Stagnation Control
if Fmoved < (NF × StagCont)/100
  for m = 1 to NF
   if limit (fireflies[m]) > LimitF
    Fireflies[m]     newrandom firefly.
    end
   end
end
# Save population to the NDSArchive.
export fireflies (fireflies,NF,NDSArchive)
end

5. Computational Results

The results are shown in the following four sub-sections.

5.1. Evaluating the Performance of the Algorithms

Ten problems in different dimensions are designed to compare the proposed meta-heuristic algorithms (i.e., NSGA-II and MOFA). We compare the obtained results of these meta-heuristics with the GAMS’s results obtained by the augmented ε-constraint method. As shown in Table 4, for each produced problem, the values of Objective Function (OF) and errors of the proposed meta-heuristics are reported in comparison to the augmented ε-constraint method, in which the solution time of this method is at most 3600 s. In this paper, for each of the three objective functions of the mathematical model, the error rate of each algorithm in comparison to the Augmented ε-constraint method can be calculated from the following equations (for the calculation of the MO-firefly algorithm’s error, we do similarly).
Gap O F i = O F i NSGA - II O F i Augmented   ε - Constaint O F i Augmented   ε - Constaint × 100 , i = 1 , 2 , 3
The mean differences between the NSGAII and augmented ε-constraint method values are 3.58, 5.06 and 3.22% for the first, second and third objective functions (i.e., transportation time, reliability and unmet demand or shortage), respectively. Furthermore, the mean differences between the best values of the MOFA and ε -constraint method are 1.75, 3.64 and 2.19% for the first, second and third objective functions, respectively. As a result, we infer that the suggested metaheuristic approaches are efficient since the mean gaps of three objective functions are quite small (see Figure 6).
Furthermore, Figure 7 compares the CPU time of the augmented ε-constraint method to the time required to solve each of the meta-heuristic algorithms. As the dimensions of the problem increase, the solving time of the augmented ε-constraint method increases exponentially, to the point where it cannot solve problems 9 and 10. In contrast, the proposed metaheuristic algorithms can find good solutions in a reasonable amount of time and with a reasonable slope.

5.2. Evaluating Metrics and Comparing Three Objectives Meta-Heuristics

To compare the performance of different algorithms in multi-objective optimisation problems, in which problem solutions constitute the optimal Pareto front, there are different criteria used in this research. One quantitative criterion of algorithms’ performance is the number of Pareto solutions, in which higher values of this number indicate that it is more appropriate. On the other hand, the distance index can be used to calculate the relative distance of consecutive solutions. The lower values of this index are more desirable. This distance index is calculated by [83].
S M   =   i   =   1 N     1 𝒹 ¯     𝒹 i N     1 𝒹 ¯
where N is the number of Pareto solutions, 𝒹 i is the spacing between two sequential solutions in optimal front obtained by each algorithm, and 𝒹 is the average of d i s . Another index that identifies the diversity of solutions is the diversity index, in which its higher values are more appropriate. This index can be computed by [84]:
D M   =   m a x 𝒻 1 i     m i n 𝒻 1 𝒾 𝒻 1 , t o t a l m a x     𝒻 1 , t o t a l m i n 2   +   m a x 𝒻 2 i     m i n 𝒻 2 i 𝒻 2 , t o t a l m a x     𝒻 2 , t o t a l m i n 2
To compare the performance of the proposed algorithms and generate Pareto-optimal solutions, 12 problems with different sizes are produced and the evaluation metrics of two meta-heuristic algorithms are presented for each problem. The attributes of the generated sample problems, the failure times, the fuzzy demands for vehicles under different scenarios and values of evaluations metrics for algorithms are given in Table 5, Table 6 and Table 7.
It’s important to note that the number of ground vehicles is between 3 and 10, and the number of air vehicles is between 2 and 5. In all problems, there is one warehouse for air vehicles. Also, the capacity and transportation time parameter values are generated according to a uniform distribution U (50, 60) and U (8, 20), respectively. The demand of affected people is considered a triangle fuzzy number with the d e m   =   d e m 1 , d e m 2 , d e m 3 structure, which generate randomly as follows (from Uniform distribution): dem1 from [20,45], dem2 from [46,70], and dem3 from [71,140]. The travel time of vehicles for distributing goods is also considered a uniform distribution, which a part of this generated random numbers can be seen in Table 6. For each problem, we have a scenario matrix, in which the rows identify scenarios, the columns identify vehicles, and the numbers in the table identify the failure time of vehicles. That is scenario 2 3   =   16 highlighted in the table meaning that vehicle 2 in scenario five is broken down after 16 h and causes the unmet demand. Finally, Table 7 shows the comparison of the two proposed meta-heuristic algorithms.
The computational results of comparison metrics are shown below for a better understanding of the performance of the meta-heuristic algorithms. We compare the meta-heuristic algorithms in Figure 8 using the distance metric and find that the MOFA outperforms the NSGA-II. The density metric results in Figure 9 show that there is no special trend for the algorithms. Figure 10 depicts the number of Pareto solutions demonstrating the MOFA’s superior performance. Figure 11 depicts a comparison of solution times, demonstrating that the MOFA is faster in finding good solutions, resulting in better performance.

5.3. Sensitivity Analysis

The sensitivity analysis is considered for problem 6 (i.e., 28 impacted areas, eight warehouses, nine vehicles and five scenarios). The results of the objective functions are changed in demand and vehicle capacity simultaneously, and the mean of the vehicle damage time (parameter of exponential distribution in scenarios generation) is shown in Table 8 and Table 9.
If the demand reducing and vehicle capacity increasing simultaneous then will be no change in the route selection and objective functions. Vice versa, when demand increases and a capacity decrease, then the transportation times (OF1) and unmet demand (OF3) will be increased, and the reliability (OF3) will be decreased. Because of rising demand and low capacity to serve more vehicles need (OF1). Therefore, the increased transportation time and vehicle failure probability will be increased. As a result, the unmet demand (OF3) increases, on the other hands; the route selection with lower reliability will be increased. If demand is fixed and the vehicle capacity is decreased, it sounds like, we reduce surplus capacity. Thus, route selection does not change. But when the demand constant and the vehicle capacity decrease from 0.9 to 0.8, the three objective functions will be changed. Thus, the routes change. For example, if vehicle 1 should serve three impacted areas, now because of decrease its capacity will not be able to serve, therefore this task will be devolved to vehicle 2. When vehicle 2 transports the arc, firstly, transportation time (OF1) increases, and it is not optimal. Secondly, the unmet demand value (OF3) in different scenarios increases. Thirdly, the arc with the most reliability is selected before, but now, the reliability decreases from 5.7 to 5.6. Similarly, if the vehicle capacity decreases up to 0.7, this change will be had again. Now, if the vehicle capacity is considered constant (value = 1) and demand decreases, the route and objective functions will not change. However, if demand increases then because of constant capacity and increased demand, the vehicle cannot response this demand volume. As a result, the transportation time will be increased and reliability will be decreased on the other hands, the vehicle damaged under different scenarios, therefore the unmet demand value will be increased. The results of vehicle downtime and its impact on the optimal solution is shown in Table 9. According to what is shown in Table 7, we find if the mean of the damage time increases, the characteristic related to vehicle damage times will be decreased. When damage time is increased (from 1 to 1.1), the vehicle performs better, transportation time increases, reliability increases, and unmet demand decrease. The model or algorithm tries to do, not selected routes where the vehicle broken-down earlier and there has the unmet demand value. Vice versa, if the mean of the damage time is decreased until the vehicle breaks down sooner, the model tries to increase the mean of the damage time. In fact, the model is increased both of the unmet demand value and transportation time.

5.4. Practical Implication

There are many cities in the world that are in high-risk areas, and the original designs of many hospitals failed to account for the potential effects of natural disasters on the built environment. Despite the fact that natural disasters are extremely rare, it is imperative to have a plan in place for dealing with them. As a result of this research, some government organisations and decision-makers may be able to develop a central platform for distributing temporary shelters to impacted areas. There are also a number of international organisations that are working on solutions for displaced people. Global campaigns have been launched by organisations like the WHO and the United Nations International Strategy for Disaster Reduction. As a result of this study, a Graphical User Interface (GUI) for emergency planning organisations can be developed using the model proposed. An online visualisation prototype that generates reliable and dynamic response plans quickly would be extremely helpful to strategic and operational planners. Decision-makers may benefit from the prototype’s ability to speed up the evacuation planning process. It will have an easy-to-use data input system that can generate a lot of data for this decision-making tool. Effective disaster response plans that can be modified quickly and easily in the event of a disaster may be possible with this information.

6. Conclusions and Future Research

As the destructive impacts of disasters on societies and built environments are predicted to increase in the future, innovative disaster response strategies to cope with emergency conditions are be-coming more crucial. Due to time and resource constraints after a distractive large-scale disaster, the distribution of post-disaster temporary shelters is challenging. There is strong evidence that the success of many post-disaster response strategies in providing temporary shelters for impacted areas is compromised by inappropriate planning. In this research, by proposing a clustered and disrupted vehicle routing model, we tried to minimise the total travel time of operations and the unmet demand (shortage) and maximise the reliability of the route simultaneously. A system was designed in which heterogeneous vehicles from multiple depots initiated the relief operations in the ground and air mode and delivered temporary shelters to the impacted areas. The augmented ε-constraint method in small size was used to find the optimal solution. To compare the performance of the proposed algorithms and generate the optimal solution, 12 problems with different sizes were produced, and the evaluation metrics of two meta-heuristic algorithms were presented for each problem. The results identified higher accuracy and lowered computational time of the multi-objective firefly algorithm.
This research has implications for key stakeholders involved in disaster management strategies and plans in disaster-prone areas, according to the empirical findings. Furthermore, policymakers in disaster-stricken countries can use the proposed model to manage emergency situations. In addition, the proposed model can be easily adapted to other disasters, such as bushfires, which are common in many countries, particularly Australia. Using a bushfire simulation framework like “Spark” developed by CSIRO-Data61, bushfire spread across the landscape can be predicted, allowing the availability of different network links to be estimated.
It is possible to extend this study in many ways. As an example, incorporating staff scheduling and management into the distribution process could be an interesting research area. In the future, researchers should look into how well the road network performs when distributing shelters. In addition, disaster response can be more efficient and time-saving if interrelated operations are coordinated. As a result, developing multi-category integrated models could be an exciting new area of study in the future.

Author Contributions

Formal analysis, Z.G.; methodology, Z.G.; supervision, R.T.-M.; validation, A.B.-A.; visualization, M.Y.; writing—original draft, Z.G.; writing—review & editing, R.T.-M., A.B.-A. and M.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data used in the study is available with the authors and can be shared upon reasonable requests.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Khalili, S.M.; Jolai, F.; Torabi, S.A. Integrated production–distribution planning in two-echelon systems: A resilience view. Int. J. Prod. Res. 2017, 55, 1040–1064. [Google Scholar] [CrossRef]
  2. Rouhanizadeh, B.; Kermanshachi, S. Post-disaster reconstruction of transportation infrastructures: Lessons learned. Sustain. Cities Soc. 2020, 63, 102505. [Google Scholar] [CrossRef]
  3. Sukhwani, V.; Napitupulu, H.; Jingnan, D.; Yamaji, M.; Shaw, R. Enhancing cultural adequacy in post-disaster temporary housing. Prog. Disaster Sci. 2021, 11, 100186. [Google Scholar] [CrossRef]
  4. Cumbane, S.P.; Gidófalvi, G. Spatial Distribution of Displaced Population Estimated Using Mobile Phone Data to Support Disaster Response Activities. ISPRS Int. J. Geo-Inf. 2021, 10, 421. [Google Scholar] [CrossRef]
  5. Safapour, E.; Kermanshachi, S. Uncertainty analysis of rework predictors in post-hurricane reconstruction of critical transportation infrastructure. Prog. Disaster Sci. 2021, 11, 100194. [Google Scholar] [CrossRef]
  6. Saeed, Z.O.; Almukhtar, A.; Salih, K. Construction Beyond War: Assessing Time and Cost of Prefabrication in Rebuilding Post-Disaster Cities. In Proceedings of the IOP Conference Series: Materials Science and Engineering, Samawah, Iraq, 23–24 December 2020; p. 012057. [Google Scholar]
  7. Habibi Rad, M.; Mojtahedi, M.; Ostwald, M.J. Industry 4.0, Disaster Risk Management and Infrastructure Resilience: A Systematic Review and Bibliometric Analysis. Buildings 2021, 11, 411. [Google Scholar] [CrossRef]
  8. Habibi Rad, M.; Mojtahedi, M.; Ostwald, M.J. The Integration of Lean and Resilience Paradigms: A Systematic Review Identifying Current and Future Research Directions. Sustainability 2021, 13, 8893. [Google Scholar] [CrossRef]
  9. Rouhanizadeh, B.; Kermanshachi, S.; Dhamangaonkar, V.S. Reconstruction of Critical and Interdependent Infrastructure Due to Catastrophic Natural Disasters: Lessons Learned. In Proceedings of the Construction Research Congress 2020: Infrastructure Systems and Sustainability, Tempe, AZ, USA, 8–10 March 2020; pp. 895–904. [Google Scholar]
  10. Wei, W.; Mojtahedi, M.; Yazdani, M.; Kabirifar, K. The Alignment of Australia’s National Construction Code and the Sendai Framework for Disaster Risk Reduction in Achieving Resilient Buildings and Communities. Buildings 2021, 11, 429. [Google Scholar] [CrossRef]
  11. Jin, J.G.; Shen, Y.; Hu, H.; Fan, Y.; Yu, M. Optimizing underground shelter location and mass pedestrian evacuation in urban community areas: A case study of Shanghai. Transp. Res. Part A Policy Pract. 2021, 149, 124–138. [Google Scholar] [CrossRef]
  12. Bamakan, S.M.H.; Faregh, N.; ZareRavasan, A. Di-ANFIS: An integrated blockchain–IoT–big data-enabled framework for evaluating service supply chain performance. J. Comput. Des. Eng. 2021, 8, 676–690. [Google Scholar] [CrossRef]
  13. Yazdani, M.; Mojtahedi, M.; Loosemore, M. Enhancing evacuation response to extreme weather disasters using public transportation systems: A novel simheuristic approach. J. Comput. Des. Eng. 2020, 7, 195–210. [Google Scholar] [CrossRef]
  14. Mirmozaffari, M.; Shadkam, E.; Khalili, S.M.; Yazdani, M. Developing a Novel Integrated Generalised Data Envelopment Analysis (DEA) to Evaluate Hospitals Providing Stroke Care Services. Bioengineering 2021, 8, 207. [Google Scholar] [CrossRef] [PubMed]
  15. Sibevei, A.; Azar, A.; Zandieh, M.; Khalili, S.M.; Yazdani, M. Developing a Risk Reduction Support System for Health System in Iran: A Case Study in Blood Supply Chain Management. Int. J. Environ. Res. Public Health 2022, 19, 2139. [Google Scholar] [CrossRef] [PubMed]
  16. Khalili, S.M.; Babagolzadeh, M.; Yazdani, M.; Saberi, M.; Chang, E. A bi-objective model for relief supply location in post-disaster management. In Proceedings of the 2016 International Conference on Intelligent Networking and Collaborative Systems (INCoS), Ostrave, Czech Republic, 7–9 September 2016; pp. 428–434. [Google Scholar]
  17. Mohammadnazari, Z.; Mousapour Mamoudan, M.; Alipour-Vaezi, M.; Aghsami, A.; Jolai, F.; Yazdani, M. Prioritizing Post-Disaster Reconstruction Projects Using an Integrated Multi-Criteria Decision-Making Approach: A Case Study. Buildings 2022, 12, 136. [Google Scholar] [CrossRef]
  18. Yazdani, M.; Mojtahedi, M.; Loosemore, M.; Sanderson, D.; Dixit, V. Hospital evacuation modelling: A critical literature review on current knowledge and research gaps. Int. J. Disaster Risk Reduct. 2021, 66, 102627. [Google Scholar] [CrossRef]
  19. Mojtahedi, M.; Oo, B.L. Critical attributes for proactive engagement of stakeholders in disaster risk management. Int. J. Disaster Risk Reduct. 2017, 21, 35–43. [Google Scholar] [CrossRef]
  20. Field, C.B.; Barros, V.; Stocker, T.F.; Dahe, Q. Managing the Risks of Extreme Events and Disasters to Advance Climate Change Adaptation: Special Report of the Intergovernmental Panel on Climate Change; Cambridge University Press: Cambridge, UK, 2012. [Google Scholar]
  21. UNISDR, U. Terminology on Disaster Risk Reduction; UNDRR: Geneva, Switzerland, 2009. [Google Scholar]
  22. Haghani, A.; Oh, S.-C. Formulation and solution of a multi-commodity, multi-modal network flow model for disaster relief operations. Transp. Res. Part A Policy Pract. 1996, 30, 231–250. [Google Scholar] [CrossRef]
  23. Haghani, S.C.O.A. Testing and evaluation of a multi-commodity multi-modal network flow model for disaster relief management. J. Adv. Transp. 1997, 31, 249–282. [Google Scholar] [CrossRef]
  24. Özdamar, L.; Ekinci, E.; Küçükyazici, B. Emergency logistics planning in natural disasters. Ann. Oper. Res. 2004, 129, 217–245. [Google Scholar] [CrossRef]
  25. Dondo, R.; Cerdá, J. A cluster-based optimization approach for the multi-depot heterogeneous fleet vehicle routing problem with time windows. Eur. J. Oper. Res. 2007, 176, 1478–1507. [Google Scholar] [CrossRef]
  26. He, R.; Xu, W.; Sun, J.; Zu, B. Balanced k-means algorithm for partitioning areas in large-scale vehicle routing problem. In Proceedings of the 2009 Third International Symposium on Intelligent Information Technology Application, Nanchang, China, 21–22 November 2009; pp. 87–90. [Google Scholar]
  27. Vitoriano, B.; Ortuño, M.T.; Tirado, G.; Montero, J. A multi-criteria optimization model for humanitarian aid distribution. J. Glob. Optim. 2011, 51, 189–208. [Google Scholar] [CrossRef]
  28. Torabi, S.A.; Baghersad, M.; Meisami, A. Emergency relief routing and temporary depots location problem considering roads restoration. In Proceedings of the 24th Annual Conference of the Production and Operations Management Society, Denver, CO, USA, 3–6 May 2013; pp. 1–10. [Google Scholar]
  29. Hamedi, M.; Haghani, A.; Yang, S. Reliable transportation of humanitarian supplies in disaster response: Model and heuristic. Procedia-Soc. Behav. Sci. 2012, 54, 1205–1219. [Google Scholar] [CrossRef] [Green Version]
  30. Nasiri, M.; ShisheGar, S. Disaster relief routing by considering heterogeneous vehicles and reliability of routes using an MADM approach. Uncertain Supply Chain. Manag. 2014, 2, 137–150. [Google Scholar] [CrossRef]
  31. Wang, X.; Wu, X.; Hu, X. A Study of Urgency Vehicle Routing Disruption Management Problem. In Proceedings of the 2010 WASE International Conference on Information Engineering, Washington, DC, USA, 14–15 August 2010; pp. 452–455. [Google Scholar]
  32. Mu, Q.; Eglese, R.W. Disrupted capacitated vehicle routing problem with order release delay. Ann. Oper. Res. 2013, 207, 201–216. [Google Scholar] [CrossRef] [Green Version]
  33. Mamasis, K.; Minis, I.; Dikas, G. Managing vehicle breakdown incidents during urban distribution of a common product. J. Oper. Res. Soc. 2013, 64, 925–937. [Google Scholar] [CrossRef]
  34. Gharib, Z.; Bozorgi-Amiri, A.; Tavakkoli-Moghaddam, R.; Najafi, E. A cluster-based emergency vehicle routing problem in disaster with reliability. Sci. Iran. 2018, 25, 2312–2330. [Google Scholar] [CrossRef] [Green Version]
  35. Jiang, L.; Wang, H.; Ding, B. Disruption management recovery model of distribution delay with service priority. Asian Soc. Sci. 2013, 9, 170. [Google Scholar] [CrossRef] [Green Version]
  36. Adedeji, P.A.; Akinlabi, S.; Madushele, N.; Olatunji, O.O. Wind turbine power output very short-term forecast: A comparative study of data clustering techniques in a PSO-ANFIS model. J. Clean. Prod. 2020, 254, 120135. [Google Scholar] [CrossRef]
  37. Mahdevari, S.; Khodabakhshi, M.B. A hybrid PSO-ANFIS model for predicting unstable zones in underground roadways. Tunn. Undergr. Space Technol. 2021, 117, 104167. [Google Scholar] [CrossRef]
  38. Kisi, O.; Zounemat-Kermani, M. Suspended sediment modeling using neuro-fuzzy embedded fuzzy c-means clustering technique. Water Resour. Manag. 2016, 30, 3979–3994. [Google Scholar] [CrossRef]
  39. Chu, H.-J. The Muskingum flood routing model using a neuro-fuzzy approach. KSCE J. Civ. Eng. 2009, 13, 371–376. [Google Scholar] [CrossRef]
  40. Sedighi, M.; Ghasemi, M.; Mohammadi, M.; Hassan, S.H. A novel application of a neuro–fuzzy computational technique in modeling of thermal cracking of heavy feedstock to light olefin. RSC Adv. 2014, 4, 28390–28399. [Google Scholar] [CrossRef]
  41. Akkaya, E. ANFIS based prediction model for biomass heating value using proximate analysis components. Fuel 2016, 180, 687–693. [Google Scholar] [CrossRef]
  42. Taherdangkoo, M.; Bagheri, M.H. A powerful hybrid clustering method based on modified stem cells and Fuzzy C-means algorithms. Eng. Appl. Artif. Intell. 2013, 26, 1493–1502. [Google Scholar] [CrossRef]
  43. Fattahi, H. Adaptive neuro fuzzy inference system based on fuzzy c–means clustering algorithm, a technique for estimation of TBM penetration rate. Iran Univ. Sci. Technol. 2016, 6, 159–171. [Google Scholar]
  44. Bezdek, J.C.; Ehrlich, R.; Full, W. FCM: The fuzzy c-means clustering algorithm. Comput. Geosci. 1984, 10, 191–203. [Google Scholar] [CrossRef]
  45. Iida, Y. Basic concepts and future directions of road network reliability analysis. J. Adv. Transp. 1999, 33, 125–134. [Google Scholar] [CrossRef]
  46. Rao, R.V.; Padmanabhan, K.K. Rapid prototyping process selection using graph theory and matrix approach. J. Mater. Process. Technol. 2007, 194, 81–88. [Google Scholar] [CrossRef]
  47. Mohaghar, A.; Fagheyi, M.S.; Moradi-Moghadam, M.; Ahangari, S.S. Integration of fuzzy GTMA and logarithmic fuzzy preference programming for supplier selection. Rep. Opin. 2013, 5, 9–16. [Google Scholar]
  48. Geetha, N.; Sekar, P. Graph Theory Matrix Approach A Review. Indian J. Sci. Technol. 2016, 9, 1–4. [Google Scholar] [CrossRef] [Green Version]
  49. Baykasoglu, A. A review and analysis of “graph theoretical-matrix permanent” approach to decision making with example applications. Artif. Intell. Rev. 2014, 42, 573–605. [Google Scholar] [CrossRef]
  50. Tofighi, S.; Torabi, S.A.; Mansouri, S.A. Humanitarian logistics network design under mixed uncertainty. Eur. J. Oper. Res. 2016, 250, 239–250. [Google Scholar] [CrossRef] [Green Version]
  51. Zhou, Z.; Chu, F.; Che, A.; Zhou, M. e-Constraint and Fuzzy Logic-Based Optimization of Hazardous Material Transportation via Lane Reservation. IEEE Trans. Intell. Transp. Syst. 2013, 14, 847–857. [Google Scholar] [CrossRef]
  52. Esmaili, M.; Amjady, N.; Shayanfar, H.A. Multi-objective congestion management by modified augmented ε-constraint method. Appl. Energy 2011, 88, 755–766. [Google Scholar] [CrossRef]
  53. Mavrotas, G. Effective implementation of the ε-constraint method in Multi-Objective Mathematical Programming problems. Appl. Math. Comput. 2009, 213, 455–465. [Google Scholar] [CrossRef]
  54. Rabbani, M.; Khalili, S.; Janani, H.; Shiripour, M. Optimization of a dynamic supply portfolio considering risks and discount’s constraints. J. Ind. Eng. Manag. 2014, 7, 218–253. [Google Scholar] [CrossRef] [Green Version]
  55. Azadeh, A.; Sheikhalishahi, M.; Khalili, S.M.; Firoozi, M. An integrated fuzzy simulation–fuzzy data envelopment analysis approach for optimum maintenance planning. Int. J. Comput. Integr. Manuf. 2014, 27, 181–199. [Google Scholar] [CrossRef]
  56. Jiménez, M.; Arenas, M.; Bilbao, A.; Rodrı, M.V. Linear programming with fuzzy parameters: An interactive method resolution. Eur. J. Oper. Res. 2007, 177, 1599–1609. [Google Scholar] [CrossRef]
  57. Pishvaee, M.S.; Torabi, S.A. A possibilistic programming approach for closed-loop supply chain network design under uncertainty. Fuzzy Sets Syst. 2010, 161, 2668–2683. [Google Scholar] [CrossRef]
  58. Rahimi, Y.; Tavakkoli-Moghaddam, R.; Mohammadi, M.; Sadeghi, M. Multi-objective hub network design under uncertainty considering congestion: An M/M/c/K queue system. Appl. Math. Model. 2016, 40, 4179–4198. [Google Scholar] [CrossRef]
  59. Yager, R.R. Ranking Fuzzy Subsets over the Unit Interval. In Proceedings of the 1978 IEEE Conference on Decision and Control Including the 17th Symposium on Adaptive Processes, San Diego, CA, USA, 10–12 January 1979; pp. 1435–1437. [Google Scholar]
  60. Baccouche, M.; Boukachour, J.; Benabdelhafid, A.; Benaissa, M. Scheduling aircraft landing: Hybrid Genetic Algorithm Approach. In Proceedings of the Vth International Meeting for Research in Logistics, Fortaleza, Brazil, 2004. [Google Scholar]
  61. Hajipour, V.; Tavana, M.; Santos-Arteaga, F.J.; Alinezhad, A.; Di Caprio, D. An efficient controlled elitism non-dominated sorting genetic algorithm for multi-objective supplier selection under fuzziness. J. Comput. Des. Eng. 2020, 7, 469–488. [Google Scholar] [CrossRef]
  62. Salari, S.A.-S.; Mahmoudi, H.; Aghsami, A.; Jolai, F.; Jolai, S.; Yazdani, M. Off-Site Construction Three-Echelon Supply Chain Management with Stochastic Constraints: A Modelling Approach. Buildings 2022, 12, 119. [Google Scholar] [CrossRef]
  63. Safaeian, M.; Fathollahi-Fard, A.M.; Kabirifar, K.; Yazdani, M.; Shapouri, M. Selecting Appropriate Risk Response Strategies Considering Utility Function and Budget Constraints: A Case Study of a Construction Company in Iran. Buildings 2022, 12, 98. [Google Scholar] [CrossRef]
  64. Bhadoria, A.; Marwaha, S. Moth flame optimizer-based solution approach for unit commitment and generation scheduling problem of electric power system. J. Comput. Des. Eng. 2020, 7, 668–683. [Google Scholar] [CrossRef]
  65. Goodarzian, F.; Abraham, A.; Ghasemi, P.; Mascolo, M.D.; Nasseri, H. Designing a green home healthcare network using grey flexible linear programming: Heuristic approaches. J. Comput. Des. Eng. 2021, 8, 1468–1498. [Google Scholar] [CrossRef]
  66. Islam, M.R.; Ali, S.M.; Fathollahi-Fard, A.M.; Kabir, G. A novel particle swarm optimization-based grey model for the prediction of warehouse performance. J. Comput. Des. Eng. 2021, 8, 705–727. [Google Scholar] [CrossRef]
  67. Yazdani, M.; Jolai, F. Lion optimization algorithm (LOA): A nature-inspired metaheuristic algorithm. J. Comput. Des. Eng. 2016, 3, 24–36. [Google Scholar] [CrossRef] [Green Version]
  68. Rao, R.V.; Keesari, H.S. A self-adaptive population Rao algorithm for optimization of selected bio-energy systems. J. Comput. Des. Eng. 2020, 8, 69–96. [Google Scholar] [CrossRef]
  69. Tavasoli, N.; Rezaee, K.; Momenzadeh, M.; Sehhati, M. An ensemble soft weighted gene selection-based approach and cancer classification using modified metaheuristic learning. J. Comput. Des. Eng. 2021, 8, 1172–1189. [Google Scholar] [CrossRef]
  70. Yazdani, M.; Kabirifar, K.; Frimpong, B.E.; Shariati, M.; Mirmozaffari, M.; Boskabadi, A. Improving construction and demolition waste collection service in an urban area using a simheuristic approach: A case study in Sydney, Australia. J. Clean. Prod. 2021, 280, 124138. [Google Scholar] [CrossRef]
  71. Zhao, W.; Shi, T.; Wang, L.; Cao, Q.; Zhang, H. An adaptive hybrid atom search optimization with particle swarm optimization and its application to optimal no-load PID design of hydro-turbine governor. J. Comput. Des. Eng. 2021, 8, 1204–1233. [Google Scholar] [CrossRef]
  72. Deb, K.; Pratap, A.; Agarwal, S.; Meyarivan, T. A fast and elitist multi-objective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 2002, 6, 182–197. [Google Scholar] [CrossRef] [Green Version]
  73. Yang, X.-S. Multi-objective firefly algorithm for continuous optimization. Eng. Comput. 2013, 29, 175–184. [Google Scholar] [CrossRef] [Green Version]
  74. Mokhtarimousavi, S.; Rahami, H.; Kaveh, A. Multi-objective mathematical modeling of aircraft landing problem on a runway in static mode, scheduling and sequence determination using NSGA-II. Iran Univ. Sci. Technol. 2015, 5, 21–36. [Google Scholar]
  75. Yang, X.-S. Firefly Algorithms for Multimodal Optimization BT—Stochastic Algorithms: Foundations and Applications; Watanabe, O., Zeugmann, T., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 169–178. [Google Scholar]
  76. Rahmani, A.; MirHassani, S.A. A hybrid Firefly-Genetic Algorithm for the capacitated facility location problem. Inf. Sci. 2014, 283, 70–78. [Google Scholar] [CrossRef]
  77. Fister Jr, I.; Perc, M.; Kamal, S.M.; Fister, I. A review of chaos-based firefly algorithms: Perspectives and research challenges. Appl. Math. Comput. 2015, 252, 155–165. [Google Scholar] [CrossRef]
  78. Simić, D.; Kovačević, I.; Svirčević, V.; Simić, S. Hybrid firefly model in routing heterogeneous fleet of vehicles in logistics distribution. Log. J. IGPL 2015, 23, 521–532. [Google Scholar] [CrossRef]
  79. Apostolopoulos, T.; Vlachos, A. Application of the firefly algorithm for solving the economic emissions load dispatch problem. Int. J. Comb. 2010, 2011, 523806. [Google Scholar] [CrossRef] [Green Version]
  80. Bacanin, N.; Tuba, M. Firefly algorithm for cardinality constrained mean-variance portfolio optimization problem with entropy diversity constraint. Sci. World J. 2014, 2014, 721521. [Google Scholar] [CrossRef]
  81. Xiao, L.; Shao, W.; Wang, C.; Zhang, K.; Lu, H. Research and application of a hybrid model based on multi-objective optimization for electrical load forecasting. Appl. Energy 2016, 180, 213–233. [Google Scholar] [CrossRef]
  82. Hidalgo-Paniagua, A.; Vega-Rodríguez, M.A.; Ferruz, J.; Pavón, N. Solving the multi-objective path planning problem in mobile robotics with a firefly-based approach. Soft Comput. 2017, 21, 949–964. [Google Scholar] [CrossRef]
  83. Schott, J.R. Fault Tolerant Design Using Single and Multicriteria Genetic Algorithm Optimization. Ph.D. Thesis, Massachusetts Institute of Technology, Cambridge, MA, USA, 1995. [Google Scholar]
  84. Zitzler, E.; Thiele, L. Multi-objective evolutionary algorithms: A comparative case study and the strength Pareto approach. IEEE Trans. Evol. Comput. 1999, 3, 257–271. [Google Scholar] [CrossRef] [Green Version]
Figure 1. The research strategy by visual narrative.
Figure 1. The research strategy by visual narrative.
Buildings 12 00414 g001
Figure 2. ANFIS Structures.
Figure 2. ANFIS Structures.
Buildings 12 00414 g002
Figure 3. Criteria and sub-criteria framework for GT-MP-DM, adopted from [49].
Figure 3. Criteria and sub-criteria framework for GT-MP-DM, adopted from [49].
Buildings 12 00414 g003
Figure 4. A schematic sample of the problem.
Figure 4. A schematic sample of the problem.
Buildings 12 00414 g004
Figure 5. The objective function values and fuzzy objective made by decision-makers.
Figure 5. The objective function values and fuzzy objective made by decision-makers.
Buildings 12 00414 g005
Figure 6. The best values of the augmented ε-constraint method, NSGA-II and MOFA.
Figure 6. The best values of the augmented ε-constraint method, NSGA-II and MOFA.
Buildings 12 00414 g006
Figure 7. CPU time of the augmented ε-constraint method compared to the multi-objective firefly algorithm (MOFA).
Figure 7. CPU time of the augmented ε-constraint method compared to the multi-objective firefly algorithm (MOFA).
Buildings 12 00414 g007
Figure 8. Comparison of NSGAII and MOFA based on to the spacing metric.
Figure 8. Comparison of NSGAII and MOFA based on to the spacing metric.
Buildings 12 00414 g008
Figure 9. NSGAII and MOFA comparison based on the diversity metric.
Figure 9. NSGAII and MOFA comparison based on the diversity metric.
Buildings 12 00414 g009
Figure 10. NSGAII and MOFA comparison based on the number of Pareto solutions.
Figure 10. NSGAII and MOFA comparison based on the number of Pareto solutions.
Buildings 12 00414 g010
Figure 11. NSGA-II vs. MOFA in terms of solution time.
Figure 11. NSGA-II vs. MOFA in terms of solution time.
Buildings 12 00414 g011
Table 1. A numerical illustration of affected point clustering using the ANFIS-FCM method.
Table 1. A numerical illustration of affected point clustering using the ANFIS-FCM method.
Affected
Points
Road SlopeWeather Conditions in Disaster SituationsIntensity of DisasterPopulation DensityRoad RiskDistance from Vehicle Depot 1 (Truck) KmDistance from Vehicle Depot 2 (Truck) KmDistance from Airport (Helicopter) KmWidth Road
(m)
Cluster No.
1HighBadVery great206High90837992
2MediumGoodGreat354Medium11162191
3MediumGoodGreat452Medium11121791
4LowgoodGreat453Low1062131
5HighBadGreat501Medium10162192
6MediumNormalGreat503Medium201714132
7MediumNormalGreat505Medium10141992
8HighBadVery great804Medium71737992
9LowgoodVery great852Low1164131
10HighNormalVery great903Medium697277132
11MediumNormalMedium1021Medium8151891
12HighBadMedium1205Medium9152092
13MediumgoodMedium1211Medium7141791
14HighBadVery great1326Medium697479132
15LowgoodGreat1418Low51114131
16LowNormalGreat2055Low1261191
17HighBadVery great2594High79726692
18LowNormalVery great2763Low1060131
19LowNormalVery great3112Low1491291
20LowNormalGreat7780Medium2751691
Table 2. Quantitative scores of alternatives.
Table 2. Quantitative scores of alternatives.
Qualitative MeasureCrisp ScoreQualitative MeasureCrisp Score
Exceptionally Low0Above average6
Extremely Low1High7
Very Low2Very high8
Low3Extremely high9
Below average4Exceptionally high10
Average5
Table 3. The relative importance of criteria.
Table 3. The relative importance of criteria.
Class Definition 𝓇 𝒾 𝒿 𝓇 𝒿 𝒾   =   1     𝓇 𝒾 𝒿
Two criteria equally important0.50.5
One criterion is slightly more important than others0.60.4
One criterion more important than others0.70.3
One criterion very important than others0.80.2
One criterion exceptionally important than others0.90.1
One criterion most important, other not important1.00.0
Table 4. The best values of the augmented ε-constraint method, NSGA-II and MOFA.
Table 4. The best values of the augmented ε-constraint method, NSGA-II and MOFA.
(Problem No.,
Depots,
Affected Areas)
Augmented ε-Constraint NSGA-II Gap (%)MOFA Gap (%)
( O F 1 , O F 2 ,   O F 3 ) Time ( O F 1 , O F 2 ,   O F 3 ) Time ( O F 1 , O F 2 ,   O F 3 ) ( O F 1 , O F 2 ,   O F 3 ) Time ( O F 1 , O F 2 ,   O F 3 )
(1, 2, 5)(24.7, 3.4, 13.1)147(24.8, 3.4, 13.2)249(0.004, 0.000, 0.008)(24.7, 3.4, 13.1)387(0.00, 0.00, 0.00)
(2, 3, 10)(27.4, 4.7, 14.2)261(27.9, 4.4, 14.4)327(0.018, 0.064, 0.014)(27.4, 4.7, 14.2)492(0.00, 0.00, 0.00)
(3, 4, 9)(28.9, 3.8, 14.9)392(30.1, 3.7, 15.6)586(0.042, 0.026, 0.047)(29.3, 3.7, 15.4)719(0.014, 0.026, 0.034)
(4, 3, 12)(30.7, 6.1, 16.8)504(31.2, 5.5, 17.5)765(0.016, 0.098, 0.042)(30.9, 5.8, 17.1)963(0.007, 0.049, 0.018)
(5, 5, 14)(34.1, 6.4, 15.3)793(35.9, 6.1, 16)980(0.053, 0.047, 0.046)(35, 6, 15.9)1104(0.026, 0.063, 0.039)
(6, 6, 15)(43.6, 5.7, 16.1)947(56.2, 5.3, 16.6)1297(0.060, 0.070, 0.031)(45.9, 5.4, 16.7)1284(0.053, 0.053, 0.037)
(7, 7, 17)(48.2, 6.2, 15.8)1297(51, 5.9, 16.4)1753(0.058, 0.048, 0.038)(49.3, 5.8, 16.2)1403(0.023, 0.065, 0.025)
(8, 8, 18)(56, 8.1, 14.2)1696(58.2, 7.7, 14.9)2102(0.039, 0.049, 0.049)(58.4, 7.7, 14.5)1883(0.043, 0.049, 0.021)
(9, 9, 19)(-, -, -)-(69.8, 8.4, 17.3)2683(-, -, -)(70.1, 8.3, 17)2292(-, -, -)
(10, 10, 21)(-, -, -)-(81, 9.6, 16.8)3103(-, -, -)(80.8, 9.8, 17.1)2841(-, -, -)
Average(36.7, 5.55, 15.05)754.625(45.61, 6, 15.87)1093.8(3.58, 5.06, 3.22)(45.18, 6.06, 15.72)1336.8(1.75, 3.64, 2.19)
Table 5. Characteristics of generated sample problems.
Table 5. Characteristics of generated sample problems.
Problem No.HelicopterTruckVehicle DepotImpacted Area in Cluster 2Impacted Area in Cluster 1
123657
2236710
3248915
4247716
5357818
6368820
73681024
84591125
94791530
105791633
115992035
1259103040
13510123045
14510153550
Table 6. The failure times and fuzzy demand for vehicles under different scenarios.
Table 6. The failure times and fuzzy demand for vehicles under different scenarios.
d e m i ˜ Vehicle
d e m ˜ = d e m 1 , d e m 2 , d e m 3 54321scenario
(20, 46, 75)1016137101
(25, 50, 80)109144202
(30, 53, 95)1681116103
(35, 60, 100)1020710104
(45, 70, 120)810910155
Table 7. Values of evaluations metrics for NSGAII and MOFA.
Table 7. Values of evaluations metrics for NSGAII and MOFA.
Problem No.NSGA-IIFirefly
SMDMNOPSRun TimeSMDMNOPSRun Time
10.9147.288176120.59227.637114645
20.71455.655967540.80385.12459763
31.01766.9782610210.99465.532410998
40.35577.5087812130.4657.151281168
50.99683.8052616270.4996.916671455
60.55474.87811218710.62643.411791666
71.0853.1801525800.48333.038792224
80.56124.9553629151.05064.179782443
90.90635.6559839870.43968.4969143496
100.7267.9399757580.73316.4724115404
110.86146.7129771080.80547.9225146337
120.59167.8599610,0490.41647.4799118223
Average0.77376.034973291.83330.65916.113610.3333391.0351
Table 8. Sensitivity analysis of the changes in vehicle capacity and demand functions simultaneously.
Table 8. Sensitivity analysis of the changes in vehicle capacity and demand functions simultaneously.
Capacity Demand
0.70.80.911.11.21.3
O F 1 O F 2 O F 3 O F 1 O F 2 O F 3 O F 1 O F 2 O F 3 O F 1 O F 2 O F 3 O F 1 O F 2 O F 3 O F 1 O F 2 O F 3 O F 1 O F 2 O F 3
0.743.65.712.943.65.714.245.25.616.748.25.617.750.15.418.454.35.319.259.45.220.2
0.843.65.712.943.65.714.243.65.715.444.95.616.946.35.517.848.75.318.255.15.219.5
0.943.65.712.943.65.714.243.65.715.443.65.716.146.55.717.1475.617.851.35.418.8
143.65.712.943.65.714.243.65.715.443.65.716.143.65.716.447.15.717.349.75.618.3
1.143.65.712.943.65.714.243.65.715.443.65.716.143.65.716.443.65.717.346.55.618
1.243.65.712.943.65.714.243.65.715.443.65.716.143.65.716.443.65.717.343.65.717.7
1.343.65.712.943.65.714.243.65.715.443.65.716.143.65.716.443.65.717.343.65.717.7
Table 9. Sensitivity analysis of the changes mean of vehicle damage time.
Table 9. Sensitivity analysis of the changes mean of vehicle damage time.
Mean of Vehicle’s Damage Time0.30.40.50.60.70.80.911.11.21.31.41.5
O F 1 51.851.650.949.34944.643.843.643.440.239.539.337.2
O F 2 5.25.25.35.45.45.65.75.75.75.85.85.85.9
O F 3 19.319.319.419.118.517.81716.115.314.714.113.913.9
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Gharib, Z.; Tavakkoli-Moghaddam, R.; Bozorgi-Amiri, A.; Yazdani, M. Post-Disaster Temporary Shelters Distribution after a Large-Scale Disaster: An Integrated Model. Buildings 2022, 12, 414. https://doi.org/10.3390/buildings12040414

AMA Style

Gharib Z, Tavakkoli-Moghaddam R, Bozorgi-Amiri A, Yazdani M. Post-Disaster Temporary Shelters Distribution after a Large-Scale Disaster: An Integrated Model. Buildings. 2022; 12(4):414. https://doi.org/10.3390/buildings12040414

Chicago/Turabian Style

Gharib, Zahra, Reza Tavakkoli-Moghaddam, Ali Bozorgi-Amiri, and Maziar Yazdani. 2022. "Post-Disaster Temporary Shelters Distribution after a Large-Scale Disaster: An Integrated Model" Buildings 12, no. 4: 414. https://doi.org/10.3390/buildings12040414

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop