Robust - Design - Mathematics 11 03902 v2
Robust - Design - Mathematics 11 03902 v2
Article
Robust Design Problem for Multi-Source Multi-Sink Flow
Networks Based on Genetic Algorithm Approach
Sahbi Boubaker 1, * , Noha Hamdy Radwan 2 , Moatamad Refaat Hassan 2 , Faisal S. Alsubaei 3 ,
Ahmed Younes 4,5 and Hameda A. Sennary 2
1 Department of Computer & Network Engineering, College of Computer Science and Engineering,
University of Jeddah, Jeddah 21959, Saudi Arabia
2 Department of Mathematics and Computer Science, Faculty of Science, Aswan University,
Aswan 81528, Egypt; [email protected] (M.R.H.); [email protected] (H.A.S.)
3 Department of Cybersecurity, College of Computer Science and Engineering, University of Jeddah,
Jeddah 23218, Saudi Arabia; [email protected]
4 Department of Computer Science, College of Applied Studies and Community Service, Imam Abdulrahman
bin Faisal University, Dammam 34212, Saudi Arabia; [email protected]
5 Department of Computer Science, Faculty of Computer and Artificial Intelligence, Sohag University,
Sohag 82524, Egypt
* Correspondence: [email protected]
Abstract: Robust design problems in flow networks involve determining the optimal capacity assign-
ments that enable the network to operate effectively even in the case of events’ occurrence such as arcs
or nodes’ failures. Multi-source multi-sink flow networks (MMSFNs) are frequent in many real-life
systems such as computer and telecommunication, logistics and supply-chain, and urban traffic. Al-
though numerous studies on the design of MMSFNs have been conducted, the robust design problem
for multi-source multi-sink stochastic-flow networks (MMSFNs) remains unexplored. To contribute
to this field, this study addresses the robust design problem for MMSFNs using an approach of two
steps. First, the problem is mathematically formulated as an optimization problem and second, a
sub-optimal solution is proposed based on a genetic algorithm (GA) involving two components. The
Citation: Boubaker, S.; Radwan, first component, an outer genetic algorithm, is employed to search the optimal capacity assigned to
N.H.; Refaat Hassan, M.; Alsubaei, the network components with minimum sum. The second component, an inner genetic algorithm,
F.S.; Younes, A.; Sennary, H.A. Robust is used to find the optimal flow vectors that maximize the system’s reliability. Through extensive
Design Problem for Multi-Source experimentation on three different networks with different topologies, the proposed solution has
Multi-Sink Flow Networks Based on been found to be efficient.
Genetic Algorithm Approach.
Mathematics 2023, 11, 3902. https://
Keywords: flow network; robust design; MMSFNs; reliability optimization; genetic algorithm
doi.org/10.3390/math11183902
In order to carefully cope with the problems usually faced during the design phase of
a network, this study’s main contributions are the formulation of the robust design problem
for MMSFNs and its sub-optimal solution using efficient mathematical tools and proposing
suitable algorithms. The solution of the problem is built around the concept of robustness
defined as the ability of a network to operate even under uncertainties and failures. In
addition, an approach based on genetic algorithms (GAs) is developed to solve the problem
in MMSFNs by minimizing the sum of arcs capacities and searching for the best set of flow
vectors that check the conditions and achieve maximum reliability. The proposed approach
is illustrated through three networks having different topologies to show its efficiency. To
the best of the authors’ knowledge, this study is the first that considers the concept of
robustness in the design problem of MMSFNs.
The remaining parts of this paper are organized as follows: in Section 2, materials and
methods including the structural analysis, problem formulation, the proposed approach
for solving the problem, and the whole algorithm are presented in Section 2. The results
and discussion are provided in Section 3. Finally, Section 4 concludes the paper.
2.2. Assumptions
• The flow conservation law must apply to the flow network.
• The arcs have capacities that are statistically independent.
• The capacity of an arc is an integer-valued random variable, which takes values
0 < 1 < 2<. . .< Me according to a given distribution.
• The flow along a path does not exceed its maximum capacity of that path.
• Critical edge
The arc ai is said to be critical if Si = 1. The network reliability Rs is zero if and only if
ai has zero capacity [15].
• The capacity assignment
In a single-source single-sink network, the maximum capacity Mi of ai ranges from 0
to the demand value. However, in MMSFNs, there are multiple demands requested by the
sinks. As a result, the following expression is proposed here to set Mi values.
Let Ei = ∑ sdw,j ai ∈ MPi,j , then 0 ≤ Mi ≤ Ei + δ, δ ∈ [0, N ], N is a positive integer.
If ai is a critical edge, then Mi should not be less than Ei .
• Probabilities for each edge
The probability for the current capacity γ (0 ≤ γ ≤ Mi ) for ai , Pr{ γ}:
Mi γ
Pr{γ} = r ( 1 − r i ) Mi − γ (2)
γ i
Minimize S (3)
Mathematics 2023, 11, 3902 5 of 16
Maximize RS (4)
where S = ∑inc Mi refers to the sum of assigned capacities and Rs is the corresponding
system reliability.
θ ki,j
∑ ∑ fi,j,k,w ≤ srw,i , w = 1, . . . , m; i = 1, . . . , σ (6)
j=1 k=1
xl ≤ Ml l = 1, . . . , nc (7)
where,
σ θ ki,j m n o
xl = ∑∑ ∑ ∑ fi,j,k,w al MPi,j,k (8)
i=1 j=1 k=1 w=1
Initial Population
The initial population is the first step in the genetic algorithm (GA) and consists of a
set of random potential solutions. Each solution is symbolized by a chromosome. Typically,
this initial population is generated randomly to produce a range of possible solutions [26].
Although random initialization may allow diversification of solutions over the search space,
other initialization methods such as pre-defined known solutions can be used.
Fitness Function
The fitness function is the heart of a genetic algorithm. This function makes it possible
to evaluate a given individual solution and determine how well it satisfies the optimization
criterion that the algorithm is developed for. The sum of the assigned capacities (S ) for the
ith individual is selected to be the fitness function of this candidate solution, i.e., f it(1) = S .
To normalize the fitness function for each individual i, the calculated value is divided by the
total sum of all fitnesses (∑i f it(1)) in the population. The following Algorithm 1 outlines
how to calculate the fitness for the ith solution in the population:
Mathematics 2023, 11, 3902 6 of 16
Selection
The selection process is one of the important steps in genetic algorithms, used to
choose individuals based on their fitness value. Chromosomes with higher fitness values
are more likely to be selected for reproduction, while those with lower values have a lower
chance of being selected. In other words, the probability of a chromosome being chosen for
reproduction is proportional to its fitness value [27].
This study employs the roulette wheel selection method, a widely adopted technique
in genetic algorithms to identify promising individuals for the crossover and mutation
process (Algorithm 2). In the roulette wheel selection, like all other selection methods,
each prospective solution is assigned a solution through the fitness function. This measure
of physical fitness determines the likelihood of an individual’s selection. Solutions with
superior fitness have a higher probability of being selected, while inferior solutions may
still have the opportunity to endure through the selection process. This characteristic may
incorporate certain elements that could prove advantageous in subsequent recombination
processes. In this study, the roulette wheel mechanism employed for parent selection relies
on the cumulative sum of the respective individual’s fitness values.
Crossover
Crossover is a genetic operator that combines two chromosomes to produce a new
chromosome. The idea behind crossover is that the new chromosome may inherit the best
characteristics from each of the parent chromosomes.
In this study, a one-point crossover operator that randomly chooses one crossover
point is used. The process involves copying everything before this point from the first
parent and everything after the crossover points from the second parent, as follows [28].
h iα h inc h iα h inc
MC = M p1 ( j) + M p2 ( j) MD = M p2 ( j) + M p1 ( j) (10)
j =1 j = α +1 j =1 j = α +1
Mathematics 2023, 11, 3902 7 of 16
where MC and MD are the children and M p1 and M p2 parents selected based on Mc1 value
and α is the random cut-point.
Mutation
Mutation represents the final mechanism of evolution, wherein one or multiple genes un-
dergo genetic variation and are subsequently transmitted to offspring for potential adaptation.
The genetic algorithm (GA) typically employs a low mutation rate to maintain its functionality
since high rates of mutation may lead to a less efficient and more rudimentary random search
process (Algorithm 3). The introduction of the mutation operator in the algorithm adds
an additional level of randomness, thereby preserving the diversity of the population. The
utilization of the genetic algorithm (GA) technique is fruitful in circumventing the emergence
of analogous solutions and escalating the likelihood of evading local solutions [29].
FindtheoptimalsetofX
s.t.
RS ismaximized
The equations needed to solve flow vectors searching problem are given in Section 2.4.2.
Representation
The chromosome F is represented by a series of length (NF), where (NF) refers to the
number resulting from multiplying a number to the minimal path (np) and the number of
resources (m) ( f 1,1,1,1 , f 1,1,2,1 , . . ., f i,j,ki,j, 1 , . . ., f i,j,ki,j ,m , . . ., f σ,θ,kσ,θ ,m ).
Fitness Function
The following Algorithm 4 shows how to calculate the fitness for each solution (i) in the
population, where X i corresponds to Fi , and each Fi satisfies Equations (5)–(7) presented
in Section 2.4.2.
Selection
We used the roulette wheel mechanism in this work to select two parents (Algorithm 5).
Mathematics 2023, 11, 3902 8 of 16
Crossover
One-point crossover is used to generate new offspring for F as follows.
h iα h i NF h iα h i NF
FC = Fp1 ( j) + Fp2 ( j) FD = Fp2 ( j) + Fp1 ( j) (11)
j =1 j = α +1 j =1 j = α +1
where FC and FD are the new vectors generated by pairing up Fp1 and Fp2 based on Mc2
value and α is the random cut-point.
Mutation
A proposed a mutation mechanism to improve the flow vector F based on Mu2 is
provided as follows (Algorithm 6):
Evaluating Rs
If X 1 , X 2 , . . . , X NP2 represent the generated set of capacity vectors that correspond to
the flow vectors, then by removing the non-minimal ones in X 1 , X 2 , . . . , X NP2 , we obtain all
lower boundary points if the network is cyclic (as discussed in, [30]). Next, if X 1 , X 2 , . . . , X l
are all lower boundary points, then the system reliability RS is calculated by Equation (12).
l n o
Z Z ≥ Xi
[
RS = pr (12)
i =1
𝑅the=system {𝑍 𝑍 ≥ 𝑋 }
𝑝𝑟reliability (12)
all lower
all lower
boundary
boundary
points,
points,
then then
the system 𝑅 is𝑅calculated
reliability is calculated
by Equation
by Equation
(12). (12).
𝑝𝑟{𝑍} = 𝑝𝑟{𝑧 }. 𝑝𝑟{𝑧 }. … . 𝑝𝑟{𝑧 }. Then, we use the recursive sum of disjoint prod-
Mathematics 2023, 11, x FOR PEER REVIEW 𝑅 =𝑅𝑝𝑟= 𝑝𝑟{𝑍 𝑍 {𝑍 ≥ 𝑍𝑋 ≥} 𝑋 } 9 of(12)
17 (12)
ucts (RSDP) procedure presented in [31].
when TM = pr{Z ≥ X }
Mathematics 2023, 11, 3902 𝑝𝑟{𝑍}𝑝𝑟{𝑍} = 𝑝𝑟{𝑧 = 𝑝𝑟{𝑧 }. 𝑝𝑟{𝑧 }. 𝑝𝑟{𝑧
}. … . }. 𝑝𝑟{𝑧
… . 𝑝𝑟{𝑧 }. Then, }. Then,
we use we theuserecursive
the recursive sum sumof disjoint
of disjointprod- 9 of 16
prod-
Mathematics
Mathematics
2023, 2023,
11, x FOR
11, x PEER
FOR PEER
REVIEW REVIEW , }, 9 of 17 9 of 17
ucts ucts
(RSDP)
Evaluating (RSDP)
Rsprocedure and TM
procedure presented = pr{Zin≥[31].
presented }
Xin − [31].pr ⋃ {Z ≥X for i ≥ 2
If 𝑋 , 𝑋 , … , 𝑋 represent when the when TM TM
= pr{Z
generated = set
pr{Z
≥ Xof≥ }capacity
X } vectors that correspond to
the flow vectors,pr { Z }then = pr by {zremoving
1 }.pr { z2 }the .pr zneq . Then,
. . . . non-minimal ones wein 𝑋use , 𝑋 the
, …i,recursive
𝑋 , we sum ofall disjoint
Evaluating
Evaluating and
Rs and TM =
Rs TM𝑅𝑠 pr{Z== 𝑝𝑟 ≥ X }≥−
pr{Z {𝑍Xpr } −⋃
𝑍 pr𝑋{Z
≥[31]. ⋃} = ≥{Z ,
X ≥},𝑇𝑀 ,
X }, for for
≥ 2i ≥ 2 obtain(13)
products (RSDP) procedure presented in
lower boundary points if the network is cyclic (as discussed in, [30]). Next, if 𝑋 , 𝑋 , … , 𝑋 are
all lower boundary If 𝑋 If, 𝑋points,
𝑋, … , 𝑋, 𝑋, … then , 𝑋represent
the system represent the generated
the generated
reliability 𝑅 nset ofsetcapacity
is calculated oof capacity
by vectors
Equationvectors
that that
correspond
(12). correspond to to
𝑍 =flow
If the 𝑧 , flow
the 𝑧vectors,
, … ,vectors,
𝑧 ,… then , 𝑧 then
by removingby removing
when the
TM non-minimal
the= non-minimal
pr Z ≥ 1 ones
ones
X in 𝑋 ,
in 𝑋𝑋 , …
, 𝑋 , 𝑋, … , 𝑋
, we ,obtain
we obtain
all all
𝑅𝑠 =𝑅𝑠 𝑝𝑟 n= 𝑝𝑟{𝑍 o 𝑍 {𝑍≥1 𝑍𝑋n≥} =𝑋 } n=𝑇𝑀 𝑇𝑀o (13) (13)
lowerlower boundary boundary points points
if theifnetwork the network is cyclic
is cyclic
(as discussed
i−1 (as discussed in, [30]).
in, [30]).
Next, Next,
if 𝑋 ,
if 𝑋𝑋 , …, 𝑋, 𝑋, … , 𝑋
are are
≥ Xi − ≥ Xj,i , for i ≥ 2
S
and TMi = pr 𝑅 Z = 𝑝𝑟system {𝑍pr 𝑋1 } Z
𝑍 ≥reliability (12)
all lower
all lower boundary boundary points, points,then then
the
𝑝𝑟(𝑍) the
= system j=
reliability
𝑝𝑟(𝑧 ) 𝑅 is𝑅calculated
is calculatedby Equation
by Equation (12). (12).
(14)
If 𝑍 If = 𝑍𝑧=, 𝑧 𝑧, …, 𝑧, 𝑧, … , …, 𝑧, 𝑧, … , 𝑧 l n o l
𝑝𝑟{𝑍} = 𝑝𝑟{𝑧 }. 𝑝𝑟{𝑧 }. … . 𝑝𝑟{𝑧 Rs =}.prThen, ∑
i recursive sum of disjoint prod-
[
weZuse
Z ≥ the
X =
𝑅 =𝑅𝑝𝑟= 𝑝𝑟{𝑍 𝑍 {𝑍 ≥ 𝑍𝑋 ≥}TM 𝑋 i} (13)
(12) (12)
ucts (RSDP) procedure presented in [31]. 𝑝𝑟(𝑍) i𝑝𝑟(𝑍)
=1= =𝑝𝑟(𝑧𝑝𝑟(𝑧 ) ) i =1 (14) (14)
2.6. The Whole Algorithm of the when Proposed Approach
= pr{Z ≥ X }
Z =𝑝𝑟{𝑍}
If𝑝𝑟{𝑍} =z1𝑝𝑟{𝑧
, z=2 , .𝑝𝑟{𝑧
. . 𝑝𝑟{𝑧
}. .}.. ,…zTM
, ze}., .𝑝𝑟{𝑧 . }.
𝑝𝑟{𝑧
neq … . 𝑝𝑟{𝑧 }. Then,}. Then,
we use we theuserecursive
the recursive sum sum of disjoint
of disjointprod- prod-
, },
Please
ucts seeucts
(RSDP) and
Algorithm
(RSDP) TM
procedure 7=
procedureforpr{Z the ≥
presented whole X }−
presented pr ⋃ [31].
inalgorithm
[31].
in {Z
neq
≥
of X
the proposed for i ≥ 2
approach.
2.6. The
2.6. Whole
The Whole Algorithm Algorithm of theofProposed the Proposed ApproachApproach =∏ } X }
when prTM
when ( Z ) TM
= pr{Z=prpr{Z
≥(zXe ) ≥ (14)
Algorithm 7: The whole algorithm of the proposed e=1approach
, }, , },
and 𝑅𝑠 TM
and =for TM
=
𝑝𝑟 pr{Z
= {𝑍pr{Z
≥𝑍X ≥ }algorithm
≥−X𝑋pr }}−=⋃pr {Z ≥{Z
⋃proposed
𝑇𝑀 Xproposed
≥ X approach.
for i for
≥ 2i ≥ 2(13)
StartPlease Please
see Algorithm
see Algorithm 7 for 7the whole
the wholealgorithm of the of the approach.
2.6. The Whole Algorithm of the Proposed Approach
Input the network information, such as minimal path, demand, resources, MG1, NP1,
Algorithm
Algorithm 7: The 7: whole
The whole algorithm algorithm of the ofproposed
the proposed ofapproach
the approach
NG1,If Cr1, 𝑧 , 𝑧 ,MG2,
𝑍 =Algorithm
Mu1, … , 𝑧7 ,shows
… , 𝑧 NG2,
NP2, the whole Cr2, algorithm
Mu2. proposed approach.
StartStart 𝑅𝑠 = 𝑅𝑠𝑝𝑟= 𝑝𝑟{𝑍 𝑍 {𝑍 ≥ 𝑍𝑋 ≥} =𝑋 } =𝑇𝑀 𝑇𝑀 (13) (13)
Start outer GA
InputInput
the network
Algorithmthe network information,
7: The information,
whole algorithmsuchsuch as minimal
of the asproposed
minimal path, path,
demand,
approach demand, resources,
resources, MG1,MG1, NP1,NP1,
Generate the initial population randomly
If 𝑍 =
If 𝑍 𝑧 = , 𝑧 𝑧, … , 𝑧, 𝑧, …, … , 𝑧 , 𝑧 , … 𝑝𝑟(𝑍)
, 𝑧
with size
= 𝑝𝑟(𝑧𝑁𝑃1. ) (14)
NG1,NG1,Cr1,
Start Cr1,
Mu1, Mu1,
MG2, MG2,
NP2, NP2,
NG2, NG2,
Cr2, Cr2,
Mu2. Mu2.
Evaluate the initial population.
StartStart
outerouter GA networkGA
While Input ℊ ≤the 𝑀𝐺1, do information, such as minimal path, demand, resources, MG1, NP1, NG1, Cr1,
GenerateMu1,
Generate theMG2, theNP2,
initial initial NG2,
population Cr2, Mu2.
population randomly randomly with
𝑝𝑟(𝑍) with
size
= size
𝑝𝑟(𝑍) 𝑁𝑃1.
=𝑝𝑟(𝑧 𝑁𝑃1. )
𝑝𝑟(𝑧 ) (14) (14)
While
2.6. The Ᵽ ≤ outer
Whole 𝑁𝑃1, GAGenerate
do
EvaluateStart
Evaluatethe Algorithm
initial
the initial ofpopulation.
population. thethe Proposed Approach randomly with size NP1.
initial population
Select Evaluate
two chromosomes.
While While ℊ ≤ 𝑀𝐺1, ℊ the≤ 𝑀𝐺1, initial population.
do do
Generate
Please
While new
see offspring
ℊ Algorithm
≤ MG1, doafter 7 forapplying
the whole crossover
algorithm and of mutation.
the proposed approach.
While WhileⱣ
2.6.
While
≤
Ᵽ= The𝑁𝑃1,
Ᵽ
2.6. ≤
Ᵽ Whole
+The
≤
𝑁𝑃1,
do
1NP1,Whole do
Algorithm
do Algorithm of theofProposed the Proposed ApproachApproach
Select
end Select
do
Algorithmtwo chromosomes.
Select two
7:twoThe chromosomes.
chromosomes.
whole algorithm of the proposed approach
Generate
Generate new
Generate Please
Evaluate the current new
offspring
Please
new seeoffspring
seeafter
Algorithm
offspring
population. after
applying
Algorithm
after applying
7applying
for7the crossover
for crossover
whole
the whole
crossover and
algorithm
and mutation.
and
algorithm mutation.
mutation.of the ofproposed
the proposed approach.
approach.
Start
Ᵽ=Ᵽ+ == 1Ᵽ + + 11
Save the
Input thebestnetwork solution to M.
information, such as minimal path, demand, resources, MG1, NP1,
end doend
end do doAlgorithm
Algorithm 7: The 7: whole
The whole algorithm algorithm of the ofproposed
the proposed approach approach
ℊ = ℊ
NG1, Cr1, + 1 Mu1, MG2, NP2, NG2, Cr2, Mu2.
EvaluateEvaluate
Evaluatethe
StartStart the
current
the current
current population.
population.
population.
end
Startdoouter
Save the GAbest solution to M.
Save
ReportSave
the best
the the
Input best best
solution
Input
the solution
network
the tofound.
networkM. to M.
information,
information, suchsuch as minimal
as minimal path,path, demand,demand, resources,
resources, MG1,MG1, NP1,NP1,
Generate the +initial
ℊ = ℊ 1solution population randomly with size 𝑁𝑃1.
ℊ = ℊ NG1,+= 1ℊ NG1,
+Cr1, 1 Cr1, Mu1, Mu1,MG2, MG2,NP2, NP2,
NG2, NG2,Cr2, Cr2,
Mu2. Mu2.
Start inner
Evaluateendthe doGA initial population.
end doend do Start
Start outer outer
GA GA found.
While Report
Generate ℊ ≤the the
𝑀𝐺1, best
initial solution
population
dosolution randomly with size 𝑁𝑃2.
ReportReport
the inner
Start best
Generatethe best
Generate solution
GA
the initial
the found.
initial found.
populationpopulation randomly randomly withwith size size 𝑁𝑃1.𝑁𝑃1.
Evaluate
While the
ⱣGenerate
≤inner
𝑁𝑃1, initial population.
doinitial population randomly with size NP2.
StartStart
inner GA
EvaluateEvaluate GA
the
Whiletwo
Select 𝑀𝐺2,the
ℊ ≤chromosomes. doinitial
the initial population.
population.
Generate Evaluate
Generate
While the
While ℊthe initial
initial
the ≤ initial
𝑀𝐺1,
ℊ ≤ population.
population population
𝑀𝐺1,
do do randomly randomly withwith 𝑁𝑃2.𝑁𝑃2.
size size
While ⱣWhile
Generate ≤new 𝑁𝑃2,ℊ ≤ do
offspring
MG2, do after applying crossover and mutation.
Evaluate
Evaluate
Whilethe
While initial
Ᵽthe≤ initial
𝑁𝑃1,
Ᵽ population.
≤ 𝑁𝑃1,
do population.
do
Ᵽ=Ᵽ+1
While ≤ Select
NP2, do two chromosomes.
While ℊ ≤Select
While 𝑀𝐺2,
ℊtwo ≤ 𝑀𝐺2, do chromosomes.
do
end do Select chromosomes.
two
Generate Select new offspring after applying crossover and mutation.
two chromosomes.
While WhileⱣ ≤ 𝑁𝑃2,
Ᵽ
Generate ≤
Generate 𝑁𝑃2,
do
new do
new
offspring
Ᵽ = Ᵽ +population.
1
Generate offspring new after after
applying
offspring applying
aftercrossovercrossover
applying and mutation.
and mutation.
crossover and mutation.
Evaluate the current
Ᵽ= Ᵽ+
Select =
= 1two
Ᵽ+
Select + 11chromosomes.
two chromosomes.
Save the best solution to M.
Generate
end Generate
do new new offspring offspring afterafter
applyingapplying crossover
crossover and mutation.
and mutation.
ℊ = ℊ end + 1 do end do
Evaluate Ᵽ = theⱣ += 1Ᵽ
current + 1 population.
end do Evaluate Evaluate the current
the current
Save the best solution to F.
population. population.
Reportℊthe Save Save
the best
the best
solution solution to M. to M.
=ℊbest+ 1 solution found.
ℊ=ℊ+ = 1ℊ + 1
Start inner
end do GA
end do end do
Generate Reportthethe optimal
initial lowers found.
population randomly with size 𝑁𝑃2.
Report
End Report
inner theGA best
the best
solution
Calculate solution
the found.
system found.
reliability Rs.
Evaluate the initial population.
Startouter
End Start
inner GAinner
GA GA
While ℊ ≤ 𝑀𝐺2, do
End Generate Generate the initial
the initial population population randomly randomly withwith size size 𝑁𝑃2.𝑁𝑃2.
While Ᵽ ≤ 𝑁𝑃2, do
Evaluate Evaluate the initial
the initial population.population.
3. Results andSelect two chromosomes.
Discussion
While While ℊ ≤ 𝑀𝐺2,
ℊ ≤ 𝑀𝐺2, do do
Generate new offspring after applying crossover and mutation.
ⱣⱣ = ≤ Ᵽ𝑁𝑃2,
Ᵽ+ ≤1𝑁𝑃2,
In
While the
While following do subsections,
do the presented approach has been applied to three net-
works. The valid values Select of
Select
two the GA
chromosomes.
two parameters were as follows, MG1 = 100, NP1 = 20,
chromosomes.
Cr1 = 0.95, Mu1 = 0.05, GenerateMG2
Generate =new 100,new NP2offspring
offspring = 10,after15, after
and
applying 20. The
applying value
crossover ofand
crossover Cr2mutation.
= 0.95,
and and that
mutation.
Ᵽ=Ᵽ+
= 1Ᵽ + 1
Mu2 = 0.05. The proposed approach was implemented in
with hardware specification that comprises a core i7 Intel p
Mathematics 2023, 11, 3902 3.1. Case1: Network with Three Sources and Two Sinks
10 of 16
=3.1.{aCase1:
6, a10 }. Where
Network with Three ncSources
= NG1 and Two=Sinks 10, NF = NG2 = 21, Resources:
r3,2, This
r3,3)network
= (5,consists2, 3, of5,103, arcs2,as 2,
shown2, in3). Demand:
Figure DMP
1; it has 7 MPs; = 1,1,1
(d=1,1{a,1,da71,2 }, , d2,1
MP1,1,2 = {a2 , a9 }, MP1,2,1 = {a1 , a8 }, MP2,1,1 = {a3 , a9 }, MP2,2,1 = {a4 , a10 }, MP3,1,1 = {a5 , a9 }
Table
and MP3,2,1 1 =shows thencbest
{a6 , a10 }. Where = NG1minimum
= 10, NF = NG2 = 21, 𝒮 Resources:
achieves R = (rmaximum
1,1 , r1,2 , r1,3 , 𝑅
𝑅 . S achieves maximum Rs when NP2
r2,1 , r2,2 , r2,3 , r3,1 , r3,2 , r3,3 ) = (5, 2, 3, 5, 3, 2, 2, 2, 3). Demand: D = (d1,1 , d1,2 , d2,1 , d2,2 , d3,1 ,
and
d3,2 ) =Table
(3, 1, 2, 2, 1, 23).clarifies
Table 1 shows Ftheandbest minimum
= 10, 15, and 20, and Table 2 clarifies F and R X .
Figure 1. Network
Figure 1. Network withand
with three sources three sources and two sinks.
two sinks.
Table 1. Case1: The best solution found while varying NP2 and its corresponding M, S, and Rs.
Table
NP2 1. Case1: The bestMsolution found whileSvarying
RS NP2 and i
10 [4 2 4 2 5 4 3 3 5 4] 36 0.973585
NP2
15
20
[4
[5
4
3
3
3
4
3
1
3
1
1
5
4
5
5
M 5
4
4]
5]
36
36
0.968533
0.968419
10 [4 2 4 2 5 4 3 3
Table 2. Case1: F and its corresponding RX for different NP2 (10, 15, and 20).
15 [4 4 3 4 1 1 5 5
F RX
1 020 0 0 0 1 [5 0 1 1 31 1 0 31 0 1 31 1 0 30 1 1 1 0.87494 5
0 1 0 1 0 0 0 1 1 1 1 0 1 0 1 1 0 1 0 1 1 0.8749
1 0 0 1 1 0 0 1 1 1 1 0 0 0 1 0 0 1 1 1 1 0.8745
1 0 0 0 0 0 1 1 1 1 1 1 0 1 1 1 1 0 0 0 1 0.8407
Table 2. Case1: F and its corresponding R for different NP2 (10,
0 0 1 1 1 0 0 1 1 1 1 0 1 0 1 1 0 0
X
0 1 1 0.8222
1 1 0 1 0 0 0 1 1 0 1 1 0 1 1 1 0 0 1 0 1 0.7904
1 0 0 1 0 0 0 1 1 0 1 0 0 0 1 1 1 1 1 1 1 0.7904
1 1 0 1 1 0 1 0 1 1 0 0 0 1 1 0 0 F
1 0 1 1 0.7899
1 1 0 1 0 1 0 1 1 0 1 0 0 0 1 1 0 0 1 1 1 0.7594
11 1 0
0 1 0 0 0
0 0 0
1 1 1
0 0
0 0 1
0 1 1
1 1 1 1 1
1 1 0
0 1 1 0
0.7413 1 1
0 1 0 1 0 0 0 1 1 1 1 0 1 0 1 1
1 0 0 1 1 0 0 1 1 1 1 0 0 0 1 0
1 0 0 0 0 0 1 1 1 1 1 1 0 1 1 1
0 0 1 1 1 0 0 1 1 1 1 0 1 0 1 1
1 1 0 1 0 0 0 1 1 0 1 1 0 1 1 1
Mathematics 2023, 11, 3902 11 of 16
Table 2. Cont.
F RX
1 1 0 1 0 1 0 1 1 1 0 0 1 1 1 0 1 0 0 0 1 0.9012
1 1 0 0 0 0 0 1 1 1 1 1 1 1 1 1 0 0 0 0 1 0.9012
1 0 0 0 1 0 1 1 1 1 1 1 0 1 1 1 0 0 0 0 1 0.8855
1 0 1 1 0 0 0 1 1 1 1 0 1 1 1 0 1 0 0 0 1 0.8855
1 0 0 1 1 1 1 1 1 1 1 0 0 1 1 0 0 0 0 0 1 0.8832
1 0 1 1 1 0 0 1 1 1 1 0 1 1 1 0 0 0 0 0 1 0.8832
0 0 1 1 1 0 1 1 1 1 1 0 0 1 1 1 0 0 0 0 1 0.8832
0 1 0 1 0 1 1 1 1 1 1 0 0 1 1 1 0 0 0 0 1 0.8120
1 0 1 1 1 0 0 1 1 1 0 0 1 1 1 0 1 0 0 0 1 0.8102
1 0 0 1 1 0 0 1 1 0 1 1 1 1 1 1 0 0 0 0 1 0.8082
1 0 0 1 1 1 0 1 1 1 1 0 1 1 1 0 0 0 0 0 1 0.7976
1 0 0 1 0 1 1 1 1 1 1 0 0 1 1 0 1 0 0 0 1 0.7976
1 1 0 1 1 0 0 1 1 1 0 1 1 1 1 0 0 0 0 0 1 0.7976
1 1 0 0 1 0 0 1 1 1 0 1 1 1 1 1 0 0 0 0 1 0.7958
1 1 0 1 0 0 0 1 1 1 0 1 1 1 1 0 1 0 0 0 1 0.7299
1 0 1 1 1 0 1 1 1 1 1 0 0 1 1 0 0 0 0 0 1 0.8760
1 1 0 0 1 0 1 1 1 1 0 0 0 1 1 1 0 1 0 0 1 0.8760
1 1 0 0 1 0 1 1 1 1 0 1 0 1 1 1 0 0 0 0 1 0.8760
1 1 0 0 0 0 1 1 1 1 0 0 0 1 1 1 1 1 0 0 1 0.8313
1 1 0 1 1 0 1 1 1 1 0 0 0 1 1 0 0 1 0 0 1 0.8313
1 1 1 1 0 0 0 1 1 0 1 0 1 1 1 1 0 0 0 0 1 0.8313
1 1 0 1 1 0 0 1 1 1 0 0 1 1 1 0 0 1 0 0 1 0.8301
0 1 1 1 0 0 0 1 1 1 1 0 1 1 1 1 0 0 0 0 1 0.8301
1 0 1 0 1 0 1 1 1 1 1 0 0 1 1 1 0 0 0 0 1 0.8301
1 0 1 1 1 0 0 1 1 1 0 0 1 1 1 0 1 0 0 0 1 0.8292
1 1 0 1 0 1 1 1 1 1 1 0 0 1 1 0 0 0 0 0 1 0.8292
1 1 0 1 1 0 0 1 1 1 0 1 1 1 1 0 0 0 0 0 1 0.8222
1 1 0 1 0 0 0 1 1 1 0 0 1 1 1 0 1 1 0 0 1 0.8222
0 1 1 1 1 0 0 1 1 1 0 0 1 1 1 1 0 0 0 0 1 0.8222
1 1 0 1 0 1 1 1 1 0 1 0 0 1 1 1 0 0 0 0 1 0.8222
1 1 1 0 1 0 0 1 1 1 0 0 1 1 1 1 0 0 0 0 1 0.8210
1 1 1 0 1 0 0 1 1 1 0 0 1 1 1 1 0 0 0 0 1 0.8210
1 1 0 1 0 0 1 1 1 0 0 0 0 1 1 1 1 1 0 0 1 0.8200
1 1 0 0 0 1 1 1 1 1 1 0 0 1 1 1 0 0 0 0 1 0.7834
1 0 1 1 0 0 0 1 1 1 1 0 1 1 1 0 1 0 0 0 1 0.7834
3.3.
3.3.Case3:
Case3:Network
Networkwith withTwo TwoSources
Sourcesand andThreeThreeSinks Sinks
This
Thisnetwork
networkconsists consists of of 11
11 arcsarcs as as shown
shown in in Figure 3, it has 13 MPs; MP1,1,1 1,1,1 =={a {a11, ,aa7},
7 },
MP 1,1,2=={a
MP1,1,2 {a2,2 ,aa5,5 ,aa77},},MP 1,2,1=={a
MP1,2,1 {a11, ,aa88},},MP
MP1,2,21,2,2=={a {a22, ,aa99},},MP 1,2,3=={a
MP1,2,3 {a22, ,aa55, , aa88},}, MP1,3,11,3,1=={a {a22, ,aa1010},},
MP
MP2,1,1 = {a
2,1,1 = 3{a, a35,, a57}, , aMP MP=2,1,2
7 }, 2,1,2 {a4, =a6{a , a45,, a76},, aMP5, a 7 },=MP
2,2,1 {a3,2,2,1
a9}, =MP 3 , a=9 },
{a2,2,2 {aMP 4, a62,2,2
, a9},=MP , a=6 , {a
{a42,3,1 a93,},
aMP
11}, 2,3,1 = {a=3 ,{aa411
MP2,3,2 , a},6,MPa10}, and
2,3,2 = {a
MP 4 , a
2,3,3
6 , a
={a 104 ,},a and
11 }. MP
Where nc
2,3,3 ={a
= ,
NG1
4 a 11 }.
= Where
11, NF = nc
NG2 = NG1
= 26, = Re-11,
NF = NG2
sources: R ==(r26, 1,1, rResources:
1,2, r2,1, r2,2) R = (r1,1
= (10, 19,, r14, , r
19).
1,2 2,1 2,2 , r
Demand:) = (10,D19,
= 14,
(d 1,119).
, d 1,2Demand:
, d 1,3 , d 2,1 , D
d =
2,2 , (d
d 1,1 1,2 ,
2,3 ) ,
= d(3,
d
2, 1,3 , d
2, 2, 2,1 , d
3, 3).2,2 ,
Tabled 2,3 5 shows the best minimum 𝒮 achieves maximum 𝑅 when NP2 = 10,
) = (3, 2, 2, 2, 3, 3). Table 5 shows the best minimum S achieves maximum
Rs and
15, when 20,NP2and=Table 10, 15, and 20, and
6 clarifies F and 𝑅 . 6 clarifies F and R X .
Table
Figure
Figure3.3.Network
Networkwith
withtwo
twosources
sourcesand
andthree
threesinks.
sinks.
Table 5. Case3: The best solution found while varying NP2 and its corresponding M, S, and Rs.
NP2 M S RS
10 [8 12 14 4 15 13 7 2 14 12 10] 111 0.995669
15 [12 6 12 14 5 9 12 6 12 14 9] 111 0.999923
20 [15 12 12 15 9 4 10 11 14 4 5] 111 0.999403
Mathematics 2023, 11, 3902 14 of 16
Table 6. Case3: F and its corresponding RX for different NP2 (10, 15, and 20).
F RX
0 1 1 1 0 1 1 0 0 1 1 0 1 0 1 0 1 1 0 0 0 1 0 1 1 1 0.9595
1 1 1 0 0 0 1 1 1 1 1 1 0 1 1 0 0 1 0 0 0 1 0 0 1 1 0.9595
1 0 1 1 1 0 1 1 0 1 1 1 0 1 1 0 0 1 0 0 1 1 0 1 0 0 0.9573
1 0 1 1 0 0 1 1 0 1 1 1 1 0 0 1 1 0 0 1 0 1 1 0 0 1 0.9573
1 1 1 1 0 1 0 1 1 0 1 1 0 0 1 0 0 1 1 0 0 1 1 1 0 0 0.9573
1 0 1 1 0 1 1 0 1 0 1 1 1 1 0 0 0 1 0 1 1 1 0 0 0 1 0.9212
1 0 1 1 0 1 0 1 1 0 0 1 1 0 0 1 0 1 1 0 1 1 1 1 0 0 0.8851
1 0 1 0 0 0 0 0 1 1 1 1 1 1 0 1 1 1 0 1 1 1 0 1 0 0 0.8851
0 0 1 1 0 1 1 0 1 0 1 1 1 0 1 1 0 1 0 1 1 1 0 1 0 0 0.8851
1 1 0 1 0 0 0 1 1 1 0 1 1 0 1 0 1 1 0 0 1 1 0 0 1 1 0.8851
1 1 0 0 1 0 0 0 0 1 1 1 1 0 1 1 1 1 0 1 1 1 0 1 0 0 0.9999
1 1 0 1 0 1 1 1 0 0 0 1 1 0 1 0 1 0 0 1 0 1 1 1 1 0 0.9998
1 1 1 0 1 1 0 0 0 0 1 1 1 1 0 0 0 1 1 1 0 1 1 0 0 1 0.9962
0 0 1 1 0 1 1 0 0 0 0 1 1 1 1 0 0 1 1 1 1 1 1 1 0 0 0.9962
1 1 0 0 0 0 0 0 0 1 0 1 1 1 1 0 1 1 1 1 0 1 1 0 1 1 0.9962
0 1 1 1 0 0 1 1 1 0 0 1 1 0 1 0 0 1 0 1 1 0 1 1 0 1 0.9962
1 0 1 1 1 0 0 1 0 1 0 1 1 0 0 1 1 0 0 1 1 1 1 1 0 0 0.9962
1 0 1 1 1 1 0 0 0 0 1 0 0 1 1 0 1 1 0 1 0 1 0 1 1 1 0.9960
1 0 1 1 1 1 1 1 0 0 0 0 0 0 1 1 0 0 0 1 1 1 0 1 1 1 0.9039
1 0 1 1 1 0 0 1 0 1 0 1 1 0 0 1 1 1 0 0 1 1 1 0 0 1 0.9038
0 1 1 0 0 0 0 1 0 1 1 1 1 0 1 1 1 0 1 1 0 1 1 1 0 0 0.9038
1 0 1 1 1 1 0 0 0 1 0 1 0 0 1 1 0 1 1 0 0 0 1 1 1 1 0.8988
1 0 1 1 0 1 0 0 0 0 1 0 0 1 1 0 1 1 1 1 0 1 1 1 0 1 0.8988
1 1 0 0 0 1 0 1 0 1 1 0 1 0 1 1 1 0 1 0 1 1 0 1 0 1 0.8988
0 1 1 0 1 1 0 1 1 0 0 0 1 0 1 1 0 1 0 0 0 1 1 1 1 1 0.8007
0 1 1 1 1 1 0 1 0 0 0 1 1 0 1 0 1 0 0 1 1 1 0 0 1 1 0.9994
1 1 1 0 1 1 1 0 0 0 0 1 1 0 0 1 0 1 0 1 1 0 0 1 1 1 0.9994
1 0 0 1 1 1 0 1 0 1 0 0 1 1 1 0 0 0 1 0 0 1 1 1 1 1 0.9988
1 1 1 0 1 0 0 1 0 0 0 1 1 0 0 1 1 1 0 1 0 1 1 0 1 1 0.9988
1 0 1 1 0 1 1 0 0 1 1 0 1 1 0 0 0 0 1 1 0 1 1 1 0 1 0.9988
1 0 1 1 1 0 0 1 0 0 1 0 1 0 0 1 1 1 0 1 1 1 0 1 0 1 0.9988
1 1 1 1 1 0 0 1 0 0 1 0 1 0 0 0 1 1 0 1 0 1 0 1 1 1 0.9988
0 0 1 1 0 0 0 1 1 1 1 0 1 1 1 0 0 1 1 0 0 1 0 1 1 1 0.9982
1 0 0 1 1 1 0 1 0 1 1 0 1 0 1 1 1 0 0 0 0 1 1 1 0 1 0.9606
1 0 1 1 1 1 0 1 1 0 1 1 1 0 0 1 0 0 0 1 0 0 1 1 0 1 0.9600
1 1 1 0 0 0 1 1 0 0 1 0 1 0 0 1 1 1 0 1 1 1 0 1 0 1 0.9600
1 0 1 1 0 0 1 1 0 0 1 1 0 1 1 0 1 1 0 1 0 1 0 1 1 0 0.9600
1 0 0 1 0 0 0 1 1 1 1 1 1 0 1 1 1 0 0 1 1 1 0 0 0 1 0.9600
0 1 1 0 0 0 1 1 1 1 0 1 1 1 1 0 0 0 0 1 0 1 1 0 1 1 0.9600
1 0 1 1 1 1 0 1 1 0 1 0 0 1 1 0 0 0 0 1 1 1 0 1 0 1 0.9600
0 1 1 0 1 1 0 0 0 1 0 1 1 1 1 0 1 0 0 1 1 0 0 1 1 1 0.9227
1 1 0 0 1 1 0 0 1 0 1 0 1 1 1 0 0 1 0 1 0 1 1 1 0 1 0.9227
1 0 1 1 0 0 1 1 0 1 0 1 1 1 0 0 1 1 0 0 0 1 1 1 1 0 0.9227
1 0 1 1 1 1 0 1 0 0 0 0 1 0 0 1 0 1 1 0 1 1 1 1 0 1 0.9227
0 1 1 0 1 1 0 0 1 1 1 0 1 0 1 1 0 1 0 0 0 1 0 1 1 1 0.9227
The main goal of the Robust Design Problem (RDP) for MMSFN is to find the optimal
set of capacities assigned to arcs, ensuring network survival even under arc failures,
i.e., RS > 0. Initially, we studied a network with three sources and two sinks. The best
values for S and RS were 36 and 0.973585, respectively, with NP2(NF) = 10. Next, in a
network with two sources and two sinks, the best values for S and RS were found to be,
respectively, 169 and 0.996641 with NP2(NF) = 10. Finally, in a network with two sources
and three sinks, the best values for S and RS were 111 and 0.999923, respectively, with
NP2(NF) = 15. The NP2 for the inner GA (corresponding to NF, number of flow vectors)
was selected to be 10, 15, and 20 for all studied cases to find the optimal or near-optimal
value for the system reliability with NG2 equal to 100. The number of flow vectors for
Mathematics 2023, 11, 3902 15 of 16
MMFNs cannot be anticipated. Therefore, we searched for the optimal flows that maximize
the system reliability. According to [1,2,7], the obtained maximum value for NF number
does not exceed 20 as summarized in Table 7. Furthermore, we follow up the reliability
values of capacity vectors RX for each example, [1], o identify the best flow strategy with
maximum RX .
4. Conclusions
This paper presented a structural analysis of MMSFN to discuss and formulate the
Robust Design Problem for this type of SFN. Additionally, it successfully solves the RDP for
MMSFN using a two-stage GA approach. We divided the problem into two subproblems:
first, searching for the optimal capacity assigned to network components with a minimum
sum, and second, searching for the optimal lower vectors to achieve the maximum system
reliability value. The proposed GA-based approach was applied to a group of networks,
and it yielded satisfactory results. No comparisons were made as the RDP for MMSFNs
has not been discussed previously.
Author Contributions: Conceptualization, N.H.R., M.R.H. and H.A.S.; methodology, N.H.R., M.R.H.
and H.A.S.; software, validation, N.H.R., A.Y., M.R.H. and H.A.S.; formal analysis, S.B. and F.S.A.;
investigation, S.B.; writing—original draft preparation, N.H.R., H.A.S. and S.B.; writing—review and
editing, A.Y., M.R.H., S.B. and F.S.A.; visualization, A.Y. and M.R.H.; supervision, S.B. and M.R.H.;
funding acquisition, S.B. and F.S.A. All authors have read and agreed to the published version of
the manuscript.
Funding: Deputyship for Research and Innovation, Ministry of Education in Saudi Arabia—project
number MoE-IF-UJ-22-4220772-4.
Institutional Review Board Statement: Not applicable.
Informed Consent Statement: Not applicable.
Data Availability Statement: Not applicable.
Acknowledgments: The authors extend their appreciation to the Deputyship for Research & Inno-
vation, Ministry of Education in Saudi Arabia, for funding this research work through the project
number MoE-IF-UJ-22-4220772-4.
Conflicts of Interest: The authors declare no conflict of interest in this work.
References
1. Hassan, M.R. Maximizing reliability of the capacity vector for multi-source multi-sink stochastic-flow networks subject to an
assignment budget. J. Ind. Manag. Optim. 2021, 17, 1253–1267. [CrossRef]
2. Hassan, M.R. System Reliability Optimization of Multi-Source Multi-Sink Stochastic Flow Networks with Budget Constraint. Int.
J. Reliab. Qual. Saf. Eng. 2021, 28, 2150025. [CrossRef]
3. Forghani-Elahabad, M.; Kagan, N. Reliability evaluation of a stochastic-flow network in terms of minimal paths with budget
constraint. IISE Trans. 2018, 51, 547–558. [CrossRef]
4. Bobbio, A.; Terruggia, R.; Ciancamerla, E.; Minichino, M. Reliability analysis of multi-source multi-sink critical interacting
systems. In Proceedings of the 2011 3rd International Workshop on Dependable Control of Discrete Systems, Saarbruecken,
Germany, 15–17 June 2011; pp. 127–132. [CrossRef]
Mathematics 2023, 11, 3902 16 of 16
5. Sahinoglu, M.; Rice, B. Network reliability evaluation. In WIREs Computational Statistics; John Wiley & Sons: Hoboken, NJ, USA,
2010; Volume 2, pp. 189–211.
6. Hamed, A.Y.; Alkinani, M.H.; Hassan, M.R. A Genetic Algorithm to Solve Capacity Assignment Problem in a Flow Network.
Comput. Mater. Contin. 2020, 64, 1579–1586. [CrossRef]
7. Hassan, M. Solving Flow Allocation Problems and Optimizing System Reliability of Multi-Source Multi-Sink Stochastic Flow
Network. Int. Arab. J. Inf. Technol. (IAJIT) 2016, 13, 477–483.
8. Liu, Q.; Zhang, H.; Ma, X.; Zhao, Q. Genetic Algorithm-based Study on Flow Allocation in a Multicommodity Stochastic-flow
Network with Unreliable Nodes. In Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial
Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), Qingdao, China, 30 July 2007–1 August 2007;
Volume 1, pp. 576–581. [CrossRef]
9. Chen, S.-G. Optimal double-resource assignment for the robust design problem in multistate computer networks. Appl. Math.
Model. 2014, 38, 263–277. [CrossRef]
10. Atzori, L.; Raccis, A. Network Capacity Assignment for Multicast Services Using Genetic Algorithms. IEEE Commun. Lett. 2004,
8, 403–405. [CrossRef]
11. Yang, G. Life Cycle Reliability Engineering; John Wiley & Sons: Hoboken, NJ, USA, 2007. [CrossRef]
12. Büsing, C.; Koster, A.M.C.A.; Schmitz, S. Robust minimum cost flow problem under consistent flow constraints. Ann. Oper. Res.
2021, 312, 691–722. [CrossRef]
13. Fowlkes, W.Y.; Creveling, C.M. Engineering Methods for Robust Product Design: Using Taguchi Methods in Technology and Product
Development; Addison-Wesley Publishing Company: Boston, MA, USA, 1995.
14. Chabrier, A.; Danna, E.; Le Pape, C.; Perron, L. Solving a Network Design Problem. Ann. Oper. Res. 2004, 130, 217–239. [CrossRef]
15. Yong, K. Robust Design and Reliability. Trans. Nanjing Univ. Aeronaut. Astronaut. 1998, 15, 9–14.
16. Cho, B.R.; Shin, S. Quality Improvement and Robust Design Methods to a Pharmaceutical Research and Development. Math.
Probl. Eng. 2012, 2012, 193246. [CrossRef]
17. Chen, S.-G. An optimal capacity assignment for the robust design problem in capacitated flow networks. Appl. Math. Model. 2012,
36, 5272–5282. [CrossRef]
18. Hamdy, N.; Hassan, M.R.; Hussein, M.E. A genetic algorithm to solve the robust design problem for a Flow Network with Node
Failure. Trans. Networks Commun. 2020, 8, 1–10. [CrossRef]
19. Radwan, N.H.; Hassan, M.R.; Hussein, M.E. Solving the Robust Design Problem for a Two-Commodity Flow Network with Node
Failure. Am. J. Eng. Appl. Sci. 2020, 13, 837–845. [CrossRef]
20. Chen, S.-G.; Lin, Y.-K. An Approximate Algorithm for the Robust Design in a Stochastic-Flow Network. Commun. Stat.—Theory
Methods 2010, 39, 2440–2454. [CrossRef]
21. López-Prado, J.L.; Vélez, J.I.; Garcia-Llinás, G.A. Reliability Evaluation in Distribution Networks with Microgrids: Review and
Classification of the Literature. Energies 2020, 13, 6189. [CrossRef]
22. Al-Shaalan, A.M. Reliability Evaluation of Power Systems. In Reliability and Maintenance-An Overview of Cases; IntechOpen:
London, UK, 2020.
23. Niu, Y.-F.; Xu, X.-Z.; He, C.; Ding, D.; Liu, Z.-Z. Capacity Reliability Calculation and Sensitivity Analysis for a Stochastic Transport
Network. IEEE Access 2020, 8, 133161–133169. [CrossRef]
24. Satitsatian, S.; Kapur, K.C. An algorithm for lower reliability bounds of multistate two-terminal networks. IEEE Trans. Reliab.
2006, 55, 199–206. [CrossRef]
25. Hassan, M.R.; Abdou, H. Multi-Source Multi-Sink Stochastic-Flow Networks Reliability under Time Constraints. Indian J. Sci.
Technol. 2019, 12, 22. [CrossRef]
26. Abed, M.H.; Tang, A.Y. Hybridizing Genetic Algorithm and Record-to-Record Travel Algorithm for Solving Uncapacitated
Examination Timetabling Problem. electronic J. Comput. Sci. Inf. Technol. 2013, 4, 25–31.
27. Sharma, M. Role and Working of Genetic Algorithm in Computer Science. Int. J. Comput. Appl. Inf. Technol. 2013, 2, 27–32.
28. Malik, A. A Study of Genetic Algorithm and Crossover Techniques. Int. J. Comput. Sci. Mob. Comput. 2019, 8, 335–344.
29. Mirjalili, S. Studies in Computational Intelligence. In Evolutionary Algorithms and Neural Networks; Springer: Berlin/Heidelberg,
Germany, 2019; Volume 780.
30. Lin, Y.-K. A simple algorithm for reliability evaluation of a stochastic-flow network with node failure. Comput. Oper. Res. 2001, 28,
1277–1285. [CrossRef]
31. Zuo, M.J.; Tian, Z.; Huang, H.-Z. An efficient method for reliability evaluation of multistate networks given all minimal path
vectors. IIE Trans. 2007, 39, 811–817. [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.