{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:20:17Z","timestamp":1726064417450},"reference-count":15,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T00:00:00Z","timestamp":1160524800000},"content-version":"vor","delay-in-days":4666,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Networks"],"published-print":{"date-parts":[[1994,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This paper considers the problem of locating an obnoxious facility on a Euclidean network that could inflict damage within a \u03bb distance of its location point. The objective is to find a location point that minimizes the sum of weights within the circle of radius \u03bb centered at the location point, where each weight (assigned to a point on the network) represents a numerical scale that typically signifies the extent of the undesirability (or the damage cost) due to the facility located near the weighted point. The weights are assumed discretely distributed over all the nodes but uniformly distributed on all the links of the network. In the problem analysis, some optimal solution properties are found, e.g., the objective function is lower semicontinuous piecewise concave and there is at least one optimal location point in a finite set of candidate points. Using these properties, an efficient solution algorithm is derived and tested with several numerical problems. \u00a9 1994 by John Wiley &amp; Sons, Inc.<\/jats:p>","DOI":"10.1002\/net.3230240102","type":"journal-article","created":{"date-parts":[[2007,5,12]],"date-time":"2007-05-12T17:18:06Z","timestamp":1178990286000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["Locating an obnoxious facility on a euclidean network to minimize neighborhood damage"],"prefix":"10.1002","volume":"24","author":[{"given":"Chang Sup","family":"Sung","sequence":"first","affiliation":[]},{"given":"Cheol Min","family":"Joo","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,11]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1287\/opre.36.1.84"},{"key":"e_1_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.12.2.107"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1287\/opre.28.6.1385"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.19.3.193"},{"issue":"1","key":"e_1_2_1_6_2","first-page":"B\u201031","article-title":"Concepts of optimal location for partially noxious facilities","volume":"23","author":"Goldman A. J.","year":"1975","journal-title":"Bull. Operation Res. Soc. Am."},{"key":"e_1_2_1_7_2","unstructured":"C. M.Joo Locating an obnoxious facility on a network subject to damage area restriction. Unpublished M.S. Thesis Korea Advanced Institute of Science and Technology Taejon Korea (1989)."},{"key":"e_1_2_1_8_2","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.25.2.146"},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.25.2.100"},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.22.3.217"},{"key":"e_1_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/BF02026821"},{"key":"e_1_2_1_12_2","volume-title":"Functional Analysis","author":"Reed H.","year":"1980"},{"key":"e_1_2_1_13_2","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.25.2.138"},{"key":"e_1_2_1_14_2","volume-title":"Location model with routing considerations for obnoxious facilities. Working Paper","author":"Stowers C. L.","year":"1991"},{"key":"e_1_2_1_15_2","doi-asserted-by":"publisher","DOI":"10.1287\/trsc.18.1.76"},{"key":"e_1_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.13.11.900"}],"container-title":["Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fnet.3230240102","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/net.3230240102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T23:56:06Z","timestamp":1698105366000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/net.3230240102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,1]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1994,1]]}},"alternative-id":["10.1002\/net.3230240102"],"URL":"https:\/\/doi.org\/10.1002\/net.3230240102","archive":["Portico"],"relation":{},"ISSN":["0028-3045","1097-0037"],"issn-type":[{"value":"0028-3045","type":"print"},{"value":"1097-0037","type":"electronic"}],"subject":[],"published":{"date-parts":[[1994,1]]}}}