Next Article in Journal
Free-Space Quantum Teleportation with Orbital Angular Momentum Multiplexed Continuous Variable Entanglement
Next Article in Special Issue
Generating Robust Optimal Mixture Designs Due to Missing Observation Using a Multi-Objective Genetic Algorithm
Previous Article in Journal
Euler–Lagrange-Type Equations for Functionals Involving Fractional Operators and Antiderivatives
Previous Article in Special Issue
Novel Algorithm for Linearly Constrained Derivative Free Global Optimization of Lipschitz Functions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Inverse Optimization Method for Safety Resource Allocation and Inferring Cost Coefficient Based on a Benchmark

School of Maritime Economics and Management, Dalian Maritime University, Dalian 116026, China
*
Author to whom correspondence should be addressed.
Mathematics 2023, 11(14), 3207; https://doi.org/10.3390/math11143207
Submission received: 7 May 2023 / Revised: 9 July 2023 / Accepted: 11 July 2023 / Published: 21 July 2023
(This article belongs to the Special Issue Operations Research and Optimization)

Abstract

:
Due to cost-push inflation, the trade-off between safety costs and risk prevention (safety) has become difficult worldwide. Most companies experience the difficulty of safety cost overruns and allocate safety resource inefficiently. In this paper, a forward model maximizing safety input is formulated. Because there is a wide range of variation of safety resource cost coefficient parameters, it is hard to determine safety resource cost coefficients in the forward model, to make the decisions on which types of safety resources are allocated to which potentially risky locations with what prices, and to ensure total input is as close to the benchmark as possible. Taking allocation, themes, resources, and cost coefficient parameters as new decision variables, the inverse optimization model is formulated based on a bi-level model. With consideration of quaternion decision, bi-level programming, and NP-hard problem, based on the comparison of exact penalty algorithm and an improved PSO algorithm, in which the inertia weight is adaptively changing with the number of iterations, the PSO is suitable for solving the specific inverse model. Numerical experiments demonstrated the effectiveness of the PSO algorithm, proving that it can allocate the right amount and types of safety resources with the right prices at the right places.

1. Introduction

The goal of the inverse optimization of safety resources is to reverse the resource allocation scheme and key parameters from the expected results. A production factory is subject to a wide range of regulations and standards that define acceptable levels of risk, such as OSHA, EPA, and NFPA. Noncompliance with these regulations can result in legal penalties and fines. Incorporating benchmarks is an easy way to ensure obeying the regulations and standards. A benchmark is set by those who have demonstrated excellent safety practices and whose size and risk characteristics are similar to those enterprises that adopt the benchmark management. However, detailed information on safety resource allocation plans and safety resource cost coefficient parameters for each kind of safety resources is often unknown. Moreover, the cost coefficient parameter of each safety resource has a wide range of choices. This greatly impedes the adoption of benchmark safety management.
Furthermore, the best practice of “which types of safety resources are allocated at which potentially risky locations with what prices” is a black box for any company that wants to adopt a benchmark. If this information cannot be inferred, the benchmark method cannot be adopted. Inverse optimization [1,2] involves working backward from total safety resources input value to determine the allocation plan and resource cost coefficient that would have produced the total safety input cost. This backwards approach is suitable to a situation with incomplete information about the benchmark’s best practice. Based on the above, this research proposes an inverse optimization method for inferring safety resource allocation and the cost coefficient based on a benchmark.
Safety resource allocation problems have attracted great attention in the safety management community. The following research studies are related to this study. Safety resources include human and material resources [3]. Reniers and Sörensen proposed an approach for the optimal allocation of safety resources using the knapsack problem to take aggregated cost-efficient preventive measures [4]. Rullo et al. proposed a method for ensuring security with reasonable resource and energy costs [5]. Yan et al. proposed a two-tier model to allocate budgets to airports to ensure airport safety [6]. Li et al. proposed an emergency response plan by dynamically allocating emergency resources across several scenarios [7]. Jiang et al. established a multivariate model for safety investment and accident control using grey prediction theory [8]. Lu et al. proposed a cost-effective safety investment method to ensure the best safety performance [9]. Heo et al. used budget data to realign the size and direction of the budget to reduce risk and promote effective budget operation and damage reduction within different risk groups [10]. Sato addressed the safety resource allocation decisions by combining linear programming and analytic hierarchy processes [11]. Eba et al. examined the utility of safety measures based on the return on safety investment [12]. Ma et al. gave a safety resource allocation method from the perspective of opportunity cost [13]. Roy et al. proposed a safety investment optimization framework, aimed at minimizing the risk value of potential hazards while adhering to given safety budgets. Zhang et al. explored the optimal-safety person–job matching method for major equipment [14,15]. Thus, it can be seen that the allocation of safety resources is one of the important research issues in the field of safety management. Many scholars use a forward optimization method to conduct their research.
Inverse optimization describes a process that is the “opposite” of traditional forward optimization. Unlike traditional forward optimization, which seeks to compute optimal decisions given objectives and constraints, inverse optimization takes decision results as inputs and determines objectives and/or constraints that make these decisions approximately or fully optimal. An inverse optimal value method is a kind of inverse optimization problem. Inverse optimal value methods aim to identify the unknown parameters of an optimization problem to achieve a given objective solution or target value as the optimal solution or the optimal value, respectively [16]. Ahmed and Guan defined the inverse optimal value model as identifying a cost vector from a set of feasible options such that the optimal objective value of the corresponding linear program is as close as possible to a desired value [17]. The methods for solving inverse optimal value problems can be categorized as accurate algorithms and intelligent algorithms. From the perspective of accurate algorithms, there are polynomial algorithms [18], alternating iteration [19], and gradient search [20], among others. From the perspective of intelligent algorithms, Li proposed an evolutionary algorithm for multi-criteria inverse optimal value problems based on the dynamic weighted aggregation method [18]. Other intelligent algorithms, such as genetic algorithm, ant colony algorithm, simulated annealing algorithm, and neural networks, have also been mentioned [21]. It should be noted that neural network algorithms are widely used to solve inverse optimization problems; however, neural network algorithms are data-driven methods, which have advantages in dealing with real-time problems. This research is a deterministic inverse optimization problem. The purpose of this research is to give a resource allocation plan with low requirements on solving speed. Moreover, only the benchmark data of the total input value of safety resources are available, so the neural network algorithm cannot deal with the problem. Chan et al. surveyed all the inverse optimization research [21]. Heuberger surveyed the inverse combinatorial optimization problem [22], and some research has paid attention to data-driven inverse optimization [23], robust inverse optimization [24], and inverse optimization applications [25,26,27]. It is worth mentioning that Wang et al. proposed an inverse optimization model for safety resource allocation, which makes the preset allocation theme to be the best theme based on the adjustment of parameters [28]; their research deals with the problem of knowing the ideal values of decision variables, and is different from this research where the ideal objective function value is known.
The existing research on the inverse optimization methodologies of safety resources provided inspiration for this research. However, quaternion problems, such as which types of safety resources should be allocated at which risky point and at what price and quantity, have not yet been solved. To provide a quaternion decision based on the total cost of a safety resource benchmark, we formulated a forward optimization model with parameters (in this model, they were initial estimate values; these were not accurate). An inverse optimization model was then formulated based on the forward model. The inverse model inferred the parameters of the forward model; the optimal input was the predetermined input of the top decision-makers. A PSO algorithm was then used to provide allocation themes and resource parameter values.
The proposed method provides a new concept for the allocation of safety resources and includes the following innovations: (1) Our quaternion decision-making method suggested quantities of the types of resources that should be allocated at which places and at what price. To the best of our knowledge, this is the first paper to address all allocation decision aspects related to the problem of the allocation of safety resources. We have provided a new method to resolve the optimization problem of safety resources, oriented by a benchmark. (2) Our research compared penalty algorithms and PSO algorithms, considering non-linearity, NP difficulty, and quaternion. Based on this comparison, a PSO algorithm with an adaptively changing inertia weight and number of iterations could provide the benchmark result. These algorithms and codes may inspire other researchers. The framework of this research is shown in Figure 1.

2. Model

2.1. Problem Analysis

Forward optimization approaches operate by acquiring a set of inputs to obtain an optimal solution based on a predefined objective function. Based on the demand points of safety resources (namely, risky points) for each system (production system, logistics system, energy system, etc.) and their subsystems, the main task of the safety management department is to develop a configuration plan for each safety resource that includes personnel, materials, equipment, and training programs. A forward model of the allocation of safety resources is a mathematical optimization model, which is used to determine the optimal allocation of safety resources to achieve the highest level of safety in a given system.
As the cost coefficient of the same type of safety resource varies, the allocation plan should simultaneously provide the quantity and cost coefficient of each type of safety resource at each safety resource demand point. Thus, an inverse optimal value model should be applied.
An inverse optimization is defined as follows: max P ( x , c ) , x X is a forward optimization problem, where X is a feasible domain, and c is a parameter vector. With a known x ^ X and a vector c, it is necessary to question the value of the parameter inferring to find out whether there is a parameter vector of c, c ^ . This makes the benchmark value equal to the problem of max P ( x , c ^ ) optimal value. A description of the scenarios for the inverse optimization of safety resources is shown in Figure 2.

2.2. Assumptions

We made the following assumptions in our research: (1) There was a positive linear correlation between safety performance and the total amount of safety investment. (2) There were diminishing returns inputted in safety beyond a certain point. The input of the benchmark was the certain point. (3) The safety resource allocation plan of the benchmark was unknown. (4) The total investment in the safety resources of the benchmark was known. (5) Each safety resource price had a large range.

2.3. Notations

The definitions of the model symbols and their meanings are shown in Table 1.

2.4. Forward Optimization Model of Safety Resource allocation

The forward optimization model is as follows:
max x , t , x , t γ ( i = 1 m j = 1 n k = 1 p a i j k x i j k + i = 1 m j = 1 n r = 1 q b i j r t i j r + i = 1 m j = 1 n s = 1 u c i j s x i j s + i = 1 m j = 1 n μ = 1 v d i j μ t i j μ )
i = 1 m j = 1 n k = 1 p a i j k x i j k g 1
i = 1 m j = 1 n r = 1 q b i j r t i j r g 2
j = 1 n k = 1 p a i j k x i j k + j = 1 n r = 1 q b i j r t i j r e i
g 4 i = 1 m j = 1 n s = 1 u c i j s x i j s g 3
g 6 i = 1 m j = 1 n μ = 1 v d i j μ t i j μ g 5
i = 1 m j = 1 n s = 1 u c i j s x i j s + i = 1 m j = 1 n μ = 1 v d i j μ t i j μ α ( i = 1 m j = 1 n k = 1 p a i j k x i j k + i = 1 m j = 1 n r = 1 q b i j r t i j r + i = 1 m j = 1 n s = 1 u c i j s x i j s + i = 1 m j = 1 n μ = 1 v d i j μ t i j μ )
x i j k _ min x i j k x i j k _ max
t i j r _ min t i j r t i j r _ max
x i j s _ min x i j s x i j s _ max
t i j μ _ min t i j μ t i j μ _ max
In the forward optimization model, Formula (1) indicates that the greater the safety performance, the better. The decision variables refer to the input amounts of various resources at each risky point. Constraints (2), (3), (5), and (6) are the resources available to supply domains from the perspectives of each type of resource. Constraint (4) indicates that each system has an upper limit for the total input of safety resources. Constraint (7) is the combination ratio of the requirements of human resources to non-human resources. Constraints (8) to (11) provide the upper- and lower-value limits of each decision variable.

2.5. Inverse Optimization Model

An inverse optimization model was formulated, as demonstrated in Figure 3.
In the inverse optimization model (12), the upper-level model pursued the total input as close to the benchmark as possible, with coefficient parameters of a , b , c , d . The lower-level model was the original model.
Upper-level model:
min a , b , c , d ( i = 1 m j = 1 n k = 1 p a i j k x i j k + i = 1 m j = 1 n r = 1 q b i j r t i j r + i = 1 m j = 1 n s = 1 u c i j s x i j s + i = 1 m j = 1 n μ = 1 v d i j μ t i j μ f * ) 2 a 1 a a 2 b 1 b b 2 c 1 c c 2 d 1 d d 2
Lower-level model:
max x , t , x , t γ ( i = 1 m j = 1 n k = 1 p a i j k x i j k + i = 1 m j = 1 n r = 1 q b i j r t i j r + i = 1 m j = 1 n s = 1 u c i j s x i j s + i = 1 m j = 1 n μ = 1 v d i j μ t i j μ ) i = 1 m j = 1 n k = 1 p a i j k x i j k g 1 i = 1 m j = 1 n r = 1 q b i j r t i j r g 2 j = 1 n k = 1 p a i j k x i j k + j = 1 n r = 1 q b i j r t i j r e i g 4 i = 1 m j = 1 n s = 1 u c i j s x i j s g 3 g 6 i = 1 m j = 1 n μ = 1 v d i j μ t i j μ g 5 i = 1 m j = 1 n s = 1 u c i j s x i j s + i = 1 m j = 1 n μ = 1 v d i j μ t i j μ α ( i = 1 m j = 1 n k = 1 p a i j k x i j k + i = 1 m j = 1 n r = 1 q b i j r t i j r + i = 1 m j = 1 n s = 1 u c i j s x i j s + i = 1 m j = 1 n μ = 1 v d i j μ t i j μ ) x i j k _ min x i j k x i j k _ max t i j r _ min t i j r t i j r _ max x i j s _ min x i j s x i j s _ max t i j μ _ min t i j μ t i j μ _ max

3. Algorithm

3.1. Penalty Algorithm

The inverse optimization model is difficult to solve for the following reasons. First, it involves two levels of optimization that are interconnected, making it more complex than single-level optimization problems. Second, the problem has multiple local optima; therefore, the problem can have multiple feasible solutions. Thus, obtaining global optima becomes more complex. Third, the bi-level programming model is non-linear and NP-hard [17], making it more difficult to obtain an optimal solution in a reasonable amount of time. We solved the model-based KKT condition using the penalty function method. The Kuhn–Tucker optimality condition was used to transform the non-linear bi-level optimization problem into a regular non-linear programming problem for the low-level problem. The complementarity and slackness conditions of the low-level problem were applied to the high-level problem through a penalty function [19]. The inverse model was then transferred as the model (13) and directly solved using the MATLAB solver.
min x , x , t , t , a , b , c , d , u ( i = 1 m j = 1 n k = 1 p a i j k x i j k + i = 1 m j = 1 n r = 1 q b i j r t i j r + i = 1 m j = 1 n s = 1 u c i j s x i j s + i = 1 m j = 1 n μ = 1 v d i j μ t i j μ f * ) 2 a 1 a a 2 , b 1 b b 2 , c 1 c c 2 , d 1 d d 2 ( u 1 + γ ) i = 1 m j = 1 n k = 1 p a i j k + ( u 2 + γ ) i = 1 m j = 1 n r = 1 q b i j r + γ i = 1 m j = 1 n s = 1 u c i j s + γ i = 1 m j = 1 n μ = 1 v d i j μ + i = 1 m j = 1 n k = 1 p u 2 + i a i j k + i = 1 m j = 1 n r = 1 q u 2 + i b i j r + ( u 11 u 10 ) i = 1 m j = 1 n s = 1 u c i j s ) + ( u 13 u 12 ) i = 1 m j = 1 n μ = 1 v d i j μ + u 14 ( ( α ( i = 1 m j = 1 n k = 1 p a i j k + i = 1 m j = 1 n r = 1 q b i j r + i = 1 m j = 1 n s = 1 u c i j s + i = 1 m j = 1 n μ = 1 v d i j μ ) ) i = 1 m j = 1 n s = 1 u c i j s i = 1 m j = 1 n μ = 1 v d i j μ ) = 0 i = 1 m j = 1 n k = 1 p a i j k x i j k g 1 i = 1 m j = 1 n r = 1 q b i j r t i j r g 2 j = 1 n k = 1 p a i j k x i j k + j = 1 n r = 1 q b i j r t i j r e i g 4 i = 1 m j = 1 n s = 1 u c i j s x i j s g 3 g 6 i = 1 m j = 1 n μ = 1 v d i j μ t i j μ g 5 i = 1 m j = 1 n s = 1 u c i j s x i j s + i = 1 m j = 1 n μ = 1 v d i j μ t i j μ α ( i = 1 m j = 1 n k = 1 p a i j k x i j k + i = 1 m j = 1 n r = 1 q b i j r t i j r + i = 1 m j = 1 n s = 1 u c i j s x i j s + i = 1 m j = 1 n μ = 1 v d i j μ t i j μ ) u 1 ( i = 1 m j = 1 n k = 1 p a i j k x i j k g 1 ) = 0 u 2 ( i = 1 m j = 1 n r = 1 q b i j r t i j r g 2 ) = 0 u 2 + i ( j = 1 n k = 1 p a i j k x i j k + j = 1 n r = 1 q b i j r t i j r e i ) = 0 u 10 ( i = 1 m j = 1 n s = 1 u c i j s x i j s g 3 ) = 0 u 11 ( g 4 i = 1 m j = 1 n s = 1 u c i j s x i j s ) = 0 u 12 ( i = 1 m j = 1 n μ = 1 v d i j μ t i j μ g 5 ) = 0 u 13 ( g 6 i = 1 m j = 1 n μ = 1 v d i j μ t i j μ ) = 0 u 14 ( α ( i = 1 m j = 1 n k = 1 p a i j k x i j k + i = 1 m j = 1 n r = 1 q b i j r t i j r + i = 1 m j = 1 n s = 1 u c i j s x i j s + i = 1 m j = 1 n μ = 1 v d i j μ t i j μ ) i = 1 m j = 1 n s = 1 u c i j s x i j s i = 1 m j = 1 n μ = 1 v d i j μ t i j μ ) = 0 x i j k _ min x i j k x i j k _ max , t i j r _ min t i j r t i j r _ max , x i j s _ min x i j s x i j s _ max , t i j μ _ min t i j μ t i j μ _ max , u 0

3.2. PSO Algorithm

A particle swarm algorithm has a strong advantage when solving multi-variable, non-linear, and large-scale optimization functions. The inertia weight of the PSO algorithm is determined by adaptively changing with the number of iterations. This is conducive to a quicker search for the global optimal value at the initial stage, obtaining a greater number of optimal solutions. With the increase in the number of iterations, the inertia weight decreases, and the local search ability is enhanced, which is conducive to a local search for other solutions close to the potential optimal solution.
The idea of the algorithm is that the particle moves in the solution space to track the individual extreme value and the population extreme value to update the position. The particle is required to calculate the fitness value every time it updates the position. It updates the individual extreme value and the population extreme value by comparing the fitness value. In this algorithm, the particle updates its velocity using Equation (14) and its position using Equation (15),
V id k + 1 = ω k V id k + c 1 r 1 ( P id k X id k ) + c 2 r 2 ( P g d k X i d k )
X i d k + 1 = X i d k + V i d k + 1
where wk is the inertia weight; D represents that the search space is D-dimensional, such that d = 1 ,   2 , , D ; i = 1 ,   2 , ;   n represents that there are n particles; k is the current iteration number; c 1 and c 2 are the acceleration factors in the PSO algorithm; r 1 and r 2 are random numbers in the interval (0,1); P i is the position of the individual extreme value; X i is the position of the particle; and P g is the position of the group extreme value.
The inertia weight varied according to the number of iterations and
ω k = ω max ( ω max ω min ) × k K
the particle swarm algorithm could be used to jointly optimize the upper and lower layers to solve the problem.
The steps used to solve the PSO algorithm were as follows:
Step 1: We entered the basic parameters, including the particle swarm algorithm acceleration factor, maximum termination generation, population size, maximum and minimum particle position, and maximum and minimum particle velocity.
Step 2: We initialized the population. According to the upper and lower limits of the decision variables of the upper-layer and lower-layer models, the initial population and the initial velocity of the particles were generated. The initial population was a matrix of random values generated by a rand function between the upper and lower limits of the variables.
Step 3: We calculated the fitness and discovered the optimal particle. Taking the objective function as the fitness function, the smaller the upper fitness value, the better the particle. The larger the lower fitness value, the better the particle. The initial population was included in the fitness function to calculate the fitness value. According to the obtained fitness value, the individual extreme value and the group extreme value as well as the individual best fitness and the group best fitness were discovered.
Step 4: We updated the weight, particle speed, and position. We obtained a weight value according to a formula and obtained a new subgeneration population.
Step 5: Boundary processing. According to the upper and lower limits of the decision variable, if the updated particle position was smaller than the lower-limit value or greater than the upper-limit value, the rand function was used to regenerate the value between the upper and lower limits.
Step 6: We judged whether the number of iterations was greater than the maximum termination generation. If yes, we proceeded to the next step. Otherwise, we returned to Step 4.
Step 7: We outputted the fitness value of the optimal individual and the optimal position of the particle and the iteration ended.

4. Numerical Analysis

4.1. Background and Parameter Setting

S Chemical Industry Park covers almost 30 square kilometers. There are 7 systems, such as raw material transportation system, production system, energy system, wastewater treatment system, environmental protection system, environmental monitoring system, and material storage system. Each system is divided into 9 subsystems. For example, the production system contains distillation, crystallization, adsorption, membrane processes, absorption, stripping, extraction, separation, and other subsystems. There are 16 kinds of equipment resources, 12 kinds of training resources, 28 kinds of material resources, and 19 kinds of human resources. α   i s 60%. The upper and lower limits of the price are the upper and lower limits of the bargaining range, which are 0.9 to 1.1 times the reference price, and the lower limit of the lower decision variable is the minimum quantity demanded, and the upper limit is 2 times the minimum quantity demanded. Other parameters can be seen in Table 2 and Table 3.

4.2. Calculation Process

The forward optimization was solved using a computer with the following basic configuration: Intel (R) Core (TM) i7-1065G7 CPU @ 1.30 GHz, 16 GB memory (15.7 GB available) running Microsoft Windows 10 Home Edition, using MATLAB R2016b configured with CPLE 12.10. The basic computer configuration used in solving the inverse optimization model was an Intel (R) Core (TM) i7-1065G7 CPU @ 1.30 GHz, 16 GB memory (15.7 GB available) running Microsoft Windows 10 Home Edition and using MATLAB R2020b.
We solved the instance using an actuate algorithm and a PSO algorithm. A numerical analysis showed that the exact algorithm could only solve small-scale problems, such as problems with only four locations. In practice, the number of locations of safety resources needed in chemical industry parks is much larger than that. The particle swarm optimization parameters were as follows: maximum inertia weight w max = 0.9; minimum inertia weight w min = 0.4; acceleration constants c 1 = 1.5 and c 2 = 2; particle velocity set in the range [−1, 1]; and a population size of 20. The maximum number of iterations was 100.

4.3. Result of the Forward Optimization Model

The forward optimization problem was solved using CPLEX. The results of the forward optimization model based on the original parameters are shown in the following figures. The maximum safety input of the forward optimization was nine million. The running time of the forward optimization was 3.5374 s.
Shown in Figure 4a is the maintenance material configuration diagram. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, the z-axis represents the k-th maintenance material, and the input quantity of the material is represented by color. For example, x (1,1,1) = 20; that is, the input quantity of the first maintenance material in the first subsystem of the first system was 20, and so on. Figure 4b is the maintenance person-hour configuration diagram. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, the z-axis represents the r-th maintenance of human resources, and the person-hour input is represented by color. For example, t (1,1,1) = 40; that is, the person-hour input of the first repair and maintenance of human resources in the first subsystem of the first system was 40, and so on. Figure 4c is the configuration diagram of the direct safety guarantee materials. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, and the z-axis represents the s-th direct safety guarantee material. The quantity of material input is represented by color. For example, x’ (1,1,1) = 1; that is, the input amount of the first direct security material in the first subsystem of the first system is 1, and so on. Figure 4d is the direct security labor person-hour configuration diagram. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, the z-axis represents the u-th direct security human resource, and the person-hour input is represented by color. For example, t’ (1,1,1) = 8; that is, the person-hour input of the first direct security human resource in the first subsystem of the first system was 8, and so on.

4.4. Result of the Inverse Optimization Model

As shown in Figure 5, after about 30 iterations, the algorithm results tended to be stable, and the running time was 1.806268 s. The ordinate was the fitness value, which was the square of the difference. The optimal value of the result calculated by inverse optimization was F = 8,499,771.1; that is, the input value was 8,499,771.1. The difference from the expected result was 0.052 × 106, which was 52,395.21. The safety resource input value obtained by the KKT condition was equal to the assigned value; that is, 8.5 × 106. The running time was 1442.292392 s. The result from the particle swarm optimization algorithm was close to the exact solution and the calculation time was much faster.
Shown in Figure 6a is a maintenance material configuration diagram. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, the z-axis represents the k-th maintenance material, and the input quantity of the material is represented by color. For example, x (1,1,1) = 23; that is, the input quantity of the first maintenance material in the first subsystem of the first system was 23, and so on. Figure 6b is the maintenance person-hour configuration diagram. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, the z-axis represents the r-th maintenance human resource, and the person-hour input is represented by a color. For example, t (1,1,1) = 41; that is, in the first subsystem of the first system, the person-hour input of the first repair and maintenance human resource was 41, and so on. Figure 6c is the configuration diagram of direct safety guarantee materials. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, and the z-axis represents the s-th direct safety guarantee material. The input quantity of materials is represented by color. For example, x’ (1,1,1) = 1; that is, the input amount of the first direct security material in the first subsystem of the first system was 1, and so on. Figure 6d is the direct security labor person-hour configuration diagram. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, the z-axis represents the u-th direct security human resource, and the person-hour input is represented by color. For example, t’ (1,1,1) = 11; that is, the person-hour input of the first direct security human resource in the first subsystem of the first system was 11, and so on.
Shown in Figure 7a is the price configuration diagram of repair and maintenance materials. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, the z-axis represents the k-th repair and maintenance materials, and the unit price of materials is represented by color. For example, a (1,1,1) = 178.2; that is, the unit price of the first repair and maintenance material resource in the first subsystem of the first system was 178.2, and so on. Figure 7b is the price configuration diagram of repair and maintenance labor hours. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, the z-axis represents the r-th repair and maintenance human resources, and the unit price of labor hours is represented by color. For example, b (1,1,1) = 23.9; that is, the unit price of the first repair and maintenance person-hour in the first subsystem of the first system was 23.9, and so on. Figure 7c is the price configuration diagram of direct security guarantee materials. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, the z-axis represents the s-th direct security guarantee material, and the unit price of the material is represented by color. For example, c (1,1,1) = 79.6; that is, the unit price of the first direct security material in the first subsystem of the first system was 79.6, and so on. Figure 7d is the direct security labor person-hour price configuration diagram. The x-axis represents the i-th system, the y-axis represents the j-th subsystem, the z-axis represents the u-th direct security human resource, and the person-hour unit price is represented by a color. For example, d (1,1,1) = 42.2; that is, the unit price of the labor hour of the first direct security human resource in the first subsystem of the first system was 42.2, and so on.
Finally, a comparison was conducted. The results are listed in Table 4.

4.5. Analysis of Results

(1) Regarding the input of the total safety resources, based on the original parameters, the optimal value obtained by the forward optimization model was F = 900 × 104. This exceeded the benchmark of 850 × 104. Based on the inverse optimization method, the input value was 8,499,771.1, which was much closer to the benchmark value.
(2) As shown in Figure 4, the error rate of the best value of the PSO was acceptable from the comparison of the results between random instances and actual instances. As the size of the instances increased, an exact algorithm was too slow to provide accurate solutions. The solving speed of the PSO was acceptable. Therefore, we concluded that the PSO could be used to solve the quaternion decision of the inverse optimization problem.

5. Conclusions

Most companies bear the discomfort of safety cost overruns and safety resource allocation, which is inefficient. Our research adopted a benchmark to solve the problem. The benchmark was a company that could minimize the consumption of human resources, financial resources, and material resources under the premise of ensuring safety. However, the allocation plans of safety resources are usually confidential. To infer a detailed plan of the benchmark, we adopted a quaternion decision of which types of safety resources were allocated at which point and at what quantity and price. This provided a key breakthrough point based on the target of benchmark safety. An optimal model of security and limited safety resource constraints were established. Once the security had reached a specific high point, the input of additional resources did not generate any effects to improve safety. Therefore, we applied the reverse-thinking of academic ideas and the inverse optimization method, converting the optimization model of maximizing safety to the inverse optimization model. Driven by the benchmark and by focusing on the inverse optimization model and algorithms for the bi-level programming of the quaternion decision, we achieved the modeling and solved the process of mechanism analysis → optimization modeling → dual conversion for inverse optimization → calculation by computer. We then used S Chemical Industry Park as a case study to apply the research.
This research is novel in solving quaternion decisions, changing the concept of safety management to guarantee safety by minimizing the consumption of resources. It not only provides new ideas and tools to solve the problem of the allocation of safety resources, but also promotes and strengthens the research into reverse engineering.
One future direction for the development of this research is the application of data-driven inverse optimization methods to consider real-time quaternion decisions.

Author Contributions

Conceptualization, L.Z.; methodology, L.Z.; software, W.G.; validation, W.G.; investigation, L.Z; writing—original draft preparation, L.Z.; editing, L.Z.; and supervision L.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (72271038, 71771036).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We would like to thank the editor and the anonymous reviewers for the valuable comments, which helped us to improve the paper greatly.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Aswani, A.; Shen, Z.J.; Siddiq, A. Inverse Optimization with Noisy Data. Oper. Res. 2018, 66, 870–892. [Google Scholar] [CrossRef] [Green Version]
  2. Birge, J.R.; Hortaçsu, A.; Pavlin, J.M. Inverse optimization for the recovery of market structure from market outcomes: An application to the miso electricity market. Oper. Res. 2017, 65, 837–855. [Google Scholar] [CrossRef] [Green Version]
  3. Martorell, S.; Villamizar, M.; Carlos, S.; Sanchez, A. Maintenance modeling and optimization integrating human and material resources. Reliab. Eng. Syst. Saf. 2010, 95, 1293–1299. [Google Scholar] [CrossRef]
  4. Reniers, G.L.L.; Srensen, K. An Approach for Optimal Allocation of Safety Resources: Using the Knapsack Problem to Take Aggregated Cost-Efficient Preventive Measures. Risk Anal. 2013, 33, 2056–2067. [Google Scholar] [CrossRef]
  5. Rullo, A.; Midi, D.; Serra, E.; Bertino, E. Pareto Optimal Security Resource Allocation for Internet of Things. Acm Trans. Inf. Syst. Secur. 2017, 20, 1–30. [Google Scholar] [CrossRef]
  6. Yan, X.H.; Ren, X.R.; Nie, X.F. A budget allocation model for domestic airport network protection. Socio-Econ. Plan. Sci. 2022, 82, 101274. [Google Scholar] [CrossRef]
  7. Li, H.; Liu, C.; Hu, X. Dynamic Generation and Optimization Model of Civil Aviation Special Emergency Response Plan. J. Saf. Environ. 2023, 23, 1596–1606. [Google Scholar]
  8. Jiang, F.-C.; Lai, E.; Shan, Y.-X.; Tang, F.-H.; Li, H.-G. A Set Theory-Based Model for Safety Investment and Accident Control in Coal Mines. Process Saf. Environ. Prot. 2020, 136, 253–258. [Google Scholar] [CrossRef]
  9. Lu, M.; Cheung, C.M.; Li, H.; Hsu, S.-C. Understanding the relationship between safety investment and safety performance of construction projects through agent-based modeling. Accid. Anal. Prev. 2016, 94, 8–17. [Google Scholar] [CrossRef]
  10. Heo, B.Y.; Min, J.K.; Heo, W.H. An algorithm for validation of the efficiency of disaster and safety management budget investment in South Korea. Int. J. Disaster Risk Reduct. 2020, 47, 101566. [Google Scholar] [CrossRef]
  11. Sato, Y. Optimal budget planning for investment in safety measures of a chemical company. Int. J. Prod. Econ. 2012, 140, 579–585. [Google Scholar] [CrossRef]
  12. Abrahamsene, E.B.; Selvik, J.T.; Milazzo, M.F.; Langdalen, H.; Dahl, R.E.; Bansal, S.; Abrahamsen, H.B. On the use of the ‘Return of Safety Investments’ (ROSI) measure for decision-making in the chemical processing industry. Reliab. Eng. Syst. Saf. 2021, 210, 107537. [Google Scholar] [CrossRef]
  13. Zhang, L.; Yang, W.; Luo, G. Inverse Optimal Value Method of “Task-personnel” Matching with Time Inferring: Taking Petrochemical Equipment Emergency Repair as an Example. Chin. J. Manag. Sci. 2023, 31, 276–286. [Google Scholar]
  14. Zhang, L.; Chen, Z.; Shi, D.; Zhao, Y. An Inverse Optimal Value Approach for Synchronously Optimizing Activity Durations and Worker Assignments with a Project Ideal Cost. Mathematics 2023, 11, 1178. [Google Scholar] [CrossRef]
  15. Chan, T.C.Y.; Kaw, N. Inverse optimization for the recovery of constraint parameters. Eur. J. Oper. Res. 2020, 282, 415–427. [Google Scholar] [CrossRef] [Green Version]
  16. Ahmed, S.; Guan, Y. The inverse optimal value problem. Math. Program. 2005, 102, 91–110. [Google Scholar] [CrossRef]
  17. Li, H. An evolutionary algorithm for multi-criteria inverse optimal value problems using a bi-level optimization model. Appl. Soft Comput. 2014, 23, 308–318. [Google Scholar] [CrossRef]
  18. Lv, Y.; Chen, Z.; Wan, Z. A penalty function method based on bi-level programming for solving inverse optimal value problems. Appl. Math. Lett. 2010, 23, 170–175. [Google Scholar] [CrossRef] [Green Version]
  19. Zhang, L.; Li, Z.; Yang, Y.; Cui, M. Human error unplanned downtime inferring and job-operator matching based on inverse optimal value method. Comput. Ind. Eng. 2020, 149, 106840. [Google Scholar] [CrossRef]
  20. Wu, H.; Wang, K.; Guo, Q.; Xu, G.; Ning, L. Design of a kind of nonlinear neural networks for solving the inverse optimal value problem with convex constraints. Int. J. Mach. Learn. Cybern. 2012, 5, 85–92. [Google Scholar] [CrossRef]
  21. Chan TC, Y.; Mahmood, R.; Zhu, I.Y. Inverse Optimization: Theory and Applications. arXiv 2021, arXiv:2109.03920v2. [Google Scholar]
  22. Heuberger, C. Inverse Combinatorial Optimization: A Survey on Problems, Methods, and Results. J. Comb. Optim. 2004, 8, 329–361. [Google Scholar] [CrossRef] [Green Version]
  23. Aswani, A.; Shen, Z.J.M.; Siddiq, A. Data-Driven Incentive Design in the Medicare Shared Savings Program. Oper. Res. 2019, 67, 1002–1026. [Google Scholar] [CrossRef]
  24. Ghobadi, K.; Lee, T.; Mahmoudzadeh, H.; Terekhov, D. Robust inverse optimization. Oper. Res. Lett. 2018, 46, 339–344. [Google Scholar] [CrossRef] [Green Version]
  25. Bodur, M.; Chan, T.C.Y.; Zhu, I.Y. Inverse mixed integer optimization: Polyhedral insights and trust region methods. INFORMS J. Comput. 2022, 34, 1471–1488. [Google Scholar] [CrossRef]
  26. Ajayi, T.; Lee, T.; Schaefer, A.J. Objective selection for cancer treatment: An inverse optimization approach. Oper. Res. 2022, 70, 1717–1738. [Google Scholar] [CrossRef]
  27. Allen, S.; Gabriel, S.A.; Dickerson, J.P. Using inverse optimization to learn cost functions in generalized nash games. Comput. Oper. Res. 2022, 142, 105721. [Google Scholar] [CrossRef]
  28. Wang, J.; Qin, Y.; Zhai, X.; Feng, L. Inverse Optimization Model of Enterprise Safety Resource Allocation and Its Application. China Saf. Sci. J. 2015, 25, 27–33. [Google Scholar]
Figure 1. Framework of this research.
Figure 1. Framework of this research.
Mathematics 11 03207 g001
Figure 2. Description of the inverse optimization of safety resources.
Figure 2. Description of the inverse optimization of safety resources.
Mathematics 11 03207 g002
Figure 3. Description of the scenarios of inverse optimization of safety resources.
Figure 3. Description of the scenarios of inverse optimization of safety resources.
Mathematics 11 03207 g003
Figure 4. Resource allocation theme by forward optimization.
Figure 4. Resource allocation theme by forward optimization.
Mathematics 11 03207 g004
Figure 5. Iterative graph of particle swarm optimization.
Figure 5. Iterative graph of particle swarm optimization.
Mathematics 11 03207 g005
Figure 6. Allocation theme of safety resources by inverse optimization.
Figure 6. Allocation theme of safety resources by inverse optimization.
Mathematics 11 03207 g006
Figure 7. Cost parameters of safety resources by inverse optimization.
Figure 7. Cost parameters of safety resources by inverse optimization.
Mathematics 11 03207 g007
Table 1. Mathematical symbols and meanings.
Table 1. Mathematical symbols and meanings.
SymbolMeaning
m Number of systems
n Number of subsystems
p Quantity of equipment resources
q Quantity of training resources
u Quantity of material resources
v Quantity of human resources
g 1 Upper limit of equipment resources
g 2 Upper limit of training resources
g 3 Upper limit of material resources
g 4 Lower limit of material resources
g 5 Upper limit of human resources
g 6 Lower limit of human resources
x i j k Quantity of the k-th equipment resource in the j-th subsystem of the i-th system
t i j r Time of the r-th resource in the j-th subsystem of the i-th system
x i j s Quantity of the s-th resource in the j-th subsystem of the i-th system
t i j μ Time of the μ-th resource in the j-th subsystem of the i-th system
a i j k Cost coefficient of the k-th resource in the j-th subsystem of the i-th system
b i j r Cost coefficient of the r-th resource in the j-th subsystem of the i-th system
c i j s Cost coefficient of the s-th resource in the j-th subsystem of the i-th system
d i j μ Cost coefficient of the μ-th resource in the j-th subsystem of the i-th system
e i Upper limit of the total investment of the i-th system
γ Coefficient of converting the total input in safety resources into safety output
α Proportion of human resources and non-human resources
f * Total input of safety resources of the benchmark
Table 2. The upper and lower limits of each resource input.
Table 2. The upper and lower limits of each resource input.
Parameter g 1 g 2 g 3 g 4 g 5 g 6
Value2,000,0001,200,0004,000,0003,000,0001,800,0001,500,000
Table 3. The upper limit of the total cost for each system.
Table 3. The upper limit of the total cost for each system.
Parameter e 1 e 2 e 3 e 4 e 5 e 6 e 7
Value500,000500,000500,000500,000600,000600,000600,000
Table 4. Comparison of forward and inverse optimization results.
Table 4. Comparison of forward and inverse optimization results.
Forward OptimizationInverse Optimization
Total safety resources input9,000,0008,499,771.1
Total input time of training and human resources (hour)80,391.980,819.2
Sum of the cost coefficient of time72,66967,149.9
Total input of non-human resources36,208.937,052.0
Sum of unit prices of materials455,266425,020.2
Difference from the benchmark500,000228.9
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, L.; Guo, W. Inverse Optimization Method for Safety Resource Allocation and Inferring Cost Coefficient Based on a Benchmark. Mathematics 2023, 11, 3207. https://doi.org/10.3390/math11143207

AMA Style

Zhang L, Guo W. Inverse Optimization Method for Safety Resource Allocation and Inferring Cost Coefficient Based on a Benchmark. Mathematics. 2023; 11(14):3207. https://doi.org/10.3390/math11143207

Chicago/Turabian Style

Zhang, Lili, and Wenhao Guo. 2023. "Inverse Optimization Method for Safety Resource Allocation and Inferring Cost Coefficient Based on a Benchmark" Mathematics 11, no. 14: 3207. https://doi.org/10.3390/math11143207

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop