Content area

Abstract

The Minimum Spanning Tree (MST) problem addresses the challenge of identifying optimal network pathways for critical infrastructure systems, including transportation grids, communication backbones, power distribution networks, and reliability optimization frameworks. However, inherent uncertainties stemming from disruptive events demand robust analytical models for effective decision-making. This research introduces an uncertainty-theoretic framework to assess MST stability in uncertain network environments through novel constructs: lower set tolerance (LST) and dual lower set tolerance (DLST). Both LST and DLST provide quantifiable measures characterizing the resilience of element sets relative to edge-weighted MST configurations. LST captures the maximum simultaneous risk variation preserving current MST optimality, while DLST identifies the minimal variation required to invalidate it. We evaluate MST robustness by integrating uncertain reliability measures and risk factors, with emphasis on computational methods for set tolerance determination. To overcome computational hurdles in set tolerance derivation, we establish bounds and exact formulations within an uncertainty programming paradigm, offering enhanced efficiency compared with conventional re-optimization techniques.

Full text

Turn on search term navigation

1. Introduction

1.1. Background and Problem Context

The Minimum Spanning Tree (MST) problem is a cornerstone of network optimization, aiming to identify a tree that connects all vertices in a network while minimizing the total weight of edges. This problem is pivotal in fields such as logistics, telecommunications, power grids, computer networks, and transportation infrastructure. However, disruptions like natural disasters introduce uncertainties that compromise network reliability and stability, leading to unpredictable performance and high variability in network parameters. In contexts like communication or power networks, where edges represent failure probabilities (risk factors), the goal shifts to maximizing overall network reliability, often by minimizing cumulative system risk. When precise information about edge functionality is unavailable, relying on probability distributions becomes problematic. Parameters are often expressed as ’belief degrees’ derived from expert judgment, but using probability or fuzzy theory to model these can lead to misleading outcomes due to the occurrence of unlikely events, resulting in greater variance than observed frequencies. Uncertainty theory has emerged as an effective framework to address these challenges [1,2,3].

This study advances the analysis of MST stability in uncertain networks by proposing a novel uncertainty-based model. The model facilitates stability analysis of edge-weighted MSTs under uncertainty by integrating risk factors associated with network edges. Specifically, it addresses the uncertain MST problem by evaluating the robustness of MST solutions against network uncertainties. Central to this approach is the concept of lower set tolerance (LST), defined as the maximum simultaneous risk variation across multiple uncertain elements that preserves the optimality of the current MST. Additionally, we introduce the dual lower set tolerance (DLST), which measures the minimum risk variation across a set of elements that renders the current MST non-optimal. These metrics gauge the sensitivity of an optimal MST to risk changes in multiple edges, with low LST or DLST values indicating that small changes can disrupt optimality. Such insights are critical for decision-makers and network planners to monitor vulnerable edge sets.

This study is the first to focus on the stability of uncertain MSTs without relying on probability distributions or fuzzy membership functions. Although computing set tolerances precisely can be challenging, we demonstrate that they are mathematically well-defined and provide computational formulations using uncertainty programming to efficiently compute or bound them. We derive bounds and exact formulas for LST and DLST, leveraging their relationships with single tolerance counterparts, and compare the results of regular and dual lower set tolerances.

The paper is organized as follows. Section 1.2 reviews relevant literature, highlighting research gaps and the motivation for this study. Section 2 defines the uncertain MST problem and introduces the programming model for α-MST. Section 3 presents a tolerance-based stability analysis of the uncertain MST, including bounds and exact formulas for LST and DLST. Section 4 summarizes key findings and proposes directions for future research. Appendix A provides foundational concepts and an overview of uncertainty theory.

1.2. Motivation and Research Contributions

The notions of tolerances and sensitivity play instrumental roles in refining local search heuristics and resolving network-centric difficulties in network architecture and transportation cybernetics. Tolerance-driven methodologies have demonstrated efficacy in enhancing optimization techniques like branch-and-bound for combinatorial challenges, including MST, traveling salesman problem (TSP), shortest path identification, and widest path determination [4,5,6,7,8,9,10].

Building upon recent progress in single tolerances for post-disaster transport networks—which established minimum and maximum cost variations preserving solution optimality for individual elements—we present two novel metrics, lower set tolerance (LST) and dual lower set tolerance (DLST), as network stability gauges. These set-based tolerance measures prove particularly advantageous in scenarios featuring uncertain change distributions but known aggregate estimations, exemplified by transportation networks where traversal times fluctuate unpredictably across connections without certainty regarding affected edges. We mathematically formalize LST and DLST under uncertainty, deduce their properties, and illustrate their utility in uncovering structural characteristics of optimal MST solutions, including identification of elements common to all optima and detection of alternative solution existence. Furthermore, we institute methodologies to compute or bound these set tolerances, frequently leveraging single tolerances, and recognize shared attributes (e.g., independence from selected optimal solution and positive values indicating unique optima) alongside distinctions (e.g., interpretation of infinite values).

This research progresses sensitivity analysis under uncertainty, a critical concentration in operations research, particularly for appraising network functionality during crisis scenarios [11,12,13,14,15,16]. A primary objective has involved evaluating network robustness and pinpointing critical constituents, with diverse frameworks employing metrics to investigate reliability [17]. However, most methodologies depend on probabilistic or fuzzy theoretical foundations [3,18,19], which prove inadequate when network parameters, such as edge functionality, lack sufficient data for reliable probability distribution formation, as witnessed during earthquake emergencies. Various analytical and modeling frameworks have surfaced to explore network reliability utilizing diverse metrics. Within the domain of road network reliability, prevailing studies predominantly concentrate on three fundamental domains: (1) connectivity reliability, (2) travel time reliability, and (3) capacity reliability [20,21,22,23,24,25,26]. Ref. [11] pioneered the modeling of network travel time reliability under stochastic demand, offering one of the earliest methodological foundations for quantifying travel-time variability in congested networks. Ref. [20] introduced a matrix-exponential approach for network reliability analysis, providing an exact probabilistic framework suitable for evaluating large-scale systems with complex failure distributions. Ref. [26] proposed an evaluation framework for carrying capacity reliability in regional rail transit systems, highlighting the importance of reserve capacity and operational resilience in modern rail networks. Ref. [21] analyzed the interaction between travel time reliability and route choice behavior using a generalized Bayesian traffic model, bridging behavioral responses with network reliability outcomes. Ref. [22] presented a comprehensive review of methodological developments in travel time reliability, summarizing advances in measurement, modeling, and integration into traffic assignment. Ref. [25] examined connectivity analysis of transportation networks by incorporating bridges and pavements under uncertainty, offering a practical framework for assessing infrastructure-dependent reliability. Ref. [24] focused on seaborne crude oil networks, proposing a methodology for connectivity reliability evaluation and the selection of most reliable shipping routes, relevant for maritime logistics planning. Ref. [27] applies uncertainty modeling for travel times in distribution logistics, using Monte Carlo and collocation methods to capture variability in travel times and analyze its impact on routing and scheduling decisions. Ref. [23] investigated resilience in flood-disrupted dynamic transportation networks, characterizing link reliability and stability to capture system performance under cascading hazards. Ref. [16] studied max-type reliability in post-disaster networks using sensitivity and stability analysis, extending uncertain network models to capture performance under extreme disruptions. Ref. [12] analyzed connectivity reliability in uncertain networks through stability analysis, providing theoretical foundations closely aligned with uncertainty-driven reliability measures. Ref. [14] developed robustness assessment methods for urban road networks under multiple hazard events, integrating hazard exposure with network structure to evaluate vulnerability. Ref. [15] offered a comprehensive review of transportation system resilience concepts, consolidating definitions, frameworks, and evaluation methods for infrastructure and operational resilience. Ref. [13] investigated the connectivity of intercity passenger transportation in China using a multi-modal network approach, illustrating the significance of integration across transport modes for accessibility and reliability.

However, we note that expert-derived “belief degrees” for edge dependability, when modeled probabilistically, can generate untrustworthy outcomes. To address this limitation, uncertainty theory, pioneered by [1,2], supplies a rigorous framework for managing human-induced uncertainties in network reliability assessment. We propose an innovative approach integrating MST, sensitivity examination, and set tolerances within uncertainty theory. Here, edge reliabilities are represented as uncertain variables—neither fuzzy nor stochastic—enabling precise characterization in data-deficient situations. We investigate how modifications in edge reliabilities influence MST stability, introducing LST and DLST as pivotal metrics in uncertain settings. Employing uncertainty theory, we develop systematic procedures to compute these set tolerances, strengthening network resilience assessment. This investigation contributes to the broader exploration of uncertain network challenges [2,16,28,29,30,31,32,33,34,35,36]. Numerous recent studies have extended uncertainty theory to diverse network design and optimization contexts. Recent works further illustrate how uncertainty can be systematically incorporated into network reliability and optimization models. For instance, Wang and Sheng [37] address both uncertain edge weights and uncertain topology, employing conditional uncertain variables to model networks where edges may or may not exist under uncertainty. Ref. [38] develop an Uncertainty Reliability Indicator (URI) for structural systems under epistemic uncertainty, defining safety-cost trade-offs using uncertain variables. Ref. [10] propose a reliability certification framework for supply chain networks subject to uncertain failures and demand, emphasizing robust design under uncertainty. Hosseini and Wadbro [12] analyzed connectivity reliability in uncertain networks, a direction closely related to our MST stability framework. Ref. [34] incorporated uncertain flows into the p-hub location problem, and Veresnikov et al. [35] applied uncertain programming to technical system design. Ref. [39] modeled environmental supply chain networks under uncertainty, demonstrating applicability in sustainability contexts. In graph optimization, Gao and Jia [40] studied the degree-constrained MST with uncertain edge weights, while [31] extended uncertain multilevel programming to vehicle routing. Ref. [30] provided a bibliometric overview of uncertainty theory applications in supply chains, highlighting future research avenues. More recently, Hosseini [16] explored max-type reliability in post-disaster networks. Guo et al. [28] addressed procurement and routing strategies under uncertain environments, and Wang [29] proposed mixed-uncertainty modeling for coal transportation costs. Together, these contributions illustrate the growing role of uncertainty theory in addressing complex reliability and optimization problems across transportation and supply chain systems. These works collectively demonstrate that uncertainty theory is maturing as a serious alternative to probabilistic/fuzzy methods for modeling human-induced or data-scarce reliability, and they strongly motivate the development of LST and DLST in uncertain network environments.

This work establishes a substantive foundation for analyzing the stability of uncertain minimum spanning trees through LST and DLST applications, effectively merging theoretical progress with practical applicability. As uncertainty increasingly impacts critical infrastructure, demand for such analytical frameworks will escalate, rendering this research a timely and valuable disciplinary contribution. In summary, this investigation delivers three principal contributions: (1) a methodological framework for incorporating “belief degrees” in tolerance-based stability assessment of uncertain MSTs, addressing constraints of probabilistic and fuzzy approaches; (2) verification that LST and DLST are well-defined, solvable, and computable in polynomial time and (3) efficient computational procedures for LST and DLST outperforming iterative re-optimization methods.

2. Modelling and Formulation: Uncertain MST

Consider N=(V,E) denoting a network where V represents the node set and EV×V the edge set. Let n=|V| and m=|E| indicate node and edge (or link) counts, respectively. Unique edges represent connections between node pairs. A spanning tree T=V,ET constitutes a sub-network of N structured as a tree containing n1 edges. Assuming each edge possesses an associated cost, an MST represents a spanning tree minimizing cumulative cost/weight across all spanning trees. We designate Ω as the complete set of spanning trees in N. Specifically, we define subset Ω(i,j)+ as spanning trees containing edge (i,j), and Ω(i,j) as those excluding edge (i,j).

Each edge (i,j) features an associated reliability measure rij(0,1) quantifying its functional probability. Naturally, we seek a spanning tree T=V,ET maximizing aggregate reliability. Thus, we maximize (i,j)Trij over the complete spanning tree set Ω. For computational convenience, we transform this maximization into a minimization problem through reliability factor inversion, representing transformed factors as rij:=rij1 (termed risk factors). Consequently, we approach the reformulated network problem as an MST formulation employing risk factors rij(0,+) as edge weights.

The problem now constitutes a standard MST formulation—the minimal risk spanning tree problem. We define the risk R(T) of spanning tree TΩ as the summation of edge risks within T. Hence, the MST formulation is expressible as follows:

(1)minTΩR(T)=minTΩ(i,j)Trij=minTΩ(i,j)ErijxijT,

where xijT=1 indicates edge (i,j) belongs to T and 0 otherwise.

Accordingly, R(Ω):=minTΩR(T) designates the objective function value for the MST problem—the risk value of an MST within the network. In a similar way, we let RΩ(i,j)+ and RΩ(i,j) denote the risk value of the MST within Ω(i,j)+ and Ω(i,j), respectively.

MST in Uncertain Settings

Diverging from conventional MST formulations, we examine scenarios featuring an uncertain measure M, with uncertain risk variables associated with edges (Appendix A). Specifically, for each edge (i,j)E, there exists an uncertain risk variable ξ(i,j)=ξij. This permits MST analysis under uncertain conditions where edge risks exhibit extreme variability. A spanning tree T with uncertain risk variables constitutes an uncertain family denoted ξT=ξij(i,j)T. The uncertain risk variable linked to this tree manifests as the combined edge risks:

(2)fξT=(i,j)Tξij=(i,j)EξijxijT.

Expression (1) specifies the minimization objective (over TΩ) for the uncertain MST problem, targeting identification of minimal-risk spanning trees under uncertain conditions:

(3)minTΩ(i,j)Tξij=minTΩ(i,j)EξijxijT.

The value of fξT remains uncertain; consequently, we must clarify the interpretation of ‘min’ in (2).

Owing to limitations in traditional deterministic or probabilistic approaches for handling uncertain variables, alternative methods must be investigated for addressing the uncertain MST challenge via uncertainty programming techniques. This necessitates the development of comparable models. In contrast to real numbers, the uncertain domain lacks inherent ordering. A fundamental challenge involves establishing a ranking methodology for uncertain variables. To address this, ref. [36] employed the critical value concept (specifically, the pessimistic value) of an uncertain variable. Uncertainty programming incorporating this critical value principle constitutes chance-constrained programming.

Assuming N=(V,E) is a network, T a spanning tree, and α(0,1] a predetermined confidence level (user-specified), the α-critical value (here, the α-pessimistic value) associated with the uncertain spanning tree ξT is defined as

(4)ξTα=infrM{f(ξT)r}α.

An uncertain spanning tree ξT* qualifies as an α-MST if for any alternative tree ξT we have ξT*αξTα. We observe that for any predetermined confidence level α(0,1], the α-pessimistic value associated with an uncertain spanning tree ξT and the α-pessimistic value of any uncertain risk variable ξij constitute increasing, left-continuous functions of α. Therefore, the α-MST programming model for the uncertain MST formulation is structured as an r-minimization:

(5)minrR,TΩr,subjecttoM(i,j)Tξijrα.

To advance, let network N(α) signify the transformed version of an uncertain network N, where uncertain risk variables ξij are replaced by their α-pessimistic values ξijα for specified confidence level α. The subsequent theorem establishes that the α-MST can be acquired by solving a standard MST problem in this auxiliary network N(α).

Theorem 1

([36]). Assume α constitutes a predetermined confidence level and N=(V,E) an uncertain network. Furthermore, assume uncertain risk variables {ξij(i,j)E} exhibit independence and possess regular distributions {Φij(i,j)E}. If Ψ1 symbolizes the inverse uncertainty distribution of the uncertain MST, then Ψ1 exists as a continuous, strictly increasing function of α. Additionally, it is established that the α-MST formulation can be equivalently expressed as

(6)minTΩ(i,j)Tξijα=minTΩ(i,j)EξijαxijT,

where ξijα designates the α-pessimistic value of variable ξij and it is defined as

(7)ξijα=infrM{ξijr}α.

Given that uncertain risk variables ξij are mutually independent with regular distribution functions, we delineate a method for calculating the inverse uncertainty distribution Ψ1 of the uncertain MST in such networks. Specifically, for any α(0,1), Ψ1(α) is determinable. Iterating this process enables numerical acquisition of uncertainty distribution Ψ(x) to the decision-maker-specified precision. This empowers decision-makers to compute maximally reliable MSTs across risk levels and comprehend network performance under diverse uncertainty scenarios.

Example 1.

The proposed methodology is applied to dual instances corresponding to distinct planning zones within the street network illustrated in Figure 1. Each network edge is associated with an independent uncertain risk variable, reflecting inherent system uncertainty. We let Ψ denote the uncertainty distribution of the uncertain MST, governing MST behavior under uncertainty. By evaluating Ψ, we analyze uncertain MST evolution as a function of network-wide uncertain risk variables.

Our example employs varied confidence level α values. Primarily, we apply Linear and Zigzag uncertainty distributions to links (Appendix A). Constructing these distributions required parameter estimation. Certain parameters (e.g., a, b, c in Definitions A3 and A4) for link distributions were randomly selected from uniform distributions within user-defined bounds. Users also specified uncertainty variable types assigned per link. Once the confidence level α(0,1) is fixed, inverse uncertainty distributions for all ξij are computed. The α-MST within N(α) is subsequently derived using an MST algorithm (e.g., see [4]).

For a clearer understanding of the network topologies, the risk variables for a bunch of edges, as well as their corresponding α-pessimistic values ξijα, are displayed in Table 1. This provides insight into the variability and risk associated with specific links within the network, offering a foundation for further analysis of their stability and reliability. We remark that for any link ξij with a constant risk parameter c, we can set ξij=ξijα=c for all values of α [1,2].

The corresponding objective function optima for the α-MST formulation appear in Figure 2. Note that uncertain MST objective optima originate from the inverse distribution of the uncertain MST; i.e., minTΩ(i,j)Tξijα.

Through incremental α adjustment within (0,1), we efficiently compute both inverse distribution Ψ1 and overall distribution Ψ for the uncertain MST, furnishing a comprehensive behavioral representation under varying confidence levels. This process enables graphical depiction of the relationship between uncertain MST distribution and uncertainty levels, as illustrated in Figure 2.

3. Sensitivity Analysis Based on Lower Set Tolerances

3.1. Single Lower Tolerances

This section introduces and formalizes tolerance-based sensitivity analysis for the uncertain MST. The analysis hinges on the α-MST concept, where tolerances are computed as confidence level functions. As the confidence level α varies, both MST and tolerances dynamically adapt. Tolerance formulas are presented, demonstrating their variation relative to confidence level. For general uncertain MST formulations, lower tolerances illuminate how optimal spanning trees are affected by edge risk factor modifications. Specifically, lower tolerance quantifies risk factor reduction impacts. Computing these tolerances constitutes a combinatorial challenge, further complicated in uncertain networks where analysis involves uncertain variables rather than deterministic factors.

Remark 1.

Our exposition demonstrated that any uncertain MST formulation on N is convertible to an α-MST formulation on modified network N(α) for given α. In this auxiliary network N(α), risk variables cease to be ‘uncertain’; they are replaced by definite α-pessimistic values. Consequently, we simply implement variable transformations ξij(i,j)E then apply MST algorithms (e.g., Kruskal) to identify an MST in N(α). Assuming ξijα represents α-pessimistic values for variables ξij in network N, we substitute all ξij in the uncertain network with ξijα. Edge transformation initialization consumes O(m) time; thus, algorithm complexity is typically Omlogm where m is the edge count. Utilizing efficient disjoint-set data structures (e.g., Union-Find) reduces time complexity to Omlogn, where n is node count [4].

Definition 1

(λ-Network). Denote by N(i,j)λ(α) the network N(α) for λR0, where edge (i,j) value ξijα (denoted ξ(i,j)α) is replaced by ξijαλ, with other values unchanged:

(8)ξ(i,j)α=ξijαif(i,j)(i,j),ξijαλif(i,j)=(i,j).

Assuming α is a specified confidence level and T* is an α-MST (i.e., MST in N(α)), lower tolerance is defined as the supremum λ permitting link weight reduction—typically within the α-MST—while maintaining spanning tree α-MST status, with other factors invariant. Thus, we formalize the single lower tolerance for a link relative to T* as

(9)lT*α(i,j)=supλ0,ξijαλT*isMSTforN(i,j)λ(α)=infλ0,ξijαλT*isnotMSTforN(i,j)λ(α).

For technical analysis, the function RN(α) proves particularly useful. It signifies the minimal objective function value for the MST formulation in N(α) without ξijα perturbations. Specifically, it provides the uncertain MST value in N for preset α:

(10)RN(α)=minTΩ(α)R(T),

where Ω(α) is the spanning tree set in N(α). We also note that set Ω(α) in N(α) is identical to set Ω in N.

It is established [36] that for given confidence level α and T1,T2Ω, and for any edge (i,j)E/(T1T2):

(a1) if RT1=RT2 then λ: RN(i,j)λ(α)T1=RN(i,j)λ(α)T2,

(a2) if RT1RT2 then λ: RN(i,j)λ(α)T1RN(i,j)λ(α)T2.

Consequently, we deduce that when lower tolerances exist, full edge set examination is unnecessary. Instead, we only consider edges in E excluded from T*; i.e., (i,j)ET*. Thus, lower tolerance existence for edge (i,j) implies (i,j)ET* for some α-MST T*. Namely, for every α-MST pair T* and T** in Ω, for any edge (i,j)E(T*T**) we have

(11)lT*α(i,j)=lT**α(i,j).

This implies that for any fixed α, lower tolerances are independent of any specific α-MST. Therefore, we now reference tolerances without explicit α-MST specification. This generalization facilitates broader comprehension of edge tolerances in uncertain networks, enabling more flexible and comprehensive tolerance-based analysis.

Lemma 1

([36]). Let α be a predetermined confidence level for an uncertain network N=(V,E). If some α-MST excludes (i,j), then lower tolerance lijα is obtainable via the following:

(12)lijα=RN(i,j)+(α)RN(α),

where RN(i,j)+(α) signifies the α-MST value in N(α) containing edge (i,j), calculable as

(13)RN(i,j)+(α)=RN(i,j)M(α)+M,whereMmax(i,j)Eξijα.

3.2. Set-Based Lower Tolerances

The single lower tolerance concept extends to scenarios where risk factors for edge sets are perturbed by constants, yielding lower set tolerances. Thus, as a tolerance extension, we introduce a generalized tolerance analysis problem, set tolerance analysis, where multiple elements vary concurrently and independently over predefined sets to evaluate how such variations impact current MST optimality. To this end, we posit that AE is the edge set (collection) undergoing modification, and λ is a collection of non-negative real-valued perturbation variables λijR0 for (i,j)A. Henceforth, given network N=(V,E), we denote by NAλ the network N=(V,E) where edge (i,j) factor is perturbed by λij(i,j)A, and (i,j)Aλij=λ.

Assuming α is a specified confidence level and T* is an α-MST, we define the lower set tolerance of A relative to T* as the supremum λ such that risks for all edges (i,j)A remain non-increasing with total reduction λ and T* retains optimality, provided risks for all other edges (i,j)EA are unaltered.

(14)LT*αA=supλR0λ(i,j)Aλij=λ,λij0,ξijα,T*isMSTinNAλ(α).

For a lower set tolerance, the corresponding infimum definition is non-equivalent to the supremum definition. Therefore, we define the dual lower set tolerance as follows:

(15)L¯T*αA=infλR0λ(i,j)Aλij=λ,λij0,ξijα,T*isnotMSTinNAλ(α).

L¯T*α(A) identifies a pathway—potentially an α-MST post-perturbation—achievable with minimal effort/reduction.

Remark 2.

Consider N(α) as the transformed version of N=(V,E) for a preset confidence level α, T* an α-MST, and AE the edge set undergoing modification. If lower and dual lower set tolerances exist, the complete set A need not be considered. For (dual) lower set tolerance computation, we only examine elements of AE excluded from T*, i.e., (i,j)AT*. Consequently, whenever discussing (dual) lower set tolerance for set A, it implies the existence of α-MST T* such that (i,j)AT*(i,j)A.

Remark 3.

Assuming RNAλ(α)T1 and RNAλ(α)T2 represent risk values of T1 and T2 in the perturbed network NAλ(α), then for any edge set AE(T1T2):

(a) if RT1=RT2 then vector λ: RNAλ(α)T1=RNAλ(α)T2,

(b) if RT1RT2 then vector λ: RNAλ(α)T1RNAλ(α)T2.

Lemma 2.

For any uncertain network and confidence level α, lower set tolerances are independent of α-MST—for every α-MST pair T* and T** and any edge set AE(T*T**):

(16) L T * α ( A ) = L T * * α ( A ) ,

(17) L ¯ T * α ( A ) = L ¯ T * * α ( A ) .

Proof. 

Consider AA(T*T**) and perturbation vector λ. Note that T* and T** are dual α-MSTs in N(α). Hence, R(T*) and R(T**) are identical. Therefore, for any perturbation vector λ, Remark 3 implies

(18)RNAλ(α)T*=RNAλ(α)T**.

Finally, lower set tolerance and dual lower set tolerance definitions (14) and (15) establish the results. □

Per Lemma 2 results, (dual) lower set tolerances for any set A are independent of α-MST. Consequently, we henceforth denote set tolerances without specific α-MST indication. Additionally, examining LST and DLST definitions (14) and (15) reveals that for any α-MST T*:

(19)L¯αALαAedgesetAE,

(20)L¯αA=LαA=lijαsingletonedgeA={(i,j)E},

where lower tolerance lijα is obtainable via Lemma 1.

Lemma 3.

Consider an uncertain network N=(V,E) and a predetermined confidence level α. Let AE be the edge set undergoing changes. Then the following statements are equivalent. (a) 

A E T Ω T

(b) 

L¯αA=,

(c) 

min(i,j)Alijα=.

Proof. 

Note that the spanning tree set Ω(α) in N(α) is identical to Ω in N for any α.

(a) ⇒ (b): Since A is a subset of no spanning tree, reducing the risk of edge (i,j)(i,j)A leaves spanning tree risks unchanged. Thus, optimal solutions (α-MSTs) in N(α) remain optimal for NAλ(α). Consequently, L¯α(A)=.

(a) ⇐ (b): Assume L¯α(A)= and T* is α-MST in N(α) with AET*. Suppose a spanning tree TΩ exists with AET. Thus, at least one edge (k,t)A belongs to T. Define perturbation vector λ with components:

(21)λij=λ,(i,j)=(k,t),0,(i,j)(k,t),

where (i,j)A and λ>RN(α)(T)RN(α)T*. Then,

(22)RNAλ(α)(T)=RN(α)(T)λ<RN(α)T*=RNAλ(α)T*,

where RNAλ(α)(T) and RN(α)(T) denote T’s risk values in the perturbed network NAλ(α) and N(α), respectively. Here, T* cannot be α-MST for NAλ(α). Therefore, L¯α(A)λ, contradicting L¯α(A)=. Thus, AETΩT holds.

(a) ⇔ (c): Since A is a subset of no spanning tree TΩ, (i,j)TΩT(i,j)A. Thus, any edge (i,j) is excluded from every spanning tree, and reducing (i,j)’s risk leaves spanning tree risk values unchanged. Hence, α-MSTs persist as optimal, justifying lijα=(i,j)A, establishing the result. Finally, (a) ⇐ (c) follows from the equivalence of expressions. □

Lemma 4.

Consider uncertain network N=(V,E), predetermined confidence level α, and AE (with defined lower set tolerance) as the edge set subject to changes. Let vector λR0 (components λij) with λ=(i,j)Aλij be a perturbation vector satisfying λ>Lα(A). Then, set A intersects every α-MST in NAλ(α).

Proof. 

First, since AE has defined a lower set tolerance, some α-MST T* in N(α) satisfies AET*. Proof by contradiction: suppose not, i.e., some α-MST T exists in NAλ(α) with AET. Since spanning tree set Ω(α) in N(α) matches that of NAλ(α) for any α, T is a feasible spanning tree in N(α), so R(T*)R(T). As AE(T*T), Remark 3 implies

(23)R(T*)=RNAλ(α)(T*)RNAλ(α)(T)=R(T).

By lower set tolerance definition and λ>Lα(A), T* cannot be α-MST for NAλ(α). Alternatively, T also cannot be α-MST for NAλ(α). This contradicts T’s optimality, hence A intersects every α-MST in NAλ(α). □

Theorem 2.

Consider uncertain network N=(V,E), predetermined confidence level α, and AE as the modifying edge set. The following bounds for lower and dual lower set tolerances hold. (a) 

L¯αALαA,

(b) 

max(i,j)AlijαLαA(i,j)Alijα,

(c) 

L¯αA=min(i,j)Alijα.

Proof. 

(a): This inequality follows directly from definitions (14) and (15).

(b): Assume T* is α-MST in N(α) with AET*. For the first inequality, assume the contrary: max(i,j)Alijα>Lα(A). Thus, for at least one edge (k,t)A, lktα=max(i,j)Alijα. Define β satisfying Lα(A)<β<lktα. Define specific perturbation vector λ with components:

(24)λij=Lα(A)+β2,(i,j)=(k,t),0,(i,j)(k,t).

By lower set tolerance definition, for all λ=(i,j)Aλij with Lα(A)<λ<β, T* is not MST for NAλ(α). Since LαA+β2<β<lktα, this contradicts the lower tolerance definition (14).

For the second inequality, assume the contrary: (i,j)Alijα<Lα(A). Define β satisfying (i,j)Alijα<β<Lα(A) and λ with β<λ<Lα(A). Define perturbation vector λ (components λij) with λ=(i,j)Aλij such that T* is α-MST of NAλ(α). Therefore, some spanning tree T and edge (k,t)A satisfy

(25)λkt>lktα,

implying

(26)RNAλ(α)(T)<RNAλ(α)T*,

contradicting T*’s optimality in NAλ(α).

(c): First show L¯α(A)min(i,j)Alijα. Assume the contrary: L¯α(A)>min(i,j)Alijα. Some edge (k,t)A satisfies lktα=min(i,j)Alijα. Define β satisfying lktα<β<L¯α(A). Define perturbation vector λ with components:

(27)λij=lktα+β2,(i,j)=(k,t),0,(i,j)(k,t).

By dual lower set tolerance definition (15), for all λ=(i,j)Aλij with 0<λ<β, T* is not α-MST for NAλ(α). This yields a contradiction since lktα<12(β+lktα).

Now prove L¯α(A)min(i,j)Alijα. Assume the contrary: L¯α(A)<min(i,j)Alijα. Considethe r perturbation vector λ (components λij) with

(28)L¯α(A)<λ<min(i,j)Alijα<min(i,j)Aξijα

such that T* is not α-MST in NAλ(α). Thus, some spanning tree T satisfies

(29)RNAλ(α)(T)<RNAλ(α)(T*).

Case 1: If AET, Remark 3 implies

(30)R(T*)=RNAλ(α)(T*)RNAλ(α)(T)=R(T),

contradicting the inequality.

Case 2: If AET, then at least one edge (k,t)A satisfies (k,t)T. Select the edge (k,t) with ξktα=min(i,j)ATξijα. We immediately derive

(31)RN(i,j)+(α)RN(α)(T)<RNAλ(α)T*+ξktαRN(α)(T)+lktα,

contradicting Lemma 1. □

Corollary 1.

Consider an uncertain network N=(V,A) and a predetermined confidence level α. Let AE be the modifying edge set. Then the following statements are equivalent. (a) 

A E T Ω T

(b) 

LαA=,

(c) 

max(i,j)Alijα=.

Corollary 2.

Uncertain network instances exist where for certain MSTs and a given confidence level α, the following cases occur: (a) 

max(i,j)Alijα=LαA,

(b) 

max(i,j)Alijα<LαA<(i,j)Alijα,

(c) 

LαA=(i,j)Alijα.

Lemma 5.

Consider uncertain network N=(V,E), predetermined confidence level α, Ω* the complete set of α-MSTs in N, and AE the modifying edge set. Then (a) 

AET*Ω*T*L¯α(A)>0,

(b) 

AET*Ω*T*Lα(A)>0.

Proof. 

(a): Since AEP*P*T*, for any edge (i,j)A, (i,j)T*Ω*T*. Thus, by single lower tolerance definition and Lemma 1 computation, lijα>0(i,j)A. Consequently,

(32)min(i,j)Alijα>0andmax(i,j)Alijα>0.

Finally, Theorem 2(b,c) establishes L¯α(A)>0 and LαA>0. The reverse direction in (a) follows from expression equivalence. Note that (b)’s reverse direction generally fails. □

Corollary 3.

Consider an uncertain network N=(V,E), a predetermined confidence level α. Then the following statements are equivalent. (a) 

Exactly one α-MST T* exists in N(α).

(b) 

L¯α(A)>0AET*.

(c) 

Lα(A)>0AET*.

In this section, we have developed a practical toolkit to assess how much risk can shift in a network before its Minimum Spanning Tree (MST) loses optimality. The foundation is Lemma 1, which provides a formula for the single lower tolerance lijα, quantifying how much risk an edge (i,j) can lose before the α-MST changes. This gives network managers a quick metric to gauge individual edge stability. Building on this, Lemma 2 proves that these tolerances are independent of the specific α-MST chosen, ensuring reliable results across different network configurations.

Scaling up, Theorem 2 delivers two critical tools: lower set tolerance (LST) and dual lower set tolerance (DLST). LST, as shown in Theorem 2(b), measures the maximum total risk reduction a set of edges A can sustain while keeping the α-MST intact, with bounds max(i,j)AlijαLα(A)(i,j)Alijα. These bounds allow quick assessment of network resilience without intensive computations. Meanwhile, Theorem 2(c) defines DLST as L¯α(A)=min(i,j)Alijα, pinpointing the smallest risk drop—computed via Lemma 1—that disrupts the MST. Network managers can use DLST to identify and reinforce critical edges, such as vulnerable power lines or shipping routes, to prevent failures during disruptions.

The uniqueness of the α-MST is addressed in Corollary 3, which states that if only one α-MST exists, then L¯α(A)>0 for any set AET*. This signals that the network can tolerate some risk reductions without shifting the MST. If multiple MSTs exist, low tolerances from Lemma 1 on non-MST edges warn of potential instability, prompting preemptive action. Managers can test this by computing lijα for non-MST edges to spot weak points.

Computationally, these tools are efficient. Single tolerances from Lemma 1 are calculated in polynomial time, and Theorem 2’s bounds avoid costly re-optimization. For large networks, like logistics systems with thousands of routes, LST and DLST can be mapped in real time. Use Theorem 2(b) for a fast resilience check, then apply Theorem 2(c) to prioritize critical edge reinforcements before disruptions, such as storms, hit. This approach ensures networks stay operational with minimal overhead.

3.3. Analysis of Tolerances for Network Planning

The single-edge tolerances (lij) and set tolerances (LST, DLST) provide a quantitative basis for a multi-scale assessment of network robustness. They precisely measure the susceptibility of the current optimal solution (T*) to improvements in alternative connections.

3.3.1. Interpreting Single-Edge Tolerances

Consider a non-tree edge (i,j)T* from Example 1 with a relatively low single-edge tolerance (lij) of 1.8, for, e.g., α=0.2 This indicates that the weight (or risk) ξij needs to be reduced by only 1.8 units before the edge becomes cost-effective enough to enter a new optimal MST, displacing an existing tree edge. In practical terms, this alternative edge is a highly competitive threat; the current network configuration is highly vulnerable to even minor improvements along this route. A network planner might see this as an opportunity for a low-cost intervention or as a risk if a competitor were to upgrade this link.

Conversely, consider another non-tree edge (k,t)T* from Example 1 (for, e.g., α=0.2) with a high single-edge tolerance (lkt) of 8.4 signifies that the weight ξkt must be reduced significantly (by 8.4 units) before it becomes a viable alternative. The current tree T* is highly robust to improvements on this specific link. A planner might deprioritize investment here, as a large effort is required to make this alternative competitive.

3.3.2. Interpreting Set Tolerances for Coordinated Planning

The true power of the framework is revealed when analyzing sets of edges. Consider a set A={(a,b),(c,d)}ET* representing edges in a zone slated for development. The LST of A, bounded by max(lab,lcd)=8.8 and (lab,lcd)=16.6, quantifies the collective investment required to make the set disruptive.

A narrow gap between these bounds implies the set’s impact is capped by its single most competitive member; coordinated investment offers little synergistic advantage.

A wide gap, as in this example, suggests strong potential synergy. A coordinated upgrade across the entire set could be far more effective at shifting the optimal network solution than improving edges individually, providing a compelling rationale for area-wide projects.

3.3.3. Computational Feasibility and Practical Implementation

A key advantage of this framework is its computational tractability. The methods developed herein calculate these tolerance metrics—either exactly or within tight bounds—in polynomial time, making them applicable to realistic network problems. This efficiency is further scalable through parallel computing architectures. These tools enable a shift from deterministic planning to risk-aware design. Planners can now make decisions explicitly aligned with their risk tolerance, leading to the design of more robust infrastructure and more precise risk assessments. This is particularly critical in disaster management, where the reliability of an evacuation route hinges on the dependability of its links. A path from an uncertain MST, though potentially longer, offers a higher guarantee of functionality under duress. Prioritizing high-tolerance routes ensures that rescue operations prioritize probability of arrival over nominal distance.

To fully realize this potential in large-scale applications, integration with Geographic Information Systems (GIS) is a critical next step. Embedding our computational framework within a GIS would allow the direct incorporation of spatial data—elevation, hazard maps, land use—into the uncertainty model. This would enable not only the calculation of tolerances but also the spatial visualization of critical corridors and the optimal siting of emergency facilities, thereby bridging the gap between theoretical network robustness and actionable spatial planning.

4. Discussion and Conclusions

This paper has tackled the challenge of evaluating stability in Minimum Spanning Trees (MSTs) within uncertain networks, a problem critical to applications such as transportation, communication, power networks, and reliability optimization. We introduced two novel concepts—lower set tolerance (LST) and dual lower set tolerance (DLST)—to assess how simultaneous changes in risk factors across multiple network elements impact the optimality of MST solutions. LST represents the supremum decrease in risk that preserves the current MST’s optimality, while DLST measures the infimum decrease required to render it non-optimal. By embedding these measures within an uncertainty programming framework, we have developed an efficient alternative to traditional re-optimization approaches, providing exact formulas and bounds to compute set tolerances and enhance decision-making under uncertainty. While our methods provide efficient computational solutions for LST and DLST, their complexity warrants deeper investigation, presenting an opportunity to optimize performance in large-scale applications.

The significance of this research lies in its demonstration that uncertainty programming can effectively address combinatorial optimization problems like the MST. By incorporating uncertain reliability and risk factors, our framework advances theoretical insights into network stability while offering practical tools for fields such as transportation, logistics, network design, and cybernetics. The ability to analyze multiple cost changes simultaneously through LST and DLST not only strengthens sensitivity analysis but also supports optimization algorithms by evaluating the consequences of including or excluding network elements, making it highly relevant to real-world scenarios where disruptions are common.

Integrating Travel Time and Capacity. One promising direction for future research is exploring uncertain travel time reliability in post-crisis transportation networks, where obtaining reliable travel time distribution data poses a significant challenge. Further enhancements could involve integrating edge reliability and capacity into our models to address more complex network dynamics.

Dynamic and Sequential Frameworks. A fundamental assumption of our model is the static nature of the network and its uncertainties. A highly impactful direction for future research involves extending the LST and DLST concepts to dynamic settings. Real-world networks evolve over time, and disruptions often trigger sequential recovery decisions. A dynamic version of this framework could model time-dependent uncertain weights ξij(t) and analyze how tolerances evolve throughout a disruption event or recovery process. Integrating our robustness measures with multi-stage stochastic programming or Markov Decision Processes could provide powerful tools for designing optimal adaptive policies for network monitoring, hardening, and recovery. This would transform the static robustness measures presented here into dynamic indicators for sequential decision-making under deep uncertainty.

Computation of Exact Set Tolerances. We also note that while the bounds max(i,j)Alij and (i,j)Alij provide polynomial-time computable estimates for the LST of set A, the problem of computing the exact value LST(A) is a non-linear optimization problem over the space of perturbation vectors λ. The gap between the upper and lower bounds can be significant, particularly in dense graphs where multiple edges in A can tolerate non-zero perturbations concurrently without violating the optimality conditions of T*. Closing this computational gap presents an interesting problem for future work. Potential approaches include the development of approximation algorithms or heuristic methods. One promising heuristic might involve an iterative greedy procedure: initialize λ based on the single-edge tolerances and then sequentially attempt to redistribute perturbation within A while continuously verifying the optimality of T* through efficient MST verification routines. A more rigorous approach could involve formulating the problem as a bilinear program or leveraging column generation techniques. The exploration of these methods will be essential for applying set tolerance concepts to very large-scale networks.

Dependent Uncertainties. A key limitation of our current framework is the assumption that uncertain variables ξij are independent. This is often unrealistic in practice, as the failure risk or cost of one network element can be highly correlated with others (e.g., edges sharing a common physical resource or geographical location). Extending the LST and DLST concepts to model such dependencies presents a substantial but valuable challenge. The primary difficulty lies in redefining the perturbation mechanism. Under independence, the perturbation λij applies only to edge (i,j). Under dependence, perturbing one edge’s uncertainty distribution may inherently alter the distributions of others. This means the feasible set of perturbations is no longer a simple Cartesian product of intervals but a complex, constrained space defined by a joint uncertainty distribution (e.g., via a copula) or a correlated uncertainty set. We leave the formalization and computational exploration of these ideas for future research. Future work could explore two potential paradigms:

A distributional approach using vine copulas or other flexible dependence models to define the joint law of ξ, though computing tolerances would likely require sophisticated Monte Carlo methods; or

A set-based approach within robust optimization, where uncertainties reside in a correlated set U (e.g., {ξ:(ξξ¯)Σ1(ξξ¯)Ψ2}), and the tolerance becomes the maximum scaling factor α such that the MST remains optimal for all ξαU.

In summary, this work establishes a robust foundation for stability analysis in uncertain MSTs using LST and DLST, blending theoretical innovation with practical utility. As uncertainties increasingly influence critical infrastructure, the need for such frameworks will continue to grow, positioning this research as a timely and impactful contribution to the field.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

We are profoundly grateful to the Editor and the anonymous Reviewers for their invaluable time and expertise. Their insightful comments and constructive criticisms were instrumental in significantly improving the quality, clarity, and impact of this manuscript. The thoughtful engagement with our work challenged us to refine our theoretical contributions and, crucially, to better articulate the implications of our framework for network planning under uncertainty.

Conflicts of Interest

There are no conflicts of interest or competing interests.

Footnotes

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Figures and Table

Figure 1 Street network configurations based on natural roads in our sample.

View Image -

Figure 2 Inverse uncertainty distribution Ψ1(α) and uncertainty distribution Ψ(x) associated with networks 1-2.

View Image -

View Image -

The α-pessimistic values for uncertain risk variables across selected edges at characteristic confidence levels α.

α = 0.2 α = 0.5 α = 0.8 α = 0.9
ξ ij ξ ij α = Φ ij 1 ( α ) ξ ij ξ ij α = Φ ij 1 ( α ) ξ ij ξ ij α = Φ ij 1 ( α ) ξ ij ξ ij α = Φ ij 1 ( α )
L(1,5) 1.8 L(1,5) 3 L(2,5) 4.4 L(2,5) 4.7
L(2,8) 3.2 L(2,8) 5 L(6,9) 8.4 L(6,9) 8.7
Z(3,7,10) 4.6 Z(3,7,10) 7 Z(1,7,10) 8.8 Z(1,7,10) 9.4
Z(3,4,9) 3.4 Z(3,4,9) 4 Z(2,6,9) 7.8 Z(2,6,9) 8.4
9 9 9 9 Z(3,3,3) 3 Z(3,3,3) 3
L(8,10) 8.4 L(8,10) 9 L(4,8) 7.2 L(4,8) 7.6

Appendix A. An Overview on Key Concepts of Uncertainty Theory

This section presents the essential concepts and foundational principles of uncertainty theory. For a comprehensive introduction, we recommend the seminal works by Liu [1,2]. A common challenge arises when reliable data are insufficient, rendering accurate estimation of probability distributions unfeasible. In such cases, uncertainty must be characterized through uncertain variables. The available data often reflect belief degrees provided by domain experts. However, addressing belief degrees using fuzzy or probability theory can lead to inconsistencies, as these degrees may exhibit greater variability than actual frequencies. Unlike belief degrees, which evolve with knowledge, frequency—a cornerstone of probability theory—remains a stable, observable property. This distinction underscores the need for a distinct approach to managing belief degrees. Liu [2] introduced uncertainty theory, establishing a formal system to model human decision-making under uncertainty, complete with key concepts and operational rules. Both theoretical and practical studies have validated the effectiveness of uncertainty theory in handling non-deterministic data, particularly in subjective estimations.

To manage belief degrees systematically, let Γ be a non-empty universal set and L a σ-algebra over Γ. The pair (Γ,L) forms a measurable space, while the triplet (Γ,L,M) constitutes an uncertainty space. Each EL is a measurable set, termed an event. To axiomatically define an uncertain measure, we assign a value M{E} to any EL, representing the degree to which E is expected to occur. This assignment, M, is a set function. If it satisfies the following axioms, it qualifies as an uncertain measure.M{Γ}=1fortheuniversalsetΓ,M{E}+M{Ec}=1foranyeventEL,M{E1}M{E2}foranyeventsE1E2,Mi=1Eii=1M{Ei}foranysequenceofevents{EiEiL},Mi=1nEi=mini{1,,n}Mi{Ei}foruncertaintyspaces(Γi,Li,Mi)andEiLi.

The probability measure, while satisfying the first four axioms, cannot be considered a subset of uncertainty theory, as the product probability measure fails to meet the fifth axiom’s requirements. Based on the principles of normality and self-duality, the uncertain measure of the empty set is zero. Thus, for any event EL, the uncertain measure ranges from 0M{E}1. Unlike frequency-based probability, the uncertain measure reflects a subjective belief about an event’s likelihood, shaped by an individual’s knowledge and understanding.

An uncertain variable ξ is termed a non-negative variable if M{ξ<0}=0, and a positive variable if M{ξ0}=0. More information can be found in Liu [1,2].

The uncertainty distribution of ξ is defined as a function Φ(x)=M{ξx} for any real number x. It is considered regular if it is a continuous and strictly increasing function of x, satisfying the following:

Φ(x1)Φ(x2) if x1>x2,

Φ(x1)>Φ(x2) if x1>x2.

(Liu [1,2]). For any uncertain variable ξ with a regular uncertainty distribution Φ(x), there exists a well-defined, continuous, and strictly increasing inverse uncertainty distribution Φ1(α) over the open interval (0,1) such that M{ξΦ1(α)}=α.

(Liu [1,2]). Let Φ:R[0,1] be a function. It is an uncertainty distribution if and only if it is monotonically increasing, excluding cases where Φ(x) is constantly 0 or 1. Additionally, a function Φ1:(0,1)R is an inverse uncertainty distribution if and only if it is continuous and strictly increasing.

(Liu [1,2]). Let ξ1,ξ2,,ξn be independent uncertain variables with regular uncertainty distributions Φ1,Φ2,,Φn. If the new variable ξ=f(ξ1,ξ2,,ξn) is strictly increasing with respect to ξ1,ξ2,,ξm and strictly decreasing with respect to ξm+1,ξm+2,,ξn, then ξ is also an uncertain variable with an inverse uncertainty distribution given byΨ1(α)=f(Φ11(α),,Φm1(α),Φm+11(1α),,Φn1(1α)). Furthermore, the (chance) constraint M{f(x,ξ1,ξ2,,ξn)0}α is equivalent to f(x,Φ11(α),,Φm1(α),Φm+11(1α),,Φn1(1α))0.

(Zigzag Uncertainty Distribution). We denote ξZ(a,b,c) as Zigzag (with parameters a, b, c where a<b<c) if it has the following uncertainty distribution Φ(x). The Zigzag distribution is regular, with an inverse distribution Φ1(α) as follows:Φ(x)=0ifxa,xa2(ba)ifaxb,x+c2b2(cb)ifbxc,1ifxc,Φ1(α)=(2α1)a+2(1α)bifα12,2αb+(12α)cifα<12.

(Linear Uncertainty Distribution). We denote ξL(a,b) as Linear (with parameters a and b) if it has the following uncertainty distribution Φ(x). The Linear distribution is regular, with an inverse distribution Φ1(α) as follows:Φ(x)=0ifxa,xabaifaxb,1ifxb,Φ1(α)=(1α)a+αb.

References

1. Liu, B. Uncertainty Theory: A Branch of Mathematics for Modeling Human Uncertainty; Springer: Berlin, Germany, 2010.

2. Liu, B. Uncertainty Theory; 5th ed. Uncertainty Theory Laboratory: Beijing, China, 2015.

3. Wang, J.; Zhu, J.; Yang, H. Reliable path selection problem in uncertain traffic network after natural disaster. Math. Probl. Eng.; 2013; 2013, 413034. [DOI: https://dx.doi.org/10.1155/2013/413034]

4. Ahuja, R.; Magnanti, T.; Orlin, J. Network flows: Theory, Algorithms, and Applications; Prentice Hall: Upper Saddle River, NJ, USA, 1993.

5. Gal, T. Sensitivity Analysis, Parametric Programming, and Related Topics: Degeneracy, Multicriteria Decision Making Redundancy; Walter de Gruyter: Berlin, Germany, 1995.

6. Punnen, A. Postoptimal Analysis, Parametric Programming, and Related Topics: Degeneracy, Multicriteria Decision Making, Redundancy; De Gruyter: Berlin, Germany, 1997.

7. Mathwieser, C.; Çela, E. Special Cases of the Minimum Spanning Tree Problem under Explorable Edge and Vertex Uncertainty. Networks; 2024; 83, pp. 587-604. [DOI: https://dx.doi.org/10.1002/net.22204]

8. Ramaswamy, R.; Orlin, J.; Chakravarti, N. Sensitivity analysis for shortest path problems and maximum capacity path problems in undirected graphs. Math. Program.; 2005; 102, pp. 355-369. [DOI: https://dx.doi.org/10.1007/s10107-004-0517-8]

9. Pettie, S. Sensitivity analysis of minimum spanning trees in sub-inverse-Ackermann time. Proceedings of the International Symposium on Algorithms and Computation; Sanya, China, 19—21 December 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 964-973.

10. Chandra, A.; Kim, J. Reliability Certification of Supply Chain Networks under Uncertain Failures and Demand. Ann. Oper. Res.; 2025; [DOI: https://dx.doi.org/10.1007/s10479-025-06790-7]

11. Clark, S.; Watling, D. Modelling network travel time reliability under stochastic demand. Transp. Res. Part B Methodol.; 2005; 39, pp. 119-140. [DOI: https://dx.doi.org/10.1016/j.trb.2003.10.006]

12. Hosseini, A.; Wadbro, E. Connectivity reliability in uncertain networks with stability analysis. Expert Syst. Appl.; 2016; 57, pp. 337-344. [DOI: https://dx.doi.org/10.1016/j.eswa.2016.03.040]

13. Zhu, Z.; Zhang, A.; Zhang, Y. Connectivity of intercity passenger transportation in china: A multi-modal and network approach. J. Transp. Geogr.; 2018; 71, pp. 263-276. [DOI: https://dx.doi.org/10.1016/j.jtrangeo.2017.05.009]

14. Zhou, Y.; Sheu, J.; Wang, J. Robustness assessment of urban road network with consideration of multiple hazard events. Risk Anal.; 2017; 37, pp. 1477-1494. [DOI: https://dx.doi.org/10.1111/risa.12802]

15. Zhou, Y.; Wang, J.; Yang, H. Resilience of transportation systems: Concepts and comprehensive review. IEEE Trans. Intell. Transp. Syst.; 2019; 20, pp. 4262-4276. [DOI: https://dx.doi.org/10.1109/TITS.2018.2883766]

16. Hosseini, A. Max-type reliability in uncertain post-disaster networks through the lens of sensitivity and stability analysis. Expert Syst. Appl.; 2024; 241, 122486. [DOI: https://dx.doi.org/10.1016/j.eswa.2023.122486]

17. Xing, T.; Zhou, X. Finding the most reliable path with and without edge travel time correlation: A lagrangian substitution based approach. Transp. Res. Part B Methodol.; 2011; 45, pp. 1660-1689. [DOI: https://dx.doi.org/10.1016/j.trb.2011.06.004]

18. Ma, W.; Tang, S.; Ke, W. Competitive analysis for the most reliable path problem with on-line and fuzzy uncertainties. Int. J. Pattern Recognit. Artif. Intell.; 2008; 11, pp. 195-206. [DOI: https://dx.doi.org/10.1142/S0218001408006156]

19. Lee, D.; Kim, D.; Jung, J. An algorithm for acquiring reliable path in abnormal traffic condition. Proceedings of the 2008 International Conference on Convergence and Hybrid Information Technology; Daejeon, Republic of Korea, 28–29 August 2008; pp. 682-686.

20. Alkaff, A.; Qomarudin, M.N.; Bilfaqih, Y. Network reliability analysis: Matrix-exponential approach. Reliab. Eng. Syst. Saf.; 2020; 204, 107192. [DOI: https://dx.doi.org/10.1016/j.ress.2020.107192]

21. Zhu, Z.; Mardan, A.; Zhu, S.; Yang, H. Capturing the interaction between travel time reliability and route choice behavior based on the generalized Bayesian traffic model. Transp. Res. Part B Methodol.; 2021; 143, pp. 48-64. [DOI: https://dx.doi.org/10.1016/j.trb.2020.11.005]

22. Zang, Z.; Xu, X.; Qu, K.; Chen, R.; Chen, A. Travel time reliability in transportation networks: A review of methodological developments. Transp. Res. Part C Emerg. Technol.; 2022; 143, 103866. [DOI: https://dx.doi.org/10.1016/j.trc.2022.103866]

23. Dong, S.; Gao, X.; Mostafavi, A.; Gao, J.; Gangwal, U. Characterizing resilience of flood-disrupted dynamic transportation network through the lens of link reliability and stability. Reliab. Eng. Syst. Saf.; 2023; 232, 109071. [DOI: https://dx.doi.org/10.1016/j.ress.2022.109071]

24. Wang, S.; Wang, Y.; Lai, C. Connectivity reliability evaluation and most reliable shipping route choice in a seaborne crude oil network. Heliyon; 2024; 10, e36295. [DOI: https://dx.doi.org/10.1016/j.heliyon.2024.e36295]

25. Xin, J.; Frangopol, D.M.; Akiyama, M.; Han, X. Connectivity analysis of transportation networks incorporating bridges and pavements under uncertainty. Bridge Maintenance, Safety, Management, Digitalization and Sustainability; CRC Press: Boca Raton, FL, USA, 2024; pp. 1916-1921.

26. Chen, Y.; Ju, Y.; Yin, J.; Jiang, D. Evaluation of Carrying Capacity Reliability for Regional Rail Transit System. Transp. Res. Rec.; 2025; 2679, 03611981251337463. [DOI: https://dx.doi.org/10.1177/03611981251337463]

27. Ait Mamoun, K.; Hammadi, L.; El Ballouti, A.; Novaes, A.; Souza de Cursi, E. Modeling Uncertain Travel Times in Distribution Logistics. Appl. Sci.; 2023; 13, 11242. [DOI: https://dx.doi.org/10.3390/app132011242]

28. Guo, F.; Liang, J.; Niu, R.; Huang, Z.; Liu, Q. Robust optimization of a procurement and routing strategy for multiperiod multimodal transport in an uncertain environment. Eur. J. Oper. Res.; 2025; 327, pp. 115-135. [DOI: https://dx.doi.org/10.1016/j.ejor.2025.05.004]

29. Wang, X. Coal Transportation Cost Prediction under Mixed Uncertainty Based on Graph Attention Networks. Int. J. High Speed Electron. Syst.; 2025; 34, 2540348. [DOI: https://dx.doi.org/10.1142/S0129156425403481]

30. Chen, L.; Wang, Y.; Peng, J.; Xiao, Q. Supply chain management based on uncertainty theory: A bibliometric analysis and future prospects. Fuzzy Optim. Decis. Mak.; 2024; 23, pp. 599-636. [DOI: https://dx.doi.org/10.1007/s10700-024-09435-9]

31. Gao, R.; Ma, Y.; Ralescu, D. Uncertain multilevel programming with application to omni-channel vehicle routing problem. J. Ambient Intell. Humaniz. Comput.; 2023; 14, pp. 9159-9171. [DOI: https://dx.doi.org/10.1007/s12652-022-04419-2]

32. Hosseini, A. Time-dependent optimization of a multi-item uncertain supply chain network: A hybrid approximation algorithm. Discret. Optim.; 2015; 18, pp. 150-167. [DOI: https://dx.doi.org/10.1016/j.disopt.2015.09.002]

33. Guo, H.; Wang, X.; Zhou, S. A transportation problem with uncertain costs and random supplies. Int. J. E-Navig. Marit. Econ.; 2015; 2, pp. 1-11. [DOI: https://dx.doi.org/10.1016/j.enavi.2015.06.001]

34. Qin, Z.; Gao, Y. Uncapacitated p-hub location problem with fixed costs and uncertain flows. J. Intell. Manuf.; 2017; 28, pp. 705-716. [DOI: https://dx.doi.org/10.1007/s10845-014-0990-8]

35. Veresnikov, G.; Pankova, L.; Pronina, V. Uncertain programming in preliminary design of technical systems with uncertain parameters. Procedia Comput. Sci.; 2017; 103, pp. 36-43. [DOI: https://dx.doi.org/10.1016/j.procs.2017.01.007]

36. Hosseini, A. Uncertainty modeling and stability assessment of minimum spanning trees in network design. Mathematics; 2024; 12, 3812. [DOI: https://dx.doi.org/10.3390/math12233812]

37. Wang, J.; Sheng, Y. The MST Problem in Network with Uncertain Edge Weights and Uncertain Topology. Soft Comput.; 2023; 27, pp. 13825-13834. [DOI: https://dx.doi.org/10.1007/s00500-023-08880-9]

38. Zhou, S.; Zhang, J.; Zhang, Q.; Huang, Y.; Wen, M. Uncertainty Theory-Based Structural Reliability Analysis and Design Optimization under Epistemic Uncertainty. Appl. Sci.; 2022; 12, 2846. [DOI: https://dx.doi.org/10.3390/app12062846]

39. Shen, J. An environmental supply chain network under uncertainty. Phys. A Stat. Mech. Its Appl.; 2019; 542, 123478. [DOI: https://dx.doi.org/10.1016/j.physa.2019.123478]

40. Gao, X.; Jia, L. Degree-constrained minimum spanning tree problem with uncertain edge weights. Appl. Soft Comput.; 2017; 56, pp. 580-588. [DOI: https://dx.doi.org/10.1016/j.asoc.2016.07.054]

© 2025 by the author. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.