Methodology for Ranking the Elements of Water-Supply Networks

被引:74
作者
Michaud, David [3 ]
Apostolakis, George E. [1 ,2 ]
机构
[1] MIT, Engn Syst Div, Cambridge, MA 02139 USA
[2] MIT, Dept Nucl Sci & Engn, Cambridge, MA 02139 USA
[3] MIT, Engn Syst Div, Cambridge, MA 02139 USA
关键词
Flood plains; Computer software; Geographic information systems; Models; Assessments;
D O I
10.1061/(ASCE)1076-0342(2006)12:4(230)
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
This paper presents a scenario-based methodology for the ranking of the elements of a water-supply network according to their value to the network's owner. The failures of the elements due to random causes and to malevolent acts are considered. The methodology is based on multiattribute utility theory and a graph theory-based network analysis algorithm. This methodology extends approaches proposed in the literature by taking into consideration the capacity of the infrastructure's elements and their mean time to repair. The water-supply infrastructure of a midsize city serves as a case study. We model the infrastructure system as a network and create scenarios to evaluate the consequences of the failure of each of its elements. For each scenario, we evaluate the supply level to the various users considering the capacity of their connection to the available resources. We then evaluate the disutility of this supply level to the decision makers using multiattribute utility theory. The accident scenarios are ranked according to their expected disutility. The vulnerabilities to malevolent acts are ranked using a subjective combination of the disutilities and the scenario susceptibility to attack. The results are provided to the decision makers for evaluation and risk management. The limitations of the proposed methodology and its applicability to other infrastructures are discussed.
引用
收藏
页码:230 / 242
页数:13
相关论文
共 19 条
[1]   Structural vulnerability of the North American power grid [J].
Albert, R ;
Albert, I ;
Nakarado, GL .
PHYSICAL REVIEW E, 2004, 69 (02) :025103-1
[2]  
Amin M, 2002, Journal of Infrastructure Systems, V8, P67, DOI DOI 10.1061/(ASCE)1076-0342(2002)8:3(67)
[3]  
[Anonymous], 1997, CRIT FDN PROT AM INF
[4]  
[Anonymous], ARCINFO 9 1
[5]  
[Anonymous], P 10 RISK BAS DEC MA
[6]  
[Anonymous], 2003, J INFRASTRUCT SYST, DOI [DOI 10.1061/(ASCE)1076-0342(2003)9:2(81), 10.1061/(ASCE)1076-0342(2003)9:2(81)]
[7]  
[Anonymous], 2004, J INFRASTRUCT SYST
[8]  
[Anonymous], RISK DECISION POLICY
[9]  
[Anonymous], CARE W FIN REP EUR C
[10]   A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism [J].
Apostolakis, GE ;
Lemon, DM .
RISK ANALYSIS, 2005, 25 (02) :361-376