Minimizing the consequences of intentional attack on water infrastructure

被引:26
|
作者
Jeong, HS
Qiao, JH
Abraham, DM
Lawley, M [1 ]
Richard, JP
Yih, Y
机构
[1] Purdue Univ, Sch Ind Engn, W Lafayette, IN 47907 USA
[2] Oklahoma State Univ, Sch Civil & Environm Engn, Stillwater, OK 74078 USA
[3] Purdue Univ, Sch Civil Engn, W Lafayette, IN 47907 USA
关键词
D O I
10.1111/j.1467-8667.2005.00419.x
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Since September 11, 2001, protecting the nation's. water infrastructure and improving water network resiliency have become priorities in the water industry. In this work, we develop methods to mitigate the consequences of water shortage resulting from destruction of facilities in water networks. These methods integrate search techniques, such as branch-and-bound and genetic algorithms, with a hydraulic solver to check demand feasibilities across a residual water network. The objective is to identify a feasible customer demand pattern that minimizes the consequences of water shortage in the downgraded network. We present a mathematical model of the problem addressed along with an exact solution methodology and several heuristics. We apply these methodologies to three water networks ranging in size from approximately 10-700 nodes and compare the solution quality and computational efficiency.
引用
收藏
页码:79 / 92
页数:14
相关论文
共 50 条
  • [21] Optimal Placement of Detectors to Minimize Casualties in an Intentional Attack
    Marufuzamman, Mohammad
    Aghalari, Amin
    Buchanan, Randy K.
    Rinaudo, Christina H.
    Houte, Kayla M.
    Ranta, Julekha H.
    IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2022, 69 (06) : 3994 - 4005
  • [22] Comment on "Breakdown of the Internet under intentional attack" - Reply
    Cohen, R
    Erez, K
    ben-Avraham, D
    Havlin, S
    PHYSICAL REVIEW LETTERS, 2001, 87 (21)
  • [23] Information Fusion to Defend Intentional Attack in Internet of Things
    Chen, Pin-Yu
    Cheng, Shin-Ming
    Chen, Kwang-Cheng
    IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (04): : 337 - 348
  • [24] The Economic Consequences of Atomic Attack
    Cavers, David F.
    ANNALS OF THE AMERICAN ACADEMY OF POLITICAL AND SOCIAL SCIENCE, 1953, 290 : 27 - 34
  • [25] Information Infrastructure of Safe Computer Attack
    Begishev, Ildar R.
    Khisamova, Zarina, I
    Mazitova, Guzel, I
    HELIX, 2019, 9 (05): : 5639 - 5642
  • [26] Protecting infrastructure from cyber attack
    Boughton N.
    Network Security, 2019, 2019 (04) : 18 - 19
  • [27] Puppet attack: A denial of service attack in advanced metering infrastructure network
    Yi, Ping
    Zhu, Ting
    Zhang, Qingquan
    Wu, Yue
    Pan, Li
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 59 : 325 - 332
  • [28] Optimizing the Resilience of Interdependent Infrastructure Systems against Intentional Attacks
    Fang, Yiping
    Zio, Enrico
    2017 2ND INTERNATIONAL CONFERENCE ON SYSTEM RELIABILITY AND SAFETY (ICSRS), 2017, : 62 - 67
  • [29] Towards the intentional multifunctionality of urban green infrastructure: a paradox of choice?
    Lauren M. Cook
    Kelly D. Good
    Marco Moretti
    Peleg Kremer
    Bridget Wadzuk
    Robert Traver
    Virginia Smith
    npj Urban Sustainability, 4
  • [30] Towards the intentional multifunctionality of urban green infrastructure: a paradox of choice?
    Cook, Lauren M.
    Good, Kelly D.
    Moretti, Marco
    Kremer, Peleg
    Wadzuk, Bridget
    Traver, Robert
    Smith, Virginia
    NPJ URBAN SUSTAINABILITY, 2024, 4 (01):