A two-stage resource allocation model for lifeline systems quick response with vulnerability analysis

The internal complexity of lifeline systems and their interdependencies amplify the vulnerability of external disruptions. We consider lifeline infrastructures as a network system with supply, transshipment, demand nodes and arcs constructed between node-pair for conveying service flows. The complex interactive network system can be modeled as multi-layered graphs, whereby the power network depends on the gas network linked through the gasified power plants. Similarly, the water network depends on both quality and quantity of power supply. A successful emergency rescue can make lifeline infrastructures more resilient against natural disasters and unexpected accidents. This study focuses on a resource allocation and schedule problem to restore the most critical components quickly in the multiple interdependent lifeline infrastructures under disruptions. The key objectives of quick response model include reducing the overall losses caused by the accidents, and restoring system functions as quickly as possible. The Resource Allocation Model (RAM) for rescue was formulated as a two-stage mixed-integer programming, in which the first stage problem aims to minimize the total losses, while the second stage problem is to optimize resource allocation for rescue service within the rescue time horizon using the proposed heuristic algorithm in polynomial complexity. In the meantime, those tasks/components to be repaired are selected by the proposed vulnerability analysis method to guarantee the optimal whole network efficiency, and then put them into the Resource Allocation Model. The simulation results demonstrate that the proposed approaches are both efficient and effective to solve the real-life post-disaster resource allocation problem.

[1]  Pengcheng Zhang,et al.  A generalized modeling framework to analyze interdependencies among infrastructure systems , 2011 .

[2]  Siqian Shen Optimizing designs and operations of a single network or multiple interdependent infrastructures under stochastic arc disruption , 2013, Comput. Oper. Res..

[3]  John E. Mitchell,et al.  Restoration of Services in Interdependent Infrastructure Systems: A Network Flows Approach , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[4]  Ling Li,et al.  Modeling of emergency response decision-making process using stochastic Petri net: an e-service perspective , 2012, Information Technology and Management.

[5]  Gerald G. Brown,et al.  Analyzing the Vulnerability of Critical Infrastructure to Attack and Planning Defenses , 2005 .

[6]  Irene Casas,et al.  Establishing public policy to protect critical infrastructure: Finding a balance between exposure and cost in Los Angeles County , 2012 .

[7]  Alan T. Murray,et al.  Critical network infrastructure analysis: interdiction and system flow , 2007, J. Geogr. Syst..

[8]  Kalyanmoy Deb,et al.  A fast and elitist multiobjective genetic algorithm: NSGA-II , 2002, IEEE Trans. Evol. Comput..

[9]  J. C. Smith,et al.  Models and algorithms for the design of survivable multicommodity flow networks with general failure scenarios , 2008 .

[10]  Alan T. Murray An overview of network vulnerability modeling approaches , 2013 .

[11]  Z. Srdjevic,et al.  A two-phase algorithm for consensus building in AHP-group decision making , 2013 .

[12]  Enrico Zio,et al.  Identifying groups of critical edges in a realistic electrical network by multi-objective genetic algorithms , 2012, Reliab. Eng. Syst. Saf..

[13]  Daouda Kamissoko,et al.  Decision process in large-scale crisis management , 2014, Environment Systems and Decisions.

[14]  Natalia Alguacil,et al.  Transmission Network Expansion Planning Under Deliberate Outages , 2009 .

[15]  R. Kasperson,et al.  A framework for vulnerability analysis in sustainability science , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[16]  Stephen J. Collier,et al.  The Vulnerability of Vital Systems: How "Critical Infrastructure" Became a Security Problem , 2008 .

[17]  Fritz Gehbauer,et al.  Optimized resource allocation for emergency response after earthquake disasters , 2000 .

[18]  Terje Aven,et al.  On Some Recent Definitions and Analysis Frameworks for Risk, Vulnerability, and Resilience , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[19]  Yan Xiao,et al.  Coordination in Fast-Response Organizations , 2006, Manag. Sci..

[20]  M. Naceur Azaiez,et al.  Optimal resource allocation for security in reliability systems , 2007, Eur. J. Oper. Res..

[21]  Kjell Hausken,et al.  Protecting complex infrastructures against multiple strategic attackers , 2011, Int. J. Syst. Sci..

[22]  Panos M. Pardalos,et al.  Computational risk management techniques for fixed charge network flow problems with uncertain arc failures , 2013, J. Comb. Optim..

[23]  Richard L. Church,et al.  A bilevel mixed-integer program for critical infrastructure protection planning , 2008, Comput. Oper. Res..

[24]  Seth D. Guikema,et al.  Resource Allocation for Homeland Defense: Dealing with the Team Effect , 2012, Decis. Anal..

[25]  Ling-Huey Su,et al.  Scheduling parallel machines with resource-dependent processing times , 2009 .

[26]  John W. Fowler,et al.  Heuristics for minimizing regular performance measures in unrelated parallel machine scheduling problems , 2011, Comput. Oper. Res..

[27]  John E. Mitchell,et al.  Integrating restoration and scheduling decisions for disrupted interdependent infrastructure systems , 2013, Ann. Oper. Res..

[28]  Wei-Chang Yeh,et al.  Parallel-machine scheduling to minimize makespan with fuzzy processing times and learning effects , 2014, Inf. Sci..

[29]  Shangyao Yan,et al.  Optimal scheduling of emergency roadway repair and subsequent relief distribution , 2009, Comput. Oper. Res..

[30]  Stefan Feuerriegel,et al.  Emergency response in natural disaster management: Allocation and scheduling of rescue units , 2014, Eur. J. Oper. Res..

[31]  W. J. Zhang,et al.  Application of social network theory to prioritizing Oil & Gas industries protection in a networked critical infrastructure system , 2011 .

[32]  Andrew Schiller,et al.  The vulnerability of global cities to climate hazards , 2007 .

[33]  Pablo Alvarez,et al.  Tri-level optimization models to defend critical infrastructure , 2007 .

[34]  Gülay Barbarosoglu,et al.  A two-stage stochastic programming framework for transportation planning in disaster response , 2004, J. Oper. Res. Soc..

[35]  Marcos R. S. Borges,et al.  The Assessment of Information Technology Maturity in Emergency Response Organizations , 2011 .

[36]  Billie Turner,et al.  Vulnerability and resilience: Coalescing or paralleling approaches for sustainability science? , 2010 .

[37]  Claudio M. Rocco Sanseverino,et al.  Assessing the Vulnerability of a Power System Through a Multiple Objective Contingency Screening Approach , 2011, IEEE Transactions on Reliability.