Abstract:Abstract-In this study, we tackle the problem of searching for the most favourable pattern of link capacities allocation that makes a power transmission network resilient to cascading failures with limited investment costs. This problem is formulated within a combinatorial multi-objective optimization framework and tackled by evolutionary algorithms. Two different models of increasing complexity are used to simulate cascading failures in a network and to quantify its resilience: a complex network model (namely… Show more
“…For all simulations, MATLAB-based toolbox "YALMIP" with the solver "SeDuMi" 1.3 as an SDP solver with tolerance parameter eps 10 −8 is used. In the pursuance of making a better comparison, the nondominated sorting genetic algorithm II (NSGA-II) [35], [36] has been used to solve the MO-OPF problems in the same run environment.…”
This is a self-archived -parallel published version of this article in the publication archive of the University of Vaasa. It might differ from the original.
“…For all simulations, MATLAB-based toolbox "YALMIP" with the solver "SeDuMi" 1.3 as an SDP solver with tolerance parameter eps 10 −8 is used. In the pursuance of making a better comparison, the nondominated sorting genetic algorithm II (NSGA-II) [35], [36] has been used to solve the MO-OPF problems in the same run environment.…”
This is a self-archived -parallel published version of this article in the publication archive of the University of Vaasa. It might differ from the original.
“…Most recently, Matisziw et al [123] conclude on the appropriateness of graph theory techniques for the assessment of electric network vulnerability by comparison to physical power flow models. This is confirmed in [66], where the problem of searching for the most favorable pattern of link capacities allocation that makes a power transmission network resilient to cascading failures with limited investment costs is formulated within a combinatorial multi-objective optimization framework and tackled by evolutionary algorithms. Two different models of increasing complexity are used to simulate cascading failures and to quantify resilience: a complex network model, and a more detailed and computationally demanding power flow model.…”
A B S T R A C TRisk assessment must evolve for addressing the existing and future challenges, and considering the new systems and innovations that have already arrived in our lives and that are coming ahead. In this paper, I swing on the rapid changes and innovations that the World that we live in is experiencing, and analyze them with respect to the challenges that these pose to the field of risk assessment. Digitalization brings opportunities but with it comes also the complexity of cyber-phyiscal systems. Climate change and extreme natural events are increasingly threatening our infrastructures; terrorist and malevolent threats are posing severe concerns for the security of our systems and lives. These sources of hazard are extremely uncertain and, thus, difficult to describe and model quantitatively.Some research and development directions that are emerging are presented and discussed, also considering the ever increasing computational capabilities and data availability. These include the use of simulation for accident scenario identification and exploration, the extension of risk assessment into the framework of resilience and business continuity, the reliance on data for dynamic and condition monitoring-based risk assessment, the safety and security assessment of cyber-physical systems.The paper is not a research work and not exactly a review or a state of the art work, but rather it offers a lookout on risk assessment, open to consideration and discussion, as it cannot pretend to give an absolute point of view nor to be complete in the issues addressed (and the related literature referenced to).
“…The impact caused by a disruption is mainly in the failure of services provided by the infrastructure, thereby causing inconvenience to people’s lives and financial losses. Different critical infrastructure systems have different physical flow characteristics of operation, such as electric flow in power systems, 37,38 train services in railway transportation systems, and information flow in telecommunication systems. With regard to CRH, this study considers the flow of trains.…”
Section: Flow-based Vulnerability Analysis Under Disruptionsmentioning
Considerable attention has been paid to the vulnerability of critical infrastructures because of the increasing occurrence of disruptive events, such as man-made or natural disasters. Even small disruptions could eventually affect the normal function of infrastructure systems. Enhancing the reliability of these systems and their robustness to disruptions is necessary and urgent. High-speed rail is a critical infrastructure that is subject to various disruptions, including component aging, malicious attacks, natural disasters, and demand surges. In this study, we analyze the topological centrality indicators of China Railway High-speed network using network theory and take real train flow information for assessing the importance of network components in terms of vulnerability to disruption. By Monte Carlo simulation, we analyze the risk of the China Railway High-speed network under random attacks and spatially localized failures. The significance of taking pre-actions for protecting critical infrastructures by mitigating its vulnerability to disruptions is emphasized.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.