2006
DOI: 10.1111/j.1467-8667.2005.00419.x
|View full text |Cite
|
Sign up to set email alerts
|

Minimizing the Consequences of Intentional Attack on Water Infrastructure

Abstract: Since September 11, 2001, protecting the nation's water infrastructure and improving water network resiliency have become priorities in the water industry. In this work, we develop methods to mitigate the consequences of water shortage resulting from destruction of facilities in water networks. These methods integrate search techniques, such as branch‐and‐bound and genetic algorithms, with a hydraulic solver to check demand feasibilities across a residual water network. The objective is to identify a feasible … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2011
2011
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 34 publications
(29 reference statements)
0
15
0
Order By: Relevance
“…Although our work is similar to Jeong et al [21] since we also seek to mitigate demand shortages by re-configuring a residual water network, it differs in that [21] does not consider the costs required to address demand not satisfied by the residual network. The work in this paper assumes that demand not met by a pressurized residual network is mitigated by truck delivery from pressurized to unpressurized demand areas.…”
Section: Relation Of Current To Previous Researchmentioning
confidence: 89%
See 2 more Smart Citations
“…Although our work is similar to Jeong et al [21] since we also seek to mitigate demand shortages by re-configuring a residual water network, it differs in that [21] does not consider the costs required to address demand not satisfied by the residual network. The work in this paper assumes that demand not met by a pressurized residual network is mitigated by truck delivery from pressurized to unpressurized demand areas.…”
Section: Relation Of Current To Previous Researchmentioning
confidence: 89%
“…Additional discussions are provided by Jeong et al [20,21] and Qiao et al [32], and an extensive review up to 2006 is provided in Qiao et al [31]. For a more general review of quantitative disaster planning models, the reader is referred to Ref.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…for the robust management of WSSs, Jeong et al [28] propose a mathematical model capable of identifying a WSS's vulnerabilities, the optimal allocation of available security resources and the reduction of the consequences of pre-planned terrorist attacks. The authors describe a model to control, or determine a suitable way to operate, a WSS damaged by terrorist attack (XIII).…”
Section: Optimization Modelsmentioning
confidence: 99%
“…Stochastic optimization and robust optimization (RO) appear to be promising techniques to solve these problems: the review by Mulvey et al (1995) examines this area and describes some practical applications. RO has already been applied to WSS: Babayan et al (2007), Jeong et al (2006), Cunha and Sousa (2010), Carr et al (2006) and Giustolisi et al (2009) present a number of robust optimization models.…”
Section: Introductionmentioning
confidence: 99%