Minimizing the Consequences of Intentional Attack on Water Infrastructure

نویسندگان

  • Hyung Seok Jeong
  • Jianhong Qiao
  • Dulcy M. Abraham
  • Mark A. Lawley
  • Jean-Philippe P. Richard
  • Yuehwern Yih
چکیده

Since September 11, 2001, protecting the nation’s water infrastructure and improving water network resiliency have become priorities in the water industry. In this work, we develop methods to mitigate the consequences of water shortage resulting from destruction of facilities in water networks. These methods integrate search techniques, such as branch-and-bound and genetic algorithms, with a hydraulic solver to check demand feasibilities across a residual water network. The objective is to identify a feasible customer demand pattern that minimizes the consequences of water shortage in the downgraded network. We present a mathematical model of the problem addressed along with an exact solution methodology and several heuristics. We apply these methodologies to three water networks ranging in size from approximately 10–700 nodes and compare the solution quality and computational efficiency. ∗To whom correspondence should be addressed. E-mail: malawley@ ecn.purdue.edu.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Outlining Comprehensive Security Analysis of a Critical Infrastructure Network

This paper outlines a security assessment methodology for analysing critical infrastructure networks. The focus is on intentional attacks against critical infrastructure, but otherwise the scope is not delimited much. Comprehensive security analysis of a critical infrastructure network requires an assessment of the probability of an attack, the probability of success of the attack, the propagat...

متن کامل

Analysis and Improving the Security of the Scalar Costa Scheme against Known Message Attack

Unintentional attacks on watermarking schemes lead to degrade the watermarking channel, while intentional attacks try to access the watermarking channel. Therefore, watermarking schemes should be robust and secure against unintentional and intentional attacks respectively. Usual security attack on watermarking schemes is the Known Message Attack (KMA). Most popular watermarking scheme with stru...

متن کامل

Interference Mitigation of Replay Attacks in GPS Receiver using of Finite Impulse Response Filter

The vulnerability of civil GPS receiver to interference may be intentional or unintentional. Among all types of interference, replay attack intended as the most dangerous intentional one. The signal structure of replay attack is almost the same with the satellite signal. The interference effects can be reduce with the design of an appropriate filter in the receiver. This paper presents two meth...

متن کامل

Analysis of Ottoman Attack on Yemen: Reasons, Consequences and Results

The 10th century AH was very important for Muslim lands, including Yemen in the era of Taherian (858-945 AH), because during this time, Portugal as a colonist country, in order to have access to new maritime routes, to seize Muslim commercial centers, as well as monopoly of Indian medicine trade, was moving eastward, into Yemen. At the same time, the Ottoman Empire, which was one somehow the fl...

متن کامل

Water and bioterrorism: preparing for the potential threat to U.S. water supplies and public health.

Water supplies and water distribution systems represent potential targets for terrorist activity in the United States because of the critical need for water in every sector of our industrialized society. Even short-term disruption of water service can significantly impact a community, and intentional contamination of a municipal water system as part of a terrorist attack could lead to serious m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Comp.-Aided Civil and Infrastruct. Engineering

دوره 21  شماره 

صفحات  -

تاریخ انتشار 2006