Application of graph-spectral methods in the vulnerability assessment of water supply networks
نویسندگان
چکیده
Many critical infrastructures consist of networks with complex structure, since they have highly interdependent elements and nontrivial designs with a degree of complexity that depends on the settings and level of interaction between these elements. The theory of complex networks employs techniques borrowed from graph theory to classify different types of networks, analyse their structures, and quantify vulnerability and robustness against node/link failures and malicious attacks. In the context of vulnerability assessment of complex networks, graph theory techniques facilitate the representation and analysis. A network is represented as a mathematical graph G=G(V, E) in which V is the set of all graph nodes, with card(V) = n, and E is the set of the graph edges, with card(E) = m. Graphs are a useful abstraction to simulate real scenarios; to this purpose, nodes and edges must be suitably defined (i.e. pumping stations, tanks, pipes, etc.) depending on the intended type of network analysis. In general, complex networks can be classified as technological, biological, social or information networks. In addition, their topological structures can be categorized as centralized, decentralized and distributed depending on the hierarchical importance or redundant configurations (Newman, 2003). Also, graph theory is based on a set of measures to evaluate the networks. These measures can be classified as basic connectivity measures, spectral measures and statistical measures (Grubesic et al., 2008). In this paper we introduce a spectral methodology based on spectral measures to establish vulnerability areas in water supply networks (WSNs), which are highly distributed and a mixture of technological, biological and information networks. Spectral measures relate the network topology with the intensity of connectivity and cohesion graph, by analysing the spectrum of the adjacency matrix of the network. Among these measures, the PageRank algorithm measures the relative importance defined in any given graph. Herrera et al. (2011), has recently applied this methodology to WSNs management. To achieve an efficient vulnerability analysis we propose a prospective study to create importance areas. To meet this objective, these areas are approached by a flexible method of semi-supervised clustering (Herrera et. al., 2010). As a result, we will obtain a telescopic screening of the whole system vulnerabilities. This allows us achieve better control by working in a top-down way from the whole network to the detail of a particular sector, which will be specifically taken into account. This provides valuable additional support to the vulnerability assessment in WSNs management.
منابع مشابه
VULNERABILITY ASSESSMENT OF WATER DISTRIBUTION NETWORKS: GRAPH THEORY METHOD
The main functional purpose of a water distribution network is to transport water from a source to several domestic and industrial units while at the same time satisfying various requirements on hydraulic response. All the water distribution networks perform two basic operations: firstly the water network needs to deliver adequate amounts of water to meet specific requirements, and secondly the...
متن کاملEvaluation of Water Resources Exploitation in a Karst Region Using Intrinsic Vulnerability Assessment
Groundwater vulnerability assessment is of crucial importance for land use/cover management. Some methods have been proposed specifically for the karst hydrogeological settings. Among them, COP and PaPRIKa, as two commonly applied recent methods, were adopted for the resource vulnerability assessment of a humid temperate karst region, north of Iran. Comparison of water bacterial content and dis...
متن کاملA Survey On the Vulnerability Parameters of Networks
The analysis of vulnerability in networks generally involves some questions about how the underlying graph is connected. One is naturally interested in studying the types of disruption in the network that maybe caused by failures of certain links or nodes. In terms of a graph, the concept of connectedness is used in dierent forms to study many of the measures of vulnerability. When certain vert...
متن کاملApplication of n-distance balanced graphs in distributing management and finding optimal logistical hubs
Optimization and reduction of costs in management of distribution and transportation of commodity are one of the main goals of many organizations. Using suitable models in supply chain in order to increase efficiency and appropriate location for support centers in logistical networks is highly important for planners and managers. Graph modeling can be used to analyze these problems and many oth...
متن کاملTowards a measure of vulnerability, tenacity of a Graph
If we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.In this paper we discuss...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Mathematical and Computer Modelling
دوره 57 شماره
صفحات -
تاریخ انتشار 2013