• Aucun résultat trouvé

Decision Support for Infrastructure network vulnerability assessment in natural disaster crisis situations

N/A
N/A
Protected

Academic year: 2021

Partager "Decision Support for Infrastructure network vulnerability assessment in natural disaster crisis situations"

Copied!
2
0
0

Texte intégral

(1)

Any correspondence concerning this service should be sent to the repository administrator:

staff-oatao@inp-toulouse.fr

This is an author-deposited version published in: http://oatao.univ-toulouse.fr/

Eprints ID: 10874

To cite this version:

Kamissoko, Daouda and Pérès, François and Zaraté, Pascale Decision Support

for Infrastructure network vulnerability assessment in natural disaster crisis situations. (2014) In: IT Innovation Day, 27 May 2014 (Digital Place, Toulouse,

France).

Open Archive Toulouse Archive Ouverte (OATAO)

OATAO is an open access repository that collects the work of Toulouse researchers and makes it freely available over the web where possible.

(2)

Decision support for infrastructure network vulnerability

assessment in natural disaster crisis situations

Daouda KAMISSOKO – Temporary Lecturer and Research Assistant - University of Toulouse (LGP/IRIT)

daouda.kamissoko@irit.fr

François PÉRÈS - Supervisor- University of Toulouse (LGP)

Pascale

ZARATÉ - Supervisor- University of Toulouse (IRIT)

Methods

Relation identification

Influence

Dependance

Interdependence modeling

Abstract

In a high industrialization context, our

societies depend

more and

more

on

networks such as power grid, water, gas and

telecommunications systems. The number

and the variety of events such as snowfall in

Paris in winter 2010, or the tsunami in Japan

in

March

2011

demonstrated

the

infrastructures’ vulnerability against natural

disasters. In addition the various materials,

services,

energies

and

information

exchanged may aggravate or mitigate the

consequences.

Because

of

the

interdependencies, the malfunction of a

network’s entity is likely to spread to the

others; to a scale exceeding one of a country,

making difficult any risk analysis.

The VESTA project aims to propose a

methodology of analyzing infrastructure

network risk and vulnerability in the field of

prevention or reduction of the natural

disaster consequences. This model will lead

to a decision support system multi-view,

multi-stakeholder,

and

communication’s

protocols in crisis situation.

Scientific issues

 Modeling interdependent critical

infrastructure,

 Modeling risk,

 Modeling interdependences,

 Structural and functional vulnerability

analysis,

Correlation between hazard’s intensity and

damage to the stakes,

 Establishment of a decision support

system for disaster management

.

Results

 Network vulnerability

 Territorial vulnerability

 Component type vulnerability

 Stake vulnerability

 Flow vulnerability

 Vulnerability induced by interdependences

 Worse Scenarios

INNOVATION IT DAY - Tuesday, May 27 2014, Toulouse

Vulnerability sets

Population Territory Hazard Vulnerability

Vulnerability is "a stake’s inability to resist the hazard’s occurrence and to recover effectively it nominal functioning for a given period of time"

Vulnerability assessment

𝑉 = 𝑃 𝐻𝑎𝑧𝑎𝑟𝑑 × ϑ

ϑ is the overall vulnerability induced by network

components

𝜗 = 1 − (1 − 𝜗

𝑛

)

𝑁

𝑛=1

𝜗

𝑛

is the vulnerability of component n

𝜗

𝑛

= (1− 𝑅

𝑛𝑏

)(1− 𝑅

𝑛𝑠

)

𝑅

𝑛𝑠

is the robustness and 𝑅

𝑛𝑏

is the resilience.

R

𝑛s

=

t

1

t

1

+ t

2

t

2

is the cumulated time of the improper functioning

states while t

1

refers to the good running ones

𝑅

𝑛𝑏𝑝

= 1 −

𝐶

𝑛𝑝2

− 𝐶

𝑛𝑝1

𝐶

𝑛𝑝1

+ 𝐶

𝑛𝑝2

𝑅

𝑛𝑏𝑝

is the robustness induced by the flow 𝑝 to the

component 𝑛, 𝐶

𝑛𝑝1

is the component n consumption in

flow 𝑝 before the feared event, 𝐶

𝑛𝑝2

is its consumption

after the feared event.

References

[1] D. Kamissoko, « Decision support for infrastructure network vulnerability assessment in natural

disaster crisis situations », Doctorate, University of Toulouse, University of Toulouse 1 Capitole, 2013.

[2] J. Johansson, H. Jonsson, et H. Johansson, « Analysing the vulnerability of electric distribution

systems: a step towards incorporating the societal consequences of disruptions », International

Journal of Emergency Management, vol. 4, no 1, p. 4 - 17, 2007.

[3] S. M. Rinaldi, J. P. Peerenboom, et T. K. Kelly, « Identifying, understanding, and analyzing

critical infrastructure interdependencies », Control Systems, IEEE, vol. 21, no 6, p. 11-25, 2001.

[4] D. Kamissoko, F. Pérès, et P. Zaraté, « Infrastructure Network Vulnerability », presented at the

20th IEEE International conference on Collaboration Technologies and Infrastructures, Paris, 2011.

[5] M. Merad, Aide à la décision et expertise en gestion des risques. Tec & Doc Lavoisier, 2010.

[6] M. Schläpfer et J. L. Shapiro, « Modeling Failure Propagation in Large-Scale Engineering

Networks », in Complex Sciences, vol. 5, Springer Berlin Heidelberg, 2009, p. 2127-2138.

[7] D. E. Snediker, A. T. Murray, et T. C. Matisziw, « Decision support for network disruption

mitigation », Decis. Support Syst., vol. 44, no 4, p. 954–969, mars 2008.

[8] « The Mathematics of Averting the Next Big Network Failure | Wired Science | Wired.com »,

Wired Science. [Online]. Available:

http://www.wired.com/wiredscience/2013/03/math-prevent-network-failure/. [Accessed: 08-avr-2013].

Illustration: Leonardo Dueñas-Osorio -quoted by Ref 8

Vulnerability

Network Relationship Territory

Specific Vulnerability

Références

Documents relatifs

To ensure a low profile, the final design utilizes infrared phototransistors to detect and interpret incoming infrared light reflected off a user's finger in contact with the

Le classifiant d’un groupe algébrique linéaire, à la Totaro Dans cette section, nous reformulons la théorie développée par To- taro dans [Tot] pour donner un sens aux groupes de

Encore ce supposé dévoilement, qui n'est pas sans rappeler le procédé de la Shamela, n'est-il qu'un bien arti ciel pacte d'écriture avec le lecteur, dans la mesure où la Paméla

Le modèle est composé de 17 variables de décision (nombre d’ouvriers, type de traitement des déchets…) qui influencent trois objectifs : coût, délais et

Using the latest available data and crop models we have captured the sensitivity of the key crops to climate change, integrated exposure from natural hazards which affect

Les déterminants oriententvéritablement la recherche.De même que Rorschach conçoit la perception comme physiologique, ilintroduit également une perspective évolutive

As such, our model assumes that flood flows within Angkor ’ s water distribution network were primarily restricted to the artificially incised channels—often further constrained

These tools are designed as heuristics which enable reformulations, semiotic transfer (texts to diagrams), and comparison between texts. Security, The formulation in