scholarly journals A SIMULATION FRAMEWORK FOR CONTROLLED CRITICAL INFRASTRUCTURES SUBJECT TO NATURAL DISASTERS

Author(s):  
Amir Mohammed ◽  
Craig Ramlal ◽  
Arvind Singh ◽  
Sean Rocke ◽  
Daniel Goitia

Natural disasters are inherently unpredictable and can cause major damage to critical infrastructures in cities and loss of life. In this study, a simulation and control framework was developed for evaluating response decisions for natural disaster scenarios with the objective of minimizing the casualties generated from within the simulation. The package was developed in MATLAB Simulink using the infrastructure interdependencies simulator (I2Sim) with a test system of six small residences, one large residence, two health centres, one large hospital, three water pumps of varying capacities and one energy production cell. The research focused on the development of heuristic controllers to evaluate the best possible outcome given the disaster scenario simulated to affect critical infrastructure. Response decisions were generated for 625 unique scenarios, this information once grouped, can be used to inform response policies after natural disasters.

Author(s):  
Chao Fang ◽  
Piao Dong ◽  
Yi-Ping Fang ◽  
Enrico Zio

Considerable attention has been paid to the vulnerability of critical infrastructures because of the increasing occurrence of disruptive events, such as man-made or natural disasters. Even small disruptions could eventually affect the normal function of infrastructure systems. Enhancing the reliability of these systems and their robustness to disruptions is necessary and urgent. High-speed rail is a critical infrastructure that is subject to various disruptions, including component aging, malicious attacks, natural disasters, and demand surges. In this study, we analyze the topological centrality indicators of China Railway High-speed network using network theory and take real train flow information for assessing the importance of network components in terms of vulnerability to disruption. By Monte Carlo simulation, we analyze the risk of the China Railway High-speed network under random attacks and spatially localized failures. The significance of taking pre-actions for protecting critical infrastructures by mitigating its vulnerability to disruptions is emphasized.


Author(s):  
N. Nivedita ◽  
S. Durbha

To ensure a resilient Healthcare Critical Infrastructure, understanding the vulnerabilities and analysing the interdependency on other critical infrastructures is important. To model this critical infrastructure and its dependencies, Hierarchal Coloured petri net modelling approach for simulating the vulnerability of Healthcare Critical infrastructure in a disaster situation is studied.. The model enables to analyse and understand various state changes, which occur when there is a disruption or damage to any of the Critical Infrastructure, and its cascading nature. It also enables to explore optimal paths for evacuation during the disaster. The simulation environment can be used to understand and highlight various vulnerabilities of Healthcare Critical Infrastructure during a flood disaster scenario; minimize consequences; and enable timely, efficient response.


2021 ◽  
Vol 11 (16) ◽  
pp. 7228
Author(s):  
Edward Staddon ◽  
Valeria Loscri ◽  
Nathalie Mitton

With the ever advancing expansion of the Internet of Things (IoT) into our everyday lives, the number of attack possibilities increases. Furthermore, with the incorporation of the IoT into Critical Infrastructure (CI) hardware and applications, the protection of not only the systems but the citizens themselves has become paramount. To do so, specialists must be able to gain a foothold in the ongoing cyber attack war-zone. By organising the various attacks against their systems, these specialists can not only gain a quick overview of what they might expect but also gain knowledge into the specifications of the attacks based on the categorisation method used. This paper presents a glimpse into the area of IoT Critical Infrastructure security as well as an overview and analysis of attack categorisation methodologies in the context of wireless IoT-based Critical Infrastructure applications. We believe this can be a guide to aid further researchers in their choice of adapted categorisation approaches. Indeed, adapting appropriated categorisation leads to a quicker attack detection, identification, and recovery. It is, thus, paramount to have a clear vision of the threat landscapes of a specific system.


2010 ◽  
Vol 136 ◽  
pp. 153-157
Author(s):  
Yu Hong Du ◽  
Xiu Ming Jiang ◽  
Xiu Ren Li

To solve the problem of detecting the permeability of the textile machinery, a dedicated test system has been developed based on the pressure difference measuring method. The established system has a number of advantages including simple, fast and accurate. The mathematical model of influencing factors for permeability is derived based on fluid theory, and the relationship of these parameters is achieved. Further investigations are directed towards the inherent characteristics of the control system. Based on the established model and measuring features, an information fusion based clustering control system is proposed to implement the measurement. Using this mechanical structure, a PID control system and a cluster control system have been developed. Simulation and experimental tests are carried out to examine the performance of the established system. It is noted that the clustering method has a high dynamic performance and control accuracy. This cluster fusion control method has been successfully utilized in powder metallurgy collar permeability testing.


Author(s):  
David Mendonça ◽  
William A. Wallace ◽  
Barbara Cutler ◽  
James Brooks

AbstractLarge-scale disasters can produce profound disruptions in the fabric of interdependent critical infrastructure systems such as water, telecommunications and electric power. The work of post-disaster infrastructure restoration typically requires information sharing and close collaboration across these sectors; yet – due to a number of factors – the means to investigate decision making phenomena associated with these activities are limited. This paper motivates and describes the design and implementation of a computer-based synthetic environment for investigating collaborative information seeking in the performance of a (simulated) infrastructure restoration task. The main contributions of this work are twofold. First, it develops a set of theoretically grounded measures of collaborative information seeking processes and embeds them within a computer-based system. Second, it suggests how these data may be organized and modeled to yield insights into information seeking processes in the performance of a complex, collaborative task. The paper concludes with a discussion of implications of this work for practice and for future research.


2014 ◽  
Vol 599-601 ◽  
pp. 900-903
Author(s):  
Quan Wang ◽  
Wei Ping Liu ◽  
Yi Jin ◽  
Bin He Fu

This paper presented the scenario of the IDCTMV Human-Machine Ergonomics test system with the programming idea of the modularization. Based on LabVIEW, the IDCTMV simulated test software and subjective evaluation software were designed and developed. The subjective evaluation results and operation performance data including the reaction time of crews, the rate of errors, and the rate of over reports were tested by the simulation of the integrated display and control terminal for the typical operation procedure, which solved the problems of lacking test methods for the study of the IDCTMV Human-Machine Ergonomics.


Energies ◽  
2021 ◽  
Vol 14 (8) ◽  
pp. 2337
Author(s):  
Linwei Chen ◽  
Haiyu Li ◽  
Thomas Charton ◽  
Ray Zhang

Interoperability testing and analysis tools provide a means for achieving and assuring the integrity of multivendor intelligent electronic devices (IEDs) data exchanges. However, the testing and analysis are very time consuming and error prone, and these problems worsen when a substation becomes large and complex during the engineering process, commission, replacement, maintenance, and extension. To address this challenge, this paper presents a virtual digital substation test system (VDSTS) with interoperability analysis tools for assessing and identifying the engineering challenges for the multiple-vendors digital substation. This VDSTS consists of three parts: (i) A virtual digital substation modelling for generating real-time digital substation primary plant operation and fault conditions, (ii) a standard IEC 61850-based substation protection, automation, and control (PAC) system architecture with multivendor IEDs and bay solutions, and (iii) multivendor Substation Configuration description Language (SCL) tools and in-house built data visualisation tool. The study focuses on the interoperability testing of sampled values (SV), generic object-oriented substation events (GOOSE), and manufacturing message specification (MMS) communication services, as defined in IEC 61850. The main issues identified are compatibility issues of SCL tools, protocol implementation issues, different information models, and application limitations. The outcomes will help utilities to reduce the risks associated with the general rollout of digital substations.


2019 ◽  
Vol 15 (1) ◽  
pp. 19-36 ◽  
Author(s):  
Wiliam Acar ◽  
Rami al-Gharaibeh

Practical applications of knowledge management are hindered by a lack of linkage between the accepted data-information-knowledge hierarchy with using pragmatic approaches. Specifically, the authors seek to clarify the use of the tacit-explicit dichotomy with a deductive synthesis of complementary concepts. The authors review appropriate segments of the KM/OL literature with an emphasis on the SECI model of Nonaka and Takeuchi. Looking beyond equating the sharing of knowledge with mere socialization, the authors deduce from more recent developments a knowledge creation, nurturing and control framework. Based on a cyclic and upward-spiraling data-information-knowledge structure, the authors' proposed model affords top managers and their consultants opportunities for capturing, debating and storing richer information – as well as monitoring their progress and controlling their learning process.


Sign in / Sign up

Export Citation Format

Share Document