86,509 research outputs found

    A note on "optimal resource allocation for security in reliability systems"

    Get PDF
    In a recent paper by Azaiez and Bier [Azaiez, M.N., Bier, V.M., 2007. Optimal resource allocation for security in reliability systems. European Journal of Operational Research 181, 773–786], the problem of determining resource allocation in series-parallel systems (SPSs) is considered. The results for this problem are based on the results for the least-expected cost failure-state diagnosis problem. In this note, it is demonstrated that the results for the least-expected cost failure-state diagnosis problem for SPSs in Azaiez and Bier (2007) are incorrect. In addition relevant results that were not cited in the paper are summarized

    RISK ASSESSMENT OF MALICIOUS ATTACKS AGAINST POWER SYSTEMS

    Get PDF
    The new scenarios of malicious attack prompt for their deeper consideration and mainly when critical systems are at stake. In this framework, infrastructural systems, including power systems, represent a possible target due to the huge impact they can have on society. Malicious attacks are different in their nature from other more traditional cause of threats to power system, since they embed a strategic interaction between the attacker and the defender (characteristics that cannot be found in natural events or systemic failures). This difference has not been systematically analyzed by the existent literature. In this respect, new approaches and tools are needed. This paper presents a mixed-strategy game-theory model able to capture the strategic interactions between malicious agents that may be willing to attack power systems and the system operators, with its related bodies, that are in charge of defending them. At the game equilibrium, the different strategies of the two players, in terms of attacking/protecting the critical elements of the systems, can be obtained. The information about the attack probability to various elements can be used to assess the risk associated with each of them, and the efficiency of defense resource allocation is evidenced in terms of the corresponding risk. Reference defense plans related to the online defense action and the defense action with a time delay can be obtained according to their respective various time constraints. Moreover, risk sensitivity to the defense/attack-resource variation is also analyzed. The model is applied to a standard IEEE RTS-96 test system for illustrative purpose and, on the basis of that system, some peculiar aspects of the malicious attacks are pointed ou

    Management of irrigation water storages: carryover rights and capacity sharing

    Get PDF
    The intertemporal management of irrigation water involves a consumption-storage decision, where the benefits of using water today are evaluated against the uncertain benefits of storing water for future use. Traditionally in Australia, state governments have centrally managed the major water storages: making decisions on water allocations given prevailing storage levels. However, in practice there are a number of factors which may prevent a centralised approach from achieving an optimal allocation of water. This paper considers in detail two decentralised approaches to storage management: carryover rights and capacity sharing. This paper also presents a quantitative analysis of storage management, involving the application of a stochastic dynamic programming model.
    • 

    corecore