2,341 research outputs found

    Impact Assessment of Hypothesized Cyberattacks on Interconnected Bulk Power Systems

    Full text link
    The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intelligent way of coordinated cyberattacks is to execute a series of disruptive switching executions on multiple substations using compromised supervisory control and data acquisition (SCADA) systems. These actions can cause significant impacts to an interconnected power grid. Unlike the previous power blackouts, such high-impact initiating events can aggravate operating conditions, initiating instability that may lead to system-wide cascading failure. A systemic evaluation of "nightmare" scenarios is highly desirable for asset owners to manage and prioritize the maintenance and investment in protecting their cyberinfrastructure. This survey paper is a conceptual expansion of real-time monitoring, anomaly detection, impact analyses, and mitigation (RAIM) framework that emphasizes on the resulting impacts, both on steady-state and dynamic aspects of power system stability. Hypothetically, we associate the combinatorial analyses of steady state on substations/components outages and dynamics of the sequential switching orders as part of the permutation. The expanded framework includes (1) critical/noncritical combination verification, (2) cascade confirmation, and (3) combination re-evaluation. This paper ends with a discussion of the open issues for metrics and future design pertaining the impact quantification of cyber-related contingencies

    Training of Crisis Mappers and Map Production from Multi-sensor Data: Vernazza Case Study (Cinque Terre National Park, Italy)

    Get PDF
    This aim of paper is to presents the development of a multidisciplinary project carried out by the cooperation between Politecnico di Torino and ITHACA (Information Technology for Humanitarian Assistance, Cooperation and Action). The goal of the project was the training in geospatial data acquiring and processing for students attending Architecture and Engineering Courses, in order to start up a team of "volunteer mappers". Indeed, the project is aimed to document the environmental and built heritage subject to disaster; the purpose is to improve the capabilities of the actors involved in the activities connected in geospatial data collection, integration and sharing. The proposed area for testing the training activities is the Cinque Terre National Park, registered in the World Heritage List since 1997. The area was affected by flood on the 25th of October 2011. According to other international experiences, the group is expected to be active after emergencies in order to upgrade maps, using data acquired by typical geomatic methods and techniques such as terrestrial and aerial Lidar, close-range and aerial photogrammetry, topographic and GNSS instruments etc.; or by non conventional systems and instruments such us UAV, mobile mapping etc. The ultimate goal is to implement a WebGIS platform to share all the data collected with local authorities and the Civil Protectio

    Moving from a "human-as-problem" to a "human-as-solution" cybersecurity mindset

    Get PDF
    Cybersecurity has gained prominence, with a number of widely publicised security incidents, hacking attacks and data breaches reaching the news over the last few years. The escalation in the numbers of cyber incidents shows no sign of abating, and it seems appropriate to take a look at the way cybersecurity is conceptualised and to consider whether there is a need for a mindset change.To consider this question, we applied a "problematization" approach to assess current conceptualisations of the cybersecurity problem by government, industry and hackers. Our analysis revealed that individual human actors, in a variety of roles, are generally considered to be "a problem". We also discovered that deployed solutions primarily focus on preventing adverse events by building resistance: i.e. implementing new security layers and policies that control humans and constrain their problematic behaviours. In essence, this treats all humans in the system as if they might well be malicious actors, and the solutions are designed to prevent their ill-advised behaviours. Given the continuing incidences of data breaches and successful hacks, it seems wise to rethink the status quo approach, which we refer to as "Cybersecurity, Currently". In particular, we suggest that there is a need to reconsider the core assumptions and characterisations of the well-intentioned human's role in the cybersecurity socio-technical system. Treating everyone as a problem does not seem to work, given the current cyber security landscape.Benefiting from research in other fields, we propose a new mindset i.e. "Cybersecurity, Differently". This approach rests on recognition of the fact that the problem is actually the high complexity, interconnectedness and emergent qualities of socio-technical systems. The "differently" mindset acknowledges the well-intentioned human's ability to be an important contributor to organisational cybersecurity, as well as their potential to be "part of the solution" rather than "the problem". In essence, this new approach initially treats all humans in the system as if they are well-intentioned. The focus is on enhancing factors that contribute to positive outcomes and resilience. We conclude by proposing a set of key principles and, with the help of a prototypical fictional organisation, consider how this mindset could enhance and improve cybersecurity across the socio-technical system

    ์‚ฐ์‚ฌํƒœ, ํ™์ˆ˜ ๋ฐ ๊ด€๋ จ ๋ณตํ•ฉ์žฌํ•ด ํ”ผํ•ด ์˜ˆ๋ฐฉ์„ ์œ„ํ•œ ํ†ตํ•ฉ์  ๋ฆฌ์Šคํฌ ๊ด€๋ฆฌ ์ฒด๊ณ„

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(๋ฐ•์‚ฌ)--์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› :ํ™˜๊ฒฝ๋Œ€ํ•™์› ํ˜‘๋™๊ณผ์ • ์กฐ๊ฒฝํ•™,2019. 8. ์ด๋™๊ทผ.In recent years, it has been reported that climate change is leading to increased damage and losses caused by natural hazards. Moreover, reports of compound disasters caused by multiple hazards in extreme weather events are becoming more frequent. Efforts have been made to improve risk management for natural hazards; however, there has been little discussion about providing an integrated framework supported by technical tools to establish an efficient and effective management plan based on quantitative analyses. Meanwhile, risk management tools and frameworks have been developed intensively in the industrial sector for decades. Applying risk management practices proven in the industrial sector can assist in systematic hazard identification and quantitative risk analysis for natural hazards, thereby potentially helping to reduce unwanted losses and to promote interactive risk communication. The objective of this study is to introduce methods of studying risk commonly used in the process industry, and to suggest how such methods can be applied to manage natural disasters, providing an integrated risk management framework. In particular, the hazard and operability (HAZOP), safety integrated level (SIL), and quantitative risk assessment (QRA) methods were investigated for the parts of the risk management process, which are risk identification, risk analysis, risk treatment, risk evaluation, and risk acceptance, as these methods are used to conduct key risk studies in industry. Herein, a literature review regarding those key risk studies and their application in various fields is briefly presented, together with an overview of risk management for natural hazards and multi-hazard risks. Next, common ways of implementing these risk studies for managing natural hazards are presented, with a focus on methodological considerations. First, a case study is presented in which HAZOP is applied to identify climate-related natural hazards in an organization using a worksheet that lists and evaluates natural hazards. Second, a study applying SIL is presented, in which the probability of landslide and rockfall occurrence is estimated based on the concept of reliability, indicating how probability values can be used for landslide risk management. In the third part, a simplified QRA for landslide hazard is exemplified through the case of site planning for a resort facility on a mountain hill, with the purpose of illustrating how stakeholders can make decisions on spatial planning regarding risk acceptance. In addition, this part presents the result of impact assessments conducted using physically-based models for cases involving multiple hazards, such as a post-wildfire landslide and complex flooding resulting from dam collapse. The technical approaches used in this studyโ€”systematic hazard identification, time-dependent reliability, and quantitative risk assessment for single or compound disasters using physically-based modelsโ€”provide the methods to resolve the difficulty of establishing tools for managing the risk from natural hazards. The analysis presented in this study also provides a useful framework for improving the risk management of natural hazards through establishing a more systematic context and facilitating risk communication between decision-makers and the public.๊ธฐํ›„๋ณ€ํ™”์— ์˜ํ•œ ์ž์—ฐ์žฌํ•ด๋Š” ์ตœ๊ทผ ์ฆ๊ฐ€ํ•˜๋Š” ์ถ”์„ธ์ด๋ฉฐ, ํญ์šฐ ๋“ฑ ๊ทนํ•œ ๊ธฐ์ƒ ํ˜„์ƒ์— ์˜ํ•œ ๋ณตํ•ฉ์žฌํ•ด ํ”ผํ•ด ์—ญ์‹œ ์ฆ๊ฐ€ํ•˜๋Š” ๊ฒƒ์œผ๋กœ ๋ณด๊ณ ๋˜๊ณ  ์žˆ๋‹ค. ๊ทธ๊ฐ„ ์ž์—ฐ ์œ„ํ•ด ์š”์†Œ๋กœ๋ถ€ํ„ฐ ๊ธฐ์ธํ•˜๋Š” ๋ฆฌ์Šคํฌ ๊ด€๋ฆฌ๋ฅผ ๊ฐœ์„ ํ•˜๊ธฐ ์œ„ํ•œ ๋…ธ๋ ฅ์€ ์žˆ์–ด์™”์œผ๋‚˜, ํ†ตํ•ฉ์ฒด๊ณ„ ๊ตฌ์ถ•์— ๋Œ€ํ•œ ๋…ผ์˜๋Š” ๋ถ€์กฑํ•œ ํŽธ์ด์˜€๋‹ค. ๋˜ํ•œ ์ •๋Ÿ‰์  ๋ฆฌ์Šคํฌ ๋ถ„์„์— ๊ธฐ๋ฐ˜ํ•œ ํšจ์œจ์  ๊ด€๋ฆฌ ์ฒด๊ณ„ ํ™•๋ฆฝ์— ์žˆ์–ด์„œ๋„ ๋ฆฌ์Šคํฌ ํ‰๊ฐ€๋ฅผ ์œ„ํ•œ ์ ์ • ๊ธฐ์ˆ  ์ œ๊ณต์— ์–ด๋ ค์›€์ด ์žˆ์—ˆ๋‹ค. ํ•œํŽธ, ์žฌํ•ด๋กœ ์ธํ•œ ์†์‹ค ์˜ˆ๋ฐฉ ๋ฐ ์ €๊ฐ์„ ์œ„ํ•œ ํ†ตํ•ฉ์  ์œ„ํ—˜ ๊ด€๋ฆฌ ์ฒด๊ณ„๋Š” ์ˆ˜์‹ญ ๋…„๊ฐ„ ์‚ฐ์—… ๋ถ€๋ฌธ์—์„œ ์ง‘์ค‘์ ์œผ๋กœ ๊ฐœ๋ฐœ๋˜์—ˆ๋‹ค. ์ž์—ฐ์žฌํ•ด ์œ„ํ—˜ ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•˜์—ฌ ์ด์™€ ๊ฐ™์€ ์ฒด๊ณ„์ ์ธ ๋ถ„์„ ๋ฐฉ๋ฒ•๊ณผ ๊ฒ€์ฆ๋œ ์šด์˜ ๋ฐฉ์‹์„ ์ฑ„ํƒํ•œ๋‹ค๋ฉด, ์ด์ƒ ๊ธฐํ›„ ๋…ธ์ถœ๋กœ ์ธํ•ด ๋ฐ˜๋ณต๋˜๋Š” ์ธ๋ช… ๋ฐ ์ž์‚ฐ ์†์‹ค์„ ์ค„์ผ ์ˆ˜ ์žˆ์„ ๊ฒƒ์ด๋‹ค. ์ด ์—ฐ๊ตฌ์˜ ๋ชฉ์ ์€ ์„์œ ํ™”ํ•™ ์—…์ข…์—์„œ ์‚ฌ์šฉ๋˜๋Š” ์œ„ํ—˜ ๊ด€๋ฆฌ ๋ฐฉ๋ฒ•์— ๋Œ€ํ•˜์—ฌ ๋ถ„์„ํ•˜๊ณ  ์ž์—ฐ์žฌํ•ด ์‚ฌ๋ก€์— ์ ์šฉํ•˜์—ฌ ํ†ตํ•ฉ์  ์œ„ํ—˜ ๊ด€๋ฆฌ ์ฒด๊ณ„๋ฅผ ์ˆ˜๋ฆฝํ•˜๋Š”๋ฐ ์žˆ๋‹ค. ํŠนํžˆ, ๋ฆฌ์Šคํฌ ๊ด€๋ จ ์Šคํ„ฐ๋”” ์ค‘ ์ฃผ์š”ํ•˜๊ฒŒ ์‹คํ–‰๋˜๋Š” ์œ„ํ—˜ ๋ฐ ์ž‘๋™์„ฑ ํ‰๊ฐ€ (The Hazard and Operability โ€“HAZOP), ์•ˆ์ „ ํ†ตํ•ฉ ์ˆ˜์ค€ ๋ถ„์„ (Safety Integrated Level โ€“ SIL), ์ •๋Ÿ‰์  ์œ„ํ—˜ ํ‰๊ฐ€ (Quantitative Risk Assessment โ€“ QRA) ์— ๋Œ€ํ•˜์—ฌ ์ž์„ธํžˆ ์•Œ์•„๋ณด๊ณ , ์ด ๋ฐฉ๋ฒ•๋“ค์ด ๋ฆฌ์Šคํฌ์˜ ํ™•์ธ, ๋ถ„์„, ์ €๊ฐ, ํ‰๊ฐ€, ์ˆ˜์šฉ์œผ๋กœ ์ด์–ด์ง€๋Š” ์ž์—ฐ์žฌํ•ด ๋ฆฌ์Šคํฌ ๊ด€๋ฆฌ ์ „๋ฐ˜์— ์–ด๋–ป๊ฒŒ ์ ์šฉ๋  ์ˆ˜ ์žˆ๋Š”์ง€์— ๋Œ€ํ•˜์—ฌ ๋ถ„์„ํ•˜์˜€๋‹ค. ์ด ๋…ผ๋ฌธ์—์„œ๋Š” ๋จผ์ € ์œ„์—์„œ ์–ธ๊ธ‰ํ•œ ์„ธ๊ฐ€์ง€ ์ฃผ์š” ๋ฆฌ์Šคํฌ ์Šคํ„ฐ๋””๋“ค์— ๋Œ€ํ•œ ๋ฌธํ—Œ ์กฐ์‚ฌ ๋‚ด์šฉ์„ ์†Œ๊ฐœํ•˜๊ณ , ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์— ์ ์šฉ๋˜๊ณ  ์žˆ๋Š” ํ˜„ํ™ฉ์— ๋Œ€ํ•˜์—ฌ ์•Œ์•„๋ณด์•˜๋‹ค. ๋˜ํ•œ ๊ธฐ์กด์˜ ์ž์—ฐ์žฌํ•ด ๋ฆฌ์Šคํฌ ๊ด€๋ฆฌ ๋ฐฉ๋ฒ•๋“ค์— ๋Œ€ํ•˜์—ฌ ์กฐ์‚ฌํ•˜๊ณ , ๋‹ค์ค‘ ์œ„ํ—˜ ์š”์†Œ์— ์˜ํ•œ ๋ณตํ•ฉ์žฌํ•ด ์œ ํ˜•์„ ์†Œ๊ฐœํ•˜์˜€๋‹ค. ๋‹ค์Œ์œผ๋กœ, ์ด ๋ฆฌ์Šคํฌ ์Šคํ„ฐ๋””๋“ค์ด ์‹คํ–‰๋˜๋Š” ์ผ๋ฐ˜์  ๋ฐฉ๋ฒ•๋“ค์— ๋Œ€ํ•˜์—ฌ ์•Œ์•„๋ณด๊ณ , ์ž์—ฐ์žฌํ•ด ๋ฆฌ์Šคํฌ ๊ด€๋ฆฌ ๋ถ„์•ผ์— ์ ์šฉ๋˜๊ธฐ ์œ„ํ•œ ๋ฐฉ์•ˆ๋“ค์— ๋Œ€ํ•˜์—ฌ ๋…ผ์˜ํ•˜์˜€๋‹ค. ์ฒซ๋ฒˆ์งธ ๊ฒฐ๊ณผ๋Š” ๊ธฐํ›„ ๊ด€๋ จ ์ž์—ฐ์žฌํ•ด์˜ ์œ„ํ—˜ ์š”์ธ์„ ์‹๋ณ„ํ•˜๊ธฐ ์œ„ํ•œ HAZOP ์Šคํ„ฐ๋”” ์‚ฌ๋ก€์ด๋ฉฐ, ์›Œํฌ์‹œํŠธ ํ˜•ํƒœ๋กœ ํ•œ ๊ธฐ๊ด€ ๋‚ด์— ๋ฐœ์ƒ ํ•  ์ˆ˜ ์žˆ๋Š” ์ž์—ฐ ์œ„ํ•ด ์š”์†Œ๋“ค์„ ๋ถ„์„ํ•˜์˜€๋‹ค. ๋‘๋ฒˆ์งธ ๋ถ€๋ถ„์€ ์‚ฐ์‚ฌํƒœ์™€ ๋‚™์„ ๋ฐœ์ƒ์˜ ํ™•๋ฅ ์„ ์ถ”์ •ํ•˜๊ธฐ ์œ„ํ•˜์—ฌ ์‹ ๋ขฐ๋„ ๊ฐœ๋…์— ๊ทผ๊ฑฐํ•œ SIL ์Šคํ„ฐ๋””๋ฅผ ์ ์šฉํ•œ ์‚ฌ๋ก€ ์—ฐ๊ตฌ์ด๋ฉฐ, ์‚ฐ์ •๋œ ํ™•๋ฅ  ์ง€ํ‘œ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ํšจ์œจ์ ์œผ๋กœ ์‚ฐ์‚ฌํƒœ ์œ„ํ—˜์„ ๊ด€๋ฆฌํ•˜๊ธฐ ์œ„ํ•œ ๋ฐฉ์•ˆ์„ ์ œ์‹œํ•˜์˜€๋‹ค. ์…‹์งธ๋กœ, ์‚ฐ์‚ฌํƒœ ์œ„ํ—˜์„ ์ •๋Ÿ‰์ ์œผ๋กœ ๋ถ„์„ํ•˜๊ธฐ์œ„ํ•œ QRA ์‚ฌ๋ก€ ์—ฐ๊ตฌ๋ฅผ ์ง„ํ–‰ํ•˜์˜€์œผ๋ฉฐ, ์‚ฐ์•… ์ง€์—ญ ํŽœ์…˜ ๋ฆฌ์กฐํŠธ์˜ ๋ถ€์ง€ ์„ ์ • ๊ณผ์ •์—์„œ ๋…ธ์ถœ๋  ์ˆ˜ ์žˆ๋Š” ์‚ฐ์‚ฌํƒœ ์œ„ํ—˜์„ ํ‰๊ฐ€ํ•˜๊ณ  ์ˆ˜์šฉํ•˜๋Š” ๋ฐฉ๋ฒ•์— ๋Œ€ํ•˜์—ฌ ๊ณ„ํš์˜ ๊ด€์ ์—์„œ ์•Œ์•„๋ณด์•˜๋‹ค. ์•„์šธ๋Ÿฌ, ์ด ๊ฒฐ๊ณผ ๋ถ€๋ถ„์—์„œ๋Š” ์‚ฐ๋ถˆ ํ›„ ์‚ฐ์‚ฌํƒœ์™€ ํ˜ธ์šฐ ์‹œ ๋Œ ๋ถ•๊ดด๋กœ ์ธํ•œ ํ™์ˆ˜, ๋‘๊ฐ€์ง€ ๋ณตํ•ฉ์žฌํ•ด ์‚ฌ๋ก€์— ๋Œ€ํ•˜์—ฌ ์•Œ์•„๋ณด๊ณ  ๋ฌผ๋ฆฌ์‹ ๊ธฐ๋ฐ˜ ๋ชจ๋ธ์„ ์‚ฌ์šฉํ•œ ์˜ํ–ฅ ํ‰๊ฐ€ ๋ฐฉ๋ฒ•์— ๋Œ€ํ•˜์—ฌ ๋…ผ์˜ ํ•˜์˜€๋‹ค. ์ด ๋…ผ๋ฌธ์—์„œ ์ œ์‹œ๋œ ๊ธฐ์ˆ ์  ์ ‘๊ทผ๋ฒ•์ธ ์ฒด๊ณ„์  ์œ„ํ—˜์„ฑ ์‹๋ณ„, ์‹œ๊ฐ„์— ๋”ฐ๋ฅธ ์‹ ๋ขฐ์„ฑ ๋ถ„์„, ์ •๋Ÿ‰์  ์œ„ํ—˜์„ฑ ํ‰๊ฐ€, ๋ฌผ๋ฆฌ ๋ชจ๋ธ์— ๊ธฐ๋ฐ˜ํ•œ ๋ณตํ•ฉ์žฌํ•ด ์˜ํ–ฅ ํ‰๊ฐ€๋Š” ์ž์—ฐ์žฌํ•ด ๋ฆฌ์Šคํฌ ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•œ ๋ฐฉ์•ˆ๋“ค๋กœ ํ™œ์šฉ ๋  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ๊ธฐ์ˆ ์  ์–ด๋ ค์›€์„ ํ•ด๊ฒฐํ•˜๋Š”๋ฐ ๋„์›€์ด ๋  ์ˆ˜ ์žˆ๋‹ค. ์ด ๋…ผ๋ฌธ์˜ ์—ฐ๊ตฌ ๊ฒฐ๊ณผ๋Š” ์˜์‚ฌ ๊ฒฐ์ •์ž์™€ ๋Œ€์ค‘ ๊ฐ„์˜ ๋ฆฌ์Šคํฌ ๊ด€๋ จ ์˜์‚ฌ ์†Œํ†ต์„ ์›ํ™œํžˆ ํ•˜๊ณ  ์ฒด๊ณ„์  ๊ด€๋ฆฌ ๋ฐฉ์•ˆ์„ ์ˆ˜๋ฆฝํ•จ์œผ๋กœ์จ ์ž์—ฐ์žฌํ•ด ๋ฆฌ์Šคํฌ ๊ด€๋ฆฌ๋ฅผ ํ–ฅ์ƒ์‹œํ‚ค๋Š”๋ฐ ์œ ์šฉํ•œ ํ†ตํ•ฉ ์ฒด๊ณ„๋ฅผ ์ œ๊ณตํ•  ๊ฒƒ์ด๋‹ค.Table of Contents 1. Introduction ๏ผ‘ 1.1 Study background and objective ๏ผ‘ 1.2 Study scope ๏ผ˜ 2. Theoretical paradigm and literature review ๏ผ‘๏ผ’ 2.1 Natural hazard management and communication ๏ผ‘๏ผ’ 2.1.1 The status of natural disaster occurrence ๏ผ‘๏ผ’ 2.1.2 Risk management for natural hazard ๏ผ‘๏ผ• 2.1.3 Communication on risk information ๏ผ‘๏ผ˜ 2.2 Industrial risk management practices ๏ผ’๏ผ 2.2.1 Risk identification ๏ผ’๏ผ 2.2.2 Risk analysis and treatment ๏ผ’๏ผ“ 2.2.3 Risk evaluation and acceptance ๏ผ’๏ผ• 2.3 Type and impact of multi-hazard risk ๏ผ’๏ผ— 2.4 Comparison of risk assessment methodologies ๏ผ“๏ผ’ 3. Risk identification for climate change issues ๏ผ“๏ผ• 3.1 Method for risk identification ๏ผ“๏ผ• 3.2 Result of risk identification ๏ผ”๏ผ 3.2.1 Climate change risk identification ๏ผ”๏ผ 3.3 Discussion on risk identification ๏ผ”๏ผ’ 4. Risk analysis and treatment for natural hazards ๏ผ”๏ผ• 4.1 Method for risk analysis and treatment ๏ผ”๏ผ• 4.2 Results of risk analysis and treatment ๏ผ–๏ผ‘ 4.2.1 Risk analysis and treatment for landslide hazard ๏ผ–๏ผ‘ 4.2.2 Risk analysis and treatment for rockfall hazard ๏ผ–๏ผ™ 4.3 Discussion on risk analysis and treatment ๏ผ˜๏ผ‘ 5. Risk evaluation and acceptance for compound disasters ๏ผ˜๏ผ— 5.1 Method for risk evaluation and acceptance ๏ผ˜๏ผ— 5.2 Result of risk evaluation and acceptance ๏ผ‘๏ผ๏ผ 5.2.1 QRA with physically-based landslide model ๏ผ‘๏ผ๏ผ 5.2.2 Impact assessment of post-wildfire landslides ๏ผ‘๏ผ๏ผ• 5.2.3 Impact assessment of complex flooding ๏ผ‘๏ผ๏ผ™ 5.3 Discussion on risk evaluation and acceptance ๏ผ‘๏ผ‘๏ผ” 6. Discussion ๏ผ‘๏ผ’๏ผ’ 7. Conclusion ๏ผ‘๏ผ’๏ผ•Docto

    Graph Theoretical Analysis of the Dynamic Lines of Collaboration Model for Disruption Response

    Get PDF
    The Dynamic Lines of Collaboration (DLOC) model was developed to address the Network-to-Network (N2N) service challenge found in e-Work networks with pervasive connectivity. A variant of the N2N service challenge found in emerging Cyber-Physical Infrastructures (CPI) networks is the collaborative disruption response (CDR) operation under cascading failures. The DLOC model has been validated as an appropriate modelling tool to aid the design of disruption responders in CPIs by eliciting the dynamic relation among the service team when handling service requests from clients in the CPI network

    Advancements in Enhancing Resilience of Electrical Distribution Systems: A Review on Frameworks, Metrics, and Technological Innovations

    Full text link
    This comprehensive review paper explores power system resilience, emphasizing its evolution, comparison with reliability, and conducting a thorough analysis of the definition and characteristics of resilience. The paper presents the resilience frameworks and the application of quantitative power system resilience metrics to assess and quantify resilience. Additionally, it investigates the relevance of complex network theory in the context of power system resilience. An integral part of this review involves examining the incorporation of data-driven techniques in enhancing power system resilience. This includes the role of data-driven methods in enhancing power system resilience and predictive analytics. Further, the paper explores the recent techniques employed for resilience enhancement, which includes planning and operational techniques. Also, a detailed explanation of microgrid (MG) deployment, renewable energy integration, and peer-to-peer (P2P) energy trading in fortifying power systems against disruptions is provided. An analysis of existing research gaps and challenges is discussed for future directions toward improvements in power system resilience. Thus, a comprehensive understanding of power system resilience is provided, which helps in improving the ability of distribution systems to withstand and recover from extreme events and disruptions

    Establishing cost-effective safety management for major oil and gas exploitation projects in the design phase

    Get PDF
    Disasters such as Deepwater Horizon in the Gulf of Mexico, in April 2010, continue to blight the oil and gas industry despite a significant amount of research effort carried out by academia, regulatory bodies, and oil and gas companies to understand how safety-related incidents, especially disasters, can be prevented. While these have contributed to the discussion around reducing risk, they often lack the systemic influences that determine the value drivers affecting decision-making, and the ability to achieve continuous and sustainable improvements in safety performance. Consequently, this research aims to provide a more holistic approach to understanding the nature of disasters in the oil and gas industry, and identifying how future disasters can be prevented by establishing "more cost-effective strategies. Quantitative research was carried out to determine the type and validity of the data used to construct trends in major accident safety performance, and qualitative research was carried out to assess the key factors that influence safety performance, and whether these are effectively applied. The conclusions of this research are that the industry has not demonstrated effective implementation of an Occupational Health and Safety Management System (OH&S-MSj. Historically safety performance shows wide annual variations where trends are difficult to define and extrapolate, making it difficult to provide any significant benefit for major accident prevention. There is no evidence to indicate that moving from a prescriptive, to a goal-setting regime, has improved safety performance, and reduced the prospect of future major accidents. Disaster investigation reports have shown that the role of the regulator has been ineffective. However, the adoption of a more comprehensive, and effective approach to inherently safer designs, and the way projects are managed, have the potential to make safety management more cost-effective and reduce the prospect of future disasters

    Resilience of the Critical Communication Networks Against Spreading Failures: Case of the European National and Research Networks

    Get PDF
    A backbone network is the central part of the communication network, which provides connectivity within the various systems across large distances. Disruptions in a backbone network would cause severe consequences which could manifest in the service outage on a large scale. Depending on the size and the importance of the network, its failure could leave a substantial impact on the area it is associated with. The failures of the network services could lead to a significant disturbance of human activities. Therefore, making backbone communication networks more resilient directly affects the resilience of the area. Contemporary urban and regional development overwhelmingly converges with the communication infrastructure expansion and their obvious mutual interconnections become more reciprocal. Spreading failures are of particular interest. They usually originate in a single network segment and then spread to the rest of network often causing a global collapse. Two types of spreading failures are given focus, namely: epidemics and cascading failures. How to make backbone networks more resilient against spreading failures? How to tune the topology or additionally protect nodes or links in order to mitigate an effect of the potential failure? Those are the main questions addressed in this thesis. First, the epidemic phenomena are discussed. The subjects of epidemic modeling and identification of the most influential spreaders are addressed using a proposed Linear Time-Invariant (LTI) system approach. Throughout the years, LTI system theory has been used mostly to describe electrical circuits and networks. LTI is suitable to characterize the behavior of the system consisting of numerous interconnected components. The results presented in this thesis show that the same mathematical toolbox could be used for the complex network analysis. Then, cascading failures are discussed. Like any system which can be modeled using an interdependence graph with limited capacity of either nodes or edges, backbone networks are prone to cascades. Numerical simulations are used to model such failures. The resilience of European National Research and Education Networks (NREN) is assessed, weak points and critical areas of the network are identified and the suggestions for its modification are proposed
    • โ€ฆ
    corecore