Professional Documents
Culture Documents
Efficient Infrastructure Restoration Strategies Using The Recovery Operator
Efficient Infrastructure Restoration Strategies Using The Recovery Operator
Airlie Chapman
Department of Mechanical Engineering, University of Melbourne, Melbourne, VIC, Australia
Leonardo Dueñas-Osorio*
Department of Civil & Environmental Engineering, Rice University, Houston, TX, USA
Mehran Mesbahi
William E. Boeing Department of Aeronautics and Astronautics, University of Washington, Seattle, WA, USA
&
Raissa M. D’Souza
Complexity Sciences Center, Department of Mechanical and Aerospace Engineering, and Department of Computer
Science, University of California, Davis, CA, USA and Santa Fe Institute, Santa Fe, NM 87501, USA
Abstract: Infrastructure systems are critical for soci- time-dependent recovery model of a system of interde-
ety’s resilience, government operation, and overall de- pendent networks. The form of the operator is assumed
fense. Thereby, it is imperative to develop informative to be a time-invariant linear dynamic model apt for infra-
and computationally efficient analysis methods for in- structure restoration. The recovery operator is generated
frastructure systems, which reveal system vulnerabili- by applying system identification techniques to numerous
ties and recoverability. To capture practical constraints disaster and recovery scenarios. The proposed compact
in systems analyses, various layers of complexity play representation provides simple yet powerful information
a role, including limited element capacities, restoration regarding systemic recovery dynamics, and enables gen-
resources, and the presence of interdependence among erating fast suboptimal recovery policies in time-critical
systems. High-fidelity modeling such as mixed integer applications.
programming and physics-based modeling can often be
computationally expensive, making time-sensitive analy-
ses challenging. Furthermore, the complexity of recovery 1 INTRODUCTION
solutions can reduce analysis transparency. An alterna-
tive, presented in this work, is a reduced-order repre- Proper operation of critical infrastructure networks is
sentation, dubbed a recovery operator, of a high-fidelity vital to our society’s well-being, as well as governance
∗ Towhom correspondence should be addressed. E-mail: leonardo. and safety. On the other hand, abnormal operation of
duenas-osorio@rice.edu. such systems generates health and security issues, as
C 2017 Computer-Aided Civil and Infrastructure Engineering.
DOI: 10.1111/mice.12314
2 González et al.
well as considerable economic loss. The current an- The second deals with system identification and linear
nual economic losses associated with adverse natural time-invariant representations of nonlinear dynamics.
events such as earthquakes, landslides, cyclones, and
floods, average between US$250 billion and US$300
1.1 Literature review on the Network Design Problem
billion, and by 2030 they are expected to increase up
(NDP) and optimization techniques applicable
to US$415 billion (UNISDR, 2015). Thus, individu-
to interdependent infrastructure systems
als, communities, governments, and other stakehold-
ers must work toward a “prospective,” “corrective,” The NDP consists of identifying the subgraph and flow
and “compensatory” management of risk, which is par- configuration that satisfy a set of demands at minimum
ticularly amplified by the existing interdependencies cost, for a given graph or network (Ahuja et al., 1993;
between different utilities and infrastructure systems Gendron et al., 1999). Johnson et al. (1978) presented
(UNISDR, 2015). a general formulation of the NDP, and proved its NP-
Considering the importance of interdependencies in completeness. Later, Dantzig et al. (1979) showed how
infrastructure performance and resilience, despite be- the structure of the NDP can be used to develop a de-
ing a relatively novel subject of study, the field has composition technique to enhance its speed and size
gained significant interest. Most of the early works on capabilities. For instances when the focus is only on
this subject focused on acknowledging and categoriz- finding optimal flows, Assad (1978) highlighted the
ing interconnectedness and interdependencies in sys- advantages of decomposition techniques for problems
tems of infrastructure networks (Rinaldi et al., 2001). considering multiple commodities. Similarly, Kenning-
Subsequently, some studies focused on the vulnerabil- ton (1978) presented a survey of linear cost multi-
ity of interdependent networks (Buldyrev et al., 2010; commodity network flows problems, emphasizing how
Vespignani, 2010; Gao et al., 2011; Hernandez-Fajardo realistic problems such as routing, assignment, urban
and Dueñas-Osorio, 2013) and later, on reducing that transportation planning, and communication, among
vulnerability (Brummitt et al., 2012). Also, some studies others, can be represented and studied using linear
started quantifying the recoverability and resilience of constraints. Even though these works acknowledge
these interdependent networked systems (Vugrin et al., that some problems require nonlinear models for their
2010; Pant et al., 2013; Ouyang, 2014; Shafieezadeh parametrization, they emphasize that linear structures
et al., 2014; Baroud et al., 2015; Ouyang and Wang, are more generalizable and easily adapted to many re-
2015), as well as developing recovery strategies for alistic network systems. Given that the NDP allows for a
such systems (Lee et al., 2007; Cavdaroglu et al., 2011; general and flexible description of networks under real-
González et al., 2016b). Nevertheless, these papers em- istic constraints, the NDP and its derivatives are widely
phasize the complexity associated with generating re- used in areas such as urban transportation, production
covery strategies and the difficulty of doing so via com- planning, and scheduling, among others (Frangioni and
putationally efficient algorithms, thus the importance of Gendron, 2009; Pedersen et al., 2008; Crainic et al.,
developing new tools. 2006; Fortz and Poss, 2009; Poss, 2011; Lin, 2011). Con-
In this article, we propose a new methodology to effi- sidering the versatility shown by the NDP-like model-
ciently develop recovery strategies for a damaged sys- ing, Lee et al. (2007) developed a network-flows-based
tem of infrastructure networks, using system identifi- approach to model multiple interdependent systems,
cation techniques. The proposed approach uses known and recover them after a damaging event. Nevertheless,
recovery strategies associated with a set of different Lee et al. (2007) emphasized the high complexity of the
disaster scenarios—which may come from computer- developed optimization model, and proposed a heuris-
generated or historical data—and applies system iden- tic approach to allow solving it when computational
tification tools to extract the main recovery dynamics power is limited. Later, Cavdaroglu et al. (2011) pre-
as a linear operator. This operator, defined as the re- sented another NDP-like Mixed-Integer formulation to
covery operator, in addition to containing relevant in- determine both the recovery strategy and the associated
formation about the recovery dynamics of the system, job scheduling for a damaged system of interdependent
can be used to efficiently generate recovery strategies networks, but considering its complexity, proposed a
associated with any given damage scenario. Before de- partitioning heuristic approach. Exploiting the analyti-
tailing the new approach to deal with infrastructure re- cal structure of the problem, González et al. (2016a, b)
covery, we discuss in the following subsections two re- proposed optimization models that extended the NDP
lated fields of study that underpin this work. The first is to optimize the recovery process of a damaged sys-
associated with designing (or restoring) networked sys- tem of networks with physical, logical, and geographi-
tems, particularly in relation to approaches that rely on cal interdependencies, revealing the high computational
network flows and mixed-integer programming (MIP). cost associated with determining a guaranteed optimal
Efficient restoration using the recovery operator 3
time-dependent recovery strategy. Even though NDP- System identification algorithms are typically applied
based models have proved useful to model and opti- to output data which is generated by experimental
mize the recovery process of a system of infrastructure processes, but these can also be exercised on high-
networks, they may not be ideal for time-critical ap- fidelity simulations to disseminate high-level features
plications due to their high computational complexity. from the system. This novel application has become
Nevertheless, these models can be used to study proto- increasingly popular in the analysis of simulated fluid
typical disaster scenarios to identify critical properties flow that is governed by nonlinear partial differential
of the system dynamics. This information is key to study equations. Sequential time-series fluid simulation data,
efficient approaches that allow identifying the main dy- in the form of a “snapshot” sequence {φ0 , . . . , φT }, are
namics associated with the recovery process described approximated as linear time-invariant dynamics φt+1 =
by NDP-like models. Aφt with an unknown linear operator A. The process
of recovering the eigenvectors and eigenvalues of op-
erator A is referred to as dynamic mode decomposi-
1.2 Literature review on the system identification and
tion (DMD) (Schmid, 2010). DMD has shown to extract
finite linear representations of nonlinear dynamics
essential features of the underlying dynamics, reliably
System identification techniques have widespread use in approximating models with low complexity (Rowley
multiple fields, such as physics, biology, and engineer- et al., 2009; Schmid et al., 2011). Rowley et al. (2009)
ing. Such techniques have been embraced in civil and connected the efficacy of DMD to its grounding in
structural engineering for the identification of structural Koopman operator theory. The Koopman operator is
parameters, structural health monitoring, and structural an infinite dimensional linear operator which captures
response (Kijewski and Kareem, 2003; Jiang and Adeli, the full information of nonlinear systems (Koopman
2005; Beskhyroun et al., 2011; Sirca and Adeli, 2012), and von Neumann, 1932). DMD is a finite-dimensional
but to our knowledge they have not been used to iden- approximation of Koopman operator theory over a
tify the main recovery dynamics of systems of interde- special set of observables (Mezić, 2005). In addition
pendent networks, such as infrastructure systems. The to its success in fluid dynamics, linear operator the-
general area of system identification endeavors to form ory has also been applied to bursting neuron mod-
dynamic models of a process from system output data els (Mauroy et al., 2014), large-scale power systems
alone—in this article, the dynamics stem from interde- (Barocio et al., 2015), and multiresolution analysis
pendent system restoration. The system identification of video streams (Kutz et al., 2015). Given such ap-
process varies depending on the assumptions placed plications to complex systems, it is surmised to be
on the dynamic model. On one hand, there is grey applicable to restoration processes of infrastructure
box modeling, which assumes a basic physical model- systems.
ing based on preceding understanding of the system, If the fundamental features of the dynamics can be
and uses data to perform fitting on specific parameters represented via a linear operator, then numerous de-
of the model. On the other hand, there is black box sirable directions follow. From a computational stand-
modeling, which has access to limited knowledge of the point, evolving a linear time-invariant system φt+1 =
studied system and assumes no prior model is available, Aφt is preferable over a nonlinear system. Also, using
thus leveraging heavily on the available data. Black box approximative linear operators enables the application
modeling usually relies on input–output information of linear systems algorithms and theory to nonlinear
of the studied system, to infer the associated dynam- systems. Applying linear stability analysis to establish
ics involved—thus, we will use this modeling approach, global stability is one example (Mauroy and Mezic,
considering its general applicability. McGhee (1963) 2013). Sootla et al. (2016) leverage the Koopman oper-
categorized these approaches as parametric space mod- ator in the design of temporal pulse control of bistable
eling, including differential equations of predetermined monotone systems. Brunton et al. (2016) demonstrated
form and order, along with state models, and nonpara- the potential use of these operators to design optimal
metric or function space modeling, for example, impulse control laws for fully nonlinear systems using tech-
response, covariance function, spectral densities, and niques from linear optimal control. In this venue, lin-
Volterra series. Comprehensive survey papers on the ear operator theory has the potential to open the ap-
topic have been written by Åström and Eykhoff (1971) plication of many techniques from the rich field of
and Kerschen et al. (2006). For further reading, see the linear controller design (Anderson and Moore, 1990;
books by Ljung (1999), Söderström and Stoica (1989), Stengel, 1994), thus hinting its applicability to modeling
and the International Federation of Automatic Control the dynamics associated with subjects such as the effi-
symposia series on system identification which has been cient recovery of systems of interdependent infrastruc-
ongoing since 1967. ture networks.
4 González et al.
˜ 1 = 11 , 21 , . . ., n1 (7) individual recovery times are weighted identically. The
method could be expanded to consider prior informa-
where (i0 , i1 ) is the input–output pair of disaster sce- tion about the relative importance of each element or
nario i. each time period modeled. Assuming there are positive
Then, it can be seen that in this case diagonal matrices W E and WT that describe the relative
 = arg min
˜ 1 − A
˜ 0 (8) importance (weights) associated with the studied ele-
A∈R|E|×|E|
ments and recovery periods, respectively, the general
Assuming that the norm used in (8) to quantify the optimization problem to construct the recovery opera-
error is the commonly used square root of the sum of tor would then be
the squares of each entry (also known as the Frobenius
norm), and that the set of damage states studied can  = arg min W E (
˜ 1 − A
˜ 0 )WT . (10)
A∈R|E|×|E|
produce a set of |E| linearly independent vectors, then
the optimization problem associated with finding  is The more important a given element (or period) is,
known, and the minimizer of this problem assumes the the higher its respective values in W E (or WT ), thus re-
closed form sulting in a larger penalization for its errors.
 = ˜ 1
˜ 0T ˜ 0T −1
˜ 0 (9)
2.2 Efficient generation of recovery strategies
where ˜ 1
˜ 0T denotes the one-period temporal cross-
correlation, and ( ˜ 0T )−1 is associated with the auto-
˜ 0 The simplicity of the linear dynamics (2) provides a
correlation of the damage states. Note that the gen- computationally efficient method to generate approxi-
eration of the proposed recovery operator is highly mate recovery strategies given a set of initial damage
efficient, and can handle large-scale systems, because it conditions.
is based on least-squares optimization and linear oper- Assume that for a given time t, there is a known
ations. Thus, in general, the main source of computa- damage state φ(t), and we want to generate a recovery
tional complexity of the proposed method comes from strategy starting from it along with the damage states
assembling the input set of benchmark damage scenar- associated with such strategy, namely, {φ̆(t), φ̆(t +
ios (and their respective recovery strategies), which can 1), ..., φ̆(|T |)}, with φ̆(t) = φ(t). Assuming that  has al-
be done well before the occurrence of the damaging ready been calculated (which in practice can be done
event. Also note that the set of damage states should in- during non-time-critical periods), then we know that for
clude damage and recovery information of all elements the period t + 1 the approximate damage state can be
to obtain nonsingular solutions. We propose using the calculated by Âφ̆(t). As the approximate dynamics are
Frobenius norm to penalize large deviations more, since continuous, then Âφ̆(t) will require a projection step
later on, when using the operator to generate recovery to describe a binary damage state. Thus, we can de-
strategies, large deviations would result in proposed re- fine a threshold value 0 < ā < 1, that will determine
covery times too far from the optimal, which would re- the ranges in which a noninteger damage state will be
duce the quality of the overall recovery strategies. Nev- rounded to a binary state. Then, the damage state for
ertheless, note that the reader is free to select the type period t + 1 would be
of norm to penalize deviations, but Equation (9) would φ̆(t + 1) = ( Âφ̆(t) − 1ā) (11)
not return the optimal Â, and other optimization meth-
ods would be needed. Generalizing for any positive integer of m periods in
The operator  can be viewed as a matrix of dimen- the future, we have that
sions |E| × |E| composed of real values. In general, each
φ̆(t + m) = ( Âm φ̆(t) − 1ā) (12)
position Âî ĵ indicates the influence that the damage
state of element î at any given time t has over the dam- The proposed method uses the recovery operator to
age state of element ĵ at time t + 1. This operator con- replicate the recovery dynamics from the generating
tains important information about the recovery dynam- data, without enforcing any constraint on the predicted
ics of the system. In particular, diverse relevant analyses recovery strategy. If there are constraints that need to
could be performed using the recovery operator, such as be enforced, such as a strict maximum resource utiliza-
finding the recovery modes of the system and their rates tion per recovery period, it is possible to use the recov-
of convergence via DMD, based on the eigendecompo- ery operator to formulate a general iterative approach
sition of Â. as follows:
Note that the proposed method to construct the re- Assume that our current iteration starts at period t
covery operator assumes that each individual element and its related initial damage state is φ̆(t). Then, Âφ̆(t)
has the same relative importance, thus errors in their can be interpreted as the relative ranking or importance
6 González et al.
of recovering each node during period t. In particular, covery strategies. If this cumulative function describes
this ranking is associated with the order in which the different behaviors for the two strategies, this would in-
elements should be recovered such that the proposed dicate that the performance recovery, the resource uti-
recovery fits better the behavior described by the in- lization, and the costs associated with each strategy are
put recovery strategies. Thus, this ranking could be used inconsistent.
to indicate the set of elements in which the resources Whenever there are inconsistencies in the predicted
should be used first (while ensuring that all desired con- times of recovery or the cumulative percentage of re-
straints are satisfied). For example, if there is a strict paired elements, it is important to evaluate the impact
maximum resource utilization, one could select the set of these inconsistencies on the quality of the predicted
of elements with higher importance and an associated recovery strategy. To estimate the impact of these
total resource utilization less than the maximum al- recovery time deviations in an efficient manner, we
lowed for that period. Then, considering the elements could construct an optimization model to both evalu-
selected to be recovered at time t, calculate φ̆(t + 1), up- ate the performance of a given recovery strategy, and
date the vector of relative importances (now Âφ̆(t + 1)), detect any infeasibility associated with it, by modify-
and repeat. ing the high-fidelity optimization model originally used
Note that in the case of a recovery process, the spec- to determine the benchmark optimal recovery strate-
tral radius of the operator (denoted as ρ(A)) is expected gies (González et al., 2016a). Assume that such high-
to be strictly less than one, to guarantee that when us- fidelity model is defined based on two arrays of vari-
ing any disaster configuration as the initial damage state ables, X and Y , where the first indicates in which period
φ̆(0), the damage states of the system will converge to a each element should be recovered (i.e., the recovery
full recovery as t increases (since limm→∞ Am = 0 if and strategy), and the second encompasses all remaining op-
only if ρ(A) < 1). erational variables, such as flow of commodities, un-
dersupply, etc. Thus, without loss of generality, assume
that the high-fidelity optimization model can be written
2.3 Measuring the quality of the generated recovery
as min X,Y {F(X, Y ) : C(X, Y ) ≥ 0}, where F(X, Y ) is the
strategies
objective function (such as recovery cost, total recov-
To use the strategies that are generated using the re- ery time, etc.) to be minimized, and C(X, Y ) represents
covery operator, it is important to quantify their qual- the set of constraints that determine which solutions are
ity. In general, it is desirable that the recovery operator feasible. Now, let χ be a fixed recovery strategy gen-
strategies resemble as close as possible strategies con- erated using the recovery operator (in which case χ at
sidered to be optimal. Using the strategies generated by period t would be described by φ̆(t − 1) − φ̆(t)). Then,
a high-fidelity optimization model as a benchmark, it is the modified optimization problem
possible to evaluate how much the recovery times de-
min F(χ , Y ) (13)
viate from one strategy to the other. In particular, the Y
ideal is that the recovery times proposed for each indi-
vidual component by the recovery operator approach
s.t. C(χ , Y ) ≥ 0 (14)
deviate as little as possible compared to the optimal
strategy.
In some instances, however, focusing only on com- could be used to evaluate the performance and feasi-
paring the proposed approximate recovery sequences bility of strategy χ . In particular, Equation (13) could
with the optimal ones may not be enough. In particu- be used to evaluate if there is a performance detri-
lar, even though the recovery times of an approximate ment, whereas inequalities (14) would determine if the
recovery strategy may deviate little compared to the op- predicted strategies are not feasible, indicating the ex-
timal one, the resultant performance recovery and costs act periods and elements associated with such an in-
associated with implementing them may differ greatly. feasibility. In general, the optimization problem de-
Moreover, the approximate recovery strategy may be scribed by Equations (13) and (14) will be more efficient
an unfeasible one. In particular, if the elements of the than the original high-fidelity optimization problem,
studied system are highly interdependent, or if the avail- since its number of decision variables is highly reduced.
able resources are very limited, the feasibility of the so- For example, the optimization problem proposed in
lutions will be sensitive to changes in the recovery times Appendix A (used to find the optimal recovery strategy)
of each element. Thus, in addition to studying the er- is NP-hard, but its modified version (used to evaluate
rors in the estimated recovery times, it is also important given recovery strategies) can be solved in polynomial
to compare the cumulative percentage of repaired ele- time (if partial functionality is allowed) (González et al.,
ments associated with the estimated and benchmark re- 2016a).
Efficient restoration using the recovery operator 7
0.06
increasing order). Then, we calculated the knee (point
40 of maximum curvature) of the curve associated with this
0.05
list. Since this point indicates the value for which the
Gas
Repaired Elements
600
one could sort the elements such that their closeness in Within confidence interval
Number of
400 Outside confidence interval
the operator reflects its geographical colocation, provid-
200
ing a graphical depiction that would facilitate finding the
influence that each geographical region has over others. 0
0 2 4 6 8 10 12 14 16 18 20
Repair Time
Cumulative Percentage of
Repaired Elements
1
3.1.1 Generated recovery strategies for nodes. To eval-
uate the power and accuracy of the proposed method- 0.5
Predicted (using Recovery Operator)
ology to efficiently generate recovery strategies using Benchmark
ios into 10 different groups (of 100 scenarios each) and Repair Time
applied cross-validation. In particular, for each group (a) Box-plot of the errors, number of repaired ele-
we generated recovery strategies, using a recovery op- ments, and cumulative percentage of recovery, re-
erator created using only the benchmark (td-INDP- spectively, for each recovery period.
generated) recovery strategies of the other nine groups.
For each disaster scenario in each group, seeded with
the initial disaster state φ(0) = φ̆(0), we used its asso- 1000
700
td-INDP-based recovery strategies, to study the qual-
ity of approximation for each time period. For this 600
Damage State Damage State Damage State Damage State Damage State
Damage State Damage State Damage State Damage State Damage State
Positive: early recovery
Negative: late recovery
Element 15
Element 5
1 1
Prediction Error
10 0.5 0.5
0 0
0 0 2 4 6 8 10 12 0 2 4 6 8 10 12
t t
-10
Element 27
Element 36
1 1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
0.5 0.5
Repair Time
0 0
Repaired Elements
600 0 2 4 6 8 10 12 0 2 4 6 8 10 12
Within confidence interval t t
Number of
Element 53
Element 75
400 Outside confidence interval
1 1
Element 87
Element 93
Repair Time
Cumulative Percentage of
1 1
Repaired Elements
1 0.5 0.5
0 0
0 2 4 6 8 10 12 0 2 4 6 8 10 12
0.5
Predicted (using Recovery Operator) t t
Element 116
Element 97
Benchmark 1 1
0 0.5 0.5
0 2 4 6 8 10 12 14 16 18 20
0 0
Repair Time
0 2 4 6 8 10 12 0 2 4 6 8 10 12
t t
(a) Box-plot of the errors, number of repaired ele- Ideal threshold area
True
ments, and cumulative percentage of recovery, re- Predicted
800
ties in the recovery strategies, due to the extended use
700 of more resources than available. Moreover, Figure 4b
600 shows that the histogram of the observed errors is bet-
500 ter centered around zero, relative to its analogous in
400 Figure 3b.
300 To provide insight on the quality of the operator
200
strategies, and on how Equation (12) is used to generate
100
such recovery strategies, Figure 5 shows the evolution of
the failure states for a set of 10 nodes, comparing their
0
-15 -10 -5 0 5 10 15 td-INDP recovery strategy and their associated values
Repair Error
of Âk φ̆(0). For each component, a value of 1 describes a
(b) Histogram of the errors fully failed state, whereas 0 describes a fully recovered
state. For each element in Figure 5, there is a gray box
Fig. 4. Comparison between predicted recovery strategy for that highlights in the horizontal axis the time period in
nodes (using the recovery operator) and the benchmark which the element was recovered according to the td-
strategies (based on the td-INDP), using ā = 0.4. INDP strategy, and in the vertical axis the range of val-
ues that ā can take such that the generated recovery
using ā = 0.4. The average error in the predicted re- strategy perfectly replicates the td-INDP strategy. As
covery times using this value of ā changed to 0.20954, expected, the faster an element is recovered according
and its standard deviation to 2.05361. These values show to the td-INDP strategy, the larger is the range of val-
that the proposed recovery strategies generated using ues that ā can take to return an accurate recovery strat-
the optimized threshold resemble more accurately the egy based on the recovery operator, since the slope of
optimal recovery strategies. From Figure 4a, it can be Âk φ̆(0) for that particular element would be higher. For
seen that the relative number of outliers observed for example, it can be observed that the range of threshold
each recovery time is less than the one observed using values that would generate an accurate recovery time
ā = 0.5. Similarly, the predicted cumulative fraction of for element 36 is much narrower than the same range
elements recovered depicts the benchmark much more associated with element 5. Note that another approach
accurately than if using ā = 0.5. In particular, it is im- to fine-tune ā would be finding the threshold value that
portant to ensure that the predicted cumulative fraction better fits these accuracy ranges across all elements and
of elements recovered is not extensively far above the scenarios. In this case, ā would maximize the number
Efficient restoration using the recovery operator 11
Prediction Error
0.14
Water
50 0
0.12
-20
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
100 0.1 Repair Time
Repaired Elements
600
Gas
Number of
0.08
150 400 Outside confidence interval
200
0.06
200 0
Power
0 2 4 6 8 10 12 14 16 18 20 22
0.04 Repair Time
Cumulative Percentage of
Repaired Elements
1
250
0.02
0.5
Predicted (using Recovery Operator)
50 100 150 200 250 Benchmark
Fig. 6. Representation of the recovery operator  (a) Box-plot of the errors, number of repaired ele-
considering both nodes and arcs. Matrix entries with absolute ments, and cumulative percentage of recovery, re-
value below 0.0079 are not displayed. The rows and columns spectively, for each recovery period.
correspond to the assigned labels for each element.
of times in which the recovery periods were accurately 12.5%, 87.5% range
1200 25%, 75% range
predicted, instead of minimizing the overall error. median
curacy and predictability power due to the inclusion of (b) Histogram of the errors
additional significant elements, with respect to the case
of nodes only. The spectral radius of this operator is Fig. 7. Comparison between predicted recovery strategy for
0.9944, which again guarantees a predicted full recov- nodes and arcs (using the recovery operator) and the
ery of the system. As observed in the recovery opera- benchmark strategies (based on the td-INDP), using ā = 0.5.
tor associated with nodes only, the blocks Âwater, gas and
Âpower, gas are dense relative to other blocks, whereas ery strategies for both nodes and arcs simultaneously.
Âgas, water and Âgas, power are the most sparse. This shows For this case, the threshold value ā used was also 0.5.
that the recovery operator provides consistent results The average cross-validation RMS error was 0.03748,
regarding the relationships between networks. Never- and the average R 2 was 0.88184. The average error in
theless, it can be seen that for each block in this oper- the predicted recovery times was 0.15993, and its stan-
ator, the upper-left corners (associated with the node dard deviation was 3.29823. These values show that the
elements, as opposed to the arc elements, located at the recovery operator can be used to adequately generate
lower-right corners) are densest. This indicates that in quasi-optimal recovery strategies, with an average er-
general the recovery relationships between nodes tend ror even smaller than the case with only nodes. Nev-
to be stronger than the ones observed for the arcs. ertheless, note that the average deviation was slightly
higher, which can be expected since there are two dif-
3.2.1 Generated recovery strategies for both nodes and ferent types of elements being analyzed simultaneously
arcs. Following the procedure detailed in Section 3.1.1, now. As in the previous examples, Figure 7 overviews
for each of the disaster scenarios, we generated recov- different aspects associated with the errors of the
12 González et al.
generated recovery strategies compared to the td-INDP to discern from the high-fidelity modeling framework.
strategies. Figures 7a and b show that the generated Analysis of these interdependencies can help isolate
strategies are also accurate, having a median error close particular significant sections of the networks during the
to 0, but with a slightly increased variability. However, recovery process and help inform recovery modifica-
Figure 7a shows that the predicted cumulative recovery tions. Finally, as the approximate dynamics are linear,
function offers a close fit to the benchmark recovery at they can be examined using a plethora of techniques
all periods, despite having to model two different types from linear systems theory. The linear operator repre-
of elements simultaneously. In particular, Figure 7b sentation means that linear time-invariant system anal-
shows that the error distribution has a reduced symme- ysis tools can be applied to examine features like stabil-
try compared to the one associated with nodes only, fa- ity, convergence, and modal features of the dynamics.
voring outliers in the left tail. This may be explained by The area of linear controller design is also open for ex-
the weaker recovery relationships observed in the arcs ploration, addressing such issues as optimal placements
compared to the ones observed between the nodes, re- of resources in the network and designing inputs into
ducing the predictability power for these types of el- the system for efficient recovery.
ements. Nevertheless, despite this increased variabil- Currently, the construction of the proposed recovery
ity, more than 50% of the proposed recovery times are operator assumes that the system to be recovered is de-
within two periods with respect to the td-INDP strate- terministic, and that the recovery process can be seen
gies, and more than 75% within five periods. as a time-invariant process, where the optimal recovery
strategy depends only on the current damage states of
each element (and not their recovery/damage history).
4 CONCLUSIONS For future work, we will explore and extend the capa-
bilities of the recovery operator to consider hysteresis,
In this article, we presented a novel approach to ef- uncertainty in the recovery process, and time-variant
ficiently generate approximate recovery strategies for recovery dynamics. This would allow, among others,
interdependent infrastructure systems, using a linear studying the impact of resource and behavioral iner-
time-invariant recovery operator. The recovery opera- tia and the occurrence of multiple subsequent damag-
tor is generated from a set of high-fidelity recovery sce- ing events. Note that if the available resources change
narios, to identify and approximate their main recovery in time, the underlying recovery dynamics may be af-
dynamics, and then to develop tailored recovery strate- fected; thus, to improve the resultant accuracy it may be
gies after specific disaster scenarios. For our illustrative ideal to construct different recovery operators for dif-
example, we used the td-INDP to generate these bench- ferent time domains. Also, applying tools from linear
mark recovery strategies associated with a set of pre- controller analysis and design is of particular interest, as
determined disaster scenarios. The recovery strategies notions of controllability and observability can now be
generated using the proposed recovery operator show applied to recovery dynamics. For example, Equation
good agreement with the high-fidelity recovery scenario (2) could be extended to consider the effects of an input
even for long-term planning, both in the time of recov- matrix B and a control vector u, such that φ(t + 1) ≈
ery and the resources used in each period. Also note Âφ(t) + Bu(t). Connections between control-theoretic
that as our proposed method is a data-driven process measures and infrastructure-centric measures such as
that operates on “snap-shots” of input/output data, the resilience would present a powerful link between the
recovery operator approach is not restricted to any par- two fields, enabling stakeholders to determine optimal
ticular recovery strategy algorithm. control configurations to maximize recoverability and
As the linear operator approach is a compact repre- resilience of their systems across multiple time scales.
sentation of the recovery dynamics, it provides a useful Moreover, as hinted in Section 2.2, the recovery oper-
tool with varied perspectives for decision makers and ator offers relevant information about the relative im-
stakeholders. First, the linear generation of the approx- portance of each element in the recovery process, that
imate recovery strategy can be exploited for its com- could be exploited in determining possible element clus-
putational savings when compared to the computation- tering configurations and the development of impor-
ally expensive high-fidelity algorithms. This provides tance rankings.
an efficiently computable coarse recovery strategy as
well as a good initial strategy to warm-start high-fidelity
optimization models. Second, the operator describes ACKNOWLEDGMENTS
time-correlations within the dynamics through the zero
structure of Â, exposing sometimes hidden interdepen- This publication was partially funded by the “Research
dencies between network elements that can be difficult Program 2012” Grant from the Office of the Vice
Efficient restoration using the recovery operator 13
President for Research - Universidad de los Andes (Bo- Fortz, B. & Poss, M. (2009), An improved Benders decom-
gotá, Colombia). The authors gratefully acknowledge position applied to a multi-layer network design problem,
the support by Centro de Estudios Interdisciplinarios Operations Research Letters, 37(5), 359–64.
Frangioni, A. & Gendron, B. (2009), Reformulations of the
Básicos y Aplicados (CEIBA), the U.S. National Sci- multicommodity capacitated network design problem, Dis-
ence Foundation (Grant CMMI-1436845), the U.S. De- crete Applied Mathematics, 157(6), 1229–41.
partment of Defense (Grant W911NF-13-1-0340), and Gao, J., Buldyrev, S. V., Havlin, S. & Stanley, H. E. (2011),
FICO for providing the Xpress-MP licenses used in the Robustness of a network of networks, Physical Review Let-
ters, 107(19), 195701-1–195701-5.
computational experiments. Gendron, B., Crainic, T. G. & Frangioni, A. (1999), Multi-
commodity capacitated network design, in B. Sansò and
P. Soriano (eds.), Telecommunications Network Planning,
Springer US, pp. 1–19.
González, A. D., Dueñas-Osorio, L., Medaglia, A. L. &
Sánchez-Silva, M. (2014a), Resource allocation for infras-
REFERENCES tructure networks within the context of disaster manage-
ment, in G. Deodatis, B. Ellingwood, and D. Frangopol
Ahuja, R. K., Magnanti, T. L. & Orlin, J. B. (1993), Network (eds.), Safety, Reliability, Risk and Life-Cycle Performance
Flows: Theory, Algorithms, and Applications, Prentice Hall, of Structures and Infrastructures, CRC Press, New York, pp.
Upper Saddle River, NJ. 639–46.
Anderson, B. D. O. & Moore, J. B. (1990), Optimal Con- González, A. D., Dueñas-Osorio, L., Medaglia, A. L. &
trol: Linear Quadratic Methods, Prentice Hall, Upper Sad- Sánchez-Silva, M. (2016a), The time-dependent interde-
dle River, NJ. pendent network design problem (td-INDP) and the eval-
Assad, A. A. (1978), Multicommodity network flows—a sur- uation of multi-system recovery strategies in polynomial
vey, Networks, 8(1), 37–91. time, in H. Huang, J. Li, J. Zhang, and J. Chen (eds.), The
Åström, K. & Eykhoff, P. (1971), System identification—a sur- 6th Asian-Pacific Symposium on Structural Reliability and
vey, Automatica, 7(2), 123–62. Its Applications, Shanghai, China, 544–50.
Barocio, E., Pal, B. C., Thornhill, N. F. & Messina, A. R. González, A. D., Dueñas-Osorio, L., Sánchez-Silva, M. &
(2015), A dynamic mode decomposition framework for Medaglia, A. L. (2016b), The interdependent network de-
global power system oscillation analysis, IEEE Transac- sign problem for optimal infrastructure system restora-
tions on Power Systems, 30(6), 2902–12. tion, Computer-Aided Civil and Infrastructure Engineering,
Baroud, H., Barker, K., Ramirez-Marquez, J. E. & Rocco, C. 31(5), 334–50.
González, A. D., Sánchez-Silva, M., Dueñas-Osorio, L. &
M. (2015), Inherent costs and interdependent impacts of in-
Medaglia, A. L. (2014b), Mitigation strategies for lifeline
frastructure network resilience, Risk Analysis, 35(4), 642–
systems based on the interdependent network design prob-
62.
lem, in M. Beer, S.-K. Au, and J. W. Hail (eds.), Vul-
Beskhyroun, S., Wegner, L. D. & Sparling, B. F. (2011), New
nerability, Uncertainty, and Risk: Quantification, Mitiga-
methodology for the application of vibration-based damage
tion, and Management, American Society of Civil Engineers
detection techniques, Structural Control and Health Moni-
(ASCE), Reston, VA, pp. 762–71.
toring, 19(1), 88–106.
Hernandez-Fajardo, I. & Dueñas-Osorio, L. (2013), Prob-
Brummitt, C. D., D’Souza, R. M. & Leicht, E. A. (2012), Sup-
abilistic study of cascading failures in complex interde-
pressing cascades of load in interdependent networks, Pro-
pendent lifeline systems, Reliability Engineering & System
ceedings of the National Academy of Sciences of the United
Safety, 111, 260–72.
States of America, 109(12), E680–89. Jiang, X. & Adeli, H. (2005), Dynamic wavelet neural network
Brunton, S. L., Brunton, B. W., Proctor, J. L. & Kutz, J. N.
for nonlinear identification of highrise buildings, Computer-
(2016), Koopman invariant subspaces and finite linear rep-
Aided Civil and Infrastructure Engineering, 20(5), 316–30.
resentations of nonlinear dynamical systems for control, Johnson, D., Lenstra, J. & Kan, A. (1978), The complexity of
PLOS ONE, 11(2), e0150171. the network design problem, Networks, 8, 279–85.
Buldyrev, S. V., Parshani, R., Paul, G., Stanley, H. E. & Kennington, J. L. (1978), A survey of linear cost multicom-
Havlin, S. (2010), Catastrophic cascade of failures in inter- modity network flows, Operations Research, 26(2), 209–36.
dependent networks, Nature, 464(7291), 1025–28. Kerschen, G., Worden, K., Vakakis, A. F. & Golinval, J.-C.
Cavdaroglu, B., Hammel, E., Mitchell, J. E., Sharkey, T. C. & (2006), Past, present and future of nonlinear system identi-
Wallace, W. A. (2011), Integrating restoration and schedul- fication in structural dynamics, Mechanical Systems and Sig-
ing decisions for disrupted interdependent infrastructure nal Processing, 20(3), 505–92.
systems, Annals of Operations Research, 203(1), 279–94. Kijewski, T. & Kareem, A. (2003), Wavelet transforms for
Crainic, T. G., Li, Y. & Toulouse, M. (2006), A first multilevel system identification in civil engineering, Computer-Aided
cooperative algorithm for capacitated multicommodity net- Civil and Infrastructure Engineering, 18(5), 339–55.
work design, Computers & Operations Research, 33(9), Koopman, B. O. & von Neumann, J. (1932), Dynamical sys-
2602–22. tems of continuous spectra, Proceedings of the National
Dantzig, G. B., Harvey, R. P., Lansdowne, Z. F., Robinson, Academy of Sciences of the United States of America, 18(3),
D. W. & Maier, S. F. (1979), Formulating and solving the 255–63.
network design problem by decomposition, Transportation Kutz, J. N., Fu, X., Brunton, S. L. & Erichson, N. B. (2015),
Research Part B: Methodological, 13(1), 5–17. Multi-resolution dynamic mode decomposition for fore-
Dueñas-Osorio, L., Craig, J. I., & Goodno, B. J. (2007), Seis- ground/background separation and object tracking, in 2015
mic response of critical interdependent networks, Earth- IEEE International Conference on Computer Vision Work-
quake Engineering & Structural Dynamics, 36(2), 285–306. shop (ICCVW), vol. 2016, IEEE, 921–29.
14 González et al.
Lee II, E. E., Mitchell, J. E. & Wallace, W. A. (2007), Restora- Sirca, G. & Adeli, H. (2012), System identification in struc-
tion of services in interdependent infrastructure systems: tural engineering, Scientia Iranica, 19(6), 1355–64.
a network flows approach, IEEE Transactions on Systems, Söderström, T. & Stoica, P. (1989), System Identification,
Man and Cybernetics, Part C (Applications and Reviews), Prentice-Hall, Upper Saddle River, NJ.
37(6), 1303–17. Song, J. & Ok, S.-Y. (2010), Multi-scale system reliability anal-
Lin, D.-Y. (2011), A dual variable approximation-based de- ysis of lifeline networks under earthquake hazards, Earth-
scent method for a bi-level continuous dynamic network quake Engineering & Structural Dynamics, 39, 259–79.
design problem, Computer-Aided Civil and Infrastructure Sootla, A., Mauroy, A. & Goncalves, J. (2016), Shaping Pulses
Engineering, 26(8), 581–94. to Control Bistable Monotone Systems Using Koopman Op-
Ljung, L. (1999), System Identification (2nd Ed.)—Theory for erator, in IFAC-PapersOnLine, 49(18), 698–703.
the User, Prentice Hall PTR, Upper Saddle River, NJ. Stengel, R. F. (1994), Optimal Control and Estimation, Dover,
McGhee, R. B. (1963), Identification of nonlinear dynamic New York.
systems by regression analysis methods, Ph.D. thesis, Uni- UNISDR (2015), Making Development Sustainable: The Fu-
versity of Southern Carolina. ture of Disaster Risk Management, Global Assessment Re-
Mauroy, A. & Mezic, I. (2013), A spectral operator-theoretic port on Disaster Risk Reduction.
framework for global stability, in 52nd IEEE Conference on U.S. Federal Emergency Management Agency (FEMA),
Decision and Control, no. 3, IEEE, 5234–39. (2011), National Disaster Recovery Framework, Technical
Mauroy, A., Rhoads, B., Moehlis, J. & Mezić, I. (2014), Global report, U.S. Department of Homeland Security.
isochrons and phase sensitivity of bursting neurons, SIAM Vespignani, A. (2010), Complex networks: the fragility of in-
Journal on Applied Dynamical Systems, 13(1), 306–38. terdependency, Nature, 464(7291), 984–5.
Mezić, I. (2005), Spectral properties of dynamical systems, Vugrin, E. D., Warren, D. E., Ehlen, M. A. & Camphouse,
model reduction and decompositions, Nonlinear Dynamics, R. C. (2010), A framework for assessing the resilience of
41(1–3), 309–25. infrastructure and economic systems, in Sustainable and
Nurre, S. G., Cavdaroglu, B., Mitchell, J. E., Sharkey, T. C. & Resilient Critical Infrastructure Systems: Simulation, Mod-
Wallace, W. A. (2012), Restoring infrastructure systems: an eling, and Intelligent Engineering, Springer Berlin Heidel-
integrated network design and scheduling (INDS) problem, berg, Germany, pp. 77–116.
European Journal of Operational Research, 223(3), 794–
806.
Ouyang, M. (2014), Review on modeling and simulation of in-
terdependent critical infrastructure systems, Reliability En- APPENDIX A: THE TIME-DEPENDENT
gineering & System Safety, 121, 43–60. INTERDEPENDENT NETWORK DESIGN
Ouyang, M. & Wang, Z. (2015), Resilience assessment of in- PROBLEM
terdependent infrastructure systems: with a focus on joint
restoration modeling and analysis, Reliability Engineering
Let us define the time-dependent Interdependent Net-
& System Safety, 141(September), 74–82.
Pant, R., Barker, K. & Zobel, C. W. (2013), Static and dy- work Design Problem (td-INDP) as the problem of
namic metrics of economic resilience for interdependent in- finding the least-cost time-dependent recovery strategy
frastructure and industry sectors, Reliability Engineering & of a partially destroyed system of infrastructure net-
System Safety, 125, 1–11. works, subject to budget, resources, and operational
Pedersen, M. B., Crainic, T. G. & Madsen, O. B. G. (2008),
Models and tabu search metaheuristics for service network constraints, while considering interdependencies be-
design with asset-balance requirements, Transportation Sci- tween the networks (González et al., 2016a, 2016b). Un-
ence, 43(2), 158–77. der such a definition, the reconstruction costs can in-
Poss, M. (2011), Models and algorithms for network design clude the costs of the resources used, labor costs, the
problems, Ph.D. thesis, Université Libre de Bruxelles.
Rinaldi, S. M., Peerenboom, J. P. & Kelly, T. K. (2001), Iden-
costs of preparing the geographical locations for the
tifying, understanding, and analyzing critical infrastructure reconstruction process (González et al., 2014a, 2016a,
interdependencies, IEEE Control Systems Magazine, 21(6), 2016b), and costs related to the system not being able to
11–25. perform adequately. Similarly, there are different types
Rowley, C. W., Mezić, I., Bagheri, S., Schlatter, P. & Henning- of interdependencies that the problem should be able
son, D. S. (2009), Spectral analysis of nonlinear flows, Jour-
nal of Fluid Mechanics, 641, 115–27. to consider, such as physical, cyber, geographical, and
Schmid, P. J. (2010), Dynamic mode decomposition of nu- logical (Rinaldi et al., 2001).
merical and experimental data, Journal of Fluid Mechanics,
656(4), 5–28.
Schmid, P. J., Li, L., Juniper, M. P. & Pust, O. (2011), Applica- A.1 Formulation
tions of the dynamic mode decomposition, Theoretical and
Computational Fluid Dynamics, 25(1–4), 249–259. The following td-INDP formulation (González et al.,
Shafieezadeh, A., Leelardcharoen, K. & Dueñas-Osorio, 2016a), uses as an input the information associated with
L. (2014), A framework for assessing the effectiveness a partially destroyed system of interconnected infras-
of resilience enhancement strategies for interdependent
infrastructure systems, in Safety, Reliability, Risk and
tructure networks (costs, capacities, damaged compo-
Life-Cycle Performance of Structures and Infrastructures, nents, resources, etc.), and returns the optimal recovery
CRC Press/Balkema, Leiden, The Netherlands, pp. 573– strategy (maximizing the performance and minimizing
80. recovery costs). Such recovery strategies become the
Efficient restoration using the recovery operator 15
data that will be used to generate the recovery opera- Decision variables
tor. The sets, parameters, and decision variables used in +
the td-INDP formulation are described as follows: δiklt Excess of supply of commodity l in node i in
network k at time t
Sets −
δiklt Unmet demand of commodity l in node i in net-
work k at time t
N Set of nodes before a destructive event
xi jklt Flow of commodity l through arc (i, j) in net-
A Set of arcs before a destructive event
work k at time t
T Set of periods for the recovery process (time hori-
wikt Binary variable that indicates if node i in net-
zon)
work k is functional at time t
S Set of geographical spaces (spatial distribution
yi jkt Binary variable that indicates if arc (i, j) in net-
of the area that contains the infrastructure
work k is functional at time t
networks)
wikt Binary variable that indicates if node i in net-
L Set of commodities flowing in the system
work k should be recovered at time t
R Set of limited resources to be used in the recon-
yi jkt Binary variable that indicates if arc (i, j) in net-
struction process
work k should be recovered at time t
K Set of infrastructure networks
z st Binary variable that indicates if space s has to
Nk∗ Set of nodes in network k ∈ K that require their
be prepared at time t
demands to be fully satisfied to be functional
Nk Set of nodes in network k ∈ K before a destructive Based on the previous description of the variables
event and parameters involved, the proposed model for the
Nk Set of destroyed nodes in network k ∈ K after the td-INDP is represented as follows:
event
Ak Set of arcs in network k ∈ K before a destructive minimize
event ⎛ ⎛
Ak Set of destroyed arcs in network k ∈ K after the
⎝ gst
z st + ⎝ f i jkt
yi jkt
event
t∈T |t>0 s∈S k∈K (i, j)∈Ak
Lk Set of commodities flowing in network k ∈ K
⎞⎞ ⎛
Parameters + qikt
wikt ⎠⎠ + ⎝ + +
Miklt δiklt
i∈Nk t∈T k∈K l∈Lk i∈Nk
vr t Availability of resource r at time t ⎞
h i jkr t Usage of resource r related to recovering arc (i, j)
in network k at time t − −
+ Miklt δiklt + ci jklt xi jklt ⎠ (A1)
pikrt Usage of resource r related to recovering node i in l∈Lk (i, j)∈Ak
network k at time t
+
Miklt Costs of excess of supply of commodity l in node i subject to
in network k at time t + −
− xijklt − xjiklt = biklt − δiklt + δiklt
Miklt Costs of unsatisfied demand of commodity l in j:(i, j)∈Ak j:( j,i)∈Ak (A2)
node i in network k at time t ∀k ∈ K, ∀i ∈ Nk , ∀l ∈ Lk , ∀t ∈ T
αi jkst Indicates if repairing arc (i, j) in network k at time
t requires preparing space s
xi jklt ≤ u i jkt yi jkt , ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T (A3)
βikst Indicates if repairing node i in network k at time t
l∈Lk
requires preparing space s
γi jk k̃t Indicates if at time t node i in network k depends xi jklt ≤ u i jkt wikt , ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T (A4)
on node j in network k̃ ∈ K l∈Lk
gst Cost of preparing geographical space s at time t
f i jkt Cost of recovering arc (i, j) in network k at time t xi jklt ≤ u i jkt w jkt , ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T (A5)
qikt Cost of recovering node i in network k at time t l∈Lk
ci jklt Commodity l unitary flow cost through arc (i, j) in
−
network k at time t wikt |biklt | ≤ |biklt |−δiklt , ∀k ∈ K, ∀i ∈ Nk∗ , ∀l ∈ Lk , ∀t ∈ T (A6)
u i jkt Total flow capacity of arc (i, j) in network k at time
t wikt γi jk k̃t ≥ w j k̃t , ∀k, k̃ ∈ K, ∀ j ∈ Nk̃ , ∀t ∈ T (A7)
biklt Demand/supply of commodity l in node i in net- i∈Nk
work k at time t
16 González et al.
wik0 = 0, ∀k ∈ K, ∀i ∈ Nk (A8) Finally, the fifth represents the cost associated with
the flow of commodities through each network. This
objective function assumes that each term involved is
yi jk0 = 0, ∀k ∈ K, ∀(i, j) ∈ Ak (A9) quantified in similar units (such as monetary units),
thus having a similar weight on the recovery process.
t Nevertheless, the objective function can be easily gen-
wikt ≤
wik t˜ , ∀k ∈ K, ∀i ∈ Nk , ∀t ∈ T | t > 0 (A10) eralized such that it can include different weights for
˜
t=1 each term, by adding a weight/importance coefficient
t associated with each of them, effectively accounting
yi jkt ≤
yi jk t˜ , ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T | t > 0 (A11) for the possible heterogeneity of each type of cost.
˜
t=1 Constraints (A2) enforce adequate flow balance of
commodities for each node, relating the total amount
of commodities entering and leaving the node with
h i jkr t
yi jkt + pikrt
wikt ≤ vr t , its respective demands. Constraints (A3), (A4), and
k∈K (i, j)∈Ak i∈Nk (A12)
(A5) relate the functionality of each link, its starting
∀r ∈ R, ∀t ∈ T | t > 0 and ending nodes, respectively, with the amount of
commodities that could flow through it. Note that, on
wikt αikst ≤
z st , ∀k ∈ K, ∀i ∈ Nk , ∀s ∈ S, ∀t ∈ T | t > 0 (A13) one hand, these serve as capacity constraints that limit
the flow capacities when the corresponding nodes and
yi jkt βi jkst ≤
z st , ∀k ∈ K, ∀(i, j) ∈ Ak , arc are functional. On the other hand, when an arc or
(A14) a node is not functioning (y or w binary variables are
∀s ∈ S, ∀t ∈ T | t > 0
0), the corresponding flows (variable x) are forced to
+
δiklt ≥ 0, ∀k ∈ K, ∀i ∈ Nk , ∀l ∈ Lk , ∀t ∈ T (A15) be 0 as well. Constraints (A6) ensure that nodes in Nk∗
are functional only if their demands are fully satisfied.
Constraints (A7) guarantee that nodes need to be func-
−
δiklt ≥ 0, ∀k ∈ K, ∀i ∈ Nk , ∀l ∈ Lk , ∀t ∈ T (A16) tional for their dependent nodes to become functional
as well. Constraints (A8) and (A9) enforce that initially
damaged nodes and arcs, respectively, are initially not
xi jklt ≥ 0, ∀k ∈ K, ∀(i, j) ∈ Ak , ∀l ∈ Lk , ∀t ∈ T (A17)
functional either. Constraints (A10) and (A11) ensure
that initially damaged nodes and arcs, respectively, can
wikt ∈ {0, 1}, ∀k ∈ K, ∀i ∈ Nk , ∀t ∈ T (A18) become functional only after they have been recovered.
Note that if an initially damaged element has not
been recovered by period t, the cumulative sum of
yi jkt ∈ {0, 1}, ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T (A19) the respective recovery decision variable (
w or
y)
will be 0, thus forcing the functionality variable (w or
y) to be 0 as well. Constraints (A12) ensure that for
yi jkt ∈ {0, 1}, ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T | t > 0 (A21) (A13) and (A14) guarantee that if a node or an arc,
respectively, need to be repaired, the geographical
spaces that accommodate them need to be prepared. In
z st ∈ {0, 1}, ∀s ∈ S, ∀t ∈ T | t > 0 (A22) this case, if for a given element the recovery variable
(
w or
y) is 1 at a period t, indicating that such an
Equation (A1) details the five different costs that element should be recovered at that period, then the
constitute the objective function. The first is the total geographical preparation variable (
z) is forced to be 1
cost of preparing the required geographical spaces for for all associated spaces, thus indicating that these need
the recovery of nodes and arcs—related to perforation to be prepared. Last, constraints (A15)–(A22) show the
and excavations processes, constructing foundations, nature of each decision variable, indicating if they are
etc. The second and third costs are associated with the continuous nonnegative or binary. For further details
individual reconstruction of arcs and nodes, respec- regarding the assumptions and other properties of the
tively. The fourth is the cost caused by having excess or td-INDP, refer to González et al. (2016a, 2016b).
deficit of commodities to properly satisfy the demands.