Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Computer-Aided Civil and Infrastructure Engineering 00 (2017) 1–16

Efficient Infrastructure Restoration Strategies Using


the Recovery Operator
Andrés D. González
Department of Civil & Environmental Engineering, Rice University, Houston, TX, USA and Department of Civil &
Environmental Engineering, Department of Industrial Engineering, Universidad de los Andes, Bogotá, Colombia

Airlie Chapman
Department of Mechanical Engineering, University of Melbourne, Melbourne, VIC, Australia

Leonardo Dueñas-Osorio*
Department of Civil & Environmental Engineering, Rice University, Houston, TX, USA

Mehran Mesbahi
William E. Boeing Department of Aeronautics and Astronautics, University of Washington, Seattle, WA, USA

&

Raissa M. D’Souza
Complexity Sciences Center, Department of Mechanical and Aerospace Engineering, and Department of Computer
Science, University of California, Davis, CA, USA and Santa Fe Institute, Santa Fe, NM 87501, USA

Abstract: Infrastructure systems are critical for soci- time-dependent recovery model of a system of interde-
ety’s resilience, government operation, and overall de- pendent networks. The form of the operator is assumed
fense. Thereby, it is imperative to develop informative to be a time-invariant linear dynamic model apt for infra-
and computationally efficient analysis methods for in- structure restoration. The recovery operator is generated
frastructure systems, which reveal system vulnerabili- by applying system identification techniques to numerous
ties and recoverability. To capture practical constraints disaster and recovery scenarios. The proposed compact
in systems analyses, various layers of complexity play representation provides simple yet powerful information
a role, including limited element capacities, restoration regarding systemic recovery dynamics, and enables gen-
resources, and the presence of interdependence among erating fast suboptimal recovery policies in time-critical
systems. High-fidelity modeling such as mixed integer applications.
programming and physics-based modeling can often be
computationally expensive, making time-sensitive analy-
ses challenging. Furthermore, the complexity of recovery 1 INTRODUCTION
solutions can reduce analysis transparency. An alterna-
tive, presented in this work, is a reduced-order repre- Proper operation of critical infrastructure networks is
sentation, dubbed a recovery operator, of a high-fidelity vital to our society’s well-being, as well as governance
∗ Towhom correspondence should be addressed. E-mail: leonardo. and safety. On the other hand, abnormal operation of
duenas-osorio@rice.edu. such systems generates health and security issues, as


C 2017 Computer-Aided Civil and Infrastructure Engineering.

DOI: 10.1111/mice.12314
2 González et al.

well as considerable economic loss. The current an- The second deals with system identification and linear
nual economic losses associated with adverse natural time-invariant representations of nonlinear dynamics.
events such as earthquakes, landslides, cyclones, and
floods, average between US$250 billion and US$300
1.1 Literature review on the Network Design Problem
billion, and by 2030 they are expected to increase up
(NDP) and optimization techniques applicable
to US$415 billion (UNISDR, 2015). Thus, individu-
to interdependent infrastructure systems
als, communities, governments, and other stakehold-
ers must work toward a “prospective,” “corrective,” The NDP consists of identifying the subgraph and flow
and “compensatory” management of risk, which is par- configuration that satisfy a set of demands at minimum
ticularly amplified by the existing interdependencies cost, for a given graph or network (Ahuja et al., 1993;
between different utilities and infrastructure systems Gendron et al., 1999). Johnson et al. (1978) presented
(UNISDR, 2015). a general formulation of the NDP, and proved its NP-
Considering the importance of interdependencies in completeness. Later, Dantzig et al. (1979) showed how
infrastructure performance and resilience, despite be- the structure of the NDP can be used to develop a de-
ing a relatively novel subject of study, the field has composition technique to enhance its speed and size
gained significant interest. Most of the early works on capabilities. For instances when the focus is only on
this subject focused on acknowledging and categoriz- finding optimal flows, Assad (1978) highlighted the
ing interconnectedness and interdependencies in sys- advantages of decomposition techniques for problems
tems of infrastructure networks (Rinaldi et al., 2001). considering multiple commodities. Similarly, Kenning-
Subsequently, some studies focused on the vulnerabil- ton (1978) presented a survey of linear cost multi-
ity of interdependent networks (Buldyrev et al., 2010; commodity network flows problems, emphasizing how
Vespignani, 2010; Gao et al., 2011; Hernandez-Fajardo realistic problems such as routing, assignment, urban
and Dueñas-Osorio, 2013) and later, on reducing that transportation planning, and communication, among
vulnerability (Brummitt et al., 2012). Also, some studies others, can be represented and studied using linear
started quantifying the recoverability and resilience of constraints. Even though these works acknowledge
these interdependent networked systems (Vugrin et al., that some problems require nonlinear models for their
2010; Pant et al., 2013; Ouyang, 2014; Shafieezadeh parametrization, they emphasize that linear structures
et al., 2014; Baroud et al., 2015; Ouyang and Wang, are more generalizable and easily adapted to many re-
2015), as well as developing recovery strategies for alistic network systems. Given that the NDP allows for a
such systems (Lee et al., 2007; Cavdaroglu et al., 2011; general and flexible description of networks under real-
González et al., 2016b). Nevertheless, these papers em- istic constraints, the NDP and its derivatives are widely
phasize the complexity associated with generating re- used in areas such as urban transportation, production
covery strategies and the difficulty of doing so via com- planning, and scheduling, among others (Frangioni and
putationally efficient algorithms, thus the importance of Gendron, 2009; Pedersen et al., 2008; Crainic et al.,
developing new tools. 2006; Fortz and Poss, 2009; Poss, 2011; Lin, 2011). Con-
In this article, we propose a new methodology to effi- sidering the versatility shown by the NDP-like model-
ciently develop recovery strategies for a damaged sys- ing, Lee et al. (2007) developed a network-flows-based
tem of infrastructure networks, using system identifi- approach to model multiple interdependent systems,
cation techniques. The proposed approach uses known and recover them after a damaging event. Nevertheless,
recovery strategies associated with a set of different Lee et al. (2007) emphasized the high complexity of the
disaster scenarios—which may come from computer- developed optimization model, and proposed a heuris-
generated or historical data—and applies system iden- tic approach to allow solving it when computational
tification tools to extract the main recovery dynamics power is limited. Later, Cavdaroglu et al. (2011) pre-
as a linear operator. This operator, defined as the re- sented another NDP-like Mixed-Integer formulation to
covery operator, in addition to containing relevant in- determine both the recovery strategy and the associated
formation about the recovery dynamics of the system, job scheduling for a damaged system of interdependent
can be used to efficiently generate recovery strategies networks, but considering its complexity, proposed a
associated with any given damage scenario. Before de- partitioning heuristic approach. Exploiting the analyti-
tailing the new approach to deal with infrastructure re- cal structure of the problem, González et al. (2016a, b)
covery, we discuss in the following subsections two re- proposed optimization models that extended the NDP
lated fields of study that underpin this work. The first is to optimize the recovery process of a damaged sys-
associated with designing (or restoring) networked sys- tem of networks with physical, logical, and geographi-
tems, particularly in relation to approaches that rely on cal interdependencies, revealing the high computational
network flows and mixed-integer programming (MIP). cost associated with determining a guaranteed optimal
Efficient restoration using the recovery operator 3

time-dependent recovery strategy. Even though NDP- System identification algorithms are typically applied
based models have proved useful to model and opti- to output data which is generated by experimental
mize the recovery process of a system of infrastructure processes, but these can also be exercised on high-
networks, they may not be ideal for time-critical ap- fidelity simulations to disseminate high-level features
plications due to their high computational complexity. from the system. This novel application has become
Nevertheless, these models can be used to study proto- increasingly popular in the analysis of simulated fluid
typical disaster scenarios to identify critical properties flow that is governed by nonlinear partial differential
of the system dynamics. This information is key to study equations. Sequential time-series fluid simulation data,
efficient approaches that allow identifying the main dy- in the form of a “snapshot” sequence {φ0 , . . . , φT }, are
namics associated with the recovery process described approximated as linear time-invariant dynamics φt+1 =
by NDP-like models. Aφt with an unknown linear operator A. The process
of recovering the eigenvectors and eigenvalues of op-
erator A is referred to as dynamic mode decomposi-
1.2 Literature review on the system identification and
tion (DMD) (Schmid, 2010). DMD has shown to extract
finite linear representations of nonlinear dynamics
essential features of the underlying dynamics, reliably
System identification techniques have widespread use in approximating models with low complexity (Rowley
multiple fields, such as physics, biology, and engineer- et al., 2009; Schmid et al., 2011). Rowley et al. (2009)
ing. Such techniques have been embraced in civil and connected the efficacy of DMD to its grounding in
structural engineering for the identification of structural Koopman operator theory. The Koopman operator is
parameters, structural health monitoring, and structural an infinite dimensional linear operator which captures
response (Kijewski and Kareem, 2003; Jiang and Adeli, the full information of nonlinear systems (Koopman
2005; Beskhyroun et al., 2011; Sirca and Adeli, 2012), and von Neumann, 1932). DMD is a finite-dimensional
but to our knowledge they have not been used to iden- approximation of Koopman operator theory over a
tify the main recovery dynamics of systems of interde- special set of observables (Mezić, 2005). In addition
pendent networks, such as infrastructure systems. The to its success in fluid dynamics, linear operator the-
general area of system identification endeavors to form ory has also been applied to bursting neuron mod-
dynamic models of a process from system output data els (Mauroy et al., 2014), large-scale power systems
alone—in this article, the dynamics stem from interde- (Barocio et al., 2015), and multiresolution analysis
pendent system restoration. The system identification of video streams (Kutz et al., 2015). Given such ap-
process varies depending on the assumptions placed plications to complex systems, it is surmised to be
on the dynamic model. On one hand, there is grey applicable to restoration processes of infrastructure
box modeling, which assumes a basic physical model- systems.
ing based on preceding understanding of the system, If the fundamental features of the dynamics can be
and uses data to perform fitting on specific parameters represented via a linear operator, then numerous de-
of the model. On the other hand, there is black box sirable directions follow. From a computational stand-
modeling, which has access to limited knowledge of the point, evolving a linear time-invariant system φt+1 =
studied system and assumes no prior model is available, Aφt is preferable over a nonlinear system. Also, using
thus leveraging heavily on the available data. Black box approximative linear operators enables the application
modeling usually relies on input–output information of linear systems algorithms and theory to nonlinear
of the studied system, to infer the associated dynam- systems. Applying linear stability analysis to establish
ics involved—thus, we will use this modeling approach, global stability is one example (Mauroy and Mezic,
considering its general applicability. McGhee (1963) 2013). Sootla et al. (2016) leverage the Koopman oper-
categorized these approaches as parametric space mod- ator in the design of temporal pulse control of bistable
eling, including differential equations of predetermined monotone systems. Brunton et al. (2016) demonstrated
form and order, along with state models, and nonpara- the potential use of these operators to design optimal
metric or function space modeling, for example, impulse control laws for fully nonlinear systems using tech-
response, covariance function, spectral densities, and niques from linear optimal control. In this venue, lin-
Volterra series. Comprehensive survey papers on the ear operator theory has the potential to open the ap-
topic have been written by Åström and Eykhoff (1971) plication of many techniques from the rich field of
and Kerschen et al. (2006). For further reading, see the linear controller design (Anderson and Moore, 1990;
books by Ljung (1999), Söderström and Stoica (1989), Stengel, 1994), thus hinting its applicability to modeling
and the International Federation of Automatic Control the dynamics associated with subjects such as the effi-
symposia series on system identification which has been cient recovery of systems of interdependent infrastruc-
ongoing since 1967. ture networks.
4 González et al.

1.3 Article structure nected networks. The proposed system ID framework


uses failure/recovery input/output “snap-shot” data to
This article is organized as follows: Section 2 details the
divulge key features of the system and its approxi-
use of system identification techniques to approximate
mate recovery dynamics, and provides tools to analyze
optimal restoration dynamics. For this purpose, we pro-
and generate good recovery strategies in an efficient
pose the construction of a linear time-invariant opera-
manner.
tor defined as the recovery operator, and we show how
to use it to efficiently construct recovery strategies for
any given disaster scenario. Section 3 applies the pro- 2.1 Time-invariant recovery operator Â
posed techniques to study the recovery dynamics of a
realistic case study: the recovery process of the water, Assume there is a set of elements E for which we want
gas, and power networks in Shelby County, TN, United to study and model their failure and recovery dynam-
States, due to earthquakes in the New Madrid Seismic ics. Without loss of generality, since the system of in-
Zone (NSMZ). Using this illustrative example we show- frastructure networks is being modeled using graphs,
case some of the capabilities of the recovery operator, the set of elements may refer to the nodes in the sys-
and the recovery strategies generated with it. Then, Sec- tem (i.e., E = N ), the arcs (i.e., E = A), or both (i.e.,
tion 4 presents relevant conclusions and ideas for future E = N ∪ A). Now, define φ(t) as the vector that de-
research. Finally, Appendix A provides details of the scribes the damage state information for all elements
high-fidelity MIP model, defined as the time-dependent e ∈ E at time t. Each entry φe (t) of such a vector is either
Interdependent Network Design Problem (td-INDP) 1 if the element e is damaged at time t, or 0 otherwise.
(González et al., 2016a, 2016b), which was used to cre- Let us also assume that given a disaster scenario at
ate “snapshots” of the recovery process that served as a time t (where the damage state of each element in
training data to generate the recovery operator. the system is known), there is an optimal recovery pro-
cess. Then, mirroring field conditions, such a recovery
process could be seen as a process where the optimal
recovery jobs (and by extension the damage states) for
2 SYSTEM IDENTIFICATION TECHNIQUES time t + 1 could be determined based only on the dam-
APPLIED TO INFRASTRUCTURE RECOVERY age states at time t. Then, there exists a mapping f such
that:
Providing good recovery strategies for a given net-
worked system is a complex task. In particular, using φ(t + 1) = f (φ(t)) (1)
time-dependent optimization models to determine ef- Such a mapping would imply a fully deterministic sys-
ficient strategies (such as the MIP models proposed by tem, where any given action, under the same conditions,
Lee et al. (2007); Cavdaroglu et al. (2011); Nurre et al. would always result in a fixed outcome. What we pro-
(2012), or the one presented in Appendix A), may be pose in this article is approximating f (φ(t)) with a time-
computationally expensive, and for scenarios in which it invariant operator Â, such that
is necessary to obtain results in real time, they may not
be suitable. One option to overcome such a problem is φ(t + 1) ≈ Âφ(t) (2)
to precalculate prototypical disaster configurations and
The operator  is selected to minimize the approxi-
their respective recovery strategies, to identify and as-
mation error over all time periods, namely,
sess the associated risks, vulnerabilities, and challenges,
and to develop predisaster recovery plans (U.S. Federal  = arg min 0 − A1  (3)
A∈R|E|×|E|
Emergency Management Agency (FEMA), 2011). Un-
fortunately, given the large number of feasible disaster where (0 , 1 ) is the input–output history pair
configurations, creating and maintaining plans for every
possible disaster also becomes a prohibitive task. Thus, 0 = [φ(0), φ(1), . . ., φ(|T | − 1)] (4)
an alternative option introduced in this article is to cre-
ate a system identification (system ID) framework that
would take families of prototypical failure scenarios and 1 = [φ(1), φ(2), . . ., φ(|T |)] (5)
their respective optimal recovery strategies as the in-
put/output data to be studied, that later can be used to This operator is associated with a given disaster sce-
generate tailor-made recovery strategies. In particular, nario. To construct an analog operator for a set of n dis-
we propose constructing a linear operator, following a aster scenarios, we can construct  ˜ 0 and 
˜ 1 as
truncated Koopman operator approach, to approximate  1 2 
the recovery dynamics observed in a system of intercon- ˜ 0 = 0 , 0 , . . ., n0 (6)
Efficient restoration using the recovery operator 5

 

˜ 1 = 11 , 21 , . . ., n1 (7) individual recovery times are weighted identically. The
method could be expanded to consider prior informa-
where (i0 , i1 ) is the input–output pair of disaster sce- tion about the relative importance of each element or
nario i. each time period modeled. Assuming there are positive
Then, it can be seen that in this case diagonal matrices W E and WT that describe the relative
 = arg min 
˜ 1 − A
˜ 0 (8) importance (weights) associated with the studied ele-
A∈R|E|×|E|
ments and recovery periods, respectively, the general
Assuming that the norm used in (8) to quantify the optimization problem to construct the recovery opera-
error is the commonly used square root of the sum of tor would then be
the squares of each entry (also known as the Frobenius
norm), and that the set of damage states studied can  = arg min W E (
˜ 1 − A
˜ 0 )WT . (10)
A∈R|E|×|E|
produce a set of |E| linearly independent vectors, then
the optimization problem associated with finding  is The more important a given element (or period) is,
known, and the minimizer of this problem assumes the the higher its respective values in W E (or WT ), thus re-
closed form sulting in a larger penalization for its errors.
 
 = ˜ 1
˜ 0T  ˜ 0T −1
˜ 0 (9)
2.2 Efficient generation of recovery strategies
where  ˜ 1
˜ 0T denotes the one-period temporal cross-
correlation, and ( ˜ 0T )−1 is associated with the auto-
˜ 0 The simplicity of the linear dynamics (2) provides a
correlation of the damage states. Note that the gen- computationally efficient method to generate approxi-
eration of the proposed recovery operator is highly mate recovery strategies given a set of initial damage
efficient, and can handle large-scale systems, because it conditions.
is based on least-squares optimization and linear oper- Assume that for a given time t, there is a known
ations. Thus, in general, the main source of computa- damage state φ(t), and we want to generate a recovery
tional complexity of the proposed method comes from strategy starting from it along with the damage states
assembling the input set of benchmark damage scenar- associated with such strategy, namely, {φ̆(t), φ̆(t +
ios (and their respective recovery strategies), which can 1), ..., φ̆(|T |)}, with φ̆(t) = φ(t). Assuming that  has al-
be done well before the occurrence of the damaging ready been calculated (which in practice can be done
event. Also note that the set of damage states should in- during non-time-critical periods), then we know that for
clude damage and recovery information of all elements the period t + 1 the approximate damage state can be
to obtain nonsingular solutions. We propose using the calculated by Âφ̆(t). As the approximate dynamics are
Frobenius norm to penalize large deviations more, since continuous, then Âφ̆(t) will require a projection step
later on, when using the operator to generate recovery to describe a binary damage state. Thus, we can de-
strategies, large deviations would result in proposed re- fine a threshold value 0 < ā < 1, that will determine
covery times too far from the optimal, which would re- the ranges in which a noninteger damage state will be
duce the quality of the overall recovery strategies. Nev- rounded to a binary state. Then, the damage state for
ertheless, note that the reader is free to select the type period t + 1 would be
of norm to penalize deviations, but Equation (9) would φ̆(t + 1) = ( Âφ̆(t) − 1ā) (11)
not return the optimal Â, and other optimization meth-
ods would be needed. Generalizing for any positive integer of m periods in
The operator  can be viewed as a matrix of dimen- the future, we have that
sions |E| × |E| composed of real values. In general, each
φ̆(t + m) = ( Âm φ̆(t) − 1ā) (12)
position Âî ĵ indicates the influence that the damage
state of element î at any given time t has over the dam- The proposed method uses the recovery operator to
age state of element ĵ at time t + 1. This operator con- replicate the recovery dynamics from the generating
tains important information about the recovery dynam- data, without enforcing any constraint on the predicted
ics of the system. In particular, diverse relevant analyses recovery strategy. If there are constraints that need to
could be performed using the recovery operator, such as be enforced, such as a strict maximum resource utiliza-
finding the recovery modes of the system and their rates tion per recovery period, it is possible to use the recov-
of convergence via DMD, based on the eigendecompo- ery operator to formulate a general iterative approach
sition of Â. as follows:
Note that the proposed method to construct the re- Assume that our current iteration starts at period t
covery operator assumes that each individual element and its related initial damage state is φ̆(t). Then, Âφ̆(t)
has the same relative importance, thus errors in their can be interpreted as the relative ranking or importance
6 González et al.

of recovering each node during period t. In particular, covery strategies. If this cumulative function describes
this ranking is associated with the order in which the different behaviors for the two strategies, this would in-
elements should be recovered such that the proposed dicate that the performance recovery, the resource uti-
recovery fits better the behavior described by the in- lization, and the costs associated with each strategy are
put recovery strategies. Thus, this ranking could be used inconsistent.
to indicate the set of elements in which the resources Whenever there are inconsistencies in the predicted
should be used first (while ensuring that all desired con- times of recovery or the cumulative percentage of re-
straints are satisfied). For example, if there is a strict paired elements, it is important to evaluate the impact
maximum resource utilization, one could select the set of these inconsistencies on the quality of the predicted
of elements with higher importance and an associated recovery strategy. To estimate the impact of these
total resource utilization less than the maximum al- recovery time deviations in an efficient manner, we
lowed for that period. Then, considering the elements could construct an optimization model to both evalu-
selected to be recovered at time t, calculate φ̆(t + 1), up- ate the performance of a given recovery strategy, and
date the vector of relative importances (now Âφ̆(t + 1)), detect any infeasibility associated with it, by modify-
and repeat. ing the high-fidelity optimization model originally used
Note that in the case of a recovery process, the spec- to determine the benchmark optimal recovery strate-
tral radius of the operator (denoted as ρ(A)) is expected gies (González et al., 2016a). Assume that such high-
to be strictly less than one, to guarantee that when us- fidelity model is defined based on two arrays of vari-
ing any disaster configuration as the initial damage state ables, X and Y , where the first indicates in which period
φ̆(0), the damage states of the system will converge to a each element should be recovered (i.e., the recovery
full recovery as t increases (since limm→∞ Am = 0 if and strategy), and the second encompasses all remaining op-
only if ρ(A) < 1). erational variables, such as flow of commodities, un-
dersupply, etc. Thus, without loss of generality, assume
that the high-fidelity optimization model can be written
2.3 Measuring the quality of the generated recovery
as min X,Y {F(X, Y ) : C(X, Y ) ≥ 0}, where F(X, Y ) is the
strategies
objective function (such as recovery cost, total recov-
To use the strategies that are generated using the re- ery time, etc.) to be minimized, and C(X, Y ) represents
covery operator, it is important to quantify their qual- the set of constraints that determine which solutions are
ity. In general, it is desirable that the recovery operator feasible. Now, let χ be a fixed recovery strategy gen-
strategies resemble as close as possible strategies con- erated using the recovery operator (in which case χ at
sidered to be optimal. Using the strategies generated by period t would be described by φ̆(t − 1) − φ̆(t)). Then,
a high-fidelity optimization model as a benchmark, it is the modified optimization problem
possible to evaluate how much the recovery times de-
min F(χ , Y ) (13)
viate from one strategy to the other. In particular, the Y
ideal is that the recovery times proposed for each indi-
vidual component by the recovery operator approach
s.t. C(χ , Y ) ≥ 0 (14)
deviate as little as possible compared to the optimal
strategy.
In some instances, however, focusing only on com- could be used to evaluate the performance and feasi-
paring the proposed approximate recovery sequences bility of strategy χ . In particular, Equation (13) could
with the optimal ones may not be enough. In particu- be used to evaluate if there is a performance detri-
lar, even though the recovery times of an approximate ment, whereas inequalities (14) would determine if the
recovery strategy may deviate little compared to the op- predicted strategies are not feasible, indicating the ex-
timal one, the resultant performance recovery and costs act periods and elements associated with such an in-
associated with implementing them may differ greatly. feasibility. In general, the optimization problem de-
Moreover, the approximate recovery strategy may be scribed by Equations (13) and (14) will be more efficient
an unfeasible one. In particular, if the elements of the than the original high-fidelity optimization problem,
studied system are highly interdependent, or if the avail- since its number of decision variables is highly reduced.
able resources are very limited, the feasibility of the so- For example, the optimization problem proposed in
lutions will be sensitive to changes in the recovery times Appendix A (used to find the optimal recovery strategy)
of each element. Thus, in addition to studying the er- is NP-hard, but its modified version (used to evaluate
rors in the estimated recovery times, it is also important given recovery strategies) can be solved in polynomial
to compare the cumulative percentage of repaired ele- time (if partial functionality is allowed) (González et al.,
ments associated with the estimated and benchmark re- 2016a).
Efficient restoration using the recovery operator 7

3 ILLUSTRATIVE EXAMPLE—SHELBY Water distribution stations


COUNTY, TN Water pipelines
Water service areas
km
To illustrate some of the capabilities of the pro- 024 8
posed recovery operator when studying multiple inter-
39
dependent infrastructure networks and designing re-
covery strategies for them simultaneously, this case
study examines the power, water, and gas networks
in Shelby County, TN, United States. The site in- (a) Water network
cludes the city of Memphis, and is known to be Power stations
in the area of influence of the NMSZ. These test Power transmission lines
networks were adapted from Hernandez-Fajardo and ff

Power tributary areas


Dueñas-Osorio (2013), Dueñas-Osorio et al. (2007), 024 8
km

and Song and Ok (2010). Note that the proposed 45


method could be used for a broad range of systems be-
yond those previously mentioned, such as transporta-
tion systems and telecommunications, among others.
Figure 1 shows the gas, water, and power networks, as (b) Power network
well as the intersection areas that constitute the set S.
In this illustrative example, we modeled two types Gas distribution stations
Gas pipelines
of interdependencies, the physical interdependence be-
Gas service areas
tween the power network and the gas and water net- km
024 8
works, and the geographical interdependence between
the gas and the water networks. The first is of relevance
5
given that pumping stations require sufficient power
supply to work adequately, whereas power stations re-
quire water for cooling down purposes. The second is (c) Gas network
associated with the geographical colocation between the
Water distribution stations
gas and water networks, which enables potential reduc-
Gas distribution stations
tions in the geographical preparation costs by schedul- Water pipelines
ing simultaneous repair jobs of components from each Gas pipelines
km
network that share the same corridors. Subareas 024 8

For this case study, we used randomly generated dis-


39
aster realizations consistent with earthquakes of magni- 5
tudes Mw ∈ {6, 7, 8, 9} and epicenter at the 35.3◦ N and 11
90.3◦ W site. We simulated 1,000 damage realizations as-
(d) Superposition of the gas and water net-
sociated with each magnitude, and used a high-fidelity
works
MIP model to optimize each of their recovery strate-
gies. In general, the proposed recovery operator is con- Fig. 1. Critical infrastructure networks in Shelby County, TN
structed such that it can be applied to diverse initial dis- (adapted from González et al., 2014b).
aster scenarios, making the presented methodology not
depend directly on the causes of failure or their likeli- recovery strategies, denominated the td-INDP, is de-
hood. Nevertheless, the quality of the obtained recov- tailed in Appendix A (each MIP instance was solved us-
ery operator will depend on how accurate and realistic ing Xpress-MP, in a PC with Windows 7 64-bit OS, 32
the input disaster realizations are. In this study, the au- GB of RAM, and a processor Intel Core i7 4770 CPU
thors assume hazard propagation curves that relate each @3.40 GHz). The available resources—modeled using
magnitude with PGA and PGV values in space. With Equation (A12)—were set such that a maximum of six
these seismic hazard models, and the subsequent use elements could be recovered per period (thus, at least
of fragility curves associated with each element in the a node and an arc from each network could be recov-
system of systems (from HAZUS), we obtain the prob- ered during each period), allowing the resultant recov-
abilities of failure that are then used to randomly gener- ery process to better showcase the effects of interdepen-
ate the initial damage states. For further details regard- dencies. For each disaster realization studied, whenever
ing the disaster scenarios used, please refer to González the optimizer had spent more than 120 seconds solving
et al. (2016b). The MIP model used to optimize the the td-INDP, the optimizer was set to return the best
8 González et al.

0.07 nontrivial stronger effects. To select the minimum value


to display, first we took all the entries in  (except
20 for the diagonal) and sorted their absolute values (in
Water

0.06
increasing order). Then, we calculated the knee (point
40 of maximum curvature) of the curve associated with this
0.05
list. Since this point indicates the value for which the
Gas

60 rate of growth in the list changes the most, we used it


0.04
as the minimum to display. In particular, this value was
80
0.011 for Figure 2. This recovery operator uses E = N ,
0.03 thus it is showing the relation between the damage
Power

states of all pairs of nodes, with |N | = 125. By drawing


100
0.02 horizontal and vertical lines to separate the nodes
in each axis into the three infrastructure networks
120
studied, we obtain nine different sections that depict
20 40 60 80 100 120 the intra- and internetwork recovery dependencies.
Water Gas Power
For simplicity, let us name each block as Âk k̃ : k, k̃ ∈ K,
which shows the strength in which the damage state of
Fig. 2. Representation of the recovery operator Â
considering nodes only. Matrix entries with absolute value
nodes in network k̃ affects the states of network k. The
below 0.011 are not displayed. The rows and columns diagonal blocks (i.e., Âkk : k ∈ K) depict the strength
correspond to the assigned labels for each element. in which the current damage state of the nodes in each
given network influences the recovery of the nodes
of the same network, whereas the off-diagonal blocks
recovery strategy found and its respective optimality (i.e., Âk k̃ : k, k̃ ∈ K|k = k̃) depict how the state of the
gap (to give analytical guarantees of the quality of the nodes in each network impacts the recovery of the other
returned solution). Each individual optimality gap was networks. Since each row and column of the recov-
calculated by comparing the objective functions associ- ery operator corresponds to a specific element in each
ated with the best recovery strategy found and solutions network, the structure and values exhibited by the oper-
of constrained linear relaxations of the problem. The av- ator can provide valuable insights about the properties
erage optimality gaps were 0%, 0%, 1.8%, and 18.8%, of the system of systems. For example, as expected,
for earthquake magnitudes 6, 7, 8, and 9, respectively. Figure 2 shows that the damage states of the nodes
To showcase the generality and versatility of the pro- in each network have a strong influence within their
posed methodologies, the following subsections present network, but also that some networks have a strong
two different cases, associated with identifying and ap- influence on the recovery of the others. In particular,
proximating the recovery dynamics of the nodes only, it can be seen that Âwater, gas and Âpower, gas are dense
and of both nodes and arcs. compared to the other blocks, showing that the states
of the gas nodes have a notable influence over the other
networks. This can also be interpreted as a priority to
3.1 Recovery operator for nodes
repair the nodes in the gas network before recovering
Figure 2 represents the recovery operator  found as the nodes of other networks—consistent with the
proposed in Section 2, based on the full set of randomly td-INDP training data, which does not include safety
generated disaster scenarios and their respective td- constraints. Such trends can be explained considering
INDP recovery strategies. Each entry Âeẽ (value of  the relative topologies of each network, since the
at row e and column ẽ) shows the strength in which studied gas network has fewer elements and much less
the damage state of element ẽ at any given time period redundancies than the other networks, which forces ini-
influences the damage state of element e in the next tial repairs in the gas networks to have a larger influence
period. The coefficient of determination associated on the overall performance of the system of networks
+ −
with  was R 2 = 0.7729, and its root-mean-square (assuming that Miklt and Miklt from Equation (A1)
(RMS) error was 0.0099, which are good indicators are equal for all networks). On the other side, blocks
of the accuracy of the found operator and its pre- Âgas, water and Âgas, power are sparse compared to the
dictability power. The spectral radius of this operator others, which indicates that states of the gas network do
is 0.9250, which indicates that the system will tend to not strongly depend on the states of the others. This also
full recovery, independently of the initial damage state. supports the interpretation that the gas network had a
Note that Figure 2 does not show the lowest values priority to be recovered. Note that these influence rela-
in the operator or its diagonal entries, to highlight the tionships are not trivially observable without relying on
Efficient restoration using the recovery operator 9

the recovery operator, since as mentioned, the gas was

Positive: early recovery


Negative: late recovery
Prediction Error
not considered to be physically dependent on the power 10
or the water in the training td-INDP data. Note that the 0
element ordering used in Figure 2 was adequate to eas-
-10
ily separate the elements from different networks, but 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Repair Time
other element sorting may also be useful. For example,

Repaired Elements
600
one could sort the elements such that their closeness in Within confidence interval

Number of
400 Outside confidence interval
the operator reflects its geographical colocation, provid-
200
ing a graphical depiction that would facilitate finding the
influence that each geographical region has over others. 0
0 2 4 6 8 10 12 14 16 18 20
Repair Time

Cumulative Percentage of
Repaired Elements
1
3.1.1 Generated recovery strategies for nodes. To eval-
uate the power and accuracy of the proposed method- 0.5
Predicted (using Recovery Operator)
ology to efficiently generate recovery strategies using Benchmark

the recovery operator, we separated all disaster scenar- 0


0 2 4 6 8 10 12 14 16 18 20

ios into 10 different groups (of 100 scenarios each) and Repair Time

applied cross-validation. In particular, for each group (a) Box-plot of the errors, number of repaired ele-
we generated recovery strategies, using a recovery op- ments, and cumulative percentage of recovery, re-
erator created using only the benchmark (td-INDP- spectively, for each recovery period.
generated) recovery strategies of the other nine groups.
For each disaster scenario in each group, seeded with
the initial disaster state φ(0) = φ̆(0), we used its asso- 1000

ciated recovery operator to efficiently generate a re- 900


12.5%, 87.5% range
25%, 75% range
covery strategy as described in Section 2.2. The gen- 800
median

erated strategies were compared with their associated


Number of Repaired Nodes

700
td-INDP-based recovery strategies, to study the qual-
ity of approximation for each time period. For this 600

case study, assuming no prior information was pro- 500

vided, we used a threshold value (number used in 400


Equation (12) to round a noninteger damage state to 300
a binary state) ā = 0.5. The average cross-validation
200
RMS error was 0.03165, and the average R 2 was
100
0.7681. The average error in the predicted recovery
times was 0.92195, and its standard deviation was 0
-15 -10 -5 0 5 10 15
2.16407. These values show that the proposed operator Repair Error
represents a good fit for the recovery dynamics, and can (b) Histogram of the errors
be used to adequately propose quasi-optimal recovery
strategies. Figure 3a shows the box-plot of the errors Fig. 3. Comparison between predicted recovery strategy for
between the predicted strategies with respect to their nodes (using the recovery operator) and the benchmark
benchmark, the number of elements with repair times strategies (based on the td-INDP), using ā = 0.5.
accurately predicted for each period, and the cumula-
tive percentage of recovery for both the predicted and ery periods, a good level of accuracy is achieved even
the benchmark strategies. Figure 3b shows the associ- when performing a long-range prediction (i.e., when es-
ated histogram of the errors between the two strategies. timating recovery times that are far from the current
It can be observed that the predicted recovery strate- time).
gies can replicate the td-INDP recovery strategies accu- Note that the quality of the estimated solutions de-
rately, given that the median error is less than one pe- pends directly on the threshold value ā used. For higher
riod, and in general the estimated recovery times have accuracy, the parameter ā could be tuned to minimize
an error below three periods. In fact, the overall distri- the difference between the benchmark and the pre-
bution of errors shows that more than 50% of the errors dicted recovery, that is, by solving an additional op-
are within only one period from the median, and more timization problem of the form arg minā φ̆(t + k) −
than 75% within two periods of the median, indicating ( Âk φ̆(t) − 1ā). To exemplify the effects of choosing a
that the generated strategies are also precise. Note that “tuned-up” ā, Figures 4a and b show a comparison be-
even though the accuracy is better for the starting recov- tween the benchmark and the predicted recovery times
10 González et al.

Damage State Damage State Damage State Damage State Damage State

Damage State Damage State Damage State Damage State Damage State
Positive: early recovery
Negative: late recovery

Element 15
Element 5
1 1
Prediction Error

10 0.5 0.5
0 0
0 0 2 4 6 8 10 12 0 2 4 6 8 10 12
t t
-10

Element 27

Element 36
1 1
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
0.5 0.5
Repair Time
0 0
Repaired Elements

600 0 2 4 6 8 10 12 0 2 4 6 8 10 12
Within confidence interval t t
Number of

Element 53

Element 75
400 Outside confidence interval
1 1

200 0.5 0.5


0 0
0 0 2 4 6 8 10 12 0 2 4 6 8 10 12
0 2 4 6 8 10 12 14 16 18 20 t t

Element 87

Element 93
Repair Time
Cumulative Percentage of

1 1
Repaired Elements

1 0.5 0.5
0 0
0 2 4 6 8 10 12 0 2 4 6 8 10 12
0.5
Predicted (using Recovery Operator) t t

Element 116
Element 97
Benchmark 1 1
0 0.5 0.5
0 2 4 6 8 10 12 14 16 18 20
0 0
Repair Time
0 2 4 6 8 10 12 0 2 4 6 8 10 12
t t
(a) Box-plot of the errors, number of repaired ele- Ideal threshold area
True
ments, and cumulative percentage of recovery, re- Predicted

spectively, for each recovery period.


Fig. 5. Recovery state estimation for 10 randomly selected
components.

1000 12.5%, 87.5% range


25%, 75% range
900 median
benchmark, as it would be suggesting likely infeasibili-
Number of Repaired Nodes

800
ties in the recovery strategies, due to the extended use
700 of more resources than available. Moreover, Figure 4b
600 shows that the histogram of the observed errors is bet-
500 ter centered around zero, relative to its analogous in
400 Figure 3b.
300 To provide insight on the quality of the operator
200
strategies, and on how Equation (12) is used to generate
100
such recovery strategies, Figure 5 shows the evolution of
the failure states for a set of 10 nodes, comparing their
0
-15 -10 -5 0 5 10 15 td-INDP recovery strategy and their associated values
Repair Error
of Âk φ̆(0). For each component, a value of 1 describes a
(b) Histogram of the errors fully failed state, whereas 0 describes a fully recovered
state. For each element in Figure 5, there is a gray box
Fig. 4. Comparison between predicted recovery strategy for that highlights in the horizontal axis the time period in
nodes (using the recovery operator) and the benchmark which the element was recovered according to the td-
strategies (based on the td-INDP), using ā = 0.4. INDP strategy, and in the vertical axis the range of val-
ues that ā can take such that the generated recovery
using ā = 0.4. The average error in the predicted re- strategy perfectly replicates the td-INDP strategy. As
covery times using this value of ā changed to 0.20954, expected, the faster an element is recovered according
and its standard deviation to 2.05361. These values show to the td-INDP strategy, the larger is the range of val-
that the proposed recovery strategies generated using ues that ā can take to return an accurate recovery strat-
the optimized threshold resemble more accurately the egy based on the recovery operator, since the slope of
optimal recovery strategies. From Figure 4a, it can be Âk φ̆(0) for that particular element would be higher. For
seen that the relative number of outliers observed for example, it can be observed that the range of threshold
each recovery time is less than the one observed using values that would generate an accurate recovery time
ā = 0.5. Similarly, the predicted cumulative fraction of for element 36 is much narrower than the same range
elements recovered depicts the benchmark much more associated with element 5. Note that another approach
accurately than if using ā = 0.5. In particular, it is im- to fine-tune ā would be finding the threshold value that
portant to ensure that the predicted cumulative fraction better fits these accuracy ranges across all elements and
of elements recovered is not extensively far above the scenarios. In this case, ā would maximize the number
Efficient restoration using the recovery operator 11

Positive: early recovery


Negative: late recovery
20

Prediction Error
0.14
Water

50 0

0.12
-20
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
100 0.1 Repair Time

Repaired Elements
600
Gas

Within confidence interval

Number of
0.08
150 400 Outside confidence interval

200
0.06
200 0
Power

0 2 4 6 8 10 12 14 16 18 20 22
0.04 Repair Time

Cumulative Percentage of
Repaired Elements
1
250
0.02
0.5
Predicted (using Recovery Operator)
50 100 150 200 250 Benchmark

Water Gas Power 0


0 2 4 6 8 10 12 14 16 18 20 22
Repair Time

Fig. 6. Representation of the recovery operator  (a) Box-plot of the errors, number of repaired ele-
considering both nodes and arcs. Matrix entries with absolute ments, and cumulative percentage of recovery, re-
value below 0.0079 are not displayed. The rows and columns spectively, for each recovery period.
correspond to the assigned labels for each element.

of times in which the recovery periods were accurately 12.5%, 87.5% range
1200 25%, 75% range
predicted, instead of minimizing the overall error. median

Number of Repaired Nodes


1000

3.2 Recovery operator for nodes and arcs


800

Now, to model the recovery process of all the elements


in the studied system of networks, assume E = N ∪ A. 600

In this case, the total number of elements increases from 400


125 to 289. Figure 6 shows the calculated recovery op-
erator  for this new set of elements, using a display 200

threshold of 0.0079. The coefficient of determination


associated with this operator was R 2 = 0.8857 and the 0
-20 -15 -10 -5 0 5 10 15 20
RMS error was 0.0117, which show an increase in ac- Repair Error

curacy and predictability power due to the inclusion of (b) Histogram of the errors
additional significant elements, with respect to the case
of nodes only. The spectral radius of this operator is Fig. 7. Comparison between predicted recovery strategy for
0.9944, which again guarantees a predicted full recov- nodes and arcs (using the recovery operator) and the
ery of the system. As observed in the recovery opera- benchmark strategies (based on the td-INDP), using ā = 0.5.
tor associated with nodes only, the blocks Âwater, gas and
Âpower, gas are dense relative to other blocks, whereas ery strategies for both nodes and arcs simultaneously.
Âgas, water and Âgas, power are the most sparse. This shows For this case, the threshold value ā used was also 0.5.
that the recovery operator provides consistent results The average cross-validation RMS error was 0.03748,
regarding the relationships between networks. Never- and the average R 2 was 0.88184. The average error in
theless, it can be seen that for each block in this oper- the predicted recovery times was 0.15993, and its stan-
ator, the upper-left corners (associated with the node dard deviation was 3.29823. These values show that the
elements, as opposed to the arc elements, located at the recovery operator can be used to adequately generate
lower-right corners) are densest. This indicates that in quasi-optimal recovery strategies, with an average er-
general the recovery relationships between nodes tend ror even smaller than the case with only nodes. Nev-
to be stronger than the ones observed for the arcs. ertheless, note that the average deviation was slightly
higher, which can be expected since there are two dif-
3.2.1 Generated recovery strategies for both nodes and ferent types of elements being analyzed simultaneously
arcs. Following the procedure detailed in Section 3.1.1, now. As in the previous examples, Figure 7 overviews
for each of the disaster scenarios, we generated recov- different aspects associated with the errors of the
12 González et al.

generated recovery strategies compared to the td-INDP to discern from the high-fidelity modeling framework.
strategies. Figures 7a and b show that the generated Analysis of these interdependencies can help isolate
strategies are also accurate, having a median error close particular significant sections of the networks during the
to 0, but with a slightly increased variability. However, recovery process and help inform recovery modifica-
Figure 7a shows that the predicted cumulative recovery tions. Finally, as the approximate dynamics are linear,
function offers a close fit to the benchmark recovery at they can be examined using a plethora of techniques
all periods, despite having to model two different types from linear systems theory. The linear operator repre-
of elements simultaneously. In particular, Figure 7b sentation means that linear time-invariant system anal-
shows that the error distribution has a reduced symme- ysis tools can be applied to examine features like stabil-
try compared to the one associated with nodes only, fa- ity, convergence, and modal features of the dynamics.
voring outliers in the left tail. This may be explained by The area of linear controller design is also open for ex-
the weaker recovery relationships observed in the arcs ploration, addressing such issues as optimal placements
compared to the ones observed between the nodes, re- of resources in the network and designing inputs into
ducing the predictability power for these types of el- the system for efficient recovery.
ements. Nevertheless, despite this increased variabil- Currently, the construction of the proposed recovery
ity, more than 50% of the proposed recovery times are operator assumes that the system to be recovered is de-
within two periods with respect to the td-INDP strate- terministic, and that the recovery process can be seen
gies, and more than 75% within five periods. as a time-invariant process, where the optimal recovery
strategy depends only on the current damage states of
each element (and not their recovery/damage history).
4 CONCLUSIONS For future work, we will explore and extend the capa-
bilities of the recovery operator to consider hysteresis,
In this article, we presented a novel approach to ef- uncertainty in the recovery process, and time-variant
ficiently generate approximate recovery strategies for recovery dynamics. This would allow, among others,
interdependent infrastructure systems, using a linear studying the impact of resource and behavioral iner-
time-invariant recovery operator. The recovery opera- tia and the occurrence of multiple subsequent damag-
tor is generated from a set of high-fidelity recovery sce- ing events. Note that if the available resources change
narios, to identify and approximate their main recovery in time, the underlying recovery dynamics may be af-
dynamics, and then to develop tailored recovery strate- fected; thus, to improve the resultant accuracy it may be
gies after specific disaster scenarios. For our illustrative ideal to construct different recovery operators for dif-
example, we used the td-INDP to generate these bench- ferent time domains. Also, applying tools from linear
mark recovery strategies associated with a set of pre- controller analysis and design is of particular interest, as
determined disaster scenarios. The recovery strategies notions of controllability and observability can now be
generated using the proposed recovery operator show applied to recovery dynamics. For example, Equation
good agreement with the high-fidelity recovery scenario (2) could be extended to consider the effects of an input
even for long-term planning, both in the time of recov- matrix B and a control vector u, such that φ(t + 1) ≈
ery and the resources used in each period. Also note Âφ(t) + Bu(t). Connections between control-theoretic
that as our proposed method is a data-driven process measures and infrastructure-centric measures such as
that operates on “snap-shots” of input/output data, the resilience would present a powerful link between the
recovery operator approach is not restricted to any par- two fields, enabling stakeholders to determine optimal
ticular recovery strategy algorithm. control configurations to maximize recoverability and
As the linear operator approach is a compact repre- resilience of their systems across multiple time scales.
sentation of the recovery dynamics, it provides a useful Moreover, as hinted in Section 2.2, the recovery oper-
tool with varied perspectives for decision makers and ator offers relevant information about the relative im-
stakeholders. First, the linear generation of the approx- portance of each element in the recovery process, that
imate recovery strategy can be exploited for its com- could be exploited in determining possible element clus-
putational savings when compared to the computation- tering configurations and the development of impor-
ally expensive high-fidelity algorithms. This provides tance rankings.
an efficiently computable coarse recovery strategy as
well as a good initial strategy to warm-start high-fidelity
optimization models. Second, the operator describes ACKNOWLEDGMENTS
time-correlations within the dynamics through the zero
structure of Â, exposing sometimes hidden interdepen- This publication was partially funded by the “Research
dencies between network elements that can be difficult Program 2012” Grant from the Office of the Vice
Efficient restoration using the recovery operator 13

President for Research - Universidad de los Andes (Bo- Fortz, B. & Poss, M. (2009), An improved Benders decom-
gotá, Colombia). The authors gratefully acknowledge position applied to a multi-layer network design problem,
the support by Centro de Estudios Interdisciplinarios Operations Research Letters, 37(5), 359–64.
Frangioni, A. & Gendron, B. (2009), Reformulations of the
Básicos y Aplicados (CEIBA), the U.S. National Sci- multicommodity capacitated network design problem, Dis-
ence Foundation (Grant CMMI-1436845), the U.S. De- crete Applied Mathematics, 157(6), 1229–41.
partment of Defense (Grant W911NF-13-1-0340), and Gao, J., Buldyrev, S. V., Havlin, S. & Stanley, H. E. (2011),
FICO for providing the Xpress-MP licenses used in the Robustness of a network of networks, Physical Review Let-
ters, 107(19), 195701-1–195701-5.
computational experiments. Gendron, B., Crainic, T. G. & Frangioni, A. (1999), Multi-
commodity capacitated network design, in B. Sansò and
P. Soriano (eds.), Telecommunications Network Planning,
Springer US, pp. 1–19.
González, A. D., Dueñas-Osorio, L., Medaglia, A. L. &
Sánchez-Silva, M. (2014a), Resource allocation for infras-
REFERENCES tructure networks within the context of disaster manage-
ment, in G. Deodatis, B. Ellingwood, and D. Frangopol
Ahuja, R. K., Magnanti, T. L. & Orlin, J. B. (1993), Network (eds.), Safety, Reliability, Risk and Life-Cycle Performance
Flows: Theory, Algorithms, and Applications, Prentice Hall, of Structures and Infrastructures, CRC Press, New York, pp.
Upper Saddle River, NJ. 639–46.
Anderson, B. D. O. & Moore, J. B. (1990), Optimal Con- González, A. D., Dueñas-Osorio, L., Medaglia, A. L. &
trol: Linear Quadratic Methods, Prentice Hall, Upper Sad- Sánchez-Silva, M. (2016a), The time-dependent interde-
dle River, NJ. pendent network design problem (td-INDP) and the eval-
Assad, A. A. (1978), Multicommodity network flows—a sur- uation of multi-system recovery strategies in polynomial
vey, Networks, 8(1), 37–91. time, in H. Huang, J. Li, J. Zhang, and J. Chen (eds.), The
Åström, K. & Eykhoff, P. (1971), System identification—a sur- 6th Asian-Pacific Symposium on Structural Reliability and
vey, Automatica, 7(2), 123–62. Its Applications, Shanghai, China, 544–50.
Barocio, E., Pal, B. C., Thornhill, N. F. & Messina, A. R. González, A. D., Dueñas-Osorio, L., Sánchez-Silva, M. &
(2015), A dynamic mode decomposition framework for Medaglia, A. L. (2016b), The interdependent network de-
global power system oscillation analysis, IEEE Transac- sign problem for optimal infrastructure system restora-
tions on Power Systems, 30(6), 2902–12. tion, Computer-Aided Civil and Infrastructure Engineering,
Baroud, H., Barker, K., Ramirez-Marquez, J. E. & Rocco, C. 31(5), 334–50.
González, A. D., Sánchez-Silva, M., Dueñas-Osorio, L. &
M. (2015), Inherent costs and interdependent impacts of in-
Medaglia, A. L. (2014b), Mitigation strategies for lifeline
frastructure network resilience, Risk Analysis, 35(4), 642–
systems based on the interdependent network design prob-
62.
lem, in M. Beer, S.-K. Au, and J. W. Hail (eds.), Vul-
Beskhyroun, S., Wegner, L. D. & Sparling, B. F. (2011), New
nerability, Uncertainty, and Risk: Quantification, Mitiga-
methodology for the application of vibration-based damage
tion, and Management, American Society of Civil Engineers
detection techniques, Structural Control and Health Moni-
(ASCE), Reston, VA, pp. 762–71.
toring, 19(1), 88–106.
Hernandez-Fajardo, I. & Dueñas-Osorio, L. (2013), Prob-
Brummitt, C. D., D’Souza, R. M. & Leicht, E. A. (2012), Sup-
abilistic study of cascading failures in complex interde-
pressing cascades of load in interdependent networks, Pro-
pendent lifeline systems, Reliability Engineering & System
ceedings of the National Academy of Sciences of the United
Safety, 111, 260–72.
States of America, 109(12), E680–89. Jiang, X. & Adeli, H. (2005), Dynamic wavelet neural network
Brunton, S. L., Brunton, B. W., Proctor, J. L. & Kutz, J. N.
for nonlinear identification of highrise buildings, Computer-
(2016), Koopman invariant subspaces and finite linear rep-
Aided Civil and Infrastructure Engineering, 20(5), 316–30.
resentations of nonlinear dynamical systems for control, Johnson, D., Lenstra, J. & Kan, A. (1978), The complexity of
PLOS ONE, 11(2), e0150171. the network design problem, Networks, 8, 279–85.
Buldyrev, S. V., Parshani, R., Paul, G., Stanley, H. E. & Kennington, J. L. (1978), A survey of linear cost multicom-
Havlin, S. (2010), Catastrophic cascade of failures in inter- modity network flows, Operations Research, 26(2), 209–36.
dependent networks, Nature, 464(7291), 1025–28. Kerschen, G., Worden, K., Vakakis, A. F. & Golinval, J.-C.
Cavdaroglu, B., Hammel, E., Mitchell, J. E., Sharkey, T. C. & (2006), Past, present and future of nonlinear system identi-
Wallace, W. A. (2011), Integrating restoration and schedul- fication in structural dynamics, Mechanical Systems and Sig-
ing decisions for disrupted interdependent infrastructure nal Processing, 20(3), 505–92.
systems, Annals of Operations Research, 203(1), 279–94. Kijewski, T. & Kareem, A. (2003), Wavelet transforms for
Crainic, T. G., Li, Y. & Toulouse, M. (2006), A first multilevel system identification in civil engineering, Computer-Aided
cooperative algorithm for capacitated multicommodity net- Civil and Infrastructure Engineering, 18(5), 339–55.
work design, Computers & Operations Research, 33(9), Koopman, B. O. & von Neumann, J. (1932), Dynamical sys-
2602–22. tems of continuous spectra, Proceedings of the National
Dantzig, G. B., Harvey, R. P., Lansdowne, Z. F., Robinson, Academy of Sciences of the United States of America, 18(3),
D. W. & Maier, S. F. (1979), Formulating and solving the 255–63.
network design problem by decomposition, Transportation Kutz, J. N., Fu, X., Brunton, S. L. & Erichson, N. B. (2015),
Research Part B: Methodological, 13(1), 5–17. Multi-resolution dynamic mode decomposition for fore-
Dueñas-Osorio, L., Craig, J. I., & Goodno, B. J. (2007), Seis- ground/background separation and object tracking, in 2015
mic response of critical interdependent networks, Earth- IEEE International Conference on Computer Vision Work-
quake Engineering & Structural Dynamics, 36(2), 285–306. shop (ICCVW), vol. 2016, IEEE, 921–29.
14 González et al.

Lee II, E. E., Mitchell, J. E. & Wallace, W. A. (2007), Restora- Sirca, G. & Adeli, H. (2012), System identification in struc-
tion of services in interdependent infrastructure systems: tural engineering, Scientia Iranica, 19(6), 1355–64.
a network flows approach, IEEE Transactions on Systems, Söderström, T. & Stoica, P. (1989), System Identification,
Man and Cybernetics, Part C (Applications and Reviews), Prentice-Hall, Upper Saddle River, NJ.
37(6), 1303–17. Song, J. & Ok, S.-Y. (2010), Multi-scale system reliability anal-
Lin, D.-Y. (2011), A dual variable approximation-based de- ysis of lifeline networks under earthquake hazards, Earth-
scent method for a bi-level continuous dynamic network quake Engineering & Structural Dynamics, 39, 259–79.
design problem, Computer-Aided Civil and Infrastructure Sootla, A., Mauroy, A. & Goncalves, J. (2016), Shaping Pulses
Engineering, 26(8), 581–94. to Control Bistable Monotone Systems Using Koopman Op-
Ljung, L. (1999), System Identification (2nd Ed.)—Theory for erator, in IFAC-PapersOnLine, 49(18), 698–703.
the User, Prentice Hall PTR, Upper Saddle River, NJ. Stengel, R. F. (1994), Optimal Control and Estimation, Dover,
McGhee, R. B. (1963), Identification of nonlinear dynamic New York.
systems by regression analysis methods, Ph.D. thesis, Uni- UNISDR (2015), Making Development Sustainable: The Fu-
versity of Southern Carolina. ture of Disaster Risk Management, Global Assessment Re-
Mauroy, A. & Mezic, I. (2013), A spectral operator-theoretic port on Disaster Risk Reduction.
framework for global stability, in 52nd IEEE Conference on U.S. Federal Emergency Management Agency (FEMA),
Decision and Control, no. 3, IEEE, 5234–39. (2011), National Disaster Recovery Framework, Technical
Mauroy, A., Rhoads, B., Moehlis, J. & Mezić, I. (2014), Global report, U.S. Department of Homeland Security.
isochrons and phase sensitivity of bursting neurons, SIAM Vespignani, A. (2010), Complex networks: the fragility of in-
Journal on Applied Dynamical Systems, 13(1), 306–38. terdependency, Nature, 464(7291), 984–5.
Mezić, I. (2005), Spectral properties of dynamical systems, Vugrin, E. D., Warren, D. E., Ehlen, M. A. & Camphouse,
model reduction and decompositions, Nonlinear Dynamics, R. C. (2010), A framework for assessing the resilience of
41(1–3), 309–25. infrastructure and economic systems, in Sustainable and
Nurre, S. G., Cavdaroglu, B., Mitchell, J. E., Sharkey, T. C. & Resilient Critical Infrastructure Systems: Simulation, Mod-
Wallace, W. A. (2012), Restoring infrastructure systems: an eling, and Intelligent Engineering, Springer Berlin Heidel-
integrated network design and scheduling (INDS) problem, berg, Germany, pp. 77–116.
European Journal of Operational Research, 223(3), 794–
806.
Ouyang, M. (2014), Review on modeling and simulation of in-
terdependent critical infrastructure systems, Reliability En- APPENDIX A: THE TIME-DEPENDENT
gineering & System Safety, 121, 43–60. INTERDEPENDENT NETWORK DESIGN
Ouyang, M. & Wang, Z. (2015), Resilience assessment of in- PROBLEM
terdependent infrastructure systems: with a focus on joint
restoration modeling and analysis, Reliability Engineering
Let us define the time-dependent Interdependent Net-
& System Safety, 141(September), 74–82.
Pant, R., Barker, K. & Zobel, C. W. (2013), Static and dy- work Design Problem (td-INDP) as the problem of
namic metrics of economic resilience for interdependent in- finding the least-cost time-dependent recovery strategy
frastructure and industry sectors, Reliability Engineering & of a partially destroyed system of infrastructure net-
System Safety, 125, 1–11. works, subject to budget, resources, and operational
Pedersen, M. B., Crainic, T. G. & Madsen, O. B. G. (2008),
Models and tabu search metaheuristics for service network constraints, while considering interdependencies be-
design with asset-balance requirements, Transportation Sci- tween the networks (González et al., 2016a, 2016b). Un-
ence, 43(2), 158–77. der such a definition, the reconstruction costs can in-
Poss, M. (2011), Models and algorithms for network design clude the costs of the resources used, labor costs, the
problems, Ph.D. thesis, Université Libre de Bruxelles.
Rinaldi, S. M., Peerenboom, J. P. & Kelly, T. K. (2001), Iden-
costs of preparing the geographical locations for the
tifying, understanding, and analyzing critical infrastructure reconstruction process (González et al., 2014a, 2016a,
interdependencies, IEEE Control Systems Magazine, 21(6), 2016b), and costs related to the system not being able to
11–25. perform adequately. Similarly, there are different types
Rowley, C. W., Mezić, I., Bagheri, S., Schlatter, P. & Henning- of interdependencies that the problem should be able
son, D. S. (2009), Spectral analysis of nonlinear flows, Jour-
nal of Fluid Mechanics, 641, 115–27. to consider, such as physical, cyber, geographical, and
Schmid, P. J. (2010), Dynamic mode decomposition of nu- logical (Rinaldi et al., 2001).
merical and experimental data, Journal of Fluid Mechanics,
656(4), 5–28.
Schmid, P. J., Li, L., Juniper, M. P. & Pust, O. (2011), Applica- A.1 Formulation
tions of the dynamic mode decomposition, Theoretical and
Computational Fluid Dynamics, 25(1–4), 249–259. The following td-INDP formulation (González et al.,
Shafieezadeh, A., Leelardcharoen, K. & Dueñas-Osorio, 2016a), uses as an input the information associated with
L. (2014), A framework for assessing the effectiveness a partially destroyed system of interconnected infras-
of resilience enhancement strategies for interdependent
infrastructure systems, in Safety, Reliability, Risk and
tructure networks (costs, capacities, damaged compo-
Life-Cycle Performance of Structures and Infrastructures, nents, resources, etc.), and returns the optimal recovery
CRC Press/Balkema, Leiden, The Netherlands, pp. 573– strategy (maximizing the performance and minimizing
80. recovery costs). Such recovery strategies become the
Efficient restoration using the recovery operator 15

data that will be used to generate the recovery opera- Decision variables
tor. The sets, parameters, and decision variables used in +
the td-INDP formulation are described as follows: δiklt Excess of supply of commodity l in node i in
network k at time t
Sets −
δiklt Unmet demand of commodity l in node i in net-
work k at time t
N Set of nodes before a destructive event
xi jklt Flow of commodity l through arc (i, j) in net-
A Set of arcs before a destructive event
work k at time t
T Set of periods for the recovery process (time hori-
wikt Binary variable that indicates if node i in net-
zon)
work k is functional at time t
S Set of geographical spaces (spatial distribution
yi jkt Binary variable that indicates if arc (i, j) in net-
of the area that contains the infrastructure
work k is functional at time t
networks)

wikt Binary variable that indicates if node i in net-
L Set of commodities flowing in the system
work k should be recovered at time t
R Set of limited resources to be used in the recon-

yi jkt Binary variable that indicates if arc (i, j) in net-
struction process
work k should be recovered at time t
K Set of infrastructure networks

z st Binary variable that indicates if space s has to
Nk∗ Set of nodes in network k ∈ K that require their
be prepared at time t
demands to be fully satisfied to be functional
Nk Set of nodes in network k ∈ K before a destructive Based on the previous description of the variables
event and parameters involved, the proposed model for the
Nk Set of destroyed nodes in network k ∈ K after the td-INDP is represented as follows:
event
Ak Set of arcs in network k ∈ K before a destructive minimize
event ⎛ ⎛
Ak Set of destroyed arcs in network k ∈ K after the    
⎝ gst
z st + ⎝ f i jkt
yi jkt
event
t∈T |t>0 s∈S k∈K (i, j)∈Ak
Lk Set of commodities flowing in network k ∈ K
⎞⎞ ⎛
    
Parameters + qikt
wikt ⎠⎠ + ⎝ + +
Miklt δiklt
i∈Nk t∈T k∈K l∈Lk i∈Nk
vr t Availability of resource r at time t ⎞
h i jkr t Usage of resource r related to recovering arc (i, j)   
in network k at time t − −
+ Miklt δiklt + ci jklt xi jklt ⎠ (A1)
pikrt Usage of resource r related to recovering node i in l∈Lk (i, j)∈Ak
network k at time t
+
Miklt Costs of excess of supply of commodity l in node i subject to
in network k at time t + −
− xijklt − xjiklt = biklt − δiklt + δiklt
Miklt Costs of unsatisfied demand of commodity l in j:(i, j)∈Ak j:( j,i)∈Ak (A2)
node i in network k at time t ∀k ∈ K, ∀i ∈ Nk , ∀l ∈ Lk , ∀t ∈ T
αi jkst Indicates if repairing arc (i, j) in network k at time
t requires preparing space s 
xi jklt ≤ u i jkt yi jkt , ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T (A3)
βikst Indicates if repairing node i in network k at time t
l∈Lk
requires preparing space s

γi jk k̃t Indicates if at time t node i in network k depends xi jklt ≤ u i jkt wikt , ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T (A4)
on node j in network k̃ ∈ K l∈Lk
gst Cost of preparing geographical space s at time t 
f i jkt Cost of recovering arc (i, j) in network k at time t xi jklt ≤ u i jkt w jkt , ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T (A5)
qikt Cost of recovering node i in network k at time t l∈Lk
ci jklt Commodity l unitary flow cost through arc (i, j) in

network k at time t wikt |biklt | ≤ |biklt |−δiklt , ∀k ∈ K, ∀i ∈ Nk∗ , ∀l ∈ Lk , ∀t ∈ T (A6)
u i jkt Total flow capacity of arc (i, j) in network k at time

t wikt γi jk k̃t ≥ w j k̃t , ∀k, k̃ ∈ K, ∀ j ∈ Nk̃ , ∀t ∈ T (A7)
biklt Demand/supply of commodity l in node i in net- i∈Nk
work k at time t
16 González et al.

wik0 = 0, ∀k ∈ K, ∀i ∈ Nk (A8) Finally, the fifth represents the cost associated with
the flow of commodities through each network. This
objective function assumes that each term involved is
yi jk0 = 0, ∀k ∈ K, ∀(i, j) ∈ Ak (A9) quantified in similar units (such as monetary units),
thus having a similar weight on the recovery process.

t Nevertheless, the objective function can be easily gen-
wikt ≤
wik t˜ , ∀k ∈ K, ∀i ∈ Nk , ∀t ∈ T | t > 0 (A10) eralized such that it can include different weights for
˜
t=1 each term, by adding a weight/importance coefficient

t associated with each of them, effectively accounting
yi jkt ≤
yi jk t˜ , ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T | t > 0 (A11) for the possible heterogeneity of each type of cost.
˜
t=1 Constraints (A2) enforce adequate flow balance of
commodities for each node, relating the total amount

of commodities entering and leaving the node with
h i jkr t
yi jkt + pikrt
wikt ≤ vr t , its respective demands. Constraints (A3), (A4), and
k∈K (i, j)∈Ak i∈Nk (A12)
(A5) relate the functionality of each link, its starting
∀r ∈ R, ∀t ∈ T | t > 0 and ending nodes, respectively, with the amount of
commodities that could flow through it. Note that, on

wikt αikst ≤
z st , ∀k ∈ K, ∀i ∈ Nk , ∀s ∈ S, ∀t ∈ T | t > 0 (A13) one hand, these serve as capacity constraints that limit
the flow capacities when the corresponding nodes and

yi jkt βi jkst ≤
z st , ∀k ∈ K, ∀(i, j) ∈ Ak , arc are functional. On the other hand, when an arc or
(A14) a node is not functioning (y or w binary variables are
∀s ∈ S, ∀t ∈ T | t > 0
0), the corresponding flows (variable x) are forced to
+
δiklt ≥ 0, ∀k ∈ K, ∀i ∈ Nk , ∀l ∈ Lk , ∀t ∈ T (A15) be 0 as well. Constraints (A6) ensure that nodes in Nk∗
are functional only if their demands are fully satisfied.
Constraints (A7) guarantee that nodes need to be func-

δiklt ≥ 0, ∀k ∈ K, ∀i ∈ Nk , ∀l ∈ Lk , ∀t ∈ T (A16) tional for their dependent nodes to become functional
as well. Constraints (A8) and (A9) enforce that initially
damaged nodes and arcs, respectively, are initially not
xi jklt ≥ 0, ∀k ∈ K, ∀(i, j) ∈ Ak , ∀l ∈ Lk , ∀t ∈ T (A17)
functional either. Constraints (A10) and (A11) ensure
that initially damaged nodes and arcs, respectively, can
wikt ∈ {0, 1}, ∀k ∈ K, ∀i ∈ Nk , ∀t ∈ T (A18) become functional only after they have been recovered.
Note that if an initially damaged element has not
been recovered by period t, the cumulative sum of
yi jkt ∈ {0, 1}, ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T (A19) the respective recovery decision variable (
w or
y)
will be 0, thus forcing the functionality variable (w or
y) to be 0 as well. Constraints (A12) ensure that for

wikt ∈ {0, 1}, ∀k ∈ K, ∀i ∈ Nk , ∀t ∈ T | t > 0 (A20)


each period, the resources used to perform the planned
recovery jobs are at most their availability. Constraints

yi jkt ∈ {0, 1}, ∀k ∈ K, ∀(i, j) ∈ Ak , ∀t ∈ T | t > 0 (A21) (A13) and (A14) guarantee that if a node or an arc,
respectively, need to be repaired, the geographical
spaces that accommodate them need to be prepared. In

z st ∈ {0, 1}, ∀s ∈ S, ∀t ∈ T | t > 0 (A22) this case, if for a given element the recovery variable
(
w or
y) is 1 at a period t, indicating that such an
Equation (A1) details the five different costs that element should be recovered at that period, then the
constitute the objective function. The first is the total geographical preparation variable (
z) is forced to be 1
cost of preparing the required geographical spaces for for all associated spaces, thus indicating that these need
the recovery of nodes and arcs—related to perforation to be prepared. Last, constraints (A15)–(A22) show the
and excavations processes, constructing foundations, nature of each decision variable, indicating if they are
etc. The second and third costs are associated with the continuous nonnegative or binary. For further details
individual reconstruction of arcs and nodes, respec- regarding the assumptions and other properties of the
tively. The fourth is the cost caused by having excess or td-INDP, refer to González et al. (2016a, 2016b).
deficit of commodities to properly satisfy the demands.

You might also like