Professional Documents
Culture Documents
2016 Vulnerability Assessmentin Water Supply System
2016 Vulnerability Assessmentin Water Supply System
1, FEBRUARY 2016
0018-9391 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications standards/publications/rights/index.html for more information.
ZHANG et al.: STOCHASTIC ANP-GCE APPROACH FOR VULNERABILITY ASSESSMENT IN THE WATER SUPPLY SYSTEM 79
weight calculation approaches are not able to resolve the uncer- been used to predict the impacts of observed stochastic events in
tainties and subjectivities associated with experts’ judgments natural disasters. However, most of these approaches encounter
under different incident scenarios (i.e., different intensities of insufficient historical data (such as the probabilities and magni-
emergencies arising under time-varying conditions). Therefore, tudes of incidents/disasters) in real-world applications [9]–[12].
more attention should be paid to improve the objectivity, dynam- The third stream is MCDM approaches, which have been
ics, and credibility of current weight calculation approaches in proposed over the last decades. The most popular MCDM ap-
vulnerability assessment. Aiming at addressing the above chal- proaches include weighted sum model (WSM), analytic hier-
lenges, this study develops new approaches for the dynamic archy process (AHP), ANP, technique for order of preference
multicriteria vulnerability assessment under different scenarios, by similarity to ideal solution (TOPSIS), and elimination and
including the formulation of criteria framework, determination choice expressing reality (ELECTRE) [13]. Among these ap-
of criteria weights, dynamic rating, visualization, and sensitiv- proaches, both AHP [14] and ANP [15] have been applied to
ity analysis. Among these processes, the most important is that the selection of alternatives; TOPSIS and ELECTRE have been
a stochastic weight determination approach, namely stochastic used for the ranking of alternatives [13]; and WSM [16], [17]
analytical network process-game cross evaluation (ANP-GCE), has been most commonly applied for the evaluation and classi-
is proposed to improve the deviations arising from the uncer- fication of alternatives, which is flexible in dealing with uncer-
tainties and inconsistencies of subjective preferences. tainties and dynamic situations in vulnerability assessment.
The main contributions of the proposed approaches are sum- In MCDM approaches, the determination of criteria weights
marized as follows. deserves more attention as it significantly affects the evalua-
1) An ANP-based criteria framework is constructed to in- tion results. Existing weight determination approaches could be
tegrate the multidimensional interdependent criteria for classified into two main groups, namely subjective approaches
vulnerability assessment. and objective approaches. The subjective approaches derive cri-
2) A stochastic dynamic multicriteria weight determination teria weights from experts’ judgments, among which the most
approach is proposed by combining the stochastic ANP widely used two approaches are AHP and ANP by Saaty [14],
with GCE approach, which is able to improve the devia- [15]. In the traditional AHP/ANP, experts are requested to make
tions of results caused by the uncertainties and subjectiv- linguistic pairwise comparisons for each pair of criteria of how
ities of experts’ judgments. many times one criterion is better or worse than the other one by
3) Dynamic assessment simulations and sensitivity analysis selecting a numerical scale from “1–9” or “1/9–1” [14]. How-
are performed to reveal how the vulnerability grade of ever, in many cases, the experts could not provide an exact num-
each component varies across scenarios, which fills in the ber for the relative importance of one criterion over another due
gap of dynamic vulnerability assessment. to the uncertainties. As a result, Saaty et al. have extended their
The remainder of this paper is organized as follows. Section II work to interval AHP/ANP [18], [19], fuzzy AHP/ANP [20]–
briefly reviews relevant literature. Section III presents the ANP- [22], stochastic AHP/ANP [23]–[25], and dynamic AHP/ANP
based criteria framework. Based on the framework, an integrated [26], [27]. It is obvious that such approach could only provide
weight calculation approach, namely stochastic ANP-GCE, is an interval weight estimate rather than an exact point estimate.
introduced in Section IV. Section V describes the scenario-based Fuzzy AHP/ANP approach describes uncertain comparison ra-
vulnerability assessment process and the associated sensitivity tios by triangular membership functions. The earliest work in
analysis approach. Section VI presents a case study and the fuzzy AHP appeared in Van Laarhoven and Pedrycz [20], and
related findings. Finally, Section VII concludes the paper and afterward, both Salo [21] and Leung and Cao [22] have tackled
suggests some directions for the future research. the issue of consistency in fuzzy comparison matrix. Although
fuzzy AHP/ANP is easier to perform, there are two main types
of criticism.
II. LITERATURE REVIEW 1) It is hard to get the fuzzy sets when there is not enough
To assess vulnerability, we summarize the existing ap- historical data.
proaches into three streams, which are network modeling, 2) It is difficult to address the issue of consistency in fuzzy
probabilistic analysis, and multiple-criteria decision-making comparison matrix.
(MCDM) approaches. Nevertheless, stochastic AHP/ANP assumes that the im-
The first stream is network modeling, which models the in- precise comparison ratios follow a probability distribution,
frastructure systems by networks, and measures the system vul- where the assumption is more reasonable and flexible com-
nerability by the efficiency of disrupted network or loss. This pared with the above two approaches (interval AHP/ANP and
method has been successfully applied for analyzing the inter- fuzzy AHP/ANP) in real applications [23]. Though extensive
dependencies and cascading failures of large-scale networks research has been proposed, two problems need to be solved in
(i.e., power, transportation systems, etc.) [7], [8]. Although the stochastic AHP/ANP.
approach can be widely applied to physical and organizational 1) These stochastic AHP/ANP models need to explore the
dimensions involved in vulnerability criteria, it hardly deals with use of other methodologies like linear programming and
the social and cultural dimensions. simulation to calculate the final weights. However, the ex-
The second stream is probabilistic analysis (e.g., Bayesian isting research either minimizes the consistency ratio us-
network, Markov Chain analysis, and Petri Net, etc.), which has ing a nonlinear programming, which may lead to a result
80 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 63, NO. 1, FEBRUARY 2016
deviated from subjective judgments [24], or maximizes IV. WEIGHT CALCULATION APPROACH FOR
the preferences of the experts, despite of their inconsis- VULNERABILITY ASSESSMENT
tency [25]. Based on the construction of criteria framework in Section
2) To the best of our knowledge, most of the literature uti-
III, an integrated weight calculation approach is developed,
lize a single distribution in their work, regardless of the
namely stochastic ANP-GCE, to cope with the uncertain pair-
situation that experts tends to have different types of com- wise comparisons, and the inconsistent subjective preferences
parisons.
of experts in the vulnerability assessment to improve traditional
The three approaches mentioned above are static, but situ-
ANP. Fig. 2 presents an overview of the proposed approach, and
ations in real cases may vary over time. To make reasonable the detailed steps of the proposed approach will be presented in
decisions, several researchers proposed dynamic AHP/ANP.
Sections IV-A and IV-B.
Satty [26] concluded three ways to deal with dynamic deci-
sions: changing the overall AHP structure at each time, altering
the paired comparison rate at each time, and using functions A. Steps of Stochastic ANP Approach
for paired comparisons. Moreover, Benitez et al. [27] proposed We first define the variables used in the weight calculation
a framework that allows users to provide partial or incomplete approach.
preference data at multiple times. Although these methods have Based on the WSM, the weighted vulnerability value of each
limitations in dealing with the dynamic problem, their work component r is expressed as (1), and steps of the stochastic
significantly enlightened us on solving the dynamic problem ANP-GCE approach are illustrated as follows:
of stochastic AHP/ANP. Regarding the objective approaches,
weights are derived through mathematical models, such as the Vr (ξ) = dr (ξ) · wr (ξ)T . (1)
maximum entropy approach [28], data envelope analysis (DEA)
Step 1: Make stochastic pairwise comparisons: In stochastic
[29], modified DEA such as fuzzy DEA and DEA game cross ef-
ANP, define aij as the stochastic pairwise comparison ratio
ficiency model [30], [31], and maximum alternatives’ deviation
when comparing criterion i with j, where i = j, i, j ∈ N . In
approach [32], etc. The advantage of these objective approaches
the group-decision environment, aij is obtained by integrating
is that none of them relies on the opinions of experts, which
the judgments of all experts k ∈ K, where the judgment of each
avoids the subjective effects on the results. However, as these
k is denoted as aij k . Differ from the traditional ANP, experts are
approaches fully depend on the structure of data and are totally
requested to give an interval of the relative importance due to
out of artificial intervention, the results may contradict with the
the dynamic environment and uncertain information, by giving
actual situations.
three numbers of minimum, best possibility, maximum, denoted
To address the above gaps, in this study, a vulnerabil-
as aij k , ãij k , āij k respectively.
ity assessment approach with dynamic weights is proposed
Given aij k , ãij k , āij k , we assume that aij k is a random vari-
considering the dynamic nature of environmental incidents. The
able that takes a set of possible values following a specific
proposed approach is able to eliminate static assessment limita-
probability distribution function (PDF), f (aij k ). To determine
tion and cope with subjectivities and uncertainties from the ex-
f (aij k ), we assume that the interval [akij , ākij ] is the 1 − αk
perts’ judgments by integrating a game theory-based approach
confidence interval of the probability distribution, where αk
GCE (which is proposed based on the game cross efficiency
is the significance level for the judgment of expert k. If his-
model) into stochastic ANP.
torical data or the experience of expert k is sufficient enough
to determine the type of probability distribution (e.g., normal,
beta, etc.), then f (aij k ) is determined by the data driven esti-
III. CRITERIA FRAMEWORK FOR VULNERABILITY ASSESSMENT mation method; otherwise, f (aij k ) is determined by requesting
for experts’ opinions. Note that the significance interval of each
In this section, we first select the assessment criteria and iden-
expert k is chosen based on the reliability and credibility of
tify the relationships among them from the related human-social
the expert. In real cases, we classify the experts to three levels,
environment systems, then an ANP-based criteria framework is
which are authoritative, highly credible, and medium credible
developed, as shown in Fig. 1.
based on their credibility and professionalism in their field, then
In the framework, the first layer represents the goal of the
the significance level of each expert is determined accordingly.
vulnerability assessment, and the second layer consists of three
In the context of group-decision making, f (aij ) is defined as
determinates including exposure, susceptibility, and coping ca-
an distribution integrated by f (aij k ) for all k ∈ K, and given
pacity according to the internal and external origins of vul-
by a weighted sum of f (aij k )
nerability [33]–[36]. In the third layer, criteria is selected for
each determinant on the basis of six clusters related to the
f (aij ) = uk f (aij k ) ∀i, j ∈ N, i = j (2)
human-social-environment systems: demographical, organiza-
k ∈K
tional, environmental, economic, system of infrastructures, and
social cultural, namely DO-E2 S2 . The number of criteria in each where uk represents the weight of expert k. A nonlinear pro-
cluster is selected by experts according to the real-time cases, gramming model is proposed to obtain uk , and the detailed in-
where interdependencies exist between criteria not only in dif- formation of this aggregation method is presented in Appendix
ferent layers but also within the same layer. A. The structure of the distributed pairwise matrix is shown as
ZHANG et al.: STOCHASTIC ANP-GCE APPROACH FOR VULNERABILITY ASSESSMENT IN THE WATER SUPPLY SYSTEM 81
for each stochastic variable, we have Let t be the iteration index, and start from t = 1. At this
−1 2 iteration, we obtain an optimal weight vector vector wr∗n (ξ)
ns ≥ max
Φ (z)σij
(5) for each component r, where wr∗n (ξ) = [wr∗1 (ξ), . . . , wr∗N (ξ)].
i,j ∈N ε To enhance the fairness of the assessment, we calculate the
cross vulnerability value for any component r (r ∈ R) using
where σij is the standard deviation of distribution f (aij ). Thus,
the optimal weight vector of other components, wr∗n (ξ) (r ∈
the sample size is dependent on the acceptable level of ε and
R). This cross evaluation value of r using wr∗n (ξ)(∀r ∈ R) is
Φ(z).
defined as Er r (ξ), which is determined as
Step 3: Calculate the weights for all samples by ANP and ag-
gregate the results: For each sample, we use the traditional ANP Er r (ξ) = wr∗n (ξ)dr n (ξ) ∀r, r ∈ R. (10)
to determine the criteria weights. Then, based on the statistical n ∈N
analysis of the weights in all samples, we could determine an
confidence interval for the weight in terms of criterion n, which Next, Ēr (ξ), the average of Er r (ξ) concerning all alternative
is suitable for all components, as shown in r is calculated as
to each component based on the work of Liang et al. [31]. By Step 5: Iterate the GCE: Define wrr n (ξ) as the weight of r
integrating the GCE approach into stochastic ANP, the Nash under scenario ξ in terms of criterion n subject to the condition
Equilibrium assessment results are obtained, which offers the that it will not deteriorate the currently average GCE value of
best suggestions for city mangers with regard to the protection component r , θrt (ξ). Then, the GCE model is shown as
resource allocation among these vulnerable alternatives. The
proof of the Nash equilibrium solution is stated in Appendix B. Max wrr n (ξ)dr n (12)
The detailed steps include step 4, step 5, and step 6. n ∈N
Step 4: Propose and solve the basic weight calculation model:
By GCE approach, we could obtain a final weight vector specific s.t. wrr n (ξ) = 1 (13)
n ∈N
for each component, and the weight of component r in terms
of criterion n is denoted as wr n (ξ). For each component r, we wrr n (ξ)dr n (ξ) ≥ θrt (ξ) (14)
propose a linear model to calculate wr n (ξ)(∀n ∈ N ) under the n ∈N
constraint of weight interval calculated by the stochastic ANP
t
t θr (ξ) −t−1
If ≥ ε for any r, return to step 5; else if
θrt−1 (ξ)
θr (ξ) − θr (ξ) ≺ ε for all r, it indicates that the result has
converged, then stop the iteration. θrt (ξ) is the final Nash Equi-
librium vulnerability value of component r, which means that
component r can receive no increment on the vulnerability value
Fig. 3. Ranking and visualization of vulnerability.
from changing its criteria weights if the criteria weights of other
components remain constant. The criteria weights of r is repre-
sented as C. Sensitivity Analysis of Vulnerability
To improve the performance of each component under assess-
1 r ∗ t−1
wr∗n (ξ) = wr n (θr (ξ)) ∀r ∈ R, ∀n ∈ N. (17) ment, a sensitivity analysis is performed to find the criterion that
|R| is most influential to the vulnerability variability of this compo-
r ∈R
nent. Define the fractional contribution of a given criterion wn
to the variance of the vulnerability rank of one component as
V. SCENARIO-BASED VULNERABILITY ASSESSMENT
the sensitivity index, denoted as Sn . Criterion with the highest
A. Calculation of Weights under Different Scenarios sensitivity index has the greatest impact on the corresponding
variability of vulnerability value. In this study, to deal with the
In view of the dynamic natures of incidents, vulnerability
nonlinear and nonmonotonic ranking process, the global sensi-
assessment is performed under all potential disaster scenarios.
tivity analysis method proposed by Sobol [37], [38] was selected
It is difficult for experts to calculate the criteria weights un-
to perform the sensitivity analysis.
der all scenarios using stochastic ANP-GCE. Therefore, while
In the vulnerability assessment process, define function f (·)
determining the scenario-based weights, some relationships be-
as the proposed ranking process, then the vulnerability rank Y
tween the criteria weights and the varied scenarios are defined
of one component is described as
in accordance with the real cases.
Define the variance between two scenarios as Δ, and define Y = f (w1 , w2 . . . , wN ) . (19)
the corresponding variance of weight of component r in terms
According to Sobol’s sensitivity analysis method, the sensi-
of criterion n as wr n (Δ). By the previous stochastic ANP-GCE
tivity index Sn could be estimated by
approach, we have obtained the optimal weight vector for each
component under scenario ξ, denoted as wr∗ (ξ). Then, for any Vn (Y )
Sn = (20)
possible scenario ξ = ξ + Δ(ξ ∈ ψ), we have V (Y )
where V (Y ) represents the total variance of vulnerability rank
wr n (ξ ) = wr∗n (ξ) + wr n (Δ). (18) Y under the changes of weights of all criteria, and Vn (Y ) rep-
resents the variance of Y when wn changes alone. To deal with
After normalization for all criteria weights, we obtain the the nonlinear ranking process, Sobol’s quasi-random sampling
final weight vector wr∗n (ξ ) under scenario ξ . method is selected to estimate V (Y ) and Vn (Y ). The first step
is to generate two independent samples M1 and M2 , both of
B. Ranking and Visualization of Vulnerability which are M × N matrices, where M is the sample size and
N is the number of criteria. The sample size M is determined
By the previous processes, we have obtained the vulnerabil- based on the central limit theorem, as the same way in step 2
ity value for each component under assessment, in this section, (see Section IV-A).
to make the assessment results more intuitively understand- To obtain Sn , first we need to estimate the values of Vn (Y )
able, and all components under assessment are classified into and V (Y ), respectively, then Sn is calculated by (20). Let’s
specific numbers of grades. The classification should be per- first estimate the value of V (Y ). To estimate V (Y ), we should
formed according to the relative vulnerability values rather than estimate the expectation value of Y first, denoted as f0 . Define
the absolute values, so that the decision makers could obtain WmM 1 and WmM 2 as the mth sample of M1 and M2 , respectively,
the relative vulnerability grade of each component to support then the estimation value of the square of f0 , denoted as fˆ02 ,
the subsequent resource allocation and decision making. To could be estimated using
realize such classification from the perspective of relative vul-
1
M1
M
nerability, the K-means clustering method is employed mainly
for the reason that this method is flexible enough to separate fˆ02 = f Wm · f (WmM 2 ). (21)
M m =1
alternatives into any number of grades, while ensuring that the
alternatives in the same scale share the highest possible simi- V (Y ) is estimated using the Monte–Carlo integral. To im-
larities. For example, all components under assessment might proves the accuracy and stability of the integral, V (Y ) is esti-
be classified into one of four grades (1 = not vulnerable, 2 = mated using a 2M × N sample WmM 1 ,M 2 , which is obtained by
low level, 3 = medium level, 4 = high level) according to the combining M1 and M2 . The estimation value of V (Y ), denoted
general used standard of risk classification, as shown in Fig. 3. as V̂ (Y ), is estimated as [37]
Furthermore, the rankings and the variations of the vulnerabil-
1
2M
ity grades across different scenarios are visualized by Software V̂ (Y ) = f 2 WmM 1 ,M 2 − fˆ02 . (22)
ArcGIS for all components under assessment. 2(M − 1) m =1
84 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 63, NO. 1, FEBRUARY 2016
TABLE I
EXPERTS’ INTERVAL PREFERENCES AND THE AGGREGATED PROBABILITY
DISTRIBUTION
B. Results
Second, we need to estimate the value of ε. Equation (22) is
First of all, the criteria weights were calculated under a spe-
used to calculate the partial variance Vn by using another two
cific scenario ξ0 in consideration of the uncertainties associated
sample sets, {W∼nM1
m , Wn m } and {W∼n m , Wn m }. The sample
M2 M2 M1
with expert judgments. In the decision-making process, due to
set {W∼n m , Wn m } is the full samples of M1 except that the nth
M1 M2
the lack of historical data, the distribution type of the stochastic
column of matrix M1 is replaced by the nth column of matrix
comparison values is obtained in accordance with experts’ ex-
M2 , {W∼nM2
m , Wn m } is obtained in the same way. The estimate
M1
periences. In this case, the stochastic comparison values follow
value of Vn , denoted as V̂n (Y ), is calculated by
normal distribution and the significance level αk is assumed to
be 0.01 for each k. Then, the experts’ interval preferences were
1 M
M
V̂n (Y ) = f W∼n M2 translated into corresponding probability distributions by the in-
m , Wn m
1
(M − 1) m =1 terval estimation method. Next, using the method in Appendix
M A, the distributions of all experts were combined into an aggre-
·f W∼n2 M1
m , Wn m . (23) gated distribution. Take the comparison between susceptibility
and coping capacity as an example, the interval preferences
Finally, the estimation of Sn is calculated by (20). In real
given by four experts and the aggregated distribution are rep-
applications, the sensitivity analysis is performed |R| times,
resented in Table I. The corresponding matrix of the pairwise
one for each component r.
comparison is shown as
Fig. 6. Weighted vulnerability values of all components in the water supply system.
concentration increases by 1 × 105 /L−1 , the weight of indicator districts are shown in Fig. 8(b). As can be seen from Fig. 8(b), the
“response speed” decreases by 0.005. vulnerabilities of both Anting and Gaohang increase when the
Third, the vulnerability values under each scenario were sep- algae density is between 56 × 105 and 74 × 105 /L−1 , indicating
arated into four grades by K-means clustering. The results cor- that these two districts need more focused attention if the algae
responding to all scenarios, where the algae cell density varying density rises beyond 56 × 105 /L−1 .
from 50 × 105 to 100 × 105 /L−1 were calculated with four Finally, to determine the impact of each criterion on the
vulnerability maps: Average vulnerability grade (AVG), stan- uncertainty of vulnerability values, a sensitivity analysis was
dard deviation of AVG (STD), min grade, and max grade, as conducted using the global sensitivity analysis method. The
presented in Fig. 7(b)–(e). first-order sensitivity maps of six selected criteria are shown in
In accordance with both AVG and STD, the districts were Fig. 9, from which we are clear of the fractional contribution
categorized into two groups in terms of vulnerability, reliability, of each criterion to the variance of vulnerability grades. The
and unstable districts. For example, Fig. 7(f) was obtained by sensitivity maps are shown in Fig. 9. Using these maps, we can
combining Fig. 7(b) and (c), where the colors represent AVG and identify the contribution of a certain criterion to the vulnerability
the shadows highlight the unstable districts with high variations. of the district it describes.
With the help of the MIN and MAX maps, decision makers have The dominating criterion for each district could also been
a better understanding of how to prepare protections against the identified based on the sensitivity maps, as shown in Fig. 10.
worst scenarios most efficiently, thus making the system more Since “population density” is the dominating criterion for
reliable. most districts, we can conclude that the population booms
Fig. 8(a) shows the detailed variation trends in all evaluated in cities are putting great pressures on their water supply
districts under different scenarios; the variations of two specific system.
86 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 63, NO. 1, FEBRUARY 2016
Fig. 7. Results from the assessment simulation under different scenarios. (a) Grades under scenario ξ0 . (b) Average grads under all scenarios. (c) STD under all
scenarios. (d) Min grades under all scenario. (e) Max grades under all scenarios. (f) Unstable districts.
Fig. 8. Variations in the vulnerability grades for all districts under different scenarios. (a) Variations for all districts. (b) Variations for two specific districts.
Fig. 9. First-order sensitivity maps for the criteria. (a) Population density. (b) Scheduling capacity. (c) Alarming ability. (d) Tech-supporting ability. (e) Water
resources per capital. (f) Water usage per capita per year.
ZHANG et al.: STOCHASTIC ANP-GCE APPROACH FOR VULNERABILITY ASSESSMENT IN THE WATER SUPPLY SYSTEM 87
2) Assume that θr (ξ), θr (ξ) ∈ [Ēr (ξ), θro (ξ)] and θr (ξ)
> θr (ξ), then we have θr (ξ) ≥ λθr (ξ) + (1 − λ)θr (ξ) ≥
θr (ξ) for any 0 ≤ λ ≤ 1. Since the feasible region of
model (12)–(15) with θrt (ξ) = λθr (ξ) + (1 − λ)θr (ξ) will not
become smaller if θrt (ξ) = θr (ξ) and will not become larger if
θrt (ξ) = θr (ξ), we have
1 r ∗
Fig. A1. Main idea behind the aggregation of different PDFs.
wr n (θr (ξ))dr n (ξ)
up to 1. Finally, as experts are classified to three levels (authori- |R|
r ∈R n ∈N
tative, highly credible, and medium credible), the weight of each
1 r ∗
expert k is constrained to a corresponding interval [uk , ūk ], as ≤ wr n (λθr (ξ) + (1 − λ)θr (ξ))dr n (ξ)
represented in constraint (A.6). This nonlinear model is solved |R|
r ∈R n ∈N
by optimization tool in the software MATLAB R2013b. The 1 r ∗
resulted stochastic pairwise comparison matrix is as shown ≤ wr n (θr (ξ))dr n (ξ).
|R|
in (3). r ∈R n ∈N
1
APPENDIX B Therefore, |R | r ∈R
r ∗ t
n ∈N wrn (θ r (ξ))d rn (ξ) is semiconcave.
The traditional DEA game cross efficiency approach is used to
Based on Lemma 2 and Lemma 3, Theorem 1 indicates that
evaluate the efficiency of output to input, while for the original
the solution obtained from the proposed GCE approach is a
model, you may refer to the work of Liang et al. [31]. By
Nash equilibrium point.
assuming the inputs are 1 and limiting the criteria weights to an
Theorem
1: The r ∗ evaluation game Γ = R, (Sr )r ∈R ,
interval, the original efficiency evaluation model can be applied 1 t
|R |
r ∈R n ∈N w rn (θ r (ξ))d rn (ξ) has at least one Nash
as a weight calculation model (7)–((9), named GCE model. equilibrium strategy portfolio.
Define the evaluation process Γ = R, (Sr )r ∈R , |R1 | r ∈R
Proof: Define fr (θt−1 ) as
r ∗ t
n ∈N wr n (θr (ξ))dr n (ξ) as a weight determination game,
where Sr ={the constraints (12)–(15) and θrt (ξ) ∈ [Ēr (ξ),
θro (ξ)]} represents the strategy set of component r, r ∈ R. Liang 1 r ∗ t−1
fr (θt−1 ) = θrt (ξ) = wr n (θr (ξ))dr n (ξ) (B.1)
et al. have proved that DEA game has a Nash equilibrium solu- |R|
r ∈R n ∈N
tion. Based on their work, it is easy to prove that the solution of
GCE is a Nash Equilibrium solution. Let θ t = [θ1t , θ2t , . . . , θ|R
t
| ], t = 2, 3, 4 . . . , and define
Lemma 1: Model (12)–(15) is feasible if θro (ξ) ≥ θrt (ξ) ≥
Ēr (ξ) ∀r ∈ R, where θrt (ξ) is the average GCE value of com- F (θ t−1 ) = [F1 (θt−1 ), F2 (θt−1 ), . . . , F|R | (θt−1 )]T . (B.2)
ponent r at iteration t, Ēr (ξ) is the average cross evaluation
value defined in (11), and θro (ξ) is the original evaluation value Then, we have θ t = F (θ t−1 ), t ≥ 2. Next, we prove that for
calculated in model (7)–(9). the function F () defined in (B.2), there must exist a fixed point
Lemma 2: The strategy set of each component, denoted as θ ∗ , such that θ ∗ = F (θ ∗ ).
Sr (∀r ∈ R), is a nonempty convex sets. Lemma 2 indicates that the Cartesian product S of
Proof: According to Lemma 1, we have Sr is nonempty. Sr is a nonempty compact convex set and |R1 | r ∈R
Assume {[wr 1 (ξ), wr 2 (ξ), . . . wr N (ξ)], θr (ξ)} and {[wr 1 (ξ), r ∗ t−1
n ∈N wr n (θr (ξ))dr n (ξ), θr (ξ) ∈ Sr
t−1
is continuous.
wr 2 (ξ), . . . wr N (ξ)], θr (ξ)} ∈ Sr ∀r, r ∈ R. Then, for any Lemma 2 also indicates that F () : S → S is a continuous
0 ≤ λ ≤ 1, it is obtained that [λwr n (ξ) + (1 − λ)wr n (ξ), ∀n function from a nonempty compact convex set S ∈ RI into
∈ N ; λθr (ξ) + (1 − λ)θr (ξ)] ∈ Sr . According to the defini- itself. From Brouwer’s fixed-point theorem [40], there must
tion of convex set, Sr ∀r
∈ R is convex. exist θ ∗ = F (θ ∗ ) for some θ ∗ = [θ1∗ , θ2∗ , . . . , θ|R
∗ T
| ] ∈ S. Be-
Lemma 3: |R1 | r ∈R n ∈N wrr n∗ (θrt (ξ))dr n (ξ) is a contin- cause of the convergence of the approach, it terminates when
uous semiconcave function of θrt (ξ).
|θ (ξ) − θ (ξ)| = F (θ (ξ)) − θ (ξ) < ε, where ε is
t+1 t t−1 t−1
Proof: The proof isdivided to two parts, where part 1 very small. Therefore, the obtained solution is close to a fixed
proves that |R1 | r ∈R n ∈N wrr n∗ (θrt (ξ))dr n (ξ) is a contin-
point, which is a Nash equilibrium point. The corresponding
uous function of (θrt (ξ)), and part 2 proves that |R1 | r ∈R criteria weights are the Nash equilibrium weight determination
r ∗ t
n ∈N wr n (θr (ξ))dr n (ξ) is semiconcave. strategy.
ZHANG et al.: STOCHASTIC ANP-GCE APPROACH FOR VULNERABILITY ASSESSMENT IN THE WATER SUPPLY SYSTEM 89
Jian-Gang Jin received the Bachelor’s degree in Yuan Liu received the Bachelor’s degree in 2014.
civil engineering from Tsinghua University, Beijing, He is Ph.D. candidate at the Department of Electrical
China, in 2009, and the Ph.D. degree in civil and envi- and Computer Engineering, University of Alberta,
ronmental engineering from the National University Canada.
of Singapore, Singapore, in 2013. His current research interests include optimization
He is an Assistant Professor with the Depart- for networks and smart-grid operations.
ment of Ocean and Civil Engineering, Shanghai Jiao
Tong University, Shanghai, China. He has published
more than 30 referred papers in international journals
and conferences. His research interests include large-
scale modeling and optimization for transportation
and logistics systems.