Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

78 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 63, NO.

1, FEBRUARY 2016

A Stochastic ANP-GCE Approach for Vulnerability


Assessment in the Water Supply System
With Uncertainties
Chong Zhang, Xiao Liu, Jian-Gang Jin, and Yuan Liu

Abstract—Water supply systems around the world are becoming NOMENCLATURE


increasingly vulnerable as a consequence of rising climate insta- r Index of components under assessment, r ∈ R.
bility and the systems’ intrinsic complexity. Assessing the vulner- k Index of experts, k ∈ K.
ability of such systems is the primary and fundamental step for
mitigating the negative impacts of environmental incidents. There n Index of criteria, n ∈ N .
are two main challenges in this context. First, since water supply ξ Index of scenarios, ξ ∈ ψ.
systems are coupled with human-environment systems, the cor- dr n (ξ) Performance value of component r when it is evaluated
responding vulnerability assessment requires consideration of a in terms of criterion n under scenario ξ. The perfor-
host of multidimensional criteria in terms of the structures and mance vector of component r in terms of all criteria is
management. Second, due to the uncertain and dynamic nature
of environmental incidents, available information is not sufficient represented as dr (ξ) = [dr 1 (ξ), dr 2 (ξ), . . . , dr N (ξ)].
for experts to make accurate real-time judgments for the weights wr n (ξ) Weight of component r in terms of  criterion n under
of criteria. To the best of our knowledge, few weight calculation scenario ξ, where wr n (ξ) ∈ [0, 1], n ∈N wr n (ξ) =
approaches are able to deal with both uncertainties and subjec- 1. The weight vector concerning all criteria is denoted
tivities of experts’ judgments under varied scenarios of the inci- as wr (ξ) = [wr 1 (ξ), . . . , wr N (ξ)].
dent. These problems are solved by developing new assessment
approaches consisting of four steps: 1) developing an analytical Vr (ξ) Vulnerability value of component r under scenario ξ.
network process (ANP) criteria framework; 2) proposing a weight
calculation approach by integrating game cross evaluation with I. INTRODUCTION
stochastic ANP based on the proposed criteria framework; 3) cal-
ULNERABILITYis the degree to which a system, sub-
culating the weighted vulnerability values, rating and visualizing
the vulnerability grades accordingly; and 4) performing assess-
ment simulations and sensitivity analysis for possible scenarios. A
V system, or system component is likely to experience harm
due to exposure to a hazard [1]. As a result of resource de-
case study of the Shanghai water supply system demonstrates the pletion, climate change and ever-growing demands for water
effectiveness of the proposed approaches, which provides guides
for improvement of system performances based on the trends of
in recent years, several cities such as Shanghai and Singapore
variations in the vulnerability grades and the dominating criterion have become increasingly vulnerable with regard to ensuring
identified for each component. high-quality water supplies. For example, in Shanghai, algae
blooms and salt tides have become unusually common; thus,
Index Terms—Game cross evaluation (GCE), scenario based,
stochastic analytical network process (ANP), uncertainty, vulner- putting the quality of water supplied to some fourteen million
ability assessment. residents at great risk. The same is true for Singapore where
water supply is highly vulnerable because of its heavy reliance
on water imports from neighboring countries [2], [3]. Vulnera-
Manuscript received December 22, 2014; revised May 10, 2015 and October bility assessment is the process of identifying, quantifying, and
1, 2015; accepted November 13, 2015. Date of publication December 10, 2015; prioritizing (or ranking) the vulnerabilities in a system. It is gen-
date of current version January 18, 2016. This work was supported in part by erally acknowledged that an effective vulnerability assessment
the National Research Foundation Singapore under its Campus for Research
Excellence and Technological Enterprise and Research Foundation of China is critical in providing guidance for the preincident prevention
under Grant 14ZDB152 and Grant 91024013. Review of this manuscript was and improving the safety of systems [4]–[6].
arranged by Department Editor B. Jiang. Vulnerability assessment points to two main challenges.
C. Zhang is with the Department of Industry Engineering, Shanghai Jiao Tong
University, Shanghai 200240, China (e-mail: jennyzhang919@gmail.com). First, since water supply systems are coupled with human-
X. Liu is with the Department of Industry Engineering, Shanghai Jiao Tong environment systems, a host of multidimensional criteria should
University, Shanghai 200240, China, and also with the Department of Industrial be taken into account when assessing the vulnerability of such
and Systems Engineering, National University of Singapore, 119077 Singapore
(e-mail: x_liu@sjtu.edu.cn). systems (i.e., demographical, economic, environmental, and so-
J.-G. Jin is with the School of Naval Architecture, Ocean, and Civil Engineer- cial cultural, etc.), which constructs a complex criteria network
ing, and the State Key Laboratory of Ocean Engineering, Shanghai Jiao Tong with different weight values. Second, in view of the uncertain
University, Shanghai 200240, China (e-mail: jiangang.jin@sjtu.edu.cn).
Y. Liu is with the Department of Electrical and Computer Engineer- and dynamic natures of such a complex system, different ex-
ing, University of Alberta, Edmonton, AB T6G 2R3, Canada (e-mail: perts may give their own judgments based on their expertize,
yuan17@ualberta.ca). which makes it difficult gathering the experts’ options in order to
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org. make accurate real-time judgments with respect to the weights
Digital Object Identifier 10.1109/TEM.2015.2501651 of assessment criteria. To the best of our knowledge, current

0018-9391 © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications standards/publications/rights/index.html for more information.
ZHANG et al.: STOCHASTIC ANP-GCE APPROACH FOR VULNERABILITY ASSESSMENT IN THE WATER SUPPLY SYSTEM 79

weight calculation approaches are not able to resolve the uncer- been used to predict the impacts of observed stochastic events in
tainties and subjectivities associated with experts’ judgments natural disasters. However, most of these approaches encounter
under different incident scenarios (i.e., different intensities of insufficient historical data (such as the probabilities and magni-
emergencies arising under time-varying conditions). Therefore, tudes of incidents/disasters) in real-world applications [9]–[12].
more attention should be paid to improve the objectivity, dynam- The third stream is MCDM approaches, which have been
ics, and credibility of current weight calculation approaches in proposed over the last decades. The most popular MCDM ap-
vulnerability assessment. Aiming at addressing the above chal- proaches include weighted sum model (WSM), analytic hier-
lenges, this study develops new approaches for the dynamic archy process (AHP), ANP, technique for order of preference
multicriteria vulnerability assessment under different scenarios, by similarity to ideal solution (TOPSIS), and elimination and
including the formulation of criteria framework, determination choice expressing reality (ELECTRE) [13]. Among these ap-
of criteria weights, dynamic rating, visualization, and sensitiv- proaches, both AHP [14] and ANP [15] have been applied to
ity analysis. Among these processes, the most important is that the selection of alternatives; TOPSIS and ELECTRE have been
a stochastic weight determination approach, namely stochastic used for the ranking of alternatives [13]; and WSM [16], [17]
analytical network process-game cross evaluation (ANP-GCE), has been most commonly applied for the evaluation and classi-
is proposed to improve the deviations arising from the uncer- fication of alternatives, which is flexible in dealing with uncer-
tainties and inconsistencies of subjective preferences. tainties and dynamic situations in vulnerability assessment.
The main contributions of the proposed approaches are sum- In MCDM approaches, the determination of criteria weights
marized as follows. deserves more attention as it significantly affects the evalua-
1) An ANP-based criteria framework is constructed to in- tion results. Existing weight determination approaches could be
tegrate the multidimensional interdependent criteria for classified into two main groups, namely subjective approaches
vulnerability assessment. and objective approaches. The subjective approaches derive cri-
2) A stochastic dynamic multicriteria weight determination teria weights from experts’ judgments, among which the most
approach is proposed by combining the stochastic ANP widely used two approaches are AHP and ANP by Saaty [14],
with GCE approach, which is able to improve the devia- [15]. In the traditional AHP/ANP, experts are requested to make
tions of results caused by the uncertainties and subjectiv- linguistic pairwise comparisons for each pair of criteria of how
ities of experts’ judgments. many times one criterion is better or worse than the other one by
3) Dynamic assessment simulations and sensitivity analysis selecting a numerical scale from “1–9” or “1/9–1” [14]. How-
are performed to reveal how the vulnerability grade of ever, in many cases, the experts could not provide an exact num-
each component varies across scenarios, which fills in the ber for the relative importance of one criterion over another due
gap of dynamic vulnerability assessment. to the uncertainties. As a result, Saaty et al. have extended their
The remainder of this paper is organized as follows. Section II work to interval AHP/ANP [18], [19], fuzzy AHP/ANP [20]–
briefly reviews relevant literature. Section III presents the ANP- [22], stochastic AHP/ANP [23]–[25], and dynamic AHP/ANP
based criteria framework. Based on the framework, an integrated [26], [27]. It is obvious that such approach could only provide
weight calculation approach, namely stochastic ANP-GCE, is an interval weight estimate rather than an exact point estimate.
introduced in Section IV. Section V describes the scenario-based Fuzzy AHP/ANP approach describes uncertain comparison ra-
vulnerability assessment process and the associated sensitivity tios by triangular membership functions. The earliest work in
analysis approach. Section VI presents a case study and the fuzzy AHP appeared in Van Laarhoven and Pedrycz [20], and
related findings. Finally, Section VII concludes the paper and afterward, both Salo [21] and Leung and Cao [22] have tackled
suggests some directions for the future research. the issue of consistency in fuzzy comparison matrix. Although
fuzzy AHP/ANP is easier to perform, there are two main types
of criticism.
II. LITERATURE REVIEW 1) It is hard to get the fuzzy sets when there is not enough
To assess vulnerability, we summarize the existing ap- historical data.
proaches into three streams, which are network modeling, 2) It is difficult to address the issue of consistency in fuzzy
probabilistic analysis, and multiple-criteria decision-making comparison matrix.
(MCDM) approaches. Nevertheless, stochastic AHP/ANP assumes that the im-
The first stream is network modeling, which models the in- precise comparison ratios follow a probability distribution,
frastructure systems by networks, and measures the system vul- where the assumption is more reasonable and flexible com-
nerability by the efficiency of disrupted network or loss. This pared with the above two approaches (interval AHP/ANP and
method has been successfully applied for analyzing the inter- fuzzy AHP/ANP) in real applications [23]. Though extensive
dependencies and cascading failures of large-scale networks research has been proposed, two problems need to be solved in
(i.e., power, transportation systems, etc.) [7], [8]. Although the stochastic AHP/ANP.
approach can be widely applied to physical and organizational 1) These stochastic AHP/ANP models need to explore the
dimensions involved in vulnerability criteria, it hardly deals with use of other methodologies like linear programming and
the social and cultural dimensions. simulation to calculate the final weights. However, the ex-
The second stream is probabilistic analysis (e.g., Bayesian isting research either minimizes the consistency ratio us-
network, Markov Chain analysis, and Petri Net, etc.), which has ing a nonlinear programming, which may lead to a result
80 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 63, NO. 1, FEBRUARY 2016

deviated from subjective judgments [24], or maximizes IV. WEIGHT CALCULATION APPROACH FOR
the preferences of the experts, despite of their inconsis- VULNERABILITY ASSESSMENT
tency [25]. Based on the construction of criteria framework in Section
2) To the best of our knowledge, most of the literature uti-
III, an integrated weight calculation approach is developed,
lize a single distribution in their work, regardless of the
namely stochastic ANP-GCE, to cope with the uncertain pair-
situation that experts tends to have different types of com- wise comparisons, and the inconsistent subjective preferences
parisons.
of experts in the vulnerability assessment to improve traditional
The three approaches mentioned above are static, but situ-
ANP. Fig. 2 presents an overview of the proposed approach, and
ations in real cases may vary over time. To make reasonable the detailed steps of the proposed approach will be presented in
decisions, several researchers proposed dynamic AHP/ANP.
Sections IV-A and IV-B.
Satty [26] concluded three ways to deal with dynamic deci-
sions: changing the overall AHP structure at each time, altering
the paired comparison rate at each time, and using functions A. Steps of Stochastic ANP Approach
for paired comparisons. Moreover, Benitez et al. [27] proposed We first define the variables used in the weight calculation
a framework that allows users to provide partial or incomplete approach.
preference data at multiple times. Although these methods have Based on the WSM, the weighted vulnerability value of each
limitations in dealing with the dynamic problem, their work component r is expressed as (1), and steps of the stochastic
significantly enlightened us on solving the dynamic problem ANP-GCE approach are illustrated as follows:
of stochastic AHP/ANP. Regarding the objective approaches,
weights are derived through mathematical models, such as the Vr (ξ) = dr (ξ) · wr (ξ)T . (1)
maximum entropy approach [28], data envelope analysis (DEA)
Step 1: Make stochastic pairwise comparisons: In stochastic
[29], modified DEA such as fuzzy DEA and DEA game cross ef-
ANP, define aij as the stochastic pairwise comparison ratio
ficiency model [30], [31], and maximum alternatives’ deviation
when comparing criterion i with j, where i = j, i, j ∈ N . In
approach [32], etc. The advantage of these objective approaches
the group-decision environment, aij is obtained by integrating
is that none of them relies on the opinions of experts, which
the judgments of all experts k ∈ K, where the judgment of each
avoids the subjective effects on the results. However, as these
k is denoted as aij k . Differ from the traditional ANP, experts are
approaches fully depend on the structure of data and are totally
requested to give an interval of the relative importance due to
out of artificial intervention, the results may contradict with the
the dynamic environment and uncertain information, by giving
actual situations.
three numbers of minimum, best possibility, maximum, denoted
To address the above gaps, in this study, a vulnerabil-
as aij k , ãij k , āij k respectively.
ity assessment approach with dynamic weights is proposed
Given aij k , ãij k , āij k , we assume that aij k is a random vari-
considering the dynamic nature of environmental incidents. The
able that takes a set of possible values following a specific
proposed approach is able to eliminate static assessment limita-
probability distribution function (PDF), f (aij k ). To determine
tion and cope with subjectivities and uncertainties from the ex-
f (aij k ), we assume that the interval [akij , ākij ] is the 1 − αk
perts’ judgments by integrating a game theory-based approach
confidence interval of the probability distribution, where αk
GCE (which is proposed based on the game cross efficiency
is the significance level for the judgment of expert k. If his-
model) into stochastic ANP.
torical data or the experience of expert k is sufficient enough
to determine the type of probability distribution (e.g., normal,
beta, etc.), then f (aij k ) is determined by the data driven esti-
III. CRITERIA FRAMEWORK FOR VULNERABILITY ASSESSMENT mation method; otherwise, f (aij k ) is determined by requesting
for experts’ opinions. Note that the significance interval of each
In this section, we first select the assessment criteria and iden-
expert k is chosen based on the reliability and credibility of
tify the relationships among them from the related human-social
the expert. In real cases, we classify the experts to three levels,
environment systems, then an ANP-based criteria framework is
which are authoritative, highly credible, and medium credible
developed, as shown in Fig. 1.
based on their credibility and professionalism in their field, then
In the framework, the first layer represents the goal of the
the significance level of each expert is determined accordingly.
vulnerability assessment, and the second layer consists of three
In the context of group-decision making, f (aij ) is defined as
determinates including exposure, susceptibility, and coping ca-
an distribution integrated by f (aij k ) for all k ∈ K, and given
pacity according to the internal and external origins of vul-
by a weighted sum of f (aij k )
nerability [33]–[36]. In the third layer, criteria is selected for
each determinant on the basis of six clusters related to the 
f (aij ) = uk f (aij k ) ∀i, j ∈ N, i = j (2)
human-social-environment systems: demographical, organiza-
k ∈K
tional, environmental, economic, system of infrastructures, and
social cultural, namely DO-E2 S2 . The number of criteria in each where uk represents the weight of expert k. A nonlinear pro-
cluster is selected by experts according to the real-time cases, gramming model is proposed to obtain uk , and the detailed in-
where interdependencies exist between criteria not only in dif- formation of this aggregation method is presented in Appendix
ferent layers but also within the same layer. A. The structure of the distributed pairwise matrix is shown as
ZHANG et al.: STOCHASTIC ANP-GCE APPROACH FOR VULNERABILITY ASSESSMENT IN THE WATER SUPPLY SYSTEM 81

Fig. 1. DO-E2 S2 criteria framework for vulnerability assessment.

Fig. 2. Process of the stochastic ANP-GCE approach.

follows: âij is a random value generated according to f (aij )


⎡ ⎤
⎡ ⎤ 1 â12 · · · â1N
1 f (a12 ) ··· f (a1N ) ⎢ ⎥
⎢ â21 1 · · · â2N ⎥
⎢ ⎥  ⎢ ⎥
⎢ 1/f (1a12 ) 1 ··· f (a2N ) ⎥ A = ⎢. .. .. ⎥ . (4)
⎢ ⎥ ⎢ ..
A=⎢ .. .. .. ⎥. (3) ⎣ . âij . ⎥

⎢ ⎥
⎣ . . f (aij ) . ⎦ âN 1 âN 2 · · · 1
1/f (a1N ) 1/f (a2N ) ··· 1
In order to assure the effectiveness of the sample set, we calcu-
late the compatibility rates for each sample matrix and abandon
Step 2: Generate samples based on the stochastic pairwise those unable to pass the inconsistency test. The compatibility
matrices: Considering the difficulty of calculating weights for rates is calculated by the Saaty’s approach and it should be
stochastic pairwise comparisons in ANP, Monte–Carlo method smaller than 0.1 [15]. Note that the optimal sample size for the
is employed to simulate the stochastic pairwise comparisons. A Monte-Carlo simulation, denoted as ns , is calculated based on
sample set is generated according to the aggregated comparison the desired accuracy of the resulting estimates. According to
matrix and then it is used to simulate the ANP results. The the central limit theorem, for each stochastic variable, we have
structure of a sample in terms of matrix A is shown as A , where / n s ≤ z) → Φ(z). To guarantee P (μ̂ − μ̄ ≤ ε) = Φ(z)
P ( σμ̂−μ̄

82 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 63, NO. 1, FEBRUARY 2016

for each stochastic variable, we have Let t be the iteration index, and start from t = 1. At this

−1 2 iteration, we obtain an optimal weight vector vector wr∗n (ξ)
ns ≥ max
Φ (z)σij
(5) for each component r, where wr∗n (ξ) = [wr∗1 (ξ), . . . , wr∗N (ξ)].
i,j ∈N ε To enhance the fairness of the assessment, we calculate the
cross vulnerability value for any component r (r ∈ R) using
where σij is the standard deviation of distribution f (aij ). Thus,
the optimal weight vector of other components, wr∗n (ξ) (r ∈
the sample size is dependent on the acceptable level of ε and
R). This cross evaluation value of r using wr∗n (ξ)(∀r ∈ R) is
Φ(z).
defined as Er r  (ξ), which is determined as
Step 3: Calculate the weights for all samples by ANP and ag- 
gregate the results: For each sample, we use the traditional ANP Er r  (ξ) = wr∗n (ξ)dr  n (ξ) ∀r, r ∈ R. (10)
to determine the criteria weights. Then, based on the statistical n ∈N
analysis of the weights in all samples, we could determine an
confidence interval for the weight in terms of criterion n, which Next, Ēr  (ξ), the average of Er r  (ξ) concerning all alternative
is suitable for all components, as shown in r is calculated as

wr n ∈ [wn (ξ), w̄n (ξ)] ∀r ∈ R, n ∈ N. (6) 1 


Ēr  (ξ) = Er r  (ξ) ∀r ∈ R (11)
|R|
The obtained interval [wn (ξ), w̄n (ξ)] is a 1 − β confidence r ∈R
interval of the statistical results where β is the significance level where |R| denotes the number of components in set R.
of the samples determined by experts. The intervals are used as Now let θrt  (ξ) be an average GCE value of component r at
constraints for wr n in the following GCE approach. iteration t, and the initial value takes θ1 r  (ξ) = Ēr  (ξ)(∀r ∈
R). Then, we suppose that in a game sense, one component r is
B. Steps of the GCE Approach given an evaluation value θrt  (ξ), and another component r could
In this section, to decrease the deviations caused by the un- maximize its own evaluation value only under the constraint that
certainties and subjectivities of stochastic ANP approach, the θrt  (ξ) cannot be decreased. Based on this manner, a new model
GCE approach is proposed to determine the weights specific named the GCE model is proposed in step 5.


to each component based on the work of Liang et al. [31]. By Step 5: Iterate the GCE: Define wrr n (ξ) as the weight of r
integrating the GCE approach into stochastic ANP, the Nash under scenario ξ in terms of criterion n subject to the condition
Equilibrium assessment results are obtained, which offers the that it will not deteriorate the currently average GCE value of
best suggestions for city mangers with regard to the protection component r , θrt  (ξ). Then, the GCE model is shown as
resource allocation among these vulnerable alternatives. The  
proof of the Nash equilibrium solution is stated in Appendix B. Max wrr n (ξ)dr n (12)
The detailed steps include step 4, step 5, and step 6. n ∈N
Step 4: Propose and solve the basic weight calculation model:  

By GCE approach, we could obtain a final weight vector specific s.t. wrr n (ξ) = 1 (13)
n ∈N
for each component, and the weight of component r in terms
 
of criterion n is denoted as wr n (ξ). For each component r, we wrr n (ξ)dr  n (ξ) ≥ θrt  (ξ) (14)
propose a linear model to calculate wr n (ξ)(∀n ∈ N ) under the n ∈N
constraint of weight interval calculated by the stochastic ANP 

approach wrr n (ξ) ∈ [wn (ξ), w̄n (ξ)] ∀n ∈ N. (15)


 Similar to model (7)–(9), the objective function (12) max-
Max wr n (ξ)dr n (7) imizes the evaluation value of component r, constraint (13)
n ∈N
 guarantees the weights of all criteria sum up to 1, and constraint
s.t. wr n (ξ) = 1 (8) (15) defines the lower and upper bounds of the weights. Differ
n ∈N from the model (7)–(9), constraint (14) is added to the model to
guarantee the updated criteria weights of component r do not
wr n ∈ [wn (ξ), w̄n (ξ)] ∀n ∈ N. (9)
impair do not impair the average GCE value of r .
In the GCE approach, all components under assessment are For each component r, the new model is solved for |R| times,
viewed as competitors and the allocation of protection resources once for each r ∈ R. Then, update θrt (ξ) by
is positively related to the vulnerability values. To secure more
protection resources, each component under assessment takes 1   r ∗ t
θrt+1 (ξ) = wr n (θr  (ξ))dr n (ξ) ∀r ∈ R (16)
a noncooperative stance in an attempt to maximize its worst |R| 
r ∈R n ∈N
possible vulnerability value. Thus, objective function (7) max-

imizes the vulnerability value of each component r, constraint where wrr n∗ (θrt  (ξ)) represents the optimal value of model (12)–
(8) guarantees that the weights of all criteria sum up to 1, while (15).
constraint (9) defines the lower and upper bounds of the weights Step 6: Determine the end condition and optimal solution:
determined by stochastic ANP. Let t = t + 1 and denote ε as an expected small positive value.
ZHANG et al.: STOCHASTIC ANP-GCE APPROACH FOR VULNERABILITY ASSESSMENT IN THE WATER SUPPLY SYSTEM 83

t

t θr (ξ) −t−1
If ≥ ε for any r, return to step 5; else if
θrt−1 (ξ)
θr (ξ) − θr (ξ) ≺ ε for all r, it indicates that the result has
converged, then stop the iteration. θrt (ξ) is the final Nash Equi-
librium vulnerability value of component r, which means that
component r can receive no increment on the vulnerability value
Fig. 3. Ranking and visualization of vulnerability.
from changing its criteria weights if the criteria weights of other
components remain constant. The criteria weights of r is repre-
sented as C. Sensitivity Analysis of Vulnerability
To improve the performance of each component under assess-
1  r  ∗ t−1
wr∗n (ξ) = wr n (θr  (ξ)) ∀r ∈ R, ∀n ∈ N. (17) ment, a sensitivity analysis is performed to find the criterion that
|R|  is most influential to the vulnerability variability of this compo-
r ∈R
nent. Define the fractional contribution of a given criterion wn
to the variance of the vulnerability rank of one component as
V. SCENARIO-BASED VULNERABILITY ASSESSMENT
the sensitivity index, denoted as Sn . Criterion with the highest
A. Calculation of Weights under Different Scenarios sensitivity index has the greatest impact on the corresponding
variability of vulnerability value. In this study, to deal with the
In view of the dynamic natures of incidents, vulnerability
nonlinear and nonmonotonic ranking process, the global sensi-
assessment is performed under all potential disaster scenarios.
tivity analysis method proposed by Sobol [37], [38] was selected
It is difficult for experts to calculate the criteria weights un-
to perform the sensitivity analysis.
der all scenarios using stochastic ANP-GCE. Therefore, while
In the vulnerability assessment process, define function f (·)
determining the scenario-based weights, some relationships be-
as the proposed ranking process, then the vulnerability rank Y
tween the criteria weights and the varied scenarios are defined
of one component is described as
in accordance with the real cases.
Define the variance between two scenarios as Δ, and define Y = f (w1 , w2 . . . , wN ) . (19)
the corresponding variance of weight of component r in terms
According to Sobol’s sensitivity analysis method, the sensi-
of criterion n as wr n (Δ). By the previous stochastic ANP-GCE
tivity index Sn could be estimated by
approach, we have obtained the optimal weight vector for each
component under scenario ξ, denoted as wr∗ (ξ). Then, for any Vn (Y )
Sn = (20)
possible scenario ξ  = ξ + Δ(ξ  ∈ ψ), we have V (Y )
where V (Y ) represents the total variance of vulnerability rank
wr n (ξ  ) = wr∗n (ξ) + wr n (Δ). (18) Y under the changes of weights of all criteria, and Vn (Y ) rep-
resents the variance of Y when wn changes alone. To deal with
After normalization for all criteria weights, we obtain the the nonlinear ranking process, Sobol’s quasi-random sampling
final weight vector wr∗n (ξ  ) under scenario ξ  . method is selected to estimate V (Y ) and Vn (Y ). The first step
is to generate two independent samples M1 and M2 , both of
B. Ranking and Visualization of Vulnerability which are M × N matrices, where M is the sample size and
N is the number of criteria. The sample size M is determined
By the previous processes, we have obtained the vulnerabil- based on the central limit theorem, as the same way in step 2
ity value for each component under assessment, in this section, (see Section IV-A).
to make the assessment results more intuitively understand- To obtain Sn , first we need to estimate the values of Vn (Y )
able, and all components under assessment are classified into and V (Y ), respectively, then Sn is calculated by (20). Let’s
specific numbers of grades. The classification should be per- first estimate the value of V (Y ). To estimate V (Y ), we should
formed according to the relative vulnerability values rather than estimate the expectation value of Y first, denoted as f0 . Define
the absolute values, so that the decision makers could obtain WmM 1 and WmM 2 as the mth sample of M1 and M2 , respectively,
the relative vulnerability grade of each component to support then the estimation value of the square of f0 , denoted as fˆ02 ,
the subsequent resource allocation and decision making. To could be estimated using
realize such classification from the perspective of relative vul-
1  M1 
M
nerability, the K-means clustering method is employed mainly
for the reason that this method is flexible enough to separate fˆ02 = f Wm · f (WmM 2 ). (21)
M m =1
alternatives into any number of grades, while ensuring that the
alternatives in the same scale share the highest possible simi- V (Y ) is estimated using the Monte–Carlo integral. To im-
larities. For example, all components under assessment might proves the accuracy and stability of the integral, V (Y ) is esti-
be classified into one of four grades (1 = not vulnerable, 2 = mated using a 2M × N sample WmM 1 ,M 2 , which is obtained by
low level, 3 = medium level, 4 = high level) according to the combining M1 and M2 . The estimation value of V (Y ), denoted
general used standard of risk classification, as shown in Fig. 3. as V̂ (Y ), is estimated as [37]
Furthermore, the rankings and the variations of the vulnerabil-
1 
2M

ity grades across different scenarios are visualized by Software V̂ (Y ) = f 2 WmM 1 ,M 2 − fˆ02 . (22)
ArcGIS for all components under assessment. 2(M − 1) m =1
84 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 63, NO. 1, FEBRUARY 2016

TABLE I
EXPERTS’ INTERVAL PREFERENCES AND THE AGGREGATED PROBABILITY
DISTRIBUTION

Index of Expert Interval Preference (μ, σ )

1 [2, 5] (3.5, 0.5814)


2 [3.5, 5.5] (4.5, 0.3876)
3 [3, 4] (3.5, 0.1938)
4 [2.5, 5.5] (4, 0.5814)
Aggregated Distribution f = N (3.6201, 0.4406)

collected from Shanghai Statistical Yearbook, Shanghai Water


Report, and information provided by water supply experts.
Fig. 4. Water supply system for districts afflicted by algal blooms in Shanghai.

B. Results
Second, we need to estimate the value of ε. Equation (22) is
First of all, the criteria weights were calculated under a spe-
used to calculate the partial variance Vn by using another two
cific scenario ξ0 in consideration of the uncertainties associated
sample sets, {W∼nM1
m , Wn m } and {W∼n m , Wn m }. The sample
M2 M2 M1
with expert judgments. In the decision-making process, due to
set {W∼n m , Wn m } is the full samples of M1 except that the nth
M1 M2
the lack of historical data, the distribution type of the stochastic
column of matrix M1 is replaced by the nth column of matrix
comparison values is obtained in accordance with experts’ ex-
M2 , {W∼nM2
m , Wn m } is obtained in the same way. The estimate
M1
periences. In this case, the stochastic comparison values follow
value of Vn , denoted as V̂n (Y ), is calculated by
normal distribution and the significance level αk is assumed to
be 0.01 for each k. Then, the experts’ interval preferences were
1  M
M 
V̂n (Y ) = f W∼n M2 translated into corresponding probability distributions by the in-
m , Wn m
1
(M − 1) m =1 terval estimation method. Next, using the method in Appendix
M  A, the distributions of all experts were combined into an aggre-
·f W∼n2 M1
m , Wn m . (23) gated distribution. Take the comparison between susceptibility
and coping capacity as an example, the interval preferences
Finally, the estimation of Sn is calculated by (20). In real
given by four experts and the aggregated distribution are rep-
applications, the sensitivity analysis is performed |R| times,
resented in Table I. The corresponding matrix of the pairwise
one for each component r.
comparison is shown as

VI. CASE STUDY ⎡ Exposure Susceptibiliy Coping Capacity⎤


1
A. Background ⎢ 1 N (2.90, 0.45)
⎢ N (3.62, 0.44) ⎥

Located at the mouth of the Yangtze River of the east Chinese A= ⎢ ⎢ ⎥
1 ⎥.
coast, Shanghai is a city known for the abundance of its water ⎢ N (3.62, 0.44) 1 ⎥
⎢ N (5.58, 0.42) ⎥
resources; yet, it is facing many threats that could severely seri- ⎣ ⎦
1
ously affect the drinking water supply. One of the most serious N (2.90,0.45) N (5.58, 0.42) 1
threats is from the blue-green algae blooms. The blue-green al- (24)
gae can severely contaminate water supply with the production In this case, 5000 samples were generated according to the
of natural toxins and mechanical damage; thus, threatening the stochastic comparison matrices, where each sample corresponds
health conditions of the millions of residents in affected districts. to a set of weights calculated by stochastic ANP. Here, β (the
The districts most suffering from algal blooms in Shanghai are significance level of the samples) is determined to be 0.01 and
indicated in Fig. 4. The green dot is Chenhang Reservoir and the corresponding lower and upper bounds of the criteria weights
pollution is spread over several other districts via the water are illustrated in Fig. 5.
supply network. Second, the GCE model was formulated by taking the in-
In order to enhance the water system’s reliability against algae tervals of criteria weights as constraints and solved using the
blooms, we assessed the vulnerability of the districts indicated software MATLAB, R2013b. As a result, the Nash Equilibrium
in Fig. 4 and provided guidelines for the protection measures criteria weights for each district under assessment were obtained
according to the results. As the intensity of the algae bloom and the weighted vulnerability values were calculated accord-
varies significantly with external conditions, the vulnerability ingly, as shown in Fig. 6. The criteria weights of all components
also varies accordingly. In this case, 21 criteria were considered under assessment are not presented for the sake of brevity.
and four experts were selected. The scenario-based stochastic Since the vulnerability varies across scenarios, the criteria
ANP-GCE model was applied to the determination of crite- weights under each scenario were calculated on the basis of
ria weights. During the assessment, all the data involved were the weights determined for scenario ξ. In this case, when algae
ZHANG et al.: STOCHASTIC ANP-GCE APPROACH FOR VULNERABILITY ASSESSMENT IN THE WATER SUPPLY SYSTEM 85

Fig. 5. Confidence intervals of criteria weights obtained by stochastic ANP.

Fig. 6. Weighted vulnerability values of all components in the water supply system.

concentration increases by 1 × 105 /L−1 , the weight of indicator districts are shown in Fig. 8(b). As can be seen from Fig. 8(b), the
“response speed” decreases by 0.005. vulnerabilities of both Anting and Gaohang increase when the
Third, the vulnerability values under each scenario were sep- algae density is between 56 × 105 and 74 × 105 /L−1 , indicating
arated into four grades by K-means clustering. The results cor- that these two districts need more focused attention if the algae
responding to all scenarios, where the algae cell density varying density rises beyond 56 × 105 /L−1 .
from 50 × 105 to 100 × 105 /L−1 were calculated with four Finally, to determine the impact of each criterion on the
vulnerability maps: Average vulnerability grade (AVG), stan- uncertainty of vulnerability values, a sensitivity analysis was
dard deviation of AVG (STD), min grade, and max grade, as conducted using the global sensitivity analysis method. The
presented in Fig. 7(b)–(e). first-order sensitivity maps of six selected criteria are shown in
In accordance with both AVG and STD, the districts were Fig. 9, from which we are clear of the fractional contribution
categorized into two groups in terms of vulnerability, reliability, of each criterion to the variance of vulnerability grades. The
and unstable districts. For example, Fig. 7(f) was obtained by sensitivity maps are shown in Fig. 9. Using these maps, we can
combining Fig. 7(b) and (c), where the colors represent AVG and identify the contribution of a certain criterion to the vulnerability
the shadows highlight the unstable districts with high variations. of the district it describes.
With the help of the MIN and MAX maps, decision makers have The dominating criterion for each district could also been
a better understanding of how to prepare protections against the identified based on the sensitivity maps, as shown in Fig. 10.
worst scenarios most efficiently, thus making the system more Since “population density” is the dominating criterion for
reliable. most districts, we can conclude that the population booms
Fig. 8(a) shows the detailed variation trends in all evaluated in cities are putting great pressures on their water supply
districts under different scenarios; the variations of two specific system.
86 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 63, NO. 1, FEBRUARY 2016

Fig. 7. Results from the assessment simulation under different scenarios. (a) Grades under scenario ξ0 . (b) Average grads under all scenarios. (c) STD under all
scenarios. (d) Min grades under all scenario. (e) Max grades under all scenarios. (f) Unstable districts.

Fig. 8. Variations in the vulnerability grades for all districts under different scenarios. (a) Variations for all districts. (b) Variations for two specific districts.

Fig. 9. First-order sensitivity maps for the criteria. (a) Population density. (b) Scheduling capacity. (c) Alarming ability. (d) Tech-supporting ability. (e) Water
resources per capital. (f) Water usage per capita per year.
ZHANG et al.: STOCHASTIC ANP-GCE APPROACH FOR VULNERABILITY ASSESSMENT IN THE WATER SUPPLY SYSTEM 87

allocation, urban planning, and emergency response. First,


the proposed approach can be used to identify the most vul-
nerable districts under a range of possible scenarios and the
dominating criteria for different districts base on ArcGIS, and
gives an improvement direction. Second, the proposed stochastic
ANP-GCE is capable of handling the uncertainties and incon-
sistencies of expert opinions. Finally, the use of ArcGIS helps
to visualize vulnerabilities and sensitivities spatially, thus mak-
ing the decision process more intuitive. Moreover, the criteria
weights constituting Nash Equilibrium points that determined
Fig. 10. Dominating criterion for the vulnerability variations in each district.
by GCE improve the objectivity of stochastic ANP.
C. Discussions A promising direction for future research is to develop a
dynamic and optimization-based multicriteria assessment ap-
The proposed stochastic ANP-GCE approach provides a
proach that takes the allocation of protection resources into con-
novel way for handling group decision making with uncertain
sideration. Using such a dynamic assessment approach, decision
pairwise comparisons. Compared with existing approaches, the
makers can identify the vulnerability mitigation effects of dif-
advantages of the proposed weight determination approach in
ferent resource allocation strategies and accordingly select the
this study can be summarized as three aspects.
best strategy.
1) The proposed approach is capable of transforming the
varying linguistic preferences of experts to any kind of
APPENDIX A
probability distribution, which is flexible in real appli-
DISTRIBUTION AGGREGATION APPROACH
cations comparing with exiting stochastic MCDM ap-
proaches. The aggregated distribution is obtained using a nonlinear op-
2) To avoid the subjective rankings of experts, the proposed timization model, which is first propose by Liu et al. [39]. The
nonlinear programming model combines the inconsistent idea is to maximize the sum of overlapping areas between the
preferences of different experts into an aggregated proba- aggregated probability distribution and each expert’s probability
bility distribution. distribution (see Fig. A1).
3) In most existing stochastic AHP/ANP approaches, the Let f (aij k ) be the PDF of one element aij in pairwise com-
precise global criteria weights are usually generated by parison matrix from expert k, ∀k ∈ K, and f (aij ) be the ag-
maximizing the preferences of experts or minimizing the gregated distribution. Then, f (aij ) is represented as
consistency ratio for pairwise comparisons; however, the 
f (aij ) = uk f (aij k ) ∀i, j ∈ N, i = j (A.1)
weights generated by these kind of approaches are still
k ∈K
quite subjective.
To decrease the deviations caused by uncertain subjective where uk (∀k ∈ K) is the weight of individual expert k. To ob-
preferences, the proposed approach incorporates the GCE ap- tain f (aij ), we have to optimize uk by a nonlinear optimization
proach with the stochastic ANP. As a result, the Nash Equilib- model.
rium assessment results are obtained, which provides reasonable Define Sk be the overlapping area between f (aij k ) and
suggestions for decision makers to optimize the resource alloca- f (aij ), then Sk is calculated as
tion among these vulnerable alternatives in their infrastructure  +∞ 
system. Sk = min(f (aij k ), uk f (aij k )) ∀k ∈ K. (A.2)
−∞ k ∈K
VII. CONCLUSION Based on the manner of maximizing the overlapping area, the
This paper has presented a stochastic multicriteria assess- optimization model can be set up as
ment approach that calculates and ranks the vulnerability of    +∞ 
each component. The proposed assessment approach has been Max Sk = min(f (aij k ), uk f (aij k ))
k ∈K k ∈K −∞ k ∈K
developed by applying the stochastic ANP-GCE weight calcu-
lation approach, which is able to deal with uncertainties in the (A.3)
real cases. This approach is specifically efficient when experts 
are unable to give precise values for pairwise comparisons or s.t. f (aij ) = uk f (aij k ) (A.4)
k ∈K
the criteria weights change with scenarios. The feasibility of the 
proposed approach has been tested through a case study of the uk = 1 (A.5)
Shanghai water supply system. Although the approach is moti- k ∈K
vated by vulnerability assessment, it has potential applications
uk ∈ [uk , ūk ], ∀k ∈ K (A.6)
in that kind of assessment problems constructed by the ANP
frameworks. where (A.3) maximizes the sum of overlapping area, constraint
The results led to the following observations, which are (A.4) defines the PDF of the aggregated distribution and con-
clearly valuable to decision makers concerned with resource straint (A.5) defines that the weights of all expert’ opinions sum
88 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 63, NO. 1, FEBRUARY 2016

1) Lemma 1 indicates that model (12)–(15) is equal to model


(7)–(9) if θrt  (ξ) < Ēr  (ξ) and is infeasible if θrt  (ξ) > θro (ξ). If
θrt  (ξ) ∈ [Ēr  (ξ), θro (ξ)], model (12)–(15) is obtained by adding
constraint (14) into the original model (7)–(9). Based on the
sensitivity
 analysis  of linear programming, itcan be shown
r ∗ t 
that r  ∈R n ∈N wr n (θr  (ξ))dr n (ξ), r ∈ R are continuous
functions of θr  (ξ) if θr  (ξ) ∈ [Ēr  (ξ), θr  (ξ)].
t t o

2) Assume that θr  (ξ), θr (ξ) ∈ [Ēr  (ξ), θro (ξ)] and θr  (ξ)
> θr (ξ), then we have θr  (ξ) ≥ λθr  (ξ) + (1 − λ)θr (ξ) ≥
θr (ξ) for any 0 ≤ λ ≤ 1. Since the feasible region of
model (12)–(15) with θrt  (ξ) = λθr  (ξ) + (1 − λ)θr (ξ) will not
become smaller if θrt  (ξ) = θr  (ξ) and will not become larger if
θrt  (ξ) = θr (ξ), we have
1   r  ∗ 
Fig. A1. Main idea behind the aggregation of different PDFs.
wr n (θr  (ξ))dr n (ξ)
up to 1. Finally, as experts are classified to three levels (authori- |R| 
r ∈R n ∈N
tative, highly credible, and medium credible), the weight of each
1   r ∗ 
expert k is constrained to a corresponding interval [uk , ūk ], as ≤ wr n (λθr  (ξ) + (1 − λ)θr (ξ))dr n (ξ)
represented in constraint (A.6). This nonlinear model is solved |R| 
r ∈R n ∈N
by optimization tool in the software MATLAB R2013b. The 1   r ∗ 
resulted stochastic pairwise comparison matrix is as shown ≤ wr n (θr  (ξ))dr n (ξ).
|R| 
in (3). r ∈R n ∈N

1

APPENDIX B Therefore, |R | r  ∈R
 r ∗ t
n ∈N wrn (θ r (ξ))d rn (ξ) is semiconcave.
The traditional DEA game cross efficiency approach is used to
Based on Lemma 2 and Lemma 3, Theorem 1 indicates that
evaluate the efficiency of output to input, while for the original
the solution obtained from the proposed GCE approach is a
model, you may refer to the work of Liang et al. [31]. By
Nash equilibrium point.
assuming the inputs are 1 and limiting the criteria weights to an
Theorem
 1: The r  ∗ evaluation game Γ = R, (Sr )r ∈R ,
interval, the original efficiency evaluation model can be applied 1 t
|R | 
r ∈R n ∈N w rn (θ r  (ξ))d rn (ξ) has at least one Nash
as a weight calculation model (7)–((9), named GCE model.  equilibrium strategy portfolio.
Define the evaluation process Γ = R, (Sr )r ∈R , |R1 | r  ∈R
 Proof: Define fr (θt−1 ) as
r ∗ t
n ∈N wr n (θr  (ξ))dr n (ξ) as a weight determination game,
where Sr ={the constraints (12)–(15) and θrt  (ξ) ∈ [Ēr  (ξ),
θro (ξ)]} represents the strategy set of component r, r ∈ R. Liang 1   r  ∗ t−1
fr (θt−1 ) = θrt (ξ) = wr n (θr  (ξ))dr n (ξ) (B.1)
et al. have proved that DEA game has a Nash equilibrium solu- |R| 
r ∈R n ∈N
tion. Based on their work, it is easy to prove that the solution of
GCE is a Nash Equilibrium solution. Let θ t = [θ1t , θ2t , . . . , θ|R
t
| ], t = 2, 3, 4 . . . , and define
Lemma 1: Model (12)–(15) is feasible if θro (ξ) ≥ θrt (ξ) ≥
Ēr (ξ) ∀r ∈ R, where θrt (ξ) is the average GCE value of com- F (θ t−1 ) = [F1 (θt−1 ), F2 (θt−1 ), . . . , F|R | (θt−1 )]T . (B.2)
ponent r at iteration t, Ēr (ξ) is the average cross evaluation
value defined in (11), and θro (ξ) is the original evaluation value Then, we have θ t = F (θ t−1 ), t ≥ 2. Next, we prove that for
calculated in model (7)–(9). the function F () defined in (B.2), there must exist a fixed point
Lemma 2: The strategy set of each component, denoted as θ ∗ , such that θ ∗ = F (θ ∗ ).
Sr (∀r ∈ R), is a nonempty convex sets. Lemma 2 indicates that the Cartesian product S of
Proof: According to Lemma 1, we have Sr is nonempty. Sr is a nonempty compact convex set and |R1 | r  ∈R
Assume {[wr  1 (ξ), wr  2 (ξ), . . . wr  N (ξ)], θr (ξ)} and {[wr 1 (ξ),  r  ∗ t−1
n ∈N wr n (θr  (ξ))dr n (ξ), θr  (ξ) ∈ Sr
t−1
is continuous.
wr 2 (ξ), . . . wr N (ξ)], θr (ξ)} ∈ Sr ∀r, r ∈ R. Then, for any Lemma 2 also indicates that F () : S → S is a continuous
0 ≤ λ ≤ 1, it is obtained that [λwr  n (ξ) + (1 − λ)wr n (ξ), ∀n function from a nonempty compact convex set S ∈ RI into
∈ N ; λθr  (ξ) + (1 − λ)θr (ξ)] ∈ Sr . According to the defini- itself. From Brouwer’s fixed-point theorem [40], there must
tion of convex set, Sr ∀r 
∈ R is convex. exist θ ∗ = F (θ ∗ ) for some θ ∗ = [θ1∗ , θ2∗ , . . . , θ|R
∗ T
 | ] ∈ S. Be-
Lemma 3: |R1 | r  ∈R n ∈N wrr n∗ (θrt  (ξ))dr n (ξ) is a contin- cause of the convergence of the approach, it terminates when

uous semiconcave function of θrt  (ξ).
|θ (ξ) − θ (ξ)| = F (θ (ξ)) − θ (ξ) < ε, where ε is
t+1 t t−1 t−1
Proof: The proof  isdivided  to two parts, where part 1 very small. Therefore, the obtained solution is close to a fixed
proves that |R1 | r  ∈R n ∈N wrr n∗ (θrt  (ξ))dr n (ξ) is a contin-
 point, which is a Nash equilibrium point. The corresponding
uous function of (θrt  (ξ)), and part 2 proves that |R1 | r  ∈R criteria weights are the Nash equilibrium weight determination
 r ∗ t
n ∈N wr n (θr  (ξ))dr n (ξ) is semiconcave. strategy.
ZHANG et al.: STOCHASTIC ANP-GCE APPROACH FOR VULNERABILITY ASSESSMENT IN THE WATER SUPPLY SYSTEM 89

ACKNOWLEDGMENT [25] R. Banuelas and J. Antony, “Application of stochastic analytic hierarchy


process within a domestic appliance manufacturer,” J. Oper. Res. Soc.,
The authors would like to thank anonymous referees and the vol. 58, no. 1, pp. 29–38, Mar. 2006.
editor for their constructive comments. [26] T. L. Saaty, “Time dependent decision-making; dynamic priorities in the
AHP/ANP: Generalizing from points to functions and from real to com-
plex variables,” Math. Comput. Model., vol. 46, nos. 7/8, pp. 860–891,
Oct. 2007.
[27] J. Benı́tez, X. Delgado-Galván, J. Izquierdo, and R. Pérez-Garcı́a, “An
REFERENCES approach to AHP decision in a dynamic context,” Dec. Support Syst., vol.
53, no. 3, pp. 499–506, Jun. 2012.
[1] V. De León and J. Carlos, Vulnerability: A Conceptual and Methodological [28] Z. Tao, H. Chen, X. Song, L. Zhou, and J. Liu, “Uncertain linguistic
Review. Bonn, Germany: UNU-EHS, 2006, ch. 2, pp. 11–23. fuzzy soft sets and their applications in group decision making,” Appl.
[2] C. Tortajada, “Water management in Singapore,” Water Res. Dev., vol. 22, Soft Comput., vol. 34, pp. 587–605, Sep. 2015.
no. 2, pp. 227–240, Jun. 2006. [29] R. G. Dyson and E. Thanassoulis, “Reducing weight flexibility in data
[3] I. O. B. Luan, “Singapore water management policies and practices,” envelopment analysis,” J. Oper. Res. Soc., vol. 39, no. 6, pp. 563–576,
Water Res. Dev., vol. 26, no. 1, pp. 65–80, Mar. 2010. Jul. 1988.
[4] I. Akgun, A. Kandakoglu, and A. F. Ozok, “Fuzzy integrated vulnerability [30] P. Guo and H. Tanaka, “Fuzzy DEA: A perceptual evaluation method,”
assessment model for critical facilities in combating the terrorism,” Expert Fuzzy Sets Syst., vol. 119, no. 1, pp. 149–160, Apr. 2001.
Syst. Appl., vol. 37, no. 5, pp. 3561–3573, May 2010. [31] L. Liang, J. Wu, W. D. Cook, and J. Zhu, “The DEA game cross-efficiency
[5] T. Aven, “On some recent definitions and analysis frameworks model and its nash equilibrium,” Oper. Res., vol. 56, no. 5, pp. 1278–1288,
for risk, vulnerability, and resilience,” Risk Anal., vol. 31, no. 4, Sep./Oct. 2008.
pp. 515–522, Apr. 2011. [32] Z. Xu, Uncertain Multi-Attribute Decision Making: Methods and Appli-
[6] A. T. Murray, “An overview of network vulnerability modeling ap- cations. New York, NY, USA: Springer, 2015.
proaches,” Geo J., vol. 78, no. 2, pp. 209–221, Apr. 2013. [33] J. Birkmann, “Measuring vulnerability to promote disaster-resilient soci-
[7] M. Ouyang, L. Zhao, L. Hong, and Z. Pan, “Comparisons of complex eties: Conceptual frameworks and definitions,” in Measuring Vulnerability
network based models and real train flow model to analyze Chinese railway to Natural Hazards: Towards Disaster Resilient Societies. Tokyo, Japan:
vulnerability,” Rel. Eng. Syst. Safety, vol. 123, pp. 38–46, Mar. 2014. United Nations Univ. Press, 2006, pp. 9–54.
[8] B. Y. Chen, W. H. Lam, A. Sumalee, Q. Li, and Z. C. Li, “Vulnerability [34] P. White, M. Pelling, K. Sen, D. Seddon, S. Russell, and R. Few, Disaster
analysis for large-scale and congested road networks with demand un- Risk Reduction: A Development Concern. London, U.K.: Department for
certainty,” Trans. Res. Part A, Policy Pract., vol. 46, no. 3, pp. 501–516, International Development, 2005, ch. 2, pp. 11–18.
Mar. 2012. [35] A. De Sherbinin, A. Schiller, and A. Pulsipher, “The vulnerability of
[9] J.-C. Laprie, K. Kanoun, and M. Kaâniche, “Modelling interdependen- global cities to climate hazards,” Environ. Urbanization, vol. 19, no. 1,
cies between the electricity and information infrastructures,” in Computer pp. 39–64, Apr. 2007.
Safety, Reliability, and Security. Berlin, Germany: Springer-Verlag, 2007, [36] C. Bach, A. Gupta, S. Nair, and J. Birkmann, “Critical infrastructures and
pp. 54–67. disaster risk reduction,” National Institute of Disaster Management and
[10] S. Sultana and Z. Chen, “Modelling flood induced interdependencies Deutsche Gesellschaft für Internationale Zusammenarbeit GmbH (GIZ),
among hydro-electricity generating infrastructures,” J. Environ. Manage., New Delhi, India, Nov. 2013.
vol. 90, no. 11, pp. 3272–3282, Aug. 2009. [37] J. Nossent, P. Elsen, and W. Bauwens, “Sobol sensitivity analysis of a
[11] O. Doguc and J. E. Ramirez-Marquez, “A generic method for estimating complex environmental model,” Environ. Model. Softw., vol. 26, no. 12,
system reliability using Bayesian networks,” Rel. Eng. Syst. Saf., vol. 94, pp. 1515–1525, Dec. 2011.
no. 2, pp. 542–550, Feb. 2009. [38] A. Ligmann-Zielinska and P. Jankowski, “Spatially-explicit integrated
[12] W. H. Nam and J. Y. Choi, “Development of an irrigation vulnerability uncertainty and sensitivity analysis of criteria weights in multicriteria
assessment model in agricultural reservoirs utilizing probability theory land suitability evaluation,” Environ. Model. Softw., vol. 57, pp. 235–247,
and reliability analysis,” Agricultural Water Manage., vol. 142, pp. 115– Jul. 2014.
126, Aug. 2014. [39] X. Liu, A. Ghorpade, Y. L. Tu, and W. J. Zhang, “A novel approach
[13] J. Rezaei, “Best-worst multi-criteria decision-making method,” Omega, to probability distribution aggregation,” Inf. Sci., vol. 188, pp. 269–275,
vol. 33, pp. 49–57, Jun. 2015. Apr., 2012.
[14] T. L. Saaty, “What is the analytic hierarchy process?” in Mathematical [40] R. A. Becker and S. K. Chakrabarti, “Satisficing behavior, Brouwer’s
Models for Decision Support. Berlin, Germany: Springer-Verlag, 1988, fixed point theorem and Nash equilibrium,” Econ. Theory, vol. 26, no. 1,
ch. 4, pp. 109–121. pp. 63–83, Jul. 2005.
[15] T. L. Saaty, “Analytic network process,” in Encyclopedia of Operations
Research and Management Science. New York, NY, USA: Springer, 2001,
pp. 28–35.
Chong Zhang received the Bachelor’s degree in lo-
[16] B. C. Ezell, “Infrastructure vulnerability assessment model (I-VAM),”
gistics engineering from the Wuhan University of
Risk Anal., vol. 27, no. 3, pp. 571–583, Jun. 2007.
Technology, Wuhan, China, in 2007. She is currently
[17] H. Eakin and L. A. Bojorquez-Tapia, “Insights into the composition of
working toward the Ph.D. degree at the Department
household vulnerability from multicriteria decision analysis,” Global En-
of Industrial Engineering, Shanghai Jiao Tong Uni-
viron. Change, vol. 18, no. 1, pp. 112–127, Feb. 2008.
versity, Shanghai, China.
[18] T. L. Saaty and L. G. Vargas, “Uncertainty and rank order in the ana-
Her research interests include risk assessment and
lytic hierarchy process,” Eur. J. Oper. Res., vol. 32, no. 1, pp. 107–117,
emergency restoration optimization for critical infras-
Oct. 1987.
tructures.
[19] E. Cagno, F. Caron, and A. Perego, “Multi-criteria assessment of the
probability of winning in the competitive bidding process,” Int. J. Project
Manage., vol. 19, no. 2, pp. 313–324, Aug. 2001.
[20] P. J. M. Van Laarhoven and W. Pedrycz, “A fuzzy extension of Saaty’s Xiao Liu received the Bachelor’s and Master’s de-
priority theory,” Fuzzy Sets Syst., vol. 11, nos. 1–3, pp. 199–227, 1983. grees in system engineering from Northeastern Uni-
[21] A. A. Salo, “On fuzzy ratio comparisons in hierarchical decision models,” versity, China, in 1999, and the Ph.D. degree in
Fuzzy Sets Syst., vol. 84, no. 1, pp. 21–32, Nov. 1996. industry engineering from Université de technologie
[22] L. C. Leung and D. Cao, “On consistency and ranking of alternatives in de Troyes, Troyes, France, in 2004.
fuzzy AHP,” Eur. J. Oper. Res., vol. 124, no. 1, pp. 102–113, Jul. 2000. She was an Associate Professor with Northeast-
[23] E. R. Jalao, T. Wu, and D. Shunk, “A stochastic AHP decision making ern University. She is currently a Professor with the
methodology for imprecise preferences,” Inf. Sci., vol. 270, pp. 192–203, Department of Industrial Engineering, Shanghai Jiao
Jun. 2014. Tong University, Shanghai, China. She has published
[24] Y. M. Wang, J. B. Yang, and D. L. Xu, “Interval weight generation ap- numerous research papers on refereed journals. Her
proaches based on consistency test and interval comparison matrices,” current research interests include risk management,
Appl. Math. Comput., vol. 167, no. 1, pp. 252–273, Aug. 2005. supply chain network design, and decision theory.
90 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 63, NO. 1, FEBRUARY 2016

Jian-Gang Jin received the Bachelor’s degree in Yuan Liu received the Bachelor’s degree in 2014.
civil engineering from Tsinghua University, Beijing, He is Ph.D. candidate at the Department of Electrical
China, in 2009, and the Ph.D. degree in civil and envi- and Computer Engineering, University of Alberta,
ronmental engineering from the National University Canada.
of Singapore, Singapore, in 2013. His current research interests include optimization
He is an Assistant Professor with the Depart- for networks and smart-grid operations.
ment of Ocean and Civil Engineering, Shanghai Jiao
Tong University, Shanghai, China. He has published
more than 30 referred papers in international journals
and conferences. His research interests include large-
scale modeling and optimization for transportation
and logistics systems.

View publication stats

You might also like