期刊文献+

资金约束下的关键基础设施应急保护策略研究 被引量:1

Critical Infrastructure Protection Strategies under Budget Constraints
原文传递
导出
摘要 针对多系统耦合多层级分布的关键基础设施网络,通过影响矩阵将网络抽象为"节点-关系"图。考虑网络中不同类的任意两节点间的相互影响,以最大化的网络总服务能力为优化目标,建立了基于预算总资金约束的基础设施保护的数学模型,设计了有效遗传算法对模型进行求解,通过不同规模下的数值实验结果表明了该算法的收敛性。最后,以典型应急情景为案例,深入分析了不同情况下的解的共性与区别,对决策部门制定系统保护策略具有重要的参考价值。 Using influence matrix, the critical infrastructure network with multi-system coupling and multi-level distribution is abstracted into a relation of "connections between nodes". With an attempt to maximize the service capacity of the whole network, the article proposes a budged-constrained model for protecting infrastructure by taking the mutual influence between any two of the nodes into consideration. Genetic algorithm is applied to analyze the model and the results generated under different circumstances demonstrate the convergence of the algorithm. Similarities and dissimilarities between the results are further analyzed with reference to emergency scenarios. It is hoped that the present study can be of value to decision-makers in developing strategies for system maintenance.
出处 《工业工程与管理》 CSSCI 北大核心 2014年第4期50-56,共7页 Industrial Engineering and Management
基金 国家自然科学基金重大研究计划(91024013 91024031)
关键词 资金约束 关键基础设施 应急保护策略 遗传算法 capital constraints critical infrastructure protection strategies genetic algorithm
  • 相关文献

参考文献11

  • 1Powell R.Defending against terroristattacks with limited resources[R].American Political Science Review,2007,101 (3),527-541.
  • 2Chertoff M.National Response Framework.Department of Homeland Security[R].Washington DC,2008.
  • 3Chertoff M.National Infrastructure Protection Plan.Department of Homeland Security[R].Washington DC,2009.
  • 4Church R L,Scaparra M P,Middleton R S.Identifying critical infrastructure:The median and covering facility interdiction problems[J].Annals of the Association of American Geographers,2004,94:491-502.
  • 5Scaparra M P,Church R L.Abi-level mixed-integer program for critical infrastructure protection planning[J].Computers and Operations Research,2008,35:1905-1923.
  • 6Liberatore F,Scaparra M P,Daskin M S.Analysis of facility protection strategies against an uncertain number of attacks:The stochastic R-interdiction median problem with fortification[J].Computers and Operations Research,38:357-366.
  • 7Rinaldi S M.Modeling and simulating critical infrastructures and their interdependencies[C].37th Hawaii International Conference on System Sciences;2004:5-8.
  • 8Haimes Y Y,Jiang P.Leontief-based model of risk in complex interconnected infrastructures[J].Journal of Infrastructure System,2001,7 (1):1-12.
  • 9Setola R,Porcellinis S D,Sforna M.Critical infrastructure dependency assessment using the input-output inoperability model[J].International Journal of Critical Infrastructure Protection,2009,2(4):170-178.
  • 10Holland J H.Adaptation in Natural and Artificial Systems[M].Cambridge,MA:MIT Press,1975.

二级参考文献11

  • 1Steven M. Rinaldi, JamesP. Peerenboom, TerrenceK. Kelly. Identifying, understanding, and analyzing critical inrarstructure interdependencies[ J]. IEEE Control Systems Magazine,2001,12( 1 ) : 11 - 25.
  • 2Y. Haimes, B. Horowitz, J. Lambert, J. Santos, C. Lian and K. Crowther. Inoperability input-output model for interdependent infrastructure sectors I : Theory and methodology[J]. Journal of Infrastructure Systems, 2005,11 (2) :67 - 79.
  • 3Y. Haimes, B. Horowitz, J. Lambert, J. Santos, K. Crowther and C. Lian. Inoperability input-output model for interdependent infrastructure sectors II: Case studies[J]. Journal of Infrastructure Systems, 2005, 11(2): 80 -92.
  • 4R. Setola , S. De Porcellinis. A methodology to estimate input-output inoperability model parameters[ A]. Critical Information Infrastructures Security[ C] ,2008 : 149 - 160.
  • 5Joost R. Santos. Inoperability Input-Output Model (IIM) with Multiple Probabilistic Sector Inputs[J].Journal of Industrial Management and Optimization, 2008,4(3) : 489 - 510.
  • 6Wassily Leontief. Input-output analysis as an alternative to conventional econometric models[J]. Mathematical Social Sciences, 1993, 25(3):306 -307.
  • 7D.G. Luenberger. Introduction to dynamic systems: theory, models and applications [J]. Mathematics and Computers in Simulation, 1981,23(2) :215 -215.
  • 8陈庆前,尹项根,侯慧,游大海,童光毅,郑毅,邵德军.从2008年雪灾分析电力系统的结构缺陷[J].中国电力,2008,41(12):1-5. 被引量:3
  • 9邵传青,易立新.重要基础设施脆弱性评价模型及其应用[J].中国安全科学学报,2008,18(11):153-158. 被引量:11
  • 10张明媛,袁永博,李宏男.基于脆性理论的灾害作用下生命线系统耦联分析[J].防灾减灾工程学报,2009,29(4):462-466. 被引量:5

共引文献4

同被引文献11

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部