Научная статья на тему 'COMPREHENSIVE ANALYSIS OF MULTI-ENERGY SYSTEM VULNERABILITY'

COMPREHENSIVE ANALYSIS OF MULTI-ENERGY SYSTEM VULNERABILITY Текст научной статьи по специальности «Экономика и бизнес»

CC BY
0
0
i Надоели баннеры? Вы всегда можете отключить рекламу.
Область наук
Ключевые слова
MULTI-ENERGY SYSTEM / RESILIENCE / VULNERABILITY ANALYSIS / MULTICRITERIA CHOICE

Аннотация научной статьи по экономике и бизнесу, автор научной работы — Beresneva Natalia Mikhailovna, Edelev Alexei Vladimirovich, Gorsky Sergey Alexeevich, Marchenko Mikhail Aleksandrovich

This article proposes a framework for comprehensive vulnerability analysis of a multi-energy system (energy infrastructure), consisting of several stages. The frame- work uses previously implemented algorithms of discrete multi-criteria selection to find optimal options for the functioning of the energy infrastructure. Also, it performs processing, storage and analysis of natural-climatic and socio-economic data for monitoring the processes of functioning of energy infrastructure facilities.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «COMPREHENSIVE ANALYSIS OF MULTI-ENERGY SYSTEM VULNERABILITY»

Вычислительные технологии, 2022, том 27, № 5, с. 79-88. © ФИЦ ИВТ, 2022 ISSN 1560-7534

Computational Technologies, 2022, vol. 27, no. 5, pp. 79-88. © FRC ICT, 2022 elSSN 2313-691X

INFORMATION TECHNOLOGIES

D01:10.25743/ICT.2022.27.5.008

Comprehensive analysis of multi-energy system vulnerability

Beresneva N. M.1'*, Edelev A. V.1, Gorsky S. A.2, Marchenko M. A.3'4 1Melentiev Energy Systems Institute SB RAS, Irkutsk, 664033, Russia

2Matrosov Institute for System Dynamics and Control Theory SB RAS, Irkutsk, 664033, Russia 3Institute of Computational Mathematics and Mathematical Geophysics SB RAS, Novosibirsk, 630090, Russia

4Novosibirsk State University, 630090, Novosibirsk, Russia

* Corresponding author: Beresneva Natalia M., e-mail: beresneva@isem.irk.ru

Received June 08, 2022, accepted June 30, 2022.

This article proposes a framework for comprehensive vulnerability analysis of a multi-energy system (energy infrastructure), consisting of several stages. The framework uses previously implemented algorithms of discrete multi-criteria selection to find optimal options for the functioning of the energy infrastructure. Also, it performs processing, storage and analysis of natural-climatic and socio-economic data for monitoring the processes of functioning of energy infrastructure facilities.

Keywords: multi-energy system, resilience, vulnerability analysis, multi-criteria choice.

Citation: Beresneva N.M., Edelev A.V., Gorsky S.A., Marchenko M.A. Comprehensive analysis of multi-energy system vulnerability. Computational Technologies. 2022; 27(5):79-88. D0I:10.25743/ICT.2022.27.5.008.

Introduction

Resilience is the ability of a multi-energy system (energy infrastructure) to adapt to various major disturbances and recover to the state in which it was before their impact. The purpose of the study of survivability is to develop strategies to increase it, the purpose of which is to improve the system's response in response to the effects of the considered large disturbances [1].

Vulnerability and risk analysis is the basis for the study of the survivability of energy infrastructure, as it plays a central role in supporting decision-making to improve survivabil-

ity [2].

The concept of vulnerability in the literature has two closely related interpretations [3]. In the first case, vulnerability is considered as a global system property that expresses the size and scale of negative consequences as a result of the impact of a particular disturbance. In the second case, the vulnerability has a local meaning and represents an element of the system, the failure of which has large-scale negative consequences for the system.

The vulnerability analysis of the energy infrastructure should solve the following methodological problems:

• quantification of vulnerability;

comparison of different system configurations by vulnerability.

In this article, the values of quantitative vulnerability indicators are determined as a result of processing, storing and analyzing information related to the functioning of the energy infrastructure. Part of the information, such as natural-climatic and socio-economic data, is obtained by monitoring the processes occurring at energy facilities. The indicators act as criteria for discrete multi-criteria selection algorithms, which are used to select the most severe perturbation scenarios in terms of consequences. Further, according to the graphs of the decline in the performance of the energy infrastructure built on the basis of selected disturbance scenarios, various configurations are compared by vulnerability. The same indicators and algorithms are used to search for elements of energy infrastructure, the failure of which poses the highest risk of under-supply of certain types of energy resources for various categories of consumers.

1. Related Work

Considering the structural and dynamic complexity of modern critical infrastructures (CIs), the need to take into account the relationships between them and uncertainties of various kinds, emphasizes [2] that the assessment of the vulnerability of CI must be carried out from different perspectives, for example, from the point of view of economics [4] or management theory [5, 6]. Each perspective can rely on its own method of modelling CIs.

The CI modelling method defines the basis for the study of its vulnerability in the local and global sense. On the one hand, the choice of indicators of the criticality of CI elements depends on the modelling method. On the other hand, it outlines possible ways to measure system performance, the decline of which is due to the impact of a large disturbance and characterizes the vulnerability of the CI in relation to this disturbance. Thus, for a comprehensive vulnerability analysis, integration of various approaches to CI modelling is required [2].

The idea of integrating various CI modelling methods for a comprehensive vulnerability analysis can be traced, for example, in [7], where the electricity transmission network is analyzed from four different points of view in order to identify the most important elements. In [8], the authors, comparing reliability and vulnerability analysis on the example of electric power systems, conclude that vulnerability analysis should serve as an addition to various types of probabilistic risk analysis. In [1, 9], the gas transmission network is considered from several aspects: reliable fuel supply to consumers, topology and controllability. A general approach for analyzing the vulnerability of critical infrastructures from these points of view is already proposed in [11]. The work [1] combines a multi-product flow problem and a model for studying the economic relationships of various industries to quantify the effects of disturbances in the transport network on industries and assess the importance of network elements.

2. Comprehensive vulnerability analysis of an energy infrastructure

Considering the above, in [13] the authors proposed a new approach to the complex analysis of the vulnerability of energy infrastructure, based on the idea of integrating various approaches to modelling CI [14].

A comprehensive analysis of the vulnerability of energy infrastructure provides:

• consideration of relationships of different types [2];

• quantitative assessment of vulnerability from a topological and functional perspective [11];

• universality in relation to different classes of disturbances and different levels of territorial and technological hierarchy [1];

• effective use of high-performance computing to accelerate calculations and analyze their results.

The input information for vulnerability analysis are classes of disturbances and measures to improve survivability, a list of vulnerability indicators, and the configuration of energy infrastructure.

Perturbations are divided into the following classes:

• natural disasters such as floods, earthquakes, hurricanes, etc.; man-made disasters caused by failure of components or subsystems;

• deliberate (intentional) violations, such as terrorist acts, cyber-attacks, etc.

Measures to increase survivability include actions to improve the security of energy infrastructure facilities before a major disturbance, as well as steps aimed at countering and absorbing the disturbance after its occurrence.

As part of a comprehensive vulnerability analysis, the energy infrastructure is considered as a meta-system consisting of several interconnected energy systems. The configuration of the energy infrastructure is understood as a description of the territorial and production structure of individual energy systems and the connections between them, natural and climatic factors and socio-economic conditions of their functioning. The method of forming a series of natural and climatic data is described in [15]. Monitoring of technological and socioeconomic parameters of the functioning of energy infrastructure facilities is presented in [16].

Vulnerability indicators, as mentioned above, are closely related to the method of modelling energy infrastructure.

2.1. Modelling a disturbance

The scenario of a major disturbance consists of several time periods T. If vt is denoted the impact of the disturbance over a period of time t = 1,... ,T, the model of functioning of the energy infrastructure as a meta-system in a period of time t can be represented as the following optimization problem:

(cxt + bst) + pzt + hut ^ min, (1)

st_i + At(vt)xt + Qtut - yt - st > 0, (2)

yt + z = Rt, (3)

xt < Dt(^t), (4)

yt < Ri, (5)

z < Rt, (6)

u < Ut, (7)

st < St(ut), (8)

so = So, (9)

where xt — the vector, the elements of which characterize the intensity of the application of technological methods of functioning of energy facilities (extraction, processing, transformation and transport of energy resources); yt — the vector, the elements of which characterize the volume of consumption of certain types of energy resources by different categories of

consumers; zt — the vector, the elements of which are equal to the under-supply of certain types of energy resources to various categories of consumers; ut — the vector describing the intensity of measures to increase the survivability; st — the vector, the components of which characterize the volume of fuel reserves; At — the matrix describing the technologies of production and transmission of energy resources, the values of the elements of which depend on the impact of the disturbance vt; Dt — the vector that determines the technically possible intensities of application of individual technological and production methods, the values of the elements of which depend on the impact of the disturbance vt; Rt — the vector whose elements demonstrate the needs for certain types of energy resources for various categories of consumers; Qt — the matrix reflecting the localization of measures to improve survivability; Ut — the vector that sets the limits of the intensity of measures to increase survivability; St — the vector defining the storage capacity, the values of the elements of which depend on the impact of the disturbance vt; c — the vector, the elements of which determine the unit costs for each technological method of functioning of the elements of the energy infrastructure; b — the vector of unit costs for storage operation; p — the vector of specific damages resulting from the under-supply of certain types of energy resources to consumers; h — the vector that sets the unit costs for the preparation and implementation of measures to improve survivability.

The objective function (1) is a convolution of three criteria. The first criterion reflects the costs associated with the functioning of the metasystem. The second criterion evaluates the damage caused by the shortage of energy resources due to the impact of the vt disturbance. The costs of preparing and carrying out measures to improve survivability are characterized by the third criterion.

The impact of the vt disturbance is realized by changing the values of the matrix components At and the vectors Dt, St in the equations (2), (4) and (8), respectively. Their elements characterize the degree of deformation of various components due to the effects of perturbation over a period of time t. The consequences zt from the impact of the perturbation vt are determined by equation (3).

The level of necessary supply of consumers with certain types of energy resources is given by equation (4). Technical restrictions on carrying out measures to increase survivability are defined in (7).

The volume of fuel reserves in storage facilities in the time period t is limited by their available capacity according to inequality (8). Equation (9) assumes that at the beginning of the disturbance (in the time period t = 0) all storage facilities have some initial reserve of energy resources described by the vector S0.

The territorial and production structure of individual energy systems and the connections between them is fully represented in the matrix At. Natural and climatic factors and socioeconomic conditions of the functioning of the energy infrastructure form separate components of the vectors Dt, Rt, St or indirectly affect their values.

In the model (1)-(9), nodes can be dedicated real sources, storages or consumers of energy resources. However, most often they are aggregated groups of energy infrastructure facilities that have similar functionality, are fairly homogeneous in their characteristics or are spatially located in the same area. All nodes have geographical coordinates. As in the case of nodes, arcs can be real objects of transport, but in most cases they represent aggregated production capabilities for the transfer of energy resources. Intersystem connections between nodes of various energy systems represent the transformation of energy resources from one type to another.

2.2. Essential principles of creating a database of vulnerability indicators

When determining vulnerability indicators, the following principles of forming data storage structures are implemented:

1. Separate tables identical in structure are formed to store data on territorial units and territorial associations. The table with territorial associations can simultaneously include groups of territories at different levels (for example, federal districts and the country as a whole). Thus, identical storage of detailed and aggregated data by territories is ensured, and the procedures for their further processing are consistent.

2. The data in the generated tables should be identified by the study scenarios, territories or their associations. The composition of vulnerability indicators may vary. It is determined mainly by the goals and level of analysis.

3. The organization of data storage on vulnerability indicators should correspond to the following points:

• the tables should contain absolute (limit and calculated) and relative values in order to preserve the possibility of assessing the vulnerability of objects from different points of view;

• the determined indicators can be single (a specific technology of an object) and complex (a convolution of various technologies of objects). The level of complexity of indicators, the necessary formalization is implemented at the stage of determining absolute values. Relative values are determined at the absolute level, regulated by the type of analyzed technologies;

from a technological point of view, the tables must necessarily contain data on the availability of energy needs, additionally data on the intensity of use of the input part (extraction, production, storage), the intensity of the use of interchangeabil-ity opportunities (in relation to fuel) can be included. The type of technology determines the rules for determining relative values.

Vulnerability indicator tables constructed in accordance with the above principles form the necessary and sufficient information base for further quantitative assessment of vulnerability.

2.3. Evaluation of the energy infrastructure vulnerability

The perturbation scenario is a failure of K elements of the energy infrastructure occurring during T time periods [3]. The number of possible groups with multiplicity less than or equal to K formed from n pre-selected elements of the energy infrastructure is equal to

^ = E

K i

n!

k=l

(n - k)!k!'

For practical reasons, K should not exceed 3 or 4, as L grows rapidly as K grows. To compensate for this disadvantage and speed up the computational experiment, distributed computing can be used to assess the vulnerability of the energy infrastructure. The distributed perturbation generation algorithm [17] allows for each integer from the segment [1, L] to determine the list of disconnected elements of the energy infrastructure corresponding to this number.

If, due to the absence or low reliability of available statistical data, it is impossible to determine the probability of accidental failure of an energy infrastructure object, then fuzzy

logic is used to assess the risk of accidental failures. For each class of disturbances, risk factors (linguistic variables) are identified that determine the occurrence of this disturbance on a certain type of energy infrastructure objects. In turn, the risk factor is characterized by its parameters. Further, on the basis of the processed values of the risk factor parameters, membership functions related to the corresponding linguistic variable are constructed. Then a base of fuzzy rules is formed with many input variables (risk factors) and one output variable (the risk of accidental failure at a specific energy infrastructure facility).

According to the number of the disturbance and the given configuration of the energy infrastructure, the list of purposefully disabled elements is restored according to the above algorithm. For other infrastructure elements, the probability of accidental failure is determined, if possible. For these elements, multi-period random failures are then iteratively simulated using the Monte Carlo method. In the modelling process, a 128-bit congruent pseudorandom number generator is used, taking into account the specifics of parcel and distributed computing [18].

The combined consequences of directed attacks and random failures for any of T time periods are calculated on the model (1)-(9). In each of the N iterations of the Monte Carlo cycle, the consequences of the disturbance obtained for the last period T are stored in the database.

The consequences of disturbances are loaded from the database, representing the values of the model parameters (1)-(9). Based on them, the values of the simple and integrated vulnerability indicators described above are calculated and stored in the same database. The calculation of the values of indicators, if necessary, can be carried out in a distributed manner.

Vulnerability assessment of energy infrastructure can be carried out in many different ways. In the analysis of the vulnerability of CI, such types of vulnerability assessment as a global vulnerability analysis and the search for critical elements are distinguished [14].

2.4. Global vulnerability analysis

Global analysis studies the vulnerability of CI as a system property. It is carried out by affecting the energy infrastructure with disturbances of a given class with an increasing amplitude of the impact, which is achieved, for example, by increasing the number of disconnected elements. As the magnitude of the impact of disturbances increases, the productivity of the CI decreases. If the performance drop occurs slowly, it is considered protected from the class of disturbances under consideration, if it is fast, then the CI is considered vulnerable to this class of disturbances. Thus, the result of a global vulnerability analysis is graphs of the dependencies of the drop in system performance on the number of disabled elements.

At the beginning of the global analysis, the most representative disturbance scenarios are selected. In these scenarios, compared to others, with the same number of failed elements, the size or scale of the negative consequences will be maximum. The size and scale of the consequences of disturbances is estimated by the values of vulnerability indicators stored in the database. Since the consequences of disturbances in terms of vulnerability indicators can be assessed in different ways, the problem of multi-criteria choice arises here. This problem can be solved by using the following known methods [19]:

sequential comparison of variants of criteria values ordered according to their significance (lexicographic method);

selection of options according to the largest number of criteria with the best values (majority method);

• Pareto-optimal choice.

The input parameters for these methods are the number of criteria, criteria optimality conditions, the number of variants of criteria values (integer scalar), variants of criteria values. At the output, a set of options is formed, selected according to the specified criteria and conditions of their optimality [20]. In this case, the criteria are vulnerability indicators, the variants of the criteria values will be the values of the indicators corresponding to the compared scenarios of disturbances, the optimality condition is the maximum.

Further, according to the values of vulnerability indicators for the most representative disturbance scenarios, graphs of the dependencies of the drop in system performance on the number of disabled elements are formed. These graphs are then used to compare different configurations of the energy infrastructure by vulnerability.

2.5. Search for critical elements

The search for critical elements explores the vulnerability of CI at the level of individual elements, that is, in the local sense. In the literature, there are many different measures of the importance of CI elements [21] that can be used in the search for critical elements. The choice of measures of importance directly depends on the points of view from which the simulated energy infrastructure is considered. In this case, such measures are vulnerability indicators and model variables (1)-(9) stored in the database.

For example, if the perturbation scenario is j = 1,... ,L consists in purposefully disabling only one element out of n, then the importance of this element can be assessed from the side of the risk of under-supply of energy resources to end consumers as follows [22]:

RAj(W) = Pj(W) - Po(W),

where W — the vector whose element values in percentages set the level of under-supply of certain types of energy resources to various categories of consumers; Pj — the probability of under-supply of energy resources of level W during the implementation of the disturbance scenario ; P0 — the probability of under-supply of energy resources of level W in the normal state of the energy infrastructure or the baseline scenario = 0.

The probability of under-supply of energy resources of level W for the disturbance scenario = 1, . . . , L is calculated as follows:

1 N

P (W ) = x Y,F (W),

i= 1

where F — a function that iterates i = 1,... ,N of the Monte Carlo cycle is equal to 1 when W

the condition z^ ^ YqqR^ is true and 0 otherwise, R^ — the vector of needs for certain

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

types of energy resources for various categories of consumers in the last time period T of the perturbation scenario at iteration i of the Monte Carlo cycle, zlT — the vector of under-supplies of certain types of energy resources to various categories of consumers in the time period T at iteration i of the Monte Carlo cycle.

There may be several levels of undersupply of energy resources W, and each of them will correspond to its own list of critical elements of energy infrastructure. Since these lists may not coincide with each other, the problem of multi-criteria selection arises during the final approval of the lists, which is solved using the methods listed above.

Conclusion

This article proposes a methodology for quantifying the vulnerability of energy infrastructure, consisting of the following stages:

Setting parameters of disturbance scenarios, including the territorial and production structure of individual energy systems and the connections between them, socioeconomic conditions of functioning and natural and climatic factors.

• Conducting calculations on which targeted attacks on the energy infrastructure and accidental failures of its elements are modelled using the Monte Carlo method.

• Processing of calculation results, where vulnerability indicators are calculated for the entire set of disturbance scenarios based on their consequences stored in the database.

• Analysis of calculation results.

At the last stage, discrete multi-criteria selection algorithms are used to determine the most important elements of the energy infrastructure. Also, with the help of these algorithms, graphs of the drop in system performance are formed, according to which various configurations of the energy infrastructure are compared by vulnerability.

The concept of risk is used twice in the methodology of quantitative vulnerability assessment. In the first case, the risk of accidental failure of the element is estimated on the basis of statistical data or, in their absence or low reliability, using fuzzy logic. In the second case, when the elements are determined, the complete failure of which creates the highest risk of under-supply of certain types of energy resources for various categories of consumers.

Thus, in the process of carrying out this work, the authors, within the framework of a new approach to the comprehensive analysis of vulnerability, developed a methodology for its quantitative assessment, which:

uses previously implemented algorithms of discrete multi-criteria selection to find options for the functioning of the energy infrastructure that are optimal in terms of survivability;

performs processing, storage and analysis of natural-climatic and socio-economic data for monitoring the processes of functioning of energy infrastructure facilities.

Acknowledgements. This work was carried out with financial support from the Ministry of Education and Science of Russia in the framework of government assignments № FWEU-2021-0003 and № FWEW-2021-0005, as well as RFBR in the framework of scientific projects № 15-07-07412a and № 20-08-00367a. The authors would like to thank Irkutsk Supercomputer Center of SB RAS for providing the access to HPC-cluster "Akademik V.M. Matrosov" (Irkutsk Supercomputer Center of SB RAS, Irkutsk: ISDCT SB RAS; http://hpc.icc.ru, accessed 18.04.2022).

References

[1] Voropai N. Electric power system transformations: A review of main prospects and challenges. Energies. 2020; 13(21):5639. D01:10.3390/en13215639.

[2] Zio E. Challenges in the vulnerability and risk analysis of critical infrastructures. Reliability Engineering & System Safety. 2016; (152):137-150. D0I:10.1016/j.ress.2016.02.009.

[3] Jonsson H., Johansson J., Johansson H. Identifying critical components in technical infrastructure networks. Proceedings of the Institution of Mechanical Engineers, Part O. Journal of Risk and Reliability. 2008; 222(2):235-243. D0I:10.1243/1748006XYRR138.

[4] Haimes Y.Y., Horowitz B.M., Lambert J.H., Santos J.R., Lian C., Crowther K.G. Inoperability input-output model for interdependent infrastructure sectors. I: Theory and methodology. Journal of Infrastructure Systems. 2005; 11(2):67-79. D0I:10.1061/(ASCE)1076-0342(2005)11:2(67).

[5] Nepusz T., Vicsek T. Controlling edge dynamics in complex networks. Nature Physics. 2012; 8(7):568-573. D0I:10.1038/nphys2327.

[6] Liu Y.Y., Slotine J.J., Barabasi A.L. Controllability of complex networks. Nature. 2011; 473(7346):167-173. D0I:10.1038/nature10011.

[7] Zio E., Golea L.R. Analyzing the topological, electrical and reliability characteristics of a power transmission system for identifying its critical elements. Reliability Engineering & System Safety. 2012; (101):67-74. D0I:10.1016/j.ress.2011.11.009.

[8] Johansson J., Hasse H., Zio E. Reliability and vulnerability analyses of critical infrastructures: comparing two approaches in the context of power systems. Reliability Engineering & System Safety. 2013; (120):27-38. D0I:10.1016/j.ress.2013.02.027.

[9] Sang M., Ding Y., Ding M., Bao M., Wang P., Sun L. Metrics and quantification of power-line and pipeline resiliency in integrated gas and power systems. IET Generation, Transmission & Distribution. 2021; (15):3001-3016. D0I:10.1049/gtd2.12236.

[10] Su H., Zio E., Zhang J., Li X. A systematic framework of vulnerability analysis of a natural gas pipeline network. Reliability Engineering & System Safety. 2018: 79-91. D0I:10.1016/j.ress.2018.03.006.

[11] Han F., Zio E. A multi-perspective framework of analysis of critical infrastructures with respect to supply service, controllability and topology. International Journal of Critical Infrastructure Protection. 2019; (24):1-13. D0I:10.1016/j.ijcip.2018.10.009.

[12] Darayi M., Barker K., Santos J.R. Component importance measures for multi-industry vulnerability of a freight transportation network. Networks and Spatial Economics. 2017; (17):1111-1136. D0I:10.1007/s11067-017-9359-9.

[13] Bychkov I.V., Gorsky S.A., Edelev A.V., Kostromin R.O., Sidorov I.A., Feoktis-tov A.G., Fereferov E.S., Fedorov R.K. Support for managing the survivability of energy systems based on a combinatorial approach. Journal of Computer and Systems Sciences International. 2021; (60):981-994. D0I:10.1134/S1064230721060071.

[14] Johansson J., Hassel H. An approach for modelling interdependent infrastructures in the context of vulnerability analysis. Reliability Engineering & System Safety. 2010; 95(12):1335-1344. D0I:10.1016/j.ress.2010.06.010.

[15] Karamov D.N. Formation of initial meteorological arrays using long-term series FM 12 Synop and METAR in system energy studies. Bulletin of the Tomsk polytechnic university. Geo Assets Engineering. 2018; 329(1):69-88. (In Russ.)

[16] Sidorov I., Kostromin R., Feoktistov A. System for monitoring parameters of functioning infrastructure objects and their external environment. Proceedings of the 2nd International Workshop on Information, Computation, and Control Systems for Distributed Environments. CEUR-WS Proceedings. 2020: 252-264. D0I:10.47350/ICCS-DE.2020.23.

[17] Djokic B., Miyakawa M., Sekiguchi S., Semba I., Stojmenovic I. Parallel algorithms for generating subsets and set partitions. International Symposium on Algorithms, SIGAL. 1990: 76-85. D0I:10.1007/3-540-52921-7_57.

[18] Marchenko M. PARM0NC — a software library for massively parallel stochastic simulation. International Conference on Parallel Computing Technologies. Berlin, Heidelberg: Springer; 2011: 302-316. D0I:10.1007/978-3-642-23178-0_27.

[19] Ho W., Xu X., Dey P.K. Multi-criteria decision making approaches for supplier evaluation and selection: a literature review. European Journal of Operational Research. 2010; 202(1):16-24.

[20] Bychkov I.V., Oparin G.A., Feoktistov A.G., Bogdanova V.G., Pashinin A.A.

Service-oriented multiagent control of distributed computations. Automation and Remote Control. 2015; (76):2000-2010. D0I:10.1134/S0005117915110090.

[21] Jian L., Duenas-Osorio L., Chen C., Shi C. AC power flow importance measures considering multi-element failures. Reliability Engineering & System Safety. 2017; (160):89-97. D0I:10.1016/j.ress.2016.11.010.

[22] van der Borst M., Schoonakker H. An overview of PSA importance measures. Reliability Engineering & System Safety. 2001; 72(3):241-245. D0I:10.1016/S0951-8320(01)00007-2.

Вычислительные технологии, 2022, том 27, № 5, с. 79-88. © ФИЦ ИВТ, 2022 ISSN 1560-7534

Computational Technologies, 2022, vol. 27, no. 5, pp. 79-88. © FRC ICT, 2022 elSSN 2313-691X

ИНФОРМАЦИОННЫЕ ТЕХНОЛОГИИ

DOI: 10.25743/ICT.2022.27.5.008 Комплексный анализ уязвимости мультиэнергетической системы

Н.М. Береснева1'*, А. В. Еде л ев1, С. А. Горский2, М. А. Марченко3'4

1 Институт систем энергетики им. Л.А. Мелентьева СО РАН, 664033, Иркутск, Россия

2Ииститут динамики систем и теории управления им. В.М. Матросова, 664033, Иркутск, Россия

3Институт вычислительной математики и математической геофизики СО РАН, 630090, Новосибирск, Россия

4Новосибирский государственный университет, 630090, Новосибирск, Россия * Контактный автор: Береснева Наталья Михайловна, e-mail: beresnevaSisem. irk .ru Поступила 08 июня 2022 г., принята в печать 30 июня 2022 г.

Аннотация

Предложена многоэтапная схема комплексного анализа уязвимости энергетической инфраструктуры. Схема использует реализованные ранее алгоритмы дискретного многокритериального отбора для поиска оптимальных вариантов функционирования энергетической инфраструктуры. Также осуществляет обработку, хранение и анализ природно-климатических и социально-экономических данных для мониторинга процессов функционирования объектов исследуемой энергетической инфраструктуры.

Ключевые слова: критические инфраструктуры, отказоустойчивость, анализ уязвимости, многокритериальный выбор.

Цитирование: Береснева Н.М., Еделев A.B., Горский С.А., Марченко М.А. Комплексный анализ уязвимости мультиэнергетической системы. Вычислительные технологии. 2022; 27(5):79-88. D01:10.25743/ICT.2022.27.5.008. (на английском)

Благодарности. Работа выполнена при финансовой поддержке Министерства науки и высшего образования РФ в рамках государственных заданий Ш FWEU-2021-0003 и Ш FWEW-2021-0005, а также РФФИ в рамках научных проектов Ш 15-07-07412а и Ш 20-08-00367а. Авторы выражают благодарность Иркутскому суперкомпьютерному центру СО РАН за предоставление доступа к высокопроизводительному кластеру "Академик В.М. Матросов" (Иркутский суперкомпьютерный центр СО РАН, Иркутск: ИДСТУ СО РАН; http://hpc.icc.ru, дата обращения 18.04.2022).

i Надоели баннеры? Вы всегда можете отключить рекламу.