- Infrastructure Resilience and Vulnerability Analysis
- Risk and Safety Analysis
- Supply Chain Resilience and Risk Management
- Transportation Planning and Optimization
- Traffic and Road Safety
- Complex Systems and Decision Making
- Occupational Health and Safety Research
- Maritime Ports and Logistics
- Disaster Management and Resilience
- Infrastructure Maintenance and Monitoring
- Water resources management and optimization
- Probabilistic and Robust Engineering Design
- Global Energy and Sustainability Research
- Environmental and Social Impact Assessments
- Electric Vehicles and Infrastructure
- Transportation Systems and Infrastructure
- Construction Project Management and Performance
- Systems Engineering Methodologies and Applications
- Risk Perception and Management
- Multi-Criteria Decision Making
- Information and Cyber Security
- Flood Risk Assessment and Management
- Water-Energy-Food Nexus Studies
- Urban Transport and Accessibility
- Wildlife-Road Interactions and Conservation
University of Virginia
2015-2024
Engineering Systems (United States)
2012-2024
Environmental Protection Agency
2024
Advanced Communication Systems (United States)
2024
Embedded Systems (United States)
2022
American College of Chest Physicians
2022
Institute of Electrical and Electronics Engineers
2006-2019
Regional Municipality of Niagara
2019
IEEE Computer Society
2019
Homerton University Hospital NHS Foundation Trust
2019
The paper discusses the theory and methodology supporting development of inoperability input-output model (IIM). IIM is based on Leontief’s model, which characterizes interdependencies among sectors in economy analyzes initial disruptions to a set resulting ripple effects. An advantage building that it supported by publications Bureau Economic Analysis. Independent computer runs can represent entire nation or within particular U.S. regions. A dynamic extension different temporal frames...
This paper contributes a methodological framework to identify, prioritize, assess, and manage risk scenarios of large‐scale system. Qualitative screening classes is appropriate initially, while quantitative assessments may be applied once the set all (hundreds) has been prioritized in several phases. The eight‐phase methodology described detail operations other than war. eight phases are as follows: Phase I, Scenario Identification —A hierarchical holographic model (HHM) developed describe...
The paper discusses case studies of the inoperability input-output model (IIM) for modeling impacts willful attacks on interdependent sectors. IIM is a assessing sector vulnerabilities using and economic loss impact metrics. focus high-altitude electromagnetic pulse (HEMP) attack scenarios. HEMP an intense blast induced from high-elevation nuclear explosions, potentially causing damage to electronic electrical systems. Parametric uncertainty analyses are conducted (1) intensity initial...
Abstract Regulatory agencies have long adopted a three‐tier framework for risk assessment. We build on this structure to propose tiered approach resilience assessment that can be integrated into the existing regulatory processes. Comprehensive approaches assessing at appropriate and operational scales, reconciling analytical complexity as needed with stakeholder needs resources available, ultimately creating actionable recommendations enhance are still lacking. Our proposed consists of tiers...
With cloud computing, Internet-of-things, wireless sensors, social media, fast storage and retrieval, etc., organizations enterprises have access to unprecedented amounts varieties of data. Current risk analysis methodology applications are experiencing related advances breakthroughs. For example, highway operations data readily available, making use them reduces risks traffic crashes travel delays. Massive financial enterprise systems support decision under by individuals, industries,...
The paper reviews needs and opportunities to reduce the vulnerability of public water systems willful attack. Water supply infrastructure systems, their components are described in general. terrorist threat is described, classifying potential physical, chemical-biological, cyber attacks these systems. A hierarchical holographic model introduced for multiple perspectives on hardening Types defined, including security, robustness, resilience, redundancy. concludes with recommendations future...
Military and industrial facilities need secure reliable power generation. Grid outages can result in cascading infrastructure failures as well security breaches should be avoided. Adding redundancy increasing reliability require additional environmental, financial, logistical, other considerations resources. Uncertain scenarios consisting of emergent environmental conditions, regulatory changes, growth regional energy demands, concerns further complications. Decisions on selecting...
This paper develops a methodology for eliciting shifts in preference across future scenarios the performance assessment of infrastructure policies and investments. The quantifies robustness alternative portfolios variety identifies that greatly affect assessments. An innovation is to elicit, each scenario, only few relative increases or decreases importance selected terms value function, which more efficient than full elicitation function scenario. identification critical via our can be used...
The Afghanistan National Development Strategy identified billions of dollars needs for transportation, water, energy, telecommunications, and other necessary infrastructure development the rebuilding Afghanistan. With economic sustainability as a primary aim, coordination prioritization investments has been challenge in part because Afghanistan's volatile security situation along with intricacies negotiating coordinating efforts numerous stakeholders. An understanding contributions systems...
Abstract A recent paper in this journal described the identification and integration of sources risk a systems engineering process model [Lambert, Jennings, Joshi, Syst Eng 9(3) (2006), 187–198]. The earlier effort falls short addressing deep, nonprobabilistic uncertainty that should enter to strategic design reengineering. Our new incorporates framework for evaluating which are deep uncertainties most influence priority‐setting among investments large‐scale with multiple stakeholders,...
Theory, methodology, and applications of risk analysis contribute to the quantification management resilience. For analysis, numerous complementary frameworks, guidelines, case studies, etc., are available in literature. resilience, documented sparse relative untested definitions concepts. This essay on resilience analytics motivates tools, processes that will achieve real systems. The paper describes how analysts lead modeling, quantification, for a variety systems subject future...
Transportation infrastructure could be vulnerable to local manifestations of global climate change, such as storm frequencies and durations seasons. To adapt, transportation agencies need methodologies for reprioritizing their assets subject the new sources vulnerability. Prioritizing is nontrivial when criteria assessments owner/operator preferences are considered in conjunction with possible scenarios. Few efforts date have addressed these scenarios a priority setting asset management...
This article presents an approach to the problem of terrorism risk assessment and management by adapting framework filtering, ranking, method. The is conducted at two levels: (1) system level, (2) asset‐specific level. system‐level attempts identify prioritize critical infrastructures from inventory assets. definition offered Presidential Decision Directive 63 was used determine set attributes assets—categorized according national, regional, local impact. An example application demonstrated...
Abstract With coordinated military and civil operations in developing countries, the integration of local stakeholder values with goals security nation building is crucial. Such encourages innovative effective courses action prioritization resources. Although tools multi‐criteria decision analysis are well suited for resource prioritization, designing practical value judgment elicitation countries a challenge because cultural, organizational, other barriers. Specifically, weight individual...
Abstract The consideration of emergent scenarios economy, environment, technology, etc. is mandated by the US Department Transportation for long‐range transportation planning infrastructure that will involve federal funding. This paper develops a practical methodology scenario‐based within multi‐criteria decision aid to support comparison policies across state, regional, and local agencies. demonstrated in case study. First, we review existing methods practices planning. Second, perform...
A risk-based cybersecurity framework must continuously assimilate new information and track changing stakeholder priorities adversarial capabilities, using decision-analysis tools to link technical data with expert judgment.
Life-cycle greenhouse gas (LC-GHG) emissions are a principal metric used by the U.S. Environmental Protection Agency to determine whether biofuel qualifies under EPA's Renewable Fuel Standard (RFS2). This paper identifies important factors in quantification of LC-GHG algae-derived diesel, jet fuel, and gasoline, using hydrothermal liquefaction (HTL) as case study for algal biofuels. The results indicate that, certain conditions, algae biofuels produced HTL offer an over 50% reduction...
Infrastructure development of volatile regions is a significant investment by international government and nongovernment organizations, with attendant requirements for risk management. Global banks may be tasked to manage these investments provide channel between donors borrowers. Moreover, various stakeholders from the private sector, local agencies, military can engaged in conception, planning, implementation constituent projects. Emergent future conditions conflict, politics, economics,...
In this paper, we review methods for assessing and managing the risk of extreme events, where “extreme events” are defined to be rare, severe, outside normal range experience system in question. First, discuss several systematic approaches identifying possible events. We then some issues related assessment including what type output is needed (e.g., a single probability vs. distribution), alternatives probabilistic approach. Next, present number methods. These include : guidelines eliciting...
In this paper, we review methods for assessing and managing the risk of extreme events, where “extreme events” are defined to be rare, severe, outside normal range experience system in question. First, discuss several systematic approaches identifying possible events. We then some issues related assessment including what type output is needed (e.g., a single probability vs. distribution), alternatives probabilistic approach. Next, present number methods. These include: guidelines eliciting...