Entropy of centrality values for topological vulnerability analysis of water distribution networks

PurposeThe increased complexity of water distribution networks (WDNs) emphasizes the importance of studying the relationship between topology and vulnerability of these networks. However, the few existing studies on this subject measure the vulnerability at a specific location and ignore to quantify...

Full description

Saved in:
Bibliographic Details
Published inBuilt environment project and asset management Vol. 9; no. 3; pp. 412 - 425
Main Authors Zarghami, Seyed Ashkan, Gunawan, Indra, Schultmann, Frank
Format Journal Article
LanguageEnglish
Published Bingley Emerald Group Publishing Limited 05.07.2019
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:PurposeThe increased complexity of water distribution networks (WDNs) emphasizes the importance of studying the relationship between topology and vulnerability of these networks. However, the few existing studies on this subject measure the vulnerability at a specific location and ignore to quantify the vulnerability as a whole. The purpose of this paper is to fill this gap by extending the topological vulnerability analysis further to the global level.Design/methodology/approachThis paper introduces a two-step procedure. In the first step, this work evaluates the degree of influence of a node by employing graph theory quantities. In the second step, information entropy is used as a tool to quantify the global vulnerability of WDNs.FindingsThe vulnerability analysis results showed that a network with uniformly distributed centrality values exhibits a lower drop in performance in the case of partial failure of its components and therefore is less vulnerable. In other words, the failure of a highly central node leads to a significant loss of performance in the network.Practical implicationsThe vulnerability analysis method, developed in this work, provides a decision support tool to implement a cost-effective maintenance strategy, which relies on identifying and prioritizing the vulnerabilities, thereby reducing expenditures on maintenance activities.Originality/valueBy situating the research in the entropy theory context, for the first time, this paper demonstrates how heterogeneity and homogeneity of centrality values measured by the information entropy can be interpreted in terms of the network vulnerability.
ISSN:2044-124X
2044-1258
DOI:10.1108/BEPAM-02-2019-0014