Topics in Safety, Risk, Reliability and Quality Bogdan I. Vamanu Adrian V. Gheorghe Polinpapilinho F. Katina Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods Transportation by Road and Rail Topics in Safety, Risk, Reliability and Quality Volume 31 Series editor Adrian V. Gheorghe, Old Dominion University, Norfolk, VA, USA Editorial Advisory Board Hirokazu Tatano, Kyoto University, Kyoto, Japan Enrico Zio, Ecole Centrale Paris, France and Politecnico di Milano, Milan, Italy Andres Sousa-Poza, Old Dominion University, Norfolk, VA, USA More information about this series at http://www.springer.com/series/6653 Bogdan I. Vamanu Adrian V. Gheorghe Polinpapilinho F. Katina • Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods Transportation by Road and Rail 123 Bogdan I. Vamanu Department of Life and Environmental Physics, DFVM Horia Hulubei National Institute for Physics and Nuclear Engineering Bucharest Romania and European Commission’s Joint Research Centre Institute for Energy and Transport (JRC-IET) Ispra Italy Adrian V. Gheorghe Engineering Management and Systems Engineering Old Dominion University Norfolk, VA USA Polinpapilinho F. Katina Engineering Management and Systems Engineering Old Dominion University Norfolk, VA USA ISSN 1566-0443 ISSN 2215-0285 (electronic) Topics in Safety, Risk, Reliability and Quality ISBN 978-3-319-30929-3 ISBN 978-3-319-30931-6 (eBook) DOI 10.1007/978-3-319-30931-6 Library of Congress Control Number: 2016935215 © Springer International Publishing Switzerland 2016 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper This Springer imprint is published by Springer Nature The registered company is Springer International Publishing AG Switzerland To my parents —Bogdan I. Vamanu To my children, Anastasia, Alexandra, and Paul —Adrian V. Gheorghe To my mother, Elizabeth, sister, Rachel, and niece, Beatrice —Polinpapilinho F. Katina Preface The twentieth and twenty-first centuries have been characterized as tumultuous (Martin 2006; Tainter 1988). This characterization fits within the scope of concepts of ambiguity, complexity, emergence, independency, and uncertainty (Keating et al. 2014; Katina 2015). Ambiguity is associated with an increasing lack of clarity and situational understanding while complexity is associated with large numbers of richly and dynamically interacting systems and subsystems with behavior difficult to predict. The concept of emergence is associated with inability to deduce behavior, structure, or performance from constituent elements while interdependency relates to mutual influence among different complex systems through which the state of a system influences, and is influenced by, the state of other interconnected systems. The uncertainty aspect of current landscape is associated with having incomplete knowledge casting doubt for decision/action consequences. Certainly, these concepts align with the notions of ‘messes’ (Ackoff 1974) and ‘wicked problems’ (Rittel and Webber 1973). Operating under these conditions is a set of systems “so vital and ubiquitous that their incapacity or destruction would not only affect the security and social welfare of any nation, but also cascade across borders” (Gheorghe et al. 2007, p. 6). Examples of such system include but not limited to chemical industries, communication systems, emergency services, energy, food and agriculture, healthcare and public health, and transportation systems. Collectively, referred to as critical infrastructures, research pertaining to such systems tends to “addresses elements of assessment, remediation, indications and warnings, mitigation, response, and reconstruction pertaining to hazards, risks, and threats from natural and man-made events affecting public well-being—public safety, economic vitality, and security” (Gheorghe and Katina 2014, p. 194). The importance of critical infrastructures can be highlighted on two fronts: first is the perspective of the level to which critical infrastructures influence public well-being. Arguably, all daily activities are influenced by goods and services that are provided by critical infrastructures: clean water, save food, lighting, banking, shopping, transportation…the list goes on. Continuous operability and availability vii viii Preface of critical infrastructure is imperative. Second is the consideration of frequency of occurrence and increasing loss of lives and property associated with natural and man-made events. Harmful events, natural or man-made, have always occurred. However, there has been unprecedented increase in occurrence and causalities associated with events such as hurricanes and terror attacks. These two fronts suggest a need for development of methodologies, methods, tools, and techniques capable of addressing emerging issues. This is not a new insight. In fact, it is widely accepted that science, state, business, and military have failed to deliver on their promises of a modern society free of risk (Beck 2006; Escobar 2004). In the context of critical infrastructures, addressing these issues might require thinking ‘outside and above’ the box. These thoughts go hand-in-hand a quote that is often attributed to Albert Einstein, “We cannot solve our problems with the same level of thinking that created them.” The same sentiments are echoed by Hammond (2002) who suggests that “problems confronting humanity at this stage in our history (poverty, violence, crime, environmental degradation and nuclear weapons…terrorism) are systemic and cannot be understood or resolved in isolation” (p. 430). When these ideas a coupled with “dwindling applicability of ‘old’ methods and tools…[the] need to (re)think such issues as infrastructure protection, deterioration, assessment, remediation, indications and warnings, mitigation, response, and reconstruction” (Gheorghe and Katina 2014, p. 195) becomes apparent. Therein these sentiments lay the purpose for the present research—the development of a sound framework for an innovative statistical approach to risk and vulnerability assessment in the transportation of hazardous materials (i.e., hazmat). To fulfill this purpose, eight chapters and four appendixes have been carefully crafted to enable understanding of concepts, ample utility of models, and transferability of the presented research. The intended audience of the book is primarily practitioners and analysts involved in managing risk associated with transportation of hazmat. However, business leaders and policy-makers will find this book useful especially since they are ultimately responsible for decisions involving business transactions including investment and development of policy the affect public well-being. Graduate students interested in the present topic may need to ‘pay a close attention’ to procedures involved in the development of equations and models. Chapter 1 introduces the research domain of critical infrastructures along with the underlying themes from which the need for robust methodologies, methods, tools, and techniques has sprung. The need for new approaches is made more apparent in Chap. 2 with a consideration of risk and vulnerability associated with the transportation of hazmat. Specifically, a new and novel approach, hotspot, is introduced along with the underpinnings of spatial information and complementary cumulative distribution function. Chapter 3 covers methods and corresponding equations related to probability of occurrence of loss of containment that result in accidents. This chapter includes detailed accounts on how to identify initiating events in the case of two modes of transportation: rail and road. Chapter 4 addresses consequences associated with loss Preface ix of containment. Types of consequences are discussed (fire, explosion, and acute intoxication) along with specific methods for their calculations. An important aspect of risk is the conceptualization of vulnerability. How though do we define vulnerability? And more specifically, how can it be quantified for use in a methodology? Chapter 5 addressed this issue in general and then in the transportation system. Chapter 6 covers two methods that can be used in quantitative assessment of vulnerability in transportation systems. First is the Index Method which targets the assessment of the vulnerability level and second is the Matrix Method which, as the outcome, derives a robustness index. This chapter concludes with a proposed model for assessing vulnerability of transportation corridors. Chapter 7 is a continuation of the models introduced in Chap. 6. It covers a quantitative vulnerability assessment method which models phenomena in multi-component systems. The first part of this chapter provides foundational information while the second part provides procedures for application of the method. The concluding chapter, Chap. 8, is a case application of present research. A real-world case scenario, a transportation system ‘Aarau-Zurich’ is selected and analyzed for hotspots. There are four complementary appendixes; each provide essential information related to theory, methods, and utility of present research. Appendix A elaborates on methods and tools for Probabilistic Risk Assessment and Reliability, Availability, Maintainability and Safety from which master logical diagrams, event tree analysis, and life data analysis (important tools in present research) are derived. Appendix B introduces the importance of decision support systems in transportation of hazmat as well as elaborating on the utility geographical information system in spatial analysis. Appendix C provides guidelines for developing an integrated software platform for risk and vulnerability assessment in transportation of hazmat. A description of a proposed architecture and its constituent blocks is provided along with potential capabilities. Lastly, Appendix D is designed to offer defensible yet simplistic explanation of how one arrives at the equation of state of system with many bi-stable entities—an issue that is rather not easy to understand by any stretch of imagination. References Ackoff, R. L. (1974). Systems, messes, and interactive planning. In Redesigning the future: Systems approach to societal problems (pp. 20–33). New York, NY: John Wiley & Sons Inc. Beck, U. (2006). Living in the world risk society. Economy and Society, 35(3), 329–345. Escobar, A. (2004). Beyond the third world: Imperial globality, global coloniality and anti-globalisation social movements. Third World Quarterly, 25(1), 207–230. Gheorghe, A. V., & Katina, P. F. (2014). Editorial: Resiliency and engineering systems—Research trends and challenges. International Journal of Critical Infrastructures, 10(3/4), 193–199. Gheorghe, A. V., Masera, M., De Vries, L., Weijnen, M., & Kröger, W. (2007). Critical infrastructures: The need for international risk governance. International Journal of Critical Infrastructures, 3(1/2), 3–19. x Preface Hammond, D. (2002). Exploring the genealogy of systems thinking. Systems Research and Behavioral Science, 19(5), 429–439. Katina, P. F. (2015). Systems theory-based construct for identifying metasystem pathologies for complex system governance (Ph.D.). Virginia, USA: Old Dominion University. Keating, C. B., Katina, P. F., & Bradley, J. M. (2014). Complex system governance: Concept, challenges, and emerging research. International Journal of System of Systems Engineering, 5 (3), 263–288. Martin, J. (2006). The meaning of the 21st century: A vital blueprint for ensuring our future. New York, NY: Riverhead Books. Rittel, H. W. J., & Webber, M. M. (1973). Dilemmas in a general theory of planning. Policy Sciences, 4(2), 155–169. Tainter, J. A. (1988). The collapse of complex societies. New York, NY: Cambridge University Press. Acknowledgments Authors wish to acknowledge different people and organizations involved in the inception, creation, and the publication of this research. Though too many to include them on this page, many scientists were consulted in the course of this work: none more than Prof. Wolfgang Kröger—ETH Zürich, Switzerland; Dr. Ioannis Papazoglou—National Center for Scientific Research ‘DEMOKRITOS’, Greece; Adolf Dörig—Dörig + Partner AG, Switzerland; Prof. Radu Cornel— Politehnica University of Bucharest, Romania; Jürg Birchmeier—Laboratorium fur Siecherheistanalytik, Switzerland; Dr. Charles Keating—Old Dominion University, USA; and Dr. Dan Vamanu—‘Horia Hulubei’ National Institute of Physics and Nuclear Engineering, Romania. Authors acknowledge support of Integrated Risk Governance Project— IHDP/Future Earth under grant number: 2010DFB20880, 2012DFG20710. Finally, authors are thankful to Cynthia Feenstra and Nathalie Jacobs of Springer Publishing Company for their administrative support in publishing this book. xi Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . 1.1 Critical Infrastructures . . . . . . . . . . . 1.2 Major Themes . . . . . . . . . . . . . . . . . 1.3 Transportation of Hazardous Materials References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1 3 6 7 2 Risk Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1 Risk Assessment in Hazmat Transportation . . . . . . . . . . . . . . 2.1.1 The Hot Spots Approach . . . . . . . . . . . . . . . . . . . . . 2.1.2 The Statistical Approach . . . . . . . . . . . . . . . . . . . . . 2.2 Extension of the Risk Assessment Methodology for Multimodal Transportation . . . . . . . . . . . . . . . . . . . . . . . 2.2.1 The ‘Hot Spot’ Method . . . . . . . . . . . . . . . . . . . . . . 2.2.2 The Statistical Method . . . . . . . . . . . . . . . . . . . . . . . 2.2.3 The Complementary Cumulative Distribution Function as a Risk Expression of the Health Impact . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 11 12 14 ... ... ... 18 18 19 ... ... 19 20 .... .... .... 23 23 25 .... .... 27 28 .... 41 .... .... .... 41 43 55 3 Quantitative Probability Assessment of Loc Accident. . . . . . . . 3.1 The Methodology: Loc Accident Probability Computation . . 3.1.1 Tools and Techniques . . . . . . . . . . . . . . . . . . . . . . 3.2 Models and Algorithms: Loc Accident Probability in Transportation by Rail . . . . . . . . . . . . . . . . . . . . . . . . . 3.2.1 Computational Scheme for LOC Accident by Rail . . . 3.3 Models and Algorithms: Loc Accident Probability in Transportation By Road . . . . . . . . . . . . . . . . . . . . . . . . 3.3.1 Deductively Model the Reality—MLD Development for LOC During Road Transportation. . . . . . . . . . . . 3.3.2 Computational Scheme for LOC Accident by Road . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii xiv Contents 4 Loc Consequence Assessment . . . . . . . . . . . . . . . . . . . . . . 4.1 Physical to Biological Effects’ Relationship. . . . . . . . . . 4.2 Fire Consequence Assessment . . . . . . . . . . . . . . . . . . . 4.2.1 Pool Fire Consequence Assessment . . . . . . . . . . 4.2.2 Flare Fire Consequence Assessment. . . . . . . . . . 4.2.3 BLEVE Consequence Assessment . . . . . . . . . . . 4.3 Explosion Consequence Assessment. . . . . . . . . . . . . . . 4.3.1 The Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 4.4 Acute Intoxication Consequence Assessment . . . . . . . . . 4.4.1 Computing the Risk Radii . . . . . . . . . . . . . . . . 4.4.2 Computing the Lethality Percentage. . . . . . . . . . 4.4.3 An Algorithm for Acute Intoxication Assessment References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 The Vulnerability Issue . . . . . . . . . . . . . . . . . . . . . . . . . 5.1 Definitions and Conceptualization . . . . . . . . . . . . . . . 5.2 Methodological Aspects in Quantitative Vulnerability Assessment in Transport Systems . . . . . . . . . . . . . . . 5.2.1 Transportation System Definition. . . . . . . . . . . 5.2.2 Defining the System by Indicators . . . . . . . . . . 5.2.3 The Vulnerability Assessment of Transportation System. . . . . . . . . . . . . . . . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 58 59 61 65 69 72 72 80 81 84 86 89 ........ ........ 91 93 ........ ........ ........ 97 98 98 . . . . . . . . 100 . . . . . . . . 103 6 Consensus-Driven Models for QVA in Transportation Corridors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1 The Index Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.1 Designing the System . . . . . . . . . . . . . . . . . . . . . . . . 6.1.2 The Risk-Management Capability Index and Weights Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.1.3 The Index Method: Transportation Corridor Vulnerability Assessment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2 The Relevance Matrices Method . . . . . . . . . . . . . . . . . . . . . . 6.2.1 The Method . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.2 Transportation Corridor Vulnerability Assessment Model with the Relevance Matrices Method . . . . . . . . . . . . . . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Physical Analogies-Based Model for Quantitative Vulnerability Assessment of Transportation Corridors . . . . . . . . . . . . . . . . . 7.1 Quantitative Vulnerability Assessment Method; Modeling Cooperative Phenomena in Multi-component Systems . . . . . 7.1.1 System Description by Indicators. . . . . . . . . . . . . . . 7.1.2 The Control Variables . . . . . . . . . . . . . . . . . . . . . . 7.1.3 System Constituents—System State Space . . . . . . . . . . 107 . . 107 . . 108 . . 108 . . 112 . . 120 . . 121 . . 123 . . 142 . . . . 145 . . . . . . . . . . . . . . . . 145 147 148 148 Contents xv 7.1.4 Vulnerability Basins—The Instability Region . . . 7.1.5 The Quantitative Vulnerability Assessment . . . . . 7.2 Applying QVA Model for the Vulnerability Assessment of Transportation Corridors . . . . . . . . . . . . . . . . . . . . . 7.2.1 Indicators Selection . . . . . . . . . . . . . . . . . . . . . 7.2.2 Computing the Physical Indicators—YUi and YVj 7.2.3 Transportation System Vulnerability Assessment . References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 An Illustrative Example—The Case for Aarau-Zurich . 8.1 Transportation Description . . . . . . . . . . . . . . . . . . 8.1.1 Graph Coordinate Axis Limits . . . . . . . . . . 8.1.2 Transportation Statistics . . . . . . . . . . . . . . . 8.2 Representation Maps of the Transportation . . . . . . . 8.2.1 ‘Aarau-Zurich’ TRANSPORTATION Map Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 . . . . . . . 155 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156 156 156 156 160 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 163 163 164 165 . . . . . . . . . . 165 Appendix A: Tools and Techniques for PRA and RAMs: A Primer . . . 177 Appendix B: Design Guidelines for Hazmat Transportation Decision Support Systems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Appendix C: Implementation Guideline for Hazmat Transportation DSS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Appendix D: Arriving at Equation for State of a System with many Bi-stable Entities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205 Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Chapter 1 Introduction Abstract This chapter introduces basic concepts in the field of critical infrastructures. The importance of the field for functionality of modern society is established in the context of major themes pertinent to the field itself (i.e., risk, vulnerability, interdependency, and resiliency). A particular sector of interest— transportation of chemicals (i.e., dangerous goods)—is then introduced to set the stage for the reminder of present research. 1.1 Critical Infrastructures There is wide recognition that modern society depends on goods and services provided by a set of complex systems known as critical infrastructures. These systems are often referred to as critical because they intrinsically connectedly maintaining and sustaining public well-being, safety, and economic prosperity (Gheorghe et al. 2006; Katina and Hester 2013; Kröger and Zio 2011; Rinaldi et al. 2001). At a fundamental level, the domain of critical infrastructures revolves around chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial bases, emergency services, energy, financial, services, food and agriculture, government facilities, health care and public health, information technology, nuclear reactors, materials, and wastewater systems (Obama 2013). At first glance, the domain of critical infrastructure (CI) appears to address sudden and catastrophic infrastructure failures and their impact (Calida and Katina 2012). This is only a partial view of this domain. Basic questions, such as how infrastructures become critical, what makes a system critical, who is in charge of such systems, can such systems operate risk-free, and how can policymakers and researchers use scientific enquiry to protect infrastructures, present a different set of challenges. Arguably, responses to such basic questions require a different, albeit holistic, perspective, capable of addressing current societal changes (i.e., rapid technological changes, socioeconomic factors, policy) and infrastructure complexity involving infrastructure systems as well as their interconnections (Gheorghe et al. 2006; Katina et al. 2014; Rinaldi et al. 2001). © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6_1 1 2 1 Introduction Table 1.1 A representative set of definitions for ‘critical infrastructures’ Author(s) CI definition Clinton (1996, p. 37347) Certain national infrastructures are so vital that their incapacity or destruction would have a debilitating impact on the defense or economic security of the USA Critical infrastructures consist of those physical and information technology facilities, networks, services, and assets which, if disrupted or destroyed, would have a serious impact on the health, safety, security, or economic well-being of citizens or the effective functioning of governments in the Member States … so vital and ubiquitous that their incapacity or destruction would not only affect the security and social welfare of any nation, but also cascade across borders European Council (2004, p. 3) Gheorghe et al. (2007, p. 6) Despite relative importance of critical infrastructures, there remains a lack of a universally accepted worldview on how to define and/or manage infrastructure systems. Moreover, information and knowledge regarding such infrastructures is often dispersed across individual infrastructure operators, sometimes with competing objectives. Table 1.1 provides a representation of definitions from various perspectives. However, the lack of a universally accepted worldview and dispersed knowledge bases should not hinder progress. In fact, it has been noted that the different perspectives ‘show the potential sources of divergence in the development of the [critical infrastructure] field … [with]. Each perspective brings a logic which provides its own internal validation to the community which produces and consumes the perspective’ (Keating and Katina 2011, p. 240). Katina and Keating’s (2015) research suggests that there are three diverging perspectives for this field: governmental, industrial (business), and academic. These perspectives are elaborated upon in Fig. 1.1. It should be obvious that these perspectives do not exist in Fig. 1.1 Three major perspectives in the field of critical infrastructures, adapted from Katina and Keating (2015) 1.1 Critical Infrastructures 3 isolation. It can also be noted that the governmental worldview on critical infrastructures tends to influence the industrial and academic worldviews through the regulation and the setting of funded research priorities especially at the national and international levels (Moteff 2010). 1.2 Major Themes The complexity associated with society changes (e.g., moving from public to private governance policies, rapid technological and institutional changes, and increasing demand for quality services) sets the stage for need to understand and effectively manage critical infrastructures—especially their services (Thissen and Herder 2003). In effect, there is a need to ensure that infrastructures are capable and able to successfully produce their expected outcomes (i.e., products, goods, and services). Successfully producing the desirable outcomes depends on various factors including infrastructure properties and interrelationships among infrastructures and how they relate to public well-being (Katina and Pinto 2012; Katina et al. 2014). Expounding on the need to understand and manage infrastructures are classical themes that set the foundations for research. Table 1.2 provides a set of themes for the field of critical infrastructures. Certainly, there is a need to make infrastructures more dependable, reliable, and resilient to natural and man-made hazards, risks, and threats. Moreover, the increasing occurrence and severity of recent events including the 9/11 attacks, Hurricane Katrina, 2011 Tōhoku earthquake, Tsunami earthquakes, and countless cyber attacks seem to indicate that our systems and indeed our modern society are exposed, fragile, susceptible, and vulnerable to different kinds of hazards, threats, and risks. Moreover, if one works with the assumption that the goal of maintaining and sustaining public health, economy, and security depends on the inputs and outputs of multiple well-interconnected infrastructure systems, the relationship among infrastructures cannot be not one to one; rather, it is multidirectional. This multidirectional relationship is a theme in critical infrastructures and is often explored through the concept of interdependency. The Merriam-Webster Encyclopedic Dictionary notes that the term ‘interdependency’ is a combination of two distinctive words: inter and dependency (Merriam-Webster 2006). The prefix inter relates to among, between, within, and shared. On the other hand, dependency means being influenced, determined by, conditioned by, or subject to another for support. Seminal contributions of Rinaldi et al. (2001) have to be recognized when it comes to the concept of interdependency in critical infrastructures. Rinaldi et al. posited that infrastructure interdependency is categorized into four types (i.e., physical, cyber, geographic, and logical). This work has been expended to include a mathematical formulation for interdependency (Dudenhoeffer et al. 2006). An even broader categorization of infrastructure interdependency is provided by Katina et al. 4 1 Introduction Table 1.2 A set of major themes for the field of critical infrastructures Major themes in critical infrastructure Theme definition Vulnerability ‘[v]ulnerability is defined as the manifestation of the inherent states of the system that can be subjected to a natural hazard or be exploited to adversely affect that system’ (Aven 2011, p. 515). Since most critical infrastructures operate in the ‘open,’ they are prone to physical harm (e.g., explosions) and cyber attacks Operability of an infrastructure may depend on the operations in other critical infrastructures. This relationship also exists in the relationship between public well-being and operability of other infrastructures (e.g., operability of an electrical grid for electricity provision) As used in this research, relates to concepts of dose amount, pollution, toxicity, and surface area (Gheorghe 2005). When used in terms of critical infrastructure, it explains proximity such as being exposed to natural threat (e.g., a hurricane) and man-made cyber threats, for example, via ubiquitous computing and telecommunications that could be hacked A fragile defines a condition of being easily broken down. In the area of power plants, fragility is ‘the likelihood of failure as a function of peak ground acceleration for plant structures, equipment, and other components’ (Kaplan et al. 1983, p. 171). The concern for the field of critical infrastructure is the identification of those systems that are fragile, understanding how fragile they are and developing means to address and possibly reduce the fragility Blanchard and Fabrycky (2006, p. 369) define reliability as ‘the ability of a system to perform its intended mission when operating for a designated period of time, or through a planned mission scenario (or series of scenarios), in a realistic operational environment.’ From the critical infrastructure perspective, reliability entails ensuring that infrastructure systems can produce their intended good and serves when needed, despite conditions that may hinder their reliability Risk is usually defined in terms of probability of occurrence of an event and magnitude of the resulting consequences (ASCE 2009). Given the importance of critical infrastructures, it is only natural to consider probabilities that certain events (e.g., loss of a containment) may occur and the resulting consequences on different levels (e.g., public well-being, business operations, environment) Critical infrastructures face many natural events (e.g., power outage due to storms) and man-made events (e.g., power outage due to sabotage), and therefore, their operability can be expected to be impacted. The key, however, is ensuring that infrastructures have the ability to quickly bounce back after failures since prolonged failures can have debilitating impact on society (Gheorghe and Katina 2014) Dependency Exposure Fragility Reliability Risk Resiliency 1.2 Major Themes 5 Table 1.3 Types of critical infrastructure interdependencies Type of interdependency Definition Physical interdependency Exists between infrastructure systems if the state of infrastructure depends on the outputs (i.e., product, goods, and services) of another infrastructure. In Rinaldi et al. (2001, p. 15), it is demonstrated that the physical interdependency in infrastructures ‘arises from the physical linkage between the inputs and outputs of two agents [where the] commodity produced or modified by one infrastructure (an output) is required by another infrastructure for it to operate (an input).’ Exists among infrastructure systems if the functioning of an infrastructure and its components depends on the output that is transmitted via information and telecommunication systems. Rinaldi (2004, p. 2) notes that ‘computerization and automation of modern infrastructures and widespread use of SCADA systems have led to pervasive cyber interdependencies.’ Exists among infrastructure systems if ‘infrastructure components, e.g., transmission lines, water pipelines, gas pipelines, and telecommunications cables share common corridors’ (GITA 2008, p. 3). Common corridors are needed in the coupling of infrastructure components; however, this poses a threat to all interdependent infrastructure systems in case of failure stemming from explosion According to Rinaldi (2004, p. 2), logical interdependency exists in infrastructures ‘if the state of each [infrastructure] depends upon the state of the other [infrastructure] via some mechanism that is not a physical, cyber, or geographic connection.’ A good example is regulatory stipulations that linked the California power crisis and financial infrastructure (Sweeney 2002) This interdependence becomes apparent only after an event happens. For example, after the attacks on the World Trade Towers, US government issued certain regulations that affected all US air transport systems. And the flying experience was forever changed (Mendonca and Wallace 2006) Refers to interdependency that exists due to public opinion, confidence, fear, and a culture as a whole as a result of infrastructure or component failure. Consider the restoration of air service after the events of 9/11. Air traffic was reduced due to the public’s evaluation of travel safety resulting in job cuts and bankruptcies (Dudenhoeffer et al. 2006) Cyber interdependency Geographic interdependency Logical interdependency Policy and/or procedural interdependency Societal interdependency (2014) with applications in health care. Table 1.3 provides a summary of types of interdependences. Research into infrastructure interdependencies can be instrumental in understanding how outputs of a given infrastructure can affect the operability of the other infrastructure. This type of analysis can be useful in developing prevention, mitigation, and recovery measures. Whether one is interested in interdependencies or any other theme of this field, it is certainly clear that there is an urgent need for the 6 1 Introduction development of robust methodologies, methods, tools, and techniques that can be used to address different issues in the field of critical infrastructures. A particular issue of interest for current research efforts is chemicals, more specifically the transportation of chemical, thereafter known as dangerous goods. 1.3 Transportation of Hazardous Materials The chemical industry plays a key role on public well-being. This sector is comprised of companies that produce industrial-level chemicals, and these chemicals are used in many aspects of human life including processing of oil, natural gas, air, water, metals, and minerals into usable products. In the context of critical infrastructures, the chemical sector has been identified as an integral component to economy, relying on and supporting a wide range of other critical infrastructure sectors (USDHS 2013). According to the US Department of Homeland Security,1 this sector can be divided into five main segments of basic chemicals, specialty chemicals, agricultural chemicals, pharmaceuticals, and consumer products. As expected, each segment has a distinctive set of characteristics, growth dynamics, markets, new developments, and issues (i.e., risk) which are beyond the scope of current discussion. However, current efforts are dedicated toward risk associated with the transportation of such goods. Transportation simply refers to means of conveyance or travel from one place to another. In the context of chemical, it refers to moving chemical from one location to another. This movement can be done via several mechanisms as indicated in Table 1.4. Certainly, the role of transportation system within the context of movement of dangerous goods is to ensure quick, safe, and secure movement of goods and people through streets, towns, regions, and countries overland, sea, or air. However, this is not a simple task as illustrated by accidents involving dangerous goods and their impact on people and the environment. In fact, dangers associated with transporting hazardous materials are all too common (NTSB 2009). One of the most recent examples is the Lac-Mégantic derailment that took place at Lac-Mégantic, Quebec, Canada in July 2013 in which forty-seven (47) people died when there was a derailment of an oil shipment train. The oil shipment caught fire, exploded, and destroyed more than thirty buildings. It goes without mentioning the mental effects and environmental effects of the derailment (Becker et al. 2000). Such kind of events, together with the need to prevent spills and illegal dumping of chemicals, were instrumental in pushing toward regulations. One such regulation was the enactment of the Hazardous Materials Transportation Act (HMTA) in 1970s with the purpose to ‘protect against the risks to life, property, and the environment that 1 http://www.dhs.gov/chemical-sector#. 1.3 Transportation of Hazardous Materials 7 Table 1.4 Forms of modes within the transportation sector Modes of transportation Description of modes of transportation Aviation A mode of transportation that includes aircraft, air traffic control systems, and thousands of airports, heliports, and landing strips. This mode includes civil and joint-use military airports, heliports, short takeoff and landing ports, and seaplane bases It encompasses millions miles of roadways, bridges, and tunnels. Vehicles (i.e., automobiles, motorcycles, trucks, and commercial freight vehicles) use these while carrying hazardous materials It consists of miles of coastline, ports, waterways, square miles of Exclusive Economic Zone, and intermodal landside connections, which allow the various modes of transportation to move people and goods to, from, and on the water This mode consists of service by buses, rail transit (commuter rail, heavy rail—also known as subways or metros—and light rail, including trolleys and streetcars), long-distance rail, and others (e.g., cable cars, inclined planes, funiculars, and automated guideway systems) This mode consists of vast networks of pipeline that traverse hundreds of thousands of miles throughout countries carrying natural gas and other hazardous liquids This mode consists of major carriers, hundreds of smaller railroads, miles of active railroad, freight cars, and locomotives This mode moves millions of messages, products, and financial transactions each day. This mode of transportation is distinguished by its focus on letter or flat mail, publications, or small- and medium-sized packages and by service Highway infrastructure and motor carrier Maritime transportation system Mass transit and passenger rail Pipeline systems Freight rail Postal and shipping are inherent in the transportation of hazardous material in intrastate, interstate, and foreign commerce’ (USSoT 1978, p. 131). In the present research, emphasis is placed on risk and vulnerability associated with the transportation of dangerous goods by rail and road. References ASCE. (2009). Guiding principles for the nation’s critical infrastructure. Reston, VA: American Society of Civil Engineers. Aven, T. (2011). On some recent definitions and analysis frameworks for risk, vulnerability, and resilience. Risk Analysis, 31(4), 515–522. doi:http://doi.org/10.1111/j.1539-6924.2010.01528.x Becker, S. M., Pitt, R., & Clark, S. (2000). Environmental health, public safety, and social impact associated with transportation accidents involving hazardous substances. Tuscaloosa, AL: University Transportation Center for Alabama. Blanchard, B. S., & Fabrycky, W. J. (2006). Systems engineering and analysis (4th ed.). Upper Saddle River, NJ: Pearson-Prentice Hall. 8 1 Introduction Calida, B. Y., & Katina, P. F. (2012). Regional industries as critical infrastructures: A tale of two modern cities. International Journal of Critical Infrastructures, 8(1), 74–90. Clinton, W. J. (1996). Executive order 13010: Critical infrastructure protection. Federal Register, 61(138), 37345–37350. Dudenhoeffer, D. D., Permann, M. R., & Manic, M. (2006). CIMS: A framework for infrastructure interdependency modeling and analysis. In Proceedings of the 38th Conference on Winter Simulation (pp. 478–485). Monterey, California: Winter Simulation Conference. http://doi.org/ 10.1109/WSC.2006.323119 European Council. (2004). Communication from the Commission to the Council and the European Parliament: Critical infrastructure protection in the fight against terrorism (pp. 1–11). Brussels, Belgium: Commission of the European Communities. Retrieved from http://eur-lex. europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52004DC0702:EN:NOT Gheorghe, A. V. (2005). Integrated risk and vulnerability management assisted by decision support systems: Relevance and impact on governance (Vol. 8). Dordrecht, The Netherlands: Springer. Gheorghe, A. V., & Katina, P. F. (2014). Editorial: Resiliency and engineering systems—research trends and challenges. International Journal of Critical Infrastructures, 10(3/4), 193–199. Gheorghe, A. V., Masera, M., De Vries, L., Weijnen, M., & Kröger, W. (2007). Critical infrastructures: The need for international risk governance. International Journal of Critical Infrastructures, 3(1/2), 3–19. Gheorghe, A. V., Masera, M., Weijnen, M. P. C., & De Vries, J. L. (Eds.). (2006). Critical infrastructures at risk: Securing the European electric power system (Vol. 9). Dordrecht, The Netherlands: Springer. GITA. (2008). The geospatial dimensions of critical infrastructure and emergency response: White paper series (p. 9). Aurora, CO: Geospatial Information and Technology Association. Retrieved from http://www.directionsmag.com/images/whitepapers/GITA/Infrastructure_ Interdependencies.pdf Kaplan, S., Perla, H. F., & Bley, D. C. (1983). A methodology for seismic risk analysis of nuclear power plants. Risk Analysis, 3(3), 169–180. doi: http://doi.org/10.1111/j.1539-6924.1983. tb00118.x Katina, P. F., & Hester, P. T. (2013). Systemic determination of infrastructure criticality. International Journal of Critical Infrastructures, 9(3), 211–225. Katina, P. F., & Keating, C. B. (2015). Critical infrastructures: A perspective from systems of systems. International Journal of Critical Infrastructures, 11(4), 316–344. Katina, P. F., & Pinto, C. A. (2012). On critical infrastructure interdependency. In The 33rd National American Society for Engineering Management (p. 10). Virginia Beach, VA: Curran Associates, Inc. Katina, P. F., Pinto, C. A., Bradley, J. M., & Hester, P. T. (2014). Interdependency-induced risk with applications to healthcare. International Journal of Critical Infrastructure Protection, 7 (1), 12–26. Keating, C. B., & Katina, P. F. (2011). Systems of systems engineering: Prospects and challenges for the emerging field. International Journal of System of Systems Engineering, 2(2/3), 234– 256. Kröger, W., & Zio, E. (2011). Vulnerable systems. London, UK: Springer. Mendonca, D., & Wallace, W. A. (2006). Impacts of the 2001 world trade center attack on New York city critical infrastructures. Journal of Infrastructure Systems, 12(4), 260–270. Merriam-Webster. (2006). Webster’s new explorer encyclopedic dictionary. Springfield, MA: Federal Street Press. Moteff, J. D. (2010). Critical infrastructures: Background, policy, and implementation (pp. 1–38). Washington, DC: Congressional Research Service. NTSB. (2009). Cargo hose rupture and release of anhydrous ammonia during offloading of a Werner transportation services cargo tank motor vehicle at the tanner industries plant: Swansea, South Carolina (No. NTSB/HZM-12/01/SUM PB2012-917002). Washington, DC: National Transportation Safety Board. References 9 Obama, B. H. (2013). Critical infrastructure security and resilience. Washington, D.C.: The White House. Retrieved from http://www.fas.org/irp/offdocs/ppd/ppd-21.pdf Rinaldi, S. M. (2004). Modeling and simulating critical infrastructures and their interdependencies. In Proceedings of the 37th Hawaii International Conference on System Sciences (pp. 1–8). Big Island, Hawaii. http://doi.org/10.1109/HICSS.2004.1265180 Rinaldi, S. M., Peerenboom, J. P., & Kelly, T. K. (2001). Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems, 21(6), 11–25. doi: http://doi.org/10.1109/37.969131 Sweeney, J. L. (2002). The California electricity crisis. Stanford, CA: Hoover Institution Press. Thissen, W. A., & Herder, P. M. (2003). Critical infrastructures: State of the art in research and application. Boston, MA: Kluwer Academic Publishers. Retrieved from http://www.loc.gov/ catdir/enhancements/fy0819/2003058876-d.html USDHS. (2013). NIPP 2013: Partnering for critical infrastructure security and resilience. Washington, D.C.: U.S. Dept. of Homeland Security. Retrieved from www.dhs.gov/xlibrary/ assets/nipp-ssp-national-monuments-icons.pdf USSoT. Title 49: Transportation, § 1, Oct. 17, 1978, 92 Stat. 1337; Pub. L. 97–449, § 1, Jan. 12, 1983, 96 Stat. 2413; Pub. L. 103–272, July 5, 1994, 108 Stat. 745 (1978). Retrieved from http://www.gpo.gov/fdsys/pkg/USCODE-2010-title49/content-detail.html Chapter 2 Risk Assessment Abstract There is no one widely accepted definition of risk. In fact, the meaning of the term risk is widely debated in literature (Holton 2004; Knight in Risk, uncertainty, and profit. Hart, Schaffner & Marx; Houghton Mifflin Co. Boston, MA, 1921). However, risk is usually associated with uncertainty. In terms of system life cycle, risk is associated with uncertainty and opportunities related to cost, schedule, and performance (INCOSE in Systems engineering handbook: a guide for system life cycle processes and activities. INCOSE, San Diego, CA, 2011). In the area of decision making, risk is associated with probabilities of unknown outcomes (Gibson et al. in How to do systems analysis. Wiley-Interscience, Hoboken, NJ, 2007). Nonetheless, a classical view of risk considers probability of occurrence of an event that could halt operations and consequences of such an event (ASCE in Guiding Principles for the Nation’s Critical Infrastructure. American Society of Civil Engineers, Reston, VA, 2009). The comprehensive analysis which consists of an objective evaluation of risk in which assumptions and uncertainties are clearly considered and presented is referred to as risk assessment. Risk assessment involves the determination of quantitative or qualitative estimation of risk related to a concrete situation and a recognized threat or hazard. 2.1 Risk Assessment in Hazmat Transportation In the particular case of risk assessment in the transportation of hazardous (i.e. hazmat) materials, the calculations of probability of occurrence of the disruptive event (the loss of containment) and of the consequences of such event (the impact on the public and the environment) play a critical role. Risk assessment typically is the basis for concepts of risk classifications (e.g., acceptable–unacceptable) and is instrumental in areas of decision making, resource allocation, and policy change. There are several methods for risk assessment that may differ from industry to industry, especially based on the type of risk involved (e.g., environmental, ecological, and public health). Some domains (e.g., nuclear, aerospace, oil, rail, and military) have a long standing in the concept of risk, and their risk assessment methods tend to be more advanced. © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6_2 11 12 2 Risk Assessment Fig. 1 The concept of impact location and affected area Risk assessment in hazmat is unique; an incident involving a transportation mode (e.g., vehicle or train) carrying hazmat cargo can produce undesirable shortand long-term effects on human health, environment, and property because of the possible release of toxic material and effects can be felt beyond an immediate area of an accident. Figure 2.1 attempts to illustrate this point by indicating that effects on an accident can be felt beyond the location of an impact. The impact location is the point of an accident and is represented by the center of the circle. From this simple illustration, the relevance of including spatial data and properties of a hazmat starts to become evident. Moreover, research suggested that 87 % of reported accidents (Major Hazard Incident Data Service—a major database) involve release hazmat (Oggero et al. 2006). Indeed, a hazmat event could be referred to as Low Probability High Consequence. 2.1.1 The Hot Spots Approach In many models, risk is computed without considering spatial information which characterizes transportation routes. This issue can be addressed through a consideration of hot spots (Gheorghe et al. 2003, 2005; Riegel 2015). The concept of ‘hot spots’ introduces route spatial characteristics and influences the computation of the probability and consequence assessment in the case of a loss of containment (LOC) accident (Gheorghe et al. 2003). The hot spots method is a practical and intuitive solution for developing accident scenarios based on a more detailed characterization of the determining risk factors that can be encountered along a transportation route (Gheorghe et al. 2004). The relationship between LOC probability, LOC consequence, and risk is presented in Fig. 2.2. When the concept of hot spots is deployed, several measures that would be ignored during a traditional approach are brought at the forefront of the analysis. In the case of transportation, especially land transportation, a logical conjugation of one hot spot might be defined in terms of a set of predefined criteria. This criterion might involve: • The existence of at least one of the sensitive infrastructure components, and/or • Crossing a given type of land use, and/or 2.1 Risk Assessment in Hazmat Transportation 13 Fig. 2 Relationship between probability, consequence, and risk • Population density which could be indicated in terms of excess of a given threshold. The sensitive infrastructure components can be identified based on road and rail accident statistics. This approach leads to the identification of the most frequent spatial characteristics in the proximity of the accidents. Identified ‘sensitive’ infrastructure components include the following: motorway rest areas, motorway entrance/exits, bridges, passages, tunnels, high-voltage line crossings, crossings, traffic jam areas, sharp curves areas and gas stations for road transportation, and station, signal, switch, bridge, passage and tunnels for rail transportation, respectively (Gheorghe et al. 2003). The hot spots approach allows the multicriteria risk characterization of the transportation routes, by taking into account the risk contributing factors given by 14 2 Risk Assessment the infrastructure, environment, and population. The first step in applying this method is identifying the areas along the route where the definition criteria of a hot spot are met. In this case, a route is described by a list of hot spots (i.e., locations with a higher risk of accidents). The second phase involves performing statistics in every hot spot, over a circular area determined by a relevant radius that equals the relevant radius of the considered physical effect (e.g., relevant radius for BLEVE— boiling liquid expanding vapor explosion). The gathered data are the basis for a hot spot risk index. Finally, the hot spots are then sorted by the risk indices and placed in risk basins defined in accordance with the risk perception of the analyst. 2.1.1.1 Representing Risk in the Hot Spot Method: The Risk Matrix The assessment of the hot spots on a transportation segment leads to the creation of segment risk report (i.e., a listing of critical points along a given segment). A risk report is a source of the segment’s risk pattern which is a holistic representation of the risk associated with the analyzed segment. Creating a risk pattern is a two-step process which involves: (1) sorting and classifying the hot spots as either hot, warm, or acceptable and (2) building a risk matrix. Sorting and classifying is done through (a) the characteristic probability of LOC accident and (b) the consequence assessment which is defined in terms of health impact quantified by the number of deaths as a result of an accident at the particular hot spot. A classification of a hot spot (i.e., hot, warm, and acceptable) is done by setting the threshold values for both probability and lethality. These values are a reflection of the risk perception by the analyst which is in accordance with previous research (Clemson 1984; Katina 2015; Quade 1980; Warfield 1976). In the second step, the building of a risk matrix is done through probability against consequence measure and populating it with the identified hot spots. This creates an interval classification of the probabilities and consequences which is conducive in effect in defining three risk basins within the risk matrix. 2.1.2 The Statistical Approach 2.1.2.1 The Framework The framework starts from an innovative statistical approach which was introduced in Gheorghe et al. (2000). The method was originally developed for risk assessment of hazmat transportation by rail. The validity of the model in the road transportation case, as well as its potential applicability in other transportation domains, such as inland waters, has been confirmed in different quantitative assessments undertaken at the Swiss Federal Institute of Technology (ETH Zürich), Zurich, Switzerland. This model targets the representation of the risk associated with an activity by the cumulative frequency of the consequence indicators. In the case of transportation of hazardous materials, this is referred to as the representation of hazmat 2.1 Risk Assessment in Hazmat Transportation 15 transportation by the cumulative frequency of fatalities (CFF). This model requires an intensive use of the hot spots method in conjunction with a circumstantial database for statistical analysis of the transportation segment vicinity. The process of computing the CCF involves: (a) the identification of the route characteristic hot spots, (b) setting up a complex source term containing a complete set of scenarios corresponding to different substance components of the transportation and distinct release classes (from small to complete release), and (c) health and environmental impact assessment (in the form of cadastral statistics) accompanied by the LOC probability assessment for each of the plausible scenarios. The following section elaborates on the model. Appendix C elaborates on need for hazmat database development and provides development guidelines. 2.1.2.2 The Statistical Method This section elaborates on the nature of the problem statement along with the conceptual aspects and the computational algorithm for obtaining the cumulative frequency of fatalities (CFF). Note that the objective of the assessment is the computation of the CFF. Risk associated with a given transport system is then characterized by the complementary CCFF which is closely related to CCDT— complementary cumulative distribution function. The Scenarios For a given case, the following holds: • CFF refers to a set of N scenarios • One scenario is characterized by: – The substance: A subject of transportation and LOC accident. Each substance is in turn characterized by a vector of physical and chemical properties. These are necessary for the consequence assessment phase. – One release category: A classification of small, medium, large, and the corresponding quantities such as kilogram (kg). – One physical effect: These can include, among others, pool fire, BLEVE, and toxicity along with the consideration of the physical effects of the substance. Each of the identified possible effects is then assessed using a corresponding method of consequence assessment. The results are provided in: (i) Lethality Percentage as function of Distance and (ii) the characteristic effect radius— the distance up to which the lethality percentage exceeds zero (0). – A list of hot spots along a given route is always identified using the hot spots approach. 16 2 Risk Assessment Fig. 3 An example of a cumulative fatalities function constructed from NFj and SFj Obtaining the CFF based on a scenarios set To construct the CFF, one has to compute for each scenario j (j ¼ 1. . .N, N— number of scenarios) the two variables: 1. the expected number of fatalities, ðNFj Þ and 2. the expected frequency of occurrence, ðSFj Þ; If NFj and SFj are known, we proceed by: – building the NFSF matrix ðNFSF 2 <Nx2 Þ as having NFj and SFj as columns. That is, NFSFðj; 1Þ ¼ NFj and NFSFðj; 2Þ ¼ SFj – sorting the NFSF descending by NFj – computing the cumulative frequency for each scenario as CFFðiÞ i X SFj ð2:1Þ j¼1 – Build an X–Y diagram as lgðCFFj Þ versus lgðNFj Þ, j ¼ 1. . .N. The polyline as indicated in Fig. 2.3 is thus obtained using the statistical method. The Process Phase 1: Identification of hot spots and the statistics This phase implies the identification of the hot spots along a given transportation segment and the computation of the corresponding NF and SF values. Once a hot spot (i.e. a location along the route which meet the hot spot defintion criteria) is identified, NF and SF are computed using the following scheme: 1. for each point p of the circular area centered at the hot spot location and having a radius equal to a given scenario’s characteristic effect radius: (a) get the distance, d, from the hot spot to point p; 2.1 Risk Assessment in Hazmat Transportation 17 (b) get the expected lethality percentage at distance d by interpolating the scenario characteristic lethality percentage using distance correlation table; (c) get the expected number of fatalities from the lethality percentage and the effective number of individuals exposed. 2. compute the expected number of fatalities at hot spot i ðNFi Þ by summing up the partial results obtained above; 3. the hot spot characteristic LOC frequency is computed by multiplying the scenario characteristic frequency with the corresponding value from the LOC probability pattern (LCPP) matrix. The LCPP expresses the assumption that the LOC event is influenced by the combination of a given land use and the type of infrastructure (i.e., object/objects) at the hot spot location. The values of LCPP are assumed a priori and can be obtained from accident statistics and/or using expert judgment. Phase 2: Lethality number mitigation factors It has been shown that models tend to provide over-conservative results especially when it comes to number of fatalities that could result from a LOC accident (Vamanu 2006). In reality, however, there are numerous factors that could contribute to mitigating the effects of LOC. For example, if one is considering the lethality number caused by heat radiation, one can easily notice that the number of casualties is significantly higher when the scenario accident occurs in open space as opposed to a residential area. The value of lethality is reduced since there is a shielding effect that is attributed to the presence of buildings. However, if the same event takes place in an industrial area, the lethality number could be higher because of a possible domino effect. In this case, the statistical method provides several means of tuning up the assessment in order to reflect this logic. This is done through a consideration of: Angular sectors mitigation factors In the case of fire and explosion, it is natural to assume that the effects will spread into a circular motion. However, this is not plausible when one considers toxicity because of atmospheric dispersion. Thus, one can reasonably conclude that wind direction plays a significant role in the validity of the assessment. The wind direction is taken into account using the following approach: Split the circular area centered at the accident location in a number m (e.g., ðm ¼ 16Þ of angular sectors, Sm . Each sector ðSi Þ is given a weight ðwi Þ in accordance with the percentage of the time the wind blows in the direction within the Si boundaries. The adjusted number of fatalities would then be given by: NF ¼ m X NFi wi i¼1 where NFi is the number of fatalities in sector i. ð2:2Þ 18 2 Risk Assessment Source term aggravation/mitigation factors These factors adjust the scenario characteristic effect radius. These factors are defined taking into account the substance and its mass quantity. Circumstantial aggravation/mitigation factors These factors adjust the lethality number provided by the analytical models. The factors are a defined function of: – the land-use characteristics (e.g., the presence in the vicinity of flammable objects as opposed with the presence of fire proof materials); – the daytime period (e.g., rush hour as opposed to night time); – the weather; and – the physical effects. 2.2 Extension of the Risk Assessment Methodology for Multimodal Transportation Fundamentally, hazmat transportation for rail and road transportation can be treated separately. This is primarily due to differences in the mechanics of occurrence of a LOC accident. However, for a holistic risk assessment, an extension of the assessment methodology is required to enable coping with complex transportation schemes which might involve different segments and conditions (Gheorghe et al. 2006). 2.2.1 The ‘Hot Spot’ Method The way the risk matrix is generated in the case of a singular transportation segment can be extended for assessing transportation routes and corridors. In this case, a route is defined as a sequence of continuous transportation segments along which the transportation may be performed in a multimodal way (either by rail or by road) and in different circumstances (i.e., different model variables). A transportation corridor is defined as a collection of routes, potentially disjoined, that form a fascicle of transportation routes. An individual assessment of transportation routes yields a set of route characterization reports. When the ‘hot spot’ methodology is applied to each of the constituent segments, followed by grouping the individual results into a report, and development of a comprehensive risk matrix, one gets the risk configuration associated with the route and or the corridor, respectively. The following observations can be made: First, the practical implementation of such an approach comes with considerable challenges associated with managing high volumes of data. 2.2 Extension of the Risk Assessment Methodology … 19 Second, it is obvious that in the case of partially overlapping routes and corridors the location of some of the hot spots will be the same. This is determined through the hot spot definition criteria. In such a case, it is possible to have unfeasible results especially if there is always a consideration of the common hot spots each time they appear in different routes. A solution to this issue is to give the analyst the freedom to choose a representative hot spot, in accordance with analyst’s risk perception. Third, it is essential to consider hot spot cases in which there is a shared location but belonging to different transportation segments (e.g., rail and road). In such a case, both hot spots need to be taken into consideration. 2.2.2 The Statistical Method Extending the statistical method for the multimodal case implies extending statistical method for transportation routes and statistical method for transportation corridors. Statistical method for transportation routes involves the following: 1. Building the NFSF matrix for each constituent segment of the route, 2. Centralizing the NFSF matrices into a route characteristic matrix NFSF_route, 3. Computing the CFF for NFSF_route. Thus, one gets the CFF profile characteristic to the transportation route. The statistical method for transportation corridors involves the following: 1. Building the NFSF_route matrix for each constituent route of the corridor, 2. Centralizing the NFSF matrices into a corridor characteristic matrix NFSF_corridor, 3. Computing the CFF for NFSF_corridor. For managing the hot spots shared by different segments or routes, the same rules as in the case of the multimodal hot spots assessment should be followed. 2.2.3 The Complementary Cumulative Distribution Function as a Risk Expression of the Health Impact Another way of processing the lethality percentage so as to lead to a risk-specific representation is the complementary cumulative distribution function (CCDF). The algorithm for CCDF can be sketched as follows (Gheorghe et al. 2003). It is assumed that the probability of one individual located at distance x from the event to be affected by the event is equal to the percentage (perc.) of affected people (resulted from the consequence assessment) divided by 100. 20 2 Risk Assessment Every perc. value obtained as function of distance is then normalized to the sum of all of the percentages, thus obtaining the probability distribution function. The following equations hold: RX max f ðRÞ ¼ 1 ð2:3Þ Rmin with f ðRÞ the nominalized perc. The cumulative distribution function is then computed as follows: CCDFðRÞ ¼ R X f ðRÞ ð2:4Þ Rmin Equation (2.4) leads at the complementary cumulative function defined as follows: CCDFðRÞ ¼ 1 CDFðRÞ ð2:5Þ References ASCE. (2009). Guiding principles for the nation’s critical infrastructure. Reston, VA: American Society of Civil Engineers. Clemson, B. (1984). Cybernetics: A new management tool. Tunbridge Wells, Kent, UK: Abacus Press. Gheorghe, A. V., Birchmeier, J., Kröger, W., & Vamanu, D. V. (2003). Hot spot based risk assessment for transportation dangerous goods by railway: Implementation within a software platform. In Proceedings of the Third International Safety and Reliability Conference (KONBIN 2003), Gdynia, Poland. Gheorghe, A. V., Birchmeier, J., Kröger, W., Vamanu, D. V., & Vamanu, B. (2004). Advanced spatial modelling for risk analysis of transportation dangerous goods. In C. Spitzer, U. Schmocker, & V. N. Dang (Eds.), Probabilistic safety assessment and management (pp. 2499–2504). London, UK: Springer London. Retrieved from http://link.springer.com/ chapter/10.1007/978-0-85729-410-4_401 Gheorghe, A. V., Birchmeier, J., Vamanu, D., Papazoglou, I., & Kröger, W. (2005). Comprehensive risk assessment for rail transportation of dangerous goods: A validated platform for decision support. Reliability Engineering & System Safety, 88(3), 247–272. http:// doi.org/10.1016/j.ress.2004.07.017 Gheorghe, A. V., Grote, G., Kogelschatz, D., Fenner, K., Harder, A., Moresi, E., et al. (2000). Integrated risk assessment, transportation of dangerous goods: Case study. Zurich, Switzerland: Target: Basel-Zurich/VCL. ETH KOVERS. Gheorghe, A. V., Masera, M., Weijnen, M. P. C., & De Vries, J. L. (Eds.). (2006). Critical infrastructures at risk: Securing the European electric power system (Vol. 9). Dordrecht, the Netherlands: Springer. Gibson, J. E., Scherer, W. T., & Gibson, W. F. (2007). How to do systems analysis. Hoboken, NJ: Wiley-Interscience. Holton, G. A. (2004). Defining Risk. Financial Analysts Journal, 60(6), 19–25. References 21 INCOSE. (2011) In H. Cecilia (Ed.) Systems engineering handbook: A guide for system life cycle processes and activities (3.2 ed.). San Diego, CA: INCOSE. Katina, P. F. (2015). Systems theory-based construct for identifying metasystem pathologies for complex system governance (Ph.D., Old Dominion University, United States, Virginia). Knight, F. H. (1921). Risk, uncertainty, and profit. Boston, MA: Hart, Schaffner & Marx; Houghton Mifflin Co. Oggero, A., Darbra, R. M., Muñoz, M., Planas, E., & Casal, J. (2006). A survey of accidents occurring during the transport of hazardous substances by road and rail. Journal of Hazardous Materials, 133(1–3), 1–7. http://doi.org/10.1016/j.jhazmat.2005.05.053 Quade, E. S. (1980). Pitfalls in formulation and modeling. In G. Majone & E. S. Quade (Eds.), Pitfalls of analysis (Vol. 8, pp. 23–43). Chichester, England: Wiley-Interscience. Riegel, C. (2015). Spatial criticality—identifying CIP hot-spots for German regional planning. International Journal of Critical Infrastructures, 11(3), 265–277. http://doi.org/10.1504/IJCIS. 2015.072157 Vamanu, B. I. (2006). Managementul riscurilor privind transportul substanţelor periculoase: aplicaţii ale sistemelor dinamice complexe (Dissertation, Universitatea Politehnica Bucureşti, Facultatea de Chimie Aplicată şi Ştiinţa Materialelor, Catedra de Inginerie Economică, Bucureşti). Warfield, J. N. (1976). Societal systems: Planning, policy and complexity. New York, NY: Wiley-Interscience. Chapter 3 Quantitative Probability Assessment of Loc Accident Abstract The purpose of this chapter is to cover a set of methods and corresponding equations related to the probability of occurrence of loss of containment (LOC) resulting in accidents. Rail and road transportation cases are addressed. The methods lay on a practical approach that entails the identification of the initial sources that in conjunction with known failures of the rolling stock and actions of the human operator may lead the system to a potentially disruptive state, hence the loss of containment. 3.1 The Methodology: Loc Accident Probability Computation In the context of current research, models can be used to support risk assessment, particularly during the identification and development of accident scenarios and the corresponding mitigation procedures. However, assessment needs to be sensitive enough to account for the characteristics of a given location. The sensitivity aspect of a model is a relevant issue since the variation of the geomorphological characteristics (e.g., population distribution, land use, and road/railway quality), along a transportation segment, plays a key role in the overall probability of accident as well as LOC. The development of the quantitative probability of LOC models can follow a detailed logic modeling philosophy—a top-down logical development and/or bottom-up quantitative modeling. In this research, a top-down approach is adopted for analyzing the process (LOC accident in rail/road transportation) in terms of mechanisms of occurrence including segregated initial events. Next, scenario-based logic and/or statistical models are developed for each of the initial events to perform the probability computation. The discrete results are then mathematically integrated from the bottoms-up to produce the LOC event probability. In essence, both © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6_3 23 24 3 Quantitative Probability Assessment of Loc Accident deductive and inductive system analysis techniques are adopted for logical modeling of the transportation system. Under a deductive approach, it is postulated that the system is already in a failure state (i.e., LOC has occurred) and that the effort is driven toward finding out possible causes and behavior that might have contributed to the current state of the system. Accident investigations are typically analyzed using deductive analyses (Gheorghe et al. 2004). Inductive assessment involves nominating an initial fault or condition and then asserting the possible effects of the initial fault on system operation or state. Consequently, deductive methods are suitable to determine ‘how’ a failed state of a system can occur, while inductive methods are applied when one is interested in finding out system failure possible states. In essence, using a deductive model, one finds a response to the question: how did the system get here? An inductive method provides a response to the question: what happens to the system if…? Prior to proceeding to an overview of the modeling and assessment techniques, it is important to recognize the concept of failure and success spaces in system operation analysis (Gheorghe et al. 2004). The operation of a system can be considered from two perspectives: the various ways for system success and various ways for system failure. An enumeration based on these perspectives would provide a total number of successful system operations, failure system operations, and the intermediate conditions. Figure 3.1 represents the concept of failure and success space concepts as adapted from Gheorghe et al. (2004). The set of all system operation states is called either success or failure space, depending on the perspective of the analysis. At first glance, both approaches appear equivalent. However, adopting the failure approach is recommended from analytical and ease of implementation standpoints since (Gheorghe et al. 2004): • It is generally easier to reach consensus on what constitutes failure than what constitutes success; • The failure events are usually discrete events (e.g., ‘tire explodes’), whereas the success events are characterized by continuous variables; Fig. 3.1 The concept of failure/success 3.1 The Methodology: Loc Accident Probability Computation 25 • There are more ways to success than to failure, which implies a higher population number in the success space which, in turn, is reflected in both the development phase and the practicality of the model; • Mathematics considerations: Most success probabilities are close to 1.0, which increases the probabilistic calculus complexity. Failure space perspective is selected for current efforts. This is attributed to the nature of the task as well as reasons that have been discussed. 3.1.1 Tools and Techniques This section provides an overview and short introduction to the main modeling and analytical tools and techniques that will be used in developing the models for LOC probability assessment. These techniques mainly originate from the engineering paradigms of probabilistic risk assessment (PRA) and reliability, availability, maintainability, and safety (RAMS) engineering paradigms. More information regarding PRA and RAMS is provided in Appendix A. In current efforts, the master logic diagram (MLD) in failure space technique is adopted for describing the mechanisms of LOC following an accident and identification of the initial disruptive events (Gheorghe et al. 2006). Moreover, by reading the MLD, the reader will be introduced to the core assumptions of the LOC accident models. Development of the MLD for LOC accidents may be sketched out as follows: Starting from one undesired event (the LOC), a diagram is developed level by level through decomposition events and the corresponding contributing subevents, down to the initiating events. This leads to the identification of the immediate causes that may lead to the top events which are placed at the bottom level of the MLD. The analysis of the resulting combinations provides a way to determine different failure states of the system, as well as the failure sequence that leads to those states. Event tree analysis (ETA) will be used to develop (accident) scenario-based models that imply sequences of system states, safety mechanisms, failures, and system operator actions. One can get the model assumptions behind the computation of given probability from an event tree (ET) diagram. A generic ET diagram is presented in Fig. 3.2 and renders: • The initial event (left-hand-most box); • The sequence of events (system or circumstantial states, human actions, or protective systems), if occurring/fail would drive the system—the rest of the top boxes into a failure state; • The success and failure branches (solid and dotted lines, respectively) associated with each state/protective system/action; • The success and failure terminal points (gray versus black indices). 26 3 Quantitative Probability Assessment of Loc Accident Fig. 3.2 A generic event tree We denote the following: ki as the relative frequency of the initial event occurrence; the index identifies the current event tree position in the overall computational flow. Its value is purely supportive being provided for assistance in following the equations and event tree sequence; having the event trees indexed, however, eases an eventual matrix representation of the computational values; qij is the <success> probability associated with event j (branch at depth j); qij is the random variable value of the corresponding chance node; the i index relates to the associated event tree index; ð1 pij Þ is the <failure> probability associated with event j. qk is full pathway k probability. Pffailurejtriggerg is the probability of failure due to a trigger (an initial event). The concepts of Markov models and optimization are adopted for the estimation of reliability and availability of components with a constant failure rate, prone to continuous wear and tear and subject to routine inspection and repair (when experiencing a real or an incipient failure) procedures. Additionally, load-related fatigue models for estimating the failure rates as related to the cumulative stress exerted on the piece of equipment resulting from the cumulative load carried or distance travelled (non-constant mean time between failures (MTBF) components). Defect data analysis based on Weibull distribution has been adopted in this case. In this chapter, the rail and road LOC accident frequency computation models are structurally similar in the sense that both take into account disruptive factors resulting from the failures of the transportation infrastructure, human errors, and rolling infrastructure. The subsequent models and algorithms are based on the literatures (Gheorghe et al. 2003, 2004, 2005) and have been implemented in a number of software tools (Gheorghe et al. 2003, 2006). 3.2 Models and Algorithms: Loc Accident Probability … 3.2 27 Models and Algorithms: Loc Accident Probability in Transportation by Rail The master logic diagram depicting the mechanism of occurrence of a LOC accident is given in Fig. 3.3. Accordingly, one may notice that the LOC can occur as a result of two major events: train/tank car collision (COL) and derailment (DER). A collision is defined as the situation in which the confinement tank physically interacts with another object resulting in a structural failure of the first. A derailment is defined as an incident in which the train locomotive or one or more rail vehicles leave the tracks. Notice that the conditional probabilities of loss of containment due to tank damage following derailment should be computed with respect to the type of the tank and the derailment characteristics (freight speed, etc.). For simplicity, only a priori values, which can be obtained through expert judgment, are considered in the subsequent models. Fig. 3.3 MLD example for the LOC accident occurrence for rail transportation 28 3 Quantitative Probability Assessment of Loc Accident In the following section is provided a set of algorithmic descriptions, individual models, and equations for computing the probability of LOC accident for railroad transportation. 3.2.1 Computational Scheme for LOC Accident by Rail 1. Probability of loss of containment PfLOCg ¼ PfLOCjCOLg þ PfLOCjDERg ð3:1Þ with 2. Probability of loss of containment due to collision PfLOCjCOLg PfLOCjCOLg ¼ PfLOCg fReleasejCOLg ð3:2Þ and 3. Probability of loss of containment due to derailment PfLOCjDERg PfLOCjDERg ¼ PfLOCg fReleasejDERg ð3:3Þ 4. Probability of collision PfCOLg PfCOLg ¼ PfCOLjFixedObjectsg þ PfCOLjOtherTraing þ PfCOLjShuntingg ð3:4Þ 5. Release probability due to collision, PfReleasejCOLg PfReleasejCOLg: Obtained from statistics=expert judgment ð3:5Þ 6. Probability of derailment, PfDERg PfDERg ¼ PfDERjTracksg þ PfDERjRollingStockg ð3:6Þ þ PfDERjOperationg 7. Release probability due to collision, PfReleasejCOLg PfReleasejDERg: Obtained from statistics=expert judgment ð3:7Þ 3.2 Models and Algorithms: Loc Accident Probability … 29 8. Probability of collision with a fixed object, PfCOLjFixedObjectg PfCOLjFixedObjectg ¼ ft ½Q1 þ Q2 ðx0 Þ þ Q3 ðxi Þ dxxi ð3:8Þ with ft daily train passage frequency (1/day). Obtained from statistics and/or expert judgment. Q1 the probability that an improperly loaded train leaves the station undetected. Obtained from statistics and/or expert judgment; Q2 ðx0 Þ the probability that a train initially properly loaded becomes improperly loaded after x0 kilometers. Obtained from statistics and/or expert judgment; Q3 ðxi Þ the probability of a foreign object on tracks will remain undetected at location xi ; dxxi the Kronecker delta, defined by: dxxi ¼ 1 0 for x ¼ xi for x ¼ 6 xi ð3:9Þ 9. Probability of collision with another train, PfCOLjOtherTraing PfCOLjOtherTraing ¼ fA ½QS þ QL QTR ð3:10Þ with fA QS QL QTR frequency of trains on the railway segment in one day (1/day). Obtained from statistics and/or expert judgment; the probability of accident due to a switch failure; the probability of accident due to red-light passing; the probability of another train on the same track. Notice that Eq. (3.12) expresses the assumption that collision with another train may be triggered only by two complementary events: a human fault—the violation of the red signal by the train operator (driver) and an infrastructure malfunction—switch failure. Irrespective of the triggering events, the subsequent events that may lead to an actual collision are the same. Figure 3.4 represents an event tree capturing collision with another train. Accordingly, if human error is involved, the collision could be avoided by train’s protection systems that detect anomalies. Otherwise, the train protection systems are irrelevant since there is no ‘fault’ that they could capture. 10. Probability of collision due to switch failure, QS According to the event tree in Fig. 3.4, 30 3 Quantitative Probability Assessment of Loc Accident Fig. 3.4 An event tree diagram for the computation of QS and QL . Correlate with Eqs. (3.11) and (3.12) QS ¼ q7 þ q8 þ q9 ð3:11Þ with q7 ¼ k1 ð1 p15 Þ p14 p13 ð1 p11 Þ q8 ¼ k1 ð1 p14 Þ p13 ð1 p11 Þ q9 ¼ k1 ð1 p13 Þ ð1 p11 Þ and k1 frequency of switch failure (1/day). Obtained from statistics and/or expert judgment. 11. Probability of collision due to red-light passing, QL According to the event tree in Fig. 3.4, QL ¼ q3 þ q4 þ q5 þ q7 þ q8 þ q9 with q3 ¼ ð1 k1 Þ p11 ð1 p12 Þ p13 p14 ð1 p15 Þ q4 ¼ ð1 k1 Þ p11 ð1 p12 Þ p13 ð1 p14 Þ q5 ¼ ð1 k1 Þ p11 ð1 p12 Þ ð1 p13 Þ ð3:12Þ 3.2 Models and Algorithms: Loc Accident Probability … 31 and ð1 k1 Þ frequency of the human error of passing the red signal (1/day)—in the assumptions stated at 9. 12. Probability of accident when another train is on tracks, QTR QTR ¼ T0 s T0 ð3:13Þ with T0 the time unit considered when adopting fA (e.g., 1 day); s total duration the segment is empty, in the same unit as T0 . To clarify the computation of QTR , let us suppose a track segment of5 km 1 . The length. The frequency of trains over the segment is five per day fA ¼ 5 day average speed of a train over the segment is 80 km/h. The corresponding time required by the train to pass over the segment is 5=80 ¼ 0:625 h 0:0026 day. Since we have 5 trains each requiring 0.0026 days, we get the total duration the segment is empty, s ¼ 1 0:0026 ¼ 0:9974; which would lead to a value of QTR ¼ 0:0026. 13. Probability of collision during shunting, PfCOLjShuntingg According to the event tree in Fig. 3.5, PfCOLjShuntingg ¼ q4 þ q5 ð3:14Þ Fig. 3.5 An event tree diagram for the computation of PfCOLjShuntingg. Correlate with Eq. (3.14) 32 3 Quantitative Probability Assessment of Loc Accident with q4 ¼ k2 ð1 p21 Þ ð1 p22 Þ p23 ð1 p24 Þ q5 ¼ k2 ð1 p21 Þ ð1 p22 Þ ð1 p23 Þ and k2 frequency of car entering track with excess speed (1/day). Obtained from statistics and/or expert judgment. 14. Probability of derailment due to tracks, PfDERjTracksg PfDERjTracksg ¼ PfDERjStateOfTracksg þ PfDERjTonnageg þ PfDERjTrackIsolationFailureAndTrackClosed g þ PfDERjTrackIsolationFailureAndTrackOpeng ð3:15Þ 15. Probability of derailment due to rolling stock, PfDERjRollingStock g PfDERjRollingStockg ¼ PfDERjBearingsg þ PfDERjBogiesg ð3:16Þ 16. Probability of derailment due to operational errors, PfDERjOperationalg PfDERjOperationalg Obtained from statistics=expert judgment ð3:17Þ 17. Probability of derailment due to tracks’ state, PfDERjTracksg PfDERjStateOfTracksg over a railway section is computed as a function of the average unavailability of the respective section and the average frequency of train passage over the section. This is denoted as follows: PfDERjStateOfTracksg ¼ 1 eft U ð3:18Þ with the average train passage frequency over the segment (in 1/day); ft U the average unavailability of the segment (in day). Since the expected probability is sufficiently small, one may consider only the first term of the exponential power series; thus, Equation [3.18] becomes 3.2 Models and Algorithms: Loc Accident Probability … PfDERjStateOfTracksg ¼ ft U 33 ð3:19Þ It is also assumed that derailment may only occur during the unavailability of the segment; hence, the average unavailability U* encompasses the triggering events that put the system into a derailment-prone state, but also takes into account other infrastructure failures and human actions that actually lead to derailment. This entails that U expresses the following mechanisms: (a) the system (railway) is in an abnormal operational (failure) state when: – – – – the track lost its geometry (e.g., parallelism); the track suffered a structural damage; there is a switch failure; there is a foreign object on tracks; (b) the abnormal states are detected by system’s operators during periodic inspections; (c) system operators resolve the problem, thus putting the system back into a normal operational state. However, since we are referring to the railway system, (a) resolving the problem also implies that the track is temporarily out of order being ‘isolated’ during the repair and (b) any repair takes time (during which the segment is still unavailable). The analytical expression of the aforementioned involves: U ¼ U1 þ U2 þ Q ð3:20Þ with U1 the segment unavailability due to the system in an abnormal state (in 1/day); the value includes the time duration between inspections and the time duration required for repair; U2 the segment unavailability due to preventive maintenance; Q the probability of human error to leave a track section in a failed state, after the completion of maintenance. U1 sums up contributions from each of the failure states; for equation consistency and future identification, we index the system failures as: 1. 2. 3. 4. Loss of track geometry; Rail failure (structural damage); Switch fault; Foreign object on track. 34 3 Quantitative Probability Assessment of Loc Accident The equation for U2 is as follows: U1 ¼ a1 ðT1 þ TR1 Q1 Þ 2 a2 þ ðT2 þ TR2 Q2 Þ h2a i 3 þ ðT3 þ TR3 Q3 Þ þ Q3d 2 a4 þ ðT4 þ TR4 Q4 Þ 2 ð3:21Þ with ai Ti TRi Qi base failure rate for failure type i (1/day); the time between inspections to detect failure type i (day); the time required to repair failure type i (day); the probability of track isolation failure during the repair of failure type i. These values address human errors that would lead to a track isolation breach. Each of the values should take into account individual probabilities for: – Failure of securing and signaling isolation by maintenance personnel; – Violation of signals or passage conditions by train driver; – Supervision and checking faults. The individual probabilities mentioned above are not reflected in the equations set for the sake of simplicity; Q3d the probability of an inadvertent switching on demand while train passing over the switch; i ¼ 1; 4 failure type identification index above. One may note that Q3d does not refer to an actual failure of the switch, but rather to the human error of ‘inadvertent switching.’ However, it has been included under the switch failure term in Eq. (3.21) for convenience. U2 in Eq. (3.21) is given by U2 ¼ fm Tm Q5 ð3:22Þ with fm the frequency of preventive maintenance actions (1/day); Tm average duration of preventive maintenance action (day); Q5 total probability of track isolation failure, given by Q5 ¼ 4 X i¼1 Qi ð3:23Þ 3.2 Models and Algorithms: Loc Accident Probability … 35 The last term of Eq. (2.22), U is U Obtained from statistics and=or expert judgment ð3:24Þ Values ai ; Ti ; TRi ; Qi ; Q3d ; fm ; Tm ; and Q are all model inputs and are given from statistics and/or expert judgment. Substituting U1 ; U2 and Q in Eq. (3.21) one gets the extended equation for the probability of derailment due to the state of tracks as follows: PfDERjStateOfTracksg ¼ ft na 1 ðT1 þ TR1 Q1 Þ ha i a2 3 þ ðT2 þ TR2 Q2 Þ þ ðT3 þ TR3 Q3 Þ þ Q3d 2 2 o a4 þ ðT4 þ TR4 Q4 Þ þ fm Tm Q5 þ U 2 ð3:25Þ 2 Equation (3.25) allows a solid estimation of the probability of derailment due to the state of the tracks in a ‘traditional’ RAMS philosophy. However, there is an immediate refinement of the model (Gheorghe et al. 2000b) that allows a better setup to reflect infrastructure state and other circumstantial and environmental factors: The analytical expression of this is adjusting (multiplying) the system failure rates ðasÞ with aggravating factors ðcÞ. Let us consider cenv the set of environment-related aggravating factors; the environment refers to the track segment location characteristics that may influence system failure types 1 (track geometry) and 2 (structural damage). Table 3.1 illustrates the cenv aggravating factors that are taken into account in CARGO software, for illustration. cswitch is the set of switch types’ aggravating factors; these factors are provided for taking into account different models of switches that (by design or operational characteristics) may influence the switch failures (failure type 3). cpo is the set of aggravating factors depending on the presence and state of protective systems against foreign objects along the segment (Table 3.2) and can influence failure type 4 (foreign objects on tracks), and cvic is the set of aggravating factors depending on the surrounding area of the segment (plain area versus mountain, etc.), also influencing failure type 4; the list of the cvic factors in CARGO is also given for illustration in Table 3.3. Table 3.1 Environment-related aggravating factors in CARGO cenv Environment description 1.0 1.5 1.5 3.0 Normal Corrosive Segment characterized by heavy traffic Segment vulnerable to heavy downpour or snowfall 36 3 Quantitative Probability Assessment of Loc Accident Table 3.2 Aggravating factors in CARGO for protective systems against foreign objects cpo Protective systems state 1.0 2.0 3.0 Fully operational Deficient Absent Table 3.3 Foreign objects’ vulnerability aggravating factors in CARGO cvic Vicinity type 3.0 3.0 2.0 1.0 1.0 1.0 1.0 1.0 1.0 3.0 3.0 1.0 2.0 3.0 2.0 2.0 1.0 3.0 3.0 2.0 1.0 2.0 1.0 1.0 Forest (enclosed) Forest type 2 Bushland Groves Vineyards Orchards Gardens Meadows and arable Farm pastures Highland pastures Alpine land Lakes Rivers Unproductive land Barren land Dwelling areas Dwelling developments Industrial buildings Industrial enterprises Special destination areas Recreational areas Street areas Railway areas/facilities Airfields Considering aggravating factors in Eq. (3.25), one gets: PfDERjStateOfTracksg ¼ ft n ha i a2 1 cenv ðT1 þ TR1 Q1 Þ þ ðT2 þ TR2 Q2 Þ 2 i h2a 3 þ cswitch ðT3 þ TR3 Q3 Þ þ Q3d 2 a4 þ cpo ðT4 þ TR4 Q4 Þ 2 þ fm Tm Q5 þ U g ð3:26Þ 3.2 Models and Algorithms: Loc Accident Probability … 37 18. Probability of derailment due to tracks, tonnage dependent, is denoted by: PfDERjTonnageDependentg The model proposed assumes that derailment occurs when there is a rupture-type failure of the tracks due to the wear and tear caused by the cumulative weight traveling over the segment. Sa PfDERjTonnageDependentg ¼ 1 e b ð3:27Þ with S tonnage (million tons) traffic over the rail segment; a,b empirical constants depending on the track deterioration mechanisms. 19. Probability of derailment due to tracks, isolation failure, and track closed to traffic is denoted by: PfDERjTrackIsolationFailure SegmentClosedg According to the event tree in Fig. 3.6, Fig. 3.6 An event tree for the computation of PfDERjTrackIsolationFailure SegmentClosedg. Correlate with Eq. (3.28) 38 3 Quantitative Probability Assessment of Loc Accident PfDERjTrackIsolationFailure SegmentClosed g ¼ q3 þ q6 þ q8 þ q9 þ q12 þ q15 þ q17 þ q18 ð3:28Þ with q3 ¼ k3 ð1 p37 Þ p34 ð1 p33 Þ p32 p31 q6 ¼ k3 ð1 p38 Þ ð1 p37 Þ p35 ð1 p34 Þ ð1 p33 Þ p32 p31 q8 ¼ k3 ð1 p39 Þ p36 ð1 p35 Þ ð1 p34 Þ ð1 p33 Þ p32 p31 q9 ¼ k3 ð1 p36 Þ ð1 p35 Þ ð1 p34 Þ ð1 p33 Þ p32 p31 q12 ¼ k3 ð1 p37 Þ p34 ð1 p33 Þ ð1 p32 Þ p31 q15 ¼ k3 ð1 p38 Þ ð1 p37 Þ p35 ð1 p34 Þ ð1 p33 Þ ð1 p32 Þ p31 q17 ¼ k3 ð1 p39 Þ p36 ð1 p35 Þ ð1 p34 Þ ð1 p33 Þ ð1 p32 Þ p31 q18 ¼ ð1 p36 Þ ð1 p35 Þ ð1 p34 Þ ð1 p33 Þ ð1 p32 Þ p31 and k3 frequency of track isolation failure and track closed (1/day). Obtained from statistics and/or expert judgment. 20. Probability of derailment due to tracks, isolation failure, and track open to traffic PfDERjTrackIsolationFailure SegmentOpeng According to the event tree in Fig. 3.7, PfDERjTrackIsolationFailure SegmentOpeng ¼ q3 þ q4 þ q5 þ q6 ð3:29Þ Fig. 3.7 An event tree for the computation of PfDERjTrackIsolationFailure SegmentOpeng. Correlate with Eq. (3.29) 3.2 Models and Algorithms: Loc Accident Probability … 39 with q3 ¼ k4 p41 p42 ð1 p43 Þ p44 ð1 p45 Þ q4 ¼ k4 p41 p42 ð1 p43 Þ ð1 p44 Þ q5 ¼ k4 p41 ð1 p42 Þ q6 ¼ k4 ð1 p41 Þ and k4 frequency of track isolation failure and track open to traffic (1/day). Obtained from statistics and/or expert judgment. 21. Probability of derailment due to rolling stock and bearings PfDERjRollingStock Bearingsg Due to structural damages and/or effects of wear and tear, the box holding the bearings of a railway truck may lose its packing (usually oil), thus allowing the excessive overheating of the bearings. This, in turn, may cause a fire or an axle fracture. When such an overheating of the bearings occurs, the term ‘hot box’ (HB) is used for defining the situation. To avoid hot box situation, the packing and bearing have to be regularly inspected on older railway systems. This job was done by humans. It is performed both in stations (by track-side workers) and during the train run by the train crew (by looking for sparks or smoke) (Gheorghe et al. 2000a). When a hot spot was detected, the train was either slowed down (to reduce friction) or stopped to ‘oil the wheels’—adding packing to ensure the lubrication characteristics. In recent times, derailments due to overheating of bearings are much rare. This is attributed to the following: First, on the one hand, there has been a drastic improvement in bearings technology. For example, the use of ball, roller, or tapered as opposed to the ‘traditional’ plain bearings drastically reduce the likelihood of overheating and second the rolling of infrastructure (i.e., automatic hot box detection (HBD) systems) which have installed along the railways since 1940s. Even though the HBDs also evolved from the technological standpoint, their role remained the same over time: Basically, an HBD detects a HB situation and triggers the alarm (via wired or the most modern wireless links) to stations, offices, or interlocking towers. Figure 3.8 tries to reflect all the processes above in the computation of the probability of derailment due to bearings overheating. According to the event tree in Fig. 3.8, one gets PfDERjRollingStock Bearingsg ¼ q2 þ q3 þ q5 þ q6 þ q7 þ q8 þ q10 þ q11 þ q12 þ q13 þ q14 þ q15 þ q16 ð3:30Þ 40 3 Quantitative Probability Assessment of Loc Accident Fig. 3.8 An even tree for the computation of PfDERjRollingStock Bearingsg. Correlate with Eq. (3.30) with q2 ¼ k5 p51 p58 ð1 p59 Þ q3 ¼ k5 p51 ð1 p58 Þ q5 ¼ k5 ð1 p51 Þ p52 1 p053 p0053 p56 p57 p58 ð1 p59 Þ q6 ¼ k5 ð1 p51 Þ p52 1 p053 p0053 p56 p57 ð1 p58 Þ q7 ¼ k5 ð1 p51 Þ p52 1 p053 p0053 p56 ð1 p57 Þ q8 ¼ k5 ð1 p51 Þ p52 1 p053 p0053 ð1 p56 Þ q10 ¼ k5 ð1 p51 Þ p52 p053 p54 p55 p57 p58 ð1 p59 Þ q11 ¼ k5 ð1 p51 Þ p52 p053 p54 p55 p57 ð1 p58 Þ q12 ¼ k5 ð1 p51 Þ p52 p053 p54 p55 ð1 p57 Þ q13 ¼ k5 ð1 p51 Þ p52 p053 p54 ð1 p55 Þ q14 ¼ k5 ð1 p51 Þ p52 p053 ð1 p54 Þ q15 ¼ k5 ð1 p51 Þ p52 p053 q16 ¼ k5 ð1 p51 Þ ð1 p52 Þ and k5 average frequency of hot wheels or bearings overheating (1/day)—from statistics and/or expert judgment. and also p053 the probability of a HBD failure, given by 3.2 Models and Algorithms: Loc Accident Probability … p053 ¼ kFR Tbi 2 41 ð3:31Þ with kFR the average HBD failure rate (1/day); Tbi time between inspections for HBD failure; p0053 the probability that a HBD is unavailable due to being repaired, given by p0053 ¼ kFR TRbi 2 ð3:32Þ with TRbi is the average repair time for HBD. 22. Probability of derailment due to rolling stock and bogies, PfDERjRollingStock Bogieg PfDERjRollingStock Bogieg: Obtained from statistics=expert judgment ð3:33Þ 3.3 Models and Algorithms: Loc Accident Probability in Transportation By Road This chapter covers the method and quantitative models proposed for probability of LOC computation in the case of road transportation. We adopt the same posture as in the case of rail transportation with respect to model assumptions, modeling, and the analytical tools that help in grasping the phenomenology of such events. Naturally, the models employed differ since there are differences in mechanisms involved in producing LOC events in road and rail transportation systems. 3.3.1 Deductively Model the Reality—MLD Development for LOC During Road Transportation Let us introduce the MLD that supports the probability computation model for LOC accidents by road in a step-by-step manner following the deductive modeling principles. The first question one must answer when considering LOC accident is ‘when LOC may happen?’ Well, LOC may follow two major disruptive events: collision 42 3 Quantitative Probability Assessment of Loc Accident and overturning of the transportation vector (e.g., a lorry). Collision encompasses the circumstances when a lorry hits an object without overturning. Then, overturning (naturally) covers the cases when a lorry partially or totally overturns. Consequently, both collision and overturning may result in structural damage of the container (e.g., a tank) carrying hazardous materials, thus resulting in LOC and release. Therefore, there is need to provide conditional probabilities of loss of containment for each of the accident types. Moving down on the logical pathway, the next questions are ‘what a lorry can collide with?’ and ‘what makes a lorry to overturn?’ Well, a lorry may collide either with another (moving) vehicle or with a fixed object. In the case of overturning, overturning may be triggered by road, lorry-related failures, and the driver himself. A collision with another vehicle usually implies actions from two or more traffic participants and may occur: • Due to violation of traffic rules (usually at crossing areas) by one of the drivers; • Due to absentmindedness (sudden braking followed by a back hit) of one or both drivers; • Due to overtaking. Several accident scenarios can be developed when considering vehicle collision at crossing. These scenarios are introduced in the analytical model description by appropriate inductive models. Overtaking is one of the major causes of accident. But do all the accidents due to overtaking have the same relevance when considering the loss of containment? Arguably no. This is especially the case when one considers the differences in a lateral collision during overtaking and a head-on collision. This differentiation must also be reflected in the MLD. Furthermore, a collision with fixed objects is an issue. Questions that one might consider involves: When can this happen? Where are the fixed objects located? Here is another major difference between rail and road transportation: A lorry going off the road is as natural as a train following the predefined path of the tracks; consequently, we should consider and assess both situations, when the lorry hits a foreign object on/near the road and when the lorry hits a foreign object off the road. It has been stated that overturning might be caused by the road being in a dysfunctional state. Moreover, the dysfunctional state of the road can also be attributed to either the state of the road (quality) or during maintenance procedures taking place on road. Overturning can also occur when there is a failure of the lorry. We only consider three distinct classes of failures as relevant: flat tire, mechanical (other than brakes), and brakes’ failures. This classification was performed after considering the most frequent lorry-related causes that lead to overturning. The proposed model also considers ‘which are the driver’s operational faults that lead to overturning.’ Three cases were appealing after contemplating the most common causes of overturning: overspeeding, heath (including fatigue), and environmental factors. The environmental aspect of faults refers to driving miss conduct when dealing with different environmental factors such as rain, sharp curves, and mountain road on the road segment. Figure 3.9 shows a master logic 3.3 Models and Algorithms: Loc Accident Probability … 43 Fig. 3.9 An MLD depicting LOC for a road transportation system diagram depicting the mechanisms for occurrence of an LOC accident and the identification of initial events. Up to this point, everything was in place for actual computation of LOC probability for road transportation. The following section addresses the necessary analytical models, algorithms, and equations. 3.3.2 Computational Scheme for LOC Accident by Road 1. Probability of loss of containment PfLOC g ¼ PfLOCjCOLg þ PfLOCjOVERTg ð3:34Þ with 2. Probability of loss of containment due to collision, PfLOCjCOLg PfLOCjCOLg ¼ PfCOLg PfReleasejCOLg ð3:35Þ 44 3 Quantitative Probability Assessment of Loc Accident and 3. Probability of loss of containment due to overturning, PfLOCjOVERT g PfLOCjOVERT g ¼ PfOVERT g PfReleasejOVERTg ð3:36Þ 4. Probability of collision, PfCOLg PfCOLg ¼ PfCOLjFixedObjectg þ PfCOLjOtherLorryg ð3:37Þ 5. Probability of release due to collision, PfReleasejCOLg PfReleasejCOLg: Obtained from statistics=expert judgment ð3:38Þ 6. Probability of overturning, PfOVERT g PfOVERT g ¼ PfOVERTjRoadwayg þ PfOVERTjLorryg þ PfOVERTjDrivingg ð3:39Þ 7. Probability of release due to overturning, PfReleasejOVERT g PfReleasejOVERT g: Obtained from statistics=expert judgment ð3:40Þ 8. Probability of collision with a fixed object, PfCOLjFixedObjectg PfCOLjFixedObjectg ¼ PfCOLjFixedObjectOnStreetg þ PfCOLjFixelObjectOffStreetg ð3:41Þ 9. Probability of collision with an object on street, PfCOLjFixedObjectOnStreetg, which includes the objects near the street (e.g., traffic signs) PfCOLjFixedObjectOnStreetg ¼ fl ½Q1 þ Q2 ðx0 ; x00 Þ þ Q3 dx0 xi ð3:42Þ with fl lorry passage frequency (1/day)—obtained from statistics and/or expert judgment; Q1 the probability that the lorry, improperly loaded, leaves undetected— obtained from statistics and/or expert judgment; Q2 ðx0 Þ the probability that the lorry, initially properly loaded, becomes improperly loaded after x0 kilometers—obtained from statistics and/or expert judgment; Q3 ðxi Þ the probability of a foreign object on road to remain undetected at location xi ; dxxi the Kronecker delta, defined as in Eq. (3.9). 3.3 Models and Algorithms: Loc Accident Probability … 45 10. Probability of collision with a fixed object, off-street, PfCOLjFixed ObjectOffStreetg. Two methods of computation are suggested as follows: 10:1 The probability of collision with a fixed object, off-road, may be given by statistics and/or expert judgment. This approach is most straightforward, even though it might not be the most appropriate way to include the circumstantial and spatial characteristics of the road segment that influence the chance of collision with an object off-street. In other words, it is not the same thing—from PfCOLjFixedObjectOffStreetg perspective. Consider a case of road transportation along an agricultural area or a forest area as compared to an urban area. There are chances of having foreign objects off-road, drastically from one case to another. In order to consider the location characteristics, one has to compute PfCOLjFixedObjectOffStreetg as 10:2 a function of land-use type (along the given segment) and the relevance of various land-use types to addressing the chance of having fixed objects off-street. This is done through PfCOLjFixedObjectOffStreetg ¼ q N X m i ni ð3:43Þ i¼1 with q mi ni the base rate of probability of collision with objects off-street, given by statistics and/or expert judgment; the share of land-use type i along the analyzed segment (kilometers along land-use i by segment length); the relevance weight associated with land-use i. It is recommended to have ni within (0.1, 10) interval (Gheorghe et al. 2000b) 11. Probability of collision with another vehicle (AV), PfCOLjAV g PfCOLjALg ¼ P COLjAVcrossing þ PfCOLjAVahead g þ P COLjAVinitiatingOvertaking þ P COLjAVduringOvertaking ð3:44Þ with 12. Probability of collision with another vehicle at crossing P COLjAVcrossing According to the event tree in Fig. 3.10, 46 3 Quantitative Probability Assessment of Loc Accident Fig. 3.10 An event tree for the computation of P COLjAV crossing . Correlate with Eq. (3.45) P COLjAVcrossing ¼ q3 þ q6 ð3:45Þ with q3 ¼ k1 p11 ð1 p12 Þ ð1 p13 Þ q6 ¼ k1 ð1 p11 Þ ð1 p12 Þ ð1 p13 Þ and k1 probability of two cars simultaneously entering the crossing (1/day). Obtained from statistics and/or expert judgment. 13. Probability of collision with the vehicle ahead PfCOLjAVahead g According to the event tree in Fig. 3.11, PfCOLjAVahead g ¼ q2 þ q3 with q2 ¼ k2 p21 ð1 p22 Þ q2 ¼ k2 ð1 p12 Þ Fig. 3.11 An event tree for the computation of PfCOLjAV ahead g. Correlate with Eq. (3.46) ð3:46Þ 3.3 Models and Algorithms: Loc Accident Probability … 47 Fig. 3.12 An event tree for the computation of P COLjAV initiatingOvertaking . Correlate with Eq. (3.47) and k1 probability of two cars simultaneously entering the crossing (1/day). Obtained from statistics and/or expert judgment. 14. Probability of head-on collision when overtaking P COLjAVinitiating Overtaking According to the event tree in Fig. 3.12, P COLjAVinitiating Overtaking ¼ q3 ð3:47Þ with q3 ¼ k3 p31 ð1 p32 Þ ð1 p13 Þ and k3 probability that the lorry driver starts the overtaking maneuver—from statistics and/or expert judgment. 15. Probability of lateral collision when overtaking P COLjAVduringOvertaking According to the event tree in Fig. 3.13, P COLjAVinitiatingOvertaking ¼ q2 Fig. 3.13 An event tree for the computation of P COLjAV duringOvertaking . Correlate with Eq. (3.48) ð3:48Þ 48 3 Quantitative Probability Assessment of Loc Accident with q2 ¼ k4 ð1 p41 Þ ð1 p42 Þ and k4 probability that the lorry driver starts the overtaking maneuver—from statistics and/or expert judgment. 16. Probability of overturning due to roadway PfOVERTjRoadwayg PfOVERTjRoadwayg ¼ PfOVERTjStateOfRoad g þ PfOVERTjRoadUnderMaintenanceg ð3:49Þ 17. Probability of derailment due to state of the road, PfOVERTjStateOfRoad g We shall adopt a methodology for the estimation of PfDERjStateOfRoad g similar to the rail transportation case. Hence, PfDERjStateOfRoad g ¼ 1 efl U ð3:50Þ with fl the average lorries’ passage frequency over the segment (in 1/day); U the average unavailability of the segment (in day). Equation (3.50) can be rewritten as: PfDERjStateOfRoad g ¼ fl U ð3:51Þ The model assumes that overturning may only occur during the unavailability of the segment; hence, the average unavailability U* encompasses the triggering events that put the system into an overturning-prone state; other infrastructure failures and human actions that lead to overturning are also taken into account. This implies that U expresses the following: • the system (roadway) is in an abnormal operational (failure) state when: – there is any type of road deterioration (from potholes to collapsed sections); – there is a foreign object on roadway. • the abnormal states are detected by system’s operators during periodic inspections; • system operators resolve the problem, thus putting the system back into a normal operational state; • resolving the problem also implies that the roadway is temporarily ‘isolated’ during the repair; and also • any repair takes time (during which the segment is still unavailable). 3.3 Models and Algorithms: Loc Accident Probability … 49 A closer look at assumptions above, one may notice that the LOC may not necessarily be directly triggered by any of the abnormal states of the system. However, the abnormal states above lead to a well-known situation in road cargo transportation: sudden movement for avoiding an obstacle, followed by uncontrollable balance of the cargo and by overturning. The analytical expression of the aforementioned is as follows: U ¼ U1 þ U2 þ Q ð3:52Þ with U1 the segment unavailability due to the system in an abnormal state (in 1/day); the value includes the mean time duration between inspections and the mean time duration required for repair; U2 the segment unavailability due to preventive maintenance; Q the probability of human error to leave the roadway in a failed state, after the completion of maintenance; U1 sums up contributions from each of the failure states; system failures are indexed as follows: 1. Deteriorated roadway; 2. Foreign object on road. The equation for U1 is as follows: U1 ¼ a1 a2 ðT1 þ TR1 Q1 Þ þ ðT2 þ TR2 Q2 Þ 2 2 ð3:53Þ with ai Ti TRi Qi base failure rate for failure type i (1/day); the mean time between inspections to detect failure type i (day); the mean time required to repair failure type i (day); the probability of road isolation failure during the repair of failure type i. These values address human errors that would lead to a road isolation breach. Each of the values should include individual probabilities for: – Failure of securing and signaling isolation by maintenance personnel; – Violation of traffic signs by the driver; – Supervision and checking faults. The individual probabilities mentioned above are not reflected in the equation set for the sake of simplicity; i ¼ 1; 2 failure type identification index. 50 3 Quantitative Probability Assessment of Loc Accident In Eq. (3.52), U2 is given by U2 ¼ fm Tm Q3 ð3:54Þ with fm the frequency of roadway preventive maintenance actions (1/day); Tm average duration of preventive maintenance action (day); Q3 total probability of road isolation failure, given by Q3 ¼ 2 X Qi ð3:55Þ i¼1 The last term of Eq. (3.52), U , is U is obtained from statistics and=or expert judgment ð3:56Þ Values ai ; Ti ; TRi ; Qi ; fm ; Tm ; and Q are all model inputs and are given from statistics and/or expert judgment. Substituting U1 ; U2 and Q in Eq. (3.19), one gets the extended equation for probability of derailment due to the state of tracks as follows: PfDERjStateOfRoad g ¼ ft þ na 1 ðT1 þ TR1 Q1 Þ 2 a2 ðT2 þ TR2 Q2 Þ 2 o ð3:57Þ þ fm Tm Q5 þ U Similar to the case of rail transportation, there is an immediate refinement of the model (Gheorghe et al. 2000b) that allows a better setup to reflect infrastructure state and other circumstantial and environmental factors: The analytical expression of this is adjusting (multiplying) the system failure rates (a s) with aggravating factors ðcÞ. Let us consider cenv , the set of environment-related aggravating factors; the environment refers to the track segment location characteristics that may influence system failure types 1 (track geometry) and 2 (structural damage). Table 3.4 illustrates the cenv aggravating factors that are taken into account in CARGO software, for illustration. cpo is the set of aggravating factors depending on the presence and state of protective systems against foreign objects along the road segment and can influence failure type 2 (foreign objects on tracks). Table 3.5 presents a range of protective systems states against foreign aggravating factors. cvic is the set of aggravating factors depending on the surrounding area of the segment such as a plain area as opposed to a mountainous area, also influencing failure type 2. The list of the cvic factors in CARGO is given in Table 3.6 for illustration. 3.3 Models and Algorithms: Loc Accident Probability … 51 Table 3.4 Environmentrelated aggravating factors in CARGO cenv Environment description 1.0 1.5 3.0 Normal Segment characterized by heavy traffic Segment vulnerability to heavy downpour or snowfall Table 3.5 Protective systems states against foreign objects’ aggravating factors in CARGO cpo Protective systems state 1.0 2.0 3.0 Fully operational Deficient Absent Table 3.6 Foreign objects’ vulnerability aggravating factors in CARGO cvic Vicinity type 7.0 6.0 5.0 5.0 1.0 1.0 1.0 3.0 2.0 2.0 3.0 1.0 2.0 3.0 2.0 2.0 1.0 5.0 6.0 2.0 1.0 10.0 1.0 1.0 Forest type 1 Forest type 2 Bushland Groves Vineyards Orchards Gardens Meadows and arable Farm pastures Highland pastures Alpine land Lakes Rivers Unproductive land Barren land Dwelling areas Dwelling developments Industrial buildings Industrial enterprises Special destination areas Recreational areas Street areas Railway areas/facilities Airfields 52 3 Quantitative Probability Assessment of Loc Accident Notice that even though the types are the same as in the rail transportation case (see Table 3.3), the values differ since the relevance of each area differs from road to rail case. Considering the aggravating factors in Eq. (3.57), one gets: n a1 cenv þ cpo ðT1 þ TR1 Q1 Þ 2 a2 þ cvic ðT2 þ TR2 Q2 Þ 2 o PfDERjStateOfRoad g ¼ ft ð3:58Þ þ fm Tm Q5 þ U 18. Probability of overturning when PfOVERTjRoadUnderMaintenanceg road is under maintenance PfOVERTjRoadUnderMaintenanceg ¼ q3 þ q6 þ q8 þ q9 ð3:59Þ According to the event tree in Fig. 3.14, with q3 ¼ k5 p51 ð1 p52 Þ ð1 p53 Þ q6 ¼ k5 ð1 p51 Þ p52 ð1 p53 Þ ð1 p54 Þ q8 ¼ k5 ð1 p51 Þ ð1 p52 Þ p53 ð1 p54 Þ q9 ¼ k5 ð1 p51 Þ ð1 p52 Þ ð1 p53 Þ Fig. 3.14 An event tree for the computation of PfOVERTjRoadUnderMaintenanceg. Correlate with Eq. (3.59) 3.3 Models and Algorithms: Loc Accident Probability … 53 Fig. 3.15 An event tree for the computation of PfOVERTjBrakeFailureg. Correlate with Eq. (3.61) and k5 frequency of road under construction or maintenance. 18. Probability of overturning due to lorry PfOVERTjLorryg PfOVERTjLorryg ¼ PfOVERTjBrakeFailureg þ PfOVERTjLorryMechanicalFailureg ð3:60Þ þ PfOVERTjFlatTireg with 19. Probability of overturning due to brake failure PfOVERTjBrakeFailureg According to the event tree in Fig. 3.15, PfOVERTjBrakeFailureg ¼ q2 þ q3 þ q5 þ q6 ð3:61Þ with q2 ¼ k6 p61 p62 ð1 p63 Þ q3 ¼ k6 p61 ð1 p62 Þ q5 ¼ k6 ð1 p61 Þ p62 ð1 p63 Þ q6 ¼ k6 ð1 p61 Þ ð1 p62 Þ and k6 relative frequency of brake failures. 20. Probability of overturning due PfOVERTjLorryMechanicalFailureg to mechanical failure, 54 3 Quantitative Probability Assessment of Loc Accident Fig. 3.16 An event tree for the computation of PfOVERTjFlatTireg. Correlate with Eq. (3.63) PfOVERTjLorryMechanicalFailureg: Obtained from statistics=expert judgment ð3:62Þ 21. Probability of overturning due to flat tire PfOVERTjFlatTireg According to the event tree in Fig. 3.16, PfOVERTjFlatTireg ¼ q3 þ q5 ð3:63Þ with q3 ¼ k7 ð1 p71 Þ p72 ð1 p73 Þ q5 ¼ k7 ð1 p71 Þ ð1 p72 Þ ð1 p73 Þ and k7 relative frequency of flat tire. 22. Probability of overturning due to driver PfOVERTjDriver g PfOVERTjDriver g ¼ PfOVERTjOverSpeedingg þ PfOVERTjDriverStateOfHealthg ð3:64Þ þ PfOVERTjTopographyg with 23. Probability of overturning due to overspeeding, PfOVERTjOverSpeed g PfOVERTjOverSpeedingg: Obtained from statistics=expert judgment ð3:65Þ 3.3 Models and Algorithms: Loc Accident Probability … 55 24. Probability of overturning due to driver’s state of health, PfOVERTjDriver StateOfHealthg PfOVERTjDriverStateOfHealthg: Obtained from statistics=expert judgment ð3:66Þ 25. Probability of overturning due to topography, PfOVERTjTopographyg PfOVERTjTopographyg: Obtained from statistics=expert judgment ð3:67Þ References Gheorghe, A. V., Grote, G., Kogelschatz, D., Fenner, K., Harder, A., Moresi, E. et al. (2000a). Integrated risk assessment, transportation of dangerous goods: Case study. Zurich, Switzerland: Target: Basel-Zurich/VCL. ETH KOVERS. Gheorghe, A. V., Vamanu, D. V., & Vamanu, B. I. (2000b). SBW: Risk in the transportation of hazardous materials by road [Computer software]. ETH Zurich: Laboratorium fur Siecherheist Analytik (LSA) KOVERS-KT Gheorghe, A. V., Birchmeier, J., Kröger, W., & Vamanu, D. V. (2003). Hot spot based risk assessment for transportation dangerous goods by railway: Implementation within a software platform. In Proceedings of the Third International Safety and Reliability Conference (KONBIN 2003). Gdynia, Poland. Gheorghe, A. V., Birchmeier, J., Kröger, W., Vamanu, D. V., & Vamanu, B. (2004). Advanced spatial modelling for risk analysis of transportation dangerous goods. In C. Spitzer, U. Schmocker & V. N. Dang (Eds.), Probabilistic safety assessment and management (pp. 2499– 2504). London, UK: Springer London. Retrieved from http://link.springer.com/chapter/10. 1007/978-0-85729-410-4_401 Gheorghe, A. V., Birchmeier, J., Vamanu, D., Papazoglou, I., & Kröger, W. (2005). Comprehensive risk assessment for rail transportation of dangerous goods: A validated platform for decision support. Reliability Engineering and System Safety, 88(3), 247–272. http://doi.org/10.1016/j.ress.2004.07.017 Gheorghe, A. V., Masera, M., Weijnen, M. P. C., & De Vries, J. L. (Eds.). (2006). Critical infrastructures at risk: Securing the European electric power system (Vol. 9). Dordrecht, the Netherlands: Springer. Chapter 4 Loc Consequence Assessment Abstract In this chapter, a set of methods and algorithms for quantitative consequence assessment (i.e., health and environmental impact) of accidental releases of hazardous substances (i.e., toxic and flammable) are presented. The effects are analyzed through the biological effects produced by different types of physical effects (phenomena) that occur during or following a loss of containment (LOC) event. Consequence assessment of a loss of containment accident is an important phase required in a sound risk assessment procedure (Gheorghe et al. 2004). Essentially, consequence assessment implies the evaluation of the impact (e.g., biological, ecological, and economical) of a disruptive event on the environment and the exposed public. In the particular case of hazmat transportation, the focus is on the impact of the environmental releases of potentially dangerous goods (substances) resulting after a LOC. Depending on the physical and chemical properties of substances in a containment, as well as containment (storage) type, the release may occur in different ways, with various effects on the environment and the public. Similar to the approach undertaken in Chap. 2, the number of fatalities is taken as the main impact indicator of a LOC accident. Since the number of fatalities depends, alongside the properties of the substance, on the spatial characteristics of the transportation system (i.e., number of people actually exposed), the need to rely on Geographical Information Systems (GIS) becomes palpable. Appendix B covers the role of GIS and decision support systems (DSS). This is an essential element of the analysis since, for example, methane explodes in the same way irrespective of the presence of people around. This calls for an intermediate impact value that would quantify the effect of an environment release in an unequivocal way. For these reasons, percentage of lethality is taken as a preferred measure on the remainder of the models. The selection of models came as a response to the natural question: What series of events lead to a fatality starting with a loss of containment? Arguably, this depends on several factors. However, the nature of the hazardous substance plays a major role. This substance/material could ignite, explode, or disperse. In this © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6_4 57 58 4 Loc Consequence Assessment research, the corresponding areas of focus (i.e., phenomena) are fire, explosion, and atmospheric dispersion. Following these phenomena, the damaging physical effects are heat radiation for fire, shockwave generation and propagation for explosion, and toxic substance spreading for dispersion. The death of an individual exposed to any of the aforementioned physical effects could occur, respectively, due to: • first, second- and third-degree burns due to heat radiation; • wounds due to the shockwave; • acute intoxication due to immersion in a toxic environment. One way to link physical effects to the impact indicator (lethality percentage) is through the use of a probit function. In probability theory and statistics, the probit function is the quantile function associated with the standard normal distribution, which is commonly denoted as N(0,1). Current research adopts methods developed by Nederlandse Organisatie voor Toegepast Natuurwetenschappelijk Onderzoek (TNO) for the calculation of physical effects and possible damages associated with dangerous substance (Committee for the Prevention of Disasters 1992; van den Bosch and Weterings 1996). These methods are consistent current research objectives. To minimize cross-referencing and enable facilitation of reading and direct implementation, various definitions and equations of the adopted methods are repeated several times in this chapter in an algorithmic fashion. 4.1 Physical to Biological Effects’ Relationship Once the physical effects of the hazmat release are known (these can be analytically computed starting from the chemical and physical characteristics of the substance and the release environment, as will be detailed in the following chapters), one needs a way of linking these results to a more risk-relevant indicator. To clarify, consider the following example: The physical effect of an open fire event following a gasoline LOC event is quantified by the means of thermal radiation. However, one needs more risk-relevant information which is related to: ‘the percentage of population (people) who will die from first degree burns when exposed to flames for a duration t.’ This information can be obtained using a probit function. A general definition of a probit function for a variety of possible effects is (van den Bosch and Weterings 1996): Probit ¼ a þ b lnðC n Þ where Probit measure of the effect; C measure of the cause; a, b, n coefficients. ð4:1Þ 4.1 Physical to Biological Effects’ Relationship 59 In consideration of the physical effect, a, b, and n are either substance characteristics (i.e., in the case of acute intoxication) or effect characteristics (i.e., in the case of fire and explosion effects). The C value in the following models relates to (i) the thermal radiation, (ii) shockwave pressure, and (iii) the toxic dose. The effect (E) is the lethality percentage. The probit function does not provide the actual percentage. In most cases, this value is typically supplied in the format of a ‘percentage versus probit value’ in tables. However, one can use an analytical approach to obtain the percentage value through the use of an error function: Probit 5 pffiffiffi Perc ¼ 50 1 þ erf 2 ð4:2Þ with erfðzÞ—the error function, defined as: 2 Zz 2 erfðzÞ ¼ pffiffiffi et dt p0 ð4:3Þ A numerical solution for Eq. (4.3) is given by the polynomial approximation (Gheorghe and Vamanu 1996): erfðzÞ ¼ 1 0:254829592 t 0:284496736 t2 þ 1:421413741 t3 1:453152027 t4 2 þ 1:061405249 t5 ex ð4:4Þ with t ¼ 1 þ1p z and p ¼ 0:3275911 for z 0 and erfðzÞ ¼ erf ðjzjÞ for z\0 4.2 ð4:5Þ Fire Consequence Assessment Consequences of fire are quantified by the percentages of exposed population, located at a given distance (d) from the thermal radiation source, that die due to first-, second-, and third-degree burns. When a fire occurs, heat is transferred to the surroundings by the means of convection and radiation. This suggests using a probit function having parameters of total heat radiation load (Q) received by a human subject at distance d from the 60 4 Loc Consequence Assessment source of fire and exposed for a time period texp. In other words, an individual exposed to Q for a time span texp suffers burns which produce death. The total heat radiation load is given by: Q ¼ texp q4=3 ð4:6Þ with q heat radiation load experienced by the receiver per unit area; texp exposure time. In the adopted analytical methods, the computation of the heat load work under the following assumptions (van den Bosch and Weterings 1996): • Flame is considered to have a finite surface radiator (the visible part of the flame); • The flame is characterized by a given radiation emittance (E), in turn; • E depends on the flame temperature (Tmax); • Tmax depends on the type of material burning; • Heat radiation load (q) is proportional to the flame emittance (E) and depends on the dimensions of the radiator and distance to the radiator; this dependency is expressed in the form of the view factor (F); • Heat radiation load at distance d is influenced (reduced) by the atmospheric transmissivity factor sa . In consideration of the above, one has the equation for the heat radiation load as: q ¼ E F sa ð4:7Þ Probit coefficients are provided for each of the burn degrees; the equations for the probit values are: Probit1 ¼ 39:83 þ 3:0186 lnðQÞ for first degree burns; Probit2 ¼ 43:14 þ 3:0186 lnðQÞ for second degree burns; and ð4:8Þ Probit3 ¼ 36:38 þ 2:5600 lnðQÞ for third degree burns Once the probit values are known, the lethality percentages can be obtained using Eq. (4.2). If one adopts a conservative posture (i.e., worst-case scenario philosophy), then • air transmissivity is taken as 1 (i.e., sa ¼ 1); • a subject is exposed to flame’s heat radiation load throughout the lifetime of the flame (i.e., texp ¼ time while flame exists); • several constants are used in the model. These constants are presented in Table 4.1. 4.2 Fire Consequence Assessment Table 4.1 Constants used in the computational algorithms 61 List of constants Symbol Unit Value Gravitational force Stefan–Boltzmann G rB 9.81 5.67E-11 Molar mass air Mair Ideal gas constant Rgas m/s2 kW m2 K4 kg kmol l Atm K Emittance Atmospheric transmissivity e s 28.9467 0.082 1 1 The models proposed also assume that anyone within the fire radius can be killed—lethality percentage equals 100 (Gheorghe et al. 2003). The maximum effect radii are determined in an iterative manner: Lethality percentage due to first-, second-, and third-degree burns is computed for distances starting from fire radius with a given measurement step (usually 1 m). The maximum radius for an effect is given by the distance at which the lethality percentage falls under a given threshold (e.g., 1 %). Therefore, one needs the caloric load (Eq. 4.6) which entails computing the thermal radiation level (q) and the exposure time (texp) to compute lethality percentage. Three types of fire considered: pool fire, flare, and boiling liquid expanding vapor explosion (BLEVE). Each of these may follow a LOC accident, depending on the factors such as the accident mechanics (e.g., puncture of the vessel above the liquid level), storage type (e.g., pressurized versus unpressurized), and the physical and chemical characteristics of the substance. To determine the type of fire that should be considered, the schema presented in Fig. 4.1 is recommended. The computational algorithms and equation set for each of the fire types are considered below. 4.2.1 Pool Fire Consequence Assessment A pool fire assessment model is provided for covering the scenarios in which the hazardous (flammable) materials spill out of the tanker—thus forming a hazmat pool. This is a situation in which heat transfer from the pool substrate causes the hazardous material to evaporate and form a cold dense vapor cloud. The presence of any ignition source in the proximity of the pool (notice that this is a frequently encountered in case of road or rail accidents) may ignite the vapor cloud spill, forming a pool fire. Assessment is a two-phase process. In phase one, the task is to determine the flame emittance (E), temperature (Tmax), and the combustion time (texp). The second phase, generally referred to as effects computation, is considered with the computation of heat radiation load q at distance d, which provides the main consequence indicator (i.e., 62 4 Loc Consequence Assessment Fig. 4.1 Types of fire by storage and release characteristics. Adapted from van den Bosch and Weterings (1996) lethality percentage). As previously mentioned, heat radiation load depends on the geometry of the flame. The geometry of a pool fire is assumed as a vertical cylinder or radius poolrad with height hf. Algorithms for each variable are noted below: 4.2.1.1 Inputs Case characteristics Substance characteristics Substance mass Pool radius Molar mass Boiling temperature Heat of evaporation m poolrad Mol tBoil hv (kg) (m) (kg/kmol) (°C) (kJ/kmol) (continued) 4.2 Fire Consequence Assessment 63 (continued) Meteorological 4.2.1.2 Specific heat cv (kJ/(kmol K)) Combustion heat Temperature Atmospheric pressure hc tambient Pambient (kJ/kg) (°C) mm Hg Risk-Relevant Output Lethality percentage due to first-, second-, and third-degree burns Maximum flame temperature Combustion time Risk radii for lethality due to first-, second-, and third-degree burns 4.2.1.3 Perci ; i ¼ 1. . .3 Tmax texp Computational Steps 1. Compute the absolute temperatures (K) as: Tboil ¼ tboil þ 273:15 Tambient ¼ tambient þ 273:15 ð4:9Þ 2. Compute the air density given the ambient as: qair Mair Pambient 760 Rgas Tambient ð4:10Þ 3. Compute the heat factor as: Tfactors ¼ cv ðTboil Tambient Þ; 0; for Tboil [ Tambient otherwise ð4:11Þ 4. Compute the burning rate per unit area (evaporation rate) as: m00 ¼ 0:001 5. Compute: hc hv þ Tfactor ð4:12Þ 64 4 Loc Consequence Assessment hf m00 ¼ 42 qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi df qair G dp 0:61 ð4:13Þ with: df the fire diameter and df = dp = 2 * poolrad hf the fire height dp the pool diameter. 6. Compute the flame emittance from the approximation as: E ¼ 0:35 m00 hc 1 þ 4 hdff ð4:14Þ 7. The maximum temperature inside the flame is given by: Tmax ¼ E 4 þ Tambient rB 14 ð4:15Þ 8. The combustion time is given by: texp ¼ 4.2.1.4 m m00 Apool ð4:16Þ Effects Computation A pool fire’s geometry is approximated as a vertical cylinder. The health effects computation (lethality percentage) depends on the view factor of the flame (i.e., view factor of a vertical cylinder). The lethality percentage at distance d from the radiator is obtained by using the following scheme: 1. Compute the maximum view factor ðFmax Þ for a vertical cylinder for distance d following the sequence as: hr ¼ hf poolrad ð4:17Þ Xr ¼ d poolrad ð4:18Þ A ¼ ðXr þ 1Þ2 þ h2r ð4:19Þ 4.2 Fire Consequence Assessment 65 B ¼ ðXr 1Þ2 þ h2r sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi) ( rffiffiffiffiffiffiffiffiffiffiffiffiffi 1 Xr þ 1 Xr2 1 þ h2r ðXr 1ÞA pffiffiffiffiffiffi atan Fh ¼ atan p Xr 1 ðXr þ 1ÞB AB sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ( ! 1 1 hr hr ðA 2Xr Þ ðXr 1ÞA pffiffiffiffiffiffi atan atan pffiffiffiffiffiffiffiffiffiffiffiffiffiffi þ Fv ¼ 2 p Xr ðXr þ 1ÞB Xr AB Xr 1 sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi) hr ðXr 1Þ atan ðXr þ 1Þ Xr Fmax ¼ qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi Fh2 þ Fv2 ð4:20Þ ð4:21Þ ð4:22Þ ð4:23Þ 2. Compute the heat radiation load as q ¼ E Fmax ð4:24Þ 3. Compute the probit function for first-, second-, and third-degree burns as: 4 Probit1 ¼ 39:83 þ 3:0186 ln texpB q3 4 Probit2 ¼ 43:14 þ 3:0186 ln texpB q3 4 Probit3 ¼ 36:38 þ 2:5600 ln texpB q3 ð4:25Þ 4. Compute the lethality percentage due to first-, second-, and third-degree burns as: Probiti 5 pffiffiffi Perci ¼ 50 1 þ erf 2 4.2.2 ð4:26Þ Flare Fire Consequence Assessment Flare fire consequence assessment model is provided for handling scenarios in which there is a puncture in the pressurized container of the hazardous material 66 4 Loc Consequence Assessment such as gas or liquefied gas. Such an event leads to a forced mix of flammable gas and air that in case of an ignition would produce a flare fire. The assessment involves determining the flame emittance (E) and temperature (Tmax) in a first phase, followed by determining the heat radiation load q at distance d, hence the main consequence indicator (lethality percentage) in a second phase (the effects computation phase). Note that, in this case, the combustion time, texp, is not one of the results of the computation. The processes encountered when gas is released from a pressurized container are highly complex; there are analytical models for simulating such an event (see van den Bosch and Weterings 1996), yet for the sake of simplicity, we consider the combustion time as one of the model inputs (denoted by texpF). The geometry of a flare is also assumed as a vertical cylinder. The associated algorithms are presented below: 4.2.2.1 Saturation Pressure Constants K1 = (22.92 + 21.18 + 21.86 + 21.36 + 21.60 + 21.86 + 26.92 + 21.51)/8 K2 = (2.71 + 1.63 + 2.82 + 2.265 + 2.70 + 2.82 + 4.90 + 2.37)/8 K3 = (0.0289 + 0.0209 + 0.0214 + 0.0174 + 0.0166 + 0.0186 + 0.0168 + 0.0114 + 0.0065)/9 K4 = (0.725 + 0.783 + 0.776 + 0.843 + 0.831 + 0.809 + 0.857 + 0.761 + 0.850)/9 4.2.2.2 Inputs Case characteristics Substance characteristics Meteorological Hole diameter Pool radius Molar mass Boiling temperature Heat of evaporation Specific heat Combustion heat Saturated vapor pressure (at 4 °C) Stoichiometric volume ratio Temperature Atmospheric pressure du texpB Mol tBoil hv cv hc pv20 jst tambient Pambient (m) (s) (kg/kmol) (°C) (kJ/kmol) (kJ/(kmol K)) (kJ/kg) (mm Hg) (°C) (mm Hg) 4.2 Fire Consequence Assessment 4.2.2.3 67 Risk-Relevant Output Lethality percentage due to first-, second-, and third-degree burns Maximum flame temperature Combustion time Risk radii for lethality due to first-, second-, and third-degree burns 4.2.2.4 Perci ; i ¼ 1. . .3 Tmax texp Computational Steps 1. Compute the absolute temperatures (K) as: Tboil ¼ tboil þ 273:15 Tambient ¼ tambient þ 273:15 ð4:27Þ 2. Compute the air density given the ambient as: qair Mair Pambient 760 Rgas Tambient ð4:28Þ 3. Compute the saturated vapor pressure under the given circumstances as: 1 1 pv pv ¼ pv20 exp 1000 K2 1:013e5 293:15 Tambient 760 ð4:29Þ 4. Compute the combustion rate (evaporation rate) following the sequence as: pratio ¼ Mol pv 8314 Tambient pratio 4 1 K3 pKratio qa ¼ qu qair ð4:30Þ ð4:31Þ ð4:32Þ b1 ¼ 50:5 þ 48:2 qa 9:95 q2a ð4:33Þ b2 ¼ 23 þ 41 qa qa b1 Kal ¼ 0:32 pffiffiffiffiffi jst b1 þ b2 qu ð4:34Þ ð4:35Þ 68 4 Loc Consequence Assessment du Kal ð4:36Þ du pffiffiffiffiffi 2 Kal b2 ð4:37Þ hf ¼ df ¼ Since we assume the same geometries for flare and pool fire, we may infer the burning rate from Eq. (4.13) as: pffiffiffiffiffiffiffiffiffiffiffiffi hf 0:61 m ¼ qair G df 42 df 1 00 ð4:38Þ 5. Compute the flame emittance as: E ¼ 0:35 m00 hc 1 þ 4 hdff ð4:39Þ 6. The maximum temperature of the flame is given by: Tmax ¼ 4.2.2.5 E 4 þ Tambient rB 1=4 ð4:40Þ Effects Computation The effects are computed following the method from Sect. 4.2.1. We duplicate the equation set for the sake of readability. Thus, to obtain the lethality percentage at distance d from the fire, one should: 1. Compute the maximum view factor ðFmax Þ for a vertical cylinder for distance d following the sequence as: hr ¼ hf poolrad ð4:41Þ Xr ¼ d poolrad ð4:42Þ A ¼ ðXr þ 1Þ2 þ h2r ð4:43Þ B ¼ ðXr 1Þ2 þ h2r ð4:44Þ 4.2 Fire Consequence Assessment 69 sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi) ( rffiffiffiffiffiffiffiffiffiffiffiffiffi 1 Xr þ 1 Xr2 1 þ h2r ðXr 1ÞA pffiffiffiffiffiffi atan Fh ¼ atan p Xr 1 ðXr þ 1ÞB AB sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ( ! 1 1 hr hr ðA 2Xr Þ ðXr 1ÞA pffiffiffiffiffiffi atan atan pffiffiffiffiffiffiffiffiffiffiffiffiffiffi þ Fv ¼ 2 p Xr ðXr þ 1ÞB Xr AB Xr 1 sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi) hr ðXr 1Þ atan ðXr þ 1Þ Xr Fmax ¼ qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi Fh2 þ Fv2 ð4:45Þ ð4:46Þ ð4:47Þ 2. Compute the heat radiation load as q ¼ E Fmax ð4:48Þ 3. Compute the probit function for first-, second-, and third-degree burns as: 4 Probit1 ¼ 39:83 þ 3:0186 ln texpF q3 4 Probit2 ¼ 43:14 þ 3:0186 ln texpF q3 4 Probit3 ¼ 36:38 þ 2:5600 ln texpF q3 ð4:49Þ 4. Compute the lethality percentage due to first-, second-, and third-degree burns as: Probiti 5 pffiffiffi Perci ¼ 50 1 þ erf 2 4.2.3 ð4:50Þ BLEVE Consequence Assessment A boiling liquid expanding vapor explosion (BLEVE) consequence assessment model is provided for handling scenarios in which there is catastrophic rupture (complete failure) of a pressurized container of the hazardous material (gas or liquefied gas), followed by ignition of the resulting BLEVE gas cloud. In the proposed model carries the assumption that the BLEVE fire is approximated to a fireball. The assessment entails: determine the flame emittance (E), temperature (Tmax), fireball radius (R) and the fireball duration (tBLEVE) in a first phase; determine the 70 4 Loc Consequence Assessment heat radiation load q at distance d, hence the main consequence indicator (lethality percentage) next (the effects computation phase). The flame geometry is that of a sphere. The associated algorithms are presented below: 4.2.3.1 Input Data Case characteristics Substance characteristics Substance mass Molar mass Boiling temperature Latent heat, vapors Specific heat Combustion heat Temperature Atmospheric pressure Meteorological 4.2.3.2 M Mol tBoil hv cv hc tambient Pambient Risk-Relevant Output Lethality percentage due to first-, second-, and third-degree burns Maximum flame temperature Duration of fireball Risk radii for lethality due to first-, second-, and third-degree burns 4.2.3.3 (kg) (kg/kmol) (°C) (kJ/kmol) (kJ/(kmol K)) (kJ/kg) (°C) (mm Hg) Perci ; i ¼ 1. . .3 Tmax TBLEVE Computational Steps 1. Compute the absolute temperatures (K) as: Tboil ¼ tboil þ 273:15 Tambient ¼ tambient þ 273:15 ð4:51Þ 2. Compute the air density given the ambient as: qair Mair Pambient 760 Rgas Tambient ð4:52Þ 3. Compute the heat factor as: Tfactors ¼ cv ðTboil Tambient Þ; 0; otherwise for Tboil [ Tambient ð4:53Þ 4.2 Fire Consequence Assessment 71 4. Compute the combustion rate (evaporation rate) as: m00 ¼ 0:001 hc hv þ Tfactor ð4:54Þ 5. Compute hf /df, assuming a pool fire of 1 m diameter as: hf ¼ hf ¼ 42 df m00 qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi qair G dp 0:61 ð4:55Þ 6. Compute the flame emittance as: E ¼ 0:35 m00 hc 1 þ 4 hdff ð4:56Þ For BLEVE, the value of emittance is doubled in accordance with van den Bosch and Weterings (1996). 7. The maximum temperature inside the flame is given by: Tmax ¼ 2E 4 þ Tambient rB 1=4 ð4:57Þ 8. The maximum radius of the fireball is: RB ¼ 3:24 m0:325 ð4:58Þ 9. The duration of the fireball is given by: tBLEVE ¼ 0:852 m0:26 4.2.3.4 ð4:59Þ Effects Computation The lethality percentage at distance d from the fireball is computed as follows: 1. Compute the maximum view factor at distance d for a sphere: Fmax ¼ RB d 2 ð4:60Þ 72 4 Loc Consequence Assessment 2. Compute the heat radiation load q ¼ E Fmax ð4:61Þ 3. Compute the probit function for first-, second-, and third-degree burns: 4 Probit1 ¼ 39:83 þ 3:0186 ln texpF q3 4 Probit2 ¼ 43:14 þ 3:0186 ln texpF q3 4 Probit3 ¼ 36:38 þ 2:5600 ln texpF q3 ð4:62Þ 4. Compute the lethality percentage due to first-, second-, and third-degree burns: Probiti 5 pffiffiffi Perci ¼ 50 1 þ erf 2 4.3 ð4:63Þ Explosion Consequence Assessment Explosion consequences (deaths) are caused by the shockwave propagation. In the proposed model, the fast variation of pressure caused by the shockwave is converted into mechanical impulse. The impulse is the consequence parameter for the probit functions used for determining the lethality percentages. The impulse value corresponding to a given pressure is obtained from empirical pressure–impulse diagrams (van den Bosch and Weterings 1996). The output of this model is the effects of the shockwave on (1) the population— as lethality percentage and (2) the environment—as structural damages on buildings. This model carries the assumption that death is caused by: • • • • • lung injuries—due to the shockwave, head injuries—due to the shockwave, body injuries—due to the shockwave, body injuries—due to fragments, and head injuries—due to fragments from broken windows. 4.3.1 The Algorithm 4.3.1.1 Constants The relevant constants and their related values are presented in Table 4.2. 4.3 Explosion Consequence Assessment Table 4.2 Constants required by the exploration assessment model 4.3.1.2 Constant Symbol Unit Value Gravity Stefan–Boltzmann constant G rB 9.81 5.67E-11 Molar mass air Mair Ideal gas constant Rgas m/s2 kW m2 K4 kg kmol l Atm K Emittance Atmospheric transmissivity Kiloton psi to Pa transformation e s kiloton psi to Pa J/kt psi/Pa 28.9467 0.082 1 1 4.182E9 1.45E-4 Inputs Case characteristics Substance characteristics Meteorological 4.3.1.3 73 Substance mass Yield fraction Positive phase duration Subject (adult, child, etc.) Subject position Typical fragment shape Fragment cross section Window width Window height Window thickness Glass elasticity module Glass density m Yieldproc texp subject position fShape Af aglass bglass dglass Eglass qglass Poisson’s coefficient (glass) Molar mass Boiling temperature Latent heat, vapors Specific heat Combustion heat Mass conversion factor Temperature Atmospheric pressure vPoisson Mol tBoil hv cv hc FTNT tambient Pambient (kg) (s) (m2) (m) (m) (m) (Pa) (kg/m3) (kg/kmol) (°C) (kJ/kmol) (kJ/(kmol.K)) (kJ/kg) (ktonne/kg) (°C) (mm Hg) Computational Steps 1. Select a reference subject for the assessment and get the corresponding subject mass from Table 4.3 74 4 Loc Consequence Assessment Table 4.3 Available subject and their corresponding average mass Subject Mass mbody (kg) ‘Adult man’ ‘Adult woman’ ‘Child’ ‘Baby’ 75 55 25 5 2. Compute the generic window dynamic load factor (DLF) following the sequence: (a) Compute window’s inertia as: Inertia ¼ qglass dglass aglass bglass a3glass þ b3glass =6 ð4:64Þ (b) Compute window’s minimum natural frequency as: fglass p ¼ 2 1 a2glass ! sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi Eglass Inertia þ 2 qglass dglass ð1 mPoisson Þ bglass 1 ð4:65Þ (c) Compute window’s oscillation period as: 1 fglass ð4:66Þ texp Tglass ð4:67Þ Tglass ¼ d) Compute ttoT as: ttoT ¼ e) Compute the dynamic load factor (DLF) as: 8 ttoT for ttoT 0:3 > 3 > > > 8 1 > 1 þ ðttoT 0:3Þ 15 0:7 for 0:3\ttoT 1:0 > > > > < 1 þ 8 þ ðttoT 1Þ 4 for 1:0\ttoT 2:0 15 15 DLF ¼ 12 1 > 1 þ þ ð ttoT 2 Þ for 2:0\ttoT 3:0 > 15 15 > > > 13 1 > 1 þ 15 þ ðttoT 3Þ 30 for 3:0\ttoT 4:0 > > > : 1 þ 13:5 for ttoT 4 15 3. Compute the static load factor for the window following the algorithm: (a) Compute the window area as: ð4:68Þ 4.3 Explosion Consequence Assessment 75 Aglass ¼ aglass bglass ð4:69Þ b) Compute critical deflection fraction as: bglass 1:5 Dtodcr ¼ 6 aglass ð5:70Þ (c) Compute the static load at iteration zero: Pst ¼ 2:0e6 2 dglass 0:7 2 A0:18 glass dglass 0:225 aglass ð4:71Þ (d) Compute window’s deflection fraction function of the current thickness: Dtod ¼ 7:6e15 Pst a3glass bglass 4 dglass ð4:72Þ (e) If Dtod\Dtodcr – compute g ¼ 1þ 1 ðDtodcr Dtod Þ 9 ð4:73Þ – update Pst q ! Pst – repeat step (d) above. 4. Compute the absolute temperature (K) and the atmospheric pressure in pascal: pambient 1:013e5 760 ð4:74Þ Tambient ¼ tambient þ 273:15 ð4:75Þ Pambient ¼ 5. Compute air density: qair ¼ Mair pambient 760 Rgas Tambient ð4:76Þ 6. Compute the kiloton expression of the yield fraction: Yield ¼ yieldproc 1000 hc FTNT ð4:77Þ 7. Compute the RB1, RB3, RB5, RB10, and RB20 effect radii, as shown in Table 4.4. 76 4 Loc Consequence Assessment Table 4.4 Explosion effect radii Effect Overpressure (psi) X1. Vibrating windows 1 Light injuries due to fragments X2. Residential buildings 3 collapsed Frequent serious injuries Possible deaths X3. Most of the buildings 5 collapsed Serious injuries Frequent deaths X4. Collapse or serious damage 10 of reinforced concrete buildings Most of the exposed public killed X5. Collapse or serious damage 20 of reinforced concrete buildings Lethality percentage next to 100 % X6. Extrapolation toward the P1 explosion center Total demolition and lethality area Description and computational formulae Radius (m) Formula RB1 RB1 = 1000 * Yield0.33 * 2.20 RB3 RB3 = 1000 * Yield0.33 * 1.00 RB5 RB5 = 1000 * Yield0.33 * 0.71 RB10 RB10 = 1000 * Yield0.33 * 0.45 RB20 RB20 = 1000 * Yield0.33 * 0.28 For computing P1, we adopt the Lagrange interpolation polynomial approach which is also implemented in Gheorghe et al. (2003). Accordingly, one has: P1 ¼ y1 Lag1 þ y2 Lag2 þ y3 Lag3 þ y4 Lag4 þ y5 Lag5 with y1 ¼ 1; X1 ¼ RB1 y2 ¼ 3; X2 ¼ RB3 y3 ¼ 5; X3 ¼ RB5 y4 ¼ 10; X4 ¼ RB10 y5 ¼ 20; X5 ¼ RB20 and ð4:78Þ 4.3 Explosion Consequence Assessment 77 X¼1 ðX X2 Þ ðX X3 Þ ðX X4 Þ ðX X5 Þ ðX1 X2 Þ ðX1 X3 Þ ðX1 X4 Þ ðX1 X5 Þ ðX X3 Þ ðX X4 Þ ðX X5 Þ ðX X1 Þ ¼ ðX2 X3 Þ ðX2 X4 Þ ðX2 X5 Þ ðX2 X1 Þ ðX X4 Þ ðX X5 Þ ðX X1 Þ ðX X2 Þ ¼ ðX3 X4 Þ ðX3 X5 Þ ðX3 X1 Þ ðX3 X2 Þ ðX X5 Þ ðX X1 Þ ðX X2 Þ ðX X3 Þ ¼ ðX4 X5 Þ ðX4 X1 Þ ðX4 X2 Þ ðX4 X3 Þ ðX X1 Þ ðX X2 Þ ðX X3 Þ ðX X4 Þ ¼ ðX5 X1 Þ ðX5 X2 Þ ðX5 X3 Þ ðX5 X4 Þ Lag1 ¼ Lag2 Lag3 Lag4 Lag5 4.3.1.4 Lethality Percentage Due to Overpressure Compute the probit function and lethality percentage starting from the center of the explosion up to RB1 radius, with a given resolution (e.g., 1 m), using the following the sequence: 1. Compute the overpressure at current distance ðPswðxÞÞ as indicated in Table 4.5: Psw Convert the obtained value in pascal: Psw psi to psa 2. Adjust the overpressure according to the subject position, as indicated in Table 4.6: Table 4.5 Overpressure formulae depending on the distance Distance X (m) Overpressure Psw(x) (psi) X X X X X Psw Psw Psw Psw Psw < > > > > RB20 = RB20 and X < RB10 = RB10 and X < RB5 = RB5 and X < RB3 = RB3 and X <= RB1 = = = = = P1 + (X − 1) * (20 − P1)/(RB20 − 1) 20 + (X − RB20) * (10 − 20)/(RB10 − RB20) 10 + (X − RB10) * (5 − 10)/(RB5 − RB10) 5 + (X − RB5) * (3 − 5)/(RB3 − RB5) 3 + (X − RB3) * (1 − 3)/(RB1 − RB3) Table 4.6 Overpressure adjustment formulae depending on the subject position Subject position Overpressure adjustment formula ‘Laid’ ‘Standing’ ‘Standing, next to a wall’ Ps = Psw Ps = Psw + 5 * Psw2/(2 * Psw + 14 * Pa) Ps = (8 * Psw2 + 14 * Psw2)/(Psw + 7 * Pa) 78 4 Loc Consequence Assessment 3. Compute the scaled pressure and impulse as: Pscaled ¼ Ps Pa ð4:79Þ t Ps exp 2 ffiffiffiffiffiffiffiffiffiffiffiffiffi iscaled ¼ pffiffiffiffiffi p Pa 3 mbody ð4:80Þ 4. Based on the results above, compute: – Probit value and lethality percentage due to lung injuries: 4:2 1:3 ¼ 5:0 5:74 ln þ Pscaled iscaled ð4:81Þ ProbitLung 5 pffiffiffi PercLung ¼ 50 1 þ erf 2 ð4:82Þ ProbitLung – Probit value and lethality percentage due to head injuries: ProbitHead ¼ 5:0 8:49 ln 2:43 103 4:0 108 þ Pscaled Pscaled iscaled PercHead ProbitHead 5 pffiffiffi ¼ 50 1 þ erf 2 ð4:83Þ ð4:84Þ – Probit value and lethality percentage due to body injuries: 7:38 103 1:3 109 þ ProbitBody ¼ 5:0 2:44 ln Pscaled Pscaled iscaled ProbitBody 5 pffiffiffi ProcBody ¼ 50 1 þ erf 2 ð4:85Þ ð4:86Þ 5. From the dynamic and static load factors of a glass sheet, compute: – Probit value and lethality percentage due to head injuries caused by glass fragments: 4.3 Explosion Consequence Assessment 79 Ps ProbitHead Glass ¼ 2:67 þ 5:62 ln DLF Pst ProbitHead Glass 5 pffiffiffi ProcHead Glass ¼ 50 1 þ erf 2 4.3.1.5 ð4:87Þ ð4:88Þ Lethality Percentage Due to Fragments 1. Select the air friction coefficient of the projectiles (fragments) depending on the considered shape as indicated in Table 4.7: 2. Compute the lethal speed V0 as: V0 ¼ Cd Af ql u2l texp 2 mfragment 2 ð4:89Þ with 7 Pa þ 6 Ps 7 Pa þ Ps sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi 5 ul ¼ Ps qair ð7 Pa þ Ps Þ ql ¼ qair ð4:90Þ ð4:91Þ 3. Depending on mfragment , one gets the probit value as in Table 4.8: 4. Compute the corresponding lethality percentage as: ProbitFrag 5 pffiffiffi ProcFrag ¼ 50 1 þ erf 2 Table 4.7 Average fragment shape and corresponding friction coefficients Shape Friction coefficient, Cd ‘Cylinder—side’ ‘Cylinder—base’ ‘Sphere’ ‘Disc’ ‘Cube—side’ ‘Cube—edge’ ‘Square box—side’ ‘Square box—edge’ 1.20 0.82 0.47 1.17 1.05 0.80 1.55 2.05 ð4:92Þ 80 4 Loc Consequence Assessment Table 4.8 Probit equation function for fragment mass mfragment >4.5 0:1 and 4:5 <0.1 4.4 ProbitFrag 13:9 þ 10:54 lnðV0 Þ m V02 17:56 þ 5:30 ln fragment 2 m V 5:115 29:15 þ 2:10 ln fragment2 0 Acute Intoxication Consequence Assessment The subsequent methodology allows addressing LOC scenarios related to an environmental release of the (toxic) substances. Once the toxic chemical, henceforth also named pollutant, leaves the container, it is subject to the atmospheric dispersion (i.e., diffusion and advection) process. Consequently, the pollutant concentration in air may exceed a threshold limit and therefore becomes dangerous for health and life of a population. However, it can be expected that concentration of a given pollutant will decrease due to diffusion and that the plume will travel due to advection. Then, of interest includes (1) how long the concentration exceeds one of the threshold values and (2) what area is affected by the plume during this time. The following set of models allows for the quantification of the impact of an atmospheric release of toxic substances in terms of: • The impact radius (radii) with respect to a given regulatory concentration in air; • The total time while a regulatory concentration is exceeded; • The lethality percentage—our core health impact indicator—due to acute intoxication as a function of distance; • The time while a concentration resulting in a given lethality percentage is exceeded. These models are adopted from the previous research (Committee for the Prevention of Disasters 1992; Gheorghe et al. 2000; 2003; van den Bosch and Weterings 1996), and the following assumptions are applicable: • The entire quantity of pollutant is released at once (instantaneous release); • The exposure time for a given effect is taken as the time span while the effect takes place (the overconservative approach). In light of the above, there are two tasks one must address: For a given quantity of pollutant and under given environmental conditions, (1) find a way to get the maximum distance down to which a reference concentration in air is exceeded and (2) find a way to determine the distance down to which a target percentage of the population exposed dies due to acute intoxication. These issues are addressed below. 4.4 Acute Intoxication Consequence Assessment 81 Table 4.9 Different health-related chemical indicators Indicator Description Immediately dangerous to life or health (IDLH) Concentration formally specified by a regulatory value and defined as the maximum exposure concentration of a given chemical in the workplace from which one could escape within 30 min. It is likely to cause death or immediate or delayed permanent adverse health effects or prevent escape from such an environment Concentration of an airborne substance to which an average person can be repeatedly exposed without adverse effects. TLV is expressed as time-weighted average, based on an allowable exposure averaged over a normal 8-h workday or 40-h workweek Maximum permissible concentration of a material, generally expressed in ppm in air, for a defined short period of time (typically 5 or 15 min, depending upon the country). This ‘concentration’ is generally a time-weighted average over the period of exposure. These values, which may differ from country to country, are often backed up by regulation and therefore may be legally enforceable ERPG-1 is the maximum concentration in air below which it is believed nearly all individuals could be exposed for up to one hour without experiencing other than mild transient adverse health effects or perceiving a clearly defined objectionable odor ERPG-2 is the maximum concentration in air below which it is believed nearly all individuals could be exposed for up to one hour without experiencing or developing irreversible or other serious health effects or symptoms that could impair their abilities to take protective action ERPG-3 is the maximum concentration in air below which it is believed nearly all individuals could be exposed for up to one hour without experiencing or developing life-threatening health effects Threshold limit value (TLV) Short-term exposure limit (STEL) The Emergency Response Planning Guidelines (ERPG-1, 2, 3) 4.4.1 Computing the Risk Radii The aim is to compute the concentrations of a pollutant in a covered area that exceed a given threshold and the exposure time (i.e., for how long). For simplicity, the impact area is assumed as the circular extent of radius that is equal to the maximum distance downwind where the threshold concentration is exceeded (risk radius). This suggests that one task becomes finding the value of the risk radius. 82 4 Loc Consequence Assessment From the toxicity point of view, chemicals can be characterized using different indicators. In a given situation, such indicators will reflect the concentration (i.e., g/m3 or ppm) of substance that might have an adverse effect on exposed population. Table 4.9 shows toxicity indicators (threshold values) based on a classification by Oxford University.1 The ‘instantaneous release’ assumption leads to adopting the Gauss puff model for the atmospheric dispersion process. The concentration at a location in space is given in the puff model by: Cðx; y; zÞ ¼ x m 3 ð2pÞ2 rh rv e 2 þ y2 2r2 h " e ðzH Þ2 2r2v þe ðz þ H Þ2 2r2 v # ð4:93Þ with g Cðx; y; zÞ m3 x ðm) y ðm) z ðm) m ðg) rh ; rv ðmÞ H ðm) the concentration in air at location ðx; y; zÞ, from source; the downwind distance from source; the crosswind distance; the height; the mass of substance; the horizontal and vertical dispersion coefficients; emission height. If one considers the puff evolution in time irrespective of wind speed (diffusion), then one denotes: CT ðg=m3 Þ the threshold concentration of a chemical (any of the toxicity indicators above); CT ½ t Rp ðmÞ, the puff radius at time t is defined as the distance from the puff center to the point in space where concentration equals CT . In current efforts, we assume that in a particular case of a LOC accident, the release takes place at ground level ðH ¼ 0Þ. Moreover, we are looking for concentration values at ground level ðz ¼ 0Þ, and since our objective is to compute the cloud radius, downwind is set at ðy ¼ 0Þ. Consequently, for a given threshold concentration and moment in time after release, Eq. (4.93) becomes: CT ¼ m 3 ð2pÞ2 rh rv e CT R½t p 2rh2 ð4:94Þ From where the risk radius can be inferred as: 1 More information can be retrieved from Physical and Theoretical Chemistry Laboratory, Oxford University, UK. 4.4 Acute Intoxication Consequence Assessment Table 4.10 Doury dispersion coefficient constants by stability class and time Time Ah 83 Kh Stability class 1 (strong diffusion) 0 4.05E-1 0.859 2.40E2 1.35E-1 1.130 3.28E3 1.35E-1 1.130 9.70E4 4.63E-1 1.000 5.08E5 6.50E0 0.824 1.30E6 2.00E5 0.500 Stability class 2 (weak diffusion) 0 4.05E-1 0.859 2.40E2 1.35E-1 1.130 3.28E3 1.35E-1 1.130 9.70E4 4.63E-1 1.000 5.08E5 6.50E0 0.824 1.30E6 2.00E5 0.500 vffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ! u u m CT ½t Rp ¼ rh t 2 ln 3 ð2pÞ2 rh rv Av Kv 0.42 1.00 20.00 20.00 20.00 20.00 0.814 0.685 0.500 0.500 0.500 0.500 0.20 0.20 0.20 0.20 0.20 0.20 0.500 0.500 0.500 0.500 0.500 0.500 ð4:95Þ Naturally, a negative value of the logarithm argument means that under the scenario assumptions (substance, mass, and time), the threshold limit has not been exceeded. Up to this point, we have not referred to the dispersion coefficients (rh and rv ) in Eq. (4.95). In this research, the Doury dispersion coefficient set (Gheorghe and Vamanu 1996) is adopted. This is a natural choice since the Doury coefficients are time dependent which is similar to the present discussion. The expression for the Doury coefficients is: rh ðtÞ ¼ ðAk tÞKh ð4:96Þ rv ðtÞ ¼ ðAv tÞKv with Ak ; Kh ; Av and Kv being the time-dependent constants as shown in Table 4.10 for each of the diffusion classes considered by the model (i.e., weak and strong diffusion). At this point, we have a solution (Eq. 4.95) to determine the time evolution of the stationary puff with respect to a given threshold concentration. To determine the risk radius associated with a given threshold limit, however, one has to consider that the puff also ‘travels’ in time (i.e., one has to include the effects of the wind). In other words, the risk radius is given by the sum of the puff radius at moment t and the distance traveled by the puff in time t. 84 4 Loc Consequence Assessment The following notations are necessary: u ðm=s) is the average wind speed; d ½t ðm) is the distance traveled by the puff center at time t; CT ½t R ðm) is the risk radius at time t. The following holds: d ½t ¼ u t ð4:97Þ and ( CT R½t ¼ ½t d ½t þ CT Rp CT R½t1 ½t if d ½t þ CT Rp \ CT R½t1 otherwise ð4:98Þ Equation (4.98) ensures that only the new distances travelled by the puff with a concentration higher than the threshold limit are taken into account. Additional information on model for atmospheric dispersion can be found elsewhere (e.g., Gheorghe 2005). The last objective in this phase of the assessment is to find out the exposure time related to a given concentration threshold. The process of computing the risk radii is iterative (i.e., time sampled). The maximum exposure time for a given concentration equals the time span between the release and the puff extinction (concentration below the threshold limit). Let us denote: CT texp ðs) as the maximum exposure time associated with concentration CT Summing up, the results of this phase are the following: (a) Maximum exposure time—the time while the concentration exceeds the threshold values; (b) Plume radius at moments of time (starting from 1 s from release until the maximum exposure time); c) The risk radii for the assumed threshold concentrations. 4.4.2 Computing the Lethality Percentage The second phase targets the assessment of the health impact of the hazmat release, quantified by the lethality percentage due to acute intoxication. Several remarks are in line. The lethality percentage is again obtained from the probit functions. In this case, however, the probit function plays the role of a dose-effect equation. The probit function for acute intoxication is (Committee for the Prevention of Disasters 1992): Probit ¼ a þ b lnðDÞ ð4:99Þ 4.4 Acute Intoxication Consequence Assessment 85 where D is the chemical dose defined as the time-integrated integral of concentration. Z ð4:100Þ D ¼ C n dt t The probit coefficients a, b, and n are substance characteristics. One may notice the difference between the meaning of the probit coefficients in case of acute intoxication and the previous cases. In the acute intoxication case, the probit coefficients are a characteristic of the substance, reflecting the impact of the toxicity of the substance on the subjects. In previous cases, the coefficients characterize the effect itself (e.g., probit coefficients for lung injuries). It is important to recall the objectives of this phase. Essentially, we are looking for: (a) The lethality percentage—our core health impact indicator—due to acute intoxication as a function of distance; (b) The time while a concentration resulting in a given lethality percentage is exceeded. In order to get this information, we approach the problem from the opposite direction. In fact, even the heading for this subchapter appears, at first glance, misleading since we start our method from a given lethality percentage. The problem statement from this inverse perspective might be restated as: Given the lethality percentage perc, find a way to determine: 1) the maximum distance downwind from emission source down to which perc exhibits and 2) the maximum exposure time while the pollutant concentration would cause perc of the exposed population death due to acute intoxication In order to respond to these questions, there is a need to assess substance and mass, and the emission characteristics. The first task is to get the probit value that corresponds to perc (probitperc ). In other words, one needs to find a way to compute the inverse of the erf function. For this, we propose the adoption/implementation of a fast-converging iterative algorithm based on the erf approximation as in Eq. (4.2). The actual algorithm for the inverse problem (i.e. obtaining probitperc starting from perc) is not provided here, being left as exercise for the interested reader. As an indication, one may opt for a numerical approach based on the half-interval (binary) search, using the Eq. (4.2). Once probitperc is known, Eq. (4.99) can be applied to get: D¼e probitperc a b ¼ TICperc ð4:101Þ Equation (4.101) also states the time-integrated concentration (TICperc ) for a given chemical, corresponding to a lethality percentage perc which is equal to D. In order to get the instantaneous concentration that would be consistent with probitperc , we consider the exposure time which is equal to the maximum of the CT texp values as previously determined. We denote: 86 4 Loc Consequence Assessment texp ¼ max C T texp ð4:102Þ From Eqs. (4.100)–(4.102), we get the value for the concentration Cperc as: ( TICperc texp Cperc ¼ 1 n 0; ; if TIC [ 0 otherwise ð4:103Þ The expression of Cperc in mg=m3 is given from: Cperc ¼ Cperc mg to ppm ð4:104Þ with mg to ppm ¼ Rgas Ta 760 Molpambient ð4:105Þ Next, one now needs to find out where (i.e., the distance from emission source) one can find concentration value that equals Cperc . This value is found by observing the results of a previously performed dispersion assessment using the atmospheric dispersion model introduced in Sect. 4.4.1. The dispersion assessment is performed for time duration texp and a recommended time sampling of 0:005 texp (Gheorghe 2005). The following section sums up all of the above in algorithmic fashion that is ready for implementation. 4.4.3 An Algorithm for Acute Intoxication Assessment Constants in Table 4.11 are required in the algorithm. Table 4.11 Acute intoxication consequence assessment required constants Constant Symbol Unit Value Gravity Molar mass air Ideal gas constant G Mair Rgas m/s2 kg/kmol lAtm K 9.81 28.9467 0.082 4.4 Acute Intoxication Consequence Assessment 4.4.3.1 Inputs Case characteristics Substance characteristics Meteorological 4.4.3.2 87 Substance mass Molar mass Boiling temperature IDLH TLV STEL ERPG-1 ERPG-2 ERPG-3 Probit a Probit b Probit n Doury stability class Wind speed m Mol tBoil IDLH TLV STEL ERPG1 ERPG2 ERPG3 Aprob Bprob Nprob Kt u (kg) (kg/kmol) (°C) (mg/m3) (mg/m3) (mg/m3) (mg/m3) (mg/m3) (mg/m3) (m/s) ground level Computational Steps Preliminary phase 1. Compute the absolute temperatures (K) as: Tambient ¼ tambient þ 273:15 Tboil ¼ tboil þ 273:15 ð4:106Þ 2. Compute the air density given the ambient as: qair Mair Pambient 760 Rgas Tambient ð4:107Þ 88 4 Loc Consequence Assessment Computation of the risk radii of IDLH, TLV, STEL, and ERPG-1, 2, 3 1. The algorithm is based on an iterative process as: 01. The algorithm is based on an iterative process as: I. Start with t =1 (seconds) II. Compute the Doury horizontal and vertical dispersion coefficients ( Equation [4.96] and Table 20. III. Compute the risk radius by following the sequence: using (i) (ii) If then compute (Equation 4.95) compute (Equation 4.98) Repeat (II) Else End A closer look at the algorithm above, one notices that it allows for simultaneous risk radii. However, notice that regardless of the implementation choice, at the end of this phase, one must select the maximum exposure time and the maximum risk radius such that: CT texp R½t ¼ max CT texp Rmax ¼ max CT These are essential to provide maximum exposure times and risk radii of each of the threshold concentrations considered (i.e., IDLH, TLV, STEL, ERPG-1, 2, 3). 4.4 Acute Intoxication Consequence Assessment 89 Intermediate phase 1. Create the reference atmospheric dispersion assessment (required for lethality radii computation) as: IV. Select the time sampling interval as V. Start with t = 1 (seconds) VI. Compute and keep the records of concentration downwind at moment t by: Computing the Doury horizontal and vertical dispersion coefficients using Equation [4.96] and Table 20; Apply Equation [4.94]. Current time t Puff displacement (location of the center of the puff) as in Equation [4.97]. VII. VIII. Repeat (VI) until End. Calculation of lethality percentage radii IX. Start with perc = 99 X. Compute that is consistent to perc, following the algorithm in Section 4.1. ( ) corresponding to XI. Compute the instantaneous concentration by sequentially applying Equations [4.101], [4.103] and [4.105]. XII. Identify in the results of the Intermediate phase the record closest to in terms of concentration2 (the reference record) XIII. Keep record of the following from the reference record. Lethality percentage Concentration Exposure time as Lethality radius XIV. XV. Repeat (X) until perc=0 End. References Committee for the Prevention of Disasters. (1992). Methods for the determination of possible damage. The Hague, the Netherlands: Sdu Uitgevers, Den Haag. Gheorghe, A. V. (2005). Integrated risk and vulnerability management assisted by decision support systems: Relevance and impact on governance (Vol. 8). Dordrecht, The Netherlands: Springer. Gheorghe, A. V., & Vamanu, D. V. (1996). Emergency planning knowledge. Zurich, Switzerland: vdf Hochschulverlag AG an der ETH Zurich. Gheorghe, A. V., Grote, G., Kogelschatz, D., Fenner, K., Harder, A., Moresi, E., Engel, M., Papazoglou., & Vamanu, D. (2000). Integrated risk assessment, transportation of dangerous goods: Case study. Zurich, Switzerland: Target: Basel-Zurich/VCL. ETH KOVERS. 90 4 Loc Consequence Assessment Gheorghe, A. V., Birchmeier, J., Kröger, W., & Vamanu, D. V. (2003). Hot spot based risk assessment for transportation dangerous goods by railway: Implementation within a software platform. In Proceedings of the third international safety and reliability conference (KONBIN 2003). Gdynia, Poland. Gheorghe, A. V., Birchmeier, J., Kröger, W., Vamanu, D. V., & Vamanu, B. (2004). Advanced spatial modelling for risk analysis of transportation dangerous goods. In C. Spitzer, U. Schmocker & V. N. Dang (Eds.), probabilistic safety assessment and management (pp. 2499– 2504). London, UK: Springer London. Retrieved from http://link.springer.com/chapter/10. 1007/978-0-85729-410-4_401 van den Bosch, C. J., & Weterings, R. A. P. M. (Eds.). (1996). Methods for the calculation of physical effects: Dues to releases of hazardous material (liquids and gases). CPR 14E, Second and later editions. The Hague, the Netherlands: TNO—The Netherlands Organization of Applied Scientific Research. Chapter 5 The Vulnerability Issue Abstract This chapter provides a working definition for ‘vulnerability’ in the context of contemporary research. Different models are then presented in an attempt to formalize the notion of vulnerability for the purposes of quantitative assessment. Methodological aspects involving system ‘definition’ and ‘indicators’ for quantitative vulnerability assessment are presented. Risk assessment is a careful and thorough examination of what could go wrong with a system, which, in turn, would harm people and the environment (de Weck et al. 2011; Gheorghe et al. 2014; Gibson et al. 2007). Certainly, risk assessment serves multiple objectives including estimating the extent of the potential damage, the likelihood of malfunctioning, assessing whether sufficient precautions have been taken, or if more actions should be done to minimize risk acceptable levels. Obviously, the raison d’être for risk assessment has to do with the internal characteristics of the process to be analyzed. This last statement can be addressed in the context of assessment methodology as indicated in Chaps. 2, 3, and 4. In the transportation of dangerous goods, risk can be depicted as function of (1) the probability and the frequency of a disruptive event characteristic to the process (e.g., LOC accident following a trigger event such as a ‘flat tire’ or ‘collision when entering the crossing’) and (2) the level of consequences of the abnormal event which could depend on the physical and chemical features of the transported substance(s) together with other factors including the type of the confinement of the substance being transported, and (3) the health impact of the event (i.e., lethality). Yet another perspective requires attention: the threat–subject relationship. When one talks of risk, the system itself would be the threat. This is especially the case when the system affects the environment. Then, a pertinent question can arise: How about the other way around? In essence, can the environment be a threat to the system? Social and economic developments as well as large-scale natural and man-made events continue to indicate that considering elements of risk (i.e., probability and consequence) is not sufficient to enhance and make systems more resilient © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6_5 91 92 5 The Vulnerability Issue (Gheorghe and Katina 2014; Tokgoz 2012), especially when we consider the need to make systems more robust and at the same time being able to limit the potential negative impact to public. This reality has led a major change of perspective with respect to industrial, economic, and social system safety analysis where dealing with complex system requires addressing an array of issues including: capability to grasp the cross-sector dependencies (Shi and Jaeger 2010), dealing with interdependencies (Katina and Unal 2015; Katina et al. 2014; Rinaldi et al. 2001; Vamanu and Masera 2006) and, by all means, consider and prevent the intentional factor. The urge to understand the intricate relationships between various entities in modern society is reflected in security policies on both sides of the Atlantic. For example, the US Department of Homeland Security noted that enhancing security and resiliency of national critical infrastructures requires ‘understanding and addressing risks from cross-sector dependencies and interdependencies …’ (USDHS 2013 p. 13). In the year, the EU adopted a new approach for the European Critical Infrastructure Protection with the aim of looking at the ‘effects of those interdependencies [that] are not limited to single countries … [this is especially the case since] critical infrastructures have a cross border dimension. In addition to interdependencies between sectors, there are also many interdependencies within the same sector but spanning a number of European countries. [such as] The European high-voltage electricity grid, composed of the interconnected national high-voltage electricity grids’ (European Commission 2013 p. 2). Complementary to the more architectural and operational-oriented issues is a concern for protection against the intentional factor and hence a requirement strongly reflected in official statements, regulatory documents, and research programs (e.g., see Ashcroft et al. 2002; EHC 1999). Protection against terrorism is a fundamental aspect in the overall Critical Infrastructure Protection. While some inherent differences on the definition, meaning, and ways to address different issues in the domain of critical infrastructures, especially on the two sides of the Atlantic (Katina and Keating 2015), transport and chemical industry hold a top position in the list. Addressing this emerging domain comes with tremendous new challenges. After all, no model-irrespective of its complexity-could had ever predicted that customer services of a mobile carrier in Great Britain would have suffered in the aftermath of the Great Tohoku Earthquake due to: the outsourcing of the services in Asia; adoption of Voice over Internet Protocol (VoIP) as communication protocol; and structural damage of several Internet submarine cables. One could argue with good reason that customer services are not the most representative aspects of critical infrastructures—and current author will tend to agree. However, this seemingly simple example illustrates the intricate and complex relationships that exist in the modern world. Moreover, these realities provide the basis for the need to think out-of-the-box when dealing with these new challenges. This posture is reflected more and more in the need for new sciences, accompanied by suitable methods, tools, and techniques that would handle challenges that we currently face and those that lie ahead. 5 The Vulnerability Issue 93 Moreover, on the understanding that the society cannot pay the costs of total protection from an economic while still abiding by the democratic principles and moral balances, identifying and prioritizing complex systems on the basis of vulnerability becomes a must for the new and emerging sciences (Apostolakis and Lemon 2005; Katina and Hester 2013). However, a question still stands: What is the vulnerability of a system? Or, stated differently: What makes a system vulnerable? The answer to this seemingly simple question is surprisingly hard to ascertain. There is a (sad) joke among researchers that says that ‘if you have 10 practitioners in one room, you will receive 15 different responses to the question of vulnerability.’ A natural consequence of this dynamics is the need for continuous efforts in the academic—as well as the sociopolitical environments—for the conceptualization, formalizing, and quantifying the notion of vulnerability. The following section introduces our approach to this issue as well as its supportive academic posture. 5.1 Definitions and Conceptualization No one accepted the definition of vulnerability. In fact, the context of the definition of notion of vulnerability appears to be driven by issues of technical, economic, social, and political security policies. This confirms the diagnosis on the current understanding that a fuzzy concept is still in need of operational quantitative expressions. Crichton (1999) provides one of the most interesting definitions since it involves risk and vulnerability: ‘Risk’ is the probability of a loss and depends on three elements: hazard, vulnerability, and exposure.’ This definition lexically introduces vulnerability as susceptibility of a system to ‘losses’ when ‘exposed’ to internal or external stress. In fact, a closer look of this definition suggests a cybernetic model, in as much as it involves the concepts of inputs, outputs, and black box for vulnerability. Figure 5.1 is drawn to represent the cybernetic model for the notion of vulnerability (Vamanu et al. 2006). Another class of models emerging from the vulnerability definitions in literature reflects a sociologic model. Mainly preferred by Scandinavian authors (e.g., Stockholm Environment Institute: http://www.sei-international.org/), this model relies on a triplet of classes: The sociological definition keeps ‘exposure’ as the main category of vulnerability, yet—by virtue of the sociology mission, places the human subjects as exposure targets at the end of the logical chain, and at the front end, the model adds threats (hazards) in the logical chain. Figure 5.2 is drawn to represent the sociological model for vulnerability (Vamanu et al. 2006). A third perspective is offered through the semantic model that proposes a tripartite relationship for defining system vulnerability (Jantsch 2005). Accordingly, vulnerability is seen as part of a relationship between threats, losses, and vulnerability. This relationship is captured in Fig. 5.3. 94 5 The Vulnerability Issue Fig. 5.1 A cybernetic model for the notion of vulnerability Fig. 5.2 A sociologic model for vulnerability Fig. 5.3 A semantic model of vulnerability The vulnerability models presented, while not exhaustive, provide insights into efforts to formalize the concept of vulnerability. In fact, current authors see these models as complementary as opposed to being contradictory. Supporting this perspective is the response to the question ‘What/who is the system in connection with the threat–exposure–subject relationship?’ Our response is ‘the system is the whole’ including: • the physical ways and means for framing motivation for threat; • the exposure channels; and • the exposure subject(s)—which according to the current understanding includes environment; critical infrastructures, and last but not least humans. 5.1 Definitions and Conceptualization 95 Lexicographic definitions of risk and vulnerability based on WordNet 1.7 Risk Vulnerability Risk Vulnerability n 1: a source of danger; ‘drinking alcohol is a health hazard’ [syn: hazard, jeopardy, peril] 2: a venture undertaken without regard to possible loss or injury; ‘he saw the rewards but not the risks of crime’; ‘there was a danger he would do the wrong thing’ [syn: peril, danger] v 1: expose to a chance of loss or damage; ‘we risked losing a lot of money în this venture’; ‘why risk your life?’ [syn: put on the line, lay on the line] 2: take a risk in the hope of a favorable outcome; ‘when you buy these stocks you are gambling’ [syn: gamble, chance, hazard, take chances, adventure, run a risk, take] n 1: the state of being vulnerable or exposed; ‘exposure to ridicule’ or ‘vulnerability to litigation’ [syn: exposure] 2: susceptibility to injury or attack [ant: invulnerability] (Webster online) Main Entry: risk Pronunciation: ‘risk’ Function: noun Etymology: French risque, from Italian risco 1: possibility of loss or injury: PERIL 2: someone or something that creates or suggests a hazard 3a: the chance of loss or the perils to the subject matter of an insurance contract also: the degree of probability of such loss b: a person or thing that is a specified hazard to an insurer <a poor risk for insurance> c: an insurance hazard from a specified cause or source <war risk> Main Entry: vul·ner·a·ble Pronunciation: ‘v&l-n(&-)r&-b&l, ‘v&l-n&r-b&l Function: adjective Etymology: Late Latin vulnerabilis, from Latin vulnerare to wound, from vulner-, vulnus wound; probably akin to Latin vellere to pluck, Greek oulE wound 1: capable of being physically wounded 2: open to attack or damage: ASSAILABLE 3: liable to increased penalties but entitled to increased bonuses after winning a game in contract bridge From this perspective, a system adaptively responds to perturbations by showing a typical stress reaction—potentially source of dysfunctions ranging from reversible operational malfunctions to reversible or irreversible structural changes— which may lead to alteration of the system’s topology and, eventually, to a total destruction (physical or operational). This perspective is an expression of a possible physiological model of vulnerability in which a system vulnerability is a threat, a predictive quantity reflecting system’s selective stress reaction toward a respective threat. An examination of the cybernetic, sociologic, semantic, and physiologic interpretations of the vulnerability, as well as those found in literature, suggests the 96 5 The Vulnerability Issue following methodological propositions and corollaries—considered to be both decent and adequate to the on-going emerging and consolidating research. Table 5.1 elaborates on the suggested propositions and corollaries at the methodological level. Table 5.1 Vulnerability-related propositions and corollaries for methodological approach Proposition/corollary Description Relevant notes Proposition 1 Risk and vulnerability are distinct notions addressing complementary realities of systems behavior: • Threats (hazards)—represent in a generic way sources or causes of potential losses, damages, and injuries • Exposure to the threats • Subject(s) of the threat The specific difference between risk and vulnerability comes from the following observations: • Risk addresses the threats (sources/causes), characterizing the consequences of their occurrence (losses/damages/injuries), the perception on the consequences (subjectivity) and the frequency (probability) of occurrence • Vulnerability addresses the subject(s) of the exposure to threats, characterizing the type and level of susceptibility, the reaction to stress or the subject’s propensity to support the exposure to the threats occurrence Due to Proposition 1, vulnerability of subjects is (has to be) read as the system’s vulnerability Due to the variety of paths (channels) of subject(s) exposure to threats, it is believed that, in order to satisfy stakeholders’ different opinions and angles of evaluation, only the adoption of an alternative set of approaches to vulnerability is adequate The three categories of threat, exposure, and subject should be seen as consubstantial with the system Proposition 2 Corollary 1 Corollary 2 5.1 Definitions and Conceptualization 97 In light of the foregone discussion, authors derive the definition of vulnerability that also represents our posture on the topic. This definition is adopted for the reminder of current discussion: Definition 1 System’s vulnerability to a threat is a predictive quantity reflecting system’s selective stress reaction toward a respective threat. 5.2 Methodological Aspects in Quantitative Vulnerability Assessment in Transport Systems Methodologically, vulnerability assessment finds itself in a defining and formalizing time (i.e., see, Musser (2002) and Bibliografie in Vamanu (2006)). The proposed approach for a quantitative vulnerability assessment takes root from thoughts and ideas in scientific literature, official documents, and statements from international and/or reference country national regulatory bodies such as the USA and the EU, as well as best practices as postulated by experiences of the current authors. Moreover, it is our intention that the vulnerability assessment models and methods would become a natural extension of risk assessment especially for those interested in hazmat transportation. Consequently, one might notice the risk-specific ideas, which have been borrowed, whenever suitable, to enhance the proposed vulnerability assessment models. The suggested methodology follows the generic ‘complex systems vulnerability assessment flow chart’ as introduced by the US Department of Energy (USDoE 2001). Figure 5.4 is developed from this flow chart and provides the methodological aspects acting as guidance in developing a transportation corridor vulnerability assessment models in the current text. Fig. 5.4 Phases of vulnerability assessment, adapted and modified from USDoE (2001) 98 5 The Vulnerability Issue 5.2.1 Transportation System Definition The ‘Transportation System’ is defined in accordance with the interpretation given in the preceding chapters with an emphasis on the statement ‘the System is the Whole.’ Thus, a transportation system is viewed consisting: • the rolling infrastructure (road and railway networks); • the transportation infrastructure (transportation fleet); • the geographical, social, economic, and political characteristics of the environment; • traffic actors; • population coming in contact with the transportation segment; • the interconnections with other systems. It is essential to recall that any of the aforementioned components may be considered as threat source, threat target, or exposure path (channel) within the current view of system–risk perspective. To illustrate, a rolling infrastructure is (i) a source of threat when taking into account that a precarious quality (e.g., a pothole or damaged tracks) could result in an increased frequency of accidents; (ii) target of the threat when subject of an attack intended to ‘harm’ the transportation segment (i.e., putting a rolling infrastructure into an inoperable state); and (iii) exposure path when it is used in an instance of moving a radioactive cargo inside a city in order to detonate it. The threats to the system are classified from the source point of view as internal and external. The threats are considered to be those actions (intentional or not) or system states that can have negative effects on targets (Krömker 2001); the sources may be or come from: • • • • • • economical environmental infrastructure political personal social. 5.2.2 Defining the System by Indicators The approach of defining the system by the characteristic indicators is adopted in a methodological phase. Accordingly, 1. a system is the expression of all its properties, expressed by indicators; and 2. an indicator is an algebraic, Boolean, or semantic variable that assigns metrics (unit and evaluation scale) to the expressed property. 5.2 Methodological Aspects in Quantitative Vulnerability Assessment … 99 Mapping the system onto the set of its characteristic indicators creates an information resource that goes beyond the needs of risk and vulnerability assessment. In the final analysis, any information about the system can be derived from only that information resource. The ultimate goal of having the set of indicators containing ‘everything about the system’ is not a reasonable expectation. Moreover, in practice, this may prove counterproductive since it would lead to excessively lengthen the assessment oriented toward clear-cut objectives: including efficiency, security, risk, and vulnerability. As a direct consequence, providing (identifying) the proper, well-defined set of indicator characteristic/representative for a given system becomes a key issue involving a great deal of responsibility—both from the technological and from the deontological viewpoints. Therefore, the set of indicators should hold ‘everything, in as much as feasible possible, about the system that is relevant to a given assessment target.’ In recent times, indicators have been used within social planning area for assessing—in the most cases—the disruptive events that may have environmental negative effects. In such a context, an indicator can be defined as an event, expression, or tool which characterizes a phenomenon. Identification and assessment of events occurring in systems with high level of complexity can be straightforwardly done using indicators, under a proper choice of representative parameters (Boverket 2007). The use of indicators also makes possible the identification and definition of requests and goals or program and action planning regarding a specific system or activity. Defining the systems by indicators is a common method in the vulnerability assessment of complex systems (Brooks et al. 2005; Krömker 2001). Therefore, the analytical building of the generic Transportation System comes down to defining the relevant indicators set. The indicators should be chosen in accordance with the reference requirements. These requirements include: • • • • the the the the indicator indicator indicator indicator must must must must be be be be quantifiable; relevant to the process/phenomenon being address; relevant to the final goal of the assessment; convenient in regard to geographical and time scales. It has also been suggested that vulnerability of a road transportation system should be given in terms of susceptibility to incidents that may lead in considerable reduction in road network serviceability (Berdica 2002). The same author also introduces reliability for describing adequate serviceability under the operating conditions encountered at a given time. The validity of this approach is more obvious in the case of railway transportation systems. However, in the current methodological phases, authors will assume that there are two contributors to the vulnerability of the transportation system: (1) internal vulnerability and external vulnerability factors. Internal vulnerability is given by the intrinsic characteristics of the system such as the rolling infrastructure, the transportation fleet, and geographic characteristics. The external vulnerability comes from the interactions of the transportation system to other systems including but not 100 5 The Vulnerability Issue limited to medical system, emergency response system, population, market, and stock exchange markets. The contributors should not be seen as disjoint entities, but rather as interacting and influencing each other—which enables the consideration of dependencies and interdependencies. The indicators set must be defined so as to reflect these dynamics. This approach is highly recommended and is found in literature (Kaly et al. 2003) and applied in regulatory recommendations and normative documents on risks and vulnerabilities in the chemical industry sector (European Commission 1996a, b, c). Indicators also have to define and meet the following requirements (Childs et al. 2000; European Commission 1996a, b, c; Papadakis and Amendola 1997): • to characterize the system operational environment, including information as geographical position, meteorological, hydrological, geological data … and, when necessary, historical; • to reflect the potential sources of risk; • to be capable of reflecting the areas of a high risk of occurrence of disruptive events; • to reflect the interaction with the other connected systems, including ‘services’; • to take into account the relevance radius—the impact radius (i.e., distance up to which an event spreads its effect) of a potential emergency involving hazardous materials; • to take into account the rolling infrastructure and its quality; • to take into account the population coming in contact with the transportation system (potentially exposed to a disruptive event); • to take into account the emergency response capability. 5.2.3 The Vulnerability Assessment of Transportation System Starting from the previous definition, the following approach is adopted for vulnerability assessment of transportation systems: 1. Describe the transportation system by indicators. The indicators are identified and analytically defined in such a manner as to (i) satisfy the generic requirements of defining indicators, (ii) characterize (express) the constituent components of the transportation system as suggested in Chap. 4, and (iii) reflect, as realistically as feasible, the operations and operability of the transportation system within the context of a system of systems—a system interacting with other systems. 2. The transportation segment (i.e., the route of interest) is divided into measurement points. 5.2 Methodological Aspects in Quantitative Vulnerability Assessment … 101 3. Vulnerability is assessed at every measurement point, taking into account the particular spatial and environmental characteristics. 4. After ‘running through’ and assessing the whole transportation segment, one gets the segment’s vulnerability profile. 5. The segment’s Vulnerability Index is then computed from the vulnerability profile. 6. The vulnerability indices of the transportation segments are contributors to the Vulnerability Index of the Transportation System. 7. Vulnerability of a given system at a measurement point is assessed by taking into account the operational environment of the system. In a neighborhood, this is described by a circular area centered on the measurement point and having a radius equal to the relevance radius (Rrel). The relevance radius is the distance up to which an event involving hazardous materials extends its effect and is either computed by (i) performing procedures for LOC consequence assessment or (ii) obtained from statistics or using expert judgment. 8. The approach is adopted, by analogy and with risk deontology— As Resilient As Society Permits (ARASP) concept (Gheorghe and Vamanu 2006a, b); this permits the analyst to define the acceptability levels for vulnerability according to his perception, belief system, and or objectives. Thus, System Vulnerability Index places the system in one of the three acceptability basins: (1) minimal, (2) acceptable, or (3) unacceptable vulnerability. Notice that, with respect to the analyst or preferences of the stakeholder, defined in terms of perception, interest, etc., the same transportation system may be placed in different acceptability basins. All proposed models share several quantities. These shared quantities are presented in Table 5.2. The current authors suggest that the proposed approach offers several advantages. These advantages including: • The approach is suitable for optimal routing selection by comparative assessment of different transportation options. • It allows the identification of the sensitive sections of a transportation segment. • It ensures prioritization targeting for the vulnerability mitigation. • It favors a sound definition and development strategies in the context of sustainability and viability for rolling infrastructure, communities, and industrial and agricultural sectors • It favors security ensuring decision-making processes. • It contributes to the improvement of emergency response systems. • The approach incorporates viewpoints of different stakeholders and therefore favors cost minimization. • It provides the capability for assessment at different level of detail—incorporation of different measures. The presented vulnerability assessment expresses the purpose of expanding the horizon of risk assessment to include the influence of the other interconnected 102 5 The Vulnerability Issue Table 5.2 Proposed shared quantities among models for transportation of dangerous goods Quantity Description Rrel Relevance radius. When using more than one relevance radii as in the instance when considering a relevance radius for each potential physical effect of loss of ðiÞ containment, Rrel shall be written Rrel sau RðiÞ rel effect hi D(P1, P2) Measurement point elevation The geographical distance (measured on great circle) between locations P1 and P2; the locations are given by their geographical coordinates (longitude, latitude) The distance between the measurement point and the closest town (populated place) Number of towns within the relevance radius The average radius of a town; in most cases, the towns (populated places) are provided as point features of a GIS layer. In the proposed models, a town is assumed as covering a Rtown circular area. Obviously, if a detailed GIS is available, characteristic town data should be used The distance between the measurement point and the closest city Number of cities within the relevance radius The distance between the measurement point and the closest river The distance between the measurement point and the closest water body (including lakes) The number of water bodies within the relevance radius The number of rivers within the relevance radius The distance between the measurement point and the closest airport The number of airports within the relevance radius The distance between the measurement point and the closest high-voltage line The number of high-voltage lines within the relevance radius The number of high-voltage lines crossed by the road/track segment between the current and previous measurement points Vegetation at measurement point Boolean variable; True if the measurement point inside a potentially floodable area The type of the rolling infrastructure The quality of the rolling infrastructure The seismical risk at the measurement point The number of bridges crossed by the road/track segment between the current and previous measurement points dtown Ntown Rtown dcity Ncities driver dwb Nwb Nrivers daip Naip dHV NHV NHV_crossed Veg Flood Rtt Rtq Eq Nbridges systems, as well as components from non-physical systems (Nagel and Rasmussen 1994). The proposed approach should be seen as taking distance to the assessed system/process in order to get a synoptic view of a playground, as seen from the perspective of an actor. Purposefully, this research took three quantitative vulnerability assessment methods and presented them in the sequel to: (1) point out ways to approach the issue of vulnerability in complex systems, (2) illustrate a possible approach to 5.2 Methodological Aspects in Quantitative Vulnerability Assessment … 103 vulnerability assessment for transportation systems, and (3) offer a glimpse to readers into how conceptual considerations can be translated into analytical and numerical models. The selected methods are based on the Index and Matrix Models which have an origination in the Scandinavian School (Nilsson et al. 2001) and the generic model of Quantitative Vulnerability Analysis (QVA) which addresses structural vulnerability (Gheorghe and Vamanu 2004). In the following chapters, the description of the aforementioned models and methods are presented, first in a generic form and then adapted and implemented for transportation system vulnerability assessment. References Apostolakis, G. E., & Lemon, D. M. (2005). A screening methodology for the identification and ranking of infrastructure vulnerabilities due to terrorism. Risk Analysis, 25(2), 361–376. Ashcroft, J., Daniels, D. J., & Hart, S. V. (2002). A method to assess the vulnerability of U.S. chemical facilities: NIJ final report (p. 33). Washington, DC: U.S. Department of Justice. Retrieved from http://www.cdc.gov/niosh/topics/emres/pdfs/DOJ-secure.pdf Berdica, K. (2002). An introduction to road vulnerability: What has been done, is done and should be done. Transport Policy, 9(2), 117–127. Boverket. (2007). Bostadspolitiken: Svensk politik för boende, planering och byggande under 130 år. 1. uppl. Karlskrona, Sweden: Boverket. Brooks, N., Neil Adger, W., & Mick Kelly, P. (2005). The determinants of vulnerability and adaptive capacity at the national level and the implications for adaptation. Global Environmental Change, 15(2), 151–163. http://doi.org/10.1016/j.gloenvcha.2004.12.006 Childs, I. R., Carlisle, R. D., & Hastings, P. A. (2000). The Brisbane-Gladstone transport corridor: Identification of risk and vulnerability for the bulk transport of dangerous goods. The Australian Journal of Emergency Management, 15(4), 54. Crichton, D. (1999). The risk triangle. In J. Ingleton (Ed.), Natural disaster management (pp. 102– 103). London, UK: Tudor Rose. de Weck, O. L., Roos, D., & Magee, C. L. (2011). Engineering systems: Meeting human needs in a complex technological world. Cambridge, MA: MIT Press. EHC. (1999). Guides to chemical risk management: New ways to prevent chemical accidents (No. EPA 550-B-99-012) (p. 12). Washington, DC: Environmental Health Center. Retrieved from http://www2.epa.gov/sites/production/files/2013-11/documents/incident.pdf European Commission. (1996a). Annex III: Principles referred to in article 7 and information referred to in article 9 on the management system and the organization of the establishment with a view to the prevention of major accidents. Retrieved from http://www.sipe-rtd.info/ directive/annex-iii-principles-referred-article-7-and-information-referred-article-9management-syst European Commission. (1996b). Annex II: Minimum data and information to be considered in the safety report specified in article 9 of council directive 96/82/EC, on the control of major accident hazards involving dangerous substances (1996). Retrieved from http://eur-lex.europa. eu/legal-content/EN/TXT/?uri=CELEX:31996L0082 European Commission. (1996c) Article 9: Safety report of council directive 96/82/EC, on the control of major-accident hazards involving dangerous substances (1996). Retrieved from http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:31996L0082 European Commission. (2013). Commission Staff Working Document on a new approach to the European Programme for Critical Infrastructure Protection: Making European Critical Infrastructures more secure (No. SWD(2013) 318 final). Brussels, Belgium: Commission of 104 5 The Vulnerability Issue the European Communities. Retrieved from http://ec.europa.eu/dgs/home-affairs/what-we-do/ policies/crisis-and-terrorism/critical-infrastructure/docs/swd_2013_318_on_epcip_en.pdf Gheorghe, A. V., & Katina, P. F. (2014). Editorial: Resiliency and engineering systems—Research trends and challenges. International Journal of Critical Infrastructures, 10(3/4), 193–199. Gheorghe, A. V., Masera, M., & Katina, P. F. (Eds.). (2014). Infranomics: Sustainability, engineering design and governance (Vol. 24). Geneva, Switzerland: Springer International Publishing. Gheorghe, A. V., & Vamanu, D. V. (2004). Towards QVA – Quantitative Vulnerability Assessment: A generic practical model. Journal of Risk Research, 7(6), 613–628. http://doi. org/10.1080/1366987042000192219 Gheorghe, A. V., & Vamanu, B. I. (2006a). Risk and vulnerability of transport critical infrastructure: A system of system engineering solution. In 4th EAPC/PfP Workshop on Critical Infrastructure Protection and Civil Emergency Planning: Building Bridges between Stakeholders to Mitigate Disasters. Zurich, Switzerland. Gheorghe, A. V., & Vamanu, D. V. (2006b). Vulnerability assessment of complex interdependent critical infrastructures. In Presented at the International Conference on Complex Systems, Boston, MA. Gibson, J. E., Scherer, W. T., & Gibson, W. F. (2007). How to do systems analysis. Hoboken, NJ: Wiley-Interscience. Jantsch, S. (2005). Introduction on interdependencies and vulnerabilities in the transportation sector. In Presented at the 3rd EAPC/PfP Workshop on Critical Infrastructure Protection and Civil Emergency Planning, Zurich, Switzerland. Kaly, U., Pratt, C., Mitchell, J., & Howorth, R. (2003). The demonstration environmental vulnerability index (EVI). (No. SOPAC Technical Report 356) (p. 137). Suva, Fiji Islands: South Pacific Applied Geoscience Commission. Retrieved from www.pacificdisaster.net/ pdnadmin/data/original/SOPAC_2003_TR0356.pdf Katina, P. F., & Hester, P. T. (2013). Systemic determination of infrastructure criticality. International Journal of Critical Infrastructures, 9(3), 211–225. Katina, P. F., & Keating, C. B. (2015). Critical infrastructures: A perspective from systems of systems. International Journal of Critical Infrastructures, 11(4), 316–344. Katina, P. F., Pinto, C. A., Bradley, J. M., & Hester, P. T. (2014). Interdependency-induced risk with applications to healthcare. International Journal of Critical Infrastructure Protection, 7 (1), 12–26. Katina, P. F., & Unal, R. (2015). Application of fuzzy sets in decision analysis for prioritising critical energy infrastructures. International Journal of Decision Sciences, Risk and Management, 6(1), 1–15. http://doi.org/10.1504/IJDSRM.2015.072762 Krömker, D. (2001). First steps towards a new vulnerability index (p. 19). Kassel, Hesse, Germany: University of Kassel. Musser, L. (2002). Vulnerability bibliography (p. 23). Boulder, CO: Center for Science and Technology Policy Research: University of Colorado-Boulder. Nagel, K., & Rasmussen, S. (1994). Traffic at the edge of chaos. In R. A. Brooks & P. Maes (Eds.), Artificial life IV (pp. 222–230). Cambridge, MA: MIT Press. Nilsson, J., Magnusson, S., Hallin, P., & Lenntorp, B. (2001). Models for vulnerability auditing and distribution of governmental economical means at the local authority level. Lund, Sweden: LUCRAM: Lund University Centre for Risk Analysis and Management. Papadakis, G. A., & Amendola, A. (Eds.). (1997). Guidance on the preparation of a safety report to meet the requirements of council directive 96/82/EC (Seveso II). Luxembourg City, Luxembourg: EC: Joint Research Centre. Rinaldi, S. M., Peerenboom, J. P., & Kelly, T. K. (2001). Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems, 21(6), 11–25. http:// doi.org/10.1109/37.969131 Shi, P., & Jaeger, C. (2010). The IRG-project science plan. Potsdam/Beijing: International Human Dimensions Programme on Global Environmental Change. References 105 Tokgoz, B. E. (2012). Probabilistic resilience quantification and visualization building performance to hurricane wind speeds (Ph.D.). Old Dominion University, Virginia, United States. USDHS. (2013). NIPP 2013: Partnering for critical infrastructure security and resilience. Washington, DC: U.S. Department of Homeland Security. Retrieved from www.dhs.gov/ xlibrary/assets/nipp-ssp-national-monuments-icons.pdf USDoE. (2001). Vulnerability assessment and survey program: Overview of assessment methodology (p. 15). Washington, DC: U.S. Department of Energy—Office of Energy Assurance. Retrieved from https://hsdl.org/?view&doc=140176&coll=limited Vamanu, B. I. (2006). Managementul riscurilor privind transportul substanţelor periculoase: aplicaţii ale sistemelor dinamice complexe (Dissertation). Universitatea Politehnica Bucureşti, Facultatea de Chimie Aplicată şi Ştiinţa Materialelor, Catedra de Inginerie Economică, Bucureşti. Vamanu, B., & Masera, M. (2006). Vulnerability of networked infrastructures: Anomalies, errors, interdependencies. In CRIS, Third International Conference on Critical Infrastructures. Alexandria, VA. Vamanu, D. V., Vamanu, B. I., & Acasandrei, V. (2006). Modele şi metode avansate în studiul migratiei nuclizilor în mediu, vulnerabilităţii ecosistemelor şi infrastructurilor critice, şi impactului eco-sanitar al activităţilor nucleare şi industriale (No. PC-D11-PT00-325). Bucureşti, Romania: Institutul Naţional de Fizică şi Inginerie Nucleară “Horia Hulubei”. Chapter 6 Consensus-Driven Models for QVA in Transportation Corridors Abstract In this chapter, two consensus-driven methods, the Index Method, and the Relevance Matrices Method, for quantitative assessment of vulnerability in transportation systems, are discussed. These methods are derived from Nilsson, Magnusson, Hallin, and Lenntorp’s work: Models for vulnerability auditing and distribution of governmental economical means at the local authority level (Nilsson et al. in Models for vulnerability auditing and distribution of governmental economical means at the local authority level. Lund University Centre for Risk Analysis and Management (LUCRAM), Lund, Sweden, 2001). 6.1 The Index Method This model targets assessment of the vulnerability level, described by Vulnerability Index, based on a set of quantifiable and measurable parameters describing the authority (management) efficiency. The model draws upon the following logic: • The concept of vulnerability has a direct relationship with the notion of ‘failure’ to comply with the adopted ‘policy.’ • The Policy Compliance Index is obtained as a weighted sum of instrumental indicators/parameters attached to the instrumental monitors. • The instrumental indicator values are obtained either by ‘direct democracy’ means (e.g., public consultation, polls, Delphi polls, expert auditing) or analytical methods. • The weights pondering instrumental indicators contribution to the Policy Compliance Index are computed from relevance indices of (1) the strategies to the policies, (2) partial objectives to strategies, and (3) instrumental indicators to partial objectives. These are provided in a form of matrix. • The vulnerability index of a system of interest, with respect to complying level of the adopted policy, is computed based on the relevance weights of the instrumental indicators and the instrumental indicators themselves. © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6_6 107 108 6 Consensus-Driven Models for QVA in Transportation Corridors Table 6.1 Five hierarchical levels of indicators for vulnerability Level Description Level 1—Final Goal Level 2—Strategic Authorities (system management) adopted policy Contains the targets that must be reached in order to reach the final goal (i.e., long-term strategic goals) Holds the actions that should be performed to reach the objectives at the strategic level. Each strategic target includes a number of operative partial targets. When combined, these reflect the level up to which the strategic targets are reached Indicators at this level are referred to as base indicators. These are the parameters which, together, define the level of compliance of the partial operational objectives The instrumental parameters must be provided with numerical values. The possible sublevels of the operational level contain parameters used for the computation of the base indicators Level 3—Operational Level 4—Instrumental Level > 4 6.1.1 Designing the System The system is described by indicators. These indicators are classified into categories and placed on corresponding hierarchical levels. The parameters at a level are connected with the parameters at the upper level, based on relevance criteria. The Vulnerability Index is computed in consideration of the value of the topmost indicator. The number of levels may vary depending on the complexity of the system of interest. However, there are five minimum required numbers of levels. Table 6.1 provides a description of the minimum required number of levels. 6.1.2 The Risk-Management Capability Index and Weights Computation As mentioned before, the target of this method determines the vulnerability of a system as an expression of the system capability of mitigating or managing risks. For system described above, risk-management capability index, I, is computed as: I¼ np X Wi Xi ð6:1Þ i¼1 with Wi the computed weights of the instrumental parameters (the method is described later in this chapter) 6.1 The Index Method Xi np 109 the numerical values (0, …, 5) of the instrumental parameters Pi number of instrumental parameters/indices. 6.1.2.1 Weights Computation One should notice that the parameters from the instrumental level have different importance (relevance) in complying with the partial objectives described by the operational indicators. Additionally, the contribution of the operational indicators to each of the strategic goals is different and, in turn, the strategic objectives differently contribute to the success of the long-term policy. In other words, the intermediate weights should be defined in order to get the final weights vector, Wi, which directly link system parameters to the risk-management capability index. The intermediate weights characterize the connections between each element at a specific level and all the elements from the lower level. In subsequent sections, the intermediate weights are referred to as level weights. Keeping this information in mind along with the consideration of Eq. (6.1), the following two arise: computing the level weights and computing the final weights vector Wi. 6.1.2.2 Computing the Level Weights There are several ways that could be used to determine level weights. In this research, authors consider an approach suggested by Nilsson et al. (2001)—The Delphi polls (Kerr 2001). Perhaps the most challenging questions for panel members in the Delphi poll approach are in the form: Given an operative target Om, (m = 1, …, no, with no— number of operative targets) and a number of npi instrumental parameters, how would you weight these parameters on a 0–5 scale knowing that Om is defined as: Om ¼ cm;1 p1 þ cm;2 p2 þ cm;3 p3 þ . . .cm;npi pnpi ð6:2Þ with ci,j the level weights; i = 1, … no; j = 1, …, np. pj parameters; j = 1, …, np. Consequently, in order to obtain level weights, one must apply the above process starting from the system bottom levels while moving toward the topmost levels. 110 6 Consensus-Driven Models for QVA in Transportation Corridors 6.1.2.3 Computing the Final Weights The following describes how the final weights vector is determined starting from the intermediate weights. The algorithm is characteristic for the 4 levels in a system of interest. However, in the case of additional levels, the procedures remain the same. The Delphi poll results are: (i) the intermediate weights between the instrumental and operational levels (C) 5 P c1;1 p1 þ c1;2 p2 þ c1;3 p3 þ c1;4 p4 þ c1;5 p5 ¼ c1;i pi ¼ O1 i¼1 5 P c13;1 p1 þ c13;2 p2 þ c13;3 p3 þ c13;4 p4 þ c13;5 p5 ¼ c13;i pi ¼ O13 i¼1 5 P c17;1 p1 þ c17;2 p2 þ c17;3 p3 þ c17;4 p4 þ c17;5 p5 ¼ c17;i pi ¼ O17 ð6:3Þ i¼1 or, in the matrix form: 0 1 1 p1 1 0 c1;1 . . . . . . . . . c1;5 O1 B p2 C C B C B . C B ... ... ... C B p3 C ¼ @ . A B . A B C @ ... ... ... @ p4 A O17 c17;1 . . . . . . . . . c17;5 p5 0 ð6:4Þ or, in the short form: O¼CP ð6:5Þ (ii) the intermediate weights between the operational and strategic levels (D) S1 ¼ 17 X d1;i Oi i¼1 S2 ¼ 17 X d2;i Oi i¼1 S3 ¼ 17 X i¼1 d3;i Oi 6.1 The Index Method 111 or S¼DO with 0 1 d1;1 . . . . . . . . . d1;17 A ... ... ... D¼@ d3;1 . . . . . . . . . d3;17 From the above, one gets: O¼CP S¼DO ð6:6Þ I ¼ES Considering the previous results, the risk-management capability index is obtained as: I ¼ E S ¼ E D O ¼ E D C P ¼ WP ð6:7Þ with W ¼ E D Cbeing the final weights vector w ¼ ðW1 ; W2 ; W3 ; W4 ; W5 Þ The symbolic equation of computing the final weights is given in Fig. 6.1. 6.1.2.4 Assessment Results: The Vulnerability Index The final weights Wi are normalized to 1 in order to get a relevant result in terms of comparative vulnerability assessment as well as a qualitative information on the system vulnerability. This is done in accordance with Eq. (6.8). Fig. 6.1 Final weights vector computation symbolic equation 112 6 Consensus-Driven Models for QVA in Transportation Corridors np X wi ¼ 1 ð6:8Þ i¼1 from: I¼ np X wi X1 ¼ 1 ð6:9Þ i¼1 I¼ np X wi ¼ 1 i¼1 0 Xi 5 one gets 0I 5 The System’s Vulnerability Index (V) is defined with respect to the risk-management capability index as indicated in Gheorghe and Vamanu (2003): I V ¼ 100 1 5 ð6:10Þ Notice that from Eq. (6.10), the system’s vulnerability is defined over a scale of 0 to 100 with V ¼ 0 corresponding to a non-vulnerable system. V ¼ 100 expresses system in a totally vulnerable state. 6.1.3 The Index Method: Transportation Corridor Vulnerability Assessment This section contains a model intended to indicate the feasibility of applying the Index Method in the field of hazmat transportation. The natural compatibility between the generic model described above and the general problematique situation of vulnerability of transportation systems is thought as being evident. The suggested model is driven by the following assumptions: • The Transportation Corridor (Segment) is characterized at every measurement point by temporal, spatial, political, and social aspects of the vicinity of the transportation segment which is a closed operation environment. These features named as location features and they characterize the assessment point. • The Transportation System is analytically defined by indicators and the interactions between the indicators. 6.1 The Index Method 113 Table 6.2 Elements of the proposed model Elements Description of elements The organizer The object The goal National Transportation Authority Vulnerability assessment of a transportation system (i) Determining the level of capability in managing the risks induced by a transportation activity (ii) Identifying and gathering relevant data for short-term policy making in transportation sector. The objective is to optimize the national capabilities in terms of (a) business, (b) safety, and (c) emergency planning and response • The input values (Xi) of the instrumental parameters (Pi) are computed function of the location features. • The level weights (Ci,j) between the operational and instrumental levels reflect the logical relationships between the instrumental and operational indicators and are considered constant during the assessment. Let us denote Xi ð Þ as the function returning the value of the instrumental parameter Xi. The model is developed in consideration of the Organizer, the Object, and the Goal. Table 6.2 elaborates on the description of Organizer, Object, and Goal. 6.1.3.1 System Description by Indicators and Classification Structure The indicators have been chosen in accordance with the basic principles of the transportation systems vulnerability assessment as indicated in Sect. 5.2.3. The indicators are classified based on four levels: Final Goal, Strategic, Operational, and Instrumental. The Final Goal is Optimizing the transportation system from the vulnerability viewpoint. This model assumes that the vulnerability of the transportation system is given by social, ecological, and economic factors. These are reflected at the Strategic level and are indicated in terms of: S1 S2 S3 S4 S5 S6 Providing consumer supply and traffic fluency; Emergency prevention; Providing the emergency response management capabilities; Secure the transportation activity from the FINANCIAL viewpoint; Secure the transportation activity from the CITIZEN viewpoint; Secure the transportation activity from the ENVIRONMENTAL viewpoint. Notice that S1–S6 also correspond to the three targets of the assessment, namely business, safety, and emergency. 114 6 Consensus-Driven Models for QVA in Transportation Corridors The Operational Level has 19 indicators: O1 O2 O3 O4 O5 O6 O7 O8 O9 O10 O11 O12 O13 O14 O15 O16 O17 O18 O19 Providing intelligent traffic control and guidance systems; Ensuring roads/railways quality; Residential areas avoidance; Providing theft/robbery protection (physical and/or financial); Ensuring the quality of the transportation vectors (lorry, train, etc.); Ensuring the intervention capability of the emergency teams; Ensuring the intervention capability of the medical personnel; Ensuring the intervention capability of the firefighters; Providing evacuation routes; Providing the intervention routes; Highly populated areas avoidance; Flood prone areas avoidance; School/kindergarten areas avoidance; Public institutions area avoidance; Highly industrialized areas avoidance; High seismic risk area avoidance; Providing ‘unstressful’ routes; High accident risk areas avoidance; Consequence minimization in the case of accident. Similar to strategic objectives, the range of O1–O19 expresses indicators which affect the performance at each of the operational levels and are related to least one strategic objective. The Instrumental level has 26 indicators. The indicators at this level are the input data source of the model. The indicators have been defined in such a manner as to allow a numerical value being computed based on publicly available data as indicated Appendix C or in Vamanu (2006). The 26 indicators at this level are: P1 P2 P3 P4 P5 P6 P7 P8 P9 P10 P11 P12 P13 Periodic checking, control, and maintenance procedures (road/railway quality); Periodic checking, control, and maintenance procedures (hazmat transportation vectors quality); Assessing and following the urban development dynamics; Instruction, formation, and periodical verification of personnel (emergency teams) Instruction, formation, and periodical verification of personnel (medical); Instruction, formation, and periodical verification of personnel (firefighters); Public information and instruction; Periodical emergency exercises; Safety-culture; Distance toward the closest town; Number of towns within the relevance area; Distance toward the closest city; Number of cities within the relevance area; 6.1 The Index Method P14 P15 P16 P17 P18 P19 P20 P21 P22 P23 P24 P25 P26 115 Rolling infrastructure type (road, railway, details); Floodable area; Vegetation; Distance toward the closest water body (river, lake, etc.); Presence of auxiliary routes; Transportation segment type (urban/extraurban); The presence of traffic control and surveillance systems; Rolling infrastructure quality The distance toward the closest airport; Number of airports within the relevance area; Segment’s slope; Seismic risk level at the current location; ‘Sensitive’ objects at the current location. On the Selection of the Indicators A close examination of each of the indicators above, it is easy to surmise these indicators follow a ‘natural’ logic. However, there might exist cases in which more detail on the logic of indicator selection is need. Specifically, a first glance at P4, P5, and P6 suggests that the three indicators refer to the same indicator (i.e., Instruction, formation, and periodical verification of personnel). However, the difference is articulated in the reference target (i.e., medical, firefighters, emergency, and intervention personnel, respectively). This is an example of a typical situation in which sublevels are needed. This situation could be represented as T and containing the three aforementioned indicators. The T indicators would be in this case the parameters for a single value of one of the P level indicators reflecting Instruction, formation, and periodical verification of personnel. Following the same reasoning, the value of each of the T level indicators may be computed from three other indicators (Instruction Level, Formation Level, Verification Level) placed on a sublevel U of the T level. The rationale behind the current approach is (i) keeping a relatively small complexity of the system and (ii) preserving the same four-level structure of the system, as in the generic model, and subscribing to systems theoretic principle of recursion (Clemson 1984; Hester and Adams 2014). In literature, safety-culture addresses the attitude within an organization toward achieving the duties associated with security. Initially introduced in the nuclear realm after the Cernobil accident, the notion typically refers to ethics, value, and attitude of individual members within a given system (i.e., organization). In the present case, P22 reflects the same notion as transposed to the case of a hazmat transportation situation. An equivalent though in terms of risk assessment could be described as: an accident may occur in case of an improperly loaded cargo, due to the low level of ‘safety-culture’ within the shipping company. A final indicator of interest is O17. Providing ‘unstressful’ routes. This indicator contributes to the transportation system vulnerability component induced by the 116 6 Consensus-Driven Models for QVA in Transportation Corridors driver (traffic participants) behavior in traffic. The interest here is to ensure that proper attention is paid towards the psychological aspects of participants in traffic. O17 is an important variable; previous researches involving psychology, statistics, and surveys have suggested that factors like quality of the rolling infrastructure, traffic density, meteorological conditions or too many traffic surveillance and restrictions directly influence the actions and behaviors of people in traffic (e.g. Barjonet 2001). In short, it can be considered that stress leads to anxiety, lack of attention, and the decrease of the overall driver’s physiological performances which, in turn, could be a source of an accident. 6.1.3.2 Transportation System Vulnerability Assessment A reminder is necessary. The value of each indicator at a given level is dependent on at least one indicator from the previous level. In other words, achieving an objective at one level depends, to a certain degree, on achieving one or more objectives on the previous level. Figure 6.2 attempts to capture this logic (linkage) between levels of a system of interest. Computation of the Instrumental Parameters The list below enumerates only the input values (Xi) of the instrumental parameters (Pi) whose computation relies on the particular location along the transportation segment (i.e. the measurement point). For each of these, the computation assumptions together with the accompanying equation is provided. All the other (e.g. X1 – X9) are assumed as constant and given from statistics / expert judgement. X10 = distance to the closest town Fig. 6.2 Logic and relationship between system indicators 6.1 The Index Method 117 Computed by linear interpolation, as a function of Rrel, Rtown, and dtown. ( X10 ðRrel ; Rtown ; dtown Þ ¼ 0 5; for dtown [ d dtown d 00 5 ; for dtown d 0 d0 ð6:11Þ with d′ = Rrel + Rtown d″ = min(Rrel + Rtown). Variables d′ and d″ are introduced to take into account the case when Rtown < Rrel. Thus, by using Eq. (6.11), one gets X1 = 0 (worst-case) even though dtown > 0 (the whole town is inside Rrel). X11—towns within Rrel X11 ðNtown Þ ¼ ct ð6:12Þ X12—distance to the closest city Computed by linear interpolation, as a function of Rreland dtown. ( X12 Rrel ; dcity ¼ 5; 5 dcity Rrel for dcity [ Rrel ; for dcity Rrel ð6:13Þ X13—cities within Rrel X13 ðNcities Þ ¼ ct ð6:14Þ X14—The rolling infrastructure type Constant, depending on the rolling infrastructure characteristics (e.g., singleversus double-lined street, highway, etc.). X14 ðRtt Þ ¼ ct ð6:15Þ X16—Vegetation Constant, depending on the vegetation at the measurement point. X16 ðVegÞ ¼ ct ð6:16Þ X17—distance to an important water (creek, river, lake, etc. ) Computed by linear interpolation, as a function of Rrel, driverand dwater. ( X17 ðRrel ; driver ; dwater Þ ¼ 5; ;driver Þ 5 minðdwater ; Rrel for minðdwater ; driver Þ [ Rrel for minðdwater ; driver Þ Rrel ð6:17Þ 118 6 Consensus-Driven Models for QVA in Transportation Corridors X19—Transportation segment type (urban/extra) X9 dcity ; dtown ¼ ct ð6:18Þ P19 = X19 reflects the vulnerability component induced by the possibility of occurrence of pedestrian-involving accidents. Hence, the value of X19 must be chosen in manner that reflects a more vulnerable situation when the measurement point is inside an urban area. X19 dcity ; dtown ; Rtt ¼ ct ð6:19Þ X20—Presence of the traffic surveillance and control systems X20 must reflect a higher vulnerability in a situation in which traffic surveillance and control systems (cameras, radars, traffic signs, traffic lights, etc.) are fewer. X22—distance to the closest airport Computed by linear interpolation, as a function of Rrel and daip. ( X22 Rrel ; daip ¼ 5; 5 daip Rrel for daip [ Rrel ; for daip Rrel ð6:20Þ X23—Airports within the Rrel X23 Naip ¼ ct ð6:21Þ hcp hcp1 X24 hpc ; hpc1 ¼ D Pcp ; Pcp1 ð6:22Þ X24—The segment slope with Pcp Pcp−1 hcp, hcp−1 current measurement point (location) previous measurement point (location) elevations at the current and previous measurement points, respectively D(Pcp, Pcp−1) the distance between the previous and the current measurement points (in fact, the assessment resolution). X25—Seismic risk at the current location X25 ðEqÞ ¼ 5 X26—‘Sensitive’ objects at current location. Eq 2 ð6:23Þ 6.1 The Index Method 119 In this model, the following ‘sensitive objects’ are taken into account: the bridges, the crossings between the transportation segment and the high-voltage lines, cities and towns passing-through, and the vegetation type. X26 Nbridges ; NHV ; Veg; dcity ; dtown ! 1 w01 g0 Nbridges þ w02 g0 ðNHV Þ ¼5 þ w03 g0 ðVegÞ þ w04 g0 dcity þ w05 g0 ðdtown Þ ð6:24Þ with g′ defined as: g0 : ½0; 1 ! R; and: 8 1 < 5Nbridges ; for Nbridges \5 g0 Nbridges ¼ 1; for Nbridges 5 : 0; for Nbridges ¼ 0 8 < 3N1 HV ; for NHV \3 0 g ðNHV Þ ¼ 1; for NHV 3 : 0; for NHV ¼ 0 g0 dcity ¼ g0 ðdtown Þ ¼ g0 ðVegÞ ¼ 1; for measurement point inside a city, 0; otherwise: 1; for measurement point inside a town, 0; otherwise: 1; for measurement point inside a forest area; 0; otherwise: and w0i¼1...5 are the respective relevance weights of each g′. In this model, X1,…,9,15,18,21 are considered as being given by expert judgment (i.e., using Delphi polls). Naturally, in a more complex models, (some of) the values of X1,…,9,15,18,21 may also be obtained either analytically or by extending the indicator levels of the system of interest. At the same time, other indicators may prove valuable when considering international transportations. Values of those indicators may depend for instance by elements as the National Gross Product or the GEM-E3 model’s Country Index as indicated in Ciscar et al. (2004). 120 6.2 6 Consensus-Driven Models for QVA in Transportation Corridors The Relevance Matrices Method An alternative procedure for assessing vulnerability in each measurement point of a transportation corridor is The Matrix Method. As previously stated, this method originates from Nilsson et al. (2001) research which addresses municipal management. Yet, the same scheme, as it will be shown, is also suitable assessing vulnerability of the transportation corridors. Originating from the same school of thought as the Index method, the Matrix Method derives a ‘robustness index’ of an assessed system by consensus-driven quantification of the risks, the system is prone to, and risk-management capability, of the system managerial staff. The System Vulnerability/Robustness is assessed against on a set of acceptability criteria defined by upper and lower thresholds. Vulnerability is given (rendered) in a space defined by the risk (Ox) and the risk-management (mitigation) capability (Oy). Three acceptability basins are defined within this space as unacceptable, tolerance, and acceptable. Figure 6.3 illustrates x–y plan for Ox and Oy along with the three basins of vulnerability. The system is characterized by three indices: I1—reflecting the maximum level of risk (threat) the system is exposed to; I2—the current risk level of the system; and I3—the current level of risk mitigation capabilities. Furthermore, I2/I1 reflects the relative risk level the system is exposed to; I2/I1 is the quality of the risk-management (mitigation) capabilities of the system governing entity (i.e., local authority, corporate management). The system’s robustness and resilience gets higher as I3/I2—a dynamic variable of the system—gets closer to 1. Relevant information for vulnerability assessment is provided by the graphical rendering of the results. Thus, the risk profile points out the most sensitive areas that Fig. 6.3 System localization in vulnerability space 6.2 The Relevance Matrices Method 121 have to be addressed in order to reduce the overall system vulnerability. This is, in fact, a direct consequence of one of the strongest points of this method—the capability of individual risk mitigation assessment. In the same line, placing the system in one of the acceptability basins is straightforward and meaningful way of visually communicating vulnerability assessment results in a simple manner. Additionally, comparative assessments of ‘what-if’ scenarios or system evolution in time can gain more relevance when represented in risk/risk mitigation matrix. In the following section, the basic equations and analytical foundation of a modified version of the general assessment method are presented. This is followed by a model tailored for transportation systems which goes on top of the generic method. 6.2.1 The Method The relevance matrix method encloses six phases: Phase 1 Identification and definition of (i) the risk types (threats, dangers) the system is prone to, and (ii) the possible effects related to each risk type (i.e., consequences— defined in terms of losses to the ecological system, human lives, or private property losses). Immediate results are the risk and loss classes. Let us denote: RTi—risc type i; LTk—loss type k; i = 1…nr, nr = the number of the identified risk types; k = 1…nl, nl = the number of the identified loss types. Phase 2 Risks and losses are categorized into 4 classes in accordance with Boverket (2007). An index between 1 and 4 is given for each class; the index value 1 expresses the less damaging situation, while the index value of 4 corresponds to the most dangerous situation. Phase 3 Each risk type is analyzed from system point of view; a risk source inventory is thus obtained. An index value (1–4) is assigned to each risk source, for each loss type; a probability of occurrence is also provided for each risk type. These values may be obtained via Delphi polls or a combination of analytical methods, previous knowledge, and/or expert judgment. The results are written in the matrix form 0 C¼@ c1;1 cnr;1 ... ... ... c1;nl cnr;nl 1 A 0 1 p1 and P ¼ @ . . . A pnl ð6:25Þ 122 6 Consensus-Driven Models for QVA in Transportation Corridors with: 1 ci;j 4 and 1 pi 4 C is built with the risk types on lines and loss types on columns; subsequently, ci,j expresses the ‘loss type i caused by risk type j index.’ Phase 4 The loss index is multiplied with the probability index, for each of the risk types. The multiplication results for each loss type are summed up. Let Zi, i = 1…nl indicate the sum previously computed: Zi ¼ nl X nl X cij pi ¼ pi cij j¼1 ð6:26Þ j¼1 The maximum value of Zi is given: Zimax ¼ max cij max pij nl ¼ 4 4 nl ð6:27Þ Pl According to Gheorghe and Vamanu (2003), Ic ¼ nj¼1 cij defines the consequence indicator, and Ip ¼ pi corresponds to the risk indicator. Subsequently, one gets: Zi the risk index associated with risk i Zmax the maximum risk index of risk i. i Risk (threat) profile of a system is built based on the individual values of Zi. The sum of all the risk indices measures the collective risks the system is prone to. Phase 5 During this phase, an inventory of the resources related to the risk management is performed. The risk-management capability is defined for each risk i, which is a function of two parameters, αi and βi. The following holds: 0 ai 1; 0 bi 1; ai þ bi 1: A value ðai þ bi Þ ¼ 1 is equivalent to a totally managed risk (threat). αi expresses the risk reduction/elimination capability, loss compensation, and consequence mitigation. This is a generic characteristic of a given risk type i—its value does not take into account the specific system characteristics. In turn, systems characteristic capabilities that deal with a given risk type i are reflected by βi. 6.2 The Relevance Matrices Method 123 Based on αi and βi, the System Robustness Indicator Relative to Risk i is introduced: qi ¼ Zi ðai þ bi Þ ð6:28Þ Phase 6 The following system’s characterization indices are introduced, using the equations and results of the previous phases: I1 = system’s maximum threat (risk) level ¼ Z max nr ð6:29Þ I2 = system’s current risk level nr X ð6:30Þ Zi i¼1 I3 = system’s current level of performance in managing nr X ðai þ bi ÞZi ð6:31Þ i¼1 Recalling from the previous section that I2 I1 reflects the relative risk level the I3 I2 system is exposed to, is the quality of the risk-management (mitigation) capabilities of the system governing entity (local authority, corporate management, etc.), and that system’s robustness and resilience gets higher as II32 a dynamic variable of the system gets closer to 1. Current authors introduce the following definition for vulnerability of a system: V ¼1 I3 I2 ð6:32Þ It is easy to see that vulnerability as given as in Eq. (6.32) is computed as function of system resilience and that V = 0 and V = 1 correspond to completely vulnerable and non-vulnerable (minimum vulnerability) systems. 6.2.2 Transportation Corridor Vulnerability Assessment Model with the Relevance Matrices Method This section covers the proposed model for assessing vulnerability of transportation corridors, built on top of the matrix method as described above. The model is driven by the following assumptions and amendments of the generic method: 124 6 Consensus-Driven Models for QVA in Transportation Corridors • The Transportation Corridor (Segment) is characterized at every point by temporal, spatial, political, and social features of the vicinity of the transportation segment (near operation environment). These features will be named location features, characterizing the assessment point. • The transportation system is defined in every assessment point by (i) the correlation matrix C (risk types versus loss types) and the P vector of the probabilities which holds the probability of occurrence for each of the considered risks • The effective values of losses (LTi) due to each type of risks (RTj) are dynamically computed in each assessment point, depending on the location features. Let us denote: LTi[RTj] is the effective value of loss i due to risk j. A = F[B, C, D]—reads A depends on B, C, and D. • I1, I2, I3 are computed for each assessment point. • After the completion of previous steps, one gets the Vulnerability Profile and the overall Vulnerability Index of the transportation system (V). The model uses the following supplemental variables: Trep [h/km]—the average time for repairing/building 1 km of rolling infrastructure (highway, railway—for road and rail transportation, respectively). The value of Trep depends on Rtt (road, railway, highway). Crep [EUR/km]—the repair cost for one kilometer of rolling infrastructure; depending on Rtt. ρpop [loc/km2]—population density; depending on location (dcity, dtown). Ccr [EUR/km2]—cleanup and reconstruction costs. Cpr [EUR/km2]—(private) property cost. Ndeaths_road [person/accident]—number of fatalities due to road accidents: Ndeaths road ¼ Ndeaths;road accidents ½person Nroad accidents ½accident Ndeaths_rail [person/accident]—number of fatalities due to rail accidents: Ndeaths rail ¼ Ndeaths;rail accidents ½person Nrail accidents ½accident Notice that Ndeaths,x is the ratio between the total number of fatalities resulting from the accidents of type x during one year and the total number of road/rail accidents that occur in the same year. In some cases, this information is readily available from different agencies (e.g., Insurance Institute for Highway Safety) at the national and regional levels. 6.2 The Relevance Matrices Method 125 Nwounded_road [person/accident]—number of the wounded due to road accidents: Nwounded road ¼ Nwounded;road accidents ½person ½accident Nroad accidents Nwounded_rail [person/accident]—number of the wounded due to rail accidents: Nwounded rail ¼ Nwounded;rail accidents ½person ½accident Nrail accidents MOD—the transportation type (urban, urban (towns), extraurban). Sa [km2]—the affected area: Sa ¼ p R2rel =1;000;000 Laffected [km]—the length of the transportation segment that is affected by a disruptive event: Laffected ¼ 2 Rrel 1000 Rrel_medical—the maximum distance to which a medical center may be located, as to provide prompt intervention in the case of an accident. Rrel_interventie—the maximum distance up to which an emergency intervention center (fire station, etc.) may be located, as to ensure a prompt intervention for mitigating the effects of a LOC accident. α[]—mitigating/aggravating factor, probabilities, β[]—mitigating/aggravating factor, losses. The model is designed for providing a solution to the following: The Problem Organizer: the National Transportation Board. Assessment goal: ensuring an optimal operability of the National Transportation System. This is done by: (i) (ii) (iii) (iv) estimating maximum risk level induced by the assessed activity; estimating current risk level on a given transportation segment; estimating robustness of the transportation system; performing quantitative assessment of vulnerability of the given transportation system. The identification of the risk types relevant to the transportation system—the indicators selection We propose the following risk types for the model. Risk types are grouped into three classes as indicated in Table 6.3. 126 6 Consensus-Driven Models for QVA in Transportation Corridors Table 6.3 Risk classification by classes Risk types (sources) Classes RT1 accident RT2 LOC followed by effects RT3 airports RT4 ‘sensitive objects’ (HV lines, bridges) RT5 traffic control and management RT6 medical personnel intervention delays RT7 emergency personnel intervention delays (firefighters, civil protection) RT8 floods RT9 snowstorms RT10 landslides RT11 avalanches RT12 forest fire RT13 earthquake RT14 safety culture RT15 terrorism RT16 insurance system RT17 legislation RT18 political stability Disruptive potential Disruptive potential Disruptive potential Disruptive potential Infrastructure and services Infrastructure and services Infrastructure and services Disruptive potential Disruptive potential Disruptive potential Disruptive potential Disruptive potential Disruptive potential Operational climate Operational climate Operational climate Operational climate Operational climate Identification of potential loss types of a transportation system The loss types considered within the model are: LT1 LT2 LT3 LT4 LT5 LT6 LT7 LT8 Traffic on the analyzed segment stopped (hours); Traffic delayed on the analyzed segment (hours); Rolling infrastructure repair costs (EUR); Transportation system remedy costs (EUR); Property loss (EUR); Fatalities (persons); Injuries (persons); Environmental damages (affected ha); Loss and probability classification Corresponding to Phase 2 of the assessment schema, loss and probability classification is left to expert judgment, as a means of reflecting different stakeholder perspectives. Filling in the correlation matrices In current research, authors opt for computing effective values for both, type of loss and type of risk correlation and probability of occurrence of a given risk type based on the characteristics of the location. 6.2 The Relevance Matrices Method 127 The following set of equations is suggested for computing the effective values. The equations are provided as follows: for each risk type, a set of equations is given in order to compute the effective value of each loss. RT1 Accident (road, rail) The model assumes that the probability of occurrence of a disruptive event characterized by RT1 equals the probability of occurrence of an accident computed using the comprehensive methodology presented in Chap. 3. There is no consideration of any hazmat transportation-related aspects such as lorry/train, load type. Obtained probability is denoted as P*. P* and is adjusted by aggravating factors depending on Rtt, Rtq, and MOD. MOD is taken into account for when including pedestrian-involving accidents, such as in the case of a city/town transportation segment. PfRT1 g ¼ F½P ½LOC; Rt1 ; Rtq ; MOD ð6:33Þ PfRT1 g ¼ P ½LOC a0 ½Rtt Rtq a00 ½MOD ð6:34Þ with α′[Rtt] and α″[MOD]—aggravating factors. LT1{RT1}—Traffic on the analyzed segment stopped (hours); LT1 fRT1 g ¼ F½Rtt ð6:35Þ LT2{RT1}—Traffic delayed on the analyzed segment (hours): LT2 fRT1 g ¼ F ½LT1 fRT1 g; Rt1 ¼ LT1 fRT1 g b½Rtt ð6:36Þ LT3{RT1}—Rolling infrastructure repair costs: LT3 fRT1 g ¼ F½Rtt ð6:37Þ LT4{RT1}—Transportation system remedy costs: Only the costs for transportation segment decongestion are considered. LT4 fRT1 g ¼ F½Rtt ð6:38Þ LT5{RT1}—Property loss (EUR): LT5 fRT1 g ¼ F ½A; MOD ¼ A b½MOD with A ð6:39Þ the average cost of the LORRY/CAR or average cost TRAIN/ LOCOMOTIVE β[MOD] aggravating factor considering additional losses due to hitting a building. 128 6 Consensus-Driven Models for QVA in Transportation Corridors LT6{RT1}—Fatalities (no. of persons): LT6 fRT1 g ¼ F Nfatalitites;x ; MOD ¼ Nfatalites;x b½MOD ð6:40Þ with β[MOD] aggravating factor, taking into account the additional number of fatalities from pedestrians. LT7{RT1}—Injuries (no. of persons): LT7 fRT1 g ¼ F Ninjured;x ; MOD ¼ Ninjured;x b½MOD ð6:41Þ with β[MOD] aggravating factor, taking into account the additional number of injured pedestrians. LT8{RT1}—Environmental losses LT8 fRT1 g ¼ 0 ð6:42Þ RT2 Loss of containment accident followed by effects The Loss of containment accident followed by effects probability equals the probability of occurrence of an accident computed by using the methodology in Sect. 3.2.1 where probability of loss of containment is represented by P[LOC]. P [LOC] is adjusted by aggravating factors depending on the rolling infrastructure type and quality (Rtt and Rtq) and the transportation type (MOD). MOD is taken into account because TR2 is assumed as including the pedestrians involving accidents. PfRT2 g ¼ F P½LOC; Rtt ; Rtq ; MOD PfRT2 g ¼ P½LOC a0 ½Rtt Rtq a00 ½MOD ð6:43Þ with α′ [Rtt] and α″[MOD] adjustment factors. Here, α″[MOD] should be selected as to reflect the following interpretation: • Measurement point inside a city: Transportation system’s vulnerability from the LOC accident viewpoint is smaller than the one in an extraurban transportation, due to smaller speeds (a00 is a mitigating factor, a00 \1Þ • Measurement point inside a town: System’s vulnerability is higher than the extraurban case, due to not necessarily smaller speeds but an increase of the number of the potentially accident initiating factors (a00 is an aggravating factor, a00 [ 1Þ • Measurement point outside populated places: α″ = 1. 6.2 The Relevance Matrices Method 129 Potential loss is computed in the ‘worst-case scenario.’ Thus, it is assumed that (i) all possible physical effects are characteristic for the transported substance and (ii) all the physical effects (fire, explosion, etc.) may follow the loss of containment. LT1{RT2} LT1—Traffic on the analyzed segment stopped (hours): LT1 fRT2 g ¼ F Rtt ; Trep ; Laff ¼ b½Rtt Trep ½Rtt Laff ð6:44Þ LT2{RT1}—Traffic delayed on the analyzed segment (hours): LT2 fRT2 g ¼ F ½LT1 fRT2 g; Rt1 ¼ LT1 fRT2 g b½Rtt ð6:45Þ with β[Rtt] aggravating factor. LT3{RT2}—Rolling infrastructure repair costs: LT3 fRT2 g ¼ FCrep ; Laff ; Rtt ¼ b½Rtt Crep ½Rtt Laff ð6:46Þ TP4{TR2}—Transportation system remedy costs: This cost includes cleanup and reconstruction costs of the affected area, and depends on the location of the accident. Consequently, LT4 fRT2 g ¼ F ½MOD; Saff ¼ Saff Ccr ½MOD ð6:47Þ LT5{RT2}—Property loss: Depends on a number of factors including: • • • • • average price per m2; affected surface; distance toward a city; distance toward a town; effects adjustment factors. LT5 fRT2 g ¼ F ½MOD; Saff ¼ Cpr city þ Cpr town þ Cpr extraurban ð6:48Þ with Cpr_oraş, Cpr_localitate, Cpr_extravilan as contributors to the final cost depending on the urban development level in the vicinity of the measurement point. ( Cpr city ¼ ( Cpr town ¼ d 0 bcity Saff 1 Rcity Cpr rel 0; 0 btown Saff 1 dRtown Cpr rel 0; city ; town ; for dcity Rrel for dcity Rrel fordtown Rrel fordtown Rrel ð6:49Þ ð6:50Þ 130 6 Consensus-Driven Models for QVA in Transportation Corridors Cextraurban ¼ bextraurban Saff ð6:51Þ with C′pr_city, C′pr_town, C′pr_extraurban the average costs per 1 km2 property. LT6{RT2}—Fatalities (no. of persons): The number of fatalities due to RT2 is assumed as a fraction of the total number of persons injured in the same circumstances. LT6 fRT2 g ¼ F ½LT7 fRT2 g; b ¼ b LT7 fRT2 g ð6:52Þ LT7{RT2}—Injuries (no. of persons): LT7 fRT2 g ¼ F Saff ; MOD; qpop ; b ¼ Saff qpop ½MOD b ð6:53Þ with β mitigating factor equal to the percentage of the exposed population injured by the LOC physical effects LT8{RT2}—Environmental losses [km2]: LT8 fRT2 g ¼ Saff ¼ p R2rel 106 ð6:54Þ RT3 Airports The presence of airports induces a higher vulnerability to a transportation system. To avoid double counting, RT3 accounts only for loss contributions resulting from the presence of an airport. The probability of occurrence of an event characterized by RT3 is computed from the probability of occurrence of a LOC accident, adjusted by aggravating factors depending on the distance to the closest airport (daip) and the number of airports in the relevance radius (Naip). PfRT3 g ¼ F P½LOC; daip ; Naip ; Rrel ( 1d P½LOC Naip Rrelaip ; for daip Rrel PfRT3 g ¼ 0; for daip [ Rrel ð6:55Þ As a result of the introductory remarks, one has: LT1{RT3}—Traffic on the analyzed segment stopped (hours): LT1 fRT3 g ¼ 0 ð6:56Þ 6.2 The Relevance Matrices Method 131 LT2{RT3}—Traffic delayed on the analyzed segment (hours): LT2 fRT3 g ¼ 0 ð6:57Þ LT3{RT3}—Rolling infrastructure repair costs: LT3 fRT3 g ¼ 0 ð6:58Þ LT4{RT3}—Transportation system remedy costs: LT4 fRT3 g ¼ 0 ð6:59Þ LT5{RT2} Property loss (EUR): Is taken as a function of: • • • • average price per km2 in the case of an airport; affected surface; distance toward an airport; effects adjustment factors. LT5 fRT3 g ¼ F daip ; Saff ¼ Cpr aip Saff b daip 1 Rrel ð6:60Þ with Cpr_aip average cost of 1 km2 of airport property; β effects adjustment factor. LT6{RT3} Fatalities (no. of persons): LT6 fRT3 g ¼ 0 ð6:61Þ LT7{RT3}—Injuries (no. of persons): LT7 fRT3 g ¼ 0 ð6:62Þ LT8{RT3}—Environmental losses [km2]: LT8 fRT3 g ¼ 0 ð6:63Þ RT4 ‘Sensitive’ objects Current model considers as ‘sensitive objects’ of infrastructure elements (not necessarily road/rail related) that (i) may increase losses and (ii) increase the probability of occurrence of a LOC accident in their vicinity. For simplicity and reduced complexity, the model considers bridges and high-voltage lines (HV lines) as sensitive objects. 132 6 Consensus-Driven Models for QVA in Transportation Corridors Similar to the case of airports, only the loss contributions resulting from the presence of ‘sensitive objects’ are taking into account to avoid double counting. The probability of occurrence of an event characterized by RT4 is defined as the probability of occurrence of a LOC accident adjusted by aggravating factors depending on the distance to the closest HV line (dHV) and the distance to the closest bridge (dbridge). PfRT4 g ¼ F P½LOC; dHV ; dbridge ; Rrel PfRT4 g ¼ P½LOC abridge aHV ð6:64Þ where αbridge and αHV are given as: ( abridge ¼ 1 dbridge Rrel ; for dbridge Rrel fordbridge [ Rrel ð6:65Þ ; fordHV Rrel fordHV [ Rrel ð6:66Þ 0; and ( aHV ¼ 1 dHV Rrel 0; LT1{RT4}—Traffic on the analyzed segment stopped (hours); Depending on the number of bridges (Nbridges) on the assessed segment and the time the traffic is stopped due to a LOC accident (TP1{TR2}): LT1 fRT4 g ¼ F LT1 fRT2 g; Nbridges ¼ b Nbridges LT1 fRT2 g ð6:67Þ β > 1 (β = 5 recommended value). LT2{RT4}—Traffic delayed on the analyzed segment (hours): Given as function of the number of bridges (Nbridges) on the assessed segment and the time the traffic is delayed due to a LOC accident (TP2{TR2}): LT2 fRT4 g ¼ F LT2 fRT2 g; Nbridges ¼ b Nbridges LT2 fRT2 g ð6:68Þ β > 1. LT3{RT4}—Rolling infrastructure repair costs: LT3 fRT4 g ¼ F LT3 fRT2 g; Nbridges ¼ b Nbridges LT3 fRT2 g ð6:69Þ β > 1. LT4{RT4}—Transportation system remedy costs: LT4 fRT4 g ¼ 0 ð6:70Þ 6.2 The Relevance Matrices Method 133 LT5{RT4}—Property loss (EUR): Depends on a number of factors including: • • • • • • the distance to the closest HV line; the number of HV lines crossed along the segment; the number of bridges along the segment; unit average cost of a HV line unit average cost of a bridge the adjustment factors function of dHV. LT5 fRT4 g ¼ F dHV ; dbridge ; Cbridge ; CHV ; Nbridges ; NHV ¼ Cbridge Nbridges þ CHV NHV b½dHV ð6:71Þ with β [dHV] mitigation factor, ( bHV ¼ 1 dHV Rrel ; 0; for dHV Rrel for dHV [ Rrel ð6:72Þ LT6{RT4}—Fatalities (no. of persons): LT6 fRT4 g ¼ 0 ð6:73Þ LT7{RT4}—Injuries (no. of persons): LT7 fRT4 g ¼ 0 ð6:74Þ LT8{RT4}—Environmental losses [km2]: LT8 fRT4 g ¼ 0 ð6:75Þ TR5 Traffic control and management TR5 expresses the characteristic risk of a transportation segment induced by the absence of traffic control and management systems. The value of the potential losses depending on TR5 is given, in a similar manner as in the previous cases, as supplemental contributions to losses caused by an LOC accident. The TR5-specific probability is in direct relation to the presence/absence of traffic control equipment. Hence, it is assumed that the vulnerability of a transportation segment is in inverse relationship with the probability of traffic control systems missing on the analyzed segment. The probability of occurrence of a disruptive event due to TR5 (PfTR5 g) is computed by adjusting the LOC probability, with aggravating factors depending on the transportation type (MOD) and type of the rolling infrastructure Rtt.. 134 6 Consensus-Driven Models for QVA in Transportation Corridors PfTR5 g ¼ F ½P½LOC; MOD; Rt PfTR5 g ¼ P½LOC ða0 ½MOD a00 ½Rt Þ ð6:76Þ LT1{RT5}—Traffic on the analyzed segment stopped (hours); LT1 fRT5 g ¼ 0 ð6:77Þ LT2{RT1}—Traffic delayed on the analyzed segment (hours): LT2 fRT5 g ¼ 0 ð6:78Þ LT3{RT1}—Rolling infrastructure repair costs: LT3 fRT5 g ¼ 0 ð6:79Þ LT4{RT1}—Transportation system remedy costs: LT4 fRT5 g ¼ 0 ð6:80Þ LT5{RT1}—Property loss (EUR): LT5 fRT5 g ¼ 0 ð6:81Þ LT6{RT5}—Fatalities (no. of persons): Computed as a percent (β) of the total number of fatalities (accidents and LOC accidents) LT6 fRT5 g ¼ F ½LT6 fRT1 g; LT6 fRT2 g ¼ b ðLT6 fRT1 g þ LT6 fRT2 gÞ ð6:82Þ LT7{RT5}—Injuries (no. of persons): Computed as a percent (β) of the total number of fatalities (accidents and LOC accidents) LT7 fRT5 g ¼ F ½LT7 fRT1 g; LT7 fRT2 g ¼ b ðLT7 fRT1 g þ LT7 fRT2 gÞ ð6:83Þ LT8{RT1}—Environmental losses LT8 fRT5 g ¼ 0 ð6:84Þ RT6 Medical personnel intervention delays It is assumed that the vulnerability of the transportation segment is in direct relationship with the probability of delayed intervention of the medical personnel. The RT6-associated probability is computed as function of the distance toward the closest city/town (dcity, dtown). 6.2 The Relevance Matrices Method 135 PfRT6 g ¼ F dcity ; dtownt ( PfRT6 g ¼ 1 minðdcity ;dtown Þ Rrel medical 0; ; for Rrel for Rrel ð6:85Þ min dcity ; dtown medical [ min dcity ; dtown medical LT1{RT6}—Traffic on the analyzed segment stopped (hours); LT1 fRT6 g ¼ 0 ð6:86Þ LT2{RT6}—Traffic delayed on the analyzed segment (hours): LT2 fRT6 g ¼ 0 ð6:87Þ LT3{RT6}—Rolling infrastructure repair costs: LT3 fRT6 g ¼ 0 ð6:88Þ LT4{RT6}—Transportation system remedy costs: LT4 fRT6 g ¼ 0 ð6:89Þ LT5{RT6}—Property loss (EUR): LT5 fRT6 g ¼ 0 ð6:90Þ LT6{RT6}—Fatalities (no. of persons): Computed as a percent (β) of the total number of fatalities (accidents and LOC accidents) LT6 fRT6 g ¼ F ½LT6 fRT1 g; LT6 fRT2 g ¼ b ðLT6 fRT1 g þ LT6 fRT2 gÞ ð6:91Þ LT7{RT6}—Injuries (no. of persons): Computed as percent (β) of the total number of fatalities (accidents and LOC accidents) LT7 fRT6 g ¼ F ½LT6 fRT1 g; LT6 fRT2 g ¼ b ðLT6 fRT1 g þ LT6 fRT2 gÞ ð6:92Þ LT8{RT1}—Environmental losses [km2]: LT7 fRT6 g ¼ 0 ð6:93Þ RT7 Emergency personnel intervention delays (firefighters, civil protection) It is assumed that vulnerability of a transportation segment is in direct relationship with the probability of delayed intervention of the emergency personnel. It is also assumed that expert emergency personnel can only be found in cities. 136 6 Consensus-Driven Models for QVA in Transportation Corridors The probability associated with RT7 is computed as function of the distance toward the closest city (dcity). PfRT7 g ¼ F dcity ( PfRT7 g ¼ 1 Rrel dcity emmergency 0; ; ð6:94Þ for Rrel emergency dcity Rrel emergency [ dcity LT1{RT7}—Traffic on the analyzed segment stopped (hours); LT1 fRT7 g ¼ 0 ð6:95Þ LT2{RT7}—Traffic delayed on the analyzed segment (hours): LT2 fRT7 g ¼ 0 ð6:96Þ LT3{RT7}—Rolling infrastructure repair costs: LT3 fRT7 g ¼ 0 ð6:97Þ LT4{RT7}—Transportation system remedy costs: Computed as a percent of the transportation remedy costs in case of a LOC accident. LT4 fRT7 g ¼ F ½LT4 fRT2 g ¼ b ðLT4 fRT2 gÞ ð6:98Þ LT5{RT7}—Property loss (EUR): Computed as a percent of the total property losses: LT5 fRT7 g ¼ F ½LT5 fRT2 g; LT5 fRT1 g; LT5 fRT4 g ¼ b ðLT5 fRT2 g þ LT5 fRT1 g þ LT5 fRT4 gÞ ð6:99Þ LT6{RT7}—Fatalities (no. of persons): Computed as a percent (β) of the total fatalities (accident and LOC accident). LT6 fRT7 g ¼ F ½LT6 fRT1 g; LT6 fRT2 g ¼ b ðLT6 fRT1 g þ LT6 fRT2 gÞ ð6:100Þ LT7{RT7}—Injuries (no. of persons): Computed as a percent (β) of the total injuries (accident and LOC accident). LT7 fRT7 g ¼ F ½LT7 fRT1 g; LT7 fRT2 g ¼ b ðLT7 fRT1 g þ LT7 fRT2 gÞ ð6:101Þ 6.2 The Relevance Matrices Method 137 LT8{RT7}—Environmental losses Computed as a percent (β) of the environmental losses in the case of LOC accident. LT8 fRT7 g ¼ F ½LT8 fRT2 g ¼ b ðLT8 fRT2 gÞ ð6:102Þ RT8 Floods It is assumed that probability associated with TR8 depends on the distance to the closest water body (driver, dwb) and the location of the measurement point inside a potentially floodable area (Flood). PfRT8 g ¼ F½driver ; dwb ; Flood ð6:103Þ 8 minðdriver ;dwb Þ ; for R minðd ; d Þ > rel river wb > Rrel <1 and measurement point inside floodable area PfRT8 g ¼ > > 0; for measurement point outside floodable area : 1; for measurement point inside floodable area LT1{RT8}—Traffic on the analyzed segment stopped (hours)—given by statistics and/or expert judgment. LT2{RT8}—Traffic delayed on the analyzed segment (hours)—given by statistics and/or expert judgment. LT3{RT8}—Rolling infrastructure repair costs: Computed as a percent of • the costs due to accident (with and without LOC); • the additional costs due to the presence of bridges on the analyzed segment: LT3 fRT8 g ¼ F ½LT3 fRT1 g; LT3 fRT2 g; LT3 fRT4 g ¼ b ðLT3 fRT1 g þ LT3 fRT2 g þ LT3 fRT4 gÞ ð6:104Þ LT4{RT8}—Transportation system remedy costs: LT4 fRT8 g ¼ 0 ð6:105Þ LT5{RT8}—Property loss (EUR): Computed as a percent of • the costs due to accident (with and without LOC); • the additional costs due to the presence of sensitive objects on the analyzed segment: LT5 fRT8 g ¼ F ½LT5 fRT1 g; LT5 fRT2 g; LT5 fRT4 g ¼ b ðLT5 fRT1 g þ LT5 fRT2 g þ LT5 fRT4 gÞ ð6:106Þ 138 6 Consensus-Driven Models for QVA in Transportation Corridors LT6{RT8}—Fatalities (no. of persons): LT6 fRT8 g ¼ 0 ð6:107Þ LT7{RT8}—Injuries (no. of persons): LT7 fRT8 g ¼ 0 ð6:108Þ LT8{RT1}—Environmental losses [km2] Computed as a percent of the losses due to LOC accident: LT8 fRT8 g ¼ F ½LT8 fRT2 g ¼ b ðLT8 fRT2 gÞ ð6:109Þ RT9 Snowstorms The probability associated with RT9 is computed as function of terrain elevation at the measurement point (hmp) with the assumption that storms/blizzards can only occur at an elevation between zero level (sea level) and Hmax above the sea level. PfRT9 g ¼ F hmp PfRT9 g ¼ ð6:110Þ h mp ; for 0 hmp \Hmax 1 Hmax 0; otherwise LT1{RT9}—Traffic on the analyzed segment stopped (hours); Computed as a percent (β) of the time the traffic is stopped on the analyzed segment due to accidents (with and without LOC) LT1 fRT9 g ¼ F ½LT1 fRT1 g; LT1 fRT2 g ¼ b ðLT1 fRT1 g þ LT1 fRT2 gÞ ð6:111Þ LT2{RT9}—Traffic delayed on the analyzed segment (hours): LT2 fRT9 g ¼ F ½LT2 fRT1 g; LT2 fRT2 g ¼ b ðLT2 fRT1 g þ LT2 fRT2 gÞ ð6:112Þ LT3{RT9}—Rolling infrastructure repair costs: LT3 fRT9 g ¼ 0 ð6:113Þ LT4{RT9}—Transportation system remedy costs: LT4 fRT9 g ¼ 0 ð6:114Þ 6.2 The Relevance Matrices Method 139 LT5{RT9}—Property loss (EUR): Computed as a percent (β) of the property losses following a LOC accident in the case of a delayed intervention of the emergency team. LT5 fRT9 g ¼ F ½LT5 fRT2 g ¼ b ðLT5 fRT2 gÞ ð6:115Þ LT6{RT9}—Fatalities (no. of persons): Computed as the number of fatalities due to delayed intervention of the medical and emergency teams, multiplied by the aggravating factor (β). LT6 fRT9 g ¼ F ½LT6 fRT6 g; LT6 fRT7 g ¼ b ðLT6 fRT6 g þ LT6 fRT7 gÞ ð6:116Þ LT7{RT9}—Injuries (no. of persons): Computed in the same assumptions as LT6: LT7 fRT9 g ¼ F ½LT7 fRT6 g; LT7 fRT7 g ¼ b ðLT7 fRT6 g þ LT7 fRT7 gÞ ð6:117Þ LT8{RT9}—Environmental losses [km2] LT8 fRT9 g ¼ 0 ð6:118Þ RT10 Landslides The probability associated with RT9 is computed as function of terrain elevation at the measurement point (hmp) with the assumption that landslides can only occur at an elevation within Hmin and Hmax above the sea level (hilly site). PfRT10 g ¼ F hmp ( PfRT9 g ¼ 1; for Hmin hmp \Hmax 0; otherwise ð6:119Þ LT1{RT10}—Traffic on the analyzed segment stopped (hours); Computed as a percent (β) of the time the traffic is stopped on the analyzed segment due to accidents (with and without LOC) LT1 fRT10 g ¼ F ½LT1 fRT1 g; LT1 fRT2 g ¼ b ðLT1 fRT1 g þ LT1 fRT2 gÞ ð6:120Þ 140 6 Consensus-Driven Models for QVA in Transportation Corridors LT2{RT10}—Traffic delayed on the analyzed segment (hours): LT2 fRT10 g ¼ F ½LT2 fRT1 g; LT2 fRT2 g ¼ b ðLT2 fRT1 g þ LT2 fRT2 gÞ ð6:121Þ LT3{RT10}—Rolling infrastructure repair costs: LT3 fRT10 g ¼ F ½LT3 fRT1 g; LT3 fRT2 g ¼ b ðLT3 fRT1 g þ LT3 fRT2 gÞ ð6:122Þ LT4{RT10}—Transportation system remedy costs: LT4 fRT10 g ¼ F ½LT4 fRT1 g; LT4 fRT2 g ¼ b ðLT4 fRT1 g þ LT4 fRT2 gÞ ð6:123Þ LT5{RT10}—Property loss (EUR): Computed as a percent (β) of the losses following a LOC accident: LT5 fRT10 g ¼ F ½LT10 fRT2 g ¼ b LT10 fRT2 g ð6:124Þ LT6{RT10}—Fatalities (no. of persons): Computed as the number of fatalities due to delayed intervention of the medical and emergency teams, multiplied by the aggravating factor (β). LT6 fRT10 g ¼ F ½LT6 fRT6 g; LT6 fRT7 g ¼ b ðLT6 fRT6 g þ LT6 fRT7 gÞ ð6:125Þ LT7{RT10}—Injuries (no. of persons): Computed in the same assumptions as LT7: LT7 fRT10 g ¼ F ½LT7 fRT6 g; LT7 fRT7 g ¼ b ðLT7 fRT6 g þ LT7 fRT7 gÞ ð6:126Þ LT8{RT10}—Environmental losses Computed as a percent (β) of the environmental losses following a LOC accident: LT8 fRT10 g ¼ F ½LT8 fRT2 g ¼ b LT8 fRT2 g ð6:127Þ The effective values (LTi) in the case of RT11–RT18 are computed similar to RT10. This is done by adjusting the already-computed values of losses with mitigating/aggravating factors (β). Assumptions at the base of computing the RT11– RT18 are associated with probabilities and are given as: 6.2 The Relevance Matrices Method 141 • P[RT11] is computed based on the assumption that there are no avalanches below 1000 m elevation. • P[RT12] depends on a measurement point being in a forest area. • P[TR13] is computed as a function related to proximity to seismic characteristics of the measurement point: P½RT13 ¼ Earthquake 10 ð6:128Þ with 0 Earthquake\10 (according to the Modified Mercalli Intensity Scale) • P[TR14], P[TR18] are assumed as being given by expert judgment. The functional logic of the model is given in Fig. 6.4. Notice that the white spaces correspond to LTi RTj ¼ 0. Now, the relevance matrices model may be applied to the filled-in correlation matrices. For simplicity, it is assumed that the inventory of the resources allocated to the system management remains constant throughout the evaluation. According to the generic model, one is able to get the following elements for each measurement point: • • • • • • Current risk level of a given system; Maximum risk level of a given system; Risk profile of the system as indicated in Fig. 6.5; Current level of competence in risk management; Robustness Index; Vulnerability of the system. Fig. 6.4 Relationship between the different types of risks and losses 142 6 Consensus-Driven Models for QVA in Transportation Corridors Fig. 6.5 An example of a risk profile (risk and associated resilience index) Vulnerability profile of an analyzed transportation segment is obtained by repeating the aforementioned procedure (Eqs. 6.33–6.128) and centralizing the results. The Vulnerability Index (total vulnerability) of the transportation system is given by: mp 1 X Vi Nmp i¼1 N V¼ ð6:129Þ With Nmp the number of measurement points; Vi system’s vulnerability at measurement point i. References Barjonet, P. (2001). Traffic psychology today. Norwell, MA: Kluwer Academic Publishers. Boverket. (2007). Bostadspolitiken: Svensk politik för boende, planering och byggande under 130 år. 1. uppl. Karlskrona, Sweden: Boverket. Ciscar, J. C., Russ, P., Parousos, L., & Stroblos, N. (2004). Vulnerability of the EU economy to oil shocks: A general equilibrium analysis with the GEM-E3 Model. Presented at the 13th Annual Conference of the European Association of Environmental and Resource Economics, Budapest, Hungary. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1. 196.3905 References 143 Clemson, B. (1984). Cybernetics: A new management tool. Tunbridge Wells, Kent, UK: Abacus Press. Gheorghe, A. V., & Vamanu, D. V. (2003). AIDRAM—Aiding Risk Assessment and Management: Concept proof software developed by appointment of the Disaster Risk Management Institute, World Bank. Washington, DC: KOVERS-KT/LSA/ETH Zurich. Hester, P. T., & Adams, K. M. (2014). Systemic thinking: Fundamentals for understanding problems and messes. New York, NY: Springer, Berlin Heidelberg. Kerr, M. (2001). The Delphi Process. In The Delphi pProcess 2002 city: Remote and rural areas research initiative, NHS in Scotland. Retrieved from http://www.rararibids.org.uk/documents/ bid79-delphi.htm Nilsson, J., Magnusson, S., Hallin, P., & Lenntorp, B. (2001). Models for vulnerability auditing and distribution of governmental economical means at the local authority level. Lund, Sweden: Lund University Centre for Risk Analysis and Management (LUCRAM). Vamanu, B. I. (2006). Managementul riscurilor privind transportul substanţelor periculoase: aplicaţii ale sistemelor dinamice complexe (Dissertation, Universitatea Politehnica Bucureşti, Facultatea de Chimie Aplicată şi Ştiinţa Materialelor, Catedra de Inginerie Economică, Bucureşti). Chapter 7 Physical Analogies-Based Model for Quantitative Vulnerability Assessment of Transportation Corridors Abstract This chapter highlights the method for quantitative vulnerability assessment in multicomponent systems. First, foundational information regarding multicomponents systems (i.e., assumptions, parameters, vulnerability scale) is reviewed. It is then shown how the model can be adapted for vulnerability assessment in transportation corridors. 7.1 Quantitative Vulnerability Assessment Method; Modeling Cooperative Phenomena in Multi-component Systems In the proposed method, adapted from generic Quantitative Vulnerability Assessment (QVA) model presented in Gheorghe and Vamanu (2004a, b), quantification of vulnerability for a multicomponent system is quantified as follows: • a two-parameter description of the system and the respective state equation which includes inputs and outputs. Input includes an arbitrarily large number of indicators accounting for the system internal process (fast-varying) as well as external forces (slow-varying) acting upon the system of interest. Output is a membership fraction indicating integrity of the system in terms of operability which is defined in terms of proportion of ‘operable’ and ‘inoperable’ states of the system; • a division of the two-parameter phase space of the system into vulnerability basins, including: – a system stable—low vulnerability, – a system and vulnerability critical, and – a system unstable—high vulnerability, regions; and • a 0–100 Vulnerability Scale and the means to measure the respective Vulnerability Index, as an operational expression of a QVA. © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6_7 145 146 7 Physical Analogies-Based Model for Quantitative Vulnerability … The generic model addresses cooperative behavior occurring in systems characterized by large number of binary state components (e.g., operational/ dysfunctional, normal/abnormal, and positive/negative). These multicomponent systems are traditionally the subject of statistical physics as addressed, for example, in the Ising and Heisenberg models (Vamanu et al. 2003). The relevance of Ising and Heisenberg models to vulnerability comes from the phenomenology of multicomponent systems. Multicomponent binary systems present state coalitions (i.e., ‘domains’ in magnetism theory) and the possibility of collective disruptive phase transitions from one state to the other which, in this context, allows expressing the vulnerability as system’s quantifiable propensity of suffering such transitions. The described physical analogies allow for defining individual binary transition probabilities (i.e., Bragg–Williams approximation, Bragg and Williams 1934) as a function of two ‘energy’-wise parameters—one characterizing the internal interactions (‘exchange’) and the other the external influence (‘field’). Furthermore, current extension of this model allows expressing the two parameters as fuzzy impact functions which depends on an arbitrary number of macroscopic indicators. Indicators serve a twofold purpose of reflecting a link to the physical reality and accounting for stakeholder subjectivity. The assumption of the large number of components allows the interpretation of the membership fraction (i.e., ratio between the functional and dysfunctional elements of the system) as continuous variable. This enables the development of an analytical model for describing its dynamics based on a master equation for the function of distribution of the system states. The master equation encompasses individual transition probabilities, hence macroscopic indicators of a system. The same assumption validates the approximation of the master equation by a series expansion to the 2nd order of the state distribution function (i.e., ratio of membership fraction and total number of components). The result is a Fokker– Planck-type equation (Risken 1996). Looking for the stationary solution of this equation and approximating the result to the 2nd order, one gets the system’s state equation—in fact, this is a transcendent equation for the extremal surface (i.e., the surface of the maximum probability) on which the system states may localize. The state equation defines a topological cusp foil in a 3D-space generated by exchange parameter (U), field parameter (V), and membership fraction itself. The foil projection on the [U, V] plane marks a cusp frontier that splits the plane in state basins. Any set of values macroscopic indicators may have at a given time, determines a unique pair of coordinates in the [U, V] plane (i.e., identifiable state point), entailing that the system’s dynamics in time is characterized by the trajectory of the state point in the exchange and field parameters in the defined plane. Figure 7.1 is drawn to represent the UV plane. Since traversing the cusp line implies collective, massive transitions of the system components from the functional/productive/normal state to the dysfunctional/ counterproductive/abnormal state, these events can be rendered as ‘catastrophic’ as in the sense of Catastrophy Theory (Thom 1975). Additionally, the generic QVA model proposes the use euclidian distance from the current system state to the cusp line as a means for quantifying the system vulnerability—as propensity of 7.1 Quantitative Vulnerability Assessment Method … 147 Fig. 7.1 A ‘graphical’ sketch of the cooperative phenomena in multi-component, binary systems experiencing disruptive state transitions. Moreover, proper scaling allows for defining a metrics for vulnerability of system of interest on a scale of 0–100 with 0 being minimum vulnerability. 7.1.1 System Description by Indicators In the QVA approach, vulnerability of a system is interpreted as the system’s virtual tendency of losing its design functions and/or structural integrity and/or identity (i.e., the design role) due to two types of influencing factors (i.e., risk characterizing and risk mitigating (management) capability characterizing factors). Following Vamanu et al. (2003), we denote: U the risk characterizing factors set; V the risk mitigating capability factors set; It is also assumed that all factors are quantifiable and suitable for being expressed by indicators. Risks that a system (e.g., transportation) is exposed to and identified by considering the different disruptive states the system may encounter are characterized by the U factors. Consequently, the associated indicators target internal characteristics of the system and/or reflect the processes that occur within the system as well as the performance of the system. The V factors characterize the capability of response/reaction of the system management to the internal evolutions of the system. In a broader sense, the V factors characterize the operational environment of the system and the different influences that may affect system operations. Thus, the associated indicators have to be external in nature. The selection of the characteristic indicators is made under the following considerations: (i) indicators should take into account the analytical models for risk 148 7 Physical Analogies-Based Model for Quantitative Vulnerability … assessment for hazmat transportation and (ii) indicators should reflect the various characteristics such as temporal, meteorological, spatial that may affect behaviors of the traffic participants, as well as the impact of traffic on population (and property) within the vicinity. 7.1.2 The Control Variables The quantifiable/monitored indicators that contribute to U and V (Xui and Xvj) are aggregated resulting into two control variables referred to as U and V. Let U be: qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi p p p p UðXu1 ; Xu2 ; . . .; Xun Þ ¼ min 1; Xu1 þ Xu2 þ . . . þ Xun ð7:1Þ with Xui ; i ¼ 1; 2; . . .; n the normalized indicators, computed from the physical indicators (Yui) as: Xui ¼ Alog10 ðYui Þ þ B; i ¼ 1; 2; . . .; n ð7:2Þ A and B (constants) are, in turn, computed based on two equivalent pairs (asð1Þ ð1Þ ð2Þ ð2Þ ð1Þ ð2Þ sumed as known) ðXi ; Yi Þ and ðXi ; Yi Þ, in which Xi ¼ 0:2 and Xi ¼ 0:6 as suggested by Gheorghe and Vamanu (2004b). The control variable V is computed in a similar manner: qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi p p p p VðXv1 ; Xv2 ; . . .; Xvn Þ ¼ min 1; Xv1 þ Xv2 þ . . . þ Xvm ð7:3Þ with Xvi ; i ¼ 1; 2; . . .; m the normalized indicators, computed from the physical indicators (Yvi) as: Xvi ¼ Alog10 ðYvi Þ þ B; 7.1.3 i ¼ 1; 2; . . .; m ð7:4Þ System Constituents—System State Space The previously obtained U and V variables are the control variables of the two-state multicomponent system. The behavior of such a system is a textbook matter in statistical physics, where the archetype is known as the Ising Model, which covers topics of macroscopic properties, stability issues, and phase transitions in multicomponent systems including ferromagnetism, binary alloys, and other order–disorder phenomena (Huang 1963). And although there is not an exact solution, there 7.1 Quantitative Vulnerability Assessment Method … 149 exists a variety of approximations including Bethe–Peierls solution, Bragg– Williams solution, and the Onsager solution (Gheorghe and Vamanu 2011). The solution adopted in the generic QVA for modeling vulnerability comes close to the Bragg–Williams approximation. In this approximation, the membership fractions in a two-state system can be obtained on certain assumptions for the probabilities of individual transitions between the two states (functional/ dis-functional). The interplay of the actual, ‘physical’, and potentially numerous system indicators will result in variations of the aggregated (fuzzy) parameters [U and V] which in turn will drive the system ‘state’ in and out of a region of instability. In a conventional sense, an operable system may thereby appear as: • Stable and thereby featuring a low vulnerability; • Critically unstable/vulnerable; or • Unstable and thereby featuring a high vulnerability. Beyond these regions, a system may only be found in inoperable. In the current endeavor, there is assumption that a ‘hazmat transportation’ system is made of different members or ‘atoms’ such as vehicles and drivers, people interacting with the transportation segment (permanent or in transit), traffic supportive infrastructure components such as fuel stations and service stations, traffic control and management system components such as fixed-traffic lights and surveillance cameras, and mobile–police squads and helicopter surveillance. Members of the system might also include relevant ‘special/sensitive objectives’ such as hospitals, police headquarters, and emergency unit headquarters and relevant official/administrative buildings as well as any other entity (animated or otherwise) that can be accommodated in a sound and defendable manner into a vision of a mutual interaction and cooperative behavior. This is meant to account for interdependency associated with mutual influences among different complex systems through which state of a system influences, and is influenced by, the state of other interconnected systems (Katina et al. 2014; Keating et al. 2014). This holistic approach of the QVA model requires that we get a solid metal picture of the aforementioned. The remainder of this is designed for this purpose. Additional information is provided in Appendix D. As mentioned before, a ‘member’ of the system may find itself in only two states: functional or dysfunctional. Assuming that at any given moment t, the system is characterized by M1 components in the functional state and M2 components in the dysfunctional state. Should M be the total number of the system components, then one gets: M1 þ M2 ¼ M ð7:5Þ The overall state of the system may then be described via the pair of numbers (M1, M2). The system dynamics, or ‘motion’ in its state space, will follow from variations in M1 and M2 that should be consistent with Eq. (7.5). 150 7 Physical Analogies-Based Model for Quantitative Vulnerability … Smallest transitions in the state of the system would obviously involve alterations by one unit in numbers of members of overall system: ðM1 1; M2 þ 1Þ w12 w21 ! ðM1 ; M2 Þ ðM1 þ 1; M2 1Þ w12 w21 ! ð7:6Þ The system is thus both described by the U and V parameters and by a membership fraction ς, defined as: 1¼ M1 M2 2M ð7:7Þ Essentially, ς expresses the degree to which the population of components in state 1 dominates the population of components in state 2. In other words, ς communicates the overall operability state of the system. There is an assumption that transitions are governed by the probabilities w12 and w21 as suggested by Bragg and Williams (1934): w12 ð1Þ ¼ wM1 e U1 þ V H w21 ð1Þ ¼ wM2 e U1 þ V H ð7:8Þ ð7:9Þ Equations [7.8] and [7.9] reflect the cooperative nature of transitions; indeed, the transition probabilities get higher as their target-state population (number of members in the target state) is higher. Notice to that although the transition probability w12 from state 1 ‘functional’ to state 2 ‘dysfunctional’ increases following a linear law with respect to the M1—a natural assumption, it actually decreases following exponential law with the fraction of population in state 1. Under these circumstances, the global asymptotic effect is a decrease, faster than linear, of w12 with the population in state 1 for adequate values of the model parameter Θ—which, due to the conservation of the total number of the system components (M), leads to an accelerated increase with the population of the target state 2. This rationale further consolidates the physical analogy with multicomponent, cooperative systems, by giving to Θ the meaning of a variable proportional with a sui generis temperature of the system. The tendency of this kind of systems to form, due to cooperative behavior, ‘domains’ as in ferromagnetism theory or ‘coalitions,’ as in a sociological driven language, is well known. Inside these coalitions, system members share the same state. Highly relevant to the suggested model are the following statements: • at low ‘temperatures’, the domain structure (ordered, having a ‘functional’ dominance) is wide and resilient to the external influences; • over a ‘critical’ temperature, the domain structure (ordered and functional) disappears. In this case, the system presents comparable or theoretically equal shares of ‘functional’ and ‘dysfunctional’ population; no spatial association is distinguishable; 7.1 Quantitative Vulnerability Assessment Method … 151 • under external influences (V), the system may abruptly and massively (involving a large number of population members) switch from ‘functional’ to ‘dysfunctional’. The same phenomena occur when internal interactions among members (U) get higher than a threshold value which depends on V. Therefore, the state of the system can be described by the probability density f(U, V, ς). The bounding surface of the probability density in the U, V, ς–space is given by: U 1þV th ¼21 H ð7:10Þ with th the hyperbolic tangent; Θ Temperature of the system, defined as Θ = kB * T where kB 1/273.15 = sui generis ‘Boltzmann constant’, and T the sui generis absolute temperature; Equation (7.10) defines the system state space as a cuspidal foil in U, V, ζ. This space topology varies with Θ. Space topologies for T = 1 K, T = 273.15 K and T = 1000 K are given in Fig. 7.1. The images in Fig. 7.2 are generated with the AIDRAM software as described in the Quantitative Vulnerability Assessment module (Gheorghe and Vamanu 2003). Taking the process described by Eq. (7.6), we can write the following rate (balance, master) equation for the function of distribution f(M1, M2) as: @f ðM1 ; M2 Þ ¼ w21 ðM1 1; M2 þ 1Þ f ðM1 1; M2 þ 1Þ @t þ w12 ðM1 þ 1; M2 1Þ f ðM1 þ 1; M2 1Þ ðw21 ðM1 ; M2 Þ þ w12 ðM1 ; M2 ÞÞ f ðM1 ; M2 Þ Then, the membership fraction is defined as: 1¼ M1 M2 2M So that 1¼ 1 for all 1 2; 12 ; for all 2 152 7 Physical Analogies-Based Model for Quantitative Vulnerability … Fig. 7.2 QVA model representing system phase space configurations on various T The equivalences are 1 M 1 ðM1 þ 1; M2 1Þ $ 1 þ M ðM1 1; M2 þ 1Þ $ 1 and 7.1 Quantitative Vulnerability Assessment Method … 153 This allows rewriting the master equation as: @f ð1Þ 1 1 1 1 ¼ w21 1 f 1 þ w12 1 þ f 1þ @t M M M M ðw21 ð1Þ þ w12 ð1Þ f ð1ÞÞ Next, (a) The assumption that the number M of system agents is large allows a series expansion of all quantities in the 2nd member of the master equation. Restricting the expansion to the 2nd order in (1/M), one obtains a continuity (conservation) equation for the state distribution function f, involving the ‘current’ variable J: @f @J þ ¼ 0; @t @1 with J as: J¼ 1 1 @ðw21 þ w12 Þf ðw21 w12 Þf M 2M 2 @1 (b) Looking for explicitly time independent and stationary solutions of the aforementioned equation, one gets f as: " N exp 2M f ðfÞ ¼ R1 1=2 # w21 ðnÞw12 ðnÞ w21 ðnÞ þ w12 ðnÞ dn w21 ð1Þ þ w12 ð1Þ with N being a normalizing constant. (c) The next step is to look for the extremal surface of the probability density of @f states (f), by making @f equal to zero. After a second series expansion of the result and again after restricting the series to the 2nd order of (1/M), one gets the system’s state equation as: UðfÞ þ V th ¼ 2f h ð7:11Þ Recall that the state equation defines the U, V, ζ–space of the most probable states of the system (Ursu et al. 1985). 7 Physical Analogies-Based Model for Quantitative Vulnerability … 154 7.1.4 Vulnerability Basins—The Instability Region Certainly, a transportation system may find itself (depending on U and V) inside or outside of one of the instability regions. Thus, it could be said that a functional/ operable system may be: • Stable, corresponding to a low vulnerability; • Critically Unstable corresponding to a medium vulnerability, or • Unstable corresponding to a high vulnerability. Outside these regions, a system is considered to be inoperable. The instability regions are delimited in the system state space as in Fig. 7.3. The instability regions are defined in relation with the cusp line. Again, the cusp line separates the system state space in areas characterized by: • a single, real solution ζ of Eq. (7.10); • two or three real solutions ζ of Eq. (7.10). Therefore, • The high vulnerability area (i.e., unstable system) is a section in which Eq. (7.10) presents two or more solutions. Fig. 7.3 System instability regions 7.1 Quantitative Vulnerability Assessment Method … 155 • The moderate vulnerability area (i.e., critically unstable system) is a section in which Eq. (7.10) has a single, positive solution. However, this is located at close distance to the cusp line. • The low vulnerability area (i.e., stable system) is a section in which Eq. (7.10) has a single, positive solution. Since there is no an exact analytical solution, the equation of the cusp line must be obtained through an iterative process of identifying a set of points in the system space (Gheorghe and Vamanu 2003). This follows that for each U > 0, one chooses Vc as the arithmetic mean between the last V for which system state equation has three solutions and the first V for which the same equation has only one positive solution. 7.1.5 The Quantitative Vulnerability Assessment In consideration of the above, a 0–100 ‘Vulnerability Scale’ and a Vulnerability Index may be defined based on the assessment of the system state in the (U, V)space. Hence, (a) The Vulnerability Index is given by the euclidian distance of the state (U, V) to the cusp line in the U 0; V 0 region of the (U, V)-plane. (b) The Vulnerability Index is normalized such that, everywhere on the cusp line, including its U 0; V 0 section, the Vulnerability Index is equal to 100 (i.e., reach its assumed maximum). (c) The Vulnerability Index is assumed to be 100 within the whole region defined by the cusp line and the U axis of the first (upper-right) quadrant of the system space. Consequently, Vulnerability Index is defined as: 1D Vi ¼ 100 15 with Vi the vulnerability index, D the euclidian distance between system’s state and the cusp line Notice that Eq. (7.12) implies a limitation of U and V as: 0 U 15 0 V 15 ð7:12Þ 7 Physical Analogies-Based Model for Quantitative Vulnerability … 156 The region characterized by a single and positive solution of the state Eq. (7.10) is considered as the stability region of the system. On the other hand, the region characterized by three real solutions is the instability region. The Vulnerability Index equals 100 in the instability region and decreases as the system gets further away of the cusp line. 7.2 Applying QVA Model for the Vulnerability Assessment of Transportation Corridors This section provides details on adaption of the generic QVA model for vulnerability assessment of transportation corridors. 7.2.1 Indicators Selection Indicators that describe the transportation system have been selected according to general assumptions articulated in the Sect. 7.1 above. In addition, system vulnerability may be in a direct or inverse relationship with indicator value. This is based on the indicator meaning (i.e., what the indicator expresses). Tables 7.1 and 7.2 provide a set of indicators putforward for characterizing the ð1Þ ð1Þ ð2Þ ð2Þ ð1Þ ð1Þ transportation system. Equivalent pairs XUi ; YUi XUi ; YUi and XVj ; YVj ð2Þ ð2Þ XVj ; YVj , assumed a priori known, should be provided by the analyst in the pre-assessment phase. 7.2.2 Computing the Physical Indicators—YUi and YVj Relevant physical indicators of the transportation system (external and internal) are provided in Tables 7.3 and 7.4. 7.2.3 Transportation System Vulnerability Assessment The vulnerability assessment of a transportation segment may be sketched out as follows: • get the physical indicators in every measurement point along a given transportation segment; • normalized indicators are computed according to Eqs. (7.1 and 7.3); 7.2 Applying QVA Model for the Vulnerability Assessment … 157 Table 7.1 A set of internal (fast varying) indicators Internal indicators (U-contributors) Vulnerability–indicator relationship XU1. Closest city XU2. Closest town XU3. Vegetation in measurement point XU4. Closest river XU5. Number of bridges on the current analyzed segment XU6. Closest in-land water body(including large rivers) XU7. Number of bridges over the in-land water bodies on the current segment XU8. Measurement point in a flooding-prone area XU9. Rolling infrastructure type XU10. Quality of the infrastructure type XU11. Closest airport XU12. Number of HV lines crossing the current analyzed segment XU13. Stress level of the traffic participant Inverse Inverse Direct Inverse Direct Inverse Direct Direct Direct Direct Inverse Direct Direct Table 7.2 A set of external (slow varying) indicators External Indicators (V-contributors) Vulnerability–Indicator Relationship XV1. Number of rivers within the relevance radius XV2. Number of cities in the relevance radius XV3. Number of towns in the relevance radius XV4. Number of rivers within the relevance radius XV5. Number of HV lines within the relevance radius XV6. Number of airports within the relevance radius XV7. Traffic fluency XV8. Earthquake danger level XV9. Measurement point elevation XV10. Traffic jam propensity on the current segment Direct Direct Direct Direct Direct Direct Direct Direct Direct Direct • system control parameters (U and V) are computed following Eq. (7.4); • compute transportation system vulnerability in the measurement point following Eq. (7.10). Processing all the measurement points according the aforementioned algorithms allows one to get the Vulnerability Profile of a given transportation segment together with a value of the Vulnerability Index as: PNmp Vsegment ¼ i¼1 Nmp Vi ð7:13Þ 158 7 Physical Analogies-Based Model for Quantitative Vulnerability … Table 7.3 A set of External (slow varying) indicators with computational means Internal Indicators (U-contributors) Computational means (unit) YU1. Closest city YU2. Closest town YU3. Vegetation in measurement point Effective distance (m) Effective distance (m) Discrete values depending on the vegetation type (non-dimensional) Effective distance (m) Number of intersections between the analyzed traffic segment and rivers (non-dimensional) Effective distance (m) YU4. Closest river YU5. Number of bridges on the current analyzed segment YU6. Closest in-land water body(including large rivers) YU7. Number of bridges over the in-land water bodies on the current segment YU8. Measurement point in a flooding-prone area YU9. Rolling infrastructure type YU10. Quality of the infrastructure type YU11. Closest airport YU12. Number of HV lines crossing the current analyzed segment YU13. Stress level of the traffic participant Number of intersections between the analyzed traffic segment and in-land waters (non-dimensional) Discrete values (non-dimensional) {0; 1} Discrete values depending on the rolling infrastructure type (non-dimensional) Discrete values (non-dimensional) {0; 1; 2; 3; 4; 5} Effective distance (m) Number of intersections between the analyzed traffic segment and the HV lines (non-dimensional) YU13 ¼ YU10 2þ YU9 (non-dimensional) Table 7.4 A set of external (slow varying) indicators with computational means External Indicators (V-contributors) Computational means (unit) YV1. Number of rivers within the relevance radius YV2. Number of cities in the relevance radius YV3. Number of towns in the relevance radius YV4. Number of rivers within the relevance radius YV5. Number of HV lines within the relevance radius YV6. Number of airports within the relevance radius YV7. Traffic fluency YV8. Earthquake danger level YV9. Measurement point elevation YV10. Traffic jam propensity on the current segment Effective number (non-dimensional) Effective number (non-dimensional) Effective number (non-dimensional) Effective number (non-dimensional) Effective number (non-dimensional) Effective number (non-dimensional) Number of vehicles/km (vehicle/km) Effective number (non-dimensional) Elevation to sea-level (m) Discrete values depending on the rolling infrastructure type (non-dimensional) 7.2 Applying QVA Model for the Vulnerability Assessment … 159 with Nmp the number of measurement points; Vi system’s vulnerability at measurement point i. Recall, it is assumed that the transportation corridor contains one or more transportation routes which, in turn, contains one or more transportation segments. Consequently, the vulnerability for each of the transportation routes constituent transportation corridor and is computed as: PNns Vroute ¼ j¼1 Vsegment Nns j ð7:14Þ with Nns the number of segments of the route; Vsegment_j vulnerability index of segment j and the vulnerability of the transportation corridor is given as: PNsroutes Vcorridor ¼ Vroute Nroutes l¼1 1 ð7:15Þ with Nroutes the total number of routes part of the transportation corridor (system); Vroute_l vulnerability index of route l, Summarizing, the ‘Assumption Zero’ of this model is that: critical, or otherwise complex real-life structures can be accommodated within the concept of a multi-component, multi-indicator system, the parts of which would show some kind of collective behavior by virtue of their interactions, as well as some susceptibility to external factors acting upon parts of the structure. To quantify vulnerability, for a multicomponent system, a generic model is proposed. This model provides: (a) a two-parameter description of the system and the respective equation of state, having an input of arbitrarily large number of indicators that account for internal (fast-varying) processes and external (slow-varying) forces acting upon the system and output of membership fraction indicating the proportion of system state of ‘operable’ and ‘inoperable’; 7 Physical Analogies-Based Model for Quantitative Vulnerability … 160 (b) a division of the two-parameter phase space of the system into vulnerability basins, including: a. a system stable—low vulnerability, b. a system and vulnerability critical, and c. a system unstable—high vulnerability, regions; and (c) a 0–100 Vulnerability Scale and the means to measure the respective Vulnerability Index as an operational expression of a QVA. The operative value of the QVA generic model has been tested on a variety of systems, ranging from nuclear reactors to IT systems to municipalities and districts (Gheorghe 2005). Moreover, ‘the method, algorithm, and software are generic, and are believed to accommodate a virtually unlimited variety of applications’ (Gheorghe and Vamanu 2004, p. 613). Adopting and adapting the QVA model for the transportation system case came as a natural choice that serves our declared goal of suggesting new approaches to tackle the emerging and yet not fully grasped issue of vulnerability assessment in complex and interconnected systems. References Bragg, W. L., & Williams, E. J. (1934). The effect of thermal agitation on atomic arrangement in alloys. Proceedings of the Royal Society of London. Series A, Containing Papers of a Mathematical and Physical Character, 145(855), 699–730. Gheorghe, A. V. (2005). Integrated risk and vulnerability management assisted by decision support systems: Relevance and impact on governance (Vol. 8). Dordrecht, The Netherlands: Springer. Gheorghe, A. V., Birchmeier, J., Kröger, W., & Vamanu, D. V. (2003). Hot spot based risk assessment for transportation dangerous goods by railway: Implementation within a software platform. In Proceedings of the third international safety and reliability conference (KONBIN 2003). Gdynia, Poland. Gheorghe, A. V., Birchmeier, J., Kröger, W., Vamanu, D. V., & Vamanu, B. (2004). Advanced spatial modelling for risk analysis of transportation dangerous goods. In C. Spitzer, U. Schmocker, & V. N. Dang (Eds.), Probabilistic safety assessment and management (pp. 2499– 2504). London, UK: Springer. Retrieved from http://link.springer.com/chapter/10.1007/978-085729-410-4_401 Gheorghe, A. V., & Vamanu, D. V. (2004a). Complexity induced vulnerability. International Journal of Critical Infrastructures, 1(1), 76–84. Gheorghe, A. V., & Vamanu, D. V. (2004b). Towards QVA—Quantitative Vulnerability Assessment: A generic practical model. Journal of Risk Research, 7(6), 613–628. http://doi. org/10.1080/1366987042000192219 Gheorghe, A. V., & Vamanu, D. V. (2011). Faces of resilience. In A. V. Gheorghe & L. Muresan (Eds.), Energy security (pp. 79–107). New York, NY: Springer. Huang, K. (1963). Statistical mechanics. New York, NY: Wiley. Katina, P. F., Pinto, C. A., Bradley, J. M., & Hester, P. T. (2014). Interdependency-induced risk with applications to healthcare. International Journal of Critical Infrastructure Protection, 7(1), 12–26. References 161 Keating, C. B., Katina, P. F., & Bradley, J. M. (2014). Complex system governance: Concept, challenges, and emerging research. International Journal of System of Systems Engineering, 5(3), 263–288. Risken, H. (1996). The Fokker-Planck equation: Methods of solution and applications. New York, NY: Springer Science & Business Media. Thom, R. (1975). Structural stability and morphogenesis. Reading, MA: Westview Press. Ursu, I., Vamanu, D., Gheorghe, A., & Purica, I. I. (1985). Socioeconomic risk in development of energy systems. Risk Analysis, 5(4), 315–326. Vamanu, D. V., Gheorghe, A. V., & Vamanu, B. I. (2003). On a generic model in quantitative vulnerability assessment. Romanian Journal of Physics: Supplement, 48, 229–237. Chapter 8 An Illustrative Example—The Case for Aarau-Zurich Abstract This chapter provides a real-world case scenario in which a transportation system is selected and analyzed for hot spot using basic information. 8.1 Transportation Description Name: Aara-Zurich Number of TRIPS: 3 Total Length (km): 57.1 Number of RAIL TRIPS: 1 Total Length on RAIL (km): 43.9 Number of ROAD TRIPS: 2 Total Length on ROAD (km): 13.2 Figure 8.1 is a composite rendering of complementary distribution function (CDF) for each of the TRIPS in the transportation system for Aarau-Zurich. TRIP—color correspondence TRIP: ‘S0 Aarau-Zurich 35 t’ TRIP: ‘S1 Zurich’ TRIP: ‘S2 Zurich 5 t’ 8.1.1 Graph Coordinate Axis Limits Probability Range (Y-axis): 10−11–10−4 Fatalities Range (X-axis): 100–105 The origin is in the LOWER-LEFT corner. Probability: min: 0.0000001 © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6_8 163 164 8 An Illustrative Example—The Case for Aarau-Zurich Fig. 8.1 Complementary distribution function for three trips: ‘S0 Aarau-Zurich 35 t’, ‘S1 Zurich’, ‘S2 Zurich 5 t’ max: 0.00001 Fatalities: minGreen: 10 minRed: 10 med: 1000 max: 10,000 8.1.2 Transportation Statistics • Highest Fatalities Expected: 4347 (persons) found in trip ‘S0 Aarau-Zurich 35 t’, scenario ‘3D.SCO’, at Spot #7 located at CH-1903 coordinates (672,548.404, 251,157.088). • Highest Affected Population: 71,262 (persons) found in trip ‘S0 Aarau-Zurich 35 t’, scenario ‘3E.SCO’, at Spot #8 located at CH-1903 coordinates (680,750.874, 248,963.665). • Highest Affected Area: 924.33 (ha) found in trip ‘S0 Aarau-Zurich 35 t’, scenario ‘3E.SCO’. • Highest Probability of LOC: 0.000000084545447 found in trip ‘S2 Zurich 5 t’, scenario ‘10.SCO’, at Spot #24 located at CH-1903 coordinates (685,743.189, 248,738.698). • Lowest Fatalities Expected: 0 (persons) found in trip ‘S0 Aarau-Zurich 35 t’, scenario ‘10.SCO’, at Spot #3 located at CH-1903 coordinates (648,875.958, 249,764.86). • Lowest Affected Population: 0 (persons) found in trip ‘S0 Aarau-Zurich 35 t’, scenario ‘10.SCO’, at Spot #6 located at CH-1903 coordinates (657,349.61, 249,907.447). • Lowest Affected Area: 0.22 (ha) found in trip ‘S1 Zurich’, scenario ‘5F.SCO’. 8.1 Transportation Description 165 • Lowest Probability of LOC: 0.00000000287421 found in trip ‘S2 Zurich 5 t’, scenario ‘10.SCO’, at Spot #5 located at CH-1903 coordinates (684,804.213, 246,112.307). 8.2 Representation Maps of the Transportation 8.2.1 ‘Aarau-Zurich’ TRANSPORTATION Map Representation The overall map of the transportation system is presented in Fig. 8.2, first without back maps and then with back maps. 8.2.1.1 TRIP ‘S0 Aarau-Zurich 35 t’ A detailed description of trip ‘S0 Aarau-Zurich 35 t’ is presented. A. Trip Description Type: RAIL Route Name: teza 0.rte Length: 43,925.8105825169 km Number of Scenarios: 27 The following Spot Definition Summary was used in Statistics Evaluation: Route Length of Relevance: 100 Route Objects: OR Station OR Signal OR Switch Fig. 8.2 An overall ‘Aarau-Zurich’ transportation map with ‘no back maps’ and ‘with back maps’. LEGEND RED line(s)—RAIL trip. BLACK line(s)—ROAD trip 166 8 An Illustrative Example—The Case for Aarau-Zurich Fig. 8.3 A CDF for TRIP ‘S0 Aarau-Zurich 35 t’ for every LIMITED RISK AREA Infrastructure: OR Dwelling Areas OR Dwelling Developments OR Recreational Areas OR Railway Areas/Facilities Population in the Affected Area > 1000 persons B. Trip CDF’s Figure 8.3 is a CDF rendering computed for TRIP ‘S0 Aarau-Zurich 35 t.’ Graph Coordinate Axis Limits Probability Range (Y-axis): 10−11–10−4 Fatalities Range (X-axis): 100–105 The origin is in the LOWER-LEFT corner. Probability: min: 0.0000001 max: 0.00001 Fatalities: minGreen: 10 minRed: 10 med: 1000 max: 10,000 C. Trip ‘S0 Aarau-Zurich 35 t’ Map Representation A overall map representing a trip ‘S0 Aarau-Zurich 35 t’ is provided in Fig. 8.4. D. Trip ‘S0 Aarau-Zurich 35 t’ Scenarios D.1 Scenario 10.SCO Substance: GASOLINE Mass: 3500 Area Affected: 18.1 Event Type: BLEVE Release Category: small release Number of Spots: 8 8.2 Representation Maps of the Transportation 167 Fig. 8.4 ‘S0 Aarau-Zurich 35 t’ trip map with ‘no back map’ and ‘with back maps’ D.2 Scenario 11A.SCO Substance: GASOLINE Mass: 3500 Area Affected: 30.49 Event Type: Explosion, Lung Impairment Release Category: small release Number of Spots: 8 ….. interrupt… D.27 Scenario 9G.SCO Substance: GASOLINE Mass: 3500 Area Affected: 27.63 Event Type: Pool Fire Release Category: small release Number of Spots: 8 E. Trip ‘S0 Aarau-Zurich 35 t’ Statistics • Highest Fatalities Expected: 4347 (persons) found in scenario ‘3D.SCO’, at Spot #7 located at CH-1903 coordinates (672,548.404, 251,157.088). • Highest Population Affected: 71,262 (persons) found in scenario ‘3E.SCO’, at Spot #8 located at CH-1903 coordinates (680,750.874, 248,963.665). • Highest Area Affected: 924.33 (ha) found in scenario ‘3E.SCO’. • Highest Probability of LOC: 0.000000084278018 found in scenario ‘10.SCO’, at Spot #3 located at CH-1903 coordinates (648,875.958, 249,764.86). • Lowest Fatalities Expected: 0 (persons) found in scenario ‘10.SCO’, at Spot #3 located at CH-1903 coordinates (648,875.958, 249,764.86). • Lowest Population Affected: 0 (persons) found in scenario ‘10.SCO’, at Spot #6 located at CH-1903 coordinates (657,349.61, 249,907.447). • Lowest Area Affected: 0.95 (ha) found in scenario ‘1F.SCO’. 168 8 An Illustrative Example—The Case for Aarau-Zurich • Lowest Probability of LOC: 0.000000023921421 found in scenario ‘10.SCO’, at Spot #4 located at CH-1903 coordinates (652,269.566, 250,583.355). F. Trip ‘S0 Aarau-Zurich 35 t’ Map Representation Four trip maps are rendered as follows: Current trip highlighted (yellow) in the transportation map (no background map). Current trip highlighted (yellow) in the transportation map (with background map). Current trip (no background map). Current trip (with background map). Notice that 1. The number of trip map renderings depends on whether background map is set (both for one of the transportation’s trips and the current trip). 2. Rendering the bounding box involves: (a) Transportation bounding box for transportation-related maps. (b) Trip route bounding box for trips with no background maps. (c) Trip background map bounding box for trips with background maps. 3. Hot Spots are also rendered on maps following: (a) BLUE spots: ALL the spots of the Highest Affected Area Scenario (see Section E above). Notice how this is represented in Fig. 8.5. (b) RED spot: the spot of the Highest Fatalities Expected (see Section E above). Notice how this is represented in Fig. 8.6. Fig. 8.5 Trip ‘S0 Aarau-Zurich 35 t’ (yellow) in TRANSPORTATION 8.2 Representation Maps of the Transportation 169 Fig. 8.6 Trip ‘S0 Aarau-Zurich 35 t’ alone 8.2.1.2 TRIP ‘S1 Zurich’ A detailed description of trip ‘S1 Zurich’ is presented. A. Trip Description Type: ROAD Route Name: teza 1.rte Length: 7932.75131372962 km Number of Scenarios: 27 The following Spot Definition Summary was used in Statistics Evaluation: Route Length of Relevance: 100.12453 Route Objects: OR Crossing Infrastructure: OR Dwelling Areas OR Dwelling Developments OR Industrial Enterprises OR Recreational Areas OR Street Areas OR Railway Areas/Facilities Population in the Affected Area > 1500 persons B. Trip CDF’s Figure 8.7 is a CDF rendering computed for TRIP ‘S1 Zurich.’ Graph Coordinate Axis Limits Probability Range (Y-axis): 10−11–10−4 Fatalities Range (X-axis): 100–105 The origin is in the LOWER-LEFT corner. Probability: min: 0.0000001 max: 0.00001 Fatalities: minGreen: 10 minRed: 10 med: 1000 max: 10,000 170 8 An Illustrative Example—The Case for Aarau-Zurich Fig. 8.7 A CDF for TRIP ‘S1 Zurich’ for a LIMITED RISK AREA Fig. 8.8 ‘S1 Zurich’ map with ‘no back maps’ C. Trip ‘S1 Zurich’ Map Representation A overall map representing a trip ‘S1 Aarau-Zurich’ is provided in Fig. 8.8. D. Trip ‘S1 Zurich’ Scenarios D.1 Scenario 10.SCO Substance: GASOLINE Mass: 2000 Area Affected: 11.2 Event Type: BLEVE Release Category: small release Number of Spots: 14 8.2 Representation Maps of the Transportation 171 D.2 Scenario 11A.SCO Substance: GASOLINE Mass: 2000 Area Affected: 20.62 Event Type: Explosion, Lung Impairment Release Category: small release Number of Spots: 14 … interrupt… D.27 Scenario 9G.SCO Substance: GASOLINE Mass: 2000 Area Affected: 17.25 Event Type: Pool Fire Release Category: small release Number of Spots: 14 E. Trip ‘S1 Zurich’ Statistics • Highest Fatalities Expected: 3825 (persons) found in scenario ‘3D.SCO’, at Spot #14 located at CH-1903 coordinates (684,570.055, 245,601.757). • Highest Population Affected: 50,586 (persons) found in scenario ‘3E.SCO’, at Spot #1 located at CH-1903 coordinates (681,804.598, 249,401.413). • Highest Area Affected: 635.64 (ha) found in scenario ‘3E.SCO’. • Highest Probability of LOC: 0.00000006179435 found in scenario ‘10.SCO’, at Spot #9 located at CH-1903 coordinates (684,414.449, 245,347.14). • Lowest Fatalities Expected: 0 (persons) found in scenario ‘12.SCO’, at Spot #5 located at CH-1903 coordinates (683,312.115, 248,122.57). • Lowest Population Affected: 0 (persons) found in scenario ‘1F.SCO’, at Spot #5 located at CH-1903 coordinates (683,312.115, 248,122.57). • Lowest Area Affected: 0.22 (ha) found in scenario ‘5F.SCO’. • Lowest Probability of LOC: 0.000000014818107 found in scenario ‘10.SCO’, at Spot #6 located at CH-1903 coordinates (683,360.049, 248,122.57). F. Trip ‘S1 Zurich’ Map Representation Trip maps are rendered in a sequel as follows: Current trip highlighted (yellow) in the transportation map (no background map). Current trip (no background map). Notice that 1. The number of trip map renderings depends on whether background map is set (both for one of the transportation’s trips and the current trip). 172 8 An Illustrative Example—The Case for Aarau-Zurich Fig. 8.9 Trip ‘S1 Zurich’ (yellow) in TRANSPORTATION with ‘no back maps’ Fig. 8.10 Trip ‘S1 Zurich’ alone with ‘no back maps’ 2. Rendering the bounding box is set as follows: (a) Transportation bounding box for transportation-related maps. (b) Trip route bounding box for trips with no background maps. (c) Trip background map bounding box for trips with background maps. 3. Hot Spots are also rendered on maps, as follows: (a) BLUE spots: ALL the spots of the Highest Affected Area Scenario (see Section E above). Notice how this is represented in Fig. 8.9. (b) The RED spot: the spot of the Highest Fatalities Expected (see Section E above). Notice how this is represented in Fig. 8.10. 8.2 Representation Maps of the Transportation 173 Fig. 8.11 A CDF for TRIP ‘S2 Zurich 5 t’ for a LIMITED RISK AREA 8.2.1.3 TRIP ‘S2 Zurich 5 t’ A overall map representing a trip ‘S2 Zurich 5 t’ is provided in Fig. 8.11. A. Trip Description Type: ROAD Route Name: teza 2.rte Length: 5260.29058973529 km Number of Scenarios: 27 The following Spot Definition Summary was used in Statistics Evaluation: Route Length of Relevance: 100.12453 Route Objects: OR Crossing Infrastructure: OR Dwelling Areas OR Dwelling Developments OR Industrial Enterprises OR Recreational Areas OR Street Areas OR Railway Areas/Facilities Population in the Affected Area > 1500 persons B. Trip CDF’s The following is the rendering of the CDF computed for TRIP ‘S2 Zurich 5 t’ for every RISK AREA LIMITS considered. Graph Coordinate Axis Limits Probability Range (Y-axis): 10−11–10−4 Fatalities Range (X-axis): 100–105 The origin is in the LOWER-LEFT corner. Probability: min: 0.0000001 max: 0.00001 Fatalities: minGreen: 10 174 8 An Illustrative Example—The Case for Aarau-Zurich Fig. 8.12 Trip ‘S2 Zurich 5 t’ map with ‘no back maps’ and ‘with back maps’ minRed: 10 med: 1000 max: 10,000 C. Trip ‘S2 Zurich 5 t’ Map Representation An overall map representing a trip ‘S1 Zurich 5 t’ is provided in Fig. 8.12. D. Trip ‘S2 Zurich 5 t’ Scenarios D.1 Scenario 10.SCO Substance: GASOLINE Mass: 500 Area Affected: 4.03 Event Type: BLEVE Release Category: small release Number of Spots: 24 D.2 Scenario 11A.SCO Substance: GASOLINE Mass: 500 Area Affected: 8.29 Event Type: Explosion, Lung Impairment Release Category: small release Number of Spots: 24 … interrupt… D.26 Scenario 9F.SCO Substance: GASOLINE Mass: 500 Area Affected: 0.22 Event Type: Flare Fire Release Category: small release Number of Spots: 24 8.2 Representation Maps of the Transportation 175 D.27 Scenario 9G.SCO Substance: GASOLINE Mass: 500 Area Affected: 6.27 Event Type: Pool Fire Release Category: small release Number of Spots: 24 E. Trip ‘S2 Zurich 5 t’ Statistics • Highest Fatalities Expected: 1781 (persons) found in scenario ‘3D.SCO’, at Spot #8 located at CH-1903 coordinates (684,954.938, 246,413.875). • Highest Population Affected: 22,050 (persons) found in scenario ‘3E.SCO’, at Spot #7 located at CH-1903 coordinates (684,756.655, 246,214.987). • Highest Area Affected: 255.96 (ha) found in scenario ‘3E.SCO’. • Highest Probability of LOC: 0.000000084545447 found in scenario ‘10.SCO’, at Spot #24 located at CH-1903 coordinates (685,743.189, 248,738.698). • Lowest Fatalities Expected: 0 (persons) found in scenario ‘10.SCO’, at Spot #21 located at CH-1903 coordinates (685,569.204, 248,447.66). • Lowest Population Affected: 0 (persons) found in scenario ‘5F.SCO’, at Spot #20 located at CH-1903 coordinates (685,521.269, 248,400.902). • Lowest Area Affected: 0.22 (ha) found in scenario ‘5F.SCO’. • Lowest Probability of LOC: 0.00000000287421 found in scenario ‘10.SCO’, at Spot #5 located at CH-1903 coordinates (684,804.213, 246,112.307). F. Trip ‘S2 Zurich 5 t’ Map Representation Four trip maps are rendered in the sequel as follows: Current trip highlighted (yellow) in the transportation map (no background map). Current trip highlighted (yellow) in the transportation map (with background map). Current trip (no background map). Current trip (with background map). Note that 1. The number of trip map renderings depends on whether background map is set (both for one of the transportation’s trips and the current trip). 2. Rendering bounding box is set as follows: (a) Transportation bounding box for transportation-related maps (b) Trip route bounding box for trips with no background maps (c) Trip background map bounding box for trips with background maps. 176 8 An Illustrative Example—The Case for Aarau-Zurich Fig. 8.13 Trip ‘S2 Zurich 5 t’ (yellow) with ‘no back maps’ and ‘with back maps’ Fig. 8.14 Trip ‘S2 Zurich 5 t’ map with ‘no back maps’ and ‘with back maps’ 3. Hot Spots are also rendered on maps, as follows: (a) BLUE spots: ALL spots of the Highest Affected Area Scenario (see Section E above). Notice how this is represented in Fig. 8.13. (b) The RED spot: the spot of the Highest Fatalities Expected (see Section E before). Notice how this is represented in Fig. 8.14. Appendix A Tools and Techniques for PRA and RAMs: A Primer Master Logical Diagrams Developed and intensively used in the area of nuclear power plants probabilistic risk assessment (Atwood et al. 2003; Papazoglou and Aneziris 2003), master logical diagrams (MLD) have gained wide range of applicability (Gheorghe et al. 2003, 2004). The MLD technique is suitable for modeling relationship of different independent functional blocks of complex systems that contribute to the achieving of a final goal (Gheorghe et al. 2000a). The use of an MLD heavily depends on analysis performed either in failure or in success spaces (see Sect. 3.1). Building an MLD in success space helps in depicting the way in which various functions and sub-functions of the system interact to achieve an overall system objective. Building an MLD in failure space helps in the logical representation of the causes for failure and identification of the initial disruptive events could lead into failure state. Consequently, an MLD is hierarchical, top-down (or left-to-right) rendering of initiating events, showing one or more general types of undesired events at the top (left), moving toward an increasingly detailed event description at lower tiers and displaying initiating events at the bottom (right). Event Tree Analysis Event tree analysis (ETA) is an assessment procedure which starts with an initiating event and depicts the possible sequence of events that can lead to an accident. ETA has also been described as a tool to identify all consequences of a system that have a probability of occurring after an initiating event. It has a wide range of applications including nuclear power plants, spacecraft, and chemical plants (Hong et al. 2009). Thus, ETA qualifies as an intuitive tool for developing a tractable model for important paths leading from an initial event to the end states of a given system. Similar to MLD technique, ETA has its origins in the US Nuclear Regulatory Commission risk assessment for nuclear power plants (Rasmussen 1975). The initial methodology underwent through several revisions that transformed into a © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6 177 178 Appendix A: Tools and Techniques for PRA and RAMs: A Primer more rigorous, mature, and accepted risk assessment tool in a variety of fields— public and private. At the base of ETA is an event tree (ET). An event tree is an inductive analytical diagram used for identifying various possible outcomes of a given event (i.e., initial event). An ET provides a visual representation of all the events which can occur in a system, with a precise mathematical representation associated with it. According to Bedford and Cooke (2002), an event tree is a basic modeling technique which provides an effective method of dissecting the operation of an arbitrary system or process into critical events which can then be assigned probabilities of success or failure. A brief description of the generic ET terminology, adapted for Chap. 3, is provided: • Initiating event (i.e., triggering event): The initiating event is the ET’s first level branch that precedes the rest of the events chain; • Event: An event is a branch in the ET that links one state of the system to the subsequent state. An event also encapsulates a variety of meanings. It may be an ‘actual’ event (e.g., overturning) or a system state (e.g., improperly loaded lorry), or a circumstantial state (e.g., traffic complexity level), or a human action (e.g., driver observing situation and acts accordingly), or a failure on demand; • Chance node: a branching point at which a new event is introduced in an ET. It represents a transition from one state to another. • Terminal points: the last-level branches; an outcome of the initial event is associated with each of the terminal points; thus, a terminal point corresponds to either success (e.g., accident not happening) or failure (e.g., accident happens) states of a given system. • Branch (event) probability: a likelihood of occurrence of a given event, conditional on the occurrence of previous events. • Pathway: a chain of events in an event tree beginning from an initiating event to an event of interest. Pathway probability is the joint probability of occurrence of an intersection of events belonging to the chain of events. • Full pathway: a pathway from the initial event a terminal point. • Critical pathway: a full pathway to a failure terminal point (i.e., the sequence of events that drive the system into a failure state). When a probability is computed based on an ET, one should correlate the ET diagram with the correspondent equations set for getting a holistic understanding of the computation assumptions and scheme. Figure A.1 provides a generic event tree. The following can be noted about an event tree: • An initial event is the most left on the box; • The sequence of events (i.e., system or circumstantial states, human actions or protective systems which, if occurring/fail would drive the system into a failure state) are represented in the rest of the top boxes; Appendix A: Tools and Techniques for PRA and RAMs: A Primer 179 Fig. A.1 A generic event tree • The success and failure branches are represented by solid and dotted lines, respectively, and are associated with each system state/protective/action; • The success and failure terminal points are represented by gray verses black indices. To identify the critical pathways, and hence understanding the assumptions behind the model, one should follow the solid line paths from the trigger event to the end of the event tree (left-to-right). Following denomination in Chap. 3: ki pij ð1 pij Þ qk the relative frequency of the initial event occurrence. pij is the <success>/<yes> random variable value of the j chance node; the i index relates to the associated event tree index. the <failure>/<false> random variable value of the j chance node. full pathway k probability. The final probability P{} is computed as the sum of all the critical path probabilities qk as: X Pfg ¼ qk jcritical k In turn, each qk is a product between the pij ’s corresponding to the success/failure sequence that put the system into a failure state. If one uses the event tree in Fig. A.1, then one has two critical pathways—ending at 4 and 5. Consequently: Pffailurejtrigger g ¼ q4 þ q5 with q4 ¼ ki ð1 pi1 Þ ð1 pi2 Þ pi3 ð1 pi4 Þ q5 ¼ ki ð1 pi1 Þ ð1 pi2 Þ ð1 pi3 Þ 180 Appendix A: Tools and Techniques for PRA and RAMs: A Primer and ki the relative frequency of the trigger event. To get the accident scenario logics, one should read the event tree with the Boolean algebra in mind. Thus, all events along a pathway are ANDed and all of possible outcomes are ORed. Considering Fig. A.1 and assuming that the failure event is accident, one can develop scenario accident using everyday language: ‘accident occurs if Event#1 does NOT occur AND Event#2 does NOT occur AND Event#3 occurs AND Event#4 does NOT occur; OR Event#1 does NOT occur AND Event#2 does NOT occur AND Event#3 does NOT occur. Naturally, all of these must be preceded by the initial event occurrence. Using Boolean logic, the ET equation becomes: P ¼ ki _ qk qðkjcriticalÞ with k 2 f4; 5g and q4 ¼ :pi1 ^ :pi2 ^ pi3 ^ :pi4 q5 ¼ :pi1 ^ :pi2 ^ :pi3 Notice that in order to get pij correspondent meaning, one has to refer to the graphical representation of the event tree. Life Data Analysis: Weibull Distribution Weibull analyses are used for failure rate estimation of components with non-constant failure rate. Weibull analysis, sometimes referred to as Life Data Analysis, originates from Professor Weibull (1951) theoretical paper on statistical distributions. The appreciation of this approach came later Pratt and Whitney applied in the analysis of defect data (Swingler 2014). Since then, Weibull analysis is one of the most used methodologies in reliability engineering and failure analysis. But what makes this analysis so attractive? First, and in a more ‘statistical’ jargon, one can make predictions about product life within a population by fitting a statistical distribution (i.e., Weibull) to life data from a representative population. This distribution can then be used to estimate important life characteristics of the product such as reliability or probability of failure at given time. Second, as Abernethy notes, one of the main advantages of Appendix A: Tools and Techniques for PRA and RAMs: A Primer 181 Weibull analysis is the ability to provide reasonably accurate failure analysis and failure forecasts with extremely small samples (Abernethy 2006). It is beyond the scope of this book to get into detailed description of generic Life Data Analysis process. However, there exists a plethora of literature (e.g., see, Abernethy 2006; Stamatis 2015; Swingler 2014) as well as freely online information on this subject. However, several aspects related to Weibull analysis that are relevant to failure of transportation infrastructure components are depicted. The first step in a Weibull distribution is the gathering of failure data. Failure data must be recorded as a function of time or as any other variable influencing the wear and tear of the product. The function for modeling reliability, depicted as function of time, in Weibull analysis is: t c b RðtÞ ¼ exp a ðA:1Þ with c; a and b calibration parameters, defined as: c a b location parameter, used to translate the plot along horizontal axis; the scale (characteristic life) parameter; the shape parameter. The value of b holds the information about the time evolution of the failure rate of a system. Thus, for b\1; the failure rate decreases with time, whereas for b [ 1; the failure rate increases with time (Finkelstein 2008). One may also notice that for b ¼ 1; and c ¼ 0; Eq. (A.1) yields a normal distribution. The function of failure rate given by the Weibull function is: kð t Þ ¼ b t cb1 a a Dorner (1999) also provides an online practical step-by-step tutorial of Weibull Analysis using Microsoft Excel®. References Abernethy, R. (2006). The new Weibull handbook: Reliability and statistical analysis for predicting life, safety, supportability, risk, cost and warranty claims (5th ed.). North Palm Beach, FL: Dr. Robert Abernethy. Atwood, C. L., LaChance, J. L., Martz, H. F., Anderson, D. L., Englehardt, M., Whitehead, D., et al. (2003). Handbook of parameter estimation for probabilistic risk assessment. Washington, DC: U.S. Nuclear Regulatory Commission. Bedford, T., & Cooke, R. M. (2002). Vines: A new graphical model for dependent random variables. The Annals of Statistics, 30(4), 1031–1068. 182 Appendix A: Tools and Techniques for PRA and RAMs: A Primer Dorner, W. (1999, January). Using Microsoft excel for Weibull analysis. Quality Digest. Retrieved from http://www.qualitydigest.com/magazine/1999/jan/article/using-microsoft-excel-weibullanalysis.html Finkelstein, M. (2008). Failure rate modelling for reliability and risk. London, New York, NY: Springer. Retrieved from http://link.springer.com/chapter/10.1007/978-1-84800-986-8_1 Gheorghe, A. V., Birchmeier, J., Kröger, W., & Vamanu, D. V. (2003). Hot spot based risk assessment for transportation dangerous goods by railway: Implementation within a software platform. In Proceedings of the Third International Safety and Reliability Conference (KONBIN 2003). Gdynia, Poland. Gheorghe, A. V., Birchmeier, J., Kröger, W., Vamanu, D. V., & Vamanu, B. (2004). Advanced spatial modelling for risk analysis of transportation dangerous goods. In C. Spitzer, U. Schmocker, & V. N. Dang (Eds.), Probabilistic safety assessment and management (pp. 2499– 2504). London, UK: Springer. Retrieved from http://link.springer.com/chapter/10.1007/978-085729-410-4_401 Gheorghe, A. V., Grote, G., Kogelschatz, D., Fenner, K., Harder, A., Moresi, E., et al. (2000a). Integrated risk assessment, transportation of dangerous goods: Case study. Zurich, Switzerland: Target: Basel-Zurich/VCL. ETH KOVERS. Hong, E.-S., Lee, I.-M., Shin, H.-S., Nam, S.-W., & Kong, J.-S. (2009). Quantitative risk evaluation based on event tree analysis technique: Application to the design of shield TBM. Tunnelling and Underground Space Technology, 24(3), 269–277. Rasmussen, N. C. (1975) Reactor safety study. An assessment of accident risks in U. S. commercial nuclear power plants. Executive Summary. WASH-1400 (NUREG- 75/014). Rockville, MD, USA: Federal Government of the United States, U.S. Nuclear Regulatory Commission. Papazoglou, I. A., & Aneziris, O. N. (2003). Master logic diagram: Method for hazard and initiating event identification in process plants. Journal of Hazardous Materials, 97(1–3), 11–30. Stamatis, D. H. (2015). Quality assurance: Applying methodologies for launching new products, services, and customer satisfaction. Boca Raton: CRC Press. Swingler, J. (2014). The physics of degradation in engineered materials and devices: Fundamentals and principles. New York, NY: Momentum Press. Weibull, W. (1951). A statistical distribution function of wide applicability. Journal of Applied Mechanics, 18, 293–297. Appendix B Design Guidelines for Hazmat Transportation Decision Support Systems Conceptual Landmarks Fundamentally, decision making is a process that implies: 1. Tackling objectives from different standpoints, sometimes divergent, or even antagonist; 2. Working with large and sometimes ambiguous and huge volumes of data, information, and knowledge; 3. Involving complex computational processes; and 4. Communicating the results in a variety of forms to relevant stakeholders who tent to come from a different perspective than that of analysis/academic. An executive expression of these issues involves Decision Support Systems (DSS). A DSS, at a basic level, addresses a specific issue and offers (1) instruments for assessing the consequences of different actions and (2) ways and means for ‘seeing’ the results of the assessment in a relevant manner that helps in choosing the best (optimal) solution to the decision maker. DSS complements human decisional capabilities with the computational power of machines. In fact, there should always be a cooperative relationship between the human factor and the power of DSS. On the one hand, humans are characterized by the unique capability of reasoning, while on the other, machines provide faster data manipulation and computational processes. Hence, it has been suggested that machine offers assistance to the human decision maker to create a system that considers the best of both aspects situations (Emery 1987). Certainly, these ideas are not new and can be found in many different fields including sociotechnical principles (Cherns 1987; Clegg 2000; Pyne 1997). It has been noted that there can be a relative confusion when it comes to the definition of a DSS (Louw 2002). Most ambiguity originates from different names of DSS that are provided by different scientific communities in relation to software tools designed for decision making. It appears that terms such as Management Information System; Strategic Information System; Expert System; Intelligent Decision Support System; and Decision Support System are applied interchangeably at methodological and application levels. © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6 183 Appendix B: Design Guidelines for Hazmat Transportation … 184 In this section, we attempt to provide clarification in reference to current research. A generic characterization of a DSS involves (Keen 1980): • It is a useful tool for manipulating large quantities of information and computational processes in order to provide relevant information in decision-making processes. A DSS should be seen as a tool which, under total control of the decision maker, carries out complex data processing and computational tasks, thus allowing the decision maker to focus on the non-formalizable aspects of the decision-making process. • DSS is a dedicated tool for providing support in solving a specific problem. It is designed to address a specific decision-making process. The functionality of a DSS must be consistent with the environment in which the analysis takes place. • The DSS will not solve the problem. The DSS should assist the decision maker by: – facilitating the analysis of the consequences of all the alternatives; and – facilitating in choosing the optimal solution. • A DSS is not a ‘black box.’ The structure and functionality of a DSS should allow the decision maker to understand phenomena being investigated as well as the logic behind the assessment procedure. In a case of user interface, system should be able to provide relevant information in every step of the assessment process. With respect to the implemented tasks, DSSs can be classified by the following taxonomy (Power 2002): • • • • • Communication-driven DSS; Data-driven DSS; Document-driven DSS; Knowledge-driven DSS; Model-driven DSS. Data-driven DSS (Data-oriented DSS) and model-driven DSS (Model-based DSS) are relevant to decision making in hazmat transportation. These are described in Table B.1. Table B.1 Two types of DSS relevant for transportation of hazmat DSS type DSS description Data-oriented DSS The purpose of such a system is to provide the ‘traditional’ data processing capabilities (query-based) as well as new ways of information visualization and analysis (data-mining). When combined with visual, interactive interfaces, these systems are a powerful tool for getting insights into large quantities of data. This type of DSS is mainly used in the visual analytics and visual reasoning realm (Thomas and Cook 2005) These systems are used for assessing consequences of various actions (choices of decision maker) and/or events that are not a choice of the decision maker (e.g., tsunami risk following an earthquake). Implementation of such systems requires the development of a set of mathematical models for simulating the behavior of the system or phenomenon under scrutiny (Makowski 1994) Model-based DSS Appendix B: Design Guidelines for Hazmat Transportation … 185 Mathematical models are a constituent part of the DSS. The models are developed for the part of the decision-making process that can be formalized. Naturally, a special attention is given to the validity of the model. One of the necessary conditions in having a proper model is gathering, processing, and verification of the data specific to the assessed process/phenomenon. In respect to their role, a model-based DSS may be classified into two classes: descriptive (predictive) and prescriptive. A descriptive DSS is generally used for the behavioral prediction of the system. The core of the descriptive systems is simulation models. A simulation model takes input as an alternative (decision variable) and provides as output as consequences of given alternatives. Hence, this technique is suitable for comparative assessment of already-known alternatives. Conversely, a prescriptive system has the role of providing the information related to different choices that would drive the behavior of the system in a desired direction. Prescriptive DSS is based on optimization techniques. The input in this case is minimizing/maximizing the objective and the output is a set of alternatives that would lead toward the proposed goal. Therefore, one can conclude that a descriptive DSS provides a response to ‘… what would happen if … while prescriptive DSS as providing the decision-maker ‘a set of optimal actions in order to …’ DSS Architecture There is no one generic recipe for the architecture of a decision support system. However, there are several characteristics common to all architecture. From a functional requirements perspective, a DSS must provide capabilities related to control of the environment, control of phenomenology, control and management of data, and control the assessment tools (Gheorghe 2005). Control of the environment (i.e., theater of action) is acquired through the use and implementation of geographical information system (GIS). The role of a GIS is to provide spatial information relevant to the analysis process and to allow visual and geographical representation of the analysis results. The relationship between GIS and DSS has implications for the analysis. First, one needs to keep in mind that GIS engine is responsible for visual rendering of maps and performing spatial analysis tasks and second, in the importance of the GIS datasets. Such datasets provide description in numerical format and offer additional information characterizing the map features such as roads, land use that are relevant in DSS. Nowadays, there is a plethora of GIS solutions on the market, both open-source and proprietary. The main issue when it comes to implementing such a system into a DSS is the access to the geographical data which, in most of the cases, is restrictive. Moreover, due to the inherent complexity of such spatial databases and the costs of developing, processing and maintaining of the datasets, all geographical areas might not be covered in one commercial dataset. Consequently, implementation of a 186 Appendix B: Design Guidelines for Hazmat Transportation … versatile GIS, capable of consuming (i.e., use maps and perform statistics) from virtually any source, is strongly recommended, especially when the DSS is oriented toward real-time crisis management. This is also recommended for DSSs intended to cope with scenarios located virtually ‘anywhere in the World’ – i.e. the theatre of action is not spatially confined (as it is the case of a single city/area). Authors do not suggest that the use of professional and comprehensive databases should be discouraged. On the contrary, what is suggested is to use any information sources available and not be limited by specific datasets. However, one must note that commercial datasets might not be available and, when available, they might not cover the system/location of interest or the data provided (i.e. features) might not be suitable/enough for the models employed. Control of the phenomenology is acquired by a modular architecture of the DSS. This enables the potential of enriching the assessment capabilities by plugging-in new modules that serve different tasks. It is recommended to have a centralized manager of system resources who can access to different modules. It is essential to ensure that different modules of the DSS are able to interact, whenever necessary, to ensure functionality of other modules. Control and management of data assumes the existence of data libraries holding information relevant to the assessment models. In designing a DSS, the implementation of the modules capable of managing these resources should also be considered. In most cases, the higher the complexity of the implemented mode, the more difficulties one will have in the subsequent assessment process. In this case, if there is a need, use a user-friendly and intuitive interface. This is an issue that is handled under controlling the assessment tools in which the design purposely considers model complexity beforehand. It is also recommended provide the end user with all necessary details regarding the assessment model and the results in different phases of the assessment. The four basic characteristics of a DSS architecture are presented in Fig. B.1. Interestingly, the Model Base bares the main responsibility with respect to quality Fig. B.1 Basic constituents of a DSS Appendix B: Design Guidelines for Hazmat Transportation … 187 of the assessment. However, notice that the results provided may be irrelevant and even wrong if the input from the GIS engine and the Database is incorrect. Moreover, both, at the input and the output of the Models Base, the geographical and physical databases provide (1) data required for the assessment and (2) the communication platform of the results. GIS Relevance in Hazmat Transportation DSS S. Panwhar states that a GIS is a computer-based tool for ‘mapping and analyzing things that exist and events that happen on earth’ (Panwhar et al. 2000). GIS technologies bring together database capabilities (i.e., queries and statistics) and the benefit of mapping and spatial analysis provided by maps. These characteristics make the difference between GIS and any other kind of information communication system. Certainly, GIS provides a set of tools that can be used in planning, decision making, and operational management; also, GIS-based systems have a variety of applications, targeting fields such as land-use management, global-warming impact, regional and urban planning, environmental risk assessment, hazard management, emergency preparedness and response, market studies, and agriculture (Goodchild 2010). In the particular field of transportation planning and optimal routing for hazmat transportation, GIS-based approach is indispensable since it offers a variety of information (e.g., geographic, political, environmental) pertinent to validity of the assessment process. A functional GIS integrates five key components: hardware, software, data, population, and analysis methods (Panwhar et al. 2000). Notice that under this approach, data and population are seen as distinctive entities. This reasoning suggests that one might conclude that GIS has only four key components since information about population could be considered as data. GIS technologies have been intensively used alongside DSS to support decision making. As a direct consequence, the term Spatial Decision Support Systems has been introduced to suggest GIS that also accommodates DSS characteristics (Gheorghe 2005; Vamanu 2006). GIS has the unique characteristic of providing not only mapping capabilities but also powerful analysis tools which can support operations of complex operations in a natural and intuitive manner (Rajamani 2002). Taking advantage of a GIS ensures that the DSS becomes flexible and more powerful. The combination of GIS and DSS also leads to an improved access and communication of information. Rather than simply being selectors of predefined alternatives, a decision maker becomes an active participant in the analysis process (Rajamani 2002). 188 Appendix B: Design Guidelines for Hazmat Transportation … There are several advantages for using software platforms for risk and vulnerability assessment. In the area on hazmat transportation, especially GIS–DSS implementation, it can be said that: (a) GIS can serve input data provider as well as a platform for results visualization and communication (b) functional and operational coupling of the spatial data and models with computational modules (c) Provides various analysis techniques oriented toward decision-making processes. In a GIS, spatial information is kept in two formats: vector and raster. The vector data are entities defined in an orthogonal x–y space or x–y–z for three-dimensional systems. The raster data are saved in a cell matrix that forms a grid. There are advantages and disadvantages associated with each format and selecting is based on the type of information being carried and the application consumes the information. In a vector-based layer, the geographic entities are given by points, lines, and polygons, with or without holes. The location of an object is given by its x– y coordinates while a line is defined by a sequence of points. A polygon is defined as a closed sequence of points. Points, lines, or polygons that are contained in a given map are known as features while a set of attributes, numerical or linguistic data, corresponds to each feature. A raster layer holds information in a cell matrix (rectangular grid). If the information is in a form of an image, a cell is named a pixel. Grids are organized in lines and columns. Each cell is associated with a set of attributes such as land use and elevation. Satellites and aerial photographs represent examples of raster layers. In recent times, there has been increased interest in developing transportation management systems and as a result, developers of GIS-based systems have introduced transportation risk-oriented capabilities into GIS platforms. Such products are collectively known as transportation GIS (Mainguenaud 2000). Transportation GIS (GIS-T) provides the shortest path between source and destination by the optimization of a set of objectives (e.g., distance, exposed persons). Another class of GIS-T has been developed to address scheduling problems. In this case, optimization techniques are also used in assessment. In this case, a time dimension is added in the optimization parameters. GIS-T systems are now widely used and implemented in many commercial positioning systems such as GPS— Global Positioning System. Data Relevance in Hazmat Transportation DSS Any item or chemical which, when being transported or moved, is a risk to public safety or is an environmental hazard, and is regulated by one or more of the following organizations (HMCRP 2011): Appendix B: Design Guidelines for Hazmat Transportation … • • • • • 189 US Department of Transportation; Hazardous Materials Regulations; International Maritime Organization; International Maritime Dangerous Goods; International Air Transport Association; Dangerous Goods Regulations; International Civil Aviation Organization; Technical Instructions; and US Air Force ‘INTERSERVICE’ Manual, Preparing Hazmat for Military Air Shipment. Hazmat also includes any item or chemical which is reportable or potentially reportable or noticeable as inventory under the reporting requirements of the Hazardous Chemical Reporting or as an environmental release under the reporting requirements of the Toxic Chemical Release Reporting: Community Right To Know. Hazmat includes chemicals with special characteristics which suggest that they can cause harm to people, plants, or animals when they are released through spilling, leaking, pumping, pouring, emitting, emptying, discharging, injecting, escaping, leaching, dumping, or disposing to environment. This includes abandoned, discarded barrels, and containers that might contain harmful chemicals. In the USA, the Hazardous Materials Information Resource System (HMIRS) is a Department of Defense to serve as a central repository for Material Safety Data Sheets (MSDS) for the United States Government military services and civil agencies. It also contains value-added information input by the service/agency focal points (HMCRP 2011). The value-added data include HAZCOM warning labels and transportation information. The system assists federal government personnel who handle, store, transport, use, or dispose of hazardous materials. Given the sensitive matter of transportation of such goods, access to such data is restricted. Nevertheless, the availability of such data in DSS analysis is critically in the validity of GIS-based approach. In fact, information regarding incident where a release or a suspected release of a hazardous material has taken place in transportation is freely available online (see, e.g., PHMSA—Pipeline and Hazardous Materials Safety Administration). The Models The models implemented in a DSS must reflect objectives and the assessment type for which the application has been developed. In the particular case of hazardous materials transportation, a descriptive DSS that would also follow the assessment methodology in the previous chapters should contain a set of models that mainly target: 190 Appendix B: Design Guidelines for Hazmat Transportation … • Probability assessment for loss of containment accident; • Consequence assessment of such an accident (i.e., environmental, economic, and health) impact of hazardous material release; • Risk assessment by combining the results probability and consequence. It is important to note that a simple collection of valid models that describe the effects of loss of containment (fire, explosion, and toxicity) is far from being enough to constitute a DSS. A decision-support system is always an inseparable blending of models and dedicated software. Moreover, the results do not offer the final decision. A decision maker still has to make a choice based on the results of the model. References Cherns, A. (1987). Principles of sociotechnical design revisted. Human Relations, 40(3), 153–161. Clegg, C. W. (2000). Sociotechnical principles for system design. Applied Ergonomics, 31(5), 463–477. Gheorghe, A. V. (2005). Integrated risk and vulnerability management assisted by decision support systems: Relevance and impact on governance (Vol. 8). Dordrecht, The Netherlands: Springer. Goodchild, M. F. (2010). Twenty years of progress: GIScience in 2010. Journal of Spatial Information Science, 2010(1), 3–20. http://doi.org/10.5311/JOSIS.2010.1.32 HMCRP. (2011). Guidebook for conducting local hazardous materials commodity flow studies. Washington, DC: Transportation Research Board. Keen, P. G. W. (1980). Decision support systems: A research perspective (Sloan WP No. 1117-80 No. CISR No. 54). Cambridge, MA: Massachusetts Institute of Technology. Retrieved from http://dspace.mit.edu/handle/1721.1/47172 Louw, R. E. (2002). Information systems analysis 488: Decision support systems (No. 1074205). St. Louis, MO: University of St. Louis. Retrieved from http://www.umsl.edu/*sauterv/ analysis/488_f02_papers/dss.html Mainguenaud, M. (2000). Query models and languages for geographical information systems. In R. Laurini (Ed.), Advances in visual information systems (pp. 511–520). Berlin: Springer. Makowski, M. (1994). Design and implementation of model-based decision support systems (No. WP-94-86) (p. 39). Laxenburg, Austria: International Institute for Applied Systems Analysis. Retrieved from http://www.iiasa.ac.at/publication/more_WP-94-086.php Panwhar, S. T., Pitt, R., & Anderson, M. D. (2000). Development of a GIS-based hazardous materials transportation management system: A demonstration project (No. UTCA Report 99244) (p. 43). Tuscaloosa, AL: University Transportation Center for Alabama. Power, D. J. (2002). Decision support systems: Concepts and resources for managers. Westport, CT: Quorum Books. Pyne, J. C. (1997). A sociotechnical systems analysis of the approval process for a complex public works proposal. United States, Virginia: Old Dominion University. Appendix B: Design Guidelines for Hazmat Transportation … 191 Rajamani, J. (2002). Siting obnoxious facilities using an integrated GIS-DSS (No. CE394K). West Sussex, UK: Persona Associates. Retrieved from http://www.persona.uk.com/barnfield/ NBAF_documents/NBAF-2-4.pdf Thomas, J. J., & Cook, K. A. (Eds.). (2005). Illuminating the path: The R&D agenda for visual analytics. Richland, WA: IEEE Press. Vamanu, B. I. (2006). Managementul riscurilor privind transportul substanţelor periculoase: aplicaţii ale sistemelor dinamice complexe (Dissertation). Universitatea Politehnica Bucureşti, Facultatea de Chimie Aplicată şi Ştiinţa Materialelor, Catedra de Inginerie Economică, Bucureşti. Appendix C Implementation Guideline for Hazmat Transportation DSS This appendix covers guidelines for developing an integrated software platform for risk and vulnerability assessment in the transportation of hazardous materials. The intent is to ensure support for developing real-world applications. Appendix B discusses architecture addresses for implementation of a prescriptive DSS-T that would accommodate models for risk and vulnerability assessment methods. In this appendix, focus is placed on functional characteristics of such an application. Note that implementation solutions such as database engine, programming languages are not the subject of this appendix. The role of the proposed DSS is in essence to address risk and vulnerability assessment for hazmat transportation from the new approach in the quantitative risk assessment (Gheorghe et al. 2000a) based on the societal risk computation by taking into account loss of containment accident occurrence frequency, loss of containment consequence assessment, as well as spatial (geographical) information that characterizes a transportation segment. Furthermore, the system would accommodate a novel vulnerability assessment perspective and thus providing the capability of a more comprehensive characterization of the transportation system by introducing components that are typically considered to be external to process under examination. In the software design perspective, N-Layer architecture is proposed and thus being subject to separation-of-concerns principle. DSS-T: Architecture and Constituent Blocks Functional requirements for the proposed DSS-T model follow the generic DSS structure described in Sect. B.2 and the accompanying Fig. B.1 and supportive of Vamanu (2006) research. A four-layer architecture is proposed, each with the following constituents: © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6 193 194 Appendix C: Implementation Guideline for Hazmat Transportation DSS The Data Layer The data layer is located at the persistence storage part of the DSS. Usually, a database server is implemented at this level. The purpose of the database server is to hold various required model input data and to save the results of assessment processes. It is beyond the scope of the current book to recommend particular database technology or even a database design. However, we suggest three of the most popular relational database management systems (RDBM) available that could be used for implementing DSS-T: MySQL, PostgreSQL, and Microsoft SQL Server. Consistent with the statement that a DSS is as good as the level up to which it serves its purpose, even a simple, text-file system-based approach might be suitable for implementing. An RDBM for DSS-T database system should contain chemicals and geographical (spatial information) databases. Figure C.1 shows a basic structure of the proposed model for DSS-T architecture. Certainly, the chemicals database is an essential component of the DSS-T. The data are indispensable to both developing the scenarios source term and performing consequence assessment of a LOC accident. The information required during the source terms definition is related to the possible outcomes of a LOC event involving a specific chemical, which entails a relevant selection of the consequence assessment models. An LOC consequence assessment model should make an intensive use of chemical physical characteristics (e.g., specific heat, combustion heat) in the physical effects computational phase. Also, in order to perform health impact, Fig. C.1 DSS-T architecture and the constituent blocks Appendix C: Implementation Guideline for Hazmat Transportation DSS 195 Table C.1 A list of information required for a chemicals database Physical characteristics Molar mass Boiling temperature Latent heat vapors Specific heat liquid Combustion heat Vapor pressure at 4 °C IDLH TLV STEL ERPG 1, 2, 3 Probit a, b, n Unit (kg/kmol) (°C) (kJ/kg) (kJ/kg/K) (kJ/kg) (mm Hg) (mg/m3) (mg/m3) (mg/m3) (mg/m3) Physical effect model Fire Pool Jet BLEVE Explosion Acute intoxication x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x which is quantified in lethality number, the models employed require the probit coefficients such as described in Sect. 4.1. The de minimis information, as represented by the x, that should be included in the chemicals database is depicted in Table C.1. This table portrays relationship between the different models in Chap. 4 and the chemical-specific characteristic. Another required database is the spatial database. Similar to the chemicals database, specifications regarding data format and selection of effective GIS technologies are beyond the scope of the current discussion. However, several remarks are made concerning spatial information required for implementing DSS-T as well as recommendations about publicly available data sources. Spatial information required for an operational implementation of the models in the previous chapters is given in Table C.2. Name for each of the spatial data sources in the format [identifier_sd] is provided for further reference. Naturally, one should not consider that the given data source in Table C.2 will be found in a single spatial dataset (e.g., one shapefile). Rather, and as in most cases in real-case applications, these data will be a collection of datasets in different formats, covering different spatial areas, with different scales. Consistent with the abstraction level of introducing a GIS-T, names are just an indication about the role of the information contained. Spatial Data Resources The following is a list of available online resources that may serve as primary datasets for developing a GIS-T. Selection and use of these resources is optional. However, the reminder of this appendix addresses the development of GIS-T based on information available in one or more of these resources. 196 Appendix C: Implementation Guideline for Hazmat Transportation DSS Table C.2 Spatial information required for a spatial database Database elements Features Source format Geographical Elevations Land-use Hydrology (lakes, reservoirs, rivers, floodable areas) [elv_sd] [lu_sd] [inw_sd] [riv_sd] [fa_sd] [eq_sd] [roadnet_sd] [railnet_sd] [sicroad_sd] [sicrail_sd] [hvnet_sd] [admin_sd] [popplaces_sd] [popdens_sd] Infrastructure Administrative Census Seismic areas Road network Railroads network Sensitive infrastructure components (road) Sensitive infrastructure components (rail) High-voltage network Administrative boundaries (country, region, etc.) Populated places Population density First, it is important to consider copyright terms, usage, and references when developing the application. There are specific terms to each of the resources and they are often available online. Natural Earth – Relevant Web site: http://www.naturalearthdata.com/ Natural Earth (NE) is one of the most comprehensive and freely available spatial datasets to data. NE started in 2008 as a project and was built through a collaboration of many volunteers with the support of NACIS—North American Cartographic Information Society. Natural Earth acts like a hub for a plethora of raster and vector data. The datasets are provided at three scales: 1:10, 1:50, and 1:100 km. There are several advantages associated with Natural Earth. However, one of the most completing advantages is the handiness of immediate data usability. This is given by both the data formats and geographic projection where: – All vector data are in ESRI shapefile format; – All raster data are in georeferenced TIFF format; – All data use the latitude–longitude geographic coordinate system in WGS84 datum. Other key features include the use of thematic themes which are grouped in three classes: cultural, physical (vector), and raster. ‘Terms of use’ is another great advantage of Natural Earth data. NE allows one to use the maps in any manner, including modifying the content and design, electronic dissemination, and offset Appendix C: Implementation Guideline for Hazmat Transportation DSS 197 Table C.3 Relevant features of natural earth pertinent to current research Themes Description Cultural Countries—holding political (country) border lines; available at 1:10, 1:50, and 1:110 scales First-order admin—holding provinces, states, etc., depending on each National administrative organization; available 1:10 and 1:50 scales Populated places Urban areas Rivers and lakes centerlines—available at 1:10, 1:50 and 1:110 scales Lakes Physical printing. Errors, if found in the data, can also be reported to NE. In the present research, Natural Earth relevant themes are provided in Table C.3. The Natural Earth Web site offers a more compressive listing of available data and ‘Use of Terms.’ The Digital Chart of the World/Vector Map Level 0 Availability There is no longer an official Digital Chart of the World download location. However, Digital Chart of the World (DCW) used to be freely available for download at ESRI and Penn State University—currently unavailable. However, DCW dataset on compact disk (CD) format is available for purchase from various online vendors such as www.geocomm.com. Vector Map (VMAP) Level 0 datasets are available on NIMA ftp sites; a more convenient way of downloading the data is through a third-party Web site (e.g., www.mapAbility.com). mapAbility also provides a valuable resource for VMap 0 datasets installation as well as several visualization software packages. The VMap Level 0 original format is VPF. However, a more ‘ready-to-use’ ESRI shapefile format may be found on GISLAB (http://imincik.github.io/gis-lab/). Description DCW is probably the most comprehensive GIS global database publicly available. It was originally developed by ESRI for the United States Defense Mapping Agency (DMA) using DMA’s Operational Navigation Chart (ONC) series that is a primary source. The scale of the coverage is 1:1,000,000. The DCW utilizes the Vector Product Format (VPF) georelational data model. Detailed information on DCW specifications can be found in MIL-D-89009 (Defense Mapping Agency 1992). 198 Appendix C: Implementation Guideline for Hazmat Transportation DSS DCW was last updated in 1992. It has been followed by the improved versions in 1997 (VMAP Level 0 and Level 1). In the ‘airfields’ metadata section of the USGS Global GIS, it states that ‘… Vector Map (VMap) Level 0 database represents the third edition of the Digital Chart of the World. (…) VMap Level 0 is a comprehensive 1:1,000,000 scale vector basemap of the world. It consists of cartographic, attribute, and textual data stored on compact disk read only memory (CD-ROM)’ (http://webgis.wr.usgs.gov/globalgis/metadata_qr/metadata/airfields. htm#t3). Both DCW and VMap use decimal degrees in geographic coordinates as well as the WGS84 datum. The thematic layers available in VMap are: Political/Oceans, Populated Places, Railroads, Roads, Utilities, Drainage, Drainage-Supplemental, Hypsography, Hypsography-Supplemental, Land Cover, Ocean features, Physiography, Aeronautical, Cultural Landmarks, Transportation structure, Vegetation, and Data Quality (Snyder 1987). In current research, the VMap may be a source for: [lu_sd], [inw_sd], [riv_sd], [fa_sd], [roadnet_sd], [railnet_sd], [hvnet_sd], [admin_sd], [popplaces_sd]. Global Earthquake Intensity Zones Map—Global Seismic Information Network – Relevant Web site: http://www.pdc.org/ Global Earthquake Intensity Zones (GEIZ) map is world coverage of earthquake intensity zones. The map was produced by the United Nations Environmental Program/Global Resource Information Database (UNEP/GRID) in 1994 on the basis of the World Map of Natural Hazards, published by Munich Reinsurance Company—Geoscience Research Group (Munich Re) in 1988. It is available through the Global Seismic Information Network (GSIN) of the Pacific Disaster Center. Relevant dataset is available at http://www.pdc.org/geodata/world/ earthquake_zones.zip and the dataset is in the ESRI shapefile format. The map of GEIZ classifies earthquake risk into several classes based on the Mercalli intensity scale. Mercalli intensity scale (MM) is a seismic scale used for measuring the intensity of an earthquake. The Mercalli scale quantifies the effects of an earthquake on the Earth's surface, humans, objects of nature, and man-made structures on a scale from I (not felt) to XII (total destruction). Table C.4 provides classification of GEIZ and the corresponding MM levels. USGS Gtopo-30 and SRTM-30 GTOPO30 is a global digital elevation model (DEM) with a horizontal grid spacing of 30 arcsec (approximately 1 km). GTOPO30 is a product of the US Geological Survey (USGS). Appendix C: Implementation Guideline for Hazmat Transportation DSS 199 Table C.4 GEIZ earthquake classification along with corresponding MM grades GEIZ class Corresponding MM grades Zone 0 V (five) and below Zone 1 Zone 2 Zone 3 Zone 4 Zone 10 MM grade effects description I. Not felt except by a very few under especially favorable conditions II. Felt only by a few persons at rest, especially on upper floors of buildings III. Felt quite noticeably by persons indoors, especially on upper floors of buildings. Many people do not recognize it as an earthquake. Standing motor cars may rock slightly. Vibrations similar to the passing of a truck. Duration estimated IV. Felt indoors by many, outdoors by few during the day. At night, some awakened. Dishes, windows, doors disturbed; walls make cracking sound. Sensation such as heavy truck striking building. Standing motor cars rocked noticeably V. Felt by nearly everyone; many awakened. Some dishes, windows broken. Unstable objects overturned. Pendulum clocks may stop VI (six) VI. Felt by all, many frightened. Some heavy furniture moved; a few instances of fallen plaster. Damage slight VII (seven) VII. Damage negligible in buildings of good design and construction; slight to moderate in well-built ordinary structures; considerable damage in poorly built or badly designed structures; some chimneys broken VIII (eight) VIII. Damage slight in specially designed structures; considerable damage in ordinary substantial buildings with partial collapse. Damage great in poorly built structures. Fall of chimneys, factory stacks, columns, monuments, walls. Heavy furniture overturned IX (nine and IX. Damage considerable in specially designed structures; above) well-designed frame structures thrown out of plumb. Damage great in substantial buildings, with partial collapse. Buildings shifted off foundations X. Some well-built wooden structures destroyed; most masonry and frame structures destroyed with foundations. Rails bent XI. Few, if any (masonry) structures remain standing. Bridges destroyed. Rails bent greatly XII. Damage total. Lines of sight and level are distorted. Objects thrown into the air Additional zone indicating main waterbodies The dataset was developed over a three-year time span and ended in 1996 and is an international collaborative effort led by USGS’s Center for Earth Resources Observation and Science (EROS) and involved the National Aeronautics and Space Administration (NASA), the United Nations Environment Program/Global Resource Information Database (UNEP/GRID), the US Agency for International 200 Appendix C: Implementation Guideline for Hazmat Transportation DSS Development (USAID), the Instituto Nacional de Estadistica Geografica e Informatica (INEGI) of Mexico, the Geographical Survey Institute (GSI) of Japan, Manaaki Whenua Landcare Research of New Zealand, and the Scientific Committee on Antarctic Research (SCAR). USGS datasets are available for download by tiles at: http://eros.usgs.gov/#/Find_Data/Products_and_Data_ Available/gtopo30_info. SRTM-30 is an improved version of GTOPO30. SRTM30 documentation (ICESat 2015) notes that ‘SRTM30 is a near-global digital elevation model (DEM) comprising a combination of data from the Shuttle Radar Topography Mission, flown in February, 2000 and the U.S. Geological Survey’s GTOPO30 data set.’ This dataset resulted from collaborative efforts of NASE, National Geospatial-Intelligence Agency (NGA) and participation of the German and Italian space agencies. The SRTM-30 dataset is available for download at: http://dds.cr. usgs.gov/srtm/version2_1/SRTM30/. SRTM-3 dataset is available for download at: http://dds.cr.usgs.gov/srtm/version2_1/SRTM3/. SRTM-3 is a higher resolution version of SRTM-30. The coverage resolution is three arc-seconds. Concluding this section is Table C.5 which highlights spatial information required for building a GIS-T along with articulated data sources. Thus far, the following remarks can be made: First, one should notice that all the information required for assessment is not directly available in spatial databases. This suggests that there is need to obtain data from different venues, applying various analytical and/or geoprocessing models with some assumptions. For example, there is no dataset for floodable areas. However, one could use a ‘naïve’ approach that utilized [fa_sd]. This naïve approach would include generating a new polygon feature shapefile by buffering the line shapefile representing rivers with a 30-m threshold. Another approach would be a much more complex model that uses ETOPO-3 dataset and ‘flood’ the neighboring zones of a river up to a given flooding height, followed by taking the fingerprint of the flooded areas and creating a raster dataset. There is a need to address heterogeneous character of various spatial datasets. This is reflected in both the spatial information (i.e., the different geographic projections, datum) and the features datasets (e.g., two data sources targeting populated places may have the name of the cities in data fields [NAME] and [NAM]). This information must be ‘brought to a common denominator’ in order to be properly used in assessment models. Finally, authors reiterate that building a (spatial) database required for a DSS in general and DSS-T in particular is anything but simple. It involves acquiring existing data, analyzing it to see its match to your model requirements, modifying/create new datasets, and many other operations that take time, require skills, and last but not least human and financial resources. Thus, it might be necessary to invest a considerable amount of resources including financial, acquiring professional datasets, and professional GIS technologies and GIS professionals. Appendix C: Implementation Guideline for Hazmat Transportation DSS 201 Table C.5 A comprehensive list of information required for GIS-T Classification Information Reference ID Possible sources Geographical Elevations [elv_sd] Land-use [lu_sd] Hydrology (lakes, reservoirs, rivers, floodable areas) [inw_sd] [riv_sd] Seismic areas Road network [fa_sd] [eq_sd] [roadnet_sd] Railroads network [railnet_sd] Sensitive infrastructure components (road) Sensitive infrastructure components (rail) High-voltage network [sicroad_sd] USGS-30 GTOPO-30 GTOPO-3 DCW VMap0 NE Lakes NE Rivers and Lakes Centerlines * GEIZ DCW VMap0 DCW VMap0 – [sicrail_sd] – [hvnet_sd] DCW VMap0 NA Countries NA First-Order Admin NA Populated places NA Urban areas DCW VMap 0 NA Populated places* Infrastructure Administrative Census Administrative boundaries (country, region, etc.) [admin_sd] Populated places (cities, towns) [popplaces_sd] Population density [popdens_sd] *Derived datasets – No available online source identified. Should be generated ad-hoc The Other datasets As previously mentioned, the data layer also acts as the repository for the assessment results. But does one perform a comparative assessment? And how does one make a decision when there is only access to single result? Consequently, there must be a way to save work/analysis and making it available for future references in a DSS-T design. Additionally, assessment procedures can be time consuming, involving complex tasks. This has an effect on the analysis as well as the analysts. The analyst may need to make several assumptions (and decisions) during data processing. Hence, the capability of reusing parts of the computational chain becomes critical and must 202 Appendix C: Implementation Guideline for Hazmat Transportation DSS be considered as a functional requirement when designing a DSS-T: There must be a capability to save assessment at different stages in the computational chain. This issue can best be described as follows: consider a situation in which an analyst has already computed the risk for a given transportation segment—a process which involved probability of LOC and consequence assessment. Assuming that this process took five (5) hours, if the analyst now needs to consider another scenario (e.g., probability of flat tire), then the analyst has to spend an additional 5 h. However, it is best if the design is easily modifiable for unanticipated scenarios. This might involve changing limited sections of the design such as performing LOC probability assessment again and maintaining (i.e., reusing) the consequence assessment part. The aforementioned issues are expression of ‘modularity’ requirement and serve as subsequent advantages for a DSS. However, the realization of such advantages requires placing special attention to the design phase and use of holistic thinking. Consequently, a deep understanding of the employed analytical models, computational modules, and of the assessment workflow is must in order to properly identify the reusable (intermediate) results. The Data Access Layer Present authors recommend the development of a Data Access Layer (DAL) for design and implementation. This recommendation is made on the basis of difficulties brought by the need to use heterogeneous datasets and technologies lead to this approach as an interface between the actual datasets and the Business layer of current application. A DAL, as the layer of a program, provides simplified access to data stored in persistent storage. And even though there is no unified description when referring to DAL and software development (e.g., see, Java versus Microsoft realms), the following general patterns are required for present efforts: – Abstraction of data must be made for application in models – There must be a ‘Separation of Concerns’ which could be done using a table with List—Array of records; Table row—Record; Row item—Record property – There must be an accommodation for multiple sources of information. Sources can be defined such as NA_roads, Transportation_segment, or another source of spatial data. Obviously, in such a case, the interface must be able to distinguish the differences especially during execution and implementation – Everything in a DSS-T architecture following Data Access layer must use the same type of information representation regardless of the source data. The consideration of this issue is to ensure that necessary analysis can take place even if data are collected from difference sources – There must be a tight control of databases. The tight controls ensure, for example, consistency in saving data Appendix C: Implementation Guideline for Hazmat Transportation DSS 203 – There must be increased security. Security concerned is always necessary when dealing with datasets involving hazmat – Ensure that the system adheres to philosophy of ‘Separation of Concerns’ A very simple definition of DAL states provides a set of methods allowing for unified access to data stores (i.e., obtaining data from a data store, updating its data and schema) via object access layers. There are clear benefits to the DAL approach especially from the perspective of architecture. This advantage can be seen from Java’s Data Access Object (Java DAO) which is used in business applications. The oldest and most mature technique is to use the Java Database Connectivity (JDBC) API, which provides the capability to execute SQL queries against a database and then fetch the results, one column at a time. Java 2 Enterprise Edition (J2EE) offers a newer persistence framework in the form of Entity Beans, a subset of the Enterprise JavaBean (EJB) framework. Design Principles of the Data Access Layer The objective of a DAL is to provide data to one’s business objects without using database-specific code. One can accomplish through exposing a series of data access methods from the DAL that operate on data in the data-tier using database-specific code without exposing any database-specific method parameters, or return types, to the business tier. In this case, any time a business object needs to access the data-tier, one uses a method calls in the DAL instead of calling directly down to the data-tier. This pushes database-specific code into the DAL and makes your business object database independent (Armstrong 2006). Data access layer contains a GIS engine that ensures data compatibility while ensuring data are accessible. The application logic layer (business) houses a variety of models necessary for GIS-T as well as models necessary for risk and vulnerability assessment. Finally, the assessment tools layer is an interface that the analyst uses for data management, definition of scenarios, and analysis of the results. As a recommendation, a fully fledged Create, Read, Update, Delete (CRUD) capability should be provided to the DSS platform. The modules handling the CRUD features of the DSS are placed at the Data Access layer. 204 Appendix C: Implementation Guideline for Hazmat Transportation DSS References Armstrong, D. (2006). .NET application architecture: The data access layer. Simple Talk: A Technical Journal and Community Hub from Redgate. Retrieved from https://www.simpletalk.com/dotnet/.net-framework/.net-application-architecture-the-data-access-layer/ Defense Mapping Agency. (1992). Military specification digital chart of the world (DCW) (No. MIL-D-89009). Springfield, VA: U.S. Defense Mapping Agency. Gheorghe, A. V., Grote, G., Kogelschatz, D., Fenner, K., Harder, A., Moresi, E., et al. (2000a). Integrated risk assessment, transportation of dangerous goods: Case study. Zurich, Switzerland: Target: Basel-Zurich/VCL. ETH KOVERS. ICESat. (2015). SRTM30 documentation. Retrieved December 1, 2015, from http://icesat.gsfc. nasa.gov/icesat/tools/SRTM30_Documentation.html Snyder, J. P. (1987). Map projections: A working manual (USGS Numbered Series No. 1395). Geological Survey (U.S.). Retrieved from http://pubs.er.usgs.gov/publication/pp1395 Vamanu, B. I. (2006). Managementul riscurilor privind transportul substanţelor periculoase: aplicaţii ale sistemelor dinamice complexe (Dissertation). Universitatea Politehnica Bucureşti, Facultatea de Chimie Aplicată şi Ştiinţa Materialelor, Catedra de Inginerie Economică, Bucureşti. Appendix D Arriving at Equation for State of a System with many Bi-stable Entities An Expert-Oriented Tutorial1 Ever since the first introduction of the Quantitative Vulnerability Assessment (QVA) model by Gheorghe and Vamanu (2004b), referenced at Sect. 7.1 of this book, interested students as well as practitioners have, on several occasions, expressed discomfort with trying to get to grips with the deductive algebraic/calculus flow that takes them from one equation to other until eventually arriving at the right, rather, compact analytic solution for the equation of state of systems with multicomponent systems with bistable entities. Namely; tanh uf þ m ¼ 2f H ðD:1Þ The tutorial that follows, although presumptuous about readers’ level of mathematical proficiency and inelegant by all academic standards, is the authors’ honest attempt to meet such concerns. Readers satisfied with the explanatory discourse in Sect. 7.1 may as well ignore this appendix. 1. Consider a dynamic system made of a large number, M, of bistable entities. Assume that M1 entities are, at a given moment in time, in ‘State 1’—e.g., the normal state or functional state; and that M2 entities are in ‘State 2’—e.g., the abnormal state or dysfunctional state. This forms the basis for Eq. (D.2): M ¼ M1 þ M2 ðD:2Þ It comes natural to contend that the dynamics of the system consists, at the elemental (or ‘atomic’) level, of an entity collapsing from State 1 into a State 2— which takes the number M1 down to M1 1 and M2 to M2 þ 1; or conversely— ascending from State 2 up into State 1—which takes M2 to M2 1 and M1 to M1 þ 1: The fundamental lack of knowledge on when such an act takes place 1 Made available by the kind contribution of Dr. Dan V. Vamanu. © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6 205 206 Appendix D: Arriving at Equation for State of a System with many Bi-stable Entities induces the common recourse to probabilities: assume, therefore, that w21 ðM1 ; M2 Þ is the probability of a State 1 to State 2 transition, whereas w12 ðM1 ; M2 Þ is the probability of a State 2 to State 1 transition, where both probabilities are some functions of M1 and M2 (see, the D.3 scheme). ðD:3Þ What the (D.3) scheme graphically depicts, a customary routine in Physics translates into a ‘master equation’ for the distribution function, f ðM1 ; M2 ; tÞ; of the probabilistic process described in (D.4)—a quantity that depends, as intuitively expected, on the current populations M1 and M2 ; while also varying with the time, t. @f ðM1 ; M2 ; tÞ ¼ w21 f ðM1 1; M2 þ 1Þ þ w12 f ðM1 þ 1; M2 1Þ @t ðw21 þ w12 Þf ðM1 ; M2 Þ ðD:4Þ In plain words, Eq. (D.4) tells us that the variation in time of the distribution function—the left-hand side of the master equation—covers, in the integrative manner provided by the concept, (i) the acts of transitions from State 1 to State 2—the first term on right-hand side of Eq. (D.4); (ii) the acts of transitions from State 2 to State 1—the second term on right-hand side of Eq. (D.4); and (iii) would naturally depend also on the current state of the system, appropriately characterized by the ðM1 ; M2 Þ pair of numbers. 2. To make the master equation useful, one has to take it to a form amenable to an algebraic handling. First, one operates a change of variables Eq. (D.5): f¼ 1 M1 M2 M1 M2 ¼ 2 M1 þ M2 2M ðD:5Þ To see the meaning in it, let us take the system to its limits: indeed, if one assumes that all entities have somehow got into State 1 (‘functional’), therefore making M1 ¼ M and, by way of consequence, making M2 ¼ 0 in Eq. (A.5), the variable f takes the value 1/2. Conversely, if one assumes that all entities get in State 2 (‘dysfunctional’), then, by making M2 ¼ M and, of course, M1 ¼ 0 variable f becomes −1/2 (scheme (A6)). In-between the extremes, variable f would indeed work as a telling measure of system functionality, opposing the functional population of entities, M1 to the dysfunctional population, M2 . Appendix D: Arriving at Equation for State of a System with many Bi-stable Entities M1 ¼ M ! f ¼ 1 2 1 M2 ¼ M ! f ¼ 2 207 ðD:6Þ To take full advantage of the change of variable (D.5), the immediate obvious consequences are worth noting: M1 þ M2 ¼ M M1 M2 ¼ 2Mf M 1 þ Mf ¼ M þf 2 2 M 1 M2 ¼ Mf ¼ M f 2 2 ðD:7:1Þ M1 ¼ 1 1 1 þf 1 ¼ M þf 2 2 M 1 1 1 f 1¼M f M2 1 ¼ M 2 2 M ðD:7:2Þ M1 1 ¼ M ðD:7:3Þ Upon these, one reaches the level of convenience that indeed justifies the change of variable: all states of the system—the current, i.e., ðM1 ; M2 Þ; the functionally depleted, i.e., ðM1 1; M2 þ 1Þ; and functionally enriched, i.e., ðM1 þ 1; M2 1Þ can be algebraically represented by a single (as opposed to two) variable, f; along with the constant M—the total population of entities in the system Eq. (D.8): ðM1 ; M2 Þ ðM1 1; M2 þ 1Þ ðM1 þ 1; M2 1Þ f M2 2 þ 1Þ f ¼ ðM1 1ÞðM ¼ M12M M1 ¼ f M1 2M ðM1 þ 1ÞðM2 1Þ þ M1 M2 f ¼ ¼ 2M þ M1 ¼ f þ M1 2M ðD:8Þ On using the notation f; f and f þ ; the master equation can be rewritten as: @f ðfÞ ¼ w21 ðf Þf ðf Þ þ w12 f þ f f þ ðw21 þ w12 Þf ðfÞ @t ðD:9Þ Which, explicitly, reads: @f ðfÞ 1 1 1 1 ¼ w21 f f f þ w12 f þ f fþ @t M M M M ðw21 þ w12 Þf ðfÞ ðD:10Þ 208 Appendix D: Arriving at Equation for State of a System with many Bi-stable Entities Featuring a single variable, f, Eq. (D.10) is now ready for more comprehensive interpretations. 3. Of a first evidence is the fact that according to the original assumption that the number M of system constituents is large, all functions involving its inverse, 1=M—a small quantity—in the right-hand side of Eq. (D.10) may be expressed by standard, convergent series expansions than could safely be cut off at their terms in the second order of 1=M : @f ðfÞ ¼ @t 1 @w21 1 @ 2 w21 1 @f 1 @2f f w21 þ þ M @f 2M 2 @f2 M @f 2M 2 @f2 1 @w12 1 @ 2 w12 1 @f 1 @2f þ þ f þ ðw21 þ w12 Þf þ w12 þ M @f 2M 2 @f2 M @f 2M 2 @f2 ðD:11Þ Straightforward multiplications in the right-hand side of Eq. (D.11), followed by ignoring all resulting terms of an order greater than 2 in 1=M (i.e., 1=M 3 or 1=M 4 ) and a regrouping of the resulting terms, will now make the contributions to the time-partial-derivative of the distribution function f in the left-hand side be arranged by their order in 1=M; as indicated in the chain of equalities Eq. (D.12), next: @f ðfÞ 1 @f 1 @2f ¼ ðw21 w12 Þ þ ðw21 þ w12 Þ @t M @f 2M 2 @f2 2 1 @w21 @w12 1 @f @w21 @w12 1 @ w21 @ 2 w12 þ f þ þ 2 þf @f @f M @f M @f @f 2M 2 @f2 @f2 1 @ 1 @ 1 @ ½ðw21 w12 Þf þ f ðw21 w12 Þ f ðw21 w12 Þ ¼ M @f M @f M @f 1 @2f @f @ @2 ðw21 þ w12 Þ 2 þ 2 ðw21 þ w12 Þ þ f 2 ðw21 þ w12 Þ þ 2M 2 @f @f @f @f 2 1 @ 1 @ ¼ ½ðw21 w12 Þf þ ½ðw21 þ w12 Þf M @f 2M 2 @f2 @ 1 1 @ @f ðw21 w12 Þf ðw21 þ w12 Þ ¼ @f M 2M 2 @f @f ðD:12Þ To make the long story short, Eq. (D.12) may now be written as: @f @J þ ¼0 @t @f ðD:13Þ Appendix D: Arriving at Equation for State of a System with many Bi-stable Entities 209 which is a manner of evidencing a quantity, J, known in Physics as a ‘current’: J¼ 1 1 @ ðw21 w12 Þf ½ðw21 þ w12 Þf M 2M 2 @f ðD:14Þ In keeping with the same tongue/thinking, Eq. (D.13) indicates that the probability distribution function f is subject, in the inner dynamics of the system, to a ‘law of conservation.’ 4. It is time now for assumptions that transcends the mere Algebra: The system is assumed to find itself in a stationary state (i.e., a state in which the probability distribution function, f, does not vary in time), which reads: @f ¼0 @t ðD:15:1Þ By virtue of Eq. (D.13), the condition in Eq. (D.15.1) automatically entails that the ‘current’ J does not vary with the ‘system operability fraction’—as we have termed z, which in turn reads: @J ¼0 @f ðD:15:2Þ Further on, the first derivative of the current J being nil entails that the ‘current’ J itself assumes a constant value, in the stationary state of the system: J ¼ constant ðD:15:3Þ and, moreover, nothing would prevent us to take this arbitrary constant as being zero. So, let us have a recap of the last reasoning: @f @J ¼0! ¼ 0; @t @f J ¼ constant; constant ¼ 0 ðD:16Þ 5. We are now back to some algebra: given the expression in Eq. (D.14) of the ‘current’ J, the condition J ¼ 0 [see Eq. (D.16)] reads in fact: ðw21 w12 Þf ¼ 1 d ½ðw21 þ w12 Þf 2M df ðD:17Þ Note that the system’s stationary condition assumed allows us to replace partial derivatives by straight derivatives. 210 Appendix D: Arriving at Equation for State of a System with many Bi-stable Entities Observe now that we can equally write Eq. (D.17) as: w21 w12 1 d ðw21 þ w12 Þf ¼ ½ðw21 þ w12 Þf 2M df w21 þ w12 ðD:17:1Þ The petty trick of multiplying the left-hand side of Eq. (D.17) by ðw21 þ w12 Þ=ðw21 þ w12 Þ—which actually means by 1—will prove more useful than one may first realize: indeed, if we introduce now a new function, g, relating to f as: g ¼ ðw21 þ w12 Þf ðD:17:2Þ then we can easily rewrite Eq. (D.17.1) as: w21 w12 dg g¼ df w21 þ w12 ðD:17:3Þ dg w21 w12 ¼ 2M g df w21 þ w12 ðD:18Þ 2M or, which is the same thing, as: And thus, we have ourselves an ordinary differential equation describing the stationary state of the system. We are now three steps away from integral solution of this equation. It goes like this: Step 1: change places of g and df in Eq. (D.18): dg w21 w12 ¼ 2M df g w21 þ w12 Step 2: integrate both members in the Step 1 results in Eq. (D.19); recall your math: – the primitive of 1=g is ln g; – ln A ln B ¼ lnðA=BÞ; – if ln g ¼ C – then g ¼ eC Note also that C is a constant that will remain inconsequential in the further reasoning. Appendix D: Arriving at Equation for State of a System with many Bi-stable Entities Zf dg ¼ 2M g 12 Zf 12 f ln gðkÞ 1 ¼ 2M 2 1 ln gðfÞ ln g 2 Zf 12 Zf ¼ 2M 12 211 w21 ðkÞ w12 ðk Þ dk w21 ðkÞ þ w12 ðkÞ w21 ðkÞ w12 ðk Þ dk w21 ðkÞ þ w12 ðkÞ w21 ðkÞ w12 ðk Þ dk w21 ðkÞ þ w12 ðkÞ 1 ln g ¼ ln C 2 Zf ln gðfÞ ln C ¼ 2M 12 gð f Þ ¼ 2M ln C Zf 12 w21 ðk Þ w12 ðkÞ dk w21 ðk Þ þ w12 ðkÞ w21 ðk Þ w12 ðkÞ dk w21 ðk Þ þ w12 ðkÞ Step 3: Z 2M g ¼ Ce w21 ðkÞ w12 ðkÞ dk 12 w21 ðk Þ þ w12 ðk Þ f At last, given the definition in Eq. (D.17.2) of function g, one obtains the target-function f as: Z f 2M f ðfÞ ¼ C e 12 w21 ðk Þ w12 ðkÞ dk w21 ðkÞ þ w12 ðkÞ ðw21 ðfÞ þ w12 ðfÞÞ ðD:19Þ 6. To get further on, one has to employ some more Physics (alas!..). An additional, yet intuitively natural assumption is that one has to look for the extremal surface of the probability density of states f, which would allow one to detect the areas of maximal probability of system's real behavior. In math language, looking for extremes of a function is to force its first derivative with respect to the relevant variable—in our case f—to zero: 212 Appendix D: Arriving at Equation for State of a System with many Bi-stable Entities df ðfÞ ¼0 df ðD:20Þ with f given by Eq. (D.19). Performing the derivative of f ðfÞ given by Eq. (D.19) is textbook material. A full account of the operation may look like this: 2 6 2M df ðfÞ d 6 e ¼0! 6 df df 6 4 2 d6 6e df 4 2M Z 3 w21 ðkÞ w12 ðk Þ dk 7 12 w21 ðk Þ þ w12 ðk Þ 7 7¼0 7 w21 ðfÞ þ w12 ðfÞ 5 f Rf w21 ðkÞw12 ðkÞ 3 Rf w ðkÞw ðkÞ dk 2M w 21ðkÞ þ w12 ðkÞdk w21 ðk Þ þ w12 ðkÞ 21 12 7 1 1 1 7 2 2 þ e 5 w21 ðfÞ þ w12 ðfÞ d 1 df w21 ðfÞ þ w12 ðfÞ ¼0 2 d6 6e df 4 2M ðD:21Þ ðD:21:1Þ 2 3 Rf w21 ðkÞw12 ðkÞ 3 Rf w ðkÞw ðkÞ dk 2M w 21ðkÞ þ w12 ðkÞdk Zf w21 ðk Þ þ w12 ðkÞ 21 12 7 w21 ðk Þ w12 ðkÞ 7 1 1 7¼ d 6 2 dk5 e 2 5 df 42M w21 ðk Þ þ w12 ðkÞ 2 ¼ d6 42M df 12 Zf 12 ¼ 2M 3 w21 ðk Þ w12 ðkÞ 7 dk5 w21 ðk Þ þ w12 ðkÞ w21 ðfÞ w12 ðfÞ w21 ðfÞ þ w12 ðfÞ ðD:21:1:1Þ 0 0 d d 1 w21 ðfÞ þ w12 ðfÞ df w21ðfÞ þ w12ðfÞ ¼ ¼ df w21 ðfÞ þ w12 ðfÞ ½w21 ðfÞ þ w12 ðfÞ2 ½w21 ðfÞ þ w12 ðfÞ2 ðD:21:1:2Þ Appendix D: Arriving at Equation for State of a System with many Bi-stable Entities " 0 # 0 w21 ðfÞ w12 ðfÞ 1 w ðfÞ þ w12 ðfÞ e 21 2M w21 ðfÞ þ w12 ðfÞ w21 ðfÞ þ w12 ðfÞ ½w21 ðfÞ þ w12 ðfÞ2 2M 213 Rf w21 ðkÞw12 ðkÞ 1 2 w21 ðkÞ þ w12 ðkÞ dk ¼0 ðD:21:2Þ 2M w21 ðfÞ w12 ðfÞ ½w21 ðfÞ þ w12 ðfÞ 0 2 0 w21 ðfÞ þ w12 ðfÞ ½w21 ðfÞ þ w12 ðfÞ2 0 ¼0 ðD:21:3Þ 0 w21 ðfÞ þ w12 ðfÞ ¼ 2M w21 ðfÞ w12 ðfÞ ðD:21:4Þ In the equations above, apostrophes (') indicate first derivatives of the functions w12 ðfÞ and w21 ðfÞ with respect to f: 7. At this stage, an analytic look into how the transition probability functions w12 ðfÞ and w21 ðfÞ may look like can no longer be avoided. The solution is again inspired by standard Statistical Physics: in physical systems of binary state entities such as Ising, or Heisenberg magnets, where magnetic moments are carried by ½ ‘spins,’ holding either ½ or −½ values, the transition probabilities are assumed to depend on system’s state variable f as follows: ( uf þ v w12 ¼ wM1 e h ¼ wM uf þ v w21 ¼ wM2 e h ¼ wM 1 2 1 2 uf þ v þ f e h uf þ v f e h ðD:22Þ with already-known notations, there are notable exceptions involving parameters u, v, and h in the exponentials. To avoid becoming completely parochial, let us confine ourselves to loosely saying that u, that multiplies the ‘system functionality variable’ f; is a measure of the intensity of interaction between any two, closest-neighboring entities in the system, whereas v is a measure of the interaction of entities with influences outside the system, known as ‘fields.’ For more on these, we redirect the reader to the main text in Sect. 7.1 and the accompanying references. On the other hand, h is some measure of system’s ‘temperature’—that again should be understood in the context as expanded upon in Sect. 7.1. And now, back to elementary calculus: taking the first derivative of w12 ðfÞ and w21 ðfÞ yields: ( w012 ¼ wM 1 uh w021 ¼ wM 1 þ 1 2 þf u 1 h 2 uf þ v e h uf þ v f e h ðD:22:1Þ 214 Appendix D: Arriving at Equation for State of a System with many Bi-stable Entities Taking the expressions of w012 ; w021 from Eq. (D.22.1) and the expressions of w21 and w12 from Eq. (D.22) into the Eq. (D.21.4) of system’s surface of extremal probability, one has: wM 1 þ u 1 h 2f wM 12 f e e uf þ v h uf þ v h þ wM 1 uh wM þf 1 2 e 1 2 þf uf þ v e h uf þ v h ¼ 2M ðD:22:2Þ Processing the fraction in (D.22.2) by simplifications and terms regrouping is, again, textbook stuff. Here it is: 1 þ u h h 1 2 u 1 h 2f 1 2f f e uf þ v h e e uf þ v h þ 1 uh 1 2 þ f e 1 2 f e 1 2 uf þ v h uf þ v h u h h 1 2 1 2 f e i e uf þ v h ¼ 2M h uf þ v i uf þ v e h e h þ f e uf þ v h e uf þ v h uf þ v h þ f e uf þ v 1 2 f e h 12 þ f e h uf þ v i uf þ v e h e h ¼ 2M uf þ v h uf þ v h ðD:22:4Þ ¼ 2M ðD:22:5Þ 1 2M h ðD:22:6Þ i ¼u h uf þ v i h uf þ v i uf þ v uf þ v e h e h f e h þ e h 1 h uf þ v i ¼u uf þ v h 2M e h e h uf þ v ðD:22:3Þ i uf þ v h e 1 2 uf þ v h 1 2 h þf 1 2 þf uf þ v e h ðD:22:7Þ uf þ v 1 e h þ e h 1 f uf þ v uf þ v ¼ u 2 2M h h e e h 1 uf þ v 1 f coth ¼u 2 h 2M h uf þ v 1 1 1 coth ¼ h 2 uh 2M f ðD:22:8Þ Appendix D: Arriving at Equation for State of a System with many Bi-stable Entities 215 8. The last step into the chores requires substantive observation that, in the right-hand side of Eq. (D.22.8), the second fraction in parenthesis has the large number M as its denominator, overwhelming—at nonzero ‘temperatures’ h; a zero-temperature being inconceivable anyway, the u=h term, which makes the respective fraction negligible when compared to ½—the first in the same parenthesis. If we ignore the said small fraction, this leaves us with: coth uf þ v 1 h 2f ðD:22:9Þ A simple inversion of the quantities in Eq. (D.22.9) now gives: tanh uf þ v ¼ 2f h ðD:23Þ where we take the liberty of making the equality categorical, which, in light of the arguments displayed in this Appendix, is believed to be defendable. The readers may wish to recognize the result, (D.23), as the equation of state of the system of binary state entities discussed in Sect. 7.1 of this book. A final remark: neither the book authors, nor their associates quoted in relation to the subject of this Appendix, are claiming or have ever claimed to originate the way of thinking and methodological clues regarding how one arrives at the equation for system state with many bistable entities. Those assets belong to such highly noted (and duly quoted) predecessors such as Haken and Weidlich in Synergetics, Thom in the Theory of Catastrophies; Bragg, Williams, Ising, and Heisenberg in Physics; and many others as noted in the References. Our only feat was to make the solutions work for our purposes. Reference Gheorghe, A. V., & Vamanu, D. V. (2004b). Towards QVA—quantitative vulnerability assessment: A generic practical model. Journal of Risk Research, 7(6), 613–628. http://doi. org/10.1080/1366987042000192219 Index A Aarau-Zurich, 163, 165, 167, 168 Academic, 2, 93, 183, 205 Accident, 12, 23, 27, 41 Acute intoxication, 80, 84, 86 Ambiguity, vii, 183 Architecture, 185, 186, 193 As Resilient As Society Permits (ARASP), 101, 120 B Boiling Liquid Expansion, Vapors Explosion (BLEVE), 61, 69, 166 Bragg–Williams approximation, 149 Business, 2, 113, 203 C Chemicals, 1, 6, 58, 80, 82, 189, 194 Collision, 27–30, 42, 44, 91 Complementary Cumulative Frequency of Fatalities (CCFF), 15 Complexity, 1, 99 Consequence, 11, 12, 59, 61, 66, 69, 72, 80, 121 Critical infrastructures, 1, 4, 92 Cumulative Frequency of Fatalities (CFF), 15, 19 D Database, 12, 15 Decision support systems (DSS), 57 Deductive, 24, 41 Democratic principles, 93 Dependency, vii, 3, 4, 60, 92, 100 Derailment, 6, 27, 28, 32, 37 E Emergency, vii, 81, 100, 113, 135 Environment, 12, 15, 35, 50, 58, 80, 81, 100, 137 Event Tree Analysis (ETA), 25 Explosion, 17, 72, 76 Exposure, 4, 61, 80, 84, 85, 93, 98 F Fatalities, 15, 17, 57, 124, 164 Fire consequence, 59, 61, 65 Flare fire, 65, 174 Fragility, 4 G Geographical information systems (GIS), 57 Governmental, 2 Great Tohoku Earthquake, 92 H Hazardous material, 7, 11, 61, 69, 83 Hazardous Materials Transportation Act (HMTA), 6 Hot spot, viii, 12, 13, 39 I Index method, ix, 107, 112, 120 Inductive, 24 Instability region, 154 Interdependency, vii, 3, 149 L Lac-Mégantic, 6 Lethality percentage, 15, 17, 19, 58, 60, 61, 64, 77, 78, 84, 85, 89 Loss of containment (LOC), 12, 14, 15, 17, 23, 43, 57, 128 Loss of containment probability, 15, 17 Low probability, high consequence, 12 © Springer International Publishing Switzerland 2016 B.I. Vamanu et al., Critical Infrastructures: Risk and Vulnerability Assessment in Transportation of Dangerous Goods, Topics in Safety, Risk, Reliability and Quality 31, DOI 10.1007/978-3-319-30931-6 217 218 M Master Logical Diagrams (MLD), 177 Matrix method, 120, 121, 123 Measure of system functionality, 206 Mitigation factors, 17 P Physical effects, 15, 58, 129, 130 Pool fire, 15, 61–64 Population density, 13, 124 Potential loss types, 126 Probability, 12, 23, 28, 29, 31–34 Protective systems state, 36, 51 Q Quantitative Vulnerability Analysis (QVA), 103, 142, 145–147, 156 R Reliability, 4 Resiliency, 4, 91, 92, 120 Risk, VII, 4, 11, 12, 14 Risk assessment, 11, 18, 91 Risk classification, 11, 126 S Sensitive, 12, 118, 131 Simulation, 185 Sociotechnical, 183 Index Spatial data, 12 Success/failure space, 24, 25 System state space, 146, 148, 154 Systems theoretic principle, 115 T Threat, 91, 93–95, 97, 98 Toxicity, 4, 15, 82 Transportation, 6 rail, 27 road, 41, 42 Transportation corridor, 18, 97, 107, 112, 123, 145 Transportation system, 6, 57, 98, 112, 124, 156 indicators, 156 V Vicinity type, 36, 37, 51 Vulnerability, 4, 93–95, 97–100, 107, 115, 121 Cybernetic model, 93–97 Physiologic model, 95, 116 Semantic model, 93 Sociologic model, 93 Vulnerability assessment, 97, 100, 103, 123, 155 Vulnerability propositions, 96 W Weibull distribution, 180