35
ORIGINAL PAPER A Bayesian vulnerability assessment tool for drinking water mains under extreme events Alessandro Pagano Raffaele Giordano Ivan Portoghese Umberto Fratino Michele Vurro Received: 25 July 2013 / Accepted: 14 June 2014 / Published online: 28 June 2014 Ó Springer Science+Business Media Dordrecht 2014 Abstract Drinking water security is a life safety issue as an adequate supply of safe water is essential for economic, social and sanitary reasons. Damage to any element of a water system, as well as corruption of resource quality, may have significant effects on the population it serves and on all other dependent resources and activities. As well as an analysis of the reliability of water distribution systems in ordinary conditions, it is also crucial to assess system vulnerability in the event of natural disasters and of malicious or accidental anthropogenic acts. The present work summarizes the initial results of research activities that are underway with the intention of developing a vulnerability assessment methodology for drinking water infrastructures subject to hazardous events. The main aim of the work was therefore to provide decision makers with an effective operational tool which could support them mainly to increase risk awareness and preparedness and, pos- sibly, to ease emergency management. The proposed tool is based on Bayesian Belief Networks (BBN), a probabilistic methodology which has demonstrated outstanding potential to integrate a range of sources of knowledge, a great flexibility and the ability to handle in a mathematically sound way uncertainty due to data scarcity and/or limited knowledge of the system to be managed. The tool was implemented to analyze the vul- nerability of two of the most important water supply systems in the Apulia region (southern Italy) which have been damaged in the past by natural hazards. As well as being useful for testing and improving the predictive capabilities of the methodology and for possibly modifying its structure and features, the case studies have also helped to underline its strengths and weaknesses. Particularly, the experiences carried out demonstrated how the A. Pagano R. Giordano (&) I. Portoghese M. Vurro Istituto di Ricerca Sulle Acque del Consiglio Nazionale delle Ricerche (IRSA-CNR), Bari, Italy e-mail: [email protected] A. Pagano e-mail: [email protected] U. Fratino DICATECh, Politecnico di Bari, Bari, Italy e-mail: [email protected] 123 Nat Hazards (2014) 74:2193–2227 DOI 10.1007/s11069-014-1302-5

A Bayesian vulnerability assessment tool for drinking water mains under extreme events

  • Upload
    michele

  • View
    215

  • Download
    3

Embed Size (px)

Citation preview

Page 1: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

ORI GIN AL PA PER

A Bayesian vulnerability assessment tool for drinkingwater mains under extreme events

Alessandro Pagano • Raffaele Giordano • Ivan Portoghese •

Umberto Fratino • Michele Vurro

Received: 25 July 2013 / Accepted: 14 June 2014 / Published online: 28 June 2014� Springer Science+Business Media Dordrecht 2014

Abstract Drinking water security is a life safety issue as an adequate supply of safe

water is essential for economic, social and sanitary reasons. Damage to any element of a

water system, as well as corruption of resource quality, may have significant effects on the

population it serves and on all other dependent resources and activities. As well as an

analysis of the reliability of water distribution systems in ordinary conditions, it is also

crucial to assess system vulnerability in the event of natural disasters and of malicious or

accidental anthropogenic acts. The present work summarizes the initial results of research

activities that are underway with the intention of developing a vulnerability assessment

methodology for drinking water infrastructures subject to hazardous events. The main aim

of the work was therefore to provide decision makers with an effective operational tool

which could support them mainly to increase risk awareness and preparedness and, pos-

sibly, to ease emergency management. The proposed tool is based on Bayesian Belief

Networks (BBN), a probabilistic methodology which has demonstrated outstanding

potential to integrate a range of sources of knowledge, a great flexibility and the ability to

handle in a mathematically sound way uncertainty due to data scarcity and/or limited

knowledge of the system to be managed. The tool was implemented to analyze the vul-

nerability of two of the most important water supply systems in the Apulia region (southern

Italy) which have been damaged in the past by natural hazards. As well as being useful for

testing and improving the predictive capabilities of the methodology and for possibly

modifying its structure and features, the case studies have also helped to underline its

strengths and weaknesses. Particularly, the experiences carried out demonstrated how the

A. Pagano � R. Giordano (&) � I. Portoghese � M. VurroIstituto di Ricerca Sulle Acque del Consiglio Nazionale delle Ricerche (IRSA-CNR), Bari, Italye-mail: [email protected]

A. Paganoe-mail: [email protected]

U. FratinoDICATECh, Politecnico di Bari, Bari, Italye-mail: [email protected]

123

Nat Hazards (2014) 74:2193–2227DOI 10.1007/s11069-014-1302-5

Page 2: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

use of BBN was consistent with the lack of data reliability, quality and accessibility which

are typical of complex infrastructures, such as the water distribution networks. The

potential applications and future developments of the proposed tool have been also dis-

cussed accordingly.

Keywords Bayesian Belief Networks � Drinking water supply � Vulnerability

assessment � Decision Support System � Physical hazards

1 Introduction

Protecting the ability to function of critical infrastructures (water, telecommunications,

energy, transport, etc.) is a serious social and economic responsibility for both military and

civilian leaders (Ezell 2007). The various services provided by critical infrastructures

include stable provision of healthy drinking water in urban areas, and this is of paramount

importance for economic, social and sanitary reasons. In particular, research on the

behavior of water supply systems under extreme events has become a central tenet of their

design and management (e.g., Shih and Chang 2006; Lindhe 2010). The analysis of their

susceptibility to threat scenarios, namely their ‘vulnerability,’ is fundamental both for

optimizing infrastructural design and maintenance and for managing emergencies (e.g.,

Christodoulou 2011; Fragiadakis et al. 2013).

An ‘extreme’ event is characterized by high intensity and low occurrence frequency,

and adverse impacts are considered disasters when they produce widespread damage and

cause severe alterations in the normal functioning of communities or societies (e.g., IPCC

2012 referring to climate extremes). In the present work, we define an ‘extreme’ event for a

drinking water infrastructure as an hazardous event able to determine significant conse-

quences to the health of exposed people. The transition from a natural disaster to a

humanitarian tragedy is found to be dependent on several issues, namely natural, eco-

nomic, political factors, awareness and preparedness (Ismail-Zadeh and Takeuchi 2007).

In this present activity, the concept of vulnerability results from the definition of risk

provided by UNDRO (1979). Risk can be expressed as a combination of ‘hazard’ (the

probability, within a specific period of time in a given area, of a potentially damaging

phenomenon occurring), ‘vulnerability’ (the degree of loss to given elements resulting

from the occurrence of a given phenomenon) and ‘element at risk’ (population, buildings

and engineering works, activities, services, utilities and infrastructures at risk in a given

area). Vulnerability analysis is recognized as a fundamental tool in making rational

decisions on how best the effects of potentially disastrous natural events can be mitigated

through proper planning or through a system of permanent controls.

The key to performing a reliable vulnerability assessment is based on a complete

identification of potentially occurring hazards, but also strongly depends on the ability

to correctly detect the main features influencing the behavior of the system under

investigation (Al-Barqawi and Zayed 2006a, b; Liu et al. 2012). Generally, an estimate

of risks, and of the effects of risk-reduction measures, requires detailed modeling of the

system and of its component parts. Indeed, a model based on a good understanding of

the system with a solid theoretical foundation can be of great use in decision making

(Lindhe 2010).

2194 Nat Hazards (2014) 74:2193–2227

123

Page 3: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

Hazardous events typically occurring in water supply systems are classified mainly as

natural (such as earthquakes, hurricanes, volcanic eruptions, landslides, fires) or anthropic

(both intentional and accidental, such as pollution, operational mistakes, blackouts).

Referring to the potential consequences on the water system, physical damage consisting in

the breakage or malfunctioning of one or more elements should, on the whole, be dis-

tinguished from resource quality alteration (Haestad Methods et al. 2003). Comprehensive

hazard reviews were proposed by Grigg (2003) and Beuken et al. (2008a), referring to

hazards potentially affecting water quantity and quality. We decided to propose a simple

classification, referring to two hazard classes:

• Physical hazards associated with potential damage to elements of the infrastructure

leading to limitations on water quantity.

• Chemical, biological, radiological (CBR) hazards connected with the possible

contamination of the resource and leading to quality problems.

In both cases, the potential occurrence of natural events (earthquakes, landslides, floods,

etc.) as well as of anthropogenic actions (both intentional, such as terrorist acts or sabotage,

and accidental) should be considered.

Although the research activities globally refer to both hazard classes, the vulnerability

assessment methodology proposed in the present work is discussed only referring to the

case of physical hazards and, particularly, on the resulting vulnerability of the water mains.

Figure 1 below proposes a synthesis of the main concepts associated with risk assess-

ment with specific reference to water supply systems.

In the context of famous natural events involving water systems which have occurred

worldwide, it is worth recalling the Loma Prieta earthquake of 1989 during which 507

pipeline breaks and major leaks occurred in the San Francisco Bay area (California, USA);

the Chi-Chi Taiwan earthquake of 1999 which did serious damage to water delivery

pipelines, treatment plants and reservoirs, similar to those experienced during the devas-

tating Kocaeli and Duzce earthquake (1999) in Turkey; the ‘Great flood of 1993’ which

destroyed an aqueduct serving 250,000 in Iowa (USA); the Indonesia Tsunami of 2004

which, besides severely damaging drinking water infrastructures, placed over 500,000

displaced persons at increased risk of waterborne disease due to resource contamination.

Such experiences revealed the need for simple and effective vulnerability assessment

techniques capable of helping decision makers in the different phases of emergency

management, namely preparedness, management and recovery, and to select the best

strategies and find optimal solutions for reducing the risks and limiting the damages on the

infrastructures and the local population.

A series of severe natural disasters that recently occurred in Italy (earthquakes in

Abruzzo and Emilia, extreme floods in Liguria and Sicilia, landslides in Puglia), with

significant consequences on water systems, underlined once more the pressing need for a

functional and effective framework for vulnerability assessment and emergency manage-

ment. The Italian Department of Civil Protection (Dipartimento della Protezione Civile—

DPC), which is responsible for actions during any contingency when people’s safety is at

risk, acknowledged significant operational problems during these events, mainly due to the

low quality and reliability of ready-to-use data and the absence of tools and protocols for

supporting decision making.

Starting from these premises, a research project is being developed by the Water

Research Institute of the National Research Council (Istituto di Ricerca Sulle Acque del

Consiglio Nazionale delle Ricerche IRSA-CNR), supported by the Italian DPC, with the

aim of defining a strategic Decision Support System (DSS) for efficient and coherent

Nat Hazards (2014) 74:2193–2227 2195

123

Page 4: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

decision making in the three aforementioned phases of the emergency management for

what concerns drinking water systems. This work describes the module of the DSS aiming

to support the network vulnerability assessment and, thus, to facilitate the preparedness

phase. Hence, this module aims to identify the main reasons of network vulnerability and

to select the most suitable actions that could contribute to reduce such vulnerability. The

developed module is based on Bayesian Belief Networks (BBNs), a semi-quantitative

probabilistic tool capable of integrating a range of variables and parameters. It also rep-

resents an easily implementable technique in case of lack of detailed data and information,

which is typical of water supply systems. Differently from other infrastructures, water

distribution networks are mainly buried underground and, in most of the cases, they were

developed in several time steps, and the documentations containing the needed information

for a detailed vulnerability assessment are fragmented and incomplete. The accessibility

and usability of this documentation results often very limited. Therefore, as discussed in

the following sections, the adoption of BBNs in this work was justified by several reasons,

but mainly for properly managing the uncertainty due to lack and incompleteness of

information. To this aim, different kinds of knowledge, i.e., scientific and expert judg-

ments, were integrated in the BBN.

In the present paper, the methodological approach adopted is firstly analyzed, starting

from the main features and applications of BBNs (Sect. 2). Furthermore, the technical

process of model development is described in detail (Sect. 3) with particular attention

paid to the process of knowledge elicitation and structuring. Since it is well known that

expertise often represents a major part of the available information, the integration of

different knowledge sources performed during the model building phase is discussed.

BBNs were developed through the modeling shell NeticaTM by Norsys, and their main

features are discussed in Sect. 4. Then, at the end of the conceptual model building stage

and once the BBN were defined, the practical usefulness of the tool as an emergency

DSS is also investigated and specifically proved through real case studies (Sect. 5).

Finally, in Sect. 6, the main potential and drawbacks of the proposed methodology are

discussed.

Anthropogenic – Terrorist acts Planning strategies

Natural – Earthquakes floods

Anthropogenic Terrorist acts,sabotages, accidental actions, etc.

EXTREME

EVENTS

Hazard analysis

Planning strategies

AZ

AR

D

Natural Earthquakes, floods,landslides, etc.

Hazard analysisand reductionH

Y

SK RA

BIL

ITY

WATER

SUPPLY

Planning and Management

Physical vulnerability:Infrastructural damage

Emergency response

RIS

VU

LN

ER

CBR vulnerability:Resource contamination

SUPPLY

SYSTEMS Vulnerability analysis and reduction

VA

T Planning and Emergency

EM

EN

T A

RIS

K POPULATION

EXPOSED

Number of users subjected to water shortage or quality reduction Exposure analysis and

Management response

EL

E p yreduction

Fig. 1 Graphic synthesis of the risk analysis process for water supply systems

2196 Nat Hazards (2014) 74:2193–2227

123

Page 5: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

2 State of knowledge

Several research projects have been carried out worldwide in order to deal with risk-

vulnerability issues on water infrastructure. These include the European research project

TECHNEAU, which is directly related to risk assessment and risk management themes.

The main issue underlined was that risk assessment procedures of the single components of

a water system should be integrated into a comprehensive decision support framework for

cost-efficient risk management of safe and sustainable drinking water supply (Rosen et al.

2007; Lindhe 2010). A holistic view of the water supply system is therefore needed for

effective risk management since hazards in one part of the system may lead to conse-

quences in other parts. A solid framework of risk management procedures and methods

was presented in a series of reports (see, for example, Rosen et al. 2007; Beuken et al.

2008a; Hokstad et al. 2009) in which BBNs were recognized as highly useful tools for

developing risk analyses in water systems (Beuken et al. 2008a, b; Goulding et al. 2012).

Despite some methodological differences between different risk-vulnerability assess-

ment techniques, a common approach was found based on three steps (Hokstad et al.

2009): (a) definition of the aims of the analysis and of the main features of the system, also

interacting with stakeholders such as water utility owners, safety managers, consumers,

municipalities and health Authorities; (b) hazard analysis mainly through brainstorming

sessions, past experiences and checklists (among others, Grigg 2003; Beuken et al. 2008a,

created an exhaustive hazard database for natural and human-related threats on drinking

water delivery infrastructure); (c) risk-vulnerability estimate methodology.

Most of the available methodologies are based on the analysis of specific elements of a

water system exposed to a fixed hazard. Specifically, much work has been done on the

assessment of water mains performance subjected to seismic action. For example, Li et al.

(2006) proposed a seismic hydraulic analysis, Shih and Chang (2006) derived fragility

relations between PVC pipes and earthquake parameters, Kakderi et al. (2011) described

methods to evaluate the seismic performance of water and waste-water systems through

several indicators for single components and for whole systems.

Other risk categories, such as landslides, were dealt with in academic papers as well,

although the need for further research on this topic has been underlined (Geertsema et al.

2009). Additionally, Binaghi et al. (2004) configured a neural model capable of learning

the displacement mechanisms in instrumented sites in order to predict displacements in

areas crossed by underground pipelines.

Nevertheless, Marzocchi et al. (2012) argued that classic strategies of risk evaluation

have some significant drawbacks such as difficulties in evaluating and comparing risks of

different origin and the assumption of the independence of different hazards which may

also underestimate the impact of extreme events. The role of new techniques, although still

not widely used, namely qualitative or semi-quantitative probabilistic approaches, should

therefore be emphasized (see, for example, Rosen et al. 2007; Lindhe 2010).

Choosing the most suitable approach is connected to the aim of the analysis (level of

decision, operational or strategic) and the complexity of the problem and is conditioned by

data availability (Rosen et al. 2007). In particular, qualitative methods aim to define

relative risk levels through words or classes, whereas quantitative tools express numerical

risk values. Nevertheless, quantitative tools usually require more resources in building the

model and collecting data, although more detailed data are generally provided. Quantita-

tive or semi-quantitative methods are typically used when the system analyzed is complex

and in order to facilitate comparison with other risks and acceptable levels of risk in

absolute terms (Lindhe 2010). Selecting the best approach, however, also depends on the

Nat Hazards (2014) 74:2193–2227 2197

123

Page 6: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

quality of available information, which is frequently affected by uncertainty (consider, for

example, the uncertainty on actual condition and breaking mechanisms of buried infra-

structure underlined by Kleiner and Rajani (2001), Rajani and Kleiner (2001) and Liu et al.

(2012).

A quantitative model of the uncertainty in the failure frequency of gas pipelines is

available in the literature (Cooke et al. 2003). This uncertainty is modeled as a function of

several observable pipeline and environmental characteristics, and based on the integration

of expert judgment, in order to develop a ranking tool for pipe sections. The tool is able to

predict failure frequencies per kilometer year and gives uncertainty bounds.

In the context of semi-quantitative techniques, Ezell (2007), for example, developed an

infrastructure vulnerability assessment model (I-VAM) based on the definition, by subject

matter experts, of value functions for each possible measure, for each component of the

system. The component-based approach fails to provide vulnerability metrics on a node-to-

node basis since it does not enumerate the various paths in a network and it does not

incorporate the hydraulic model of the network. The work by Karamouz et al. (2010a, b) is

worthy of note too. The vulnerability of the whole water supply system was calculated

following the approach by Ezell et al. (2000) as the sum of the subsystems’ vulnerabilities

representing a combination of several parameters chosen and evaluated by experts. A

strategic planning scheme and a driving force, pressure, state, impact and response

(DPSIR) methodology have been adopted for identifying the main internal and external

factors affecting the system, thus helping to establish suitable strategies. In any event, the

most simple and, perhaps, the most widely used approach is based on risk matrices used to

rank the risks related to a range of hazardous events (PAHO-WHO 1998; KDHE-BOW

2003). Other applicable techniques (details are provided by Hokstad et al. 2009) are failure

mode effects and criticality analysis (FMECA), fault tree analysis (FTA), event tree

analysis, Markov analysis and, particularly, Bayesian Belief Networks.

The importance of expert judgment elicitation techniques, particularly in hazard

assessment and risk management problems, was underlined in several studies. An inter-

esting contribution was provided by Aspinall and Cooke (1998) who proposed a formalized

procedure for eliciting expert judgment in real-time crisis management due to volcanic

hazard. The method performed a weighted combination of expert judgments and revealed

very successful for decision makers in handling key issues. The structured elicitation

methodology was used also for the reassessment of the long-term outlook at the volcano,

providing consensus probability values to the different branches of event trees for different

potential eruptive scenarios. Such trees became increasingly detailed and complex as the

eruption progressed. The most attracting features of the procedure are undoubtedly its

implementation effectiveness and the capability of overcoming knowledge discrepancies

and illogicalities. Furthermore, the model is based on a dynamic structure and on the

ability of interpreting complex phenomena during their temporal evolution. This means

that the model is built, modified and developed during the event, as a function of the

specific occurrences. Probability trees are updated as circumstances demand. Regular

assessments of the scientific team’s ‘comfort’ with the current alert level are fundamental

for optimizing decision making as well as for identifying all possible scenarios, the

hierarchy of perceived hazards, keeping track of the uncertainties in the problem.

Despite a still limited application in risk-vulnerability analyses in the water sector (see,

for example, Beuken et al. 2008b), BBNs may emerge as particularly useful in relation to

their numerous interesting features (Aguilera et al. 2011). A BBN is a probabilistic graphic

model and, more specifically, a statistical multivariate model for a set of variables (Jensen

and Nielsen 2007), defined in terms of qualitative (a directed acyclic graph, DAG,

2198 Nat Hazards (2014) 74:2193–2227

123

Page 7: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

constituted by nodes, links and conditional probability tables) and quantitative components

(a conditional distribution for each variable, defining the strength of the conditional

relationship with parent variables). Nodes are basically system variables, both discrete and

continuous chance, characterized by a set of possible states representing the conditions that

they might potentially occupy. Links define causal connections between nodes. A node that

has no links to any other variable is named ‘parent’ and the user is expected to define its

state, whereas the destination node of two or more links is termed ‘child’ node. Conditional

probability tables (CPTs) quantify the strength of a link between nodes based on Bayes

theory of probability and represent the key in correctly building a BBN (Bromley 2005).

BBNs are flexible and dynamic tools since they are able to automatically update

knowledge and results (Ordonez-Galan et al. 2009) in addition through the adoption of

learning algorithms (Li et al. 2010). Furthermore, they allow powerful integration between

expert and scientific knowledge, which can guide the model to focus on the most important

features or to find inconsistencies or differences with respect to established theoretical

properties (Batchelor and Cain 1999; Cain 2001; Wang et al. 2009). In particular, the role

of expert judgment has been widely discussed in the literature (Langseth and Portinale

2007) and many applications have confirmed its usefulness in helping assess which evi-

dence is limited or inconclusive, making the published and unpublished knowledge and the

wisdom of experts explicit and serving as a basis for action when problems are too urgent

or stakes too high to postpone measures until more complete knowledge is available. BBNs

are able to incorporate expert knowledge via a participatory modeling procedure (Uusitalo

2007). This potential has also been underlined by Bromley et al. (2005) and Pollino et al.

(2007) as the possibility of working with both huge and limited datasets. Krueger et al.

(2012) examined in detail the formal use of expert opinion too, underlining that expert data

should be treated like any other data, including the propagation of associated uncertainties.

Such data are fundamental as it allows the knowledge base of models to be widened.

The most significant technical features that make BBNs particularly useful for risk-

vulnerability analysis have been summarized by Wang et al. (2013): the combination of

qualitative and quantitative aspects; the possibility of reversal inference (from results to

causes) and the ease with which influencing factors can be ranked; their strong learning

ability; the combination of data with domain knowledge; prediction accuracy even with

rather small sample sizes. Furthermore, BBNs can be used to analyze the complex systems

and complex interactions that typically occur during extreme events (Peng and Zhang

2012; Li et al. 2010). At last, it should be underlined that nodes in BBNs are modeled by

means of probability distributions, thus allowing a more accurate estimate of risk and an

explicit propagation of uncertainty (Uusitalo 2007; Aguilera et al. 2011). As information

accumulates, knowledge on the true value of the variable usually increases, i.e., the

uncertainty of the value diminishes and the probability distribution grows narrower (Uu-

sitalo 2007). BBN can therefore operate with different levels of detail, directly taking into

account the uncertainty associated with input variables. Input data completeness, afford-

ability and reliability, which represent a serious problem in risk management activities, can

thus be properly taken into account. The results provided by BBN simulation could be

useful to support the phases of awareness raising and preparedness. In general, the more

detailed and precise the input data are, the more accurate and reliable will be the results.

Such features also contribute to making BBNs particularly effective for the building of a

Decision Support System (DSS) which is the fundamental objective of the present study. In

particular, the possibility of modeling the relationships between variables, even if they

involve uncertainty, unpredictability and imprecision (Batchelor and Cain 1999), is a basic

challenge for decision makers mainly for correctly evaluating the effects of strategies on

Nat Hazards (2014) 74:2193–2227 2199

123

Page 8: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

specific scenarios. As well as the mathematical aspects of BBNs, such tools can be also

highly useful since they promote an improved understanding of the system being modeled,

always taking into account the role of new factors which are relevant for the decision (Cain

2001).

The adoption of Bayesian Belief Networks allows the definition of a fixed general

structure for the model and can be used for mapping vulnerability levels on a typical water

supply system. The model is not built during each event, but simply characterized through

the states of input variables for the investigated infrastructure. A method for emergency

management, such as that by Aspinall and Cooke (1998), is characterized by a dynamic

temporal nature, whereas the Bayesian method adopted in the present work is ‘static,’

aiming at characterizing system’s conditions in specific time frames. Although the tem-

poral evolution of phenomena can be also modeled through Dynamic Bayesian Belief

Networks, this is beyond the aims of the present activity. Differently from Bayesian

Networks, the approach by Aspinall and Cooke (1998) is only based on expert judgment.

Bayesian Networks, instead, are capable of integrating different sources of knowledge and

information, as it will be discussed in the following. This is fundamental, since several

information on vulnerability mechanisms and on the behavior of drinking water infra-

structures is available.

Object-oriented Bayesian networks (OOBNs) are an advance on traditional BBNs based

on object-oriented programming (Molina et al. 2010). OOBNs are hierarchical descriptions

of real-world problems that mirror the way in which humans conceptualize complex

systems. According to the Authors, OOBNs are particularly able to consider the uncer-

tainty in every variable of the model through the implementation of the CPTs, to make the

modeling environment more user-friendly, and to integrate and represent together eco-

nomic, physical, social and other variables (Susnik et al. 2013). Practically, an OOBN

represents a number of networks that can be linked together such that it is possible to

transfer information from one to the other (Molina et al. 2011). Common variables are

identified and used as inputs for each individual BBN and then aggregated in a joint output

network. Such approach was found to be really useful in the field of water resources

management (Castelletti and Soncini-Sessa 2007; Pollino et al. 2007; Carmona et al. 2011;

Henriksen et al. 2012). As it will be discussed in the following, the OOBN approach

revealed particularly useful in the present activity, mainly in order to identify, isolate and

characterize each specific mechanism affecting the global vulnerability assessment. The

whole model domain is thus conceptualized into subdomains, and linkages from variables

in one subdomain to other subdomains are identified and modeled (Molina et al. 2010).

3 Model building

3.1 Aims and scope

The main objective of the research activity is to develop a probabilistic tool (DSS) for

performing a vulnerability assessment of water supply systems in order to prioritize risk

levels, locate weak points, identify potential problems of the infrastructure and risk sce-

narios and thus correctly identify the main actions to reduce infrastructure vulnerability, to

ease the emergency management, and, finally, to recovery the infrastructure. The DSS is

then composed by three main modules. The module described in this work aims to support

water utilities and decision makers to identify the most vulnerable elements of the network,

explain the role of specific features influencing vulnerability levels and thus assisting the

2200 Nat Hazards (2014) 74:2193–2227

123

Page 9: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

managers in the selection of the most suitable strategies to reduce infrastructure’s vul-

nerability toward different hazards.

The following sections describe the different phases for developing this module of the

DSS.

3.2 Knowledge elicitation and structuring

Knowledge is generally available in many forms, distributed throughout academic work,

technical reports and the minds of experienced individuals, and is characterized by a

variable degree of reliability (Wang et al. 2009). One of the typical problems encountered

when working in the water management field is the quality of the available information

which depends both on data reliability and on the fragmentation level of the existing

knowledge. Referring specifically to the scope of application of the present work, such

problems are much more evident since extreme events are uncommon, complex and dif-

ferentiated and particularly subject to knowledge dispersion phenomena. Therefore, the

collection and organization of expert knowledge can help in correctly defining and iden-

tifying complex problems. The combination of expert knowledge with other information is

used in many different areas such as risk analysis and reliability analysis (Page et al. 2012).

Although there are benefits to be derived from the use of expert knowledge, several issues

need to be addressed, such as expert selection, the aggregation of opinions, expert bias and

uncertainty (Krueger et al. 2012). In this work, expert knowledge and opinions were used

to fill gaps concerning the characteristics of the water supply system leading to high

vulnerability degree toward extreme events.

In the present activity, the knowledge of a group of experts, both engineers and

researchers working in the field of water management, was collected and represented a

basis for model building. Among the different knowledge elicitation methods, we selected

the one-to-one interview, because it allowed continuous feedback among interviewer and

interviewee (Page et al. 2012). In the following Table 1, a comprehensive list of the

experts involved in model building and validation is provided.

Several methods were used in order to avoid the most common sources of biases in

expert knowledge elicitation. Firstly, the impacts of interviewer’s problem framing on the

elicitation problem were reduced by involving few researchers in developing the frame-

work of the interview. This reduced the subjectivity level in the formulation of questions.

The availability issue—i.e., the tendency of experts to overestimate the likelihood of

events they had recently experienced—was lessened by making the experts aware of the

phenomenon and the scope of the study well in advance (Page et al. 2012). Each interview

started with a brief discussion to clarify the objectives of the activity, thus properly

focusing the aim of the DSS.

The results of the literature review concerning the vulnerability of water supply

infrastructures were used to develop the first draft of the conceptual model representing the

cause-effect chains linking the infrastructure characteristics to the vulnerability. Experts

were then asked to change the conceptual model, adding or deleting variables. The indi-

vidual conceptual models were aggregated to obtain the experts’ model. The process of

individual models aggregation ended when no new concepts and/or relationships emerged

after a number of interviews (Ozesmi and Ozesmi 2004).

Once the aggregated conceptual model was developed, experts were asked to weight the

different elements in conceptual model according to their relative importance in deter-

mining the system vulnerability. We assumed that the higher was the importance degree

assigned by the experts and the higher was the contribution of the elements to system

Nat Hazards (2014) 74:2193–2227 2201

123

Page 10: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

Ta

ble

1L

ist

of

the

stak

eho

lder

sin

vo

lved

inm

od

elb

uil

din

gan

dv

alid

atio

n,

and

des

crip

tio

no

fth

eir

role

Sta

keh

old

erT

yp

eN

um

ber

of

un

its

Inv

olv

emen

tP

arti

cip

atio

nle

vel

Info

rmat

ion

pro

vid

ed

DP

CT

echnic

ians

4M

odel

cust

om

eran

duse

rin

emer

gen

cyco

nd

itio

ns

Conce

ptu

alm

odel

buil

din

gan

dd

iscu

ssio

no

fre

sult

sO

bje

ctiv

esof

the

acti

vit

y,

char

acte

riza

tion

of

the

met

ho

do

log

ical

app

roac

h,

dis

cuss

ion

and

ver

ifica

tio

no

fth

ere

sult

s

IRS

A-C

NR

Res

earc

her

s6

Mo

del

bu

ild

eran

du

ser

Mo

del

bu

ild

ing

,m

od

elte

stin

g,

mod

elim

ple

men

tati

on

and

cali

bra

tion

Po

siti

ve

and

neg

ativ

eas

pec

tso

fth

em

ethodolo

gic

alap

pro

ach,

iden

tifi

cati

on

of

var

iab

les

and

wei

ghti

ng

of

cau

sal

rela

tionsh

ips,

BB

Nbuil

din

g,

imp

lem

enta

tion

tore

alca

sest

ud

ies

Poli

tecn

ico

di

Bar

iA

cadem

ics

4M

odel

buil

der

Model

buil

din

g,

model

imple

men

tati

on

and

cali

bra

tion

Iden

tifi

cati

on

of

var

iable

san

dw

eighti

ng

of

causa

lre

lati

onsh

ips,

BB

Nbuil

din

g,

imp

lem

enta

tion

tore

alca

sest

ud

ies

Wat

erau

tho

rity

(AqP

S.p

.A.)

Tec

hnic

ians

6M

odel

use

rin

ord

inar

ym

anag

emen

tco

nd

itio

ns

Conce

ptu

alm

odel

buil

din

gan

dd

iscu

ssio

no

fre

sult

sD

ata

pro

vis

ion

,d

iscu

ssio

nan

dv

erifi

cati

on

of

the

resu

lts

2202 Nat Hazards (2014) 74:2193–2227

123

Page 11: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

vulnerability. The experts’ opinions were collected as fuzzy numbers (Zadeh 1983; Zim-

mermann 1991; Page et al. 2012). Compared with other knowledge elicitation and struc-

turing methods, fuzzy numbers presented several advantages. Firstly, fuzzy numbers

allowed us to take the differences among experts’ opinions into account. Secondly, they

were flexible enough to be adapted to experts’ understanding of the phenomenon and to the

associated uncertainty (Page et al. 2012). Thirdly, fuzzy numbers were similar to natural

language, which reflected the ways experts were used to talk and think about the issues

considered. This reduced the perceived efforts of being involved in the knowledge elici-

tation phase (Giordano and Liersch 2012). Finally, fuzzy numbers allowed us to represent

areas of the distribution which are not well known.

The shape of the fuzzy number was developed by interacting with the interviewees,

making the meaning of each shape and the impacts on the results clear to them, i.e.,

relating the shape of the fuzzy numbers to the degree of confidence in the expressed

opinion. Various distributions were described (see Fig. 2), ranging from the wide flat-

topped distribution (low confidence) to much narrower triangular distribution, indicating

higher confidence (Giordano et al. 2013).

For the sake of clarity, we could consider the example in Fig. 3.

Experts were asked to formulate their opinions concerning the relative importance of

‘A’ and ‘B’ in determining the value of ‘C.’ A fuzzy number was assigned to A and to B by

(a)

(b)

(c)

Fig. 2 Fuzzy numbers describing the importance degree according to expert opinions. (a) Low confidence;(b) medium confidence; and (c) high confidence

Nat Hazards (2014) 74:2193–2227 2203

123

Page 12: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

each involved expert. In order to facilitate the BBN development, the conceptual models

were built as acyclic graphs. Nevertheless, feedback loops—i.e., circular relations from the

child variable to the parental node—could be identified. In this case, experts were required

to further investigate these loops. They can be the results of some mistakes during the

knowledge-structuring phase, or they can represent dynamic relations between variables

across multiple time frames (Nadkarni and Shenoy 2004). In the first case, the causal

connections were redefined together with the involved experts. If the feedback loops were

intentionally included by the experts to represent dynamic relations between variables over

time, then the parent variable (i.e., the variable receiving the feedback loop) was disag-

gregated in two time frames, as shown in Fig. 4. A fuzzy weight was assigned by the expert

to each variable.

Although it is widely acknowledged in the scientific literature that people can better use

and understand opinions expressed by non-numerical phrases than by numbers (see e.g.,

Budescu and Wallsten 1985) and that the experts are highly internally consistent in their

use of linguistic judgments (Clark 1990), using fuzzy numbers to describe experts’ opin-

ions requires to cope with the ambiguity in the interpretation of the terms related to the

fuzzy weights (e.g., low, medium and high) (Page et al. 2012; Budescu and Wallsten 1985;

Budescu et al. 1988). To this aim, additional semantic anchors were designed to normalize

expert responses and reduce ambiguity (Page et al. 2012). In this work, the used anchors

referred to the expected change of the value of variable C due to change in the parent

variables (Fig. 5).

A formal method of combining experts’ opinions was required. The fuzzy intersection

method was used (e.g., Page et al. 2012). The centroid of the area obtained after fuzzy

intersection allowed us to define the aggregated importance degree (Fig. 6).

The aggregated fuzzy weight was then used to develop the conditional probability table

of the BBN, as described in the next section.

Fig. 3 Causal connectionbetween three variables

A

B

C

A

B

C B'

Fig. 4 Disaggregation of the feedback loops in the conceptual model for the BBN development

2204 Nat Hazards (2014) 74:2193–2227

123

Page 13: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

3.3 BBN development

The conceptual model developed aggregating the experts’ knowledge was used as basis for

the development of the BBN. The cause-effect network of the BBN was obtained by

addressing some crucial issues related to the structure of the conceptual model, i.e., the

distinction between ‘direct’ and ‘indirect’ relationships between concepts, and the exis-

tence of loops (Giordano et al. 2013).

The next step was the development of the conditional probability table (CPT) which

determines the probability distribution of the value of a variable starting from the prob-

ability distribution of the parent variables. In this work, the CPT was developed using the

results of the fuzzy weighting process.

The CPT was defined using the following formula:

Ai ¼Xn

j¼1;j6¼i

WjiAj

!ð1Þ

where Aj is the value of the parent concepts; Wji is the weight obtained by aggregating the

expert judgements. Formula (1) makes it possible to assess the expected value of a variable

by considering the values of the parent nodes and the fuzzy weights. Therefore, the CPT

for each variable was calculated by considering the different values of the parent variables.

The probability that C assumes a certain value is assessed by comparing the value cal-

culated using Eq. (1) with the considered value in the CPT. The following formula was

used (Giordano et al. 2013):

P Ci ¼ VCið Þ ¼ 1� VCi

� V 0Ci

�� �� ð2Þ

where P(Ci = Vci) represents the probability that the variable Ci assumes the value Vcj; V0ci

represents the value of Ci obtained using formula (1), which is based on the values of the

LOW MEDIUM HIGH

No changesare expected

Small changes are expected (<10%)

Changes are expected (>10%

and <50%)

Significant changesare expected (>50%

and <75%)

Very significantchanges are

expected (>70%)

Fig. 5 Additional semantic anchoring

Fig. 6 Fuzzy intersection. The aggregated fuzzy weight is obtained as centroid of the intersection area

Nat Hazards (2014) 74:2193–2227 2205

123

Page 14: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

parent nodes. The obtained value is then normalized to 1. The involved experts were then

asked to validate the results of the CPT development process.

Once the structure of the model was outlined, feedback sessions were also held

involving the experts to ensure that the system had been modeled correctly and that errors

and inconsistencies had been eliminated.

3.4 Model validation procedure

Testing, validating and updating BBNs are essential to ensure reliability and reduce bias.

Validation is quite a complex process which is generally performed in various phases of

the model development process. Practical validation guidelines have been provided mainly

by Marcot et al. (2006), Marcot (2012) and Pitchforth and Mengersen (2013).

All the validation steps mentioned by Marcot et al. (2006) were performed. The first two

steps—i.e., alpha-level and beta-level—are mainly based on experts and proved to be

fundamental since a model might be tested mainly in terms of formal validity given that no

objective dataset exists (Pitchforth and Mengersen 2013). However, a third validation step,

carried out with real data, is generally required. Therefore, scientific cooperation activities

are being carried out with local water authorities in order to calibrate the model in relation

to a complete range of real case studies.

4 Model description

4.1 Overview

Following a simple scheme proposed by Lindhe (2010), a drinking water system consists

principally of a raw water source, a treatment plant and a distribution system. Going into

greater depth, Haestad Methods et al. (2003) and then Karamouz et al. (2010a) identified

water sources, a water treatment plant, water distribution pipelines and storage and other

facilities as the main components of a water system, vulnerable to both natural and human

influences.

The vulnerability assessment for water distribution networks is a multi-faceted issue,

generally encompassing the following aspects: (a) component analysis (i.e., pipes, valves,

reservoirs); (b) operations (i.e., the operating parameters of a network, such as water

pressure and flow); and (c) topology and connectivity (i.e., the number of arcs/nodes in a

network, elevations, arc lengths). For every aspect, a number of possible analysis methods

exist (see e.g., Fragiadakis et al. 2013). Most of the reported research works on the

vulnerability of water distribution networks focuses on component analysis. More complex

approaches are available, such as network reliability analysis, but they require a complete

knowledge of the topology and of the hydraulic functioning of the system. Considering the

scope of this module of the DSS and the unavailability of reliable and complete infor-

mation about the network, a component analysis was performed in this work.

To this aim, a typical scheme of a drinking water infrastructure was defined taking the

following elements into account: (a) water source, a natural and/or artificial system pro-

viding drinking water volumes (possible water sources include surface water such as rivers

or lakes, groundwater or a combination of these); (b) intake structures (b1. wells; b2.

wellspring intake; b3. dams; b4. river intake); (c) treatment plants; (d) water mains;

(e) tanks and storage; (f) pumping stations used to ensure adequate hydraulic pressure in

the service area; (g) control systems; and (h) urban distribution networks.

2206 Nat Hazards (2014) 74:2193–2227

123

Page 15: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

BBNs were developed for each subsystem referring to both hazard classes considered.

The main vulnerability mechanisms were identified, and the foremost variables condi-

tioning the structural behavior selected. In practice, each subsystem was considered

independently and thus vulnerability analysis was performed without taking into account

any connection or mutual dependency. Although this assumption does not affect the

assessment of each element or subsystem, it may determine a misleading interpretation of

overall system behavior (e.g., connections between elements cannot be neglected when the

diffusion of contaminants into the network is modeled). Such a simplified approach,

however, is sufficiently reliable, as clarified above, since it provides a general assessment

procedure for each element of the infrastructure, independently of its specific physical

configuration and the connections between subsystems. Coherently with the aims of the

present tool, technicians involved in risk management of drinking water infrastructures

need to know primarily which are the weakest points of the system (identified by means of

the vulnerability assessment model proposed), since the first failure immediately condi-

tions the hydraulic behavior of the network. Such analysis is then integrated through

hydraulic modeling software, useful for defining operative scenarios for complex and

interconnected networks.

Since the model is based on several BBNs, which are similar in terms both of structure

and applicability, only one of the developed BBNs is analyzed in the following section.

Particularly, the model used for assessing the physical vulnerability of water mains is

proposed and discussed in details.

4.2 The case of water mains: a conceptual model

As has been amply analyzed in the previous sections, one of the most favorable charac-

teristics connected to the adoption of BBNs in environmental modeling is their ability to

manage and integrate a range of different variables. In reference to the case of water mains,

vulnerability depends on a wide range of parameters which contribute to affect their

condition and their response to external action. As previously stated, the model was

developed using both expert knowledge and scientific literature. The most significant

factors affecting water system deterioration were defined in accordance with Kleiner and

Rajani (2001), Rajani and Kleiner (2001), Al-Barqawi and Zayed (2006a, b), Vairava-

moorthy et al. (2006) and Liu et al. (2012) and considering the influence of internal factors

and external conditions on the processes of pipe deterioration and failure (Rostum 2000;

Davies et al. 2001a, b; Sadiq et al. 2004; Wood and Lence 2009). The experts’ knowledge

was added, and the conceptual model developed.

A comprehensive review of the main parameters considered in the present methodology

for assessing pipe conditions, in relation to physical hazards, has been proposed in Fig. 7

below. In the same figure, the main damage mechanisms contributing to the global vul-

nerability analysis are also summarized.

Table 2 below provides a synthetic view of the main input variables considered, their

meaning and possible states.

Damage mechanisms contributing to physical vulnerability, presented in Fig. 7, are

briefly summarized in the following:

• Corrosion: the main reason for metal pipe failure (Sadiq et al. 2004; Al-Barqawi and

Zayed 2006a, b). Structural properties combined with environmental aggressiveness

and poor protection measures may significantly condition the failure rate and determine

Nat Hazards (2014) 74:2193–2227 2207

123

Page 16: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

a significant loss of mechanical performance in the event of extreme events and intense

stress.

• Breakage: physical breakage may occur as a consequence of poor mechanical soil and

structure properties, unexpected or intense loading and severe operating conditions. A

summary of external stresses (in buried pipes) can be found in Rajani et al. (2000) and

in Sadiq et al. (2004).

• Joint extraction: both structural and loading conditions determine the possibility of

joint extraction or damage during specific events such as earthquakes (Liu et al. 2012).

• Intentional damage: safety levels represent structural ‘resilience’ to potential anthropic

action of various kinds (sabotage, vandalism, etc.) depending on the protection

measures and detection techniques adopted (Gleick 2006).

As well as defining global physical vulnerability levels, the identification of influential

and independent mechanisms is useful to better identify the causes of vulnerability levels

and consequently of fundamental importance in selecting the best strategy to adopt and the

specific operational measures needed.

4.3 Model analysis

The structure of the BBN that was built for characterizing the physical vulnerability of

water mains is proposed in the following Fig. 8.

In reference to the concepts proposed in the previous section, the BBN can be inter-

preted in two ways. Firstly, a global vulnerability judgment on each element of the network

RS Material

INPUT VARIABLES F

AC

TO Thickness

Pipe coatingCathodic protectionThrust restraint

YSI

CA

L Thrust restraint

DiameterJoint frequencyJoint typeD h

Conceptual model

PH

TA

L

DepthLength

Soil mechanical characteristics

PHYSICAL VULNERABILITY

MECHANISMSBBN

PHYSICAL VULNERABILITY

ASSESSMENTON

ME

NT

AC

TO

RS

Soil mechanical characteristicsSeismicityExisting instabilitiesDynamic loads

MECHANISMS

CorrosionBreakage ASSESSMENT

EN

VIR

OF External pressures

Soil resistivity

H d li i bili

BreakageJoint extractionIntentional damage(safety level)

IVE

RS

Hydraulic variabilityOperating / Nominal PressureVisibilityAccessibility

(safety level)

OP

ER

AT

FAC

TO

ySurveillanceMonitoringAge / Design lifeM i tMaintenancePerformed/ScheduledExtra maintenance

Fig. 7 Overview of the input parameters and of damage mechanisms considered in the BBN developed forassessing the physical vulnerability of water mains

2208 Nat Hazards (2014) 74:2193–2227

123

Page 17: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

Table 2 Synthesis of the input variables adopted, of their meaning and of their possible states

Input variable Meaning States

Material Different materials determine variablemechanical behaviors and show a specificresponse to corrosion, breaking anddeterioration phenomena

Cast ironSteelConcretePlastic

Thickness A greater thickness accounts for greaterresistance and corrosion resiliency

HighLow

Pipe coating Inner and outer pipe coatings guaranteeoptimal resistance to chemical actions,deterioration and corrosion

YesNo

Cathodic protection Active protection systems reduce pipeelectrical potential limiting corrosion

YesNo

Thrust restraint The presence of thrust restraints balancesspecific forces (e.g., hydrodynamic force incurves)

YesNo

Diameter Studies have shown that pipe breaks tend toreduce for pipes with greater diameter.

[200 mm\200 mm

Joint type The flexibility of pipe joints conditions theirresponse to external actions

RigidSemi-rigidFlexible

Joint frequency The frequency of pipe joints conditions theoverall flexibility of the system

HighMediumLow

Depth Buried systems are less exposed to superficialevents (e.g., floods) and often not clearlyvisible

SuperficialBuried

Length The higher the length of the system, the lowerthe effectiveness of monitoring activities

HighMediumLow

Soil mechanicalcharacteristics

The mechanical properties of soil and backfillproperties influence the system’s response toexternal actions

GoodPoor

Seismicity The expected external stress level ischaracterized also through the analysis of theseismicity of the investigated area

HighMediumLow

Existing instabilities Increasing vulnerabilities are expected wherelocal instabilities (e.g., faults or landslides)already exist

YesNo

Dynamic loads The higher the dynamic loads (e.g., trafficloads) the higher the system’s vulnerability

FrequentAbsent

External pressures Local aggressive conditions (e.g., proximity ofelectricity lines, external currents) mayincrease vulnerability levels

HighMediumLow

Soil resistivity Soil resistivity summarizes a series of soilchemical, physical and biological featuresdetermining the expected behavior in termsof corrosion

HighMediumLow

Hydraulicvariability

A water system is much more vulnerable ifsubjected to significant variations inhydraulic conditions, particularly pressure.In the case of water mains, the entity ofhydrostatic pressure is considered

HighMediumLow

Nat Hazards (2014) 74:2193–2227 2209

123

Page 18: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

is given by the target variable (in the present case ‘physical vulnerability’). This means that

the end user may quickly estimate the global vulnerability level of the system, thus

immediately identifying the weakest points of an infrastructure. Secondly, an elementary

vulnerability judgment may help in verifying the specific contribution of each mecha-

nism—i.e., corrosion, breaking, joint extraction and safety level—to the global vulnera-

bility level. This may help in correctly addressing monitoring and operational efforts as

well as in choosing the most suitable strategies in order to reduce vulnerability. Referring

to the OOBN approach, the network was sketched as in Fig. 8b. Each of the vulnerability

mechanisms depends on a subset of input variables and can be interpreted as a subnet or,

namely, an ‘object’ contributing to the whole BBN.

Let us consider, for example, a part of the BBN as shown in Fig. 9. The nodes are

represented with their possible states.

The methodology for experts’ knowledge elicitation and structuring, described in

Sect. 3.2, was applied to the corrosion vulnerability. The ranking of the different elements

within this vulnerability mechanism was obtained considering the aggregated fuzzy

weights (Table 3).

The results summarized in Table 3 were then transposed into quantitative form via the

definition of CPTs, as described in Sect. 3.3. In Table 4, the CPT relating the ‘corrosion

vulnerability’ variable to its parent nodes is proposed as example.

Table 2 continued

Input variable Meaning States

Operating Pressure/Nominal Pressure

A pipe is much more vulnerable if operatingpressure is close to its nominal pressure

High (0.66–1)Medium (0.33–0.66)Low (0–0.33)

Visibility Most hydraulic structures are hidden.Recognizable structures are more exposed tosabotage and terrorist acts

YesNo

Accessibility Accessible structures (without fences or walls)are more exposed to sabotage and terroristacts

YesNo

Surveillance Surveillance by employees or monitoringsystems reduces the risk of intrusion andaccelerates emergency responses

YesNo

Monitoring Qualitative and quantitative monitoringsystems (both local and centralized),especially if continuous, help in quicklydetecting problems and faults

Existing and continuousExisting non continuousAbsent

Age/design Life Failure probability follows the classical‘bathtub’ curve: older systems are lessefficient and more subject to deterioration,newly completed ones may be affected byconstruction faults

[0.80.1–0.8\0.1

Maintenance:performed/scheduled

Regular maintenance contributes to improvingpipe conditions and response to externalstresses

LowMediumHigh

Extramaintenance Past unexpected maintenance activities denotevulnerable areas or vulnerability conditionsdue to local factors

FrequentAbsent

2210 Nat Hazards (2014) 74:2193–2227

123

Page 19: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

Once the structure of the BBN had been outlined, a feedback session with experts

helped in preliminarily validating the network in order to verify if the BBN was coherent

with their knowledge.

BBN for physical vulnerability of water mains

OBJECT 1Corrosion Vulnerability Mechanism

Join3 M

echa

nism

Ont E

xtraction

Corrosion vulnerability

lJoint extr a

Physical vulnerability

OB

JEC

Tal

Intr

usio

nM

OB

JEC

T2

Vulnerability

Safe

tyle

veaction

vulner

Ext

ern

yM

echanism

Breaking vulnerability

ability

OBJECT 4Breaking Vulnerability Mechanism

Protection level

Safety level

Breaking vulnerability

PHYSICAL VULNERABILITY

"Passive" protection level External stress level

VisibilityAccessibility Depth Dynamic loads Existing instabilities

Seismicity

"Active" protection level

Surveillance

Monitoring

Flexibility

Mechanical features

Soil mechanical characteristics

Hydraulic efficiency

Hydralic variability (hydrostatic)

Operating pressure/Nominal pressure

Joint extraction vulnerability Thrust restraint

Joint frequency

Diameter

Joint type

Actual conditions Corrosion Vulnerability

Environmental aggressiveness Corrosion resiliencyExternal pressures

MaterialPipe coating Cathodic protection

Thickness

Maintenance: performed/scheduledAge/Design life

Extra-maintenance

Soil resistivity

Length

a

b

Fig. 8 (a) BBN for the vulnerability assessment of water mains to physical hazards; (b) BBN representedthrough the OOBN approach

Actual conditions

GoodMediumPoor

33.333.333.3

Age/Design life

More than 08Between 01 and 08Less than 01

33.333.333.3

Maintenance: performed/scheduled

LowMediumHigh

33.333.333.3

Extra-maintenance

AbsentFrequent

50.050.0

Environmental aggressiveness

HighMediumLow

33.333.333.3

Corrosion resiliency

HighMediumLow

33.333.333.3

Soil resistivity

HighMediumLow

33.333.333.3

Cathodic protection

YesNo

50.050.0

Pipe coating

YesNo

50.050.0

Thickness

HighLow

50.050.0

External pressures

HighMediumLow

33.333.333.3

Corrosion Vulnerability

HighMediumLow

33.333.333.3

Material

Cast ironSteelConcretePlastic

25.025.025.025.0

Fig. 9 Analysis of the submodel describing the mechanism of corrosion vulnerability

Nat Hazards (2014) 74:2193–2227 2211

123

Page 20: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

Table 3 Ranking procedure of variables contributing to corrosion vulnerability

Child variable Rank Aggregated fuzzyweight

Parent variable Rank Aggregated fuzzyweight

Corrosion resiliency 1 0.9 Material 1 0.95

Pipe coating 2 0.87

Cathodic protection 3 0.82

Thickness 4 0.65

Environmentalaggressiveness

2 0.85 External pressures 1 0.9

Soil resistivity 2 0.8

Actual conditions 3 0.7 Extramaintenance 1 0.88

Age/design life 2 0.78

Maintenance performed/scheduled

3 0.68

Table 4 CPT associated with the ‘corrosion vulnerability’ variable

Corrosion resiliency Environmental aggressiveness Actual conditions High Medium Low

High High Good 0.05 0.05 0.9

High High Medium 0.05 0.05 0.9

High High Poor 0.05 0.05 0.9

High Medium Good 0 0.05 0.95

High Medium Medium 0 0.05 0.95

High Medium Poor 0 0.05 0.95

High Low Good 0 0 1

High Low Medium 0 0 1

High Low Poor 0 0 1

Medium High Good 0.5 0.3 0.2

Medium High Medium 0.55 0.25 0.2

Medium High Poor 0.6 0.2 0.2

Medium Medium Good 0.35 0.4 0.25

Medium Medium Medium 0.4 0.35 0.25

Medium Medium Poor 0.45 0.3 0.25

Medium Low Good 0.2 0.2 0.6

Medium Low Medium 0.25 0.25 0.5

Medium Low Poor 0.3 0.3 0.4

Low High Good 0.9 0.1 0

Low High Medium 0.95 0.05 0

Low High Poor 1 0 0

Low Medium Good 0.7 0.2 0.1

Low Medium Medium 0.75 0.15 0.1

Low Medium Poor 0.8 0.1 0.1

Low Low Good 0.5 0.3 0.2

Low Low Medium 0.55 0.25 0.2

Low Low Poor 0.6 0.2 0.2

2212 Nat Hazards (2014) 74:2193–2227

123

Page 21: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

The process of validation of the submodel considered was also performed using the

sensitivity analysis tool available in NeticaTM software. Sensitivity is defined as the

expected variation of certain variables as a result of the conditional probability structure of

the BBN and the specific state of its parents. Sensitivity analysis is particularly helpful in

displaying how much the target node (beliefs, mean value, etc.) could be influenced by a

single finding by the other nodes in the net. This analysis is best done (Marcot et al. 2001;

Marcot 2012) by first setting uniform probabilities at each input node because specifying

the value of an input variable sets its sensitivity value to zero, which can also affect

sensitivity of the remaining variables. In reference to the submodel proposed in Fig. 9, the

detailed results of the sensitivity analysis are set out in Table 5 below, expressing the

sensitivity of the target node (in this example, ‘corrosion vulnerability’) to the findings at

other nodes.

Full details on sensitivity analysis can be found in NeticaTM online documentation. A

similar detailed application of sensitivity analysis tools in NeticaTM shell was described

also by Amstrup et al. (2008).

Sensitivity is calculated in the modeling shell NeticaTM as the degree of ‘entropy

reduction’ or ‘mutual information’ (reduction in the disorder or variation) at one node

relative to the information represented in other nodes of the model. Thus, the sensitivity

tests indicate how much of the variation in the node in question is explained by each of the

other nodes considered.

In the following equations, P(q) and P(f) are the individual probabilities associated with

the states q and f of the variables Q and F, respectively, whereas P(q, f) is the short form for

P(q and f) and represents a joint probability distribution. Following a typical Bayesian

approach, the available knowledge is encoded in conditional probability statements, while

belief in joint events, if it is ever needed, is computed through the expression P(q,

f) = P(q|f) P(f). The notation P(q|f) expresses the Bayes conditionalization and attributes

to q a certain degree of ‘belief’ given the knowledge f (f is also called the ‘context’ of the

belief in q) (Pearl 1988).

Going further into details, the degree of entropy reduction I is the expected reduction in

mutual information of an output variable Q, with q states, due to a finding of an input

Table 5 Results of the sensitivity analysis for the ‘corrosion vulnerability’ variable

Node Mutual info (Entropy reduction) Percent Variance of beliefs

Corrosion resiliency 0.46345 42.8 0.0889487

Material 0.17432 16.1 0.0358891

Environmental aggressiveness 0.0215 1.99 0.0040697

Pipe coating 0.01683 1.56 0.003749

External pressures 0.00953 0.881 0.0018894

Cathodic protection 0.0031233 0.289 0.000677

Thickness 0.00171 0.158 0.0003808

Actual state 0.00135 0.125 0.0000565

Soil resistivity 0.00101 0.093 0.0001936

Extramaintenance 0.0004 0.0371 0.0000168

Age/design life 0.00008 0.00734 0.0000033

Maintenance performed/scheduled 0.00005 0.00496 0.0000022

Nat Hazards (2014) 74:2193–2227 2213

123

Page 22: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

variable F, with f states. For discrete variables, I is measured in terms of information bits

and is calculated as follows:

I ¼ HðQÞ � HðQjFÞ ¼X

q

X

f

Pðq; f Þ log2 Pðq; f Þ½ �PðqÞPðf Þ ð3Þ

where H(Q) is the entropy of Q before any new findings, H(Q|F)is the entropy of Q after

new findings from variable F, and Q is measured in information bits (Marcot et al. 2006;

Marcot 2012).

The ‘variance of belief’ represents the expected change squared of the beliefs of the

query variable, taken over all of its states, due to a finding at each other variable. The term

‘belief’ is used consistently with Pearl (1988) and represents the posterior probability (the

conditional probability assigned once the evidence is taken into account). The variance of

beliefs is determined according to the following equation:

S2 ¼X

q

X

f

Pðq; f Þ � Pðqjf Þ � PðqÞ½ �2 ð4Þ

From the results of a sensitivity analysis, input variables can be rank-ordered or com-

pared quantitatively as to the degree to which each reduces variance or uncertainty

(entropy) in a specified outcome variable (Marcot 2012). Generally, the number that best

describes the degree of sensitivity of one node to another, in case of discrete nodes, is the

‘mutual information’ (or ‘entropy reduction’). Such parameter was therefore used for

analyzing the influence of single variables.

The results have been discussed with experts who agreed with them. A similar proce-

dure was carried out for each submodel in both BBNs, and changes were then made to the

CPTs in order to match them with the experts’ knowledge.

5 Model implementation

The Apulia region, located in the southern part of Italy, has been unfortunately notorious,

since Roman times, for its arid appearance and climate and for a permanent shortage of

water. The Apulian Aqueduct project, whose conception and initial construction dates back

to the end of nineteenth and the early years of the twentieth centuries, is a response to this

historic water issue. It is the largest aqueduct in Europe and is still considered one of the

foremost works worldwide in the field of hydraulic engineering with about 12,000 km of

urban networks, 4,000 km of water mains serving more than 4 million users. The con-

siderable distance between the water sources and the main urban areas, as well as the

complicated territorial pattern due to the presence of mountains and geologically unstable

areas, has produced, on the one hand, a series of design and construction concerns, and on

the other hand, significant operating and maintenance problems. Several hazards (including

earthquakes, landslides and floods) still represent a serious issue for the functioning of such

an important system.

The present research project is being developed with the support of the technical staff of

Acquedotto Pugliese S.p.A. (AqP), the regional water company. Several case studies

connected to hazardous events were selected and were modeled in order to provide support

for validating and calibrating the vulnerability model. A range of hazards were taken into

account in order to provide a complete and differentiated operational framework. The

results of two case studies, both related to water mains, are summarized in the following.

2214 Nat Hazards (2014) 74:2193–2227

123

Page 23: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

5.1 Case study: Ofanto Aqueduct

Firstly, the vulnerability model has been applied to one of the most important elements of

the regional network whose location is shown in Fig. 10. It is a pressurized system with an

overall length of approximately 100 km designed for discharges from 1.9 to 6.5 m3/s

according to specific operational conditions. Steel pipes divided into 16-m-long bars with

welded joints with diameters of 2,400 or 2,000 mm, and thicknesses of 20 mm were used.

The system was designed and built in the 1980s in order to respond to increasing demand

for water in central Apulia’s urban areas and to provide an alternative path to the volumes

conveyed through another water main. Despite this, the Ofanto Aqueduct is still affected

by the existence of active landslide phenomena, especially in the Apennine area and

several pipe branches have been damaged or undergone major maintenance work over the

last few years. Furthermore, in the most hazardous locations, pipe relative displacements

are monitored in real time with a GPS system.

The physical vulnerability model for water mains was applied, integrating the structural

information provided by AqP, with geographical and environmental data available through

geographical databases, useful for defining input variables for the model (see Table 2).

Infrastructural information was available partially in digital form and partially as hard

copy. Environmental and territorial data were available in digital form, mainly through

online Web-GIS platforms, from local authorities and institutions. The procedure was

developed in GIS environment and data attribution partially automated by means of simple

tools.

The infrastructure analyzed was divided into homogeneous elements according to the

input variables required. The associated database was then imported as a ‘cases file’ into

0 20 40 60 8010Kilometers

Ofanto aqueduct

Water supply systems

Railways

Major roads

Rivers

Geomorphological hazard

Hydraulic hazard

Fig. 10 Location of Ofanto Aqueduct and geographical data

Nat Hazards (2014) 74:2193–2227 2215

123

Page 24: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

NeticaTM software thus allowing a contextual compilation of the BBN for all the homo-

geneous elements of the infrastructure. The results were then directly joined with the GIS

layer of the infrastructure and plotted on a graph. In particular, Fig. 11 shows the proba-

bilistic values associated with the state ‘high’ of the ‘breaking vulnerability’ variable (the

most representative in the event of landslide). The detailed view proposed within the same

Figure focuses on results in the study area.

BBN results appeared coherent with the real situation since the highest levels of

breaking vulnerability overlapped with the points where severe damage was experienced. It

is worth noting that, besides damaged pipes located in the study area, the model detected

other areas, mainly located in the upstream part of the aqueduct, with significant vulner-

ability levels. Such conclusions were therefore discussed with AqP technicians, and par-

ticularly, the situation of other points investigated in detail and recognized as highly

vulnerable. It was found that several of these pipe sections were under maintenance and

intrusive monitoring due to slight damage.

Referring to Ofanto Aqueduct, an overview of the conditions of the whole infrastructure

provided by the vulnerability assessment methodology is described in the following.

Particularly, five classes were defined referring to the value of high probability of ‘breaking

vulnerability’ (More than 0.6 = ‘Very high’; between 0.5 and 0.6 = ‘High’; between 0.4

and 0.5 = ‘Medium’; between 0.3 and 0.4 = ‘Low’; and Less than 0.3 = ‘Very low’).

The total length of pipes within each class was calculated, and mean probability values

associated with ‘breaking vulnerability’ states (see the following Table 6 for details). The

vulnerability assessment confirms that Ofanto Aqueduct is characterized by ‘Medium’ to

‘Very low’ breaking vulnerability conditions. A few critical locations (‘High’ and ‘Very

0 10 20 30 405Kilometers

Probability of ’high’ breaking vulnerability

0.14 - 0.25

0.26 - 0.36

0.37 - 0.47

0.48 - 0.58

0.59 - 0.69

Water supply systems

Railways

Major roads

Rivers

Geomorphological hazard

Hydraulic hazard

Fig. 11 Results of the first case study: values of high probability of breaking vulnerability on the entireinfrastructure and detail of the study area

2216 Nat Hazards (2014) 74:2193–2227

123

Page 25: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

high’ probability of breaking vulnerability) are clearly identified, representing approxi-

mately the 3 % of the global length of the infrastructure. Such information is highly

significant for local water companies, since it can be used for easily prioritizing actions and

for correctly addressing maintenance activities, thus effectively reducing the vulnerability

levels on complex networks.

Referring to the most vulnerable pipe of the network, the OOBN approach was used for

identifying the specific role of single mechanisms contributing to the physical vulnerability

levels. The following Fig. 12 clarifies the influence of each vulnerability mechanism,

through the value of the high probability associated with the worst state of the variable

(‘Breaking vulnerability,’ ‘Joint extraction vulnerability’ and ‘Corrosion vulnerabil-

ity’ = High; ‘Safety level’ = Low).

As depicted in the above Fig. 12, the ‘breaking vulnerability’ mechanism is clearly the

most influential for the network, as expected. The mechanisms described by other ‘objects’

denote, instead, a limited influence on the physical vulnerability levels. The identification

of the foremost mechanism is fundamental for decision makers in order to select the most

suitable actions to be implemented in order to reduce the vulnerability. This, along with the

results of the sensitivity analysis performed for each ‘object,’ useful for identifying the

most influential variables, may directly allow a clear identification of best actions.

Referring particularly to the Ofanto Aqueduct case study, the input variables that primarily

condition vulnerability levels are environmental parameters (‘seismicity,’ ‘existing

Table 6 Overview of the breaking vulnerability levels for Ofanto Aqueduct

Probability P of breaking vulnerability

Very high High Medium Low Very low

Length (m) 174.4 2,882.6 32,330 43,167.8 10,072.3

P = High 0.62 0.54 0.45 0.33 0.28

P = Medium 0.15 0.17 0.17 0.15 0.13

P = Low 0.23 0.30 0.38 0.52 0.58

62.3

31.8

15

25

breakingvulnerability

safetylevel

corrosionvulnerability

joint extractionvulnerability

Fig. 12 Overview of the specificinfluence of vulnerabilitymechanisms (‘objects’) onphysical vulnerability levels forOfanto Aqueduct

Nat Hazards (2014) 74:2193–2227 2217

123

Page 26: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

0 30 60 90 12015Kilometers

"Canale principale"

Water supply systems

Railways

Major roads

Rivers

Geomorphological hazard

Hydraulic hazard

Fig. 13 Location of ‘Canale Principale’ and geographical data

0 25 50 75 10012.5Kilometers

Probability of ’high’ breaking vulnerability

0.14 - 0.25

0.26 - 0.36

0.37 - 0.47

0.48 - 0.58

0.59 - 0.69

Water supply systems

Railways

Major roads

Rivers

Geomorphological hazard

Hydraulic hazard

Fig. 14 Results of the second case study: values of high probability of breaking vulnerability on the entireinfrastructure and detail of the study area

2218 Nat Hazards (2014) 74:2193–2227

123

Page 27: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

instabilities’ and ‘soil mechanical characteristics’). A reduction of vulnerability levels

could be therefore mainly pursued through environmental interventions (e.g., regulate

surface and underground water and set the body of the landslides to give a long-lasting

slowdown effect), rather than by structural changes. An explicit introduction of possible

actions, for the development of a comprehensive DSS, is one of the main upcoming

developments of the research.

5.2 Case study: ‘Canale Principale’

A second case study was developed in reference to another fundamental water infra-

structure in Puglia whose location is represented in Fig. 13, namely the ‘Canale Princi-

pale.’ It is a gravity water main made of brick laid with cement mortar and designed for a

discharge of 6.5 m3/s. Its overall length is approximately 245 km with several segments in

tunnels. Designed and built starting from the early 1900s, it was an ambitious engineering

challenge (VV.AA. 1929). Canale Principale is currently the most important infrastructure

for conveying drinking water in Puglia although several hazards (mainly a severe earth-

quake in 1980s) have threatened its functioning in different sections.

With the same procedure described for the previous case study, the physical vulnera-

bility model for water mains was applied to the whole ‘Canale Principale,’ combining both

structural and environmental data in the GIS environment. The results expressing the

probability of the ‘breaking vulnerability’ being ‘high’ are plotted in Fig. 14 below. A

detailed view proposed within the same Figure focuses on results in the study area.

In the second case study as well, model predictions reflect the real situation quite well

since the highest levels of breaking vulnerability are within the damaged branches.

Following the same approach used in the previous section, an overview of the condi-

tions of Canale Principale according to the results of the vulnerability assessment meth-

odology is described in the following. Particularly, in the following Table 7, the total

length of pipes within each class was calculated, and mean probability values associated

with ‘breaking vulnerability’ states. In the present case study too, ‘Medium’ to ‘Very low’

breaking vulnerability conditions are prevailing. A few critical locations (‘High’ and ‘Very

high’ probability of breaking vulnerability), where actions should be primarily addressed,

are also identified.

As in the previous section, the OOBN approach can be used for identifying the specific

role of single mechanisms contributing to the physical vulnerability levels referring to the

most vulnerable pipe of the network. The following Fig. 15 clarifies the influence of each

vulnerability mechanism, through the value of the high probability associated with the

worst state of the variable (‘Breaking vulnerability,’ ‘Joint extraction vulnerability’ and

‘Corrosion vulnerability’ = High; ‘Safety level’ = Low).

Table 7 Overview of the breaking vulnerability levels for Canale Principale

Probability P of breaking vulnerability

Very high High Medium Low Very low

Length (m) 553.30 10,788.10 19,611.00 2,490.00 197,173.00

P = High 0.69 0.55 0.42 0.33 0.20

P = Medium 0.15 0.18 0.18 0.15 0.11

P = Low 0.16 0.27 0.40 0.52 0.69

Nat Hazards (2014) 74:2193–2227 2219

123

Page 28: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

As depicted in the above Fig. 15, the ‘breaking vulnerability’ mechanism is the most

influential for the network, as expected. However, significant safety problems are also

present. The other mechanisms denote, instead, a limited influence on the physical vul-

nerability levels. The identification of the foremost mechanisms is fundamental for deci-

sion makers in order to identify and select the most suitable strategies to reduce

vulnerability levels. Also in this case, the identification of the most influential mechanisms

and of the main variables help decision makers in selecting optimal strategies. Likewise in

the previous case study, environmental parameters are the foremost to be modified,

although the ‘safety level’ can be also improved, mainly improving the ‘Actual conditions’

of the infrastructure.

5.3 Model validation and update

The model was validated through several steps, as described in Sect. 3.4. Particularly, the

application of the model to the case studies above helped to check and modify the structure

that was preliminarily developed. Particularly, both case studies suggested only a signif-

icant modification of the network confirmed also by technical review sessions with experts,

consisting in the insertion of the ‘extra maintenance’ variable. This variable determines a

negative influence on ‘actual conditions,’ expressing an increase in vulnerability levels in

places where maintenance was required in the past. Besides being an expression of local

vulnerability conditions, this is further justified by the fact that technicians often noticed

the concentration of new damages in the vicinity of past interventions, possibly due to the

change in local conditions and structural response.

Minor changes were also performed in some CPTs, particularly in order to increase the

influence of mechanical soil characteristics on breaking vulnerability. A major role of ‘Soil

mechanical characteristics’ on ‘Mechanical features’ was explicitly taken into account, as

suggested by experts.

5.4 Application of the tool to an operative scenario

The systems described in Sects. 5.1 and 5.2 are interconnected, since Ofanto Aqueduct was

designed and built in the 1980s in order to respond both to increasing demand for water in

57.3

41.5

3.65

10

breakingvulnerability

safety level

corrosionvulnerability

joint extractionvulnerability

Fig. 15 Overview of the specificinfluence of vulnerabilitymechanisms (‘objects’) onphysical vulnerability levels forCanale Principale

2220 Nat Hazards (2014) 74:2193–2227

123

Page 29: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

central Apulia urban areas and to provide an alternative path to the volumes conveyed

through Canale Principale, which had been seriously damaged during an earthquake.

Therefore, one of the most probable emergency scenarios, confirmed also by the results of

the modeling activity summarized above as well as by the local water authority, is asso-

ciated to the interruption of the flow within the Canale Principale, with the transfer of the

whole discharge (6.5 m3/s) in the Ofanto Aqueduct, behaving as a sort of ‘bypass’ system.

In the following Fig. 16, we propose the results of a simulation of the hydraulic

behavior of Ofanto Aqueduct considering the scenario of 6.5 m3/s flowing in the system.

The adopted software, EPANET, was used in order to get information about pressures in

nodes and flows in links. The ordinary conditions for Canale Principale were also simu-

lated in HEC-RAS, but the results are omitted for the sake of brevity. Although the

application described in the present section is quite simple, it can be easily argued that

several important information on the variation of the hydrodynamic regime of the system

can be obtained from an hydraulic model. This is mainly useful for assessing the conse-

quences of an event on the ordinary conditions (pressure reduction, discharge variation,

etc.) and for verifying alternative functioning conditions of the network.

The adoption of an hydraulic modeling tool in conjunction with the vulnerability

assessment methodology could reveal even more helpful, since BBN can be firstly used to

get a mapping of vulnerability levels and then, a series of hypothesis on the hydraulic

functioning of the network can be developed accordingly.

6 Discussion and future developments

Currently, several BBNs were built and are available in order to perform the vulnerability

assessment of each element of a water delivery infrastructure in relation to a range of

hazards that are classified as physical hazards (landslides, floods, earthquakes, etc.) and

Pressure

52.00

94.00

136.00

178.00

m

Flow

112444.00

224888.00

337332.00

449776.00

CMD

Fig. 16 Results of the hydraulic simulation performed in EPANET referring to the scenario considered

Nat Hazards (2014) 74:2193–2227 2221

123

Page 30: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

CBR hazards (chemical, biological and radiological contamination). Both natural events

and anthropic actions are considered.

The implementation of the vulnerability module of the DSS in the two case studies

revealed its usefulness and satisfactory predictive capability, as well as some practical

difficulties and approximations.

Firstly, it has to be underlined that the application of the model to real cases helped to

confirm, with minor changes, the structure of the model that was preliminarily developed.

Particularly, both case studies suggested only a significant modification of the network

confirmed also by technical review sessions with experts consisting in the insertion of the

‘extra maintenance’ variable. Minor changes were also performed in some CPTs, partic-

ularly in order to slightly increase the influence of mechanical soil characteristics on

breaking vulnerability.

Interaction with the technicians of the local water authority also revealed the tool’s

usefulness to support them in optimizing management procedures and for scheduling

ordinary maintenance, in order to reduce network vulnerability.

Feedback sessions were held with both DPC and a local water authority (AqP), two

different subjects involved in drinking water infrastructures management process, and the

formal structure of the model discussed and modified. Once the case studies were com-

pleted, the results were carefully commented, in order to check whether the proposed tool

was able to comply with requirements and needs by both decision makers. A positive

feedback was provided by DPC on the adoption of the tool in emergency management

activities, as well as by AqP referring to the applicability of the system to ordinary

procedures. Particularly, according to the feedbacks collected during the interaction with

local technicians, the results of the model could be used to prioritize actions, by imme-

diately identifying weak points where further detailed investigations should be performed

or where resources should be firstly directed.

Despite the fact that the proposed vulnerability assessment tool is fundamental to the

development of a DSS for managing emergencies on drinking water infrastructures, it

appears not to be completely satisfactory for performing a comprehensive assessment of

system performance and for selecting operational strategies. In fact, the vulnerability tool

should be integrated with an hydraulic model capable of characterizing the variation in the

hydrodynamic regime due to the potential damage of one or more elements of the system

and scenarios occurring on the network. Such an upgrade is particularly useful for

investigating the impact of hazards on complex and branched systems. This aspect is being

carefully investigated, and a hydraulic model in EPANET (for pressurized systems) and in

HEC-RAS (for gravity systems) was developed and tested, with specific reference to the

case studies, in order to analyze several possible flow configurations.

As already stated, the capability of the model to fill data gaps by referring to experts’

knowledge was really useful in the vulnerability analysis for the two case studies. In fact,

although the amount of information required as input by the tool was rather low, the phase

of data population was quite complicated, since data from different sources, available in

different forms (digital or hard copy), with inhomogeneous level of detail and reliability

had to be combined and manipulated. This demonstrated once more that the implemen-

tation of more quantitative-oriented tools could be strongly hampered by the low acces-

sibility and reliability of information about the infrastructure.

During the feedbacks collection sessions, we were also able to identify potential

drawbacks of the proposed tool. Firstly, local technicians emphasized the subjectivity

related to the definition of the value to be assigned to the variables in the model. Although

these issues were addressed during the knowledge elicitation phase (see Sect. 3.2), the final

2222 Nat Hazards (2014) 74:2193–2227

123

Page 31: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

version of the model will be accomplished with practical guidelines which are currently

under development, to help the user with variable comprehension and values attribution.

Another significant issue to be considered is connected to a certain difficulty in working

with different software and environments for managing data: data exchange is not

straightforward since it has not been automated. Nevertheless, a user-friendly interface is

being developed in order to simplify data transfer and processing between GIS and Ne-

ticaTM particularly with the aim of making the data entry interactive and simplifying the

visualization of results.

The model was only validated with specific reference to the case of water mains, but no

significant differences in terms of strengths and weaknesses are expected referring to other

infrastructural elements. The only major issue that may arise is in the application of such

tool to the case of urban water networks. Indeed, such systems are particularly complex

and characterized by a strong information uncertainty, as emerged during interviews with

technicians of water utilities. A different approach based on the vulnerability assessment of

global urban districts should be adopted.

Although the methodological framework was carefully defined and preliminary tests

performed, further research studies may be useful to refine its structure and its inference

ability. The integration of the probabilistic vulnerability assessment tool with an hydraulic

model revealed also fundamental for investigating the effects of specific scenarios on the

behavior of complex networks.

The development of the other two modules aiming to support the emergency man-

agement and recovery phase is one of the most urgent developments of the described

activity. To this aim, actions have to be introduced in the model, in order to dynamically

simulate their impacts on the infrastructure. The uncertainty management and communi-

cation will play a crucial role in this development phase.

7 Conclusions

The present work summarizes the methodological approach adopted and the first results of

a research project that is being carried out by the Water Research Institute of the National

Research Council (IRSA-CNR) supported by the Italian Department of Civil Protection

(DPC), oriented to the definition of a probabilistic vulnerability assessment tool for

drinking water infrastructure. The main aim of the model is to detect weak points and high

vulnerability conditions, thus helping to optimize interventions and limit the consequences

on populations of drinking water quantity reduction and quality alteration in the event of

natural and anthropogenic disasters. It could be therefore mainly used as a DSS for opti-

mizing the risk management activities on drinking water systems. The model proved to be

sufficiently reliable even in case of lack of detailed information, and thus, capable of

providing effective responses and operational strategies to reduce infrastructure

vulnerability.

The experiences carried out in the two case studies demonstrated the potentialities of

BBNs in structuring expert knowledge and making it functional to support vulnerability

assessment. BBNs’ ability to deal with qualitative information was particularly helpful in

the present work. As already discussed, a positive feedback was also provided by AqP

technicians regarding the possibility of using this tool for the detection of vulnerable areas

and the prioritization of intervention even in ordinary conditions.

Nat Hazards (2014) 74:2193–2227 2223

123

Page 32: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

The proposed developments of the tool will be particularly oriented to the definition of

other modules mainly aiming at supporting both the emergency management and the

recovery phase, thus widening its applicability conditions.

Acknowledgments The present research activity was supported by the Italian Department of Civil Pro-tection (‘‘Intesa Operativa del 19.12.2006 tra DPC e IRSA—Rep. 618’’). The authors are particularlygrateful to the Acquedotto Pugliese S.p.A. technicians for their support in model development and forproviding data for case studies. We would like to thank Dr. Gianluigi Fiori (Acquedotto Pugliese S.p.A.), Dr.Girolamo Vitucci (Acquedotto Pugliese S.p.A.), Dr. Andrea Duro (Department of Civil Protection) and Dr.Francesco Campopiano (Department of Civil Protection). We are also grateful to all the experts whocontributed to model building and validation too.

References

Aguilera PA, Fernandez A, Fernandez R, Rumı R, Salmeron A (2011) Bayesian networks in environmentalmodeling. Environ Model Softw 26:1376–1388. doi:10.1016/j.envsoft.2011.06.004

Al-Barqawi H, Zayed T (2006a) Condition rating model for underground infrastructure sustainable watermains. J Perform Constr Facil 20(2):126–135. doi:10.1061/(ASCE)0887-3828(2006)20:2(126)

Al-Barqawi H, Zayed T (2006b) Assessment model of water main conditions. In: Proceedings of pipelines2006—service to the owner, July 30–August 2 2006, Chicago, Illinois. doi:10.1061/40854(211)27

Amstrup SC, Marcot BG, Douglas DC (2008) A Bayesian network modeling approach to forecasting the21st century worldwide status of polar bears. In: DeWeaver ET, Bitz CM, Tremblay LB (Eds) Arcticsea ice decline: observations, projections, mechanisms, and implications. Geophysical monograph 180.American Geophysical Union, Washington DC, pp 213–268

Aspinall W, Cooke RM (1998) Expert judgment and the Montserrat volcano eruption. Proceedings of the 4thinternational conference on probabilistic safety assessment and management PSAM4, September 13th–18th, New York City, USA (eds. Ali Mosleh and Robert A. Bari), Vol. 3, pp 2113–2118

Batchelor C, Cain J (1999) Application of belief networks to water management studies. Agric Water Manag40(1):51–57. doi:10.1016/S0378-3774(98)00103-6

Beuken R, Reinoso M, Sturm S, Kiefer J, Bondelind M, Astrom J, Lindhe A, Rosen L, Pettersson T,Machenbach I, Melin E, Thorsen T, Eikebrokk B, Hokstad P, Rostum J, Niewersch C, Kirchner D,Kozisek F, Weyessa Gari D, Swartz C, Menaia J (2008a) Identification and description of hazards forwater supply systems—a catalogue of today’s hazards and possible future hazards. TECHNEAUD4(1):4

Beuken R, Meerkerk M, Bosch A, Reinoso M, Mesman G (2008b) Risk assessment case study—Amster-dam, The Netherlands. TECHNEAU D4.1.5c

Binaghi E, Boschetti M, Brivio PA, Gallo I, Pergalani F, Rampini A (2004) Prediction of displacements inunstable areas using a neural model. Nat Hazards 32(1):135–154. doi:10.1023/B:NHAZ.0000026796.59079.1a

Bromley J (2005) Guidelines for the use of Bayesian networks as a participatory tool for water resourcemanagement. Centre for Ecology and Hydrology Crowmarsh Gifford, Wallingford

Budescu DV, Wallsten TS (1985) Consistency in interpretation of probabilistic phrases. Organ Behav HumDecis Process 36(3):391–405. doi:10.1016/0749-5978(85)90007-X

Budescu DV, Weinberg S, Wallsten TS (1988) Decisions based on numerically and verbally expresseduncertainties. J Exp Psychol Hum Percept Perform 14(2):281–294. doi:10.1037/0096-1523.14.2.281

Cain J (2001) Planning improvements in natural resources management—guidelines for using Bayesiannetworks to support the planning and management of development programmes in the water sector andbeyond. Centre for Ecology and Hydrology Crowmarsh Gifford, Wallingford

Carmona G, Varela-Ortega C, Bromley J (2011) The use of participatory object-oriented Bayesian networksand agro-economic models for groundwater management in Spain. Water Resour Manag25(5):1509–1524. doi:10.1007/s11269-010-9757-y

Castelletti A, Soncini-Sessa R (2007) Bayesian networks and participatory modelling in water resourcemanagement. Environ Model Softw 22(8):1075–1088. doi:10.1016/j.envsoft.2006.06.003

Christodoulou SE (2011) Water network assessment and reliability analysis by use of survival analysis.Water Resour Manag 25(4):1229–1238. doi:10.1007/s11269-010-9679-8

Clark DA (1990) Verbal uncertainty expressions: a critical review of two decades of research. Curr PsycholRes Rev 9(3):203–235. doi:10.1007/BF02686861

2224 Nat Hazards (2014) 74:2193–2227

123

Page 33: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

Cooke RM, Jager E, Lewandowski D (2003) Reliability model for underground gas pipelines. In: BonanoEJ, Camp AL, Majors MJ, Thompson RA (eds) Probabilistic safety assessment and management.Elsevier, Amsterdam, pp 1045–1050

Davies JP, Clarke BA, Whiter JT, Cunningham RJ (2001a) Factors influencing the structural deteriorationand collapse of rigid sewer pipes. Urban Water 3:73–89. doi:10.1016/S1462-0758(01)00017-6

Davies JP, Clarke BA, Whiter JT, Cunningham RJ, Leidi A (2001b) The structural condition of rigid sewerpipes: a statistical investigation. Urban Water 3:277–286. doi:10.1016/S1462-0758(01)00036-X

Ezell BC (2007) Infrastructure vulnerability assessment model (I-VAM). Risk Anal 27(3):571–583. doi:10.1111/j.1539-6924.2007.00907.x

Ezell BC, Farr JV, Wiese I (2000) Infrastructure risk analysis model. J Infrastruct Syst 6(3):114–122. doi:10.1061/(ASCE)1076-0342(2000)6:3(114)

Fragiadakis M, Christodoulou SE, Vamvatsikos D (2013) Reliability assessment of urban distributionnetworks under seismic loads. Water Resour Manag 27(10):3739–3764. doi:10.1007/s11269-013-0378-0

Geertsema M, Schwab JW, Blais-Stevens A, Sakals ME (2009) Landslides impacting linear infrastructure inwest central British Columbia. Nat Hazards 48(1):59–72. doi:10.1007/s11069-008-9248-0

Giordano R, Liersch S (2012) A fuzzy GIS-based system to integrate local and technical knowledge in soilsalinity monitoring. Environ Model Softw 36:49–63. doi:10.1016/j.envsoft.2011.09.004

Giordano R, D’Agostino D, Apollonio C, Lamaddalena N, Vurro M (2013) Bayesian belief network tosupport conflict analysis for groundwater protection: the case of the Apulia region. J Environ Manag115:136–146. doi:10.1016/j.jenvman.2012.11.011

Gleick PH (2006) Water and terrorism. Water Policy 8(6):481–503. doi:10.2166/wp.2006.035Goulding R, Jayasuriya N, Hora E (2012) A Bayesian network model to assess the public health risk

associated with wet weather sewer overflows discharging into waterways. Water Res 46(16):4933–4940. doi:10.1016/j.watres.2012.03.044

Grigg NS (2003) Water utility security: multiple hazards and multiple barriers. J Infrastruct Syst 9(2):81–88.doi:10.1061/(ASCE)1076-0342(2003)9:2(81)

Haestad Methods, Walski TM, Chase DV, Savic DA, Grayman W, Backwith S, Koelle E (2003) Advancedwater distribution modeling and management. Haestad Press, Waterbury

Henriksen HJ, Zorrilla-Miras P, de la Hera A, Brugnach M (2012) Use of Bayesian belief networks fordealing with ambiguity in integrated groundwater management. Integr Environ Assess Manag.8(3):430–444. doi:10.1002/ieam.195

Hokstad P, Rostum J, Sklet S, Rosen L, Pettersson TJR, Lindhe A, Sturm S, Beuken R, Kirchner D,Niewersch C (2009) Methods for risk analysis of drinking water systems from source to tap—guidancereport on risk analysis. TECHNEAU D4(2):4

IPCC (2012) Summary for policymakers. In: Field CB, Barros V, Stocker TF, Qin D, Dokken DJ, Ebi KL,Mastrandrea MD, Mach KJ, Plattner GK, Allen SK, Tignor M, Midgley PM (eds) Managing the risksof extreme events and disasters to advance climate change adaptation. A special report of workinggroups i and ii of the intergovernmental panel on climate change. Cambridge University Press,Cambridge, pp 1–19

Ismail-Zadeh A, Takeuchi K (2007) Preventive disaster management of extreme natural events. Nat Hazards42(3):459–467. doi:10.1007/s11069-006-9075-0

Jensen FV, Nielsen TD (2007) Bayesian networks and decision graphs. Springer, New YorkKakderi K, Alexoudi M, Argyroudis S, Pitilakis K (2011) Definition of system components and the for-

mulation of system to evaluate the performance of water and waste-water systems. SYNERG D2:5Karamouz M, Saadati S, Ahmadi A (2010a) Vulnerability assessment and risk reduction of water supply

systems. In Proceedings of world environmental & water resources congress 2010: challenges ofchange, 16–20 May 2010, Providence, Rhode Island, USA. doi:10.1061/41114(371)449

Karamouz M, Ahmadi A, Zahraie B, Moridi A (2010b) Development of an algorithm for risk based strategicwater supply planning: a case study. In Proceedings of world environmental & water resources con-gress 2010: Challenges of change, 16–20 May 2010, Providence, Rhode Island, USA. doi:10.1061/41114(371)236

KDHE-BOW (Kansas Department of Health and Environment—Bureau of Water) (2003) Simplified vul-nerability assessment tool for drinking water. 1000 SW Jackson Street

Kleiner Y, Rajani B (2001) Comprehensive review of structural deterioration of water mains: statisticalmodels. Urban Water 3(3):131–150. doi:10.1016/S1462-0758(01)00033-4

Krueger T, Page T, Hubacek K, Smith L, Hiscock K (2012) The role of expert opinion in environmentalmodeling. Environ Model Softw 36:4–18. doi:10.1016/j.envsoft.2012.01.011

Langseth H, Portinale L (2007) Bayesian networks in reliability. Reliab Eng Syst Saf 92(1):92–108. doi:10.1016/j.ress.2005.11.037

Nat Hazards (2014) 74:2193–2227 2225

123

Page 34: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

Li J, Wei S, Liu W (2006) Seismic reliability analysis of urban water distribution networks. Earthq Eng EngVib 5(1):71–77. doi:10.1007/s11803-006-0628-8

Li L, Wang J, Leung H, Jiang C (2010) Assessment of catastrophic risk using Bayesian network constructedfrom domain knowledge and spatial data. Risk Anal 30(7):1157–1175. doi:10.1111/j.1539-6924.2010.01429.x

Lindhe A (2010) Risk assessment and decision support for managing drinking water systems. PhD Dis-sertation, Chalmers University of Technology, Gothenburg, Sweden

Liu Z, Kleiner Y, Rajani B, Wang L, Condit W (2012) Condition assessment technologies for watertransmission and distribution systems. EPA/600/R-12/017

Marcot BG (2012) Metrics for evaluating performance and uncertainty of Bayesian network models. EcolModel 230:50–62. doi:10.1016/j.ecolmodel.2012.01.013

Marcot BG, Holthausen RS, Raphael MG, Rowland MM, Wisdom MJ (2001) Using Bayesian beliefnetworks to evaluate fish and wildlife population viability under land management alternatives from anenvironmental impact statement. For Ecol Manag 153(1–3):29–42. doi:10.1016/S0378-1127(01)00452-2

Marcot BG, Steventon JD, Sutherland GD, McCann RK (2006) Guidelines for developing and updatingBayesian belief networks applied to ecological modeling and conservation. Can J For Res36:3063–3074. doi:10.1139/x06-135

Marzocchi W, Garcia-Aristizabal A, Gasparini P, Mastellone ML, Di Ruocco A (2012) Basic principles ofmulti-risk assessment: a case study in Italy. Nat Hazards 62(2):551–573. doi:10.1007/s11069-012-0092-x

Molina JL, Bromley J, Garcıa-Arostegui JL, Sullivan C, Benavente J (2010) Integrated water resourcesmanagement of overexploited hydrogeological systems using object-oriented Bayesian networks.Environ Model Softw 25(4):383–397. doi:10.1016/j.envsoft.2009.10.007

Molina JL, Farmani R, Bromley J (2011) Aquifers management through evolutionary bayesian networks:the Altiplano case study (SE Spain). Water Resour Manag 25(14):3883–3909. doi:10.1007/s11269-011-9893-z

Nadkarni S, Shenoy PP (2004) A causal mapping approach to constructing Bayesian networks. DecisSupport Syst 38(2):259–281. doi:10.1016/S0167-9236(03)00095-2

Ordonez-Galan C, Matıas JM, Rivas T, Bastante FG (2009) Reforestation planning using Bayesian net-works. Environ Model Softw 24:1285–1292. doi:10.1016/j.envsoft.2009.05.009

Ozesmi U, Ozesmi S (2004) A participatory approach to ecosystem conservation: fuzzy cognitive maps andstakeholder group analysis in Uluabat Lake, Turkey. Environ Manag 31(4):518–531. doi:10.1007/s00267-002-2841-1

Page T, Heatwaite AL, Thompson LJ, Pope L, Willows R (2012) Eliciting fuzzy distributions from expertsfor ranking conceptual risk model components. Environ Model Softw 36:19–34. doi:10.1016/j.envsoft.2011.03.001

PAHO-WHO (1998) Natural disaster mitigation in drinking water and sewerage systems. Guidelines forvulnerability analysis, Washington, DC

Pearl J (1988) Probabilistic reasoning in intelligent systems. Networks of plausible inference. MorganKaufmann Publisher, San Francisco, CA

Peng M, Zhang LM (2012) Analysis of human risks due to dam-break floods—part 1: a new model based onBayesian networks. Nat Hazards 64(1):903–933. doi:10.1007/s11069-012-0275-5

Pitchforth J, Mengersen K (2013) A proposed validation framework for expert elicited Bayesian Networks.Expert Syst Appl 40(1):162–167. doi:10.1016/j.eswa.2012.07.026

Pollino CA, Woodberry O, Nicholson A, Korb K, Hart BT (2007) Parameterisation and evaluation of aBayesian network for use in an ecological risk assessment. Environ Model Softw 22(8):1140–1152.doi:10.1016/j.envsoft.2006.03.006

Rajani B, Kleiner Y (2001) Comprehensive review of structural deterioration of water mains: physicallybased models. Urban Water 3(3):151–164. doi:10.1016/S1462-0758(01)00032-2

Rajani B, Makar J, McDonald S, Zhan C, Kuraoka S, Jen C-K, Veins M (2000) Investigation of grey castiron water mains to develop a methodology for estimating service life. American Water WorksAssociation Research Foundation, Denver, CO

Rosen L, Hokstad P, Lindhe A, Sklet S, Røstum J (2007) Generic framework and methods for integrated riskmanagement in water safety plans. TECHNEAU D4(1):3

Rostum J (2000) Statistical modelling of pipe failures in water networks. Dissertation, Faculty of CivilEngineering, the Norwegian University of Science and Technology

Sadiq R, Rajani B, Kleiner Y (2004) Probabilistic risk analysis of corrosion associated failures in cast ironwater mains. Reliab Eng Syst Saf 86(1):1–10. doi:10.1016/j.ress.2003.12.007

2226 Nat Hazards (2014) 74:2193–2227

123

Page 35: A Bayesian vulnerability assessment tool for drinking water mains under extreme events

Shih BJ, Chang CH (2006) Damage survey of water supply systems and fragility curve of PVC waterpipelines in the Chi–Chi Taiwan earthquake. Nat Hazards 37(1–2):71–85. doi:10.1007/s11069-005-4657-9

Susnik J, Molina JL, Vamvakeridou-Lyroudia LS, Savic DA, Kapelan Z. Comparative analysis of systemdynamics and object-oriented Bayesian networks modelling for water systems management. WaterResour Manag 27(3):819-841. doi:10.1007/s11269-012-0217-8

UNDRO (1979) Natural disasters and vulnerability analysis. Report of expert group meeting, Office of theUnited Nations Disaster Relief Co-ordinator

Uusitalo L (2007) Advantages and challenges of Bayesian networks in environmental modeling. Ecol Model203(3–4):312–318. doi:10.1016/j.ecolmodel.2006.11.033

Vairavamoorthy K, Gorantiwar SD, Yan J, Galgale HM, Mohamed-Mansoor MA, Moban S (2006) Riskassessment of contaminant intrusion into water distribution systems. Water, Engineering and Devel-opment Centre, Loughborough University, Leicestershire, UK

VV.AA. (1929) The Apulian Aqueduct, Southern Italy. Reprinted for Engineering, Offices of Engineering,35 and 36, Bedford Street, Strand, W.C.2.

Wang QJ, Robertson DE, Haimes CL (2009) A Bayesian network approach to knowledge integration andrepresentation of farm irrigation: 1. Model development. Water Resour Res 45(2):W02409. doi:10.1029/2006WR005419

Wang J, Gu X, Huang T (2013) Using Bayesian networks in analyzing powerful earthquake disaster chains.Nat Hazards in press. doi: 10.1007/s11069-013-0631-0

Wood A, Lence BJ (2009) Using water main break data to improve asset management for small and mediumutilities: district of Maple Ridge B.C. J Infrastruct Syst 15(2):111–119. doi:10.1061/(ASCE)1076-0342(2009)15:2(111)

Zadeh LA (1983) A computational approach to fuzzy quantifier in natural languages. Comput Math withAppl 9(1):149–184. doi:10.1016/0898-1221(83)90013-5

Zimmermann HJ (1991) Fuzzy set theory and its applications. Kluwer Academic Publisher, Boston, MA

Nat Hazards (2014) 74:2193–2227 2227

123