Investigating and Assessing the Vulnerability of Transportation Networks and Analyzing its Interaction with Urban Airports

Document Type : Original Article

Authors

1 Imam Hussein University

2 ihu

3 unever city amam hosen

Abstract

What in this research it has been addressd vulnerability  review and assessment transportion networks  and its interaction analysis Emphasis on urban air ports against man made threats and proposals to reduce vulnerability based on the principles and foundations of passive defense is. Airports by providing  fast shipping platform and passenger and with high capacity between regions with a long distance to the comprehensive development of countries and even the provinces help a lot so that it as one of the symbols of development Civilian airports are currently considered as one of the vital and valuable assets in any country that is considered as one of the air borders, and will be very important, so that taking measures to reduce their vulnerability to threats is necessary and unavoidable, so that The slightest disturbance in its functioning or damage to its body causes huge material and moral damages. The current research is an applied research, and it is in the category of descriptive-analytical research, the required information has been collected using documentary methods, including library documents, observations and field. For this purpose, a number of 32 experts were chosen as experts and FEMA method was used for risk analysis and the information was analyzed using Expert choice software and AHP technique.    The findings of the research show that the assets of city airports in different sectors are seriously vulnerable to military attacks and man-made terrorist acts Of course, according to the type, nature and function of each of the infrastructure elements, the degree and level of vulnerability is different And it is possible to explain the factors of increasing vulnerability and the ways to reduce it for each key asset, with the aim of ensuring the continuity of activity and maintaining the airport infrastructure and protecting human lives.

Keywords


Smiley face

 [1] S. R. Mousavi and Y. Piustegar, "Evaluation and vulnerability of critical infrastructures against man-made threats, a case study of the non-military international airport,” Ayman city scientific research journal, 2017. (In Persian)
[2] M. H. Ataei, “Assessing the vulnerability of civilian airports in the country against threats and providing solutions to reduce the vulnerability of Imam Khomeini International Airport (RA),” 2014. (In Persian)
[3] M. Shahbazi, M. Shafiei, and Z. Abu Talebi, “Network approach to critical infrastructures,” Strategic report of the Deputy Economic Research, Center for Strategic Studies, Expediency Analysis Forum, 2013. (In Persian)
[4] S. B. Hosseini, S. Sawadkohi Far, and A. Rashdi Fard, “Analytical investigation of Mehrabad airport with non-agent defense approach,” 2013. (In Persian)
[5] F. Shamsai Zafarqandi, “Architectural form and its role in reducing the effects of the blast wave,” Collection of papers of the first conference on architecture and urban planning from the point of view of passive defense, Malik Ashtar University of Technology, 2013. (In Persian)
[6] Gh. Jalali Farahani, “an introduction to the theoretical foundations of non-agent defense against new threats,” Tehran: Printing and Publishing Institute of Imam Hossein University (AS), 2013. (In Persian)
[7] M. R. Hafez Nia, “an introduction to research methods in humanities,” Tehran: Samit Publishing House, 2009. (In Persian)
 [8] A. Vali, “Principles of Airport Engineering,” Technical and Engineering Faculty of Islamic Azad University, Central Tehran Branch of Civil Engineering Department, 2012. (In Persian)
[9] S. Karimi, “analysis and assessment of the riskiness of city assets,” A case study of Hamadan City, 2019. (In Persian)
[10] C. Cioaca, “Critical aviation infrastructures vulnerability assessment to terrorist threats,” AirForce ACADEMY, Romania, 2013.
[11] R. Wood, “airport design and operation of the system with security approach,” 2005.