Goforth Et Al 2022 Infrastructure Asset Management System Optimized Configuration A Genetic Algorithm
Goforth Et Al 2022 Infrastructure Asset Management System Optimized Configuration A Genetic Algorithm
Abstract: An effective infrastructure asset management (AM) system is crucial for utilities, city officers, government agencies, and other
asset-owning organizations to facilitate navigating the numerous challenges associated with operating and managing infrastructure assets. In
this paper, the AM system itself is represented as a complex network (comprised of nodes and links) that describes the major components
necessary for its operation within an organization and the information connections between such components. ISO 55001, a widely accepted
international standard, specifies the requirements for an effective AM system and outlines the criticality levels of different system
components—reflected in the corresponding network by the link weights. The main challenges facing managing an AM system (i.e., meta-
management) pertain to (1) information asymmetry (i.e., not relying on consistent information for decision making) between AM system
components; and (2) information overload (i.e., excessive information undermining decision making) within the AM system components.
These challenges cause systemic risks (possibility of dependence-induced disruptions) within the system network due to the connectedness of
system components. Systemic risks can be mitigated through built-in network resilience by restructuring the system component connections.
Such network reconfiguration presents a complex nonconvex optimization problem with multiple potential solutions depending on the num-
ber of new connections to be added to the AM system, the length of those connections, and the target risk mitigation level. Through this
metamanagement (managing the management system) lens, a genetic algorithm approach was employed to explore the optimal AM network
configurations considering different objective functions. These objective functions were based on different complex network measures in-
cluding the betweenness-, closeness-, and eigenvector-centrality, as well as the vulnerability index. The devised objective functions were
employed to the cases of adding 1 to 15 links only to limit network overconnectedness (i.e., information overload). Considering all objective
functions evaluated, adding a small number of links (fewer than five) provided a significant reduction in systemic risk (18% to 49%). Finally,
managerial insights are presented to explain how to employ the developed approach to mitigate the systemic risks within an organization’s
AM system based on different metrics valuations and stakeholder inputs. DOI: 10.1061/(ASCE)IS.1943-555X.0000712. This work is made
available under the terms of the Creative Commons Attribution 4.0 International license, [Link]
Practical Applications: The effective implementation of infrastructure asset management systems within organizations that own, operate,
and manage infrastructure assets is critical to address the pressing challenges facing the infrastructure decision makers (e.g., infrastructure
ageing and deterioration, maintenance backlogs, strict regulatory operating conditions, limited financial resources, and losing valuable
experience through retirements). Infrastructure asset management systems contain connectivity between major operational components that
can lead to systemic risks (i.e., dependence-induced possible disruptions). Such systemic risks are typically caused by information asym-
metry, when (some) asset management stakeholders operate in silos, and/or information overload, when asset management stakeholders are
overwhelmed by too much/irrelevant information thus, hindering their decision-making effectiveness. The approach described in this paper
empowers infrastructure asset managers with the necessary means to reduce their organizations’ systemic risk exposure, and subsequently
enhance their organization resilience to information asymmetry and/or overload. This study is meant to be applied by organizations that align
their asset management system with an accepted system that includes 39 separate asset management subject areas.
Author keywords: Centrality analysis; Complex network theory; Genetic algorithm; Infrastructure asset management; ISO 55001;
Systemic risk; Vulnerability index.
1 2
Formerly, Graduate Student, McMaster Univ., Hamilton, ON, Canada Postdoctoral Fellow, Dept. of Civil Engineering, NTERFACE Institute
L8S 4L8; Senior Consultant, Global Infrastructure Advisory, Bay Adelaide for Multi-Hazard Systemic Risk Studies, McMaster Univ., 1280 Main St.
Centre, KPMG LLP, 333 Bay St. #4600, Toronto, ON, Canada M5H 2S5 West, Hamilton, ON, Canada L8S 4L7; Assistant Professor, Dept. of Irri-
gation and Hydraulics, Faculty of Engineering, Cairo Univ., Orman, Giza
(corresponding author). ORCID: [Link] 12613, Egypt. ORCID: [Link] Email:
Email: egoforth@[Link] ahmeda69@[Link]
3
Note. This manuscript was submitted on January 7, 2022; approved Professor and Director, Dept. of Civil Engineering, School of Computa-
on May 31, 2022; published online on August 8, 2022. Discussion period tional Science and Engineering, INTERFACE Institute for Multi-Hazard Sys-
temic Risk Studies, McMaster Univ., Hamilton, ON, Canada L8S4L7. Email:
open until January 8, 2023; separate discussions must be submitted for eldak@[Link]
individual papers. This paper is part of the Journal of Infrastructure 4
Associate Professor, Dept. of Civil Engineering, McMaster Univ., 1280
Systems, © ASCE, ISSN 1076-0342. Main St. West, Hamilton, ON, Canada L8S 4L7. Email: wiebel@[Link]
typically implement AM systems to achieve their organizational organizations aim at employing the principles and guidelines de-
strategic plan and objectives (Hodkiewicz 2015). An AM system scribed within the ISO 55001 standard to improve their AM system
is a set of interrelated and interacting elements of an organization; operations (Woodhouse 2014; Hodkiewicz 2015; Konstantakos
the system’s function is to establish the AM policy and AM objec- et al. 2019).
tives and the processes needed to achieve those objectives (ISO An efficient AM system must include consistent information
2014b). flow between the connected subject areas because miscommuni-
As outlined by the Institute of Asset Management’s (IAM) Asset cation can lead to system dysfunction. In addition, an effective
Management Anatomy document, a typical AM system is com- AM system minimizes the exposure of AM stakeholders to in-
posed of six divisions and 39 subject areas (IAM 2015), as shown formation overload caused by having access to too much out-of-
in Fig. 1. Each of the 39 AM subject areas was designed to illustrate scope information and data (Herrera et al. 2011; Prajogo et al.
the breadth of a certain set of activities within an AM system, the 2018). An AM system may be influenced by systemic risks
relationships between these activities and the need to integrate (i.e., dependence-induced disruptions) related to information
them, and the critical role for AM to align with and deliver the stra- asymmetry caused by the malfunction of one or multiple specific
tegic plan of an asset-intensive organization (IAM 2015). As such, subject areas or the interruption of information flow between
each AM subject area is a functional component necessary for subject areas (Goforth et al. 2022). Examples of information
the implementation and operation of an AM system within an asymmetry in an AM system include stakeholders that use differ-
organization that owns and manages infrastructure assets. Detailed ent and/or inconsistent information to support their AM subject
descriptions of each AM subject area are given in the Asset Man- area-specific decision process, not responding to other stakehold-
agement Anatomy guide developed by IAM (IAM 2015). Goforth ers’ decisions promptly, and the isolation of AM subject areas
et al. (2022) introduced the concept of how a typical AM system due to inadequate information-sharing procedures or protocols
can be viewed as a network of connected components, with nodes (Bergh et al. 2019).
Fig. 3. ISO 55001 clauses mapped to AM subject areas as defined by IAM (2015).
Centrality Measures 1X
ECi ¼ a EC ð3Þ
λ j i;j j
The betweenness centrality is a measure that identifies the critical-
ity of a specific node as the fraction of shortest paths passing where λ = maximum eigenvalue of the adjacency matrix A. For the
through it (Freeman 1977). The betweenness centrality of a node AM network, a greater value of ECi indicates that the correspond-
i (BCi ) is thus calculated as follows ing AM subject area is connected to other highly influential AM
subject areas and is thus critical to the information transfer within
X ρjk ðiÞ the AM system.
BCi ¼ ð1Þ
j≠i≠k
ρjk The vulnerability index is related to the size of the network’s
giant component (i.e., the largest connected set of nodes) and
is used to identify the critical nodes that are highly sensitive
where ρjk = weighted length (i.e., sum of the link weights) of all to disruptions by quantifying the fraction of nonoperational
shortest paths connecting nodes j and k; and ρjk ðiÞ = weighted nodes when a specific node is triggered to fail (Ezzeldin and
length of these shortest paths that traverse node i. Regarding the El-Dakhakhni 2021). The vulnerability index of node i (VIi ) is
AM network, the BCi values reflect the importance of the corre- given by
sponding AM subject area to the operation of the whole AM system
and can thus be used to reflect its influence on the information flow N − N0
VIi ¼ ð4Þ
throughout the AM system. N
The closeness centrality is a measure that identifies nodes that
are key to rapidly process and relay information to other nodes in where N 0 = total number of operational nodes in the network’s
the network (Estrada and Knight 2015). The closeness centrality of giant component after node i was triggered to fail. The value
a node i (CCi ) is evaluated as of VIi is estimated considering the cascading disruption effect
within the network as follows: (1) once a node i is triggered to
P fail, information moving through the network is redistributed
j dði; jÞ based on the shortest paths available; (2) following the redistrib-
CCi ¼ ð2Þ
N ution, nodes are considered operational when they can sustain
their original information share in addition to those transferred
where dði; jÞ = shortest path length between nodes i and j; and N = from other nodes; and (3) the redistribution process continues un-
total number of nodes in the network. When applied to the AM til all nodes in the network are functional and the corresponding
network, the closeness centrality can be used to identify the AM N 0 value is then obtained. Therefore, calculating the values of VIi
subject areas that are critical for the rapid processing and transfer- necessitates adopting the concept of overflow modeling (Motter
ring of information to other AM subject areas. and Lai 2002).
The eigenvector centrality is a measure that identifies nodes that Several studies have adopted the concept of overflow modeling
are highly connected to influential nodes within the network (Thai in different fields, where the flow is simulated by the exchange of
and Pardalos 2012). The eigenvector centrality of a node i (ECi ) is a single unit between node pairs along the shortest path connecting
where α = design capacity tolerance that represents the ability of between asset performance and risk (i.e., life cycle value realiza-
a node to sustain additional information due to any disturbance tion) using available resources or the procurement of additional
in the network. The information overload of a node can be repre- resources (i.e., resource management).
sented through Eq. (5). Therefore, within an AM system, the VIi The AM subject areas identified within the top 15 based on three
represents the susceptibility of an AM subject area to information centrality measures include Asset Management Planning (S5),
overload. Operations and Maintenance Decision Making (A5), Stakeholder
Fig. 4. Top 15 AM subject areas ranked based on (a) betweenness centrality; (b) closeness centrality; (c) eigenvector centrality; and (d) vulnerability
index.
20
-20.4%
-20.8%
-11.6%
-10.9%
150
Average Betweenness Centrality
15
-12.3%
-6.2%
-5.1%
-7.7%
-5.2%
-0.3%
-3.1%
-7.8%
-3.1%
-8.0%
-6.1%
-0.4%
-2.3%
-1.2%
-6.7%
-2.3%
-1.5%
-6.1%
100
10
-8.3%
-5.4%
-5.8%
-6.7%
-6.1%
-0.5%
-7.0%
50 5
0 0
0 2 4 6 8 10 12 14 16 0 2 4 6 8 10 12 14 16
(a) Number of Added Links (b) Number of Added Links
1.0
0.25
-4.6%
-23.5%
-5.7%
-4.9%
-3.9%
Average Eigenvector Centrality
0.8
-5.6%
-18.5%
-1.5%
-3.3%
0.20
-0.6%
-1.5%
-1.8%
-1.1%
-11.4%
-4.4%
-1.5%
-1.1%
-0.3%
-8.5%
0.0%
0.0%
0.6
-9.3%
0.15
-7.8%
-2.8%
-2.8%
0.0%
0.0%
-2.9%
-3.0%
0.0%
0.10 0.4
0.05 0.2
0.00 0.0
0 2 4 6 8 10 12 14 16 0 2 4 6 8 10 12 14 16
(c) Number of Added Links (d) Number of Added Links
Fig. 5. Optimization results specific to the number of links added to the AM system network for (a) betweenness centrality; (b) closeness centrality;
(c) eigenvector centrality; and (d) vulnerability index. The values above the data points indicate the percent difference from the previous centrality
value.
Fig. 6. Link additions according to the betweenness centrality (labels are defined in Fig. 1).
betweenness centrality in the highly critical AM subject areas when additional information to describe the process and the feedback
only up to four link additions are available to implement. required for asset decommissioning and disposal.
Beyond four added links, the S2 → L3 and S3 → R8 links are Adding the three links identified as optimal within the typical
replaced by a combination of other links that stem from similar AM system decreased the average closeness centrality of the most
source nodes. The S2 → L3 and S3 → R8 connections would be critical 15 AM subject areas by 30%, whereas adding the six links
feasible for introducing an information- or data-sharing process in identified as optimal provided a 52% reduction. Both scenarios pro-
a real AM system. For example, the AM strategy and objectives vide a large reduction in the closeness centrality–based objective
would specifically provide information on how the resources of function without greatly increasing the number of links, and there-
the organization should be managed and the analysis of asset de- fore the possibility of information overload, within the AM system
mand would provide information related to the review, audit, and network.
assurance processes.
Eigenvector Centrality
Closeness Centrality
Fig. 8 presents the connections that were identified to be added to
Fig. 7 presents the connections that were identified to be added to the typical AM system for up to six added links when reducing
the typical AM system for up to six added links when reducing the the systemic risk due to the eigenvector centrality is the focus, and
systemic risk due to nodes with high closeness centrality values is Appendix S2 provides the labeled connections in a table for 1 to 15
desired, and Appendix S2 provides the labeled connections in a link additions.
table for one to fifteen link additions. An 18% reduction in the systemic risk due to the disruption of
The information connection formed between the Strategic Plan- AM subject areas with high eigenvector centralities can be obtained
ning (S4) and Asset Decommissioning and Disposal (L11) areas by adding just four links to the AM system network. The informa-
is optimal among all link addition scenarios from Scenario 1 to tion connection formed between the Risk Assessment and Manage-
Scenario 6. All optimal link additions identified originated from ment (R4) and Sustainable Development (R5) areas is optimal for
the Strategic Planning (S4) subject area, highlighting the impor- each link addition scenario in Fig. 8, and the information connec-
tance of links originating from this node in reducing the average tion from Risk Assessment and Management (R4) and Stakeholder
closeness centrality within the AM system (i.e., reducing the dis- Engagement (R1) areas is optimal among all link addition scenarios
tance of the 15 critical AM subject areas to the other AM subject from Scenario 2 to Scenario 6. Such occurrences highlight the criti-
areas in the AM system network). The S4 → L11 link would be cality of each link in the reduction in eigenvector centrality–based
feasible within a working AM system if the strategic plan provided systemic risk (i.e., reducing the reliance of the AM system on
Fig. 7. Link additions according to the closeness centrality (labels are defined in Fig. 1).
Fig. 8. Link additions according to the eigenvector centrality (labels are defined in Fig. 1).
Fig. 9 presents the connections that were identified to be added to mizing each of betweenness centrality, closeness centrality, eigen-
the typical AM system for up to six added links when reducing the vector centrality, and vulnerability index separately, minimizing a
systemic risk due to the average vulnerability index of the top 15 weighted combination of such measure is also crucial because each
subject areas is the only goal, and Appendix S2 provides the la- centrality measure evaluates a different aspect of the network’s
beled connections in a table for 1 to 15 link additions. The α value exposure to systemic risks. As such, the values of a, b, c, and d
from Eq. (5) was specified as 0.05, indicating that if a node’s in- in Eq. (7) were each assumed as 0.25, and the resulting objective
formation load exceeded its capacity by 5%, the node was consid- function evaluations are shown in Fig. 10 for link additions from 1
ered to be in a state of information overload; 5% was chosen as a to 15.
representative value to illustrate the application of the previously Fig. 11 presents the connections that were identified to be added
described methodology and it has been used in other vulnerabil- to the typical AM system for up to six added links and Appendix S2
ity index applications (Ezzeldin and El-Dakhakhni 2021; Goforth provides the labeled connections in a table for 1 to 15 link
et al. 2020). additions.
The optimal added links presented in Fig. 9 do not have signifi- The information connection between the Strategic Planning (S4)
cant commonalities among each of the six link addition scenarios. and Resource Management (L3) areas is common among most link
There are only three links (i.e., L1 → R1, L5 → R8, and L8 → S4) addition scenarios, highlighting its importance in reducing the com-
that were optimal among two consecutive link addition scenarios. bined systemic risk according to the weighted objective function
Fig. 9. Link additions according to the vulnerability index (labels are defined in Fig. 1).
Managerial Insights
Fig. 11. Link additions based on an equal weighted combination of betweenness centrality, closeness centrality, eigenvector centrality, and vulner-
ability index (labels are defined in Fig. 1).
Conclusion
Data Availability Statement
Implementing an effective AM system is critical for organizations
that own, manage, and operate infrastructure assets to ensure Some data (network data), models (MATLAB and R models), and
that their assets can provide the greatest life cycle value and the code (optimization code) that support the findings of this study are
best service to their customers or users. A well-managed asset man- available from the corresponding author upon reasonable request.
agement system can help organizations alleviate the challenges
induced by infrastructure ageing, strict regulatory operating condi-
tions, limited financial means, and losing valuable experience due Acknowledgments
to retirements. Through a metamanagement lens, this study syn-
thesized the AM system, developed by the IAM, as a network The financial support for the study was provided through the
Downloaded from [Link] by [Link] on 03/13/24. Copyright ASCE. For personal use only; all rights reserved.
of connected components (i.e., nodes and links). Nodes within Canadian Nuclear Energy Infrastructure Resilience under Systemic
the network represent the AM subject areas, whereas links between Risk (CaNRisk)—Collaborative Research and Training Experience
node simulate the information transfer between subject area pairs. (CREATE) program of the Natural Science and Engineering Re-
The ISO 55001 standard specifies the best practice for organ- search Council (NSERC) of Canada. The INTERFACE Institute
izations in their implementation and operation of AM systems. and the INViSiONLab support in the development of this study is
Based on this, the AM system network link weights were defined also acknowledged.
in this study as the number of ISO 55001 clauses that pertain to the
source node. The main challenges of AM system operation are Supplemental Materials
caused by information asymmetry between and information over-
load within system components. These main challenges create sys- Appendixes S1 and S2 are available online in the ASCE Library
temic risks (i.e., dependence-induced possible disruptions) within ([Link]).
the AM system network, which can lead to cascading disruptions
throughout the system. To mitigate such risks, this study manages
the AM system through a network reconfiguration approach. References
Betweenness centrality, closeness centrality, eigenvector cen-
Alzoor, F. S., M. Ezzeldin, M. Mohamed, and W. El-Dakhakhni. 2021.
trality, and vulnerability index were employed to identify the dif-
“Prioritizing bridge rehabilitation plans through systemic risk-guided
ferent AM subject areas most critical for information transfer. classifications.” J. Bridge Eng. 26 (7): 04021038. [Link]
Identifying such subject areas is essential because their disruption .1061/(ASCE)BE.1943-5592.0001733.
can initiate a systemic risk situation within the AM system and may Artoni, A. 2019. “A methodology for simulation-based, multiobjective gear
lead to system-level malfunction. Subsequently, a GA was de- design optimization.” Mech. Mach. Theory 133 (Mar): 95–111. https://
ployed to reduce the systemic risk within the AM system through [Link]/10.1016/[Link].2018.11.013.
minimizing the measures considered. Different objective functions ASCE. 2021. 2021 report card for America’s infrastructure. Reston, VA:
were considered to minimize the betweenness centrality, closeness ASCE.
centrality, and eigenvector centrality, as well as the vulnerability Barabási, A.-L. 2016. Network science. Cambridge, UK: Cambridge
University Press.
index (individually or weighted combinations thereof), and optimal
Barbosa, F., A. De Sousa, and A. Agra. 2018. “Topology design of trans-
link configurations were presented visually for one to six added parent optical networks resilient to multiple node failures.” In Proc.,
links. Considering all evaluations, adding a small number of links 2018 10th Int. Workshop on Resilient Networks Design and Modeling,
(fewer than five) can significantly enhance the AM system’s ability 1–8. New York: IEEE.
to combat system risks (reduced the EC and VI by 18% and 49%, Bergh, D. D., D. J. Ketchen Jr., I. Orlandi, P. P. M. A. R. Heugens, and
respectively). B. K. Boyd. 2019. “Information asymmetry in management research:
Managerial insights were also presented highlighting that there Past accomplishments and future opportunities.” J. Manage. 45 (1):
were only very few added link commonalities considering the differ- 122–158. [Link]
ent objective functions. This observation underlines the importance Bertling Tjernberg, L. 2018. Infrastructure asset management with power
of clarify organization-specific systemic risk reduction goals and system applications. Boca Raton, FL: Taylor & Francis Group.
Bhavathrathan, B. K., and G. R. Patil. 2018. “Algorithm to compute urban
highlights the value of exploring the use of weighted combinations
road network resilience.” Transp. Res. Rec. 2672 (48): 104–115. https://
of different network measures. It should also be recalled that the val- [Link]/10.1177/0361198118793329.
uation of an AM subject areas depends on multiple metrics such as Bloomberg Professional Services. 2020. Supply chain momentum
money, technology, data, and personnel. Fusing such metrics is chal- strategies with graph neural networks. New York: Bloomberg.
lenging, and therefore relevant detailed stakeholder input is key to Brunetto, Y., M. Xerri, and S. Nelson. 2014. “Building a proactive
operationalize the developed metamanagement approach. engagement culture in asset management organizations.” J. Manage.
Overall, organizations can employ the approach developed in Eng. 30 (4): 04014014. [Link]
this study to reduce the exposure of their AM system to systemic .0000251.
risks due to the potential cascading disruption of highly connected CIRC (Canadian Infrastructure Report Card). 2016. Informing the future:
The Canadian infrastructure report card. Montreal: CIRC.
and critical AM subject areas. The connection addition methodol-
CIRC (Canadian Infrastructure Report Card). 2019. Monitoring the state
ogy presented herein enhances the information transfer throughout of Canada’s core public infrastructure: The Canadian infrastructure
the AM system while also ensuring that AM stakeholders are not report card 2019. Montreal: CIRC.
overloaded with too much information. Future work may apply the Crescenzi, P., G. D’Angelo, L. Severini, and Y. Velaj. 2016. “Greedily im-
developed methodology at different stages of AM deployment proving our own closeness centrality in a network.” ACM Trans. Knowl.
within organizations and with specific link addition costs, allowing Discovery Data 11 (1): 1–32. [Link]
GFMAM (Global Forum on Maintenance and Asset Management). 2014. k-links.” In Proc., Int. Conf. on Data Science and Advanced Analytics,
The asset management landscape. Toronto, ON, Canada: GFMAM. 561–570. New York: IEEE.
Goforth, E., W. El-Dakhakhni, and L. Wiebe. 2022. “Network analytics Pacreau, G., E. Lezmi, and J. Xu. 2021. Graph neural networks for asset
for infrastructure asset management systemic risk assessment.” J. Infra- management. Amsterdam, Netherlands: Elsevier.
struct. Syst. 28 (2): 04022006. [Link] Papagelis, M. 2015. “Refining social graph connectivity via shortcut edge
-555X.0000667. addition.” ACM Trans. Knowl. Discovery Data 10 (2): 1–35. [Link]
Goforth, E., M. Ezzeldin, W. El-Dakhakhni, L. Wiebe, and M. Mohamed. .org/10.1145/2757281.
2020. “Network-of-networks framework for multimodal hazmat trans- Parotsidis, N., E. Pitoura, and P. Tsaparas. 2015. “Selecting shortcuts for a
portation risk mitigation: Application to used nuclear fuel in Canada.” smaller world.” In Proc., SIAM Int. Conf. on Data Mining 2015, 28–36.
J. Hazard. Toxic Radioact. Waste 24 (3): 04020016. [Link] Philadelphia: Society for Industrial and Applied Mathematics.
.1061/(ASCE)HZ.2153-5515.0000493. Parotsidis, N., E. Pitoura, and P. Tsaparas. 2016. “Centrality-aware link rec-
Golightly, D., G. Kefalidou, and S. Sharples. 2018. “A cross-sector analysis ommendations.” In Proc., 9th ACM Int. Conf. on Web Search and Data
of human and organisational factors in the deployment of data-driven Mining, 503–512. New York: Association for Computing Machinery.
predictive maintenance.” Inf. Syst. e-Bus. Manage. 16 (3): 627–648. Paterson, J., and B. Ombuki-Berman. 2020. “A hybrid approach to
[Link] network robustness optimization using edge rewiring and edge
addition.” In Proc., IEEE Int. Conf. on Systems, Man, and Cybernetics,
Herrera, F., G. Chan, M. Legault, R. M. Kassim, and V. Sharma. 2011. The
4051–4057. New York: IEEE.
digital workplace: Think, share, do. New York: Deloitte & Touche.
Pell, R., R. Svoboda, R. Eagar, P. Ondko, and F. Kirschnick. 2015. Effective
Hodkiewicz, M. R. 2015. “The development of ISO 55000 series stan-
infrastructure asset management—A holistic approach to transforma-
dards.” In Vol. 19 of Engineering asset management-systems, profes-
tion. Hong Kong: Arthur D. Little—Prism.
sional practices and certification, 427–438. Cham, Switzerland:
Pizzuti, C., and A. Socievole. 2018. “A genetic algorithm for improving
Springer.
robustness of complex networks.” In Proc., IEEE 30th Int. Conf. on
IAM (Institute for Asset Management). 2015. Asset management—An
Tools with Artificial Intelligence, 514–521. New York: IEEE.
anatomy. Bristol, UK: IAM.
Prajogo, D., J. Toy, A. Bhattacharya, A. Oke, and T. C. E. Cheng. 2018.
INFC (Infrastructure Canada). 2018. Investing in Canada: Canada’s
“The relationships between information management, process manage-
long-term infrastructure plan. Ottawa: INFC.
ment and operational performance: Internal and external contexts.”
ISO. 2014a. Asset management—Management systems—Requirements. Int. J. Prod. Econ. 199 (May): 95–103. [Link]
ISO 55001. Geneva: ISO. .2018.02.019.
ISO. 2014b. Asset management—Overview, principles and terminology. Rodríguez, N., A. Gupta, P. L. Zabala, and G. Cabrera-Guerrero. 2018.
ISO 55000. Geneva: ISO. “Optimization algorithms combining (meta)heuristics and mathematical
ISO. 2021. “Known certified organizations.” ISO/TC 251 Asset Manage- programming and its application in engineering.” Math. Probl. Eng.
ment. Accessed October 28, 2021. [Link] 2018 (Sep): 1–3. [Link]
/social-links/resources/[Link]. Ross, R. 2019. Reliability analysis for asset management of electric power
Kinney, R., P. Crucitti, R. Albert, and V. Latora. 2005. “Modeling cascad- grids. Singapore: Wiley.
ing failures in the North American power grid.” Eur. Phys. J. B 46 (1): Thai, M. T., and P. M. Pardalos. 2012. Handbook of optimization in com-
101–107. [Link] plex networks: Communication and social networks. Edited by M. T.
Konstantakos, P. C., P. T. Chountalas, and A. I. Magoutas. 2019. “The Thai, P. M. Pardalos, and Laboratory of Algorithms and Technologies
contemporary landscape of asset management systems.” Qual.-Access for Networks Analysis. New York: Springer.
Success 20 (169): 10–17. Uddin, W., W. R. Hudson, and R. Haas. 2013. Public infrastructure asset
Kourtellis, N., T. Alahakoon, R. Simha, A. Iamnitchi, and R. Tripathi. management. New York: McGraw-Hill.
2013. “Identifying high betweenness centrality nodes in large social Vishnu, C. R., S. P. Das, R. Sridharan, P. N. Ram Kumar, and N. S.
networks.” Social Network Anal. Min. 3 (4): 899–914. [Link] Narahari. 2021. “Development of a reliable and flexible supply chain
.1007/s13278-012-0076-6. network design model: A genetic algorithm based approach.” Int. J.
Mahyar, H., R. Hasheminezhad, E. Ghalebi, A. Nazemian, R. Grosu, Prod. Res. 59 (20): 6185–6209. [Link]
A. Movaghar, and H. R. Rabiee. 2018. “Identifying central nodes for .1808256.
information flow in social networks using compressive sensing.” Social Woodhouse, J. 2014. “Standards in asset management: PAS 55 to ISO
Network Anal. Min. 8 (1): 1–24. [Link] 55000.” Infrastruct. Asset Manage. 1 (3): 57–59. [Link]
-0506-1. .1680/iasma.14.00013.
Medvet, E., and A. Bartoli. 2021. “Evolutionary optimization of graphs Wu, L. 2015. “Centrality of the supply chain network.” Accessed August 29,
with GraphEA.” In AIxIA 2020—Advances in artificial intelligence, 2015. [Link]
edited by M. Baldoni and S. Bandini, 83–98. Cham, Switzerland: Xerri, M. J., S. Nelson, and Y. Brunetto. 2015. “Importance of workplace
Springer. relationships and attitudes toward organizational change in engineering
Morshedlou, N., K. Barker, A. D. González, and A. Ermagun. 2021. asset-management organizations.” J. Manage. Eng. 31 (5): 04014074.
“A heuristic approach to an interdependent restoration planning and [Link]