| publications-4111 |
article |
2003 |
van Bloemen Waanders, Bart Gustaaf and van Bloemen Waanders, Bart G. and Biegler, Lorenz T. and Biegler, Lorenz T. and Bartlett, Roscoe and Bartlett, Roscoe A. and Laird, Carl D. and Laird, Carl D. |
Nonlinear Programming Strategies for Source Detection of Municipal Water Networks |
|
10.1061/40685(2003)38 |
|
|
|
Increasing concerns for the security of the national infrastructure have led to a growing need for improved management and control of municipal water networks. To deal with this issue, optimization offers a general and extremely effective method to identify (possibly harmful) disturbances, assess the current state of the network, and determine operating decisions that meet network requirements and lead to optimal performance. This paper details an optimization strategy for the identification of source disturbances in the network. Here we consider the source inversion problem modeled as a nonlinear programming problem. Dynamic behavior of municipal water networks is simulated using EPANET. This approach allows for a widely accepted, general purpose user interface. For the source inversion problem, flows and concentrations of the network will be reconciled and unknown sources will be determined at network nodes. Moreover, intrusive optimization and sensitivity analysis techniques are identified to assess the influence of various parameters and models in the network in a computational efficient manner. A number of numerical comparisons are made to demonstrate the effectiveness of various optimization approaches. |
|
|
|
|
| publications-4112 |
article |
2007 |
Patterson, Sean Albert and Patterson, Sean Albert and Apostolakis, G. and Apostolakis, George |
Identification of critical locations across multiple infrastructures for terrorist actions |
Reliability Engineering & System Safety |
10.1016/j.ress.2006.08.004 |
|
|
|
This paper presents a possible approach to ranking geographic regions that can influence multiple infrastructures. Once ranked, decision makers can determine whether these regions are critical locations based on their susceptibility to terrorist acts. We identify these locations by calculating a value for a geographic region that represents the combined values to the decision makers of all the infrastructures crossing through that region. These values, as well as the size of the geographic region, are conditional on an assumed destructive threat of a given size. In our case study, the threat is assumed to be minor, e.g., a bomb that can affect objects within 7m of it. |
|
|
|
|
| publications-4113 |
article |
2008 |
Jakopanec, Irena and Borgen, Katrine and Vold, Line and Lund, Helge and Forseth, Tore and Hannula, Raisa and Hannula, Raisa and NygΓ¥rd, Karin |
A large waterborne outbreak of campylobacteriosis in Norway: The need to focus on distribution system safety |
BMC Infectious Diseases |
10.1186/1471-2334-8-128 |
|
|
|
Background On 7 May 2007 the medical officer in Roros (population 5600) reported 15 patients with gastroenteritis. Three days later he estimated hundreds being ill. Untreated tap water from a groundwater source was suspected as the vehicle and chlorination was started 11 May. Campylobacter was isolated from patients' stool samples. We conducted an investigation to identify the source and describe the extent of the outbreak. |
|
|
|
|
| publications-4114 |
article |
2002 |
Shang, Feng and Uber, James G. and Polycarpou, Marios M. |
Particle Backtracking Algorithm for Water Distribution System Analysis |
Journal of Environmental Engineering |
10.1061/(asce)0733-9372(2002)128:5(441) |
|
|
|
A novel input-output model of water quality in water distribution systems is presented as a particle (water parcel) backtracking algorithm (PBA). The PBA is a simpler and more efficient version of that described by Zierolf et. al. in 1998 and is extended to allow storage tanks and multiple water sources and quality inputs. For simplicity the algorithm details are described for networks with a single water quality input at the water source, and the necessary extensions to allow multiple water sources and quality inputs are described separately. The PBA provides information that is not available using traditional simulation approaches: the various paths that water takes between a particular input source and output node, and their associated time delays and impact on output node water quality. Such information constitutes a complete description of the input-output behavior under typical assumptions of first-order chemical decay or production reactions. Thus the output behavior can be calculated for any source quality input, and the explicit mathematical form of the input-output behavior is useful information for certain applications such as feedback control. More generally, the PBA is a tool to understand flow-path-dependent water quality processes in distribution systems, since those paths and their characteristics are made explicit and thus available for analysis. The potential utility of input-output analysis is illustrated by several examples. |
|
|
|
|
| publications-4115 |
article |
2006 |
Michaud, David and Michaud, David and Apostolakis, G. and Apostolakis, George |
Methodology for Ranking the Elements of Water-Supply Networks |
Journal of Infrastructure Systems |
10.1061/(asce)1076-0342(2006)12:4(230) |
|
|
|
This paper presents a scenario-based methodology for the ranking of the elements of a water-supply network according to their value to the network’s owner. The failures of the elements due to random causes and to malevolent acts are considered. The methodology is based on multiattribute utility theory and a graph theory-based network analysis algorithm. This methodology extends approaches proposed in the literature by taking into consideration the capacity of the infrastructure’s elements and their mean time to repair. The water-supply infrastructure of a midsize city serves as a case study. We model the infrastructure system as a network and create scenarios to evaluate the consequences of the failure of each of its elements. For each scenario, we evaluate the supply level to the various users considering the capacity of their connection to the available resources. We then evaluate the disutility of this supply level to the decision makers using multiattribute utility theory. The accident scenarios are r... |
|
|
|
|
| publications-4116 |
article |
2006 |
Jeong, Hyung Seok and Jeong, Hyung Seok and Qiao, Jun and Qiao, Jianhong and Abraham, Dulcy M. and Abraham, Dulcy M. and Lawley, Mark and Lawley, Mark and Richard, Jeanβ€Philippe P. and Richard, Jean-Philippe P. and Yih, Yuehwern and Yih, Yuehwern |
Minimizing the Consequences of Intentional Attack on Water Infrastructure |
Computer-aided Civil and Infrastructure Engineering |
10.1111/j.1467-8667.2005.00419.x |
|
|
|
Abstract: Since September 11, 2001, protecting the na-tion’s water infrastructure and improving water networkresiliency have become priorities in the water industry.In this work, we develop methods to mitigate the con-sequences of water shortage resulting from destructionof facilities in water networks. These methods integratesearch techniques, such as branch-and-bound and geneticalgorithms, with a hydraulic solver to check demand fea-sibilities across a residual water network. The objective isto identify a feasible customer demand pattern that min-imizes the consequences of water shortage in the down-graded network. We present a mathematical model of theproblem addressed along with an exact solution method-ology and several heuristics. We apply these methodolo-gies to three water networks ranging in size from approx-imately 10–700 nodes and compare the solution qualityand computational efο¬ciency. β— To whom correspondence should be addressed. E-mail: malawley@ecn.purdue.edu . 1 INTRODUCTION |
|
|
|
|
| publications-4117 |
article |
2014 |
Ouyang, Min and Ouyang, Min |
Review on modeling and simulation of interdependent critical infrastructure systems |
Reliability Engineering & System Safety |
10.1016/j.ress.2013.06.040 |
|
|
|
|
|
|
|
|
| publications-4118 |
article |
2008 |
Barthel, Roland and Barthel, Roland and Janisch, Stephan and Janisch, Stephan and Schwarz, Nina and Schwarz, Nina and Trifkovic, Aleksandar and Trifkovic, Aleksandar and Nickel, Darla and Nickel, D. and Schulz, Carsten and Schulz, C. and Mauser, Wolfram and Mauser, W. and Mauser, Wolfram |
An integrated modelling framework for simulating regional-scale actor responses to global change in the water domain |
Environmental Modelling and Software |
10.1016/j.envsoft.2008.02.004 |
|
|
|
|
|
|
|
|
| publications-4119 |
article |
2011 |
Lienemann, Taru and Lienemann, Taru and Pitkänen, Tarja and Pitkänen, Tarja and Antikainen, Jenni and Antikainen, Jenni and Mölsä, Elina and Molsa, Elina and Miettinen, Ilkka T. and Miettinen, Ilkka T. and Haukka, Kaisa and Haukka, Kaisa and Vaara, Martti and Vaara, Martti and Siitonen, Anja and Siitonen, Anja |
Shiga Toxin-Producing Escherichia coli O100:H–: stx2e in Drinking Water Contaminated by Waste Water in Finland |
Current Microbiology |
10.1007/s00284-010-9832-x |
|
|
|
In November 2007, 450 m3 of treated wastewater leaked into the drinking water distribution system contaminating the drinking water of over 10,000 inhabitants of Nokia, Southern Finland. Nearly 1,000 people visited the health centre because of gastroenteritis during the following 5 weeks. A wide range of enteric pathogens was found in the patients. The authors used the 16-plex PCR to investigate whether the five major diarrheagenic Escherichia coli pathotypes (EPEC, ETEC, STEC, EIEC or EAEC) were present in the contaminated drinking water and in the patients’ stool samples. The contaminated drinking water was positive for genes characteristic of various E. coli pathotypes: pic, invE, hlyA, ent, escV, eae, aggR, stx2, estIa and astA. These genes, except stx2, hlyA and invE, were also detected in the stool samples of the patients linked to this outbreak. A sorbitol positive, streptomycin resistant STEC strain was isolated from the drinking water, and belonged to the serotype O100:H–, produced Stx2 toxin (titre 1:8 by reversed-passive latex agglutination method), and carried the genes stx2e,estIa and irp2. |
|
|
|
|
| publications-4120 |
article |
2014 |
Long, Van and Do, Van Long and Fillatre, Lionel and Fillatre, Lionel and Nikiforov, Igor and Nikiforov, Igor |
A statistical method for detecting cyber/physical attacks on SCADA systems |
|
10.1109/cca.2014.6981373 |
|
|
|
This paper addresses the problem of detecting cyber/physical attacks on Supervisory Control And Data Acquisition (SCADA) systems. The detection of cyber/physical attacks is formulated as the problem of detecting transient changes in stochastic-dynamical systems in the presence of unknown system states (often regarded as the nuisance parameter). The Variable Threshold Window Limited CUmulative SUM (VTWL CUSUM) test is adapted to the detection of transient changes of known profiles in the presence of nuisance parameter. Taking into account the performance criterion of the transient change detection problem, which minimizes the worst-case probability of missed detection for a given value of the worst-case probability of false alarm, the thresholds are tuned for optimizing the VTWL CUSUM algorithm. The optimal choice of thresholds leads to the simple Finite Moving Average (FMA) algorithm. The proposed algorithms are utilized for detecting the covert attack on a simple water distribution system, targeting at stealing water from the reservoir without being detected. |
|
|
|
|