2006
DOI: 10.1007/11758532_54
|View full text |Cite
|
Sign up to set email alerts
|

An Adaptive Cyberinfrastructure for Threat Management in Urban Water Distribution Systems

Abstract: Abstract. Threat management in drinking water distribution systems involves real-time characterization of any contaminant source and plume, design of control strategies, and design of incremental data sampling schedules. This requires dynamic integration of time-varying measurements along with analytical modules that include simulation models, adaptive sampling procedures, and optimization methods. These modules are compute-intensive, requiring multi-level parallel processing via computer clusters. Since real-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The adaptive simulation-optimization scheme proposed here should be ideally coupled with a dynamic source identification model [20] that continuously updates the perceived contamination scenario using streaming data. A general framework for dynamic integration of these analytical modules for development of an adaptive cyberinfrastructure for threat management is described in [31]. 6 In the event that a contaminant is introduced to a WDS, water utility operators may take different preventive and protective actions to protect public health.…”
Section: Perceived Contamination Scenario Updatesmentioning
confidence: 99%
“…The adaptive simulation-optimization scheme proposed here should be ideally coupled with a dynamic source identification model [20] that continuously updates the perceived contamination scenario using streaming data. A general framework for dynamic integration of these analytical modules for development of an adaptive cyberinfrastructure for threat management is described in [31]. 6 In the event that a contaminant is introduced to a WDS, water utility operators may take different preventive and protective actions to protect public health.…”
Section: Perceived Contamination Scenario Updatesmentioning
confidence: 99%
“…The parameters shown in Table 1 and the computation time of approximately 83 days on an average desktop computer reflect the need to have a large number of individuals generated to search Mesopolis. To reduce the computation time, NCES was executed on a computer cluster containing eleven nodes with two 2.2 GHz processors, four GB RAM, and 80 GB HD per node (Mahinthakumar et al 2006). Using parallelized versions of the Java framework and EPANET, the computation time for one optimization trial using the settings in Table 1 was reduced to approximately seven hours.…”
Section: Number Of Subpopulationsmentioning
confidence: 99%
“…In projects [9][10][11][12], the applications are in the areas of environmental and natural resource management. In [9] the project employs previous work performed by the investigators in the Instrumented Oil-Field DDDAS project that has enabled a new generation of data-driven, interactive and dynamically adaptive strategies for subsurface characterization and oil reservoir management.…”
Section: Overview Of Work Presented In This Workhopmentioning
confidence: 99%
“…Work conducted in [10] develops capabilities to convert a traditional data collection sensor and ocean model into a DDDAS enabled system for identifying contaminants, dynamically coupling different models, simulations, and sensing strategies, in a symbiotic manner. The paper in [11] is centered on methods for detection, management and mitigation of threat in drinking water distribution systems; it involves real-time characterization of any contaminant source and plume, design of control strategies, and design of incremental data sampling schedules. This requires dynamic integration of time-varying measurements along with analytical modules hat include simulation models, adaptive sampling procedures, and optimization methods.…”
Section: Overview Of Work Presented In This Workhopmentioning
confidence: 99%