2007
DOI: 10.1007/978-3-540-72584-8_139
|View full text |Cite
|
Sign up to set email alerts
|

Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems

Abstract: Abstract. This paper describes a preliminary cyberinfrastructure for contaminant characterization in water distribution systems and its deployment on the grid. The cyberinfrastructure consists of the application, middleware and hardware resources. The application core consists of various optimization modules and a simulation module. This paper focuses on the development of specific middleware components of the cyberinfrastructure that enables efficient seamless execution of the application core in a grid envir… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(13 citation statements)
references
References 5 publications
0
13
0
Order By: Relevance
“…A second methodology, a simulation-optimization method based on a reduced gradient method (e.g., Guan et al 2006) or genetic algorithm (GA), involves considerable runtime due to the necessity to simulate large numbers of injection events using EPANET (Rossman 2000). To accelerate the GA optimization procedure, parallel GA has been proposed (e.g., Sreepathi et al 2007), which allows simulation of intrusion events with EPANET in parallel; the parallel GA procedure has the following limitations: 1) to utilize this procedure online, a water utility may need to maintain the parallel computing facilities or hardware routinely, since the time of an intrusion event is never known à priori, and hence the computing units may be required at any time. Another option is cloud computing, should the internet access and elapsed time in queue before running parallel GA be guaranteed; 2) there is no guarantee for the GA to converge to the global optimum, i.e., the true intrusion node may not be identified; and, 3) there may be the need for simulating duplicate intrusion events, resulting in need for extensive computational power.…”
Section: Introductionmentioning
confidence: 99%
“…A second methodology, a simulation-optimization method based on a reduced gradient method (e.g., Guan et al 2006) or genetic algorithm (GA), involves considerable runtime due to the necessity to simulate large numbers of injection events using EPANET (Rossman 2000). To accelerate the GA optimization procedure, parallel GA has been proposed (e.g., Sreepathi et al 2007), which allows simulation of intrusion events with EPANET in parallel; the parallel GA procedure has the following limitations: 1) to utilize this procedure online, a water utility may need to maintain the parallel computing facilities or hardware routinely, since the time of an intrusion event is never known à priori, and hence the computing units may be required at any time. Another option is cloud computing, should the internet access and elapsed time in queue before running parallel GA be guaranteed; 2) there is no guarantee for the GA to converge to the global optimum, i.e., the true intrusion node may not be identified; and, 3) there may be the need for simulating duplicate intrusion events, resulting in need for extensive computational power.…”
Section: Introductionmentioning
confidence: 99%
“…As mentioned earlier, CSC [13] in a Water Distribution System (WDS) is to find the contaminant source locations and their temporal mass loading history. The temporal mass history is defined through values such as as the start time of the contaminant release, duration of release, and the contaminant mass loading during this time.…”
Section: Problem Definitionmentioning
confidence: 99%
“…The MGA code is the optimization engine of the simulation -optimization framework. It calls the simulation component: a PEPANET: The PEPANET is the parallel version of EPANET simulator [13]. It receives a number of contamination source parameters from an input file and divides them into multiple file chunks to different EPANET servers to compute.…”
Section: H I L E T H E P R E D E F I N E D T E R M I N a T I O N C R mentioning
confidence: 99%
See 2 more Smart Citations