YaBeSH Engineering and Technology Library

    • Journals
    • PaperQuest
    • YSE Standards
    • YaBeSH
    • Login
    View Item 
    •   YE&T Library
    • ASCE
    • Journal of Water Resources Planning and Management
    • View Item
    •   YE&T Library
    • ASCE
    • Journal of Water Resources Planning and Management
    • View Item
    • All Fields
    • Source Title
    • Year
    • Publisher
    • Title
    • Subject
    • Author
    • DOI
    • ISBN
    Advanced Search
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Archive

    Securing Water Distribution Systems Using Online Contamination Monitoring

    Source: Journal of Water Resources Planning and Management:;2005:;Volume ( 131 ):;issue: 005
    Author:
    Avi Ostfeld
    ,
    Elad Salomons
    DOI: 10.1061/(ASCE)0733-9496(2005)131:5(402)
    Publisher: American Society of Civil Engineers
    Abstract: The events of September 11, 2001 in the United States have brought to the fore the problem of drinking water distribution systems security. As a water distribution system is spatially diverse, limiting physical access to all components is practically impossible. Deliberate intrusions of contaminants directly into tanks, treatment plants, or through connecting devices is considered one of the most serious terrorist threats. An effective means of reducing this threat is online contamination monitoring. This paper extends previous work of the writers for optimal allocation of monitoring stations to secure drinking water distribution systems against deliberate contamination intrusions. The current methodology takes explicitly into account the randomness of the flow rate of the injected pollutants, the randomness in consumer’s demands, and the detection sensitivity and response time of the monitoring stations. The objective is to determine the optimal location of a set of monitoring stations aimed at detecting deliberate external terrorist hazard intrusions through water distribution system nodes: sources, tanks, treatment plant intakes, consumers—subject to extended period hydraulic demands and water quality conditions, and a maximum volume of polluted water exposure to the public at a concentration higher than a minimum hazard level. The methodology is implemented in a noncommercial program entitled
    • Download: (103.7Kb)
    • Show Full MetaData Hide Full MetaData
    • Get RIS
    • Item Order
    • Go To Publisher
    • Price: 5000 Rial
    • Statistics

      Securing Water Distribution Systems Using Online Contamination Monitoring

    URI
    http://yetl.yabesh.ir/yetl1/handle/yetl/39972
    Collections
    • Journal of Water Resources Planning and Management

    Show full item record

    contributor authorAvi Ostfeld
    contributor authorElad Salomons
    date accessioned2017-05-08T21:08:01Z
    date available2017-05-08T21:08:01Z
    date copyrightSeptember 2005
    date issued2005
    identifier other%28asce%290733-9496%282005%29131%3A5%28402%29.pdf
    identifier urihttp://yetl.yabesh.ir/yetl/handle/yetl/39972
    description abstractThe events of September 11, 2001 in the United States have brought to the fore the problem of drinking water distribution systems security. As a water distribution system is spatially diverse, limiting physical access to all components is practically impossible. Deliberate intrusions of contaminants directly into tanks, treatment plants, or through connecting devices is considered one of the most serious terrorist threats. An effective means of reducing this threat is online contamination monitoring. This paper extends previous work of the writers for optimal allocation of monitoring stations to secure drinking water distribution systems against deliberate contamination intrusions. The current methodology takes explicitly into account the randomness of the flow rate of the injected pollutants, the randomness in consumer’s demands, and the detection sensitivity and response time of the monitoring stations. The objective is to determine the optimal location of a set of monitoring stations aimed at detecting deliberate external terrorist hazard intrusions through water distribution system nodes: sources, tanks, treatment plant intakes, consumers—subject to extended period hydraulic demands and water quality conditions, and a maximum volume of polluted water exposure to the public at a concentration higher than a minimum hazard level. The methodology is implemented in a noncommercial program entitled
    publisherAmerican Society of Civil Engineers
    titleSecuring Water Distribution Systems Using Online Contamination Monitoring
    typeJournal Paper
    journal volume131
    journal issue5
    journal titleJournal of Water Resources Planning and Management
    identifier doi10.1061/(ASCE)0733-9496(2005)131:5(402)
    treeJournal of Water Resources Planning and Management:;2005:;Volume ( 131 ):;issue: 005
    contenttypeFulltext
    DSpace software copyright © 2002-2015  DuraSpace
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    yabeshDSpacePersian
     
    DSpace software copyright © 2002-2015  DuraSpace
    نرم افزار کتابخانه دیجیتال "دی اسپیس" فارسی شده توسط یابش برای کتابخانه های ایرانی | تماس با یابش
    yabeshDSpacePersian