Show simple item record

contributor authorJinhui Jeanne Huang
contributor authorEdward A. McBean
date accessioned2017-05-08T21:08:29Z
date available2017-05-08T21:08:29Z
date copyrightNovember 2009
date issued2009
identifier other%28asce%290733-9496%282009%29135%3A6%28466%29.pdf
identifier urihttp://yetl.yabesh.ir/yetl/handle/yetl/40249
description abstractTo respond to growing concerns related to potential contamination ingress via backflow and/or terrorist threats to drinking water, a data mining approach is developed. Use of this data mining approach, in conjunction with a maximum likelihood procedure provides the means to identify the location and time of an intrusion event, based on limited sensor data. Uncertainties in water demand, sensor measurement, and modeling, are demonstrated to be highly relevant and necessary to be considered in the contamination identification problem. The effectiveness of the data mining method is demonstrated using a case study network where it takes only 3 min to identify a multiple injection event using five sensors in a 285 node water distribution network, including consideration of the aforementioned sources of uncertainty. The effectiveness of the method ensures the ability for a rapid-response to an abnormal event, and consequently, minimizes exposure risks of water consumers.
publisherAmerican Society of Civil Engineers
titleData Mining to Identify Contaminant Event Locations in Water Distribution Systems
typeJournal Paper
journal volume135
journal issue6
journal titleJournal of Water Resources Planning and Management
identifier doi10.1061/(ASCE)0733-9496(2009)135:6(466)
treeJournal of Water Resources Planning and Management:;2009:;Volume ( 135 ):;issue: 006
contenttypeFulltext


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record