Consequence Management Optimization for Contaminant Detection and Isolation
Publication: Journal of Water Resources Planning and Management
Volume 132, Issue 4
Abstract
Vulnerability assessments may be used to help identify components of water distribution systems that require strengthening against possible attacks, including physical destruction and/or chemical contamination. Numerous recent research efforts have focused on the placement of sensor systems to aid vulnerability assessments associated with contamination events. A related issue is the probability of isolating a contaminant following sensor detection. In this current effort, we utilize three optimization techniques: (1) an unconstrained first-order reliability method (FORM); (2) a constrained FORM; and (3) parameter estimation (PEST), to determine the optimal demand to reduce contaminant concentration. This aids in consequence management of contamination events by supplying water distribution system operators with additional information to remediate contaminated sections. Application of these techniques to a relatively simple network and a moderately complex network demonstrates the usefulness of optimization methods in determining optimal demands in order to reduce contaminant concentration. Although each of the techniques performed well for this example, PEST illustrated greater capabilities in determining the most optimal solution.
Get full access to this article
View all available purchase options and get full access to this article.
Acknowledgement
This material is based upon work supported in part by the National Science Foundation, Grant No. NSF0114329. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the writers and do not necessarily reflect the views of the National Science Foundation.
References
Baginska, B., Milne-Home, W., and Cornish, P. S. (2003). “Modelling nutrient transport in Currency Creek, NSW with AnnAGNPS and PEST.” Environ. Modell. Software, 18(8–9), 801–808.
Bentley Systems, I. (2003). WaterCAD: Water distribution system modeling software, 6, Haestad Methods Solution Center, Watertown, Conn.
Danneels, J. J., and Finley, R. E. (2004). “Assessing the vulnerabilities of U.S. drinking water systems.” J. Contemporary Water Research Education, (129), 8–12.
Doherty, J. (2003). “Ground water model calibration using pilot points and regularization.” Ground Water, 41(2), 170–177.
Doherty, J. (2004a). PEST—model indepedent parameter estimation, user’s manual, 5th Ed., Watermark Numerical Computing, Brisbane, Australia http://www.sspa.com/pest .
Doherty, J. (2004b). PEST—model indepedent parameter estimation, 9, Watermark Numerical Computing, Brisbane, Australia, http://www.sspa.com/pest .
Doherty, J., and Johnston, J. M. (2003). “Methodologies for calibration and predictive analysis of a watershed model.” J. Am. Water Resour. Assoc., 39(2), 251–265.
U. S. Environmental Protection Agency (EPA). (2002). EPANET 2.0, National Risk Management Research Laboratory, U.S. EPA, Cincinnati, http://www.epa.gov/ORD/NRMRL/wswrd/epanet.html .
Haldar, A, and Mahadevan, S. (2000). Reliability assessment using stochastic finite element analysis, Wiley, New York.
Kessler, A., Ostfeld, A., and Sinai, G. (1998). “Detecting accidental contaminations in municipal water networks.” J. Water Resour. Plan. Manage., 124(4), 192–198.
Kumar, A., Kansal, M. L., and Arora, G. (1997). “Identification of monitoring stations in water distribution system.” J. Environ. Eng., 123(8), 746–752.
Maier, H. R., Lence, B. J., Tolson, B. A., and Foschi, R. O. (2001). “First-order reliability method for estimating reliability, vulnerability, and resilience.” Water Resour. Res., 37(3), 779–790.
Mays, L. W., ed. (2000). Water distribution systems handbook, McGraw–Hill, New York.
Nilsson, K. A., Buchberger, S. G., and Clark, R. M. (2005). “Simulating exposures to deliberate intrusions into water distribution systems.” J. Water Resour. Plan. Manage., 131(3), 228–236.
Oak Ridge National Laboratory (ORNL). (2000). LandScan 2000 global population database, Oak Ridge, Tenn., http://sedac.ciesin.columbia.edu/plue/gpw/landscan .
Ostfeld, A., and Salomons, E. (2004). “Optimal layout of early warning detection stations for water distribution systems security.” J. Water Resour. Plan. Manage., 130(5), 377–385.
Parris, T. M. (2002). “Tools for environmental emergency response.” Environment, 44(8), 3–4.
Propato, M., and Uber, J. G. (2004). “Vulnerability of water distribution systems to pathogen intrusion: How effective is a disinfectant residual?” Environ. Sci. Technol., 38(13), 3713–3722.
Rackwitz, R., and Fiessler, B. (1978). “Structural reliability under combined random load sequences.” Comput. Struct., 9(5), 489–494.
Rossman, L. A. (2000). EPANET 2.0, user’s manual, National Risk Management Research Laboratory, U.S. EPA, Cincinnati, http://www.epa.gov/ORD/NRMRL/wswrd/epanet.html .
Tolson, B. A., Maier, H. R., Simpson, A. R., and Lence, B. J. (2004). “Genetic algorithms for reliability-based optimization of water distribution systems.” J. Water Resour. Plan. Manage., 130(1), 63–72.
Uber, J., Murray, R., and Janke, R., (2004). “Use of systems analysis to assess and minimize water security risks.” J. Contemporary Water Research Education, (129), 34–40.
Walski, T. M. (2001). “Water distribution models for emergency response.” Water Security Summit Proc., Haestad Press, Waterbury, Conn., 259–269.
Walski, T. M., et al. (1987). “Battle of network models: Epilogue.”J. Water Resour. Plan. Manage., 113(2), 191–203.
Xu, C. G., Goulter, I. C., and Tickle, K. S. (2003). “Assessing the capacity reliability of ageing water distribution systems.” Civ. Eng. Environ. Syst., 20(2), 119–133.
Information & Authors
Information
Published In
Copyright
© 2006 ASCE.
History
Received: Aug 24, 2005
Accepted: Dec 30, 2005
Published online: Jul 1, 2006
Published in print: Jul 2006
Authors
Metrics & Citations
Metrics
Citations
Download citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.