TECHNICAL PAPERS
Dec 15, 2009

Extreme Impact Contamination Events Sampling for Water Distribution Systems Security

Publication: Journal of Water Resources Planning and Management
Volume 136, Issue 1

Abstract

In recent years, drinking water distribution systems security has become a major concern. To protect public health and minimize the effected community by a contaminant intrusion, water quality needs to be continuously monitored and analyzed. Contamination warning systems are being designed to detect and characterize contaminant intrusions into water distribution systems. Since contamination injections can occur at any node at any time the theoretical number of possible injection events, even for a medium-size network, is huge and grows substantially with system size. As a result of that contamination warning systems are designed based on a subset of contamination events, which is not necessarily the most critical. To cope with this difficulty a method derived from cross entropy, which originates from rare event simulations, is proposed. The suggested algorithm is able to sample efficiently a rare subset (i.e., a subset of events with a small probability to occur, but with an extreme impact) of the entire set of possible contamination events. The suggested methodology is demonstrated using an illustrative example and two water distribution systems example applications.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgments

This research was supported by the Institute for Future Defense Technologies Research named for the Medvedi, Shwartzman, and Gensler families, by the Grand Water Research Institute, and by NATO [Science for Peace (SfP) Project No. UNSPECIFIEDCBD.M.D.SFP 981456]. The valuable reviewer’s suggestions and comments are highly acknowledged.

References

Baranowski, T. M., and LeBoeuf, E. J. (2008). “Consequence management utilizing optimization.” J. Water Resour. Plann. Manage., 134(4), 386–394.
Berry, J. W., Hart, W. E., Phillips, C. A., Uber, J. G., and Watson, J. P. (2006). “Sensor placement in municipal water networks with temporal integer programming models.” J. Water Resour. Plann. Manage., 132(4), 218–224.
Cristo, C. D., and Leopardi, A. (2008). “Pollution source identification of accidental contamination in water distribution networks.” J. Water Resour. Plann. Manage., 134(2), 197–202.
CWS Benchmarks. (2001). “Water distributions systems example networks.” ⟨www.projects.ex.ac.uk/cws/⟩ (Feb. 28, 2009).
Davis, J. M., and Janke, R. (2008). “Importance of exposure model in estimating impacts when a water distribution system is contaminated.” J. Water Resour. Plann. Manage., 134(5), 449–456.
Isovitsch, S. L., and VanBriesen, J. M. (2008). “Sensor placement and optimization criteria dependencies in a water distribution system.” J. Water Resour. Plann. Manage., 134(2), 186–196.
Kessler, A., Ostfeld, A., and Sinai, G. (1998). “Detecting accidental contaminations in municipal water networks.” J. Water Resour. Plann. Manage., 124(4), 192–198.
Krause, A., Leskovec, J., Guestrin, C., VanBriesen, J., and Faloutsos, C. (2008). “Efficient sensor placement optimization for securing large water distribution networks.” J. Water Resour. Plann. Manage., 134(6), 516–526.
Kullback, S., and Leibler, R. A. (1951). “On information and sufficiency.” Ann. Math. Stat., 22(1), 79–86.
Ostfeld, A., et al. (2008). “The battle of the water sensor networks: A design challenge for engineers and algorithms.” J. Water Resour. Plann. Manage., 134(6), 556–568.
Ostfeld, A., and Salomons, E. (2004). “Optimal layout of early warning detection stations for water distribution systems security.” J. Water Resour. Plann. Manage., 130(5), 377–385.
Poulin, A., Mailhot, A., Grondin, P., Delorme, L., Periche, N., and Villeneuve, J. P. (2008). “Heuristic approach for operational response to drinking water contamination.” J. Water Resour. Plann. Manage., 134(5), 457–465.
Preis, A., and Ostfeld, A. (2008a). “Multiobjective contaminant sensor network design for water distribution systems.” J. Water Resour. Plann. Manage., 134(4), 366–377.
Preis, A., and Ostfeld, A. (2008b). “Multiobjective contaminant response modeling for water distribution systems security.” J. Hydroinform., 10(4), 267–274.
Rubinstein, R. Y. (1997). “Optimization of computer simulation models with rare events.” Eur. J. Oper. Res., 99, 89–122.
Rubinstein, R. Y. (1999). “The cross-entropy method for combinatorial and continuous optimization.” Methodol. Comput. Appl. Probab., 1(2), 127–190.
Rubinstein, R. Y., and Kroese, D. P. (2004). The cross-entropy method: A unified approach to combinatorial optimization, Monte Carlo simulation, and machine learning, Springer, New York.
Rubinstein, R. Y., and Melamed, B. (1998). Modern simulation and modeling, Wiley, New York.
USEPA. (2002). EPANET 2.00.12, ⟨http://www.epa.gov/ORD/NRMRL/wswrd/epanet.html⟩ (Feb. 28, 2009).
Xu, J., Fischbeck, P. S., Small, M. J., VanBriesen, J. M., and Casman, E. (2008). “Identifying sets of key nodes for placing sensors in dynamic water distribution networks.” J. Water Resour. Plann. Manage., 134(4), 378–385.

Information & Authors

Information

Published In

Go to Journal of Water Resources Planning and Management
Journal of Water Resources Planning and Management
Volume 136Issue 1January 2010
Pages: 80 - 87

History

Received: Aug 3, 2007
Accepted: Aug 3, 2009
Published online: Dec 15, 2009
Published in print: Jan 2010

Permissions

Request permissions for this article.

Authors

Affiliations

Lina Perelman [email protected]
Ph.D. Student, Faculty of Civil and Environmental Engineering, Technion—Israel Institute of Technology, Haifa 32000, Israel. E-mail: [email protected]
Avi Ostfeld, M.ASCE [email protected]
Associate Professor, Faculty of Civil and Environmental Engineering, Technion—Israel Institute of Technology, Haifa 32000, Israel (corresponding author). E-mail: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share