Technical Papers
May 13, 2011

False Negative/Positive Issues in Contaminant Source Identification for Water-Distribution Systems

Publication: Journal of Water Resources Planning and Management
Volume 138, Issue 3

Abstract

A contaminant source identification (CSI) methodology for water distribution systems is intended to identify possible events (i.e., intrusion nodes, times, duration, and mass rate). The methodology has to be both rapid and able to incorporate uncertainties when identifying possible intrusion nodes (PINs). Identification of PINs has two major issues: the false-negative rate (failure to identify the true ingress location) and the false-positive issue (falsely identifying a location that is not the true ingress location). A data-mining procedure is described and applied, which involves mining an offline-built database to select PINs that possess first-detection times within ±m from the online sensor first-detection time, with m selected to address issues of false negatives and positives. This data-mining approach is made possible through the power of parallel computing, which demonstrates huge potential by simulating scenarios simultaneously. In the case studies, scenario simulation times are reduced linearly to the number of processors applied. Results show that increasing the number of scenarios in the database can provide input to compute the m value, always reduces the false-negative rate of each sensor, and usually reduces the number of false PINs. Demonstrated by data-mining online application for two case studies of water distribution systems, the procedure identifies the PINs within less than 4 min, demonstrating that data mining represents a rapid and efficient CSI procedure.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgments

This work was made possible by the facilities of SHARCNET and Compute/Calcul Canada. This research was supported by the NSERC strategic grant STPGP 336126 and the Canada Research Chairs Program. Special thanks are given to personnel from the city of Guelph through provision of the WDS data and the hydraulic model.

References

American Water Works Association (AWWA). (2005). Contamination warning systems for water: An approach for providing actionable information to decision-makers, AWWA, Denver.
Babayan, A., Kapelan, Z., Savic, D., and Walters, G. (2005). “Least-cost design of water distribution networks under demand uncertainty.” J. Water Resour. Plann. Manage.JWRMD5, 131(5), 375–382.
Guan, J., Aral, M. M., Maslia, M. L., and Grayman, W. M. (2006). “Identification of contaminant source in water distribution systems using simulation-optimization method: Case study.” J. Water Resour. Plann. Manage.JWRMD5, 132(4), 252–262.
Hart, W. E, and Murray, R. (2010). “Review of sensor placement strategies for contaminant warning systems in drinking water distribution systems.” J. Water Resour. Plann. Manage.JWRMD5, 136(6), 611–619.
Huang, J., and McBean, E. (2009). “Data mining to identify contaminant event locations in water distribution systems.” J. Water Resour. Plann. Manage.JWRMD5, 135(6), 466–474.
Kim, M., Choi, C. Y., and Gerba, C. P. (2008). “Source tracking of microbial intrusion in water systems using artificial neural networks.” Water Res.WATRAG, 42(4-5), 1308–1314.
Laird, C. D., Biegler, L., Waanders, B., and Bartlett, R. A. (2005). “Contaminant source determination for water networks.” J. Water Resour. Plann. Manage.JWRMD5, 131(2), 125–134.
López-Ibáñez, M., Prasad, T. D., and Paechter, B. (2008). “Parallel optimisation of pump schedules with a thread-safe variant of EPANET toolkit.” Proc., 10th Annual Water Distribution Systems Analysis Conf., ASCE, Reston, VA.
Perelman, L., and Ostfeld, A. (2010). “Bayesian networks for estimating contaminant source and propagation in water distribution system using cluster structure.” Proc., Water Distribution System Analysis 2010, ASCE, Reston, VA.
Shang, F., Uber, J. G., and Polycarpou, M. M. (2002). “Particle back tracking algorithm for water distribution system analysis.” J. Environ. Eng.JOEEDU, 128(5), 441–450.
Shared Hierarchical Academic Research Computing Network (SHARCNET). (2009). 〈www.sharcnet.ca〉 (Aug. 1, 2010).
Shen, H., McBean, E., and Ghazali, M. (2009a). “Contaminant source identification for priority nodes in water distribution systems.” Dynamic modeling of urban water systems, monograph 18, Computational Hydraulics International (CHI), Guelph, ON, Canada.
Shen, H., McBean, E., and Ghazali, M. (2009b). “Multi-stage response to contaminant ingress into water distribution systems and probability quantification.” Can. J. Civ. Eng.CJCEB8, 36(11), 1764–1772.
Sreepathi, S., et al. (2007). “Cyberinfrastructure for contamination source characterization in water distribution system.” Computational science—ICCS 2007: Lecture notes in computer science, Vol. 4487, Springer, Heidelberg, Germany, 1058–1065.
U.S. EPA. (2005). “WaterSentinel system architecture.” EPA-817-D-05-003, Office of Water, Office of Ground Water and Drinking Water, U.S. EPA, Washington, DC.
Wong, A., Young, J., Hart, W. E., McKenna, S. A., and Laird, C. D. (2010). “Optimal determination of grad sample locations and source inversion in large-scale water distribution systems.” Proc., Water Distribution System Analysis 2010, ASCE, Reston, VA.

Information & Authors

Information

Published In

Go to Journal of Water Resources Planning and Management
Journal of Water Resources Planning and Management
Volume 138Issue 3May 2012
Pages: 230 - 236

History

Received: Aug 8, 2010
Accepted: May 1, 2011
Published online: May 13, 2011
Published in print: May 1, 2012

Permissions

Request permissions for this article.

Authors

Affiliations

Hailiang Shen, Ph.D. [email protected]
School of Engineering, Univ. of Guelph, 50 Stone Rd. East, Guelph, ON N1G 2W1, Canada. E-mail: [email protected]
Edward McBean [email protected]
Professor of Engineering and Canada Research Chair of Water Supply Security, School of Engineering, Univ. of Guelph, 50 Stone Rd. East, Guelph, ON N1G 2W1, Canada (corresponding author). E-mail: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share