Technical Papers
Oct 10, 2011

Water Contamination Impact Evaluation and Source-Area Isolation Using Decision Trees

Publication: Journal of Water Resources Planning and Management
Volume 138, Issue 5

Abstract

The security of drinking water distribution operation is an important issue that has received increasing interest within the last few years. The U.S. EPA has issued guidelines for water utilities regarding which qualitative and quantitative metrics to monitor, and what response actions to take from the moment a contamination event alarm has been triggered, until the contamination has been accommodated and the system has returned to normal operation. Expanded sampling is a type of response action in which the water utilities examine water quality at certain locations in the network after a contamination event has been detected to help evaluate the contamination impact and locate the source-area. In this work, we propose a computational approach, based on decision trees, for choosing a sequence of nodes in the distribution network to perform expanded sampling, such that the water contamination impact is evaluated and the source-area is isolated, with as few manual quality samplings as possible. To illustrate the solution methodology, we present results based on a simplified and a benchmark water distribution system.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgments

This research work has been funded by the European Commission 7th Framework Program, under grant INSFO-ICT-270428 (iSense), and by the Cyprus Research Promotion Foundations Framework Programme for Research, Technological Development and Innovation, co-funded by the Republic of Cyprus and the European Regional Development Fund.

References

Alpaydin, E. (2004). Introduction to machine learning, MIT Press, Cambridge, MA.
Cristo, C. D., Leopardi, A. (2008). “Pollution source identification of accidental contamination in water distribution networks.” J. Water Resour. Plann. Manage., 134(2), 197–202.
De Sanctis, A. E., Shang, F., and Uber, J. G. (2006). “Determining possible contaminant sources through flow path analysis.” Proc. 8th Annual Water Distribution Systems Analysis Symp., ASCE, Cincinnati 124–137.
De Sanctis, A. E., Shang, F., and Uber, J. G. (2010). “Real-time identification of possible contamination sources using network backtracking methods.” J. Water Resour. Plann. Manage., 136(4), 444–453.
Eliades, D., and Polycarpou, M. (2010). “A fault diagnosis and security framework for water systems.” IEEE Trans. Contr. Syst. Technol., 18(6), 1254–1265.
Fügenschuh, A., Göttlich, S., and Herty, M. (2007). “Water contamination detection.” 8th Int. Conf. on Business Computer Science, Univ. Press of Karlsruhe, Germany, 501–518.
Guan, J., Aral, M. M., Maslia, M. L., and Grayman, W. M. (2006). “Identification of contaminant sources in water distribution systems using simulation—optimization method: Case study.” J. Water Resour. Plann. Manage., 132(4), 252–262.
Hill, J., van Bloemen Waanders, B., and Laird, C. (2006). “Source inversion with uncertain sensor measurements.” Proc. ASCE Water Distribution Systems Analysis, 1–13.
Huang, J. J., and McBean, E. A. (2009). “Data mining to identify contaminant event locations in water distribution systems.” J. Water Resour. Plann. Manage., 135(6), 466–474.
Krause, A., Leskovec, J., Guestrin, C., VanBriesen, J., and Faloutsos, C. (2008). “Efficient sensor placement optimization for securing large water distribution networks.” J. Water Resour. Plann. Manage., 134(6), 516–526.
Kumar, J., Zechman, E. M., Brill, E. D., Mahinthakumar, G., Ranjithan, S., and Uber, J. (2007). “Evaluation of non-uniqueness in contaminant source characterization based on sensors with event detection methods.” Proc. ASCE World Environmental and Water Resources, 513–520.
Laird, C. D., Biegler, L. T., van Bloemen Waanders, B. G., and Bartlett, R. A. (2004). “Time dependent contamination source determination: A network subdomain approach for very large water networks.” Proc. ASCE World Water and Environmental Resources, 469–480.
Laird, C. D., Biegler, L. T., and van Bloemen Waanders, B. G. (2006). “Mixed-integer approach for obtaining unique solutions in source inversion of water networks.” J. Water Resour. Plann. Manage., 132(4), 242–251.
Laird, C., Biegler, L., van Bloemen Waanders, B., and Bartlett, R.(2005). “Contamination source determination for water networks.” J. Water Resour. Plann. Manage., 131(2), 125–134.
Liu, L., Zechman, E. M., Brill, E. D., Mahinthakumar, G., Ranjithan, S., and Uber, J. (2006). “Adaptive contamination source identification in water distribution systems using an evolutionary algorithm-based dynamic optimization procedure.” Proc. ASCE Water Distribution Systems Analysis, 123–133.
Liu, L. (2009). “Real-time contaminant source characterization in water distribution systems.” Ph.D. thesis, NC State Univ., Raleigh, NC.
Maslia, M. L., Sautner, J. B., Aral, M. M., Gillig, R., Reyes, J. J., and Williams, R. C. (2001). Historical Reconstruction of the Water-distribution System Serving the Dover Township Area, NJ, January 1962–December 1996, Rep, Agency for Toxic Substances and Disease Registry, Atlanda, GA.
Maslia, M. L., Sautner, J. B., Aral, M. M., Reyes, J. J., Abraham, J. E., and Williams, R. C. (2000). “Using water-distribution system modeling to assist epidemiologic investigations.” J. Water Resour. Plann. Manage., 126(4), 180–198.
McKenna, S., Waanders, B., Laird, C., Buchberger, S., Li, Z., and Janke, R. (2005). “Source location inversion and the effect of stochastically varying demand.” Proc. ASCE World Water and Environmental Resources, 10.
Ostfeld, A., and Salomons, E.(2005). “Solving the inverse problem of deliberate contaminants intrusions into water distribution systems.” Proc. ASCE World Water and Environmental Resources, 12.
Ostfeld, A. et al. (2008). “The battle of the water sensor networks (BWSN): A design challenge for engineers and algorithms.” J. Water Resour. Plann. Manage., 134(6), 556–568.
Perelman, L., Maslia, M., Ostfeld, A., and Sautner, J. (2008). “Using aggregation/skeletonization network models for water quality simulations in epidemiologic studies.” J. Am. Water Works Assoc., 100(6), 122–133.
Preis, A., and Ostfeld, A. (2006). “Multiobjective sensor design for water distribution systems security.” Proc. ASCE Water Distribution Systems Analysis, 17.
Preis, A., and Ostfeld, A. (2007). “A contamination source identification model for water distribution system security.” Eng. Optimiz., 39(8), 941–947.
Rossman, L. A. (2000). EPANET 2 Users manual, National Risk Management Research Laboratory, Office of Research and Development, U.S. EPA, Cincinnati.
Shang, F., Uber, J., and Polycarpou, M. (2002). “Particle backtracking algorithm for water distribution system analysis.” J. Env. Eng., 128(5), 441–450.
Sreepathi, S. et al. (2007). “Cyberinfrastructure for contamination source characterization in water distribution systems.” Proc., 7th Int. Conf. on Computational Science, Springer-Verlag, Berlin, 1058–1065.
Uber, J. G. (2005). “Identifiability of contaminant source characteristics in steady-state and timevarying network flows.” Proc. ASCE World Water and Environmental Resources, 25–28.
U.S. EPA. (2008a). “Water security initiative: Interim guidance on developing an operational strategy for contamination warning systems.”, Cincinnati.
U.S. EPA. (2008b). “Water security initiative: Interim guidance on developing consequence management plans for drinking water utilities.”, Cincinnati.
Vankayala, P., Sankarasubramanian, A., Ranjithan, S. R., and Mahinthakumar, G. (2009). “Contaminant source identification in water distribution networks under conditions of demand uncertainty.” Environ. Forensics, 10(3), 253–263.
van Bloemen Waanders, B. G., Bartlett, R. A., Biegler, L. T., and Laird, C. D. (2003). “Nonlinear programming strategies for source detection of municipal water networks.” Proc. ASCE World Water and Environmental Resources, 10.
Wong, A. V., McKenna, S. A., Hart, W. E., and Laird, C. D. (2010). “Real-time inversion and response planning in large-scale networks.” Comput. Aided Chem. Eng., 28, 1027–1032.
Zechman, E. M., and Ranjithan, S. R. (2009). “Evolutionary computation-based methods for characterizing contaminant sources in a water distribution system.” J. Water Resour. Plann. Manage., 135(5), 334–343.

Information & Authors

Information

Published In

Go to Journal of Water Resources Planning and Management
Journal of Water Resources Planning and Management
Volume 138Issue 5September 2012
Pages: 562 - 570

History

Received: Oct 5, 2010
Accepted: Oct 7, 2011
Published online: Oct 10, 2011
Published in print: Sep 1, 2012

Permissions

Request permissions for this article.

Authors

Affiliations

Demetrios G. Eliades [email protected]
S.M.ASCE
KIOS Research Center for Intelligent Systems and Networks, Dept. of Electrical and Computer Engineering, Univ. of Cyprus, 75 Kallipoleos Ave., P.O. Box 20537, CY-1678 Nicosia, Cyprus (corresponding author). E-mail: [email protected]
Marios M. Polycarpou [email protected]
KIOS Research Center for Intelligent Systems and Networks, Dept. of Electrical and Computer Engineering, Univ. of Cyprus, 75 Kallipoleos Ave., P.O. Box 20537, CY-1678 Nicosia, Cyprus. E-mail: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share