Technical Papers
Jan 13, 2015

Adjoint-Based Probabilistic Source Characterization in Water-Distribution Systems with Transient Flows and Imperfect Sensors

Publication: Journal of Water Resources Planning and Management
Volume 141, Issue 9

Abstract

If a contamination event occurs in a water distribution system, sensors in the network may observe water quality changes. The data from these sensors can be used to identify the source of the contamination. The sensors can be binary sensors that record the presence or absence of contamination, fuzzy sensors that measure concentration within a set range, or perfect sensors that measure the exact concentration within the bounds of measurement uncertainty. This work presents an adjoint-based probabilistic approach for identifying the source node, source release time, and source strength for an instantaneous release of contamination based on sensor observations and known system hydraulics. In the adjoint approach, information is propagated upgradient from the sensors to the possible source nodes. EPANET is used to simulate the transient hydraulics of the pipe network and the upgradient propagation of the adjoint state through the network. The resulting adjoint states are related to probability density functions of the source release times at all possible source nodes. For fuzzy or perfect sensors, these probabilities can be used to determine the most likely source node. A hypothetical example is used to show that this method is accurate, even for a small number of sensor observations and complex hydraulics.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgments

This work was funded in part by the Air Force Medical Service Air Force Institute of Technology Civilian Institution Program and by the National Science Foundation under Grant DMS-0602284. The authors thank three anonymous reviewers for their valuable comments on this paper.

References

ASCE (American Society of Civil Engineers). (2004). “Interim voluntary guidelines for designing an online contaminant monitoring system.” Reston, VA.
De Sanctis, A. E., Feng, S., and Uber, J. G. (2010). “Real-time identification of possible contamination sources using network backtracking methods.” J. Water Resour. Plann. Manage., 444–453.
DHS (Department of Homeland Security). (2003). Homeland security presidential directive 7: Critical infrastructure identification, prioritization, and protection, Washington, D.C.
Di Cristo, C., and Leopardi, A. (2008). “Pollution source identification of accidental contamination in water distribution networks.” J. Water Resour. Plann. Manage., 197–202.
Di Nardo, A., Di Natale, M., Guida, M., and Musmarra, D. (2013). “Water network protection from intentional contamination by sectorization.” Water Resour. Manage., 27(6), 1837–1850.
Grayman, W. M., Murray, R., and Savic, D. A. (2009). “Effects of redesign of water systems for security and water quality factors.” Proc., World Environmental and Water Resources Congress, ASCE, Reston, VA.
Guan, J., Aral, M., Maslia, M., and Grayman, W. (2006). “Identification of contaminant sources in water distribution systems using simulation-optimization method: Case study.” J. Water Resour. Plann. Manage., 252–262.
Guidorzi, M., Franchini, M., and Alvisi, S. (2009). “A multi-objective approach for detecting and responding to accidental and intentional contamination events in water distribution systems.” Urban Water J., 6(2), 115–135.
Islam, M. R., Chaudhry, M. H., and Clark, R. M. (1997). “Inverse modeling of chlorine concentration in pipe networks under dynamic conditions.” J. Environ. Eng., 1033–1040.
Kumar, J., Brill, E. D., Mahinthakumar, G., and Ranjithan, S. R. (2012). “Contaminant source characterization in water distribution systems using binary signals.” J. Hydroinf., 14(3), 585–602.
Laird, C., Biegler, L., and van Bloemen Waanders, B. (2006). “Mixed-integer approach for obtaining unique solutions in source inversion of water networks.” J. Water Resour. Plann. Manage., 242–251.
Laird, C., Biegler, L., van Bloemen Waanders, B., and Barlett, R. (2005). “Contamination source determination for water networks.” J. Water Resour. Plann. Manage., 125–134.
Liu, L., Ranjithan, S. R., and Mahinthakumar, G. (2011). “Contamination source identification in water distribution systems using an adaptive dynamic optimization procedure.” J. Water Resour. Plann. Manage., 183–192.
Neupauer, R. (2011). “Adjoint sensitivity analysis of contaminant concentrations in water distribution systems.” J. Eng. Mech., 31–39.
Neupauer, R., Records, M., and Ashwood, W. (2010). “Adjoint model to identify contaminant sources in water distribution systems.” J. Water Resour. Plann. Manage., 587–591.
Neupauer, R. M., and Records, M. K. (2009). “Conditioned backward probability modeling to identify contamination sources in a water distribution system.” Proc., World Environmental and Water Resources Congress 2009, ASCE, Reston, VA, 1–8.
Neupauer, R. M., and Wilson, J. L. (1999). “Adjoint method for obtaining backward-in-time location and travel time probabilities of a conservative groundwater contaminant.” Water Resour. Res., 35(11), 3389–3398.
Preis, A., and Ostfeld, A. (2006). “Contamination source identification in water systems: A hybrid model tree-linear programming scheme.” J. Water Resour. Plann. Manage., 263–273.
Preis, A., and Ostfeld, A. (2007). “A contamination source identification model for water distribution system security.” Eng. Optim., 39(8), 941–947.
Preis, A., and Ostfeld, A. (2008). “Genetic algorithm for contaminant source characterization using imperfect sensors.” Civ. Eng. Environ. Systems, 25(1), 29–39.
Propato, M., Sarrazy, F., and Tryby, M. (2010). “Linear algebra and minimum relative entropy to investigate contamination events in drinking water systems.” J. Water Resour. Plann. Manage., 483–492.
Rico-Ramirez, V., Frausto-Hernandez, S., Diwekar, U. M., and Hernadez-Castro, S. (2007). “Water networks security: A two-stage mixed-integer stochastic program for sensor placement under uncertainty.” Comput. Chem. Eng., 31(5–6), 565–573.
Rossman, L. A. (2000). EPANET 2: User’s manual, Risk Reduction Engineering Laboratory, U.S. Environmental Protection Agency, Cincinnati.
Shen, H., McBean, E. A., and Ghazali, M. (2009). “Multi-stage response to contaminant ingress into water distribution systems and probability quantification.” Can. J. Civ. Eng., 36(11), 1764–1772.
Vankayala, P., Sankasubramanian, A., Ranjithan, S. R., and Mahinthakumar, G. (2009). “Contaminant source identification in water distribution networks under conditions of demand uncertainty.” Environ. Forensics, 10(3), 253–263.
Zechman, E. M., and Ranjithan, S. R. (2009). “Evolutionary computation-based methods for characterizing contaminant sources in a water distribution system.” J. Water Resour. Plann. Manage., 334–343.

Information & Authors

Information

Published In

Go to Journal of Water Resources Planning and Management
Journal of Water Resources Planning and Management
Volume 141Issue 9September 2015

History

Received: Jun 19, 2014
Accepted: Dec 3, 2014
Published online: Jan 13, 2015
Discussion open until: Jun 13, 2015
Published in print: Sep 1, 2015

Permissions

Request permissions for this article.

Authors

Affiliations

David E. Wagner
Bioenvironmental Engineering Flight Commander, United States Air Force, 280 First St., Holloman Air Force Base, NM 88330.
Roseanna M. Neupauer, M.ASCE [email protected]
P.E.
Associate Professor, Dept. of Civil, Environmental, and Architectural Engineering, Univ. of Colorado Boulder, 1111 Engineering Dr., Boulder, CO 80309 (corresponding author). E-mail: [email protected]
Cody Cichowitz
Student, Johns Hopkins Univ. School of Medicine, P.O. Box 850, Buena Vista, CO 81211.

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share