Technical Papers
Jun 17, 2023

P2O: AI-Driven Framework for Managing and Securing Wastewater Treatment Plants

Publication: Journal of Environmental Engineering
Volume 149, Issue 9

Abstract

Wastewater treatment plants (WWTPs) are critical infrastructures responsible for processing wastewater before discharging effluent to rivers and other potential uses. WWTPs use large, connected deep tunnels for storing sanitary and wet-weather flows for treatment. However, wastewater in those systems cannot exceed safe tunnel levels in order to prevent overflows of untreated wastewater into the environment. Further, WWTPs are among the 16 national lifeline infrastructure sectors in which the utilization of sensor technology has increased, making the sectors vulnerable to all forms of cyber threats. Considering these challenges, the work presented in this manuscript uncovers the role of AI at WWTPs by focusing on two problems: tunnel water-level prediction and detection of security threats. This is done by proposing an AI framework: P2O (prediction, protection, and optimization). The prediction module forecasts the tunnel water level using deep-learning models based on the current wastewater flow in the tunnel and other inputs from the sensors and gauges. The protection module focuses on classifying the intentionality of an anomaly, i.e., whether an attack is adversarial in nature or merely an outlier, using recurrent neural network models. Last, the optimization module aims to provide actionable recommendations to pump operators using a genetic algorithm. The experimental results of P2O indicate that the prediction module can predict the tunnel water level with 85% accuracy, and the protection module can detect about 97% of intentional attacks on WWTPs. AI models within P2O are evaluated; the experimental results are presented and discussed.

Practical Applications

This manuscript presents P2O, which is a novel AI framework that can predict about 85% of wastewater overflow incidences and about 95% of intentional cyberattacks on a WWTP, as indicated in the experiments. The deployment of P2O at a WWTP is essential, especially considering the adverse effects of overflowing wastewater on the environment (i.e., rivers and other water bodies). Moreover, cyberattacks on WWTPs can be subtle, making them challenging to detect; on average, most of them are noticed within one week to one month after the attack. This makes national infrastructure vulnerable to external and internal threats, influencing the well-being of water bodies and overall national security. P2O provides a real-time monitoring interface and can recommend optimal actions in different scenarios (i.e., outliers) for pump operators and process engineers at WWTPs.

Get full access to this article

View all available purchase options and get full access to this article.

Data Availability Statement

The code for P2O will be made available based on requests to the corresponding author. The SWaT (Goh et al. 2016) (https://itrust.sutd.edu.sg/itrust-labs_datasets/) and SMOD (Laso et al. 2017) are open-source data sets that can be obtained by contacting the original owners of the data. The third data set cannot be shared due to a nondisclosure agreement with the WWTP.

References

Abdi, H., and L. J. Williams. 2010. “Principal component analysis.” Wiley Interdiscip. Rev. Comput. Stat. 2 (4): 433–459. https://doi.org/10.1002/wics.101.
Adadi, A., and M. Berrada. 2018. “Peeking inside the black-box: A survey on explainable artificial intelligence (XAI).” IEEE Access 6 (Sep): 52138–52160. https://doi.org/10.1109/ACCESS.2018.2870052.
Adepu, S., and A. Mathur. 2016a. “Introducing cyber security at the design stage of public infrastructures: A procedure and case study.” In Complex systems design & management Asia, 75–94. Cham, Switzerland: Springer.
Adepu, S., and A. Mathur. 2016b. “An investigation into the response of a water treatment system to cyber attacks.” In Proc., 2016 IEEE 17th Int. Symp. on High Assurance Systems Engineering (HASE), 141–148. New York: IEEE.
Adepu, S., and A. Mathur. 2018. “Distributed attack detection in a water treatment plant: Method and case study.” IEEE Trans. Dependable Secure Comput. 18 (1): 86–99. https://doi.org/10.1109/TDSC.2018.2875008.
Alanazi, M., A. Mahmood, and M. J. M. Chowdhury. 2022. “SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues.” Comput. Secur. 125 (Feb): 103028.
Albahar, M. A., R. A. Al-Falluji, and M. Binsawad. 2020. “An empirical comparison on malicious activity detection using different neural network-based models.” IEEE Access 8 (Mar): 61549–61564. https://doi.org/10.1109/ACCESS.2020.2984157.
Alin, A. 2010. “Multicollinearity.” Wiley Interdiscip. Rev. Comput. Stat. 2 (3): 370–374. https://doi.org/10.1002/wics.84.
Ardabili, S., A. Mosavi, M. Dehghani, and A. R. Várkonyi-Kóczy. 2020. “Deep learning and machine learning in hydrological processes climate change and earth systems a systematic review.” In Vol. 101 of Engineering for sustainable future. INTER-ACADEMIA 2019. Lecture notes in networks and systems, edited by A. Várkonyi-Kóczy. Berlin: Springer.
Asadollahfardi, G., M. Afsharnasab, M. H. Rasoulifard, and M. Tayebi Jebeli. 2022. “Predicting of acid red 14 removals from synthetic wastewater in the advanced oxidation process using artificial neural networks and fuzzy regression.” Rend. Lincei Sci. Fis. Nat. 33 (1): 115–126. https://doi.org/10.1007/s12210-021-01043-8.
Asadollahfardi, G., H. Zangooi, M. Asadi, M. Tayebi Jebeli, M. Meshkat-Dini, and N. Roohani. 2018. “Comparison of box-Jenkins time series and ANN in predicting total dissolved solid at the Zāyandé-Rūd River, Iran.” J. Water Supply Res. Technol. AQUA 67 (7): 673–684. https://doi.org/10.2166/aqua.2018.108.
Batarseh, F. A., L. Freeman, and C.-H. Huang. 2021. “A survey on artificial intelligence assurance.” J. Big Data 8 (1): 1–30. https://doi.org/10.1186/s40537-021-00445-7.
Batarseh, F. A., M. O. Yardimci, R. Suzuki, M. N. K. Sikder, Z. Wang, and W. Mao. 2022. “Realtime management of wastewater treatment plants using AI.” Accessed March 15, 2023. https://www.waterrf.org/news/2022-intelligent-water-systems-challenge.
Bennett, N. D., et al. 2013. “Characterising performance of environmental models.” Environ. Modell. Software 40 (Feb): 1–20. https://doi.org/10.1016/j.envsoft.2012.09.011.
Bergstra, J., and Y. Bengio. 2012. “Random search for hyper-parameter optimization.” J. Mach. Learn. Res. 13 (2): 281–305. https://doi.org/10.5555/2503308.2188395.
Biewald, L. 2020. “Experiment tracking with weights and biases.” Accessed March 2, 2023. https://www.wandb.com/.
Bruce, P., A. Bruce, and P. Gedeck. 2020. Practical statistics for data scientists: 50+ essential concepts using R and Python. Sebastopol, CA: O’Reilly Media.
Chai, T., and R. R. Draxler. 2014. “Root mean square error (RMSE) or mean absolute error (MAE)?—Arguments against avoiding RMSE in the literature.” Geosci. Model Dev. 7 (3): 1247–1250. https://doi.org/10.5194/gmd-7-1247-2014.
Charu, C. A. 2018. Neural networks and deep learning: A textbook. New York: Springer.
Chawla, N. V., K. W. Bowyer, L. O. Hall, and W. P. Kegelmeyer. 2002. “Smote: Synthetic minority over-sampling technique.” J. Artif. Intell. Res. 16 (Jun): 321–357. https://doi.org/10.1613/jair.953.
Chicano, F., A. M. Sutton, L. D. Whitley, and E. Alba. 2015. “Fitness probability distribution of bit-flip mutation.” Evol. Comput. 23 (2): 217–248. https://doi.org/10.1162/EVCO_a_00130.
Collier, K. 2021. “50,000 security disasters waiting to happen: The problem of America’s water supplies.” Accessed March 2, 2023. https://www.nbcnews.com/tech/security/hacker-tried-poison-calif-water-supply-was-easyentering-password-rcna1206.
Corominas, L., M. Garrido-Baserba, K. Villez, G. Olsson, U. Cortés, and M. Poch. 2018. “Transforming data into knowledge for improved wastewater treatment operation: A critical review of techniques.” Environ. Modell. Software 106 (Aug): 89–103. https://doi.org/10.1016/j.envsoft.2017.11.023.
Das, B., and D. Chakrabarty. 2016. “Newton’s divided difference interpolation formula: Representation of numerical data by a polynomial curve.” Int. J. Math. Trend Technol. 35 (3): 197–203.
Dokeroglu, T., E. Sevinc, T. Kucukyilmaz, and A. Cosar. 2019. “A survey on new generation metaheuristic algorithms.” Comput. Ind. Eng. 137 (Nov): 10–40. https://doi.org/10.1016/j.cie.2019.106040.
Doshi-Velez, F., and B. Kim. 2017. “Towards a rigorous science of interpretable machine learning.” Preprint, submitted February 28, 2017. https://arxiv.org/abs/1702.08608.
Faramondi, L., F. Flammini, S. Guarino, and R. Setola. 2021. “A hardware-in-the-loop water distribution testbed dataset for cyber-physical security testing.” IEEE Access 9 (Aug): 122385–122396. https://doi.org/10.1109/ACCESS.2021.3109465.
Fernández, A., S. Garcia, F. Herrera, and N. V. Chawla. 2018. “Smote for learning from imbalanced data: Progress and challenges, marking the 15-year anniversary.” J. Artif. Intell. Res. 61 (Apr): 863–905. https://doi.org/10.1613/jair.1.11192.
Feurer, M., and F. Hutter. 2019. “Hyperparameter optimization.” In Automated machine learning. The springer series on challenges in machine learning, edited by F. Hutter, L. Kotthoff, and J. Vanschoren. Berlin: Springer.
Flynn, M. J. 2020. “Civilians ‘defending forward’ in cyberspace.” Cyber Defense Rev. 5 (1): 29–40.
Forest, J. J. F. 2006. Vol. 3 of Homeland security: Critical infrastructure. Westport, CT: Greenwood Publishing Group.
Gilpin, L. H., D. Bau, B. Z. Yuan, A. Bajwa, M. Specter, and L. Kagal. 2018. “Explaining explanations: An overview of interpretability of machine learning.” In Proc., 2018 IEEE 5th Int. Conf. on data science and advanced analytics (DSAA), 80–89. New York: IEEE.
Goh, J., S. Adepu, K. N. Junejo, and A. Mathur. 2016. “A dataset to support research in the design of secure water treatment systems.” In Proc., Int. Conf. on Critical Information Infrastructures Security, 88–99. Berlin: Springer.
Hassanzadeh, A., A. Rasekh, S. Galelli, M. Aghashahi, R. Taormina, A. Ostfeld, and M. K. Banks. 2020. “A review of cybersecurity incidents in the water sector.” J. Environ. Eng. 146 (5): 03120003. https://doi.org/10.1061/(ASCE)EE.1943-7870.0001686.
Hettiarachchi, H., and T. Ranasinghe. 2019. “Emoji powered capsule network to detect type and target of offensive posts in social media.” In Proc., Int. Conf. on Recent Advances in Natural Language Processing (RANLP 2019), 474–480. Varna, Bulgaria: INCOMA Ltd.
Hindy, H., D. Brosset, E. Bayne, A. Seeam, and X. Bellekens. 2019. “Improving SIEM for critical SCADA water infrastructures using machine learning.” In Proc., Computer Security: ESORICS 2018 Int. Workshops, CyberICPS 2018 and SECPRE 2018, Barcelona, Spain, September 6–7, 2018, Revised Selected Papers 2, 3–19. Berlin: Springer. https://doi.org/10.1007/978-3-030-12786-2.
Hingston, P. F., L. C. Barone, and Z. Michalewicz. 2008. Design by evolution: Advances in evolutionary design. Berlin: Springer.
Hyndman, R. J., and G. Athanasopoulos. 2018. Forecasting: Principles and practice. Melbourne, Australia: OTexts.
Ilyas, A., L. Engstrom, A. Athalye, and J. Lin. 2018. “Black-box adversarial attacks with limited queries and information.” In Vol. 80 of Proc., Int. Conf. on Machine Learning, in Proceedings of Machine Learning Research, 2137–2146. Washington, DC: Machine Learning Research.
James, G., D. Witten, T. Hastie, and R. Tibshirani. 2013. Vol. 112 of An introduction to statistical learning. Boston: Springer.
Kabir Sikder, M. N., F. A. Batarseh, P. Wang, and N. Gorentala. 2022. “Model-agnostic scoring methods for artificial intelligence assurance.” In Proc., 2022 IEEE 29th Annual Software Technology Conf. (STC), 9–18. New York: IEEE. https://doi.org/10.1109/STC55697.2022.00011.
Katoch, S., S. S. Chauhan, and V. Kumar. 2021. “A review on genetic algorithm: Past, present, and future.” Multimedia Tools Appl. 80 (5): 8091–8126. https://doi.org/10.1007/s11042-020-10139-6.
Khan, N. A., S. U. Khan, S. Ahmed, I. H. Farooqi, M. Yousefi, A. A. Mohammadi, and F. Changani. 2020. “Recent trends in disposal and treatment technologies of emerging-pollutants-a critical review.” TRAC Trends Anal. Chem. 122 (Jan): 115744. https://doi.org/10.1016/j.trac.2019.115744.
Khan, N. A., V. Vambol, S. Vambol, B. Bolibrukh, M. Sillanpaa, F. Changani, A. Esrafili, and M. Yousefi. 2021. “Hospital effluent guidelines and legislation scenario around the globe: A critical review.” J. Environ. Chem. Eng. 9 (5): 105874. https://doi.org/10.1016/j.jece.2021.105874.
Kochenderfer, M. J., and T. A. Wheeler. 2019. Algorithms for optimization. Cambridge, MA: MIT Press.
Komorowski, M., D. C. Marshall, J. D. Salciccioli, and Y. Crutain. 2016. “Exploratory data analysis.” In Secondary analysis of electronic health records, 185–203. Cham, Switzerland: Springer.
Kuhn, M., and K. Johnson. 2013. Vol. 26 of Applied predictive modeling. New York: Springer.
Kulkarni, A., D. Chong, and F. A. Batarseh. 2020. “Foundations of data imbalance and solutions for a data democracy.” In Data democracy, 83–106. Amsterdam, Netherlands: Elsevier.
Laso, P. M., D. Brosset, and J. Puentes. 2017. “Dataset of anomalies and malicious acts in a cyber-physical subsystem.” Data Brief 14 (Oct): 186–191. https://doi.org/10.1016/j.dib.2017.07.038.
LeCun, Y., Y. Bengio, and G. Hinton. 2015. “Deep learning.” Nature 521 (7553): 436–444. https://doi.org/10.1038/nature14539.
Li, J.-H. 2018. “Cyber security meets artificial intelligence: A survey.” Front. Inf. Technol. Electron. Eng. 19 (12): 1462–1474. https://doi.org/10.1631/FITEE.1800573.
Lim, B., and S. Zohren. 2021. “Time-series forecasting with deep learning: A survey.” Philos. Trans. R. Soc. A 379 (2194): 202–209.
Lunardi, A. 2018. “Real interpolation.” In Vol. 16 of Interpolation theory. CRM series. Berlin: Springer.
Lundberg, S. M., and S.-I. Lee. 2017. “A unified approach to interpreting model predictions.” In Advances in neural information processing systems, 30. San Mateo, CA: Morgan Kaufmann Publishers.
Luo, Y., W. Guo, H. H. Ngo, L. D. Nghiem, F. I. Hai, J. Zhang, S. Liang, and X. C. Wang. 2014. “A review on the occurrence of micropollutants in the aquatic environment and their fate and removal during wastewater treatment.” Sci. Total Environ. 473 (Mar): 619–641. https://doi.org/10.1016/j.scitotenv.2013.12.065.
Miller, T., A. Staves, S. Maesschalck, M. Sturdee, and B. Green. 2021. “Looking back to look forward: Lessons learnt from cyber-attacks on industrial control systems.” Int. J. Crit. Infrastruct. Prot. 35 (Dec): 100464. https://doi.org/10.1016/j.ijcip.2021.100464.
Moradbeikie, A., K. Jamshidi, A. Bohlooli, J. Garcia, and X. Masip-Bruin. 2020. “An IIOT based ICS to improve safety through fast and accurate hazard detection and differentiation.” IEEE Access 8 (Nov): 206942–206957. https://doi.org/10.1109/ACCESS.2020.3037093.
Moriasi, D. N., J. G. Arnold, M. W. Van Liew, R. L. Bingner, R. D. Harmel, and T. L. Veith. 2007. “Model evaluation guidelines for systematic quantification of accuracy in watershed simulations.” Trans. ASABE 50 (3): 885–900. https://doi.org/10.13031/2013.23153.
Owolabi, T. A., S. R. Mohandes, and T. Zayed. 2022. “Investigating the impact of sewer overflow on the environment: A comprehensive literature review paper.” J. Environ. Manage. 301 (Jan): 113810. https://doi.org/10.1016/j.jenvman.2021.113810.
Park, J., W. H. Lee, K. T. Kim, C. Y. Park, S. Lee, and T.-Y. Heo. 2022. “Interpretation of ensemble learning to predict water quality using explainable artificial intelligence.” Sci. Total Environ. 832 (Aug): 155070. https://doi.org/10.1016/j.scitotenv.2022.155070.
Perrone, P., F. Flammini, and R. Setola. 2021. “Machine learning for threat recognition in critical cyber-physical systems.” In Proc., 2021 IEEE Int. Conf. on Cyber Security and Resilience (CSR), 298–303. New York: IEEE.
Peters, P. E., and D. H. Zitomer. 2021. “Current and future approaches to wet weather flow management: A review.” Water Environ. Res. 93 (8): 1179–1193. https://doi.org/10.1002/wer.1506.
Picek, S., M. Golub, and D. Jakobovic. 2012. “Evaluation of crossover operator performance in genetic algorithms with binary representation.” In Bio-iInspired computing and applications. ICIC 2011. Lecture notes in computer science, edited by D. S. Huang, Y. Gan, P. Premaratne, and K. Han, 223–230. Berlin: Springer.
Radanliev, P., D. De Roure, M. Van Kleek, O. Santos, and U. Ani. 2021. “Artificial intelligence in cyber physical systems.” AI Soc. 36 (3): 783–796. https://doi.org/10.1007/s00146-020-01049-0.
Rahnama, E., O. Bazrafshan, and G. Asadollahfardi. 2020. “Application of data-driven methods to predict the sodium adsorption rate (SAR) in different climates in Iran.” Arabian J. Geosci. 13 (21): 1–19. https://doi.org/10.1007/s12517-020-06146-4.
Ratner, B. 2009. “The correlation coefficient: Its values range between + 1/- 1, or do they?” J. Targeting Meas. Anal. Mark. 17 (2): 139–142. https://doi.org/10.1057/jt.2009.5.
Reardon, R. D. 2005. “Clarification concepts for treating peak wet weather wastewater flows.” In Proc., WEFTEC 2005, 4431–4444. Clermont, FL: Florida Water Resources Journal.
Robison, M. 1991. “National pollutant discharge elimination system (NPDES) permit application requirement for storm water discharges.” In Army environmental hygiene agency aberdeen proving ground MD. Washington, DC: USEPA.
Sahu, A., Z. Mao, P. Wlazlo, H. Huang, K. Davis, A. Goulart, and S. Zonouz. 2021. “Multi-source multi-domain data fusion for cyberattack detection in power systems.” IEEE Access 9 (Aug): 119118–119138. https://doi.org/10.1109/ACCESS.2021.3106873.
Sanders, K. T., and M. E. Webber. 2012. “Evaluating the energy consumed for water use in the united states.” Environ. Res. Lett. 7 (3): 034034. https://doi.org/10.1088/1748-9326/7/3/034034.
Schütze, M., A. Campisano, H. Colas, W. Schilling, and P. A. Vanrolleghem. 2002. “Real-time control of urban wastewater systems-where do we stand today?” In Global solutions for urban drainage, 1–17. Reston, VA: ASCE.
Sojobi, A. O., and T. Zayed. 2022. “Impact of sewer overflow on public health: A comprehensive scientometric analysis and systematic review.” Environ. Res. 203 (Jan): 111609. https://doi.org/10.1016/j.envres.2021.111609.
Thompson, N. C., K. Greenewald, K. Lee, and G. F. Manso. 2020. “The computational limits of deep learning.” Preprint, submitted July 10, 2020. https://arxiv.org/abs/2007.05558.
Throneburg, M., P. Amico, and M. Labitzke. 2014. “An optimization planning framework for cost-effective wet-weather planning.” In Proc., Collection Systems Conf. 2014. Richmond, VA: Water Environment Federation.
Tuptuk, N., P. Hazell, J. Watson, and S. Hailes. 2021. “A systematic review of the state of cyber-security in water systems.” Water 13 (1): 81. https://doi.org/10.3390/w13010081.
Wang, Z., H. Song, D. W. Watkins, K. G. Ong, P. Xue, Q. Yang, and X. Shi. 2015. “Cyber-physical systems for water sustainability: Challenges and opportunities.” IEEE Commun. Mag. 53 (5): 216–222. https://doi.org/10.1109/MCOM.2015.7105668.
Willemain, T. R. 2013. “Practical time series forecasting: A hands-on guide, by Galit Shmueli.” Foresight: Int. J. Appl. Forecasting 1 (29): 43–44.
Yu, T., and H. Zhu. 2020. “Hyper-parameter optimization: A review of algorithms and applications.” Preprint, submitted March 12, 2020. https://arxiv.org/abs/2003.05689.
Yu, Y., X. Si, C. Hu, and J. Zhang. 2019. “A review of recurrent neural networks: LSTM cells and network architectures.” Neural Comput. 31 (7): 1235–1270. https://doi.org/10.1162/neco_a_01199.
Zanzotto, F. M. 2019. “Human-in-the-loop artificial intelligence.” J. Artif. Intell. Res. 64 (Feb): 243–252. https://doi.org/10.1613/jair.1.11345.
Zhong, J., X. Hu, J. Zhang, and M. Gu. 2005. “Comparison of performance between different selection strategies on simple genetic algorithms.” In Vol. 2 of Proc., Int. Conf. on Computational Intelligence for Modelling, Control and Automation and Int. Conf. on Intelligent Agents, Web Technologies and Internet Commerce (CIMCA-IAWTIC’06), 1115–1121. New York: IEEE.

Information & Authors

Information

Published In

Go to Journal of Environmental Engineering
Journal of Environmental Engineering
Volume 149Issue 9September 2023

History

Received: Nov 29, 2022
Accepted: Mar 21, 2023
Published online: Jun 17, 2023
Published in print: Sep 1, 2023
Discussion open until: Nov 17, 2023

Permissions

Request permissions for this article.

ASCE Technical Topics:

Authors

Affiliations

Postdoctoral Associate, Commonwealth Cyber Initiative (CCI), Virginia Tech, Arlington, VA 22203. ORCID: https://orcid.org/0000-0002-3620-2670
Mehmet Yardimci
Ph.D. Candidate, Dept. of Computer Science, Virginia Tech, Blacksburg, VA 24061.
Md Nazmul Kabir Sikder
Ph.D. Candidate, Bradley Dept. of Electrical and Computer Engineering (ECE), Virginia Tech, Arlington, VA 22203.
Associate Professor, Dept. of Biological Systems Engineering (BSE), Virginia Tech, Blacksburg, VA 24060 (corresponding author). ORCID: https://orcid.org/0000-0002-6062-2747. Email: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share