Skip to main content

Utility of Supercomputers in Trace-Back Algorithms for City-Sized Distribution Systems

  • Chapter
  • First Online:
  • 1343 Accesses

Part of the book series: Protecting Critical Infrastructure ((PCIN,volume 2))

Abstract

A contaminant source identification procedure intended to protect water distribution systems has to be both rapid and able to incorporate uncertainties, when identifying possible intrusion nodes (PINs). PIN identification has two major issues, the false-negative rate (failure to identify the true ingress location) and the false-positive issue (falsely identifying a location which is not the true ingress location). A data mining procedure is described and applied, which involves mining an off-line-built database, to select PINs that possess first detection times within ±m from the online sensor first detection time. The “m” value is a statistical characterization of the array of events of the offset values between online sensor first detection time under uncertainty and the one corresponding to the same intrusion event stored in the off-line database; with “m” selected, issues of controlling false negatives and positives are addressed. The approach described herein is made possible through the power of parallel computing in supercomputers, which demonstrates huge potential by simulating scenarios simultaneously. The online data mining procedure, i.e., the PIN identification, is integrated into a geographic information system toolkit for rapid emergency response. In the case studies, simulation of scenarios is reduced linearly to the number of processors applied. Results show that increasing the number of scenarios in the database can provide input to compute the “m” value, always reduce the false-negative rate of each sensor, and usually reduce the number of false-positive PINs.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  • American Water Works Association (AWWA). (2004). “Security guidance for water utilities.” http://www.awwa.org/science/wise Accessed Oct 14 2009. AWWA

  • Babayan, A., Kapelan, Z., Savic, D., and Walters, G. (2005). “Least-cost design of water distribution networks under demand uncertainty.” Journal of Water Resources Planning and Management, 131(5), 375–382

    Article  Google Scholar 

  • Guan, J., Aral, M.M., Maslia, M.L., Grayman, W.M. (2006). “Identification of contaminant source in water distribution systems using simulation-optimization method: case study.” Journal of Water Resources Planning and Management, 132(4), 252–262.

    Google Scholar 

  • Huang, J., and McBean, E. (2009). “Data mining to identify contaminant event locations in water distribution systems.” Journal of Water Resources Planning and Management, 135(6), 466–474

    Article  Google Scholar 

  • Kim, M., Choi, C.Y., and Gerba, C.P. (2008). “Source tracking of microbial intrusion in water systems using artificial neural networks.” Water Research, 42, 1308–1314

    Article  Google Scholar 

  • Methods, H., Walski, T.M., Chase, D.V., Savic, D.A., Grayman, W., Beckwith, S., and Koelle, E. (2003). Advanced water distribution monitoring and management. 1st ed. Haestad Methods, Waterbury, CT

    Google Scholar 

  • Ostfeld, A., and Salomons, E. (2005). “Securing water distribution systems using online contamination monitoring.” Journal of Water Resources Planning and Management, 131(5), 402–405

    Article  Google Scholar 

  • Perelman, L., and Ostfeld, A. (2010). “Bayesian networks for estimating contaminant source and propagation in water distribution system using cluster structure.” Water Distribution System Analysis 2010, Tucson, AZ, September 12–15

    Google Scholar 

  • Shang, F., Uber, J.G., and Polycarpou, M.M. (2002). “Particle back tracking algorithm for water distribution system analysis.” ASCE Journal of Environment Engineering, 128(5), 441–450

    Article  Google Scholar 

  • SHARCNET: http://www.sharcnet.ca. Accessed on Aug 25 2010

  • Shen, H., McBean, E., and Ghazali, M. (2009a). “Multi-stage response to contaminant ingress into water distribution systems and probability quantification.” Canadian Journal of Civil Engineering, 36(11), 1764–1772

    Article  Google Scholar 

  • Shen, H., McBean, E., and Ghazali, M. (2009b). “Contaminant source identification for priority nodes in water distribution systems.” Dynamic Modeling of Urban Water Systems, monograph 18, CHI, Guelph

    Google Scholar 

  • Sreepathi, S., Mahinthakumar, K., Zechman, E., Ranjithan, R., Brill, D., Ma, X., and Laszewski, G.V. (2007). “Cyberinfrastructure for contamination source characterization in water distribution system.” Computational Science ICCS 2007, Part I, LNCS 4487, 1058–1065

    Google Scholar 

  • US EPA. (2003). “Cross connection control manual.”

    Google Scholar 

  • Wong, A., Young, J., Hart, W.E., McKenna, S.A., and Laird, C.D. (2010). “Optimal determination of grad sample locations and source inversion in large-scale water distribution systems.” Water Distribution System Analysis 2010, Tucson, AZ, September 12–15

    Google Scholar 

Download references

Acknowledgments

This research was supported by the NSERC strategic grant STPGP 336126 and the Canada Research Chairs program, which are greatly appreciated.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hailiang Shen .

Editor information

Editors and Affiliations

Appendix

Appendix

To get the probability of generating negative random numbers, the following notations are applied:

  • x= random pattern factor, obeying normal distribution,

  • \(\ overline{x}\)= original pattern factor,

  • s= standard deviation,

  • y=normalized random pattern factor, obeying standard normal distribution.

Pattern factor makes no sense in negative values; every original pattern factor \(\ overline{x}\) is non-negative.

When \(\overline{x} = 0\), \(s = 0.1\), \(\overline{x} = 0\), thus, the generated random number would be always zero.

When \(\overline{x} > 0\),

$$y = \frac{{x - \overline{x}}}{s}$$
((21.2))

Since s equals to \(0.1\,\overline{x}\), Eq. (21.2) is converted to

$$y = \frac{{x - \overline{x}}}{{0.1\overline{x}}}$$
((21.3))

Thus, the probability of generating random negative pattern factor is

$$\begin{array}{l} P\left(x < 0\right) = P\left(\overline{x}\left(0.1\,y + 1\right) < 0\right) \\ \qquad\qquad = P\left(y < - 10\right) \\ \qquad\qquad = 7.6{\textrm{E}} - 24 \\ \end{array}$$
((21.4))

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this chapter

Cite this chapter

Shen, H., McBean, E. (2011). Utility of Supercomputers in Trace-Back Algorithms for City-Sized Distribution Systems. In: Clark, R., Hakim, S., Ostfeld, A. (eds) Handbook of Water and Wastewater Systems Protection. Protecting Critical Infrastructure, vol 2. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-0189-6_21

Download citation

Publish with us

Policies and ethics