Solving the inverse problem of deliberate contaminants intrusions into water distribution systems

Avi Ostfeld, Elad Salomons

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

A methodology is developed and applied for solving the general inverse problem of a deliberate contaminant intrusion into a water distribution system: given a contaminant detection at one or more online monitoring/sensors stations - identify the injection characteristics: (1) location, (2) starting time, (3) intensity (mass time), and (4) duration. The algorithm is based on the randomized pollution matrix (RPM) concept, developed in previous works by the authors, and taking into account the monitoring stations detection sensitivity, their response delay, and possible different injection probabilities throughout the system. The model outcomes are the system nodes with the highest likelihood to be the injection locations; the approximated injection starting times; intensities; and durations. The model is demonstrated through a base run and sensitivity analysis using a simple example application. Copyright ASCE 2005.

Original languageEnglish
Title of host publicationWorld Water Congress 2005
Subtitle of host publicationImpacts of Global Climate Change - Proceedings of the 2005 World Water and Environmental Resources Congress
Pages46
Number of pages1
DOIs
StatePublished - 2005
Externally publishedYes
Event2005 World Water and Environmental Resources Congress - Anchorage, AK, United States
Duration: 15 May 200519 May 2005

Publication series

NameWorld Water Congress 2005: Impacts of Global Climate Change - Proceedings of the 2005 World Water and Environmental Resources Congress

Conference

Conference2005 World Water and Environmental Resources Congress
Country/TerritoryUnited States
CityAnchorage, AK
Period15/05/0519/05/05

ASJC Scopus subject areas

  • Water Science and Technology

Fingerprint

Dive into the research topics of 'Solving the inverse problem of deliberate contaminants intrusions into water distribution systems'. Together they form a unique fingerprint.

Cite this