Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems

@inproceedings{Sreepathi2007CyberinfrastructureFC,
  title={Cyberinfrastructure for Contamination Source Characterization in Water Distribution Systems},
  author={Sarat Sreepathi and G. Mahinthakumar and Emily Zechman Berglund and S. Ranji Ranjithan and Downey Brill and Xiaosong Ma and G. Laszewski},
  booktitle={International Conference on Computational Science},
  year={2007}
}
This paper describes a preliminary cyberinfrastructure for contaminant characterization in water distribution systems and its deployment on the grid. The cyberinfrastructure consists of the application, middleware and hardware resources. The application core consists of various optimization modules and a simulation module. This paper focuses on the development of specific middleware components of the cyberinfrastructure that enables efficient seamless execution of the application core in a grid… 

A Simulation Study on Urban Water Threat Detection in Modern Cyberinfrastructures

This work uses a simulation framework to identify optimized locations of sensors that lead to fast detection of contamination sources and contrast this system architecture with a Hadoop-based implementation that automatically includes fault tolerance.

Dynamic fault tolerant grid workflow in the water threat management project

This work provides fault tolerance at the "queuing stage" rather than the "job-execution stage" of the Water Threat Management system by scheduling jobs in fault-tolerant ways, and presents a dynamic workflow in the system that can reduce the queue wait time in the changing environment.

Threat Detection in an Urban Water Distribution Systems with Simulations Conducted in Grids and Clouds

A workflow-based algorithm for identifying threads to an urban water management system that contrasts the architecture with a Hadoop implementation and a new middleware called cyberaide, that enables easy access to Grid resources through portals or the command line.

Water Contamination Impact Evaluation and Source-Area Isolation Using Decision Trees

AbstractThe security of drinking water distribution operation is an important issue that has received increasing interest within the last few years. The U.S. EPA has issued guidelines for water

Experiment and Workflow Management Using Cyberaide Shell

Cyberaide Shell provides a dynamic interface that allows access to complex cyberinfrastructure in an easy and intuitive fashion on an ad-hoc basis and is demonstrated using a Water Threat Management application deployed on the TeraGrid.

Application of parallel computing in data mining for contaminant source identification in water distribution systems

By increasing the number of scenarios in the database for CSI through the use of a super-computer, the opportunity exists to decrease the false negative rate and reduce the numberof false possible intrusion nodes.

Conference on Water Distribution System Analysis , WDSA 2014 Cloud-Based Decision Making in Water Distribution Systems

This research uses cloud computing capabilities for supporting analysis and decision making in water distribution systems and includes the development of evolutionary algorithms ready to run in a cloud environment for searching the best possible decisions considering a set of objectives.

A distributed computing architecture to enable advances in field operations and management of distributed infrastructure

This thesis proposes an architectural approach to providing dynamic, predictive, user-centric, device and platform independent access to consistent and up-to-date knowledge to support in-field operations and central management of distributed infrastructures.

False Negative/Positive Issues in Contaminant Source Identification for Water-Distribution Systems

A data-mining procedure is described and applied, which involves mining an offline-built database to select PINs that possess first-detection times within ±  m from the online sensor first- Detection time, with m selected to address issues of false negatives and positives.

Utility of Supercomputers in Trace-Back Algorithms for City-Sized Distribution Systems

The online data mining procedure, i.e., the PIN identification, is integrated into a geographic information system toolkit for rapid emergency response and results show that increasing the number of scenarios in the database can provide input to compute the “m” value, always reduce the false-negative rate of each sensor, and usually reduce the numberof false-positive PINs.

References

SHOWING 1-10 OF 33 REFERENCES

An Adaptive Cyberinfrastructure for Threat Management in Urban Water Distribution Systems

The development of an adaptive cyberinfrastructure system facilitated by a dynamic workflow design such that the measurement system, the analytical modules and the computing resources can mutually adapt and steer each other.

Evolutionary Computation-Based Methods for Characterizing Contaminant Sources in a Water Distribution System

The findings of an ongoing research investigation that develops and tests an evolutionary algorithm-based flexible and generic procedure, which is structured within a simulation-optimization paradigm, are reported.

Adaptive Contamination Source Identification in Water Distribution Systems Using an Evolutionary Algorithm-based Dynamic Optimization Procedure

A new multi population-based search using an evolutionary algorithm (EA) that at any time represents the solution state that best matches the available observations that is demonstrated for a contamination source identification problem in an illustrative water distribution network.

The EPANET Programmer's Toolkit for Analysis of Water Distribution Systems

The EPANET Programmer's Toolkit is a collection of functions that helps simplify computer programming of water distribution network analyses and can also simplify adding analysis capabilities to integrated network modeling environments based on CAD, GIS, and database packages.

Revolutionizing Science and Engineering Through Cyberinfrastructure: Report of the National Science Foundation Blue-Ribbon Advisory Panel on Cyberinfrastructure

The Panelʼs overarching recommendation is that the National Science Foundation should establish and lead a large-scale, interagency, and internationally coordinated Advanced Cyberinfrastructure Program (ACP) to create, deploy, and apply cyberinfrastructure in ways that radically empower all scientific and engineering research and allied education.

Dynamic Data Driven Applications Systems: New Capabilities for Application Simulations and Measurements

  • F. Darema
  • Computer Science
    International Conference on Computational Science
  • 2005
Examples of ongoing research developing DDDAS technologies are provided, both in terms of new capabilities in applications, measurement methods and in related systems software technologies.

Introduction to the ICCS2006 Workshop on Dynamic Data Driven Applications Systems

  • F. Darema
  • Computer Science
    International Conference on Computational Science
  • 2006
The scope of the present workshop provides examples of research and technology advances enabled through D DDAS and driven by DDDAS, leading to new capabilities by improving applications modeling and systems management methods, augmenting the analysis and prediction capabilities of simulations, improving the efficiency of simulations and the effectiveness of measurement systems.

Features of the Java Commodity Grid Kit

The Java CoG Kit provides middleware for accessing Grid functionality from the Java framework, and a prototype pure Java resource management system that enables one to run Grid jobs on platforms on which a Java virtual machine is supported, including Windows NT machines.

Kepler: an extensible system for design and execution of scientific workflows

The Kepler scientific workflow system provides domain scientists with an easy-to-use yet powerful system for capturing scientific workflows (SWFs), a formalization of the ad-hoc process that a scientist may go through to get from raw data to publishable results.

- G -

. For seven-dimensional Riemannian manifolds equipped with a G 2 -structure, we show in a full detailed way that all integral formulas and divergence equations, given by diverse authors, are agree