Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/80959
Citations
Scopus Web of Science® Altmetric
?
?
Type: Conference paper
Title: Graph decomposition in risk analysis and sensor placement for water distribution network security
Author: Deuerlein, J.
Wolters, A.
Meyer-Harries, L.
Simpson, A.
Citation: 12th Annual Conference on Water Distribution Systems Analysis 2010, Tucson, Arizona, United States, 12 Sep-15 Sep 2010 / Kevin E. Lansey, Christopher Y. Choi, Avi Ostfeld and Ian L. Pepper (eds.): pp. 394-411
Publisher: American Society of Civil Engineers
Issue Date: 2010
ISBN: 9780784412039
Conference Name: Water Distribution Systems Analysis (12th : 2010 : Tucson, Arizona, USA)
Statement of
Responsibility: 
Jochen Deuerlein, Andreas Wolters, Lea Meyer-Harries and Angus R. Simpson
Abstract: Over the last decade considerable research in water distribution network modeling has focused on the security of water supply against terrorist attacks. In this paper, specific issues of urban and regional distribution systems as to their vulnerability against terrorist attacks with CBRN (chemical, biological, radiological, nuclear) substances, detection methods and emergency plans are investigated. As a first step, a risk analysis is carried out based on topological properties of different parts of the network, classification of building developments and customers. The decomposition of the network graph enables the differentiation of network components (into treed components, blocks and bridges). Following this subdivision, the different impacts and detection characteristics can be assessed. The results of the risk analysis can be used for the creation of risk maps. The specific differences of urban (mainly looped) and regional (mainly branched) supply networks are discussed. The decomposition of the network graph can be further used for reducing the problem size of the sensor allocation problem by pre-selection of events with little impact and aggregation of the network model. The main ideas are demonstrated by use of the example network 2 of the Battle of the Water Sensor Networks (BWSN). The crucial point of all sensor networks is that a full coverage of the system won't be reachable and there will be a considerably long time to detection. An alarm is not actually generated until the toxic substance has passed a sensor. In this study another approach is proposed. The case of intrusion of the toxic substance by pumping against the pressure of the network will be considered. This event is considered as a "positive" leak. Leak detection methods that are normally used for the observation of pipelines are applied to the investigation of the water hammer event caused by the intrusion. Finally, conditions for the practical applicability of the method will be put up for discussion.
Rights: © 2010 American Society of Civil Engineers
DOI: 10.1061/41203(425)38
Published version: http://dx.doi.org/10.1061/41203(425)38
Appears in Collections:Aurora harvest 2
Civil and Environmental Engineering publications

Files in This Item:
File Description SizeFormat 
hdl_80959.pdfAccepted version952.59 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.