An Adaptive Cyberinfrastructure for Threat Management in Urban Water Distribution Systems

Threat management in drinking water distribution systems involves real-time characterization of any contaminant source and plume, design of control strategies, and design of incremental data sampling schedules. This requires dynamic integration of time-varying measurements along with analytical modules that include simulation models, adaptive sampling procedures, and optimization methods. These modules are compute-intensive, requiring multi-level parallel processing via computer clusters. Since real-time responses are critical, the computational needs must also be adaptively matched with available resources. This requires a software system to facilitate this integration via a high-performance computing architecture such that the measurement system, the analytical modules and the computing resources can mutually adapt and steer each other. This paper describes the development of such an adaptive cyberinfrastructure system facilitated by a dynamic workflow design.

[1]  Thomas M. Walski,et al.  Analysis of water distribution systems , 1984 .

[2]  Jack Dongarra,et al.  Computational Science - ICCS 2005, 5th International Conference, Atlanta, GA, USA, May 22-25, 2005, Proceedings, Part I , 2005, International Conference on Computational Science.

[3]  Julian F. Miller,et al.  Genetic and Evolutionary Computation — GECCO 2003 , 2003, Lecture Notes in Computer Science.

[4]  Frederica Darema,et al.  Dynamic Data Driven Applications Systems: New Capabilities for Application Simulations and Measurements , 2005, International Conference on Computational Science.

[5]  Gregor von Laszewski,et al.  Workflow Concepts of the Java CoG Kit , 2005, Journal of Grid Computing.

[6]  Steven G. Buchberger,et al.  Intensity, Duration, and Frequency of Residential Water Demands , 1996 .

[7]  Gregor von Laszewski,et al.  A Repository Service for Grid Workflow Components , 2005, Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services - (icas-isns'05).

[8]  Henk Nijmeijer Book review: Estimation and control of systems / by Theodore F. Elbert. - New York : Van Nostrand Reinhold, 1984 , 1986 .

[9]  Gregor von Laszewski,et al.  Java CoG Kit Workflow , 2007, Workflows for e-Science, Scientific Workflows for Grids.

[10]  Sylvia Richardson,et al.  Markov Chain Monte Carlo in Practice , 1997 .

[11]  James G. Uber,et al.  The Threat Ensemble Vulnerability Assessment (TEVA) Program for Drinking Water Distribution System Security , 2004 .

[12]  David J. Spiegelhalter,et al.  Introducing Markov chain Monte Carlo , 1995 .