Vulnerability of sewer network - graph theoretic approach

被引:5
|
作者
Ganesan, Balaraman [1 ]
Raman, Sundareswaran [2 ]
Ramalingam, Sujatha [2 ]
Turan, Mustafa Erkan [3 ]
Bacak-Turan, Goksen [3 ]
机构
[1] St Josephs Inst Technol, Chennai, Tamil Nadu, India
[2] SSN Coll Engn, Chennai, Tamil Nadu, India
[3] Manisa Celal Bayar Univ, Manisa, Turkey
关键词
Sewer system networks; Water supply networks; Centrality; Group betweenness centrality; Group closeness centrality; INFLUENTIAL SPREADERS; DRAINAGE SYSTEMS; CENTRALITY; WATER; INFRASTRUCTURE; MODEL;
D O I
10.5004/dwt.2020.25744
中图分类号
TQ [化学工业];
学科分类号
0817 ;
摘要
One of the most important structures in urban areas is an efficient sewer system to protect humans and the environment from the detrimental effects of wastewater. Such sewer systems often consist of pipes, manholes, pumping stations, and other complementary units. Strict monitoring of the sewer system is highly essential as any leakage can cause undesirable effects on health and safety. The layout is modeled as a graph which contains all sewer links and satisfies all the restrictions of a sanitary sewer system. In this work, we apply centrality measures on the sewer network system and water distribution system and also analyze the vulnerability of these systems.
引用
收藏
页码:370 / 376
页数:7
相关论文
共 50 条
  • [1] A Graph Theoretic Approach to Power System Vulnerability Identification
    Sen Biswas, Reetam
    Pal, Anamitra
    Werho, Trevor
    Vittal, Vijay
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2021, 36 (02) : 923 - 935
  • [2] Network synchronizability analysis: A graph-theoretic approach
    Chen, Guanrong
    Duan, Zhisheng
    [J]. CHAOS, 2008, 18 (03)
  • [3] Urban Network Parcellation using Graph Theoretic Approach
    Dubnov, Goni
    Dubnov, Shlomo
    Kiyoki, Yasushi
    [J]. 2015 IEEE 9TH INTERNATIONAL CONFERENCE ON SEMANTIC COMPUTING (ICSC), 2015, : 413 - 416
  • [4] A Graph-theoretic QoS-aware Vulnerability Assessment for Network Topologies
    Xuan, Ying
    Shen, Yilin
    Nguyen, Nam P.
    Thai, My T.
    [J]. 2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [5] A graph theoretic approach to data incest management in network centric
    McLaughlin, SP
    Evans, RJ
    Krishnamurthy, V
    [J]. 2005 7th International Conference on Information Fusion (FUSION), Vols 1 and 2, 2005, : 1162 - 1169
  • [6] A graph-theoretic visualization approach to network risk analysis
    O'Hare, Scott
    Noel, Steven
    Prole, Kenneth
    [J]. VISUALIZATION FOR COMPUTER SECURITY, PROCEEDINGS, 2008, 5210 : 60 - +
  • [7] A Generalized Framework for Reactor Network Synthesis: A Graph Theoretic Approach
    de Lima, Arthur E. Pastore
    Maravelias, Christos T.
    [J]. COMPUTERS & CHEMICAL ENGINEERING, 2022, 160
  • [8] Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach
    Guang, Xuan
    Yeung, Raymond W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (06) : 4513 - 4529
  • [9] Graph-theoretic approach for UAV-aided network connectivity
    Waharte, Sonia
    Trigoni, Niki
    [J]. DRONET'18: PROCEEDINGS OF THE 2018 ACM INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS AND SERVICES, 2018, : 87 - 91
  • [10] A GRAPH-THEORETIC APPROACH TO EXPLICIT NONLINEAR PIPE NETWORK OPTIMIZATION
    BOULOS, P
    ALTMAN, T
    [J]. APPLIED MATHEMATICAL MODELLING, 1991, 15 (09) : 459 - 466