Identification of contaminant sources in enclosed spaces by a single sensor

被引:90
|
作者
Zhang, T. [1 ]
Chen, Q. [1 ]
机构
[1] Purdue Univ, Sch Mech Engn, Air Transportat Ctr Excellence Airliner Cabin Env, W Lafayette, IN 47907 USA
关键词
inverse modeling; computational fluid dynamics; quasi-reversibility equation; pseudo-reversibility equation; backward location probability; indoor environment;
D O I
10.1111/j.1600-0668.2007.00489.x
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
To protect occupants from infectious diseases or possible chemical/biological agents released by a terrorist in an enclosed space, such as an airliner cabin, it is critical to identify gaseous contaminant source locations and strengths. This paper identified the source locations and strengths by solving inverse contaminant transport with the quasi-reversibility (QR) and pseudo-reversibility (PR) methods. The QR method replaces the second-order diffusion term in the contaminant transport equation with a fourth-order stabilization term. By using the airflow pattern calculated by computational fluid dynamics (CFD) and the time when the peak contaminant concentration was measured by a sensor in downstream, the QR method solves the backward probability density function (PDF) of contaminant source location. The PR method reverses the airflow calculated by CFD and solves the PDF in the same manner as the QR method. The position with the highest PDF is the location of the contaminant source. The source strength can be further determined by scaling the nominal contaminant concentration computed by CFD with the concentration measured by the sensor. By using a two-dimensional and a three-dimensional aircraft cabin as examples of enclosed spaces, the two methods can identify contaminant source locations and strengths in the cabins if the sensors are placed in the downstream location of the sources. The QR method performed slightly better than the PR method but with a longer computing time.
引用
收藏
页码:439 / 449
页数:11
相关论文
共 50 条
  • [21] Thermostats at multiple enclosed spaces
    Tain, A
    COMPTES RENDUS HEBDOMADAIRES DES SEANCES DE L ACADEMIE DES SCIENCES, 1922, 174 : 1453 - 1455
  • [22] The acoustics of enclosed spaces.
    Schuster, A
    NATURE, 1922, 110 : 341 - 342
  • [23] Oxygen depletion in enclosed spaces
    Burke, Daniel
    Alnasser, Manhal
    JOURNAL OF MARINE ENGINEERING AND TECHNOLOGY, 2020, 19 (04): : 291 - 294
  • [24] ENTERING TANKS AND ENCLOSED SPACES
    HODNICK, HV
    AMERICAN INDUSTRIAL HYGIENE ASSOCIATION JOURNAL, 1969, 30 (02): : 144 - &
  • [25] Sensor network design for contaminant detection and identification in water distribution networks
    Palleti, Venkata Reddy
    Narasimhan, Shankar
    Rengaswamy, R.
    Teja, Ravi
    Bhallamudi, S. Murty
    COMPUTERS & CHEMICAL ENGINEERING, 2016, 87 : 246 - 256
  • [26] Contaminant detection, identification, and quantification using a microchip laser fluorescence sensor
    Sinfield, Joseph V.
    Hemond, Harold F.
    Germaine, John T.
    Johnson, Bernadette
    Bloch, Jonathan
    JOURNAL OF ENVIRONMENTAL ENGINEERING, 2007, 133 (03) : 346 - 351
  • [27] Real-Time Identification of Indoor Pollutant Source Positions Based on Neural Network Locator of Contaminant Sources and Optimized Sensor Networks
    Vukovic, Vladimir
    Tabares-Velasco, Paulo Cesar
    Srebric, Jelena
    JOURNAL OF THE AIR & WASTE MANAGEMENT ASSOCIATION, 2010, 60 (09) : 1034 - 1048
  • [28] Simultaneous identification of groundwater contaminant sources and simulation of model parameters based on an improved single-component adaptive Metropolis algorithm
    Chang, Zhenbo
    Lu, Wenxi
    Wang, Han
    Li, Jiuhui
    Luo, Jiannan
    HYDROGEOLOGY JOURNAL, 2021, 29 (02) : 859 - 873
  • [29] Research on contaminant sources identification of uncertainty water demand using genetic algorithm
    Yan Xuesong
    Sun Jie
    Hu Chengyu
    Cluster Computing, 2017, 20 : 1007 - 1016
  • [30] Research on contaminant sources identification of uncertainty water demand using genetic algorithm
    Yan Xuesong
    Sun Jie
    Hu Chengyu
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2017, 20 (02): : 1007 - 1016