A Security-Oriented Manual Quality Sampling Methodology for Water Systems

被引:0
|
作者
Demetrios G. Eliades
Marios M. Polycarpou
Bambos Charalambous
机构
[1] University of Cyprus,KIOS Research Center for Intelligent Systems and Networks, ECE Department
[2] Water Board of Lemesos,undefined
来源
关键词
Water distribution networks; Manual sampling; Fault diagnosis; Security;
D O I
暂无
中图分类号
学科分类号
摘要
The management and security of water resources will be a key challenge in the years ahead. This work investigates the water quality manual sampling scheduling problem in drinking water distribution networks. This work contributes to research by presenting a problem formulation based on the underlying substance propagation dynamics, coupled with the impact dynamics describing the “damage” caused by a contamination in a drinking water distribution network. The proposed solution methodology optimizes a risk-objective, in order to compute a manual sampling scheme comprised of sampling nodes and times, using evolutionary computation techniques. To illustrate the methodology, we present simulation results on a real water distribution network.
引用
收藏
页码:1219 / 1228
页数:9
相关论文
共 50 条
  • [1] A Security-Oriented Manual Quality Sampling Methodology for Water Systems
    Eliades, Demetrios G.
    Polycarpou, Marios M.
    Charalambous, Bambos
    [J]. WATER RESOURCES MANAGEMENT, 2011, 25 (04) : 1219 - 1228
  • [2] Secure tropos: A security-oriented extension of the tropos methodology
    Mouratidis, Haralambos
    Giorgini, Paolo
    [J]. INTERNATIONAL JOURNAL OF SOFTWARE ENGINEERING AND KNOWLEDGE ENGINEERING, 2007, 17 (02) : 285 - 309
  • [3] Behavioral Equivalence of Security-Oriented Interactive Systems
    Liu, Guanjun
    Jiang, Changjun
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (08) : 2061 - 2068
  • [4] A security-oriented task scheduler for heterogeneous distributed systems
    Xie, Tao
    Qin, Xiao
    [J]. HIGH PERFORMANCE COMPUTING - HIPC 2006, PROCEEDINGS, 2006, 4297 : 35 - +
  • [5] Security-Oriented Network Architecture
    Jiang, Weiyu
    Liu, Bingyang
    Wang, Chuang
    Yang, Xue
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] Security-oriented service composition and evolution
    Han, Jun
    Kowalczyk, Ryszard
    Khan, Khaled M.
    [J]. ASPEC 2006: 13TH ASIA-PACIFIC SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 71 - 78
  • [7] Security-oriented Design for Web-based Systems: A Critical Review
    Katarahweire, Marriette
    Balikuddembe, Joseph K.
    [J]. AFRICAN CONFERENCE ON SOFTWARE ENGINEERING AND APPLIED COMPUTING (ACSEAC 2012), 2012, : 55 - 59
  • [8] On some directions in security-oriented research
    Sekanina, Lukas
    Hruska, Tomas
    Vojnar, Tomas
    Kolar, Dusan
    Cernocky, Jan
    [J]. 2007 ECSIS SYMPOSIUM ON BIO-INSPIRED, LEARNING, AND INTELLIGENT SYSTEMS FOR SECURITY, PROCEEDINGS, 2007, : 141 - +
  • [9] Improving Perimeter Security with Security-oriented Program Transformations
    Hafiz, Munawar
    Johnson, Ralph E.
    [J]. 2009 ICSE WORKSHOP ON SOFTWARE ENGINEERING FOR SECURE SYSTEMS, 2009, : 61 - 67
  • [10] Security-oriented sensor placement in intelligent buildings
    Eliades, D. G.
    Michaelides, M. P.
    Panayiotou, C. G.
    Polycarpou, M. M.
    [J]. BUILDING AND ENVIRONMENT, 2013, 63 : 114 - 121