Next Article in Journal
Assessing Reclaimed Urban Wastewater for Reuse in Agriculture: Technical and Economic Concerns for Mediterranean Regions
Previous Article in Journal
Net Fisheries’ Métiers in the Eastern Mediterranean: Insights for Small-Scale Fishery Management on Kalymnos Island
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Development of a Contaminant Distribution Model for Water Supply Systems

1
French South African Institute of Technology (F’SATI)/Department of Electrical Engineering, Tshwane University of Technology, Pretoria 0001, South Africa
2
École Supérieure d’Ingénieurs en Électrotechnique et Électronique, Cité Descartes, 2 Boulevard Blaise Pascal, Noisy-le-Grand, 93160 Paris, France
3
Institute of NanoEngineering Research (INER)/Department of Chemical, Metallurgy and Material Engineering, Tshwane University of Technology, Pretoria 0001, South Africa
*
Author to whom correspondence should be addressed.
Water 2019, 11(7), 1510; https://doi.org/10.3390/w11071510
Submission received: 21 June 2019 / Revised: 12 July 2019 / Accepted: 17 July 2019 / Published: 21 July 2019
(This article belongs to the Section Water Quality and Contamination)

Abstract

:
Water contamination can result in serious health complications and gross socioeconomic implications. Therefore, identifying the source of contamination is of great concern to researchers and water operators, particularly, to avert the unfavorable consequences that can ensue from consuming contaminated water. As part of the effort to address this challenge, this present study proposes a novel contaminant distribution model for water supply systems. The concept of superimposing the contaminant over the hydraulic analysis was used to develop the proposed model. Four water sample networks were used to test the performance of the proposed model. The results obtained displayed the contaminant distributions across the water network at a limited computational time. Apart from being the first in this domain, the significant reduction of computational time achieved by the proposed model is a major contribution to the field.

1. Introduction

The provision of potable water is essential to human health and the well-being of a society. This also conforms with one of the set objectives (target 6a) of the United Nation’s sustainable Development Goals (SDGs) by 2030 [1]. Despite reports that access to water have improved, a depleted delivery of potable water is an utmost concern that affects several continents. Interestingly, the goal of a utility operator is to supply water in adequate quantity and quality when desired. Usually, water is transported through water distribution networks (WDNs) from a treatment plant to consumers’ taps. A WDN is a complex infrastructure, which comprises of: pipes, nodes, and reservoirs where human interference is possible. Hence, it is exposed to both accidental and intentional attacks, which can have severe consequences on the public health, besides socioeconomic implications [2,3].
Mostly, the quality of water is examined at a treatment plant, but it can technically be contaminated during transportation, through: pipe leakages, nodes and cross-connections [4]. The negative consequences of consuming contaminated water can be severe, as reported in the literature [5]. For instance, Kenzie et al. [6] and Corso et al. [7] discussed the significant impact of a transported infection through a water supply system in Milwaukee, (USA) that engendered 403,000 users, some were subsequently hospitalised with an estimated bill of about USD 96.2 million. Cooper et al. [8] reported the consequences of an accidental pollution of a chemical in a WDN in Virgina, where over 300,000 users were affected. Several studies [6,7,8] have also established that attacks on the WDNs are real, and can happen again. The socioeconomic implications that can arise from water network attacks have allowed researches on water security, a notable attention and posited it at the forefront of research in this area.
Consequently, two notable preventive measures are recognised to curtail the attacks on the WDNs. These are: (1) enhancement of the physical infrastructure of the system, and (2) an instalment of water quality monitoring sensors across the water networks. An intensive monitoring of the network nodes will increase the level of safety. Unfortunately, it is impracticable to install sensors at every node in the network due to the high cost of procuring water quality monitoring sensors under limited budget constraints. In order to overcome these constraints, numerous efforts have been proposed to address the concern [9,10,11,12,13,14,15,16,17]. Even though an installed water quality sensor detects a contaminant event, it is imperative to identify the source of the contamination for immediate action to be taken, so as to minimise the adverse effect from contaminated water on the public health.
As such, research efforts on the Contamination Source Identification (CSI) in a water distribution network has significantly gained recognition. Modelling the transport and fate of contaminant in a WDN, demands knowledge about the characteristics of the contaminant, which are hardly known. Furthermore, it is rarely possible to identify the name of the contaminant and its type (chemical or biological); these add to the complexity encountered in developing a precise water quality model. Researchers and stakeholders have proposed various methodologies to address this challenge [13,18,19,20,21,22,23]. Adedoja et al. [5] presented a comprehensive review on how to establish a source of contamination in a water distribution network. Since hydraulic model exists and has been solved by some researchers [24,25,26,27], incorporating contaminant into it is a promising approach. Superimposing the contaminant into the hydraulic model has no effect on the flow direction. Based on this background, this study develops, a contaminant distribution model, by superimposing contaminants into the hydraulic analysis in order to quantify the contaminant distribution across the water networks. This is part of an effort to bridge the identified research shortcomings and contribute to knowledge in this domain. The rest of this paper is organised as follows: Section 2 outlines a brief background and related works. In Section 3, the description of the hydraulic model and the proposed mathematical formulation is presented. Implementation of the developed model on water networks is detailed in Section 4. Results and discussions are contained in Section 5, while conclusions and future research studies are presented in Section 6.

2. Background and Related Works

The CSI problem is characterised by responding to three (3) vital concerns: locating the source of contamination, the time of injection, and its magnitude. A derivation of the information from the data collected from water quality monitoring stations, is a complex task that must be resolved for prevention purposes, which include: public warning announcements, valves closure, pipes flushing, etc. Over the years, researchers have proposed different approaches; the use of simulation-optimisation approach [18], particle backtracking [28], machine learning [29], data mining [30], among others. CSI problem is commonly treated as an inverse problem by attempting to locate the source of contamination from the data collected from the water quality monitoring stations. Van Bloemen et al. [31] proposed a quadratic programming (QP) technique to tackle this problem. The authors’ model exhibited a probable capability to address the challenge. However, excessive computational stress was identified as a shortcoming of their approach. Thereafter, Lair et al. [32] suggested a dynamic optimisation method, based on a sub-domain to curtail this computational stress. They reported that the model can merely handle the computational stress, but excludes key information during the selection of sub-domains, which was a setback of the approach.
Preis and Ostfeld [33] presented a coupled model tree-linear programming technique with the use of the commonly adopted EPANET tool developed by Rossman [34]. Preis and Ostfeld [35] proposed a combination of a Generic algorithm (GA) with the EPANET to resolve the CIS problem. EPANET was employed for the hydraulic simulation, while GA was used to moderate the injection attribute. The method minimises the difference between the measured and the evaluated data. The use of this method requires an excessive computation that demands the use of parallel computing. In addition, the study by Liu et al. [22,23] discussed an adaptive dynamic optimisation (ADOPT) method. This method has a real-time response with contamination occurrences. The authors utilised an evolutionary algorithm (EA) to overcome the early convergence that can lead to imprecise output. This process helps to preserve a group of possible output that can lead to diverse non-unique solutions. The EA enhances the results once a new observation is absorbed, which decreases the magnitude of the non-uniqueness. It was tested by using two water networks to demonstrate the feasibility of the proposed method. The consideration of a single source of injection and non-reactive contaminants are some of the advantages of this method; however, for a large water network, such assumptions may not be feasible. The model may therefore, suffer from over-generalization. Recently, Xu et al. [19] used a cultural algorithm to address a similar concern. They demonstrated the viability of the method by using three water supply networks. The results obtained exhibited positive capability of the technique, even though extreme computation was a major setback. Other shortcomings connected to the CSI problems are: complex network nodes, and stochaistic demand of water, which can lead to some problems of uncertainties. Yan et al. [36] proposed a hybrid encoding method to improve the convergence criteria.
Probabilistic and Bayesian techniques have also been used to address CSI problem. Dawsey et al. [37] proposed an inclusion of sensor data with a possibility to evaluate the source of occurrence from different areas, while Tao et al. [38] formulated a probabilistic approach. Nuepauer et al. [39] presented a backward modelling scheme with the use of a Probability Density Function (PDF) to locate the source and release time of contamination. The collected information from the monitoring sensor were used to generate the PDF. The results obtained expressed the effectiveness of the backward model to handle a steady flow conditions with a single source of the contamination. Wang and Zhou [40] applied a Bayesian sequential technique to handle the CSI problem. Baradouzi et al. [41] discussed a Probabilistic Support Vector Machines (PSVMs) technique to identify the source of contamination; they used some tools to train the PSVMs. The results obtained exhibit the feasibility of the approach to identify an upstream region viable for likely location. The water distribution system of Arak, Iran was employed to validate the proposed method.
Other notable works have been presented by Di Nardo et al. [42], model-based by Zechman and Ranjithan [20], artificial neutral networks, (ANN) by Kim et al. [43] and hybrid methods [44,45] to resolve the CSI problem. Propato [13] discussed an entropic-based method. In the study, a linear algebraic technique was first employed to minimise the selection of probable sources. Thereafter, a minimum entropy method was applied to evaluate the likely source, which led to the potential sources that are sensible to the monitoring stations. An evolutionary scheme and population-based global search method was presented by Zechman and Ranjithan [20]. The technique was devised by applying a tree-based encoding model, which generates the decision vectors and a set of connected genetic operators that led to an effective search. Liu et al. [45] combined a statistical method and a heuristic search model to present the contamination incident. The statistical method pointed the possible locations and the heuristic search method amplified the contamination source attributes. The feasibility of the method was examined by using two water networks. The results obtained showed a quick adaptive discovery of contaminant attributes. However, the method cannot be expanded to handle multiple sources occurrence. Liu et al. [44] proposed a hybrid method to characterise the sources by giving a sensor measurements in real time. The method integrates a logistic regression (LR) and local improvement model to speed-up the convergence processes. In order to ascertain the capability of the method, two water networks were examined. The first is a sample small network of about 117 pipes, while the details of the second network was adapted from [46]. The results obtained, expressed the fast convergence of the hybrid method when compared to the single method. Despite the significant effort recorded on the aforementioned problem, excessive computation remained unsolved. To this end, the present study formulates a contaminant distribution model when given the source of contamination, with an assumption that hydraulic solution is solved.

3. Proposed Model Formulation

Since hydraulic model exists and have been solved by some researchers [24,26], this study proposes to superimpose the contaminant into the hydraulic analysis. This study formulates a contaminant distribution model by giving a source of contaminations and, on an assumption that the hydraulic model is resolved and the network flow analysis is known.

3.1. Hydraulic Model

By applying graph the theory, a water distribution network can be presented as a connected graph with a set of edges and a set of nodes [24]. The former consists of pipes, pumps and valves. The two basic principles that describe the hydraulic equations in a water distribution network are: the principle of mass continuity in the node and, an energy conservation around the loop. A typical water network consist of n p number of pipes, n j number of junction nodes (nodes with unknown heads), and n f number of fixed-head nodes (nodes with known heads), the total number of nodes in the network can be expressed as: n t = n j + n f . The mass continuity equation is similar to the Kirchoff’s law in electrical network and, it is applicable to the nodes with known demand. It states that the algebraic summation of the flows at the node is zero. Thus, it is expressed as:
A s q + d = 0
where q ϵ n p × 1 = [ q 1 , q 2 , q n p ] T is the vector of the pipe flow rates; d ϵ n j × 1 = [ d 1 , d 2 , d n j ] T is the vector of the fixed demand at the nodes with unknown heads and A s is the node-pipe incidence matrix of dimension n j × n p connecting to the nodes with unknown heads [47]. The energy conservation law is related to the Kirchoff’s voltage law in electrical network. It deals with head losses around the loops and, can be presented in term of its topological matrix as follows:
M ¯ Δ h s = Δ h
where Δ h is the head loss vector across the pipes; Δ h s is the head loss across the loops; M ¯ ϵ m × n p represented the loop-pipe incidence matrix; and m is the number of loops. The element M ¯ in Equation (2) are derived from:
M ¯ i j = + 1 if pipe j is in loop i and is in the same direction 1 if pipe j is in loop i and is in the opposite direction 0 if pipe j is not in loop i
In addition, the energy conservation is expressed, thus:
Δ h s = A s T A f T h h f
where h = [ h 1 , h 2 , h n j ] T denotes the vector of the unknown heads of dimension ( n j × 1 ) and h f = [ h f ( 1 ) , h f ( n f ) ] T represents the vector of the unknown heads of dimension ( n f × 1 ). A s is the node-pipe incidence matrix of dimension n j × n p associating to the nodes with unknown heads [47]. Both A s and A f are obtained from the actual topological incidence matrix, A as:
A = A s A f
The element A is derived from
A i j = + 1 if the flow in pipe j leaves node i 1 if the flow in pipe j enters node i 0 if pipe j is not incident to node i
Similarly, the head loss equations are essential for the solution of the piping networks. It describes the pressure drop across a given pipe of flow in a particular pipe. An illustration of this is described by the element shown in Figure 1, with two end nodes i and j. The head loss due to the friction of the flow of water with the pipe wall is commonly expressed as:
Δ h ( r , q ) = h i h j = E q
E = r | q | α 1
where h i and h j are the heads at end node of the pipe and r = [ r 1 , , r n p ] T denotes the vector of the pipe resistance factor. Consideration of minor loss due to the valves and other pipe connections is generally expressed in the form:
Δ h ( r , q ) = r q | q | α 1 + k m q | q |
Subsequent, consideration of energy balance equation and the inclusion of the minor loss leads to;
r q | q | α 1 + k m q | q | = A s T h + A f T h f
( r | q | α 1 + k m | q | ) q A s T h A f T h f = 0
A matrix E can be defined as:
E = d i a g ( r | q | α 1 + k m | q | )
By substituting Equations (12) into (11), the energy balance equation is expressed as
E q A s T h A f T h f = 0
Equations (1) and (13) are both steady-state hydraulic equations. These can be solved in order to estimate the pipe flow and the heads at the junction node. The system of equations expressed by Equation (14) are partly linear and partly non-linear [24].
E q A s T h A f T h f = 0 A s q + d = 0
Equation (14) can also be expressed as:
E A s T A s 0 q h + A f T h f d = 0
The system of equations expressed in the Equation (14) maybe solved by an iterative method. The matrix E is a n p × n p diagonal matrix, whose elements are formed from the head loss (including the minor loss due to valves) relation as:
E = r 1 | q 1 | α 1 + k m 1 | q 1 | r 2 | q 2 | α 1 + k m 2 | q 2 | r n p | q n p | α 1 + k m n p | q n p |
where k m = [ k m 1 , k m 2 , , k m n p ] T is a ( n p × 1 ) vector of the minor loss factor due to valves or any other connections attached to the pipe; and α is an exponent whose value depends on the head loss model employed (1.85 for Hazen–Willam and 2 for both Darcy–Weisbach or Chezy–Manning head loss model) [48]. The variable r depends on the head loss model employed. In the circumstance where the Darcy–Weisbach or the Hazen–William’s model is used, the hydraulic resistance for the l t h pipe is described as:
r l = 8 f i L l g π 2 D l 5
for Darcy-Weisbach model, and
r l = L l 3.59 C h w l 1.852 × 1 D l 4.87
for Hazen-William model. In Equations (17) and (18), L l is the length of the l t h pipe; g is the acceleration due to gravity; D l denotes the diameter of the l t h pipe; f l is a dimensionless constant, which represents the fictional factor for the l t h pipe; and C h w l is the Hazen–William friction coefficient for the l t h pipe. The pipe friction factor f, in Equation (17) is a function of the equivalent sand roughness ε of pipes as well as the Reynold number R e , and this can be calculated by using the expression reported by Shockling et al. 2006 [49]. In this study, the Hazen–William head loss model will be adopted.

3.2. Formulation of the Proposed Contaminant Distribution Model

The formulation of this model assumes that the hydraulic solution has been resolved and the source of contaminations are known. Thus, the proposed contaminant distribution model is explicitly presented by using Figure 2.
The simple network depicted in Figure 2 consists of Eight (8) nodes, and Ten (10) branches. In this case, nodes 1 and 3 are assumed to be the sources of contamination with variables; β 1 and β 3 while, the external sources are represented by; Q ¯ 1 and Q ¯ 3 respectively. The concentrations at nodes: 1 to 8 are independent of the inflow branches into a particular node. By assigning a variable δ k , to the concentration at node k, the following relationships are formulated in Equations (19)–(26) as:
δ 1 = β 1
δ 2 = α 1 Q 1 + α 2 Q 2 Q 1 + Q 2
δ 3 = β 3
δ 4 = α 3 Q 3 + α 6 Q 6 Q 3 + Q 6
δ 5 = α 4
δ 6 = α 7 Q 7 + α 5 Q 5 Q 5 + Q 7
δ 7 = α 8
δ 8 = α 9 Q 9 + α 10 Q 10 Q 9 + Q 10
Considering the out of the node concentrations. If concentrations in branches are represented by α k , then Equations (26)–(33) are formulated as:
α 1 = α 3 = δ 1
α 2 = α 5 = δ 3
α 4 = δ 2
α 6 = α 7 = δ 5
α 8 = δ 4
α 9 = δ 6
α 10 = δ 7
Therefore, the concentration of contamination at node k is independent of the outflow branches from the respective nodes; this is expressed in Equation (34)
C o u t t δ k = α k
C o u t = 1 , if flow in branch leaves node i 0 , otherwise
where C o u t t in Equation (34) is expressed in Equation (35) and is the transpose of the incident matrices, δ k is the concentration at node k and α k is the concentration in branches.
Similarly, the inflow q k , into the nodes is formulated in Equations (36)–(43) as:
q 1 = Q ¯ 1
q 2 = Q 1 + Q 2
q 3 = Q ¯ 3
q 4 = Q 3 + Q 6
q 5 = Q 4
q 6 = Q 5 + Q 7
q 7 = Q 8
q 8 = Q 9 + Q 10
The matrices formulation of Equations (36)–(43) is expressed in Equation (44) as:
q 1 q 2 q 3 q 4 q 5 q 6 q 7 q 8 = 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 1 Q 1 Q 2 Q 3 Q 4 Q 5 Q 6 Q 7 Q 8 Q 9 Q 10 + Q ¯ 1 0 Q ¯ 3 0 0 0 0 0 0 0
Equation (44) is generally expressed in Equation (45) as:
q k = C i n t Q k + Q ¯ k
where C i n t in Equation (45) is the transpose of the inflow incident matrices and expressed in Equation (46), Q k is the flow and Q ¯ k , is the flow from the external sources.
C i n = 1 , if flow in branch leaves node i 0 , otherwise
The integration of the concentration at node, δ and flow at node, q can be expressed in term of flow, Q. Thus, the concentration in branches (i.e., pipes) α , are formulated and expressed in Equations (47)–(54) as:
δ 1 q 1 = β 1 q 1 = β 1 Q ¯ 1
δ 2 q 2 = α 1 Q 1 + α 2 Q 2
δ 3 q 3 = β 3 Q ¯ 3
δ 4 q 4 = α 3 Q 3 + α 6 Q 6
δ 5 q 5 = α 4 Q 4
δ 6 q 6 = α 5 Q 5 + α 7 Q 7
δ 7 q 7 = α 8 Q 8
δ 8 q 8 = α 9 Q 9 + α 7 Q 7
Equations (47)–(54) are represented in matrices form in Equation (55)
δ 1 q 1 δ 2 q 2 δ 3 q 3 δ 4 q 4 δ 5 q 5 δ 6 q 6 δ 7 q 7 δ 8 q 8 = 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 1 1 α 1 Q 1 α 2 Q 2 α 3 Q 3 α 4 Q 4 α 5 Q 5 α 6 Q 6 α 7 Q 7 α 8 Q 8 α 9 Q 9 α 10 Q 10 + β 1 Q ¯ 1 0 β 3 Q ¯ 3 0 0 0 0 0 0 0
The general formulation of Equation (55) is expressed in Equation (56) as:
d i a g ( q ) δ = C i n t d i a g ( Q ) α + d i a g Q ¯ β
The concentration in branches α , is related to the concentration at node δ and is expressed in Equation (57) as:
α 1 α 2 α 3 α 4 α 5 α 6 α 7 α 8 α 9 α 10 = 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 1 0 δ 1 δ 2 δ 3 δ 4 δ 5 δ 6 δ 7 δ 8
Equation (57) is generally expressed in Equation (58) as:
[ α = C o u t δ ]
If Equation (58) is substituted into Equation (56), then, Equation (59) is expressed as:
d i a g ( q ) δ = C i n t d i a g ( Q ) C o u t δ + d i a g Q ¯ β
d i a g ( q ) C i n t d i a g ( Q ) C o u t δ = d i a g Q ¯ β
By resolving Equation (60), δ may be derived. Therefore, the distribution of contaminants across the pipes and at the nodes can be quantified.

4. Application of the Developed Model on WDNs

The validation of the developed contaminant distribution model was implemented on four water distribution networks, which were adapted from literature [47,50,51]. All computations and hydraulic analysis were performed in MATLAB software environment.

4.1. Model Programming Procedures

This procedure assumes that the hydraulic network analysis has been resolved. In this study, Newton–Raphson’s Content Model solution is employed [24]. The required input from the solved network analysis are; sending nodes, receiving nodes and the flow L / s . Thus, the program procedures are as follow:
  • Get the network analysis solution
  • Prepare the Structure
  • Get the pipe flows
  • Get supplies and demands
  • Get injections at the supply nodes
  • Get contamination at supply nodes
  • Compute the sum input flows to the nodes
  • Build matrices for equation as function of gamma, δ .
  • Compute contamination at the nodes
  • Get contamination in the pipes, α .

4.2. Illustrative Example 1

Figure 3 is a water distribution network adapted from the work of Ozger [50], to demonstrate the validity of the developed contaminant distribution model. The network has two (2) reservoirs with twenty-one (21) Pipes, and (13) thirteen Nodes. In this example, it is assumed that 3% and 2% of the flow are injected at reservoir 1 and 2 as contaminants, respectively. The available network characteristics are presented in Table 1.

4.3. Illustrative Example 2

This example consists of 71 pipes, 46 nodes and a reservoir. The details of the Illustrative Example 2 for the validation of the developed model was adapted from Kumar et al. [51]. The schematic of Illustrative Example 2 is shown in Figure 4.

4.4. Illustrative Example 3

In this example, one hundred and five (105) pipes network depicted in Figure 4, was considered. The network consists of 105 pipes, three fixed-head nodes (sources), and 64 nodes, after redundant nodes (these are nodes where two or more pipes meet with zero demand) were removed. The network characteristic data defining the network is available in the report of Adedeji [47].

4.5. Illustrative Example 4

This example examined the four hundred and forty two pipes as represented in Figure 5. The network contains 442 pipes, three reservoirs, and 295 nodes after the redundant (these are nodes where two or more pipes meet with zero demand) nodes have been removed. The data defining the network is available in the report by Adedeji [47].

5. Results and Discussions

This section presents the results and discussions of the four (4) sample networks examined for the validation of the performance of the developed model. Table 2 and Table 3 present the numerical results for illustrative Example 1.

5.1. Results and Discussions for Illustrative Example 1

The results of the pipe flow and the contaminant in the pipes are presented in Table 2. This Table shows that Pipe 7 has contaminant concentration of 0.029; it is as a result of the combination of the contaminants from Nodes 1 and 2 at Node 4. At Pipes 5, 6, 11, 12, and 21, the contaminants are from the same source, Node 2, while the other pipes have the same contaminant concentration (0.030); this implies that the contaminant is from Node 1. Based on these results, pipes with the same node as origin, have the same contaminant concentration, for example, Pipes, 5, 6, 11, 12, and 21. However, where different contaminant mix at a node, the contaminant concentration that will leave the node will be less than the maximum contaminant concentration that enters the node. A typical example of this scenario is at Pipe 7. On the other hand, when the quantity of contaminants from different pipes meeting at a node are the same, the contaminant concentration leaving the node will be the average of the contaminant concentration that entered into the node. Thus, this shows that the proposed model results are realistic.
The nodal flow and contaminant distribution at nodes for illustrative Example 1, is shown in Table 3. The results in this Table shows that Nodes 4 (0.029), 6 (0.024), and 8 (0.024) have different contaminant concentrations. These concentrations are different from the injected contaminant concentrations, which are 0.030 and 0.020 from Nodes 1 and 2, respectively. This difference in the contaminants’ concentration is due to different contaminants mixing at a node. On the other hand, when different sources with the contaminant concentrations mix at a node, the node’s contaminant concentration is the same as its source concentration.

5.2. Results and Discussions for Illustrative Example 2

Table 4 and Table 5 present the numerical results of contaminant contribution for the pipes and nodes for illustrative Example 2. The Illustrative Example 2, as shown in Figure 4, has only one source of supply, and 5% of the flow is assumed as contaminant. Since, there is no contaminant mix, it is reasonable for the 0.050 contaminants injected at the source to flow through the entire network, which also verified the feasibility of the proposed model. The results of the pipes and nodes flow rate are also presented. A sub-network with area nodes: 15, 18, 30 and 27 revealed that the quantity of contaminants decreases from node 15 towards node 18. Similar attribute was observed from node 15 towards node 27. Perhaps, if there is a need for water piping extension, it will be appropriate to tap from the extreme nodes, irrespective of the node position. This is because, nodes at the extreme nodes have lower quantity of contaminants. It was generally observed that the farther the node from the source of supply, the lower the quantity of contaminant at the nodes junction.

5.3. Results and Discussions for Illustrative Example 3

Table 6 and Table 7 present the numerical results of the contaminant contribution across the pipes and the nodes for illustrative Example 3. In this example, it was assumed that Nodes 1, 46, and 50 are sources of contamination with 0.04, 0.05 and 0.03 contaminants, respectively. This example has redundant nodes (these are nodes where two or more pipes meet with zero demand), which were excluded in the simulations. The node numerical results obtained (Table 7) revealed that most of the nodes have different contaminant values from injected contaminants at the three (3) sources (Nodes; 1, 46, and 50) of contamination. This is due to the fact that, different contaminants mix at different nodes of the networks. It was observed that the contaminant (0.04) at source (Node 1) flows through Node 1 to 6; 10–11; 14–16; 27 and 28, respectively. These nodes have direct connections to the source (Node 1) without mixing with the two sources of contaminant, as can be seen in the schematic diagram of the network in Figure 5. Similarly, the contaminant from source (Node 46) flows through Nodes; 46, 19, 21, and 22, respectively. These nodes are also directly connected to the source (Node 46) without any interconnected nodes from other sources of contamination. This same attribute was observed from source (Node 50) where Nodes; 41, 36, 34, 35, 33, 41, 53 and 55 have the same contaminant values that was injected at source (Node 50). On the other hand, contaminant at the remaining nodes differ from the injected values (ranges between the lowest to highest values. i.e., 0.030–0.050). Based on the results obtained, the values of contaminants from Nodes 7–13 range between the contaminant values from Nodes 1 and 46 (i.e., 0.040–0.050). The results showed that these nodes have contaminant mixtures from the stated nodes (i.e., Nodes 1 and 46). Similar attribute was observed at Nodes; 17, 18, 20, 23, and 24. The results of the remaining nodes indicated a mixture of contaminants from source Nodes 1 and 50. These can be seen from the numerical results for Nodes 47 to 67. Moreover, circumstances where three contaminants mix at the nodes are possible within the network. This further established the practicability of the proposed model as observed from the results.
The numerical results of pipe and contaminant flow for the Illustrative Example 3 is presented in Table 6. Similar to the node results, it was observed that pipes that are directly connected to the sources of contaminants have same flow as their sources. For instances, Pipes 1–4, 10–17, 23–29 are directly connected to source (Node 1). Similar scenarios are observed in Pipes; 36–42, which are connected to source (Node 46). Likewise, the Pipes connected to source (Node 50) are 52–55, 57–58, 72–77, 80, 82–85, and 105, respectively. The rest of the pipes are connected to the nodes where two or more contaminants mix as noted from the results obtained.

5.4. Results and Discussions for Illustrative Example 4

After the removal of redundant nodes (these are nodes where two or more pipes meet with zero demand), the illustrative Example 4 network consists, 442 pipes, three reservoirs, and 295 nodes as depicted in Figure 6. This network sample is bigger than Example 3 network, and they both have three sources of contaminations. In this case, nodes 1, 116, and 164 are assumed to be contamination sources with; 0.02, 0.01, and 0.03, respectively. The contaminant distributions across this network displayed the same attributes as the results of the Illustrative Example 3. The proposed method shows capability to handle medium networks within a short time. The results of Illustrative Example 4 is not presented due to its volume.
Table 8 shows the number of iterations taken in order to obtain the result for the various WDNs considered. As expected, the number of iterations increases as the size of the WDN increases.
Table 9 depicts the execution time for both hydraulic analysis and the proposed model for the various WDNs considered in this study. It was generally observed that the bigger the network, the higher the execution time.

6. Conclusions and Future Studies

Over the years, identification of contamination sources has received a significant attention among researchers and, has been a concern due to the negative effect that can emanate from the use of contaminated water. As part of an effort to fill this research gap, this study proposed a contaminant distribution model by superimposing the contaminant over the network analysis. To the best of the authors’ knowledge, there is no record of this approach in the literature. The viability of the proposed model was tested with four water networks, and the model’s performance was satisfactory. The results obtained described the practicability of the contaminant distribution across pipes and the nodes of the water networks. In addition, the results verified the practicability of the proposed model at a limited computational time. The source of contamination could be derived with this distribution model if, a set of measurement data is given. Thus, this will allow water supply companies to know the source of contamination upon which appropriate preventive measures such as; public awareness, closure of valves, etc. would be provided in order to minimise the extent of contamination on the society. In addition, comparison of this model with similar methodologies is important in order to ascertain its strength and weakness which, would be examined in future studies. Furthermore, procurement and maintenance cost of water quality monitoring sensor is also a challenge that must be addressed. Future research would focus on the issue of contamination source identification and optimal sensor placement in a water distribution network. The proposed model and its solution will be embedded within a method that allows the detection of the source of contamination. Although, this model was applied on a small and medium WDNs due to data availability, application of the proposed model on large networks would also be investigated in the future. These are topical areas of research interest that would be examined in subsequent studies. Finally, in order to increase the dynamics and robustness of the proposed model, it is expected that future research will explore the effects of external factors, such as temperature, on the contaminant distribution model.

Author Contributions

The work is part of the Doctorate degree of O.S.A. which was discussed with his supervisors. O.S.A. formulated the problem and drafted the manuscript. Y.H. assisted with quality improvement in the mathematical formulations and programming. The manuscript was scrutinized by Y.H. and R.S. while, B.K. also gave some suggestions.

Acknowledgments

This research work was supported by the French South African Institute of Technology (F’SATI), Tshwane University of Technology, Pretoria, South Africa.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Sdgreport. The Sustainable Development Goals 2015. 2015. Available online: www.undp.org/content/undp/en/home/sustainable-development-goals/goal-6-clean-water-and-sanitation.html (accessed on 18 May 2019).
  2. Clark, R.M.; Grayman, W.M.; Males, R.M. Contaminant propagation in distribution systems. J. Environ. Eng. 1988, 114, 929–943. [Google Scholar] [CrossRef]
  3. Clark, R.M.; Deininger, R.A. Protecting the nation’s critical infrastructure: The vulnerability of US water supply systems. J. Contingencies Crisis Manag. 2000, 8, 73–80. [Google Scholar] [CrossRef]
  4. Kirmeyer, G.J.; Martel, K. Pathogen Intrusion into the Distribution System; American Water Works Association: Denver, CO, USA, 2001. [Google Scholar]
  5. Adedoja, O.S.; Hamam, Y.; Khalaf, B.; Sadiku, R. Towards Development of an Optimization Model to Identify Contamination Source in a Water Distribution Network. Water 2018, 10, 579. [Google Scholar] [CrossRef]
  6. Mac Kenzie, W.R.; Hoxie, N.J.; Proctor, M.E.; Gradus, M.S.; Blair, K.A.; Peterson, D.E.; Kazmierczak, J.J.; Addiss, D.G.; Fox, K.R.; Rose, J.B.; et al. A massive outbreak in Milwaukee of Cryptosporidium infection transmitted through the public water supply. N. Engl. J. Med. 1994, 331, 161–167. [Google Scholar] [CrossRef] [PubMed]
  7. Corso, P.S.; Kramer, M.H.; Blair, K.A.; Addiss, D.G.; Davis, J.P.; Haddix, A.C. Costs of illness in the 1993 waterborne Cryptosporidium outbreak, Milwaukee, Wisconsin. Emerg. Infect. Dis. 2003, 9, 426. [Google Scholar] [CrossRef] [PubMed]
  8. Cooper, W.J. Responding to crisis: The West Virginia chemical spill. Environ. Sci. Technol. 2014, 48, 3095. [Google Scholar] [CrossRef] [PubMed]
  9. Berry, J.W.; Fleischer, L.; Hart, W.E.; Phillips, C.A.; Watson, J.P. Sensor placement in municipal water networks. J. Water Resour. Plan. Manag. 2005, 131, 237–243. [Google Scholar] [CrossRef]
  10. Berry, J.; Carr, R.D.; Hart, W.E.; Leung, V.J.; Phillips, C.A.; Watson, J.P. Designing contamination warning systems for municipal water networks using imperfect sensors. J. Water Resour. Plan. Manag. 2009, 135, 253–263. [Google Scholar] [CrossRef]
  11. Ostfeld, A.; Salomons, E. Optimal layout of early warning detection stations for water distribution systems security. J. Water Resour. Plan. Manag. 2004, 130, 377–385. [Google Scholar] [CrossRef]
  12. Ostfeld, A.; Salomons, E. Optimal early warning monitoring system layout for water networks security: Inclusion of sensors sensitivities and response delays. Civ. Eng. Environ. Syst. 2005, 22, 151–169. [Google Scholar] [CrossRef]
  13. Propato, M. Contamination warning in water networks: General mixed-integer linear models for sensor location design. J. Water Resour. Plan. Manag. 2006, 132, 225–233. [Google Scholar] [CrossRef]
  14. Kansal, M.; Dorji, T.; Chandniha, S.K. Design scheme for water quality monitoring in a distribution network. Int. J. Environ. Dev. 2012, 9, 69–81. [Google Scholar]
  15. Afshar, A.; Khombi, S.M. Multiobjective optimization of sensor placement in water distribution networks; dual use benefit approach. Int. J. Optim. Civil. Eng. 2015, 5, 315–331. [Google Scholar]
  16. Cozzolino, L.; Mucherino, C.; Pianese, D.; Pirozzi, F. Positioning, within water distribution networks, of monitoring stations aiming at an early detection of intentional contamination. Civ. Eng. Environ. Syst. 2006, 23, 161–174. [Google Scholar] [CrossRef]
  17. Ostfeld, A.; Uber, J.G.; Salomons, E.; Berry, J.W.; Hart, W.E.; Phillips, C.A.; Watson, J.P.; Dorini, G.; Jonkergouw, P.; Kapelan, Z.; et al. The battle of the water sensor networks (BWSN): A design challenge for engineers and algorithms. J. Water Resour. Plan. Manag. 2008, 134, 556–568. [Google Scholar] [CrossRef]
  18. Laird, C.D.; Biegler, L.T.; van Bloemen Waanders, B.G.; Bartlett, R.A. Contamination source determination for water networks. J. Water Resour. Plan. Manag. 2005, 131, 125–134. [Google Scholar] [CrossRef]
  19. Yan, X.; Gong, W.; Wu, Q. Contaminant source identification of water distribution networks using cultural algorithm. Concurr. Comput. Pract. Exp. 2017, 29, e4230. [Google Scholar] [CrossRef]
  20. Zechman, E.M.; Ranjithan, S.R. Evolutionary computation-based methods for characterizing contaminant sources in a water distribution system. J. Water Resour. Plan. Manag. 2009, 135, 334–343. [Google Scholar] [CrossRef]
  21. De Sanctis, A.; Boccelli, D.; Shang, F.; Uber, J. Probabilistic approach to characterize contamination sources with imperfect sensors. In Proceedings of the World Environmental and Water Resources Congress 2008, Ahupua’A, HI, USA, 13–16 May 2008; pp. 1–10. [Google Scholar]
  22. Liu, L.; Ranjithan, S.R.; Mahinthakumar, G. Contamination source identification in water distribution systems using an adaptive dynamic optimization procedure. J. Water Resour. Plan. Manag. 2010, 137, 183–192. [Google Scholar] [CrossRef]
  23. Liu, L.; Zechman, E.M.; Brill, E.D., Jr.; Mahinthakumar, G.; Ranjithan, S.; Uber, J. Adaptive contamination source identification in water distribution systems using an evolutionary algorithm-based dynamic optimization procedure. In Proceedings of the Eighth Annual Water Distribution Systems Analysis Symposium, Cincinnati, OH, USA, 27–30 August 2006; pp. 1–9. [Google Scholar]
  24. Adedeji, K.B.; Hamam, Y.; Abe, B.T.; Abu-Mahfouz, A.M. Leakage Detection and Estimation Algorithm for Loss Reduction in Water Piping Networks. Water 2017, 9, 773. [Google Scholar] [CrossRef]
  25. Hamam, Y.; Brameller, A. Hybrid method for the solution of piping networks. In Proceedings of the Institution of Electrical Engineers; IET: London, UK, 1971; Volume 118, pp. 1607–1612. [Google Scholar]
  26. Hamam, Y.; Hindi, K. Optimised on-line leakage minimisation in water piping networks using neural nets. In Proceedings of the IFIP Working Conference, Dagschul, Germany, 28 September–1 October 1992; Volume 28, pp. 57–64. [Google Scholar]
  27. Todini, E. A unifying view on the different looped pipe network analysis algorithms. In Computing and Control for the Water Industry; Research Studies Press Ltd.: Baldock, UK, 1999; pp. 63–80. [Google Scholar]
  28. De Sanctis, A.E.; Shang, F.; Uber, J.G. Real-time identification of possible contamination sources using network backtracking methods. J. Water Resour. Plan. Manag. 2009, 136, 444–453. [Google Scholar] [CrossRef]
  29. Wang, H.; Harrison, K.W. Improving efficiency of the Bayesian approach to water distribution contaminant source characterization with support vector regression. J. Water Resour. Plan. Manag. 2012, 140, 3–11. [Google Scholar] [CrossRef]
  30. Huang, J.J.; McBean, E.A.; James, W. Multi-objective optimization for monitoring sensor placement in water distribution systems. In Proceedings of the Eighth Annual Water Distribution Systems Analysis Symposium, Cincinnati, OH, USA, 27–30 August 2006; pp. 1–14. [Google Scholar]
  31. Van Bloemen Waanders, B.G.; Bartlett, R.A.; Biegler, L.T.; Laird, C.D. Nonlinear programming strategies for source detection of municipal water networks. In Proceedings of the World Water & Environmental Resources Congress 2003, Philadelphia, PA, USA, 23–26 June 2003; pp. 1–10. [Google Scholar]
  32. Laird, C.D.; Biegler, L.T.; van Bloemen Waanders, B.G. Real-time, large-scale optimization of water network systems using a subdomain approach. In Real-Time PDE-Constrained Optimization; SIAM: Philadelphia, PA, USA, 2007; pp. 289–306. [Google Scholar]
  33. Preis, A.; Ostfeld, A. A contamination source identification model for water distribution system security. Eng. Optim. 2007, 39, 941–947. [Google Scholar] [CrossRef]
  34. Rossman, L.A. EPANET 2: Users Manual; National Risk Management Research Laboratory, U.S. Environmental Protection Agency: Cincinnati, OH, USA, 2000.
  35. Preis, A.; Ostfeld, A. Multiobjective sensor design for water distribution systems security. In Proceedings of the Eighth Annual Water Distribution Systems Analysis Symposium, Cincinnati, OH, USA, 27–30 August 2006; pp. 1–17. [Google Scholar]
  36. Yan, X.; Zhao, J.; Hu, C.; Wu, Q. Contaminant source identification in water distribution network based on hybrid encoding. J. Comput. Methods Sci. Eng. 2016, 16, 379–390. [Google Scholar] [CrossRef]
  37. Dawsey, W.J.; Minsker, B.S.; VanBlaricum, V.L. Bayesian belief networks to integrate monitoring evidence of water distribution system contamination. J. Water Resour. Plan. Manag. 2006, 132, 234–241. [Google Scholar] [CrossRef]
  38. Tao, T.; Huang, H.D.; Xin, K.L.; Liu, S.M. Identification of contamination source in water distribution network based on consumer complaints. J. Cent. South Univ. Technol. 2012, 19, 1600–1609. [Google Scholar] [CrossRef]
  39. Neupauer, R.M.; Records, M.K.; Ashwood, W.H. Backward probabilistic modeling to identify contaminant sources in water distribution systems. J. Water Resour. Plan. Manag. 2009, 136, 587–591. [Google Scholar] [CrossRef]
  40. Wang, C.; Zhou, S. Contamination source identification based on sequential Bayesian approach for water distribution network with stochastic demands. IISE Trans. 2017, 49, 899–910. [Google Scholar] [CrossRef]
  41. Barandouzi, M.; Kerachian, R. Probabilistic Contaminant Source Identification in Water Distribution Infrastructure Systems. Civ. Eng. Infrastruct. J. 2016, 49, 311–326. [Google Scholar]
  42. Di Nardo, A.; Di Natale, M.; Guida, M.; Musmarra, D. Water network protection from intentional contamination by sectorization. Water Resour. Manag. 2013, 27, 1837–1850. [Google Scholar] [CrossRef]
  43. Kim, M.; Choi, C.Y.; Gerba, C.P. Source tracking of microbial intrusion in water systems using artificial neural networks. Water Res. 2008, 42, 1308–1314. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  44. Liu, L.; Zechman, E.M.; Mahinthakumar, G.; Ranji Ranjithan, S. Identifying contaminant sources for water distribution systems using a hybrid method. Civ. Eng. Environ. Syst. 2012, 29, 123–136. [Google Scholar] [CrossRef]
  45. Liu, L.; Zechman, E.M.; Mahinthakumar, G.; Ranjithan, S.R. Coupling of logistic regression analysis and local search methods for characterization of water distribution system contaminant source. Eng. Appl. Artif. Intell. 2012, 25, 309–316. [Google Scholar] [CrossRef]
  46. Brumbelow, K.; Torres, J.; Guikema, S.; Bristow, E.; Kanta, L. Virtual cities for water distribution and infrastructure system research. In Proceedings of the World Environmental and Water Resources Congress 2007: Restoring our Natural Habitat, Tampa, FL, USA, 15–19 May 2007; pp. 1–7. [Google Scholar]
  47. Adedeji, K. Development of a Leakage Detection and Localisation Technique for Real-Time Applications in Water Distribution Networks. Ph.D. Thesis, Tshawane University of Technology, Pretoria, South Africa, 2018. [Google Scholar]
  48. Basha, H.; Kassab, B. Analysis of water distribution systems using a perturbation method. Appl. Math. Model. 1996, 20, 290–297. [Google Scholar] [CrossRef]
  49. Shockling, M.; Allen, J.; Smits, A. Roughness effects in turbulent pipe flow. J. Fluid Mech. 2006, 564, 267–285. [Google Scholar] [CrossRef]
  50. Ozger, S.S.; Mays, L. A Semi-Pressure-Driven Approach to Reliability Assessment of Water Distribution Networks. Ph.D. Thesis, Arizona State University, Tempe, AZ, USA, 2003. [Google Scholar]
  51. Kumar, S.M.; Narasimhan, S.; Bhallamudi, S.M. State estimation in water distribution networks using graph-theoretic reduction strategy. J. Water Resour. Plan. Manag. 2008, 134, 395–403. [Google Scholar] [CrossRef]
Figure 1. Network element [24].
Figure 1. Network element [24].
Water 11 01510 g001
Figure 2. A sample network.
Figure 2. A sample network.
Water 11 01510 g002
Figure 3. Schematic for Illustrative Example 1 Ozger [50].
Figure 3. Schematic for Illustrative Example 1 Ozger [50].
Water 11 01510 g003
Figure 4. Schematic for Illustrative Example 2 Kumar et al. [51].
Figure 4. Schematic for Illustrative Example 2 Kumar et al. [51].
Water 11 01510 g004
Figure 5. Schematic for Illustrative Example 3 Adedeji [47].
Figure 5. Schematic for Illustrative Example 3 Adedeji [47].
Water 11 01510 g005
Figure 6. Schematic for Illustrative Example 3 Adedeji [47].
Figure 6. Schematic for Illustrative Example 3 Adedeji [47].
Water 11 01510 g006
Table 1. Pipe characteristics.
Table 1. Pipe characteristics.
Pipe IDLength (m)D (mm)C (H-W)Node IDElevation (m)Demand (CMH)
1609.60762130127.430.0
2243.80762128233.53212.4
31524.00609126328.96212.4
41127.76609124432.00640.8
51188.72406122530.48212.4
6640406120631.39684.0
7762.00254118729.56640.8
8944.88254116831.39327.6
91676.40381114932.610.0
10883.923051121034.140.0
11883.923051101135.05108.0
121371.603811081236.58108.0
13762.002541061333.530.0
14822.96254104RES60.96N/A
15944.88305102RES60.96N/A
16579.00305100
17487.6820398
18457.2015296
19502.9220394
20883.9220392
21944.8830590
Table 2. Numerical results for pipe and contaminant flow for illustrative Example 1.
Table 2. Numerical results for pipe and contaminant flow for illustrative Example 1.
Pipe IDPipes Flow Rate (L/s)Contaminant in Pipes (L/s)% of Contaminant in Pipes
1625.87418.7760.030
2625.87418.7760.030
3336.58510.0980.030
4219.7086.5910.030
518.4850.3690.020
6248.1264.9630.020
760.1931.7580.029
857.8771.7360.030
9151.4304.5420.030
1010.2870.3080.030
1184.5571.6910.020
1286.0821.7210.020
1334.9610.6990.020
1421.0210.6310.030
1578.8582.3650.030
1645.7851.3730.030
1733.0720.9920.030
183.07260.09210.030
1926.9270.8070.030
2018.8580.5650.030
2151.1201.0220.020
Table 3. Numerical results for illustrative Example 1 for the nodes.
Table 3. Numerical results for illustrative Example 1 for the nodes.
Node IDNode Flow Rate (L/s)Contaminant in Nodes (L/s)% of Contaminant at Nodes
1625.87418.7760.030
2625.87418.7760.030
3336.58510.0980.030
4238.1936.9550.029
5248.1254.9620.020
6190.0004.4650.024
7209.3076.2790.030
891.0002.2200.024
945.7851.3730.030
1078.8582.3650.030
1133.0720.9920.030
12300.9000.030
1386.0821.7210.020
14625.87418.7760.030
15248.1254.9620.0200
Table 4. Numerical results for pipe and contaminant flow for Illustrative Example 2.
Table 4. Numerical results for pipe and contaminant flow for Illustrative Example 2.
Pipe IDPipes Flow Rate (L/s)Contaminant in Pipes (L/s)Pipe IDPipes Flow Rate (L/s)Contaminant in Pipes (L/s)
188.8794.444370.2770.014
261.7333.086380.0340.017
358.0032.900396.5420.327
424.7311.236401.4930.075
522.9661.148410.1170.006
67.4900.374422.1670.108
76.5450.327430.4980.025
85.8800.294440.8310.042
94.8050.240453.8180.191
103.4150.171462.3350.117
112.5300.126471.4520.073
121.8650.093483.3760.169
130.7330.037491.7900.089
1422.7581.137500.6320.032
155.3620.268510.4820.241
162.2660.113522.0800.104
170.7760.0385314.9620.748
188.0140.401545.9240.296
192.4790.124555.7340.286
201.64450.0825625.8161.290
210.6850.034579.8500.493
221.83600.092583.6600.183
230.4790.024597.9670.398
240.0430.002607.3980.369
255.0290.252617.4900.374
261.3130.065626.5450.327
270.9420.471635.8800.294
280.4010.020644.8050.240
291.9130.095653.4150.171
300.8090.040662.5300.126
310.2640.013671.8650.093
322.8320.141681.7970.089
330.1370.007690.1170.006
340.5090.0257011.6060.580
350.3450.0177110.7780.538
361.0250.051
Table 5. Numerical results for node and contaminant flow for Illustrative Example 2.
Table 5. Numerical results for node and contaminant flow for Illustrative Example 2.
Node IDNode Flow Rate (L/s)Contaminant in Nodes (L/s)Node IDNodes Flow Rate (L/s)Contaminant in Nodes (L/s)
188.8794.444243.2270.161
288.8794.444251.7490.087
361.7323.086260.6650.033
458.0032.900272.9700.148
544.3032.215281.0240.051
641.1432.057290.7860.039
714.9800.749300.3780.018
813.0900.654316.5420.327
911.7600.588321.4930.074
109.6100.481332.4000.120
116.8300.342343.8180.191
125.0600.253351.3300.066
133.7300.186364.8280.241
142.5300.126372.3350.116
1522.7571.137385.7340.287
165.3620.268392.2720.113
172.2660.113400.6320.032
180.8200.0414114.9620.748
198.0140.401422.0800.104
204.3150.2154325.8161.290
212.1230.106445.9240.296
220.6850.034459.8500.492
235.0290.251463.6600.183
Table 6. Numerical results for pipe and contaminant flow for Illustrative Example 3.
Table 6. Numerical results for pipe and contaminant flow for Illustrative Example 3.
Pipe IDPipes Flow Rate (L/s)Contaminant in Pipes (L/s)% in PipesPipe IDPipes Flow Rate (L/s)Contaminant in Pipes (L/s)% in Pipes
1333.82613.3530.0400543.2020.0960.0300
2203.9068.1560.0400550.8720.0260.0300
380.2373.2090.04005613.0620.5220.0400
4123.6684.9460.0400572.9220.0870.0300
577.7943.0970.0398582.3290.0690.0300
674.9882.9850.0398597.7010.2750.0358
771.2292.8360.0398602.8050.1120.0398
827.4871.0940.0398618.2040.3260.0398
913.3570.5270.03956212.0850.4810.0399
1068.8232.7520.0400632.9140.1150.0397
1151.0962.0430.0400648.7160.3470.0397
1221.9110.8760.0400654.1980.1660.0396
1314.5570.5820.0400663.9700.1580.0398
1423.4660.9380.04006712.6860.5050.0398
157.8500.3140.04006826.0551.0370.0398
1621.7830.8710.04006912.5580.4370.0348
1737.5071.5000.0400703.7590.1490.0398
1811.7720.4730.04207110.5060.3870.0368
194.2060.1920.0458726.7170.2010.0300
203.1830.1450.0458738.2920.2480.0300
2116.4680.6580.0400740.0030.0010.0300
229.6510.3950.04097540.7051.2210.0300
230.3480.0140.04007655.7141.6710.0300
2410.3480.4140.04007742.0311.2610.0300
253.8370.1530.04007826.0661.0070.0387
261.16270.0460.04007910.0000.3520.0353
2710.0430.4010.04008016.9450.5080.0300
283.8810.1550.04008123.0120.8110.0353
2919.5900.7830.040082125.1013.7530.0300
304.3320.1810.04198310.4080.3120.0300
3110.0670.4040.04028440.7081.2210.0300
328.9090.3560.0458854.4810.1340.0300
331.0230.0460.04588623.6110.9010.0382
346.8340.2860.0419873.4670.1270.0369
358.1650.3730.04588812.5970.4970.0395
3615.5990.7800.0500897.3690.2910.0396
3776.0723.8030.0500900.3540.0140.0395
3860.4723.0230.0500917.7230.3050.0396
396.1700.3080.0500922.7240.1070.0396
4010.5700.5280.0500937.2760.2710.0373
415.5700.2780.0500948.5470.3190.0373
4243.7322.1860.0500953.0030.1180.0395
435.4070.2140.39709614.6250.5390.0369
4411.5770.5230.0452974.0800.1520.0373
4525.3901.0150.0400981.2710.0470.0373
4620.8570.8270.39709928.4540.8740.0307
4714.5000.5000.345010030.0000.9310.0310
4835.0901.6190.046110112.2610.3760.0307
4920.6600.9640.04671020.2730.0090.0337
505.6600.2640.046710336.6351.0990.0300
518.1420.3750.04611045.2730.1770.0337
5212.2630.3670.030010523.6440.7090.0300
536.1240.1830.0300
Table 7. Numerical results of node and contaminant flow for Illustrative Example 3.
Table 7. Numerical results of node and contaminant flow for Illustrative Example 3.
Node IDNodes Flow Rate (L/s)Contaminant in Nodes (L/s)% in NodesNode IDNodes Flow Rate (L/s)Contaminant in Nodes (L/s)% in Nodes
1333.82613.3530.0400353.2020.0960.0300
210.0430.4020.04003642.0131.2610.0300
35.0000.2000.04003726.0661.0080.0387
451.0962.0440.04003820.6600.9640.0467
536.4861.4580.04003943.0121.5160.0353
610.3480.4140.04004010.0000.3530.0353
710.0000.4090.040941125.1013.7530.0300
819.6510.8040.04094255.7141.6710.0300
94.2060.1930.04584322.5580.7850.0348
1019.9990.8080.04044415.0000.5970.0398
1123.4660.9390.04004574.0722.9850.0398
1227.3711.2530.04584676.0723.8040.0500
1341.8401.6820.04024712.9140.5130.0397
1468.8232.7530.04004812.6860.5050.0398
15333.82613.3530.04004916.5670.6550.0396
1629.6331.1850.040050125.1013.7530.0300
1731.1671.3060.04195171.2292.8360.0398
1815.0000.6600.04405238.6171.4750.0382
1976.0703.8040.05005340.7051.2210.0300
2011.5770.5230.0452548.5470.3190.0373
2160.4723.0240.05005551.1171.5340.0300
2210.5700.5290.05005628.0921.0360.0369
2340.6601.8970.04675730.9541.2220.0395
2458.2322.6870.04615813.3520.5270.0395
2544.5001.5360.0345597.7230.3050.0396
2626.2631.0420.0397607.7230.3050.0396
2780.2373.2090.04006110.0000.3790.0379
28203.9068.1560.04006217.6280.6580.0373
2912.0850.4820.03996340.7161.2510.0307
30125.9985.0160.03986435.2731.1880.0337
3177.7933.0970.0398655.2730.1770.0337
3210.5060.3870.03586630.0000.9310.0310
3322.7010.8110.03006730.0000.9310.0310
346.1240.1840.0300
Table 8. Comparison of Case Study and Iterative Period.
Table 8. Comparison of Case Study and Iterative Period.
Case StudyPipe SizeNode SizeNo of Iteration for Network Analysis (Max = 20)
Ozger 2003 [50]21154
Kumar 2008 [51]71465
Adedeji 2018 [47]105676
Adedeji 2018 [47]44229512
Table 9. Comparison of Computational time for Hydraulic Analysis and Proposed Model.
Table 9. Comparison of Computational time for Hydraulic Analysis and Proposed Model.
Case StudyPipe SizeNode SizeNetwork Analysis Ex. Time (ms)Proposed Model Ex. Time (ms)
Ozger 2003 [50]21153511
Kumar 2008 [51]71464116
Adedeji 2018 [47]105675625
Adedeji 2018 [47]4422959244

Share and Cite

MDPI and ACS Style

Adedoja, O.S.; Hamam, Y.; Khalaf, B.; Sadiku, R. Development of a Contaminant Distribution Model for Water Supply Systems. Water 2019, 11, 1510. https://doi.org/10.3390/w11071510

AMA Style

Adedoja OS, Hamam Y, Khalaf B, Sadiku R. Development of a Contaminant Distribution Model for Water Supply Systems. Water. 2019; 11(7):1510. https://doi.org/10.3390/w11071510

Chicago/Turabian Style

Adedoja, Oluwaseye S., Yskandar Hamam, Baset Khalaf, and Rotimi Sadiku. 2019. "Development of a Contaminant Distribution Model for Water Supply Systems" Water 11, no. 7: 1510. https://doi.org/10.3390/w11071510

APA Style

Adedoja, O. S., Hamam, Y., Khalaf, B., & Sadiku, R. (2019). Development of a Contaminant Distribution Model for Water Supply Systems. Water, 11(7), 1510. https://doi.org/10.3390/w11071510

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop