This powerpoint presentation begins by listing the causes of contaminant intrusion as:
Water Main Breaks and Water Main Leaks;
Backflow Control Valve Failures;
Cross Connections; and,
Terrorism. The study approach included:
finding strategic locations for sensors; and,
developing a practical algorithm to
identify contaminant intrusion. Major approaches adopted in previous
work are listed, along with a data mining approach, advantage of data mining method, procedure to establish a database, SODA (Screening Out Data-mining
Algorithm); and, approach developed in this study -
Maximum Likelihood Method.
| Edition : | Vol. - No. |
| File Size : | 1
file
, 3.1 MB |
| Note : | This product is unavailable in Ukraine, Russia, Belarus |
| Number of Pages : | 32 |
| Published : | 06/01/2007 |