An Adaptive Cyberinfrastructure for Threat Management in Urban Water Distribution Systems
Identifieur interne : 001093 ( Main/Exploration ); précédent : 001092; suivant : 001094An Adaptive Cyberinfrastructure for Threat Management in Urban Water Distribution Systems
Auteurs : Kumar Mahinthakumar [États-Unis] ; Gregor Von Laszewski [États-Unis] ; Ranji Ranjithan [États-Unis] ; Downey Brill [États-Unis] ; Jim Uber [États-Unis] ; Ken Harrison [États-Unis] ; Sarat Sreepathi [États-Unis] ; Emily Zechman [États-Unis]Source :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2006.
Descripteurs français
- Pascal (Inist)
- Calcul réparti, Collecticiel, Contaminant, Echantillonnage, Gestion ressource eau, Haute performance, Intégration numérique, Machine parallèle, Modélisation, Méthode adaptative, Méthode domaine temps, Méthode optimisation, Panache, Plan échantillonnage, Synthèse commande, Système adaptatif, Système dynamique, Système modulaire, Système réparti, Système temps réel, Temps réel, Temps réponse, Traitement parallèle, Workflow, Zone urbaine.
- Wicri :
- topic : Zone urbaine.
English descriptors
- KwdEn :
- Adaptive method, Adaptive system, Contaminant, Control synthesis, Distributed computing, Distributed system, Dynamical system, Groupware, High performance, Modeling, Modular system, Numerical integration, Optimization method, Parallel machines, Parallel processing, Plume, Real time, Real time system, Response time, Sampling, Sampling design, Time domain method, Urban area, Water resource management, Workflow.
Abstract
Abstract: Threat management in drinking water distribution systems involves real-time characterization of any contaminant source and plume, design of control strategies, and design of incremental data sampling schedules. This requires dynamic integration of time-varying measurements along with analytical modules that include simulation models, adaptive sampling procedures, and optimization methods. These modules are compute-intensive, requiring multi-level parallel processing via computer clusters. Since real-time responses are critical, the computational needs must also be adaptively matched with available resources. This requires a software system to facilitate this integration via a high-performance computing architecture such that the measurement system, the analytical modules and the computing resources can mutually adapt and steer each other. This paper describes the development of such an adaptive cyberinfrastructure system facilitated by a dynamic workflow design.
Url:
DOI: 10.1007/11758532_54
Affiliations:
Links toward previous steps (curation, corpus...)
- to stream Istex, to step Corpus: 000020
- to stream Istex, to step Curation: 000020
- to stream Istex, to step Checkpoint: 000742
- to stream Main, to step Merge: 001106
- to stream PascalFrancis, to step Corpus: 000228
- to stream PascalFrancis, to step Curation: 000023
- to stream PascalFrancis, to step Checkpoint: 000226
- to stream Main, to step Merge: 001119
- to stream Main, to step Curation: 001093
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">An Adaptive Cyberinfrastructure for Threat Management in Urban Water Distribution Systems</title>
<author><name sortKey="Mahinthakumar, Kumar" sort="Mahinthakumar, Kumar" uniqKey="Mahinthakumar K" first="Kumar" last="Mahinthakumar">Kumar Mahinthakumar</name>
</author>
<author><name sortKey="Von Laszewski, Gregor" sort="Von Laszewski, Gregor" uniqKey="Von Laszewski G" first="Gregor" last="Von Laszewski">Gregor Von Laszewski</name>
</author>
<author><name sortKey="Ranjithan, Ranji" sort="Ranjithan, Ranji" uniqKey="Ranjithan R" first="Ranji" last="Ranjithan">Ranji Ranjithan</name>
</author>
<author><name sortKey="Brill, Downey" sort="Brill, Downey" uniqKey="Brill D" first="Downey" last="Brill">Downey Brill</name>
</author>
<author><name sortKey="Uber, Jim" sort="Uber, Jim" uniqKey="Uber J" first="Jim" last="Uber">Jim Uber</name>
</author>
<author><name sortKey="Harrison, Ken" sort="Harrison, Ken" uniqKey="Harrison K" first="Ken" last="Harrison">Ken Harrison</name>
</author>
<author><name sortKey="Sreepathi, Sarat" sort="Sreepathi, Sarat" uniqKey="Sreepathi S" first="Sarat" last="Sreepathi">Sarat Sreepathi</name>
</author>
<author><name sortKey="Zechman, Emily" sort="Zechman, Emily" uniqKey="Zechman E" first="Emily" last="Zechman">Emily Zechman</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:40E34C45C4FF4959C5E89313B0AB63FFB5D18665</idno>
<date when="2006" year="2006">2006</date>
<idno type="doi">10.1007/11758532_54</idno>
<idno type="url">https://api.istex.fr/document/40E34C45C4FF4959C5E89313B0AB63FFB5D18665/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">000020</idno>
<idno type="wicri:Area/Istex/Curation">000020</idno>
<idno type="wicri:Area/Istex/Checkpoint">000742</idno>
<idno type="wicri:doubleKey">0302-9743:2006:Mahinthakumar K:an:adaptive:cyberinfrastructure</idno>
<idno type="wicri:Area/Main/Merge">001106</idno>
<idno type="wicri:source">INIST</idno>
<idno type="RBID">Pascal:08-0051206</idno>
<idno type="wicri:Area/PascalFrancis/Corpus">000228</idno>
<idno type="wicri:Area/PascalFrancis/Curation">000023</idno>
<idno type="wicri:Area/PascalFrancis/Checkpoint">000226</idno>
<idno type="wicri:doubleKey">0302-9743:2006:Mahinthakumar K:an:adaptive:cyberinfrastructure</idno>
<idno type="wicri:Area/Main/Merge">001119</idno>
<idno type="wicri:Area/Main/Curation">001093</idno>
<idno type="wicri:Area/Main/Exploration">001093</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">An Adaptive Cyberinfrastructure for Threat Management in Urban Water Distribution Systems</title>
<author><name sortKey="Mahinthakumar, Kumar" sort="Mahinthakumar, Kumar" uniqKey="Mahinthakumar K" first="Kumar" last="Mahinthakumar">Kumar Mahinthakumar</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>North Carolina State University, Raleigh, NC</wicri:regionArea>
<placeName><region type="state">Caroline du Nord</region>
</placeName>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author><name sortKey="Von Laszewski, Gregor" sort="Von Laszewski, Gregor" uniqKey="Von Laszewski G" first="Gregor" last="Von Laszewski">Gregor Von Laszewski</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>University of Chicago, Chicago, IL</wicri:regionArea>
<placeName><region type="state">Illinois</region>
</placeName>
</affiliation>
<affiliation><wicri:noCountry code="no comma">E-mail: gregor@mcs.anl.gov</wicri:noCountry>
</affiliation>
</author>
<author><name sortKey="Ranjithan, Ranji" sort="Ranjithan, Ranji" uniqKey="Ranjithan R" first="Ranji" last="Ranjithan">Ranji Ranjithan</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>North Carolina State University, Raleigh, NC</wicri:regionArea>
<placeName><region type="state">Caroline du Nord</region>
</placeName>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author><name sortKey="Brill, Downey" sort="Brill, Downey" uniqKey="Brill D" first="Downey" last="Brill">Downey Brill</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>North Carolina State University, Raleigh, NC</wicri:regionArea>
<placeName><region type="state">Caroline du Nord</region>
</placeName>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author><name sortKey="Uber, Jim" sort="Uber, Jim" uniqKey="Uber J" first="Jim" last="Uber">Jim Uber</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>University of Cincinnati, Cincinnati, OH</wicri:regionArea>
<placeName><region type="state">Ohio</region>
</placeName>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author><name sortKey="Harrison, Ken" sort="Harrison, Ken" uniqKey="Harrison K" first="Ken" last="Harrison">Ken Harrison</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>University of South Carolina, Columbia, SC</wicri:regionArea>
<placeName><region type="state">Caroline du Sud</region>
</placeName>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author><name sortKey="Sreepathi, Sarat" sort="Sreepathi, Sarat" uniqKey="Sreepathi S" first="Sarat" last="Sreepathi">Sarat Sreepathi</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>North Carolina State University, Raleigh, NC</wicri:regionArea>
<placeName><region type="state">Caroline du Nord</region>
</placeName>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
<author><name sortKey="Zechman, Emily" sort="Zechman, Emily" uniqKey="Zechman E" first="Emily" last="Zechman">Emily Zechman</name>
<affiliation wicri:level="2"><country xml:lang="fr">États-Unis</country>
<wicri:regionArea>North Carolina State University, Raleigh, NC</wicri:regionArea>
<placeName><region type="state">Caroline du Nord</region>
</placeName>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">États-Unis</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2006</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">40E34C45C4FF4959C5E89313B0AB63FFB5D18665</idno>
<idno type="DOI">10.1007/11758532_54</idno>
<idno type="ChapterID">54</idno>
<idno type="ChapterID">Chap54</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass><keywords scheme="KwdEn" xml:lang="en"><term>Adaptive method</term>
<term>Adaptive system</term>
<term>Contaminant</term>
<term>Control synthesis</term>
<term>Distributed computing</term>
<term>Distributed system</term>
<term>Dynamical system</term>
<term>Groupware</term>
<term>High performance</term>
<term>Modeling</term>
<term>Modular system</term>
<term>Numerical integration</term>
<term>Optimization method</term>
<term>Parallel machines</term>
<term>Parallel processing</term>
<term>Plume</term>
<term>Real time</term>
<term>Real time system</term>
<term>Response time</term>
<term>Sampling</term>
<term>Sampling design</term>
<term>Time domain method</term>
<term>Urban area</term>
<term>Water resource management</term>
<term>Workflow</term>
</keywords>
<keywords scheme="Pascal" xml:lang="fr"><term>Calcul réparti</term>
<term>Collecticiel</term>
<term>Contaminant</term>
<term>Echantillonnage</term>
<term>Gestion ressource eau</term>
<term>Haute performance</term>
<term>Intégration numérique</term>
<term>Machine parallèle</term>
<term>Modélisation</term>
<term>Méthode adaptative</term>
<term>Méthode domaine temps</term>
<term>Méthode optimisation</term>
<term>Panache</term>
<term>Plan échantillonnage</term>
<term>Synthèse commande</term>
<term>Système adaptatif</term>
<term>Système dynamique</term>
<term>Système modulaire</term>
<term>Système réparti</term>
<term>Système temps réel</term>
<term>Temps réel</term>
<term>Temps réponse</term>
<term>Traitement parallèle</term>
<term>Workflow</term>
<term>Zone urbaine</term>
</keywords>
<keywords scheme="Wicri" type="topic" xml:lang="fr"><term>Zone urbaine</term>
</keywords>
</textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: Threat management in drinking water distribution systems involves real-time characterization of any contaminant source and plume, design of control strategies, and design of incremental data sampling schedules. This requires dynamic integration of time-varying measurements along with analytical modules that include simulation models, adaptive sampling procedures, and optimization methods. These modules are compute-intensive, requiring multi-level parallel processing via computer clusters. Since real-time responses are critical, the computational needs must also be adaptively matched with available resources. This requires a software system to facilitate this integration via a high-performance computing architecture such that the measurement system, the analytical modules and the computing resources can mutually adapt and steer each other. This paper describes the development of such an adaptive cyberinfrastructure system facilitated by a dynamic workflow design.</div>
</front>
</TEI>
<affiliations><list><country><li>États-Unis</li>
</country>
<region><li>Caroline du Nord</li>
<li>Caroline du Sud</li>
<li>Illinois</li>
<li>Ohio</li>
</region>
</list>
<tree><country name="États-Unis"><region name="Caroline du Nord"><name sortKey="Mahinthakumar, Kumar" sort="Mahinthakumar, Kumar" uniqKey="Mahinthakumar K" first="Kumar" last="Mahinthakumar">Kumar Mahinthakumar</name>
</region>
<name sortKey="Brill, Downey" sort="Brill, Downey" uniqKey="Brill D" first="Downey" last="Brill">Downey Brill</name>
<name sortKey="Brill, Downey" sort="Brill, Downey" uniqKey="Brill D" first="Downey" last="Brill">Downey Brill</name>
<name sortKey="Harrison, Ken" sort="Harrison, Ken" uniqKey="Harrison K" first="Ken" last="Harrison">Ken Harrison</name>
<name sortKey="Harrison, Ken" sort="Harrison, Ken" uniqKey="Harrison K" first="Ken" last="Harrison">Ken Harrison</name>
<name sortKey="Mahinthakumar, Kumar" sort="Mahinthakumar, Kumar" uniqKey="Mahinthakumar K" first="Kumar" last="Mahinthakumar">Kumar Mahinthakumar</name>
<name sortKey="Ranjithan, Ranji" sort="Ranjithan, Ranji" uniqKey="Ranjithan R" first="Ranji" last="Ranjithan">Ranji Ranjithan</name>
<name sortKey="Ranjithan, Ranji" sort="Ranjithan, Ranji" uniqKey="Ranjithan R" first="Ranji" last="Ranjithan">Ranji Ranjithan</name>
<name sortKey="Sreepathi, Sarat" sort="Sreepathi, Sarat" uniqKey="Sreepathi S" first="Sarat" last="Sreepathi">Sarat Sreepathi</name>
<name sortKey="Sreepathi, Sarat" sort="Sreepathi, Sarat" uniqKey="Sreepathi S" first="Sarat" last="Sreepathi">Sarat Sreepathi</name>
<name sortKey="Uber, Jim" sort="Uber, Jim" uniqKey="Uber J" first="Jim" last="Uber">Jim Uber</name>
<name sortKey="Uber, Jim" sort="Uber, Jim" uniqKey="Uber J" first="Jim" last="Uber">Jim Uber</name>
<name sortKey="Von Laszewski, Gregor" sort="Von Laszewski, Gregor" uniqKey="Von Laszewski G" first="Gregor" last="Von Laszewski">Gregor Von Laszewski</name>
<name sortKey="Zechman, Emily" sort="Zechman, Emily" uniqKey="Zechman E" first="Emily" last="Zechman">Emily Zechman</name>
<name sortKey="Zechman, Emily" sort="Zechman, Emily" uniqKey="Zechman E" first="Emily" last="Zechman">Emily Zechman</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Ticri/CIDE/explor/CyberinfraV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001093 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 001093 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Ticri/CIDE |area= CyberinfraV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:40E34C45C4FF4959C5E89313B0AB63FFB5D18665 |texte= An Adaptive Cyberinfrastructure for Threat Management in Urban Water Distribution Systems }}
This area was generated with Dilib version V0.6.25. |