This powerpoint presentation begins by listing the causes of contaminant intrusion as:Water Main Breaks and Water Main Leaks;Backflow Control Valve Failures;Cross Connections; and,Terrorism. The study approach included: finding strategic locations for sensors; and,developing a practical algorithm toidentify contaminant intrusion. Major approaches adopted in previouswork are listed, along with a data mining approach, advantage of data mining method, procedure to establish a database, SODA (Screening Out Data-miningAlgorithm); and, approach developed in this study -Maximum Likelihood Method.
Product Details
Edition: Vol. - No. Published: 06/01/2007 Number of Pages: 32File Size: 1 file , 3.1 MB