University
stringclasses
19 values
Text
stringlengths
458
20.7k
ADE
Quasi-static and dynamic fracture toughness tests 2 ∆𝑎 𝐾 𝐾′√(∆𝑎−𝑥) 𝐺 = lim ∫ 𝐼 𝐼 𝑑𝑥 (4.17) 𝐼 ∆𝑎→0(1+𝑣)𝜇∆𝑎 √2𝜋𝑥 √2𝜋 0 ∆𝑎 can be very small, such that ∆𝐾′ can be made small enough in comparison to 𝐾 , and as a 𝐼 result of which ∆𝐾′ can be neglected. 𝐾2 ∆𝑎√∆𝑎−𝑥 𝐺 = lim 𝐼 ∫ 𝑑𝑥 (4.18) 𝐼 ∆𝑎→0(1+𝑣)𝜇∆𝑎 𝑥 0 In order to solve the integral, putting 𝑥 = ∆𝑎𝑠𝑖𝑛2𝛼. When 𝑥 = 0 and 𝛼 = 0 and when 𝑥 = 𝜋 ∆𝑎,𝛼 = 𝑎𝑛𝑑 𝑑𝑥 = ∆𝑎 2𝑠𝑖𝑛𝛼 𝑐𝑜𝑠𝛼 𝑑𝛼 2 𝐾2 𝜋/2 (∆𝑎−∆𝑎𝑠𝑖𝑛2𝑎) 𝐺 = lim 𝐼 ∫ √ ∆𝑎2sin𝑎𝑐𝑜𝑠𝑎𝑑𝑎 𝐼 ∆𝑎→0(1+𝑣)𝜋𝜇∆𝑎 ∆𝑎𝑠𝑖𝑛2𝑎 0 𝐾2∆𝑎 𝜋/2 𝐺 = 𝐼 ∫ 2𝑐𝑜𝑠2𝑎𝑑𝑎 𝐼 (1+𝑣)𝜋𝜇∆𝑎 0 (4.19) 𝐾2 𝜋/2 𝐺 = 𝐼 ∫ 2𝑐𝑜𝑠2𝑎𝑑𝑎 𝐼 (1+𝑣)𝜋𝜇 0 𝐾2 𝜋 𝐼 𝐺 = 𝐼 (1+𝑣)𝜋𝜇 2 𝐾22(1+𝑣) 𝜋 𝐼 (4.20) 𝐺 = 𝐼 (1+𝑣)𝜋𝐸 2 𝐾2 𝐼 (4.21) 𝐺 = 𝐼 𝐸 4.3.3 - Quasi-static mode I fracture toughness test results The load-displacement curves of granite which represent the rock characteristics were directly obtained from SCB fracture toughness tests. Figure 4.10 shows the typical load-displacement curves of Australian granite with different loading rates at various temperatures obtained in this study. After the elastic stage, the rock suddenly broke in a typical brittle failure. Each load- displacement curve exhibits a slowly increasing portion until a peak followed by a dramatically falling post-failure portion indicating a brittle fracture. The turning point at the peak force in Figure 4.10 denotes the stable-unstable fracture transition of the specimen. Figure 4.11 illustrates typical failed specimens for each temperature group and fracture surface of a 91
ADE
Quasi-static and dynamic fracture toughness tests Table 4.4 summarises the failure loads and the corresponding fracture toughness values for all sets of the specimens at different temperatures and loading rates. More detailed results of the fracture toughness are depicted in Figure 4.12a. The relation between the mode I quasi-static fracture toughness, loading rate and temperature for CCNSCB specimens treated at various temperatures and under different loading rates is depicted in Figure 4.12b. It can be seen from Figure 4.12 that the quasi-static mode I fracture toughness and energy-release rate (given by Equation 4.21) at the same heat-treatment temperature increased linearly with the loading rate. As in the case with increasing loading rate, the load required to fail the specimen increased which resulted in a rising trend of the fracture toughness of the rock as they are dependent on each other. The cracks which were mostly formed by intergranular fractures under low loading rates caused rougher fracture surfaces, when compared to that of the samples failed under high loading rates. However, transgranular fractures became dominant which consumed more energy than intergranular fractures and resulted in more straight fracture path and less rough fracture surface at high loading rates as supported by Zhang and Zhao (2013). Due to the increased number of activated micro-cracks at high loading rates and that absorbed more energy when compared to a single macro crack, resulting in an increase in the fracture energy as parallel to the findings by Dai and Xia (2013). Table 4.4 Summary of the failure loads and the fracture toughness results and their average with standard deviations Temperature Loading rate 𝑷 Average of 𝑲 Average of 𝑲 𝒎𝒂𝒙 𝑰𝑪 𝑰𝑪 (°C) (mm/min) (kN) 𝑷 (kN) (MPa·m0.5) (MPa·m0.5) 𝒎𝒂𝒙 0.02 1.28 1.70 0.05 1.95 2.59 RT (25) 1.93±0.49 2.56±0.65 0.08 1.98 2.63 0.1 2.49 3.30 0.02 1.94 2.57 0.05 2.04 2.69 100 2.14±0.18 2.84±0.24 0.08 2.25 2.99 0.1 2.32 3.08 0.02 1.50 1.99 175 0.05 1.65 1.88±0.34 2.19 2.49±0.45 0.08 2.10 2.79 95
ADE
Quasi-static and dynamic fracture toughness tests 0.1 2.20 2.92 0.02 1.67 2.20 0.05 1.84 2.45 250 1.88±0.16 2.49±0.21 0.08 2.01 2.66 0.1 2.01 2.65 (a) (b) Figure 4.12 (a) Pure mode-I fracture toughness variation with temperature (b) relationship of mode-I fracture toughness with loading rate under different temperatures In addition, the quasi-static mode I fracture toughness and energy-release rate of pre-heated Australian granite are dependent on temperature as depicted in Figure 4.12. Under the same loading rate, 𝐾 and 𝐺 of granite presented a decreasing trend by a total of approximately 𝐼𝐶 𝐼 17% and 30%, respectively with ascending temperature from ambient temperature (25 °C) to 250 °C. The fundamental reason for the decrease of fracture toughness is micro-cracks induced by thermal damage resulting in degradation of the tensile stress resistance which indicates that the rock’s ability to resist fracture deteriorated with increasing temperature. These results were interpreted with the support of microscopic observations of the micro-cracks within the specimens along with the help of SEM analysis (see Figure 3.13 in Chapter 3.3.5). This is also in accordance with the findings of Yin et al. (2012), Mahanta et al. (2016) and Feng et al. (2017). Therefore, it is shown that both the loading rate and temperature have significant influence on the quasi-static mode I fracture toughness and energy-release rate of granite in this study. These findings of this investigation will be useful for better understanding of the strain burst mechanism such as application of a combination of favourable measures for thermal damage and loading rate during deep excavations over 1000 m. 96
ADE
Quasi-static and dynamic fracture toughness tests 4.4 - Dynamic characteristics of strain burst in brittle rocks exposed to thermal effect Rock fracture in explosion, excavation and strain burst tends to occur at high loading rates of about 104-106 MPa·m1/2/s (Zhang and Zhao 2014), which is close to the loading rates in SHPB tests. Hence, the SHPB apparatus is suitable for investigating the dynamic responses in rock during strain burst. To explore the topic of coupled influence of thermal damage and loading rate on the dynamic fracture properties and behaviour of Australian granite during strain burst, a series of dynamic fracture toughness tests was conducted on thermally-treated CCNSCB specimens over a wide range of loading rates by the SHPB setup. The dynamic mechanical behaviour of granite after high-temperature treatment under different loading rates was examined and discussed. The dynamic stress intensity factor (SIF) of the CCNSCB specimen was obtained by the extended quasi-static calculation under the dynamic force equilibrium condition. The dynamic initiation fracture toughness (DIFT) (𝐾𝑖 ) and the rate dependency of 𝐼𝑑 the phenomenon were determined and also compared for the specimens exposed to different temperatures. The fracturing processes were recorded by a high-speed (HS) camera, and the crack propagation speeds were estimated by HS image analysis. In addition, the dynamic fracture process and the coupled influence of temperature and loading rate on the dynamic fracture modes were identified by HS image analysis. 4.4.1 - Split Hopkinson Pressure Bar (SHPB) system Dynamic fracture tests were performed by means of a 50 mm-diameter SHPB system at Monash University as shown in Figure 4.13. The testing system comprises of a gas gun generating the impact speed of the bullet up to 15 m/s, a cylindrical striker bar (500 mm in length), an incident bar (2500 mm in length), a transmission bar (2000 mm in length) and an absorbed bar (damper) (1000 in length), and were made from 50 mm diameter high strength 45CrMo steel, with a nominal yield strength of 1.1 GPa. The main parameters of the SHPB setup used in this research are shown in Table 4.5. A steel platen with two pins was introduced to achieve a three-point bending load to the specimen (see Figure 4.13). 97
ADE
Quasi-static and dynamic fracture toughness tests Table 4.5 The main parameters of the SHPB system ( Subscript b stands for bar) Incident Diameter Transmission Absorbing P-wave Elastic Density bar of bars bar length bar length velocity modulus 𝝆 length 𝒃 (mm) (mm) (mm) 𝒄 (m/s) 𝑬 (GPa) (kg/m3) (mm) 𝒃 𝒃 50 2500 2000 1000 5170 210 7800 During the tests, the stress-wave pulses were captured by two sets of strain gauges located diametrically opponent attached on the incident and transmission bars. An eight-channel digital oscilloscope was used to record and store the strain gauge signals collected from the Wheatstone bridge circuits after amplification (by means of a differential amplifier), together with the signal from the strain gauge mounted on the CCNSCB specimen. The CCNSCB specimen was sandwiched between the incident and transmission bars, with three point- contacts to transfer dynamic loads: one between the incident bar and the top of the specimen, the other two contacts formed by two supporting pins between the transmission bar and the specimen, as depicted in Figure 4.13. To capture the fracture characteristics of Australian granite under dynamic loading, a high-speed camera (CMOS camera, Phantom V2511) at the frame rate of 200,000 fps with a resolution of 256 × 256 pixels in conjunction with the SHPB system, located on the front side of the specimen, was utilised in this research (see Figure 4.13). The focus of the ultra-high speed camera was manually adjusted under focused mode to capture images with optimal quality. 98
ADE
Quasi-static and dynamic fracture toughness tests a part of the incident stress wave is reflected back into the incident bar as the reflected wave 𝜀 𝑟 upon reaching the bar-specimen interface, and the remaining portion of the wave passes through the specimen to the transmission bar and becomes the transmitted wave 𝜀 . Strain 𝑡 gauges mounted on the incident and transmission bar surfaces capture the time of passage and magnitude of these elastic stress-wave pulses through the incident and transmission bars during the test. Figure 4.14. The x-t diagram of stress waves propagation in SHPB (Xia et al. 2011) Denoting the incident wave, the reflected wave and the transmitted wave by 𝜀 , 𝜀 and 𝜀 , 𝑖 𝑟 𝑡 respectively, and based on one-dimensional elastic wave theory with the SHPB experimental data the dynamic forces on the incident end (𝑃 ) and the transmitted end (𝑃 ) of the specimen 1 2 can be calculated as (Kolsky 1953) (see Figure 4.9b): 𝑃 = 𝐴 𝐸 (𝜀 +𝜀 ) (4.22) 1 𝑏 𝑏 𝑖 𝑟 𝑃 = 𝐴 𝐸 𝜀 (4.23) 2 𝑏 𝑏 𝑡 where 𝐴 and 𝐸 the cross-sectional area and Young’s modulus of the bars, respectively. 𝑏 𝑏 The histories of strain rate 𝜀̇(𝑡), strain 𝜀(𝑡) and stress 𝜎(𝑡) of the specimen in the dynamic tests can be determined as: 100
ADE
Quasi-static and dynamic fracture toughness tests 𝐶 𝜀̇(𝑡) = (𝜀 −𝜀 −𝜀 ) (4.24) 𝐿 𝑖 𝑟 𝑡 0 𝐶 𝑡 𝜀(𝑡) = ∫ (𝜀 −𝜀 −𝜀 )𝑑𝑡 (4.25) 𝐿 𝑖 𝑟 𝑡 0 0 𝐴 𝑏 𝜎(𝑡) = 𝐸 (𝜀 −𝜀 −𝜀 ) (4.26) 2𝐴 𝑏 𝑖 𝑟 𝑡 0 where 𝐴 , and 𝐿 are the initial cross-sectional area and the initial length of the specimen, 0 0 respectively. C is the one dimensional longitudinal elastic stress wave velocity of the bar. Therefore, based on the Equations 4.24-4.26, the dynamic stress-strain curve of the specimen can be determined. 4.3.2.2 - Pulse shaping technique The induced stress wave is an approximately trapezoidal shape accompanied by high-frequency oscillation and a steep rise of the incident wave when the striker bar directly impacted on the incident bar. Without a proper pulse shaping, it is difficult to achieve dynamic stress equilibrium which leads to premature failure of rock and unbalanced forces at the front and rear interface of the rock sample (Zhou et al. 2012). In order to eliminate this problem, the pulse shaping technique was adopted to facilitate the dynamic force balance of the CCNSCB specimen which is a requirement for all the equations deduced in the SHPB test in this study. 4.4.2 - Dynamic fracture tests The damage evolution of Australian granite was investigated by conducting dynamic tests over a wide range of loading rates to reveal the rate dependency of strain burst. Dynamic fracture toughness tests were performed on thermally-treated granite specimens up to 250 °C under different impact velocity ranging from 2 to 8 m/s using a SHPB device at Monash University. 4.4.3 - Evaluation of the experimental results CCNSCB granite specimens were successfully tested for dynamic fracture toughness mechanical behaviour in the SPHB experiments. For all the SHPB tests, the dynamic force balance of the granite specimen is inspected,and the results meet the criterion recommended by the ISRM (Zhou et al. 2012). The influence of temperature and rate dependence of the dynamic fracture toughness of Australian granite are analysed and discussed. The dynamic 101
ADE
Quasi-static and dynamic fracture toughness tests fracturing process and failure patterns of CCNSCB samples in different temperature and loading rate conditions are observed using a high-speed camera. 4.3.2.1 - Dynamic force balance Dynamic force equilibrium is the prerequisite of any effective dynamic fracture tests. It must be ensured that the time-varying dynamic forces on both loading sides of the specimen are roughly balanced prior to failure and the sample must be in a state of stress equilibrium through the time to fracture and thus the quasi-static equation could be employed to determine the dynamic fracture toughness. According to the suggested method by ISRM, the dynamic force equilibrium was achieved for each sample by means of the pulse shaping technique in this research (Zhou et al. 2012). Taking a typical test as an example, the captured incident, reflected and transmitted strain waveforms of a typical CCNSCB sample are displayed in Figure 4.15a. The time-zero of the incident and reflected waves was shifted to the incident bar/specimen interface, and the time-zero of the transmitted wave was shifted to the transmitted bar/specimen interface. As shown in Figure 4.15b, the curve of the sum of the incident and reflected stresses almost overlapped (𝑃 = 𝑃 ) with that of the transmitted stress, indicating that the external 1 2 forces on both sides of the sample was nearly identical. The dynamic forces 𝑃 and 𝑃 were 1 2 calculated and checked by equations 4.22 and 4.23, and the dynamic loading history on both ends of a specimen is shown in Figure 4.15b. It can be observed that the uniformity of the dynamic stress across the specimen was well achieved in the impact direction, and thus the inertial effect was reduced to a negligible level. Although there exists inevitably dynamic friction at the interfaces between the rock sample and the bars, the achieved dynamic stress equilibrium also demonstrated that 1D stress wave propagation theory could be employed to calculate the stress-strain history of rock specimen in dynamic tests. 102
ADE
Quasi-static and dynamic fracture toughness tests (a) (b) Figure 4.15 (a) Typical signals recorded by strain gauges of a dynamic test with thermally- treated (100 °C) CCNSCB specimen at 𝑣 of 5 m/s and (b) dynamic force equilibrium. 𝑠𝑡𝑟𝑖𝑘𝑒𝑟 In., Re., Tr. denote the incident, reflected and transmitted waves, respectively 4.3.2.2 - Dynamic data interpretation Figure 4.16a presents a typical dynamic stress-strain curve of a granite specimen in dynamic CCNSCB test. The stress and strain were calculated from the incident and transmission bar signals using Equations 4.25 and 4.26. These signals provide not only the deformation information of the specimen, but also contain energy release during rock fracturing. The evolution of stress and strain on the rock specimen during impact are shown in Figure 4.16b. It should be noted that the stress of the peak point can be used to calibrate dynamic constitutive models. Figure 4.16c depicts a typical dynamic SIF-time history curve of CCNSCB specimen which can be used for determining the loading rate in the dynamic experiment. 103
ADE
Quasi-static and dynamic fracture toughness tests Using the signals of the incident, reflected and transmitted waves recorded by the strain gauges, the stress-strain curves of granite were obtained under the coupling effects of temperature (25, 100, 175 and 250 °C) and impact velocity, 𝑣 , (2, 3, 5, 7 and 8 m/s), as presented in Figure 𝑠𝑡𝑟𝑖𝑘𝑒𝑟 4.17. It can be seen that the curves underwent into three stages: elastic deformation, yielding and failure. In the elastic deformation stage, the rate of increase in the stress decreased more slowly compared with that in the initial loading. Meanwhile, the micro-cracks within the rock began to increase in size under the action of the dynamic loading, resulting in a decrease in the curve slope. In the yielding stage, the rate of increase in the stress was lower than that in the elastic stage, mainly due to the rapid expansion of the micro-cracks within the specimen unde the stress wave. When the curve reached the peak strength, the maximum load-bearing capacity was reached, which would led to macroscopic damage. In the failure stage, due to the formation of macroscopic fracture surfaces the failure of rock occurred which resulted in the decrease in the load-bearing capacity of the specimen. The stress decreased, while the strain continued to increase in this stage. With an increase in the impact velocity, the loading rate strengthening influence became more remarkable and the stress of the granite increased under all temperatures. At a high impact velocity, the loading was fast and plastic strain component may not get enough time to develop fully until the next incremental load was applied. Consequently it appeared that the material had stiffened due to the incomplete development of the plastic strain which then led to the increase of the dynamic strength of granite. 105
ADE
Quasi-static and dynamic fracture toughness tests Figure 4.17. Dynamic stress-strain curves of granite under different temperatures and impact loadings Figure 4.18 presents the relationship between the dynamic strength and the loading rate under various temperatures. It can be seen that the loading rate has a significant effect on the dynamic strength of granite under each temperature level, however the degree of the influence varies. At a given loading rate or impact velocity, the value of dynamic strength for the same level of deformation tended to decrease as the pre-heating temperature rose over the range from room temperature (25 °C) to 250 °C due to degradation influence of thermal damage on the overall rock strength in which high temperature aggravated the cumulative damage of the rock. Similar results were observed by Yin et al. (2012) and Wang et al. (2018) who studied the mechanical properties of granite by conducting dynamic tests using the SHPB technique. Taking 𝑣 = 𝑠𝑡𝑟𝑖𝑘𝑒𝑟 5 𝑚/𝑠 as an example, the dynamic strength of granite showed a decline by 33% when the 106
ADE
Quasi-static and dynamic fracture toughness tests et al. 2012), the loading rate (𝐾̇ ) of CCNSCB specimen was calculated by the evolution of the 𝐼 dynamic SIF obtained from the dynamic CCNSCB test. Figure 4.16c shows a typical dynamic SIF-time history curve of CCNSCB specimen. There exists an approximately linear-increasing regime in the SIF history, indicating the dynamic SIF in the CCNSCB specimen increased steadily during this stage. The slope of this region is defined as the loading rate in which the unit of the loading rate is GPa·m1/2 s-1 based on the suggested method by ISRM (Zhou et al. 2012). In this study, the loading rates of all specimens in dynamic CCNSCB tests were determined using this method. Typical dynamic SIF-time curves including the loading rate in the CCNSCB specimens at room temperature (25 °C) are depicted in Figure 4.19. Figure 4.19. Typical SIF-time curves for determining loading rate in dynamic CCNSCB tests at room temperature (25 °C) 4.3.2.4 - Thermal damage influence and rate dependence of dynamic initiation fracture toughness (𝑲𝒊 ) 𝑰𝒅 The dynamic initiation fracture toughness (DIFT) (𝐾𝑖 ) which is the ability of the material to 𝐼𝑑 fracture was determined by using the maximum value of SIF in this research. The fracture properties were deduced using a quasi-static theory as the dynamic stress balance was substantially achieved during the dynamic test using pulse shaping technique, eliminating the inertial effects (Chen et al. 2009; Zhou et al. 2012). The DIFT of CCNSCB specimen was 108
ADE
Quasi-static and dynamic fracture toughness tests calculated by using Equations 4.2 and 4.3, provided that the dynamic force balance was satisfied at both ends of specimens. Figure 4.20 shows the variation of DIFT with the loading rate and temperature. It can be concluded from Figure 4.20 that the DIFT of granite is obviously both loading rate and temperature dependent. The DIFT are close to each other at lower loading rates (less than 400 GPa·m1/2 s-1), whereas, showed a certain degree of dispersion at higher loading rates. For the CCNSCB specimen under the same loading rate, the DIFT values of granite showed a decline compared with those at 25 °C. The obtained DIFT values of thermally- treated granite under various impact velocities from dynamic CCNSCB tests are listed in Table 4.6. For instance, the DIFT under the impact velocity of 5 m/s, decreased by 29% as the temperature increased from 25 °C to 250 °C. This phenomenon was mainly caused by the increase of the thermal damage induced by the micro-cracks which eventually led to the continuous decrease of fracture toughness. This viewpoint was further verified with the SEM analysis conducted to observe the microstructure of the granite after treatment at various temperatures in Chapter 3. Figure 4.20. The DIFT versus loading rate for granite specimens treated at various temperatures In order to systematically investigate the coupling effects of loading rate and thermal damage on the DIFT of granite, the linear regression method was utilised and the linear fitting of each group was obtained. Figure 4.21 presents the rate dependency of DIFT for four groups of thermally-treated granite. It was found that the DIFT of granite showed an increasing trend 109
ADE
Quasi-static and dynamic fracture toughness tests 4.3.2.5 - Dynamic fracturing process and failure patterns of CCNSCB specimens To study the progressive dynamic failure of thermally treated granite, a high-speed (HS) camera with 200,000 fps was utilised to capture the dynamic fracturing process in dynamic tests. The representative examples of typical dynamic mode I failure processes of CCNSCB granite specimens induced by different temperature conditions at impact velocity of 8 m/s are depicted in Figure 4.22, demonstrating the initiation and propagation of the cracks. The time zero corresponds to a specific time when the incident pulse has just arrived at the incident bar/specimen interface. The first one or two snapshots exhibit the typical CCSCNB specimen prior to macro fracture onset. It can be seen that the cracks initiated from the tip of notch and propagated along the impact loading, and then the tensile failure along the dynamic loading direction dominated the failure. For instance, after around 154 μs, a small macroscopic crack ahead of the notch tip became visible, indicating that crack initiation occurred, and then the crack propagated along the pre-notched direction. Subsequently, the primary crack run throughout the specimen at about 189 μs, and the CCNSCB specimen was split into two almost identical halves and each fragment showed a rotation motion around the contact points between the incident bar and the sample (see Figure 4.22, the last snapshot). 0 μs 154 μs 165 μs LD crack 173 μs 189 μs 218 μs (a) T = 25 °C 112
ADE
Quasi-static and dynamic fracture toughness tests 0 μs 59 μs 66 μs LD crack 72 μs 78 μs 132 μs (d) T = 250 °C Figure 4.22. HS camera images showing dynamic fracturing process of thermally treated granite (a) 25 °C (RT) and (b) 250 °C at an impact velocity of 8 m/s in dynamic CCNSCB tests (LD-loading direction) The failure mechanism of rocks can be revealed by assessing the failure mode. The failure patterns of Australian granite exposed to various temperatures at five different impact velocities can be seen in Figure 4.23. Along with the increased impact velocity, the failure modes of the pre-heated granite changed from tensile splitting (characterisation of class I) to pulverisation in which the samples were pulverised by excess energy in class II loading, indicating that the stress concentration at both ends became more serious, and thus the crashed area was greater. The fundamental reason for this failure mode was that the elastic modulus of the bar was quite different from that of the specimen, resulting in that the pressure of contact surface was concentrated and thus the specimens were broken into many smaller fragments or pulverised in which more cracks were activated and expanded. It can be seen in Figure 4.23 that the increased level of thermal damage within the specimen resulted in a wider damage zone which was due to the thermally-induced micro-cracks with the treatment temperature. This can be attributed to the weakening of the minerals’ bonding 113
ADE
Quasi-static and dynamic fracture toughness tests 25 °C 100 °C 175 °C 250 °C (e) Impact velocity (𝑣 ) = 8 m/s 𝑠𝑡𝑟𝑖𝑘𝑒𝑟 Figure 4.23. Failure modes of recovered specimens under different impact velocities and temperatures 4.5 -Summary and discussion In this chapter, the effects of the thermal damage and loading rate on both quasi-static and dynamic mechanical, fracture characteristics and quasi-static (𝐾 ) and dynamic initiation (𝐾𝑖 ) 𝐼𝐶 𝐼𝑑 mode I fracture toughness and energy-release rate of thermally treated Australian granite specimens at various pre-heating treatments up to 250 °C under different loading rates were explored. The CCNSCB specimens were adopted in the quasi-static and dynamic mode I fracture toughness measurements of the rocks. A servo-hydraulic testing machine and a dynamic testing apparatus SHPB were utilised to conduct the quasi-static and dynamic fracture toughness tests. The fracturing characteristics during strain burst under various temperature conditions and loading rates were assessed and discussed in detail. The following key conclusions can be drawn: 1. The CCNSCB specimen combines the merits of two ISRM-suggested methods (CCNBD and NSCB methods), and thus it allows accurate determination of the mode I fracture toughness of granite under quasi-static and dynamic loadings. 2. The experimental results indicated that the quasi-static fracture toughness and energy- release rate in mode I are a function of loading rate and they presented a rising trend with 116
ADE
Quasi-static and dynamic fracture toughness tests increasing loading rate. At high loading rates, transgranular fractures became dominant which consumed more energy than intergranular fractures; this in turn, resulted in more straight fracture path and posed a less rough fracture surface when compared to the low loading rate condition (Zhang and Zhao 2013). 3. Under the same loading rate, the quasi-static mode I fracture toughness and energy-release rate of granite showed a gradual decrease (17% and 30%, respectively) with ascending temperature from 25 °C to 250 °C due to the thermally-induced micro-cracks within the rocks. These findings of this investigation will be useful in achieving a better understanding of initiation of fracturing during strain burst under various temperature and loading rate conditions. 4. The stress-strain curves of granite under various impact velocities and temperatures showed the same deformation stages; elastic deformation, yielding and failure. When the impact velocity was high, the loading rate strengthening effect became more remarkable and the strength of granite increased under all temperatures. The failure modes of Australian granite also exhibited rate dependence at the same temperature level. Along with the high impact velocity, the failure mode of the pre-heated granite changed from tensile splitting (characterisation of Class I) to pulverisation or breaking into many small pieces in which the specimens were pulverised by the excess energy in Class II loading. Under the same dynamic impact, an increase in the treatment temperature weakened the interaction force between the particles and aggravated the fragmentation degree of granite. 5. The DIFT of Australian granite was obtained by the quasi-static analysis that was evidenced by the dynamic force balance until the time to fracture. The DIFT of the granite presented an ascending trend with the loading rate at a given heat-treatment temperature and decreased with increasing temperature, revealing the deterioration of the ability to resist fracturing with the rise of temperature. Therefore, in order to effectively and safely excavate the rock in deep underground conditions, a favourable measure should be applied to reduce the intensity of strain burst by considering a combined application of thermal treatment and impact with a proper loading rate. 117
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions Chapter 5: Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions Strain burst is a common problem encountered in brittle rocks in deep, high-stress mining applications. Limited research focuses on the effects of temperature on the strain burst mechanism and the kinetic energies of rocks. This study aims to investigate the effects of thermal damage on the strain burst characteristics of brittle rocks under true-triaxial loading conditions using the acoustic emission (AE) and kinetic energy (KE) analyses. The Time- domain and frequency-domain analyses related to strain burst were studied, and the damage evolution was quantified by b-values, cumulative AE energy and events rates. The ejection velocities of the rock fragments from the free face of the granite specimens were used to calculate kinetic energies. The experimental results showed that thermal damage resulted in a delay in bursting but increased the bursting rate at ~95% of normalised stress level. This is believed to be due to the microcracks induced by temperature exposure and thus the accumulated AE energy (also supported by cumulative AE counts) at the initial loading stage was reduced, causing a delay in bursting. The strain burst stress, initial rock fragment ejection velocity, and kinetic energy decreased from room temperature (25 °C) to 100 °C, whereas they resulted in a gradual rise from 100 °C to 150 °C demonstrating more intense strain burst behaviour. Keywords Strain burst · Rock burst · True-triaxial loading · Thermal damage · Temperature · Acoustic emission · b-value · Kinetic Energy Rock burst is a typical unstable rock failure associated with the violent ejections of rock fragments from the free face/sidewall/roof of an underground excavation. A serious threat, rock bursts can kill workers and cause severe injuries and damage. They can also cause mining and tunnelling operations to cease either temporarily or permanently. Rock bursts are classified into three types: Strain burst, fault-slip burst, and pillar burst (Hedley 1992). Strain burst is the most prevalent type of rock burst. It occurs due to the sudden release of stored strain energy within the rock mass when the induced major principal stress (σ ) exceeds the rock mass strength 1 (σ ). This type of detrimental failure process has been observed in deep, hard rock mines and cm 119
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions tunnels in different locations all around the world, and is considered to be the biggest unsolved problem in deep underground excavations (He et al. 2016). Underground rock mass is in a state of stress equilibrium prior to any excavation (σ >σ >σ ). Introducing an excavation in rock 1 2 3 masses results in the redistribution of stresses around underground openings (see Figure 5.1) and accumulation of elastic strain energy in the surrounding rock mass. Figure 5.1 Stress state change on the sidewall of an underground opening, and a representative elementary volume before and after excavation (“modified from Su et al. 2017a”) Additionally, rock mass surrounding underground excavations is vulnerable to the effects of high ground temperatures, especially at increasing depths. The physical and mechanical behaviours of the rock mass are influenced by the thermal effects which threaten both the safety of the working environment and the efficiency of engineering projects (Chen et al. 2012; Liu and Xu 2013). For instance, a number of intense strain bursts occurred during the excavation of tunnels in the Jinping II Hydropower Station, which caused casualties and fatal injuries, damaged equipment and ceased operations at the increasing depth due to the high geo-stress and high temperature (Zhang et al. 2012; Li et al. 2012; Feng et al. 2015). Understanding thermally induced rock damage is, therefore, of utmost importance for the safety and long-term stability of underground excavations. For this purpose, a realistic experimental testing system needs to be used for the assessment of thermal damage on the behaviour of strain burst. Many researchers have investigated the influence of temperature on the mechanical and physical behaviour of rocks under uniaxial compression (Heuze 1983; Dwivedi et al. 2008; Sun et al. 2015), and under triaxial compression (Masri et al. 2014; Ding et al. 2016; Yao et al. 2016; Mohamadi and Wan 2016). Ding et al. (2016), studied damage evolution in sandstone 120
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions after exposure to high-temperature treatment in unloading conditions, and found that both peak ductile deformation and peak effective stress changed after a critical temperature level. Kong et al. (2016) investigated the AE characteristics and physical-mechanical properties of sandstone after high-temperature exposure under uniaxial compression conditions and found that AE parameters can be used for evaluating the thermal stability of rocks and for analysing crack development. These existing works clearly show considerable thermal effects on the mechanical behaviour of rocks, and the need to consider damage due to thermal effects in investigating strain burst in deep mining. In this sense, a true-triaxial condition that better reflect stress states in deep mining, along with the effects of thermal damage on strain burst behaviour of rocks should be considered. However, to the best of our knowledge, all these features are either missing or not addressed at length in previous works. A considerable amount of research in the laboratory has been conducted to mimic the failure process of strain burst. These experimental efforts have mainly conducted under uniaxial compression (Nemat-Nasser and Horii 1982; Wang and Park 2001), conventional triaxial compression (Huang et al. 2001; Hua and You 2001;), and true-triaxial compression (Mogi 1971; Atkinson and Ko 1973; Michelis 1985; Takahaski and Koide 1989; Wawersik et al. 1997; Haimson and Chang 2000; Nasseri et al. 2014; Feng et al. 2016). However, none of the aforementioned testing methods were able to realistically simulate the exact boundary conditions and stress paths for rocks during an excavation in which strain burst occurs. Hence, to characterise strain burst process in the laboratory, a novel true-triaxial strain burst testing system was developed by He et al. (2010) at the State Key Laboratory for Geomechanics and Deep Underground Engineering in Beijing, China. This hydraulic testing facility enables researchers to simulate the creation of an excavation by abruptly unloading σ from one of the 3 rectangular prism’s surfaces that is exposed to air. Using this testing system, a considerable number of tests have been conducted on various types of rocks exposed to different stress paths to provide a better understanding of the behaviour of strain burst under true-triaxial loading/unloading conditions (He et al. 2010, 2012, Gong et al. 2015; Li et al. 2015). Few studies in the available literature have addressed the kinetic energy characteristics of strain burst failure. The influence of the unloading rate on strain burst behaviours of brittle rock under true-triaxial unloading conditions was studied by Zhao et al. (2014) concluding that the rock tends to strain burst more often when the unloading rate is high and the failure mode changes from strain burst to non-violent spalling as the unloading rate decreases. After creating a comprehensive database on the true-triaxial unloading tests, Akdag et al. (2017) discussed the 121
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions influence of specimen dimensions on the bursting behaviour of rocks and indicated that the failure mode changes from strain bursting to local spalling when the height to width ratio of the rock sample is reduced from 2.5 to 1. For this reason and my focus on rock burst in the present study, all specimens with height to width ratio of 2.5 were used. Su et al. (2017) investigated the influence of tunnel axis stress on strain burst by using modified true-triaxial rock burst system. The experimental results indicated that intensive strain burst is more likely to occur when the tunnel axis stress is high. Table 1 summarises the true-triaxial loading and unloading tests to assess the failure characteristics of different rocks. However, the aforementioned studies did not consider the temperature influence on strain burst behaviours. Therefore, it is essential to investigate how strain burst mechanism is affected by high- temperature conditions. This chapter investigates the influence of temperature on strain burst. A true-triaxial loading- unloading experimental set up was used to replicate strain-burst condition. In the following sections, the basic properties of the rock samples are described first. The strain burst testing methods and the experimental procedure are then introduced. This is followed by the analysis of the influence of temperature on strain burst stress and dynamic failure processes of strain burst. Subsequently, time-domain, frequency-domain and b-value analyses were conducted to systematically investigate the evolution of AE due to thermal damage influence on strain burst. Finally, the kinetic energies of the ejected rock fragments due to thermal damage are discussed. 122
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions 1 Table 5.1 Summary of true-triaxial loading and unloading tests to characterise the failure type of rocks Loading Specimen size Loading method Rock type Failure mode Reference type (mm x mm x mm) 15 x 15 x 30 Dolomite Mogi (1971) 50 x 50 x 100 Marble Michelis (1985) (1) apply σ , σ , σ 50 x 50 x 100 Sedimentary rocks Takahashi & Koide (1989) 1 2 3 Loading (2) keep σ and σ 57 x 57 x 125 Sandstone Fracturing & ductility Wawersik et al. (1997) 2 3 (3) increase σ 1 19 x 19 x 38 Granite Haimson & Chang (2000) 80 x 80 x 80 Sandstone Nasseri et al. (2014) 50 x 50 x 100 Granite Feng et al. (2016) Limestone, granite, 30 x 60 x 150 Rock burst He et al. (2010, 2012) sandstone, marble 20 x 40 x 100 Marble Spalling Coli et al. (2010) 30 x 60 x 150 Marble Rock burst and slabbing Gong et al. (2012) (1) apply σ , σ , σ 1 2 3 (2) keep σ 30 x 60 x 150 Granite Rock burst Zhao et al. (2014) Unloading 2 (3) Unload σ 30 x 60 x 150 Granite Rock burst 3 (4) Increase σ 1 30 x 60 x 120 Granite Slabbing Zhao and Cai (2014) 30 x 60 x 90 Granite Shearing Granite, sandstone, Splitting, Slabbing, 100 x 100 x 100 Li et al. (2015) cement mortar Spalling 100 x 100 x 200 Granite Rock burst Su et al. (2017) 25 x 50 x 125 Granite Strain burst Akdag et al. (2018) 2 123
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions 5.1 -Experimental methodology 5.1.1 - Rock properties The rock samples used in this study were collected from a borehole located in South Australia at a depth of 1020 – 1345 m. The collected rock was coarse-grained granite with weak to moderate alteration and occasional weak gneissic foliation. The grain size of this brittle granite rock ranges from 0.5 mm to 3 mm and is composed of potassium feldspar, quartz and chlorite. Therefore, the diameter of the specimens was more than 10 times bigger than the rock grain size required to satisfy ISRM recommendations (Fairhurst and Hudson 1999). Uniaxial compression tests were performed on both cylindrical granite specimens that had a diameter of 42 mm, were sub-cored from 63 mm diameter drill cores, and were 100 mm long (Fairhurst and Hudson 1999). The tests were also performed on rectangular prism samples (125 mm × 50 mm × 25 mm). The granite specimens were loaded axially with an axial displacement rate of 0.1 mm/min and LVDTs and strain gauges were attached to measure both axial and lateral strains. Rocks were also equipped with AE sensor to capture the cracking and damage behaviour during the tests (see Figure 5.2). The test results and basic mechanical properties of the granite samples are listed in Table 5.2. Figure 5.2 Instrumentation of granite specimens for UCS tests 124
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions Table 5.2 Mechanical properties of rectangular prism granite specimens for UCS (𝜎 ) tests 𝑐2 Dimensions Young's Specimen Density UCS,𝝈 Poisson's 𝒄𝟐 Height modulus, Number Width (mm) Thickness (mm) (g/cm3) (MPa) ratio, ν (mm) E (GPa) B1 #5 124.87 50.10 25.02 2.89 175.8 55.3 0.19 B1 #8 124.99 50.23 25.14 2.82 184.4 27.9 0.11 B3 #3 125.04 49.97 25.00 2.87 137.1 28.5 0.10 5.2 - Experimental procedure for strain burst tests 5.2.1 - Sample preparation and strain burst testing system A total of sixteen rectangular prism granite samples were prepared from the drill cores of 63 mm diameter for the strain burst tests (see Figure 5.3a). Each sample size was approximately 125 mm × 50 mm × 25 mm. All six surfaces of the samples were carefully polished to minimise the end effect during loading. The samples’ average flatness was 0.009 mm. Nine flatness measurements were taken from the surfaces of each specimen using digital dial gauge. Sample hardness was measured with the Leeb rebound method, using an Equotip 3 hardness tester (see Figure 5.3b-c). The Leeb number (L value) is used to express the hardness of the material, which can be used as an indicator of rock strength (Aoki and Matsukara, 2008). The average Leeb hardness of the granite specimens used for this study was 746 and the average density was 2871 kg/m3. The average P-wave velocity of the specimens before thermal damage was approximately 5764 m/s. All the granite specimens were divided into six groups (i.e. groups I, II, III, IV, V and VI) based on temperature. Specimens were then kept at room temperature of 25 °C (i.e. group I) or heated up to the following temperature levels of 50, 75, 100, 125, and 150 °C (i.e. groups II, III, IV, V and VI respectively). Figure 5.3 (a) Overview of granite specimens, (b) flatness measurement by digital dial gauge, (c) hardness measurement via Equotip hardness tester 125
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions The strain bursts tests were performed using the deep underground true-triaxial strain burst testing system developed by He et al. (2010) at the University of Mining and Technology in Beijing, China. The strain burst test facility consists of a hydraulic controlling unit, a data acquisition system for stress and deformation, and also equipped with an AE monitoring system, a high-speed digital video camera system to monitor the instantaneous strain bursting process and linear variable differential transducers (LVDT) to measure the displacements during testing (see Figure 5.4). To mimic and characterise the stress distribution near an excavation boundary in the laboratory, this testing system enables loading a rectangular rock specimen independently in three principal stress directions (σ , σ , σ ) progressively to the pre- 1 2 3 determined in-situ stress level, and suddenly removing σ by dropping a rigid loading plate, 3 while maintaining σ constant and then increasing σ until strain burst occurs (see Figure 5.4d- 2 1 e). The hydraulic loading unit has a maximum force capacity of 450 kN which is used to apply vertical and horizontal loads on the six surfaces of a rectangular rock specimen. The data acquisition system is capable of recording 100,000 data points per second (see Figure 5.4a). The high-speed digital camera records at 1,000 fps with a resolution of 1024 × 1024 pixels, which enables the capture of sudden cracking as well as the violent ejection of rock fragments (see Figure 5.4e). The AE technique is a useful, non-destructive testing method used to investigate the onset and evolution of micro-cracking. It is also used to analyse the damage mechanism of rocks (Karakus et al. 2016). In the present study, two AE sensors with a diameter of 18 mm to investigate the AE characteristics of granite samples were used. The AE transducers (type WD, from the American Physical Acoustics Corp.) were attached to the lateral side of the rock specimens by means of spring clips and adhesive tape to minimise friction between the specimen and the loading plate and to prevent sensor failure due to rock ejection (see Figure 5.4f). A petroleum jelly was smeared on the sensors and the steel plates to ensure good acoustic coupling. The resonance frequency of the AE transducers was 125 kHz, associated with an operating frequency range from 100 kHz to 1 MHz. A PCI-2 AE system was used to monitor the damage within the granite specimens during strain burst tests and the output voltage of the AE was amplified to 40 dB gain. The amplitude threshold for AE detection was set to 35 dB with an AE sampling rate of 10 msps (million samples per second) for each test. 126
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions Cai (2008) stated that it is significant to be able to capture the correct rock mass behaviour during excavations, because the actual stress path in a rock mass is complex and has an important role in the failure or damage process. Hence, accurate excavation responses depend on the unloading paths. The in-situ stress test results were used as a guideline for determining the stress loading conditions used to simulate strain burst in the laboratory. Figure 5.5 plots the designed stress path and the applied loading-unloading directions on a rock specimen during strain burst testing. All surfaces of the rectangular prism granite specimen were loaded independently, in three principal stress directions. The loads were progressively applied until all six surfaces reached the minimum principal stress. Subsequently, while the loads on two surfaces, where 𝜎 was acting, were kept constant, the loads on the other four surfaces were 3 increased simultaneously until they reached the intermediate principal stress level. Finally, while keeping the loads on the other lateral four surfaces constant, the load at the top surface was increased to the pre-determined maximum principal stress level in two steps. Therefore, the in-situ stress level of σ /σ /σ = 43/23/11 MPa was reached and the loads were retained for 1 2 3 about 5 minutes to make sure the stress was distributed uniformly. In order to mimic the stress redistribution and concentration after an excavation, σ was removed quickly with an unloading 3 rate of around 17 MPa/s while σ was kept constant. Then to generate a strain burst σ was 2 1 increased at a constant rate of 0.25 MPa/s until strain burst occurred. Meanwhile, when unloading of σ began, recording of the high-speed digital video camera was started to capture 3 the strain burst process. 129
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions Figure 5.5 Designed loading-unloading stress path and illustration of stress conditions on rock specimen for strain burst tests 5.3 -Evaluation of the experimental results 5.3.1 - Influence of thermal damage on strain burst stress The principal stresses applied to the granite samples just before unloading, and at failure, under various temperature conditions are summarised in Table 5.3. The table shows the ratios of major principal stress σ , the sum of major and intermediate principal stresses, and the 1 deviatoric stress to the UCS (σ ,σ ) of both cylindrical and rectangular prism granite c1 c2 specimens. Note that σ is the average value of UCS of cylindrical granite specimens (42 mm c1 × 100 mm), which is equal to 155 MPa and σ corresponds to the average UCS value of c2 rectangular prism specimens (25 mm × 50 mm × 125 mm), which is 180 MPa. The major principal stress σ at failure varies in the range of 0.65–1.87 times σ , and 0.56–1.61 times 1 c1 σ . It is also shown that the ratio of deviatoric stress of σ and σ to σ and σ is between c2 1 2 c1 c2 0.49–1.70 and 0.42–1.46 respectively. The ratios indicated in Table 5.3 can be used as indicators of strain burst occurrence by comparing them to the rock burst criteria based on strength theory. Figure 5.6 presents the actual stress paths and cumulative AE energy, which was calculated after AE analysis, of the granite specimens from each group under different temperature conditions. As the testing system was not servo-controlled, you will see in Table 3 some discrepancies can be conserved between the recorded principal stresses and the 130
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions 5.3.2 - Observations on the influence of thermal damage on strain burst behaviour In order to capture the failure processes of the granite samples induced by the different temperature conditions, a high-speed camera was used. Using a frame rate of 1000 f/s (frames per second), the dynamic failure characteristics of the tested samples, including the crack growth and fragment ejection were observed. A series of images for the samples were captured to investigate the influence of temperature on the rock failure process. These are presented in Figure 5.9. The numbers at the bottom-left corner of the snapshots indicate time in h:m:s:ms. It should be noted that regardless of the temperature, strain bursts occurred in all specimens. A common strain burst development process for all of the specimens was as follows: Splitting of rock into rock plates, bending of the rock plates, ejection of rock fragments, and rock plates at high speeds accompanied by a loud explosion sound after the rock plates break off. It can be observed from Figure 5.9 that the intensity of the strain burst differs moderately in different temperature conditions. For granite specimen tested at the temperature of 25 °C, (see Figure 5.9a), where the specimen did not experience any thermal damage, the upper part of the free face split into rock plates, and small fragments were ejected at high speed. After the upper rock plate broke off, a large number of fragments and rock plates were suddenly ejected outward, and this activity was associated with a loud sound. The final strain burst pit area was around half of the whole free surface of the specimen and tensile cracks near the free face occurred parallel to σ on both lateral sides. When the temperature was increased up to 100 °C (see 1 Figure 5.9d), strain burst further became less violent. This may be caused by the thermal damage due to the deteriorated bonding among mineral grains that rendered the rock relatively weaker after temperature. Tensile cracks are observable at the free face of the sample. As the temperature increased from 100 °C to 150 °C, more violent strain burst characteristics were observed, as shown in Figure 5.9e-f. This gradual change can be attributed to the compaction of the rock samples due to the closure of pre-existing micro-cracks (Kumari et al. 2017a). 138
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions Figure 5.9 Rock failure process of the granite specimens treated with different temperatures captured by the high-speed camera: (a) T = 25 °C; (b) T = 50 °C; (c) T = 75 °C; (d) T = 100 °C; (e) T = 125 °C; (f) T = 150 °C 5.3.3 - AE analysis for thermal damage assessment It is well understood that rock failure is accompanied by the release of energy. Elastic waves propagating from a source within a material by the rapid release of localised energy can be defined as an acoustic emission. The AE method has been widely used to investigate brittle rock failure, and to quantify rock damage in many engineering applications (Lockner 1993, Grosse and Ohtsu, 2008; Nicksiar and Martin 2012; Carpinteri et al. 2013; Zhao et al. 2015; Karakus et al. 2016). As shown in Figure 5.4, the AE technique was used to monitor the evolution of damage inside the granite samples at various temperatures. Time-domain analysis AE parameters such as counts, hits, energy, amplitude and frequency were obtained from the AE monitoring system and the fracturing processes of strain burst under different temperature conditions were investigated. While the number of cracks is manifested by AE hits, the magnitude of the micro-cracking is related to the AE energy. Cumulative AE energy was therefore used to assess the energy release characteristics of the granite specimens subjected to various temperatures under true-triaxial unloading conditions. Figure 5.6 illustrates the evolution of cumulative AE energies of the samples. It can be seen that although temperature conditions were different, the evolution features of cumulative AE energy for the six specimens underwent a similar trend from the beginning of loading until strain burst. Based on the cumulative AE energy characteristics, the evolution of AE behaviour was divided into three typical stages, i.e., the AE quiet linear elastic deformation stage, the AE growth stage and the AE active strain burst stage. Figures 5.10a and 5.11a depict the rate and cumulative plots of the AE energy and hits versus the time and also corresponding normalised strain burst stress in which the three deformation stages of strain burst are also demonstrated. The damage caused by temperature was quantified by changes in AE signal characteristics. Therefore, thermal damage for strain burst (𝐷 ) can be calculated for the granite specimens treated with different 𝑆𝐵 temperature conditions by using Equation 5.1. 𝛺 𝐷 = (5.1) 𝑆𝐵 𝛺 𝑚 141
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions Figure 5.11 Plots of (a) AE hits rate and (b) cumulative AE hits and damage evolution by AE hits versus normalised strain burst peak stress at corresponding stages shown in part a for the rock at temperature of 25 °C At the initial stage, a sudden increase can be observed due to the closure of pre-existing cracks, voids or other defects. After the majority of the natural cracks compacted, the rocks went into a linear elastic deformation period. During the stress maintenance phase, the cumulative AE energy rate changed little indicating that no micro-cracking inside the rocks was observed. During this phase, stiffness started to decrease, and it was associated with signifying tensile or shear movements between the faces of closing or closed cracks (Eberhardt et al. 1998). Upon the unloading of the minimum principal stress σ , the cumulative AE energy gradually 3 increased, revealing that new micro-cracks generated and started to grow. However, their low AE energy indicates that they have limited influence on decreasing the overall strength of the rock and thus cannot cause strain bursting. As the maximum principal stress σ was further 1 increased while intermediate principal stress σ was maintained constant, the micro-cracks 2 began to propagate to a few large cracks, to coalescence and to form macro-cracks. This increasingly contributed to the degradation of the inherent rock strength, which was revealed by a high amount of cumulative AE energy. At AE active strain burst stage, due to the unstable coalescence of macro-cracks and the ejection of rock fragments from the free face, cumulative AE energy associated with higher amplitudes rapidly increased at a high rate until strain burst occurred. Figure 5.12 presents variations on the cumulative AE energy and cumulative AE counts with the temperature for all granite specimens. In general, increasing the number of micro-fractures caused a decline in both cumulative AE energy and counts. Nevertheless, as observed in this work, this trend is only correct for sufficiently high temperatures. For example, when the temperatures reached 100 °C and 150 °C, the cumulative AE energy of the samples decreased by 14%-20%, and the cumulative AE counts declined by 20%-55%, compared with the values at 25 °C. 144
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions Figure 5.14 Thermal damage influence on damage accumulation rate b-value analysis The b-value from Gutenberg-Richter’s equation (Gutenberg and Richter 1956) has been widely used to assess the internal damage evolution of rock (Grosse and Ohtsu 2008; Carpinteri et al. 2009; Sagar et al. 2012; Kim et al. 2015). The Gutenberg-Richter relation between the cumulative frequency-magnitude distributions of AE data is given in seismology by Equation. 5.2. 𝐴 𝑙𝑜𝑔 (𝑁) = 𝑎 −𝑏( 𝑑𝐵 ) (5.2) 10 20 where 𝐴 is the peak amplitude of AE events in decibels, N is the incremental frequency which 𝑑𝐵 can be defined as the number of AE hits with an amplitude greater than 𝐴 and the b-value is 𝑑𝐵 the negative slope of the log-linear plot between frequency and amplitude. For three deformation stages, b-values were calculated by plotting the cumulative AE hits, peak amplitude distribution, and fitting curve (an example of calculation of b-values can be seen in Figure 5.15a). Fracture density can be represented by the y-intercept of the fitting line and as can be observed that y-intercepts of the three deformation stages decrease from the initial AE quiet stage to the AE active stage. 147
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions Figure 5.15 Example of calculation of b-values (a) AE incremental frequency and amplitude distribution and b-value calculation, (b) average b-values and standard deviations in three deformation stages for the granite specimen at temperature level of 150 °C (c) temperature influence on b-value at AE active stage Figure 5.15b presents the estimated b-values in three deformation stages and at the evolution. At the initial stage, the closure and compaction of pre-existing microcracks, voids or other defects resulted in high b-values. This is evidenced by a large number of AE events with low magnitude. During the generation of new micro-cracks, and also during the stable growth of micro-cracks (no macro-crack formation), a few AE events were observed. In the AE active stage, b-values decreased sharply. This indicates that AE events with higher amplitudes were detected due to the accelerated unstable crack growth, and coalescence until strain burst. This sudden change in the b-value also indicates that the damage accumulated inside the rock is increasing. Therefore, the higher b-value trend suggests that micro-crack growth, whilst lower b-value trend implies that macro-cracks have formed inside the rock that can be used as a damage alert. Figure 5.15c presents the influence of temperature on the b-value at AE active stage. Although, Carpinteri et al. (2009) indicated that b-value changes systematically from 1.5 (in which damage in the material is still uniform at a condition of criticality) to 1.0 when the final failure is imminent characterised by a strong damage localisation, b-values in Figure 5.15c are less than 1.0 since they were calculated for AE active stage. When the temperature increased to 100 °C, b-values show an increasing trend. This indicates that thermal damage reduced the macro- cracking process due to the mechanical degradation of the samples which in turn resulted in less intense strain bursting. As the temperature increased from 100 °C to 150 °C, b-values gradually declined which can reveal more intense strain burst characteristics. Therefore, b- value analysis can be used to assess the type of deterioration of the rock and to quantify the damage degree. Frequency-domain analysis The frequency-amplitude characteristics of the AE waves of the six granite specimens treated different temperatures are presented in Figure 5.16. The frequency-amplitude behaviours of the AE signals showed trends similar to the total cumulative AE energy responses. Increasing the temperature led to a low-frequency band of and higher amplitudes (see Figure 5.16). When the 149
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions Figure 5.16 AE frequency-amplitude features of the six granite specimens treated with different temperatures: (a) T = 25 °C; (b) T = 50 °C; (c) T = 75 °C; (d) T = 100 °C; (e) T = 125 °C; (f) T = 150 °C In order to investigate the influence of thermal damage on strain burst behaviours in greater depth, the frequency spectrum analysis was carried out. The AE signals were analysed using the Fast Fourier Transform (FFT) method (see Equation 5.3), as the frequency spectrum can be used to investigate the internal damage level during strain burst. 𝑁−1 𝑋 = ∑ 𝑥 .𝑒−𝑖2𝜋𝑘𝑛/𝑁 (5.3) 𝑘 𝑛 𝑘=0 Figure 5.17 demonstrates the main frequency behaviour when the temperature was increased from room temperature (25 °C) to 150 °C. The average results show that the main frequency was approximately 261 kHz for room temperature samples and continually decreased to around 113 kHz as the temperature was increased. It is believed that the micro-cracking processes occurred over a long time period at low temperatures. However, when temperature increased, this micro-cracking period gradually diminished due to the thermal damage inside the specimens. 152
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions The kinetic energy calculation analysis of the ejected fragments can be described as follows. First, a three-dimensional spatial coordinate system was set up in which the centre bottom of the steel rig was selected as the origin point, denoted by a red circle (see Figure 5.18a). Then, the motion trail of relatively large fragments was traced after bursting, as illustrated in Figure 5.18b. The specific spatial locations of the fragments were determined from the side and top view of the high-speed photos (see Figure 5.18d). Figure 5.18c presents, the movement tracking of the fragment, F-2, from the free face of the granite sample at the onset of bursting to the bottom platform. After calculating the movement time, ∆𝑡, locations of the fragments before and after ejection were identified with respect to the spatial coordinate system. As can be seen in Figure 5.18b, the initial ejection location of the fragment is point A (𝑥 ,𝑦 ,𝑧 ), which has 0 0 0 an initial speed of 𝑉 and the final dropping down point is point B (𝑥 ,𝑦 ,𝑧 ). 0 1 1 1 After measuring the velocity, the total kinetic energy of the ejected fragments was calculated by using Equation 5.4. 𝑛 1 2 𝐸 = ∑ 𝑚 𝑣 (5.4) 𝑘 2 𝑖 𝑖 𝑖=1 where n is the number of fragments having D > 10 mm and m > 0.5 g, 𝑚 is the mass of the 𝑖th 𝑖 rock fragment and 𝑣̅ is the initial ejection velocity of the 𝑖th rock fragment. By using the 𝑖 equation above, the total kinetic energies for all granite specimens treated with different temperatures were calculated. Note that average velocity values of the ejected fragments were taken as the ejection velocity of a granite specimen. The ejection velocities and strain bursting of the granite specimens exposed to different temperature conditions from room temperature (25 °C) to 150 °C are displayed in Figure 5.19. Due to the thermal damage occurred inside the granite samples leading to the degradation of the mechanical characteristics, the ejection velocity of the fragments dramatically decreased when the temperature level was below 100 °C. With improved compactness between 100 °C and 150 °C, the velocity of the ejected fragments increased slightly, which is associated with relatively intense strain bursting (see Figure 5.20a). 155
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions Figure 5.19 Ejection velocities of rock fragments from the granite specimens treated with different temperature conditions The kinetic energy of the ejected fragments showed a trend similar to the ejection velocities. Kinetic energy continually decreased with the temperature, until the critical temperature level of 100 °C was reached. This is because the granite specimens manifested thermal damage (see Figure 5.20b). The strain burst stress and total elastic strain energy showed a decline in temperatures below 100 °C due to thermally induced damage and is shown in Figure 5.20a. It can also be seen that the amount of total elastic strain energy released from the granite specimens decreased because the thermally induced microcracks reduced the amount of strain energy accumulation (see Figure 5.21b). When the temperature increased from 100 °C to 150 °C, the accumulated strain energy within the granite specimens increased (see Figure 5.21a). Therefore, this led to the higher amount of the strain energy release associated with an increase in kinetic energy, as shown in Figure 5.20a. 156
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions energy and the ejection velocity of the fragments decreased by 45%, 68%, 96%, and 82% respectively. It is believed that thermally induced microcracking caused mechanical degradation and this resulted in less strain energy accumulation which led to small kinetic energy. When the temperature level was above 100 °C, bursting stress, accumulated strain energy, kinetic energy release and fragment ejection velocity increased when compared to the results captured at the temperature of 100 °C. This led to more intense strain burst characteristics. The results demonstrate that thermal damage has some influence on strain burst behaviour of brittle rock. Table 5.4 Temperature influence on strain burst stress, total elastic strain energy, kinetic energy and ejection velocity of the fragments Temperature (°C) 25 50 75 100 125 150 Strain burst stress (%) 0 -15.7 -32.2 -44.6 -35.9 -15.8 Total elastic strain energy (%) 0 -22.9 -54.1 -68.2 -58.9 -26.9 Kinetic energy (%) 0 -22.1 -92.8 -96.3 -73.4 -27.9 Ejection velocity of the fragments (%) 0 -16.3 -70.0 -82.0 -57.2 -34.3 5.4 - Discussions Strain burst stresses for the samples exposed to temperatures up to 100 °C declined by 44.6%, compared to the stresses of the specimens at the room temperature (25 °C) (see Figure 5.8). It is believed that creation of new micro-cracks due to temperature exposure led to a weakening of the bonding among mineral grains of the samples, which can be attributed to the anisotropy in the thermodynamic properties of different rock minerals, and this caused a degradation of the overall rock strength. The failure mechanism for the granite specimens exposed to temperatures up to 100 °C might have been due to intergranular fracture mechanism in which micro-cracks first develop at the mineral grain boundaries that was consistent with the existing literature (Yin, et al., 2012; Zuo et al. 2014; Li et al. 2016; Feng et al. 2017). As the temperature increased from 100 up to 150 °C, the strain burst stress showed a gradual rise. It is believed that the closure of pre-existing micro-cracks due to the thermal expansion of mineral grains by high temperature may render the rocks denser and more compact (Funatsu et al. 2014; Gautam et al. 2016). In order to understand this phenomenon, SEM analysis needs to be conducted, which is a subject of our future work. However, experimental evidence in the literature suggests that the above-mentioned mechanisms of intergranular and transgranular thermal cracking could be behind the observed behaviour in this study. In fact Zuo et al. (2014) and Feng et al. 159
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions (2017) reported that when the temperature was more than 100 °C, the coupled fracture mechanism of intergranular and transgranular thermal cracking (in which the micro-cracks develop within the mineral grains) was the main mechanism for improved compactness of the specimens after the gradual closure of the pre-existing defects in the crystal. Since the effects of the microcracking process are related to the magnitude of the AE events, damage evaluation will be better understood with cumulative AE energy. It was observed that the rate of thermal damage accumulation increased as the temperature increased from room temperature (25° C) up to 100 °C. It is believed that the weakening of the minerals’ bonding caused a mechanical degradation on the strength of the rocks and this triggered the rapid thermal damage accumulation and bursting. On the other hand, when the temperature increased from 100 °C to 150 °C, the granite specimens exhibited slower damage accumulation and revealed intense strain burst. This can be attributed to the improved densification of the samples due to the thermal dilation of mineral grains which decreased the distance between the interfaces of the minerals and their mutual attraction was enhanced. From an energy point of view, kinetic energies of the granite specimens were calculated to assess the influence of thermal damage on the intensity of strain burst. The samples treated with temperatures from room temperature (25 °C) to 100 °C manifested dramatically less intense strain burst associated with slower particle ejection velocities due to the thermal damage. At temperatures from 100 °C to 150 °C, more intense strain burst was displayed with faster rock fragment ejection. It is believed that this increase in kinetic energy was caused by the enhanced compactness of the samples due to the fact that thermally-induced volumetric expansion of minerals led to the closure of the pre-existing micro-cracks and original defects in the samples. The aforementioned experimental results give useful enlightenments about the impact of thermal damage on strain burst characteristics. However, more experiments considering higher temperature levels should be performed to better understand the mechanism of strain burst under high geo-stress and high-temperature conditions. 5.5 - Conclusion In this chapter, temperature influence on the strain burst behaviour of granite samples was investigated using a unique true-triaxial strain burst testing system. Based on acoustic emission, 160
ADE
Effects of thermal damage on strain burst mechanism for brittle rocks under true-triaxial loading conditions stress and kinetic energy analyses conducted on granite samples exposed to various temperatures the following conclusions can be drawn: 1. The strain burst stress of granite changes with temperature from room temperature 25 °C to 150 °C. A temperature level of 100 °C was identified as the critical transition temperature, which induces the change in the strain burst behaviours of granite. As the temperature increased from 25 °C to 100 °C, the strain burst stress diminished by approximately 45%. It is believed that this declining trend is caused by the development of microcracks that are induced by temperatures. At 100-150 °C, the strain burst stress showed a slightly rising trend, but it is still less than that at room temperature. This can be attributed to the improved compaction of the grains in brittle rock by the closure of pre- existing micro-cracks due to the thermal expansion of minerals at higher temperatures. 2. The evolution of AE characteristics can be divided into three deformation stages. Those stages are the AE quiet linear elastic deformation stage, AE growth stage and AE active strain burst stage. The cumulative AE energy showed a sharp increase at the initial stage, then accumulated slowly during the stress maintenance phase before increasing dramatically until strain burst occurred. Corresponding with the failure characteristics of the granite specimens exposed to different temperature conditions, the total cumulative AE energy and cumulative AE counts decreased as the temperature increased from 100 °C to 150 °C. It was found that cumulative AE energy characteristics reflect the damage evolution better as the size of micro-cracks are related to the magnitude of the AE events. Moreover, when the temperature increased, a low-frequency band was observed due to the thermal damage inside the specimens, which can also be an indicator for strain burst. 3. The thermal damage for strain burst (𝐷 ) increased the rate of bursting at ~95% of 𝑆𝐵 normalised axial stress levels. This can be due to the fact that as temperature caused thermally induced micro-cracks that helped to reduce the accumulated energy at the initial loading stage. A good relationship was observed between the trend of the b-values and the micro- and macro- cracking during the strain burst test. The estimated b-values showed a continuously declining trend during the test indicating that a large amount of macro-cracks were generated prior to strain burst. Therefore, b-value analysis can be used as a precursor to assess the degradation of the rock and strain burst process. 161
ADE
Conclusions and recommendations Chapter 6: Conclusions and recommendations 6.1 - Introduction The final chapter of this thesis presents the strain burst proneness indexes and criteria proposed to evaluate the propensity of strain burst and the summary of the work done in this research, providing conclusions and recommendations for future work. Firstly, the methodology presented for prediction of strain burst in deep underground mines is discussed. Secondly, the main contributions of this research are summarised. Finally, a list of recommended future work is given followed by some additional research questions inspired by this study. 6.2 - Quantifying the influence of intrinsic rock parameters on strain burst and application to real engineering problems As mining progresses to greater depths, the rate and severity of strain burst hazards encountered tend to inevitably increase, resulting in significant operational and safety challenges. Strain burst is a sudden and violent rock fracturing and spontaneous instability phenomenon accompanied by the abrupt release of strain energy of an excavation whereby the rock mass rupture is initiated by mining-induced, or dynamic stress changes until the rock mass strength (critical strain burst stress level) is reached. Such a failure characteristic poses a serious threat to the safety and efficiency of deep underground engineering operations. Therefore, the research on strain burst mechanism and prediction have become one of the key scientific and technical problems in rock mechanics field. Determination of strain burst proneness of rock is one of the challenging issues in the field of strain burst research. Timely identification of potential precursor information enables effective and specifically targeted measures to mitigate strain burst hazards. Is it possible to forecast strain burst before it occurs? How can the magnitude of potential strain burst be predicted? What magnitude of measures should be taken into account for eliminating, or minimising the risk of strain burst and its destructive consequences to an acceptable level? These real engineering application related questions will be explained in this chapter under strain burst proneness assessment section. This chapter critically assesses the underlying mechanism and 163
ADE
Conclusions and recommendations consequences of strain burst evaluation methods and proposes a new energy based indexes for practical use in real engineering applications in geomechanics. There have been many research conducted to assess the potential risk, vulnerability and proneness of strain burst and some discriminant indices of criterion were proposed including the elastic strain energy storage index (Kidybinski 1981), the rock brittleness index (Wang and Park 2001), the decrease modulus index (Singh 1989), the burst potential index (Mitri et al. 1999). Cook (1966) pointed out the significance of energy release for inducing rock burst and proposed the energy release rate index as rockburst prediction. The burst potential index was proposed by Mitri et al. (1999) to evaluate the potential rockburst risk after excavation and it was stated that rockburst tends to occur when the rock energy storage rate reaches the limit of energy storage. Kidybinski (1981) proposed the elastic strain energy index to assess the intensity of rockburst. Wiles (2002) studied the correlation between pillar burst and the local energy release rate and provided an indicator that can be used for predicting the potential for rockburst. Recently, Weng et al. (2017) investigated the energy accumulation and dissipation characteristics of rockburst failure process and they introduced a strain energy density index for examining the energy distribution in the surrounding rock mass when rock fails due to strain burst or spalling. Table 6.1 presents some examples of empirical criteria of strain burst proneness in the literature which were derived from the mechanical parameters obtained by laboratory tests. Table 6.1 Example indices for strain burst prediction Index or equation Explanation Reference Ratio of the maximum tangential stress to Russenes 1974; Hoek 𝜎 /𝜎 𝜃 𝑐 the uniaxial compressive strength of rock and Brown 1980 Ratio of the elastic energy stored to the Elastic strain energy dissipated energy in one cycle of cycling Kidybinski 1981 index compression test Ratio of the energy storage rate to the Burst potential index maximum strain energy that the rock Mitri et al. 1999 (BPI=ESR/E)100% mass can sustain before failure Ratio of the compressive strength to the Rock mass index Palmstrom 1995 tangential stress 164
ADE
Conclusions and recommendations The ratio of square of the uniaxial Rock brittleness index compressive strength of to double amount Wang and Park 2001 (𝑃𝐸𝑆 = 𝜎2/2𝐸 ) of the unloading tangential elastic 𝑐 𝑢 modulus Local energy release The difference in energy stored in the Jiang et al. 2010 rate index rock mass before and after brittle failure Strain energy density Demonstrating the strain energy Weng et al. 2017 index accumulation and dissipation The ratio of the energy release of an Rockburst energy element generating brittle failure to the Xu et al. 2017 release rate index limit energy storage of that element Damage accumulation leading to strain burst is a static process followed by the dynamic release of stored strain energy in which stored strain energy is converted to kinetic energy as in the form of ejections of rock fragments. Therefore, strain burst from beginning to the ending is combined quasi-static and dynamic behaviour. In this respect, to fully understand the strain burst mechanism it is essential to consider quasi-static and dynamic parameters for forecasting the potential and intensity of strain burst. Although the strength and deformability of rocks can be approximately predicted, the intrinsic structure and the internal failure mechanism still remain for further investigation. Due to the complex physical and mechanical properties of rock mass, the main causes related geomechanical properties and the strain burst mechanism present a challenging concern to researchers in rock mechanics. 6.3 - New strain burst proneness indexes based on excess stored strain energy In this section, strain burst characteristics based on the energy theory was analysed and energy indexes were proposed to quantitatively evaluate the intensity of strain burst of brittle rock. Based on the energy evolution characteristics of brittle granite under uniaxial and triaxial compression, true-triaxial loading-unloading and three-point bending, new strain burst proneness indexes were proposed and new strain burst criterion based on these indexes were presented. Note that these indexes were proposed for brittle hard granite. 6.3.1 - The excess strain energy index 𝛀 𝑺𝑩 According to the circumferential-strain controlled uniaxial and triaxial compression tests, the elastic stored strain energy, fracture energy and excess strain energy that is the potential energy 165
ADE
Conclusions and recommendations for strain burst, of the granite specimens during the entire loading were accurately calculated and the rule of energy accumulation and release in granite was systematically analysed. It was found that the maximum strain energy stored and excess strain energy in the rock are affected by the confining pressure and temperature. Based on the above-mentioned theory, here a new energy index for strain burst proneness Ω SB was proposed, can be calculated as in Equation 6.1: dΦ EX Ω = (6.1) SB dU E where dΦ and dU are the excess strain energy released during brittle failure (strain burst) EX E and the elastic stored strain energy after Class II behaviour starts, respectively. The energy calculations are shown as follows (see Chapter 3): 𝜎2 𝑑𝑈 = 𝐴 (6.2) 𝐸 2𝐸 𝜎𝐵 𝜎2 −𝜎2 (𝑀−𝐸) dΦ = ∑ 𝑖 𝑖+1 (6.3) 𝐶𝑊 2𝐸𝑀 𝑖=𝜎𝐴 𝜎𝐶 𝜎2 −𝜎2 (𝑀−𝐸) dΦ = ∑ 𝑖 𝑖+1 (6.4) 𝐹𝑀 2𝐸𝑀 𝑖=𝜎𝐵 𝜎2 𝑑𝑈 = 𝐶 (6.5) 𝑅𝐸 2𝐸 dΦ = 𝑑𝑈 −dΦ −dΦ −𝑑𝑈 (6.6) 𝐸𝑋 𝐸 𝐶𝑊 𝐹𝑀 𝑅𝐸 where Φ is the energy consumption dominated by cohesion degradation during stable 𝐶𝑊 fracturing, Φ is the energy dissipated during the mobilisation of frictional failure, 𝑈 is the 𝐹𝑀 𝑅𝐸 residual stored elastic strain energy, 𝜎 is the point of axial strain reversal, 𝜎 is the point of 𝐴 𝐵 brittle failure intersection (see Figure 3.4 in Chapter 3), 𝐸 is the elastic stiffness of the specimen and 𝑀 (𝑀 = 𝛿𝜎/𝛿𝜀) is the post-peak modulus between two incremental stress points, 𝜎 and 𝑖 𝜎 which can vary significantly with the fracture development. 𝑖+1 From the above analyses, the strain burst proneness of the thermally-treated granite specimens at different confining pressure can be classified into three grades: low, medium and strong strain burst proneness. The grading standards of strain burst proneness based on Ω are listed SB in Table 6.1. According to the calculated Ω and the failure pattern of the granite specimens SB 166
ADE
Conclusions and recommendations (see Figure 3.8 in Chapter 3), a new criterion for strain burst proneness with Ω was proposed SB as follows: Ω > 0.08 low strain burst proneness SB 0.04 < Ω < 0.08 medium strain burst proneness Confinement SB (6.7) Ω < 0.04 strong strain burst proneness SB Ω < 0.2 low strain burst proneness SB 0.2 < Ω < 0.4 medium strain burst proneness Temperature SB (6.8) Ω > 0.4 strong strain burst proneness SB Table 6.2 Classification of strain burst proneness using the excess strain energy index Ω SB Confining pressure (MPa) 𝛀 Strain burst proneness 𝐒𝐁 0 0.187 Low 0 0.272 Low 0 0.205 Low 10 0.071 Medium 20 0.079 Medium 20 0.087 Medium 30 0.021 Strong 30 0.040 Strong 40 0.037 Strong 40 0.038 Strong 50 0.024 Strong 60 0.007 Strong Figure 6.1 presents the influence of confining pressure and temperature on strain burst proneness. It can be seen that the strain burst proneness of brittle granite is strongly dependent on the pre-heating temperature and confinement. The results demonstrated that the higher the confining pressure and temperature, the stronger the strain burst proneness will be. It is believed that due to the anisotropy in the thermodynamic properties of different rock minerals, the amount and width of the microcracks inside the specimen increased, and this triggered the rapid thermal damage accumulation and bursting. In other words, the fundamental reason for the increase of strain burst proneness is the thermally induced damage by microcracking. Thermally induced damage caused less elastic strain energy accumulation and hence the excess strain energy which is a measure for the intensity of the intrinsic strain burst in the rock decreased with increasing temperature, resulting in stronger strain burst proneness. 167
ADE
Conclusions and recommendations 6.3.2 - Released energy index 𝛌 𝑺𝑩 The kinetic energy of the ejected fragments during strain burst can serve as a significant precursor for evaluating the strain burst intensity quantitatively. Using a high-speed camera, the ejection failure process of rock fragments were observed in true-triaxial loading-unloading strain burst tests. The ejection velocities and kinetic energies from the tested granite specimens were quantitatively estimated by analysing the recorded videos. After measuring the velocity, the total kinetic energy of the ejected fragments was calculated by using Equation 6.9. 𝑛 1 2 𝐸 = ∑ 𝑚 𝑣 (6.9) 𝑘 2 𝑖 𝑖 𝑖=1 where n is the number of fragments having D > 10 mm and m > 0.5 g, 𝑚 is the mass of the 𝑖th 𝑖 rock fragment and 𝑣̅ is the initial ejection velocity of the 𝑖th rock fragment. By using the 𝑖 equation above, the total kinetic energies for all granite specimens treated with different temperatures were calculated. In addition, the strain burst stress (𝜎 ) and total elastic strain 𝑆𝐵 energy (U ) of the granite samples exposed to different temperatures were calculated. E Based on the kinetic energy and stress analyses, a released energy index 𝜆 for strain burst SB proneness, was proposed, which can be described by: 𝐸 𝑘 𝜆 = (6.10) SB U E According to the calculated 𝜆 of the thermally-treated granite specimens, a new criterion for SB strain burst proneness with index 𝜆 was proposed as follows: SB 𝜆 < 0.5 low to moderate strain burst SB (6.11) λ > 0.5 medium to intense strain burst SB 𝜎𝑆𝐵 > 1.2 low strain burst proneness 𝜎𝑈𝐶𝑆 1 < 𝜎𝑆𝐵 < 1.2 moderate strain burst proneness (6.12) 𝜎𝑈𝐶𝑆 𝜎𝑆𝐵 < 1intense strain burst proneness 𝜎𝑈𝐶𝑆 where 𝜎 is the uniaxial compressive strength. 𝑈𝑆𝐶 169
ADE
Conclusions and recommendations The strain burst proneness of thermally-induced granite specimens is given in Table 6.2. It can be seen that strain burst proneness increased with an increased temperature which can be attributed to the mechanical strength degradation induced by thermal microstructures, rendering the rock relatively weaker. Table 6.3 Classification of strain burst proneness using the released energy index 𝜆 and 𝜎𝑆𝐵 SB 𝜎𝑐𝑚 𝝈 𝑺𝑩 Temperature (°C) 𝛌 Strain burst proneness 𝑺𝑩 𝝈 𝒄𝒎 0.586 1.67 Low 25 0.409 1.50 Low 0.572 1.24 Low 50 0.322 1.87 Low 0.056 1.02 Moderate 75 0.099 1.13 Moderate 0.058 1.06 Moderate 100 0.059 0.92 Intense 0.065 0.65 Intense 0.174 1.11 Moderate 125 0.439 0.98 Intense 0.419 0.96 Intense 0.554 1.06 Moderate 150 0.439 1.67 Low 6.3.3 -Energy release rate index 𝚿 𝑺𝑩 Energy release rate which is a measure of the energy that is dissipated per unit increase in an area during crack growth is important for the successful assessment of fracturing characteristics during strain burst. In this study, the effects of various loading rates on the strain burst proneness for thermally-treated granite was analysed and discussed. The applied energy is equal to the work done on the crack surface for its propagation which can be determined by the applied load and the displacement in the system. Based on the above-mentioned theory, an energy release rate index Ψ for strain burst SB proneness was presented, as follows: 170
ADE
Conclusions and recommendations 𝐺 Ψ = 𝐼 (6.13) SB 𝑊 Where 𝐺 and 𝑊 are the energy-release rate and applied energy on granite under mode I 𝐼 fracture, respectively. A strain burst proneness criterion based on Ψ index was proposed (see Equation 6.14) and SB the coupled influence of loading rate and temperature on strain burst proneness was investigated in this study. Ψ > 1 (Low strain burst proneness) SB 0.75 < Ψ < 1 (Moderate strain burst proneness) (6.14) SB Ψ < 1 (Intense strain burst proneness) SB The detailed strain burst proneness of granite under various levels of temperature at different loading rates are given in Table 6.3. The results showed that the strain burst proneness decreases with increasing loading rate as the strength and fracture toughness of granite, resulting in slight strain burst proneness. Increased temperature, on the other hand, caused stronger strain burst proneness of granite due to the thermal damage resulting in deterioration of the tensile stress resistance. Table 6.4 Classification of strain burst proneness using the energy release rate index Ψ SB Temperature (°C) Loading rate (mm/min) 𝚿 Strain burst proneness 𝑺𝑩 0.02 0.641 Intense 0.05 1.242 Low RT 0.08 1.265 Low 0.1 1.484 Low 0.02 0.737 Intense 0.05 1.045 Low 100 0.08 0.837 Moderate 0.1 1.144 Low 0.02 0.631 Intense 0.05 0.847 Moderate 175 0.08 0.479 Intense 0.1 0.731 Intense 250 0.02 1.016 Low 171
ADE
Conclusions and recommendations 0.05 0.752 Intense 0.08 0.947 Moderate 0.1 0.840 Moderate Based on the above-mentioned strain burst proneness indexes and criteria, a methodology for forecasting the propensity of strain burst is proposed, as depicted in Figure 6.2. Using these indexes can provide guidelines for the development of an effective and reliable method to forecast the propensity of strain burst. According to the energy calculations in this new testing methodology, calculating the excess strain energy, stored elastic strain energy and energy release rate evolution characteristics can be used for improved understanding of the performance and design of rock support systems in strain burst-prone mines. Appropriate rock support design can be provided by considering the energy absorption capacity of rock support and the energy characteristics obtained from the laboratory tests conducted for investigating the underlying mechanism of strain burst damage. Therefore, this research will lead to better and more efficient prediction methods for brittle rock failure and strain burst, towards planning guidelines and ultimately safer deep underground working environments. 172
ADE
Conclusions and recommendations 6.4 - Conclusions The objective of this research is fourfold: first, to investigate the energy evolution characteristics during strain burst by conducting circumferential strain controlled tests under the combined influence of thermal damage and confining pressure, and second determining quasi-static and dynamic fracture toughness on thermally treated Australian CCNSCB granite specimens at various loading rates and examine the relation between the quasi-static and dynamic mode-I fracture toughness and energy release rates; third, investigate the influence of deviatoric stresses and temperature effects on strain burst behaviour using rectangular prism granite specimens exposed to different pre-heating temperatures under true-triaxial loading/unloading conditions; and finally proposing strain burst criteria or index for strain burst proneness by the results from the tests mentioned above and upscale these finding to apply for the real engineering applications. Apart from this, three other motivating branches of interest can be directed to systematically and thoroughly assess the influence of external factors including confining pressure, thermal damage and loading rate on the mechanical properties and energy characteristics of brittle Australian granite during strain burst in deep mining operations. Based on the acoustic emission, stress, kinetic energy analyses and fracture characterisation carried out on granite samples exposed to various temperature, confinement and loading rate the following key conclusions can be drawn: Forecasting the propensity of strain burst 1. An energy calculation method was developed based on post-peak energy analysis. AE responses during compression tests were used to assess the energy and crack evolution characteristics of Australian granite specimens under different confinement. Using AE characteristics, fracture energy was split into two-class: 1) energy consumed dominantly by gradual weakening of cohesive behaviour and 2) energy dissipated during the mobilisation of frictional failure. A portion of elastic energy, released from the Class II rock, was defined as excess strain energy which is a measure for the propensity of the intrinsic strain burst in the rock. It directly determines the intrinsic ejection velocity of the rock fragments when a bursting event occurs. Therefore, this methodology can be used for quantitative predictions of bursting strain energy in the field which could facilitate 174
ADE
Conclusions and recommendations improving the early warning efficiency and provides a comprehensive guideline for the mitigation methods to reduce strain burst intensity. 2. Confinement has significantly affected the post-peak energy redistribution characteristics and fracture mechanism of granite. The elastic stored strain energy, energy consumed by dominating cohesion weakening, and energy dissipated during mobilisation of frictional failure were 8.74, 2.53 and 12.1 times the values at unconfined condition, resulting in more severe strain burst indicating that rising up the confining pressure improved the efficiency of energy accumulation. This explains why the damage degree of granite is more prominent in the process of deep excavations. 3. The temperature has significantly affected the post-peak energy redistribution characteristics and fracture mechanism of granite. The elastic stored strain energy, total fracture energy, excess strain energy diminished by 80, 82 and 43%, respectively when the temperature increased from room temperature to 250 °C. This declining trend was attributed to the development of micro-cracks that were induced by elevated temperatures. Thermally induced damage caused less strain energy accumulation and hence the excess strain energy decreased with increasing temperature. Another parameter to express the intensity of a burst event, ejection velocity, dropped down as the gradual increase of temperature. The proposed approach can provide an early warning of brittle rock instability, which is significant for strain burst assessment in deep mining operations. 4. The fracturing mechanism of granite was influenced by both confining pressure (excavation depth) and temperature. The dominant failure pattern of granite changed from multiple splitting failure to splitting-shear composite failure as the level of confinement increased. When the temperature was less than 100 °C, granite samples experienced more induced intergranular thermal fracturing. Coupled fracture mechanism of intergranular and transgranular thermally induced cracking were the main fracture mechanism triggering strain burst when the temperature exceeded 100 °C. 175
ADE
Conclusions and recommendations Quasi-static and dynamic fracture characterisation 1. The CCNSCB specimen combines the merits of two ISRM-suggested methods (CCNBD and NSCB methods), and thus it allows accurate determination of the mode I fracture toughness of granite under quasi-static and dynamic loadings. 2. The experimental results indicated that the quasi-static fracture toughness and energy- release rate in mode I are a function of loading rate and they presented a rising trend with increasing loading rate. At high loading rates, transgranular fractures became dominant which consumed more energy than intergranular fractures; this in turn, resulted in more straight fracture path and posed a less rough fracture surface when compared to the low loading rate condition. 3. Under the same loading rate, the quasi-static mode I fracture toughness and energy-release rate of granite showed a gradual fall (17% and 30%, respectively) with ascending temperature from 25 °C to 250 °C due to the thermally-induced micro-cracks within the rocks. These findings of this investigation will be useful in achieving a better understanding of initiation of fracturing during strain burst under various temperature and loading rate conditions. 4. The stress-strain curves of granite under various impact velocities and temperatures showed the same deformation stages; elastic deformation, yielding and failure. When the impact velocity was high, the loading rate strengthening effect became more remarkable and the strength of granite increased under all temperatures. The failure modes of Australian granite also exhibited rate dependence at the same temperature level. Along with the high impact velocity, the failure mode of the pre-heated granite changed from tensile splitting (characterisation of Class I) to pulverisation or breaking into many small pieces in which the specimens were pulverised by the excess energy in Class II loading. Under the same dynamic impact, an increase in the treatment temperature weakened the interaction force between the particles and aggravated the fragmentation degree of granite. 5. The DIFT of Australian granite was obtained by the quasi-static analysis that was evidenced by the dynamic force balance until the time to fracture. The DIFT of the granite presented an ascending trend with the loading rate at a given heat-treatment temperature 176
ADE
Conclusions and recommendations and decreased with increasing temperature, revealing the deterioration of the ability to resist fracturing with the rise of temperature. Therefore, in order to effectively crush the deep rock, a favourable measure should be applied to reduce the intensity of strain burst by considering a combined application of a thermal treatment and impact with a proper loading rate. Effects of thermal damage on strain burst mechanism for brittle rocks under true- triaxial loading-unloading conditions 1. The strain burst stress of granite changes with temperature from room temperature 25 °C to 150 °C. A temperature level of 100 °C was identified as the critical transition temperature, which induces the change in the strain burst behaviours of granite. As the temperature increased from 25 °C to 100 °C, the strain burst stress diminished by approximately 45%. It is believed that this declining trend is caused by the development of microcracks that are induced by temperatures. At 100-150 °C, the strain burst stress showed a slightly rising trend, but it is still less than that at room temperature. This can be attributed to the improved compaction of the grains in brittle rock by the closure of pre- existing micro-cracks due to the thermal expansion of minerals at higher temperatures. 2. The evolution of AE characteristics can be divided into three deformation stages. Those stages are the AE quiet linear elastic deformation stage, AE growth stage and AE active strain burst stage. The cumulative AE energy showed a sharp increase at the initial stage, then accumulated slowly during the stress maintenance phase before increasing dramatically until strain burst occurred. Corresponding with the failure characteristics of the granite specimens exposed to different temperature conditions, the total cumulative AE energy and cumulative AE counts decreased as the temperature increased from 100 °C to 150 °C. It was found that cumulative AE energy characteristics reflect the damage evolution better as the size of micro-cracks are related to the magnitude of the AE events. Moreover, when the temperature increased, a low-frequency band was observed due to the thermal damage inside the specimens, which can also be an indicator for strain burst. 3. The thermal damage for strain burst (𝐷 ) increased the rate of bursting at ~95% of 𝑆𝐵 normalised axial stress levels. This can be due to the fact that as temperature caused 177
ADE
Conclusions and recommendations thermally induced micro-cracks that helped to reduce the accumulated energy at the initial loading stage. A good relationship was observed between the trend of the b-values and the micro- and macro- cracking during the strain burst test. The estimated b-values showed a continuously declining trend during the test indicating that a large amount of macro-cracks were generated prior to strain burst. Therefore, b-value analysis can be used as a precursor to assess the degradation of the rock and strain burst process. 4. The kinetic energy of the ejected fragments dramatically decreased until they reached the critical temperature of 100 °C. This is because of manifested thermally induced damage which caused less elastic strain energy accumulation. When the temperature increased from 100 °C to 150 °C, kinetic energy had also a slight rise which is associated with the higher initial velocity of ejected fragments which may occur due to the expansion of mineral grains by increased temperature. This helped to improve the compactness of the rock which implies that a more intense or severe strain burst may be encountered in situations where temperatures rise above the critical temperature of 100 °C. Quantifying the influence of intrinsic rock parameters on strain burst and application to real engineering problems 1. To estimate and classify the strain burst proneness of brittle rock, energy evolution characteristics of granite were used to assess the tendency of strain burst. Excess strain energy (Ω ), released energy (𝜆 ), and energy-release rate (Ψ ) indexes were proposed SB SB SB on the basis of energy characteristics for brittle rock. 2. Based on the strain burst proneness of granite specimens obtained through circumferential- strain controlled uniaxial and triaxial compression tests, true triaxial loading-unloading strain burst tests, and three-point bending mode I fracture toughness tests, and the indexes proposed, new criterions for strain burst proneness were put forward. The influence of confining pressure, temperature and loading rate on the strain burst proneness was also analysed and discussed. 178
ADE
Conclusions and recommendations 6.5 - Recommendations for future work In addition to the results reported in this thesis, the following interests can be recommended for future work: 1. Conducting circumferential-strain controlled tests with simultaneously increasing the temperature and confining pressure. 2. The growth of the microcracks in rocks is accompanied by significant inelastic deformation near the crack tip. This highly damaged region adjacent to the crack tip is called a fracture process zone (FPZ) within the material undergoes micro-damaging. In the FPZ, micro-cracks close or open depending on their orientation with respect to the direction of the applied load, and crack growth, in fact, occurs by connecting the micro- cracks at a critical load. Therefore, PFZ during strain burst should be analysed and discussed more in-depth to estimate the PFZ in underground excavation and thus more appropriate supporting system can be applied with some economic benefits. 3. In the view of the study on dynamic fracture properties of rock under coupling of temperature and static pressure will to be carried out for a better understanding of dynamic fracture characteristics during strain burst. 4. 3D X-ray micro-CT technique deserves examination for accurately quantification of the thermally-induced damage under different loading conditions. 5. The effects of confining pressure on the dynamic fracture parameters of brittle rock should be studied to understand the fracture propagation characteristics under confined environment. This will help to identify the initiation of unstable crack growth. 6. The effect of intermediate principal stress on rock failure is commonly acknowledged, and it was first verified that, under constant 𝜎 condition, the rock strength in the conventional 3 triaxial extension was higher than that in the conventional triaxial compression test. Therefore, the influence of intermediate stress on strain burst mechanism under true- triaxial unloading conditions should be subjected to detailed investigation. 7. The influence of loading and unloading rate on strain burst behaviour under true-triaxial loading-unloading conditions should be studied. 8. The energy dissipation due to the formation of rock fragments triggered by tension and shear failures during strain burst process should be systematically investigated. 179
ADE
Abstract Hydraulic simulation models have been used to simulate the steady-state of a water distribution system (WDS) for serval decades. These models have been used in WDS simulationtoolkitsandhaveplayedacriticalroleinthedesign,operation,andmanagement of WDSs in industry and research. In recent years, a number of graph theory based WDSsolutionmethodshavebeendeveloped. Thesemethodshaveexploredthestructural properties (both matrix and graph) of the problem to improve the speed and reliability of WDSsimulations. Onequestionthatnaturallyarisesis whichmethodor combinationof methodsshouldbeapplied? In this thesis, a WDS simulation testbed, called WDSLib, has been developed as a toolthatcanbeusedtoanswertheabovequestion. WDSLibisanextensiblesimulation toolkit for the steady-state analysis of a WDS. It has been created using modularised object-oriented design and implemented in C++ programming language. WDSLib can be used (1) to implement, test, and compare different solution methods, (2) to focus the researchonthemosttime-consumingpartsofasolutionmethod,(3)toguidethechoice of solution method when multiple simulation runs are used (such as occurs in a genetic algorithmrun). WDSLibhasbeenusedtoinvestigatetheperformanceoffoursolutionmethods,namely the global gradient algorithm (GGA), the reformulated co-tree flows method, the GGA withtheforest-corepartitioningalgorithm(FCPA),andtheRCTMwiththeFCPA,oneight casestudybenchmarknetworkswithbetween934and19647pipesandbetween848and 17971 nodes. The results can be used to inform the choice of the solution method for a givencombinationofthenetworkfeaturesunderdifferentdesignsettings. Thisworkalso demonstrateshowto(1)usetheWDSLibtoimplement,test,andbenchmarktheexisting solution methods and (2) use the results to determine which method or combination of methodstousedunderasettingofinterest. Anewgraphtheoryalgorithm,calledthebridge-blockpartitioningalgorithm(BBPA), has been proposed which further partitions the WDS network in a number of bridge components and a number of block components. The BBPA is also implemented in the WDSLib in order to ensure a fair comparison with the existing methods. The BBPA is a pre-processing and post-processing method, the use of which provides significant advantages over the current methods in terms of both the computational speed and the reliability of the solution. This work also demonstrates how to (1) use the WDSLib to implement, test, and benchmark the new solution method and (2) use the WDSLib to demonstrate the efficiency of new method without having to reengineer the content of sharedWDSLibfunctionsanddatarepresentations. iii
ADE
Chapter1. IntroductionandPublicationsOverview In a hydraulic simulation, there are two sets of primary equations that govern the underlyingrelationshipsofaWDSundersteady-stateconditions: asetofmassconservation or continuity equations and a set of energy conservation equations. Some assumptions aremade tosimplify thegoverningequations ofa hydraulic simulationincluding: (1)that the velocity heads are negligible when compared to the friction head losses, (2) that the minorheadlosses atthepipejunctionsandfittings aremuchsmallerthanthefrictionhead losses, (3)water isincompressible, (4)thedemandsare consideredtooccur ataparticular time instance and are concentrated at the nodes of a network, and (5) the demands are independentof nodalpressure. Withthe aboveassumptions,the twogoverningequations mentionedabovecanbedescribedas: (1)themassconservationequations: thetotalinflow mustequaltothetotaloutflowatanynode;(2)theenergyconservationequations: thehead differencemustbeequaltothefrictionheadlossforanypipe. Thesetwosetsofgoverningequationscanbeformulatedasalargeandsparsenon-linear saddle point problem (Benzi et al. 2005). There is a number of well-known iteration methods for solving this non-linear saddle point problem. These include: range space methods(TodiniandPilati1988), nullspacemethods (Rahal 1995;Elhayetal. 2014),and loop-based methods (Epp and Fowler 1970; Nielsen 1989). Moreover, the use of graph theoryhasbecameincreasinglypopularindevelopingsolutionmethodstoimproveboth the efficiencyand thereliability of WDSsolution process. Themain reasonunderpinning thephilosophyofusinggraphtheorywithhydraulicsimulationistheinvariantnatureofthe networktopology. Thisfixedtopologycanoftenbeexploitedasapre-and-post-processing steptospeed-upthecomputations. Range Space Methods: Theglobalgradientalgorithm(GGA)(TodiniandPilati1988), a range space method, employed block elimination to reduce the size of the key matrix. Although graph theory is not used when deriving GGA solution method, the node-arc incidencematrix, whichwasfirstusedin Todiniand Pilati(1988)todescribe thenetwork topology, provides a portal into using graph theory to simplify the solution process of a WDSnetwork. Simpsonetal.(2012)developedtheconceptofseparatingtheforestand core components while Deuerlein (2008) introduced the forest-core partitioning algorithm (FCPA). The forest component is separated out from the core by sweeping the node-arc incidence matrix. After the forest component is separated out, a standard GGA is then applied to the core component of the network. The main advantage of the FCPA is to separatetheforest,whichislinearcomponentofthesystemofequations,fromthecore, whichisthenonlinearcomponentofthesystemofequations. Thisprocessspeedsupthe demand-dependentmodel(DDM)solutionprocesswhenanetworkhasasignificantforest portion. Later, the graph matrix partitioning algorithm (GMPA) (Deuerlein et al. 2015) wasproposed. TheGMPAexploitedthelinearrelationshipsbetweenflowsoftheinternal treeswithinthecoreandtheflowsofthecorrespondingsuper-linksaftertheforestofthe networkhadbeenremoved. Loop-Based Methods: The Hardy Cross method (Cross 1936), a loop based method, is the oldest method. In the Hardy Cross method, the system of equations is solved by successiveapproximation,inwhichasetofflowsthatsatisfiescontinuityissuccessively correctedloopbyloopuntilthepredefinedstoppingtesthasbeenmet. Inanotherpaper, Epp and Fowler (1970) developed a programmable version of the Hardy Cross method. However,theloop-basedmethodisnotwidelyusedbecause(1)itrequiredtheidentification oftheloops,(2)itrequiredtheuseofapseudo-sourceifthenetworkhasmorethanone source,and(3)itrequiredthedeterminationasetofinitialflowsthatsatisfiescontinuity. Deuerlein(2008) proposeda decomposition model forWDS graph, inwhich thenetwork 2
ADE
Chapter1. IntroductionandPublicationsOverview solution methods. Moreover, a number of graph theory based WDSsolution methods have been efficiently implemented to provide a fast simulation platform for both once-off and multi-runsimulationsettings. Aim#2: Toprovideinsightinthechoiceofsolutionmethodsforgivencombinations ofnetworkfeaturesand givendesignsettings Itisoftendifficult,ifnotimpossible,to determine a priori what method or combination of methods to use for a given network topology. ThesimulationplatformdevelopedinAim#1isusedtobenchmarkthehydraulic solutionofa numberofcasestudywater distributionnetworkswithavariety oftopology features. Thecorrelationsbetweenthesetopologyfeaturesandtherelativeperformanceof themethodsofinterestarestudied. Aim #3: To develop a new graph theory based algorithm to further partition the WDS Anewalgorithmthatcanbeusedtofurtherpartitionthenetworkisproposed. This algorithmis implementedin thesimulation platformdeveloped inAim #1anda detailed casestudyiscarriedoutexploringthealgorithm’sefficiencyanditsreliability. 1.3 Publications Thisthesisiscomprisedofthreepublications. Theircontributiontothebodyofknowledge isalignedwiththeresearchaimsinSection1.2. Thissectiongivesabriefdescriptionfor eachpublicationanditscontribution. Chapter 3 presents the development of an extensible simulation platform, WDSLib, for the demand-driven steady-state analysis of aWDS. WDSLib has been created using a modularised object-orienteddesign and implementedin the C++ programming language, and has been validated against a reference MATLAB implementation. Two solution methods, namely the global gradient algorithm (GGA) and the reformulated co-tree flowsmethod(RCTM),andapre-processingandpost-processingmethod,theforest-core partitioningalgorithm(FCPA),arecurrentlyimplementedinWDSLib. Chapter4presentsathoroughbenchmarkstudytocomparetheperformanceofGGA, GGA with FCPA, RCTM, and RCTM with FCPA using WDSLib developed in the first publication. Theresultsofthis studywillhelpinformthechoiceof solutionmethodsfor givencombinationsofnetworkfeaturesandgivendesignsettings. Chapter5proposesabridge-blockpartitioningalgorithm(BBPA)thatfurtherpartitions the network into bridges, blocks and cut-vertices. It has been shown that the use of the BBPA is not only able to significantly reduce the computation time of the once-off simulation and the multi-run simulation, but also able to improve the reliability of the solution. 1.3.1 Contributions to the development of a WDS Simulation Platform for WDS Simulation and Optimisation A number of contributions have been made in developing a framework for efficiently incorporating graph theory in a WDS simulation model that can be used for simulation, optimisation,andmanagementofaWDSnetwork. Thesecontributionsarepresentedwhile describingtheworkflowsinvolvedindifferentgraphtheorybasedWDSsolutionmethods. 4
ADE
Chapter 2 Review of the Existing Water Distribution System Solution Methods Thischapterreviewsthefundamentalaspectsofthehydraulicanalysisofasteady-state demand-driven water distribution system. The system of equations for a WDS is first described in Section 2.1. Section 2.2 describes some of the recent applications of graph theoryconceptsinthesolutionofthesteady-stateproblemforawaterdistributionsystem. Then, inSection 2.3,the solutionmethods thatare usedto simulatethe steady-stateof a WDSarereviewed. 2.1 WDS Model equations Thisthesisconsidersademand-drivenwaterdistributionsystemwithn pipes,n unknown- p j head nodes and n fixed-head nodes. The j-th pipe of the network can be characterised f by its diameter d , length l , resistance factor r . The i-th node of the network can be j j j characterisedbyitsnodaldemandd ,andtheelevationheadz . i i Let q = (q ,q ,....q )T denote the vector of unknown flows, h = (h ,h ,....h )T 1 2 np 1 2 nj denote the vector of unknown heads, r = (r ,r ,....r )T denote the vector of pipe 1 2 np resistance factors, d = (d ,d ,.....d )T denote the vector of nodal demands, e = 1 2 nj l (e ,e ....e )T denotethevectoroffixedheadelevations. l 1 l 2 lnr The head loss exponent n is assumed to be dependent only on the head loss model: n = 2 for the Darcy-Weisbach head loss model and n = 1.852 for Hazen-Williams head loss model. The head loss within the pipe j, which connects the node i and the node k, is modelled by h h = r q q n 1. Denote by G(q) Rnp np, a diagonal square i k j j j − × − | | ∈ matrix with elements [G] = r q n 1 for j = 1,2,....n . Denote by F(q) Rnp np, jj j j − p × | | ∈ a diagonal square matrix where the j-th element on its diagonal [F] = ∂ [G] q . jj ∂qj jj j The unknown-head node-arc incidence matrix A is full rank, where [A ] is used to 1 1 ij representtherelationshipbetweenpipeiandnodej: [A ] = 1ifpipeientersnodej, 1 ij − [A ] = 1ifpipeileavesnodej,and[A ] = 0ifpipeiisnotconnectedtonodej. The 1 ij 1 ij matrixA isthe fixed-headnode-arc incidencematrix,where [A ] isused torepresent 2 2 ij therelationshipbetweenpipeiandfixedheadnodej: [A ] = 1ifpipeientersfixed 2 ij − headnodej,[A ] = 1ifpipeileavesfixedheadnodej,and[A ] = 0ifpipeiisnot 2 ij 2 ij connected to fixed head node j. The steady-state flows and heads in the WDS system 9
ADE
Chapter2. ReviewoftheExistingWaterDistributionSystemSolutionMethods SpanningTree Aspanningtreeisanacyclicsubgraphwhichtraverseseverynodeina graph,suchthattheadditionofanyco-treeelementcreatesaloop. Anacyclicgraphisa graph having no graph cycles. A WDS, with or without a forest, can be partitioned into two subgraphs: a spanning tree component, G = (V ,E ), and a set of co-tree edges, st st st E , so that E E = E , E E = . This relationship can sometimes be used to ct st ct c st ct ∪ ∩ ∅ furtherexploittheblockstructureoftheJacobianmatrixtoproduce,inrealisticWDSs,an evensmallerkeymatrix. Thisisachievedbydealingseparatelywiththespanningtreeand theco-treeintheNewtonmethodlinearisation. Loop A loop, know as a simple cycle in graph theory, is a path of edges and vertices wherein a vertex is reachable from itself with no repetitions of vertices and edges. Two loops,C andC ,canbeusedtoformanotherloopbyusingthesymmetricdifferenceof 1 2 twosets((C C ) (C C )). Thesetofallloopsiscalledthecyclespace. Consider 1 2 1 2 ∪ − ∩ aconnectedgraphG=(V,E)withaspanningtreeG Gandthecomplementaryco-tree st ∈ edges E . For every co-tree edge e E there is a unique cycle C in G +e; these ct ct e st ∈ cyclesC arethefundamentalcyclesofGwithrespecttothespanningtreeG . e st IfT isaspanningtreeorspanningforestofagivengraphG,andeisanedgethatdoes notbelongtoT,thenthefundamentalcycleC definedbyeisthesimplecycleconsisting e ofetogetherwiththepathinT connectingtheendpointsofe. Thereareexactlyn n +c p j − fundamentalcycles,oneforeachedgethatdoesnotbelongto T . Each ofthemislinearly independentfromtheremainingcycles,becausetheyincludeanedgeethatisnotpresent inanyotherfundamentalcycle. Therefore,thefundamentalcyclesformacyclebasisfor thecyclespace. Acyclebasisofagraphisaminimalsetofsimplecyclesthatallowsevery cycleinthecyclespacetobeexpressedasasymmetricdifferenceofbasiscycles. Minimum cycle basis The cycles that can be made by a spanning tree and the corresponding co-tree is a subset of the cycle space. In cycle-based methods, it is often preferable to use a shortest cycle basis. The Shortest Maximal Cycle Basis (SMCB) is a cycle basis B of a given graph G with the property that the length of the longest cycle includedinBisthesmallestamongallbasesofG.Itispossibletominimisethenumberof non-zerosinthekeymatrixofloop-basedmethodsbyusingashortestcyclebasis. 2.3 Solution Methods We consider three types of hydraulic solution methods: (1) range space methods, (2) loop-based methods and (3) null space methods. These three types of solution methods and the applications of graph theory in each of the three categories are discussed in the followingsections. 2.3.1 Range Space Methods Theglobalgradientalgorithm(GGA),arangespacemethod, was first proposedbyTodini andPilati(1988). TheyappliedblockeliminationtoEq. (2.5)toyieldatwo-stepNewton solverforthecaseswhentheheadlossismodelledbytheHazen-Williamformula: h(m+1) = U 1 nd+A T [(1 n)q(k) G 1A e ] (2.6) − 1 − 2 l − − − n o 11
ADE
Chapter3. Publication1: WDSLib: AWaterDistributionSystemSimulationTestBed data acquisition (SCADA) operational setting, and (4) to adjust control devices, such as valves, in a management setting. In the design setting and both the above operational settings,repeatedhydraulicassessmentisrequiredonanetworkwithfixedtopology. Inthe management setting, repeated hydraulic assessment is required on a network with flexible networkparametersettings. Withever-increasingnetworksizesandtheneed forreal-time managementusingaSCADAsystem,itisimportanttohavearobustsimulationpackage whichcanbeconfiguredtobemaximallyefficientwhateverthesetting. Inthefieldofhydraulicsimulation,thesystemofequationscanbeformulatedasalarge andsparsenon-linearsaddlepointproblem. Thereareseveralwell-knowniterationmethods for solving the non-linear saddle point problem. These include: range space methods (GlobalGradientAlgorithm(TodiniandPilati1988)),Nullspacemethods(Co-Treeflow formulationvariations(Rahal1995;Elhayetal.2014)),andloop-basedmethods(Loopflow correction(Cross1936)). Theirrelativeperformanceintermsofspeed,rate-of-convergence, and accuracy depends among other things on the topology of the target network: size of the forest component, the number of network loops, and the density of these network loops. It is difficult to evaluate the impact of these topology factors by only examining the incidence matrix that describes the pipe network connectivity. As a result, the best method to use for a particular network cannot be easily determined a priori. Moreover, extracomplexity isintroducedwhenamulti-runhydraulic assessmentisrequired. During a multi-run hydraulic simulation, the elapsed computation time of each method can be brokendownintotwoparts: thecomponentsthatareonlyrequiredtobeperformedonceat theverybeginningforthesamenetwork,calledtheoverhead,andthecomponentsthatare required to be carried out repeatedly for each separate run until the required number of iterations has been met, called the hydraulic-phase. It is desirable to have a simulation platform,giventhedifferentlevelsofrepetition,toimplementthesealternativealgorithms efficiently. Equippedwithsuchaplatformauserwouldbeabletoeasilybenchmarkthe performanceofalternativemethodsonasmallnumberofevaluationsforagivennetwork and use that performance to inform the choice of algorithm to use for either a once-off simulationsettingorforamultiplesimulationsetting(suchasforanevolutionaryalgorithm (EA)). ThisworkdescribesanextensibleWDSsimulationplatformcalledWDSLib. WDSLib is a numerically robust, efficient and accurate C++ library that implements many WDS simulation methods. WDSLib is written using a modular object-oriented design which allowsuserstoeasilymixandinterchangesolutioncomponents,therebyenablingusersto avoidredundantcomputations. Ithasbeenoptimizedtousesparsedatastructureswhich areorientedtothepatternofaccessrequiredforeachsolutionmethod. WDSLibhasbeen validatedforaccuracyonarangeofrealisticbenchmarkwaterdistributionnetworksagainst referenceimplementationsandtestedforspeed. Theprogramacceptstheinputfileformats ofthe industrystandardEPANET2 (Rossman 2000)toolkit andits performanceis faster thanEPANET2inalltestedsettingsandbenchmarks. Theremainderofthispaperisstructuredasfollows. Thenextsectiondescribesrelated methodologies and implementations. A general description of the WDS demand-driven steady-state problem is given in the next section. Section 3.6 presents a mathematical formulation of the network and the solution methods that are used in WDSLib. The tool-kitstructureisthengiveninsection3.7. Thisisfollowed,insection3.8,bythetoolkit implementation details. Section 3.9 provides some examples of how the toolkit can be utilized in a simulation work flow. The results are discussed in Section 3.10. Finally, section 3.11 summarizes the results of this paper and describes future extensions to the 23
ADE
Chapter3. Publication1: WDSLib: AWaterDistributionSystemSimulationTestBed toolkit. 3.5 Background This section describes related water distribution system network solution methods and implementations. The first sub-section describes solution methods, including those used byWDSLib. This isfollowed by adescription ofcurrentlyavailableimplementations and comparesthesewithWDSLib. 3.5.1 Related Methods Thisresearchconsidersawaterdistributionmodelmadeupofenergyconservationequations andthedemanddrivenmodelcontinuityequations. TheHardyCrossmethod(Cross1936), also known as the loop flow corrections method, is one of the oldest methods and uses successive approximations, solving for each loop flow correction independently. It is a methodthatwaswidelyusedforitssimplicityatthetimewhenitwasintroduced. More thanthreedecadeslater,EppandFowler(1970)developedacomputerversionofCross’s methodandreplacedthenumericalsolverwiththeNewtonmethod,whichsolvesforall loop flow corrections simultaneously. However, this method has not been widely used because of the need (i) to identify the network loops, (ii) to find initial flows that satisfy continuityand(iii)tousepseudo-loops. The GGA is a range space method that solves for both flows and heads. It was the first algorithm, in the field of hydraulics, to exploit the block structure of the Jacobian matrixtoreducethesizeofthekeymatrixinthelinearizationoftheNewtonmethod. The GGAhasgainedpopularitythroughitsrapidconvergencerateforawiderangeofstarting values. This is the result of using the Newton method on an optimizations problem that hasaquadraticsurface. However,itwasreportedbyElhayandSimpson(2011)thatthe GGAfailscatastrophicallyinthepresenceofzeroflowsinaWDSwhentheheadlossis modeled bythe Hazen-Williams formula. Regularization methodshave beenproposed by bothElhayandSimpson(2011)andGorevetal.(2012)todealwithzeroflowswhenthe headlossismodeledbytheHazen-Williamsformula. TheGGAasitwasfirstproposed,appliedonlyfortheWDSsinwhichtheheadlossis modeledbytheHazen-Williamsformula,wheretheresistancefactorwasindependentof flow. Rossman(1994)extendedtheGGAtoallowtheuseoftheDarcy-Weisbachformula. Ithasbeen pointedoutinSimpson andElhay(2010), however, thatRossmanincorrectly treatedtheDarcy-Weisbachresistancefactorasindependentoftheflow. Theyintroduced thecorrectJacobianmatrixtodealwiththis. Ithasbeendemonstratedthatoncethecorrect Jacobian matrixis used, the quadratic convergence rate of theNewton method is restored. Furthermore,ElhayandSimpson(2011)reportedthattheGGAdoesnotfailinthepresence of zero flows when the derivatives of the Darcy-Weisbach Jacobian matrix are correctly computedforlaminarflows. The co-trees flow method (CTM) (Rahal 1995) is a null space method that solves for the co-tree flows and spanning tree flows separately. The CTM, unlike the loop flow correctionsmethod,doesnotrequiretheinitialflowstosatisfycontinuity. However,itdoes require: (i)theidentificationoftheassociatedcirculatinggraph;(ii)thedeterminationof the demands that are to be carried by tree branches; (iii) finding the associated chain of branchesclosingacircuitforeachco-treechord;(iv)computingpseudo-linkheadlosses. The reformulated co-trees flow method (RCTM) (Elhay et al. 2014) is also a null space 24
ADE
Chapter3. Publication1: WDSLib: AWaterDistributionSystemSimulationTestBed because there are no clearly defined interfaces for the incorporation of third-party code componentsinEPANET2,thereisnoguaranteethatindependentlyauthoredextensions willbeeasytocombinewitheachother. Intheabsenceofapopulareasy-to-modifyWDSsimulationplatformthereiscurrently no straightforward means for comparing different solution methods. To date, when new solutionmethodshavebeendevelopedtheyhavebeencomparedusingdifferentresearch systems, on different platforms with different implementation languages. This leads to difficulty in comparing methods, limits the reusability of code, and creates a barrier for researchers to reproduce and replicate results. To address these issues, an extensible framework is required that allows implementation of new methodologies to be easily incorporatedwithoutanadverseimpactontheperformanceoftherestofthesystem. To this end, a number of attempts have been made to implement an object-oriented wrappertoencapsulatetheEPANET2solver(openNet(Morleyetal.2000)andOOTEN(van Zyletal. 2003)). However,these twosystemswerefocusedonprovidingmoreflexibility in the processing of input to the core EPANET solver. They did not address any issues relatingtothe solutionprocess. CWSnet, aC++implementationinobject-orientedstyle, was produced by Guidolin et al. (2010) as an alternative to EPANET 2.0. In CWSnet, moreattentionhasbeen givento thehydraulicelements oftheWDSnetwork. Inaddition, CWSNetprovidesapressuredrivenmodel,andtakesadvantageofthecomputingpowerof the computer’s Graphics Processing Unit (GPU). However, in CSWnetthe data structures representingthenetworkarespecializedtothesolutionmethodsthatituses. Thesedata structuresarenoteasilyadaptedtoworkefficientlywiththedifferenttraversalorders,and graph algorithms used by newlydeveloped solutionmethods. However, CWSnet still uses thesamehydraulicsolverandthesamelinearsolvertechniquesimplementedinEPANET 2(Guidolinetal.2010). Toaccommodatethedeficienciesreferredtoabove,thispaperpresentsanewhydraulic simulationtoolkitWDSlib. WDSlibiscodedinC++,andincorporatesanumberofrecently publishedtechniques. Thistoolkitoffersuserstheabilityto: (i)choosefrom,ormodify, differentapproachesandimplementationsofdifferentWDSmodelanalyses,and(ii)extend thetoolkittoincludenewdevelopments. Thesefeatureshavebeenimplementedusingfast and modularized code. A focus ofattention in thisresearch has beenprogram correctness, robustnessandcodeefficiency. Thecorrectnessofthetoolkithasbeenvalidatedagainsta referenceMATLABimplementation. Thedifferencesbetweenallresults(intermediateand final)producedbytheC++toolkitandtheMATLABimplementationwereshowntobe smaller than 10 10. In the interest of toolkit robustness, special attention has been paid − to numerical processes to guard against avoidable failures, such as loss of significance throughsubtractivecancellation,andnumericalerrors,suchasdivisionbyzero. Thedata structures and code libraries in WDSLib are shared and all implementations have been carefully designed to ensure fairness of performance comparisons between algorithms. WDSLibusesapluggablearchitecturewheresolution-methods,andtheiraccompanying pre-processing and post-processing code are easily substituted. In addition, different numerical linear algebra techniques can be incorporated using a well-defined interface. This concludes the discussion of related work. The mathematical formulations of the solutionmethodsusedinWDSLibarepresentedinthenextsection. 26
ADE
Chapter3. Publication1: WDSLib: AWaterDistributionSystemSimulationTestBed networkandthepipeindexesofthecorecomponentofthenetworkfromtheAlgorithm 1 (if the FCPA is used). In this algorithm, all water sources are the starting point of the searchprocess,SN,andmarkedasvisited. ThenodesinSN arethenusedastoidentifya spanning tree within the WDS. This is achieved by repeatedly finding all adjacent pairs, nodetandpipes,ofandremovingthefirstnodeinSN byusingtheadjacencylist. Ifthe adjacent node t is not visited then node t is inserted into the spanning-tree node vector, STN, and search node vector, SN, and node t is marked as visited and pipe s to the spanning-treepipevector,STP,andpipesismarkedasvisited. Iftheadjacentnodetis visitedandthepipesisnotvisitedthenthepipesisinsertedintotheco-treepipevector, CTP andmarkpipesasvisited. ThisprocessisrepeateduntilSN isempty. Theoverall time-complexity of this algorithm is O(n + n ) (compared to O(n n ) as mentioned p j p j above)isthesameasthebestasymptoticcomplexityofbreadth-firstsearchonagraph. 3.9 Example Applications WDSLib consists of a collection of functions which can be used either as a standalone applicationforfastone-offsimulationsorasalibraryofsoftwarecomponentsthatcanbe integratedintoauser’sownWDSsolutionprocesses. Thissectionpresentstwoexample applications. The first application is the setup for a basic one-off simulation of a WDS. Thesecondapplication(describedinsubsection3.9.1)presentsanexampleusingWDSLib toimplementasimple1+1EvolutionaryStrategy(BeyerandSchwefel2002)(1+1-ESor, morecommonly,1+1EA)forsizingpipesinaWDS. Example 1 - Once-off Simulation The setup for WDSLib as a standalone application is straightforward. The user provides a configurationtextfilethatspecifiesinputandoutputfilenames;thenameofthesolver;the desiredoutputvariables;andsimulationparameters. Thesevalueshavesensibledefaults so the user can set up the solver by using a minimal configuration such as that shown in Fig.3.4. Byusingthis configfile,WDSLibis configuredtorun asinglehydraulic analysis ofthenetworkthatisstoredassay"hanoi.inp",anEPANET-formattedinputfile,under "Network/"sub-directory,usingthereformulatedco-treeflowsmethodwiththeforest-core partitioningalgorithm. Thefullsetofconfigurationparametersforonceoffsimulationsis showninFig.3.10inAppendix3.16. 3.9.1 Example 2 - A Simple Network Design Application AsaminimalistexampleoftheapplicationofWDSLibtoaWDSnetworkdesignproblem, the following example uses 1+1EA for optimally sizing pipe diameters. This algorithm takes an existing network with randomly generated pipe diameters and optimizes the networkto minimizecost,subjectto givenpressurehead constraints. A 1+1EAisavery simple evolutionary strategy (Beyer and Schwefel 2002) which starts with a randomly generated individual (in this case a WDS diameter configuration). This 1+1EA then progressesbyapplyingamutationtoarandompipediametersize,andthenevaluatingthe new individual. If the new individual is better it replaces the old network. This process continuesinaloopuntilagivennumberofevaluationsisreached. 39
ADE
Chapter3. Publication1: WDSLib: AWaterDistributionSystemSimulationTestBed Thisconcludesthepresentationofexamplesinthiswork. Thenextsectionpresentsa casestudythatillustratestheperformanceofWDSLibinamulti-simulationsetting. 3.10 Case Study The following presents timing results for WDSLib running the 1+1EA described in the previous section. The results below compare the four different solvers plus EPANET2. Note, that detailed timings for once-off simulations comparing the four methods can be foundinQiuetal.(2018). Threenetworkswerebenchmarkedintheseexperiments. These were the N , N , and N case-study networks used in Simpson et al. (2012). Table 3.7 1 3 4 summarizesthecharacteristicsofthesenetworks. Table3.7. Benchmarknetworkssummary FullNetwork Forest&CoreNetworks Co-treeNetwork Network n n n n (n /n#) n n n p j s f f p jc pc ct N 934 848 8 361(38%) 573 487 84 1 N 1975 1770 4 823(42%) 1152 947 205 3 N 2465 1890 3 429(17%) 2036 1461 757 4 Table3.8showstheresultsofthe1+1EAfromFig.3.5fortheGGA,GGAwithFCPA, RCTM, RCTM with FCPA and the EPANET2 solvers. For each of the four WDSLib solversabove,thetimingsare givenforrunningtheEAwithandwithouttheL1modules hoistedoutthemainEAloop. EachexperimentevaluatestheWDSnetwork100,000times. Andthebestperformingmethodforeachnetworkishighlightedinbold. Itisimportantto notethat1+1EAusingboththeGGAandtheWDSLib Table 3.8. The actual 1+1 Evolutionary Algorithm run-time with 100,000 evaluations (min.) foreachofthefoursolutionmethodsappliedtonetworksN ,N ,andN 1 3 4 GGA GGAwithFCPA RCTM RCTMwithFCPA EPANET min. min. min. min. min. N 6.73 4.64 4.53 4.13 9.81 1 N 15.21 9.79 13.75 10.30 26.43 3 N 21.14 16.29 23.92 21.93 67.11 4 The results show that the EA runs using WDSLib are substantially faster than the runs using the EPANET2 solver. This is, in part, due to the fact that the EPANET2 solveris designedasa standalonesolverwhichdoesnot facilitatelifting outofinvariant computationsfromtheEAloop. Asa demonstrationofhow theperformanceof anEA canbetraced Fig.3.9 showsthe evolutionofthefitnessvaluesoftheN network. Thesetraceswereextractedfromafile 1 written to in line 9 in Fig. 3.8. As can be seen, the cost and the pressure head violation terms drop during the EA run. Note that there will be considerable variation between 1+1EArunsduetoitshighlystochasticnature. 43
ADE
Chapter4. Publication2: ABenchmarkingStudyofWaterDistributionSystemSolution Methods 4.2 Abstract In recent years a number of new WDS solution methods have been developed. These methods have been aimed at improving the speed and reliability of WDS simulations. However,todate,thesemethodshavenotbeenbenchmarkedagainsteachotherinareliable way. Thisresearchaddressesthisproblembyusinganewlydevelopedsoftwareplatform, WDSLib, as a fair basis for a detailed comparison of the performance of these methods under different settings. In this work, efficientimplementations of three solution methods, the Global Gradient Algorithm (GGA), the forest-core partitioning algorithm (FCPA), and thereformulatedco-treeflowmethod(RCTM),andcombinationsofthese,arecompared on eight case study benchmark networks containing between 934 and 19647 pipes and between 848and 17971nodes. These simulationswere carriedout underboth aonce-off simulationsettingandamultiplesimulationsetting(suchasoccursinageneticalgorithm). Timingsfor thesebenchmarkruns aredecomposed intostagesso thattheperformance of thesemethodscanbeeasilyestimatedfordifferentsettings. Theresultsofthisstudywill helpinformthechoiceofsolutionmethodsforgivencombinationsofnetworkfeaturesand givendesignsettings. Inaddition,timingresultsarecomparedwithEPANET2. 4.2.1 Keywords water distributionsystems solution;Forest-Core Partitioning Algorithm;Global Gradient Algorithm;ReformulatedCo-treeFlowMethod;hydraulicanalysis;EPANET. 4.3 Introduction Water Distribution Systems (WDSs) are frequently modeled by a system of nonlinear equations,thesteady-statesolutionsofwhich,theflowsandheadsinthesystem,areused in WDS design, management and operation. In a design setting, the solutions might be used as part of an optimization problem to determine the best choices of some network parameterssuchaspipediameters. Inamanagementsetting,thesolutionsmightbeused for the calibration of network parameters such as demand patterns. In an operational environment, new solutions might be needed to adjust control device settings whenever newsupervisorycontrolanddataacquisition(SCADA)informationbecomesavailable. ThemostwidelyusedWDSsimulationmethodincurrentuseistheGlobalGradient Algorithm(GGA)(TodiniandPilati1988),whichsolvesthenon-linearsystemofequations representingtheWDS.TheGGAanditsimplementationsexhibitexcellentconvergence characteristics for a wide range of starting values and a wide variety of WDS problems. However, some networks have structural properties which can be exploited to further improvetheefficiencyofthesolutionprocess. TheGGA,arangespacemethod,exploits theblockstructureofthefullJacobianmatrixinordertoproduceasmallerkeymatrixinthe linearizationoftheNewtonmethod. Thereformulatedco-treeflowsmethod(RCTM)(Elhay etal.2014),anull-spacemethod(Benzietal.2005),canfurtherexploittheblockstructure of the Jacobian matrix to produce, in realistic WDSs, an even smaller key matrix. This is achieved by dealing separately with the spanning tree and the co-tree in the Newton methodlinearization. AnotheravenueforreducingcomputationcanbeexploitedbyusingtheForest-Core Partitioning Algorithm (FCPA) (Simpson et al. 2012) to separate the problem into its linearandnon-linearcomponents. TheobservationunderpinningtheFCPAisthatmost 56
ADE
Chapter4. Publication2: ABenchmarkingStudyofWaterDistributionSystemSolution Methods WDSs have trees, the collections of which are called forests. The complement of the forestinanetworkiscalledthecore. Theflowsinaforestcanbecomputeda-prioribya linear process. Hence, the dimension of the key matrices in the solution process can be significantlyreducedwhentheforestisalargepartofthenetwork. Withthedevelopmentofdifferentsolutionmethods,WDSsimulationpackageusersare facedwithachoiceofwhichsolutionmethodormethodstoapply. Previouspublications performedcasestudiescomparingtheperformancesoftheirrespectivemethodstotheGGA. However, thesecomparisonswereoften doneusingdifferent implementationlanguages, and different levels of code optimization – which makes cross-comparison of methods difficult. Consequently, there is a need for a study which reliably compares the relative performanceofthesemethods usingafast,carefully designedcodeimplementation. To thisend,thisworkpresentsathoroughbenchmarkstudytocomparetheperformanceof GGA,GGA-with-FCPA,RCTM,andRCTM-with-FCPAforarangeofcasestudynetworks usingafastC++implementation. Thetimingsfortheserunsaredecomposedaccording tohowofteneachsolutioncomponentisexecutedindifferentsimulationsettings. From thesetimingsitispossibletoaccuratelypredictruntimesforlong-runmultiplesimulation settings. Toconfirmtherelevanceoftheseresults,thetimingshavebeencomparedwith thespeed ofthe industrialand research standard toolkitof EPANET2 (Rossman2000) and wasfoundtobefasterinallcases. Thispaperisorganizedasfollowed. Adetailedreviewofexistingsolutionmethodsis given in the next section. The section following presents the mathematical formulation of each method. The motivation for a benchmark study is then given, followed by the methodology used in this paper to carry out a benchmark study. The description of the module categorization is then presented. This is followed by a case study of the four solutionmethods appliedtotheeight casestudynetworks. The resultsarediscussedin the nextsection. Thelastsectionofferssomeconclusions. 4.4 Literature Review This section provides a review of the algorithms that are tested in this paper. A brief developmenthistoryofWDSsolutionalgorithmsispresentedinthefirstsubsection. The nextsubsectiongivesanoverviewoftheGGAanditsdevelopment,followedbyanoverview of solution methods which use the null space approach (such as co-trees flow method (CTM) and RCTM). Finally, a review of the methods that use graph theory to simplify problemcomplexityarepresented. 4.4.1 Development history of the WDS algorithms Thisresearchconsidersawaterdistributionmodelmadeupofenergyconservationequations andthedemanddrivenmodelcontinuityequations. TheHardyCrossmethod(Cross1936), also known as the loop flow corrections method, is one of the oldest methods and uses successive approximations, solving for each loop flow correction independently. It is a methodthatwaswidelyusedforitssimplicityatthetimewhenitwasintroduced. More thanthreedecadeslater,EppandFowler(1970)developedacomputerversionofCross’s methodandreplacedthenumericalsolverwiththeNewtonmethod,whichsolvesforall loop flow corrections simultaneously. However, this method has not been widely used because of the need (i) to identify the network loops, (ii) to find initial flows that satisfy continuityequationand(iii)tousepseudo-loops. 57
ADE
Chapter4. Publication2: ABenchmarkingStudyofWaterDistributionSystemSolution Methods 4.6.3 Network Partitioning Associated with a WDS is a graph G=(V, E), where the elements of V are the nodes (vertices) of the graph G and elements of E are the pipes (links) of the graph G. In this subsection, the permutation of the system equations (4.3) for the FCPA is introduced, followedbyadescriptionoftheRCTM,whichfurtherexploitstheblockstructureofthe Jacobianmatrix. Forest-CorePartitioningAlgorithm Inademand-drivenmodel,itispossibletoexploitthefactthateveryWDScanbedivided intotwosubgraphs: atreedsubgraph(forest)G = V ,E andaloopedsubgraph(core) f f f G = (V ,E ),sothatE E = E,E E = (cid:16),V V(cid:17) = V. Allflowsandheadsin c c c f C f C f C ∪ ∩ ∅ ∪ boththeforestandthecoremustbefound. Theflowsintheforestcanbefoundbyalinear process before the iterative solution phase and theheads in the forest can be found linearly aftertheiterativephase. Simpson et al. (2012) proposed the FCPA, which partitions the network into a treed component and a looped component (referred to as the core) thereby reducing the com- putationtimewherethenetworkhasasignificantforestcomponent. TheFCPAstartsby generatingapermutationmatrix n n p j n S O f n P O P = pc  (4.9) 1 n O C jc   n O T  f     S , where Rnp np is the square orthogonal permutation matrix for the pipes, "P # ∈ × S Rn f np is the permutation matrix which identifies the pipes in the forest as distinct × ∈ fromthoseofthecoreoftheWDS,P Rnpc×np isthepermutationmatrixforthepipes ∈ C in the core of the WDS, Rnj nj is the square orthogonal permutation matrix for "T # ∈ × the nodes, C Rnjc×nj is the permutation matrix for the nodes in the core of the WDS, ∈ T Rn f nj isthepermutationmatrixwhichidentifiesthenodesintheforestasdistinct × ∈ fromthoseofthecoreoftheWDS. Anewlemmaisproposedasfollows: LEMMA1. Suppose n m P Q = 1 , m S 2 ! Q Rn n, is an orthogonal permutation matrix and that D = diag d ,d , ,d × 1 2 n ∈ { ··· } ∈ Rn n isdiagonal. Then × PDST = 0 (4.10) 62
ADE
Chapter4. Publication2: ABenchmarkingStudyofWaterDistributionSystemSolution Methods where: R = K A RT ; R = K A RT ; L = R R T ; F(m) = K F(m)K T ; 1 1 1 2 2 1 21 − 2 −1 1 1 1 F(m) = K F(m)K T G(m) = K G(m)K T ; G(m) = K G(m)K T ; a = K A e ; 2 2 b2 1 1 b 1 2 2 2 1 b1 2 l a = L K A e +K A e ; W(m) = L (F(m) ) 1L T + (F(m) ) 1. Note that in 2 21 1 b2 l 2 2 l b 21 1 − 21 b 2 − b Eq. (4.20), an initial set of the co-tree flows q(0) is needed to commence the solution 2 b b process. The heads are found after the iterative process of the RCTM by using a linear solution process: R h = F q(m+1) (F G )q(m) a (4.22) 1 1 1 − 1 − 1 1 − 1 Thispartitioningofthenetworkequationsreducesthesizeofthenon-linearcomponent ofthesolverton n (thenumberofco-treeelementsinthenetwork). Ithasbeenproven p j − by Elhay et al. (2014) that the RCTM and the GGA have identical iterative results and solutionsifthe same startingvaluesareused. However,forRCTM,theuseronlyneeds to set the initial flow estimates for the co-tree pipes, q(0) , in contrast to GGA where initial 2 flow estimates are required for all pipes. The flows in the complementary spanning tree pipesaregeneratedbyEq.(4.20). 4.7 Methodology This section describes the methodology used to carry out a comparative study of the WDS solution methods. The following describes the software platform used to run the benchmarking simulations. This description is followed by the proposed algorithm evaluationmethod. 4.7.1 The Software Platform Torunthebenchmarktestsrequiredbythisstudyahydraulicsimulationtoolkit,WDSLib, wascreated. Thistoolkit,writteninC++,incorporatedthesolutionmethodsstudiedinthis paper,whichincludetheGGA,theGGAwiththeFCPA,theRCTM,andtheRCMTwith theFCPA.Inordertoprovideausefulplatformforcomparison,thesolutionmethodswere implemented using fast and modularized code. A focus of attention in this research has beentheimplementationcorrectness,robustnessandefficiency. Thecorrectness∗ ofthe toolkithasbeenvalidatedagainstareferenceMATLABimplementation. Thedifferences betweenallresults(intermediateandfinal)producedbytheC++toolkitandtheMATLAB implementation were shown to besmaller than 10 10. Inthe interestof toolkitrobustness, − specialattentionhasbeenpaid tonumericalprocessestoguardagainstavoidablefailures, suchaslossofsignificancethroughsubtractivecancellation,andnumericalerrors,such as division by zero. The data structures and code libraries in the toolkit are shared and all solution method implementations have been carefully designed to ensure fairness of performancecomparisonsbetweenalgorithms. The following subsections describe the measures taken in the implementation the solutionmethodstohelpensurethevalidityofthetimingexperimentsforthecasestudy results. Theseincludemeasurestoensureaccuratetimingresults,minimizationofmemory use,andnumericalrobustness. ∗termsrecognizedinComputerSciencewillbedesignatedbyasterisksuperscript 65
ADE
Chapter4. Publication2: ABenchmarkingStudyofWaterDistributionSystemSolution Methods RCTM,and(iii)reducethenumberofpipesinthespanningtree. Thiscanbeseenbythe per-iterationexecutiontimesforeachoftheL modules,whichareshownintheTable4.6. 3 Table 4.7. The number of iterations required for each of the four solution methods to satisfythestoppingtestfortheeightcasestudiesnetworks. The"relativediff."referstothe relativedifferencecomparedtothenumberofiterationsfortheGGA GGA GGAwith RCTM RCTMwith Relativediff. FCPA FCPA usingRCTM N 8 8 12 12 +50% 1 N 8 8 13 13 +62.5% 2 N 8 8 9 9 +12.5% 3 N 9 9 13 13 +44.4% 4 N 8 8 10 10 +25% 5 N 10 10 12 12 +20% 6 N 9 9 13 13 +44.4% 7 N 9 9 11 11 +22.2% 8 Thenumberofiterationsrequiredforeachofthefoursolutionmethodstosatisfythe stopping test for the eight case studies networks is shown in the Table 4.7. It is evident from Table 4.7 that the GGA took exactly the same number of iterations to satisfy the stopping test with or without the FCPA. The flows in the forest network satisfy a linear system,whichdoesnotchangefromoneiterationtothenext. Therefore,theflowsinthe forestpipesreachtheirsteady-stateafterthefirstiteration. Similarly,theRCTMwithor without FCPA takes the same number of iterations. In the cases that were analyzed in this study, the RCTM required a greater number of iterations to satisfy the stopping test comparedto theGGA.Thisis becausedifferentmechanisms areusedto generate asetof initialflowsforthetwomethodsasdiscussedpreviously. ItisworthusingtheFCPAinconjunctionwithboththeGGAandRCTMforaonce-off simulation given that FCPA decreases the L per-iteration time without increasing the 3 numberofiterationspermodule. Interestingly,asmallerper-iterationtimeisrequiredby theL modulesoftheRCTMexceptfornetworkN . However,RCTMrequiresagreater 3 8 numberofiterationsforallthecasestudynetworks. Thissometimescausesagreatertime fortheRCTMtosatisfythestoppingtest. 4.9.2 Multiple Simulation Setting The performance of the four solution methods under the multiple simulation setting are compared. Pipediametersfortheeightcasestudynetworkswererandomlygeneratedat eachevaluationtosimulateanevolutionaryalgorithmrun. Itisimportanttonotethatthe useof randomly generated pipediametersgivesan overestimateof thetotalruntime. This is because, as EA’s progress, the pipe diameters in its population become increasingly realistic,which,onaverage,shouldreducethenumberofiterationsattheL level. 3 Table4.8 and Table 4.9 show thedetailed timing resultsof multiple simulationswith number of evaluations N = 100,000 for each of the four solution methods applied to E thenetworksN andN . Table4.8showsthatexploitingthetreednatureofnetworkN 1 8 1 givestheFCPAa29%timesavingovertheGGAand15%timesavingovertheRCTM.A smallersavingisachievedbytheuseoftheFCPAfornetworkN : 14%fortheGGAand 8 9%fortheRCTM.Inamultiplesimulationsetting,theRCTMismoretiming-consuming 73
ADE
Chapter 5 Publication 3: A Bridge-Block Partitioning Algorithm for Speeding up Analysis of Water Distribution Systems 5.1 Synopsis In Chapter 4, WDSLib, a waterdistribution system simulation toolkit thatwas developed inChapter3,wasusedasafairbasisforadetailedcomparisonoftheperformanceoffour waterdistributionsystemsolutionmethods,namelytheglobalgradientalgorithm(GGA), the GGA with the forest-core partitioning algorithm (FCPA), the reformulated co-tree flowsmethod(RCTM),andtheRCTMwiththeFCPAunderdifferentsettings. Another typeofgraphproperty,bridgeandblockcomponents,hasbeeninvestigatedinthischapter. The bridge-block partitioning algorithm (BBPA)begins by using theFCPA toseparate the forest component from the core component. Then, the BBPA further partitions the core componentofthenetworkintoblockandbridgecomponents. Bridgecomponentsarethepipesinthecorethatarenotpartofanyloop. Thesolutions for thebridge componentscanbe foundbya linearprocess– inthesame way ascanthe forestcomponent intheFCPA.Theremainder ofthenetworkisconsistingofblocks and solutionsfortheseblockcomponentscanbefoundseparately. Itispossibletoseparatetwo blockswithasinglenodecalledacut-vertex. Theadvantagesinspeedandreliabilityfor the BBPA arise, in part, fromthe smaller systems thatresult from partitioning thenetwork intothesesmallerblocks,ifthecorecomponentoftheWDSgraphisone-connected. TheBBPAexploitsthefactthattheflowsandheadsinoneblockcomponentareweakly coupledwiththoseoftheotherblockcomponentsandthesolutionoftheflowsandheads in a bridge component is a linear process. The convergence rate for the solution of the core component of a WDS, without the BBPA, is restricted to that of the worst block of the network. The number of iterations required by each block is bounded above by that requiredbytheunpartitionedsystem. The use of BBPA can also improve the reliability of the solution. The numerical reliability of the solution can be determined by the condition number of the Schur complement. Theconditionnumberofamatrixistheratioofthelargesttothesmallest singular value of any square matrix. In most cases, the condition numbers for all the individualblockswillbesmallerthantheconditionnumberofthefullmatrix. In this Chapter, the advantage of using BBPA is demonstrated on eight case studies withbetween932to19647pipesandbetween848and17971nodes. Theglobalgradient 77
ADE
Chapter5. Publication3: ABridge-BlockPartitioningAlgorithmforSpeedingup AnalysisofWaterDistributionSystems 5.2 Abstract Manywaterdistributionsystem(WDS)solutionmethodshavebeendevelopedtoperform demand-driven steady-state analysis. These methods are used to solve the non-linear systemofequationsthatmodelaWDS.WDSnetworkshavestructuralpropertiesthatcan oftenbeexploitedtospeedupthesesolutionmethods. Onesolutionmethodthatexploits these structural propertiesis theforest-core partitioning algorithmthat was proposedas a pre-processing and post-processing method that can be used to separate the network into a linear forest component and a non-linear core component. This paper presents a complementarymethodforpre-andpost-processingcalledthebridge-blockpartitioning algorithm (BBPA). This method further partitions the core component of the network into anumberoflinearbridgecomponentsandanumberofnon-linearblockcomponents. The use of BBPA to partition a WDS network provides significant advantages over current solutionmethodsintermsofbothspeedandsolutionreliability. 5.2.1 Keywords Global gradient algorithm (GGA); Graph Theory; Bridge-Block Partitoning; Water distributionsystems;Hydraulicanalysis. 5.3 Introduction Hydraulic simulation algorithms use mathematical models designed to simulate the hydraulic performance of a water distribution system (WDS) and have played a critical roleinthedesign,operation,andmanagementofWDSsinresearchandindustry. These models have been used for (1) optimizing WDS network design parameters (such as pipe diameters), (2) for calibrating network parameters (such as demand patterns), (3) conductingreal-timemonitoringandcalibrationofthenetworkelementsinasupervisory controlanddataacquisition(SCADA)operationalsetting,and(4)adjustingcontroldevices (suchasvalves). Inhydraulicsimulation,thesystemofequationscanbeformulatedasa large andsparsenon-linear saddle-pointproblem. Thereare severalwell-knowniterative methods for solving the non-linear saddle-point problem. These include: range space methods,nullspacemethods,andloop-basedmethods. ThemostwidelyusedWDSsolutionmethodistheGlobalGradientAlgorithm(Todini andPilati1988). TheGGA,arangespacemethod,takesadvantageoftheblockstructureof thefullJacobianmatrixtoachieveasmallerkeymatrixinthelinearizationoftheNewton method. Since the development of the GGA, numerous new WDS hydraulic solution methodshavebeenproposedandimprovementshavebeenmadetoexistingWDShydraulic solution methods. Most of these new WDS hydraulic solution methods employ graph theorytodecomposeorpartitiontheWDSnetworkgraphintosub-graphswhichresultsin a smaller system of equations. Deuerlein (2008) introduced a decomposition model for a WDS network graph, in which the one-connected components are categorized as the forest componentandthebiconnectedcomponents arecategorizedasthe corecomponent. After removing the forest component, the core component can be further partitioned into blocks that are connected by bridge elements. After the partitioning processes, a loop flow corrections method is then used. Simpson et al. (2012) proposed a matrix based identification method for the forest component and the core component and introduced theforest-corepartitioningalgorithm(FCPA).IntheFCPA,flowsandheadsintheforest 81
ADE
Chapter5. Publication3: ABridge-BlockPartitioningAlgorithmforSpeedingup AnalysisofWaterDistributionSystems (a)ExampleA (b)ExampleB Fig.5.1. Twoexamplenetworksofblocks,bridges,andcut-vertices illustrated in Fig. 5.1(b). The node (cut-vertex 2) is a cut-vertex that separates the two blocks. Thesetwoblockscanalsoalsobesolvedseparately,aswasthecaseinpart(a)of theexample. Theadvantagesin speedand reliabilityfor theBBPA arise, inpart, from the smallersystemsthatresultfrompartitioningthenetworkintothesesmallerblocksifthe corecomponentoftheWDSgraphisone-connected. The BBPA exploits the fact the flows and heads in one block component are weakly coupledwiththeseoftheotherblockcomponentsandthesolutionoftheflowsandheads inabridgecomponentisalinearprocess. Theconvergencerateforthesolutionofthecore component of a WDS, without the BBPA, is restricted to that of the worst block of the network. Solvingeachblockseparatelyreduces thenumberofiterationsexecutedtothe numberofiterationsrequiredbythatblock. There is a number of advantages to using the BBPA to identify the linear bridge componentsandtheblockcomponentsofaWDSnetwork: 1. The number of iterations required by each block is bounded by that required by the unpartitioned system – solving the flows and heads in each block separately significantly reduces the overall computational time for the non-linear solver in almostallcases. 2. It improves the numerical reliability of the solution. The numerical reliability of thesolutioncanbedeterminedbytheconditionnumberoftheSchurcomplement. The condition number of amatrix is the ratio of the largest to the smallest singular valueofanysquarematrix. Aroughruleofthumbis: onedigitofreliabilityinthe solution is lost for every power of ten in the condition number. If a square matrix is partitioned into block diagonal form by orthogonal permutations, the condition numbers ofblockscan be nogreater than that ofthe full matrix. Inmost cases, the condition numbers for all the individual blocks will be smaller than the condition numberofthefullmatrix. Thisphenomenonisillustratedlaterinthispaper. 3. Itreducestheneedtoregularizeforthepresenceofzeroflows(ElhayandSimpson 2011). IthasbeenpointedoutbySimpsonetal.(2012)thatsolvingfortheflowsand heads separately can avoid thenumerical failure that occurswhen there are nodes withzerodemandpresentintheforest. Itisshowninthispaperthatthereareblocks, in some networks, that have zero accumulative demands. The solutions of these networksneedaregularizationmethodto dealwiththepresence ofthezeroflows 83
ADE
Chapter5. Publication3: ABridge-BlockPartitioningAlgorithmforSpeedingup AnalysisofWaterDistributionSystems 5.5.2 The properties of the system of equations after bridge-block partitioning In the BBPA, a full WDS network is partitioned into n smaller independent non- b linear systems by permuting the original full system of equations using two orthogonal permutationsP andR. Oneofthemaincontributionsofthispaperistoshowthattheuse of the BBPA can significantly reduce the computational loads and improve the numerical reliabilityoftheresults. TheBBPAcanbeusedtoimprovethereliabilityofsolutionoftheloopedcomponentin thefinalWDSsolution. Thisisbecausetheconditionnumber,theratiobetweenthelargest tothe smallest singularvalue ofamatrix,can beusedto estimate thelossofreliable digits in solving a linear system with that matrix. The orthogonal permutations of the BBPA shufflethen singularvaluesoftheSchurComplementintotheircorrespondingblocks. j This is because pre-and-post-multiplying a matrix by orthogonal matrices preserves the singularvalues. Theupperboundof thelargestsingularvalueofall blocksisthe largest singularvalueofthefullsystemandthelowerboundforthesmallestsingularvalueofall blocksisthesmallestsingularvalueforthefullsystem. Therefore,theconditionnumber ofeachblockat thesolutionisboundedabovebytheconditionnumber ofthefullsystem of equationsbut in mostcases will besmaller. Moreover, theonly occasions whenone of theblockshasthesameconditionnumberasthefullsystemiswhereboththehighestand lowestsingularvaluesarepresent inthesameblock. Eveninthis particularcasetheother blocksinthesystemwillhavelowerconditionnumbersthanthefullsystem. Furthermore,theuseoftheBBPAcanminimizetheneedtouseregularizationmethods forhandlingzero-flows. IntheFCPApaper(Simpsonetal.2012),theauthorspointedout thatitiscommonforzeroflowstooccurattheendsoftreeswithzerodemands. Similarly, it is also possible for all nodes in the end blocks to have zero demands. The GGA fails catastrophicallyattheseblockswhentheheadlossismodelledbytheHazen-Williamhead loss model. One side-effect of identifying these end blocks with zero nodal demands is zeroflowscanbeassignedtoallpipesintheseblocksandtheheadofpseudo-sourcecanbe assignedtoallnodesintheseblocks. Whenzeroflowsoccurinotherblocks,regularization isneededonlyfortheblockswiththepresenceofzeroflowsinsteadofthefullsystem. Inadditiontotheimprovementofthenumericalreliabilityofthefinalresult,theuseof theBBPAcansignificantlyreducecomputationalloads. Thisreductionincomputational loads is achieved through: (1) the bridge component being solved by a linear process, the removal of which reduces the number of non-zeroes in Schur component, (2) the probablereductioninthenumberiterationsrequiredbyeachblockasshowninAppendix insection5.13,and(3)thenon-linearsystemofequationsforeachblockisindependentof otherblockswhichallowseachblocktobesolvedinparallel. 5.6 Bridge-Block Partitioning Algorithm ThestepsoftheBBPAarenowdescribed. TheBBPAstartswithaforestsearch algorithm toidentifytheforestcomponentasdistinctfromthecore. Thisisfollowedbyidentifying all the blocks and bridges in the core, and updating the demands for the cut-vertices by using Stage 3 as givenbelow, a variation of the algorithm detailed by Hopcroft and Tarjan (1973). Notethatthisalgorithmisbasedonthedepth-firstsearchandrunsinlineartime. Therearetwowaystosolvethecoreofthenetwork: inparallelorserially. 90
ADE
Chapter5. Publication3: ABridge-BlockPartitioningAlgorithmforSpeedingup AnalysisofWaterDistributionSystems Thesystemofpipeheadlossandnodalcontinuityequationsfortheexamplenetworkis G1 1 0 0 0 0 0 q1 el7  G2 −1 0 0 0 0 1 q2 0     G3 G4 − 01 −1 1 0 1 0 0 0 0 0 0    q q3 4     0 0        G5 G6 0 0 −0 1 1 0 − 11 0 0 0 0        q q5 6         0 0          G7 G8 0 0 − 01 00 00 −1 1 10        q q7 8    =    0 0    . (5.22)       1 0 0 − 0 01 − 1 01 −0 11 0 10 −0 01 −0 01 000             h h h1 2 3             d d d1 2 3           0 0 0 0 0 0 0 0 − 01 01 10 −0 1         h h4 5         d d4 5      0 1 0 0 0 0 0 1   h6   d6       By permuting the rows (pipes) in the ordering given by p = 1;2;3;7;8;4;5;6 and { } thecolumns(nodes)intheorderinggivenbyv = 1;6;2;5;3;4 ,thesystemofequations { } inEq.(5.22)canberearrangedintothefollowingblockstructure: Pipes Nodes Block B B B B B B 1 2 3 1 2 3 B 1 G 1 1 0 0 0 0 0 q 1 e l7   G 2 G −1 1 1 0 0 1 0 0 0 0 0 0q q2 3 0 0              B B B2 3 1                1 1 13 G 07 G 08 G 04 G 05 G 06 − 0 0 0 0 0 0 1 0 0 0 − − −1 1 10 0 −11 0 0 0 0 0 1 1 0 −10 0 0 1                             hq q q q q7 8 4 5 6 1               =               d0 0 0 0 0 1                (5.23)          B B2 3               00 0 0 0 − 01 0 0 0 − 10 0 0 0 −0 1 0 01 −01 0 01 −0 0 1 01 −00 0 1 1 −0 0 0 11                          h h h h h6 2 5 3 4                         d d d d d6 2 5 3 4             *theboldnumbersinthematrixrepresentthecut-vertices Eq.(5.23) hasthree graphblocksas shown inFig. 5.2include Block1 (abridge), Block 2,andBlock3. Notethat,forcross-referencingpurposes,thisequationhasbeenlabeled withtheblocknumbers(affiliatedwithpipesandnodes)correspondingtoeachentityin theexamplenetwork. Thecut-vertices(cv andcv inFig.5.2)arehighlightedinbold 1 2 intheircorrespondingmatrixblocks. Intheequation, itisevidentthat thepermuted A 1 matrix is a block three by three, lower block triangular matrix which represents a WDS withthethreegraphblocks(B ,B ,andB ). 1 2 3 The end block (B in Fig. 5.2) is a sub-network consisting of three pipes {4; 5; 6}, 3 two nodes {3; 4}, and a pseudo-source at node {2}. The nodal demands of this block do not need to be updated because this is the end block. The head of the node 2 (cv ) , 2 whichisthecut-vertexbehavingasthepseudo-sourceforthisblock,canbemovedtothe right-hand-sideof systemofequations usingEq.(5.16). Thesolution ofblock B canbe 3 foundseparatelyaftertheheadofthepseudo-sourceatnode{2}isfound. The second block diagonal row (B in Fig. 5.2) is a sub-network consisting of four 2 pipes {2; 3; 7; 8}, three nodes {2; 5; 6}, and one pseudo-source at node {1}. This is an intermediate block so that the demand at the node 2 (cv ), a cut-vertex that is not a 2 pseudo-source, needstobe updatedbyincreasingits demandbythesum ofdemands atall nodesofitschildblock(B )asfollows: d = d +d +d usingEq.(5.20). Node1(cv ), 3 2 2 3 4 1 b 94 sepiP sedoN
ADE
Chapter5. Publication3: ABridge-BlockPartitioningAlgorithmforSpeedingup AnalysisofWaterDistributionSystems whichisthecut-vertexbehavingasthepseudo-sourceforthisblock,B ,canbemovedto 2 the right-hand-side ofsystem ofequations using Eq. (5.16). The solution ofblock B can 2 befoundseparatelyaftertheheadofthepseudo-sourceatnode{1}isfound. Finally,therootblock(B inFig.5.2)isasub-networkconsistingofpipe{1},node 1 {1},andsource{7}. BlockB isabridgecomponent. Thebridgecomponentcanbesolved 1 by using a linearprocess. The demandfor thenode 1 inFig. 5.2 (cv ), acut vertex inthe 1 rootblock,isupdatedbyincreasingitsdemandbythesumofdemandsatallnodesofits childblock(B )asfollows: d = d +d +d +d +d +d andtheelevationheadfor 2 1 1 2 3 4 5 6 thesource stays thesame. Afterupdating thedemands andheads, the system ofequations b inEq.(5.23)becomes: Pipes Nodes Block B1 B2 B3 B1 B2 B3 B1 G1 1 0 0 0 0 0 q1 el7                        BB B B B2 3 1 2 3                              1 00 0 0 0 G 0 01 0 0 02 G 0 10 0 0 03 −G 0 0 1 0 017 −G 00 1 0 018 G 0 00 0 1 04 −G 0 00 0 1 15 G 0 0 10 0 06 0 0 0 0 0 0 0 1 0 0 1 0 0 0 −0 1 0 0 0 01 −10 0 0 0 01 0 0 0 0 1 1 0 −0 0 0 0 0 11                                                          h h h h h hq q q q q q q2 3 7 8 4 5 6 1 6 2 5 3 4                             =                             d1+d2 d+ 2d +3h h h h d d dd d+0 0 0 6 3 43 51 1 2 2 d +4 d+ 4d5+d6                              (5.24) Note that the system of equations obtained in Eq. (5.24) is equivalent to performing blockGauss-JordaneliminationonEq.(5.23). Solvingthesystemofequationsinthisway requires solving each block in a particular sequence, from the rootblock (B ) to the end 1 block (B ). The sequence that is required in the example network in Fig. 5.2 is: (1) to 3 findthesolutionofblockB ,therootblock;(2)tofindthesolutionofblockB usingthe 1 2 headofthenode one,cv ,inblockB ;and(3) tofindthesolutionofblockB ,theend 1 1 3 block,usingtheheadofthenodetwo,cv ,inblockB . 2 2 Furthermore,thesecondpipehead-lossblockequationorthesecondblockequation (B )inEq.(5.24)is: 2 G q B h = B h , b 2 b 2 − 22 b 2 21 b 1 whichexpandsto: G q 1 0 0 h 2 2 h 1 G q 0 1 0 6 h  3  3+  h =  1, (5.25) G q 0 1 1  2 0   7 G   q7    1 − 0 1 h 5   0   8 8  −            theright-hand-sideofwhichcanberewrittenas: B h = B [v h ], (5.26) 21 b 1 − 22 3 1 whichexpandsto: h 1 0 0 1 h h 0 1 0 1  1 =   h 0 0 1 1  1    −  h 1 0 1 0 1     −       95 sepiP sedoN
ADE
Chapter5. Publication3: ABridge-BlockPartitioningAlgorithmforSpeedingup AnalysisofWaterDistributionSystems usingEq.(5.21). SubstitutingitbackintoEq.(5.25),weget: G q B h = B [v h ], b 2 b 2 − 22 b 2 − 22 3 1 whichexpandsto: G q 1 0 0 1 0 0 2 2 h h G q 0 1 0 6 0 1 0 1  3  3+  h =   h , G q 0 1 1  2 0 1 1  1   7 G   q7    1 − 0 1 h 5   1 − 0 1 h 1   8 8  −    −          whichcanfurthersimplifiedinto: G q B [h +v h ] = O, b 2 b 2 − 22 b 2 3 1 whichexpandsto: G q 1 0 0 2 2 h h G q 0 1 0 6 − 1  3  3+  h h = O. G q 0 1 1  2 − 1   7 G   q7    1 − 0 1 h 5 −h 1   8 8  −        Thethirdpipehead-lossblockequationorthethirdblockequation(B )inEq.(5.24)is: 3 G q B h = B h , b 3 b 3 − 33 b 3 32 b 2 whichexpandsto: G q 1 0 h 4 4 h 2 G q + 1 1 3 = 0 . (5.27)  5 G  q5  0 − 1  h 4!  h  6 6 2               Eq.(5.27)canbefurthersimplifiedto G q 1 0 4 4 h h G q + 1 1 3 − 2 = O  5 G  q5  0 − 1  h 4 −h 2! 6 6           usingasimilarmanipulationasforBlock2above. Finally,thesystemofequationsinEq.(5.24)mayberewrittenas: Pipes Nodes Block B1 B2 B3 B1 B2 B3 B1 G1 1 0 0 0 0 0 q1 el7                       BB B B B2 3 1 2 3                              1 00 0 0 0 G 0 01 0 0 02 G 0 10 0 0 03 −G 0 0 1 0 017 −G 00 1 0 018 G 0 00 0 1 04 −G 0 00 0 1 15 G 0 0 10 0 06 0 0 0 0 0 0 0 1 0 0 1 0 0 0 −10 1 0 0 0 0 −110 0 0 0 0 0 0 0 0 1 1 0 −10 0 0 0 0 1                                                          hh hh h52 46 3hq q q q q q q −− −− −2 3 7 8 4 5 6 1 hh hh h11 21 2                             =                             d1+d2 d+ 2d +3 ddd d d+0 0 0 0 0 0 0 536 3 4d +4 d+ 4d5+d6                              (5.28) 96 sepiP sedoN
ADE
Chapter5. Publication3: ABridge-BlockPartitioningAlgorithmforSpeedingup AnalysisofWaterDistributionSystems 5.7.2 Solving the example network Considerthe network shownin Fig.5.2 andits permutedsystem ofequations, Eq.(5.28). Eachblockbecomesanindependentsystemandcanbesolvedsequentiallyfromtheroot blocktotheendblock. Thesystemofequationsfortherootblock,B (Block1inFig.5.2), 1 whichalsorepresentsabridge,is: G 1 q e 1 1 = l 7 , (5.29) 1 0 h d +d +d +d +d +d ! 1! 1 2 3 4 5 6! the solutionof whichcan beused tosolveits childblock, block B (Block 2in Fig.5.2) 2 byusing: G 1 0 0 q 0 2 8 G 0 1 0 q 0  3  7    G 0 1 1 q 0  7 −  3     G 1 0 1 q  =  0 , (5.30)  8  2     −      1 0 0 1 h 6 h 1  d 6    −     0 1 1 0 h h  d +d +d   −  2 − 1  2 3 4   0 0 1 1   h 5 h 1    d 5    −  −         andfinally,theendblock,blockB Block3inFig.5.2)canbesolvedbyusing: 3 G 1 0 q 0 4 6 G 1 1 q 0  5  5    − G 0 1 q = 0 . (5.31) 6 3       1 1 0 h h  d    3 2  3   −     0 1 1 h 4 h 2 d 4  −  −         Thesystemsofequationsforeachofthethreeblockscanalsobesolvedinparallel. Notethat,whenusingBBPA,iftheheadlossoftheexamplenetworkshowninFig.5.2 is modeled by the Hazen-William formula and the nodal demands at nodes three and four are zero, this does not cause a failure of the method due to singularity of the Schur complement,unliketheGGAandRCTMonthesamenetwork(ElhayandSimpson2011). Inaddition,theblockwithzerototaldemandcanbesolved(1)priortotheiterativephase by assigningzero flowstoall applicablepipesand (2)byassigningthe headsof thesource toallnodesinthisblockaftertheiterativephase. 5.8 Relation of BBPA to other solution methods TheBBPAcanbedescribedasapre-and-post-processingmethodforthefollowingreasons: (1)itfindstheblocksandbridgesofaWDS,(2)thebridgescanbesolvedbyusingalinear processsimilartotheforestcomponent,and(3)thenusesanyWDSsolutionmethod,for exampleGGA,RCTM,orGMPA,to,independently,solveeachblock. TheBBPAcanalsobeusedtoidentifytheforestcomponentofthenetwork. However, theuseoftheFCPArequireslessoverheadthantheBBPA. Thesametopologicalproperties exploitedbyFCPAandBBPAarepartlyresponsible forthesavingsachievedbypartial-update(AbrahamandStoianov2015). Theforestand bridgecomponents- beinglinear-convergeafterjustone iterationofapplicationof anon linear solver. The partial update scheme is able to exploit this by checking for convergence 97
ADE
Chapter5. Publication3: ABridge-BlockPartitioningAlgorithmforSpeedingup AnalysisofWaterDistributionSystems Fig. 5.4. The condition number of the Schur complement at the solution for each block (scatterpoint)andtheconditionnumberoftheSchurcomplementforthefullsystem(red line) 5.11 Conclusions In this paper, the bridge-block partitioning algorithm is introduced. The BBPA is a pre-processing and post-processing algorithm that (1) first partitions the network into bridge components and block components, (2) then solves for the flows in the bridge components by a linear process, (3) after that it separately solves for the flows and the estimated heads for each independent block by using any WDS solver, and (4) finally the heads are recovered by a linear process at the end. This partitioning of the network canbeusedtospeed-upthesolutionprocessofthesteadystatedemand-drivenhydraulic simulationandtoimprovethereliabilityoftheresultsifthecorecomponentoftheWDS graphisone-connected. Thespeed-upofthesolutionprocessisachievedby(1)solving the bridge component in the BBPA by a linear process similar to that of solving for the forest in the FCPA, which reduces the number of non-zeroes in the Schur complement (2)solvingeachblockbyusingtheminimumnumberofiterationsthatisrequiredbythat block. Moreover,theBBPAimprovesthereliabilityoftheresultsbecausethecondition numberoftheSchurComplementforeachblockisboundedabovebytheconditionnumber fortheSchurComplementofthefullsystem. The usefulness of the BBPA has also been demonstrated by applying it to eight benchmark networks with between 934 and 19,647 pipes and between 848 and 17,971 nodes. The total savings in wall clock time after applying the BBPA to the GGA are between33%and70%. Itisshownthat,thenumberofiterationsandtheconditionnumber requiredbyeachblockareboundedbythenumberofiterationsandtheconditionnumber requiredbythefullsystem,respectively. TheuseoftheBBPAcanalsominimizetheneed to regularize the zero flows when the head loss is modelled by the Hazen-William head loss equation. This is because in real life systems, such as the case study networks used 101
ADE
Chapter6. ConclusionsandRecommendationsforFutureStudy Theproposedframeworksignificantlyreducesthecomputationloadofeachofthesolution methods that are implemented in WDSLib. This is achieved by categorising each of the functions that are used in each of the solution methods into three categories: (1) the functions that will only have to be executed once are called level one (L ) functions. 1 L functions relate to network topology, which is invariant for the whole simulation; 1 (2) in a multi-simulation setting, certain functions will need to be run once for every hydraulic-phase. These,once-per-assessmentfunctions,arecalledleveltwo(L )functions; 2 and(3) foreveryhydraulicassessment, thereisa non-lineariterativephase inthe solution process. Thefunctionsinthisphaserunmanytimesforeachhydraulicassessmentuntilthe stoppingtesthasbeensatisfied. Theseiterative-phasefunctionsarecalledlevelthree(L ) 3 functions. Equippedwithsuchaframework,itispossible(1)toconductafaircomparison betweendifferentsolutionmethods;and(2)toalloweachfunctiontoberuntheminimum numberoftimesdeterminedbyitssimulationsetting. Use the proposed framework to conduct a benchmark study on four different WDS solution methods Theproposedframeworkis thenusedinChapter4to benchmarkthe performanceoffoursolutionmethods,theglobalgradientalgorithm(GGA),theGGAwith theforest-corepartitioningalgorithm(FCPA),thereformulatedco-treeflowsmethod,and theRCTMwiththeFCPA,againsteachother. Eachofthefoursolutionmethodsisapplied toeightcasestudynetworks. ProposeanewpartitioningalgorithmtoimprovetheexistingWDSsolutionmethods In Chapter 5, a new graph partitioning algorithm, bridge-block partitioning algorithm (BBPA), is proposed. The BBPA is a pre-and-post-processing algorithm that partitions theWDSgraphintoanumberofbridgecomponentsandanumberofblockcomponents. EachofthebridgecomponentscanbesolvedusingalinearprocesssimilartotheFCPA and each of the block components can be separately solved by using any WDS solution method,theGGA,RCTM,orGMPA.ThereisanumberofadvantagestousingtheBBPA: (1)thenumberofiterationsrequiredbyeachblockisboundedabovebythatrequiredbythe unpartitionedsystem–solving theflowsandheadsin eachblock separatelysignificantly reduces the overall computational time for the non-linear solver in almost all cases; (2) the condition number of the Schur complement of each block is bounded above by that of the unpartitioned system. In most cases, the condition numbers for all the individual blockswillbesmallerthantheconditionnumberofthefullmatrix;(3)thesolutionofeach blockcanbefoundinparallelinademand-drivenmodelbecausetheflowsandheadsin oneblockcomponentareindependentfromthoseoftheotherblockcomponents. 6.3 Recommendations for WDS demand-driven solution methods The performance of any water distribution system solution method is very problem dependent. To date, there has been no reliable method that accurately predicts the performanceofagivenalgorithmonaparticularnetworkapriori. Thisisreflectedinthe performancedifferencesreportedinthisthesis. The network topology is the most influential factor in the performance of different solutionmethods(matrixdensity,thedistributionofnon-zeroelementsafterbandwidth reduction,etc.). Recommendationsaregivenasfollows: 110
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed real-time monitoring and calibration of the network elements in a supervisory control and 13 data acquisition (SCADA) operational setting, and (4) to adjust control devices, such as 14 valves, in a management setting. In the design setting and both the above operational 15 settings, repeated hydraulic assessment is required on a network with fixed topology. In 16 the management setting, repeated hydraulic assessment is required on a network with 17 flexible network parameter settings. With ever-increasing network sizes and the need for 18 real-timemanagementusingaSCADAsystem, itisimportanttohavearobustsimulation 19 package which can be configured to be maximally efficient whatever the setting. 20 In the field of hydraulic simulation, the system of equations can be formulated as a 21 large and sparse non-linear saddle point problem. There are several well-known iteration 22 methods for solving the non-linear saddle point problem. These include: range space 23 methods (Global Gradient Algorithm (Todini and Pilati 1988)), Null space methods (Co- 24 Tree flow formulation variations (Rahal 1995; Elhay et al. 2014)), loop-based methods 25 (Loop flow correction (Cross 1936)), and pre-and-post-processing methods (forest-core 26 partitioning algorithm (Simpson et al. 2014), domain decomposition (Diao et al. 2014), 27 network clustering (Perelman and Ostfeld 2011)). Their relative performance in terms of 28 speed, rate-of-convergence, and accuracy depends among other things on the topology of 29 the target network: size of the forest component, the number of network loops, and the 30 density of these network loops. It is difficult to evaluate the impact of these topology fac- 31 tors by only examining the incidence matrix that describes the pipe network connectivity. 32 As a result, the best method to use for a particular network cannot be easily determined a 33 priori. Moreover, extra complexity is introduced when a multi-run hydraulic assessment 34 is required. During a multi-run hydraulic simulation, the elapsed computation time of 35 each method can be broken down into two parts: the components that are only required 36 to be performed once at the very beginning for the same network, called the overhead, 37 and the components that are required to be carried out repeatedly for each separate run 38 until the required number of iterations has been met, called the hydraulic-phase. It is 39 desirable to have a simulation platform, given the different levels of repetition, to im- 40 plement these alternative algorithms efficiently. Equipped with such a platform a user 41 120
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed would be able to easily benchmark the performance of alternative methods on a small 42 number of evaluations for a given network and use that performance to inform the choice 43 of algorithm to use for either a once-off simulation setting or for a multiple simulation 44 setting (such as for an evolutionary algorithm (EA)). 45 ThisworkdescribesanextensibleWDSsimulationplatformcalledWDSLib. WDSLib 46 is a numerically robust, efficient and accurate C++ library that implements many WDS 47 simulation methods. WDSLib is written using a modular object-oriented design which 48 allows users to easily mix and interchange solution components, thereby enabling users 49 to avoid redundant computations. It has been optimized to use sparse data structures 50 which are oriented to the pattern of access required for each solution method. WDSLib 51 has been validated for accuracy on a range of realistic benchmark water distribution 52 networks against reference implementations and tested for speed. The program accepts 53 the input file formats of the industry standard EPANET2 (Rossman 2000) toolkit and 54 its performance is faster than EPANET2 in all tested settings and benchmarks. 55 Theremainderofthispaperisstructuredasfollows. Thenextsectiondescribesrelated 56 methodologies and implementations. A general description of the WDS demand-driven 57 steady-state problem is given in the next section. Section 3 presents a mathematical 58 formulation of the network and the solution methods that are used in WDSLib. The 59 tool-kit structure is then given in section 4. This is followed, in section 5, by the toolkit 60 implementation details. Section 6 provides some examples of how the toolkit can be 61 utilized in a simulation work flow. The results are discussed in Section 7. Finally, 62 section 8 summarizes the results of this paper and describes future extensions to the 63 toolkit. 64 2 Background 65 This section describes related water distribution system network solution methods and 66 implementations. The first sub-section describes solution methods, including those used 67 by WDSLib. This is followed by a description of currently available implementations and 68 121
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed compares these with WDSLib. 69 2.1 Related Methods 70 This research considers a water distribution model made up of energy conservation equa- 71 tionsandthedemanddrivenmodelcontinuityequations. TheHardyCrossmethod(Cross 72 1936), also known as the loop flow corrections method, is one of the oldest methods and 73 uses successive approximations, solving for each loop flow correction independently. It 74 is a method that was widely used for its simplicity at the time when it was introduced. 75 More than three decades later, Epp and Fowler (1970) developed a computer version of 76 Cross’s method and replaced the numerical solver with the Newton method, which solves 77 for all loop flow corrections simultaneously. However, this method has not been widely 78 used because of the need (i) to identify the network loops, (ii) to find initial flows that 79 satisfy continuity and (iii) to use pseudo-loops. 80 The GGA is a range space method that solves for both flows and heads. It was the 81 first algorithm, in the field of hydraulics, to exploit the block structure of the Jacobian 82 matrix to reduce the size of the key matrix in the linearization of the Newton method. 83 The GGA has gained popularity through its rapid convergence rate for a wide range 84 of starting values. This is the result of using the Newton method on an optimizations 85 problem that has a quadratic surface. However, it was reported by Elhay and Simpson 86 (2011) that the GGA fails catastrophically in the presence of zero flows in a WDS when 87 the head loss is modeled by the Hazen-Williams formula. Regularization methods have 88 been proposed by both Elhay and Simpson (2011) and Gorev et al. (2012) to deal with 89 zero flows when the head loss is modeled by the Hazen-Williams formula. 90 The GGA as it was first proposed, applied only for the WDSs in which the head loss 91 is modeled by the Hazen-Williams formula, where the resistance factor was independent 92 of flow. Rossman (2000) extended the GGA to allow the use of the Darcy-Weisbach 93 formula. It has been pointed out in Simpson and Elhay (2010), however, that Rossman 94 incorrectlytreatedtheDarcy-Weisbachresistancefactorasindependentoftheflow. They 95 introduced the correct Jacobian matrix to deal with this. It has been demonstrated that 96 122
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed once the correct Jacobian matrix is used, the quadratic convergence rate of the Newton 97 method is restored. Furthermore, Elhay and Simpson (2011) reported that the GGA 98 does not fail in the presence of zero flows when the derivatives of the Darcy-Weisbach 99 Jacobian matrix are correctly computed for laminar flows. 100 The co-trees flow method (CTM) (Rahal 1995) is a null space method that solves for 101 the co-tree flows and spanning tree flows separately. The CTM, unlike the loop flow cor- 102 rections method, does not require the initial flows to satisfy continuity. However, it does 103 require: (i) the identification of the associated circulating graph; (ii) the determination of 104 the demands that are to be carried by tree branches; (iii) finding the associated chain of 105 branches closing a circuit for each co-tree chord; (iv) computing pseudo-link head losses. 106 The reformulated co-trees flow method (RCTM) (Elhay et al. 2014) is also a null space 107 method that solves for co-tree flows and spanning trees flows separately. It represents a 108 significant improvement on the CTM by removing requirements (i) to (iv) above. It uses 109 theSchilders’factorization(Schilders2009)topermutethenode-arcincidencematrixinto 110 an invertible spanning tree block and a co-tree block. This permutation reduces the size 111 of the Jacobian matrix from the number of junctions (as in the GGA) to approximately 112 the number of loops in the network. 113 Abraham and Stoianov (2015) proposed a novel idea to speed-up the solution process 114 when using a null space method to solve a WDS network. Their idea exploits the fact 115 that a significant proportion of run-time is spent computing the head losses. At the 116 same time, flows within some pipes exhibit negligible changes after a few iterations. As a 117 result, there is no point in wasting computer resources to re-compute the pipe head losses 118 for the pipes that have little or no change in flows. This partial update can be used to 119 economize the computational complexity of the GGA, the RCTM and their variations. 120 The forest-core partitioning algorithm (FCPA) (Simpson et al. 2014) speeds up the 121 solution process in the case where the network has a significant forest component. This 122 algorithm permutes the system equations to partition the linear component of the prob- 123 lem, which is the forest of the WDS, from the non-linear component, which is the core 124 of the WDS. It can be viewed as a method that simplifies the problem by solving for 125 123
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed the flows and the heads in the forest just once instead of at every iteration. The FCPA 126 reduces the number of pipes, number of junctions, and the dimension of the Jacobian 127 matrix in the core by the number of forest pipes (or nodes). 128 The graph matrix partitioning algorithm(GMPA) (Deuerlein et al. 2015) exploited 129 the linear relationships between flows of the internal trees within the core and the flows 130 of the corresponding super-links after the forest of the network has been removed. This 131 was a major breakthrough. The GMPA permutes the node-arc incidence matrix in such 132 a way that all of the nodes with degree two in the core can be treated as a group. By 133 partitioning the network this way, the network can be solved by a global step, which 134 solves for the nodes with degree greater than two (super nodes) and the pipes which 135 connect to them (path chords), and a local step, which solves for the nodes with degree 136 two (interior path nodes) and pipes connected to them (path-tree links). 137 2.2 Related Implementations 138 EPANET 2 (Rossman 2000) is a widely used WDS simulation package. EPANET 2 im- 139 plemented the GGA to provide a demand-driven steady-state solution of a WDS. The 140 code for EPANET 2 is in the public domain, allowing many extensions to be devel- 141 oped. Currentlyavailableextensionsinclude: theimplementationofapressure-dependent 142 model (Cheung et al. 2005; Morley and Tricarico 2008; Siew and Tanyimboh 2012; Jun 143 and Guoping 2012) and a real-time simulation capability (Vassiljev and Koppel 2015). 144 The EPANET 2 implementation is not explicitly designed to necessarily be easy to 145 understand or accommodate alternative solution methods (Guidolin et al. 2010). The 146 elements that are used in EPANET 2 are stored by the variables that describe their 147 graph properties. For example, (1) junctions, reservoirs, and tanks are stored as a C 148 struct called Node and (2) all valves, pipes, and pumps are stored as a C struct called 149 Link. The abundant use of global variables limits the reusability and the possibility of 150 the thread-safe design (Guidolin et al. 2010). 151 Consequently, itisdifficulttocleanlyincorporatenewsolutionmethodsintoEPANET 152 2 in a manner that allows a fair comparison of performance between these methods. 153 124
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed Moreover, because there are no clearly defined interfaces for the incorporation of third- 154 party code components in EPANET 2, there is no guarantee that independently authored 155 extensions will be easy to combine with each other. 156 Intheabsenceofapopulareasy-to-modifyWDSsimulationplatformthereiscurrently 157 no straightforward means for comparing different solution methods. To date, when new 158 solution methods have been developed they have been compared using different research 159 systems, on different platforms with different implementation languages. This leads to 160 difficulty in comparing methods, limits the reusability of code, and creates a barrier for 161 researchers to reproduce and replicate results. To address these issues, an extensible 162 framework is required that allows implementation of new methodologies to be easily 163 incorporated without an adverse impact on the performance of the rest of the system. 164 To this end, a number of attempts have been made to implement an object-oriented 165 wrappertoencapsulatetheEPANET2solver(openNet(Morleyetal.2000)andOOTEN(van 166 Zyl et al. 2003)). However, these two systems were focused on providing more flexibility 167 in the processing of input to the core EPANET solver. They did not address any is- 168 sues relating to the solution process. CWSnet, a C++ implementation in object-oriented 169 style, was produced by Guidolin et al. (2010) as an alternative to EPANET 2.0. In CWS- 170 net, more attention has been given to the hydraulic elements of the WDS network. In 171 addition, CWSNet provides a pressure driven model, and takes advantage of the comput- 172 ing power of the computer’s Graphics Processing Unit (GPU). However, in CSWnet the 173 data structures representing the network are specialized to the solution methods that it 174 uses. These data structures are not easily adapted to work efficiently with the different 175 traversal orders, and graph algorithms used by newly developed solution methods. How- 176 ever, CWSnet still uses the same hydraulic solver and the same linear solver techniques 177 implemented in EPANET 2 (Guidolin et al. 2010). 178 To accommodate the deficiencies referred to above, this paper presents a new hy- 179 draulic simulation toolkit WDSlib. WDSlib is coded in C++, and incorporates a number 180 of recently published techniques. This toolkit offers users the ability to: (i) choose from, 181 or modify, different approaches and implementations of different WDS model analyses, 182 125
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed Let q = (q ,q ,....q )T denote the vector of unknown flows, h = (h ,h ,....h )T 209 1 2 np 1 2 nj denote the vector of unknown heads, r = (r ,r ,....r )T denote the vector of resistance 210 1 2 np factors, d = (d ,d ,.....d )T denote the vector of nodal demands, e = (e ,e ....e )T 211 1 2 nj l l1 l2 lnf denote the vector of fixed head elevations. 212 The head loss exponent n is assumed to be dependent only on the head loss model: 213 n = 2 for the Darcy-Weisbach head loss model and n = 1.852 for Hazen-Williams head 214 loss model. The head loss within the pipe j, which connects the node i and the node k, 215 216 is modelled by h i h k = r jq j q j n −1. Denote by G(q) Rnp ×np, a diagonal square matrix − | | ∈ 217 with element [G] jj = r j q j n −1 for j = 1,2,....n p. Denote by F(q) Rnp ×np, a diagonal | | ∈ square matrix where the j-th element on its diagonal [F] = d [G] q . A is the full 218 jj dqj jj j 1 rank, unknown head, node-arc incidence matrix, where [A ] is used to represent the 219 1 ji relationship between pipe j and node i; [A ] = 1 if pipe j enters node i, [A ] = 1 if 220 1 ji 1 ji − pipe j leaves node i, and [A ] = 0 if pipe j is not connected to node i. A is the 221 1 ji 2 fixed-head node-arc incidence matrix, where [A ] is used to represent the relationship 222 2 ji between pipe j and fixed head node i, [A ] = 1 if pipe j enters fixed head node i, 223 2 ji − [A ] = 1 if pipe j leaves fixed head node i, and [A ] = 0 if pipe j is not connected to 224 2 ji 2 ji fixed head node i. 225 3.2 System of Equations 226 The steady-state flows and heads in the WDS system are modeled by the demand-driven 227 model (DDM) continuity equations (1) and the energy conservation equations (2): 228 A Tq d = O (1) 1 − − 229 G(q)q A h A e = O, (2) 1 2 l − − which can be expressed as 230 G(q) A q A e 1 2 l − = 0, (3)      − A T O h d 1 −           127
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed as the generalized equations that can be applied when the head-loss is modeled by the 245 Hazen-Williams equation or the Darcy-Weisbach equation. The correct Jacobian matrix 246 with the formula for F, when head loss is modeled by Darcy-Weisbach equation, can be 247 found in Simpson and Elhay (2010). They showed that the use of the correct Jacobian 248 matrix restores the quadratic rate of convergence. 249 It is important to note that the GGA, as it was originally proposed, solves the entire 250 networkbyanon-linearsolver,andthiscanincludesomeunnecessarycomputationswhich 251 can be avoided by exploiting the structural properties of the WDS graph composition. 252 The methods described below exploit these structural properties to potentially improve 253 the speed of the solution process. 254 3.4 Forest-Core Partitioning 255 Associated with a WDS is a graph G = (V,E), where the elements of V are the nodes 256 (vertices) of the graph G and elements of E are the pipes (links) of the graph G. The 257 graph G can be partitioned into smaller subgraphs with special properties. The special 258 properties that are exploited in WDSLib and their formulations are described in this 259 subsection. The concept of partitioning the WDS network was proposed by Deuerlein 260 (2008) in order to simplify the WDS solution process. Simpson et al. (2014) extended 261 the idea of the network partitioning of Deuerlein (2008) and introduced the forest-core 262 partitioning algorithm (FCPA), which partitions the network into a treed component 263 and a looped or core component. The FCPA starts with a searching algorithm which 264 265 identifies the forest subgraph, G f = (V f,E f), in which S Nnf×np is the permutation ∈ matrix which identifies the pipes in the forest, E , as distinct from the pipes in the 266 f 267 core , E c, and T Nnf×nj is the permutation matrix which identifies the nodes in the ∈ forest, V , as distinct from the nodes in the core, V , as distinct from the core subgraph, 268 f c 269 G c = (V c,E c), in which P Nnpc×np is the permutation matrix for E c and C Nnjc×nj ∈ ∈ is the permutation matrix for V . 270 c 129
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed The flows of the pipes in the forest, Sq, can be found directly from 271 Sq = TA TST −1 Td. (10) 272 1 − (cid:0) (cid:1) The system for the reduced non-linear problem (for the core heads and flows) can be 273 expressed as 274 PGPT PA CT Pq PA e 1 2 l − = , (11) 275      CA TP O Ch Cd+CA TSTSq 1 1 −           and then the Newton iterative method is applied to Eq. (11). 276 Finally, once the iterative solution process for the core has stopped, the forest heads 277 can be found by solving a linear system: 278 Th = SA TT −1 SA e SGSTSq +SA CTCh . (12) 279 1 2 l 1 − − (cid:0) (cid:1) (cid:0) (cid:1) The system for the reduced non-linear problem (for the core heads and flows) in Eq. 11 280 can be expressed as: 281 G A q A e 1 2 l − = (13) 282      A T O h d − b1 b b b           where G = PGPT,A = PAb CT,q = Pqb,h = Chb,A = PA , and d = Cd + 283 1 1 2 2 CA TSTSq. 284 1 b b b b b b The FCPA simplifies the problem by identifying the linear part of the problem and 285 solving it separately from the core to avoid unnecessary computation in the iterative 286 process. 287 3.5 Reformulated Co-Tree flows method 288 A graph, with or without forest, can be partitioned into two sub-graphs: a spanning 289 tree subgraph and a complementary co-tree subgraph. The reformulated co-tree flow 290 method (RCTM) (Elhay et al. 2014) exploited the relationship between the spanning tree 291 130
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed nent of the solver to n n (the number of co-tree elements in the network). It has been 315 p j − proven by Elhay et al. (2014) that the RCTM and the GGA have identical iterative re- 316 sults and solutions if the same starting values are used. However, for the RCTM, the user 317 (0) only needs to set the initial flow estimates for the co-tree pipes, q , in contrast to GGA 318 2 where initial flow estimates are required for all pipes. The flows in the complementary 319 spanning pipes are generated by Eq.(14) in the RCTM. 320 4 WDSLib Structure 321 WDSLib is a WDS simulation toolkit consisting of a set of C++ member functions, 322 which henceforth will be referred to just as functions, that can be composed to solve 323 for the steady state solution of a WDS. WDSLib can be used for a once-off simulation 324 or a multi-run simulation. Pre-packaged driver code is provided to perform once-off 325 simulations using a choice of solver methods. For a multi-simulation setting, where the 326 use-cases are very diverse, the user is able to select the desired components of WDSLib 327 to compose and compile their own driver. 328 Individual functions in WDSLib are classified according to their role in the simulation 329 workflow. In any simulation workflow, there will be functions that will only have to be 330 executed once. For example, functions to read the input file or partition the network will 331 only have to execute once at the start of the simulation (or of all simulations). Likewise, 332 code to reverse the network partitioning and write simulation results will only have to 333 execute once at the end of the simulation. In this work, these functions that are only 334 required to be run once are called level one (L ) functions. L functions relate to network 335 1 1 topology, which is invariant for the whole simulation. In a multi-simulation setting, 336 certain functions will need to be run once for every hydraulic-phase. An example of 337 such a module is the module making the initial guesses of pipe flow rates for the updated 338 network configuration. In this work, these, once-per-assessment functions, are called level 339 two (L ) functions. 340 2 Finally, for every hydraulic assessment there is a non-linear iterative phase in the so- 341 132
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed lution process. The functions in this phase run many times for each hydraulic assessment 342 until the stopping test has been satisfied. Examples of these include the functions to 343 calculate the G and F matrices (see Eqs. (3) and (4)) and running the Cholesky solver. 344 These iterative-phase functions are called level three (L ) functions. 345 3 Fig. 1 illustrates the global structure of WDSLib under a once-off simulation setting 346 and a multi-run simulation setting. The modular setup of WDSLib allows each module 347 to be run the minimum number of times determined by its simulation setting. Under 348 the module structure described above a once-off simulation setting can be viewed as a 349 special case where the L functions and L functions are both run once. Note that after 350 1 2 running the initial L functions it is possible to run hydraulic assessments of the network 351 1 in parallel. This mode of execution might be used in a design setting such as using a 352 genetic algorithm (GA) to optimize pipe diameter sizes. 353 Figure 1: Global structure of WDSLib for both simulation settings L and L functions are classified into parts a and b according to whether they run 354 1 2 before or after the lower level processing that they embed. These functions are detailed 355 in Fig. 2. The L functions that run at the start of the simulation are called L func- 356 1 1a 133
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed tions. These include the module to read the configuration file and the EPANET .inp file; 357 partition the network; and solve the linear part(s) of the network. The corresponding 358 L functions are run at the end of the simulation. These include tasks such as reversing 359 1b the network partitioning. Note that certain L functions require their corresponding L 360 1a 1b functions to be used. For example the forest search module needs to be paired with the 361 reverse FCPA permutation. There is a similar structure for L functions. L functions 362 2 2a are run at the start of each hydraulic assessment and L functions run at the end. The 363 2b functions that must be included for the FCPA method are denoted with single asterisks. 364 Likewise the functions that must be included with the RCTM method are denoted with 365 double asterisks. For these methods to work correctly all affiliated functions must be 366 included in the simulation workflow. Note that it is also possible to run both the RCTM 367 and FCPA in the same workflow. Also note that the user cannot run both GGA and 368 RCTM in the same workflow – the user must choose between these solution methods. 369 Table 1 provides a mapping from the function descriptions in Fig. 2 to the function 370 names in WDSLib. In addition, the dependencies between functions for each solution 371 method are shown in Table 1a, Table 1b, Table 1c and Table 1d. The columns in each 372 table list, respectively, the description of the function, its name in WDSLib, the C++ 373 class in which it appears, its input parameters, and its output values. Note, that void 374 is used in these latter two columns to denote that the function interacts with the class 375 variables rather than through its parameters and return value. Examples of how these 376 functions can be coded are presented in section 6. The key data-access functions in 377 WDSLib are described next. 378 Getter and Setter methods Each class in WDSLib has various methods available for 379 setting the network parameters and retrieving the results of the WDS network. These 380 methods allow the user to reconfigure the network before and during simulation runs. 381 The names of the setter methods all start with a prefix set and the names of the getter 382 methods all start with a prefix get. For example, a user can set (write-to) the diameter 383 of pipe index to value by calling pipe->setD(index,value) and get (read-from) the 384 head of node index by calling h[index]=result->gethFinal(index). A summary of 385 134
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed Table 1: Key function descriptions, names, their classes, inputs and outputs. The affili- ated functions are shown in sub-tables (1a) (1b) (1c) (1d). (a) Shared Modules Description Modulename Class Input Output Readtheconfigurationfile readConfig runManager configfilename void ReadEPANETinputfile getInputData Input EPANET.inpfile EPANETerrcode Variablesscaling scale Solver void void AMDbandwidthreduction AMD Suitesparse void void Calculatetheresistanceconstants getRf Solver net resistanceconstant Generateinitialguessesofflows init Solver diameter flowrate Calculatetheheadlosscoefficients getGF Solver net,resistanceconstant void Stoppingtest stopTest Solver result norm Recoverscaledvariables rScale Solver void void (b) Global gradient algorithm (GGA) Description Module name Class Input Output GGA Solver runH GGASolver(Solver) void void (c) Forest-core algorithm (FCPA) Description Module name Class Input Output Forest search forestSearch topology SN, EN void Calculate flows in forest forestFlow solver demands flows in forest pipes Calculate heads in forest forestHead solv result heads in forest pipes Reverse FCPA permutation rFCPA Solver void void (d) Reformuated cotree flows method (RCTM) Description Module name Class Input Output Spanning tree search STSearch topology SN, EN void RCTM solver runH RCTMsolver (Solver) void void Calculate heads in ST and CT RCTMHead RCTMsolver flows in ST and CT void Reverse RCTM permutation rRCTM RCTMsolver void void 136
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed Table 2: The getter and setter functions of each class and the variables they access Class Name Description Read-Access Write-Access Net Basic network properties, & Pipe and Node Node,Pipe, n , n , p j n s Node Node properties d, z , z s u Pipe Pipe properties SN, EN, L, D, R, pipe ID Flag Flag information getFlag(”flagN”,flagV) setFlag(”flagN”) Parameter Parameter information getPara(”paraN”,paraV)setPara(”paraN”) Simulation Manage hydraulic simulation - - Solver Parent class of solution methods - - GGASolver GGA solution method Result - RCTMSolver RCTM solution method Result - Topology Network topology information getCore, getForest Result Results of the simulations qIter, hIter, GIter , FIter, numIter, Cre- sIter, EresIter, Time the variables that can be read-from (read-access through getter methods) and written-to 386 (write-access through setter methods for each key classes is specified in Table 2. This 387 concludes the discussion of the the broad structure of the WDSLib package. The next 388 section describes key aspects of the implementation of the package. 389 5 WDSLIB: Toolkit Implementation 390 This section outlines key implementation details of WDSLib. As previously mentioned, 391 the overall aim of WDSLib is to provide a clearly-structured, flexible and extensible hy- 392 draulic simulation toolkit that allows testing, evaluation, and use, in production settings, 393 of both existing and new WDS solution techniques. These aims require WDSLib be im- 394 plemented so that it is fast to execute, flexible to configure, robust to challenging input 395 datacases, andeasytounderstandandmodify. Thefollowingdescribesaspectsoftheim- 396 plementation of WDSLib that enable it to meet these requirements. The next subsection 397 describes the general considerations that informed the design of the whole toolkit. This 398 generaldiscussionisfollowedbyasummaryofkeyimprovementstothesolutionprocesses 399 encoded in forest searching and spanning tree searching in the WDSLib package. 400 137
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed 5.1 General capabilities and properties 401 This sub-section describes design aspects underpinning the utility and performance of 402 WDSLib. In-turn, the following outlines measures taken to: (1) maximize code clarity 403 and modularity; (2) increase the efficiency of memory access and storage; (3) maximize 404 numerical robustness; (4) facilitate accurate timing of code execution; and (5) maximize 405 simulation speed for different settings. 406 Design Considerations 1: Modularity 407 The modular design of WDSLib is central to the evaluation and testing of different WDS 408 solution methods. All methods have been defined to perform a single, well–defined, 409 function and each class can be compiled, used and tested independently. These features 410 allowuserstoassemblethemethodsofinterestfromindependentlydevelopedcomponents 411 tocreateacustomizedWDSsolutionmethodinareliableway. WDSLib’smodulardesign 412 also allows the users to profile the computation time of each individual component of an 413 algorithm. Functions communicate through well-defined interfaces and the function code 414 has been factored to minimize development and testing cost. This architecture allows 415 customized simulation applications (i) to combine the functions of interest and (ii) to 416 implement new solution algorithms to extend the functionalities of WDSLib. 417 Design Considerations 2: Memory Considerations 418 Care was taken to minimize the memory footprint of executing code (in order to re- 419 duce memory requirements and prevent memory leaks) in the interest of the toolkit 420 efficiency and toolkit robustness. Reducing memory requirements allows the solution of 421 larger WDS problems for a given memory capacity. In WDSLib, memory reduction was 422 achieved through both, using sparse matrix representations and the systematic allocation 423 and deallocation of working structures in the C++ code. The matrices used in WDS 424 simulation are often sparse, with the density of the full node-arc incidence matrix being 425 only 2/n . Consequently, it is more efficient to store these matrices using sparse stor- 426 j age schemes which store only the non-zero elements of the matrix and pointers to their 427 138
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed locations (Davis et al. 2014). It is important to note that the choice of a sparse ma- 428 trix representation is made based on (1) the storage requirements of the matrix and (2) 429 common search orders to column elements and row elements. This latter factor means 430 that the best format for sparse matrix representation varies with the preponderant or- 431 ders of search, (row-wise, column-wise, or both), employed by each method. There is 432 a number of common storage formats for sparse matrices (Compressed column storage 433 (CCS) of Duff et al. (1989)), Compressed row storage (CRS), Block Compressed column 434 storage (BCCS), Block Compressed row storage (BCRS), and Adjacency lists). As will 435 be described shortly, WDSLib, uses a modified adjacency-list representation. 436 Other implementations use a variety of storage schemes. In EPANET 2, the A 437 1 matrix is stored as two arrays of node indices, which represent start nodes (SN) and the 438 end nodes (EN) of each pipe. The i th entry of the SN and EN arrays represent the 439 − start node and end node of i th pipe of the network. This storage format minimizes 440 − the memory required to store the A matrix because only the indices are required to 441 1 be stored because [A ] = 1 and [A ] = 1. As shown in Table 4, searching 442 1 (i,SNi) − 1 (i,ENi) through rows (pipes) of matrices that are stored in this format is efficient. However, 443 searching though the columns (nodes) is relatively inefficient. This storage format is also 444 used in CWSnet. 445 Both CCS and CRS are used in the FCPA implementation reported in Simpson 446 et al. (2014), and the RCTM implementation reported in Elhay et al. (2014). The 447 partial update null space method (Abraham and Stoianov 2015) used CCS. The memory 448 requirement for storing the A matrix in CCS is 2 nnz +n +1 as shown in Table 4. 449 1 j × This storage scheme is fast for searching through columns (nodes) of matrices that are 450 stored in CCS and slow for searching though rows (pipes). 451 In WDSLib, a modified adjacency list, described in Table 3, tailored for WDS hy- 452 draulic simulation, is used. An adjacency list for an undirected and unweighted graph 453 consists of n unordered lists for each vertex n , which contains all the vertices to which 454 j i vertex n is adjacent. The network that is shown in the Fig. 3 has one source, three 455 i nodes, and four pipes. The adjacency list for this network can be described by four lists 456 139
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed Table 3: The adjacency-list matrix presentation Node Index adjacent to Size 1 (v ,e ) v N(v ) e connects v and v Deg(v ) i j i 1 j 1 i 1 { | ∈ } 2 (v ,e ) v N(v ) e connects v and v Deg(v ) i j i 2 j 2 i 2 { | ∈ } 3 (v ,e ) v N(v ) e connects v and v Deg(v ) i j i 3 j 3 i 3 . { | ∈ . } . . . . . . . n (v ,e ) v N(v ) e connects v and v Deg(v ) j { i j | i ∈ nj j nj i } nj 2,3 , 1,4 , 1,4 , 2,3 . Each list describes the set of adjacent vertices of a vertex 457 {{ } { } { } { }} in the graph. For example, the first list, 2,3 , represents that the vertex 1 is adjacent 458 { } to the vertex 2 and vertex 3. 459 Figure 3: A simple sample network. Numbers denote junction and pipe indices in the network. The adjacency list is modified to include a directed and weighted graph for WDSLib. 460 This modified adjacency list for a directed and weighted WDS graph consists of n un- 461 j ordered lists for each vertex n . This list contains all the vertex and edge pairs to which 462 i vertex n is adjacent. For example, the adjacency list for the same network that is shown 463 i intheFig.3canbedescribedbyfourlists (2,1),(3,4) , (1,1),(4,2) , ((1,4),(4,3) , (2,2),(3,3) . 464 {{ } { } { } { }} Each list represents the set of adjacent vertex and edge pair of a vertex in the graph. For 465 example, the first list, (2,1),(3,4) , describes that the vertex 1 is adjacent to the vertex 466 { } 2 by edge 1 and the vertex 3 by edge 4. It is fast to search through both the rows and 467 columns of the A matrices that are stored in this format. 468 1 In addition to these optimized encodings, both G and F are diagonal square matrices, 469 140
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed Table 4: Different sparse representations for A 1 Types size(A ) size(A ) size([A A ]) Column Search Row Search 1 2 1 2 CCS 2 nnz+n +1 2 nnz+n +1 4 n +n +2 O(n) O((n )n) j f p n j × × × CRS 2 nnz+n +1 2 nnz+n +1 6 n +2 O((n )n) O(n) p p p p × × × EPANET - - 2 n O(n) O((n )n) p j × WDSlib - - 4 n O(n) O(n) p × which require less storage when stored as vectors than in sparse matrix form. The storage 470 methods used for the variables in WDSLib and their associated memory usage are given 471 in Table 5. 472 As a final note, to offer further assurance of the correctness of memory management in 473 WDSLib, Valgrind (Nethercote and Seward 2007), a programming debugging tool, was 474 deployed during testing to detect any memory leaks, memory corruption, and double- 475 freeing. 476 Table 5: Vectors and matrices in WDSLib variables type size storage method memory requirements q, L D, r vector n 1 vector n double , p p × × h, d vector n 1 vector n double j j × × G, F matrix n n vector n double p p p × × A , A matrix n n sparse matrix (2 n ) integer 1 2 p j p × × × L matrix (n n ) n sparse matrix (n n ) n integer 21 p j j p j j − × ≤ − × × Design Considerations 3: Numerical Considerations 477 The calculations in WDSLib are performed in C++ under IEEE-standard double pre- 478 cision floating point arithmetic with machine epsilon (cid:15) = 2.22 10 16. Invariant 479 mach − × terms and parameters in every equation were evaluated in advance and replaced by full 480 20-decimal digit accuracy constants. Intermediate results of calculations, (which are not 481 easily accessible in EPANET), can be output at the user’s request. The stopping toler- 482 ance and stopping test can be set by the user either through the configuration file or by 483 the relevant setter method in the Parameter class. 484 141
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed is identified as a leaf node when its node degree is one. Every time a leaf node, node k, 533 is identified, the node pointer is moved to its adjacent node, node k, and the node degree 534 of node k is reduced by one. This process repeats if the adjusted node degree of node k 535 is one. Otherwise, node k is the root node for this tree and the algorithm progresses to 536 the next tree in the forest. 537 Key Optimization 2: Improvements to Spanning Tree Search 538 The reformulated co-tree flows method (RCTM) in this paper is also a substantial im- 539 provement over the algorithm of the original paper (Elhay et al. 2014). The original 540 spanning tree search algorithm sweeps the rows of the A matrix (pipes) in order to 541 1 identify the singleton rows and their corresponding columns. The spanning tree search 542 in the original RCTM required a sweep of of the A matrix to identify the next pipe in 543 1 the spanning tree. This algorithm is O(n n ), which is relatively inefficient. 544 p j The pseudo-code for the refined spanning tree search algorithm is shown in Ap- 545 pendixCThisimprovedalgorithmtakesasinputtheadjacencylistdescribingthenetwork 546 and the pipe indexes of the core component of the network from the Algorithm 1 (if the 547 FCPA is used). In this algorithm, all water sources are the starting point of the search 548 process, SN, and marked as visited. The nodes in SN are then used as to identify a 549 spanning tree within the WDS. This is achieved by repeatedly finding all adjacent pairs, 550 node t and pipe s, of and removing the first node in SN by using the adjacency list. 551 If the adjacent node t is not visited then node t is inserted into the spanning-tree node 552 vector, STN, and search node vector, SN, and node t is marked as visited and pipe s to 553 the spanning-tree pipe vector, STP, and pipe s is marked as visited. If the adjacent node 554 t is visited and the pipe s is not visited then the pipe s is inserted into the co-tree pipe 555 vector, CTP and mark pipe s as visited. This process is repeated until SN is empty. 556 The overall time-complexity of this algorithm is O(n + n ) (compared to O(n n ) as 557 p j p j mentioned above) is the same as the best asymptotic complexity of breadth-first search 558 on a graph. 559 144
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed 6.1 Example 2 - A Simple Network Design Application 578 AsaminimalistexampleoftheapplicationofWDSLibtoaWDSnetworkdesignproblem, 579 the following example uses 1+1EA for optimally sizing pipe diameters. This algorithm 580 takes an existing network with randomly generated pipe diameters and optimizes the 581 network to minimize cost, subject to given pressure head constraints. A 1+1EA is a very 582 simple evolutionary strategy (Beyer and Schwefel 2002) which starts with a randomly 583 generated individual (in this case a WDS diameter configuration). This 1+1EA then 584 progresses by applying a mutation to a random pipe diameter size, and then evaluating 585 the new individual. If the new individual is better it replaces the old network. This 586 process continues in a loop until a given number of evaluations is reached. 587 The C++ code for this example is shown in Figs. 5, 6, 7, and 8. If the name of the 588 file containing this code is: simpEA.cc then the simplest command to compile this code 589 is: 590 g++ simpEA.cc -o simpEA -Llib -lWDSLib 591 To run this code the user would type: 592 ./simpEA config.txt 593 where config.txt contains the same configuration text as for the previous example. 594 Starting with the main function in Fig. 5, line 15 points to the config file specified by 595 thecommandline. Thenexttwolinesinitializetheresultandthesimulationaccording 596 to the configuration file. This is followed by the L module to perform the user selected 597 1a L functions. Line 19 generates the initial pipe diameters of the network and line 20 598 1a initializes the workspace for the mutated string. Line 23 sets the pipe diameters of the 599 network. Line 24 evaluates the current network configuration. The permutation and 600 scaling for the current individual is reversed by L in line 25 of Fig. 5. Line 26 calculates 601 1b the fitness of the current network configuration by using the evaluate function in Fig. 8. 602 This function applies a penalty for pressure head constraint violations and pipe material 603 costs. The body of the 1+1EA is contained in the selection operator and mutation 604 operator that follow. Lines 27 to 31 compare the string in the current generation with 605 146
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed the current best string if the individual p1, as measured by evaluate is better than the 606 individual p2 then p1 replaces p2. Line 32 mutates the current network, p2, using mutate 607 (see Fig. 7). The mutate function changes the diameter of a randomly selected pipe in the 608 networktoarandomlyselecteddiameter, chosenfromasetofcommerciallyavailablepipe 609 diameters. The mutated individual, stored in the workplace p1, is used as the network 610 configuration for the next iteration. Until the total number of generations is reached, the 611 user selected information about the best individual is outputted by dispResult in line 612 34 of Fig. 5. 613 It should be noted that the algorithm described above can be used to design a simple 614 WDS but is not optimal in terms of speed of convergence. Other EA’s such as genetic 615 algorithms (Simpson et al. 1994) will perform better. However the above example has the 616 advantage of simplicity and contains all the basic elements that a GA would use when 617 interacting with WDSLib. 618 This concludes the presentation of examples in this work. The next section presents 619 a case study that illustrates the performance of WDSLib in a multi-simulation setting. 620 7 Case Study 621 The following presents timing results for WDSLib running the 1+1EA described in the 622 previous section. The results below compare the four different solvers plus EPANET2. 623 Note, that detailed timings for once-off simulations comparing the four methods can be 624 found in Qiu et al. (2018). Three networks were benchmarked in these experiments. 625 These were the N , N , and N case-study networks used in Simpson et al. (2014). 626 1 3 4 Table 7 summarizes the characteristics of these networks. Table 7: Benchmark networks summary Full Network Forest & Core Networks Co-tree Network Network n n n n (n /n#) n n n p j s f f p jc pc ct N 934 848 8 361 (38%) 573 487 84 1 N 1975 1770 4 823 (42%) 1152 947 205 3 N 2465 1890 3 429 (17%) 2036 1461 757 4 149
ADE
AppendixA. SubmittedversionofPublication1: WDSLib: AWaterDistributionSystem SimulationTestBed Table 8 shows the results of the 1+1EA from Fig. 5 for the GGA, GGA with FCPA, 627 RCTM, RCTM with FCPA and the EPANET2 solvers. For each of the four WDSLib 628 solvers above, the timings are given for running the EA with and without the L1 modules 629 hoisted out the main EA loop. Each experiment evaluates the WDS network 100,000 630 times. And the best performing method for each network is highlighted in bold. It is 631 important to note that 1+1EA using both the GGA and the WDSLib 632 Table 8: The actual 1+1EA run-time with 100,000 evaluations (min.) for each of the four solution methods applied networks N , N , N 1 3 4 GGA GGA with FCPA RCTM RCTM with FCPA EPANET min. min. min. min. min. N 6.73 4.64 4.53 4.13 9.81 1 N 15.21 9.79 13.75 10.30 26.43 3 N 21.14 16.29 23.92 21.93 67.11 4 The results show that the EA runs using WDSLib are substantially faster than the 633 runs using the EPANET2 solver. This is, in part, due to the fact that the EPANET2 634 solver is designed as a standalone solver which does not facilitate lifting out of invariant 635 computations from the EA loop. 636 As a demonstration of how the performance of an EA can be traced Fig. 9 shows the 637 evolution of the fitness values of the N network. These traces were extracted from a file 638 1 written to in line 30 in Fig. 5. As can be seen, the cost and the pressure head violation 639 terms drop during the EA run. Note that there will be considerable variation between 640 1+1EA runs due to its highly stochastic nature. 641 8 Conclusions 642 ThispaperhasdescribedWDSLib, alibraryforsteady-statehydraulicsimulationofWDS 643 networks. WDSLib is fast, modular, and portable with implementation of several stan- 644 dard and recently published hydraulic solution methods. We have outlined the supported 645 solution methodologies, the structure of the package and key aspects of WDSLib’s imple- 646 mentation. Two example applications have been presented including a design case study 647 150