Assessment of the Water Distribution Networks in the Kingdom of Saudi Arabia: A Mathematical Model

: Graph theory is a branch of mathematics that is crucial to modelling applicable systems and networks using matrix representations. In this article, a novel graph-theoretic model was used to assess an urban water distribution system (WDS) in Saudi Arabia. This graph model is based on representing its elements through nodes and links using a weighted adjacency matrix. The nodes represent the points where there can be a water input or output (sources, treatment plants, tanks, reservoirs, consumers, connections), and links represent the edges of the graph that carry water from one node to another (pipes, pumps, valves). Four WDS benchmarks, pumps, tanks, reservoirs, and external sources were used to validate the framework at ﬁrst. This validation showed that the worst-case scenarios for vulnerability were provided by the fault sequence iterating the calculation of the centrality measurements. The vulnerability framework’s application to the Saudi Arabian WDS enabled the identiﬁcation of the system’s most vulnerable junctions and zones. As anticipated, the regions with the fewest reservoirs were most at risk from unmet demand, indicating that this system is vulnerable to the removal of junctions and pipes that are intricately associated with their neighbours. Different centrality metrics were computed, from which the betweenness centrality offered the worst vulnerability prediction measures. The aspects and zones of the WDS that can more signiﬁcantly impact the water supply in the event of a failure were identiﬁed by the vulnerability framework utilising attack tactics.


Introduction
Recently, the performance of water distribution systems (WDSs) has been investigated using graph theory and statistical models [1].In the past, WDSs were created using mathematical models to determine their ideal system layout in terms of satisfying each node's water demand and pressure level [2].This approach is now considered conventional.Moreover, the role of reliable mathematical models has been investigated, showing them to be vital to achieving excellence in the future planning and control of water supply networks [3].The study of the complex WDS representation can provide insights into its vulnerability, for instance by detecting the critical elements that simulate attacks on its structure [4].It has been exposed that the networks derived from WDSs present some randomness, which can be positive for the topological robustness, but the geographical constraints can make their structure close to planar graphs [5].Topological attributes such as connectivity, efficiency, centrality, robustness, and modularity have also been applied to predict the resilience of WDSs [6].It has been found that the selection of the topological attributes to describe the resilience of the WDS has to be careful and that these metrics are meaningful for assessing the network under stress conditions [7].A holistic analysis framework has been presented for decision-making in water distribution networks based on graph spectral techniques, exploiting the properties of the eigenvalues and eigenvectors of graph matrices [8].This kind of framework is more useful when combining topological (structural) attributes with performance measures to represent the behaviour of the grid and when they are applied to network models based on real conditions [9].Similarly, a number of important attributes of WDSs and their relationship with vulnerability have also been studied in power systems [10] and, then, have been successfully applied to water networks [11].
The implications of the above-mentioned references are more relevant to the unique geographical characteristics of the Kingdom of Saudi Arabia (KSA) due to the year-round scarcity of water resources and because the weather conditions in this region favour droughts.Despite such circumstances, this country is an important agricultural producer in the region, using a large percentage of the available water for such activities [12].However, there is a large disparity in the access to piped water supply and sewage across the provinces [13].The government of the KSA has proposed several strategic objectives related to the preservation, optimisation, and management of water resources in its Saudi Vision 2030 strategic framework and the National Transformation Program 2020.In order to boost agricultural output and create efficient production systems for plants, livestock, and fisheries, the Ministry of Environment, Water, and Agriculture has set strategic goals for guaranteeing the long-term security of food [14].To ensure the continuous supply of water, it is crucial to understand the vulnerabilities of the water distribution network.Such a network connects the sources with the consumers, ensuring that the conditions of the water flow and pressure are appropriate.Water distribution systems (WDSs) can be modelled as weighted graphs using complex network theory to represent the operation of the grid under particular conditions, as has been performed on other real networks [15].Before describing this article's findings and problem statement, it is important to familiarise ourselves with the following terms, which will be used repeatedly in the remaining text.
Vulnerability framework: This provides a vulnerability prediction measure that can be compared with other networks or with the same network under different conditions.Centrality metrics: These are the most widely employed indicators for identifying important nodes in a network.Structural features: These are based merely on the connections between nodes, which in this case represent how the pipes and the junctions are connected.Operational features: These are based on the operation of the system, considering the demand, the supply, and the water flows in a particular state.Malware profile: This is an ordered collection of network elements (nodes or links).Functional damage: This is measured as the fraction of unsatisfied demand determined after removing the faulty elements.Physical damage: This is measured by determining the fraction of removed elements in a particular stage of the failure sequence.Vulnerability curve: This is a graph in which the axis along the horizontal direction indicates a physical damage metric and the vertical axis a functional damage measure.Vulnerability prediction measure (VPM): This is derived from the area under the vulnerability curve and expresses the degree of damage using the physical damage measure.
On the one hand, the optimisation model has suggested new chlorine booster locations to improve water quality in the water distribution network of the city of Al-Khobar [16].On the other hand [11], a vulnerability assessment was performed on different benchmarks to evaluate the metrics of centrality in different regions of the USA.However, these benchmarks did not include tanks, pumps, or external sources.Motivated by the above review and discussion, we used graph modelling to develop a vulnerability framework that allows assessing the vulnerability of the network proposed in [16] by considering the missing sources of [11], i.e., tanks, pumps, or external sources.We considered both structural and operational features.Our vulnerability framework studies the impact that removing certain nodes or links of the network has over the satisfied water demand.It employs centrality measures and different failure strategies to test the network.The framework provides a vulnerability prediction measure that can be compared with other networks or with the same network under different conditions.We give an application of this vulnerability framework and provide recommendations to improve the robustness of such networks.
The plan of this paper is as follows: After providing water distribution network modelling in Section 2, we add a necessary discussion about vulnerability framework and centrality metrics in Section 3 and Section 4, respectively.Degree, eigenvector, betweenness, closeness PageRank, and Katz metric of centralities are considered.The representation of our model using line graphs is worked out in Section 5. A general methodology of vulnerability assessment on benchmarks is provided in Section 6, while Section 7 also addresses these benchmarks for a case study in an urban water distribution system based in KSA.Section 8 provides a comprehensive discussion and analysis of the results obtained leading to a conclusion and future directions in Section 9.

Water Distribution Network Modelling
This section presents the fundamentals of the simplified WDS graph model proposed in this article, which is based on representing its elements through nodes and links.The nodes represent the points where there can be a water input or output (sources, treatment plants, tanks, reservoirs, consumers, connections), and links represent elements that carry water from one node to another (pipes, pumps, valves).
The WDS weighted graph G(v, l) consists of a set of nodes v = {v 1 , v 2 , ..., v n } and a set of links l = {l 1 , l 2 , ..., l m }.Each link is related to a corresponding weight Q = {Q 1 , Q 2 , ..., Q m }, which represents the water flow calculated using the quasi-static flow equations.
The steady-state hydraulic model is based on the mass and energy balance equations: where Q j are the unknown flows in all N i links/pipes connected to the i-th network node, Q d,i is the demand known at the node i, H i,u is the unknown total head at the upstream node of the i-th pipe, and ∆H i is the calculated difference between the i-th pipe's total head loss and pumping head.The change in total energy across each link is determined by where K is the coefficient of local head loss and R is the resistance coefficient of pipe, whose value is dependent upon the friction head loss model in use.The value of n also depends on this model and H p,i (Q i ) is the head delivered by a pump placed at link i, which is a function of the flow delivered [17].
The expressions (1), ( 2) and ( 3) are a set of nonlinear equations whose solution requires numerical methods, for instance, the gradient algorithm, which is applied in this article through the EPANET-Matlab Toolkit [18].The EPANET-Matlab Toolkit allows importing and exporting calculations from EPANET using Matlab, which is a powerful tool for managing and analysing the data of the WDS [19].Since its creation in 1993 by the United States Environmental Protection Agency (USEPA), EPANET has been the most widely used water modelling program.It has been used extensively for the last 30 years to simulate hydraulic and water quality systems.Pumps, valves, reservoirs, nodes, and pipes make up the WDS's hydraulic system.All input data for parameters including pipe length, diameter, water head, and coefficient values are needed by the EPANET's hydraulics model [16].Velocities, junction pressures, and head losses in the network make up the output values of the model.

Vulnerability Framework
The vulnerability evaluation approach is based on the prior work [11] for electric power system vulnerabilities, which included individually concentrated attacks and sequential profiles of attacks on connections and nodes of the related graph model.In this sense, a malware profile is an ordered collection of network elements (nodes or links) [10].The framework proposes the vulnerability curve, which is helpful in determining the amount of functional damage caused by a fault profile.The vulnerability curve is a graph that represents a physical damage measure on the horizontal axis and a functional damage measure on the vertical axis.Both measures are zero in the initial stage when the network works normally, as the network is affected by physical or functional damage.The measures increase gradually until they reach one, which represents 100% of damage.
When using WDS, the functional loss is defined by the amount of unsatisfied demand (UD) that remains after the defective components have been eliminated.Under the assumption that the first k components of the malfunctioning sequence are removed, this is calculated by where wd s (k) is the water requirement met by the current stage's sources, and wd total is the system's starting total water demand.
Using the proportion of deleted components (FOE) on the m-th phase in the failure sequence, the physical damage is calculated by The vulnerability prediction measure (VPM), which is derived from the area under the vulnerability curve, expresses the degree of damage using physical damage measures.In this regard, it is argued that the assault sequence damages the WDS more severely depending on the VPM, making the network more susceptible to similar attacks.The WDS represented in EPANET is transformed to a Matlab graph object [20], and based on the type of attack, UD(k) is then determined and documented in all stages.Removing the most important component first (RMCEF) and iterating the greatest central element first (IMCEF), two distinct kinds of fault sequences are assessed in this study.
The vector f , which contains arranged components in accordance with centrality and represents the RMCEF fault sequence, is Figure 1 illustrates the RMCEF algorithm's streamlined flow diagram.The algorithm removes the nodes or pipes according to the vector f , runs the hydraulic analysis, and determines the unsatisfied demand using Equation (4) and the fraction of removed elements using Equation (5) until the demand is totally unsatisfied or all the elements are removed, i.e., UD(k) = 1 or FOE(k) = 1.
The component with the greatest relevance in the present grid is targeted and eliminated using the IMCEF attack profile.The key characteristic is that after an element is removed, the centrality metrics are recalculated.The concept behind the aforementioned attack profile is that after the most central piece is eliminated, the centrality metrics change and the second-most important component from the original ranking may no longer be of such importance.The order of components according to centrality must then be updated, as shown in Figure 2, and the centralities vector needs to be recalculated.

Centrality Metrics
The most popular pointers for recognising significant points in an arbitrary network are centrality metrics; however, depending on the study case and the type of network, importance may have varied implications [21].The centralities used in this study are used to gauge an element's significance in relation to the water flow that passes through it.When comparing several centrality measures for related applications in electric power systems, past studies found that the degree, Katz, and eigenvector centralities based on power traffic vs. water flow were the most trustworthy.Furthermore, it has been suggested that PageRank centralities, betweenness, and closeness are relevant in contemporary computational applications.It has been suggested that betweenness, closeness, and degree centralities are suitable metrics for examining centrality in spatial networks [22].
The size, connectivity, and related weights of the network all affect how difficult it is to calculate centrality measurements.The effectiveness of the aforementioned centralities for determining WDS susceptibility is compared in this paper.The weighted graph framework developed in Section 2 is used to calculate the metric of these centralities.These are normalised for better comparability such that the total of the metrics for all the nodes or links equals one unit.

Degree Metric of Centrality
The popular centrality metric known as degree centrality (D i (G)) provides some understanding of a node's connectedness.The system's infrastructure and the node's location in it still may be overlooked by i, according to [23].Generally, it counts the total number of edges that are associated with i, particularly in the case of the weighted graph used in this study, which takes the weights of those edges into account.Accordingly, it can be computed using the following formula: where Q ij is the stream of water between junction i and j.

Eigenvector Metric of Centrality
Bonacich suggested the eigenvector centrality (E i (G)) in 1972 as a metric of significance based on the notion that a node's prominence is correlated with the significance of its neighbours.It is determined under the presumption that the node's i centrality is inversely related to the sum of its neighbours' centralities [23].This metric's calculation looks like this: where u j represents the j-th component associated with the eigenvector that corresponds to λ max , and λ max is the maximum eigenvalue of its weighted matrix of adjacency based on water flows.

Betweenness Metric of Centrality
The importance of a particular node with regard to its function in tying the other nodes in the system together is measured by Freeman's centrality of betweenness (B i (G)) associated with the node i.As in the instance of WDS, the transit of water amongst the other nodes, betweenness is aimed at conveying the significance of the node being a bridge in the connection with other nodes.Such statistic takes into account the total number of shortest pathways as well as the number of shortest routes that pass the chosen node.We use the following formula: where σ jk (i) is the number of shortest paths between junction j and k that pass through junction i, but σ jk is the total number of shortest paths between junctions j and k.

Closeness Metric of Centrality
The network's overall distance between a node's i element and the other nodes determines its C i (G) closeness centrality.The nodes that require the fewest steps in order to interact with the remaining nodes in the system are the most important nodes when utilising this metric.It can be determined by using: where the shortest length from junction i to j is d ij .The harmonic closeness, which is another method of determining the closeness [23], is an accumulation of the reciprocal distances between nodes, and can be written in the form of the following equation: This metric can also be standardised to have a range between 0 and 1, giving the following results: The closeness measure of Equation ( 10) is null if a network is not fully connected since the gap between two nodes that are related to distinct components is unlimited.The harmonised proximity Equation ( 11) is used as a workaround for this issue; see [22] for more information.

PageRank Metric of Centrality
As a statistic to categorise websites in accordance with their relative relevance, the PageRank metric of centrality was put forward.According to [24,25], the PageRank metric of centrality grows significantly when the total number of back links or connections pointing to the website, is high.When it comes to WDS, a junction's PageRank centrality indicates how many additional junctions link to it, or if there are few junctions pointing, then those junctions have a high PageRank.The PageRank centrality formula is given by: where the damping factor α is a value between 0 and 1, and δ + (j) is the node's out-degree.The PageRank centrality (PR i (G)) computation in this study is done using the Matlab copyright method as an outcome of a network's random walk.If a node in the graph has no successors, the next node is selected from all of the nodes using 0.85 as probability from the collection of successors of the present node.The average amount of time taken at every node throughout the random walk is the centrality score.Self-loops in this method make the node to which they are attached more central.Edge weights have an impact on the likelihood of selecting a successor junction as well [20].

Katz Metric of Centrality
The Katz metric of centrality was developed as a way for estimating a person's popularity that considers both the status of each person emitting a "vote" as well as the amount of direct "votes" the person receives [26].In the context of WDS, the Katz metric of centrality denotes a node's significance considering the volume of water flowing through it and the significance of the connections from which it originates.The calculation of its centrality is where the n entries of e n are 1, I is the n × n identity matrix, e n is the adjacency matrix of the graph G determined by the water stream weights, and α is the attenuation element, which satisfies the following inequality involving the greatest eigenvalue of A: When this technique was initially applied to WDS, it failed to converge in some circumstances involving huge networks [25].

Representation Using Line Graphs
In contrast to the preceding part, which focused on the junction or node centralities, the link or pipe centralities are also assessed here using the theory of line graphs [27].To determine the pipe centralities, the weighted adjacency matrix A of the graph G(v, e) is transformed into an analogous line graph adjacency matrix using the following equations: where F is the weighted incidence matrix, with F αi = F αj = w ij , and the other elements of column α are set to zero, U is the diagonal matrix with element w, which is the vector with the sum of weights adjacent to each node in G and e n is a vector of ones with the appropriate size.This transformation is due to Yoshida [28].
In this article, diag(w) corresponds to a diagonal matrix with the elements in vector w, while diag(A) is a vector formed by the elements of the diagonal of the matrix A.
Self-loops confined in L are eliminated by removing the non-zero elements of its diagonal.This is accomplished by transforming it into M, which has zero diagonal elements by using the following equations: where D L is a matrix with only the diagonal entries l, which has the main diagonal elements of L. Furthermore, L wo has the off-diagonal elements of L. This method is due to the distribution of non-zero components of diag(L), while it keeps some of its properties.
To illustrate the conversion to a line graph we present an example using a small network called the EPANET-MSX Example Network, whose graph is shown in Figure 3.The edges with their respective weight and the weighted adjacency matrix (A) of the original graph are shown in Table 1. Figure 4 shows the line graph obtained after applying the proposed transformation, where each node represents a line (or pipe) in the original graph; the edges and the adjacency matrix of the transformed graph M are shown in Table 2.

Vulnerability Assessment on Benchmarks
In a previous study [11], a vulnerability assessment was performed on different benchmarks to evaluate the metrics of centrality and such outbreak techniques.However, these benchmarks did not include tanks, pumps, or external sources.In this section, the benchmarks employed include such elements and the Matlab algorithm was extended to be able to simulate their effect.
The experiments on benchmarks validate the Matlab/EPANET algorithms for the application of the vulnerability framework.The benchmarks were selected from the EPANET library [29] and Figures 5-7 present the graphs of each WDS, with the location of their elements.Furthermore, Table 3 shows the characteristics of the benchmarks.

Attacks on Junctions
The first experiment consisted of applying the vulnerability framework to the benchmarks using two junction attack sequences to obtain the VPMs with different centrality measures.Table 4 and Figure 8 show the simulation results for this experiment.
It is observed that the IMCEF attack strategy predicted a higher vulnerability in most of the cases simulated, with VPMs over 0.8, while the RMCEF strategy presented more variability in the VPM results.PageRank, degree, and Katz centralities were the most consistent in retrieving the highest VPM in the cases studied.
A benchmark that presented the highest VPM was the Net2, which can be related to the fact that this network does not have reservoirs but only one external source.

Attacks on Pipes
The second experiment with benchmarks consisted of applying the vulnerability framework using two attack sequences on pipes to obtain the VPMs with different centrality measures.In these cases, the attack sequence is applied to the line graph obtained from the original WDS weighted graph model.Table 5 and Figure 9 show the simulation results.
One can note that the technique of IMCEF attack also predicted a higher vulnerability in most of the cases simulated, but in this experiment, the variability of the results was similar to the RMCEF strategy.Using centrality metrics, Katz and degree metrics were the most consistent in retrieving the maximum VPM in the majority of the considered types.

Attacks on Junctions
In the same way that it was done with the benchmarks, the vulnerability assessment framework was applied to the representative urban Saudi Arabian WDS.Initially, attacks on junctions were evaluated with different centrality measures and applying both fault sequences (RMCEF and IMCEF).Figure 11 and Table 6 show the results of this experiment with different centrality measures.It is observed that the highest VPM was obtained for the IMCEF fault strategy with the betweenness centrality, followed by closeness and degree.From Figure 11 it is also noted that the PageRank and the Katz vulnerability curves from both sequences are similar, which can help to predict the IMCEF curve and VPM with a more efficient approach than the RMCEF sequence.
Furthermore, the calculated VPMs were lower than the ones obtained for the benchmarks in most cases, and observing the topology of the Saudi Arabian WDS it is evident that the network is more redundant and has multiple reservoirs, which make it less vulnerable.In the model, different zones were defined according to [16] to assess their vulnerability as shown in Figure 12.
Figure 12 shows a ranking of the junctions in the worst-case scenario (betweenness centrality) and they are also classified by zone, where the top nodes are the ones that are iteratively removed first.It is noted that the top nodes are located in different zones, and zones 4 and 5 have the largest amount of top junctions, representing the zones that are more central according to the iterated betweenness centrality.
In addition, the individual damage of removing each junction was evaluated and a ranking based on the UD that each node causes is shown in Figure 13.The nodes with the highest individual damage are located in zones 2 and 5. Thus, zone 5 of the network has two aspects that indicate its vulnerability.

Attacks on Pipes
The second part of the assessment was carried out on the pipes of the Saudi Arabian WDS.The attack sequence was applied to the line graph obtained by converting it to the simplified weighted graph.Figure 14 and Table 7 show the results of the vulnerability curves and the VPMs for the removal of pipes.
In this experiment, the IMCEF with betweenness centrality also presented the highest VPM followed by the eigenvector and PageRank.Examining Figure 14, the vulnerabil-ity curves for the degree, PageRank, and Katz centralities are similar for RMCEF and IMCEF strategies.

Discussion
The simulations implemented demonstrate the vulnerability assessment in WDS with pumps, tanks, reservoirs, and external sources.The experiments in benchmarks allowed us to validate the algorithms with such elements for the removal of junctions and pipes.This also leads to confirming the importance of the reservoirs in increasing the robustness of the WDS.
The IMCEF fault sequence detected the worst cases of vulnerability for junctions and pipes.However, the RMCEF is helpful as a fast way to predict the vulnerability when the system is large.
In particular, the assessment of the Saudi Arabian WDS demonstrated the importance of employing different centrality measures, since the betweenness had the highest VPM (Figure 15), which contradicts some of the previous results in benchmarks.Also, it is important to consider that this model has multiple reservoirs, tanks, and external sources, which makes it more complex than previous models evaluated.
In this case, the betweenness being the most relevant centrality indicates that the robustness of this WDS is related to the high connectivity between the junctions.Zone 5 presented two indicators of being the most vulnerable zone.Factors that are affected, in this case, are that this zone has no reservoirs and is in the centre of the WDS, connecting the rest of the junctions.
In addition, this work shows the results using an individual demand scenario, which is useful to demonstrate the application of the vulnerability framework.Another extension of the work could be the evaluation of different demand scenarios since the VPM is based on dissatisfied demand, which can lead to variable vulnerability conditions.

Conclusions
The main contribution of this article is the application of a vulnerability framework based on a simplified weighted graph model to assess the vulnerability of a Saudi Arabian WDS.Hence, we evaluated the vulnerability of a WDS with characteristics that are based on the Al-Khobar WDS [16].We provided an application of this vulnerability framework with recommendations to improve the robustness of such networks.
Initially, the algorithm was validated with three benchmarks, including pumps, tanks, reservoirs, and external sources.This validation confirmed that the IMCEF allows obtaining the worst-case scenarios for the vulnerability and identified degree, Katz, and PageRank centralities as more representative.Also, it related the lack of reservoirs to a higher vulnerability, as was expected.
The implementation of the vulnerability framework in the Saudi Arabian WDS provides the vulnerability curves and the VPMs with different attack sequences.The results coincide with the IMCEF providing the worst VPM, but in this case, the fault sequences based on the betweenness centrality provided the highest VPM.This indicates that this network is more susceptible to the removal of the elements that are highly connected with the rest.
In addition, this work demonstrated the identification of vulnerable zones using attacks on junctions and their individual damage.The zones identified as the most vulnerable correspond with the zones with fewer reservoirs and no tanks, supporting the importance of such elements to guarantee the water supply to all consumers.
For future directions of this work, one can focus on the simulation of the vulnerability framework, including the segment networks, and optimising the WDS by minimising the VPM and increasing the robustness of the WDS based on the characteristics of the KSA.Furthermore, conducting empirical research to confirm the viability and efficacy of the suggested approach in realistic settings can be one viable area for further study.Insights can be gained by looking at how the approach can be scaled and used in other situations and locations.To increase the scope and impact of this effort, it is also important to consider possible synergies with adjacent research fields and multidisciplinary collaborations.A confluence of more recent work [30,31] with these suggestions will be crucial for future developments.

Figure 1 .
Figure 1.Flow diagram for the Remove Most Central Element First (RMCEF) fault sequence.

Figure 2 .
Figure 2. Flow diagram for the Iterated Most Central Element First (IMCEF) fault sequence.

Figure 3 .
Figure 3. Graph corresponding to the EPANET-MSX Example Network.

Figure 8 .
Figure 8. VPM resulting from attacks based on junction removal under various fault schemes.

Figure 10 .
Figure 10.Network topology of the representative urban Saudi Arabian WDS.

Figure 11 .
Figure 11.Vulnerability curves obtained from attacks on junctions with different centrality measures and attack sequences for the representative urban Saudi Arabian WDS.

Figure 12 .
Figure 12.Zone definition and vulnerability ranking of junctions for the representative urban Saudi Arabian WDS.

Figure 13 .
Figure 13.Ranking of junctions according to the normalised individual damage.

Figure 14 .
Figure 14.Vulnerability curves obtained from attacks on pipes with different centrality measures and attack sequences for the representative urban Saudi Arabian WDS.

Figure 15 .
Figure 15.Summary of the VPM for the representative urban Saudi Arabian WDS.

Table 1 .
Edges and adjacency matrix corresponding to the EPANET-MSX Example Network.
Figure 4. Line graph corresponding to the EPANET-MSX Example Network applying the line graph conversion.

Table 2 .
Edges and adjacency matrix corresponding to the line graph obtained from the EPANET-MSX Example Network.

Table 3 .
Properties of the WDS benchmarks.

Table 4 .
VPM from various attack profiles applied at junctions.

Table 6 .
VPM for various assault profiles carried out for junctions.

Table 7 .
VPM for various assault profiles carried out for pipes.