2021
DOI: 10.1061/(asce)wr.1943-5452.0001362
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive Multipopulation Evolutionary Algorithm for Contamination Source Identification in Water Distribution Systems

Abstract: Real-time monitoring of drinking water in a water distribution system (WDS) can eectively warn and reduce safety risks. One of the challenges is to identify the contamination source through these observed data due to the real-time, non-uniqueness, and large scale characteristics. To address the real-time and non-uniqueness challenges, we propose an adaptive multi-population evolutionary optimization algorithm to determine the real-time characteristics of contamination sources, where each population aims to loc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 37 publications
0
3
0
Order By: Relevance
“…4 Undetected leaks result in wasted water, energy consumption for needless pumping, and contamination risks. 5,6 They also represent lost revenue for the utility. As pipes are buried underground, visual leak detection is complex, and many leaks remain unnoticed until they surface or cause obvious problems.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…4 Undetected leaks result in wasted water, energy consumption for needless pumping, and contamination risks. 5,6 They also represent lost revenue for the utility. As pipes are buried underground, visual leak detection is complex, and many leaks remain unnoticed until they surface or cause obvious problems.…”
Section: Introductionmentioning
confidence: 99%
“…Leakages can occur due to corrosion, pressure transients, construction defects, and aging infrastructure. , Even small leaks can gradually intensify and lead to significant pipe ruptures . Undetected leaks result in wasted water, energy consumption for needless pumping, and contamination risks. , They also represent lost revenue for the utility. As pipes are buried underground, visual leak detection is complex, and many leaks remain unnoticed until they surface or cause obvious problems .…”
Section: Introductionmentioning
confidence: 99%
“…These developments started by using traditional optimization techniques, such as linear programming (LP) scheme (Preis & Ostfeld, 2006). This was followed by the use of various evolutionary algorithms (EAs) as they possess superior search capabilities compared to the traditional LP and nonlinear programming (NLP) techniques (Hu et al., 2015; Li et al., 2021; Preis & Ostfeld, 2008). While these algorithms have reliable performance in locating contamination sources in hypothetical case studies, their practical application can be challenging.…”
Section: Introductionmentioning
confidence: 99%