2006
DOI: 10.1061/(asce)0733-9496(2006)132:4(252)
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Contaminant Sources in Water Distribution Systems Using Simulation–Optimization Method: Case Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0
1

Year Published

2008
2008
2020
2020

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 127 publications
(37 citation statements)
references
References 9 publications
0
36
0
1
Order By: Relevance
“…The goal of this methodology is to decrease the complexity of the problem, while continuing to identify realistic sources of contamination. Guan et al (2006) describes an algorithm that utilizes simulation-optimization and a reduced gradient method (RGM) to solve the source identification problem. Their use of RGM aims to reduce the computation time of the simulation-optimization process.…”
Section: Optimizationmentioning
confidence: 99%
See 1 more Smart Citation
“…The goal of this methodology is to decrease the complexity of the problem, while continuing to identify realistic sources of contamination. Guan et al (2006) describes an algorithm that utilizes simulation-optimization and a reduced gradient method (RGM) to solve the source identification problem. Their use of RGM aims to reduce the computation time of the simulation-optimization process.…”
Section: Optimizationmentioning
confidence: 99%
“…Their use of RGM aims to reduce the computation time of the simulation-optimization process. Guan et al (2006) also examined the effect of error in sensor data on the algorithms ability to correctly identify a source. They found that the algorithm could still correctly identify a source, but it was not able to accurately define the release history.…”
Section: Optimizationmentioning
confidence: 99%
“…van Bloemen Waanders et al 2003;Laird et al 2005Laird et al , 2006; Guan et al 2006;Liu et al 2006;Preis & Ostfeld 2007. These optimization approaches include direct methods and simulation-optimization approaches.…”
Section: Contaminant Source Characterization Is Complicated Notmentioning
confidence: 99%
“…Because of the discreteness, nonlinearity and nonconvexity, as well as the limiting assumptions of existing optimization formulations, indirect methods have recently attracted increasing attention. Taking advantage of a simulation-optimization approach, wherein the water distribution system simulation model EPANET was used as a simulator, Guan et al (2006) demonstrated its applicability to nonlinear contaminant sources and releasehistory identification by incorporating the reduced gradient method. Another simulation-optimization approach, proposed by Liu et al (2006), used a multiple population-based evolutionary algorithm to search for a set of contaminant source characteristics that may result in similar sensor observations.…”
Section: Contaminant Source Characterization Is Complicated Notmentioning
confidence: 99%
“…The first type used, for example, by Shang et al (2002), employs a methodology to trace back a contaminant particle in discrete time, given a sensor's first detection time and concentration; however, this procedure cannot determine the contaminant release history (contaminant intrusion time, duration, and mass rate) although it is suitable as a pre-step to reduce the search space for an optimization procedure. A second methodology, a simulation-optimization method based on a reduced gradient method (e.g., Guan et al 2006) or genetic algorithm (GA), involves considerable runtime due to the necessity to simulate large numbers of injection events using EPANET (Rossman 2000). To accelerate the GA optimization procedure, parallel GA has been proposed (e.g., Sreepathi et al 2007), which allows simulation of intrusion events with EPANET in parallel; the parallel GA procedure has the following limitations: 1) to utilize this procedure online, a water utility may need to maintain the parallel computing facilities or hardware routinely, since the time of an intrusion event is never known à priori, and hence the computing units may be required at any time.…”
Section: Introductionmentioning
confidence: 99%