Skip to main content

Advertisement

Log in

Research on contaminant sources identification of uncertainty water demand using genetic algorithm

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Urban water supply network is easily affected by intentional or occasional chemical and biological pollution, which threatens the health of consumers. In recent years, drinking water contamination happens occasionally, which seriously harms social stabilization and safety. Placing sensors in water supply pipes can monitor water quality in real time, which may prevent contamination accidents. However, how to reversely locate pollution sources through the detecting information from water quality sensors is a challengeable issue. Its difficulties lie in that limited sensors, massive pipe network nodes and dynamic water demand of users lead to the uncertainty, large-scale and dynamism of this optimization problem. This paper mainly studies the uncertainty problem in contaminant sources identification (CSI). The previous study of CSI supposes that hydraulic output (e.g., water demand) is known. Whereas, the inherent variability of urban water consumption brings an uncertain problem that water demand presents volatility. In this paper, the water demand of water supply network nodes simulated by Gaussian model is stochastic, and then being used to solve the problem of CSI, simulation–optimization method finds the minimum target of CSI and concentration which meet the simulation value and detected value of sensors. This paper proposes an improved genetic algorithm to solve the CSI problem under uncertainty water demand and comparative experiments are placed on two water distribution networks of different sizes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Zhangjie, F., Xingming, S., Qi, L., Lu, Z., Jiangang, S.: Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing. IEICE Trans. Commun. 98(1), 190–200 (2015)

    Google Scholar 

  2. Gu, B., Sheng, V.S., Wang, Z., Ho, D., Osman, S., Li, S.: Incremental learning for v-support vector regression. Neural Netw. 67, 140–150 (2015)

    Article  Google Scholar 

  3. Guo, P., Wang, J., Geng, X.H., Kim, C.S., Kim, J.-U.: A variable threshold value authentication architecture for wireless mesh networks. J. Internet Technol. 15(6), 929–935 (2014)

    Google Scholar 

  4. Xie, S., Wang, Y.: Construction of tree network with limited delivery latency in homogeneous wireless sensor networks. Wirel. Personal Commun. 78(1), 231–246 (2014)

    Article  Google Scholar 

  5. Hu, C., Li, M., Zeng, D., Guo, S.: A survey on sensor placement for contamination detection in water distribution systems. Wirel. Netw. (2016) 1–15. doi:10.1007/s11276-016-1358-0

  6. Zeng, D., Teng, C., Gu, L., Yao, H., Liang, Q.: Flow setup time aware minimum cost switch-controller association in software defined networks. 11th International Conference on IEEE. 259–264 (2015)

  7. Shang, F., Ulber, J.G., Polycarpou, M.M.L.: Particle back-tracking algorithm for water distribution systems analysis. J. Environ. Eng. 128, 441–450 (2002)

    Article  Google Scholar 

  8. Laird, C.D., Biegler, L.T., van BloemenWaanders, B.G., Bartlett, R.A.: Contamination source determination for water networks. J. Water. Resour. Plan. Manag. 131, 125–134 (2005)

    Article  Google Scholar 

  9. De Sanctis, A.E., Shang, F., Uber, J.G.: Real-time identification of possible contamination sources using network backtracking methods. J. Water. Resour. Plan. Manag. 136, 444–453 (2010)

    Article  Google Scholar 

  10. Costa, D.M., Melo, L.F., Martins, F.G.: Localization of contamination sources in drinking water distribution systems: a method based on successive positive readings of sensors. Water Resour. Manag. 27, 4623–4635 (2013)

  11. Huang, J.J., McBean, E.A.: Data mining to identify contaminant event locations in water distribution systems. J. Water Resour. Plan. Manag. 135, 466–474 (2009)

    Article  Google Scholar 

  12. Perelman, L., Ostfeld, A.: Bayesian networks for source intrusion detection. J. Water Resour. Plan. Manag. 139, 426–432 (2013)

    Article  Google Scholar 

  13. Wang, H., Jin, X.: Characterization of groundwater contaminant source using Bayesian method. Stoch. Environ. Res. Risk Assess. 27, 867–876 (2013)

    Article  Google Scholar 

  14. Wang, H., Harrison, K.W.: Improving efficiency of the Bayesian approach to water distribution contaminant source characterization with support vector regression. J. Water Resour. Plan. Manag. 140, 3–11 (2014)

    Article  Google Scholar 

  15. Guan, J., Aral, M.M., Maslia, M.L., Grayman, W.M.: Identification of contaminant sources in water distribution systems using simulation-optimization method: case study. J. Water Resour. Plan. Manag. 132, 252–262 (2006)

    Article  Google Scholar 

  16. Liu, L., Ranjithan, S.R., Mahinthakumar, G.: Contamination source identification in water distribution systems using an adaptive dynamic optimization procedure. J. Water Resour. Plan. Manag. 137, 183–192 (2010)

    Article  Google Scholar 

  17. Hu, C., et al.: A MapReduce based parallel niche genetic algorithm for contaminant source identification in water distribution network. Ad Hoc Netw. 35, 116–126 (2015)

    Article  Google Scholar 

  18. Yan, X., et al.: Contaminant source identification in water distribution network based on hybrid encoding. J. Comput. Methods Sci. Eng. 16, 379–390 (2016)

    Google Scholar 

  19. Vankayala, P., et al.: Contaminant source identification in water distribution networks under conditions of demand uncertainty. Environ. Forensics 10, 253–263 (2009)

    Article  Google Scholar 

  20. Holland, J.H.: Adaptation in Natural and Artificial Systems, 1st edn. MIT Press, Cambridge (1975)

    Google Scholar 

  21. Goldberg, D.E.: Genetic Algorithms in Search, Optimization, and Machine Learning. Addison wesley Reading, Menlo Park (1989)

    MATH  Google Scholar 

  22. Dogan, A., Ozguner, F.: Genetic algorithm based scheduling of meta-tasks with stochastic execution times in heterogeneous computing systems. Cluster Comput. 7(2), 177–190 (2004)

    Article  Google Scholar 

  23. Ramirez, A.J., et al.: Plato: a genetic algorithm approach to run-time reconfiguration in autonomic computing systems. Cluster Comput. 14(3), 229–244 (2011)

    Article  Google Scholar 

  24. Moghaddam, F.F., et al.: Carbon-aware distributed cloud: multi-level grouping genetic algorithm. Cluster Comput. 18(1), 477–491 (2015)

    Article  Google Scholar 

  25. Shojafar, M., et al.: FUGE: a joint meta-heuristic approach to cloud job scheduling algorithm using fuzzy theory and a genetic method. Cluster Comput. 18(2), 829–844 (2015)

    Article  Google Scholar 

  26. Wu, Q., et al.: Multi-label classification algorithm research based on swarm intelligence. Cluster Comput. 19(4), 2075–2085 (2016)

    Article  Google Scholar 

  27. Sheng, X., Kefeng, W.: Motif identification method based on Gibbs sampling and genetic algorithm. Cluster Comput. 1–9 (2016). doi:10.1007/s10586-016-0699-x

  28. Yan, X., et al.: Hybrid genetic algorithm for engineering design problems. Cluster Computing. 1–13 (2016). doi:10.1007/s10586-016-0680-8

  29. Meng, X., et al.: A genetic algorithm using K-path initialization for community detection in complex networks. Cluster Computing. 1–10 (2016). doi:10.1007/s10586-016-0698-y

Download references

Acknowledgements

This paper is supported by Natural Science Foundation of China (Nos. 61402425, 41404076, 61501412, 61673354, 61672474).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hu Chengyu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xuesong, Y., Jie, S. & Chengyu, H. Research on contaminant sources identification of uncertainty water demand using genetic algorithm. Cluster Comput 20, 1007–1016 (2017). https://doi.org/10.1007/s10586-017-0787-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-0787-6

Keywords

Navigation