TY - JOUR
T1 - Modeling contaminant intrusion in water distribution networks
T2 - A new similarity-based DST method
AU - Deng, Yong
AU - Jiang, Wen
AU - Sadiq, Rehan
PY - 2011/1
Y1 - 2011/1
N2 - Contaminant intrusion in a water distribution network is a complex but a commonly observed phenomenon, which depends on three elements - a pathway, a driving force and a contamination source. However, the data on these elements are generally incomplete, non-specific and uncertain. In an earlier work, Sadiq, Kleiner, and Rajani (2006) have successfully applied traditional Dempster-Shafer theory (DST) to estimate the "risk" of contaminant intrusion in a water distribution network based on limited uncertain information. However, the method used for generating basic probability assignment (BPA) was not very flexible, and did not handle and process uncertain information effectively. In this paper, a more pragmatic method is proposed that utilizes "soft" computing flexibility to generate BPAs from uncertain information. This paper compares these two methods through numerical examples, and demonstrates the efficiency and effectiveness of modified method.
AB - Contaminant intrusion in a water distribution network is a complex but a commonly observed phenomenon, which depends on three elements - a pathway, a driving force and a contamination source. However, the data on these elements are generally incomplete, non-specific and uncertain. In an earlier work, Sadiq, Kleiner, and Rajani (2006) have successfully applied traditional Dempster-Shafer theory (DST) to estimate the "risk" of contaminant intrusion in a water distribution network based on limited uncertain information. However, the method used for generating basic probability assignment (BPA) was not very flexible, and did not handle and process uncertain information effectively. In this paper, a more pragmatic method is proposed that utilizes "soft" computing flexibility to generate BPAs from uncertain information. This paper compares these two methods through numerical examples, and demonstrates the efficiency and effectiveness of modified method.
KW - Dempster-Shafer theory
KW - Fuzzy set theory
KW - Risk of contaminant intrusion
KW - Similarity measure
KW - Uncertainty
KW - Water distribution networks
UR - http://www.scopus.com/inward/record.url?scp=77956618534&partnerID=8YFLogxK
U2 - 10.1016/j.eswa.2010.07.004
DO - 10.1016/j.eswa.2010.07.004
M3 - 文章
AN - SCOPUS:77956618534
SN - 0957-4174
VL - 38
SP - 571
EP - 578
JO - Expert Systems with Applications
JF - Expert Systems with Applications
IS - 1
ER -