{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:43:14Z","timestamp":1761896594600,"version":"3.41.2"},"reference-count":50,"publisher":"Wiley","issue":"24","license":[{"start":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T00:00:00Z","timestamp":1498694400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672474","61673354","41404076"],"award-info":[{"award-number":["61672474","61673354","41404076"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Concurrency and Computation"],"published-print":{"date-parts":[[2017,12,25]]},"abstract":"<jats:title>Summary<\/jats:title><jats:p>In recent years, the drinking water pollution incident occurred frequently, a serious threat to social stability and security. By using the sensor networks real\u2010time monitoring the urban water supply networks, the water pollution event probability can be greatly reduced. But knowing how to use the water quality monitor sensor networks to collect information to identify pollution sources is still a challenging problem. In this paper, we formulate the contaminant source identification problem into an optimization problem, and then design the cultural algorithm to solve it by considering different sizes of water supply networks as the experimental data. Finally, the experimental results verify the effectiveness and robustness of the proposed method.<\/jats:p>","DOI":"10.1002\/cpe.4230","type":"journal-article","created":{"date-parts":[[2017,6,29]],"date-time":"2017-06-29T07:36:39Z","timestamp":1498721799000},"source":"Crossref","is-referenced-by-count":26,"title":["Contaminant source identification of water distribution networks using cultural algorithm"],"prefix":"10.1002","volume":"29","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3333-1466","authenticated-orcid":false,"given":"Xuesong","family":"Yan","sequence":"first","affiliation":[{"name":"School of Computer Science China University of Geosciences Wuhan 430074 Hubei China"}]},{"given":"Wenyin","family":"Gong","sequence":"additional","affiliation":[{"name":"School of Computer Science China University of Geosciences Wuhan 430074 Hubei China"}]},{"given":"Qinghua","family":"Wu","sequence":"additional","affiliation":[{"name":"Faculty of Computer Science and Engineering Wuhan Institute of Technology Wuhan 430205 Hubei China"}]}],"member":"311","published-online":{"date-parts":[[2017,6,29]]},"reference":[{"issue":"6","key":"e_1_2_8_2_1","first-page":"929","article-title":"A variable threshold\u2010value authentication architecture for wireless mesh networks","volume":"15","author":"Guo P.","year":"2014","journal-title":"Journal of Internet Technology"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-014-1748-5"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389802"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1358-0"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389802"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3642"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417566"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2016.2569413"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000674"},{"key":"e_1_2_8_11_1","article-title":"A spark\u2010based genetic algorithm for sensor placement in large scale drinking water distribution systems","volume":"1","author":"Hu C","year":"2017","journal-title":"Cluster Computing"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9372(2002)128:5(441)"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9496(2005)131:2(125)"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000050"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11269-013-0431-z"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/2015WR018515"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9496(2009)135:6(466)"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000288"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00477-012-0622-9"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000323"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/2014WR015740"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s40996-016-0022-3"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9496(2006)132:4(252)"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/03052150701540670"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/10286600701695471"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9496(2009)135:5(334)"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/15275920903140486"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1061\/41173(414)35"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000104"},{"key":"e_1_2_8_30_1","first-page":"757","article-title":"Identification of pollutant source characteristics under uncertainty in contaminated water resources systems using adaptive simulated annealing and fuzzy logic","volume":"6","author":"Amirabdollahian M","year":"2014","journal-title":"International Journal of GEOMATE"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11269-014-0737-5"},{"key":"e_1_2_8_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10040-015-1256-z"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)WR.1943-5452.0000513"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2015.07.011"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCM-160625"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-3614-9_10"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.swevo.2017.05.010"},{"key":"e_1_2_8_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-0787-6"},{"key":"e_1_2_8_39_1","unstructured":"RossmanL. A..EPANET2: users manual. Laboratory Office of Research & Devt.u.s.env. protection Agency 2000."},{"key":"e_1_2_8_40_1","unstructured":"ReynoldsR. G..An introduction to cultural algorithms. in Proceedings of the 3rd Annual Conference on Evolutionary Programming World Scientific Publishing 131\u2010139 1994."},{"key":"e_1_2_8_41_1","unstructured":"ChungC.Knowledge\u2010based approaches to self\u2010adaptation in cultural algorithms. Ph.D. Thesis WayneState University Detroit Michigan USA 1997."},{"key":"e_1_2_8_42_1","doi-asserted-by":"crossref","first-page":"152","DOI":"10.4028\/www.scientific.net\/AMR.468-471.152","article-title":"A study of genetic algorithm based on niche technique","volume":"468","author":"Li M","year":"2012","journal-title":"Advanced Materials Research"},{"key":"e_1_2_8_43_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218213098000135"},{"key":"e_1_2_8_44_1","unstructured":"JinX.andReynoldsR. G..Using knowledge\u2010based evolutionary computation to solve nonlinear constraint optimization problems: a cultural algorithm approach. In Proceeding of the 1999 Congress on Evolutionary Computation 1672\u20101678 1999."},{"key":"e_1_2_8_45_1","doi-asserted-by":"crossref","unstructured":"Coello Coello C. A. &Becerra R. L.Evolutionary multiobjective optimization using a cultural algorithm. In Swarm Intelligence Symposium 6\u201013 2003.","DOI":"10.1109\/SIS.2003.1202240"},{"key":"e_1_2_8_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/03052150410001647966"},{"key":"e_1_2_8_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2014.11.047"},{"key":"e_1_2_8_48_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.08.005"},{"key":"e_1_2_8_49_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218001416500130"},{"key":"e_1_2_8_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2015.2450018"},{"key":"e_1_2_8_51_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9496(2008)134:6(556)"}],"container-title":["Concurrency and Computation: Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fcpe.4230","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/cpe.4230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T09:53:00Z","timestamp":1750413180000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/cpe.4230"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,29]]},"references-count":50,"journal-issue":{"issue":"24","published-print":{"date-parts":[[2017,12,25]]}},"alternative-id":["10.1002\/cpe.4230"],"URL":"https:\/\/doi.org\/10.1002\/cpe.4230","archive":["Portico"],"relation":{},"ISSN":["1532-0626","1532-0634"],"issn-type":[{"type":"print","value":"1532-0626"},{"type":"electronic","value":"1532-0634"}],"subject":[],"published":{"date-parts":[[2017,6,29]]},"article-number":"e4230"}}