{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T02:55:38Z","timestamp":1769050538971,"version":"3.49.0"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"18","license":[{"start":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T00:00:00Z","timestamp":1615939200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T00:00:00Z","timestamp":1615939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61873119"],"award-info":[{"award-number":["61873119"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Innovation Commission of Shenzhen","award":["KQJSCX20180322151418232"],"award-info":[{"award-number":["KQJSCX20180322151418232"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Neural Comput &amp; Applic"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s00521-021-05894-y","type":"journal-article","created":{"date-parts":[[2021,3,17]],"date-time":"2021-03-17T09:06:18Z","timestamp":1615971978000},"page":"11889-11903","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["DLGEA: a deep learning guided evolutionary algorithm for water contamination source identification"],"prefix":"10.1007","volume":"33","author":[{"given":"Kai","family":"Qian","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3467-3532","authenticated-orcid":false,"given":"Jie","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yulong","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Shuang-Hua","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,17]]},"reference":[{"key":"5894_CR1","doi-asserted-by":"publisher","DOI":"10.1201\/9780367802486","volume-title":"Handbook of evolutionary computation","author":"T B\u00e4ck","year":"1997","unstructured":"B\u00e4ck T, Fogel DB, Michalewicz Z (1997) Handbook of evolutionary computation. CRC Press, Boca Raton"},{"key":"5894_CR2","unstructured":"Chung J, Gulcehre C, Cho K, Bengio Y (2014) Empirical evaluation of gated recurrent neural networks on sequence modelling. In: Proceedings of the NIPS 2014 workshop on deep learning and representation learning"},{"key":"5894_CR3","unstructured":"Dauphin YN, Fan A, Auli M, Grangier D (2017) Language modelling with gated convolutional networks. In: Proceedings of the 34th international conference on machine learning, pp 933\u2013941. JMLR.org"},{"key":"5894_CR4","doi-asserted-by":"crossref","unstructured":"Graves A, Mohamed A, Hinton G (2013) Speech recognition with deep recurrent neural networks. In: Proceedings of the IEEE international conference on Acoustics, Speech and Signal Processing, pp 6645\u20136649","DOI":"10.1109\/ICASSP.2013.6638947"},{"issue":"4","key":"5894_CR5","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1061\/(ASCE)0733-9496(2006)132:4(252)","volume":"132","author":"J Guan","year":"2006","unstructured":"Guan J, Aral MM, Maslia ML, Grayman WM (2006) Identification of contaminant sources in water distribution systems using simulation-optimization method: case study. J Water Resour Plan Manag 132(4):252\u2013262","journal-title":"J Water Resour Plan Manag"},{"issue":"1","key":"5894_CR6","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1016\/S0004-3702(02)00381-8","volume":"145","author":"J He","year":"2003","unstructured":"He J, Yao X (2003) Towards an analytic framework for analysing the computation time of evolutionary algorithms. Artif Intell 145(1):59\u201397. https:\/\/doi.org\/10.1016\/S0004-3702(02)00381-8","journal-title":"Artif Intell"},{"issue":"8","key":"5894_CR7","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1162\/neco.1997.9.8.1735","volume":"9","author":"S Hochreiter","year":"1997","unstructured":"Hochreiter S, Schmidhuber J (1997) Long short-term memory. Neural Comput 9(8):1735\u20131780","journal-title":"Neural Comput"},{"issue":"1","key":"5894_CR8","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland JH (1992) Genetic algorithms. Sci Am 267(1):66\u201373","journal-title":"Sci Am"},{"key":"5894_CR9","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.adhoc.2015.07.011","volume":"35","author":"C Hu","year":"2015","unstructured":"Hu C, Zhao J, Yan X, Zeng D, Guo S (2015) A mapreduce based parallel niche genetic algorithm for contaminant source identification in water distribution network. Ad Hoc Netw 35:116\u2013126 (Special Issue on Big Data Inspired Data Sensing, Processing and Networking Technologies)","journal-title":"Ad Hoc Netw"},{"key":"5894_CR10","doi-asserted-by":"crossref","unstructured":"Huang JJ, McBean EA (2009) Data mining to identify contaminant event locations in water distribution systems. J Water Resour Plan Manag","DOI":"10.1061\/41024(340)97"},{"key":"5894_CR11","doi-asserted-by":"publisher","first-page":"2880","DOI":"10.1109\/TASLP.2020.3030497","volume":"28","author":"Q Kong","year":"2020","unstructured":"Kong Q, Cao Y, Iqbal T, Wang Y, Wang W, Plumbley MD (2020) Panns: Large-scale pretrained audio neural networks for audio pattern recognition. IEEE\/ACM Trans Audio Speech Lang Process 28:2880\u20132894","journal-title":"IEEE\/ACM Trans Audio Speech Lang Process"},{"issue":"6","key":"5894_CR12","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/3065386","volume":"60","author":"A Krizhevsky","year":"2017","unstructured":"Krizhevsky A, Sutskever I, Hinton GE (2017) Imagenet classification with deep convolutional neural networks. Commun ACM 60(6):84\u201390","journal-title":"Commun ACM"},{"issue":"4","key":"5894_CR13","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1061\/(ASCE)0733-9496(2006)132:4(242)","volume":"132","author":"CD Laird","year":"2006","unstructured":"Laird CD, Biegler LT, van Bloemen Waanders BG (2006) Mixed-integer approach for obtaining unique solutions in source inversion of water networks. J Water Resour Plan Manag 132(4):242\u2013251","journal-title":"J Water Resour Plan Manag"},{"issue":"2","key":"5894_CR14","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1061\/(ASCE)0733-9496(2005)131:2(125)","volume":"131","author":"CD Laird","year":"2005","unstructured":"Laird CD, Biegler LT, van Bloemen Waanders BG, Bartlett RA (2005) Contamination source determination for water networks. J Water Resour Plan Manag 131(2):125\u2013134","journal-title":"J Water Resour Plan Manag"},{"key":"5894_CR15","unstructured":"Lippai I (2020) Wolf-Cordera Ranch. http:\/\/emps.exeter.ac.uk\/engineering\/research\/cws\/resources\/benchmarks\/expansion\/wolf-cordera-ranch.php. [Online; Accessed 19 June 2020]"},{"issue":"2","key":"5894_CR16","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1061\/(ASCE)WR.1943-5452.0000104","volume":"137","author":"L Liu","year":"2010","unstructured":"Liu L, Ranjithan SR, Mahinthakumar G (2010) Contamination source identification in water distribution systems using an adaptive dynamic optimization procedure. J Water Resour Plan Manag 137(2):183\u2013192","journal-title":"J Water Resour Plan Manag"},{"issue":"2","key":"5894_CR17","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1080\/10286608.2012.663360","volume":"29","author":"L Liu","year":"2012","unstructured":"Liu L, Zechman EM, Mahinthakumar G, Ranjithan SR (2012) Identifying contaminant sources for water distribution systems using a hybrid method. Civil Eng Environ Syst 29(2):123\u2013136","journal-title":"Civil Eng Environ Syst"},{"key":"5894_CR18","unstructured":"Mahfoud SW (1995) Niching methods for genetic algorithms. Ph.D. thesis, University of Illinois at Urbana-Champaign"},{"issue":"7","key":"5894_CR19","doi-asserted-by":"publisher","first-page":"969","DOI":"10.1016\/j.envsoft.2011.01.006","volume":"26","author":"L Perelman","year":"2011","unstructured":"Perelman L, Ostfeld A (2011) Topological clustering for water distribution systems analysis. Environ Model Softw 26(7):969\u2013972","journal-title":"Environ Model Softw"},{"key":"5894_CR20","doi-asserted-by":"crossref","unstructured":"Perelman L, Ostfeld A (2013) Bayesian networks for source intrusion detection. J Water Resour Plan Manag 139","DOI":"10.1061\/(ASCE)WR.1943-5452.0000288"},{"issue":"4","key":"5894_CR21","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1061\/(ASCE)0733-9496(2006)132:4(263)","volume":"132","author":"A Preis","year":"2006","unstructured":"Preis A, Ostfeld A (2006) Contamination source identification in water systems: a hybrid model trees-linear programming scheme. J Water Resour Plan Manag 132(4):263\u2013273","journal-title":"J Water Resour Plan Manag"},{"issue":"8","key":"5894_CR22","doi-asserted-by":"publisher","first-page":"941","DOI":"10.1080\/03052150701540670","volume":"39","author":"A Preis","year":"2007","unstructured":"Preis A, Ostfeld A (2007) A contamination source identification model for water distribution system security. Eng Optim 39(8):941\u2013947","journal-title":"Eng Optim"},{"key":"5894_CR23","doi-asserted-by":"crossref","unstructured":"Qian K, Jiang J, Ding Y, Yang S (2020) Deep learning based anomaly detection in water distribution systems. In: Proceedings of the 2020 IEEE international conference on networking, sensing and control (ICNSC), pp 1\u20136","DOI":"10.1109\/ICNSC48988.2020.9238099"},{"issue":"24","key":"5894_CR24","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/j.ifacol.2018.09.609","volume":"51","author":"M Qui\u00f1ones-Grueiro","year":"2018","unstructured":"Qui\u00f1ones-Grueiro M, Bernal-de L\u00e1zaro JM, Verde C, Prieto-Moreno A, Llanes-Santiago O (2018) Comparison of classifiers for leak location in water distribution networks. IFAC PapersOnLine 51(24):407\u2013413","journal-title":"IFAC PapersOnLine"},{"key":"5894_CR25","doi-asserted-by":"crossref","unstructured":"Rethage D, Pons J, Serra X (2018) A wavenet for speech denoising. In: Proceedings of the 2018 IEEE international conference on acoustics, speech and signal processing, pp 5069\u20135073","DOI":"10.1109\/ICASSP.2018.8462417"},{"key":"5894_CR26","unstructured":"Rossman LA (2000) Epanet 2: Users manual"},{"issue":"4","key":"5894_CR27","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1061\/(ASCE)WR.1943-5452.0000050","volume":"136","author":"AED Sanctis","year":"2010","unstructured":"Sanctis AED, Shang F, Uber JG (2010) Real-time identification of possible contamination sources using network backtracking methods. J Water Resour Plan Manag 136(4):444\u2013453. https:\/\/doi.org\/10.1061\/(ASCE)WR.1943-5452.0000050","journal-title":"J Water Resour Plan Manag"},{"issue":"5","key":"5894_CR28","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1061\/(ASCE)0733-9372(2002)128:5(441)","volume":"128","author":"F Shang","year":"2002","unstructured":"Shang F, Uber JG, Polycarpou MM (2002) Particle backtracking algorithm for water distribution system analysis. J Environ Eng 128(5):441\u2013450","journal-title":"J Environ Eng"},{"key":"5894_CR29","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.conengprac.2016.07.006","volume":"55","author":"A Soldevila","year":"2016","unstructured":"Soldevila A, Blesa J, Tornil-Sin S, Duviella E, Fernandez-Canti RM, Puig V (2016) Leak localization in water distribution networks using a mixed model-based\/data-driven approach. Control Eng Pract 55:162\u2013173","journal-title":"Control Eng Pract"},{"issue":"3","key":"5894_CR30","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1080\/15275920903140486","volume":"10","author":"P Vankayala","year":"2009","unstructured":"Vankayala P, Sankarasubramanian A, Ranjithan SR, Mahinthakumar G (2009) Contaminant source identification in water distribution networks under conditions of demand uncertainty. Environ Foren 10(3):253\u2013263","journal-title":"Environ Foren"},{"key":"5894_CR31","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1007\/s00477-013-0727-9","volume":"27","author":"H Wang","year":"2013","unstructured":"Wang H, Harrison KW (2013) Bayesian approach to contaminant source characterization in water distribution systems: adaptive sampling framework. Stoch Environ Res Risk Assess 27:1921\u20131928","journal-title":"Stoch Environ Res Risk Assess"},{"key":"5894_CR32","doi-asserted-by":"crossref","unstructured":"Wang H, Harrison KW (2014) Improving efficiency of the bayesian approach to water distribution contaminant source characterization with support vector regression. Environ Model Softw 140","DOI":"10.1061\/(ASCE)WR.1943-5452.0000323"},{"key":"5894_CR33","doi-asserted-by":"crossref","unstructured":"Yan X, Gong J, Wu Q (2020) Pollution source intelligent location algorithm in water quality sensor networks. Neural Comput Appl","DOI":"10.1007\/s00521-020-05000-8"},{"issue":"24","key":"5894_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/cpe.4230","volume":"29","author":"X Yan","year":"2017","unstructured":"Yan X, Gong W, Wu Q (2017) Contaminant source identification of water distribution networks using cultural algorithm. Concurr Comput Pract Exp 29(24):1\u201311","journal-title":"Concurr Comput Pract Exp"},{"key":"5894_CR35","doi-asserted-by":"publisher","first-page":"5941","DOI":"10.1007\/s10586-018-1725-y","volume":"22","author":"X Yan","year":"2019","unstructured":"Yan X, Li T, Hu C (2019) Real-time localization of pollution source for urban water supply network in emergencies. Clust Comput 22:5941\u20135954","journal-title":"Clust Comput"},{"issue":"2","key":"5894_CR36","doi-asserted-by":"publisher","first-page":"1007","DOI":"10.1007\/s10586-017-0787-6","volume":"20","author":"X Yan","year":"2017","unstructured":"Yan X, Sun J, Hu C (2017) Research on contaminant sources identification of uncertainty water demand using genetic algorithm. Clust Comput 20(2):1007\u20131016","journal-title":"Clust Comput"},{"key":"5894_CR37","doi-asserted-by":"publisher","first-page":"308","DOI":"10.5004\/dwt.2018.22330","volume":"110","author":"X Yan","year":"2018","unstructured":"Yan X, Yang K, Hu C (2018) Pollution source positioning in a water supply network based on expensive optimization. Desalin Water Treat 110:308\u2013318","journal-title":"Desalin Water Treat"},{"key":"5894_CR38","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.swevo.2017.05.010","volume":"47","author":"X Yan","year":"2019","unstructured":"Yan X, Zhao J, Hu C, Zeng D (2019) Multimodal optimization problem in contamination source determination of water supply networks. Swarm Evolut Comput 47:66\u201371","journal-title":"Swarm Evolut Comput"},{"key":"5894_CR39","doi-asserted-by":"publisher","first-page":"17901","DOI":"10.1007\/s11356-017-0516-y","volume":"26","author":"X Yan","year":"2019","unstructured":"Yan X, Zhu Z, Li T (2019) Pollution source localization in an urban water supply network based on dynamic water demand. Environ Sci Pollut Res 26:17901\u201317910","journal-title":"Environ Sci Pollut Res"},{"issue":"15","key":"5894_CR40","doi-asserted-by":"publisher","first-page":"1809","DOI":"10.1016\/j.artint.2008.07.001","volume":"172","author":"Y Yu","year":"2008","unstructured":"Yu Y, Zhou ZH (2008) A new approach to estimating the expected first hitting time of evolutionary algorithms. Artif Intell 172(15):1809\u20131832. https:\/\/doi.org\/10.1016\/j.artint.2008.07.001","journal-title":"Artif Intell"}],"container-title":["Neural Computing and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-05894-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00521-021-05894-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00521-021-05894-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,23]],"date-time":"2021-08-23T20:11:55Z","timestamp":1629749515000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00521-021-05894-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3,17]]},"references-count":40,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["5894"],"URL":"https:\/\/doi.org\/10.1007\/s00521-021-05894-y","relation":{},"ISSN":["0941-0643","1433-3058"],"issn-type":[{"value":"0941-0643","type":"print"},{"value":"1433-3058","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3,17]]},"assertion":[{"value":"25 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}