{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:49:10Z","timestamp":1776811750161,"version":"3.51.2"},"reference-count":14,"publisher":"European Society of Computational Methods in Sciences and Engineering","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2016,6,6]]},"DOI":"10.3233\/jcm-160625","type":"journal-article","created":{"date-parts":[[2016,6,7]],"date-time":"2016-06-07T08:43:55Z","timestamp":1465289035000},"page":"379-390","source":"Crossref","is-referenced-by-count":8,"title":["Contaminant source identification in water distribution network based on hybrid encoding"],"prefix":"10.66113","volume":"16","author":[{"given":"Xuesong","family":"Yan","sequence":"first","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan, Hubei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jing","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan, Hubei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chengyu","family":"Hu","sequence":"additional","affiliation":[{"name":"School of Computer Science, China University of Geosciences, Wuhan, Hubei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Qinghua","family":"Wu","sequence":"additional","affiliation":[{"name":"Hubei Provincial Key Laboratory of Intelligent Robot, Wuhan Institute of Technology, Wuhan, Hubei, China"},{"name":"School of Computer Science and Engineering, Wuhan Institute of Technology, Wuhan, Hubei, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"55691","reference":[{"issue":"5","key":"10.3233\/JCM-160625_ref1","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1061\/(ASCE)0733-9372(2002)128:5(441)","article-title":"Particle back-tracking algorithm for water distribution systems analysis","volume":"128","author":"Shang","year":"2002","journal-title":"Journal of Environ Eng"},{"issue":"2","key":"10.3233\/JCM-160625_ref2","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1061\/(ASCE)0733-9496(2005)131:2(125)","article-title":"Contamination source determination for water networks","volume":"131","author":"Laird","year":"2005","journal-title":"J Water Resour Plan Manag"},{"issue":"4","key":"10.3233\/JCM-160625_ref3","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1061\/(ASCE)WR.1943-5452.0000050","article-title":"Real-time identification of possible contamination sources using network backtracking methods","volume":"136","author":"De Sanctis","year":"2010","journal-title":"J Water Resour Plan Manag"},{"issue":"13","key":"10.3233\/JCM-160625_ref4","doi-asserted-by":"crossref","first-page":"4623","DOI":"10.1007\/s11269-013-0431-z","article-title":"Localization of Contamination Sources in Drinking Water Distribution Systems: A Method Based on Successive Positive Readings of Sensors","volume":"27","author":"Costa","year":"2013","journal-title":"Water Resources Management"},{"key":"10.3233\/JCM-160625_ref5","doi-asserted-by":"crossref","first-page":"466","DOI":"10.1061\/(ASCE)0733-9496(2009)135:6(466)","article-title":"Data Mining to Identify Contaminant Event Locations in Water Distribution Systems","volume":"135","author":"Jeanne Huang","year":"2009","journal-title":"J. Water Resour. Plann. Manage"},{"key":"10.3233\/JCM-160625_ref6","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1061\/(ASCE)WR.1943-5452.0000288","article-title":"Bayesian Networks for Source Intrusion Detection","volume":"139","author":"Perelman","year":"2013","journal-title":"J. Water Resour. Plann. Manage"},{"issue":"4","key":"10.3233\/JCM-160625_ref7","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1007\/s00477-012-0622-9","article-title":"Characterization of groundwater contaminant source using Bayesian method","volume":"27","author":"Wang","year":"2013","journal-title":"Stochastic Environmental Research and Risk Assessment"},{"key":"10.3233\/JCM-160625_ref8","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1061\/(ASCE)WR.1943-5452.0000323","article-title":"Improving Efficiency of the Bayesian Approach to Water Distribution Contaminant Source Characterization with Support Vector Regression","volume":"140","author":"Wang","year":"2014","journal-title":"J. Water Resour. Plann. Manage"},{"key":"10.3233\/JCM-160625_ref9","doi-asserted-by":"crossref","first-page":"04016001","DOI":"10.1061\/(ASCE)WR.1943-5452.0000619","article-title":"Testing Contamination Source Identification Methods for Water Distribution Networks","author":"Seth","year":"2016","journal-title":"Journal of Water Resources Planning and Management"},{"issue":"4","key":"10.3233\/JCM-160625_ref10","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1061\/(ASCE)0733-9496(2006)132:4(252)","article-title":"Identification of contaminant sources in water distribution systems using simulation-optimization method: case study","volume":"132","author":"Guan","year":"2006","journal-title":"J Water Resour Plan Manage"},{"issue":"5","key":"10.3233\/JCM-160625_ref11","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1061\/(ASCE)0733-9496(2009)135:5(334)","article-title":"Evolutionary computation-based methods for characterizing contaminant sources in a water distribution system","volume":"135","author":"Zechman","year":"2009","journal-title":"Journal of Water Resources Planning and Management"},{"issue":"2","key":"10.3233\/JCM-160625_ref12","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1061\/(ASCE)WR.1943-5452.0000104","article-title":"Contamination source identification in water distribution systems using an adaptive dynamic optimization procedure","volume":"137","author":"Liu","year":"2010","journal-title":"J. Water Resour. Plann. Manage"},{"key":"10.3233\/JCM-160625_ref13","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.adhoc.2015.07.011","article-title":"A MapReduce based Parallel Niche Genetic Algorithm for contaminant source identification in water distribution network","volume":"35","author":"Hu","year":"2015","journal-title":"Ad Hoc Networks"},{"issue":"6","key":"10.3233\/JCM-160625_ref14","doi-asserted-by":"crossref","first-page":"556","DOI":"10.1061\/(ASCE)0733-9496(2008)134:6(556)","article-title":"The battle of the water sensor networks (bwsn): A design challenge for engineers and algorithms","volume":"134","author":"Ostfeld","year":"2008","journal-title":"Journal of Water Resources Planning and Management"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCM-160625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:07:03Z","timestamp":1776809223000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCM-160625"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,6]]},"references-count":14,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.3233\/jcm-160625","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,6]]}}}