Modeling contaminant intrusion in water distribution networks: A new similarity-based DST method

Contaminant intrusion in a water distribution network is a complex but a commonly observed phenomenon, which depends on three elements - a pathway, a driving force and a contamination source. However, the data on these elements are generally incomplete, non-specific and uncertain. In an earlier work, Sadiq, Kleiner, and Rajani (2006) have successfully applied traditional Dempster-Shafer theory (DST) to estimate the ''risk'' of contaminant intrusion in a water distribution network based on limited uncertain information. However, the method used for generating basic probability assignment (BPA) was not very flexible, and did not handle and process uncertain information effectively. In this paper, a more pragmatic method is proposed that utilizes ''soft'' computing flexibility to generate BPAs from uncertain information. This paper compares these two methods through numerical examples, and demonstrates the efficiency and effectiveness of modified method.

[1]  P. Smets Data fusion in the transferable belief model , 2000, Proceedings of the Third International Conference on Information Fusion.

[2]  Pengfei Shi,et al.  Similarity measures on intuitionistic fuzzy sets , 2003, Pattern Recognit. Lett..

[3]  Shyi-Ming Chen NEW METHODS FOR SUBJECTIVE MENTAL WORKLOAD ASSESSMENT AND FUZZY RISK ANALYSIS , 1996 .

[4]  Steven G. Buchberger,et al.  Assessing Intrusion Susceptibility in Distribution Systems , 2002 .

[5]  Hsuan-Shih Lee,et al.  Optimal consensus of fuzzy opinions under group decision making environment , 2002, Fuzzy Sets Syst..

[6]  Li Dengfeng,et al.  New similarity measures of intuitionistic fuzzy sets and application to pattern recognitions , 2002, Pattern Recognit. Lett..

[7]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[8]  Trevor R. Lindley,et al.  A Framework to Protect Water Distribution Systems Against Potential Intrusions , 2001 .

[9]  Malcolm J. Beynon,et al.  A novel technique of object ranking and classification under ignorance: An application to the corporate failure risk problem , 2005, Eur. J. Oper. Res..

[10]  Arthur P. Dempster,et al.  Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[11]  Qi Liu,et al.  A subjective methodology for risk quantification based on generalized fuzzy numbers , 2008, Int. J. Gen. Syst..

[12]  R. Sadiq,et al.  Aggregative risk analysis for water quality failure in distribution networks , 2004 .

[13]  Shyi-Ming Chen,et al.  Fuzzy risk analysis based on similarity measures of generalized fuzzy numbers , 2003, IEEE Trans. Fuzzy Syst..

[14]  Witold Pedrycz,et al.  Fuzzy sets in pattern recognition: Accomplishments and challenges , 1997, Fuzzy Sets Syst..

[15]  Kari Sentz,et al.  Combination of Evidence in Dempster-Shafer Theory , 2002 .

[16]  Rehan Sadiq,et al.  Estimating risk of contaminant intrusion in water distribution networks using Dempster–Shafer theory of evidence , 2006 .

[17]  Qi Liu,et al.  A new similarity measure of generalized fuzzy numbers and its application to pattern recognition , 2004, Pattern Recognit. Lett..

[18]  Yong Deng,et al.  Evaluating Sensor Reliability in Classification Problems Based on Evidence Theory , 2006, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).