A heuristic approach algorithm for the optimization of water distribution networks

Research output: Contribution to journalConference articlepeer-review

8 Scopus citations


Many optimization models to determine cost-effectiveness and obtain the least-cost system designs for water distribution networks have been developed. An algorithm used for solving an optimization model, such as the branch-and-bound or enumeration method, has deficiencies that may include efficiency problems and local optimal solution problems. A heuristic approach, with a bounded implicit enumeration (BIE) algorithm was developed in this study to improve searching efficiency. The heuristic approach first treats the system as a sub-system so that the sub-system's solution must spread widely at the solution space. Then, the optimal sub-system solution is found by a BIE algorithm. On the basis of the optimal solution for the initial system, one larger than and one smaller than its commercial diameter is used to form a new system design. Finally, an optimal solution is determined by using the BIE algorithm until the same solution is found. In this study, five water distribution network designs were used to illustrate the performance of this approach. The obvious results show that a heuristic approach is more efficient than BIE alone. The efficiency becomes more obvious when the system becomes larger. Comparing the three case studies, the heuristic approach along with the BIE algorithm finds global optimal solution more efficiently.

Original languageEnglish
Pages (from-to)219-226
Number of pages8
JournalWater Science and Technology
Issue number5
StatePublished - 1997
EventProceedings of the 1997 4th IAWQ International Symposium on Systems Analysis and Computing in Water Quality Management - Quebec, Can
Duration: 17 Jun 199720 Jun 1997


  • Bounded implicit enumeration
  • Heuristic approach
  • Optimization
  • Water distribution networks


Dive into the research topics of 'A heuristic approach algorithm for the optimization of water distribution networks'. Together they form a unique fingerprint.

Cite this