<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <issn pub-type="ppub">1613-0073</issn>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Liquor-HGNN: A heterogeneous graph neural network for leakage detection in water distribution networks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Melanie Schaller</string-name>
          <email>schaller@informatik.uni-wuerzburg.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Michael Steininger</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrzej Dulny</string-name>
          <email>dulny@informatik.uni-wuerzburg.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Daniel Schlör</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andreas Hotho</string-name>
          <email>hotho@informatik.uni-wuerzburg.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>(Data Science)</institution>
          ,
          <addr-line>Am Hubland, Würzburg, 97074</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Julius-Maximilians Universität Würzburg (JMU), Center for Artificial Intelligence (CAIDAS)</institution>
          ,
          <addr-line>Chair for Informatics X</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>LWDA'23: Lernen</institution>
          ,
          <addr-line>Wissen, Daten, Analysen</addr-line>
        </aff>
      </contrib-group>
      <abstract>
        <p>In this paper, we introduce the Liquor-HGNN model, a novel approach for detecting and localizing leaks in drinking water distribution networks (DWDNs) through the utilization of heterogeneous graph learning. By leveraging a preprocessing model, our approach mounts the challenges posed by data sparsity and sensor heterogeneity limitations. Liquor-HGNN outperforms all other approaches on the same dataset in terms of Economic score. Here, the Economic Score function iterates over the detected leakages, finds the closest pipes to each detected leakage, and calculates the score contribution for each true detection based on the detected distance as well as on the starting time of the leakages. To the best of our knowledge, Liquor-HGNN represents the first-ever application of a heterogeneous Graph Neural Network (GNN) specifically tailored for leak detection in DWDNs.</p>
      </abstract>
      <kwd-group>
        <kwd>Deep learning and representation learning</kwd>
        <kwd>Temporal and spatio-temporal data analytics</kwd>
        <kwd>Applications of</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ceur-ws.org</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        Water pipe systems are crucial for providing clean drinking water to communities, but they are
prone to leaks and ruptures, leading to resource waste and damage [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Thus, detecting and
locating leaks in drinking water distribution networks (DWDNs) is essential for maintaining
the integrity and sustainability of these systems [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. This paper introduces the Liquor-HGNN
model, a novel approach that utilizes heterogeneous graph learning to accurately identify the
start time of leaks and to pinpoint leaky pipes in DWDNs.
      </p>
      <sec id="sec-2-1">
        <title>1.1. Background and Motivation</title>
        <p>Leakage in the water distribution network is a major source of non-revenue water. Non-revenue
water refers to the discrepancy between the volume of water supplied to the distribution network
and the amount of water actually billed to customers. On average, non-revenue water accounts
nEvelop-O
LGOBE</p>
        <p>
          https://github.com/MilanShao/ (M. Schaller)
CEUR
Workshop
Proceedings
for approximately 35 percent of the total water supply [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. This highlights the pressing need
for eficient leak detection methods in order to prevent wastage of resources and maintain the
overall quality and reliability of the water system.
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>1.2. Problem Statement and Relevance</title>
        <p>
          Traditional visual inspection methods are impractical for underground pipelines, leading
to the installation of sensors in water distribution networks [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ]. However, due to financial
and spatial limitations, these sensors are sparsely distributed across pipeline sections [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. The
complexity and diversity of sensor data (e.g. the diferent sorts of sensors, that are used to
measure DWDNs like flow, demand or pressure sensors), along with the large distances between
sensors (see pipe sections in Fig. 1) and diferent types of leaks, pose challenges in accurately
determining the leaky pipe section and starting time of leaks. These diferent types of leaks
include background leaks, incipient leakages, as well as abrupt leakages such as medium pipe
bursts and large pipe bursts [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Additionally, the collected time-series data difer according to
the diferent measuring principles of sensors (see Fig. 1). Furthermore, nodes in the network
difer in their usage profiles [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ], adding further complexity (see demand patterns on the left
side in Fig. 1). Despite the high complexity of the task, it is a worthwhile goal to adequately
meet the challenge of leakage detection and to satisfy the needs of the stakeholders ranging
from water utility companies, water management agencies until the general public [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ].
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>1.3. Objectives</title>
        <p>
          The primary objective is to develop an efective model for detecting leaks in water pipe systems.
The model should learn the relationships between diferent system components, including
sensor types (e.g. flow sensors, pressure sensors, demand measurements, smart meters [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]),
network information (i.e. pipe-attributes corresponding to edge-attributes like diameters, length,
roughness coeficients, as well as geospatial data like coordinates or elevation and physical
information), and user patterns (i.e. residential and commercial demand patterns, etc. [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]), to
accurately detect and locate leaks.
        </p>
        <p>Expressed from a more technical perspective, the objective of the model is to predict the
edge-labels for leaky or non-leaky pipes at each time step based on the discrete spatio-temporal
graph snapshot to localize anomalies. The specific objectives and quantifiable criteria for the
success of the Liquor-HGNN approach are to localize leaks for all pipe sections (corresponding
to edges of a graph) using measurement information from only around 10 percent of the nodes,
to accurately forecast the start time of leaks and to propose an imputation method for handling
missing data through prior forecasts.</p>
      </sec>
      <sec id="sec-2-4">
        <title>1.4. Method</title>
        <p>
          To address the complex task of leakage detection, we propose the Liquor-HGNN model1. The
model selects the most suitable threshold based the Economic Score Metric, that is built upon
the metric of KIOS research center [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. The Economic Score function iterates over the detected
leakages, finds close pipes to each detected leakage, and calculates the score contribution for
each true detection based on the detected distance and the number of true detections. Our
metric also applies a penalty if a leakage is not detected. The Liquor-HGNN model takes into
account the physical positions of nodes, their connections via edges as well as the user patterns
within the hydraulic demand distribution [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. It leverages sparsely distributed sensor data and
incorporates a graph attention mechanism to focus on the most relevant parts of the graph.
        </p>
        <p>
          Methodologically, our approach involves a preprocessing procedure to interpolate demand
values for every node. The demand over time is divided into diferent components, including
a global trend, seasonal fluctuations, and weekly and daily variations. These components are
derived from the predictions of the demand measurements and are separated according to their
demand patterns. The predictions are then multiplied with the steady-state demand or base
demand of each node [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ].
        </p>
        <p>
          To handle the heterogeneous graph structure, our model employs heterogeneous
messagepassing layers. This enables the model to capture and utilize the diverse sensor types present in
the water pipe system as diferent node types in the network. The heterogenity allows to learn
from the various types of relationships present in the graph. To introduce diferent edge-weights
in heterogeneous graph neural networks, we use the HeteroConv wrapper [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. This is described
partly in the appendix.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>2. Related Work</title>
      <p>
        In this section, we first review the 18 submissions made to the BattLeDIM challenge, which
serve as the main benchmarking results for the used dataset. The first submission is the
ensemble multivariate changepoint detection (EMCPD) by Cheng et al. [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]. This method
1https://github.com/MilanShao/Liquor-HGNN/blob/main/README.md
combines six algorithms, including changepoint detection, non-parametric multiple changepoint
analysis, divisive hierarchical estimation, kernel changepoint analysis, and Bayesian estimation
of abrupt changes and trends. Huang et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] propose a method consisting of five stages:
model decomposition, data partitioning, nodal demand calibration, calibration residual-based
leakage detection, and an improved vectorial angle method for leakage localization. The
Leakbusters team, represented by Daniel et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ], developed a method with two algorithm
components. The first component analyzes pressure diferences between pairs of nodes using
SCADA data to identify leakage events. The model is trained on normal time periods, and the
reconstruction error is used to detect leakage events. Saldarriaga et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] utilize a genetic
algorithm (GA) to identify leaks, while Wang et al. [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ] from the Tsinghua Team employ a
multistage approach involving empirical mode decomposition, extraction of daily and weekly
seasonalities, and emitter representation. The Under Pressure team, represented by Stefelbauer
et al. [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], introduces a hierarchical approach for leak diagnosis. It involves demand calibration
using AMR data and measured flows, mathematical optimization for calibrating pipe roughness,
and the use of a dual network for leak start time detection and localization. Zhang et al. [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]
employ a fuzzy similarity priority ratio for leakage localization, while Romero et al. [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] from
the IRI team combine a model-based and data-driven methodology. Their approach determines
the usage of the two approaches based on the characteristics of the network’s diferent areas.
Min et al. [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] and Blocher et al. [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] both use clustering algorithms to solve the task, and
Liu et al. [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ] employ an LSTM. Dopazo et al. [21] and Tan et al. [22] utilize machine learning
approaches.
      </p>
      <p>The winning Tongji Team, represented by Li et al. [23], developed the Multiple Leaks Detection
and Isolation Framework (MLDIF). It employs a gradient iteration algorithm with variable steps
to calibrate model parameters for each zone and predicts water consumption using AMR
measurements.</p>
      <p>Wu et al. [24] and Bhowmick et al. [25] both use time series data decomposition, while
Marzola et al. [26] spatially localize anomalies through an enumerative procedure. Barros et
al. [27] introduce a signal processing approach.</p>
      <p>None of these approaches modeled the task using graph neural networks except for
Gardarsson et al. [28], who trained two Chebyshev polynomial kernel Graph Convolutional Networks.
Although they stated to gain a better economic score, their results have not been reproducable
according to the delivered code and have thus been excluded from the conducted experiments.</p>
      <p>On the other hand, there is an increasing number of papers that use Heterogeneous Graph
Neural Networks (HGNN) for link prediction like HetGNN [29] or MTHetGNN [30].</p>
    </sec>
    <sec id="sec-4">
      <title>3. Dataset Description</title>
      <p>
        The BattLeDIM 2020 dataset [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] was created using a real water distribution network in Cyprus,
covering a pipe length of 42.6 km. It contains information on pipe breaks, water losses, and two
consumer types: residential and commercial, each with distinct demand patterns. The dataset
consists of 782 nodes, 33 of them equipped with pressure sensors providing measurements
every 5 minutes. The network consists of 905 pipe segments of steel pipes with a roughness
coeficient between 120-140 of approximately 50 meters length, that are used as edges of the
Graph Neural Network. All measurements for five-minute timesteps for 80 percent of the year
2018 are considered as training data, 20 percent as validation data and the full year of 2019 as test
dataset. Each node has a unique demand pattern for each consumer type, based on the statistical
characteristics. Additionally, 82 Automated Metered Readings (AMRs) ofer aggregated demand
data (see Appendix). The dataset includes the physical network structure and coordinates of
the pipes, making it suitable for water network simulations with the Water Network Tool for
Resilience (WNTR), a Python package which supports pressure-driven demand simulations and
leakage modelling [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. We predict leakages in the ISO 8601 time format YYYY-MM-DD hh:mm,
while the predicted location of the leakage is specified by the link ID.
      </p>
    </sec>
    <sec id="sec-5">
      <title>4. Methodology</title>
      <p>The methodology consists of the simulated-based preprocessing model for data interpolation
and the the heterogeneous graph neural network for leakage.</p>
      <sec id="sec-5-1">
        <title>4.1. Data Input and Preprocessing for missing data</title>
        <p>Our proposed approach uses a heterogeneous graph neural network (HGNN) [29] to incorporate
nodes with diferent node-types. As the water in water distribution networks is characterized
by a certain flow direction, we use a directed graph. A heterogeneous graph can be defined
as a tuple  ℎ = (, Φ, Ψ) , where  = ( , ) is a graph object with given nodes  and edges
 , Φ ∶  →   is a node type mapping function and Ψ ∶  →   is an edge type mapping
function. In the preprocessing step, missing demand values are predicted using the Neural
Prophet model [31]. We separate the nodes measuring the signals of the whole distribution
network into two sets of nodes,  ⊂  containing all nodes with pressure measurements and
nodes with demand measurements  ⊂  . Accordingly we define a signal at time  of the
pressure sensor of node  as   () and   () as the signal of the demand sensor.</p>
        <p>Note that demand of a node is dependent of its usage pattern. In this dataset usage is
distinguished between residential demand and commercial demand which difer in volume and
periodicity. In our experiment, nodes are either considered commercial or residential.</p>
        <p>Due to the sparsity of data, ninety percent of the nodes lack any measurements, however,
their usage pattern (commercial or residential) is given. To address the sparsity of the data and
ifll in missing demand values, the Neural Prophet model [ 31] is employed to learn and predict
demands for each given usage pattern. Neural Prophet decomposes the time series into several
components according to the following equation in order to find the best shaping functions.</p>
        <p>For each pattern type c for commercial and r for residential, we use all nodes  ∈  to learn a
Neural Prophet Model and predict the demand  ̂c () and  ̂r () at a given time  as:
 ̂c () =  c() +  c() +  c() +  c() +  c() +  c()
 ̂r () =  r() +  r() +  r() +  r() +  r() +  r()
(1)
(2)
where,  •() - Trend at time  ,  •() - Seasonal efects at time  ,  •() - Event and holiday
efects at time  ,  •() - Regression efects at time  for future-known exogenous variables,  •()
Auto-regression efects at time  based on past observations,  •() - Regression efects at time 
values  • () for residential and commercial patterns.
for lagged observations of exogenous variable for each usage pattern • ∈ {c, r}. Neural-Prophet
is a special type of generalized additive models (GAM), that decomposes the time series into the
above mentioned six types of components. The trend component uses an automatic changepoint
detection, while seasonality makes use of Fourier term decomposition. For events the automatic
given holidays of each country are taken. For the calculation of regression efects a real-valued
regressor is used. The auto-regression efects are modelled by the so called AR-Net, which is a
fully connected neural network [31]. This adds non-linear efects to the additive model. For the
loss function the Huber loss is used, while the learning rate is optimized within a range test.
Adam is used as optimizer.
with the predicted value to get overall demand  ̃ for a node  :</p>
        <p>
          In the next step, we adopt the base demand  base calculation by Klise et al. [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] and multiply it
 ̃
 () = {
 base ⋅  ̂c ()
 base ⋅  ̂r ()
if  has commercial pattern
if  has residential pattern
        </p>
        <p>In Fig. 2 the fit of the predicted values  ̂• (), represented by the blue line, is plotted against
the actual measured values  • (). We predict the demand values of the entire network to obtain
a representative distribution, while the pressure values are still only taken at the nodes with
pressure measurements without interpolation.</p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2. Heterogeneous Graph Learning</title>
        <p>We separate between the two node-types   = {NP, P}, where nodes of type NP only have the
demand values (from demand preprocessing or given demands) and nodes of the node-type P
additionally have the pressure measurements</p>
        <p>(). Thus the feature vector xj() for a node  is
given as:
xj() =


⎧ 
⎨⎪ ̃
⎩ 
 ()
 ()
 () ||</p>
        <p>() if  ∈  and  ∈ 
⎪  () ||  ̃ () if  ∈  and  ∉ 


if  ∉  and  ∉ 
if  ∉  and  ∈ 
(3)
(4)</p>
        <p>Here, || denotes the concatenation operator. Additionally we denote four edge types, each
representing a connection between two node types. Thus we have   = {(P, P), (NP, NP),
(NP, P), (P, NP)}. We then compute the heterogeneous graph convolution by using the
GATConv [32] at a given time  .</p>
        <p>In the following, we omit the time parameter for brevity as we predict leakages for each point
in time individually.</p>
        <p>x̂(e) =
i</p>
        <p>∑  ,() Θ() xj
∈  +()</p>
        <p>Here   +() again denotes the neighbors of node  along edges of type  ∈   , potentially
including the node  itself, || denotes the concatenation operator and xj is the recorded feature
at node  . Here Θ() is the weight matrix associated with the attention mechanism for each
edge type  . Please note that, automatically generated node or edge tensors are created upon
initial access and are indexed using string keys. Node types are represented by unique string
identifiers, while edge types are defined using a triplet format, signifying the edge type and the
two node types it connects. This design allows for varying feature dimensionalities for each
type within the data object.</p>
        <p>The attention coeficients  ,() [32] are computed as
 ,() =</p>
        <p>exp(LeakyReLU(a() ⊤[Θ() xi||Θ() xj]))
∑∈  +() exp(LeakyReLU(a() ⊤[Θ() xi||Θ() xk]))
(5)
(6)
where Θ() and a() are learnable parameters. In the next step we aggregate the features from
each edge type in the following way:
x̂i = ReLU(∑ x̂i(e)) (7)</p>
        <p>∈</p>
        <p>We stack consecutive heterogeneous message-passing layers (see Fig. 3) of this type in our
model, using the predicted features of the previous layer x̂i as input for the next layer. After
applying the last layer, we calculate embeddings for each edge using the output node embeddings
of the last message-passing layer in the graph decoder by applying a single fully-connected
layer. For a given edge  connecting nodes  and  with node embeddings x̂i and x̂j respectively,
we have:</p>
        <p>logits =  ( W[x̂i||x̂j] + b)
where W, b are learnable parameter matrices.</p>
        <p>
          Diferent threshold values are then tested over the logits to convert them into binary
predictions. For each threshold value, a custom economic score is calculated based on the detections
made by the model. The economic score takes into account both the true positive detections
and their distances from the actual leak location. The higher the economic score, the better
the model performs. In order to set the threshold for separating leaky from non-leaky edges
on the validation split, we used our own implementation of the Economic Score metric2 based
on the KIOS research metric of the challenge. This KIOS Economic Score metric adopts a
purely economic perspective. In this perspective, the water utility assesses its gains based on
the money saved from successfully detecting water leaks. Additionally, the utility takes into
account the expenses associated with dispatching a repair crew each time they need to search
for a leak. A valid detection is one that identifies a link ID situated within a predefined distance
from the actual leak site, and the reported start time of the leakage incident falls within the
duration of the same leak. The predefined distance corresponds to the operational capability
of the close-range equipment employed by the repair crew [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. As the Economic Score metric
consists of more than 1200 lines of code and two pages of formula in the original version, we
refer to the source for further information.
        </p>
        <p>The edge embeddings calculated by W[x̂i||x̂j] + b are used as input for the Sigmoid layer in
eq. (8) with the binary cross entropy (BCE) loss with logits as loss function, which gives a score
indicating how normal (0) or anomalous (1) an edge is. The decision if an edge  is considered
leaky is then made according to a threshold  .</p>
        <p>leaky = {
0 logits &lt; 
1 logits ≥</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Experiments</title>
      <p>
        We conducted experiments on the BATTleDIM dataset under challenge conditions in order to
maintain strict comparability [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>For the training phase, we used 80 percent of the 2018 data, while the remaining 20 percent
served as the validation split to set the threshold. To evaluate the final model performance, the
complete 2019 dataset was held back as an independent test set.
2https://github.com/MilanShao/Liquor-HGNN/blob/main/models/liquor_gnn.py
(8)
(9)</p>
      <p>To ensure the Liquor-HGNN model’s optimal configuration, we conducted hyperparameter
optimization (HPO). The selected hyperparameters for Liquor-HGNN include ten layers, 50
epochs, 64 hidden channels, a tuned learning rate of 0.00109, and a batch size of 512. We have
been testing diferent convolutions in preliminary experiments including GATConv, SAGEConv,
GraphConv and LEConv. The best results have been gained by GATConv. Therefore we use it
in the results section.</p>
    </sec>
    <sec id="sec-7">
      <title>6. Results</title>
      <p>
        The following section presents the results of benchmarking experiments conducted on the
BattleDIM dataset, comparing against other submissions in the BattleDIM 2020 challenge. Table
1 ranks the participants based on their Economic Score [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>The best economic score was reached by Liquor-HGNN with a Score of 271,584. Following
closely behind was the first place team of the challenge, with an Economic Score of 264,873. In
summary, the benchmarking results showcase the efectiveness of Liquor-HGNN.</p>
    </sec>
    <sec id="sec-8">
      <title>7. Discussion</title>
      <p>
        The BattleDIM Challenge 2020 introduced a metric [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] to evaluate leakage detection algorithms
in water supply networks. This metric considers spatial and temporal characteristics of predicted
pipe leakages, aiming to capture their economic impact. However in our experiments, optimizing
for this metric seems to introduce unintended and non-intuitive artefacts as for example a
model with lower TPR and higher FPs can nevertheless result in a better economic score. The
stringent penalties for undetected or late-identified leakages may inadvertently increase false
predictions without proportional consequences. This can impose additional costs on water
suppliers. Moreover, the metric only evaluates the initial prediction and does not account for
potential improvements over subsequent time steps. This is further distorted by the hierarchical
order of evaluation, in which the first detected time-step is taken more into account than the
ones that follow in chronological order. The optimization of the model towards a high economic
score comes along with an increasing number of false values, which are not ranked high for the
penalty calculation. When we use diferent metrics like F1, Precision, Recall, Balanced Accuracy
or AUC-ROC to set the threshold on the validation split the model is optimized towards a higher
True Positive rate and focuses more on eliminating false predictions. The highest True Positive
Rate we gained was 82,61 percent. If we manually tune the threshold on the validation set, we
have been able to gain an Economic Score of 326,521 as highest value but at the cost of 138
False Positives. This means, that if the model is optimized to predict as much as possible as
true value the Economic Score rises, but the False values also go up. Nevertheless, the metric’s
integration of spatial and temporal failures is commendable, catering to the specific needs of
water distribution networks. To ensure fair evaluations, future enhancements should strike a
balanced approach, considering both false predictions and missed leakages while incorporating
iterative performance improvements. By addressing these concerns, the metric could be further
refined to efectively capture the real-world challenges faced by leakage detection algorithms.
      </p>
    </sec>
    <sec id="sec-9">
      <title>8. Conclusion</title>
      <p>We have gained the highest Economic Score for the Liquor-HGNN approach in comparison to the
other challenge submissions. We demonstrated the efectiveness of the localization of leakages
in sparsely measured water distribution networks. We further integrated Liquor-HGNN with a
demand prediction pre-processing model that leverages the underlying physical information of
the hydraulic system. This combination enabled us to overcome the challenges posed by sparse
data in complex sensor distribution networks.
//doi.org/10.5281/zenodo.3911523. doi:10.5281/zenodo.3911523.
[21] D. Adanza Dopazo, A leakage detection system extracting the most meaningful features
with decision trees., 2020. URL: https://doi.org/10.5281/zenodo.3906668. doi:10.5281/
zenodo.3906668.
[22] C. A. Tan, V. Phipatanasuphorn, C. H. A. Lai, Deep Learning of Complex Pipe
Leakages Events in Drinking Water Distribution Networks for Efective Spatiotemporal
PreDetections and Isolations of Leak Conditions, 2020. URL: https://doi.org/10.5281/zenodo.
3902945. doi:10.5281/zenodo.3902945.
[23] Z. Li, K. Xin, Fast Localization of Multiple Leaks in Water Distribution Network Jointly
Driven By Simulation and Machine Learning, 2020. URL: https://doi.org/10.5281/zenodo.
3911045. doi:10.5281/zenodo.3911045.
[24] Z. Y. Wu, Y. He, Decomposition-based data analysis with hydraulic model calibration
for leakage detection and isolation, 2020. URL: https://doi.org/10.5281/zenodo.3908525.
doi:10.5281/zenodo.3908525.
[25] S. Bhomwick, K. Seifert, Water Leakage Detection and Localization: Anomaly Matrix - A
Deterministic Approach, 2020. URL: https://doi.org/10.5281/zenodo.3906850. doi:10.5281/
zenodo.3906850.
[26] I. Marzola, F. Mazzoni, S. Alvisi, M. Franchini, A Pragmatic Approach for Leakage Detection
Based on the Analysis of Observed Data and Hydraulic Simulations, 2020. URL: https:
//doi.org/10.5281/zenodo.3900989. doi:10.5281/zenodo.3900989.
[27] Brentan, Fluing abstract, 2020. URL: https://doi.org/10.5281/zenodo.4011894. doi:10.5281/
zenodo.4011894.
[28] G. Örn Garðarsson, F. Boem, L. Toni, Graph-based learning for leak detection and
localisation in water distribution networks*, IFAC-PapersOnLine 55 (2022) 661–666.
URL: https://www.sciencedirect.com/science/article/pii/S2405896322005882. doi:https:
//doi.org/10.1016/j.ifacol.2022.07.203, 11th IFAC Symposium on Fault Detection,
Supervision and Safety for Technical Processes SAFEPROCESS 2022.
[29] C. Zhang, D. Song, C. Huang, A. Swami, N. V. Chawla, Heterogeneous graph
neural network, in: Proceedings of the 25th ACM SIGKDD International Conference on
Knowledge Discovery and Data Mining, KDD ’19, Association for Computing
Machinery, New York, NY, USA, 2019, p. 793–803. URL: https://doi.org/10.1145/3292500.3330961.
doi:10.1145/3292500.3330961.
[30] Y. Wang, Z. Duan, Y. Huang, H. Xu, J. Feng, A. Ren, Mthetgnn: A heterogeneous graph
embedding framework for multivariate time series forecasting, 2020. URL: https://arxiv.
org/abs/2008.08617. doi:10.48550/ARXIV.2008.08617.
[31] O. Triebe, H. Hewamalage, P. Pilyugina, N. Laptev, C. Bergmeir, R. Rajagopal,
Neuralprophet: Explainable forecasting at scale, 2021. URL: https://arxiv.org/abs/2111.15397.
doi:10.48550/ARXIV.2111.15397.
[32] P. Veličković, G. Cucurull, A. Casanova, A. Romero, P. Liò, Y. Bengio, Graph attention
networks, 2017. URL: https://arxiv.org/abs/1710.10903. doi:10.48550/ARXIV.1710.10903.
[33] S. Menon, Piping Calculations Manual, McGraw Hill LLC, 2004. URL: https://books.google.</p>
      <p>de/books?id=jC5PltQbLjwC.</p>
    </sec>
    <sec id="sec-10">
      <title>9. Appendix</title>
      <sec id="sec-10-1">
        <title>9.1. Edge Weight Assignment</title>
        <p>
          In the case of the used LEConv, edge-weights can be assigned to the edges. But unfortunately,
this has not been possible for heterogeneous graphs, as they have diferent edge-types and
dimensions. We therefore use the generic HeteroConv wrapper [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] to perform the message
passing from node xi() to node xj() for the diferent edge types. For the binary weight
assignment, a convention for an unweighted graph is adopted where the adjacency matrix  of
two nodes  and
        </p>
        <p>equals 1 if the edge   exists in the graph, and 0 otherwise.</p>
        <p>To assign weight values based on hydraulic loss, various equations are employed. The
pipelength is defined as   and the diameter of the pipe is defined as   as well as the slope of the
pipe as   .</p>
        <p>For a hydraulic loss weighted graph, the edge weight is determined using diferent equations.
Thus, its hydraulic state is estimated at every intersection of the network by processing the
physical time-series signals in conjunction with topological information about the piping system.
For example if we denote the Hazen-Williams equation, we have:</p>
        <p>
          where the velocity is taken from the WNTR tool [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ]. The same applies for the following
equations.
        </p>
        <p>Darcy-Weisbach equation:</p>
        <sec id="sec-10-1-1">
          <title>Prony equation:</title>
        </sec>
        <sec id="sec-10-1-2">
          <title>Manning’s equation:</title>
        </sec>
        <sec id="sec-10-1-3">
          <title>Hagen-Poiseuille equation: Energy equation:</title>
          <p>ℎ
ℎ = 10.67 (</p>
          <p>velocity 1.852
)
l


 = elevation diference + friction headloss
(10)
(11)
(12)
(13)
(14)
(15)</p>
          <p>The friction factor in the Darcy-Weisbach equation is calculated iteratively based on the
Colebrook-White equation. The initial friction factor is set to 0.2083 as a starting point in
literature [33], because it is close to the friction factor value for a smooth pipe. According to
the Economic Score metric the best headloss equation for edge-weight assignment is taken
automatically. The headloss value for each link is then stored in the equivalent tensor of each
equation. The edge weights for each relation according to the edge types are then computed as
the exponential function of the negative of the headloss values.</p>
          <p>The edge-weights associated with the best performing hydraulic head-loss equation for
the four edge types at layer  are then denoted as weights  xi(),, xj() , where 
denotes the relation and the node features xi() and xj() as well as GATConv are introduced
earlier. In the edge-weight dictionary the edge-weights are stored according to the edge-types.
These edge-weights are then used during message passing in the HeteroConv layers, where the
LEConv layers are applied to compute the updated node features.</p>
        </sec>
      </sec>
      <sec id="sec-10-2">
        <title>9.2. Acknowledgement</title>
        <p>We thank FlowChief GmbH for financing this research project.</p>
      </sec>
      <sec id="sec-10-3">
        <title>9.3. BattleDIM Water Network Visualization</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>R.</given-names>
            <surname>Dighade</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kadu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pande</surname>
          </string-name>
          ,
          <article-title>Challenges in water loss management of water distribution systems in developing countries</article-title>
          ,
          <source>International Journal of Innovative Research in Science, Engineering and Technology</source>
          <volume>3</volume>
          (
          <year>2014</year>
          )
          <fpage>13838</fpage>
          -
          <lpage>13846</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>C.</given-names>
            <surname>Montoya-Pachongo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Douterelo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Noakes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Camargo-Valero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sleigh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.- C.</given-names>
            <surname>Escobar-Rivera</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Torres-Lozada</surname>
          </string-name>
          ,
          <article-title>Field assessment of bacterial communities and total trihalomethanes: Implications for drinking water networks</article-title>
          ,
          <source>Science of the Total Environment</source>
          <volume>616</volume>
          (
          <year>2018</year>
          )
          <fpage>345</fpage>
          -
          <lpage>354</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Frauendorfer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Liemberger</surname>
          </string-name>
          ,
          <article-title>The issues and challenges of reducing non-revenue water (</article-title>
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N. A. M.</given-names>
            <surname>Yussof</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. W.</given-names>
            <surname>Ho</surname>
          </string-name>
          ,
          <article-title>Review of water leak detection methods in smart building applications</article-title>
          ,
          <source>Buildings</source>
          <volume>12</volume>
          (
          <year>2022</year>
          )
          <fpage>1535</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>C.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Zeng</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <article-title>A survey on sensor placement for contamination detection in water distribution systems</article-title>
          ,
          <source>Wireless Networks</source>
          <volume>24</volume>
          (
          <year>2018</year>
          )
          <fpage>647</fpage>
          -
          <lpage>661</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S. G.</given-names>
            <surname>Vrachimis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. G.</given-names>
            <surname>Eliades</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Taormina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ostfeld</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Kapelan</surname>
          </string-name>
          , S. Liu,
          <string-name>
            <given-names>M.</given-names>
            <surname>Kyriakou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pavlou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Qiu</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Polycarpou</surname>
          </string-name>
          ,
          <article-title>Battledim: Battle of the leakage detection and isolation methods</article-title>
          ,
          <source>in: Proc., 2nd Int. CCWI/WDSA Joint Conf</source>
          ,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Klise</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Murray</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Haxton</surname>
          </string-name>
          ,
          <article-title>An overview of the water network tool for resilience (wntr)</article-title>
          .
          <source>(</source>
          <year>2018</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>H. E.</given-names>
            <surname>Mutikanga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. K.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Vairavamoorthy</surname>
          </string-name>
          ,
          <article-title>Methods and tools for managing losses in water distribution systems</article-title>
          ,
          <source>Journal of Water Resources Planning and Management</source>
          <volume>139</volume>
          (
          <year>2013</year>
          )
          <fpage>166</fpage>
          -
          <lpage>174</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>TehraniJamsaz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Jannesari</surname>
          </string-name>
          , Graphbinmatch:
          <article-title>Graph-based similarity learning for cross-language binary and source code matching</article-title>
          ,
          <source>arXiv preprint arXiv:2304.04658</source>
          (
          <year>2023</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10] T. Cheng,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Harrou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Leiknes</surname>
          </string-name>
          ,
          <source>A Hybrid Leakage Detection and Isolation Approach Based on Ensemble Multivariate Changepoint Detection Methods</source>
          ,
          <year>2020</year>
          . URL: https://doi.org/10.5281/zenodo.3964167. doi:
          <volume>10</volume>
          .5281/zenodo.3964167,
          <article-title>This publication is based upon work supported by the King Abdullah University of Science and Technology (KAUST) Ofice of Sponsored Research (OSR) under Award No: OSR-2019- CRG7-3800.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>L.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Du</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Guan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>The combined usage of the hydraulic model calibration residual and an improved vectorial angle method for solving the BattLeDIM problem</article-title>
          ,
          <year>2020</year>
          . URL: https://doi.org/10.5281/zenodo.3925507. doi:
          <volume>10</volume>
          .5281/zenodo.3925507.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>I.</given-names>
            <surname>Daniel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pesantez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Letzgus</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Khaksar Fasaee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Alghamdi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Mahinthakumar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Berglund</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Cominola</surname>
          </string-name>
          ,
          <article-title>A high-resolution pressure-driven method for leakage identification and localization in water distribution networks</article-title>
          ,
          <year>2020</year>
          . URL: https: //doi.org/10.5281/zenodo.3924632. doi:
          <volume>10</volume>
          .5281/zenodo.3924632.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>J.</given-names>
            <surname>Saldarriaga</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Solarte</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Salcedo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Montes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Martinez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gozalez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Cuello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Ariza</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Galindo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Ortiz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Gomez</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Vanegas</surname>
          </string-name>
          ,
          <source>Battle of the Leakage Detection and Isolation Methods: An Energy Method Analysis using Genetic Algorithms</source>
          ,
          <year>2020</year>
          . URL: https://doi.org/10.5281/zenodo.3923227. doi:
          <volume>10</volume>
          .5281/zenodo.3923227.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Ma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <article-title>A multistage approach to detect and isolate multiple leakages in district metering areas in water distribution systems</article-title>
          ,
          <year>2020</year>
          . URL: https://doi.org/10.5281/zenodo.3924109. doi:
          <volume>10</volume>
          .5281/zenodo.3924109.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>D. B. Stefelbauer</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Deuerlein</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Gilbert</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          <string-name>
            <surname>Piller</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Abraham</surname>
          </string-name>
          ,
          <article-title>A dual model for leak detection</article-title>
          and localization,
          <year>2020</year>
          . URL: https://doi.org/10.5281/zenodo.3923907. doi:
          <volume>10</volume>
          .5281/ zenodo.3923907.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>W.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , J. Liu, L. Han,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Shi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A Real</given-names>
            <surname>Time</surname>
          </string-name>
          <article-title>Method to Detect the Burst Location of Urban Water Supply Network</article-title>
          ,
          <year>2020</year>
          . URL: https://doi.org/10.5281/ zenodo.3923929. doi:
          <volume>10</volume>
          .5281/zenodo.3923929.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>L.</given-names>
            <surname>Romero</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Blesa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Alves</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Cembrano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Puig</surname>
          </string-name>
          , E. Duviella,
          <article-title>Leak Localization In Water Distribution Networks Using Data-Driven And</article-title>
          <string-name>
            <surname>Model-Based</surname>
            <given-names>Approaches</given-names>
          </string-name>
          ,
          <year>2020</year>
          . URL: https://doi.org/10.5281/zenodo.3923501. doi:
          <volume>10</volume>
          .5281/zenodo.3923501.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>K. W.</given-names>
            <surname>Min</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y. H.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Jung</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Kim</surname>
          </string-name>
          ,
          <article-title>A Two-Phase Model to Detect and Localize Water Distribution System Leakages</article-title>
          ,
          <year>2020</year>
          . URL: https://doi.org/10.5281/zenodo.3922019. doi:
          <volume>10</volume>
          .5281/zenodo.3922019.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>C.</given-names>
            <surname>Blocher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Pecci</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Jara Arriagada</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Stoianov</surname>
          </string-name>
          ,
          <article-title>Detecting and Localizing Leakage Hotspots in Water Distribution Networks via Regularization of an Inverse Problem: An Application to the Battle of Leakage Detection</article-title>
          and Isolation Methods 2020 Competition,
          <year>2020</year>
          . URL: https://doi.org/10.5281/zenodo.3921800. doi:
          <volume>10</volume>
          .5281/zenodo.3921800,
          <article-title>the project was co-funded by Cla-Val UK Ltd</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>R.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , D. Zhang,
          <source>Leakage Detection and Isolation in Water Distribution Network Based on Data Mining and Genetic Optimized Hydraulic Simulation</source>
          ,
          <year>2020</year>
          . URL: https:
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>