scholarly journals Failure Detection Methods for Pipeline Networks: From Acoustic Sensing to Cyber-Physical Systems

Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 4959
Author(s):  
Boon Wong ◽  
Julie A. McCann

Pipeline networks have been widely utilised in the transportation of water, natural gases, oil and waste materials efficiently and safely over varying distances with minimal human intervention. In order to optimise the spatial use of the pipeline infrastructure, pipelines are either buried underground, or located in submarine environments. Due to the continuous expansion of pipeline networks in locations that are inaccessible to maintenance personnel, research efforts have been ongoing to introduce and develop reliable detection methods for pipeline failures, such as blockages, leakages, cracks, corrosion and weld defects. In this paper, a taxonomy of existing pipeline failure detection techniques and technologies was created to comparatively analyse their respective advantages, drawbacks and limitations. This effort has effectively illuminated various unaddressed research challenges that are still present among a wide array of the state-of-the-art detection methods that have been employed in various pipeline domains. These challenges include the extension of the lifetime of a pipeline network for the reduction of maintenance costs, and the prevention of disruptive pipeline failures for the minimisation of downtime. Our taxonomy of various pipeline failure detection methods is also presented in the form of a look-up table to illustrate the suitability, key aspects and data or signal processing techniques of each individual method. We have also quantitatively evaluated the industrial relevance and practicality of each of the methods in the taxonomy in terms of their respective deployability, generality and computational cost. The outcome of the evaluation made in the taxonomy will contribute to our future works involving the utilisation of sensor fusion and data-centric frameworks to develop efficient, accurate and reliable failure detection solutions.

2011 ◽  
Vol 13 (3) ◽  
pp. 307-323 ◽  
Author(s):  
Nemanja Branisavljević ◽  
Zoran Kapelan ◽  
Dušan Prodanović

The number of automated measuring and reporting systems used in water distribution and sewer systems is dramatically increasing and, as a consequence, so is the volume of data acquired. Since real-time data is likely to contain a certain amount of anomalous values and data acquisition equipment is not perfect, it is essential to equip the SCADA (Supervisory Control and Data Acquisition) system with automatic procedures that can detect the related problems and assist the user in monitoring and managing the incoming data. A number of different anomaly detection techniques and methods exist and can be used with varying success. To improve the performance, these methods must be fine tuned according to crucial aspects of the process monitored and the contexts in which the data are classified. The aim of this paper is to explore if the data context classification and pre-processing techniques can be used to improve the anomaly detection methods, especially in fully automated systems. The methodology developed is tested on sets of real-life data, using different standard and experimental anomaly detection procedures including statistical, model-based and data-mining approaches. The results obtained clearly demonstrate the effectiveness of the suggested anomaly detection methodology.


2021 ◽  
Vol 12 (2) ◽  
pp. 1-18
Author(s):  
Jessamyn Dahmen ◽  
Diane J. Cook

Anomaly detection techniques can extract a wealth of information about unusual events. Unfortunately, these methods yield an abundance of findings that are not of interest, obscuring relevant anomalies. In this work, we improve upon traditional anomaly detection methods by introducing Isudra, an Indirectly Supervised Detector of Relevant Anomalies from time series data. Isudra employs Bayesian optimization to select time scales, features, base detector algorithms, and algorithm hyperparameters that increase true positive and decrease false positive detection. This optimization is driven by a small amount of example anomalies, driving an indirectly supervised approach to anomaly detection. Additionally, we enhance the approach by introducing a warm-start method that reduces optimization time between similar problems. We validate the feasibility of Isudra to detect clinically relevant behavior anomalies from over 2M sensor readings collected in five smart homes, reflecting 26 health events. Results indicate that indirectly supervised anomaly detection outperforms both supervised and unsupervised algorithms at detecting instances of health-related anomalies such as falls, nocturia, depression, and weakness.


2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Xiang Li ◽  
Jianzheng Liu ◽  
Jessica Baron ◽  
Khoa Luu ◽  
Eric Patterson

AbstractRecent attention to facial alignment and landmark detection methods, particularly with application of deep convolutional neural networks, have yielded notable improvements. Neither these neural-network nor more traditional methods, though, have been tested directly regarding performance differences due to camera-lens focal length nor camera viewing angle of subjects systematically across the viewing hemisphere. This work uses photo-realistic, synthesized facial images with varying parameters and corresponding ground-truth landmarks to enable comparison of alignment and landmark detection techniques relative to general performance, performance across focal length, and performance across viewing angle. Recently published high-performing methods along with traditional techniques are compared in regards to these aspects.


2021 ◽  
Vol 11 (12) ◽  
pp. 5685
Author(s):  
Hosam Aljihani ◽  
Fathy Eassa ◽  
Khalid Almarhabi ◽  
Abdullah Algarni ◽  
Abdulaziz Attaallah

With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them. Therefore, developing and improving attack detection techniques are prominent methods to defend against cyberattacks. One of the promising attack detection methods is behaviour-based attack detection methods. Practically, attack detection techniques are widely applied in distributed software systems that utilise network environments. However, there are some other challenges facing attack detection techniques, such as the immutability and reliability of the detection systems. These challenges can be overcome with promising technologies such as blockchain. Blockchain offers a concrete solution for ensuring data integrity against unauthorised modification. Hence, it improves the immutability for detection systems’ data and thus the reliability for the target systems. In this paper, we propose a design for standalone behaviour-based attack detection techniques that utilise blockchain’s functionalities to overcome the above-mentioned challenges. Additionally, we provide a validation experiment to prove our proposal in term of achieving its objectives. We argue that our proposal introduces a novel approach to develop and improve behaviour-based attack detection techniques to become more reliable for distributed software systems.


Author(s):  
Wei Liang ◽  
Lai-bin Zhang ◽  
Zhao-hui Wang

In China, the rarefaction-pressure wave techniques are widely used to diagnose the leakage fault for liquid pipelines. Many leaking propagating assumptions, such as stable single-phased flow hypothesis and none rarefaction wave front hypothesis, are often uncertain in the process of leak detection, which can easily result in some errors. Thus the rarefaction-pressure wave techniques should be integrated with other analytical techniques to compute a more accurate leak location. Additionally, the development trends of rarefaction-pressure wave techniques lie in three aspects. First, rarefaction-pressure wave detection techniques will be integrated with other compatible detection techniques and modern signal processing methods to solve the complex problems encountered in leak detection. Second, studies of rarefaction-pressure wave techniques have advanced to a new stage. The deductions on propagation mechanism of rarefaction-pressure wave have been successfully applied to determine leaks qualitatively. Third, analysis on rarefaction-pressure wave detection techniques will be made from a quantitative point of view. The quantitative data have been used to deduce leak amounts and location. The purpose of this paper is to present the recent achievements in the study of improved rarefaction-pressure wave detection techniques. The rarefaction-pressure wave detection methods, effects of incomplete information conditions, the improvements of rarefaction-pressure wave detection techniques with modified factors and propagation mechanisms are comprehensively investigated. The disfigurements of rarefaction-pressure wave are analyzed. The corresponding methods for resolving such problems as ill diagnostic information and weak amplitude values are put forward. Several methods for stronger small leakage detection ability, higher leakage positioning precision, lower false alarm rates are proposed. The application of rarefaction-pressure wave detection techniques to safety protection of liquid pipelines is also introduced. Finally, the prospect of rarefaction-pressure wave detection techniques is predicted.


2021 ◽  
pp. 1-21
Author(s):  
Shahela Saif ◽  
Samabia Tehseen

Deep learning has been used in computer vision to accomplish many tasks that were previously considered too complex or resource-intensive to be feasible. One remarkable application is the creation of deepfakes. Deepfake images change or manipulate a person’s face to give a different expression or identity by using generative models. Deepfakes applied to videos can change the facial expressions in a manner to associate a different speech with a person than the one originally given. Deepfake videos pose a serious threat to legal, political, and social systems as they can destroy the integrity of a person. Research solutions are being designed for the detection of such deepfake content to preserve privacy and combat fake news. This study details the existing deepfake video creation techniques and provides an overview of the deepfake datasets that are publicly available. More importantly, we provide an overview of the deepfake detection methods, along with a discussion on the issues, challenges, and future research directions. The study aims to present an all-inclusive overview of deepfakes by providing insights into the deepfake creation techniques and the latest detection methods, facilitating the development of a robust and effective deepfake detection solution.


Author(s):  
Alex J. Baumgard ◽  
Tara L. Coultish ◽  
Gerry W. Ferris

Over the last 15 years, BGC Engineering Inc. has developed and implemented a geohazards Integrity Management Program (IMP) with 12 major pipeline operators (consisting of gas and oil pipelines and of both gathering and transmission systems). Over this time, the program has been applied to the assessment of approximately 13,500 individual hydrotechnical and geotechnical geohazard sites spanning approximately 63,000 km of operating pipelines in Canada and the USA. Hydrotechnical (watercourse) and geotechnical (slope) hazards are the primary types of geohazards that have directly contributed to pipeline failures in Canada. As with all IMPs, the core objectives of a geohazard management system are to ensure a proactive approach that is repeatable and defensible. In order to meet these objectives, the program allows for varying levels of intensity of inspection and a recommended timescale for completion of actions to manage the identified geohazards in accordance with the degree of hazard that the site poses to the pipeline. In this way, the sites are managed in a proactive manner while remaining flexible to accommodate the most current conditions at each site. This paper will provide a background to the key components of the program related specifically to existing operating pipeline systems, present pertinent statistics on the occurrence of various types of geohazards based on the large dataset of inspections, and discuss some of the lessons learned in the form of program results and program challenges from implementing a geohazard integrity management system for a dozen operators with different ages of systems, complexity of pipeline networks, and in varied geographic settings.


2013 ◽  
Vol 845 ◽  
pp. 283-286 ◽  
Author(s):  
Malik Abdul Razzaq Al Saedi ◽  
Mohd Muhridza Yaacob

There is a high risk of insulation system dielectric instability when partial discharge (PD) occurs. Therefore, measurement and monitoring of PD is an important preventive tool to safeguard high-voltage equipment from wanton damage. PD can be detected using optical method to increase the detection threshold and to improve the performance of on-line measurement of PD in noise environment. The PD emitted energy as acoustic emission. We can use this emitted energy to detect PD signal. The best method to detect PD in power transformer is by using acoustic emission. Optical sensor has some advantages such as; high sensitivity, more accuracy small size. Furthermore, in on-site measurements and laboratory experiments, it isoptical methodthat gives very moderate signal attenuations. This paper reviews the available PD detection methods (involving high voltage equipment) such as; acoustic detection and optical detection. The advantages and disadvantages of each method have been explored and compared. The review suggests that optical detection techniques provide many advantages from the consideration of accuracy and suitability for the applications when compared to other techniques.


Author(s):  
Shouvik Chakraborty ◽  
Mousomi Roy ◽  
Sirshendu Hore

Image segmentation is one of the fundamental problems in image processing. In digital image processing, there are many image segmentation techniques. One of the most important techniques is Edge detection techniques for natural image segmentation. Edge is a one of the basic feature of an image. Edge detection can be used as a fundamental tool for image segmentation. Edge detection methods transform original images into edge images benefits from the changes of grey tones in the image. The image edges include a good number of rich information that is very significant for obtaining the image characteristic by object recognition and analyzing the image. In a gray scale image, the edge is a local feature that, within a neighborhood, separates two regions, in each of which the gray level is more or less uniform with different values on the two sides of the edge. In this paper, the main objective is to study the theory of edge detection for image segmentation using various computing approaches.


Sign in / Sign up

Export Citation Format

Share Document