902 resultados para Leak detection systems


Relevância:

100.00% 100.00%

Publicador:

Resumo:

Leakage reduction in water supply systems and distribution networks has been an increasingly important issue in the water industry since leaks and ruptures result in major physical and economic losses. Hydraulic transient solvers can be used in the system operational diagnosis, namely for leak detection purposes, due to their capability to describe the dynamic behaviour of the systems and to provide substantial amounts of data. In this research work, the association of hydraulic transient analysis with an optimisation model, through inverse transient analysis (ITA), has been used for leak detection and its location in an experimental facility containing PVC pipes. Observed transient pressure data have been used for testing ITA. A key factor for the success of the leak detection technique used is the accurate calibration of the transient solver, namely adequate boundary conditions and the description of energy dissipation effects since PVC pipes are characterised by a viscoelastic mechanical response. Results have shown that leaks were located with an accuracy between 4-15% of the total length of the pipeline, depending on the discretisation of the system model.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

On average approximately 13% of the water that is withdrawn by Canadian municipal water suppliers is lost before it reaches final users. This is an important topic for several reasons: water losses cost money, losses force water agencies to draw more water from lakes and streams thereby putting more stress on aquatic ecosystems, leaks reduce system reliability, leaks may contribute to future pipe failures, and leaks may allow contaminants to enter water systems thereby reducing water quality and threatening the health of water users. Some benefits of leak detection fall outside water agencies’ accounting purview (e.g. reduced health risks to households connected to public water supply systems) and, as a result, may not be considered adequately in water agency decision-making. Because of the regulatory environment in which Canadian water agencies operate, some of these benefits-especially those external to the agency or those that may accrue to the agency in future time periods- may not be fully counted when agencies decide on leak detection efforts. Our analysis suggests potential reforms to promote increased efforts for leak detection: adoption of a Canada-wide goal of universal water metering; development of full-cost accounting and, pricing for water supplies; and co-operation amongst the provinces to promulgate standards for leak detection efforts and provide incentives to promote improved efficiency and rational investment decision-making.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A methodology for pipeline leakage detection using a combination of clustering and classification tools for fault detection is presented here. A fuzzy system is used to classify the running mode and identify the operational and process transients. The relationship between these transients and the mass balance deviation are discussed. This strategy allows for better identification of the leakage because the thresholds are adjusted by the fuzzy system as a function of the running mode and the classified transient level. The fuzzy system is initially off-line trained with a modified data set including simulated leakages. The methodology is applied to a small-scale LPG pipeline monitoring case where portability, robustness and reliability are amongst the most important criteria for the detection system. The results are very encouraging with relatively low levels of false alarms, obtaining increased leakage detection with low computational costs. (c) 2005 Elsevier B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Acoustic techniques have been used for many years to find and locate leaks in buried water distribution systems. Hydrophones and accelerometers are typically used as sensors. Although geophones could be used as well, they are not generally used for leak detection. A simple acoustic model of the pipe and the sensors has been proposed previously by some of the authors of this paper, and their model was used to explain some of the features observed in measurements. However, simultaneous measurements of a leak using all three sensor-types in controlled conditions for plastic pipes has not been reported to-date and hence they have not yet been compared directly. This paper fills that gap in knowledge. A set of measurements was made on a bespoke buried plastic water distribution pipe test rig to validate the previously reported analytical model. There is qualitative agreement between the experimental results and the model predictions in terms of the differing filtering properties of the pipe-sensor systems. A quality measure for the data is also presented, which is the ratio of the bandwidth over which the analysis is carried out divided by the centre frequency of this bandwidth. Based on this metric, the accelerometer was found to be the best sensor to use for the test rig described in this paper. However, for a system in which the distance between the sensors is large or the attenuation factor of the system is high, then it would be advantageous to use hydrophones, even though they are invasive sensors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Techniques based on signal analysis for leak detection in water supply systems typically use long pressure and/or flow data series of variable length. This paper presents the feature extraction from pressure signals and their application to the identification of changes related to the onset of a leak. Example signals were acquired from an experimental laboratory circuit, and features were extracted from temporal domain and from transformed signals. Statistical analysis of features values and a classification method were applied. It was verified the feasibility of using feature vectors for distinguish data acquired in the absence or presence of a leak.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In water distribution systems, old metallic pipes have been replaced by plastic pipes due to their deterioration over time. Although acoustic methods are effective in finding leaks in metallic pipes, they have been found to be problematic when applied to plastic pipes due to the high damping within the pipe wall and the surrounding medium. This is responsible for the leak signal not traveling long distances. Moreover, the leak energy in plastic pipes is generally located at a narrow frequency range located at low frequencies. However, the presence of resonances can narrow even more this frequency range. In order to minimise the influence of background noise and resonances on the calculation of the time delay estimate, band-pass filters are often used to supress undesirable frequency components of the noise. The objective of this paper is to investigate the influence of resonances in the pipe system (pipe, valves, connections and hydrants), on the time delay estimate calculated using acoustic signals. Analytical models and actual leak data collected in a bespoke rig located in the United Kingdom are used to investigate this feature.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

On-line leak detection is a main concern for the safe operation of pipelines. Acoustic and mass balance are the most important and extensively applied technologies in field problems. The objective of this work is to compare these leak detection methods with respect to a given reference situation, i.e., the same pipeline and monitoring signals acquired at the inlet and outlet ends. Experimental tests were conducted in a 749 m long laboratory pipeline transporting water as the working fluid. The instrumentation included pressure transducers and electromagnetic flowmeters. Leaks were simulated by opening solenoid valves placed at known positions and previously calibrated to produce known average leak flow rates. Results have clearly shown the limitations and advantages of each method. It is also quite clear that acoustics and mass balance technologies are, in fact, complementary. In general, an acoustic leak detection system sends out an alarm more rapidly and locates the leak more precisely, provided that the rupture of the pipeline occurs abruptly enough. On the other hand, a mass balance leak detection method is capable of quantifying the leak flow rate very accurately and of detecting progressive leaks.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mobile malwares are increasing with the growing number of Mobile users. Mobile malwares can perform several operations which lead to cybersecurity threats such as, stealing financial or personal information, installing malicious applications, sending premium SMS, creating backdoors, keylogging and crypto-ransomware attacks. Knowing the fact that there are many illegitimate Applications available on the App stores, most of the mobile users remain careless about the security of their Mobile devices and become the potential victim of these threats. Previous studies have shown that not every antivirus is capable of detecting all the threats; due to the fact that Mobile malwares use advance techniques to avoid detection. A Network-based IDS at the operator side will bring an extra layer of security to the subscribers and can detect many advanced threats by analyzing their traffic patterns. Machine Learning(ML) will provide the ability to these systems to detect unknown threats for which signatures are not yet known. This research is focused on the evaluation of Machine Learning classifiers in Network-based Intrusion detection systems for Mobile Networks. In this study, different techniques of Network-based intrusion detection with their advantages, disadvantages and state of the art in Hybrid solutions are discussed. Finally, a ML based NIDS is proposed which will work as a subsystem, to Network-based IDS deployed by Mobile Operators, that can help in detecting unknown threats and reducing false positives. In this research, several ML classifiers were implemented and evaluated. This study is focused on Android-based malwares, as Android is the most popular OS among users, hence most targeted by cyber criminals. Supervised ML algorithms based classifiers were built using the dataset which contained the labeled instances of relevant features. These features were extracted from the traffic generated by samples of several malware families and benign applications. These classifiers were able to detect malicious traffic patterns with the TPR upto 99.6% during Cross-validation test. Also, several experiments were conducted to detect unknown malware traffic and to detect false positives. These classifiers were able to detect unknown threats with the Accuracy of 97.5%. These classifiers could be integrated with current NIDS', which use signatures, statistical or knowledge-based techniques to detect malicious traffic. Technique to integrate the output from ML classifier with traditional NIDS is discussed and proposed for future work.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Prevalence and dissemination of Salmonella in a Brazilian poultry slaughterhouse were evaluated by three rapid detection systems (SS/SV(TM), VICAM, OSRT(TM), Unipath/Oxoid, and REVEAL(TM), Neogen), plus the conventional procedure. The carcasses were sampled after bleeding (P1), defeathering (P2), evisceration (P3), washing (P4), chilling (P5) and the packaged end-product (P6). In the first set of carcasses, the Salmonella incidence determined by the conventional method was 38.3% and 22.5% by SS/SV(TM). In the set for evaluation of OSRT(TM), the number of positive samples was the same detected by the cultural procedure (49.0%). In the third set, the positivity by the conventional procedure was 33.3%, and 5.0% by REVEAL(TM). The comparisons of positives in the first and third sets of carcasses were significantly different (P < 0.05). The positivity for Salmonella, in carcasses at P1 to P6, as determined by at least one of the methods, was 47.5%, 47.5%, 32.5%, 30.0%, 30.0% and 37.7%, respectively.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Internet access by wireless networks has grown considerably in recent years. However, these networks are vulnerable to security problems, especially those related to denial of service attacks. Intrusion Detection Systems(IDS)are widely used to improve network security, but comparison among the several existing approaches is not a trivial task. This paper proposes building a datasetfor evaluating IDS in wireless environments. The data were captured in a real, operating network. We conducted tests using traditional IDS and achieved great results, which showed the effectiveness of our proposed approach.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Mode of access: Internet.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

"U.S. Atomic Energy Commission Contract AT(29-1)-1106."

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper presents an effective decision making system for leak detection based on multiple generalized linear models and clustering techniques. The training data for the proposed decision system is obtained by setting up an experimental pipeline fully operational distribution system. The system is also equipped with data logging for three variables; namely, inlet pressure, outlet pressure, and outlet flow. The experimental setup is designed such that multi-operational conditions of the distribution system, including multi pressure and multi flow can be obtained. We then statistically tested and showed that pressure and flow variables can be used as signature of leak under the designed multi-operational conditions. It is then shown that the detection of leakages based on the training and testing of the proposed multi model decision system with pre data clustering, under multi operational conditions produces better recognition rates in comparison to the training based on the single model approach. This decision system is then equipped with the estimation of confidence limits and a method is proposed for using these confidence limits for obtaining more robust leakage recognition results.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We propose a method for detecting and analyzing the so-called replay attacks in intrusion detection systems, when an intruder contributes a small amount of hostile actions to a recorded session of a legitimate user or process, and replays this session back to the system. The proposed approach can be applied if an automata-based model is used to describe behavior of active entities in a computer system.