975 resultados para Leak detection systems


Relevância:

100.00% 100.00%

Publicador:

Resumo:

On average approximately 13% of the water that is withdrawn by Canadian municipal water suppliers is lost before it reaches final users. This is an important topic for several reasons: water losses cost money, losses force water agencies to draw more water from lakes and streams thereby putting more stress on aquatic ecosystems, leaks reduce system reliability, leaks may contribute to future pipe failures, and leaks may allow contaminants to enter water systems thereby reducing water quality and threatening the health of water users. Some benefits of leak detection fall outside water agencies’ accounting purview (e.g. reduced health risks to households connected to public water supply systems) and, as a result, may not be considered adequately in water agency decision-making. Because of the regulatory environment in which Canadian water agencies operate, some of these benefits-especially those external to the agency or those that may accrue to the agency in future time periods- may not be fully counted when agencies decide on leak detection efforts. Our analysis suggests potential reforms to promote increased efforts for leak detection: adoption of a Canada-wide goal of universal water metering; development of full-cost accounting and, pricing for water supplies; and co-operation amongst the provinces to promulgate standards for leak detection efforts and provide incentives to promote improved efficiency and rational investment decision-making.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

A methodology for pipeline leakage detection using a combination of clustering and classification tools for fault detection is presented here. A fuzzy system is used to classify the running mode and identify the operational and process transients. The relationship between these transients and the mass balance deviation are discussed. This strategy allows for better identification of the leakage because the thresholds are adjusted by the fuzzy system as a function of the running mode and the classified transient level. The fuzzy system is initially off-line trained with a modified data set including simulated leakages. The methodology is applied to a small-scale LPG pipeline monitoring case where portability, robustness and reliability are amongst the most important criteria for the detection system. The results are very encouraging with relatively low levels of false alarms, obtaining increased leakage detection with low computational costs. (c) 2005 Elsevier B.V. All rights reserved.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Acoustic techniques have been used for many years to find and locate leaks in buried water distribution systems. Hydrophones and accelerometers are typically used as sensors. Although geophones could be used as well, they are not generally used for leak detection. A simple acoustic model of the pipe and the sensors has been proposed previously by some of the authors of this paper, and their model was used to explain some of the features observed in measurements. However, simultaneous measurements of a leak using all three sensor-types in controlled conditions for plastic pipes has not been reported to-date and hence they have not yet been compared directly. This paper fills that gap in knowledge. A set of measurements was made on a bespoke buried plastic water distribution pipe test rig to validate the previously reported analytical model. There is qualitative agreement between the experimental results and the model predictions in terms of the differing filtering properties of the pipe-sensor systems. A quality measure for the data is also presented, which is the ratio of the bandwidth over which the analysis is carried out divided by the centre frequency of this bandwidth. Based on this metric, the accelerometer was found to be the best sensor to use for the test rig described in this paper. However, for a system in which the distance between the sensors is large or the attenuation factor of the system is high, then it would be advantageous to use hydrophones, even though they are invasive sensors.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Techniques based on signal analysis for leak detection in water supply systems typically use long pressure and/or flow data series of variable length. This paper presents the feature extraction from pressure signals and their application to the identification of changes related to the onset of a leak. Example signals were acquired from an experimental laboratory circuit, and features were extracted from temporal domain and from transformed signals. Statistical analysis of features values and a classification method were applied. It was verified the feasibility of using feature vectors for distinguish data acquired in the absence or presence of a leak.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

In water distribution systems, old metallic pipes have been replaced by plastic pipes due to their deterioration over time. Although acoustic methods are effective in finding leaks in metallic pipes, they have been found to be problematic when applied to plastic pipes due to the high damping within the pipe wall and the surrounding medium. This is responsible for the leak signal not traveling long distances. Moreover, the leak energy in plastic pipes is generally located at a narrow frequency range located at low frequencies. However, the presence of resonances can narrow even more this frequency range. In order to minimise the influence of background noise and resonances on the calculation of the time delay estimate, band-pass filters are often used to supress undesirable frequency components of the noise. The objective of this paper is to investigate the influence of resonances in the pipe system (pipe, valves, connections and hydrants), on the time delay estimate calculated using acoustic signals. Analytical models and actual leak data collected in a bespoke rig located in the United Kingdom are used to investigate this feature.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Securing IT infrastructures of our modern lives is a challenging task because of their increasing complexity, scale and agile nature. Monolithic approaches such as using stand-alone firewalls and IDS devices for protecting the perimeter cannot cope with complex malwares and multistep attacks. Collaborative security emerges as a promising approach. But, research results in collaborative security are not mature, yet, and they require continuous evaluation and testing. In this work, we present CIDE, a Collaborative Intrusion Detection Extension for the network security simulation platform ( NeSSi 2 ). Built-in functionalities include dynamic group formation based on node preferences, group-internal communication, group management and an approach for handling the infection process for malware-based attacks. The CIDE simulation environment provides functionalities for easy implementation of collaborating nodes in large-scale setups. We evaluate the group communication mechanism on the one hand and provide a case study and evaluate our collaborative security evaluation platform in a signature exchange scenario on the other.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The aim of the project is to reduce the risk of serious damage by exotic pests to the valuable timber resources of Fiji, Vanuatu and Australia by establishing efficient detection systems for target pests in high hazard sites. In particular, the project aims to minimise losses in the valuable plantations of Fiji and the emerging plantation industry of Vanuatu. This is part of a 'neighbourhood watch' approach to incursion management that will benefit all regional countries, including Australia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper discusses a successful application of the Acoustic Emission Technique (AET) for the detection and location of leak paths present on an inaccessible side of an end shield of a Pressurised Heavy Water Reactor (PHWR). The methodology was based on the fact that air- and water-leak AE signals have different characteristic features. Baseline data was generated from a sound end shield of a PHWR for characterising the background noise. A mock-up end shield system with saw-cut leak paths was used to verify the validity of the methodology. It was found that air-leak signals under pressurisation (as low as 3 psi) could be detected by frequency domain analysis. Signals due to air leaks from various locations of defective end shield were acquired and analysed. It was possible to detect and locate leak paths. The presence of detected leak paths was further confirmed by an alternative test.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Leak detection in the fuel channels is one of the challenging problems during the in-service inspection (ISI) of Pressurised Heavy Water Reactors (PHWRs). In this paper, the use of an acoustic emission (AE) technique together with AE signal analysis is described, to detect a leak that was ncountered in one (or more) of the 306 fuel channels of the Madras Atomic Power Station (PHWR), Unit I. The paper describes the problems encountered during the ISI, the experimental methods adopted and the results obtained. Results obtained using acoustic emission signal analysis are compared with those obtained from other leak detection methods used in such cases.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Fusion of multiple intrusion detection systems results in a more reliable and accurate detection for a wider class of intrusions. The paper presented here introduces the mathematical basis for sensor fusion and provides enough support for the acceptability of sensor fusion in performance enhancement of intrusion detection systems. The sensor fusion system is characterized and modeled with no knowledge of the intrusion detection systems and the intrusion detection data. The theoretical analysis is supported with an experimental illustration with three of the available intrusion detection systems using the DARPA 1999 evaluation data set.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Network Intrusion Detection Systems (NIDS) intercept the traffic at an organization's network periphery to thwart intrusion attempts. Signature-based NIDS compares the intercepted packets against its database of known vulnerabilities and malware signatures to detect such cyber attacks. These signatures are represented using Regular Expressions (REs) and strings. Regular Expressions, because of their higher expressive power, are preferred over simple strings to write these signatures. We present Cascaded Automata Architecture to perform memory efficient Regular Expression pattern matching using existing string matching solutions. The proposed architecture performs two stage Regular Expression pattern matching. We replace the substring and character class components of the Regular Expression with new symbols. We address the challenges involved in this approach. We augment the Word-based Automata, obtained from the re-written Regular Expressions, with counter-based states and length bound transitions to perform Regular Expression pattern matching. We evaluated our architecture on Regular Expressions taken from Snort rulesets. We were able to reduce the number of automata states between 50% to 85%. Additionally, we could reduce the number of transitions by a factor of 3 leading to further reduction in the memory requirements.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The IDS (Intrusion Detection System) is a common means of protecting networked systems from attack or malicious misuse. The development and rollout of an IDS can take many different forms in terms of equipment, protocols, connectivity, cost and automation. This is particularly true of WIDS (Wireless Intrusion Detection Systems) which have many more opportunities and challenges associated with data transmission through an open, shared medium.
The operation of a WIDS is a multistep process from origination of an attack through to human readable evaluation. Attention to the performance of each of the processes in the chain from attack detection to evaluation is imperative if an optimum solution is to be sought. At present, research focuses very much on each discrete aspect of a WIDS with little consideration to the operation of the whole system. Taking a holistic view of the technology shows the interconnectivity and inter-dependence between stages, leading to improvements and novel research areas for investigation.
This chapter will outline the general structure of Wireless Intrusion Detection Systems and briefly describe the functions of each development stage, categorised into the following 6 areas:
• Threat Identification,
• Architecture,
• Data Collection,
• Intrusion Detection,
• Alert Correlation,
• Evaluation.
These topics will be considered in broad terms designed for those new to the area. Focus will be placed on ensuring the readers are aware of the impact of choices made at early stages in WIDS development on future stages.