Accepted Manuscript Leak location of pipelines based on characteristic entropy Lei Ni, Juncheng Jiang, Yong Pan, Zhirong Wang PII:
S0950-4230(14)00056-4
DOI:
10.1016/j.jlp.2014.04.004
Reference:
JLPP 2755
To appear in:
Journal of Loss Prevention in the Process Industries
Received Date: 14 January 2014 Revised Date:
24 March 2014
Accepted Date: 15 April 2014
Please cite this article as: Ni, L., Jiang, J., Pan, Y., Wang, Z., Leak location of pipelines based on characteristic entropy, Journal of Loss Prevention in the Process Industries (2014), doi: 10.1016/ j.jlp.2014.04.004. This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
ACCEPTED MANUSCRIPT Leak location of pipelines based on characteristic entropy Lei Ni, Juncheng Jiang1 , Yong Pan, Zhirong Wang Jiangsu Key Laboratory of Urban and Industrial Safety, College of Urban Construction and Safety Engineering, Nanjing Tech University, Nanjing, 210009, China
M AN U
SC
RI PT
Abstract: The leakage of oil/gas pipelines is one of the major factors to influence the safe operation of pipelines. So it is significant to detect and locate the exact pipeline leakage. A novel leak location method based on characteristic entropy is proposed to extract the input feature vectors. In this approach, the combination of wavelet packet and information entropy is called “wavelet packet characteristic entropy” (WP-CE). The combination of empirical mode decomposition and information entropy is called “empirical mode decomposition characteristic entropy” (EMD-CE). Both pressure signal and flow signal of low noise and high noise of pipeline leakage are decomposed to extract the characteristic entropy. The location of pipeline leak is determined by the combination of the characteristic entropy as the input vector and particle swarm optimization and support vector machine method (PSO-SVM). The results of proposed leak location method are compared with those of PSO-SVM based on physical parameters. Under the condition of high noise, the results of proposed leak location method are better than those of PSO-SVM based on physical parameters. Keywords: leak location; pipeline; characteristic entropy; wavelet packet; empirical mode decomposition
AC C
EP
TE D
1. Introduction Pipeline transportation has been widely used in every walk of life because of its special merits in transporting liquid, gas, slurry. However, more and more serious leak problems have not only affected the natural run but also made huge loss to human life and wealth. Currently, some methods and systems for pipeline leak detection have been developed. Ostapkowicz, P(Ostapkowicz 2014) presented an improved method based on negative pressure wave detection which used median filtering of the calculating deviations of pressure signals. Yang, J(Yang et al. 2013) extracted the sound signal of pipe and presented the neural-network approach for identification of pipeline leakage. Srirangarajan (Srirangarajan et al. 2013) used multiscale wavelet method to detect and locate pipe burst events in water distribution system. L. Molina-Espinosa.(Molina-Espinosa, Cazarez-Candia and Verde-Rodarte et al. 2013) established the transient model of an incompressible flow of pipes with leaks. The finite differences technique was used to resolve the model. Ayed Lazhar (Lazhar, Hadj-Taïeb et al. 2013) studied a single viscoelastic pipe by the transient analysis and the viscoelastic factor was considered by a generalized KelvinVoigt model. He also considered the presence of the two leaks in a pipe. In the above methods of pipeline leak location, intelligent algorithm and pattern recognition was one of the main methods. In this method, the extraction of input vector was very important. Salvatore Belsito (Belsito et al. 1998)proposed a leak-detection method based on artificial neural networks (ANN), which can detect and locate leak down to 1% of flow rates. This method could compensate for the operational variations and prevent spurious alarms by combining with adequate preprocessing of those data. The input feature vectors of this method were inlet and outlet flow rate, and the fluid pressures. Henrique(Da Silva et al. 2005)used fuzzy system to classify the running mode and identify the operational transients. The fuzzy system could identify the leakage better because of adjusted thresholds. It 1 corresponding author: JunchengJiang. E-mail address:
[email protected]. Postal address: Mail box 13, No. 200 North Zhongshan Road, Nanjing Tech University, Nanjing, 210009, China. 1
ACCEPTED MANUSCRIPT
AC C
EP
TE D
M AN U
SC
RI PT
was adequate to evaluate a small-scale LPG pipeline monitoring case. The input feature vectors of this method were transient measured through average volumetric flow (Transqm) and transient measured through the origin–destination differential pressure variation (Transdp). But it was difficult to determine the thresholds of the input feature vectors. The Interactive Self-organizing Data Analysis Technique Algorithm (ISODATA) method was used to classify the normal pipeline and abnormal pipeline by Hu Jinqiu(Jinqiu et al. 2007). The abnormal pressure waves of pipeline leakage were detected by pressure transducers. Ten features extracted from samples are mean, effective value, peak value, root amplitude, mean square, root-mean-square, variance, and skewness in time-domain, peak amplitude and corresponding frequency point infrequency-domain. J. Izquierdo (Izquierdo et al. 2007) proposed a neuro-fuzzy approach to detect the pipeline leakage. The flow rate and piezometric heads of pipeline were extracted to the input feature vectors. WojciechTylman (Tylman, Kolczyński and Anders 2010)proposed a leak-detection method based on neural networks and Bayesian network to detect leaks of dielectric fluid in underground high-pressure and fluid-filled (HPFF) cables. The input feature vectors of this method were pressure, temperature and electric value. C.A. Laurentys (Laurentys et al. 2011) proposed a leak-detection method based on expert system. The input vectors of this method were flow, pressure and temperature. Santosh Kumar Mandal (Mandal, Chan and Tiwari et al. 2012) proposed a novel leak-detection method based on rough set theory and support vector machine (SVM). The input vectors were the normalized pressure and flow rate. Corneliu T.C. Arsene (Arsene, Gabrys and Al-Dabass et al. 2012)proposed a leak-detection method based on neural networks and graphs theory. The input vectors were head and flow. According to above analyses, the artificial neural network had practical limitations for small numbers of samples. The hyper-parameters of SVM were determined through experiences. At the same time, the pressure and flow rate of pipeline were chosen as the most used input vectors. They had definite physical meaning. In fact, the signal of pipeline leakage was an unsteady signal and easy to be interfered by its ambient noise. Besides, the correlation between input feature vectors and output values was poorer. In order to solve these problems, in this research, the input vectors of pressure and flow of pipeline leakage are extracted by information entropy (Cui et al. 2009). The information entropy combined with wavelet packet (WP) forms the wavelet packet characteristic entropy(Bokoski and Juricic 2012) (WP-CE). While the information entropy combined with empirical mode decomposition (EMD) forms the empirical mode decomposition characteristic entropy(Huang, Hu and Geng 2011) (EMD-CE).The methods of particle swarm optimization and support vector machine (PSO-SVM) (Ni, Jiang and Pan 2013)are employed as the location method in the system, which can recognize the different locations along with a pipeline effectively. The remainder of this paper is organized as follows: In Section 2, overview of WP, WP-CE, EMD EMD-CE and PSO-SVM algorithms is presented. Section 3 is the simulation study of pipeline leakage. Section 4 is the analysis of the performance of applied algorithms. Section 5 is the conclusions. 2 Basic theory 2.1 Wavelet packet Wavelet analysis can be used in multi-resolution analysis of time domain and frequency domain because of its good sense of localization. But the resolution of wavelet analysis is very poor when frequency is high. Wavelet packet decomposition can make multi-layer division for the frequency band of the fault signal and then can be further decomposed high frequency part of signal, which makes it more accurate in signal analysis. Wavelet packet transform can decompose signals into different frequency bands to choose adaptive frequency bands to overcome the disadvantages of wavelet transform (Qu et al. 2010). 2
RI PT
ACCEPTED MANUSCRIPT
SC
Fig.1 Schematic of three layer wavelet packet decomposition Wavelet packet decomposition has the following relationships: S=AAA3+DAA3+ADA3+DDA3+AAD3+DAD3+ADD3+DDD3. Wavelet packet decomposition can decompose the press and flow signal of pipeline leakage with the following recursion.
(1)
M AN U
u (t ) = 2 ∑ h(k )u (2t − k ) n 2n k u 2 n −1 (t ) = 2 ∑ g (k )u n (2t − k ) k Where, h(k) is high-pass filter and g(k) is low pass filter.
2.2 Wavelet packet characteristic entropy (WP-CE) Signal is decomposed into j layer wavelet packet coefficients. S(j,k) is wavelet packet decomposition sequence. K=0~2j-1. The wavelet packet decomposition of signal is regarded as a division of signal. The measure of the division of signal (Bokoski and Juricic 2012) is defined as:
TE D
(i ) (i ) = NS F j k ∑ S F j k (i ) i
ε
( j ,k )
(2)
( , )
=1
( , )
AC C
EP
Where, SF(j,k)(i) is fourier transform value of S(j,k)(i). N is original signal length. According to the basic theory of entropy, wavelet packet characteristic entropy is defined as: N
H j , k = −∑ ε i =1
j ,k
(i ) log ε
j ,k
(i )
(k = 0 ~ 2 − 1) j
(3)
Hj,k is the j layer and the k-th wavelet packet characteristic entropy of signal. 2.3 Empirical mode decomposition EMD (Wu and Huang 2004; Yu, YuDejie and Cheng 2006), an adaptive method to decompose any data into a set of intrinsic mode function (IMF) components, is considered to be a breakthrough in the field of signal analysis in recent years. EMD is ideally suitable for analyzing data from non-stationary and nonlinear processes, while the non-stationary of press signal in pipeline leakage is obvious. So the EMD method can grasp the information of the signal characteristics more accurately and efficiently. Essentially, EMD algorithm is a numerical algorithm in which time-domain signal is decomposed by the frequency scale. The fluctuations of different scales or tendency are decomposed to produce a series of intrinsic mode functions with different characteristic scales. An intrinsic mode function (IMF) is a function which should meet the following conditions simultaneously (Huang et al. 1998): 3
ACCEPTED MANUSCRIPT
r
h j (t )−h j −1(t ) 2 h j (t )
2
≤ε
M AN U
SD = ∑
SC
RI PT
(1)In the whole data set, the number of extrema must be either equal to that of zero crossings, or at most differ in one. ; (2) At any point, the mean value of the envelope whether it is defined by the local maxima or the local minima must be zero. Under the above assumptions, IMF can be filtered out by EMD by the following steps: 1) Variables should be given initial value: r0(t)=x(t), i=1; 2) Extract the i-th IMF component: a) Set initial value of variables: h0(t)=ri(t), j=1; b) All local maxima and minima of hj-1(t) are confirmed; c) Local maxima and minima of hj-1(t) is interpolated using the cubic spline function and formed both Upper and lower envelopes line. d) Calculate the average of the upper and lower envelopes line, mj-1(t); e) Calculate the difference: hj(t)=hj-1(t)-mj-1(t); f) The standard deviation (SD) is used to judge each screening results:
i =0
(4)
TE D
A typical value for SD can be set between 0.2 and 0.3. If SD satisfies the condition, stop counting and imfi(t)=hj(t), Otherwise, enter a loop computing from (B) and j=j+1 until SD is between 0.2 and 0.3. 3) ri(t)=ri-1(t)-imfi(t); 4) The sifting process is repeated until all, or the required numbers of IMFs, are extracted from the signal. In the first case the sifting process is terminated when the residual rn(t) of the sifting process has less than 3 extrema. The original signal x(t) can be expressed as a sum of extracted imfi(t) and the residual of the sifting process rn(t): n
x(t ) = ∑ imf (t ) + r n (t ) i
(5)
EP
i =1
AC C
2.4 Empirical mode decomposition characteristic entropy (EMD-CE) Signal is decomposed into several IMFs (IMF(a)).a=0-M, and M is the number of IMF. The IMF is regarded as a division of signal. The measure of the division of signal is defined as(Huang, Hu and Geng 2011):
IMF (i ) ε (i ) = ∑ IMF (i )
(6)
F (a )
N
(a )
i =1
F (a )
Where, IMFF(a)(i) is i-th fourier transform value of IMF(a)(i). N is original signal length. According to the basic theory of entropy, empirical mode decomposition characteristic entropy is defined as:
= −∑ ε a (i ) log ε a (i ) N
H
a
i =1
4
(a = 0 − M )
(7)
ACCEPTED MANUSCRIPT
SC
RI PT
Ha is the empirical mode decomposition characteristic entropy of the a-th IMF. 2.5 The extraction of the wavelet packet characteristic entropy of pipeline leakage signal The wavelet packet entropy of pressure signal and flow signal is extracted as follows: (1) Signal decomposition: The signal is decomposed into three layers wavelet coefficients. (2) Signal reconstruction: The sequence of eight frequency bands is reconstructed. The sequence of wavelet packet reconstruction of pressure signal and traffic signal is get. Each reconstruction signal contains the original signal from low to high frequency information without information redundancy and omissions. (3) The wavelet packet characteristic entropy vectors of signal: the wavelet packet entropy of pressure signal and flow signal is extracted by equations (2) and (3) and then construct the feature vectors (T). T=[HP(3 0),HP 3,1 ,HP 3,2 ,HP 3,3 ,HP 3,4 ,HP 3,5 ,HP 3,6 ,HP 3,7 ,HF(3 0),HF 3,1 ,HF 3,2 ,HF 3,3 , HF 3,4 ,HF 3,5 ,HF 3,6 ,HF 3,7 ].Because the higher characteristic of wavelet packet entropy is inconvenient. So, the eigenvectors are normalized.
∑7 H 3,j j = 0
1/2
H =
M AN U
Vector “T” is the normalized wavelet packet feature vector:
(8)
H H H H H H H H T ' = 3, 0 , 3,1 , 3, 2 , 3,3 , 3, 4 , 3,5 , 3, 6 , 3, 7 H H H H H H H H
(9)
TE D
2.6 The extraction of the empirical mode decomposition characteristic entropy of pipeline leakage signal (1) Signal decomposition: The signal is decomposed into a sum of IMFs; (2) The empirical mode decomposition characteristic entropy vectors of signal: the EMD-CE of pressure signal and flow signal is extracted by equations (6) and (7) and then construct the feature vectors (T). T=[imfHP1, imfHP2, imfHP3,...,imfHPn,imfHF1,imfHF2, imfHF3,... ,imfHFm]. Because the higher characteristic of EMD-CE is inconvenient. So, the eigenvectors are normalized.
EP
H =
∑n imfH j j =0
1/2
(10)
AC C
Vector “T” is the normalized wavelet packet feature vector:
T ' = imfH 1 ,imfH 2 ,imfH 3 ,...,imfH n H H H H
(11)
2.7 PSO-SVM method (1)Support vector machine (SVM) The support vector machine(Burges 1998) (SVM), which is based on structural risk minimization criterion to obtain a minimum actual risk, is a new machine learning algorithms. Its topology is determined by the support vector, and can overcome the defects of that of neural network method. SVM performs well in solving the practical problems of small and medium-sized sample, non-linear, high dimension and local minima points. (2)Algorithm of particle swarm optimization (Navalertporn and Afzulpurkar 2011) A group of random particles are initialized, and x and v denote the position and velocity of any particle respectively in the search space. Xi represents the position of the i-th particle in the D-dimensional search 5
ACCEPTED MANUSCRIPT space, while Vi represents the velocity of i-th particle in the D-dimensional search space. The best particle in the search space is recorded and represented as Pi=(pi1,pi2,…,piD) while the best particle in the group is recorded and represented as Pg=(pg1,pg2,….,pgD). Particle’s position and velocity are updated by the best particles according to the following equations. Repeat the front steps until the number of iterations reaches the predetermined value. id
= Ψ
v
id
+
c r (p 1
1
x
id
id
=
−
x
)+ c
x
id
id
+ v id
2
r (p 2
gd
−
x
id
)
RI PT
v
(12) (13)
TE D
M AN U
SC
Where c1 and c2 are two acceleration constants regulating the relative velocities with respect to the best global and local positions.Ψ is the inertia weight (3)Parameter optimization method of SVM based on PSO The three major hyper-parameters C, σ and ε in SVM are optimized by PSO. The training process is described as follows(Ni, Jiang and Pan 2013): 1) Set up parameters of PSO for PSO–SVM. For PSO, set up the number of particle, maximum number of iterations, two acceleration constants (c1, c2) and inertia weight(Ψ). Initialize the velocity and position for each particle comprised of the hyper-parameters C, σ and ε. 2) Set the best position(Pi) from the particle with the minimal fitness in the swarm. 3) Train an SVM regression model with the corresponding hyper-parameters based upon cross validation in each candidate particle. 4) Update the velocity and position of each particle by using Eqs.(12) and (13) 5) Check the stopping criterion. If the generations don’t reached at the maximal number, then return to Step (4). Otherwise go to next step. 6) Terminate the algorithm and give the optimal hyper-parameters.
AC C
EP
2.8 Model validation Model validation is of crucial importance to pipeline leakage modeling. The calibration and predictive capability of a model of pipeline leakage should be tested through model validation. The most widely used correlation coefficient (R) can provide a reliable indication of the fitness of the model. In the present study, it is employed to validate the calibration capability of a model of pipeline leakage. As for the validation of predictive capability of a model of pipeline leakage, two basic principles (internal validation and external validation) are existed. The cross-validation (CV) is one of the most often used methods for internal validation. A good CV result (Q2) often indicates a good robustness and high internal predictive ability of a QSPR model(Golbraikh and Tropsha 2002). The internal predictive capability of a model is evaluated by leave-one-out cross-validation (Q2LOO) on the training set, which is calculated with the following equation(Gramatica, Pilutti and Papa 2004): 2
∧ y − y ∑ i i − ∑ y i − y
training
Q
2 LOO
= 1−
i =1
2
training i =1
(14)
∧
Where, yi,
y i , and
are the experimental, predicted, and mean values of the samples for the 6
ACCEPTED MANUSCRIPT training set, respectively. The predictive capability of a model on external prediction set can be expressed by Q2ext with the following equation(Gramatica, Pilutti and Papa 2004). 2
∧ ∑ yi − yi − ∑ y i − y tr
prediction
Q
2 ext
= 1−
i =1
2
prediction
RI PT
i =1
∧
Where, yi and
yi
are the experimental and predicted values of the samples for the prediction set,
−
and
(15)
y tr is the mean experimental values of the samples for the training set.
M AN U
SC
Root mean square (RMS) is also selected as one of the parameters using in the model validation. 3. Simulation study For the case evaluated here, the main simulation parameters are presented as follows: length of pipeline, L=55km; pipe diameter, D=0.3414m;density of liquid, ρ=832kg/m3;inlet pressure, P(int)=1700kpa; outlet pressure, P(out)=1007kpa; Medium velocity, V=224m3/h; acoustic velocity, a=1100m/s. Besides, pipeline is divided into 50 sections, which the length is 1.1km. The Boundary conditions include the leak rate dw =5% and constant inlet pressure and outlet flow. The simulation process and results can be seen in the references(Ni, Jiang and Pan 2013).The results are shown in Fig.2 and Fig.3. 3.1Pipeline leak location under the condition of low noise
TE D
1020000 1010000
outpress
1000000 990000 980000
3# 11# 21# 31# 41# 49#
960000 950000 940000 930000
AC C
press(pa)
EP
970000
920000 910000 900000 890000 880000 0
200
400
600
800
times(s)
Fig.2 Outlet press of different leak location
7
1000
1200
ACCEPTED MANUSCRIPT 1.77
inlet flow 1.76
49# 1.74
41# 31#
1.73
RI PT
inlet flow(m/s)
1.75
21# 11#
1.72
3# 1.71
0
200
400
SC
1.70 600
times(s)
800
1000
0
200
0
5000 0 -5000
10000 0 -10000
TE D
400
600
800
1000
800
1000
200
400
600
800
1000
200
400
600
800
1000
200
400
600
800
1000
0
200
400
600
800
1000
0
200
400
600
800
1000
0
200
400
600
800
1000
0
3,3 3,4
0
3,5
0
3,2
600
3,7
5000 0 -5000
1000
3,6
5000 0 -5000
800
400
EP
10000 0 -10000
600
200
AC C
outpress (pa)
10000 0 -10000
400
3,0
200
3,1
0 1100000 1000000 900000 10000 0 -10000
M AN U
Fig.3 Inlet flow of different leak location (1) PSO-SVM method based on WP-CE
time(s)
Fig.4 Db5 wavelet packet decomposition coefficients of pressure signal
8
600
800
1000
200
400
600
800
1000
200
400
600
800
1000
200
400
600
200
400
600
200
400
600
800
1000
200
400
600
800
1000
800
1000
3,3
RI PT
3,2
3,1
400
1000
800
1000
200
400
600
3,6 3,7
I
3,5
3,4
800
SC
0.000 -0.005 0.005 0 0.000 -0.005 0.005 0 0.000 -0.005 0.005 0 0.000 -0.005 0.002 0 0.000 -0.002 0
200
M AN U
inlet flow(m/s)
1.80 1.75 1.70 0.02 0 0.00 -0.02 0 0.005 0.000 -0.005 0.005 0
3,0
ACCEPTED MANUSCRIPT
time(s)
AC C
EP
TE D
Fig.5 Db5 wavelet packet decomposition coefficients of flow signal The wavelet packet characteristics entropy of the signal is extracted by following the steps in section 2.3. Fig.4 and Fig.5 show the wavelet packet decomposition coefficients of pressure signal and flow signal respectively when the leakage of pipe located at 3# hole. Both pressure signal and flow signal are decomposed by db5 wavelet packet. Pipeline measurement signal mutation can be seen clearly from node (3, 1). According to the above analysis, the normalized wavelet packet characteristic entropy in No.3, 6, 9, 11, 13, 18, 19, 23, 26, 31, 33, 39, 41, 43, 46 and 49 is training set. The normalized wavelet packet characteristic entropy s in No.16, 21, 29 and 36 is test set. Then, the PSO algorithm is implemented to find the optimal hyper-parameters C, σ and ε for eigenvectors model by using 3-fold cross validation. At the same time, the leak locations of pipelines are determined by SVM. The related parameters of C, σ and ε for RBF kernel function are varied in the arbitrarily fixed ranges[0.1, 100], [0.01, 1000] and [0.00001, 1]. Swarm size S=30, inertia weight Ψ=0.9, acceleration constants c1=1.6 and c2=1.5, and maximum number of iterations fixed at 300.
9
SC
RI PT
ACCEPTED MANUSCRIPT
M AN U
Fig.6 Convergence curve of PSO-SVM method based on WP-CE
10
training set prediction set
8 6
2 0 -2 -4
EP
-6
TE D
residuals
4
-8
-10
AC C
0
10
20
30
40
The leak locations of literature value
Fig.7 Distribution of residuals
10
50
ACCEPTED MANUSCRIPT
training set prediction set
40
RI PT
30
20
10
0 0
10
20
30
SC
The leak locations of calculated values by WP-CE-PSO-SVM
50
40
50
The leak locations of literature value
M AN U
Fig.8 The results of PSO-SVM method based on WP-CE
TE D
The convergence process of PSO is shown in Fig.6. The convergence curve shows the best fitness for the training samples which are obtained from the minimal fitness of the swarm in each generation. Relying on the PSO algorithm, make C= 100, σ= 0.01 and ε= 0.01. The regression results of SVM are shown in Table 1 and Table 2. The WP-CE of outlet press and inlet flow is two elements of an eigenvector. The results of test exhibit good performance of the training SVM in Fig.8. As shown in Fig.7, the residuals are randomly distributed on both sides of zero line, so the predicted model which is established by PSO-SVM can be considered to be steady reasonably. Table 1 WP-CE and predict value of outlet press
0)
0.0642 0.0676
HP
HP
HP
HP
HP
HP
3,1
3,2
3,3
3,4
3,5
3,6
3,7
EP
(3
HP
AC C
HP
0.3775
0.3836
0.3904
0.3417
0.3727
0.3845
0.3876
Location of WP-CE
3.0101
Location of BPNN(Ni, Jiang and Pan 2013) 7.7478
The literature value(Ni, Jiang and Pan 2013) 3
0.369
0.3855
0.3846
0.3499
0.3769
0.3808
0.3915
9.1653
8.6628
6
0.3775
0.3845
0.3819
0.3473
0.3777
0.3821
0.3868
13.5961
9.9509
9
0.3762
0.3823
0.3879
0.344
0.3778
0.378
0.3905
13.3115
11.0977
11
0.3743
0.382
0.3875
0.3498
0.3776
0.3748
0.3909
15.2761
12.5525
13
0.0772
0.3703
0.3763
0.3888
0.3472
0.3793
0.3877
0.3866
18.1037
15.476
18
0.0768
0.377
0.3849
0.3871
0.3494
0.3717
0.3788
0.3877
18.9899
19.1199
19
0.0801
0.374
0.3831
0.3945
0.3527
0.3686
0.3783
0.3846
25.5031
20.9519
23
0.0758
0.3763
0.378
0.3882
0.3518
0.375
0.3814
0.3864
16.0101
28.6404
16
0.0791
0.366
0.3803
0.387
0.3527
0.3793
0.3869
0.384
22.0732
24.9947
21
0.0811
0.3905
0.3852
0.3814
0.3495
0.3757
0.3772
0.3763
27.2179
26.4761
29
0.0695 0.0733 0.075
11
ACCEPTED MANUSCRIPT Table 2 WP-CE and predict value of inlet flow
HF 0)
HF
HF
HF
HF
HF
HF
3,1
3,2
3,3
3,4
3,5
3,6
3,7
Location of WP-CE
BPNN(Ni, Jiang and Pan 2013)
The literature value(Ni, Jiang and Pan 2013)
0.3776
0.3812
0.3915
0.3477
0.3779
0.3802
0.3864
3.0101
7.7478
3
0.0362
0.378
0.3797
0.3886
0.3485
0.3754
0.3838
0.3885
9.1653
8.6628
6
0.0373
0.378
0.3842
0.3911
0.3414
0.3734
0.3852
0.3883
13.5961
9.9509
9
0.0377
0.3703
0.3861
0.3851
0.35
0.3775
0.3813
0.392
13.3115
11.0977
11
0.0376
0.3785
0.3855
0.3825
0.3477
0.3782
0.3827
0.3873
15.2761
12.5525
13
0.0385
0.3769
0.3835
0.3889
0.344
0.3784
0.3786
0.3915
18.1037
15.476
18
0.0384
0.3756
0.3833
0.3891
0.3496
0.375
0.3765
0.3931
18.9899
19.1199
19
0.0388
0.3724
0.3798
0.3929
0.3442
0.3782
0.386
0.0384
0.3723
0.3797
0.393
0.3442
0.3783
0.3861
0.039
0.3767
0.3835
0.3889
0.3441
0.3785
0.3785
0.0384
0.3778
0.38
0.3881
0.3487
RI PT
0.036
SC
(3
HF
Location of
25.5031
20.9519
23
0.3882
16.0101
28.6404
16
0.3915
22.0732
24.9947
21
27.2179
26.4761
29
M AN U
0.3881
0.3754
0.3837
0.3888
TE D
3.2 Pipeline leak location under the condition of high noise The previous research is conducted under the condition of low noise. But in actual situation, there are varying noises in output signal obtained from pipeline leakage including the environmental noise, the noise of fluid inside and the influence of the instrument itself. So in this section, Gaussian white noise is superimposed on the original low noise signal to simulate the actual signal in MATLAB. Signal superposition results are shown in the Fig.9 and Fig.10.
1040000
EP
1000000 980000
AC C
outlet–pressure pa
1020000
16 36 29 21
960000 940000 920000 900000 880000
0
200
400
600
times s Fig.9 Outlet press with white noise
12
800
1000
ACCEPTED MANUSCRIPT 1.78
16 36 29 21
1.77 1.76
inlet–flow(m/s)
1.75 1.74
RI PT
1.73 1.72 1.71 1.70
SC
1.69 1.68 0
200
400
600
800
1000
times(s)
M AN U
Fig.10 Inlet flow with white noise
EP
TE D
(1) PSO - SVM method based on the physical parameters The final outlet press value and the value of maximum of inlet flow are extracted as eigenvectors from the above analysis. The location of leak hole is output value. The locations of leak holes in No.3, 6, 9, 11, 13, 18, 19, 23, 26, 31, 33, 39, 41, 43, 46 and 49 are training set. The locations of leak holes in No.16, 21, 29 and 36 are test set. Then, the PSO algorithm is implemented to find the optimal hyper-parameters C, σ and ε for eigenvectors model by using 3-fold cross validation. At the same time, the leak locations of pipelines are determined by SVM. The related parameters of C, σ and ε for RBF kernel function are varied in the arbitrarily fixed ranges[0.1, 100], [0.01, 1000] and [0.00001, 1]. Swarm size S=30, inertia weight Ψ=0.9, acceleration constants c1=1.6 and c2=1.5, and maximum number of iterations fixed at 300. 300
fitness
AC C
250
fitness
200
150
100
50
0 0
50
100
150
200
Generations 13
250
300
ACCEPTED MANUSCRIPT Fig.11 Convergence curve training set prediction set
RI PT
residuals
10
-10 0
10
20
30
SC
0
40
50
M AN U
The leak locations of literature value
training set prediction set
50
TE D
40
30
20
EP
The–leak–locations–of–calculated–values –by–PS0-SVM
Fig.12 Distribution of residual
10
AC C
0
0
10
20
30
40
50
The–leak–locations–of–literature–value
Fig.13 The results of PSO-SVM
The convergence process of PSO is shown in Fig.11. Relying on the PSO algorithm, C=2872.5, σ= 0.01 and ε=1.8552 are defined. The regression results of SVM are shown in Table 3 and Fig.13, and outlet press and inlet flow are two elements of an eigenvector. As shown in Fig.12, all four prediction sets are on the same side of the zero line, so the stability of the model is poorer.
14
ACCEPTED MANUSCRIPT Table 3 PSO-SVM based on physical parameters Outlet press(pa)
Inlet flow(m/s)
The literature value(Ni, Jiang and Pan 2013)
Location of PSO-SVM
1 2 3 4 5 6 7 8 9
948687.7 962460.3 951595.6 943639.6 940361.6 927427.2 944024.8 899926.2 935368.8
1.7673 1.7674 1.7671 1.7683 1.7694 1.7694 1.7715 1.7708 1.7725
6 11 16 21 26 31 36 41 46
13.3365 9.9885 11.9510 19.0496 25.0281 28.7144 33.5005 42.8554 40.0903
0
200
0
200
20000 0 -20000
0
600
800
1000
400
600
800
1000
400
600
800
1000
200
400
600
800
1000
200
400
600
800
1000
600
800
1000
600
800
1000
0
200
400
0
200
400
AC C
20000 0 -20000
0
400
3,5
20000 0 -20000
1000
3,6
20000 0 -20000
800
3,7
20000 0 -20000
3,0
200
600
3,1
0
1000
400
TE D
20000 0 -20000
800
3,2
200
600
3,3
0
EP
outpress (Pa)
50000 0 -50000
400
3,4
200
SC
0
1100000 1000000 900000
M AN U
(2) PSO-SVM method based on WP-CE
RI PT
Sample
time(s)
Fig.14 Db4 wavelet packet decomposition coefficients of pressure signal with white noise
15
ACCEPTED MANUSCRIPT 0
200
400
600
800
1000
0
200
400
600
800
1000
0
200
400
600
800
1000
0
200
400
600
800
1000
0
200
400
600
0
200
400
600
0
200
400
600
0
200
400
600
0
200
0.005 0.000 -0.005 0.01 0.00 -0.01
3,1 3,2 3,3
800
1000
800
1000
3,5
3,4
1000
400
time(s)
600
3,6
0.0075 0.0000 -0.0075
800
800
1000
800
1000
3,7
0.005 0.000 -0.005
RI PT
0.005 0.000 -0.005
SC
0.01 0.00 -0.01
M AN U
inlet flow (m/s)
0.02 0.00 -0.02
3,0
1.8 1.7 1.6
TE D
50
EP
The–leak–locations–of–calculated–values– of–WP-CE-PSO-SVM
Fig.15 Db5 wavelet packet decomposition coefficients of flow signal with white noise The signal with white noise is extracted the wavelet packet characteristics entropy by following the steps in section 2.3. Fig.14 and Fig.15 show the wavelet packet decomposition coefficients of pressure signal and flow signal respectively when the leakage of pipe located at 3# hole. The choice of mother wavelet has an important influence on the results of the analysis. Pressure signal is decomposed by db4 wavelet packet and flow signal is decomposed by db5 wavelet packet. Pipeline measurement signal mutation can be seen clearly from node (3,1). The same as the low noise situation, the high noise signal of pipeline leakage is extracted by wavelet packet characteristic entropy and calculated by PSO-SVM.
training set prediction set
AC C
40
30
20
10
0 0
10
20
30
40
The–leak–locations–of–literature–value
Fig.16 The results of PSO-SVM method based onWP-CE 16
50
ACCEPTED MANUSCRIPT
3
training set prediction set
2
RI PT
residuals
1
0
-1
-3 10
20
30
40
50
M AN U
0
SC
-2
The–leak–locations–of–literature–value Fig.17 Distribution of residuals
TE D
Relying on the PSO algorithm, C= 10000, σ= 2358.7 and ε= 2.9251 are made. The regression results of SVM are shown in Table 4 and Table 5. The WP-CE of outlet press and inlet flow is two elements of an eigenvector. The results of test exhibit good performance of the training SVM in Fig.16. As shown in Fig.17, the residuals are randomly distributed on both sides of zero line, so the predicted model which is established by PSO-SVM can be considered to be steady reasonably. Table 4 pipeline leak location of outlet press with WP-CE HP
3,1
3,2
3,3
0.0777
0.3743
0.3718
0.0706
0.3728
WP-CE-
HP
HP
3,4
3,5
3,6
3,7
0.3906
0.3579
0.3777
0.3780
0.3866
6
8.9255
0.3894
0.3813
0.3440
0.3820
0.3806
0.3873
11
13.9250
0.3782
0.3896
0.3897
0.3571
0.3679
0.3692
0.3853
16
18.9253
0.3728
0.3834
0.3908
0.3543
0.3734
0.3769
0.3848
21
19.4951
0.3771
0.3825
0.3928
0.3493
0.3702
0.3820
0.3820
26
23.0746
0.3724
0.3782
0.3844
0.3563
0.3852
0.3732
0.3865
31
28.0751
0.0851
0.3751
0.3917
0.3874
0.3472
0.3705
0.3780
0.3845
36
33.0750
0.0874
0.3784
0.3749
0.3905
0.3396
0.3754
0.3810
0.3933
41
38.0748
0.0789
0.3759
0.3831
0.3918
0.3386
0.3720
0.3802
0.3932
46
43.0755
0)
0.0754 0.0787 0.0796 0.0809
HP
The literature
HP
(3
HP
EP
HP
AC C
HP
17
value(Ni, Jiang and Pan 2013)
PSO-SVM
ACCEPTED MANUSCRIPT
Table 5 pipeline leak location of inlet flow with WP-CE WP-CE-
HF
HF
HF
HF
HF
HF
3,1
3,2
3,3
3,4
3,5
3,6
3,7
0.0366
0.3757
0.3841
0.3878
0.3495
0.3743
0.3828
0.3883
6
8.9255
0.0382
0.3753
0.3888
0.3865
0.3463
0.3770
0.3800
0.3882
11
13.9250
0.0375
0.3773
0.3903
0.3858
0.3470
0.3755
0.3791
0.3872
16
18.9253
0.0376
0.3716
0.3804
0.3906
0.3433
0.3792
0.3801
0.3964
21
19.4951
0.0368
0.3802
0.3903
0.3893
0.3505
0.3730
0.3730
0.3861
26
23.0746
0.0390
0.3787
0.3799
0.3903
0.3496
0.3739
0.3820
0.3880
31
28.0751
0.0394
0.3764
0.3783
0.3868
0.3443
0.3845
0.3875
0.3840
36
33.0750
0.0384
0.3784
0.3769
0.3951
0.3401
0.3765
0.3832
0.0379
0.3780
0.3775
0.3850
0.3518
0.3738
0.3768
SC
The literature
HF
0)
200 200
IMF9 IMF10
41
38.0748
0.3994
46
43.0755
600
800
1000
400
600
800
1000
400
600
800
1000
400
600
800
1000
200
400
600
800
1000
200
400
600
800
1000
200
400
600
800
1000
200
400
600
800
1000
200
400
600
800
1000
200
400
600
800
1000
200
400
600
800
1000
I
time(s)
Fig.18 The IMFs of pressure signal with white noise
18
PSO-SVM
0.3911
400
TE D
200
EP
20000 0 -20000 0 20000 0 -20000 0 30000 0 -30000 0 20000 0 -20000 0 30000 0 -30000 0 20000 0 -20000 20000 0 0 -20000 20000 0 0 -20000 20000 0 0 -20000 20000 0 0 -20000 0
AC C
IMF8
IMF7
IMF6
IMF5
IMF4
IMF3
IMF2
IMF1
(3) PSO-SVM method 0based on EMD-CE 200
Pan 2013)
RI PT
(3
value(Ni, Jiang and
M AN U
HF
IMF4
0.01 0.00 -0.01
IMF5
0.02 0.00 -0.02
IMF6
0.05 0.00 -0.05
IMF7
0.05 0.00 -0.05 0.05 0.00 -0.05
400
600
800
1000
0
200
400
600
800
1000
0
200
400
600
800
1000
0
200
400
600
800
1000
0
200
400
600
0
200
400
600
0
200
400
600
0
200
400
600
0
200
RI PT
IMF3
0.01 0.00 -0.01
200
400
800
1000
800
1000
800
1000
SC
IMF2
0.01 0.00 -0.01
0
M AN U
IMF1
0.01 0.00 -0.01
IMF8
ACCEPTED MANUSCRIPT
time(s) 600
800
1000
800
1000
AC C
EP
TE D
Fig.19 The IMFs of flow signal with white noise The signal with white noise is extracted the IMFs by following the steps in section 2.4. Fig.18 and Fig.19 show the IMFs of pressure signal and flow signal respectively when the leakage of pipe located at 3# hole. The pressure signal has ten IMFs while the flow signal has eight. Firstly, the first eight IMFs of pressure signal and all the eight IMFs of flow signal are selected to extract the characteristic entropy by following the steps in section 2.6.The results are shown in table 6 and table 7.
19
ACCEPTED MANUSCRIPT
RI PT
Table 6 EMD-CE of outlet press imfHP2
imfHP3
imfHP4
imfHP5
imfHP6
imfHP7
imfHP8
The leak locations of literature value(Ni, Jiang and Pan 2013)
0.4634
0.4222
0.3996
0.3668
0.3124
0.3002
0.2545
0.2457
6
0.5135
0.4287
0.3821
0.3416
0.3206
0.2593
0.2515
0.2379
11
0.4761
0.4132
0.3787
0.3559
0.3239
0.3006
0.2637
0.2602
16
0.4559
0.4359
0.3989
0.3723
0.3264
0.3068
0.2541
0.1976
21
0.4740
0.4348
0.4038
0.3673
0.2975
0.2838
0.2462
0.2423
26
0.4831
0.4261
0.3933
0.3380
0.2939
0.2966
0.2924
0.2370
31
0.4655
0.4281
0.3983
0.3714
0.3269
0.2965
0.2282
0.2379
36
0.4704
0.4322
0.4060
0.3609
0.3149
0.3020
0.2408
0.2202
41
0.4883
0.4578
0.4258
0.3932
0.2480
0.2383
0.2369
0.2041
46
M AN U
SC
imfHP1
imfHF2
imfHF3
imfHF4
imfHF5
imfHF6
imfHF7
imfHF8
The leak locations of literature value(Ni, Jiang and Pan 2013)
0.5459
0.4752
0.3934
0.3323
0.2955
0.2537
0.2010
0.1371
6
0.5479
0.4619
0.4023
0.3091
0.3007
0.2531
0.2291
0.1487
11
0.5441
0.4889
0.4390
0.3651
0.2549
0.2229
0.1484
0.0476
16
0.5878
0.4956
0.4000
0.3005
0.5007
0.4657
0.4228
0.3615
0.2729
0.2351
0.1616
0.0531
21
0.3107
0.2393
0.2263
0.1340
26
0.5552
0.4725
0.4146
0.3530
0.2632
0.2298
0.2188
0.0455
31
0.5221
0.4525
0.4022
0.3754
0.2678
0.2363
0.2168
0.2130
36
0.5527
0.4597
0.3941
0.3337
0.2615
0.2397
0.2210
0.2046
41
0.5428
0.4828
0.4405
0.3663
0.2581
0.1837
0.2046
0.0439
46
AC C
EP
imfHF1
TE D
Table 7 EMD-CE of inlet flow
20
ACCEPTED MANUSCRIPT According to the above analysis, the normalized EMD-CE in No.3, 6, 9, 11, 13, 18, 19, 23, 26, 31, 33, 39, 41, 43, 46 and 49 is the training set. The normalized EMD-CE in No.16, 21, 29 and 36 is the test set. Relying on the PSO algorithm, C= 1000, σ=5.9814 and ε= 0.01 are made. The regression results of SVM are shown in Fig. 20. The EMD-CE of outlet press and inlet flow is two elements of an eigenvector. The results of test exhibit bad performance of the training SVM in Fig.20.
RI PT
training set prediction set
50 45 40 35
SC
30 25 20 15 10 5 0 0
10
M AN U
The–leak–locations–of–calculated–value– of–part–of–EMD-CE
55
20
30
40
50
The–leak–locations–of–literature–value
AC C
EP
TE D
Fig. 20 the results of PSO-SVM method based on EMD-CE Second, all the IMFs of pressure signal and flow signal are selected to extract the characteristic entropy by following the steps in section 2.6. The results are shown in Table 8 and Table 9.
21
ACCEPTED MANUSCRIPT
Table 8 EMD-CE of outlet press
0.3827 0.3665 0.3605 0.3894 0.3921 0.3747 0.3787 0.3919 0.4205
imfHP4 0.3512 0.3276 0.3388 0.3634 0.3566 0.3220 0.3531 0.3484 0.3883
imfHP5 0.2991 0.3075 0.3084 0.3187 0.2889 0.2800 0.3108 0.3039 0.2449
imfHP6 0.2875 0.2487 0.2862 0.2995 0.2755 0.2825 0.2819 0.2915 0.2353
imfHP7
imfHP8
0.2437 0.2412 0.2511 0.2481 0.2391 0.2786 0.2170 0.2324 0.2339
0.2353 0.2282 0.2477 0.1929 0.2353 0.2258 0.2262 0.2125 0.2015
imfHP9
imfHP10
RI PT
0.4043 0.4112 0.3933 0.4255 0.4222 0.4059 0.4070 0.4172 0.4521
imfHP3
0.2203 0.2142 0.2240 0.1853 0.1932 0.2204 0.2267 0.1968 0.1144
SC
0.4438 0.4925 0.4532 0.4450 0.4602 0.4603 0.4425 0.4540 0.4821
imfHP2
M AN U
imfHP1
The leak locations of literature value(Ni, Jiang and Pan 2013)
0.1852 0.1848 0.2089 0.1132 0.1409 0.2095 0.2116 0.1720 0.1090
6 11 16 21 26 31 36 41 46
Table 9 EMD-CE of inlet flow imfHF2
imfHF3
imfHF4
imfHF5
0.5459 0.5479 0.5441 0.5878 0.5007 0.5552 0.5221 0.5527 0.5428
0.4752 0.4619 0.4889 0.4956 0.4657 0.4725 0.4525 0.4597 0.4828
0.3934 0.4023 0.4390 0.4000 0.4228 0.4146 0.4022 0.3941 0.4405
0.3323 0.3091 0.3651 0.3005 0.3615 0.3530 0.3754 0.3337 0.3663
0.2955 0.3007 0.2549 0.2729 0.3107 0.2632 0.2678 0.2615 0.2581
imfHF6
AC C
EP
TE D
imfHF1
0.2537 0.2531 0.2229 0.2351 0.2393 0.2298 0.2363 0.2397 0.1837
22
imfHF7
imfHF8
0.2010 0.2291 0.1484 0.1616 0.2263 0.2188 0.2168 0.2210 0.2046
0.1371 0.1487 0.0476 0.0531 0.1340 0.0455 0.2130 0.2046 0.0439
The leak locations of literature value(Ni, Jiang and Pan 2013) 6 11 16 21 26 31 36 41 46
ACCEPTED MANUSCRIPT
RI PT
training set prediction set
50
SC
40
30
20
10
0 0
10
M AN U
The–leak–location–of–calculated–value –of–all–the–EMD-CE
According to the above analysis, the normalized EMD-CE in No.3, 6, 9, 11, 13, 18, 19, 23, 26, 31, 33, 39, 41, 43, 46 and 49 is the training set. The normalized EMD-CE in No.16, 21, 29 and 36 is the test set. Relying on the PSO algorithm, C= 1000, σ=31.2895 and ε= 2.5844 are made. The regression results of SVM are shown in Fig.21. The EMD-CE of outlet press and inlet flow is two elements of an eigenvector. The results of test exhibit good performance of the training SVM in Fig.21.As shown in Fig. 22, the residuals are randomly distributed on both sides of zero line, so the predicted model which is established by PSO-SVM can be considered to be steady reasonably.
20
30
40
50
The–leak–locations–of–literature–value
TE D
Fig. 21 The results of PSO-SVM based on EMD-CE 10 8 6
2 0
AC C
residuals
EP
4
training set prediction set
-2 -4 -6 -8
-10 0
10
20
30
40
50
The leak locations of literature value
Fig.22 Distribution of residuals 4 Discussion The results of different pipeline leak positioning methods are processed. The correlation coefficients 23
ACCEPTED MANUSCRIPT of training set and test set, Cross validation (Q2LOO Q2ext) and RMS are calculated to show in the following table. Table 10 performance comparison with different methods Training set
Model
RMS
Rext
Q2ext
RMS
BPNN
0.9661
0.9299
3.8701
0.5023
0.1211
7.1561
PSO-SVM
0.9998
0.9996
0.2959
0.9999
0.9995
0.1721
PSO-SVM method based on WP-CE
0.9946
0.9826
1.9274
PSO-SVM
0.9511
0.9005
4.611
PSO-SVM method based on WP-CE
0.9948
0.9624
2.8326
PSO-SVM based on part of EMD-CE
0.7873
0.5835
9.4316
RI PT
LOO
PSO-SVM based on all the EMD-CE
0.99
0.9588
2.9675
0.9914
0.9814
1.0402
0.9869
0.7726
3.6401
0.9588
0.9046
2.3575
0.9638
0.8138
3.2932
0.974
0.8854
2.5843
SC
High noise
Q
Prediction set
M AN U
Low noise
R
2
AC C
EP
TE D
Under the condition of low noise, the results of PSO-SVM method based on the physical parameters are better than those of PSO-SVM method based on WP-CE from the Table 10 and are better than those of BPNN method. But when the noise is high, the results of PSO-SVM method based on WP-CE and PSO-SVM method based on all the EMD-CE are better than those of PSO-SVM method based on the physical parameters while the results of PSO-SVM method based on part of EMD-CE are worse than those of PSO-SVM method based on the physical parameters. Under the condition of low noise, the outlet pressure and inlet flow value of different leakage can be distinguished easily. WP-CE is a signal processing method. It is not obvious that the relationship between WP-CE and output value is linear or nonlinear. So, the correlation of PSO-SVM based on physical parameters is better than that of PSO-SVM method WP-CE. In fact, as a general machine learning method, the PSO-SVM is based on the structural risk minimization principle, which minimizes an upper bound of the generalization error rather than minimizes the training error. So, the PSO-SVM has better generalization performance than ANN. Moreover, compared with ANN, once corresponding parameters are specified, the solution of SVM is definite and reproducible, which is clearly superior to ANN. When the noise is high, considering of the difficulties to identify the outlet pressure and inlet flow, the results of PSO-SVM method based on physical parameters are poor. The high frequency noise of signal is separated by WP-CE. The matching degree of low frequency signal and the original signal is higher. EMD method is based on the local feature of the signal, and can decompose signal adaptively into several intrinsic mode functions (IMFs)according to its characteristic time scale. So the results of PSO-SVM method based on all the EMD-CE and PSO-SVM method based on WP-CE are better than those of PSO-SVM method based on physical parameters. Although the first several IMFs have described the characteristic of the signal basically, the correlation of PSO-SVM method based on part of EMD-CE is worse than that of PSO-SVM method based on all the EMD-CE. So, the results of PSO-SVM method based on part of the EMD-CE are worse than those of PSO-SVM method based on all the EMD-CE. 5 Conclusions Characteristics entropy is presented for the application of the pipeline leak detection. The characteristic entropy of pipeline leakage signal is extracted as the input vector. The location of the pipeline 24
ACCEPTED MANUSCRIPT
Hj,k ε
(j ,k )
SC
M AN U
Nomenclatures u(t) Wavelet packet decomposition sequence h(k) High-pass filter g(k) Low pass filter S(j,k) Wavelet packet decomposition sequence SF(j,k)(i) Fourier transform value of S(j,k)(i) N Original signal length
RI PT
leakage is determined by the combination of characteristic entropy and PSO-SVM. The results of this method are compared with those of PSO-SVM method based on physical parameters. The condition of high noise is defined to simulate the condition of actual pipeline leakage. In this case, the results of PSO-SVM based on characteristics entropy are better than those of PSO-SVM based on physical parameters. In the characteristics entropy method, PSO-SVM method based on WP-CE needed to choose a suitable mother function of wavelet, but that based on EMD-CE don’t need. The results of PSO-SVM method based on WP-CE with the suitable mother function of wavelet are close to those of PSO-SVM method based on all the EMD-CE. Therefore, PSO-SVM method based on EMD-CE is more convenient. So, the leak location method of pipeline based on characteristic entropy is an effective method. It can improve the processing ability of pipeline leakage signal effectively. This method can also provide the fundamental input parameter for leak location of pipeline.
The j layer and the kth wavelet packet characteristic entropy of signal
(i )
The measure of the division of signal
Initial value of variables The residual of the sifting process ith fourier transform value of IMF(a)(i)
Ha
The empirical mode decomposition characteristic entropy of the a-th IMF The feature vectors of pressure signal The feature vectors of flow signal The normalized wavelet packet feature vector The position of the i-th particle The velocity of i-th particle The best particle in the search space The best particle in the group Acceleration constants Inertia weight Leave-one-out cross-validation on the training set Leave-one-out cross-validation on the prediction set
EP
AC C
HP HF T Xi Vi Pi Pg c1 and c2 Ψ Q2LOO Q2ext
TE D
h0(t) rn(t) IMFF(a)(i)
Acknowledgements The authors are grateful for the support given by Jiangsu Graduate Scientific Innovation Projects (CXLX11_0380) and Jiangsu Natural Science Foundation of China (BK2007587).
References: 25
ACCEPTED MANUSCRIPT Arsene, Corneliu T. C., Bogdan Gabrys, and David Al-Dabass. 2012. Decision support system for water distribution systems based on neural networks and graphs theory for leakage detection. Expert Systems with Applications 39 (18):13214-13224. Belsito, Salvatore, Paolo Lombardi, Paolo Andreussi, and Sanjoy Banerjee. 1998. Leak detection in liquefied gas pipelines by artificial neural networks. AIChE Journal 44 (12):2675-2688. Bokoski, P., and D. Juricic. 2012. Fault detection of mechanical drives under variable operating conditions based on wavelet packet Renyi entropy signatures. MECHANICAL SYSTEMS AND SIGNAL PROCESSING
RI PT
31:369-381.
Burges, Christopher J. C. 1998. A Tutorial on Support Vector Machines for Pattern Recognition. Data Mining and Knowledge Discovery 2 (2):121-167.
Cui, Houxi, Laibin Zhang, Rongyu Kang, and Xinyang Lan. 2009. Research on fault diagnosis for reciprocating compressor valve using information entropy and SVM method. Journal of Loss Prevention in the Process
SC
IndustriesPapers Presented at the 2007 and 2008 International Symposium of the Mary Kay O'Connor Process Safety Center and Papers Presented at the WCOGI 2007 22 (6):864-867.
Da Silva, Henrique V., Celso K. Morooka, Ivan R. Guilherme, Tiago C. Da Fonseca, and José R. P. Mendes. 2005. Leak detection in petroleum pipelines using a fuzzy system. Journal of Petroleum Science and (3
4):223-238.
M AN U
EngineeringAn Introduction to Artificial Intelligence Applications in Petroleum Exploration and Production 49 Golbraikh, Alexander, and Alexander Tropsha. 2002. Beware of q2!. Journal of Molecular Graphics and ModellingQSAR in vivo 20 (4):269-276.
Gramatica, P., P. Pilutti and E. Papa. 2004. Validated QSAR Prediction of OH Tropospheric Degradation of VOCs: Splitting into Training−Test Sets and Consensus Modeling. Journal of Chemical Information and Computer SciencesJ. Chem. Inf. Comput. Sci.Journal of Chemical Information and Computer Sciences 44
TE D
(5):1794-1802.
Huang, J. A., X. G. Hu, and X. Geng. 2011. An intelligent fault diagnosis method of high voltage circuit breaker based on improved EMD energy entropy and multi-class support vector machine. ELECTRIC POWER SYSTEMS RESEARCH 81 (2):400-407.
Huang, Norden E., Zheng Shen, Steven R. Long, Manli C. Wu, Hsing H. Shih, Quanan Zheng, Nai-Chyuan Yen,
EP
Chi Chao Tung, and Henry H. Liu. 1998. The empirical mode decomposition and the Hilbert spectrum for nonlinear and non-stationary time series analysis. Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences 454 (1971):903 -995.
AC C
Izquierdo, J., P. A. López, F. J. Martínez, and R. Pérez. 2007. Fault detection in water supply systems using hybrid (theory and data-driven) modelling. Mathematical and Computer Modelling 46 (3 4):341-350. Jinquiu, Hu, Zhang Laibin, Wang Zhaohui, and Liang Wei. 2007. Application of an improved ISODATA method to pipeline leak detection. Petroleum Science 4 (2):97-104. Laurentys, C. A., C. H. M. Bomfim, B. R. Menezes, and W. M. Caminhas. 2011. Design of a pipeline leakage detection using expert system: A novel approach. Applied Soft Computing 11 (1):1057-1066. Lazhar, Ayed, Lamjed Hadj-Taïeb, and Ezzeddine Hadj-Taïeb. 2013. Two leaks detection in viscoelastic pipeline systems by means of transient. Journal of Loss Prevention in the Process Industries 26 (6):1341-1351. Mandal, Santosh Kumar, Felix T. S. Chan, and M. K. Tiwari. 2012. Leak detection of pipeline: An integrated approach of rough set theory and artificial bee colony trained SVM. Expert Systems with Applications 39 (3):3071-3080. Molina-Espinosa, L., O. Cazarez-Candia, and C. Verde-Rodarte. 2013. Modeling of incompressible flow in short pipes with leaks. Journal of Petroleum Science and Engineering 109 (0):38-44. 26
ACCEPTED MANUSCRIPT Navalertporn, Thitipong, and Nitin V. Afzulpurkar. 2011. Optimization of tile manufacturing process using particle swarm optimization. Swarm and Evolutionary Computation 1 (2):97-109. Ni, L., J. Jiang and Y. Pan. 2013. Leak location of pipelines based on transient model and PSO-SVM. Journal of Loss Prevention in the Process Industries 26 (6):1085-1093. Ostapkowicz, P. 2014. LEAKAGE DETECTION FROM LIQUID TRANSMISSION PIPELINES USING IMPROVED
PRESSURE
WAVE
TECHNIQUE.
Review
of
Article.
EKSPLOATACJA
I
NIEZAWODNOSC-MAINTENANCE AND RELIABILITY 16 (1):9-16.
RI PT
Qu, Zhigang, Hao Feng, Zhoumo Zeng, Jingchang Zhuge, and Shijiu Jin. 2010. A SVM-based pipeline leakage detection and pre-warning system. Measurement 43 (4):513-519.
Srirangarajan, Seshan, Michael Allen, Ami Preis, Mudasser Iqbal, HockBeng Lim, and AndrewJ. Whittle. 2013. Wavelet-based Burst Event Detection and Localization in Water Distribution Systems. Journal of Signal Processing Systems 72 (1):1-16.
SC
Tylman, Wojciech, Jakub Kolczyński, and George J. Anders. 2010. Fully automatic AI-based leak detection system. Energy 35 (9):3838-3848.
Wu, Zhaohua, and Norden E. Huang. 2004. A study of the characteristics of white noise using the empirical Engineering Sciences 460 (2046):1597 -1611.
M AN U
mode decomposition method. Proceedings of the Royal Society of London. Series A: Mathematical, Physical and Yang, J., Y. M. Wen, P. Li, and X. K. Wang. 2013. Study on an improved acoustic leak detection method for water distribution systems. Review of Article. URBAN WATER JOURNAL 10 (2):71-84. Yu, Y., YuDejie, and J. S. Cheng. 2006. A roller bearing fault diagnosis method based on EMD energy entropy
AC C
EP
TE D
and ANN. JOURNAL OF SOUND AND VIBRATION 294 (1-2):269-277.
27
ACCEPTED MANUSCRIPT
AC C
EP
TE D
M AN U
SC
RI PT
►The characteristic entropy of pipeline leakage signal is extracted as the input vector. ►The characteristic entropy combines with PSO-SVM method. ►In high noise condition, the results of PSO-SVM based on characteristics entropy are better. ►PSO-SVM method based on EMD-CE is more convenient.