Next Article in Journal
Binding Affinity of a Highly Sensitive Au/Ag/Au/Chitosan-Graphene Oxide Sensor Based on Direct Detection of Pb2+ and Hg2+ Ions
Next Article in Special Issue
Downhole Applications of Magnetic Sensors
Previous Article in Journal
Robust Weighted Sum Harvested Energy Maximization for SWIPT Cognitive Radio Networks Based on Particle Swarm Optimization
Previous Article in Special Issue
Pulsed Eddy Current Sensing for Critical Pipe Condition Assessment
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Defect Detection and Segmentation Framework for Remote Field Eddy Current Sensor Data

Centre for Autonomous Systems (CB 11.09.300), Faculty of Engineering and Information Technology, University of Technology Sydney, 15 Broadway, Ultimo, NSW 2007, Australia
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(10), 2276; https://doi.org/10.3390/s17102276
Submission received: 31 July 2017 / Revised: 22 September 2017 / Accepted: 28 September 2017 / Published: 6 October 2017
(This article belongs to the Special Issue Magnetic Sensors and Their Applications)

Abstract

:
Remote-Field Eddy-Current (RFEC) technology is often used as a Non-Destructive Evaluation (NDE) method to prevent water pipe failures. By analyzing the RFEC data, it is possible to quantify the corrosion present in pipes. Quantifying the corrosion involves detecting defects and extracting their depth and shape. For large sections of pipelines, this can be extremely time-consuming if performed manually. Automated approaches are therefore well motivated. In this article, we propose an automated framework to locate and segment defects in individual pipe segments, starting from raw RFEC measurements taken over large pipelines. The framework relies on a novel feature to robustly detect these defects and a segmentation algorithm applied to the deconvolved RFEC signal. The framework is evaluated using both simulated and real datasets, demonstrating its ability to efficiently segment the shape of corrosion defects.

1. Introduction

Water pipelines made of ferromagnetic materials are subject to corrosion, which can lead to expensive and dangerous pipe failures. These failures can be predicted by assessing the quality of the pipelines and thus the infrastructure can be replaced before it happens. To assess the quality of the pipelines, the water industry relies on Non-Destructive Evaluation (NDE) technologies which allows for a cost-effective inspection. The Remote Field Eddy Current (RFEC) is one of the electromagnetic NDE technologies dedicated to the assessment of ferromagnetic pipes. This technology is deployed by means of an inline tool that travels inside a pipeline while gathering information related to the remaining non-corroded pipe wall thickness. The analysis of the data gathered by the tool plays a critical role for the timely replacement of the corroded pipes sections, ultimately avoiding pipe failures.
RFEC tools were originally designed with an exciter coil and a receiver coil located at a remote distance along the axial direction [1]. It can be easily shown through Finite Element Analysis (FEA) that the electromagnetic field generated by the exciter coil flows outwards from the pipe near the exciter coil and flows inwards to the pipe at a remote location, hence the placement of the receiver coil in this remote area [2]. This phenomenon, referred as double through wall penetration in the literature, is summarized in Figure 1. Each time the electromagnetic field crosses the pipe wall, its amplitude is attenuated and its phase is delayed proportionally to the non-corroded thickness of the pipe wall [3], making this technology particularly relevant for NDE. As a result, the sensor measurements of an RFEC tool are generally the amplitude of the electromagnetic field measured by the receiver coil and the phase-shift between the generated and measured electromagnetic field.
This article considers the task of automatically recovering the shape and extent of corrosion patches, cracks or pitting with an automatic and systematic approach. In this article the extraction of the extent and shape are referred as defect segmentation. To recover the extent and shape of a defect, it is important to have information on both the axial and radial directions. Thus, there is a need for a tool with multiple receivers distributed along the circumference—such as the one shown in Figure 1 with an array of receivers in the remote area. More information of such a tool regarding its practical implementation is discussed in [4]. The extraction of the depth of the defect has been studied in the literature [5] and is out of the scope of this work.
To the best of the authors’ knowledge, no work focused on extracting the extent and shape of defects using RFEC data has been published in the literature. The closest work consists of defect sizing (depth and extent) in the case of 2D axisymmetric geometries [5,6]. The common practice for extracting the shape of corrosion or other defects from data obtained with other NDE technologies, is to consider the task as an image segmentation problem. Segmentation methods have been considered for Magnetic Flux Leakage (MFL), and Pulsed Eddy Current (PEC) data—both electromagnetic NDE technologies used for pipeline assessment—where a comparison between region growing, minimum error thresholding, and morphological segmentation has been done on simulated data in [7]. As shown in the paper, region growing outperforms the other methodologies; unfortunately, this approach cannot be directly applied on raw RFEC data due to the double through wall phenomenon and the presence of Bell and Spigot (B&S) joints.
In fact, the double through wall phenomenon induces a signal convolution, where the changes in the sensor measurements are due to the change in thickness at, mainly, two different areas of the pipe—near the exciter coil, and near the receiver coil. This signal convolution—also referred to as signal shadowing—is discussed in the literature for tools with different receiver configurations; for axisymmetrical tools with a single receiver coil [8], for multiple receiver coils distributed along the axial direction [9] and for tools with an array of receivers [10]. Removing this shadowing effect and accounting for the B&S joints allows the use of classical image segmentation algorithms such as the one evaluated in [7].
In this work, we present a fully automatic framework for defect shape extraction from pipes inspected with RFEC sensors. To account for shadowing effects and the joints, the framework is subdivided in multiple tasks; (1) sensor measurement deconvolution based on the proposed optimization algorithm in [10], (2) B&S joint detection to locate independent pipe segments, (3) defect detection within each pipe segment, and (4) shape extraction through segmentation of each of the found defects.
The contributions of this article include; (i) a novel feature descriptor that, combined with a classifier, allows for robust defect detection, and (ii) the strategy to apply a specific signal deconvolution algorithm to remove the double through wall effect from the RFEC signals to allow the use of standard image segmentation algorithms for shape segmentation of defects in a pipeline. In addition, a method that allows to simulate RFEC measurements of a realistic long pipeline in an extremely efficient manner is developed as part of this work.
The article is organized as follows: the proposed framework including the signal deconvolution, the extraction of the B&S joints, the defect detection, and the defect extraction is discussed in Section 2. The results and validation methods are given in Section 3 followed by the discussion in Section 4 regarding the contributions and limitations.

2. Proposed Approach

Automatically extracting the shape of corrosion patches, cracks, and damaged areas of the pipe (referred to with the generic term “defect” in the rest of the paper) from the sensor measurements obtained by an RFEC tool deployed in a pipeline is formulated as a detection and segmentation problem. More formally, the sensor measurements Y R X × Θ is defined as a 2D matrix with X the matrix’s size in the axial direction and Θ in the circumferential direction (the sensor measurements are originally defined in the cylindrical coordinate and are unwrapped into a 2D matrix to make the data processing more convenient). We define Y x , θ : = Y ( x , θ ) as the sensor measurement located at the position ( x , θ ) using a cylindrical coordinate system. Given Y , the aim is to find the location ( x i , θ i ) and the segmented shape of each of the defects present in the pipeline. The problem is subdivided into multiple independent subproblems. The flowchart of the framework is shown in Figure 2.

2.1. Signal Deconvolution

As mentioned above, due to the double through-wall phenomenon, the sensor measurements gathered with an RFEC tool are convolved. In other words, the value of a single sensor measurement is a function of the pipe thickness in several areas. This phenomenon has been widely discussed in the literature [8,11,12]. We proposed to use here the authors’ deconvolution approach described in [10].
The deconvolution in [10] separates the signal Y into two components; (i) the foreground signal Y f g as a 2D matrix and (ii) the background signal y b g that is axisymmetrical over θ and thus represented as a one-dimensional (1D) vector. The relationship between Y , y b g , and Y f g is defined by the following equation:
Y x , θ = w 1 Y x , θ fg + w k y x bg ,
with w 1 and w k some weight parameters which have to be learned.
The relation described in Equation (1) has been empirically demonstrated using a three-dimensional (3D) FEA simulation in [12]. To perform the signal deconvolution, the background signal y b g needs first to be recovered. This is done by performing a 2D signal deconvolution using the Algorithm 1. Intuitively this algorithm maximizes the similarity between the background signal and foreground signal with a spatial shift equivalent to the tool length. This maximizes the attenuation due to the first crossing near the exciter coil and the attenuation due to the second crossing of the pipe wall near the receiver coils. In fact, for a spatial shift equal to the length of the tool, this attenuation is supposed to be equal. Once the background signal is recovered, y bg is finally obtained by substituting the recovered y bg into Equation (1) as
Y x , θ fg = 1 w 1 Y x , θ w k y x bg .
Y fg is then the estimated deconvolved signal, which for the sake of simplicity is re-defined as Y for the remainder of the paper.
The parameters used in Algorithm 1 are defined as follows: Let l e x c i t e r r e c e i v e r be the distance between the exciter coil and the receivers. δ is defined as the number of measurements recorded by the tool while moving through a distance equal to l e x c i t e r r e c e i v e r . As defined beforehand, X is the size of Y in the axial direction. γ is the step size assigned to the gradient descent (line 5). The smoothing part of the algorithm (line 6) is performed by using a simple moving average algorithm.
Algorithm 1: Signal deconvolution
Sensors 17 02276 i001

2.2. Localization of Bell and Spigot Joints

The full pipeline contains B&S joints that make the defect analysis harder if considered all together with the pipe segments (a pipe segment is defined as a section of a pipeline between two joints). Therefore, once the signal has been deconvolved, each pipe segment is analyzed independently to detect and segment the defects. This approach is referred as per-pipe segmentation in Figure 2. Hence, before considering the segmentation of the sensor data, the pipe joints need to be located within the data. To do so, a similar approach to the one proposed by Vidal-Calleja et al. [13] is used.

2.2.1. Feature Construction

As the B&S joints have an axisymmetrical geometry, the average of the sensor measurements over the circumferential direction is thus considered. More formally, from the sensor measurement Y , a vector y is created, where each y x is defined as m e a n θ ( Y x , θ ) . From this vector, an instance—in the machine learning sense—is generated for each measurement and is then classified as either a B&S joint or a non-B&S joint. To do so, a feature vector f is defined for each instance that describes a sensor measurement and these feature vectors are feed into a supervised binary classifier. More formally, the feature vector of the xth measurement is defined as follows:
f ( x ) = [ l o g ( B ¯ ) , φ ¯ , A , M , C ] ,
with B ¯ the amplitude, and φ ¯ the phase-shift of the circumferential mean value of the sensor measurements. Given that the thickness of the pipe is larger at the joints and that these features are both linearly related to the thickness of the pipe, these particular features provide valuable information on possible joints. [ A , M , C ] are the Hjorth parameters [14] with A the Activity, M the Mobility, and C the complexity. The Hjorth parameters are time-dependent features created for the description of Electroencephalogram (EEG) signals and are used to describe the behavior of a signal window. These features are defined using an array of phase-shift measurements φ ¯ as follows:
Activity : A = var ( φ ¯ ) .
Mobility : M = var ( φ ¯ d φ ¯ d x ) var ( φ ¯ ) .
Complexity : C = M ( φ ¯ d φ ¯ d x ) M ( φ ¯ ) .
As the phase-shift is wrapped over 2 π , when the tool passes through outstanding pipe thickness—either smaller or larger than the rest of the pipe—the Hjorth parameters are particularly useful to describe the noisy behavior of the signal in these areas.
Before feeding the data to the classifiers, a soft data whitening on the feature space is performed. Data whitening is particularly important for some of the classifiers as it allows considering each feature with equal importance. With the set of the feature vectors for all instances defined as F , the whitening of the feature space is performed as a standardization method that removes the mean and divides it by the standard deviation.

2.2.2. Classifiers Description

The set of features is then used to train and test a range of different supervised classifiers. The core concept and the main applications for each classifier used herein are summarized below—for all formulations the notation f is used for the feature vector, w for the parameters to be learned, and c for the classes is used:
  • Naive Bayes Classifiers require the features to be independent and identically distributed. First, a likelihood table is generated for any event by doing a frequency analysis on the training set. A probability of a class c i is then obtained by using the Bayes theorem as p ( c i | f ) = p ( c i ) p ( f j | c i ) p ( f ) . The class with the maximum probability is then chosen. Naive Bayes classifiers are popular for text classification (e.g., spam filters) and have also been applied for medical diagnosis [15]. It is possible to train the classifier with a closed-form expression [16], which allows training with a linear computational complexity.
  • Logistic Regression uses a logistic function—also known as a sigmoid function—defined as p ( f ) = 1 1 + e w T f to generate a probability. A threshold on the probability is then used to yield a binary classification [17]. Logistic regression is used in many fields, such as medical [18,19] and social sciences [20].
  • Random Forests are obtained by training a set of independent decision trees on a set of randomly sampled data. Once these decision trees are trained, a new sample is classified by considering the class which is most often obtained from all the independent decision trees [21]. The utilization of multiple classifiers is referred to as bagging and is used to avoid overfitting [22].
  • Support Vector Machine finds the linear decision boundary which maximizes the distance between the closest points of each class—i.e., finds a fat margin—while minimizing the distance between the miss-classified samples and the decision boundary [23]. Additionally, to create a more flexible classification, a kernel trick [24] can be used to bring the features into a higher dimension (in our case the Support Vector Machine (SVM) is using a Radial Basis Functions (RBF) kernel).
A study comparing the performance of 179 different classifiers tested against 121 datasets has been done by Fernández-Delgado et al. [25]. The study shows that boosting algorithms, SVM and particularly Random Forests are most often outperforming other classifiers, with Random Forests often ranked amongst the three best classifiers. Additionally to these state-of-the-art classifiers, we have chosen Logistic Regression and Naive Bayes Classifiers for their low complexity which often lead to a better generalization.
Once the position of every joint is located, it is possible to analyze each pipe segment independently. Thus, in the following sections, Y is used to describe the 2D sensor measurements for a single pipe segment.

2.3. Defect Detection

Many segmentation algorithms require either a seed or a Region of Interest (ROI) as an initialization step. Therefore, detecting defects is a required task before performing the segmentation. In this context, the defect detection is defined as the task of finding the minimum thickness point of either a corrosion patch, a crack or a localized pitting. The defect detection is performed by ranking the local minima within the sensor measurements. The outliers amongst the potential defects are then discarded with a binary classifier. Most outliers are local minima near the edges of the pipe segment (i.e., near the joints).
First, to find the local minima, a peak finder algorithm that performs a comparison between the considered pixel and its neighbors using an 8-connectivity window is used. More formally, a sensor measurement Y x , θ is considered to be a local minimum if it respects the following condition:
Y x , θ = min Y x 1 , θ 1 Y x 1 , θ Y x 1 , θ + 1 Y x , θ 1 Y x , θ Y x , θ + 1 Y x + 1 , θ 1 Y x + 1 , θ Y x + 1 , θ + 1 .
As the connectivity of each measurement is used to find the potential defects, the sensor measurement located on the edges of the 2D sensor measurements are not considered properly—in other words, it is not possible to define an 8-connectivity for these points. To overcome this problem, the cylindrical property of the sensor measurement is used to wrap the data on the circumference as shown in Figure 3. More formally, the lines of measurements located at the extremity on θ —shown in red on the figure— are duplicated on the other extremity of the 2D image while unwrapping the sensor measurement.
The search of all the local minima can then be implemented efficiently by using a divide-and-conquer strategy with an O ( n ) complexity [26]. Efficient implementations of this algorithm are common within popular libraries and often leverage Graphics Processing Units (GPU) to reduce the computation time (scipy.ndimage.filters.minimum_filter for Python or imregionalmin for Matlab implementations). The list of local minima is then ranked according to the value of the phase-shift, and the outliers from the list are removed using a binary classifier. The new feature vector f used to train the classifier is defined as follows:
f = [ l o g ( B ) , φ , A , M , C , d upstream , d downstream ] ,
with B the amplitude, φ the phase-shift, and [ A , M , C ] defined similarly to Section 2.2.1—conversely to the previous section, these features are not defined based on the circumferential mean value. The additional features [ d upstream , d downstream ] are the distance to the joints upstream and downstream. Due to the large thickness of the joints, the strength of the magnetic field is weak, leading to a low signal to noise ratio. In brief, the distances to the joints upstream and downstream describe how close the points are from a source of noise.
The rejection of the outliers is then performed by classifying every potential defect based on the features vector f . We compare the same classifiers described in Section 2.2.2 for this task.

2.4. Defect Segmentation

As discussed in the introduction, many algorithms are available for the segmentation task. Considering the limited size of our datasets, we focus here on non-supervised methods. We have chosen for our analysis the principle of the region growing algorithm and the active contour segmentation. The former one is chosen as it has shown good performance for electromagnetic data, and the latter one is chosen for its increased flexibility compared to region growing.

2.4.1. Region Growing

For a given 2D image Y R X × Θ , an initial seed s N 2 and a threshold parameter t R , the region growing algorithm starts the segmentation of Y by allocating s to the segmented area O . An iterative process is then started by comparing the value of each unallocated neighbor of O to the mean value of the pixels in O . If this measure is below the threshold t, then the neighbor is allocated to O and the comparison/allocation of the neighbors is performed again. More formally, the region growing algorithm is defined by Algorithm 2.
The seed is obtained from defect detection described in Section 2.3. Thus, the threshold t—which is bounded by 0 and the range of Y —is the only parameter that has to be optimized. For these reasons, a simple way to optimize t is to perform an exhaustive search by using a grid search over the possible values of the parameter t and choose the value with the best performance.
Algorithm 2: Region Growing
Sensors 17 02276 i002

2.4.2. Active Contour Segmentation

The active contour algorithm is an iterative method which finds the segmentation contour that minimizes an energy function F. While several variants of the active contour algorithm exist, the core of the energy function is often defined as the sum of the dissimilarity of the pixels inside the contour and the dissimilarity of the pixels outside the contour. We focus here on the method from Chan and Vese [27], called Active Contour Without Edge, where additional regularization terms are added to the energy function F to constrain the length of the contour and the surface area of the inner segmentation. These regularization terms allow smoother segmentations. The energy function F is then defined as follows
F ( c 1 , c 2 , C ) = μ Length ( C ) + ν Area ( i n s i d e ( C ) ) + λ 1 i n s i d e ( C ) | Y x , θ c 1 | 2 d x d θ + λ 2 o u t s i d e ( C ) | Y x , θ c 2 | 2 d x d θ ,
where C is the contour to optimize, c 1 is the average value of the image i n s i d e of C, and c 2 is the average value of the image o u t s i d e of C. μ and ν are regularization parameters that restrict the length and the area of the contour. λ 1 and λ 2 are the parameters that weight the importance of the similarity between the inside and outside of the contour. In practice, the minimization of the energy F is solved as a level set formulation where a Lipschitz function ϕ : Ω R is used as a proxy instead of manipulating the contour C. With the given ϕ function, the contour is then defined as
C = { ( x , θ ) Ω : ϕ ( x , θ ) = 0 } , i n s i d e ( C ) = { ( x , θ ) Ω : ϕ ( x , θ ) > 0 } , o u t s i d e ( C ) = { ( x , θ ) Ω : ϕ ( x , θ ) < 0 } ,
and the terms from Equation (9) are then defined as follows:
Length ( C ) = Ω | H ( ϕ ( x , θ ) ) | d x d θ ,
Area ( i n s i d e ( C ) ) = Ω H ( ϕ ( x , θ ) ) d x d θ ,
i n s i d e ( C ) | Y x , θ c 1 | 2 d x d θ = Ω | Y x , θ c 1 | H ( ϕ ( x , θ ) ) 2 d x d θ ,
o u t s i d e ( C ) | Y x , θ c 2 | 2 d x d θ = Ω | Y x , θ c 2 | ( 1 H ( ϕ ( x , θ ) ) ) 2 d x d θ ,
with H ( . ) the Heaviside function, and c 1 and c 2 defined as:
c 1 ( ϕ ) = Ω Y x , θ H ( ϕ ( x , θ ) ) d x d θ Ω H ( ϕ ( x , θ ) ) d x d θ , c 2 ( ϕ ) = Ω Y x , θ ( 1 H ( ϕ ( x , θ ) ) ) d x d θ Ω ( 1 H ( ϕ ( x , θ ) ) ) d x d θ .
The evolution of the ϕ surface is obtained by solving the following Partial Differential Equations (PDE) (the time t is a virtual variable introduced for solving the PDE equation. It has no physical meaning related to the problem):
ϕ t = δ ϵ ( ϕ ) μ div Δ ϕ | Δ ϕ | ν λ 1 ( μ 0 c 1 ) 2 + λ 2 ( μ 0 c 2 ) 2 = 0 in ( 0 , ) × Ω , ϕ ( 0 , x , θ ) = ϕ 0 ( x , θ ) in Ω , δ ϵ ( ϕ ) | Δ ϕ | ϕ n = 0 on Ω ,
with n the exterior normal of the contour C, ϕ n the normal derivative of ϕ at the contour C, and δ ϵ the regularized Dirac function. The formal steps required for solving the active contour without edge are given in Algorithm 3. The re-initialization described in line 6 is required to avoid the level set function from becoming too flat.
Remark (cylindrical space): The active contour algorithm is designed for 2D matrices. As a result, the regularization term Equation (11) is integrated over the matrix edges. For the cylindrical RFEC data, this problem is overcome by rotating the matrix to be centered on the defect that has to be segmented and then applying the inverse transformation on the segmented data.
The parameters λ 1 , λ 2 , μ , and ν have to be tuned for adapting the methodology to the RFEC dataset. Conversely to the Region Growing approach, performing an exhaustive search on such a parameter space is not feasible. Thus, we propose to search for the best parameters using Genetic Algorithm (GA) which aims for a globally optimal solution [28].
Algorithm 3: Active Contour Without Edges
Sensors 17 02276 i003

3. Results

Two datasets are used for the evaluation and validation of the proposed framework. The first dataset consists of RFEC sensor measurements artificially obtained using a calibrated direct model applied over a realistically corroded pipe geometry generated by spatial statistics. This controlled dataset allows us to generate a large amount of high quality data to evaluate the individual algorithms. The second dataset consists of RFEC sensor measurements obtained with a commercial tool and a limited amount of ground truth obtained by excavating, cleaning and laser scanning corroded pipe sections from the assessed pipeline. Note that this latter dataset is limited due to the high cost of data collection, not only regarding the inspection but regarding the excavated pipes.

3.1. Artificial Dataset

The geometry of the pipe segments that captures the distribution of the corrosion can be learned with spatial statistics and data-driven approaches [29]. Such models are trained on the real thickness data obtained from excavated pipe segments, giving the possibility to generate plausible corroded geometries. Using the model proposed by Shi et al. [29], a set of realistic looking pipe segments has been generated. Each pipe segment has to be linked to each other using joints in the same way that real pipelines are laid. The 3D profile of a B&S joint, previously scanned with a laser scanner and later digitalized has been inter-placed between each artificial pipe segment. This results in an artificial pipeline made of realistically corroded 3D pipes. A sample of this pipeline is shown in Figure 4.
The following step consists of generating the associated sensor signal, i.e., the simulated inspection of the artificial pipeline by an RFEC tool. We use a previously characterised direct model to map the geometry into sensor measurements [8,10]. The parameters used for the direct model are obtained from the 2D axisymmetric FEA simulation; therefore, applying it to a 3D case results in an approximation. Still, this process allows for the production of a realistic dataset which can be used to test the proposed framework.
Using the formalism developed in [10] and starting from Equation (1) with the cylindrical coordinates:
Y = w 1 T fg + w k t bg + y 0 + N ( 0 , σ 2 ) ,
where Y is the sensor measurements. In our simulated data w 1 = 158.33 , w k = 115.08 , and y 0 = 65.89 are the parameters from the direct model (in the case of a real system, these parameters would depend on the properties of the tool). N ( 0 , σ 2 ) is the sensor noise defined as Gaussian noise with zero mean and σ for standard deviation. T fg is the thickness map from the pipeline and t bg is a vector defined by the circumferential thickness average such that
t bg ( x ) = 1 2 π θ = 0 2 π T ( x + k 1 , θ ) .
Similarly to the inverse model proposed in [10], T fg and t bg are shifted by the length of the tool in term of indices, i.e., T fg = T ( 1 : n k , 1 : Θ ) and t bg = t ( k : n ) .
The outcome of this process is a new dataset which has both the sensor measurements and the thickness map—used to produce the ground truth for validating the algorithms.

3.2. Real Dataset

Actual data from a condition assessment inspection with the See-Snake RFT tool (Figure 5a) is also used to evaluate and validate the results of the proposed framework. Approximately 800 m of data have been inspected on a 660 mm diameter cast-iron water pipe. Ground-truth for the joints has been manually obtained by analysts from PICA Corporation. and, for the real thickness of the pipe, a few selected pipes have been excavated and scanned with a high resolution 3D laser scanner and high resolution accurate thickness has been obtained as described by Skinner et al. [30] (see Figure 5b,c).
The sensor measurements Y are obtained by scanning the entire pipeline. The tool is composed of a single exciter coil, an array of electromagnetic receivers distributed along the circumferential direction. The tool is pushed downstream in the pipeline by the water flow. While traveling down the pipe, the tool generates an electromagnetic field and records the response from the interaction between the electromagnetic field and the ferromagnetic pipe. The measurements recorded by the tool are the amplitude and the phase-shift—described in Section 1—from the array of receivers. Prior to the signal deconvolution step, the collected data is pre-processed to interpolate missing data and re-calibrate receivers [31].

3.3. Classifiers Evaluation

As the proposed framework relies heavily on classification algorithms, we have dedicated here a full section to evaluate with a rigorous methodology the classifiers described in Section 2.2.2 to assure accurate segmentation results. Let us consider a set of N input-output D = { ( f i , l i ) } i = 1 N —called training data—where f i F is a d-dimensional feature vector and l i L is the class where L is defined as { t r u e , f a l s e } . A binary classifier learns a function h ^ which tries to approximate the function h : F L .

3.3.1. K-Fold Cross-Validation

During the training stage of a classifier, it is possible to have the classifier over-fitting the training data. This problem mostly occurs when the classifier’s structure has a high complexity and the dataset is relatively small. In this case, the classifier tends to memorize the training data instead of learning the correlation between the features and the label. A common method used to avoid being over-confident in the classification performance is to use a K-fold cross-validation. It consists of splitting the training dataset into K sets and using one of these sets for evaluating the classifier while the other sets are used for training. This operation is repeated K times changing the evaluation set each time. Unless another method is specified in a subsection, the classifier’s parameters are trained by using a 10-fold cross-validation.

3.3.2. Confusion Matrix and Standard Metrics

The performance of the binary classifier can be represented in a table called confusion matrix by summarizing correctly and incorrectly classified instances according to their respective classes. The categories are named as follows: true positives t p , false positives f p , true negatives t n , and false negatives f n . These categories are defined according to the confusion matrix shown in Table 1. A confusion matrix provides the raw information about the classification success. However, when optimizing an algorithm, it is often more practical to use a more compact representation of the classifier success. Following this idea, several measures are defined to evaluate the performance of a classifier such as
a c c u r a c y = t p + t n t p + t n + f p + f n , p r e c i s i o n = t p t p + f p , r e c a l l = t p t p + f n , fall-out = f p f p + t n .
Despite the accuracy and the precision being commonly used for evaluating classifiers, they are a biased representation of the reality in the case where the instances are not distributed evenly amongst the classes—referred to as unbalanced datasets. In such a situation, the Cohen’s kappa coefficient [32] can be used as an alternative to the standard accuracy measure as it compares the observed accuracy to the expected accuracy of a random classifier. It is formally defined as follows,
κ = 1 1 p o 1 p e ,
with p o the probability of an instance to be correctly classified and p e the probability of an instance to be correctly classified using a random classifier. More formally p o and p e are defined as follows for a binary classifier,
p o = t p + t n N , p e = ( t p + f p ) · ( t p + f n ) + ( f n t n ) · ( f p + t n ) N 2 .

3.3.3. ROC Curves

Considering a class c defined within { 1 , , C } , for a given instance ( f i , l i ) , most classifiers produce a set of probabilistic predictions c , p ( l i = c | f i ) and the most likely class is defined by l i ^ = argmax c = 1 C p ( l i = c | f i ) . In the case of a binary classifier, where the class is reduced to { t r u e , f a l s e } , the probabilities of each class have the following property: p ( l i = t r u e | f i ) = 1 p ( l i = f a l s e | f i ) . Thus, the classification task is performed by choosing a threshold which decides, for a given probability, to which class the instance belongs—without prior information, one would choose the threshold 0.5 .
The impact of the threshold choice can be visualized with Receiver Operating Characteristic (ROC) curves. This visualization method, illustrated in Figure 6, is a graphical plot that illustrates the performance of a binary classifier for different discrimination thresholds. Practically, the curves are created by plotting the recall against the fall-out while varying the value of the classifier threshold. The use of the recall and the fall-out to define the ROC curve makes it insensitive to unbalanced datasets [33]. The ROC curve of a perfect classifier would have the shape of a step function, where a random classifier would be a straight line—shown as a dotted line in Figure 6.

3.4. Signal Deconvolution

The signal deconvolution is applied to both the artificial and real dataset using the methodology described is Section 2.1. For the simulated dataset, w 1 and w k were learned from the FEA and found empirically for the real dataset, ϵ was set to 10 3 and γ to 0.1. For each dataset, a sample of the deconvolution result is shown in Figure 7, with the artificial dataset in the first column and the real dataset in the second one. The pipe profile for each dataset is shown in Figure 7a,b, and the associated RFEC data in Figure 7c,d. The outcome of the signal deconvolution is shown in Figure 7e,f.
As described in Section 2.1 and Section 3.1, the algorithm used for the signal deconvolution is the inverse of the function used to simulate the artificial measurements (with additional Gaussian noise). Thus, the correct performance of the signal deconvolution shown in Figure 7e is expected. Conversely to the artificial dataset, in the real scenario, the magnetic field generated by the exciter coil flows trough the path of least resistance. Therefore, the applied signal deconvolution—which assumes the magnetic field to flow through a constant path—is an approximation of the reality. In order to attenuate the effect of this approximation, a smoothing step is used in Algorithm 1 (line 6). In the real data sample, the filtering effect of the deconvolution is visible in Figure 7d where the circumferential offset at the axial position 506.5 m is removed after the deconvolution—as shown in Figure 7f. As a result, the two large defects visible in the pipe profile Figure 7b are highlighted after the signal deconvolution.

3.5. Bell and Spigot Joint Detection

In this section, we use the methods described in Section 3.3 to evaluate the B&S joint classifier. At first, we consider the ROC curves shown in Figure 6 to compare the classifiers’ performances.
For each dataset, both the SVM classifier with an RBF kernel and the random forest classifier show good performances. The poor performance of the logistic regression classifier on the real dataset is due to the unbalance dataset and the definition of its loss-function, which maximizes the global accuracy. As a result, all the instances are classified in the same class. While SVM slightly outperforms random forest for any threshold, it has a training time complexity of O ( N 2 ) [34]. The time complexity is given according to the training dataset that has N instances each with d features. This complexity is due to the RBF kernel, which provides a more powerful classification compared to the linear kernel. In practical scenarios, the linear kernel often performs similarly to the logistic regression. Due to the RBF kernel, SVM is slower than random forest which has a complexity of O ( d N log ( N ) ) [35]. In our case, all computations are performed off-line. Thus, the SVM classifier with an RBF kernel is preferred. For online implementation, one might consider a different classifier to reduce the computation time. More importantly, the good performances of all selected classifiers show that the features used for the classification contain the information required for the detection of B&S joints.
While it is common to classify the instances by using a threshold of 0.5 on the output probability, in a practical scenario, one has to consider if false positives are preferred to false negatives—or vice versa. Here, as we classify the sensor measurements y i , there are multiple instances which are associated with a single B&S joint (around 15 instances for a single joint). Thus, the presence of a few false negatives is not critical as we just need to detect at least one instance for each joint. On the other hand, the false positives result in interpreting an element of a pipe segment as a B&S joint, which does not allow a per-pipe analysis. Considering the ROC curve, the threshold is set to 0.5 for the artificial dataset which results in a perfect classification—as shown in Table 2. For the real dataset, a threshold of 0.7 has been chosen as this value allows having a classification without false positives. The performance of the classifiers for the chosen threshold is displayed in Table 3. Despite the fact that we are focused on the Precision measure, this dataset is a good example of why the accuracy should not be used to measure the performance of unbalanced datasets.
The visualization of the classification performance is shown in Figure 8. A sample of the artificial pipe profile—in blue—and the B&S joint classification—in orange—are shown in Figure 8a. For the real dataset, as the pipe profile is not available for a large section, the B&S joint classification is compared with the sensor measurements—in blue—in Figure 8b. In Figure 8b, the success of the classification is shown by the regularity of the classification (i.e., the B&S joints are regularly spaced by a pipe segment length).

3.6. Defect Detection

This section evaluates the performance of the different classifiers for detecting the center of a defect as described in Section 2.3. In the artificial dataset, the only source of noise comes from the simulated Gaussian noise N ( 0 , σ 2 ) on the signal. There are no outliers present in the data, hence there is no need to train a classifier here. Therefore, in this subsection we only analyze the results obtained on the real dataset.
Since we are using supervised learning, ground truth is needed not only for validation but also for training the algorithms. For this purpose, a dataset of 1000 + samples has been manually labeled. The collected dataset contains 711 instances labeled as outliers and 359 minima labeled as defects.
Once again, an ROC curve, shown in Figure 9, is used for comparing the performance of the different classifiers. Similarly to the B&S joint classification, the SVM classifier outperforms the other methods. However, in this case, the size of the dataset is small enough not to have to worry about the computation time. Considering the engineering problem and the overall performance of the classifier, there is no preference for balancing the number of false positives versus the false negatives. As a result, the threshold for the classifier is set at 0.5 on the output probability. The performance on a 10-cross fold-validation of each classifier for this threshold is given in Table 4.
Additionally, the confusion matrix summarizing the SVM classification for the given threshold is given in Table 5. The performance of the classifier is acceptable considering that some of the points were manually labeled as outliers where they could have arguably been considered as the center of a defect.

3.7. Defect Segmentation

This section evaluates the performance of the different segmentation algorithms described in Section 2.4. While performing fundamentally different tasks, segmentation and classification algorithms can be evaluated similarly [36]. To do so, each pixel is considered to be an instance of the dataset. The notion of true/false positives and true/false negatives are then defined similarly to the example shown in Figure 10.
In the segmentation context, the precision relates to the proportions of correctly segmented pixels within the segmentation, and the recall relates to the proportions of correctly segmented pixels from the label. While these measures provide valuable information for the segmentation performance, segmentation algorithms are usually evaluated using the F-score [37], which is often referred to as the harmonic mean and is defined as follows:
F- score = 2 × r e c a l l × p r e c i s i o n r e c a l l + p r e c i s i o n .
The evaluation criteria F-score is used as the reward function which has to be maximized for optimizing the segmentation parameters. For both GA implementations, we use the same hyper-parameters in the optimizer: the probability of crossover is set to 0.8, the probability of mutation to 0.01, the population to 50, and the maximum number of generations to 100. The stability of these parameters has been tested with 40 different initializations of the randomizer resulting in small variations in the F-score (2.62% for the generated dataset and 3.09% for the real dataset).
The segmentation label of the artificial dataset has been obtained by applying a threshold on the thickness map of the pipeline. This approach provides an unbiased label and helps to automate the process. We use a 10-fold cross-validation for assessing the results which are presented in Table 6. The precision, recall, and accuracy are also given even though they are not used for optimizing the parameters directly. Additionally, some samples are provided showing the results of the segmentation in Figure 11.
In the case of the real dataset, the thickness map of the pipe has been manually labeled to generate the segmentation of the reference. This manual label is used to evaluate the performance of the algorithm. Once again, the F-score is used as a metric to optimize the parameters. As the data is more limited than the previous dataset, we use here a leave-one-out-cross-validation (a leave-one-out-cross-validation is equivalent to K-fold cross-validation with K equal to the number of instances) while optimizing the parameters on the rest of the dataset. The precision, recall, accuracy and F-score are given in Table 7 and results are shown in Figure 12.

4. Discussion and Final Remarks

The proposed framework solves the problem of extracting the size and shape of large corrosion patches and other defects from data collected with RFEC tools. The framework considers multiple steps such as signal deconvolution using the methodology proposed in [10], joint and defect detection are solved using an SVM classifier, and defect segmentation using active contour. Results are tested on both artificial and real datasets using standard metrics for evaluation of classification problems and compared to other standard algorithms.
The key contributions within the framework are the proposed embedding of the 2D signal deconvolution into the framework, which allows the use of state-of-the art segmentation algorithms, and the novel feature used to robustly locate defects. This feature is extracted from the minima in the measurements of each independent receiver around the circumference and fed into the classifier to remove potential outliers. Furthermore, a minor contribution of this paper is the proposed mechanism to generate RFEC data to evaluate the algorithms such as detection and segmentation.
In order to understand the importance of this work, one has to compare the proposed work with the work applied to other NDE methods. For instance, RFEC is often compared to PEC technologies for the assessment of ferromagnetic pipeline. Both technologies are based on two coils; an exciter coil and a receiver coil. PEC probes, are often designed as hand devices. Hence they can be used for assessing pipes from the outside. As RFEC tools are most often designed as inline tools, they allow assessing several kilometers of pipe in a single inspection. While RFEC tools offer a more convenient approach in terms of inspection, the data analysis is more complicated. Indeed, solving the inverse modeling of PEC tools can be performed by linear or non-linear regression mapping of the sensor measurements into the thickness map (typically using the decay rate of the PEC measurements [38]). In the case of RFEC tools, the data interpretation is more complicated and the spatial dependency of the sensor measurements has to be accounted for. This problem is solved as described in this paper by the signal deconvolution step which then allows using standard classification and segmentation algorithms afterward. Without the signal deconvolution, using any standard segmentation method to get the defects would result mostly in vertical stripes (see Figure 7d). Thus, the final segmentation shown in the results section could not have been obtained even by manually processing the data.
Considering the vast variety of available segmentation algorithms, one might argue about the choice of the active contour algorithm. More powerful segmentation algorithms, such as superpixels [39] and fully connected CNNs [40], offer higher complexity. However, they are harder to train and more prone to overfitting when not enough data is available. Furthermore, simpler approaches based on edge detection such as Canny, Sobel, or gradient would not perform properly due to the smooth nature of the data. The performances of the active contour segmentation presented in Table 7 are acceptable given the fact that they include all the accumulated errors from the previous processing steps: the localization error due to the data alignment between ground truth and RFEC data, the inherent errors related to the technologies’ accuracy (laser scanner and RFEC tool), and the human accuracy for manually labeling the data.
While we propose an automatic approach to the data analysis, there is still a need for a pre-process of labeling for the training stage of the classifiers and the optimization of the parameters. Considering the size of the feature vector for the defect detection, a balanced dataset of one hundred points should be enough to train the classifier. For the segmentation algorithm, manual tuning of the parameters could be performed easily on a few samples. The physical meaning of these parameters makes this task trivial and therefore easy to use. Another limitation of the proposed approach is that it is designed only for RFEC tools equipped with several receivers distributed along the circumference. In fact, as we are using segmentation methods based on image processing algorithms, our approach would not work on the original sensor design proposed by MacLean [1], where only two coils (emitter and receiver) are used.
The proposed framework is applicable for automating the RFEC data analysis using a reliable and systematic approach. The availability of the defect shapes can certainly help in the decision-making of replacing used pipes. A direct example is to use the size and shape of a defect as an input to a stress analysis in order to study the probability of a pipe failure [41].

Acknowledgments

This publication is an outcome from the Critical Pipes Project funded by Sydney Water Corporation, Water Research Foundation of the USA, Melbourne Water, Water Corporation (WA), UK Water Industry Research Ltd., South Australia Water Corporation, South East Water, Hunter Water Corporation, City West Water, Monash University, University of Technology Sydney and University of Newcastle. The research partners are Monash University (lead), University of Technology Sydney and University of Newcastle. The authors would like to thank PICA Corporation for data collection and technology discussions.

Author Contributions

Raphael Falque analysed the data and designed and implemented the algorithms; Raphael Falque and Teresa Vidal-Calleja conceived the algorithms and co-wrote the manuscript; Teresa Vidal-Calleja and Jaime Valls Miro supervised the research and gave suggestions at all stages. All authors contributed to the discussions and review of the manuscript.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. MacLean, W.R. Apparatus for Magnetically Measuring Thinckness of Ferrous Pipe. U.S. Patent 2573799, 6 November 1951. [Google Scholar]
  2. Lord, W.; Sun, Y.S.; Udpa, S.; Nath, S. A finite element study of the remote field eddy current phenomen. IEEE Trans. Magn. 1988, 24, 435–438. [Google Scholar] [CrossRef]
  3. Palanisamy, R. Electromagnetic field calculations for the low frequency eddy current testing of tubular products. IEEE Trans. Magn. 1987, 23, 2663–2665. [Google Scholar] [CrossRef]
  4. Teitsma, A.; Takach, S.; Maupin, J.; Fox, J.; Shuttleworth, P.; Seger, P. Small diameter remote field eddy current inspection for unpiggable pipelines. J. Press. Vessel Technol. 2005, 127, 269–273. [Google Scholar] [CrossRef]
  5. Davoust, M.È.; Brusquet, L.; Fleury, G. Robust estimation of flaw dimensions using remote field eddy current inspection. Meas. Sci. Technol. 2006, 17, 3006–3014. [Google Scholar] [CrossRef]
  6. Davoust, M.È.; Fleury, G.; Oksman, J. A parametric estimation approach for groove dimensioning using remote field eddy current inspection. Res. Nondestr. Eval. 1999, 11, 39–57. [Google Scholar] [CrossRef]
  7. Saranya, R.; Jackson, D.; Abudhahir, A.; Chermakani, N. Comparison of segmentation techniques for detection of defects in non-destructive testing images. In Proceedings of the 2014 International Conference on Electronics and Communication Systems (ICECS), Coimbatore, India, 13–14 February 2014. [Google Scholar]
  8. Falque, R.; Vidal-Calleja, T.; Dissanayake, G.; Miro, J.V. From the skin-depth equation to the inverse RFEC sensor model. In Proceedings of the 2016 14th International Conference on Control, Automation, Robotics and Vision (ICARCV), Phuket, Thailand, 13–15 November 2016. [Google Scholar]
  9. Luo, Q.W.; Shi, Y.B.; Wang, Z.G.; Zhang, W.; Zhang, Y. Approach for removing ghost-images in remote field eddy current testing of ferromagnetic pipes. Rev. Sci. Instrum. 2016, 87. [Google Scholar] [CrossRef] [PubMed]
  10. Falque, R.; Vidal-Calleja, T.; Valls Miro, J. Towards Inverse modeling of RFEC via an optimization based signal deconvolution. arXiV 2017. preprint. [Google Scholar]
  11. Zhang, Y. Electric and Magnetic Contributions and Defect Interactions in Remote Field Eddy Current Techniques. Ph.D. Thesis, Queen’s University, Kingston, ON, Canada, 1997. [Google Scholar]
  12. Falque, R.; Vidal-Calleja, T.; Valls Miro, J.; Lingnau, D.C.; Russell, D.E. Background segmentation to enhance remote field eddy current signals. In Proceedings of the Australasian Conference on Robotics and Automation (ACRA), Melbourne, Australia, 2–4 December 2014. [Google Scholar]
  13. Vidal-Calleja, T.; Miro, J.V.; Martin, F.; Lingnau, D.C.; Russell, D.E. Automatic detection and verification of pipeline construction features with multi-modal data. In Proceedings of the 2014 IEEE/RSJ International Conference on Intelligent Robots and Systems, Chicago, IL, USA, 14–18 September 2014. [Google Scholar]
  14. Hjorth, B. EEG analysis based on time domain properties. Electroencephalogr. Clin. Neurophysiol. 1970, 29, 306–310. [Google Scholar] [CrossRef]
  15. Rish, I. An Empirical Study of the Naive Bayes Classifier; Technical Report; IBM Research—Thomas J. Watson Research Center: Albany, NY, USA, 2001; pp. 41–46. [Google Scholar]
  16. Russell, Stuart, J.; Norvig, P. Artificial Intelligence: A Modern Approach; Prentice Hall: Bergen, NJ, USA, 2009; p. 1152. [Google Scholar]
  17. Cox, D.R. The regression analysis of binary sequences. J. R. Stat. Soc. Ser. B Methodol. 1958, 20, 215–242. [Google Scholar]
  18. Boyd, C.R.; Tolson, M.A.; Copes, W.S. Evaluating Trauma Care. J. Trauma Inj. Infect. Crit. Care 1987, 27, 370–378. [Google Scholar] [CrossRef]
  19. Truett, J.; Cornfield, J.; Kannel, W. A multivariate analysis of the risk of coronary heart disease in Framingham. J. Chronic Dis. 1967, 20, 511–524. [Google Scholar] [CrossRef]
  20. Harrell, F.E. Regression Modeling Strategies; Springer Series in Statistics; Springer: New York, NY, USA, 2001; p. 289. [Google Scholar]
  21. Ho, T.K. Random decision forests. In Proceedings of the 3rd International Conference on Document Analysis and Recognition, Montreal, QC, Canada, 14–16 August 1995. [Google Scholar]
  22. Hastie, T.; Tibshirani, R.; Friedman, J. The Elements of Statistical Learning; Number 2 in Springer Series in Statistics; Springer: New York, NY, USA, 2009; pp. 587–588. [Google Scholar]
  23. Cortes, C.; Vapnik, V. Support-vector networks. Mach. Learn. 1995, 20, 273–297. [Google Scholar] [CrossRef]
  24. Hofmann, T.; Schölkopf, B.; Smola, A.J. Kernel methods in machine learning. Ann. Stat. 2008, 36, 1171–1220. [Google Scholar] [CrossRef]
  25. Fernández-Delgado, M.; Cernadas, E.; Barro, S.; Amorim, D. Do we need hundreds of classifiers to solve real world classification problems? J. Mach. Learn. Res. 2014, 15, 3133–3181. [Google Scholar]
  26. Cormen, T.H.; Leiserson, C.E.; Rivest, R.; Stein, C. Introduction to Algorithms; MIT Press: Cambridge, MA, USA, 2009; p. 1312. [Google Scholar]
  27. Chan, T.; Vese, L. Active contours without edges. IEEE Trans. Image Process. 2001, 10, 266–277. [Google Scholar] [CrossRef] [PubMed]
  28. Goldberg, D.E. Genetic Algorithms in Search, Optimization and Machine Learning; Addison-Wesley Longman Publishing Co., Inc.: Boston, MA, USA, 1989; p. 372. [Google Scholar]
  29. Shi, L.; Sun, L.; Vidal Calleja, T.; Valls Miro, J. Kernel-specific gaussian process for predicting pipe wall thickness maps. In Proceedings of the Australasian Conference on Robotics and Automation, Canberra, Australia, 2–4 December 2015. [Google Scholar]
  30. Skinner, B.; Vidal-Calleja, T.; Valls Miro, J.; Bruijn, F.D.; Falque, R. 3D point cloud upsampling for accurate reconstruction of dense 2.5D thickness maps. In Proceedings of the Australasian Conference on Robotics and Automation (ACRA), Melbourne, Australia, 2–4 December 2014. [Google Scholar]
  31. Falque, R.; Vidal-Calleja, T.; Miro, J.V. Kidnapped laser-scanner for evaluation of RFEC tool. In Proceedings of the IEEE International Conference on Intelligent Robots and Systems (IROS), Hamburg, Germany, 28 September–2 October 2015. [Google Scholar]
  32. Cohen, J. A coefficient of agreement for nominal scales. Educ. Psychol. Meas. 1960, 20, 37–46. [Google Scholar] [CrossRef]
  33. Fawcett, T. An introduction to ROC analysis. Pattern Recognit. Lett. 2006, 27, 861–874. [Google Scholar] [CrossRef]
  34. Platt, J.C. Sequential Minimal Optimization: A Fast Algorithm for Training Support Vector Machines; Technical Report MSR-TR-98-14; Microsoft Research: Redmond, WA, USA, 1998; pp. 185–208. [Google Scholar]
  35. Breiman, L. Random Forests. Mach. Learn. 2001, 45, 5–32. [Google Scholar] [CrossRef]
  36. Alpert, S.; Galun, M.; Brandt, A.; Basri, R. Image segmentation by probabilistic bottom-up aggregation and cue integration. IEEE Trans. Pattern Anal. Mach. Intell. 2012, 34, 315–327. [Google Scholar] [CrossRef] [PubMed]
  37. Arbel, P.; Maire, M.; Fowlkes, C.; Malik, J. Contour detection and hierarchical image segmentation. IEEE Trans. Pattern Anal. Mach. Intell. 2011, 33, 1–20. [Google Scholar]
  38. Ulapane, N.; Alempijevic, A.; Vidal-Calleja, T.; Miro, J.V.; Rudd, J.; Roubal, M. Gaussian process for interpreting pulsed eddy current signals for ferromagnetic pipe profiling. In Proceedings of the 2014 IEEE 9th Conference on Industrial Electronics and Applications (ICIEA), Hangzhou, China, 9–11 June 2014. [Google Scholar]
  39. Felzenszwalb, P.F.; Huttenlocher, D.P. Efficient graph-based image segmentation. Int. J. Comput. Vis. 2004, 59, 1–26. [Google Scholar] [CrossRef]
  40. Long, J.; Shelhamer, E.; Darrell, T. Fully convolutional networks for semantic segmentation. In Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition, Boston, MA, USA, 7–12 June 2015. [Google Scholar]
  41. Sadiq, R.; Rajani, B.; Kleiner, Y. Probabilistic risk analysis of corrosion associated failures in cast iron water mains. Reliab. Eng. Syst. Saf. 2004, 86, 1–10. [Google Scholar] [CrossRef]
Figure 1. Schematic of the RFEC tool considered in this article. The exciter coil generates an electromagnetic field which is expelled outwards from the pipe near the exciter coil—hence the direct field is quickly attenuated. At a remote distance along the axial direction, the remote field flows inwards to the pipe and is measured by an array of receivers.
Figure 1. Schematic of the RFEC tool considered in this article. The exciter coil generates an electromagnetic field which is expelled outwards from the pipe near the exciter coil—hence the direct field is quickly attenuated. At a remote distance along the axial direction, the remote field flows inwards to the pipe and is measured by an array of receivers.
Sensors 17 02276 g001
Figure 2. Flowchart of the framework used for the signal segmentation. In (a), the flowchart shows the processing done on the complete dataset; in (b) the flowchart shows the per-pipe analysis performed for each independent pipe sections.
Figure 2. Flowchart of the framework used for the signal segmentation. In (a), the flowchart shows the processing done on the complete dataset; in (b) the flowchart shows the per-pipe analysis performed for each independent pipe sections.
Sensors 17 02276 g002
Figure 3. While unwrapping the data, the sensor measurements located at the boundary regarding theta are duplicated on the other extremity of the data, to consider the cylindrical properties of the sensor measurement.
Figure 3. While unwrapping the data, the sensor measurements located at the boundary regarding theta are duplicated on the other extremity of the data, to consider the cylindrical properties of the sensor measurement.
Sensors 17 02276 g003
Figure 4. 3D visualization of a part of the artificial pipeline. The artificial pipe segments are linked to each other using the 3D model of a Bell and Spigot joint.
Figure 4. 3D visualization of a part of the artificial pipeline. The artificial pipe segments are linked to each other using the 3D model of a Bell and Spigot joint.
Sensors 17 02276 g004
Figure 5. (a) Commercial RFEC tool used for the field data collection in this work, courtesy of PICA Corporation, Edmonton, AB, Canada; (b) Pictures of an excavated pipe section with the Bell and Spigot joint visible on the left; (c) Digitalization of a 3D model of the pipe using a laser scanner. The 3D model is then transformed into a 2.5D thickness map.
Figure 5. (a) Commercial RFEC tool used for the field data collection in this work, courtesy of PICA Corporation, Edmonton, AB, Canada; (b) Pictures of an excavated pipe section with the Bell and Spigot joint visible on the left; (c) Digitalization of a 3D model of the pipe using a laser scanner. The 3D model is then transformed into a 2.5D thickness map.
Sensors 17 02276 g005
Figure 6. ROC curves of the B&S classification. In (a) the ROC curves show the performance of the classifiers for the artificial dataset and in (b) the ROC curves show the performance of the classifiers on the real dataset. Overall, for both dataset, the SVM classifier outperforms the other classifiers. In (a), the SVM and the random forest classifiers have the same performance.
Figure 6. ROC curves of the B&S classification. In (a) the ROC curves show the performance of the classifiers for the artificial dataset and in (b) the ROC curves show the performance of the classifiers on the real dataset. Overall, for both dataset, the SVM classifier outperforms the other classifiers. In (a), the SVM and the random forest classifiers have the same performance.
Sensors 17 02276 g006
Figure 7. Samples from the signal deconvolution applied to the artificial (left column) and real (right column) dataset. The pipe profile is shown in the first row, the associated RFEC signal is shown in the second row, and the applied signal deconvolution is shown in the last row. For both dataset, darker colors relate to lower thicknesses—the yellow stripes correspond to joints.
Figure 7. Samples from the signal deconvolution applied to the artificial (left column) and real (right column) dataset. The pipe profile is shown in the first row, the associated RFEC signal is shown in the second row, and the applied signal deconvolution is shown in the last row. For both dataset, darker colors relate to lower thicknesses—the yellow stripes correspond to joints.
Sensors 17 02276 g007
Figure 8. B&S classification. In (a), the geometry of the artificial pipe is shown with the B&S classification; In (b), the signal is shown with the B&S joint for this dataset.
Figure 8. B&S classification. In (a), the geometry of the artificial pipe is shown with the B&S classification; In (b), the signal is shown with the B&S joint for this dataset.
Sensors 17 02276 g008
Figure 9. ROC curves of defect classification in real dataset comparing the different classifiers. SVM with an RBF kernel outperforms the other classifiers.
Figure 9. ROC curves of defect classification in real dataset comparing the different classifiers. SVM with an RBF kernel outperforms the other classifiers.
Sensors 17 02276 g009
Figure 10. Relation between segmentation and classification evaluation. For a label L and a segmentation S, the true positives are defined as the intersection of the label and segmentation or t p = L S , the false positives consist of the segmentation absent in the label or f p = S \ L , the false negatives are the label absent in the segmentation or f p = L \ S , and the true negatives are the pixels absent in both the segmentation and label or t n = ω ( f p + t p + f n ) .
Figure 10. Relation between segmentation and classification evaluation. For a label L and a segmentation S, the true positives are defined as the intersection of the label and segmentation or t p = L S , the false positives consist of the segmentation absent in the label or f p = S \ L , the false negatives are the label absent in the segmentation or f p = L \ S , and the true negatives are the pixels absent in both the segmentation and label or t n = ω ( f p + t p + f n ) .
Sensors 17 02276 g010
Figure 11. Segmentation on artificial data. Results of the segmentation, with (ad) the ground truth and the manual segmentation; (eh) and (il) the processed sensor data with (eh) the region growing segmentation and (il) the active contour segmentation—darker colors relate to lower thicknesses.
Figure 11. Segmentation on artificial data. Results of the segmentation, with (ad) the ground truth and the manual segmentation; (eh) and (il) the processed sensor data with (eh) the region growing segmentation and (il) the active contour segmentation—darker colors relate to lower thicknesses.
Sensors 17 02276 g011
Figure 12. Segmentation on real data. Results of the segmentation, with (ad) the ground truth and the manual segmentation; (eh) and (il) the processed sensor data with (eh) the region growing segmentation and (il) the active contour segmentation—darker colors relate to lower thicknesses.
Figure 12. Segmentation on real data. Results of the segmentation, with (ad) the ground truth and the manual segmentation; (eh) and (il) the processed sensor data with (eh) the region growing segmentation and (il) the active contour segmentation—darker colors relate to lower thicknesses.
Sensors 17 02276 g012
Table 1. Confusion matrices are used to summarize the performance of a classification.
Table 1. Confusion matrices are used to summarize the performance of a classification.
Predicted Condition
truefalse
truetrue t p f n
conditionfalse f p t n
Table 2. Classifiers’ performances for the artificial dataset (ranked according to κ ).
Table 2. Classifiers’ performances for the artificial dataset (ranked according to κ ).
coefPrecisionRecallAccuracy κ
SVM1.001.001.001.00
Random Forest1.001.001.001.00
Naive Bayes0.690.780.960.71
Logistic Regression0.720.670.950.67
Table 3. Classifiers’ performances for the real dataset (ranked according to κ ). The threshold for SVM has been chosen in order to have a precision equal to 1. Hence, the other metrics are slightly biased.
Table 3. Classifiers’ performances for the real dataset (ranked according to κ ). The threshold for SVM has been chosen in order to have a precision equal to 1. Hence, the other metrics are slightly biased.
coefPrecisionRecallAccuracy κ
SVM1.000.210.970.34
Random Forest0.700.420.970.51
Naive Bayes0.060.860.490.04
Logistic Regression0.210.010.930.01
Table 4. Classifiers’ performances for defect detection in real dataset (ranked according to κ ).
Table 4. Classifiers’ performances for defect detection in real dataset (ranked according to κ ).
coefPrecisionRecallAccuracy κ
SVM0.960.830.900.84
Random Forest0.870.870.920.80
Logistic Regression0.840.890.900.79
Naive Bayes0.740.870.840.69
Table 5. Confusion Matrix for the SVM classification.
Table 5. Confusion Matrix for the SVM classification.
Predicted Condition
defectsoutliers
truedefects29859
conditionoutliers12693
Table 6. Comparison of the segmentation performance on the artificial dataset (ranked according to  F -score).
Table 6. Comparison of the segmentation performance on the artificial dataset (ranked according to  F -score).
coefPrecisionRecallAccuracyF-Score
Region Growing0.600.270.880.19
Active Contour0.770.690.990.66
Table 7. Comparison of the segmentation performance on the real dataset (ranked according to F -score).
Table 7. Comparison of the segmentation performance on the real dataset (ranked according to F -score).
coefPrecisionRecallAccuracyF-Score
Region Growing0.630.140.920.22
Active Contour0.530.480.930.48

Share and Cite

MDPI and ACS Style

Falque, R.; Vidal-Calleja, T.; Miro, J.V. Defect Detection and Segmentation Framework for Remote Field Eddy Current Sensor Data. Sensors 2017, 17, 2276. https://doi.org/10.3390/s17102276

AMA Style

Falque R, Vidal-Calleja T, Miro JV. Defect Detection and Segmentation Framework for Remote Field Eddy Current Sensor Data. Sensors. 2017; 17(10):2276. https://doi.org/10.3390/s17102276

Chicago/Turabian Style

Falque, Raphael, Teresa Vidal-Calleja, and Jaime Valls Miro. 2017. "Defect Detection and Segmentation Framework for Remote Field Eddy Current Sensor Data" Sensors 17, no. 10: 2276. https://doi.org/10.3390/s17102276

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop