Next Article in Journal
Measurement of Pulse Wave Signals and Blood Pressure by a Plastic Optical Fiber FBG Sensor
Previous Article in Journal
Correcting the Error in Measuring Radiation Received by a Person: Introducing Cylindrical Radiometers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Water Pipeline Leakage Detection Based on Machine Learning and Wireless Sensor Networks

1
College of Electronic Information Engineering, Inner Mongolia University, Hohhot 010021, China
2
Department of Electrical and Computer Engineering, University of Nebraska-Lincoln, Lincoln, NE 68588, USA
3
Tianjin Key Laboratory of Wireless Mobile Communications and Power Transmission, Tianjin Normal University, Tianjin 300387, China
*
Author to whom correspondence should be addressed.
Sensors 2019, 19(23), 5086; https://doi.org/10.3390/s19235086
Submission received: 23 October 2019 / Revised: 13 November 2019 / Accepted: 19 November 2019 / Published: 21 November 2019
(This article belongs to the Section Remote Sensors)

Abstract

:
The detection of water pipeline leakage is important to ensure that water supply networks can operate safely and conserve water resources. To address the lack of intelligent and the low efficiency of conventional leakage detection methods, this paper designs a leakage detection method based on machine learning and wireless sensor networks (WSNs). The system employs wireless sensors installed on pipelines to collect data and utilizes the 4G network to perform remote data transmission. A leakage triggered networking method is proposed to reduce the wireless sensor network’s energy consumption and prolong the system life cycle effectively. To enhance the precision and intelligence of leakage detection, we propose a leakage identification method that employs the intrinsic mode function, approximate entropy, and principal component analysis to construct a signal feature set and that uses a support vector machine (SVM) as a classifier to perform leakage detection. Simulation analysis and experimental results indicate that the proposed leakage identification method can effectively identify the water pipeline leakage and has lower energy consumption than the networking methods used in conventional wireless sensor networks.

1. Introduction

Water provides a material basis for human life and the survival of all living things, and it is an indispensable natural resource needed for the development of human society. Due to population growth, economic development, and changing consumption patterns, the demand for water resources is increasing rapidly, and this increasing demand is expected to accelerate greatly during the next 20 years [1]. However, the wastage of water resources caused by leakage from water pipelines is an important problem [2]. A study conducted by the World Bank indicated that the leakage from water pipeline exceeds 48.6 billion m 3 annually, and the corresponding annual economic losses are approximately US$14.6 billion [3]. According to the 2012 Green City Index statistics, water pipeline leakage rates exceed 10% in one third of countries worldwide. For example, the average water pipeline leakage rate is 23% in the EU, 13% in the U.S. and Canada, 22% in Asia, 35% in Latin America, and 30% in Africa [4,5]. Accordingly, research on high performance water pipeline leakage detection technologies has great significance for the protection of water resources and the promotion of economic development.
The main causes of water pipeline leakage include the corrosive nature of the soil, deficient pipe material quality, the temperature and pressure, failure to employ standard pipe laying methods, geological changes, and human damage [6,7,8]. For instance, deterioration caused by the pressure of the soil may lead to uneven pipeline stress bearing, which can result in leakage from ruptures and breakage. Leakage may also result from damage to pipe junctions caused by external impacts or ruptures caused by the failure to weld junctions during construction. Nevertheless, because the vast majority of water pipelines are located deep underground, leakage is typically not promptly discovered, and when the amount of leakage is large, it is usually not discovered until water begins flowing from the ground surface. Furthermore, since most leaks are relatively small or undetectable, leakage causes substantial waste of water resources [9,10]. Therefore, it is extremely important to detect leakage from underground water pipelines effectively and accurately.
Academic researchers and the industry have conducted major research campaigns and developed numerous effective detection methods. One of the earliest detection methods is the listening system in which detection personnel listen to changes in the volume and sound quality of leakage noise coming from equipment and locate areas of leakage based on these observations [11,12]. This method not only depends on the experience of the detection personnel, but is highly labor intensive and unreliable due to the large areas of water pipeline networks. Ground penetrating radar can determine the locations of pipeline leaks through the detection of soil voids caused by water leakage. However, because of the complex differences in the geological structure in different areas, this method has poor applicability and is very expensive [13,14]. Other studies have presented leakage detection inspired by the changes in the internal pressure of a water pipeline, such as the pressure gradient method, negative pressure wave method, and flow rate balance method [15,16,17]. Although these methods are relatively sensitive to a pipeline’s flow rate and pressure, they tend to give false positive results when the flow rate fluctuations are large because the flow rate in water pipeline networks will fluctuate continuously. It has been found that the spectrum of leakage signals is concentrated, and the pipeline vibration frequency is correlated with the leakage state [18]. This characteristic can be employed in conjunction with the spectral analysis of signals from piezoelectric accelerometers to perform leakage detection. However, when the environmental noise has a similar frequency spectrum to that of the leakage signals, this method also has a tendency to give false positives. Another study used the linear predictive coding coefficient (LPCC) of acoustic leakage signals and a hidden Markov model (HMM) to improve the ability to distinguish the leakage signal from interfering environmental signals [19]. However, the detection error of this method tends to increase with the length of time that the system is in use. Furthermore, in [20,21,22], some detection methods based on acoustic signals, such as through hydrophones, have proven that effectively leak detection can be achieved in a longer range of detection in water pipelines. These methods exhibit a high sensitivity to leaks in the range of interest, appearing appropriate for early leak detection. Additionally, the works in [23,24,25] have applied machine learning to pipeline monitoring and have achieved excellent results. Moreover, research on large scale water pipeline network systems has used methods such as real-time modeling to compare measured pipeline network data with flow rate model predictions [26,27,28,29], but problems such as high modeling difficulty and high computational loads in real applications limit the use of these methods. Researchers have achieved impressive results in research in the field of tap water pipeline leakage detection and location. However, the large scale of water pipeline networks and the extreme complexity of the network architectures, environmental conditions, and geological factors still pose significant challenges for the real-time monitoring of water supply pipeline networks and intelligent leakage detection.
Wireless sensor networks (WSNs) provide an efficient way to address these issues. Due to their outstanding sensing ability, communication protocols, processor speed, and data collection advantages, wireless sensor network technologies have been widely applied in the field of monitoring [30,31,32,33,34]. In [35], PipeNet, a system based on wireless sensor networks, was proposed. It aims to monitor water flow and detect leaks by attaching acoustic and vibration sensors to large bulk-water pipelines and pressure sensors to normal pipelines. In contrast to the PipeNet project, the PipeProbe system does not assume that water pipe surfaces are exposed and accessible for sensor module attachment [36]. PipeProbe can be dropped into the source of a water pipeline. During its traversal of the pipeline, it collect the sensor readings necessary for the reconstruction of the 3D spatial layout of the traversed water pipelines. To demonstrate the application and control of a low cost wireless sensor network for a high data rate, WaterWiSe@SG, a wireless sensor network to enable real-time monitoring of a water distribution network in Singapore, was proposed in [37]. The goal of WaterWiSe@SG was to develop generic wireless sensor network capabilities to enable real-time monitoring of a water distribution network.
This paper proposes a water pipeline monitoring system based on wireless sensor networks and a leakage identification method based on support vector machine (SVM). Machine learning can simulate the acquisition of knowledge through human learning activities and can enable the automatic improvement of system performance. As a result, it is widely applied in speech and biological affect identification [38], physiological signal detection [39], body movement identification [40], signal feature detection and identification, etc. [41,42,43,44]. The proposed system employs ZigBee nodes serving as signal collection nodes and uses the 4G network to transmit the signals adopted by the sensors to the data processing center for processing. To address the high networking power consumption that affects conventional wireless sensor networks, we also propose a leakage triggered networking method able to network and perform data transmission from wireless sensor nodes in the vicinity of leakage points, which effectively reduces the network energy consumption and extends its life cycle. Based on the differences in the time-frequency features of leakage and non-leakage signals, we propose a leakage detection method that constructs feature matrices by employing the intrinsic mode function, approximate entropy, and principal component analysis (PCA) and that uses SVM as a classifier to identify the leaks. Our experiment is performed along an exposed aluminum-plastic composite pipe, with a diameter of 27 mm. The CT1010 acceleration sensor is used in this experiment due to its sensitivity. During our experiments, the water pressure is no less than 0.3 MPa. The detectable leaking flow rate is calculated to be approximately 2.5 cm 3 /s based on the pipe pressure. Experimental and simulation results demonstrate that the proposed methods can effectively detect the leakage and prolong the lifetime of the wireless sensor network.
The rest of the paper is organized as follows. The implementation of the leakage monitoring system is introduced in Section 2. In Section 3, the leakage triggered networking solution for wireless sensor networks that are able to network sensors receiving leakage signals is developed. We propose a leakage detection method based on time-frequency features and SVM in Section 4. Experimental and simulations results are reported in Section 5. Conclusions are presented in Section 6.

2. Water Pipeline Leakage Monitoring System Based on ZigBee Technology

We designed a water pipeline monitoring system based on a ZigBee and 4G wireless communication system. It included a ZigBee wireless network, a gateway, and a data processing center. The system architecture is shown in Figure 1. The ZigBee wireless sensor was constructed from terminal nodes, coordinators, and routers. The terminal node employed an acoustic sensor to acquire signals from pipeline leakage, and the coordinator relied on serial ports and a gateway to establish a linkage and maintain the two-way transmission of data and control commands between the terminal nodes and the gateway. The gateway also took advantage of the 4G network to upload data collected by the sensors to the host for storage and processing.
In this system, the ZigBee nodes employed CC2530, and the Zstack protocol was used for data transmission. The system’s gateway employed STM32F103VET6 as its chief control element and used a built-in 4G module to perform networking functions. The gateway and ZigBee coordinator communicated via a serial port, which enabled the data processing center to monitor and control the ZigBee wireless sensor network. The gateway used its built-in multithreading TCP server to monitor requests from the host and transmit data after establishing a connection. The host’s functions included display of the remote pipeline monitoring system, interactive controls, and signal processing. The software on the host was developed using C# and SQL, and the TCP protocol and TCP server on the gateway established network connections and received control commands and data transmissions from the ZigBee wireless sensor network. The CC2530 has a nominal maximum operating distance of 75 m, and research has indicated that ZigBee nodes have a reliable operating range of 60 m in a line-of-sight (LOS) environment [45,46]. The data acquisition card used in this paper was NI’s MCC BTH-1208LS, which was used to save data to the host computer for analyzing signals. CT1010 acceleration sensor was used in this experiment due to its sensitivity, which was matched with data acquisition card. Figure 2 shows the results of testing the packet loss rate of the system’s terminal nodes in a non-line-of-sight (NLOS) environment as the interval between the nodes changes. To ensure the reliability of the system’s data transmissions, the intervals between the CC2530 nodes should be kept at approximately 30 m.

3. Leakage Triggered ZigBee Networking

In actual water pipeline monitoring environments, a large number of terminal sensors needs to be installed along pipelines. Since the pipeline leakage is a low probability event, all of the sensors working at the same time will result in a significant waste of energy. Furthermore, leakage in water supply pipelines occurs randomly, and pipeline systems must be monitored in real time. To reduce energy consumption and increase network lifetime, we propose a leakage triggered networking method.
The ZigBee networking method includes initialization networking and triggered networking. The topological structure of the network provides an important basis for ZigBee networking; in view of the structural characteristics and distribution of water supply pipelines, this paper employed a network topology. To achieve initialization networking, the first step was to determine the coordinator nodes and set their signal channels and network ID numbers, which would initialize the network. Non-coordinator nodes were then added to the network. Figure 3 mainly interprets how the nodes join the network. To ensure that the number of terminal nodes installed at each relay node (i.e., router node) was balanced, it would add received signal strength indicator (RSSI) information to each Beacon_request frame when each terminal node in this solution sends a network join request. In accordance with the RSSI values, routing nodes provided joining service to the terminal nodes. To collect leakage signals effectively and reliably, it is necessary to set reasonable threshold values for the RSSI. If the RSSI values of the terminal nodes are smaller than the threshold, the routing nodes will not process the request of terminal nodes. If the RSSI values are greater than the threshold, the routing nodes will record the terminal nodes’ information and ensure that they can join the network.
After the network was initialized, to reduce the network power consumption and prolong the network lifetime, this paper designed three types of control frames (i.e., join frame, active frame, and wave frame), which can be used to trigger the network according to the leakage detection results. The structures of the join frame, active frame, and wave frame are shown in Table 1, Table 2 and Table 3. The Sou_address field is the original address, which is the routing node address. The nodes rely on this field to determine whether they have been activated and are working. The Des_address field is the destination address and constitutes the address of a routing node that has joined the network. The PANID is the network address. In the join frames, the join_result field is the result of networking; a result of zero indicates that the networking of a routing node has failed, and a result of one indicates that it has been successful. In the active frame, the Act_address field is the active address, and child nodes will join the network after receiving this information and then perform data sampling. In the wave frames, the Position field records the actual physical address information. Because this paper mainly considered the networking solution and its performance, the Position field was not used for node location.
Figure 4 shows the leakage triggered networking flowchart. The terminal nodes send Join frames to the routing nodes to compile a list of terminal nodes. After the routing-terminal relationship has been constructed, the routing nodes will send Active frames to the terminal nodes. When receiving Active frames, the terminal nodes will then determine whether they are the destination nodes. If a node is a destination node, it will activate itself and perform data sampling. If a node is not a destination node, it will enter a sleep monitoring state and wait for the next Active frame. Once a node in the working state determines that a signal it has received is a leakage signal, the routing node will send the preset leakage triggered address to the nodes on the terminal nodes list. All of the nodes on the list receiving that address will activate themselves and initiate signal sampling and transmission. This method enables routing nodes to control the working status of the terminal nodes. After the networking is completed, data transmission is performed using the ZigBee routing protocol.

4. Leakage Detection by Using Machine Learning and Time-Frequency Features

4.1. Time-Frequency Analysis of the Acoustic Leakage Signal

4.1.1. Spectrum Density Feature

Many studies have indicated that the components of the spectra of leakage signals are chiefly concentrated within specific bands. As a result, the differences between signal spectra can be employed as pipeline leakage identification characteristics. To extract the differences of the signal spectral density, we used empirical mode decomposition (EMD) to perform a time-frequency analysis of pipeline signals and proposed a frequency domain feature for detection.
EMD can selectively decompose the signal as the sum of a finite number of intrinsic mode functions (IMFs) [47], enabling multiple IMFs to be used in the multiscale analysis of the spectrum density of leakage signals. An analytic function z ( t ) can be expressed as:
z ( t ) = x ( t ) + j x ^ ( t ) = a ( t ) e j Φ ( t ) ,
where x ^ ( t ) is the Hilbert transform of a signal x ( t ) and Φ ( t ) is given by:
Φ ( t ) = arctan x ^ ( t ) x ( t ) .
Finding the derivative of the phase function with respect to time enables the signal analysis instantaneous frequency function to be determined as:
f ( t ) = 1 2 π d Φ ( t ) d t .
The definition of the instantaneous frequency shows that although the instantaneous frequency may take the form of a meaningless negative frequency under certain situations, if the instantaneous frequency is positive throughout a certain period of time, then the x ( t ) can be termed the IMF. Accordingly, an IMF must satisfy the following two conditions:
(1)
The number of extreme points is N e (including the minimum and maximum values), which is the same as or no more than one from the number of zero crossing points N s ,
( N s 1 ) N e ( N s + 1 ) .
(2)
At an arbitrary time t i within the time period, the mean of the upper envelope determined by the local maximum and the lower envelope determined by the local minimum is zero,
[ x m a x ( t ) + x m i n ( t ) ] / 2 = 0 , t i [ t a , t b ] .
Generally, a signal can include multiple IMFs. The EMD method can be used to extract the IMFs from a signal. To derive the spectrum density features of a leakage signal, we used the EMD method to process the signal, which will yield the IMFs of that signal. All the extreme points of the original signal x ( t ) are connected with a cubic spline curve, yielding the upper and lower envelopes of x ( t ) , which causes the signal to be contained between the two envelopes. We assumed that the function formed by means of the two envelopes is m ( t ) . Subtracting m ( t ) from the original signal x ( t ) ,
h 1 ( t ) = x ( t ) m ( t ) .
We now check whether h 1 ( t ) satisfies the two conditions of the IMF. If it does not satisfy them, repeat (6) until the IMF conditions are satisfied. h 1 ( t ) at this time is expressed as c 1 ( t ) , where c 1 ( t ) is the first IMF of the signal x ( t ) ,
c 1 ( t ) = h 1 ( t ) .
Next, c 1 ( t ) is subtracted from the original signal x ( t ) to obtain the new signal r 1 ( t ) ,
r 1 ( t ) = x ( t ) c 1 ( t ) .
Repeating (6) until the IMF conditions are satisfied, the first IMF of r 1 ( t ) is obtained, which is the second IMF of x ( t ) and is denoted as c 2 ( t ) . Continuing in the same manner, we can progressively derive the m th IMF c m ( t ) of the signal x ( t ) and the remainder r m ( t ) .
Using the foregoing steps, the original signal x ( t ) can be decomposed into the sum of IMFs and a remainder,
x ( t ) = i = 1 m c i ( t ) + r m ( t ) .
In general, the IMF condition (2) is difficult to satisfy; thus, a stopping criterion is generally established. When the stopping criterion has been satisfied, Condition (2) can be considered to have been met. For this reason, we set the standard deviation between two consecutive processing results as S d ,
S d = n = 0 N 1 h k 1 ( n ) h k ( n ) 2 h k 2 ( n ) ,
where N is the observed signal length and h k 1 ( n ) and h k ( n ) are two consecutive processing results in the process of the IMF derivative. When the standard deviation S d reaches the preset threshold value, we can assume that Condition (2) has been satisfied. It has been indicated in [47] that the threshold value of the standard deviation S d is typically taken as 0.2–0.3.
After the IMFs of a signal have been obtained, we can further obtain the discrete Fourier transform C i ( k ) of the IMF components c i ( n ) resulting from EMD decomposition,
C i ( k ) = n = 0 N 1 c i ( n ) e j 2 π N k n .
Deriving the modulus square of C i ( k ) yields the IMF power spectrum of the signal,
P i ( k ) = 1 N C i ( k ) 2 .
We then obtain the mean of Equation (12),
P ¯ i = k = 0 N 1 C i ( k ) 2 N 2 .
This paper uses the mean value of the IMF power spectrum as the frequency domain feature of the leakage signal.
Figure 5 shows the power spectra of the signals from a pipeline with and without leakage. The results indicate that the frequencies of the acoustic signals leakage were chiefly concentrated near 1.6 kHz, which is consistent with previous research [48]. Figure 6 is the spectra of the first four groups of IMF components obtained by EMD of the pipeline leakage signal and the pipeline non-leakage signal. In this experiment, the threshold value of the standard S d was set as 0.3. Comparing the IMF of each layer of the leakage signal and the non-leakage signal, it can be seen that the main spectrum of the signal was in the first layer IMF. The spectrum of the leakage signal mainly distributed between 1000 Hz and 2000 Hz. The non-leakage signal spectrum was more random and mostly distributed over the entire band.

4.1.2. Signal Complexity Feature

Because pipeline leakage is a localized and low probability event, there should be differences in the time domain composition of leakage signals and non-leakage signals, and the composition of leakage signals should be more complex. Accordingly, the differences of signal composition in time domain can be used to identify leakage signal. The approximate entropy (ApEn) is the conditional probability when similarity is maintained after the dimensions of a similarity vector are increased from m to m + 1 and is the probability of the new mode when the number of dimensions changes [49]. The greater the probability of the new mode is, the more complex the signal and the greater the corresponding ApEn. Therefore, we used the average ApEn as a time domain feature to quantify signal complexity.
For a sequence u ( 1 ) , u ( 2 ) , ⋯, u ( N ) , two sequences with length m can be used to construct as x ( i ) = [ u ( i ) , u ( i + 1 ) , , u ( i + m 1 ) ] and x ( j ) = [ u ( j ) , u ( j + 1 ) , , u ( j + m 1 ) ] , where i , j N M + 1 . We then calculate the distance between x ( i ) and x ( j ) ,
d [ x ( i ) , x ( j ) ] = max k = 1 , 2 , , m [ u ( i + m 1 ) u ( j + k 1 ) ] .
Assuming a threshold value r, we determine the number of d [ x ( i ) , x ( j ) ] r (which is set as L) for every i < N m + 1 and calculate the ratio of L and the number of vectors,
C i m ( r ) = L N m + 1 .
For all i values, we derive the mean ϕ m ( r ) of ln C i m ( r ) ,
ϕ m ( r ) = i = 1 N m + 1 ln C i m ( r ) N m + 1 .
Increasing m by one, we repeat Steps (14)–(16) to obtain ϕ m + 1 ( r ) , and in accordance with ϕ m + 1 ( r ) and ϕ m ( r ) , we can obtain the ApEn value as:
ApEn ( m , r ) = ϕ m ( r ) ϕ m + 1 ( r ) .
The results showed that the ApEn was a dimensionless scalar quantity, and its value was related to m and r. To ensure that the ApEn had reasonable statistical characteristics, based on experience, m = 2 is usually employed, and r was set as 0.1–0.3-times the standard deviation (SD) of the sequence [49]. Figure 7 shows the ApEn of signals before and after leakage for different threshold values. In the experiment, 50 datasets were obtained in each of the two situations, the length of each dataset being 5000, with r = 0.3 S D , r = 0.2 S D , r = 0.1 S D , respectively. The results in Figure 7 show that when r = 0.2 S D , seven leakage signals were discriminated as normal signals and 10 normal signals were discriminated as leakage signals, with an accuracy of 83%; while in the other two cases, the accuracies were 81% and 80%, respectively. Therefore, it was appropriate to set the threshold value as r = 0.2 S D . The above analysis indicates that the complexity of the leakage signal should be higher than that of the non-leakage signal, and the complexity can therefore be used to identify leakage.

4.1.3. Signal Principal Component Feature

PCA is a classical feature extraction method that involves the reduction of dimensionality and converts variables into a smaller number of aggregate variables (the principal components). Each principal component is a linear combination of the original variables, and the individual principal components are not mutually correlated. The principal components can convey a vast majority of the information contained in the original variables, and this information is not mutually overlapping. In this paper, we used PCA to analyze the differences between pipeline leakage signals and non-leakage signals.
Assuming that n samples are obtained each time from pipeline signals, this can be expressed as x i = ( x 1 i , x 2 i , , x n i ) T . If we have m sets of data x 1 , x 2 , ⋯, x m , we can construct an n × m matrix X = [ x 1 x 2 x m ] as:
X = x 11 x 12 x 1 m x 21 x 22 x 2 m x n 1 x n 2 x n m .
We used the signal principal components to construct a n × l ( 0 < l m ) component signal matrix Y = [ y 1 y 2 y l ] , and then constructed a matrix G based on the internal product g j i = [ y j , x i ] of the principal component signal matrix and original signal matrix,
G = Y T ( X E [ X ] ) .
We further chose g j = [ g j 1 g j 2 g j m ] , 0 < j l as the feature for the identification of leakage.

4.2. Machine Learning Inspired Water Pipeline Leakage Detection

Although the features in Section 4.1 have different characteristics in connection with the identification of pipeline leakage, the use of a single feature for identification is inefficient. For example, if the spectra of leakage and non-leakage signals are significantly different, the mean spectra of the IMFs will have excellent identification ability. However, when there is interference in the same band, this method tends to yield many false results. In addition, when the leakage from a pipeline is relatively small, the mean ApEn will have a poor ability to differentiate between leakage and non-leakage signals.
To increase the accuracy of leakage detection, this paper took advantage of the time-frequency features to construct identification feature sets and used SVM to classify the signal features and thereby determine pipeline leakage. The SVM is an advantageous means of solving small sample problems, nonlinear problems, and problems involving high-dimensional data, e.g., data forecasting, data fitting, and model identification. Assume that ( x i , y i ) constitutes a training set data sample, where 1 i N , x i R d for each sample, d is the dimensionality of the input space, and y i 1 , 1 is the classification label. The training set can be linearly delimited by a hyper-plane that can be expressed as w · x + b = 0 , where w and b are locations that determine the hyper plane. A sample satisfying the following conditions is termed a support vector:
y i ( w · x i + b ) = 1 .
In fact, the optimal classification of a sample is the solution for the optimal classification hyper plane,
m i n ϕ ( w , ξ ) = 1 2 w 2 + c i = 1 N ξ i s . t . y i ( w · x i + b ) 1 ξ i ,
where w is the coefficient vector of the classification hyper-plane in the feature space, b is the threshold value of the classification plane, ξ i ( ξ i 0 ) is a relaxation factor included to account for the classification error, and C is a penalty factor for the misclassified sample. The optimal classification hyper-plane obtained can be expressed as:
w o · x + b o = 0 .
In nonlinear separable situations, a projection function (termed the kernel function) is used to project an input space R d with low dimensionality into a feature space H with high dimensionality, which converts the training sample from a linear inseparable problem with low dimensionality into a higher dimensional linear separable problem. At this time, the optimized dual problem is:
max α i = 1 N α i 1 2 i = 1 N α i α j y i y j K ( x i , x j ) s . t . i = 1 N y i α i = 0 , 0 α i C ,
where K ( x i , x j ) = Φ ( x i ) · Φ ( x j ) is the kernel function. Equation (23) shows that an SVM model with a suitable kernel function K ( · ) must be chosen in the case of a nonlinear separable problem. The decision function corresponding to the use of Equation (23) is:
f ( x ) = s g n [ i = 1 N α i y i K ( x i , x ) + b ] .
To improve the accuracy of leakage detection, we must use the training sample and testing sample to optimize the SVM, and the optimization processes are shown in Figure 8. Due to the effects of environmental factors on underground water pipelines, it is necessary to perform signal sampling during different times and at different places to compile sample sets including leakage signals and non-leakage signals. At first, the feature set of the training sample is used to perform SVM training, which creates a preliminary identification model. The feature set of the testing sample is then used to test the trained SVM model. The SVM model is optimized further based on testing results until the accuracy of the test output meets the requirements, which results in an SVM pipeline leakage identification model.
The theoretical analysis underlying Equations (23) and (24) indicates that the main factors that affect the SVM model’s performance include the kernel function and the penalty factor C. According to the characteristics and ability of the SVM, we took the radial basis kernel as the kernel function in this paper [50,51,52]. The radial basis kernel function is expressed as:
K ( x i , x j ) = exp ( γ x i x j 2 ) .
In this case, the SVM model’s performance is determined by the parameters C and γ . To achieve accurate identification results, the optimization process shown in Figure 8 must use the training sample and testing sample to optimize ( C , γ ) . Research has shown that the exponential sequences obtained using C and γ can achieve good results. In this paper, we obtained the following parameter values based on the parameter value range: C = 2 x ( x [ 5 , 15 ] ) and γ = 2 y ( y [ 15 , 5 ] ) [53,54]. Based on the cross-validation grid-search method, we then optimized the SVM parameters. We used the training sample and testing sample to perform testing of an SVM model with different 2 x and 2 y combinations and thus obtained the testing accuracy. The final step was to select the C and γ values that yielded the optimal cross-validation accuracy, which were selected for identification.

5. Simulation Results

5.1. Leakage Triggered Networking

In this section, OPNET Modeler14.5 was used to simulate the proposed leakage triggered networking method. The simulation process requires the design and configuration of three different layers. The node layer defines the node behavior and controls the data flow between the different modules in one node. The process layer uses the protocol to perform state conversion for the state machines. The network layer establishes the network topological structure and network layers.
Generally, a ZigBee node model includes an application layer, network layer, MAC layer, and a wireless transceiver. To compile the network power consumption, we added an energy calculation module to the node model. The energy calculation module kept track of the transceiver’s standby, receiving, and transmitting energy consumption via monitoring of the transceiver status. Since the code for the application layer module and network layer module in OPNET was not available, we redesigned the application layer and network layer modules. During the simulation, the coordinator nodes, routing nodes, and terminal nodes had the same node model. The application layer included the source module and sink module. The source module employed the simple_source model, which was a data packet generation module and was responsible for generating data packets with the specified packet size in accordance with the specified packet interval. The sink module was a data packet destruction module and was responsible for destroying data packets that had been transmitted to the destination node, which released internal storage dynamically assigned by the program. The network layer consisted of the network_layer module and mainly served to drive the completion of networking procedures by the MAC module, complete initialization networking and leakage triggered networking, and perform data packet routing in accordance with the AODVjrrouting protocol. The MAC layer employed an 802_15_4_mac module and had a CSMA/CA competitive algorithm. The 802_15_4_mac module performed some networking, multiple access, and sleep management functions via an added sleep state machine. The physical layer employed a wireless_tx/wireless_rx module as a wireless transceiver.
The water supply pipeline network shown in Figure 9 was designed for the simulation. The area was 1500 m × 1500 m and contained a total of 644 ZigBee nodes, which included six coordinator nodes and 638 routing and terminal nodes. The coordinator nodes were considered as sink nodes. The distance between adjacent nodes was 10 m; the distance between routing nodes was 50 m; and four terminal nodes were located between each pair of routing nodes. Each of the routing and terminal nodes was also a sensor. The terminal nodes completed the data collection and the detection of the water leakage signal and sent the data to the routing nodes. Then, the routing nodes transmitted the information collected by themselves and the terminal nodes to the sink nodes through multi-hop routing. Finally, the sink nodes sent the information to the background control center to realize the monitoring of the entire network. An RxGroup Configmo module was used to configure the nodes’ single-hop link distance in the simulation scenario, and channel fading employed a free space loss model. The simulation parameters for each layer are shown in Table 4.
The simulation time was 1200 s. First, leakage signal information functions were established in the MAC layer, and a leakage triggered networking experiment was performed via the establishment of leakage point coordinates, signal attenuation coefficients, and the leakage signal detection threshold using the functions. The leakage coordinate was (319, 753), which indicated that the leakage point was located between Nodes 10 and 11, as shown in Figure 10. In the simulation, Node 3 was a coordinator node, Nodes 8, 13, and 18 were routing nodes, and the remaining nodes were terminal nodes. According to the simulation settings, leakage occurred at 700–720 s, and the signal attenuation coefficient and leakage signal detection threshold settings ensured that Routing Nodes 8 and 13 could receive the leakage signal. We also monitored the active and sleep status of the MAC layer to track the nodes’ networking status.
Figure 11 shows the working statuses during the 0–1200 s period. The coordinator and routing nodes were consistently in the working state, and the terminal nodes within the routing node network were sequentially working and sleeping. Leakage occurred when the simulation time reached 700 s, and all of the terminal nodes within the network formed by Routing Nodes 8 and 13 entered the working state at that time. Leakage ceased when the simulation time reached 720 s, and the terminal nodes within the network formed by Routing Nodes 8 and 13 resumed the normal working status. The routing nodes on both sides of the leakage point could detect the leakage signal and performed networking when the leakage occurred, whereas the other routing nodes remained in a normal working state. Simulation results indicated that the proposed solution achieved leakage triggered networking by the sensor nodes on both sides of a leakage point, which could further provide data to determine the location of the leakage point.
Figure 12 shows a comparison of the networking time between the proposed networking solution and the ZigBee 2007 networking solution. The simulation results indicated that the networking time of the proposed solution was slightly greater than that of the ZigBee 2007 solution because of the addition of the RSSI threshold value. However, the networking time of all the nodes increased only by approximately 1.39%. Therefore, the proposed solution could be used in a large scale networking environment.
Figure 13 shows a comparison of the power and energy consumptions of the proposed solution and the ZigBee 2007 solution. Simulation results clearly demonstrated that the proposed solution could reduce the network power and energy consumption and increase the network lifetime through controlling of the polling work of the terminal nodes within their networks.
Figure 14 shows the percentage of terminal nodes carried by all the routing nodes when the transmission power of the sensor nodes was 1 mW and the RSSI threshold was −68 dBm. In accordance with the channel loss model, the signal transmission distance controlled by the threshold value was approximately 25 m. Because the nodes were spaced at intervals of 10 m in the simulation, four terminal nodes were carried by each routing node. The results shown in Figure 14 indicate that the proposed solution can ensure the number of terminal nodes carried by the routing nodes was more uniform than that in the original solution and could thereby ensure more stable network coverage.

5.2. Leakage Identification

The experiment was performed along an exposed aluminum-plastic composite pipe, with a diameter of 27 mm. Moreover, the water-tap was used as the leakage sound source, then the flow rate was adjusted, and the sensor was placed at a distance of 20 cm away from the water-tap. One hundred datasets of leakage signals and non-leakage signals were sampled respectively. Each dataset had a length of 5000, and the data were used to train and optimize the SVM model. In addition, 100 datasets of leakage and non-leakage signals were sampled during the early quiet morning hours, respectively. Therefore, the simulated noise was employed to verify the effectiveness of the proposed leakage detection.
At first, 50 datasets were extracted from each of the leakage and non-leakage signals and used to create a training set. The remaining samples were then used to create a testing set. The SVM parameters ( C , γ ) were set to an integer power of two; the range of C was set as C [ 2 5 , 2 15 ] ; and the range of γ was set as γ [ 2 15 , 2 5 ] . The grid-search method was used, and 21 × 21 = 441 for ( C , γ ) parameter combinations were used to perform the model training. The detection accuracy is shown in Figure 15. The results indicated that the highest identification accuracy achieved by the proposed algorithm was 98%. In addition, when C 2 2 , γ 2 0 , and 2 1 C × γ 2 7 , the SVM model based on the radial basis kernel provided good pipeline leakage signal identification performance.
To verify the effectiveness of the proposed leakage detection, the experiment was performed in which 100 datasets of leakage signals and non-leakage signals were sampled, respectively. Figure 16 shows the detection results for ( C , γ ) = ( 2 9 , 2 4 ) parameter combinations, where the leakage label was 2, and the non-leakage label was 1. The identification results showed that the proposed method only determined two leakage signals to be non-leakage signals and made accurate determinations in all other cases, indicating that the classification accuracy achieved by the proposed algorithm was 98%. Table 5 shows the results obtained by using the proposed algorithm to perform leakage identification after artificial Gaussian noise and impulsive noise were added to leakage signals obtained during a quiet period of time. The results indicated that the proposed water supply pipeline leakage detection method based on the time-frequency features of the signal and SVM could effectively detect pipeline leakage.

6. Conclusions

In this paper, an experimental water pipeline leakage detection system based on machine learning and wireless sensors networks was presented. The system employed ZigBee and 4G to acquire and transmitted signals. In addition, a leakage triggered networking method was further proposed to reduce the WSN energy consumption effectively and prolong the system life. To improve the accuracy of water pipeline leakage detection, the proposed system made better use of EMD, ApEn, and PCA of the leak signal and SVM to identify the leakage signal intelligently. Simulation analysis and experimental results indicated that the proposed leakage identification method could effectively identify the water pipeline leakage.

Author Contributions

The algorithms proposed in this paper were conceived by Y.L. (Yang Liu), X.M., Y.L. (Yuting Li), and Y.T. Y.L. (Yang Liu), Y.T., J.G., and Y.Z. designed the experiments. X.M., Y.L. (Yuting Li), Y.Z., and J.G. performed the experiments and analyzed the results. Y.L. (Yang Liu), Y.T., and X.M. wrote the paper.

Funding

The authors would like to acknowledge the National Natural Science Foundation of China for its support of this research. This work was supported by the National Science Foundation of China under Grant 61761033 and 61461036, in part by the Natural Science Foundation of Neimongol Autonomous Region of China under Grant 2019MS06033, and in part by the High College Research Project of Neimongol Autonomous Region of China under Grant NJYT-20-A11.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
WSNsWireless sensor networks
SVMSupport vector machine
LPCCLinear predictive coding coefficient
HMMHidden Markov model
PCA Principal component analysis
LOSLine-of-sight
NLOSNon-line-of-sight
RSSIReceived signal strength indicator
EMDEmpirical mode decomposition
IMFsIntrinsic mode functions
ApEnApproximate entropy
SDStandard deviation

References

  1. Tindall, J.A.; Campbell, A.A. Water security-national and global issues. Sex. Relatsh. Ther. 2010, 30, 314–324. [Google Scholar]
  2. Lang, X.; Li, P.; Hu, Z.; Ren, H.; Li, Y. Leak detection and location of pipelines based on LMD and least squares twin support vector machine. IEEE Access 2017, 5, 8659–8668. [Google Scholar] [CrossRef]
  3. Cataldo, A.; Cannazza, G.; Benedetto, E.D.; Giaquinto, N. A new method for detecting leaks in underground water pipelines. IEEE Sens. J. 2012, 12, 1660–1667. [Google Scholar] [CrossRef]
  4. Fang, D.; Chen, B. Ecological network analysis for a virtual water network. Environ. Sci. Technol. 2015, 49, 6722–6730. [Google Scholar] [CrossRef] [PubMed]
  5. Moore, N.M. The Green City: Sustainable homes, sustainable suburbs. Nicholas Low, Brendan Gleeson, Ray Green, and Darko Radović. Urban Geogr. 2009, 30, 927–928. [Google Scholar] [CrossRef]
  6. Martini, A.; Troncossi, M.; Rivola, A. Automatic leak detection in buried plastic pipes of water supply networks by means of vibration measurements. Shock Vibrat 2015, 2015, 1–13. [Google Scholar] [CrossRef]
  7. Kim, H.; Shin, E.S.; Chung, W.J. Energy demand and supply, energy policies, and energy security in the Republic of Korea. Energy Policy 2011, 39, 6882–6897. [Google Scholar] [CrossRef]
  8. Puust, R.; Kapelan, Z.; Savic, D.A.; Koppel, T. A review of methods for leakage management in pipe networks. Urban Water J. 2010, 7, 25–45. [Google Scholar] [CrossRef]
  9. Wang, F.; Lin, W.; Liu, Z.; Wu, S.; Qiu, X. Pipeline leak detection by using time-domain statistical features. IEEE Sens. J. 2017, 17, 6431–6442. [Google Scholar] [CrossRef]
  10. Lay-Ekuakille, A.; Vergallo, P. Decimated signal diagonalization method for improved spectral leak detection in pipelines. IEEE Sens. J. 2014, 14, 1741–1748. [Google Scholar] [CrossRef]
  11. Thompson, M.; Chapman, C.J.; Howison, S.D.; Ockendon, J.R. Noise generation by water pipe leaks. In Proceedings of the 40th European Study Group with Industry, Keele, UK, 9–12 April 2001; pp. 1–4. [Google Scholar]
  12. Yang, J.; Wen, Y.; Li, P. Leak acoustic detection in water distribution pipelines. In Proceedings of the 7th World Congress on Intelligent Control and Automation, Chongqing, China, 25–27 June 2008; pp. 3057–3061. [Google Scholar]
  13. Goulet, J.A.; Coutu, S.; Smith, I.F.C. Model falsification diagnosis and sensor placement for leak detection in pressurized pipe networks. Adv. Eng. Inform. 2013, 27, 261–269. [Google Scholar] [CrossRef]
  14. Cabrera, D.A.; Herrera, M.; Izquierdo, J.; Levario, S.J.O.; Garcia, R.P. GPR-based water leak models in water distribution systems. Sensors 2013, 13, 15912–15936. [Google Scholar] [CrossRef]
  15. Benkherouf, A.; Allidina, A.Y. Leak detection and location in gas pipelines. IEE Proc. D Control. Theory Appl. 1988, 135, 142–148. [Google Scholar] [CrossRef]
  16. Chen, H.; Ye, H.; Chen, L.V.; Su, H. Application of support vector machine learning to leak detection and location in pipelines. In Proceedings of the 21st IEEE Instrumentation and Measurement Technology, Como, Italy, 18–20 May 2004; pp. 2273–2277. [Google Scholar]
  17. Ellul, I.R. Advances in pipeline leak detection techniques. Pipes Pipelines Int. 1989, 34, 7–12. [Google Scholar]
  18. Wan, Q.; Koch, D.B.; Morris, K. Multichannel spectral analysis for tube leak detection. In Proceedings of the Southeastcon’93, Charlotte, NC, USA, 4–7 April 1993. [Google Scholar]
  19. Ai, C.S.; Zhao, H.; Ma, R.J.; Dong, X. Pipeline damage and leak detection based on sound spectrum LPCC and HMM. In Proceedings of the Sixth International Conference on Intelligent System Design and Applications, Jinan, China, 16–18 October 2006; pp. 829–833. [Google Scholar]
  20. Martini, A.; Rivola, A.; Troncossi, M. Autocorrelation analysis of vibro-acoustic signals measured in a test field for water leak detection. Appl. Sci. 2018, 8, 2450. [Google Scholar] [CrossRef]
  21. Hunaidi, O.; Chu, W.T. Acoustical characteristics of leak signals in plastic water distribution pipes. Appl. Acoust. 1999, 58, 235–254. [Google Scholar] [CrossRef]
  22. Martini, A.; Troncossi, M.; Rivola, A. Vibroacoustic measurements for detecting water leaks in buried small-diameter plastic pipes. J. Pipeline Syst. Eng. Pract. 2017, 8, 1–10. [Google Scholar] [CrossRef]
  23. Kang, J.; Park, Y.; Lee, J.; Wang, S.; Eom, D. Novel leakage detection by ensemble CNN-SVM and graph-based localization in water distribution systems. IEEE Trans. Ind. Electron. 2018, 65, 4279–4289. [Google Scholar] [CrossRef]
  24. Chraim, F.; Erol, Y.B.; Pister, K. Wireless gas leak detection and localization. IEEE Trans. Ind. Inform. 2016, 12, 768–779. [Google Scholar] [CrossRef]
  25. Yoon, S.; Ye, W.; Heidemann, J.; Littlefield, B.; Shahabi, C. SWATS: Wireless sensor networks for steamflood and waterflood pipeline monitoring. IEEE Netw. 2011, 25, 50–56. [Google Scholar] [CrossRef]
  26. Jing, L.; Li, Z.; Li, Y.; Murch, R. Channel characterization of acoustic waveguides consisting of straight gas and water pipelines. IEEE Access 2018, 6, 6807–6819. [Google Scholar] [CrossRef]
  27. Poulakis, Z.; Valougeorgis, D.; Papadimitriou, C. Leakage detection in water pipe networks using a Bayesian probabilistic framework. Probabilistic Eng. Mech. 2003, 18, 315–327. [Google Scholar] [CrossRef]
  28. Ferrante, M.; Brunone, B.; Rossetti, A.G. Harmonic analysis of pressure signal during transients for leak detection in pressurized pipes. In Proceedings of the 4th International Conference on Water Pipeline Systems, York, UK, 28–30 March 2001; pp. 28–30. [Google Scholar]
  29. Wang, X.J.; Lambert, M.F.; Simpson, A.R.; Liggett, J.A.; Vítkovský, J.P. Leak detection in pipelines using the damping of fluid transients. J. Hydraulic Eng. 2002, 128, 697–711. [Google Scholar] [CrossRef]
  30. Almazyad, A.S. A proposed scalable design and simulation of wireless sensor network-based long-distance water pipeline leakage monitoring system. Sensors 2014, 14, 3557–3577. [Google Scholar] [CrossRef]
  31. Ali, S. SimpliMote: A wireless sensor network monitoring platform for oil and gas pipelines. IEEE Syst. J. 2018, 12, 778–789. [Google Scholar] [CrossRef]
  32. Hodge, V.J.; O’Keefe, S.; Weeks, M.; Moulds, A. Wireless sensor networks for condition monitoring in the railway industry: A survey. IEEE Trans. Intell. Transp. Syst. 2015, 16, 1088–1106. [Google Scholar] [CrossRef]
  33. Miao, Y.; Li, W.; Tian, D.; Hossain, M.S.; Alhamid, M.F. Narrowband internet of things: Simulation and modelling. IEEE Internet Things J. 2018, 5, 2304–2314. [Google Scholar] [CrossRef]
  34. Zhang, T.; Fan, H.; Loo, J.; Liu, D. User preference aware caching deployment for device-to-device caching networks. IEEE Syst. J. 2019, 13, 226–237. [Google Scholar] [CrossRef]
  35. Stoianov, I.; Nachman, L.; Madden, S.; Tokmouline, T. PIPENET: A wireless sensor network for pipeline monitoring. In Proceedings of the 6th international conference on Information processing in sensor networks, Cambridge, MA, USA, 25–27 April 2007; pp. 264–273. [Google Scholar]
  36. Chang, Y.C.; Lai, T.T.; Chu, H.H.; Huang, P. Pipeprobe: Mapping spatial layout of indoor water pipelines. In Proceedings of the 2009 Tenth International Conference on Mobile Data Management: Systems, Services and Middleware, Taipei, Taiwan, 18–20 May 2009; pp. 391–392. [Google Scholar]
  37. Whittle, A.J.; Girod, L.; Preis, A.; Allen, M.; Lim, H.B.; Iqbal, M.; Goldsmith, D. WATERWISE@SG: A testbed for continuous monitoring of the water distribution system in Singapore. In Proceedings of the 12th Annual Conference on Water Distribution Systems Analysis (WDSA), Tucson, AZ, USA, 12–15 September 2010; pp. 1362–1378. [Google Scholar]
  38. Jang, E.H.; Park, B.J.; Kim, S.H.; Chung, M.A.; Park, M.S.; Sohn, J.H. Emotion classification based on bio-signals emotion recognition using machine learning algorithms. In Proceedings of the 2014 International Conference on Information Science, Electronics and Electrical Engineering, Sapporo, Japan, 26–28 April 2014; pp. 1373–1376. [Google Scholar]
  39. Siryani, J.; Tanju, B.; Eveleigh, T.J. A machine learning decision support system improves the internet of things’ smart meter operations. IEEE Internet Things J. 2017, 4, 1056–1066. [Google Scholar] [CrossRef]
  40. Pławiak, P.; Sośnicki, T.; Niedźwiecki, M.; Tabor, Z.; Rzecki, K. Hand body language gesture recognition based on signals from specialized glove and machine learning algorithms. IEEE Trans. Ind. Informat. 2016, 12, 1104–1113. [Google Scholar] [CrossRef]
  41. Ye, H.; Liang, L.; Li, G.Y.; Kim, J.; Lu, L.; Wu, M. Machine learning for vehicular networks: Recent advances and application examples. IEEE Veh. Technol. Mag. 2018, 13, 94–101. [Google Scholar] [CrossRef]
  42. Malfante, M. Machine learning for volcano seismic signals: Challenges and perspectives. IEEE Singal Process. Mag. 2018, 35, 20–30. [Google Scholar] [CrossRef]
  43. Prieto, M.D. Bearing fault detection by a novel condition monitoring scheme based on statistical time features and neural networks. IEEE Trans. Ind. Electron. 2013, 60, 3398–3407. [Google Scholar] [CrossRef]
  44. Becari, W.; de Oliveira, A.M.; Peres, H.E.M.; Correra, F.S. Microwave-based system for non-destructive monitoring water pipe networks using support vector machine. IET Sci. Meas. Technol. 2016, 10, 910–915. [Google Scholar] [CrossRef]
  45. Gomaa, R.I. Real-time radiological monitoring of nuclear facilities using Zigbee technology. IEEE Sens. J. 2014, 14, 4007–4013. [Google Scholar] [CrossRef]
  46. Zheng, K. Energy efficient localization and tracking of mobile devices in wireless sensor networks. IEEE Trans. Veh. Technol. 2017, 66, 2714–2726. [Google Scholar] [CrossRef] [Green Version]
  47. Huang, N.E.; Shen, Z.; Long, S.R. The empirical mode decomposition and the Hilbert spectrum for nonlinear non-stationary time series analysis. Proc. R. Soc. A Math. Phys. Eng. Sci. 1998, 454, 903–995. [Google Scholar] [CrossRef]
  48. Yang, J.; Wen, Y.; Li, P. Leak location using blind system identifi-cation in water distribution pipelines. J. Sound Vibrat. 2008, 310, 134–148. [Google Scholar] [CrossRef]
  49. Pincus, S.M. Approximate entropy: A complexity measure for biological time series data. In Proceedings of the 1991 IEEE Seventeenth Annual Northeast Bioengineering Conference, Hartford, CT, USA, 4–5 April 1991; pp. 35–36. [Google Scholar]
  50. Cortes, C.; Vapnik, V. Support-vector networks. Mach. Learn. 1995, 20, 273–297. [Google Scholar] [CrossRef]
  51. Müller, K.R.; Mika, S.; Rätsch, G.; Tsuda, K.; Schölkopf, B. An introduction to kernel-based learning algorithms. IEEE Trans. Neural Netw. 2001, 12, 181–201. [Google Scholar] [CrossRef]
  52. Ayat, N.E.; Cheriet, M.; Suen, C.Y. Automatic model selection for the optimization of SVM kernels. Pattern Recognit. 2005, 38, 1733–1745. [Google Scholar] [CrossRef]
  53. Hsu, C.W.; Lin, C.J. A comparison of methods for multiclass support vector machines. IEEE Trans. Neural Netw. 2002, 13, 415–425. [Google Scholar] [PubMed]
  54. Huang, C.L.; Wang, C.J. A GA-based feature selection and parameters optimization for support vector machines. Expert Syst. Appl. 2006, 31, 231–240. [Google Scholar] [CrossRef]
Figure 1. System architecture for pipeline monitoring.
Figure 1. System architecture for pipeline monitoring.
Sensors 19 05086 g001
Figure 2. CC2530 packet loss rate under NLOS conditions.
Figure 2. CC2530 packet loss rate under NLOS conditions.
Sensors 19 05086 g002
Figure 3. Flowchart of the nodes joining the network.
Figure 3. Flowchart of the nodes joining the network.
Sensors 19 05086 g003
Figure 4. Flowchart of the ZigBee network leakage triggered networking.
Figure 4. Flowchart of the ZigBee network leakage triggered networking.
Sensors 19 05086 g004
Figure 5. Power spectra of signals from a pipeline. (a) Normal signal power spectrum. (b) Leakage signal power spectrum.
Figure 5. Power spectra of signals from a pipeline. (a) Normal signal power spectrum. (b) Leakage signal power spectrum.
Sensors 19 05086 g005
Figure 6. The first four intrinsic mode function (IMF) spectra of the pipeline leakage and non-leakage signal. (a) Leakage signal. (b) Non-leakage signal.
Figure 6. The first four intrinsic mode function (IMF) spectra of the pipeline leakage and non-leakage signal. (a) Leakage signal. (b) Non-leakage signal.
Sensors 19 05086 g006
Figure 7. ApEn of signals for different threshold values. (a) r = 0.3 S D . (b) r = 0.2 S D . (c) r = 0.1 S D .
Figure 7. ApEn of signals for different threshold values. (a) r = 0.3 S D . (b) r = 0.2 S D . (c) r = 0.1 S D .
Sensors 19 05086 g007
Figure 8. Schematic diagram of the SVM identification model training and optimization.
Figure 8. Schematic diagram of the SVM identification model training and optimization.
Sensors 19 05086 g008
Figure 9. Arrangement of nodes.
Figure 9. Arrangement of nodes.
Sensors 19 05086 g009
Figure 10. Arrangement of wireless sensor nodes in the vicinity of a leakage point.
Figure 10. Arrangement of wireless sensor nodes in the vicinity of a leakage point.
Sensors 19 05086 g010
Figure 11. Node status. (a) Coordinator and routing nodes. (b) Networking nodes. (c) Nodes in the normal working state.
Figure 11. Node status. (a) Coordinator and routing nodes. (b) Networking nodes. (c) Nodes in the normal working state.
Sensors 19 05086 g011
Figure 12. Comparisons of the networking time and proportions of networking nodes for the proposed solution and the ZigBee 2007 solution. (a) Networking time. (b) Proportion of networking nodes.
Figure 12. Comparisons of the networking time and proportions of networking nodes for the proposed solution and the ZigBee 2007 solution. (a) Networking time. (b) Proportion of networking nodes.
Sensors 19 05086 g012
Figure 13. Comparisons of the networking power and energy consumption for the proposed solution and the ZigBee 2007 solution. (a) Power. (b) Energy.
Figure 13. Comparisons of the networking power and energy consumption for the proposed solution and the ZigBee 2007 solution. (a) Power. (b) Energy.
Sensors 19 05086 g013
Figure 14. Ratio of terminal nodes carried by routing nodes for the proposed solution and the ZigBee 2007 solution.
Figure 14. Ratio of terminal nodes carried by routing nodes for the proposed solution and the ZigBee 2007 solution.
Sensors 19 05086 g014
Figure 15. Identification accuracy under different ( C , γ ) parameter combinations.
Figure 15. Identification accuracy under different ( C , γ ) parameter combinations.
Sensors 19 05086 g015
Figure 16. Pipeline leakage and non-leakage detection results.
Figure 16. Pipeline leakage and non-leakage detection results.
Sensors 19 05086 g016
Table 1. Join frame.
Table 1. Join frame.
Field NamePANIDDes_addressSou_addressJoin_resultChannel
Length16 bits16 bits16 bits1 bit32 bits
InstructionsNetwork IDDestinationSourceResultsChannel
Table 2. Active frame.
Table 2. Active frame.
Field NamePAN IDSou_addressAct_address
Length16 bits16 bits16 bits
InstructionsNetwork IDSourceActive Node
Table 3. Wave frame.
Table 3. Wave frame.
Field NamePAN IDDes_addressSou_addressPositionValue
Length16 bits16 bits16 bits64 bits128 bits
InstructionsNetwork IDDestinationSourceLeakage PointInformation
Table 4. Simulation parameter settings.
Table 4. Simulation parameter settings.
Application Layer Parameters
Packet SizeConstant (512)
Packet Interarrival TimeExponential (5)
Start Time120 s
Stop TimeInfinity
MAC Layer Parameters
ACK Wait Duration0.05 s
Minimum Backoff Exponent3
Maximum Number of Backoffs4
Channel Sensing Duration0.5
Physical Layer Parameters
Transmission Bands2450 MHz Band
Data Rate240 kbps
Packet Reception-Power Threshold−85 dBm
Transmission Power1 mW
Receive Power0.4 mW
Idle Power0.1 mW
Table 5. Leakage signal identification rate in an environment containing Gaussian noise and impulse noise.
Table 5. Leakage signal identification rate in an environment containing Gaussian noise and impulse noise.
SNR(dB) 12 9 6 3 036912
(c,g)
( 2 9 , 2 4 ) 344260838588919396
( 2 10 , 2 5 ) 344260828587919296
( 2 11 , 2 6 ) 344260828587899396
Gaussian Noise ( 2 12 , 2 7 ) 374260828487889395
( 2 13 , 2 8 ) 344260828587919396
( 2 14 , 2 9 ) 344259828587919396
( 2 15 , 2 10 ) 344259828587918396
( 2 9 , 2 4 ) 313256848588909496
( 2 10 , 2 5 ) 313254828487899395
( 2 11 , 2 6 ) 313259818487909395
Impulsive Noise ( 2 12 , 2 7 ) 313256818587909395
( 2 13 , 2 8 ) 313255818487909395
( 2 14 , 2 9 ) 313355818487919396
( 2 15 , 2 10 ) 313255808487919395

Share and Cite

MDPI and ACS Style

Liu, Y.; Ma, X.; Li, Y.; Tie, Y.; Zhang, Y.; Gao, J. Water Pipeline Leakage Detection Based on Machine Learning and Wireless Sensor Networks. Sensors 2019, 19, 5086. https://doi.org/10.3390/s19235086

AMA Style

Liu Y, Ma X, Li Y, Tie Y, Zhang Y, Gao J. Water Pipeline Leakage Detection Based on Machine Learning and Wireless Sensor Networks. Sensors. 2019; 19(23):5086. https://doi.org/10.3390/s19235086

Chicago/Turabian Style

Liu, Yang, Xuehui Ma, Yuting Li, Yong Tie, Yinghui Zhang, and Jing Gao. 2019. "Water Pipeline Leakage Detection Based on Machine Learning and Wireless Sensor Networks" Sensors 19, no. 23: 5086. https://doi.org/10.3390/s19235086

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop