Technical Papers
Jun 14, 2016

Leakage Zone Identification in Large-Scale Water Distribution Systems Using Multiclass Support Vector Machines

Publication: Journal of Water Resources Planning and Management
Volume 142, Issue 11

Abstract

This paper presents a new method for identifying leakage zones of water distribution systems. A large water network is first divided into a number of zones. The zone number is used as the category label of the multiclass support vector machine (M-SVM), which is trained with the data set generated by simulation of the possible leakages using a hydraulic model. The trained M-SVM is used as the leakage zone identification model and applied to determine the likely leakage zones with the observed field data. Two case studies are presented in this paper to demonstrate the effectiveness of the method. The results indicate that this method has many unique advantages in solving the nonlinear and high-dimensional pattern recognition problem with a small sample data set. Together with the method of pressure-dependent leakage detection (PDLD), the proposed approach enables engineers to improve the effectiveness and efficiency of leakage detection for large water distribution systems.

Get full access to this article

View all available purchase options and get full access to this article.

Acknowledgments

This work is financially supported by the National Science and Technology Major Project (2014ZX07406003). The authors would like to thank the local water utility for providing the leakage data.

References

Aksela, K., Aksela, M., and Vahala, R. (2009). “Leakage detection in a real distribution network using a SOM.” Urban Water J., 6(4), 279–289.
Bentley Systems. (2012). Darwin optimization user manual, Watertown, CT.
Bentley Systems. (2013). WaterGEMS V8i users’ manual, Watertown, CT.
Boser, B. E., Guyon, I. M., and Vapnik, V. N. (1992). “A training algorithm for optimal margin classifiers.” Proc., 5th Annual Workshop Computational Learning Theory, ACM, Pittsburgh, 144–152.
Caputo, A. C., and Pelagagge, P. M. (2002). “An inverse approach for piping networks monitoring.” J. Loss Prev. Process Ind., 15(6), 497–505.
Caputo, A. C., and Pelagagge, P. M. (2003). “Using neural networks to monitor piping systems.” Process Saf. Prog., 22(2), 119–127.
Chamasemani, F. F., and Singh, Y. P. (2011). “Multi-class support vector machine (SVM) classifiers—An application in hypothyroid detection and classification.” Proc., 2011 6th Int. Conf. on Bio-Inspired Computing: Theories and Applications (BIC-TA), IEEE Computer Society, Alamitos, CA, 351–356.
Chang, C. C., and Lin, C. J. (2011). “LIBSVM: A library for support vector machines.” ACM Trans. Intell. Syst. Technol., 2(3), 1–27.
Chapelle, O., Vapnik, V., Bousquet, O., and Mukherjee, S. (2002). “Choosing multiple parameters for support vector machines.” Mach. Learn., 46(1–3), 131–159.
Cortes, C., and Vapnik, V. (1995). “Support-vector networks.” Mach. Learn., 20(3), 273–297.
Costanzo, F., Morosini, A. F., Veltri, P., and Savić, D. (2014). “Model calibration as a tool for leakage identification in WDS: A real case study.” Procedia Eng., 89, 672–678.
Covas, D., et al. (2003). “An assessment of the application of inverse transient analysis for leak detection. Part II: Collection and application of experimental data.” Advances in water supply management, C. Maksimovic, D. Butler, and F. A. Memon, eds., Swets & Zeitlinger, Lisse, Netherlands, 79–88.
Feng, J., and Zhang, H. (2006). Algorithm of pipeline leak detection based on discrete incremental clustering method, Springer, Berlin, 602–607.
Goulet, J.-A., Coutu, S., and Smith, I. F. (2013). “Model falsification diagnosis and sensor placement for leak detection in pressurized pipe networks.” Adv. Eng. Inf., 27(2), 261–269.
Kapelan, Z., Savic, D., and Walters, G. A. (2004). “Incorporation of prior information on parameters in inverse transient analysis for leak detection and roughness calibration.” Urban Water, 1(2), 129–143.
Kingdom, W. D., Limberger, R., and Marin, P. (2006). “The challenge of reducing NRW in developing countries.”, World Bank, Washington, DC.
Liggett, J. A., and Chen, L. C. (1994). “Inverse transient analysis in pipe networks.” J. Hydraul. Eng., 934–955.
MacKay, D. J. (2003). Information theory, inference, and learning algorithms, Cambridge University Press, Cambridge, U.K.
Mamo, T. G., Juran, I., and Shahrour, I. (2014). “Virtual DMA municipal water supply pipeline leak detection and classification using advance pattern recognizer multi-class SVM.” J. Pattern Recognit. Res., 9(1), 25–42.
Mashford, J., De Silva, D., Burn, S., and Marney, D. (2012). “Leak detection in simulated water pipe networks using SVM.” Appl. Artif. Intell., 26(5), 429–444.
MATLAB R2010a [Computer software]. Mathworks, Natick, MA.
Meseguer, J., et al. (2014). “A decision support system for on-line leakage localization.” Environ. Modell. Software, 60, 331–345.
Milgram, J., Cheriet, M., and Sabourin, R. (2006). ““One against one” or “one against all”: Which one is better for handwriting recognition with SVMs?.” Training, 195, 143–160.
Misiunas, D., Vítkovský, J., Olsson, G., Simpson, A., and Lambert, M. (2005). “Pipeline break detection using pressure transient monitoring.” J. Water Resour. Plann. Manage., 316–325.
Misiunas, D., Vítkovský, J. P., Olsson, G., Simpson, A. R., and Lambert, M. F. (2004). “Burst detection and location in pipe networks using a continuous monitoring technique.” 9th Int. Conf. on Pressure Surges, BHR Group, Bedfordshire, U.K., 24–26.
Mounce, S., Boxall, J., and Machell, J. (2010). “Development and verification of an online artificial intelligence system for detection of bursts and other abnormal flows.” J. Water Resour. Plann. Manage., 309–318.
Mounce, S. R., Mounce, R. B., and Boxall, J. B. (2011). “Novelty detection for time series data analysis in water distribution systems using support vector machines.” J. Hydroinf., 13(4), 672–686.
Perez, R., et al. (2014). “Leak localization in water networks: A model-based methodology using pressure sensors applied to a real network in Barcelona [applications of control].” IEEE Control Syst., 34(4), 24–36.
Pérez, R., Puig, V., Pascual, J., Quevedo, J., Landeros, E., and Peralta, A. (2011). “Methodology for leakage isolation using pressure sensitivity analysis in water distribution networks.” Control Eng. Pract., 19(10), 1157–1167.
Poulakis, Z., Valougeorgis, D., and Papadimitriou, C. (2003). “Leakage detection in water pipe networks using a Bayesian probabilistic framework.” Probab. Eng. Mech., 18(4), 315–327.
Refaeilzadeh, P., Tang, L., and Liu, H. (2009). Cross-validation, Springer, Berlin, 532–538.
Romano, M., Kapelan, Z., and Savić, D. A. (2010). “Real-time leak detection in water distribution systems.” Proc., 12th Water Distribution Systems Analysis Conf., ASCE, Reston, VA.
Rossman, L. A. (2002). EPANET 2.0 user’s manual, National Risk Management Research Laboratory, U.S. EPA, Cincinnati.
Sanz, G., Pérez, R., Kapelan, Z., and Savic, D. (2015). “Leak detection and localization through demand components calibration.” J. Water Resour. Plann. Manage., 04015057.
Taghvaei, M., Beck, S. B. M., and Staszewski, W. J. (2006). “Leak detection in pipelines using cepstrum analysis.” Meas. Sci. Technol., 17(2), 367–372.
Taïeb, L. H., Ayed, L., and Taïeb, E. H. (2012). “Leak detection in viscoelastic pipe by transient analysis.” Condition monitoring of machinery in non-stationary operations, Springer, Berlin, 69–79.
Tao, T., Huang, H., Li, F., and Xin, K. (2014). “Burst detection using an artificial immune network in water-distribution systems.” J. Water Resour. Plann. Manage., 04014027.
UNEP (United Nations Environment Programme). (2008). “Inequity in access to clean water and sanitation.” Vital water graphics: An overview of the state of the world’s fresh and marine waters, 2nd Ed., Nairobi, Kenya.
Vapnik, V. N., and Kotz, S. (1982). Estimation of dependences based on empirical data: Springer series in statistics (Springer series in statistics), Springer, Berlin.
Vítkovský, J. P., Simpson, A. R., and Lambert, M. F. (2000). “Leak detection and calibration using transients and genetic algorithms.” J. Water Resour. Plann. Manage., 262–265.
Weston, J., and Watkins, C. (1998). “Multi-class support vector machines.”, Dept. of Computer Science, Royal Holloway, Univ. of London, London.
WHO (World Health Organization). (2000). “Global water supply and sanitation assessment 2000 report.” Geneva.
Wu, Z., Burrows, R., Moorcroft, J., Croxton, N., and Limanond, S. (2011). “Pressure-dependent leakage detection method compared with conventional techniques.” Proc., Water Distribution System Analysis Symp. (CD-ROM), ASCE, Reston, VA.
Wu, Z., Sage, P., and Turtle, D. (2010). “Pressure-dependent leak detection model and its application to a district water system.” J. Water Resour. Plann. Manage., 116–128.
Wu, Z. Y. (2009). “Unified parameter optimisation approach for leakage detection and extended-period simulation model calibration.” Urban Water J., 6(1), 53–67.
Wu, Z. Y., and Sage, P. (2006). “Water loss detection via genetic algorithm optimization-based model calibration.” Proc., Water Distribution System Analysis Symp. (CD-ROM), ASCE, Reston, VA.
Wu, Z. Y., and Sage, P. (2007). “Pressure dependent demand optimization for leakage detection in water distribution systems.” Proc., Combined CCWI2007 and SUWM2007, ASCE, Reston, VA, 353–361.
Wu, Z. Y., Walski, T., Mankowski, R., Cook, J., Tryby, M., and Herrin, G. (2002). “Calibrating water distribution model via genetic algorithms.” Proc., AWWA IMTech Conf., AWWA, Denver.
Zheng, Y. W., and Yuan, S. (2012). “Optimizing pressure logger placement for leakage detection and model calibration.” WDSA 2012: 14th Water Distribution Systems Analysis Conf., Adelaide, SA, Australia, ASCE, Reston, VA.
Zhou, Z., Hu, C., Xu, D., Yang, J., and Zhou, D. (2011). “Bayesian reasoning approach based recursive algorithm for online updating belief rule based expert system of pipeline leak detection.” Expert Syst. Appl., 38(4), 3937–3943.

Information & Authors

Information

Published In

Go to Journal of Water Resources Planning and Management
Journal of Water Resources Planning and Management
Volume 142Issue 11November 2016

History

Received: Sep 22, 2015
Accepted: Jan 24, 2016
Published online: Jun 14, 2016
Published in print: Nov 1, 2016
Discussion open until: Nov 14, 2016

Permissions

Request permissions for this article.

Authors

Affiliations

Qingzhou Zhang [email protected]
Ph.D. Student, School of Municipal and Environmental Engineering, Harbin Institute of Technology, Harbin 150090, China. E-mail: [email protected]
Zheng Yi Wu [email protected]
Bentley Fellow, Bentley Systems, Incorporated, 27 Siemon Co. Dr., Suite 200W, Watertown, CT 06795. E-mail: [email protected]
Associate Professor, School of Municipal and Environmental Engineering, Harbin Institute of Technology, Harbin 150090, China. E-mail: [email protected]
Professor, School of Municipal and Environmental Engineering, Harbin Institute of Technology, Harbin 150090, China (corresponding author). E-mail: [email protected]
Ph.D. Student, School of Municipal and Environmental Engineering, Harbin Institute of Technology, Harbin 150090, China. E-mail: [email protected]
Hongbin Zhao [email protected]
Professor, School of Municipal and Environmental Engineering, Harbin Institute of Technology, Harbin 150090, China. E-mail: [email protected]

Metrics & Citations

Metrics

Citations

Download citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click Download.

Cited by

View Options

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Get Access

Access content

Please select your options to get access

Log in/Register Log in via your institution (Shibboleth)
ASCE Members: Please log in to see member pricing

Purchase

Save for later Information on ASCE Library Cards
ASCE Library Cards let you download journal articles, proceedings papers, and available book chapters across the entire ASCE Library platform. ASCE Library Cards remain active for 24 months or until all downloads are used. Note: This content will be debited as one download at time of checkout.

Terms of Use: ASCE Library Cards are for individual, personal use only. Reselling, republishing, or forwarding the materials to libraries or reading rooms is prohibited.
ASCE Library Card (5 downloads)
$105.00
Add to cart
ASCE Library Card (20 downloads)
$280.00
Add to cart
Buy Single Article
$35.00
Add to cart

Media

Figures

Other

Tables

Share

Share

Copy the content Link

Share with email

Email a colleague

Share