State of Research on Negative Pressure Techniques Applied to Leak Detection in Liquid Pipelines

Author(s):  
Wei Liang ◽  
Lai-bin Zhang ◽  
Zhao-hui Wang

In China, the rarefaction-pressure wave techniques are widely used to diagnose the leakage fault for liquid pipelines. Many leaking propagating assumptions, such as stable single-phased flow hypothesis and none rarefaction wave front hypothesis, are often uncertain in the process of leak detection, which can easily result in some errors. Thus the rarefaction-pressure wave techniques should be integrated with other analytical techniques to compute a more accurate leak location. Additionally, the development trends of rarefaction-pressure wave techniques lie in three aspects. First, rarefaction-pressure wave detection techniques will be integrated with other compatible detection techniques and modern signal processing methods to solve the complex problems encountered in leak detection. Second, studies of rarefaction-pressure wave techniques have advanced to a new stage. The deductions on propagation mechanism of rarefaction-pressure wave have been successfully applied to determine leaks qualitatively. Third, analysis on rarefaction-pressure wave detection techniques will be made from a quantitative point of view. The quantitative data have been used to deduce leak amounts and location. The purpose of this paper is to present the recent achievements in the study of improved rarefaction-pressure wave detection techniques. The rarefaction-pressure wave detection methods, effects of incomplete information conditions, the improvements of rarefaction-pressure wave detection techniques with modified factors and propagation mechanisms are comprehensively investigated. The disfigurements of rarefaction-pressure wave are analyzed. The corresponding methods for resolving such problems as ill diagnostic information and weak amplitude values are put forward. Several methods for stronger small leakage detection ability, higher leakage positioning precision, lower false alarm rates are proposed. The application of rarefaction-pressure wave detection techniques to safety protection of liquid pipelines is also introduced. Finally, the prospect of rarefaction-pressure wave detection techniques is predicted.

2020 ◽  
Vol 16 ◽  
Author(s):  
Vallidevi Krishnamurthy ◽  
Kannappan Panchamoorthy Gopinath ◽  
Ganeshraj Vanathi ◽  
Suresh Ganapathy Shivanirudh

Background: Nanoparticle has become an important part of many modern scientific technologies. Also, there are many naturally occurring nanoparticle that play important role in various natural and synthetic processes. Detection of these nanoparticles is expensive and challenging. This review paper explains in detail about various sensor based methods used in detection of nanoparticles. Methodology: Sensor based analytical techniques are more accurate than other techniques. Nanoparticles may occur in air, water, solid surface and human or other living organisms’ physical environments. The detection methods include spectroscopic techniques, electrochemical methods, microcativities and microlasers based detection, optical techniques and many other high sensitive methods. All these methods and their principles are explained in this study. The importance and the ill effects of the nano particles are explained in this article. Further, the detection of a particular single nano particle is also discussed. Conclusions: The detailed comparative analysis of these methods showed that sensor based methods is highly efficient in detection of nanoparticles. The further research in this field may introduce many cost effective and high efficient detection techniques that would revolutionize the medical and other application fields.


1994 ◽  
Author(s):  
Valerie Belcher ◽  
Daniel Mackowski ◽  
Roy Hartfield, Jr. ◽  
Sushil Bhavnani

2021 ◽  
Vol 12 (2) ◽  
pp. 1-18
Author(s):  
Jessamyn Dahmen ◽  
Diane J. Cook

Anomaly detection techniques can extract a wealth of information about unusual events. Unfortunately, these methods yield an abundance of findings that are not of interest, obscuring relevant anomalies. In this work, we improve upon traditional anomaly detection methods by introducing Isudra, an Indirectly Supervised Detector of Relevant Anomalies from time series data. Isudra employs Bayesian optimization to select time scales, features, base detector algorithms, and algorithm hyperparameters that increase true positive and decrease false positive detection. This optimization is driven by a small amount of example anomalies, driving an indirectly supervised approach to anomaly detection. Additionally, we enhance the approach by introducing a warm-start method that reduces optimization time between similar problems. We validate the feasibility of Isudra to detect clinically relevant behavior anomalies from over 2M sensor readings collected in five smart homes, reflecting 26 health events. Results indicate that indirectly supervised anomaly detection outperforms both supervised and unsupervised algorithms at detecting instances of health-related anomalies such as falls, nocturia, depression, and weakness.


2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Xiang Li ◽  
Jianzheng Liu ◽  
Jessica Baron ◽  
Khoa Luu ◽  
Eric Patterson

AbstractRecent attention to facial alignment and landmark detection methods, particularly with application of deep convolutional neural networks, have yielded notable improvements. Neither these neural-network nor more traditional methods, though, have been tested directly regarding performance differences due to camera-lens focal length nor camera viewing angle of subjects systematically across the viewing hemisphere. This work uses photo-realistic, synthesized facial images with varying parameters and corresponding ground-truth landmarks to enable comparison of alignment and landmark detection techniques relative to general performance, performance across focal length, and performance across viewing angle. Recently published high-performing methods along with traditional techniques are compared in regards to these aspects.


2021 ◽  
Vol 11 (12) ◽  
pp. 5685
Author(s):  
Hosam Aljihani ◽  
Fathy Eassa ◽  
Khalid Almarhabi ◽  
Abdullah Algarni ◽  
Abdulaziz Attaallah

With the rapid increase of cyberattacks that presently affect distributed software systems, cyberattacks and their consequences have become critical issues and have attracted the interest of research communities and companies to address them. Therefore, developing and improving attack detection techniques are prominent methods to defend against cyberattacks. One of the promising attack detection methods is behaviour-based attack detection methods. Practically, attack detection techniques are widely applied in distributed software systems that utilise network environments. However, there are some other challenges facing attack detection techniques, such as the immutability and reliability of the detection systems. These challenges can be overcome with promising technologies such as blockchain. Blockchain offers a concrete solution for ensuring data integrity against unauthorised modification. Hence, it improves the immutability for detection systems’ data and thus the reliability for the target systems. In this paper, we propose a design for standalone behaviour-based attack detection techniques that utilise blockchain’s functionalities to overcome the above-mentioned challenges. Additionally, we provide a validation experiment to prove our proposal in term of achieving its objectives. We argue that our proposal introduces a novel approach to develop and improve behaviour-based attack detection techniques to become more reliable for distributed software systems.


2021 ◽  
pp. 1-21
Author(s):  
Shahela Saif ◽  
Samabia Tehseen

Deep learning has been used in computer vision to accomplish many tasks that were previously considered too complex or resource-intensive to be feasible. One remarkable application is the creation of deepfakes. Deepfake images change or manipulate a person’s face to give a different expression or identity by using generative models. Deepfakes applied to videos can change the facial expressions in a manner to associate a different speech with a person than the one originally given. Deepfake videos pose a serious threat to legal, political, and social systems as they can destroy the integrity of a person. Research solutions are being designed for the detection of such deepfake content to preserve privacy and combat fake news. This study details the existing deepfake video creation techniques and provides an overview of the deepfake datasets that are publicly available. More importantly, we provide an overview of the deepfake detection methods, along with a discussion on the issues, challenges, and future research directions. The study aims to present an all-inclusive overview of deepfakes by providing insights into the deepfake creation techniques and the latest detection methods, facilitating the development of a robust and effective deepfake detection solution.


Sign in / Sign up

Export Citation Format

Share Document