Software Based Leak Detection Presentation
Software Based Leak Detection Presentation
Software Based Leak Detection Presentation
Presented by:
James Akingbola
David Mannel
Elijah Odusina
Overview
Gas pipeline explosion in the Ukrainian village of Luka south of the capital Kiev May 7, 2007
Pipeline Configurations
Methods of leak detection
Hardware Method:
This method is used to detect leaks with instrumentation
outside the pipeline.
Software Method:
This method uses different instruments to monitor internal
parameters (such as pressure, flow, temperature) that infer
product release.
It is also known as computational pipeline monitoring
(CPM).
Hardware Method
Acoustic Emissions
Vapor Monitoring
* http://www.wavealert.com/Pages/sys1.html
Hardware Method – Fiber Optic
.
Hardware Method – Vapor Sensing Method
Pipeline Monitoring: Multi-hop Sensor Wireless Network
Professor Sridhar Radhakrishnan
Solution
Problem: Develop continuous real-time Multi-hop wireless sensor network with
monitoring of pipelines to determine leak and appropriate sensor fusion technologies.
other structural damages.
Disadvantages
System costs are usually high
High complexity of installation
Software Methods
Balancing Systems
Uses the principle of mass conservation
. . dM L
M I (t ) M O (t )
dt
Types of Balancing systems
Volume Balance
Compensated Mass Balance
Model Compensated Mass Balance
Software Methods- Balancing Systems
Advantage
It is simple to implement
Cost effective
Disadvantage
Can be affected by instrument error
High rate of false alarms
Software Method - Pressure Analysis
Gradient Intersection method
This method uses SCADA* values to calculate the theoretical
hydraulic profile or baseline of the pipe
The presence of a leak can be determined from a specific
deviation or combinations of several deviations from the baseline
Xleak
Software Method - RTTM
Real Time Transient Modeling (RTTM)
Involves computer simulation of pipeline conditions using
advanced fluid mechanics and hydraulic modeling.
Basic equations used in RTTM are:
d v
Continuity equation: 0
dt x
dv 1 p
Momentum Equation: . fD 0
dt x
dh 1 dp
Energy equation: . lL 0
dt dt
Software Method - RTTM
Advantages
It takes into account the configuration of the pipe as
well as the product characteristics.
Very fast in detection and location
Disadvantage
It is a complex way of leak detection
The RTTM method costs much more than the other
methods
Requires many instruments, controller training and
maintenance.
Errors in instrument calibration could raise false alarms
Generalized Likelihood Ratio
This is a statistical method modeled after
the flow conditions in the pipeline
A mathematical model that describes
effects of leaks and biases on the flow
process is used.
Can detect leaks in pipeline branch,
location in the branch and magnitude of
the leak.
Can identify various types of gross errors
GLR for Gross Error Identification
Process Model Process leak Model
Steady state model without leak A mass flow leak in process unit (node) j
z xv of unknown magnitude b can be modeled
by;
z is a measurement vector
Ax bm j 0
x is the true value of state variables
the elements of vector m j corresponds to
v is the vector of random error
the total mass flow constraint associated
Ax 0 with node j
A = constraint matrix
Procedure for single gross error
Measurement bias Model
z x v bei r Az
When there is no gross error;
b is the bias of unknown magnitude in
instrument I
Er 0
e i =is a vector with unity in position i
Covr V AQA'
S. Narasimhan and R.S.H. Mah. "Generalized Likelihood Ratio Method for Gross Error Identification." AIChe Journal 33,
No.9(1987): 1514-1519.
GLR for Gross Error Identification
If a gross error due to a bias of magnitude let μ be the unknown expected value of r,
b is present in measurement I, then; we can formulate the hypotheses for gross
error detection as
Er b Aei H0 : 0
If a gross error due to process leak in H1 : b f i
magnitude b is present in node j, then;
Ho: is the null hypothesis that no gross
Er bmi errors are present and
H1: is the alternative hypothesis that
either a leak or a measurement bias is
When a gross error due to a bias or present.
process leak is present;
b and fi are unknown parameters. b can
E r b f be any real number and fi will be referred
i to as a gross error vectors from the set F
sup
exp 0.5 r b f i V r b f
' 1
d i2
exp 0.5r V r Ti
i
' 1
bi f i Ci
Where: 1
di f i V r
'
The expression on the right hand side is
always positive. The calculation can be 1
Ci f i V f i
'
simplified by the calculation by the test
statistics, T as:
This calculation is performed for every
1
T 2 ln sup r V r r b f i V r b f i
b, f
'
' 1
vector fi in set F and the test statistics T
is:
j
T sup Ti
i
GLR for Gross Error Identification
NOTE
Performance Measures
The overall power of the method to identify gross errors is
given by:
Overall
power
Number of gross errors correctly identified
Number of gross errors simulated
GLR for Gross Error Identification
Results & Discussion
For the Recycle process network
1 2 3 5 7
6
GLR for Gross Error Identification
Constraint Matrix for the process Network
Type of Streams
Constraint Pipe 1 2 3 4 5 6 7
Mass
Balance A 1 -1 0 1 0 1 0
Mass
Balance
B 0 1 -1 0 0 0 0
Mass
Balance
C 0 0 1 -1 -1 0 0
Mass
Balance
D 0 0 0 0 1 -1 -1
GLR for Gross Error Identification
Bias in sensor 1
Simulations (Ti)
Sensors
1 2 3 4 5 6 7 8 9 10
1 2110 719 1190 431 1496 2457 1394 2386 1404 1056
2 61 729 16 0.18 181 930 1 34 189 491
3 82 631 227 141 491 712 521 10 535 4
4 371 5 159 196 99 19 751 10 114 528
5 1144 379 270 86 283 1008 217 32 21 39
6 317 550 29 583 72 926 127 10 33 261
7 919 39 1538 0.18 975 523 755 2659 1052 336
T 2110 729 1538 583 1496 2457 1394 2659 1404 1056
b^ -58 34 -50 -35 49 -63 47 66 48 -41
250.0000%
200.0000%
Error
150.0000%
TRUE
FALSE
100.0000%
50.0000%
0.0000%
0 20 40 60 80 100 120 140
Simulated Magnitude
Error vs Simulated Magnitude (3% Meter Variance)
300.0000%
250.0000%
200.0000%
Error
150.0000%
TRUE
FALSE
100.0000%
50.0000%
0.0000%
-250 -200 -150 -100 -50 0 50 100 150 200 250
Simulated Magnitude
Error vs Simulated Magnitude (5% Meter Variance)
300.0000%
250.0000%
200.0000%
Error
150.0000%
TRUE
FALSE
100.0000%
50.0000%
0.0000%
0 50 100 150 200 250 300 350 400
Simulated Magnitude
Overall Power vs. Simulated Magnitude (1% Process
Variance)
1.2
0.8
Overall Power
0.6
TRUE
FALSE
0.4
0.2
0
0 20 40 60 80 100 120 140
Simulated Magnitude
Overall Power vs. Simulated Magnitude (3% Meter
Variance)
1.2
0.8
Overall Power
0.6
TRUE
FALSE
0.4
0.2
0
-250 -200 -150 -100 -50 0 50 100 150 200 250
Simulated Magnitude
Overall Power vs. Simulated Magnitude (5% Meter
Variance)
1.2
0.8
Overall Power
0.6
TRUE
FALSE
0.4
0.2
0
0 50 100 150 200 250 300 350 400
Simulated Magnitude
Simulation Procedure
Energy balance
P1 P2 ( P1 P1e ) ( P1e P2 )
without leak
Miguel J. Bagajewicz and Emmanuel Cabrera. "Data Reconciliation in Gas Pipeline Systems." Ind. Eng.
Chem. Res 42, No.22(2003): 1-11
Simulation Procedure
Problem formulation With Error:
Without Error: ~ ~
~ ~
Min (G i Gi ) * S ( Pi Pi ) 2 * S Pi1
2 1
Gi
Min (G i Gi ) * S ( Pi Pi ) 2 * S Pi1
2 1
Gi
i
i
Subject to:
Subject to:
Gi ,in Gi ,out b 0
Gi ,in Gi ,out 0 So:
Case 1 0.4 0 0
Case 2 0 0.4 0
Case 3 0 0 -0.4
Sample Pipeline Network
Simulation Procedure - Leak in Pipe 1
Calculator Optimizer
Error
The error is calculated as follows:
Error = (Calculated Value-True Value)/(True
Value)
Simulation Procedure-Case Study
Error vs. Leak Magnitude (Perfect Measurment)
1.00%
0.50%
Error
0.00%
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5
-0.50%
-1.00%
Leak Magnitude
Simulation Procedure-Case Study
Error VS. Leak Simulated
70.00%
As the simulated leak magnitude decreases, the error in
the estimated magnitude increases.
60.00% The Simulated magnitude has little effect on the location.
There is no trend in identification of True/False values.
50.00%
40.00%
Location True
Error
Magnitude True
30.00% Location False
Magnitude False
20.00%
10.00%
0.00%
0 0.5 1 1.5 2 2.5 3 3.5
-10.00%
Leak Simulated
Simulation Procedure-Case Study
Overall Power VS. Leak Simulated
70
60
50
Overall Power
40
10
0
0 0.5 1 1.5 2 2.5 3 3.5
Leak Simulated
Future Research
Run more simulations
Explore multiple leak detection
Acknowledgements
Miguel Bagajewicz
Quang Nguyen
Roman Voronov
Rufei Lu
Questions