You are on page 1of 13

429 © IWA Publishing 2015 Water Science & Technology: Water Supply | 15.

3 | 2015

A review of methods for burst/leakage detection and


location in water distribution systems
Rui Li, Haidong Huang, Kunlun Xin and Tao Tao

ABSTRACT
Rui Li
The problem of bursts and leakages in water distribution systems has received significantly increased
Haidong Huang
attention over the past two decades. As they represent both an environmental and an economical Kunlun Xin (corresponding author)
Tao Tao
issue, how to reduce water loss through bursts and leakages is a challenging task for water utilities. College of Environmental Science and Engineering,
Tongji University,
Consequently, various techniques have been developed to detect the location and size of leakages. Shanghai,
China
The methods for bursts (or leaks) detection and location can be broadly divided into two main
E-mail: xkl@tongji.edu.cn
categories, one based on hardware and the other based on software. Hardware-based methods
include (i) acoustic detection methods such as listening rods, leak correlators, leak noise loggers and
(ii) non-acoustic detection methods such as gas injection, ground penetrating radar technology and
infrared photography. Software-based methods make use of the data collected by real-time pressure
and/or flow sensors and several artificial intelligence techniques and statistical data analysis tools,
including (i) methods based on numerical modeling methods, such as inverse transient analysis, time
domain analysis and frequency domain analysis, and (ii) some non-numerical modeling methods,
such as artificial neural networks, Bayesian inference systems, the Golden section method, and
Kalman filtering. In this article, the authors describe the methods for pipe network burst location and
detection, summarize the features of each method, and propose a suggestion for future work.
Key words | detection and location, leakage, pipe burst, water distribution system

INTRODUCTION

The problem of bursts and leakages in water distribution sys- There are a large group of methods using highly special-
tems has received significantly increased attention over the ized hardware equipment, such as leak noise correlators,
past two decades. Bursts and leaks not only cause economic leak noise loggers, gas injection, ground penetrating radar
losses to the water industry but also represent an environ- and infrared photography. Despite the advantage of accuracy
mental issue and a potential risk to public health with in bursts/leaks detection and location, they also have some
regard to contaminated water (Puust et al. ). The drawbacks. For example, they are expensive, labor-intensive,
amount of leaked water varies widely between different slow to run, and may also require the cessation of pipeline
3
countries. In China, about 6 billion m water are lost due operations for long periods of time (Romano et al. ).
to bursts and leaks each year. Therefore, researchers have been focusing more on finding
To prevent water loss and improve water use efficiency, faster techniques based on software that cost less to run.
more effective methodologies of bursts/leaks control are Techniques based on fluid transients for burst/leak detec-
required. Although there are a variety of methods to solve tion have gained popularity over the last decade, for example,
the problem of detecting and locating bursts/leaks, they can inverse transient analysis, time domain analysis and frequency
be broadly divided into two main categories (Sima et al. domain analysis (FDA). Using these techniques, a massive
), one based on hardware, and the other based on amount of data can be gathered in a very short period of
software. time, therefore ensuring that the inverse problem will always
doi: 10.2166/ws.2014.131

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
430 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

be over-determined. However, they often require a signifi- the surface of the detection equipment, the listening rod can
cantly larger number of such sensors in the pipeline network detect a variety of faint sounds which human ears cannot
that leads to high costs. In addition, methods based on transi- hear due to air isolation or outside interference when the
ents are mainly used on single, above-ground pipelines, for it is equipment is in operation. It is like a doctor’s stethoscope,
hard to follow underground pipes of the system’s architecture. through contact with the human body, the doctor will be
With the latest developments of hydraulic sensor tech- able to listen carefully to the sound of the heart beating, or
nology and on-line data acquisition systems, techniques the sound of breathing. The listening rod is simple, but to
that use artificial intelligence (AI) tools and statistical data accurately determine where the problem lies will usually
analysis tools are emerging, including artificial neural net- depend on the user’s experience and overall capability.
works, Bayesian inference systems, the Golden section Other available instruments, such as the electronic listening
method and adaptive Kalman filtering (Ye & Fenner ). rod and listening devices, use the same working principle as
They are different from transient analysis in that they only the listening rod; however, due to great progress in the elec-
require pressure or flow data sampled at a much lower fre- tronic zoom function, the detection accuracy of these
quency. In addition, for the AI-based techniques, there is devices is significantly improved.
still room for improvement in terms of pinpointing bursts/
leaks, as no information about its precise location is given Leak correlator
when a burst/leak is discovered in a particular area.
In the rest of this paper, hardware-based and software- The leak correlator is a product of third-generation technol-
based methods are described, followed by the main con- ogy. It is also the world’s most widely used advanced
clusions and recommendations for future work. technology to accurately determine the location of a leak
(Thornton ), especially in noisy places, deeply buried
pipelines or regions that are inappropriate for the ground lis-
HARDWARE-BASED METHODS tening method. With a leak-related instrument, we can
quickly and accurately detect the exact location of under-
This type of approach for detecting the position of pipe ground pipe leakage. The method is different from the
bursts/leaks is usually associated with hardware devices. listening rod, because it is based on the noise velocity rather
According to the theoretical principles that apply to the than the noise level caused by leakage. It calculates the leak-
hardware device, these methods can be divided into acoustic age point by collecting data from both ends of the leaking
and non-acoustic detection methods. pipeline, including the distance between the two sensors,
the time difference between the two sensors when the
Acoustic detection methods sound reaches them, and the sound propagation velocity in
the pipe, and performs relevant calculations with these data.
Specifically, the current broadly used acoustic methods The leak-related instrument is an effective detection method
include listening rods, leak correlators and leak noise log- for long distance pipelines (Hunaidi et al. ), the sensitivity
gers (Mutikanga et al. ). Such methods are mainly is slightly higher than the average, and the operator’s skill
based on the features or principle of sound for detection. level requirements are relatively low. However, there are a
number of difficulties in trying to determine the position of
Listening rod leaks in plastic pipes (Muggleton & Brennan ).

The basic acoustic instrument is the listening rods, which is a Leak noise loggers
cheap and useful tool. Its shape is like a probe, and the tail is
equipped with a spherical object that can fit closely with the Leak noise loggers (Shimanskiy et al. ; Muggleton et al.
ears of metal rods; it can accurately determine problem areas ) generally consist of several data loggers and a control-
by using the principle of conduction. By being in contact with ler of all the acoustic receivers installed in the water

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
431 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

distribution system. When the computer equipped with Gas injection


special software for data loggers is programed, the recorder
is put at different locations on the pipe network, such as By injecting industrial hydrogen (95%N2, 5% hydrogen) into
hydrants, valves and other exposed piping. The recorder is the pipe and detecting the gas with a ground detector that is
then automatically turned on at the default time to record sensitive to industrial hydrogen, then the location of pipeline
the acoustic signal throughout the leaking pipes. The signals leakage can be determined according to the location of the
are digitized and automatically stored in the logger, then gas detected (Figure 1). Hydrogen is the lightest gas and it
processed through special software on the computer to has an important characteristic in that it can flow through
quickly detect the existence of leakage. The basis on very small surface cracks. As the gas detector is very sensitive
which leaks are distinguished is that each leakage point to a very small amount of this gas, a very small leak can be
will produce a continuous leakage sound, which determines detected using this method (Hunaidi et al. ). At present,
the presence of leaks near the recorder according to the such methods have been widely applied using machine detec-
degree of intensity and frequency the noise logger records. tion; however, because of the high cost, this technique is
Computer software will identify this automatically and generally used for large-scale low-pressure non-metallic
make a two-dimensional or three-dimensional map of leak- pipe leakage detection. In addition, the technology has a
age points. Such methods are typically used for non- major drawback in that only leakage above the pipeline
district meter area (DMA) trunk pipe leaks. Compared can be detected using this method, for the gas cannot over-
with the listening rod, this method is generally done auto- flow from the bottom of the pipe.
matically by the computer system, with fewer requirements
for professional experience. Ground penetrating radar
In general, acoustic detection methods work well for
medium and large metal pipe leakage detection. But tests Ground penetrating radar (GPR) (Hunaidi ) inspection
showed that they cannot accurately detect small pipe leakage, is a non-destructive and non-invasive geophysical method
especially in the case of large diameter, non-metallic trunk that produces a continuous cross-sectional profile or
pipes. Because the leakage sound in large pipes is usually at record of subsurface features. In recent years, it has been
a low frequency, the detection equipment cannot distinguish given a lot of attention. Using this technique, the equipment
it. In addition, the success of acoustic detection methods for is not required to be inserted into the internal pipe. Ground
plastic pipe leakage is not significant, because non-metallic penetrating radar technology works by transmitting high-
pipe leakage sound is also mostly at the low frequency that frequency electromagnetic waves underground using
leak detectors or hydrophones cannot accurately identify.

Non-acoustic detection methods

Being different from the acoustic detection method, the non-


acoustic detection method is unaffected by those factors
described above; therefore, the non-acoustic detection
method has a wider application than the acoustic detection
method. Specifically, the current non-acoustic detection
methods include gas injection, ground penetrating radar
detection technology, thermal infrared imaging, radioactive
tracers leak detection, etc. Here the authors mainly discuss
Figure 1 | In the gas injection method, a portable gas sensor is used to detect non-toxic
the gas injection method, ground penetrating radar detec-
gas as it escapes through leaks in the pipe and rises through the surrounding
tion technology and the thermal infrared imaging method. soil to the ground surface (Hunaidi et al. 2000).

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
432 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

transmitting antennae and receiving the electromagnetic applied to leakage detection of large-scale low-pressure
wave reflected back to the surface, to infer the spatial non-metallic pipes; however, it might not be applicable in
location, structure, shape and burial depth of the subsurface cold climates or saturated soil.
according to the received electromagnetic wave, amplitude,
and changes in intensity and time (Figure 2). Leakage water Thermal infrared imaging
will make the relative dielectric constant of the medium
increase at the leakage area or below the infiltration line, The principle of a thermal infrared (IR) camera (Mohamed &
showing a significant difference to a site where there is no Osama ) is based on thermal infrared imaging. When it
leakage. A characteristic image with lower frequency and receives and displays the emitted IR radiation from an
larger amplitudes is produced on radar profiles to infer the object, the infrared energy can be right on the focal plane of
spatial location, scope and burial depth of the leakage infrared detectors, then it can be converted into electricity
point. Compared to other methods, this method is fast, con- through photoelectric conversion. Through a sequence of
venient, with high precision and resolution. It can be signal processing, the viewfinder of the thermal camera can
get the thermal image of tested equipment and detect thermal
contrasts, as is shown in Figure 3(a), and a case study is shown
in Figure 3(b). A thermal infrared camera has many positive
characteristics, such as high efficiency, accurate judgment,
intuitive images, safe and reliable, detection without contact,
immunity to electromagnetic interference, long detection dis-
tance and high speed, and is independent of pipe material
type and size. However, it also has some drawbacks, for
example, it is affected by many factors such as weather con-
ditions, soil, and pavement surface conditions.

Hardware-based methods – conclusions

Figure 2 | GPR can be used to detect leaks in water pipes by detecting anomalies created The various methods that are based on the hardware devices
by leaking water in the pipe depth (Hunaidi 1998) thermal infrared imaging. described above are currently used to detect leaks. With the

Figure 3 | Thermography techniques detect thermal infrared radiation and display it as visible images (a) (Mohamed & Osama 2010). This thermographic survey (on the right) was con-
ducted with the camera system focused directly on the ground surface above a simulated leak (b) (Hunaidi et al. 2000).

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
433 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

development of technology, the accuracy of such methods range is limited, and leaks cannot be detected in a timely
will be increasingly high. They are often accompanied by fashion for large pipe networks, besides which the operating
high costs, as relatively expensive equipment and a large cost is usually high. Although the accuracy of hardware
number of leak detection staff are necessary for these methods is high, the timeliness and sensitivity is low. Conse-
methods. For a limited detection range and the required quently, much research has been focused on finding faster
equipment installation, using such methods is generally techniques that cost less to run. Software-based methods typi-
more time-consuming, especially for large pipe networks. cally rely on an algorithm or some kind of model for leakage
The effective range, advantages and disadvantages of the detection. As such methods rely on additional information
above methods are listed in Tables 1 and 2. (like pipe network pressure, flow data) rather than on the leak-
age noise information, they run well on any type of pipes.
Compared with hardware-based methods, software-based
SOFTWARE-BASED METHODS methods do not aim to accurately locate the definite leakage
point, but to minimize possible leakage areas to the minimum
It can be seen from Tables 1 and 2 that many shortcomings level. Thus, the efficiency of the leakage detection is improved.
exist in these methods based on hardware. The detection Software-based methods can be roughly divided into

Table 1 | Effective scope of hardware-based methods

Degree of leakage Applicable pipe


Method Detection range detection Accuracy material Reference

Listening rod 200–500 m About 0.003 l/s 30–75 m Metal Rajtar & Muthiah
()
Leak correlator 15–2,000 m About 0.03 l/s <0.6 m Metal Hunaidi et al. ()
Leak noise loggers Related to accuracy demanded Leaks above 10 dB 2.5 m Metal
Gas injection 1m Unlimited <1 m Unlimited Hunaidi et al. ()
Ground penetrating 1m 0.33 l/s 0.001 m Unlimited Hunaidi ()
radar
Thermal infrared Related to temperature Temperature difference 0.1 mrad Unlimited
W
imaging difference 0.05–0.10 C

Table 2 | Advantages and disadvantages of hardware-based methods

Method Advantages Disadvantages

Listening rod Low cost and simple operation Low accuracy, dependent on the experience of staff and less
effective on non-metallic pipes
Leak correlator Portable, high accuracy, FM and removing Higher cost, accuracy susceptible from diameter, pipe
noise material, pressure etc. and less effective on non-metallic
pipes
Leak noise loggers Automatic leak detection, does not rely on High cost, accuracy susceptible from the number and
the staff’s experience and easy installation arrangement of loggers and less effective on non-metallic
pipes
Gas injection High precision, not susceptible to other High cost, unable to detect the lower side of the pipe
factors
Ground penetrating radar High precision, not susceptible to other High cost, expertise needed and unable to detect pipe
factors leakage in a saturated soil
Thermal infrared imaging Less time and less cost needed Affected by many factors

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
434 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

numerical modeling methods and non-numerical modeling Leakage detection and location using fluid transients is
methods. Numerical modeling methods identify possible leak- given more and more attention by researchers. As large
age areas by establishing a relevant numerical model which is amounts of data can be obtained in a very short time
used to gain relevant data, and comparing simulation results when the fluid is under a transient state, it guarantees that
with field data. a unique solution can be obtained when solving the inverse
problem. Moreover, compared with steady-state fluid,
Numerical model methods hydraulic results are less susceptible to the pipe resistance
coefficient under a fluid transient state. To sum up, current
Currently, numerical model methods mainly include main methods based on transient events include inverse
methods based on transient events and the traditional transient analysis, time domain analysis and FDA.
hydraulic model method. The traditional hydraulic model
method detects leakage using data when the pipe network Inverse transient analysis
is under steady-state conditions. Compared with other
hydraulic models, it is more convenient to build and solve Inverse transient analysis (ITA) is a relatively new approach
the traditional hydraulic model. Thus, the traditional combining the inverse method with the transient analysis in
hydraulic model has been favored by many researchers. networks (Covas & Ramos ). Liggett & Chen () first
Kang & Lansey () proposed a novel pipe burst detec- introduced a transient model into water supply pipe network
tion method combined with a limit analysis method. In this leakage detection. It is called ITA when pipe leakage is
method, the pipe burst simulation is to add the node with a cer- detected using simulation results of a transient model and
tain diffusion coefficient diffuser. The specific steps are divided transient measurement data. The ITA method generally
into the following three parts. First, identify system pressure involves researching and modeling the behavior of water
and flow uncertainty using the limit analysis method, then per- supply systems under transient events. Transient events
form a pipe burst event simulation on each node, and finally which can be artificially induced (e.g. closing the valve), or
obtain the pipe burst sensitivity matrix of each node according which occur through natural causes (such as pipe burst),
to the structure of the pipe burst simulation. Second, deter- tend to cause the pipe network pressure or flow to change
mine the possible location of a pressure and flow monitoring significantly over a short time period. The pressure or flow
point based on the matrix of pipe burst sensitivity obtained change caused by transient events is big enough to character-
above. Third, determine the possible pipe burst position ize the information from water supply systems; however, how
according to the extent of the match between the specific to effectively extract useful information like the pressure or
burst sensitivity tables that are based on SCADA (Supervisory flow data from transient events is still a problem, for such
Control and Data Acquisition) monitoring data and the devel- information is usually overshadowed by various noise
oped burst sensitivity matrix. A simple pipe network pipe sources. In the ITA method (Kapelan et al. ), leakage
explosion simulation shows that this method has some val- detection is described as an optimization problem and its
idity. However, this method needs further validation if it is objective function is shown in formula (1):
applied to practical situations.
Based on similar principles, Farley () proposed and X
Nx X
Nt
Min SSE ¼ (pij   pij )2 (1)
demonstrated another pipe burst positioning method. This i¼1 j¼1

method obtains a Jacobian matrix by simulating a pipe


burst, then selects monitoring sites according to the Jaco- where: Nx, the location number of the pressure monitoring
bian matrix. Finally possible pipe burst locations are point; Nt, step interval numbering; SSE, the summation of
identified by comparing simulation results of the Jacobian mean square error between field pressure data and simulated
matrix and the actual pipe burst Jacobian matrix. The transient pressure data; pij , pressure data at pressure moni-
author verified the method in several different DMA, and toring point i with time step j; pij, pressure analog data at
proved that it worked to some extent. pressure monitoring point i with time step j.

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
435 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

The actual pressure monitoring data is compared with signals could be used for leak detection, location, and
the simulation pressure data obtained from the transient quantification by ITA. This transient-based technique has
model, then the minimum mean square error between been shown to be successful in the detection and location
them is calculated, and lastly the location of the leakage of leaks of reasonable size, provided that physical and
point is determined. Leakage detection methods using an hydraulic characteristics of the system are known. However,
inverse transient model generally include the following it will be very difficult to apply to a buried leak in real sys-
main steps: tems considering that the signal will have multiple-random
fluctuations, and the limited manpower resources a utility
1. Pipe network transient events are artificially manufac-
has to know the physical and hydraulic characteristics of
tured by opening or closing fire hydrants or pumping
the system. Thus, this method can only be successfully
stations, thus the pressure or flow of the pipe network
applied in single, well-known and controlled transmission
changes significantly. However, it must be noted that
systems for the moment.
pressure and flow velocity caused by transient events
need to be controlled within the permissible range.
Time domain analysis and frequency domain analysis
2. The pressure at the selected monitoring points is
measured with a high-resolution pressure sensor.
Similar to ITA methods, time domain analysis (TDA) and
3. The model is corrected periodically until the end of the
frequency domain analysis (FDA) also take advantage of
convergence condition by comparing the actual monitor-
the information generated by transient events. However,
ing data and transient model simulation data.
what is different is that TDA and FDA methods do not
The ITA method has been carefully researched since its need to use the simulated data generated from a transient
introduction. However, the main effort has been focused on model, as there is often no available transient model, besides
the development of the mathematical part of the technique which, this kind of model is usually quite difficult to estab-
rather than on experimental validation or field testing. lish. In spite of this, these two methods also have to face
Some limited experiences from laboratory and field tests another difficult problem, namely the problem of signal
can be found from Vitkovsky et al. (), Stephens et al. attenuation. The only difference between TDA and FDA
(), Covas et al. (b) and Saldarriaga et al. (). lies in the different way of analyzing the pressure monitoring
To test the effectiveness of the transient analysis method, data. The TDA method generally does not involve any math-
Vitkovsky et al. () verified this method in the laboratory. ematical conversion. It analyzes the pressure monitoring
Experimental results show that the method has a certain data directly in the time domain, so it has the advantages
rationality and feasibility. The main advantage of ITA lies of intuition and preciseness.
in its simplicity and that it can be applied to any network Jönsson & Larson () first proposed the TDA method
topology in theory. However, it should be noted that there for the detection of leaks using the wave reflection method.
is some difficulty in making this type of approach practical. Such a method first generates wave pressure by a transient
First, the ITA requires accurate transient model and pipe event, then determines the position of the leakage point by
network boundary conditions, the model error is the main detecting and measuring the arrival time and the velocity
limiting factor applied to the actual pipe network. Second, of the reflected pressure wave. The arrival time of the
the method often requires a large number of high-sensitivity pressure wave consists of two parts: the arrival time from
sensors for high-frequency sampling. Third, no effective the transient event point to the leakage point, and the
method has yet been found to accurately distinguish a return time from the leakage point to measurement sites.
signal response caused by leakage or by other similar Based on the same principle, Silva et al. () proposed
noises. Similarly, Covas & Ramos () collected data the sparse wavelet method, which is mainly used to detect
from two pipe systems (a laboratory facility at Imperial Col- negative pressure waves caused by pipe bursts. Compared
lege London and a quasi-field system at Thames Water to other methods, the main advantage of the method
Utilities) to investigate to what extent transient pressure based on reflected waves is its simplicity. But how to

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
436 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

accurately monitor the weak pressure signal is still a pro- in the identification of signal similarity and time delay,
blem to be solved, because the pressure signals are often especially when the continuous acoustic emission signals
subject to background noise, especially in the case of a were affected by various disturbances and noise. However,
small leak. Inspired by the research work of Liou (), Vit- it must be noted that such methods need detailed and
kovsky et al. () proposed a new method for identifying specific authentication in the actual network.
pipeline leakage or blockage based on the principle of reflec- In contrast to TDA, FDA can have a certain mathemat-
tion. The location of the leak is determined according to the ical conversion of the pressure signal. Considering that the
position of the spikes, and the size of the leak is estimated signal not only changes over time, but is also related to infor-
depending on the size of the spikes. Although the results mation such as the frequency and phase, the signal frequency
show that the method has potential to become a tool for structure requires further analysis, and the signal will be
leakage detection, before this method can be applied to described in the frequency domain. Such methods also
the actual pipe network, there are still some issues to be need to use the information generated by the transient
solved, for example, how to accurately measure the pulse, event, but this time the transient event is usually induced
and how to determine the pulse which is caused by leakage by several cycle-driven devices, such as vibration valves,
in the presence of noise interference. Wang et al. () pro- which are often installed at the downstream end of the
posed a new leak detection technique based on TDA, and pipe. Through analyzing the frequency response plot when
the solution showed that the presence of a small leak leakage or no leakage exists in the pipe network, it can be
reduces the amplitudes of the resonant frequencies while determined whether leakage exists according to whether
its influence on the non-resonant frequencies is negligible. the formant is changed in the frequency response plot. Typi-
Compared to the acoustic based leak detection methods, cally, when leakage occurs, the formant of the frequency
the proposed method may be applied with a much greater response is lower than when there is no leakage. The use
measurement interval and is less influenced by the back- of frequency response methods for pipeline leakage detec-
ground noise. However, as this method is also based on tion was first suggested by Mpesha et al. (). Such a
transient events, it can only be used on single pipelines. method converts the pressure signal from the time domain
Since the wavelet transform analysis can effectively into the frequency domain using the Fast Fourier Transform,
extract information from the signal, it can carry multi-scale then determines leakage using the conversion matrix method
detailed analysis on function or signal through computing for analysis. Experimental results show that a very small leak
functions such as scaling and translation, so in recent can be detected and located using this method. Inspired by
years, some researchers have used wavelet analysis to treat cable fault locating methods, Covas et al. (a) put forward
pressure signals when performing leakage detection. Fer- a standing wave difference method for leakage detection.
rante & Brunone () tested the feasibility of such The method takes advantage of the vibration flow and spec-
techniques, and the results indicated that the use of such trum analysis principles. The authors performed related
technology could effectively identify pressure signal fluctu- simulations using several different construction forms of
ations caused by a small leakage. Taghvaei () did a pipe network, and the results showed that the method had
laboratory test, and the result showed that the combined some validity. However, such methods have not been vali-
wavelet transform and cepstrum method is possible for the dated by any experiments or field data.
detection and location of even small leaks in pipe networks. From relevant research results, the method based on
Wang et al. () presented an improved cross-correlation transient events has the potential to become a more effective
algorithm for high-precision pipeline leak detection based tool for leakage detection. But it is undeniable that the
on wavelet transform and energy feature extraction. To method still has a long way to go before it becomes a prac-
further verify the feasibility and superiority of the proposed tical technology. The main reason is that most tests of these
method in practice, a set of field testing signals were ana- methods are carried out in a simple pipe network under
lyzed with the improved algorithm, and the results showed strictly controlled conditions of the experiment and so far
that the improved method could achieve higher precision these methods have not been verified in actual networks,

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
437 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

especially the more complex pipe network systems. The effi- method was effective in identifying leakage hotspots regard-
ciency ranges of various leak detection methodologies using less of pipe material, and proved to be practical and useful in
pressure transients is shown in Table 3. assisting the engineer to quickly find leaks in large water dis-
Traditional hydraulic modeling techniques have tribution systems (Tables 4 and 5).
improved over the last two decades due to technical In summary, the numerical modeling methods are rela-
improvements to modeling software and advances in tively low in cost and simple in application, as they solve
SCADA systems. These techniques have been studied by complex problems of leakage detection and location by estab-
many researchers (Rossman ; Todini ; Wu & lishing a straightforward numerical model and with certain
Sage ; Giustolisi et al. , and many others). In one monitoring information. The methods dependent on the
of the most recent studies, Wu et al. () developed a rela- numerical model have some advantages; however, they may
tively new approach called pressure dependent leakage have some drawbacks, because there is a need for accurate
detection (PDLD) as a hydraulic model for identifying the pipe information and related parameters which cannot
leakage. Two case studies, one in Thailand and the other usually be obtained to create numerical models. In view of
in the UK, have been undertaken by using the PDLD this, with the development of technology, another type of
method together with step-testing and acoustic noise logging leakage detection method, namely non-numerical modeling
devices, respectively. The results obtained with PDLD were methods, has gradually increased in recent years.
successful in predicting the leak while both hardware-based To sum up, categories and characteristics of leakage
methods failed. The studies illustrated that the PDLD detection technology are shown in Table 5.

Table 3 | Efficiency ranges of various leak detection methodologies using pressure transients

Transient Inspection range


methodology Case study (pipeline length) (m) Detectable leak size (l/s) Location precision (m) Reference

ITA Real 5,936 3 50 Covas et al. (b)


ITA Real Network 1 – Saldarriaga et al. ()a
ITA Laboratory 272 0.12 5 Covas & Ramos ()
Quasi-field system 1,280 0.35 20
TDA Laboratory 37.2 0.01 0.38 Wang et al. ()
FDA Numerical 2,000 4.73 <500 Lee et al. ()
a
This case study did not mention the location precision but gave the accuracy of leakage discharge estimation.

Table 4 | Application, results, benefits and defects of various leakage control techniques

Results
Technique Application obtained Benefits Defects Reference

ANN DMA (UK) Effective Adaptive, effective and on time Large amounts of data Mounce et al.
required for training and ()
DMA Effective updating Nazif et al.
(Tehran) ()
Kalman DMA (UK) Effective Faster speed and efficiency; does not require Hard to detect stable leaks Ye & Fenner
filtering large amounts of data ()
BISs DMA (UK) Promising Can be useful when data availability is limiting A great deal of data and Romano et al.
or when dealing with different kinds of errors computer power needed ()
that cannot be included in calculations for training and prediction

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
438 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

Table 5 | Leakage detection technology categories and characteristics

Methods Characteristics

Leakage Methods based Acoustic detection Listening rod Pinpoint the location of leakage, generally high cost
detection on hardware methods Leak correlator and time-consuming, not timely, only applies to
methods Leak noise loggers leakage detection of a small range
Non-acoustic Gas injection
detection Ground penetrating radar
methods technology
Infrared photography
Methods based Numerical Methods based on Generally low cost; detect and locate the leakage
on software modeling transient events: timely and accurately; determine the possible
methods ITA, TDA, FDA leakage area; cannot locate the leakage point
Traditional hydraulic precisely; application of more sophisticated
model algorithms and principles needed
Non-numerical Artificial neural network,
modeling Bayesian inference
methods system, Golden section
method, adaptive
Kalman filtering

Non-numerical model methods artificial neural networks and fuzzy inference systems, the
results show that the method can effectively and timely con-
Non-numerical models analyze monitoring data combined duct online pipe burst tests. Aksela et al. () have also
with tools such as data mining or artificial intelligence algor- done some research work related to artificial neural net-
ithms, and then identify possible leakage areas based on works. To obtain a reasonable prediction, it is not difficult
certain rules or principles, without resorting to simulation to find that using artificial neural networks to detect leakage
results of the model. Such methods can also be called usually requires a lot of historical data (usually several
data-driven approaches, because they need to analyze months of data) to train the neural network, and the
data, find their own rules from large amounts of data, and neural network needs updating every month. Therefore,
ultimately determine the possible leakage points. Compared the efficiency of these methods is usually lower. Also, the
with approaches based on transient events, the sampling fre- methods are not able to detect leakage quickly because the
quency at the monitoring points of non-numerical modeling training time is usually relatively long, and that often leads
methods is much lower, although both methods need to use to alarm delay.
data from monitoring equipment. There is no need to estab- Considering the problems a traditional artificial neural
lish a hydraulic model for non-numerical modeling network has, Ye & Fenner () proposed an adaptive
methods, therefore detailed information and parameters of Kalman filtering method to detect pipe bursts. Compared
the pipeline and equipment are not required, this is a signifi- with the artificial neural network method, the adaptive
cant feature of such methods. Kalman filtering method has a higher speed and faster detec-
Mounce et al. () proposed a method combining arti- tion efficiency. More importantly, it does not require large
ficial neural networks with a fuzzy inference system to amounts of training data, thus avoiding effects caused by
detect pipe bursts, and then to validate the method through data error or lack of data. In this method, the adaptive
field data of several DMA. First the probability density func- Kalman filtering works as a tool to build a normal water
tion is constructed to speculate the flow curve of the future mode. It can determine whether the system downstream
by training artificial neural networks with adequate histori- has anomalies (such as pipe bursts) by the residual of the
cal data, then the fuzzy inference system is used for filter which is the difference between the measurement
classification. Considering the respective advantages of and the filter estimation. To test and validate the adaptive

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
439 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

Kalman filtering burst detection method, it has been applied Finally, developing ways of combining hardware-based
to two kinds of UK DMA data. Tests showed that the test methods with software-based methods effectively is the
results of this method are in good agreement with the his- trend for future pipe burst and leakage research, that is to
torical operating results of the pipe network. Compared say, developing a compound method (e.g. using software-
with the pressure monitoring data, flow monitoring data based methods to minimize the possible leakage area first,
are more sensitive to pipe bursts. and then using hardware to pinpoint the location of leakage)
Other methods, such as the Bayesian inference system which enables the water company personnel to react more
(Poulakis et al. ; Rougier ; Puust et al. ; quickly with lower cost in the case of burst/leak events.
Romano et al. ), and the Golden section method (Yama- Although not exhaustive, this review could be a valuable
noto et al. ) are all non-numerical modeling methods. reference resource for practitioners and researchers dealing
With the rapid development of hydro-sensing technology with water loss management in distribution systems.
and on-line monitoring technology, non-numerical model-
ing methods have achieved initial success and are
expected to become effective tools for detection and identi- ACKNOWLEDGEMENTS
fication of small and medium pipe bursts. Nevertheless,
there is much room for improvement in terms of testing The authors would like to acknowledge the financial support
reliability and timeliness. Moreover, whether a pipe burst from the National Key Project on Water Pollution Control of
has occurred in a particular area network can be more accu- China (ZX201207408-002) and National Science Foundation
rately found (for example, DMA) with such methods, of China (51378374 and 51478326).
without giving any precise information about the location
of the pipe burst.
REFERENCES

Aksela, K., Aksela, M. & Vahala, R.  Leakage detection in a


CONCLUSIONS AND RECOMMENDATIONS real distribution network using a SOM. Urban Water Journal
6 (4), 279–289.
Burst/leakage detection and location methods have come a Covas, D. & Ramos, H.  Hydraulic transients used for leakage
long way since the mid-1950s, and significant advances have detection in water distribution systems. In: Proceedings of the
4th Conference on Water Pipeline Systems: Managing
been made in the past in both hardware-based and software- Pipeline Assets in an Evolving Market, York, UK, ASCE,
based techniques. According to the review presented here, pp. 227–241.
conclusions and future work recommendations are made Covas, D. & Ramos, H.  Case studies of leak detection and
location in water pipe systems by inverse transient analysis.
as follows.
Journal of Water Resources Planning and Management
The hardware-based methods are still superior in terms 136 (2), 248–257.
of detection accuracy; however, they also remain much Covas, D., Ramos, H. & Almeida, A. B. a Standing wave
more expensive to use than the software-based methods. difference method for leak detection in pipeline systems.
Journal of Hydraulic Engineering 131 (12), 1106–1116.
With regard to timely detection and location, the software-
Covas, D., Ramos, H., Young, A., Graham, N. & Maksimovic, C.
based methods are much better. b Uncertainties of leak detection by means of hydraulic
To sum up, each method has its own advantages and transients: from the lab to the field. In: Proceedings of
CCWI2005, Water Management for the 21st Century,
drawbacks. In the hardware-based methods, both the leak
University of Exeter, UK, pp. 143–148.
correlator and the thermal infrared imaging method are Farley, B., Mounce, S. R. & Boxall, J. B.  Development and
most promising, because they have high accuracy and a field validation of a burst localisation methodology. Journal
wide detection range. While in the software-based methods, of Water Resources Planning and Management 139 (6),
604–613.
the AI methods are quite promising due to the development
Ferrante, M. & Brunone, B.  Pipe system diagnosis and leak
of hydro-sensor technology and real-time online data moni- detection by unsteady-state test: wavelet analysis. Advances
toring systems. in Water Resources 26, 107–116.

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
440 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

Giustolisi, O., Kapelan, Z. & Savic, D.  A hydraulic simulation Nazif, S., Karamouz, M., Tabesh, M. & Moridi, A.  Pressure
model for pipe networks with leakage outflows and pressure- management model for urban water distribution networks.
driven demands. In: World Environmental and Water Water Resources Management 24, 437–458.
Resources Congress 2007, ASCE, pp. 1–15. Poulakis, Z., Valougeorgis, D. & Papadimitriou, C.  Leakage
Hunaidi, O.  Ground-penetrating radar for detection of leaks detection in water pipe networks using a Bayesian
in buried plastic water distribution pipes. In: Proceedings of probabilistic framework. Probabilistic Engineering
7th International Conference on Ground-Penetrating Radar, Mechanics 18 (4), 315–327.
Lawrence, KS, USA, pp. 783–786. Puust, R., Kapelan, Z., Savic, D. & Koppel, T.  Probabilistic leak
Hunaidi, O., Chu, W., Wang, A. & Guan, W.  Detecting leaks detection in pipe networks using the SCEM-UA algorithm.
in plastic pipes. Journal American Water Works Association In: Proceedings of the 8th Annual Water Distribution Systems
92 (2), 82–94. Analysis Symposium, ASCE, Cincinnati, OH, USA, pp. 1–12.
Hunaidi, O., Wang, A., Bracken, M., Gambino, T. & Fricke, C. Puust, R., Kapelan, Z., Savic, D. & Koppel, T.  A review of
 Acoustic methods for locating leaks in municipal water methods for leakage management in pipe networks. Urban
pipe networks. In: International Conference on Water Water Journal 7 (1), 25–45.
Demand Management, Dead Sea, Jordan, pp. 1–14. Rajtar, J. M. & Muthiah, R.  Pipeline leak detection system for
Jönsson, L. & Larson, M.  Leak detection through hydraulic oil and gas flowlines. Journal of Manufacturing Science and
transient analysis. In: Pipeline Systems (B. Coulbeck & E. Engineering 119 (1), 105–109.
Evans, eds). Kluwer Academic, Dordrecht, pp. 273–286. Romano, M., Kapelan, Z. & Savic, D. A.  Bayesian-based
Kang, D. & Lansey, K.  A novel approach to detect pipe burst online burst detection in water distribution systems. In:
in water distribution network. Journal of Water Resources Integrating Water Systems (J. Boxall & C. Maksimovic, eds).
Planning and Management 140 (1), 121–127. Taylor and Francis Group, London, pp. 331–337.
Kapelan, Z. S., Savic, D. A. & Walters, G. A.  A hybrid inverse Romano, M., Kapelan, Z. & Savić, D. A.  Burst detection and
transient model for leakage detection and roughness location in water distribution systems. In: ASCE World
calibration in pipe networks. Journal of Hydraulic Research Environmental and Water Resources Congress 2011, Palm
41 (5), 481–492. Springs, California, USA, pp. 166–174.
Lee, P. J., Vitkovsky, J. P., Lambert, M. F., Simpson, A. R. & Liggett, Rossman, L. A.  EPANET2 User’s Manual, US Environmental
J. A.  Frequency domain analysis for detecting pipeline Protection Agency, Cincinnati.
leaks. Journal of Hydraulic Engineering 131 (7), 596–604. Rougier, J.  Probabilistic leak detection in pipelines using the
Liggett, J. A. & Chen, L. C.  Inverse transient analysis in pipe mass imbalance approach. Journal of Hydraulic Research 43
networks. ASCE Journal of Hydraulic Engineering 120 (8), (5), 556–566.
934–955. Saldarriaga, J. G., Fuentes, D. A. A. & Galvis, L. F. C. 
Liou, J. C. P.  Mass imbalance error of water hammer Implementation of the hydraulic transient and steady
equations and leak detection. Journal of Fluids Engineering oscillatory flow with genetic algorithms for leakage detection
116 (1), 103–109. in real water distribution networks. In: Proceedings of the 8th
Mohamed, F. & Osama, M.  Automated detection and Annual Water Distribution Systems Analysis Symposium,
location of leaks in water mains using infrared photography. Cincinnati, OH, USA, ASCE, pp. 1–14.
Journal of Performance of Constructed Facilities 3, 242–248. Shimanskiy, S., Iljima, T. & Naoi, Y.  Development of
Mounce, S. R., Boxall, J. B. & Mexell, J.  Development and microphone leak detection technology on Fugen NPP.
verification of an online artificial intelligence system for Progress in Nuclear Energy 43 (1–4), 357–364.
detection of bursts and other abnormal flows. Journal of Water Silva, R., Buiatta, C., Cruz, S. & Pereira, J.  Pressure wave
Resources Planning and Management 136 (3), 309–318. behavior and leak detection in pipelines. Computer and
Mpesha, W., Gassman, S. L. & Chaudhry, M. H.  Leak Chemical Engineering 20, S491–S496.
detection in pipes by frequency response method. Journal of Sima, V., Behzad, M. & Karim, S.  Leak detection in
Hydraulic Engineering 127 (2), 134–147. transportation pipelines using feature extraction and KNN
Muggleton, J. M. & Brennan, M. J.  Leak noise propagation classification. In: ASCE Pipelines Specialty Conference 2009,
and attenuation in submerged plastic water pipes. Journal of San Diego, CA, USA, pp. 580–589.
Sound and Vibration 278 (3), 527–537. Stephens, M., Lambert, M. F., Simpson, A. R., Vitkovsky, J. P. &
Muggleton, J. M., Brennan, M. J., Pinnington, R. J. & Gao, Y.  Nixon, J.  Field tests for leakage, air pocket, and discrete
A novel sensor for measuring the acoustic pressure in buried blockage detection using inverse transient analysis in water
plastic water pipes. Journal of Sound and Vibration 295 (3–5), distribution pipes. In: Proceedings of the 6th Water Distribution
1085–1098. Systems Analysis Symposium, World Water and Environmental
Mutikanga, H. E., Sharma, S. K. & Vairavamoorthy, K.  Resources Congress, ASCE, Salt Lake City, UT, USA, pp. 1–10.
Methods and tools for managing losses in water distribution Taghvaei, S. M.  Fast leak detection and location of water
systems. ASCE Journal of Water Resources Planning and pipelines based using orthogonal wavelet transform. In:
Management 2, 166–174. ICPTT 2009, China, ASCE, pp. 186–192.

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk
441 R. Li et al. | A review of methods for burst/leakage detection and location Water Science & Technology: Water Supply | 15.3 | 2015

Thornton, J.  Water Loss Control Manual. McGraw-Hill, boundary condition: leak detection in pipe networks using
New York. coded transients. In: Proceedings of the 8th Annual Water
Todini, E.  Towards realistic extended period simulations Distribution Systems Analysis Symposium, ASCE,
(EPS) in looped pipe network. In: Proceedings of Water Cincinnati, OH, USA, pp. 1–10.
Distribution Systems Analysis Symposium, ASCE, Wang, X. X., Zhao, M. & Li, S. Z.  An improved cross-
Cincinnati, USA, August 2006, pp. 1–16. correlation algorithm based on wavelet transform and energy
Vitkovsky, J. P., Simpson, A. R., Lambert, M. F. & Wang, X. J.  feature extraction for pipeline leak detection. In: ICPTT
An experimental verification of the inverse transient 2012, Wuhan, China, ASCE, pp. 577–591.
technique. In: Proceedings of the 6th Conference on Wu, Z. Y. & Sage, P.  Water loss detection via genetic
Hydraulics in Civil Engineering, Hobart, Australia, ASCE, algorithm optimization-based model calibration. In:
pp. 373–380. Proceedings of Water Distribution Systems Analysis
Vitkovsky, J. P., Lee, P. J., Stephens, M. L., Lambert, M. F., Simpson, Symposium, ASCE, Cincinnati, USA, August 2006, pp. 1–11.
A. R. & Liggett, J. A.  Leak and blockage detection in Wu, Z. Y., Burrows, R., Moorcroft, J., Croxton, N. & Limanond, S.
pipelines via an impulse response method. In: Proceedings of  Pressure-dependent leakage detection method compared
Pumps, Electromechanical Devices and Systems Applied to with conventional techniques. In: Water Distribution
Urban Water Management, Vol. 1 (E. Cabrera & E. Cabrera Jr, Systems Analysis 2010, Tucson, Arizona, USA, ASCE,
eds). Valencia, Spain, ASCE, pp. 423–430. pp. 1083–1092.
Vítkovský, J., Lambert, M., Simpson, A. & Liggett, J.  Yamanoto, T., Fujimoto, Y., Ashiki, T., Kurokawa, F. & Tonozuka,
Experimental observation and analysis of inverse transients Y.  Estimation of pipe break location in water
for pipeline leak detection. Journal of Water Resources distribution network. In: Proceedings of the IWA World
Planning and Management 133 (6), 519–530. Water Congress and Exhibition, IWA, Beijing, China,
Wang, X. J., Lambert, M. F., Simpson, A. R., Liggett, J. A. & Vitkovsky, pp. 10–14.
J. P.  Leak detection in pipelines using the damping of fluid Ye, G. L. & Fenner, R. A.  Kalman filtering of hydraulic
transients. Journal of Hydraulic Engineering 128 (7), 697–711. measurements for burst detection in water distribution
Wang, X. J., Simpson, A. R. & Lambert, M. F.  An analytical systems. Journal of Pipeline Systems Engineering and Practice
solution for the transients in a pipeline with a variable 2, 14–22.

First received 6 May 2014; accepted in revised form 3 December 2014. Available online 24 December 2014

Downloaded from http://iwaponline.com/ws/article-pdf/15/3/429/413734/ws015030429.pdf


by alaa.a.agala@cranfield.ac.uk

You might also like