Leak detection of pipeline: An integrated approach of rough set theory and artificial bee colony trained SVM

نویسندگان

  • Santosh Kumar Mandal
  • Felix T. S. Chan
  • Manoj Kumar Tiwari
چکیده

The generation of leak along the pipeline carrying crude oils and liquid fuels results enormous financial loss to the industry and also affects the public health. Hence, the leak detection and localization problem has always been a major concern for the companies. In spite of the various techniques developed, accuracy and time involved in the prediction is still a matter of concern. In this paper, a novel leak detection scheme based on rough set theory and support vector machine (SVM) is proposed to overcome the problem of false leak detection. In this approach, ‘rough set theory’ is explored to reduce the length of experimental data as well as generate rules. It is embedded to enhance the decision making process. Further, SVM classifier is employed to inspect the cases that could not be detected by applied rules. For the computational training of SVM, this paper uses swarm intelligence technique: artificial bee colony (ABC) algorithm, which imitates intelligent food searching behavior of honey bees. The results of proposed leak detection scheme with ABC are compared with those obtained by using particle swarm optimization (PSO) and one of its variants, so-called enhanced particle swarm optimization (EPSO). The experimental results advocate the use of propounded method for detecting leaks with maximum accuracy. 2011 Elsevier Ltd. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BeeID: intrusion detection in AODV-based MANETs using artificial Bee colony and negative selection algorithms

Mobile ad hoc networks (MANETs) are multi-hop wireless networks of mobile nodes constructed dynamically without the use of any fixed network infrastructure. Due to inherent characteristics of these networks, malicious nodes can easily disrupt the routing process. A traditional approach to detect such malicious network activities is to build a profile of the normal network traffic, and then iden...

متن کامل

An Improved K-Means with Artificial Bee Colony Algorithm for Clustering Crimes

Crime detection is one of the major issues in the field of criminology. In fact, criminology includes knowing the details of a crime and its intangible relations with the offender. In spite of the enormous amount of data on offenses and offenders, and the complex and intangible semantic relationships between this information, criminology has become one of the most important areas in the field o...

متن کامل

INVERSE FREQUENCY RESPONSE ANALYSIS FOR PIPELINES LEAK DETECTION USING THE PARTICLE SWARM OPTIMIZATION

Inverse Transient Analysis (ITA) is a powerful approach for leak detection of pipelines. When the pipe transient flow is analyzed in frequency domain the ITA is called Inverse Frequency Response Analysis (IFRA). To implement an IFRA for leak detection, a transient state is initiated in the pipe by fast closure of the downstream end valve. Then, the pressure time history at the valve location is...

متن کامل

Integrated Well Placement and Completion Optimization using Heuristic Algorithms: A Case Study of an Iranian Carbonate Formation

Determination of optimum location for drilling a new well not only requires engineering judgments but also consumes excessive computational time. Additionally, availability of many physical constraints such as the well length, trajectory, and completion type and the numerous affecting parameters including, well type, well numbers, well-control variables prompt that the optimization approaches b...

متن کامل

A hybridization of evolutionary fuzzy systems and ant Colony optimization for intrusion detection

A hybrid approach for intrusion detection in computer networks is presented in this paper. The proposed approach combines an evolutionary-based fuzzy system with an Ant Colony Optimization procedure to generate high-quality fuzzy-classification rules. We applied our hybrid learning approach to network security and validated it using the DARPA KDD-Cup99 benchmark data set. The results indicate t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Expert Syst. Appl.

دوره 39  شماره 

صفحات  -

تاریخ انتشار 2012