Detecting leaks through AMR data analysis

被引:3
|
作者
Claudio, K. [1 ]
Couallier, V. [2 ]
Leclerc, C. [1 ]
Le Gat, Y. [3 ]
Litrico, X. [1 ]
Saracco, J. [4 ]
机构
[1] LyRE Lyonnaise Eaux, 91 Rue Paulin, F-33000 Bordeaux, France
[2] Inst Math Bordeaux, F-33405 Talence, France
[3] IRSTEA Bordeaux, Team REBX, F-33612 Cestas, France
[4] INRIA Bordeaux Sud Ouest, Team CQFD, F-33405 Talence, France
来源
关键词
automatic meter reading; leakage detection; statistical process control;
D O I
10.2166/ws.2015.071
中图分类号
X [环境科学、安全科学];
学科分类号
08 ; 0830 ;
摘要
Automatic meter reading (AMR) provides real-time consumption data, enabling to collect a huge amount of information about daily, even hourly, consumptions. It is then easy to assess lost volumes on the network, using supplied volumes information. However, because of the multiple components of water losses, the metering and calculation inaccuracies, the occurrence of new (detectable) leaks is hard to detect. Therefore this paper aims at proposing a user-friendly statistical tool that helps to quickly and reliably detect new leakage occurrence. The use of process control chart (like exponential weighted moving average) enables us to detect changes in the water loss time series, in particular, a new leak occurrence.
引用
下载
收藏
页码:1368 / 1372
页数:5
相关论文
共 50 条
  • [31] Detecting traffic anomalies through aggregate analysis of packet header data
    Kim, SS
    Reddy, ALN
    Vannucci, M
    NETWORKING 2004: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS, 2004, 3042 : 1047 - 1059
  • [32] Outage management through AMR systems using an intelligent data filter
    Sridharan, K
    Schulz, NN
    IEEE TRANSACTIONS ON POWER DELIVERY, 2001, 16 (04) : 669 - 675
  • [33] Cyclone: Detecting Contention-Based Cache Information Leaks Through Cyclic Interference
    Harris, Austin
    Wei, Shijia
    Sahu, Prateek
    Kumar, Pranav
    Austin, Todd
    Tiwari, Mohit
    MICRO'52: THE 52ND ANNUAL IEEE/ACM INTERNATIONAL SYMPOSIUM ON MICROARCHITECTURE, 2019, : 57 - 72
  • [34] Detecting Memory Leaks through Introspective Dynamic Behavior Modeling using Machine Learning
    Lee, Sangho
    Jung, Changhee
    Pande, Santosh
    36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 814 - 824
  • [35] Detecting Cognitive Causes of Confidentiality Leaks
    Ruksenas, R.
    Curzon, P.
    Blandford, A.
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2007, 183 (SPEC. ISS.) : 21 - 38
  • [36] DETECTING AND LOCATING THE SMALLEST LEAKS EARLY
    JAX, P
    NUCLEAR ENGINEERING INTERNATIONAL, 1994, 39 (485): : 22 - 24
  • [37] Privacy Leaks through Data Hijacking Attack on Mobile Systems
    Zhang, Daojuan
    Guo, Yuanfang
    Guo, Dianjie
    Yu, Guangming
    4TH ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND APPLICATIONS (ITA 2017), 2017, 12
  • [38] DETECTING LEAKS TO REDUCE ENERGY COSTS
    VALENTI, M
    MECHANICAL ENGINEERING, 1995, 117 (07) : 98 - 100
  • [39] Detecting heat exchanger leaks by listening
    不详
    CHEMICAL ENGINEERING, 1997, 104 (01) : 125 - 125
  • [40] Ultrasonic techniques for detecting helium leaks
    Sheen, SH
    Chien, HT
    Raptis, AC
    SENSORS AND ACTUATORS B-CHEMICAL, 2000, 71 (03) : 197 - 202