PRESENTED BY:-
GAURAV BISWAS
BIT MESRA
 ABSTRACT
 INTRODUCTION
 Example and benefits
 LITERATURE REVIEW
 RESEARCH METHODOLOGY
 IMPLEMENTATION
 RESULT AND DISCUSSION
 CONCLUSIONs
 FUTURE SCOPE
 REFERENCEs
 The objective of this project is to locate and identify the
anomalies in an underground pipeline installation.
 Anomalies are identified and classified as structural damage
and Operational Maintenance also we have to trained the
Deep Learning model for Anomaly Detection and
Classification.
 For this we are using two techniques:-
(a) Convolutional Neural Network (CNN).
(b) Faster RCNN.
 Automation of manual assessment of hours of video.
 Reduce the human errors and reduce risk of liability issues.
 Pipeline Anomaly Detection is an automated Condition
Assessment System for pipeline networks. It reduces
manual efforts and time needed to review and code
video scans.
 It uses Artificial Intelligence (AI) and advanced neural
networks to identify, grade and score pipe anomalies.
 Videos of pipeline are generated by a camera-mounted
rover into the underground pipelines.
 It automates the process of identification of defects in
pipeline videos and generates a comprehensive
inspection report.
Fig: Camera-mounted rovers to record video of underground
sewer pipes.
Fig: Sample Anomalies and annotated images using the Pipeline
Anomaly Detection.
Saves Time.
Reduces Scanning Costs.
Provides High Accuracy.
Increases Availability of Experts.
Optimizes Maintenance Decisions.
Improves Customer Service.
Fig: Case Study of Pipeline Anomaly Detection.
AUTHOR YEAR STUDY FINDING
S. Safari
&
M.
Aliyari
2005 Detection and isolation
of interior defects
based on image
processing, Journal of
Pipeline Systems
Engineering and
Practice.
Principles regarding the learning
algorithm or deep architectures in
particular of those building blocks
unsupervised learning for single-
layer models and for pipeline
systems.
S. Kumar
& D.M.
Abraham
2017 Automated defect
classification in sewer
closed circuit using
CNN.
Investigated land area is labeled
into water and the classification is
compared to per-pixel works.
R.
Fenner
2009 Approaches to sewer
maintenance a review,
Urban Water pipeline
anomaly detection.
Using this approach we have to
reconstruct the frames from the
video and from that frames again
extracted the I- frames from it and
then display the result.
 Using Convolutional Neural Network (CNN) techniques for
implementing deep neural networks.
 Extracting Frames from the underground pipeline video and
then train those frames with this algorithm.
 Provide the underground pipeline frames dataset as an input.
 We have to use Optical Character Recognition (OCR) and
Pytesseract for extracting the text from the given images.
 Use OCR and Pytesseract for extracting text from image got
35% and 60% accuracy.
Also use Autoencoders for clearing the blur
images.
Extraction of I- Frames from the dataset using
different codes.
Detecting defects in the given video with a
camera-mounted rover and create a GUI
Application to get the output.
Got 90% accuracy using Faster RCNN.
For Extracting the text from the given pipeline video we
use:
 (a) Optical Character Recognition (OCR)
 (b) Pytesseract
(a) Optical Character Recognition (OCR):-
 It is the method of extracting text from the given image.
 It converts the image to gray scale, after that it smooth the image
and then it filters.
 Detect lines, words and characters.
(b) Tesseract:-
Python-tesseract is a tool used for OCR.
It is used an API to extract printed text from images.
It supports a wide variety of languages.
Tesseract was dependant on the multi-stage process
where we can differentiate steps like Word Finding,
Line Finding and Character Classification.
 Autoencoders:
 An autoencoder is a type of artificial neural network
used to learn efficient data in an unsupervised manner.
 The aim of an autoencoder is to learn a representation
for a set of data, typically for dimensionality reduction,
by training the network to ignore signal “noise”.
Fig: After performing Autoencoder this is the
outcome.
 If we want to extract just a single frame (I-Frame)
from the video into an image file we use I frame for
that.
 An I Frame (Intra coded frame) is a complete image
like a JPG or JPEG image file.
 The basic need is to compare the quality of the image
from the dataset and the actual I Frame image.
Fig: Actual Graphical User Interface (GUI) of Pipeline Anomaly
Detection.
 (A) Convolutional Neural Network:
 In deep learning, a convolutional neural network is a class of
deep neural networks, most commonly applied to analyzing
visual imagery.
 They are regularized versions of multilayer perceptrons. It
usually mean fully connected networks, that is, each neuron
in one layer is connected to all neurons in the next layer.
output
The Accuracy for Convolutional Neural Network (CNN) for this dataset is 70%
In this model we train our dataset into 50 epoch and finally get this
accuracy.
(B) FASTER RCNN:
Faster R-CNN with CNN features is the object
detection architecture and the pioneer approach
that applies deep models to object detection.
The function of this network is to generate
good features from the image.
The output of this network maintains the shape
and structure of the original image.
Fig: The architectures of Faster RCNN and Region Proposal Network
(RPN).
The Accuracy for Faster RCNN for this dataset is 90%.
In this model we train our dataset into 50 epoch and finally get this
accuracy.
 Using CNN and Faster RCNN to train our dataset for Pipeline
Anomaly Detection.
 A combination of CCTV, microwave sensor, neutron
and gamma ray, and hydro chemical sensors would be a
powerful tool.
 The most significant factor requiring water authorities to
undertake such exercises, however, will be the public
perception of sewer leakage.
 In our project the accuracy for CNN is near about 70% and
for Faster RCNN it is coming 90%.
Any deep learning application that we are using has big
scope in future. The function of output video frames needs to
be improved in the next stage of the research.
In addition, the output needs to be enhanced by including
more information (e.g., condition grade of the defects) to
realize the automation of the pipeline assessment.
Also the size of the training dataset is to cover as many
features as possible, which will lead to improving the
performance of the model.
[1] R. Fenner, 2002, Approaches to sewer maintenance a review Urban Water, New York, IEEE.
[2] K. Baah, B. Dubey, R. Harvey, 2009, A risk-based approach to sanitary sewer pipe asset management,
Germany, IEEE.
[3] M.D. Yang, T.C Su, 2014, Automated diagnosis of sewer pipe defects based on machine learning approaches,
Australia, IEEE, ICLR.
[4] Xinchen Yan, Jimei Yang, 2016, Conditional Image Generation from Visual Attributes, North Korea, IEEE,
ECCV
[5] O. Moselhi, 2004, Automated detection of surface defects in water and sewer pipes, Washington D.C, IEEE.
[6] S.K. Sinha, 2003, Computer vision techniques for automatic structural assessment of underground pipes,
India ECCV, IEEE.
[7] M.J. Anbari, 2017, Risk assessment model to prioritize sewer pipes inspection in wastewater collection
networks in Environ. Manag, Germany, IEEE ECCV .
[8] S.T. Ariaratnam, 2015, Financial outlay modeling for a local sewer rehabilitation strategy and Constr. Eng.
Manag, Russia, IEEE.
Pipeline anomaly detection

More Related Content

PPTX
False colouring
PDF
The International Journal of Engineering and Science (The IJES)
PDF
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
PDF
kanimozhi2019.pdf
PDF
Robust Malware Detection using Residual Attention Network
PDF
Self Attested Images for Secured Transactions using Superior SOM
PPTX
160205 NeuralArt - Understanding Neural Representation
PDF
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
False colouring
The International Journal of Engineering and Science (The IJES)
FPGA Based Pattern Generation and Synchonization for High Speed Structured Li...
kanimozhi2019.pdf
Robust Malware Detection using Residual Attention Network
Self Attested Images for Secured Transactions using Superior SOM
160205 NeuralArt - Understanding Neural Representation
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...

What's hot (20)

PDF
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
PDF
Mangesh_kothule_resume
PDF
Hf2513081311
PDF
IRJET- Study of SVM and CNN in Semantic Concept Detection
PDF
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
PDF
Automated Speech Recognition
PDF
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
PDF
Hardware software co simulation of edge detection for image processing system...
PDF
Deep Learning for Structure-from-Motion (SfM)
PDF
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
PDF
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
PDF
Neural Network Algorithm for Radar Signal Recognition
PPTX
Biometric presentation attack detection
PDF
I017425763
PDF
C04841417
PPTX
Single Image Depth Estimation using frequency domain analysis and Deep learning
PDF
H43044145
PDF
Optimization of image compression and ciphering based on EZW techniques
PDF
Wavelet Based Image Watermarking
PDF
Design and Analysis of Quantization Based Low Bit Rate Encoding System
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
Mangesh_kothule_resume
Hf2513081311
IRJET- Study of SVM and CNN in Semantic Concept Detection
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
Automated Speech Recognition
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
Hardware software co simulation of edge detection for image processing system...
Deep Learning for Structure-from-Motion (SfM)
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Neural Network Algorithm for Radar Signal Recognition
Biometric presentation attack detection
I017425763
C04841417
Single Image Depth Estimation using frequency domain analysis and Deep learning
H43044145
Optimization of image compression and ciphering based on EZW techniques
Wavelet Based Image Watermarking
Design and Analysis of Quantization Based Low Bit Rate Encoding System
Ad

Similar to Pipeline anomaly detection (20)

PDF
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
PDF
Image super resolution using Generative Adversarial Network.
PDF
Car Steering Angle Prediction Using Deep Learning
PDF
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
PPTX
Anomaly Detection with Azure and .NET
PDF
Real time Traffic Signs Recognition using Deep Learning
PDF
Text Recognition using Convolutional Neural Network: A Review
PDF
Devanagari Digit and Character Recognition Using Convolutional Neural Network
PDF
A Robust Automatic Meter Reading System based on Mask-RCNN
PPTX
06-08 ppt.pptx
PDF
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
PDF
VIDEO BASED SIGN LANGUAGE RECOGNITION USING CNN-LSTM
PDF
Dataset creation for Deep Learning-based Geometric Computer Vision problems
PDF
IRJET - Object Detection and Translation for Blind People using Deep Learning
PDF
IRJET-Cleaner Drone
PDF
Gesture Recognition System using Computer Vision
PDF
FACE COUNTING USING OPEN CV & PYTHON FOR ANALYZING UNUSUAL EVENTS IN CROWDS
PDF
SIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLE
PDF
IMAGE CAPTION GENERATOR USING DEEP LEARNING
PDF
A REVIEW ON IMPROVING TRAFFIC-SIGN DETECTION USING YOLO ALGORITHM FOR OBJECT ...
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
Image super resolution using Generative Adversarial Network.
Car Steering Angle Prediction Using Deep Learning
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
Anomaly Detection with Azure and .NET
Real time Traffic Signs Recognition using Deep Learning
Text Recognition using Convolutional Neural Network: A Review
Devanagari Digit and Character Recognition Using Convolutional Neural Network
A Robust Automatic Meter Reading System based on Mask-RCNN
06-08 ppt.pptx
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
VIDEO BASED SIGN LANGUAGE RECOGNITION USING CNN-LSTM
Dataset creation for Deep Learning-based Geometric Computer Vision problems
IRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET-Cleaner Drone
Gesture Recognition System using Computer Vision
FACE COUNTING USING OPEN CV & PYTHON FOR ANALYZING UNUSUAL EVENTS IN CROWDS
SIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLE
IMAGE CAPTION GENERATOR USING DEEP LEARNING
A REVIEW ON IMPROVING TRAFFIC-SIGN DETECTION USING YOLO ALGORITHM FOR OBJECT ...
Ad

More from GauravBiswas9 (11)

PPTX
SPARK ARCHITECTURE
PPTX
Spark architecture
PPT
PPTX
PPTX
2.5G Cellular Standards
PPT
Map reduce in BIG DATA
PPTX
Iot in healthcare
PPTX
Gsm vs gprs
PPTX
Circuit switch vs packet switch
PPTX
Channelization scheme in AMPS & GSM
PPTX
Big data analytics.
SPARK ARCHITECTURE
Spark architecture
2.5G Cellular Standards
Map reduce in BIG DATA
Iot in healthcare
Gsm vs gprs
Circuit switch vs packet switch
Channelization scheme in AMPS & GSM
Big data analytics.

Recently uploaded (20)

PDF
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PDF
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PPTX
introduction to high performance computing
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PPTX
Current and future trends in Computer Vision.pptx
PPTX
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
PDF
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
PPTX
Feature types and data preprocessing steps
PPTX
Amdahl’s law is explained in the above power point presentations
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPTX
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
PPTX
Software Engineering and software moduleing
Human-AI Collaboration: Balancing Agentic AI and Autonomy in Hybrid Systems
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
22EC502-MICROCONTROLLER AND INTERFACING-8051 MICROCONTROLLER.pdf
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
introduction to high performance computing
CyberSecurity Mobile and Wireless Devices
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
Level 2 – IBM Data and AI Fundamentals (1)_v1.1.PDF
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Current and future trends in Computer Vision.pptx
AUTOMOTIVE ENGINE MANAGEMENT (MECHATRONICS).pptx
ChapteR012372321DFGDSFGDFGDFSGDFGDFGDFGSDFGDFGFD
Feature types and data preprocessing steps
Amdahl’s law is explained in the above power point presentations
III.4.1.2_The_Space_Environment.p pdffdf
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
Graph Data Structures with Types, Traversals, Connectivity, and Real-Life App...
Software Engineering and software moduleing

Pipeline anomaly detection

  • 2.  ABSTRACT  INTRODUCTION  Example and benefits  LITERATURE REVIEW  RESEARCH METHODOLOGY  IMPLEMENTATION  RESULT AND DISCUSSION  CONCLUSIONs  FUTURE SCOPE  REFERENCEs
  • 3.  The objective of this project is to locate and identify the anomalies in an underground pipeline installation.  Anomalies are identified and classified as structural damage and Operational Maintenance also we have to trained the Deep Learning model for Anomaly Detection and Classification.  For this we are using two techniques:- (a) Convolutional Neural Network (CNN). (b) Faster RCNN.  Automation of manual assessment of hours of video.  Reduce the human errors and reduce risk of liability issues.
  • 4.  Pipeline Anomaly Detection is an automated Condition Assessment System for pipeline networks. It reduces manual efforts and time needed to review and code video scans.  It uses Artificial Intelligence (AI) and advanced neural networks to identify, grade and score pipe anomalies.  Videos of pipeline are generated by a camera-mounted rover into the underground pipelines.  It automates the process of identification of defects in pipeline videos and generates a comprehensive inspection report.
  • 5. Fig: Camera-mounted rovers to record video of underground sewer pipes.
  • 6. Fig: Sample Anomalies and annotated images using the Pipeline Anomaly Detection.
  • 7. Saves Time. Reduces Scanning Costs. Provides High Accuracy. Increases Availability of Experts. Optimizes Maintenance Decisions. Improves Customer Service.
  • 8. Fig: Case Study of Pipeline Anomaly Detection.
  • 9. AUTHOR YEAR STUDY FINDING S. Safari & M. Aliyari 2005 Detection and isolation of interior defects based on image processing, Journal of Pipeline Systems Engineering and Practice. Principles regarding the learning algorithm or deep architectures in particular of those building blocks unsupervised learning for single- layer models and for pipeline systems. S. Kumar & D.M. Abraham 2017 Automated defect classification in sewer closed circuit using CNN. Investigated land area is labeled into water and the classification is compared to per-pixel works. R. Fenner 2009 Approaches to sewer maintenance a review, Urban Water pipeline anomaly detection. Using this approach we have to reconstruct the frames from the video and from that frames again extracted the I- frames from it and then display the result.
  • 10.  Using Convolutional Neural Network (CNN) techniques for implementing deep neural networks.  Extracting Frames from the underground pipeline video and then train those frames with this algorithm.  Provide the underground pipeline frames dataset as an input.  We have to use Optical Character Recognition (OCR) and Pytesseract for extracting the text from the given images.  Use OCR and Pytesseract for extracting text from image got 35% and 60% accuracy.
  • 11. Also use Autoencoders for clearing the blur images. Extraction of I- Frames from the dataset using different codes. Detecting defects in the given video with a camera-mounted rover and create a GUI Application to get the output. Got 90% accuracy using Faster RCNN.
  • 12. For Extracting the text from the given pipeline video we use:  (a) Optical Character Recognition (OCR)  (b) Pytesseract (a) Optical Character Recognition (OCR):-  It is the method of extracting text from the given image.  It converts the image to gray scale, after that it smooth the image and then it filters.  Detect lines, words and characters.
  • 13. (b) Tesseract:- Python-tesseract is a tool used for OCR. It is used an API to extract printed text from images. It supports a wide variety of languages. Tesseract was dependant on the multi-stage process where we can differentiate steps like Word Finding, Line Finding and Character Classification.
  • 14.  Autoencoders:  An autoencoder is a type of artificial neural network used to learn efficient data in an unsupervised manner.  The aim of an autoencoder is to learn a representation for a set of data, typically for dimensionality reduction, by training the network to ignore signal “noise”.
  • 15. Fig: After performing Autoencoder this is the outcome.
  • 16.  If we want to extract just a single frame (I-Frame) from the video into an image file we use I frame for that.  An I Frame (Intra coded frame) is a complete image like a JPG or JPEG image file.  The basic need is to compare the quality of the image from the dataset and the actual I Frame image.
  • 17. Fig: Actual Graphical User Interface (GUI) of Pipeline Anomaly Detection.
  • 18.  (A) Convolutional Neural Network:  In deep learning, a convolutional neural network is a class of deep neural networks, most commonly applied to analyzing visual imagery.  They are regularized versions of multilayer perceptrons. It usually mean fully connected networks, that is, each neuron in one layer is connected to all neurons in the next layer. output
  • 19. The Accuracy for Convolutional Neural Network (CNN) for this dataset is 70% In this model we train our dataset into 50 epoch and finally get this accuracy.
  • 20. (B) FASTER RCNN: Faster R-CNN with CNN features is the object detection architecture and the pioneer approach that applies deep models to object detection. The function of this network is to generate good features from the image. The output of this network maintains the shape and structure of the original image.
  • 21. Fig: The architectures of Faster RCNN and Region Proposal Network (RPN).
  • 22. The Accuracy for Faster RCNN for this dataset is 90%. In this model we train our dataset into 50 epoch and finally get this accuracy.
  • 23.  Using CNN and Faster RCNN to train our dataset for Pipeline Anomaly Detection.  A combination of CCTV, microwave sensor, neutron and gamma ray, and hydro chemical sensors would be a powerful tool.  The most significant factor requiring water authorities to undertake such exercises, however, will be the public perception of sewer leakage.  In our project the accuracy for CNN is near about 70% and for Faster RCNN it is coming 90%.
  • 24. Any deep learning application that we are using has big scope in future. The function of output video frames needs to be improved in the next stage of the research. In addition, the output needs to be enhanced by including more information (e.g., condition grade of the defects) to realize the automation of the pipeline assessment. Also the size of the training dataset is to cover as many features as possible, which will lead to improving the performance of the model.
  • 25. [1] R. Fenner, 2002, Approaches to sewer maintenance a review Urban Water, New York, IEEE. [2] K. Baah, B. Dubey, R. Harvey, 2009, A risk-based approach to sanitary sewer pipe asset management, Germany, IEEE. [3] M.D. Yang, T.C Su, 2014, Automated diagnosis of sewer pipe defects based on machine learning approaches, Australia, IEEE, ICLR. [4] Xinchen Yan, Jimei Yang, 2016, Conditional Image Generation from Visual Attributes, North Korea, IEEE, ECCV [5] O. Moselhi, 2004, Automated detection of surface defects in water and sewer pipes, Washington D.C, IEEE. [6] S.K. Sinha, 2003, Computer vision techniques for automatic structural assessment of underground pipes, India ECCV, IEEE. [7] M.J. Anbari, 2017, Risk assessment model to prioritize sewer pipes inspection in wastewater collection networks in Environ. Manag, Germany, IEEE ECCV . [8] S.T. Ariaratnam, 2015, Financial outlay modeling for a local sewer rehabilitation strategy and Constr. Eng. Manag, Russia, IEEE.