Efficient method for localizing leaks in water supply pipe network based on valve operations and online water metering

11326977 · 2022-05-10

Assignee

Inventors

Cpc classification

International classification

Abstract

The present disclosure belongs to the field of municipal engineering and urban water supply network, and provides an efficient method for localizing leaks in a districted metering area (DMA) of water supply pipe networks based on valve operations and online water metering, which is implemented in multiple stages to gradually reduce the leaking area. At each stage, the DMA is firstly decomposed into two sub-areas using an optimized valve operation strategy determined by a minimized objective function, wherein a graph theory-based method is used for the solution. Then the sub-areas containing leaks are identified through online water balance analysis based on smart demand meters, thereby reducing the leaking area. The minimum leaking area is identified with the least number of valve operations. Compared with the traditional methods, the method of the present disclosure can obviously improve the efficiency and accuracy of leak localization and is easy to implement.

Claims

1. An efficient method for localizing leaks in water supply pipe networks based on valve operations and online water metering, wherein, existing valves in a district metering area DMA are decomposed into two sub-areas by closing valves following an optimal strategy, and the sub-area containing leaks is identified from online water balance analysis based on smart demand meters, thereby reducing the area containing leaks; the strategy of combining valve operations with water balance analysis is repeatedly implemented to gradually reduce the leaking area until no valve operation is capable of further reducing the leaking area; wherein, the method further comprises steps of: 1) using a graph theory-based method to find out valve closing strategies V.sub.s={v.sub.1, v.sub.2, . . . , v.sub.N}; that is capable of decomposing the DMA into two sub-areas, which form a set V={v.sub.1, v.sub.2, . . . , v.sub.S}; wherein, N is a total number of operable valves in the DMA, and S is a total number of obtained valve closing strategies; v.sub.n∈{0,1} represents the state of a valve n, 0 indicating being closed, and 1 indicating being open; decomposing the DMA into two sub-areas by the valve closing strategies V.sub.s, which is expressed as G=G.sub.1(V.sub.s)∪G.sub.2(V.sub.s), in which G is a graph of the DMA, vertices in the graph represent node elements in the pipe network, edges represent link elements in the pipe network, and G.sub.1 and G.sub.2 represent the two sub-areas decomposed by closed valves of a valve closing strategy; 2) initiating the leak localization by marking all pipes in the DMA as potential leaking pipes, and setting a current stage of leak localization as k=1, leaks are assumed to locate at pipe sections with x.sub.m=1 representing the pipe section potentially have leaks and x.sub.m=0 representing no leaks exist at the pipe section; wherein, m=1, 2, . . . M, M represents the total number of pipe sections in the DMA, and the cases of leaks at other components connected to the pipe sections are equivalent to those of leaks at pipe sections; 3) determining an optimal valve operation strategy at the current stage k by establishing an optimized objective function as follows, minimization F k = w 1 .Math. n = 1 N .Math. v n k - v n k - 1 .Math. N + w 2 .Math. .Math. i = 1 G 1 P ( V k ) x i k - 1 L i - .Math. j = 1 G 2 P ( V k ) x j k - 1 L j .Math. .Math. m = 1 G ( P ) L m ( 1 ) constraints:
valve closing strategy: v.sub.n.sup.k∈{0,1}n=1,2, . . . , N  (2)
decomposing the DMA into two sub-areas: G=G.sub.1(V.sup.k)∪G.sub.2(V.sup.k)  (3)
pressure constraints at uninterrupted users: H.sub.u(V.sup.k)≥h.sub.u.sup.min  (4) where, Σ.sub.n=1.sup.N|v.sub.n.sup.k−v.sub.n.sup.k-1| represents the number of valve operations at the current stage k (relative to the valve state at a previous stage k−1), comprising valve opening and closing; Σ.sub.n=1.sup.N|v.sub.n.sup.k−v.sub.n.sup.k-1|/N represents normalization of valve operations; L.sub.m represents a length of the pipe section m; |Σ.sub.i=1.sup.G.sup.1.sup.p.sup.(V.sup.k.sup.)x.sub.i.sup.k-1L.sub.i−Σ.sub.j=1.sup.G.sup.2.sup.p.sup.(V.sup.k.sup.)x.sub.j.sup.k-1L.sub.j| represents a length difference between the potential leaking pipes in the two sub-areas decomposed by the valve closing strategy V.sup.k, Σ.sub.m=1.sup.G(P)L.sub.m represents the total length of the pipe section in the DMA; |Σ.sub.i=1.sup.G.sup.1.sup.p.sup.(V.sup.k.sup.)x.sub.i.sup.k-1L.sub.i−Σ.sub.j=1.sup.G.sup.2.sup.p.sup.(V.sup.k.sup.)x.sub.j.sup.k-1L.sub.j|/Σ.sub.m=1.sup.G(P)L.sub.m represents normalization of the length difference; and w.sub.1 and w.sub.2 represent weights of the number of valve operations and the length difference between the potential leaking pipes in the two sub-areas, respectively; 4) closing or opening the valves according to the optimal valve closing strategy, and decomposing the DMA into two sub-areas: for the two sub-areas, one contains at least an inlet of the DMA, that is, the sub-area functions normally, and the other one functions normally, or is isolated by closed valves, that is, water supply is interrupted; 5) optionally selecting a sub-area that functions normally to perform online water balance analysis, in order to identify whether this sub-area has leaks; wherein, if it is identified having no leaks, the leaks are located in another sub-area; the online water balance analysis is implemented through boundary flowmeters of the DMA and smart demand meters at end users; the difference between the flow entering the selected sub-area and user's water consumptions in the selected sub-area, that is, non-revenue water NRW, which indicates whether there are leaks in the selected sub-area; if the value of NRW of the selected sub-area is similar to that of the NRW of the DMA before leak localization, it indicates that there are leaks in the selected sub-area; otherwise, the leaks are located in another sub-area; 6) updating the potential leaking pipes of the current stage k by marking the pipe sections in the sub-area that has been identified having no leaks as pipe sections with no leaks, that is, x.sup.k=0, so as to reduce the leaking area; 7) judging whether there is any valve operation in the DMA to further reduce the leaking area, if so, returning to step 3) for the next stage of leak localization, that is, k=k+1, otherwise, which indicates that a minimum leaking area has been identified, terminating the leak localization process; and 8) dispatching workers to accurately pinpoint the leak locations in the identified leaking area and then repair the localized leaks.

2. The efficient method for localizing leaks in water supply networks based on valve operations and online water metering according to claim 1, wherein, the step 1) specifically comprises steps of: (1) removing all edges representing valves in the pipe network graph G and identifying all connected subgraphs in the generated new graph, wherein the subgraphs represent the smallest areas in the pipe network that are isolated by closing valves; (2) transforming the pipe network graph G into a new alternative graph G.sub.V, wherein the valves in the pipe network are taken as edges and all the connected subgraphs identified in step (1) as vertices, and the new alternative graph G.sub.V is constructed according to a topological connection relationship between the valves and the connected subgraphs; (3) determining cut sets of the alternative graph G.sub.V, wherein each cut set represents a valve closing strategy V.sub.s, and edges in the cut set represent valves to be closed in the valve closing strategy, namely, v.sub.n=0; forming a set of valve closing strategies V by converting each cut set V into a valve closing strategy.

3. The efficient method for localizing leaks in water supply networks based on valve operations and online water metering according to claim 2, wherein, in the step (3), the cut sets of the alternative graph G.sub.V are determined by the Contraction algorithm of the Karger algorithm, specifically by: randomly selecting an edge in the graph to be removed, merging two endpoints of the edge, and reserving other connecting edges of the endpoints; repeating the process until there are only two endpoints left in the graph, at which time the connecting edge of these two remaining endpoints is a cut set of the graph; Obtaining a sufficient number of cut sets by repeatedly executing the Contraction algorithm for t.sup.4 log t times, where t is the total number of vertices in the graph G.sub.V.

Description

BRIEF DESCRIPTION OF DRAWINGS

(1) FIG. 1 is an implementation roadmap of the method of the present disclosure.

(2) FIG. 2 is a schematic diagram of a graph theory-based method adopted by the present disclosure.

(3) FIG. 3 is a schematic diagram of the multi-stage leak localization procedure of the present disclosure.

(4) FIG. 4 is a pipe network topology diagram of a DMA according to an embodiment.

(5) FIG. 5 is a valve operation diagram of each stage in the process of leak localization according to an embodiment.

(6) FIG. 6 is a graph of water balance analysis results in the process of leak localization according to an embodiment.

DESCRIPTION OF EMBODIMENTS

(7) in order to make the leak localization method of the present disclosure easy to understand, the technical solution of the present disclosure will be described clearly and completely with reference to the drawings and specific embodiments. Obviously, the described embodiments are only some embodiments, rather than all embodiments, of the present application. Based on the embodiments in this application, all other embodiments obtained by ordinary skilled persons in this field without creative work belong to the protection scope of this application.

(8) FIG. 2(a) shows a simple DMA pipe network, including 2 inlets, 1 outlet, 5 valves (V1, V2, V3, V4 and V5), and several pipe sections and nodes. According to the present disclosure, the following specific implementation steps are adopted to localize the leak, as shown in FIG. 1.

(9) At Step 1, a DMA pipe network is taken as a pipe network graph G (pipe segment and valve are edges and nodes are vertices), valve edges in graph G are removed, and all connected subgraphs in the graph are identified. For the example in FIG. 2(a), five connected subgraphs are identified; which are respectively represented by S1, S2, S3, S4 and S5, as shown in FIG. 2(b). Each connected subgraph represents a set of pipe network components that can be divided by closing valves.

(10) At Step 2, the pipe network graph G is converted into an alternative graph G.sub.V (the valves are the edges and the connected subgraphs are the vertices). For the example in FIG. 2(a), the generated alternative graph is shown in FIG. 2(c).

(11) At Step 3, the Contraction algorithm is operated for t.sup.4 log t times to determine the cut sets of the alternative graph G.sub.V (t is the total number of vertices of the graph), and form the valve closing strategy set V. For the alternative graph shown in FIG. 2(c), FIGS. 2(d-f) show the results of running the Contraction algorithm once. First; an edge is randomly selected to be removed (V5 in FIG. 2d); then, the vertices S4 and S5 at both ends of the selected edge are merged to generate a new vertex S.sub.45 (FIG. 2e); once again, an edge is randomly selected to be removed and the vertices are merged until there are two vertices left, and a cut set of the alternative graph G.sub.V can be obtained (the cut set {V3, V4} as shown in FIG. 2f). After running the algorithm repeatedly for 1005 times; a set of the cut sets of the graph G.sub.V can be obtained by deleting the duplicate members in the cut sets. The edges in the set of cut sets are converted into closed valves to obtain a valve closing strategy set V.

(12) At Step 4, the leak localization procedure is initiated, the current stage k=1 is set, and all pipe sections are set as potential leaking pipe sections (i.e., x.sup.k=1). FIG. 3(a) shows the initialization result, in which the pipe sections marked as dotted lines are the potential leaking pipe sections.

(13) At Step 5, an optimal valve operation strategy at the current stage is determined. The optimization objective function F.sup.k (Equation 1) is evaluated by using the valve closing strategy set V determined in Steps 1-3, and the valve closing strategy which satisfies the constraint condition (Equation 4) and has the minimum objective function value F.sup.k is selected as the optimal solution. The optimal valve operation strategy at the current stage is determined by combining with the valve state in the current system. As shown in FIG. 3(b), the optimal valve operation strategy for the current stage k=1 is to close V3 and V4.

(14) At Step 6, the optimal valve operation strategy is executed, and the DMA pipe network is decomposed into two sub-areas. As shown in FIG. 3(b), closing V3 and V4 decomposes the example DMA into two sub-areas, one of which contains S1, S2 and S3, and the other contains S4 and S5.

(15) At Step 7, the sub-area containing a DMA inlet is optionally selected to perform online water balance analysis to determine which sub-area the leak is located in. For the two sub-areas in FIG. 3(b), one is optionally chosen to carry out water balance analysis, that is, measure the flow into the selected sub-area and the user's water consumptions in the selected sub-area through DMA inlet and outlet flow meters and smart demand meters, and calculate its non-revenue water NRW. If the NRW of the selected sub-area is similar to the NRW of the DMA, the leak is located in the selected sub-area. Otherwise, the leak is located in another sub-area. In order to continue the leak localization procedure, it is assumed that the water balance analysis results identify that the leak is located in the sub-area containing S4 and S5.

(16) At Step 8, the pipe sections in the sub-area where no leak exists is marked as pipe sections with no leaks (i.e., x.sup.k=0). As shown in FIG. 3(b), the pipe sections inside S1, S2 and S3 are marked as pipe sections with no leaks.

(17) At Step 9, whether there is any valve operation in the DMA that can further reduce the leaking area is determined. If yes, go back to step 5 to continue the next stage of leak localization (i.e., k=k+1); otherwise, the minimum leaking area has been found, stop the leak localization procedure. For the situation shown in FIG. 3(b), the area shown can be further reduced, and the process of leak localization at stage k=2 (the optimal valve operation is to open V4 and close V5) can be continued back to step 5 until the minimum leaking area is found (i.e., S4 in FIG. 3c).

(18) At Step 10, according to the result of leak localization, workers are dispatched to the leaking area to find the exact location of leaks by using equipment methods such as listening rods and repair the found leaks.

(19) The following describes the implementation steps and application effects of the present disclosure in combination with practical application scenarios. The following application scenarios are only used to illustrate how the present disclosure is applied in concrete practice, but are not used to limit the scope of the present disclosure.

(20) FIG. 4 shows a DMA area in a city water supply network, including 2 inlets, 1 outlet, 51 operable valves and a pipeline with a total length of 58.7 km. Remote flow meters are installed at the inlet and outlet of the DMA area to monitor the flow into and out of the DMA online, and smart demand meters are also installed at each user's place to record the user's water consumption online. In addition, there is an important industrial user in the DMA area, requiring uninterrupted water supply (node pressure should not be less than 15.0 m). The local water company conducts leakage management by continuously monitoring and analyzing the night flow of the DMA. When the minimum night flow rate of the DMA increases Obviously, it shows that new leaks occur in this area. In the following, taking an observed leakage event (the minimum nighttime flow rate increased from 76.5 L/s to 85.2 L/s) as an example, the method of the present disclosure is applied to locate the leak.

(21) According to the above specific implementation, the leak generated in the example DMA is located, and the specific optimized valve operation and water balance analysis results are shown in FIG. 5 and FIG. 6 respectively. Firstly, the graph theory-based method is used to determine the valve closing strategy set which can decompose a DMA into two sub-areas (steps 1-3). The DMA pipe network graph can be divided into 40 connected subgraphs by valves, and 4,940 pipe network graph cut sets can be obtained by running the Contraction algorithm 9,400,000 times, thus forming a set with 4,940 valve closing strategies for solving the subsequent optimization objective function. Using steps 4-9, the leaking area can be gradually reduced until the smallest leaking area is obtained (pipe sections marked as dotted lines in FIG. 5d, with a total length of 4.3 km). For example, in stage 1 (time t.sub.0−t.sub.1), the DMA pipe network is divided into two sub-areas by three valve operations (closing three valves) (FIG. 5a), and the online water balance analysis of a sub-area including an outlet shows that its non-revenue water NRW is about 8.5 L/s (FIG. 6). The NRW of the DMA before the leak localization is about 9.0 L/s, which indicates that the leak is located in the sub-area containing the outlet, thus marking the pipe sections in another sub-area as pipe sections with no leaks. Similar steps are applied to subsequent stages 2-4 (time t.sub.1−t.sub.4), and water balance analysis is carried out in the sub-areas containing outlets.

(22) Finally, the present disclosure can reduce the leaking area from 58.7 km to 4.3 km and improve the leak localization efficiency by about 13 times by applying 14 optimized valve operations and corresponding water balance analysis in 4 stages. After determining the minimum leaking area, the water company sends the staff to the identified leaking area for accurate leak localization, and confirms that the leak is located in the determined area (as shown in FIG. 5d). Therefore, an example application shows that the method provided by the present disclosure significantly improves the efficiency of leak localization and ensures the accuracy of leak localization.