System and method for early identification and monitoring of defects in transportation infrastructure
11605158 · 2023-03-14
Assignee
Inventors
Cpc classification
G06V10/457
PHYSICS
G06F18/2148
PHYSICS
G06F18/285
PHYSICS
International classification
Abstract
The invention relates to a system and method for monitoring a structural vulnerability not yet apparent as a defect. A type of vulnerability is identified from a grouping of elements and/or features of a structure and its systems, called findings, whose attributes meet a particular set of selection rules called relationship-association classifiers (RACs)—a series of one or more tests of relationships between attributes of findings, the series of tests indicating whether findings are associated and collectively classified as a particular type of vulnerability or defect. A RAC may be established by an optimization function or a neural network function, trained from maintenance reports and documented findings and attributes concurrent with each maintenance report. Findings are identified and attributes evaluated from one or more images, typically taken during routine maintenance of the structure. A grouping identified as a vulnerability can be reported to a maintenance entity for follow-up.
Claims
1. A method of detection of vulnerabilities in a structure, the method comprising: a. accumulating images of a structure taken during routine maintenance of the structure into an image database, the images being multiple images taken at different times; b, processing the images; c. detecting and indexing one or more findings, a finding being a grouping of elements and/or features of the structure, in said one or more images, wherein the multiple images being taken at different times enables development of a timeline history of attributes of each finding; d. adding said one or more findings to an object database; e. computing one or more attributes of each of the findings; f. testing relationships between said one or more attributes of two or more types of said findings against selection rules of one or more relationship-associative classifiers (RACs); each one or more RAC associated with one of said vulnerabilities of said structure; g. grouping the findings with attributes meeting said RAC into a vulnerability group of said RAC; and h. reporting the vulnerability group to a maintenance entity as one of said vulnerabilities.
2. The method of claim 1, wherein the structure comprises one or more of a tunnel, a bridge, a road, a dam, or a pipeline.
3. The method of claim 2, wherein the findings of the structure comprise concrete or iron walls, bearings, deck, piers, abutments, traffic lane control sign, variable message sign, barriers, emergency telephone, signs, public announcements, cameras, safety, visibility sensors, CO.sub.2 sensors, heat sensors, fire hoses, vents, doors, railings, pavement, cables, electricity tunnels, covers, traffic lights, road lamps, lighting fixtures, electricity boxes, electric cords, cracks, rust, wet areas, welding exposure, concrete segregation, broken sensors, broken fire hoses, water leaks, loose wires, soot, missing equipment, loose screws, disintegration, waste, broken pavement, inflorescence, exposed iron, missing covers, graffiti, open holes, damaged suspension cables, potholes, or any combination thereof.
4. The method of claim 1, wherein positions of the findings depicted in said one or more images found by matching a pattern in the one or more images with positions of matching findings in said one or more images taken during maintenance and/or operations of said structure.
5. The method of claim 1, wherein the attributes of the findings comprise one or more of location, color, shape, size, texture, depth, width, height, area, impact distance from a source of the finding, quantity of elements within a particular radius, distance from a particular utility, distance from a past corrective action area, influence on core infrastructure, percentage of exposure, and physical connectivity to another finding.
6. The method of claim 1, wherein the vulnerability comprises findings from two or more functional groups of the structure.
7. The method of claim 6, wherein the functional groups comprise one or more of structural, electricity, air conditioning, a lifesaving system, an air quality system, a signing system, a fire detection system, and a fire mitigation system.
8. The method of claim 1, wherein the RACs are learned using a neural network technique.
9. A system for detection of vulnerabilities in a structure, comprising a. an image database, configured to store accumulated images of said structure, taken during routine maintenance of the structure, the images being multiple images taken at different times; b. an image processing module, configured to process the accumulated images; c. a findings processing module and an object database comprising a findings sub-database and a vulnerabilities sub-database, the findings processing module configured to i. detect and index findings, findings being groupings of elements and/or features of the structure in one or more of the images, wherein the multiple images being taken at different times enables development of a timeline history of attributes of each finding; ii. store detected findings as a findings object in the findings sub-database; and iii. compute attributes of said findings of each of said findings object; wherein the system further comprises d. a rules engine, configured to i. test at least one relationship between said attributes of two or more types of said findings against selection rules of relationship-associative classifiers (RACs); each said RAC associated with a vulnerability of said structure; ii. group the finding object with attributes meeting said RAC into a vulnerability grouping of said vulnerability; and iii. store vulnerability objects comprising the grouped finding objects or references thereto; and e. a reporting module, configured to report the vulnerability object and findings objects therein as said vulnerability to a maintenance entity.
10. The system of claim 9, wherein the structure comprises one or more of a tunnel, a bridge, a road, a dam, or a pipeline.
11. The system of claim 10, wherein the findings of the structure comprise concrete or iron walls, bearings, deck, piers, abutments, traffic lane control sign, variable message sign, barriers, emergency telephone, signs, public announcements, cameras, safety, visibility sensors, CO.sub.2 sensors, heat sensors, fire hoses, vents, doors, railings, pavement, cables, electricity tunnels, covers, traffic lights, road lamps, lighting fixtures, electricity boxes, electric cords, cracks, rust, wet areas, welding exposure, concrete segregation, broken sensors, broken fire hoses, water leaks, loose wires, soot, missing equipment, loose screws, disintegration, waste, broken pavement, inflorescence, exposed iron, missing covers, graffiti, open holes, damaged suspension cables, potholes, or any combination thereof.
12. The system of claim 9, wherein positions of the findings depicted in said image found by matching a pattern in the image with positions of matching findings in images taken during maintenance and/or operations of said structure.
13. The system of claim 9, wherein the attributes of the findings comprise one or more of location, color, shape, size, texture, depth, width, height, area, impact distance from a source of the finding, quantity of elements within a particular radius, distance from a particular utility, distance from a past corrective action area, influence on core infrastructure, percentage of exposure, and physical connectivity to another finding.
14. The system of claim 9, wherein the vulnerability object comprises findings objects associated with findings from two or more functional groups of the structure.
15. The system of claim 14, wherein the functional groups comprise one or more of structural, electricity, air conditioning, a lifesaving system, an air quality system, a signing system, a fire detection system, and a fire mitigation system.
16. The system of claim 9, wherein the RACs are learned using a neural network technique.
17. The system of claim 9, wherein said images comprise photographs, thermal images, LIDAR images, or any combination thereof.
18. The system of claim 9, wherein said vulnerability group is grouped from relationships between attributes of findings in a single said image.
19. A system for detection of vulnerabilities due to cracks in a transportation infrastructure, comprising a. an images database, storing accumulated images of a structure, the images taken during routine maintenance of the structure, and the being multiple images taken at different times; b. an image processing module, configured to process the images; c. a findings processing module and an objects database comprising a findings sub-database of findings, wherein the multiple images being taken at different times enables development of a timeline history of attributes of each finding, the findings being groupings of elements and/or features of the structure, and a vulnerabilities sub-database, the findings processing module configured to i. detect findings comprising structural cracks in one or more of the images; ii. store new said detected findings as findings objects in the findings sub-database; and iii. compute attributes of said findings of each said findings object; and wherein the system further comprises d. a rules engine, configured to i. test relationships between said attributes of said findings against selection rules of one or more relationship-associative classifiers (RACs); each said RAC associated with a vulnerability of said structure or its systems; ii. group the findings objects with attributes meeting said RAC into a vulnerability grouping of said vulnerability; and iii. store vulnerability objects comprising the grouped findings objects or references thereto; and e. a reporting module, configured to report the vulnerability object and findings objects therein as said crack vulnerability to a maintenance entity; wherein said RACs group said cracks in a region in which all cracks are less than a critical distance from the nearest crack.
20. The system of claim 19, wherein said findings of the structure further comprise concrete or iron walls, bearings, deck, piers, abutments, traffic lane control sign, variable message sign, barriers, emergency telephone, signs, public announcements, cameras, safety, visibility sensors, CO.sub.2 sensors, heat sensors, fire hoses, vents, doors, railings, pavement, cables, electricity tunnels, covers, traffic lights, road lamps, lighting fixtures, electricity boxes, electric cords, rust, wet areas, welding exposure, concrete segregation, broken sensors, broken fire hoses, water leaks, loose wires, soot, missing equipment, loose screws, disintegration, waste, broken pavement, inflorescence, exposed iron, missing covers, graffiti, open holes, damaged suspension cables, potholes, or any combination thereof.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
(1)
(2)
(3)
(4)
DETAILED DESCRIPTION
(5) Definitions:
(6) “Structure” can refer to a transportation structure such as a tunnel, bridge, or culvert; or any other structure such as a dam, pipeline, or water/sewage pipe.
(7) “Element” refers to any part of a structure. Examples of elements include concrete, pavement, railings, barriers, vents, signs, lights, sensors, fire hydrants, and electrical cables. Elements of a bridge may include a roadway, trusses, suspension cables, lampposts, and bridge traffic signs. Elements of a tunnel may include walls, ceiling, tiles, ventilation shafts, and CO/CO.sub.2 sensors, and safety signs.
(8) “Finding” refers to an element or feature of an element in one or more images of a structure. An element or feature can be counted as a finding whether it appears normal in the image or anomalous (e.g., misshapen, enlarged, diminished, discolored, dis-textured, or missing), or whether the feature itself is an anomaly (e.g., a crack, wet spot, or rust spot, broken sign).
(9) “Vulnerability” refers to a group of one or more findings whose attributes are deemed to indicate a defect or potential defect of a structure and its systems when a rule or set of rules is applied.
(10) “Relationship-associative classifier (RAC)” refers to a series of one or more tests of relationships between attributes of findings, the series of tests indicating whether findings are associated and collectively classified as a particular type of vulnerability or defect.
(11) “Maintenance entity” refers to a party with an involvement or interest in the maintenance of a structure, its systems, or element(s) therein. Examples of a maintenance entity can include, for example, a company responsible for operations, engineering, maintenance engineering, maintenance, assets inventory manager, risk assessment, maintenance planning, electricity, or plumbing; or an asset owner, or any company or person(s) involved in the infrastructural element.
(12) Reference is now made to
(13) Method 100 comprises accumulating one or more images of a structure 105. A typical structure can be a transportation structure such as a tunnel, bridge, or culvert; or any other structure such as a dam or pipeline. Descriptions in this application shall be made as pertaining to tunnels; however, it is appreciated that the teachings of the invention apply to any transportation structure and other types of structures.
(14) Each image is typically obtained during the course of maintenance and operations performed at the structure. Accumulating of the images 105 is typically to a database. Each image may be, for example, a photograph, a thermal image, or a LIDAR image. Images may be directly digitized upon exposure; or developed, printed, and scanned. An image is typically accompanied with metadata such as the ID number of the contractor who took the image; a timestamp; data of the image-taking camera, such as location and aiming direction of the camera, f-stop, lighting, and exposure time; and/or a maintenance report. Accumulated images taken at various times contribute to a dynamic and ongoing understanding of potential defects of the structure and its elements, as further described herein.
(15) For purposes of clarity, some steps herein are described with regard to one image. It is appreciated that some or all steps may be repeated for each of the accumulated images of the structure. It is also understood that some steps of the method 100 may be performed more than once.
(16) Method 100 further comprises processing the images 110, in preparation for identifying findings 107 (further described herein). Techniques of processing an image 110 can be, for example, filtering, normalization of color channels, cropping, resizing, translation, rotation, inversion, and rescaling.
(17) Method 100 further comprises identifying findings of the structure in an accumulated image 115. Findings are elements or features of elements of the structure. For example, wall segments, ceiling, tiles, ventilation shafts, fire hoses, wires, equipment, screws, pavement, lampposts, lighting fixtures, CO/CO.sub.2 sensors, and safety signs; or features thereof.
(18) Findings depicted in the image may be identified, for example, by matching a pattern in the image with elements in previously analyzed accumulated images or with an original image or model of the structure. Alternatively, or in addition, findings may be identified by matching attributes (e.g., location, size, color, shape) with those of previously found findings.
(19) Identified findings 115 may comprise both new findings as well as findings previously identified from earlier accumulated images. A finding may be an element or feature pictured in the image in its normal condition or may—in whole or in part—have an anomaly such as a crack, rust, wet areas, welding exposure, concrete segregation, water leaks, soot, disintegration, waste, exposed iron, missing covers, graffiti, holes, potholes, among others, and combinations thereof.
(20) In some embodiments, identifying findings 115 comprises distinguishing whether an element is in its normal state; or whether the element is in an anomalous state or contains an anomalous feature. Examples of normal and anomalous states of elements, and resulting findings, are indicated in the Table 1.
(21) TABLE-US-00001 TABLE 1 Normal Anomalous Feature condition Finding state(s)/feature(s) Finding Wall Dry None Wet Wet spot Electricity box Painted Normal Rusted Rusted electricity box electricity box Concrete Uniform None Segregated Segregated concrete Tile Smooth None Cracked or missing Cracked/Missing tile Cable Continuous None Exposed wiring Exposed wiring insulation Sensor Present and Normal Missing or broken Missing/Broken unbroken sensor sensor
(22) Method 100 further comprises adding new findings to an objects database 117 and computing attributes of the identified findings 120. An attribute of a finding may be the functional group to which the finding belongs. For example, cracks and segregated concrete have a functional group attribute of “structural,” while an electrical box and cables have a functional group attribute of “electrical.”
(23) Other attributes of a finding may include, for example, location, color, shape, size, texture, depth, width, height, area, distance from a source of an anomaly, quantity of elements within a particular radius, distance from a particular utility, distance from a past corrective action area, degree of influence on core infrastructure, percentage of exposure, among others, and any combination thereof.
(24) A finding may be assigned, according to the type of the finding, a template of attributes. For example, a crack can have an attribute of whether or not the crack is leaking. Attributes in the template are computed 120 and updated in the objects database. Attributes and relationships may be updated statistically, with a level of confidence of an evaluated attribute value (e.g., depending on image quality, perspective, analysis confidence, etc.) weighted against a level of confidence of an existing attribute value. A finding's previous attribute values may be archived (e.g., in the objects database), thereby enabling development of a timeline history of attributes of each finding.
(25) Method further comprises applying relationship-associative classifiers (RACs) to the findings 125. A RAC is a series of one or more tests of relationships between attributes of findings indicating whether findings are associated and collectively classified as a particular type of vulnerability or defect. A RAC is designed to test mutual presence or attributes of findings that are potentially correlated to a condition of concern in the structure, and therefore identified as a vulnerability.
(26) Non-limiting examples of RACs for a tunnel are A RAC for a crack-density vulnerability groups cracks in a region in which all cracks are less than 1 cm from the nearest crack. A RAC for proximity hazard of a leaking crack to the ventilation system associates ventilation system findings and cracks that are leaking and whose distance to a ventilation system finding is less than 10 cm. A RAC for growing rust vulnerability associates a region of segregated concrete and a total rust area which is bigger than last year's total rust area on the same segregated concrete region. A RAC for a vulnerability of water damage caused by a leaking hose associates a fire hose with overlapping cracks that are leaking. A RAC for emphasizing location-based vulnerabilities that associates vulnerabilities found by other RACs, such as vulnerabilities on the roof of a tunnel or a pillar of a bridge.
(27) RACs may be programmed manually or computed with an optimization algorithm. In some embodiments, a neural network algorithm may be employed to learn RACs, trained, for example, by maintenance reports. The algorithm may neurally analyze attributes of findings in a concurrent and past time frame of each maintenance report.
(28) Method further comprises grouping the selected findings for each RAC as a vulnerability 130. In some embodiments, step 125 may be repeated for new images, and additional findings may be added to a grouping of findings.
(29) Method further comprises reporting identified vulnerabilities 135. The vulnerabilities may be reported to one or more engineering entities, e.g. for follow-up action such as an inspection. Reported data may be accompanied by images, findings, and attributes contributing to each vulnerability.
(30) In some embodiments, method 100 further comprises providing a 3D tour of findings and vulnerabilities of the structure 140.
(31) Reference is now made to
(32)
(33)
(34)
(35)
(36) Reference is now made to
(37) System 300 comprises an images database 320 and an image processing module 315. Images database 320 stores images of a structure. A typical structure can be a transportation structure such as a tunnel, bridge, or culvert; or any other structure such as a dam or pipeline. Each image is typically obtained during the course of maintenance and operations performed on the structure. Each image may be a photograph, a thermal image, or a LIDAR image. Images may be directly digitized upon exposure; or developed, printed, and scanned. An image is typically accompanied with metadata such as the ID number of the contractor who took the image; a timestamp; data of the image-taking camera, such as location and aiming direction of the camera, f-stop, lighting, and exposure time; and/or a maintenance report.
(38) Image processing module 315 is configured to process a raw image in order to prepare the image for identification of findings. Image processing module 315 may employ techniques such as filtering, normalization of color channels, cropping, resizing, translation, rotation, inversion, and rescaling. Image processing module 315 may generate intermediate images processed from a raw image. Some intermediate images and segmented images may be stored, in whole or in part, in images database 320, in association with the raw image.
(39) System 300 further comprises a findings processing module 325. Findings processing module 325 detects and indexes findings in an image of the structure. Findings processing module 325 may detect findings in an image by matching a pattern in the image with identified findings in previously processed images in images database 320. Alternatively, or in addition, findings processing module 325 may match attributes (e.g., location, size, color, shape) with those of previously found findings in an objects database 340 (further described herein).
(40) Findings processing module 325 further computes attributes of findings. Findings processing module 325 adds the attributes or a link thereto to a findings object 350 of the finding.
(41) System 300 optionally comprises an infrastructure information database 335, which may store, for example, CAD drawings, satellite photos, and/or geo maps of the structure. Elements identification module 325 may employ infrastructure information database 335 to assist in identifying findings.
(42) System 300 further comprises an objects database 340. Objects database 340 comprises a findings sub-database 345. Findings sub-database 345 stores findings objects 350. Each findings object 350 comprises or links to a findings identifier and attributes of the identified finding. Objects database 340 further comprises a groupings sub-database 355. Grouping sub-database 355 stores grouping objects
(43) System 300 further comprises a rules module 370. Rules module 370 is configured to apply relationship-associative classifiers (RACs) to each finding and group findings objects 350 of findings meeting the selection rule into groupings. A grouping is a group of one or more findings whose presence or attributes are of concern, because the findings in the grouping are correlated such that they may stem from the same conditions or constitute a particular risk to the structure—a vulnerability. Vulnerabilities may be further monitored by system 300 and/or reported to a maintenance entity for follow-up attention. In an example of monitoring vulnerabilities, rules module 370 may apply several RACs with progressive thresholds of a particular type of vulnerability. For example, an expanding crack may not meet the growth-rate (or crack length) threshold of a RAC of the most severe crack, but may meet a lower growth-rate threshold RAC and worthy of monitoring. Beyond a particular level RAC-growth-rate threshold, cracks may be reported, along with the level of severity, to a maintenance entity.
(44) In some embodiments, a vulnerability may comprise more than one type of finding. For example, a wet crack may be grouped with rust on an electrical box. In some embodiments, a vulnerability may comprise only one finding. For example, a crack (among thousands of other cracks) in a tunnel roof may be placed in a grouping because the crack is collocated with a screw fastening a vent to the roof.
(45) Findings may be grouped as a vulnerability if they are of a common functionality group, geometrical location in the structure, material type, surface structure, temperature, IR absorbance or reflectance, or caused or affected by the same external forces (such as by a shock wave or vehicular crash).
(46) A vulnerabilities sub-database 355 of objects database 340 stores vulnerability objects 360. A vulnerability object 360 specifies which findings objects 350 are in the vulnerability grouping. Rules module 370 inspects findings objects 345 and creates new vulnerability objects 360 or adds findings to an existing vulnerability object 360. Rules module 370 may be trained (i.e., supplied with new or optimized RACs) by a neural network algorithm correlating defects reported by a maintenance entity with attributes of findings recorded before the defect report.
(47) System further comprises a reporting module 375, which reports the findings associated with the vulnerability object 360 as a vulnerability. Reports may present data, for example, tabular, graphical, and/or in 3D.
(48) For example, FIG. 4A1 shows images 400A-400C of a crack in a tunnel from three different cameras. The images are accompanied by a description 405 of present status and recommendation, based on the crack's identifying RAC and the crack's attributes. The images are accompanied by past images 410 accumulated by system 300 and dates each past image was taken, thereby indicating a timeline depicting the progression of the crack.
(49) FIGS. 4B1 and 4B2 shows an image 420 of a tunnel wall and roof, respectively, on which are superimposed identifiers of findings on the wall. Each identifier is disposed at the location of the finding. A user of system 400 may click on an identifier to learn more details about the underlying finding.
(50)
(51)