Leakage detection of natural gas pipeline based on an embedded system

Baoying Zhu, Fenxi Yao, Senchun Chai

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Citations (Scopus)

Abstract

Natural gas, which is treated as an alternative to the depleting supplies of oil, is widely used for fuel and electricity production. The use of natural gas in the world depends upon the thousands miles of natural gas pipeline networks that have been set up in few decades. The safe operation of these complex systems is of significant importance due to the intrinsic characteristics of hydrocarbons such as: toxicity, flammability and explosion velocity. In this work, a real-time leakage monitoring model of the long distance natural gas pipeline is proposed. And a leakage detection and localization mechanisms based on the above model were studied. In order to test the performance of the provided method, a networked data acquisition and analysis system was built. Through application to a practical system, it is verified that the proposed system is effective in gas leakage detection.

Original languageEnglish
Title of host publicationProceedings - 2014 7th International Symposium on Computational Intelligence and Design, ISCID 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages289-292
Number of pages4
ISBN (Electronic)9781479970056
DOIs
Publication statusPublished - 19 Mar 2015
Event7th International Symposium on Computational Intelligence and Design, ISCID 2014 - Hangzhou, China
Duration: 13 Dec 201414 Dec 2014

Publication series

NameProceedings - 2014 7th International Symposium on Computational Intelligence and Design, ISCID 2014
Volume1

Conference

Conference7th International Symposium on Computational Intelligence and Design, ISCID 2014
Country/TerritoryChina
CityHangzhou
Period13/12/1414/12/14

Keywords

  • embedded system
  • leakage detection
  • natural gas

Fingerprint

Dive into the research topics of 'Leakage detection of natural gas pipeline based on an embedded system'. Together they form a unique fingerprint.

Cite this