Internet of Things in Business Transformation. Группа авторов

Читать онлайн книгу.

Internet of Things in Business Transformation - Группа авторов


Скачать книгу
Therefore, when choosing a format for a book that would be accessible to both researchers and university students, an attempt was made to simplify the content and emphasize real-life examples to make the information more easily understood.

      On behalf of the entire editorial board, our heartfelt appreciation goes out to all the authors for considering us to publish their valuable work. Their overwhelming response has been a real factor in keeping us motivated and moving forward with this book, and therefore merits our sincere acknowledgement. The quality and diversity of their contributions have made the book more impactful, and their trust, patience and kind cooperation throughout the various stages of production played a vital role in its success. We also wish to thank the people at Scrivener Publishing for their guidance and support in bringing this edited collection to completion.

       The Editors

      November 2020

      1

      Applications of IIoT-Based Systems in Detection Leakage in Pipeline Custody Transfer of Hydrocarbon Products

       Pragyadiya Das

       National Institute of Technology, Trichy, India

       Abstract

      Custody transfer via pipelines has always been prone to losses due to leakages. Moreover, due to the large lengths of pipelines, leak detection is a tedious task. There are various methods that employ mechanical, mathematical and signal processing based approaches to detect leaks and their location. With the advent of Industrial Internet of Things and Machine Learning, the method of leak detection of pipelines using various machine learning methods have been analyzed and implemented in this chapter.

      Keywords: Custody transfer, pipelines, leak detection, industrial Internet of Things, machine learning, ensemble learning

      The world of Oil and Gas has been moving at an alarming rate. The world is getting energy hungry [1] and the need for oil (or natural gas) is not going to go down anytime soon [2].

      With this increased need for fuel, there is a constant need for the fuel (gasoline etc.) to be transported from one place to another. This gives rise to a need for a medium of transfer that would effectively transport the fuel in a secure and accountable manner.

      As per data released in India’s official website (https://community.data.gov.in/), the total length of Natural Gas pipelines went from 10,246 to 17,753 km in the period of 31st March 2010 to 31st March 2017. That is a growth of 57% [3]. This is a significant growth and shows the need and increasing utility of pipeline in the energy scenario of an energy hungry nation like India [4].

      Looking at pipelines a major method of custody transfer of Gasoline, Diesel and other energy related fuels, it is important that there is proper monitoring of these structures to prevent any kind of adulteration, or more importantly, leakage causing financial losses.

      With the advent of Wireless Sensor Networks (WSN) and Internet of Things (IoT), the monitoring of long distance pipelines have now become a task that can be achieved.

      The concept of “Internet of Things” has its core concepts set out as the interconnection of devices that have the capability to talk to themselves and “act” or take “decisions” based on each other’s statuses.

      Usage of Industrial grade sensors to monitor industrial processes in real time and later achieving their interconnection is called Industrial Internet of Things.

      Modern day refineries and pipelines consist of numerous numbers of sensors. The data that is generated is huge. This poses as a great opportunity to drive data analytics and Industrial Internet of things in this sector [6].

      IIoT is the utilization of smart sensors (or actuators) to enhance manufacturing and industrial processes. The idea behind IIoT is intelligent machines are made better humans at capturing and analyzing data in real time, in addition they are also made better at prompting information that can be used to make decisions in lesser time and more effectively [7].

      The below detail explains the varied kind of reasons that are faced while analyzing pipeline leaks.

Schematic illustration of percentage break-up of reasons causing pipeline leaks.

      1.3.1 Various Techniques used to Detect Pipeline Leak

      The methods that are usually used are divided into two classes,

      1 Hardware techniques.

      2 Software techniques.

      We shall discuss in brief about three of the most common non-analytic and hardware-based technique used in pipeline leak detection. They are as follows:

      1 a)


Скачать книгу