SlideShare a Scribd company logo
1 of 24
Smart networks shed new light
on old water loss facts
  Haggai Scolnicov, TaKaDu
WHAT IS TAKADU?


                  2
Let’s revisit Active Leakage Control




                      Data
          Flow
                     analysis    Field
 DMAs   meters at                         Repairs
                       and      surveys
         inlets
                    targeting




                                                    3
Let’s revisit Active Leakage Control



                   Data
                   Data
     Data                        Field
                 analysis
                  analysis
   Continuous       and
                    and       Triggered by
   monitoring    targeting   specific events
                targeting



                                               4
Let’s revisit Active Leakage Control



                          Data
                          Data
         Data                            Field
Flow, GIS, calendar,    analysis Early repairs
                         analysis
      Continuous
network operations,        and
                           and       Triggered by
                                  Less visible bursts
      monitoring        targeting   specific events
pressure, weather,     targeting  Continuous service
schematics…                        Cost and capacity


                                                        5
You can’t just “look for flow increases”



                Other      Complex
     Data
               network      utility
    quality
                events     process



                                       6
Analyst = Superman?
• Sifting
  Check all data for all DMAs
• Statistical estimation
  Is flow surprisingly high?
• Special knowledge
  Was it caused by something else?

 TaKaDu’s algorithms help boost this phase

                                              7
TaKaDu monitors network anomalies




                                    8
WHY WE NEED TO STUDY LEAKS
(AND HOW WE GOT TO BE GOOD AT IT)

                                    9
Can you spot the hiding elephant?




                                    10
Some leaks are easy to spot




• Great for marketing and conference slides
But…
• You don’t need a fancy algorithm to find this
• You may not even need an analyst
But most leaks are a little trickier




                                       12
But most leaks are a little trickier




                                       13
But most leaks are a little trickier




                                       14
How leaks hide in data

•   Small leaks (1 l/s) in large DMAs (XX l/s)
•   Other flow increases (legitimate or other faults)
•   Concurrent flow decrease
•   Concurrent expected flow increase
•   Random variability
                                       Other   Complex
•   Wrong data!                Data
                                      network   utility
                              quality
                                       events  process
•   Gradual increase

                                                     15
Field experience and hard evidence

• Millions of sensor-days of data processed
• Thousands of leaks found, analysed and
  reported at a dozen utilities
• Every utility is unique (really!)
• … But some basic truths are common




                                              16
TOP FACTS ABOUT LEAKAGE
(WHICH DON’T GET ENOUGH PUBLICITY)

                                     17
Many leaks start abruptly at 0.5-5 l/s

                                   4 l/s leak starts




• You can target significant leaks soon after start
• “DMA has 2 leaks, one X l/s and one Y l/s” vs.
  “DMA total leakage is Z l/s”

                                                       18
Leaks start small and grow




• Early intervention is worth more than it seems
• A 1 l/s leak is just a 5 l/s leak waiting to happen


                                                    19
… Or they cause major visible bursts




• Early intervention prevents costly bursts
• You often have weeks and even months before
  the “big pop”

                                            20
Do many leaks last years and years?

• Very rare in events noticeable in data (~ 1 l/s)
• Perhaps common in leaks of 0.1 l/s or 0.01 l/s?
     Does anyone have solid evidence for this?
     Are many DMAs leaking 20 x 0.1 l/s?
     Tinier leaks are vast majority of repairs,
     but do they matter?


• So where does (real) water loss come from?

                                                     21
Many leaks last weeks to months
(then they are repaired after a visible burst or ALC)




                                     110 l/s burst




• Several megalitres lost before repair / big burst

• This is a huge component of water loss
                                                     22
Some leaks grow very slowly




• Rare, but possibly a distinct category of leak
• Anecdotally tougher to locate (many months)
• Maybe old pipe perforating at many locations?


                                               23
Thank you!

More Related Content

Similar to what leaks really look like: challenging conventional wisdom with smart water knowledge

10 Tricks to Ensure Your Oracle Coherence Cluster is Not a "Black Box" in Pro...
10 Tricks to Ensure Your Oracle Coherence Cluster is Not a "Black Box" in Pro...10 Tricks to Ensure Your Oracle Coherence Cluster is Not a "Black Box" in Pro...
10 Tricks to Ensure Your Oracle Coherence Cluster is Not a "Black Box" in Pro...SL Corporation
 
The Central Hub: Defining the Data Lake
The Central Hub: Defining the Data LakeThe Central Hub: Defining the Data Lake
The Central Hub: Defining the Data LakeEric Kavanagh
 
Stationarity is the new speed
Stationarity is the new speedStationarity is the new speed
Stationarity is the new speedMartin Geddes
 
incident analysis - procedure and approach
incident analysis - procedure and approachincident analysis - procedure and approach
incident analysis - procedure and approachDerek Chang
 
Cyber Analytics Applications for Data-Intensive Computing
Cyber Analytics Applications for Data-Intensive ComputingCyber Analytics Applications for Data-Intensive Computing
Cyber Analytics Applications for Data-Intensive ComputingMike Fisk
 
Performance is a Shape, Not a Number
Performance is a Shape, Not a NumberPerformance is a Shape, Not a Number
Performance is a Shape, Not a NumberDevOps.com
 
Error in hadoop
Error in hadoopError in hadoop
Error in hadoopLen Bass
 
Observability - The good, the bad and the ugly Xp Days 2019 Kiev Ukraine
Observability -  The good, the bad and the ugly Xp Days 2019 Kiev Ukraine Observability -  The good, the bad and the ugly Xp Days 2019 Kiev Ukraine
Observability - The good, the bad and the ugly Xp Days 2019 Kiev Ukraine Aleksandr Tavgen
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityPaul Morse
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Grant Swanson
 
A Deep Learning use case for water end use detection by Roberto Díaz and José...
A Deep Learning use case for water end use detection by Roberto Díaz and José...A Deep Learning use case for water end use detection by Roberto Díaz and José...
A Deep Learning use case for water end use detection by Roberto Díaz and José...Big Data Spain
 
Multi-Cluster and Failover for Apache Kafka - Kafka Summit SF 17
Multi-Cluster and Failover for Apache Kafka - Kafka Summit SF 17Multi-Cluster and Failover for Apache Kafka - Kafka Summit SF 17
Multi-Cluster and Failover for Apache Kafka - Kafka Summit SF 17Gwen (Chen) Shapira
 
Big Data Rampage
Big Data RampageBig Data Rampage
Big Data RampageNiko Vuokko
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network MayhemPacketTrap Msp
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)stelligence
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...Liming Zhu
 
Observability - the good, the bad, and the ugly
Observability - the good, the bad, and the uglyObservability - the good, the bad, and the ugly
Observability - the good, the bad, and the uglyAleksandr Tavgen
 
Secondary data analysis with digital trace data
Secondary data analysis with digital trace dataSecondary data analysis with digital trace data
Secondary data analysis with digital trace dataAndrea Wiggins
 

Similar to what leaks really look like: challenging conventional wisdom with smart water knowledge (20)

10 Tricks to Ensure Your Oracle Coherence Cluster is Not a "Black Box" in Pro...
10 Tricks to Ensure Your Oracle Coherence Cluster is Not a "Black Box" in Pro...10 Tricks to Ensure Your Oracle Coherence Cluster is Not a "Black Box" in Pro...
10 Tricks to Ensure Your Oracle Coherence Cluster is Not a "Black Box" in Pro...
 
The Central Hub: Defining the Data Lake
The Central Hub: Defining the Data LakeThe Central Hub: Defining the Data Lake
The Central Hub: Defining the Data Lake
 
Stationarity is the new speed
Stationarity is the new speedStationarity is the new speed
Stationarity is the new speed
 
incident analysis - procedure and approach
incident analysis - procedure and approachincident analysis - procedure and approach
incident analysis - procedure and approach
 
Cyber Analytics Applications for Data-Intensive Computing
Cyber Analytics Applications for Data-Intensive ComputingCyber Analytics Applications for Data-Intensive Computing
Cyber Analytics Applications for Data-Intensive Computing
 
Performance is a Shape, Not a Number
Performance is a Shape, Not a NumberPerformance is a Shape, Not a Number
Performance is a Shape, Not a Number
 
Error in hadoop
Error in hadoopError in hadoop
Error in hadoop
 
Observability - The good, the bad and the ugly Xp Days 2019 Kiev Ukraine
Observability -  The good, the bad and the ugly Xp Days 2019 Kiev Ukraine Observability -  The good, the bad and the ugly Xp Days 2019 Kiev Ukraine
Observability - The good, the bad and the ugly Xp Days 2019 Kiev Ukraine
 
Big Data Approaches to Cloud Security
Big Data Approaches to Cloud SecurityBig Data Approaches to Cloud Security
Big Data Approaches to Cloud Security
 
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
Gigamon U - Real Time Real Clear, Real Time Solutions for Today’s Application...
 
Data Intensive Engineering
Data Intensive EngineeringData Intensive Engineering
Data Intensive Engineering
 
Big data pipelines
Big data pipelinesBig data pipelines
Big data pipelines
 
A Deep Learning use case for water end use detection by Roberto Díaz and José...
A Deep Learning use case for water end use detection by Roberto Díaz and José...A Deep Learning use case for water end use detection by Roberto Díaz and José...
A Deep Learning use case for water end use detection by Roberto Díaz and José...
 
Multi-Cluster and Failover for Apache Kafka - Kafka Summit SF 17
Multi-Cluster and Failover for Apache Kafka - Kafka Summit SF 17Multi-Cluster and Failover for Apache Kafka - Kafka Summit SF 17
Multi-Cluster and Failover for Apache Kafka - Kafka Summit SF 17
 
Big Data Rampage
Big Data RampageBig Data Rampage
Big Data Rampage
 
Big Events Cause Network Mayhem
Big Events Cause Network MayhemBig Events Cause Network Mayhem
Big Events Cause Network Mayhem
 
IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)IT Operation Analytic for security- MiSSconf(sp1)
IT Operation Analytic for security- MiSSconf(sp1)
 
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
POD-Diagnosis: Error Detection and Diagnosis of Sporadic Operations on Cloud ...
 
Observability - the good, the bad, and the ugly
Observability - the good, the bad, and the uglyObservability - the good, the bad, and the ugly
Observability - the good, the bad, and the ugly
 
Secondary data analysis with digital trace data
Secondary data analysis with digital trace dataSecondary data analysis with digital trace data
Secondary data analysis with digital trace data
 

Recently uploaded

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 

Recently uploaded (20)

unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 

what leaks really look like: challenging conventional wisdom with smart water knowledge

  • 1. Smart networks shed new light on old water loss facts Haggai Scolnicov, TaKaDu
  • 3. Let’s revisit Active Leakage Control Data Flow analysis Field DMAs meters at Repairs and surveys inlets targeting 3
  • 4. Let’s revisit Active Leakage Control Data Data Data Field analysis analysis Continuous and and Triggered by monitoring targeting specific events targeting 4
  • 5. Let’s revisit Active Leakage Control Data Data Data Field Flow, GIS, calendar, analysis Early repairs analysis Continuous network operations, and and Triggered by Less visible bursts monitoring targeting specific events pressure, weather, targeting Continuous service schematics… Cost and capacity 5
  • 6. You can’t just “look for flow increases” Other Complex Data network utility quality events process 6
  • 7. Analyst = Superman? • Sifting Check all data for all DMAs • Statistical estimation Is flow surprisingly high? • Special knowledge Was it caused by something else?  TaKaDu’s algorithms help boost this phase 7
  • 9. WHY WE NEED TO STUDY LEAKS (AND HOW WE GOT TO BE GOOD AT IT) 9
  • 10. Can you spot the hiding elephant? 10
  • 11. Some leaks are easy to spot • Great for marketing and conference slides But… • You don’t need a fancy algorithm to find this • You may not even need an analyst
  • 12. But most leaks are a little trickier 12
  • 13. But most leaks are a little trickier 13
  • 14. But most leaks are a little trickier 14
  • 15. How leaks hide in data • Small leaks (1 l/s) in large DMAs (XX l/s) • Other flow increases (legitimate or other faults) • Concurrent flow decrease • Concurrent expected flow increase • Random variability Other Complex • Wrong data! Data network utility quality events process • Gradual increase 15
  • 16. Field experience and hard evidence • Millions of sensor-days of data processed • Thousands of leaks found, analysed and reported at a dozen utilities • Every utility is unique (really!) • … But some basic truths are common 16
  • 17. TOP FACTS ABOUT LEAKAGE (WHICH DON’T GET ENOUGH PUBLICITY) 17
  • 18. Many leaks start abruptly at 0.5-5 l/s 4 l/s leak starts • You can target significant leaks soon after start • “DMA has 2 leaks, one X l/s and one Y l/s” vs. “DMA total leakage is Z l/s” 18
  • 19. Leaks start small and grow • Early intervention is worth more than it seems • A 1 l/s leak is just a 5 l/s leak waiting to happen 19
  • 20. … Or they cause major visible bursts • Early intervention prevents costly bursts • You often have weeks and even months before the “big pop” 20
  • 21. Do many leaks last years and years? • Very rare in events noticeable in data (~ 1 l/s) • Perhaps common in leaks of 0.1 l/s or 0.01 l/s? Does anyone have solid evidence for this? Are many DMAs leaking 20 x 0.1 l/s? Tinier leaks are vast majority of repairs, but do they matter? • So where does (real) water loss come from? 21
  • 22. Many leaks last weeks to months (then they are repaired after a visible burst or ALC) 110 l/s burst • Several megalitres lost before repair / big burst • This is a huge component of water loss 22
  • 23. Some leaks grow very slowly • Rare, but possibly a distinct category of leak • Anecdotally tougher to locate (many months) • Maybe old pipe perforating at many locations? 23