SlideShare a Scribd company logo
PRESENTED BY:-
GAURAV BISWAS
BIT MESRA
 ABSTRACT
 INTRODUCTION
 Example and benefits
 LITERATURE REVIEW
 RESEARCH METHODOLOGY
 IMPLEMENTATION
 RESULT AND DISCUSSION
 CONCLUSIONs
 FUTURE SCOPE
 REFERENCEs
 The objective of this project is to locate and identify the
anomalies in an underground pipeline installation.
 Anomalies are identified and classified as structural damage
and Operational Maintenance also we have to trained the
Deep Learning model for Anomaly Detection and
Classification.
 For this we are using two techniques:-
(a) Convolutional Neural Network (CNN).
(b) Faster RCNN.
 Automation of manual assessment of hours of video.
 Reduce the human errors and reduce risk of liability issues.
 Pipeline Anomaly Detection is an automated Condition
Assessment System for pipeline networks. It reduces
manual efforts and time needed to review and code
video scans.
 It uses Artificial Intelligence (AI) and advanced neural
networks to identify, grade and score pipe anomalies.
 Videos of pipeline are generated by a camera-mounted
rover into the underground pipelines.
 It automates the process of identification of defects in
pipeline videos and generates a comprehensive
inspection report.
Fig: Camera-mounted rovers to record video of underground
sewer pipes.
Fig: Sample Anomalies and annotated images using the Pipeline
Anomaly Detection.
Saves Time.
Reduces Scanning Costs.
Provides High Accuracy.
Increases Availability of Experts.
Optimizes Maintenance Decisions.
Improves Customer Service.
Fig: Case Study of Pipeline Anomaly Detection.
AUTHOR YEAR STUDY FINDING
S. Safari
&
M.
Aliyari
2005 Detection and isolation
of interior defects
based on image
processing, Journal of
Pipeline Systems
Engineering and
Practice.
Principles regarding the learning
algorithm or deep architectures in
particular of those building blocks
unsupervised learning for single-
layer models and for pipeline
systems.
S. Kumar
& D.M.
Abraham
2017 Automated defect
classification in sewer
closed circuit using
CNN.
Investigated land area is labeled
into water and the classification is
compared to per-pixel works.
R.
Fenner
2009 Approaches to sewer
maintenance a review,
Urban Water pipeline
anomaly detection.
Using this approach we have to
reconstruct the frames from the
video and from that frames again
extracted the I- frames from it and
then display the result.
 Using Convolutional Neural Network (CNN) techniques for
implementing deep neural networks.
 Extracting Frames from the underground pipeline video and
then train those frames with this algorithm.
 Provide the underground pipeline frames dataset as an input.
 We have to use Optical Character Recognition (OCR) and
Pytesseract for extracting the text from the given images.
 Use OCR and Pytesseract for extracting text from image got
35% and 60% accuracy.
Also use Autoencoders for clearing the blur
images.
Extraction of I- Frames from the dataset using
different codes.
Detecting defects in the given video with a
camera-mounted rover and create a GUI
Application to get the output.
Got 90% accuracy using Faster RCNN.
For Extracting the text from the given pipeline video we
use:
 (a) Optical Character Recognition (OCR)
 (b) Pytesseract
(a) Optical Character Recognition (OCR):-
 It is the method of extracting text from the given image.
 It converts the image to gray scale, after that it smooth the image
and then it filters.
 Detect lines, words and characters.
(b) Tesseract:-
Python-tesseract is a tool used for OCR.
It is used an API to extract printed text from images.
It supports a wide variety of languages.
Tesseract was dependant on the multi-stage process
where we can differentiate steps like Word Finding,
Line Finding and Character Classification.
 Autoencoders:
 An autoencoder is a type of artificial neural network
used to learn efficient data in an unsupervised manner.
 The aim of an autoencoder is to learn a representation
for a set of data, typically for dimensionality reduction,
by training the network to ignore signal “noise”.
Fig: After performing Autoencoder this is the
outcome.
 If we want to extract just a single frame (I-Frame)
from the video into an image file we use I frame for
that.
 An I Frame (Intra coded frame) is a complete image
like a JPG or JPEG image file.
 The basic need is to compare the quality of the image
from the dataset and the actual I Frame image.
Fig: Actual Graphical User Interface (GUI) of Pipeline Anomaly
Detection.
 (A) Convolutional Neural Network:
 In deep learning, a convolutional neural network is a class of
deep neural networks, most commonly applied to analyzing
visual imagery.
 They are regularized versions of multilayer perceptrons. It
usually mean fully connected networks, that is, each neuron
in one layer is connected to all neurons in the next layer.
output
The Accuracy for Convolutional Neural Network (CNN) for this dataset is 70%
In this model we train our dataset into 50 epoch and finally get this
accuracy.
(B) FASTER RCNN:
Faster R-CNN with CNN features is the object
detection architecture and the pioneer approach
that applies deep models to object detection.
The function of this network is to generate
good features from the image.
The output of this network maintains the shape
and structure of the original image.
Fig: The architectures of Faster RCNN and Region Proposal Network
(RPN).
The Accuracy for Faster RCNN for this dataset is 90%.
In this model we train our dataset into 50 epoch and finally get this
accuracy.
 Using CNN and Faster RCNN to train our dataset for Pipeline
Anomaly Detection.
 A combination of CCTV, microwave sensor, neutron
and gamma ray, and hydro chemical sensors would be a
powerful tool.
 The most significant factor requiring water authorities to
undertake such exercises, however, will be the public
perception of sewer leakage.
 In our project the accuracy for CNN is near about 70% and
for Faster RCNN it is coming 90%.
Any deep learning application that we are using has big
scope in future. The function of output video frames needs to
be improved in the next stage of the research.
In addition, the output needs to be enhanced by including
more information (e.g., condition grade of the defects) to
realize the automation of the pipeline assessment.
Also the size of the training dataset is to cover as many
features as possible, which will lead to improving the
performance of the model.
[1] R. Fenner, 2002, Approaches to sewer maintenance a review Urban Water, New York, IEEE.
[2] K. Baah, B. Dubey, R. Harvey, 2009, A risk-based approach to sanitary sewer pipe asset management,
Germany, IEEE.
[3] M.D. Yang, T.C Su, 2014, Automated diagnosis of sewer pipe defects based on machine learning approaches,
Australia, IEEE, ICLR.
[4] Xinchen Yan, Jimei Yang, 2016, Conditional Image Generation from Visual Attributes, North Korea, IEEE,
ECCV
[5] O. Moselhi, 2004, Automated detection of surface defects in water and sewer pipes, Washington D.C, IEEE.
[6] S.K. Sinha, 2003, Computer vision techniques for automatic structural assessment of underground pipes,
India ECCV, IEEE.
[7] M.J. Anbari, 2017, Risk assessment model to prioritize sewer pipes inspection in wastewater collection
networks in Environ. Manag, Germany, IEEE ECCV .
[8] S.T. Ariaratnam, 2015, Financial outlay modeling for a local sewer rehabilitation strategy and Constr. Eng.
Manag, Russia, IEEE.
Pipeline anomaly detection

More Related Content

What's hot

High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
Dr. Amarjeet Singh
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
IJERA Editor
 
IRJET- Study of SVM and CNN in Semantic Concept Detection
IRJET- Study of SVM and CNN in Semantic Concept DetectionIRJET- Study of SVM and CNN in Semantic Concept Detection
IRJET- Study of SVM and CNN in Semantic Concept Detection
IRJET Journal
 
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
csandit
 
Automated Speech Recognition
Automated Speech Recognition Automated Speech Recognition
Automated Speech Recognition
Pruthvij Thakar
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
csandit
 
Hardware software co simulation of edge detection for image processing system...
Hardware software co simulation of edge detection for image processing system...Hardware software co simulation of edge detection for image processing system...
Hardware software co simulation of edge detection for image processing system...
eSAT Publishing House
 
Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)
PetteriTeikariPhD
 
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
Edge AI and Vision Alliance
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
ambitlick
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal Recognition
IJERA Editor
 
Biometric presentation attack detection
Biometric presentation attack detectionBiometric presentation attack detection
Biometric presentation attack detection
Gautam Saxena
 
I017425763
I017425763I017425763
I017425763
IOSR Journals
 
C04841417
C04841417C04841417
C04841417
IOSR-JEN
 
Single Image Depth Estimation using frequency domain analysis and Deep learning
Single Image Depth Estimation using frequency domain analysis and Deep learningSingle Image Depth Estimation using frequency domain analysis and Deep learning
Single Image Depth Estimation using frequency domain analysis and Deep learning
Ahan M R
 
H43044145
H43044145H43044145
H43044145
IJERA Editor
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniques
TELKOMNIKA JOURNAL
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
IJERA Editor
 
Design and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding SystemDesign and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding System
ijtsrd
 

What's hot (20)

High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
 
Mangesh_kothule_resume
Mangesh_kothule_resumeMangesh_kothule_resume
Mangesh_kothule_resume
 
Hf2513081311
Hf2513081311Hf2513081311
Hf2513081311
 
IRJET- Study of SVM and CNN in Semantic Concept Detection
IRJET- Study of SVM and CNN in Semantic Concept DetectionIRJET- Study of SVM and CNN in Semantic Concept Detection
IRJET- Study of SVM and CNN in Semantic Concept Detection
 
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
 
Automated Speech Recognition
Automated Speech Recognition Automated Speech Recognition
Automated Speech Recognition
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
 
Hardware software co simulation of edge detection for image processing system...
Hardware software co simulation of edge detection for image processing system...Hardware software co simulation of edge detection for image processing system...
Hardware software co simulation of edge detection for image processing system...
 
Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)Deep Learning for Structure-from-Motion (SfM)
Deep Learning for Structure-from-Motion (SfM)
 
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
“Case Study: Facial Detection and Recognition for Always-On Applications,” a ...
 
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor NetworksAccurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
Accurate and Energy-Efficient Range-Free Localization for Mobile Sensor Networks
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal Recognition
 
Biometric presentation attack detection
Biometric presentation attack detectionBiometric presentation attack detection
Biometric presentation attack detection
 
I017425763
I017425763I017425763
I017425763
 
C04841417
C04841417C04841417
C04841417
 
Single Image Depth Estimation using frequency domain analysis and Deep learning
Single Image Depth Estimation using frequency domain analysis and Deep learningSingle Image Depth Estimation using frequency domain analysis and Deep learning
Single Image Depth Estimation using frequency domain analysis and Deep learning
 
H43044145
H43044145H43044145
H43044145
 
Optimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniquesOptimization of image compression and ciphering based on EZW techniques
Optimization of image compression and ciphering based on EZW techniques
 
Wavelet Based Image Watermarking
Wavelet Based Image WatermarkingWavelet Based Image Watermarking
Wavelet Based Image Watermarking
 
Design and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding SystemDesign and Analysis of Quantization Based Low Bit Rate Encoding System
Design and Analysis of Quantization Based Low Bit Rate Encoding System
 

Similar to Pipeline anomaly detection

IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET Journal
 
Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.
IRJET Journal
 
Car Steering Angle Prediction Using Deep Learning
Car Steering Angle Prediction Using Deep LearningCar Steering Angle Prediction Using Deep Learning
Car Steering Angle Prediction Using Deep Learning
IRJET Journal
 
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
CSCJournals
 
Anomaly Detection with Azure and .NET
Anomaly Detection with Azure and .NETAnomaly Detection with Azure and .NET
Anomaly Detection with Azure and .NET
Marco Parenzan
 
Real time Traffic Signs Recognition using Deep Learning
Real time Traffic Signs Recognition using Deep LearningReal time Traffic Signs Recognition using Deep Learning
Real time Traffic Signs Recognition using Deep Learning
IRJET Journal
 
Text Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewText Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A Review
IRJET Journal
 
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkDevanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural Network
IRJET Journal
 
06-08 ppt.pptx
06-08 ppt.pptx06-08 ppt.pptx
06-08 ppt.pptx
Farah Naaz
 
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHONLANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
IRJET Journal
 
VIDEO BASED SIGN LANGUAGE RECOGNITION USING CNN-LSTM
VIDEO BASED SIGN LANGUAGE RECOGNITION USING CNN-LSTMVIDEO BASED SIGN LANGUAGE RECOGNITION USING CNN-LSTM
VIDEO BASED SIGN LANGUAGE RECOGNITION USING CNN-LSTM
IRJET Journal
 
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problems
PetteriTeikariPhD
 
IRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET - Object Detection and Translation for Blind People using Deep LearningIRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET Journal
 
IRJET-Cleaner Drone
IRJET-Cleaner DroneIRJET-Cleaner Drone
IRJET-Cleaner Drone
IRJET Journal
 
Gesture Recognition System using Computer Vision
Gesture Recognition System using Computer VisionGesture Recognition System using Computer Vision
Gesture Recognition System using Computer Vision
IRJET Journal
 
FACE COUNTING USING OPEN CV & PYTHON FOR ANALYZING UNUSUAL EVENTS IN CROWDS
FACE COUNTING USING OPEN CV & PYTHON FOR ANALYZING UNUSUAL EVENTS IN CROWDSFACE COUNTING USING OPEN CV & PYTHON FOR ANALYZING UNUSUAL EVENTS IN CROWDS
FACE COUNTING USING OPEN CV & PYTHON FOR ANALYZING UNUSUAL EVENTS IN CROWDS
IRJET Journal
 
SIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLE
SIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLESIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLE
SIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLE
IRJET Journal
 
IMAGE CAPTION GENERATOR USING DEEP LEARNING
IMAGE CAPTION GENERATOR USING DEEP LEARNINGIMAGE CAPTION GENERATOR USING DEEP LEARNING
IMAGE CAPTION GENERATOR USING DEEP LEARNING
IRJET Journal
 
A REVIEW ON IMPROVING TRAFFIC-SIGN DETECTION USING YOLO ALGORITHM FOR OBJECT ...
A REVIEW ON IMPROVING TRAFFIC-SIGN DETECTION USING YOLO ALGORITHM FOR OBJECT ...A REVIEW ON IMPROVING TRAFFIC-SIGN DETECTION USING YOLO ALGORITHM FOR OBJECT ...
A REVIEW ON IMPROVING TRAFFIC-SIGN DETECTION USING YOLO ALGORITHM FOR OBJECT ...
IRJET Journal
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
IRJET Journal
 

Similar to Pipeline anomaly detection (20)

IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting PneumoniaIRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
IRJET- A Survey on Medical Image Interpretation for Predicting Pneumonia
 
Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.Image super resolution using Generative Adversarial Network.
Image super resolution using Generative Adversarial Network.
 
Car Steering Angle Prediction Using Deep Learning
Car Steering Angle Prediction Using Deep LearningCar Steering Angle Prediction Using Deep Learning
Car Steering Angle Prediction Using Deep Learning
 
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
Semantic Concept Detection in Video Using Hybrid Model of CNN and SVM Classif...
 
Anomaly Detection with Azure and .NET
Anomaly Detection with Azure and .NETAnomaly Detection with Azure and .NET
Anomaly Detection with Azure and .NET
 
Real time Traffic Signs Recognition using Deep Learning
Real time Traffic Signs Recognition using Deep LearningReal time Traffic Signs Recognition using Deep Learning
Real time Traffic Signs Recognition using Deep Learning
 
Text Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A ReviewText Recognition using Convolutional Neural Network: A Review
Text Recognition using Convolutional Neural Network: A Review
 
Devanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural NetworkDevanagari Digit and Character Recognition Using Convolutional Neural Network
Devanagari Digit and Character Recognition Using Convolutional Neural Network
 
06-08 ppt.pptx
06-08 ppt.pptx06-08 ppt.pptx
06-08 ppt.pptx
 
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHONLANE DETECTION USING IMAGE PROCESSING IN PYTHON
LANE DETECTION USING IMAGE PROCESSING IN PYTHON
 
VIDEO BASED SIGN LANGUAGE RECOGNITION USING CNN-LSTM
VIDEO BASED SIGN LANGUAGE RECOGNITION USING CNN-LSTMVIDEO BASED SIGN LANGUAGE RECOGNITION USING CNN-LSTM
VIDEO BASED SIGN LANGUAGE RECOGNITION USING CNN-LSTM
 
Dataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problemsDataset creation for Deep Learning-based Geometric Computer Vision problems
Dataset creation for Deep Learning-based Geometric Computer Vision problems
 
IRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET - Object Detection and Translation for Blind People using Deep LearningIRJET - Object Detection and Translation for Blind People using Deep Learning
IRJET - Object Detection and Translation for Blind People using Deep Learning
 
IRJET-Cleaner Drone
IRJET-Cleaner DroneIRJET-Cleaner Drone
IRJET-Cleaner Drone
 
Gesture Recognition System using Computer Vision
Gesture Recognition System using Computer VisionGesture Recognition System using Computer Vision
Gesture Recognition System using Computer Vision
 
FACE COUNTING USING OPEN CV & PYTHON FOR ANALYZING UNUSUAL EVENTS IN CROWDS
FACE COUNTING USING OPEN CV & PYTHON FOR ANALYZING UNUSUAL EVENTS IN CROWDSFACE COUNTING USING OPEN CV & PYTHON FOR ANALYZING UNUSUAL EVENTS IN CROWDS
FACE COUNTING USING OPEN CV & PYTHON FOR ANALYZING UNUSUAL EVENTS IN CROWDS
 
SIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLE
SIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLESIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLE
SIGN LANGUAGE INTERFACE SYSTEM FOR HEARING IMPAIRED PEOPLE
 
IMAGE CAPTION GENERATOR USING DEEP LEARNING
IMAGE CAPTION GENERATOR USING DEEP LEARNINGIMAGE CAPTION GENERATOR USING DEEP LEARNING
IMAGE CAPTION GENERATOR USING DEEP LEARNING
 
A REVIEW ON IMPROVING TRAFFIC-SIGN DETECTION USING YOLO ALGORITHM FOR OBJECT ...
A REVIEW ON IMPROVING TRAFFIC-SIGN DETECTION USING YOLO ALGORITHM FOR OBJECT ...A REVIEW ON IMPROVING TRAFFIC-SIGN DETECTION USING YOLO ALGORITHM FOR OBJECT ...
A REVIEW ON IMPROVING TRAFFIC-SIGN DETECTION USING YOLO ALGORITHM FOR OBJECT ...
 
Human Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision TechniqueHuman Motion Detection in Video Surveillance using Computer Vision Technique
Human Motion Detection in Video Surveillance using Computer Vision Technique
 

More from GauravBiswas9

SPARK ARCHITECTURE
SPARK ARCHITECTURESPARK ARCHITECTURE
SPARK ARCHITECTURE
GauravBiswas9
 
Spark architecture
Spark architectureSpark architecture
Spark architecture
GauravBiswas9
 
WCDMA
WCDMA WCDMA
Ofdm
OfdmOfdm
2.5G Cellular Standards
2.5G Cellular Standards2.5G Cellular Standards
2.5G Cellular Standards
GauravBiswas9
 
Map reduce in BIG DATA
Map reduce in BIG DATAMap reduce in BIG DATA
Map reduce in BIG DATA
GauravBiswas9
 
Iot in healthcare
Iot in healthcareIot in healthcare
Iot in healthcare
GauravBiswas9
 
Gsm vs gprs
Gsm vs gprsGsm vs gprs
Gsm vs gprs
GauravBiswas9
 
Circuit switch vs packet switch
Circuit switch vs packet switchCircuit switch vs packet switch
Circuit switch vs packet switch
GauravBiswas9
 
Channelization scheme in AMPS & GSM
Channelization scheme in AMPS & GSMChannelization scheme in AMPS & GSM
Channelization scheme in AMPS & GSM
GauravBiswas9
 
Big data analytics.
Big data analytics.Big data analytics.
Big data analytics.
GauravBiswas9
 

More from GauravBiswas9 (11)

SPARK ARCHITECTURE
SPARK ARCHITECTURESPARK ARCHITECTURE
SPARK ARCHITECTURE
 
Spark architecture
Spark architectureSpark architecture
Spark architecture
 
WCDMA
WCDMA WCDMA
WCDMA
 
Ofdm
OfdmOfdm
Ofdm
 
2.5G Cellular Standards
2.5G Cellular Standards2.5G Cellular Standards
2.5G Cellular Standards
 
Map reduce in BIG DATA
Map reduce in BIG DATAMap reduce in BIG DATA
Map reduce in BIG DATA
 
Iot in healthcare
Iot in healthcareIot in healthcare
Iot in healthcare
 
Gsm vs gprs
Gsm vs gprsGsm vs gprs
Gsm vs gprs
 
Circuit switch vs packet switch
Circuit switch vs packet switchCircuit switch vs packet switch
Circuit switch vs packet switch
 
Channelization scheme in AMPS & GSM
Channelization scheme in AMPS & GSMChannelization scheme in AMPS & GSM
Channelization scheme in AMPS & GSM
 
Big data analytics.
Big data analytics.Big data analytics.
Big data analytics.
 

Recently uploaded

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
Jayaprasanna4
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
abh.arya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
FluxPrime1
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
PrashantGoswami42
 

Recently uploaded (20)

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
ethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.pptethical hacking in wireless-hacking1.ppt
ethical hacking in wireless-hacking1.ppt
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
Vaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdfVaccine management system project report documentation..pdf
Vaccine management system project report documentation..pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
DESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docxDESIGN A COTTON SEED SEPARATION MACHINE.docx
DESIGN A COTTON SEED SEPARATION MACHINE.docx
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 

Pipeline anomaly detection

  • 2.  ABSTRACT  INTRODUCTION  Example and benefits  LITERATURE REVIEW  RESEARCH METHODOLOGY  IMPLEMENTATION  RESULT AND DISCUSSION  CONCLUSIONs  FUTURE SCOPE  REFERENCEs
  • 3.  The objective of this project is to locate and identify the anomalies in an underground pipeline installation.  Anomalies are identified and classified as structural damage and Operational Maintenance also we have to trained the Deep Learning model for Anomaly Detection and Classification.  For this we are using two techniques:- (a) Convolutional Neural Network (CNN). (b) Faster RCNN.  Automation of manual assessment of hours of video.  Reduce the human errors and reduce risk of liability issues.
  • 4.  Pipeline Anomaly Detection is an automated Condition Assessment System for pipeline networks. It reduces manual efforts and time needed to review and code video scans.  It uses Artificial Intelligence (AI) and advanced neural networks to identify, grade and score pipe anomalies.  Videos of pipeline are generated by a camera-mounted rover into the underground pipelines.  It automates the process of identification of defects in pipeline videos and generates a comprehensive inspection report.
  • 5. Fig: Camera-mounted rovers to record video of underground sewer pipes.
  • 6. Fig: Sample Anomalies and annotated images using the Pipeline Anomaly Detection.
  • 7. Saves Time. Reduces Scanning Costs. Provides High Accuracy. Increases Availability of Experts. Optimizes Maintenance Decisions. Improves Customer Service.
  • 8. Fig: Case Study of Pipeline Anomaly Detection.
  • 9. AUTHOR YEAR STUDY FINDING S. Safari & M. Aliyari 2005 Detection and isolation of interior defects based on image processing, Journal of Pipeline Systems Engineering and Practice. Principles regarding the learning algorithm or deep architectures in particular of those building blocks unsupervised learning for single- layer models and for pipeline systems. S. Kumar & D.M. Abraham 2017 Automated defect classification in sewer closed circuit using CNN. Investigated land area is labeled into water and the classification is compared to per-pixel works. R. Fenner 2009 Approaches to sewer maintenance a review, Urban Water pipeline anomaly detection. Using this approach we have to reconstruct the frames from the video and from that frames again extracted the I- frames from it and then display the result.
  • 10.  Using Convolutional Neural Network (CNN) techniques for implementing deep neural networks.  Extracting Frames from the underground pipeline video and then train those frames with this algorithm.  Provide the underground pipeline frames dataset as an input.  We have to use Optical Character Recognition (OCR) and Pytesseract for extracting the text from the given images.  Use OCR and Pytesseract for extracting text from image got 35% and 60% accuracy.
  • 11. Also use Autoencoders for clearing the blur images. Extraction of I- Frames from the dataset using different codes. Detecting defects in the given video with a camera-mounted rover and create a GUI Application to get the output. Got 90% accuracy using Faster RCNN.
  • 12. For Extracting the text from the given pipeline video we use:  (a) Optical Character Recognition (OCR)  (b) Pytesseract (a) Optical Character Recognition (OCR):-  It is the method of extracting text from the given image.  It converts the image to gray scale, after that it smooth the image and then it filters.  Detect lines, words and characters.
  • 13. (b) Tesseract:- Python-tesseract is a tool used for OCR. It is used an API to extract printed text from images. It supports a wide variety of languages. Tesseract was dependant on the multi-stage process where we can differentiate steps like Word Finding, Line Finding and Character Classification.
  • 14.  Autoencoders:  An autoencoder is a type of artificial neural network used to learn efficient data in an unsupervised manner.  The aim of an autoencoder is to learn a representation for a set of data, typically for dimensionality reduction, by training the network to ignore signal “noise”.
  • 15. Fig: After performing Autoencoder this is the outcome.
  • 16.  If we want to extract just a single frame (I-Frame) from the video into an image file we use I frame for that.  An I Frame (Intra coded frame) is a complete image like a JPG or JPEG image file.  The basic need is to compare the quality of the image from the dataset and the actual I Frame image.
  • 17. Fig: Actual Graphical User Interface (GUI) of Pipeline Anomaly Detection.
  • 18.  (A) Convolutional Neural Network:  In deep learning, a convolutional neural network is a class of deep neural networks, most commonly applied to analyzing visual imagery.  They are regularized versions of multilayer perceptrons. It usually mean fully connected networks, that is, each neuron in one layer is connected to all neurons in the next layer. output
  • 19. The Accuracy for Convolutional Neural Network (CNN) for this dataset is 70% In this model we train our dataset into 50 epoch and finally get this accuracy.
  • 20. (B) FASTER RCNN: Faster R-CNN with CNN features is the object detection architecture and the pioneer approach that applies deep models to object detection. The function of this network is to generate good features from the image. The output of this network maintains the shape and structure of the original image.
  • 21. Fig: The architectures of Faster RCNN and Region Proposal Network (RPN).
  • 22. The Accuracy for Faster RCNN for this dataset is 90%. In this model we train our dataset into 50 epoch and finally get this accuracy.
  • 23.  Using CNN and Faster RCNN to train our dataset for Pipeline Anomaly Detection.  A combination of CCTV, microwave sensor, neutron and gamma ray, and hydro chemical sensors would be a powerful tool.  The most significant factor requiring water authorities to undertake such exercises, however, will be the public perception of sewer leakage.  In our project the accuracy for CNN is near about 70% and for Faster RCNN it is coming 90%.
  • 24. Any deep learning application that we are using has big scope in future. The function of output video frames needs to be improved in the next stage of the research. In addition, the output needs to be enhanced by including more information (e.g., condition grade of the defects) to realize the automation of the pipeline assessment. Also the size of the training dataset is to cover as many features as possible, which will lead to improving the performance of the model.
  • 25. [1] R. Fenner, 2002, Approaches to sewer maintenance a review Urban Water, New York, IEEE. [2] K. Baah, B. Dubey, R. Harvey, 2009, A risk-based approach to sanitary sewer pipe asset management, Germany, IEEE. [3] M.D. Yang, T.C Su, 2014, Automated diagnosis of sewer pipe defects based on machine learning approaches, Australia, IEEE, ICLR. [4] Xinchen Yan, Jimei Yang, 2016, Conditional Image Generation from Visual Attributes, North Korea, IEEE, ECCV [5] O. Moselhi, 2004, Automated detection of surface defects in water and sewer pipes, Washington D.C, IEEE. [6] S.K. Sinha, 2003, Computer vision techniques for automatic structural assessment of underground pipes, India ECCV, IEEE. [7] M.J. Anbari, 2017, Risk assessment model to prioritize sewer pipes inspection in wastewater collection networks in Environ. Manag, Germany, IEEE ECCV . [8] S.T. Ariaratnam, 2015, Financial outlay modeling for a local sewer rehabilitation strategy and Constr. Eng. Manag, Russia, IEEE.