Pipeline leaks pose significant risks to industries, the environment, and individuals, so localizing pipeline leaks is crucial for enhancing pipeline safety during operation. This paper applies a method for localizing pipeline leakages, integrating transient signal detection with multi-sensor data fusion. Addressing the challenges in detecting small leaks amidst strong noise and uncertainty, the method employs the Dempster–Shafer evidence framework for data fusion and an algorithm to analyze transient pressure waves. Comparing it with three spectrum-based methods, the performance of the fusion method is discussed in the single-leakage and multi-leakage cases. In the single-leakage case, even with high levels of noise, the fusion algorithm delivers precise localization estimates. The fusion method excels over the other three methods in the multi-leakage case. The approach significantly enhances the accuracy of leak localization in water pipelines. Extensive simulations demonstrate the method's effectiveness, particularly in noisy environments, offering a promising solution for maintaining pipeline integrity and reducing resource wastage.

  • The leak location pipeline transient model is obtained using transfer matrix analysis.

  • The method combines fusion algorithms with leak detection methods to improve detection accuracy.

  • This method has high noise immunity for small leakage detection.

Pipeline transportation is a vital component of industrial production and everyday activities due to its numerous advantages, including high capacity, easy construction, cost-effectiveness, and straightforward operation (Moubayed et al. 2021). Despite these benefits, pipeline systems are susceptible to various challenges such as corrosion, ageing, and external forces (Huang et al. 2020). The occurrence of these issues is often influenced by both internal and external factors, leading to frequent incidents of pipeline leakage. The ramifications of these leaks extend beyond resource wastage, encompassing significant economic losses. For this reason, ensuring the safety and reliability of pipeline systems through prompt leak detection and localization is paramount in industrial operations and daily life.

In recent years, the field of leak detection and localization has seen a significant focus on transient-based techniques due to the promising and versatile nature of the fluid transient-based defect detection method. Extensive research efforts over the past few decades have contributed to the development of various commercially available leak detection techniques. These techniques range from simple physical detection methods to sophisticated acoustic approaches such as vibration signals (Kothandaraman et al. 2022), negative pressure waves (Chen et al. 2018; Lang 2021), and sound waves (Lang et al. 2018). The method for detecting defects using fluid transients involves introducing hydraulic waves into piping systems, measuring the pressure response at specific locations, and analyzing the signals to identify and characterize defects.

In practice, transient wave reflections from small leaks are typically weak and can be influenced by various uncertainties such as noise, traffic, mechanical equipment, and turbulence. To enhance the robustness of leak localization, two methods can be employed, as suggested by Keramat et al. (2019). The first approach, proposed by Wang et al. (2020a), involves conducting the experiment multiple times and using the average of several transient measurements. The wavelet transform technique has been shown to be effective in accurately pinpointing small leaks (Ferrante et al. 2007). However, conducting these transient experiments repeatedly is labor-intensive, disturbs the water supply, risks inducing pipeline structural fatigue, and is therefore impractical. The second solution suggests conducting the transient experiment just once but utilizing pressure signals from multiple sensors at various locations. The second solution proposes to perform only one transient experiment, using pressure signals from multiple sensors at different locations for leak detection by means of spectral analysis techniques. The utilization of sensors for health monitoring in contemporary urban pipe networks is on the rise (Qi et al. 2018). To enhance leak detection accuracy in noisy environments, the multi-sensor approach is gaining traction (Khaleghi et al. 2013; Wang et al. 2018). Leakage patterns are deterministic and manifest in each sensor's signal amidst random fluctuations.

Many applications, including sensor networks, automated control, and video/image processing, have been developed in the field of multi-sensor fusion. Researchers have used fuzzy set theory (Zadeh 1965), Dempster–Shafer evidence theory (DEST) (Shafer 1976), and probabilistic theory (Durrant-Whyte & Henderson 2008) to quantify data defects in information fusion. Probability distributions are used to represent data uncertainty, while fuzzy set theory is employed to represent data ambiguity. However, in cases that involve uncertain and ambiguous data, the DEST (Dempster 1967) is considered to be more general and flexible. In the context of leak localization problems, the pressure data obtained from each sensor often suffer from noise and uncertainty due to the system's complexity. Despite their imperfections, these pressure measurements provide valuable evidence about the presence and location of the leak. Modeling this evidence (Wang et al. 2020b) with probability distributions is difficult due to the unknown distribution of arbitrary uncertainty in the data. In contrast, transient wave data display a distinct structure. Hence, this study proposes a novel approach to dealing with uncertainty in transient wave data by utilizing the DEST framework.

Wang et al. (2019) used spectrum analysis for leak detection, but in the case of multiple leaks, the localization effect deteriorates and even misclassification occurs when the leaks are too close together. To solve this problem, we propose the DS-MUSIC-like method on top of this, which combines the DEST framework to analyze the transient waveform data to achieve multi-sensor fusion and reduce uncertainty. By applying the improved subspace-based DS-MUSIC-like algorithm to simulate small leaks by varying the leakage area, we are able to detect not only small leaks that are difficult to identify under strong noise but also leaks that are too close to each other successfully. This detection method takes location information into account and improves the accuracy and diagnostic capability of leak localization.

The paper is structured as follows: first, a description of the hydraulic transient model is presented. Then, the multi-source sensor fusion method is described in detail. Numerical simulations are performed to verify the effectiveness of the method. We present the results and discuss the performance of the DEST methodology for single and multiple leaks. Finally, conclusions are drawn.

Transient pipeline modeling

A transient pipeline model is developed in this section to study the reservoir-pipe-valve system. The pipeline model, shown in Figure 1, consists of two tanks defining a pipeline with length l. The upstream tank location and downstream tank location are specified. Denoting the sensor location near the downstream tank as , the leakage location is denoted by .
Figure 1

Structure of the pipeline system under consideration.

Figure 1

Structure of the pipeline system under consideration.

Close modal
Based on the conservation of mass and Newton's second law, the continuum and momentum equations of one-dimensional non-constant flow (Chaudhry 2014) can be obtained by taking a specific small cell. This process allows the derivation of the basic set of differential equations for the change in flow rate and pressure during the flow in the pipe. Figure 1 shows the setup of the considered piping system.
(1)
(2)

In the pipe, the water pressure is represented by P and the flow rate by V. The water density is represented as , and the pressure wave velocity is denoted by a. represents the angle between the pipe and the horizontal plane, while g represents the gravitational acceleration. The Darcy–Weisbach friction factor is expressed as f, while the internal diameter of the pipe is indicated as D. The friction resistance term is linearized due to the second-order non-linearity of the turbulence pipe flow term, making direct conversion to the frequency domain difficult (Duan et al. 2018). In addition, time is represented by t, and the distance from the upstream extremity of the pipe is denoted by x.

The tube with the length of l is divided into i sections, and in the ith section of the pipe, the relationship between the discharge flow and the head at and the discharge flow and the head at is determined by applying the transfer matrix technique to the value at , which is based on the linearized form of the frictional resistance term and the orifice equation.
(3)
in which
(4)
is the matrix of fields,
(5)
is the characteristic resistance, and
(6)
is the propagating function.
(7)
where is the stabilized leakage flow corresponding to the head , is the discharge coefficient of the leak, and is the flow area of the leak orifice.
The pressure head at the pressure sensor can be determined for a specific angular frequency .
(8)
in which is the size of the leak, and
(9)
(10)
where is the pipe's elevation at the leak, and is additive unrelated Gaussian random disturbance with zero mean and covariance .
In the experiments discussed in this paper, the boundary conditions at the upstream node are denoted as and , are assumed to be known. The upstream is connected to a reservoir, leading to the reasonable assumption that . The discharge can be estimated if a measurement station is located near the upstream boundary, denoted as . Assuming there is no leakage between and , the discharge at the upstream node can be determined using the pressure head measurement at . By utilizing the known boundary condition , it becomes possible to solve for .
(11)
Let represent the discrepancy in the pressure sensor readings before and after the leak, computed as
(12)
The generalized model can be obtained as
(13)
Here, is a vector with JM dimensions (Wang & Ghidaoui 2018):
(14)
and
(15)
is also a vector in JM dimensions. M is the sensor count.

This suggests that the head pressure difference value is linked to the leak's location, thus will be utilized subsequently.

MUSIC-like algorithm applied to leak detection

The leakage localization of pipelines in the framework of beamforming can be achieved by applying an algorithm known as the MUSIC-like algorithm (Lim et al. 2016). This method maintains the high-resolution estimation capability of the MUSIC algorithm while adjusting and optimizing the algorithm accordingly, taking into account the characteristics of the underwater acoustic channel, the multipath effect, and the noise interference as a way of dealing with the challenges of the underwater environment. This algorithm utilizes the pressure sensor acquisition data and aims to minimize the total power while imposing constraints on the desired signal power. The optimization problem associated with this algorithm (Zhang & Ng 2010) can be defined as follows:
(16)
(17)

The weight matrix represents the optimal solution vector of the problem. is an estimate of the received signal covariance vector. is a control parameter and represents a non-essential constant in the optimization process outcomes.

The data's covariance matrix is derived by continuously measuring the N pressure difference vectors. The matrix can be expressed as follows:
(18)
Construct the objective function by solving it using the Lagrangian method:
(19)
where is the Lagrange multiplier.
By deriving Equation (19) and setting the result to zero, we achieve the following result:
(20)
Equation (19) is revised as follows:
(21)
where
(22)

Let represents the smallest eigenvalue, and represents the second smallest eigenvalue of the covariance matrix .

The optimization problem defined in Equation (16) is converted to an eigenvalue problem, as shown in Equation (20). In this scenario, the weight vector is the eigenvector that corresponds to the smallest eigenvalue of the matrix . The leakage location can be determined from peaks in the spatial power spectrum. The formula is expressed as
(23)

Multi-sensor leakage data fusion

Originally proposed by A.P. Dempster in 1967, the Dempster–Shafer theory of evidence, also referred to as the theory of belief function theory (Dempster 1967), was introduced to tackle multivalued mapping issues through the utilization of upper and lower bound probabilities. G. Shafer introduced the concept of belief function to develop the theory of evidence. He also created a set of mathematical methods for dealing with uncertainty reasoning, including evidence and combination. D–S theory is an extension of Bayesian reasoning that effectively captures the concept of uncertainty (Lin et al. 2021). It does not need to know the a priori probability and can be very useful.

Suppose the identification frame Θ consists of n exclusive elements, and represents the power set of Θ expressed as:
(24)
The mass function of the uncertainty of the event, also known as basic probability assignment (BPA), is quantized with the constraint that
(25)

The subset A of Θ is termed a focal element of m if m(A) is greater than zero, where m is any measure. The empty set is denoted by . The mass function m(A) indicates the level of support for A provided by the evidence.

The quality of m(A) measures the level of confidence in its worthiness. This can be expressed through the associated confidence and likelihood functions and can be obtained for any A subset of Θ, by
(26)
(27)
where B is a subset of A.
In an evidence theory identification framework, BPA calculates confidence function Bel(A) and likelihood function Pl(A) for hypothesis A, forming a trust interval [Bel(A), Pl(A)] that shows the level of certainty for the hypothesis. Consider two quality functions, m and m, on an identification framework Θ, representing independent and reliable evidence sources. The combination function, , is merged using Dempster's rule for evidence combination (Shafer 1976):
(28)
included among these
(29)
indicates a level of conflict between two items of evidence. B and C are subsets of A. As the value of K increases, the conflict becomes more severe and the combination of information becomes less informative.
Generally, the above law of evidence combination can be extended to n mass functions as follows:
(30)
K is defined as
(31)
Two pipe cases are considered: one with a leak (L) and one without a leak (NL). Define the identification framework and the power set of . The mass function that describes the possible locations of leakage x is as follows:
(32)
(33)
(34)
(35)

in which stands for spectrum function.

Once we have the mass function distribution, we can use the Dempster combination rule to combine information from various sensors and pinpoint the location of a possible leak.
(36)
(37)
(38)
(39)
The leak location is determined by the probability of maximum
(40)

Leak localization methods are summarized in Algorithm 1.

Algorithm 1. Localization of leaks through multi-sensor fusion within the Dempster–Shafer framework

  • 1. Select J frequencies .

  • 2. Calculate the pressure head difference using the formula as data.

  • 3. Obtain the power spectrum function by the MUSIC-like algorithm .

  • 4. Calculate the mass function for each position x by Equations (32)–(35).

  • 5. Fuse the mass functions by Equations (36)–(39).

  • 6. Determine the location of the leak by using Equation (40).

Numerical setup

The validation of the proposed leak localization method using simulation data is presented in this section. Figure 1 displays the layout of the numerically simulated pipeline, with a valve located downstream of a single pipeline and pressure sensors positioned in the same downstream area. Another pressure sensor at is used to estimate . For downstream multi-sensor arrangements, there is a sensor ambiguity problem. When two sensors are too close to each other, the measurements received from the two sensors are linearly correlated. To avoid this problem in order to obtain the most leakage information, the distance between two sensors is required to be not less than (Wang 2021), where is the minimum wavelength of the detected wave.

The transfer matrix method is used to simulate unsteady wave propagation in the frequency range. It is assumed that pulse waves are generated when the valve rapidly closes and opens. The specified boundary conditions are and , with the simulation's key parameters listed in Table 1.

Table 1

Parameters of the pipeline

Piping parametersNumerical value
Pipe length  
Wave speed  
Upstream reservoir head  
Downstream reservoir head  
Pipe diameter  
Darcy–Weisbach coefficient  
Steady-state discharge  
Upstream boundary head  
Downstream boundary discharge  
Piping parametersNumerical value
Pipe length  
Wave speed  
Upstream reservoir head  
Downstream reservoir head  
Pipe diameter  
Darcy–Weisbach coefficient  
Steady-state discharge  
Upstream boundary head  
Downstream boundary discharge  

Gaussian white noise with zero mean is added to all pressure sensors. The noise level is defined as the ratio of the noise level to the signal-to-noise ratio in decibels.
(41)
where is the mean head difference and is the Gaussian white noise standard deviation.

Leak localization performance with single leak and single sensor

This section discusses the estimation of individual leaks in the single sensor case with leak location and assuming the total leak parameter . The transient wave propagation is simulated with a sensor , and the DS fusion algorithm fuses the mass functions and obtained from and . For leakage detection, resonant and anti-resonant frequencies are used, where . The DS fusion algorithm is applied to a correlation matrix sample size of 620 (N = 620). To compare the DS fusion algorithm with other algorithms, the latter two belonging to the beamforming and subspace-based methods, respectively, the three beamforming algorithms are designed with different weighting vectors as candidate leakage position functions. The spatial power spectral function is maximized at the actual leakage location in these algorithms. Figure 2 shows the leakage localization results at a signal-to-noise ratio of 0 dB. From the leakage localization results in Figure 2, it can be observed that the Matched-Field Processing (MFP) method has a wider main flap with a large number of side lobes, particularly at 600, 800, and 1,200 m. In contrast, both Capon's beam-forming (BF) and MUSIC-like methods successfully achieve narrow peaks while retaining a relatively large amount of side lobes at 600 m. On the other hand, the DS-MUSIC-like method successfully achieves narrow peaks and eliminates all side lobes, outperforming these three methods.
Figure 2

Detection of one leak utilizing four algorithms. The actual leak location is 1,400 m. Fused data sensor locations are 1,800 and 2,000 m. The SNR is 0 dB.

Figure 2

Detection of one leak utilizing four algorithms. The actual leak location is 1,400 m. Fused data sensor locations are 1,800 and 2,000 m. The SNR is 0 dB.

Close modal

Leak localization performance with single leak and dual sensors

This section addresses estimating a single leak in the two sensor scenario, assuming the total leak parameter (effective leak size) and leak location . The simulation of transient wave propagation is conducted with sensor locations and . The DS fusion algorithm fuses the mass function m1 obtained from and with the mass function obtained from and . The leak localization results in Figure 3 show that Capon BF, MUSIC-like, and DS-MUSIC-like methods all produce sharp peaks and reduce sidebands effectively, unlike the MFP method where the primary lobe is wider and the secondary lobe is significantly high around 1,600 m. All three methods outperform MFP in terms of suppressing side lobes and fluctuations. However, for relatively small signal-to-noise ratios (SNRs) (e.g. −40 dB in Figure 4), the performance of the algorithms deteriorates as the noise level increases. This is evident as all four algorithms produce results with side lobes while still being able to roughly locate the leak. Higher side lobes may be misidentified as leaks, compromising leak location accuracy, especially if the number of leaks is unknown. In terms of suppressing side lobes and fluctuations, the fusion method, DS-MUSIC-like, exhibits superior performance.
Figure 3

Detection of one leak utilizing four algorithms. The actual leak location is 800 m. Fused data sensor locations are 1,800 and 2,000 m and 1,600 and 2,000 m. The SNR is 0 dB.

Figure 3

Detection of one leak utilizing four algorithms. The actual leak location is 800 m. Fused data sensor locations are 1,800 and 2,000 m and 1,600 and 2,000 m. The SNR is 0 dB.

Close modal
Figure 4

Detection of one leak utilizing four algorithms. The actual leak location is 600 m. Fused data sensor locations are 1,800 and 2,000 m and 1,600 and 2,000 m. The SNR is −40 dB.

Figure 4

Detection of one leak utilizing four algorithms. The actual leak location is 600 m. Fused data sensor locations are 1,800 and 2,000 m and 1,600 and 2,000 m. The SNR is −40 dB.

Close modal
To assess and compare the performance of the DS-MUSIC-like algorithm with three other methods, Figure 5 shows the root mean square error (RMSE) for each estimated leak location across different SNRs ranging from −40 to 0 dB. RMSE values were calculated as follows (Hussain et al. 2012):
(42)
where is our simulated value, indicates the true leak location, and is the estimated value from the ith trial. The results shown in Figure 5 indicate that the RMSE of estimation decreases as SNR increases, with the DS-MUSIC-like algorithm exhibiting smaller errors compared with other methods.
Figure 5

RMSE (m) of the first leak versus SNR.

Figure 5

RMSE (m) of the first leak versus SNR.

Close modal

Leak localization performance with dual leaks and single sensor

The DS fusion algorithm considers the double leakage case with a single sensor, where there are two leakages at points and with dimensions and , respectively. The sensor location is . Mass functions and obtained from and are fused by the DS fusion algorithm. Assuming a SNR of −30 dB for the measurement noise at all frequencies and a sample size N = 620, the results are displayed in Figure 6. Each figure shows a local maximum near each actual leak, confirming that all four methods accurately pinpoint two leaks. The first three algorithms, particularly the MFP algorithm, feature side flaps. The MFP algorithm is distinguished by its broad main flap and several side flaps, one of which is a high side flap at around 1,400 m. The wide main flap and the presence of high side flaps in the MFP algorithm can interfere with leak localization, especially when leak counts are unknown. In contrast, the DS fusion algorithm shows smooth curves in Figure 6 and proves to be effective in suppressing the side lobes.
Figure 6

Localization of two leaks using four algorithms. Actual leak locations are 600 and 1,000 m. Fused data sensor locations are 1,600 and 2,000 m. The SNR is −30 dB.

Figure 6

Localization of two leaks using four algorithms. Actual leak locations are 600 and 1,000 m. Fused data sensor locations are 1,600 and 2,000 m. The SNR is −30 dB.

Close modal

Leak localization performance with dual leaks and dual sensors

The results of the double leakage case with dual sensors, two leakages at and with dimensions and , are displayed in Figure 7. The sensor locations are and . The DS fusion algorithm fuses the mass function obtained from and with the mass function obtained from and . Assuming a measurement noise SNR of −30 dB at all frequencies and a sample size of N = 620, it can be observed that each method exhibits different degrees of side lobes and higher side lobes at certain locations which may impact the determination of the leakage location. In comparison to the aforementioned methods, the DS-MUSIC-like algorithm effectively suppresses most of the side lobes through data fusion and accurately locates the leaks.
Figure 7

Localization of two leaks using four algorithms. Actual leak locations are 600 and 1,400 m. Fused data sensor locations are 1,600 and 2,000 m and 1,700 and 2,000 m. The SNR is −30 dB.

Figure 7

Localization of two leaks using four algorithms. Actual leak locations are 600 and 1,400 m. Fused data sensor locations are 1,600 and 2,000 m and 1,700 and 2,000 m. The SNR is −30 dB.

Close modal

In the DS-MUSIC-like algorithm, the leakage probability of the side flap is less than 0.2, and it can be considered a leakage-free case. Compared with other methods, the fusion algorithm greatly suppresses the generation of side flaps and reduces the leakage detection error.

This study proposes a method to improve leak location accuracy by introducing multi-sensor measurements is proposed. The information leakage, as measured by multiple sensors, is extracted and fused using the DEST framework. It then uses a multi-sensor leak location analysis method. Uncertainty noise and transient wave measurements are used to help solve the problem of locating leaks in pipelines. The simulated results show that the method efficiently combines multi-sensor information. The method not only detects small leaks that are difficult to identify in strong noise but also successfully identifies leaks when the distance is too close, improving positioning accuracy and precision.

In practical applications, the distribution of uncertainties remains elusive due to a dearth of understanding of system architecture and equipment dynamics, inaccuracies in numerical computations and modeling, disturbances from traffic and other external factors, as well as imprecise measurements pertaining to wave speed, friction factor, and steady-state discharge. Consequently, advancing this field necessitates a thorough examination of the diverse uncertainties that could potentially impact leak detection. Furthermore, the simulation experiments presented in this paper have only encompassed scenarios with one or two leaks. In the case of a larger number of leaks, the optimization problem has to be solved. Therefore, in future studies, other techniques will be considered to reduce computational complexity and cost.

This work was supported by the Science and Technology Development Plan Project of Jilin Province, China (Grant No. 20230201068GX).

Data cannot be made publicly available; readers should contact the corresponding author for details.

The authors declare there is no conflict.

Chaudhry
M. H.
2014
Applied Hydraulic Transients
, 3rd edn.
Springer
,
New York, USA
.
Chen
Q.
,
Shen
G.
,
Jiang
J.
,
Diao
X.
,
Wang
Z.
,
Ni
L.
&
Dou
Z.
2018
Effect of rubber washers on leak location for assembled pressurized liquid pipeline based on negative pressure wave method
.
Process Safety and Environmental Protection
119
,
181
190
.
Dempster
A.
1967
Upper and lower probabilities induced by a multivalued mapping
.
Annals of Mathematical Statistics
38
,
325
339
.
Duan, H.-F., Che, T.-C., Lee, P. J. & Ghidaoui, M. S. 2018 Influence of nonlinear turbulent friction on the system frequency response in transient pipe flow modelling and analysis. Journal of Hydraulic Research 56, 451–463.
Durrant-Whyte, H. & Henderson, T. C. 2008 Multisensor data fusion. In: Springer Handbook of Robotics, Springer, Berlin, Heidelberg, pp. 585–610.
Ferrante
M.
,
Brunone
B.
&
Meniconi
S.
2007
Wavelets for the analysis of transient pressure signals for leak detection
.
Journal of Hydraulic Engineering
133
,
1274
1282
.
Huang
Y.
,
Zheng
F.
,
Kapelan
Z.
,
Savic
D.
,
Duan
H.
&
Zhang
Q.
2020
Efficient leak localization in water distribution systems using multistage optimal valve operations and smart demand metering
.
Water Resources Research
56
,
e2020WR028285
.
Hussain
I.
,
Shah
T.
,
Gondal
M. A.
&
Mahmood
H.
2012
Analysis of S-box in image encryption using root mean square error method
.
Zeitschrift für Naturforschung A
67
,
327
332
.
Keramat
A.
,
Ghidaoui
M. S.
,
Wang
X.
&
Louati
M.
2019
Cramer–Rao lower bound for performance analysis of leak detection
.
Journal of Hydraulic Engineering
145
,
04019018
.
Khaleghi
B.
,
Khamis
A.
,
Karray
F. O.
&
Razavi
S. N.
2013
Multisensor data fusion: A review of the state-of-the-art
.
Information Fusion
14
,
28
44
.
Kothandaraman
M.
,
Law
Z.
,
Ezra
M. A. G.
,
Pua
C. H.
&
Rajasekaran
U.
2022
Water pipeline leak measurement using wavelet packet-based adaptive ICA
.
Water Resources Management
36
,
1973
1989
.
Lang
X.
,
Li
P.
,
Cao
J.
,
Li
Y.
&
Ren
H.
2018
A small leak localization method for oil pipelines based on information fusion
.
IEEE Sensors Journal
18
,
6115
6122
.
Lim, H. S., Ng, B. P. & Reddy, V. V. 2016 Generalized MUSIC-like array processing for underwater environments. IEEE Journal of Oceanic Engineering 42, 124–134.
Moubayed
A.
,
Sharif
M.
,
Luccini
M.
,
Primak
S.
&
Shami
A.
2021
Water leak detection survey: Challenges & research opportunities using data fusion & federated learning
.
IEEE Access
9
,
40595
40611
.
Qi
Z.
,
Zheng
F.
,
Guo
D.
,
Maier
H. R.
,
Zhang
T.
,
Yu
T.
&
Shao
Y.
2018
Better understanding of the capacity of pressure sensor systems to detect pipe burst within water distribution networks
.
Journal of Water Resources Planning and Management
144
,
04018035
.
Shafer
G.
1976
A Mathematical Theory of Evidence
.
Princeton University Press, New Jersey, USA
.
Wang
X.
,
Palomar
D. P.
,
Zhao
L.
,
Ghidaoui
M. S.
&
Murch
R. D.
2019
Spectral-based methods for pipeline leakage localization
.
Journal of Hydraulic Engineering
145
,
04018089
.
Wang
X.
,
Lin
J.
&
Ghidaoui
M. S.
2020a
Usage and effect of multiple transient tests for pipeline leak detection
.
Journal of Water Resources Planning and Management
146
,
06020011
.
Wang
X.
,
Waqar
M.
,
Yan
H.-C.
,
Louati
M.
,
Ghidaoui
M. S.
,
Lee
P. J.
,
Meniconi
S.
,
Brunone
B.
&
Karney
B.
2020b
Pipeline leak localization using matched-field processing incorporating prior information of modeling error
.
Mechanical Systems and Signal Processing
143
,
106849
.
Zadeh
L. A.
1965
Fuzzy sets
.
Information and Control
8
(
3
),
338
353
.
Zhang
Y.
&
Ng
B. P.
2010
MUSIC-like DOA estimation without estimating the number of sources
.
IEEE Transactions on Signal Processing
58
,
1668
1676
.
This is an Open Access article distributed under the terms of the Creative Commons Attribution Licence (CC BY 4.0), which permits copying, adaptation and redistribution, provided the original work is properly cited (http://creativecommons.org/licenses/by/4.0/).