The method of claim 1 further comprising using a sigmoid to decide what parts and then using a tanh to delimit values.ĩ. The method of claim 1 further comprising using tanh.Ĩ. The method of claim 1 further comprising using neural networks.ħ. The method of claim 1 further comprising using deep learning models.Ħ. The method of claim 1 further comprising, after inputting the first set of data and the second set of data, making changes to the pipeline, and then further training the computer system with unsupervised learning to adapt to the changes that were made.ĥ. The method of claim 2 further comprising, after inputting the first set of data and the second set of data, making changes to the pipeline, and then further training the computer system by: inputting into the computer system a fourth set of data acquired from the pipeline during operation of the pipeline after the changes were made receiving from the computer system alarms of suspected leaks from the pipeline and communicating to the computer system whether an actual leak existed when each alarm of the alarms was indicated.Ĥ. The method of claim 1 further comprising, after inputting the first set of data and the second set of data, further training the computer system by: inputting into the computer system a third set of data acquired from the pipeline during operation of the pipeline receiving from the computer system alarms of suspected leaks from the pipeline and communicating to the computer system whether an actual leak existed when each alarm of the alarms was indicated.ģ. A computer-implemented method of detecting leaks in a pipeline that conveys a liquid or gas, the method comprising at least the acts of: inputting into a computer system a first set of data acquired from the pipeline during normal operation of the pipeline acquiring a second set of data from the pipeline while simulating leaks from the pipeline by releasing quantities of the liquid or gas from the pipeline from multiple locations along the pipeline inputting into the computer system the second set of data and training the computer system to detect the leaks in the pipeline including communicating to the computer system that no leaks existed while the first set of data was acquired and communicating to the computer system that leaks existed while the second set of data was acquired.Ģ.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |