Pipeline Crack Detection Using Mathematical Morphological Operator
A pipeline crack is a major hazard to any type of liquid transportation. Oil industry depends mainly on human detection of these cracks, which leads to many problems from health to environment disaster. To detect a crack, pipelines’ inner layers are X-rayed, and these X-rays were later manually evaluated for cracks and holes. This technique evolves lot of time and resources. This proposed research work helps to diminish this problem by analyzing the cracks and holes through a computerized solution. A pipeline with crack is analyzed using image analysis and processing which comprises of various pattern recognition techniques. Image analysis and processing is one of the most powerful innovations in today’s world. It brings all kinds of pattern recognition together and solves the problem of data identification and misuse of data. This is achieved by applying the method of pattern analysis and recognition. As a result, this technique of image analysis and processing is used to detect the holes and cracks which occur in a pipeline that carries any type of liquids and gases. This paradigm helps in environmental safety. As in the pipeline industry there are many man-made equipments and methods, computer application to carry out these process is lacking. To make a shift over to the computerized image recognition, high-frequency filter (HFF) with Gate Turn off thyristor (GTO) using unsupervised-based learning algorithm is implemented. Mathematical morphological operator and edge detection principles are used for image evaluation. Initially a digital camera with fiber optic cable is passed inside a pipeline to capture the cracked images. These images are converted as raster images and stored as bits. Later, these images are processed to view for hidden points using unsupervised cluster algorithm; after evaluating the hidden points, the crack has to be measured for its length and to identify the location where it occurs and this is achieved by developing mathematical morphological operator. Images are always not clear, so the dataset formed is always unclear; in order to smooth the images, the edge detection principle is applied. The captured images are read as pixel groups, after converting into raster images. If the pixels grouped as clusters are clear with no zero bit values, it denotes that the pipeline is without any crack else even a small relapse in any one of the pixel will make the image vague. The blurred picture denotes that there is a defect in the pipeline. This helps to locate the image with defect, which is rectified and thus it results in an effective, defect-free passage that will carry any type of liquid or gas. The extraction of hidden patterns from a large quantity of data recognition activities seems to be a major conflict in image detection. Usually, the size of a pipeline is 22 m; in order to avoid the problem of large data, the length to capture an image can be reduced to 10 m and later the rest. The safety of the environment and the manual operator is very important during the transportation of any substance in a pipeline; this major security concern has made image detection to become a popular component in the area of image analysis and processing. In traditional manual detection systems, the manual operator needs to spend much time in analyzing the data and also it generates high false data rates. There is an urgent need for effective and efficient methods to discover both the unknown and unexpected novel image display over a pipeline network from those that are extremely large in size and high in dimensionality and complexity. So the pattern recognition-based image analysis detection systems have been chosen which are more precise and require less manual processing time and input from human experts. This research focuses on solving the issues in image detection communities that can help the system operator to make processing, classification, labeling of data and to mitigate the outcome of image data. The system administrator finds it difficult to preprocess the data. Even though it has been done successfully, the overwhelming output of the images makes the task a failure and even sometimes images go unidentified. To overcome this situation, frequent updating of data is needed. In order to reduce the workload of the administrator, four major image analysis and processing techniques involving pattern recognition task have been introduced. Image detection datasets have been used in this research, and the proposed algorithms will be implemented in MATLAB. In this research, for classification of network data, several existing algorithms like Kohonen-cluster algorithm, Canny’s edge detection algorithm, and mathematical morphological operator algorithm for the simulation of images are proposed. The crack is measured using mathematical morphological operator. Mathematical morphology is evaluated using the concept of geometric measurements. Set theory is applied to evaluate morphological-based geometric measurements. An important technical goal is to provide sufficient information so that the readers can apprehend and possibly implement the technique that has been derived. The result of this study will build a system, for identifying the defects in an oil pipe, by matching to an image database. This system can be implemented or replaced with the existing manual one. Need of this topic: Engineers pursuing mechanical stream and who would like to have a career from normal mechanical to oil pipeline can refer the topic through this book for their career enhancement. The chapters on erosion, corrosion, and dilation will help them to make a more effective study on cracks and holes which can be applied through robotics. This book will focus more on detecting the cluster cracks that are neglected during an inspection of an oil pipeline. This concept of detecting a hole or a crack can be applied to any type of pipeline that is going to transport any type of substances. The topic of the book can be the same or it can be altered according to the needed definition of the engineering society. The opportunity to write these chapters will help to learn more about the mathematical operators to detect a clustered crack.
1.1 Image Analysis and Processing
Multi-scale signal analysis
1.2 Image Coordinates
Signals are also used for image processing. These image outputs are treated as 2D signals, and standard signal processing techniques are applied for image detection. Image analyzed will be considered to be a function of two real variables as A(X, Y), where A will be considered as amplitude defined as the brightness of the image at the real coordinate position (X, Y). This chapter will deal with three important categories of manipulating an image: image processing, image analysis, and image understanding.
Crude oil and natural gas over land transporting are safe and efficient through pipelines. Each and every day, oil companies transport enough crude oil and petroleum products to fill 15,000 tanker truck loads and 4,200 railcars. Pipeline network transports three million barrels of oil every day. Everything from water to crude oil even solid capsule is being transported across millions of miles.
2.1 Pipeline Design
This chapter to begin with needs to learn about the designing of a pipeline system. Factors like distance to be traveled, quantity of liquid or gas that is to be transported, and the quality of the substances to be traveled have to be considered.
Sensitive areas nearby
Communities located nearby and their concern
Temperature and climatic conditions
Public safety concern and any other risk that is posing near
- The terrain facility for the construction of a pipeline (Fig. 1)
2.2 Causes for Pipeline Damage
2.3 Pipelines Monitoring—Smart Pigs
Monitoring of pipelines should be done with weekly, bi-weekly or monthly inspection by the operators and they inspect the pipelines with all relevant safety measures. Manually, internal inspection is carried out by gadgets like high-resolution inspection tools also called as intelligent pigs or pipeline intervention gadget, to detect the dents, damages, and corrosions.
2.4 Drawbacks of Existing Pipeline Models
One of the most extensive representations is smart pigs (pigs) pipeline intervention gadget. Earlier smart balls and X-ray machine detection were used.
Routine leak surveys, including pinhole-sized leaks are required.
Emergency leak location, minimizing product loss evaluation is mandatory, and cleanup costs are high.
Validation of alarms generated by CPM systems (with leak location) is not successful.
Acceptance testing of new pipelines failed.
2.5 Image Analysis and Processing Model of a Pipeline
Image defects encountered can be accessed by the sizing methods in the piping industry. Although the focus of this chapter with research has been on image analysis and processing of pipeline applications, the technology can be extended for many other applications also, including the inspection of stainless steel and aluminum-based products. Defects in a pipeline are identified using a computerized program in this chapter. As discussed earlier, a camera is sent inside the pipeline path that captures the images and sends to the system.
2.6 Characteristics of Image Analysis Model
After reading the theory of pipeline, the analysis process of an image has to be considered, and the size of the digitized camera used to capture and send the images to the data section for image analysis should be sized conveniently according to the inner diameter of the pipeline. The miniature cameras come with different specifications, but the right one has to be chosen depending on the diameter of the pipeline that helps to select the right camera for image capturing. Choosing a camera depends on the diameter of the pipeline that is used for transporting different substances.
2.7 Implementation of Digitized Camera with Fiber Optic Cable
The rapid deployment of fiber optic technology to enhance the transportation of images through light sources helps to capture the picture from the camera and sent to the system that is prepared to monitor the pipeline image techniques. Impact technologies like LLC help to explore the possibilities in attaching a fiber optic cable to a digitized camera to capture the pictures from inside the pipeline. This helps to have a good knowledge of the type of image processing technique involved in taking pictures. A study with the help of any cameraman will helps us to select the perfect one for picture capturing inside the pipeline.
2.8 Pipeline Evaluation
Pipelines have to be evaluated before choosing the fiber optic cable (FOC) and the camera for further processing. This is carried out with the help of an inspection engineer who guides to tell the structure, material, and the inside coating of the pipeline that are buried underneath. Pipelines are drained, and this process is termed as a “shut-down operation,” where the path is closed for evaluation before the next process commences. In this duration, pipelines are checked for cracks, holes, or any other defects, and these are replaced or repaired to carry out the next assigned task. This may take 10–30 days, and numerous people evolve in this process because even a minor negligence will cause oil spills that results in heavy loss to the industry and also to the environment. After the study of the pipeline characteristics, computerized methods to detect the defects are carried out with the insertion of the digitized camera inside the pipeline to find and locate the damaged areas in the pipeline.
2.9 Fiber Optic Cable
The jacket is used to hold the cable without movement while traveling inside the pipeline to capture a jerk-free image. Microbend clamping device is used to hold the jacket that has an optical photo detector, and this is connected to the laptop or desktop or to an IPAD through the optical electrical converter. This design of the system helps to capture and send the pictures for image analysis and processing.
3 Image Detection Techniques
3.1 Gate Turn-Off Thyristors
A GTO is implemented here because it acts as rectifiers, switches, and as a voltage regulator. PNPN technique is applied in these GTOs which helps to detect repeated occurrence of 0s.
3.2 High-Frequency Filter
3.3 Image Analysis Using Bitmaps
Digital images can also be represented as raster image, and it is also called a bitmap. .gif, .jpg, .bmp are the various formats for storing images in the system. Red–Green–Blue (RGB) is one of the best methods to identify the image with pixel notifications.
3.4 Methods to Identify Hidden Structures in an Image
clustering (e.g., k-means, mixture models, hierarchical clustering),
blind signal separation using feature extraction technique for dimension reduction
Through this chapter since the bits are analyzed without predefined set of results, k-means clustering algorithm is used to detect the hidden structure in the image. Images classified into bitmaps are applied through k-means structure to classify the hidden bit images. Images can be as clusters or can be as a single image, these are converted to bitmap image and then through the k-means, the defected parts are identified. Length and the exact position are calculated using the mathematical morphological operators.
3.5 Filtration of an Image
A filtering of an image is useful for many applications, including smoothing, sharpening, removing noise, and edge detection. A filter starts its process work from a kernel which is a small array applied to each pixel and its neighbors within an image. Filters are always applied to images for clear view, and this process is known as convolution and this is achieved by applying either in spatial or frequency domain. Image domains are used to overview transformations between images. This helps to make a study of filtered images. The high-frequency filter design is used here to refine the image before bit valuation. The design is very important because the anomaly caused during image perfection is rectified with this design. The decision whether to use a high-pass filter or low-pass filter should be taken with all properties in concern. With these reviews, the images taken by the digitized camera with a fiber optic cable connection are implemented to get the resultant structure as required for the detection faults in the pipeline.
3.6 Characteristics of Cluster Algorithm Model
Cluster analysis used for image processing is a general task to be solved. The clusters are represented as groups with small distances within the cluster members and data space dense areas. Clustering can therefore be originated as a multi-objective optimization problem, and an approximate process based on cluster algorithm can be opted depending upon the density threshold, maximum occurrence of projected clusters that depends on individual dataset, and the results to be expected. Cluster analysis is an iterative process of knowledge with trial and failure involvement and not automatic. Thus, it is required to modify data preprocessing and parameters, till the result with desired properties is achieved.
3.7 K-Means Algorithm
To implement in a best way k centroids are declared, each representing a cluster. All centroids should be planned and placed because they are received from different location causing different results. The better choice is to place them as much as possible far away from each other and take each point that belongs to a given dataset and relate it to the nearest centroid for further analysis. When no point is pending, the first step is completed and an early group age is done. At this point k new centroids are used as centres of the clusters resulting from the previous steps has to be recalculated, a knowledge discovery approach helps to clarify the different methods used in k-means algorithm in case of clustering large datasets. To read the values in a much faster method, the technique of learning fast nets has been applied.
4 Morphological Image Processing System
This is a vital and initial step to keep the pipeline infrastructure in proper shape (quality-wise); the pig (pipeline intervention gadget) used needs a lot of manual operation and there are differences between the image photographed and the picture marked manually. Thus, automated system implementation is required. The basic task for automated operation is to find out the cracks, holes, joints, and fissures in the images taken by the camera. These cracks have their own specific patterns (images described as such), matching the Gaussian profile on which pattern recognition has to be performed. Mathematical morphology is used to extract image components with regard to geometric features. An image is not taken under assumption; the features are extracted from the image that is used for representation and description of the image. This is possible by taking the values from the image domain, and this can be used as semantic information.
4.1 Implementation of the Operator Tool
4.1.1 Design of the Algorithm
Morphological operations are used mainly to detect expanding and shrinking image to a given structuring element. When the images are operated in the initial state, it appears only in black and white called binary images and later after technical development, they are applied for color images called grayscale images.
image intensity represented as bits
bit error recovery
That maps 2D coordinates to the range [I(min) to I(max)] that defines the possible intensity values. If an image is black and white, the dark colors are considered as background and white are parts of the image. But now to locate a perfect crack position, white parts are placed as background and dark ones are parts of an image. When the image is photographed and sent to the system, with the leak software, the data is read for pixel image and it is analyzed for picture perfection. Leak software is a tool that helps to find the leak values with leak detection methods.
4.2 Analysis with the Bitmap Set
Dilation is a morphological expansion operation—this operation is used both in binary and grayscale images. In binary images, structural element is moved over the image where the dilation takes on binary images. Two pieces of data are taken as data inputs.
4.2.1 Data Gathering Procedure
Values for evaluation of 3 × 3 pixels
4.3 Mode of Analysis—Detection of the Crack with the Morphological Operator
4.3.1 Types: Erosion and Corrosion
correction factor (calculated from the available bit set)
where F is an image and E is a structured element for evaluation. In case of gray scale, each pixel touched by E is considered and the minimum intensity for all the pixels is calculated.
Dilation plays a vital role, and this operation mostly uses a structuring element for probing and expanding the shapes that is present in the input image. It is one of the most prominent operations in mathematical morphology.
4.3.2 Opening and Closing Techniques
Dilation and erosion can be combined to form two important higher order operations. The opening technique is used to remove small objects from the image and closing removes small holes (for original images). For defected images, closing removes small objects and opening removes small holes.
4.4 Proposed Method to Implement the Image Analysis Model
5 Edge Detection of an Image
5.1 Methods to Detect Edge Defects
Edge detection has many methods, but they are grouped under two categories such as search-based and zero crossing-based methods. Smoothing filters’ application helps in differentiating the way of computing edge strength. The different types of edge detection algorithms are gradient-based algorithm includes Laplacian-based algorithm and Canny’s edge detection algorithm. Canny’s edge detection algorithm is the best one when compared to other edge detection algorithms.
5.1.1 Smoothing of the Detected Image
In smoothing, the data points of a signal are modified so individual points (presumably because of noise) are reduced, and points that are lower than the adjacent points are increased leading to a smoother signal.
It must be able to retrieve more data after smoothing process
It must be able to give analysis details that is both easy to access and robust.
The purpose of this chapter is to develop an algorithm to ease the work of a manual operator in identifying the cracks in an oil pipeline, with better accuracy and reduced false detection of image recognition. Our proposed approach is also suitable for any type of computerized pipeline intervention. The study aims to construct a computerized mobility model which is useful to an environmental protection service. This model handles the problem of image analyzes interruption on the computing during the transportation of any form of liquid in a pipeline, where the substance travels from one location to another. The solution might be the boundary of convex and non-convex environment, which is successful. Furthermore, mathematical morphological operators and edge detection algorithms applied here are evaluated, thus giving an appreciated result.
The performance of existing X-ray image analysis and smart pigs for pipeline analysis over this computer-based monitoring system (CBMS) is compared and analyzed. Based on the performance analysis of the existing models, the developed CBMS shows a good result, and it is faster and the time duration is limited when compared to the other two existing models. These two models, X-ray and smart pigs, take 2 days and a day, respectively, for image analysis. CBMS gives the result within seconds and gives approximately 90% result. Thus, human errors and time delay in detecting the cracks or holes or any other defects caused due to natural calamities or due to human errors is avoided. The overall performance of CBMS may vary depending on the type of algorithm chosen to remove clusters, but the ultimate output remains the same with a good record of result.
- 1.Aldenderfer, M. S., & Blashfield, R. K. (1988). Sage university paper on quantitative applications in social science. Cluster Analysis, 36(1), 1–13.Google Scholar
- 2.Wardhani, A. W., & Gonzalez, R. (1998). Automatic image structure analysis. e-prints (pp. 1–9). Google Scholar
- 3.Ledda, A., & Luong, H. Q. (2006). Image interpolation using mathematical morphology (pp. 12–49).Google Scholar
- 4.Bhoite, A. (2011) Automated fiber optic cable end face field inspection. Technologic, 3–8.Google Scholar
- 6.Busch, C., & Eberle, M. (1995). Morphological operations for color-coded images. In F. Post & M. Göbel (Eds.), Proceedings of the European Association for Computer Graphics (pp. 193–204).Google Scholar
- 7.Can, F., & Ozkarahan, E. A. (1984). Two partitioning type clustering algorithms. Journal of the Association for Information Science and Technology, 35, 268–276.Google Scholar
- 9.Canny, J. (1986). A computational approach to edge detection (pp. 3–6).Google Scholar
- 10.Crouch, C. J. (1988). A cluster-based approach to thesaurus construction. In 11th International Conference on Research and Development in Information Retrieval (pp. 309–320). New York.Google Scholar
- 11.Domingo, J., Benavent, X., Vegara, F., & Pelechano, J. (2005). A new approach for image colour morphology (pp. 234–245). Tech. Rep., Institute of Robotics, University of Valencia.Google Scholar
- 12.Dougherty, E. R., & Astola, J. (1994). Introduction to non-linear image processing. Bellingham, Washington: Spie.Google Scholar
- 13.El-Hamdouchi, A. (1987). The use of inter-document relationships in information retrieval. Ph.D. thesis, University of Sherfield.Google Scholar
- 14.Ester, M., Kriegel, H.-P., & Sander, J. (1996). A density based algorithm for discovering clusters in large spatial database with noise (pp. 226–231).Google Scholar
- 15.Everitt, B. (1980). Cluster analysis. In F. Khalvati (Ed.), Computational redundancy in image processing (pp. 4–6, 3–57, 2nd ed.).Google Scholar
- 16.Gonzalez, P., Cabezas, V., Mora, M., Cordova, F., & Vidal, J. (2010). Morphological color images processing using distance-based and lexicographic order operators. In Proceedings of the 29th International Conference of the Chilean Computer Science Society.Google Scholar