WO2019193592A1 - System and method for early identification and monitoring of defects in transportation infrastructure - Google Patents

System and method for early identification and monitoring of defects in transportation infrastructure Download PDF

Info

Publication number
WO2019193592A1
WO2019193592A1 PCT/IL2019/050381 IL2019050381W WO2019193592A1 WO 2019193592 A1 WO2019193592 A1 WO 2019193592A1 IL 2019050381 W IL2019050381 W IL 2019050381W WO 2019193592 A1 WO2019193592 A1 WO 2019193592A1
Authority
WO
WIPO (PCT)
Prior art keywords
findings
vulnerability
attributes
images
image
Prior art date
Application number
PCT/IL2019/050381
Other languages
French (fr)
Inventor
Saar Dickman
Amichay COHEN
Original Assignee
Dynamic Infrastructure Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dynamic Infrastructure Ltd. filed Critical Dynamic Infrastructure Ltd.
Priority to AU2019249431A priority Critical patent/AU2019249431A1/en
Priority to US17/045,176 priority patent/US11605158B2/en
Priority to EP19781112.8A priority patent/EP3775855A4/en
Publication of WO2019193592A1 publication Critical patent/WO2019193592A1/en
Priority to IL277789A priority patent/IL277789A/en

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01NINVESTIGATING OR ANALYSING MATERIALS BY DETERMINING THEIR CHEMICAL OR PHYSICAL PROPERTIES
    • G01N21/00Investigating or analysing materials by the use of optical means, i.e. using sub-millimetre waves, infrared, visible or ultraviolet light
    • G01N21/84Systems specially adapted for particular applications
    • G01N21/88Investigating the presence of flaws or contamination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/0002Inspection of images, e.g. flaw detection
    • G06T7/0004Industrial image inspection
    • G06T7/0008Industrial image inspection checking presence/absence
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/21Design or setup of recognition systems or techniques; Extraction of features in feature space; Blind source separation
    • G06F18/214Generating training patterns; Bootstrap methods, e.g. bagging or boosting
    • G06F18/2148Generating training patterns; Bootstrap methods, e.g. bagging or boosting characterised by the process organisation or structure, e.g. boosting cascade
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/285Selection of pattern recognition techniques, e.g. of classifiers in a multi-classifier system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T7/00Image analysis
    • G06T7/0002Inspection of images, e.g. flaw detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/44Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components
    • G06V10/457Local feature extraction by analysis of parts of the pattern, e.g. by detecting edges, contours, loops, corners, strokes or intersections; Connectivity analysis, e.g. of connected components by analysing connectivity, e.g. edge linking, connected component analysis or slices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/20Special algorithmic details
    • G06T2207/20084Artificial neural networks [ANN]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/30Subject of image; Context of image processing
    • G06T2207/30181Earth observation
    • G06T2207/30184Infrastructure
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T2207/00Indexing scheme for image analysis or image enhancement
    • G06T2207/30Subject of image; Context of image processing
    • G06T2207/30232Surveillance

Definitions

  • the present invention is in the field of infrastructure monitoring and maintenance, and in particular relates to a computer-based system and method for early identification and monitoring of defects in transportation infrastructure.
  • Patent KR101604050B discloses a road tunnel inspection device comprising: a tunnel photographing part which photographs a wall or an inner space in a tunnel in order to discriminate an extent of a crack of the tunnel wall, fire breakout in the tunnel and a traffic accident of a vehicle in the tunnel, and transmits the photographed image data; a tunnel inspection part to inspect an inner surface of the tunnel using a tunnel surface inspection device; a water leakage inspection part to inspect a water leakage of the tunnel using a tunnel water leakage inspection device; a communication part to provide an interface to realize communication with an external terminal; an inspection state analysis part which analyzes an occurrence of an abnormal state in the tunnel, by analyzing the tunnel photographing part, the tunnel inspection part, and the water leakage inspection part, and generates an abnormal state notification signal in case of the occurrence of the abnormal state; and a control part to control the tunnel photographing part, the tunnel inspection part, the water leakage inspection part, the communication part, and the inspection state analysis part.
  • Patent application CN108053132 discloses a bridge defect smart reporting system including a manual tour inspection mobile terminal and a data processing server.
  • the manual tour inspection mobile terminal acquires current position of the tour inspection terminal through a GPS positioning function, collects tour inspection basic information, and obtains a position with bridge defect in the shortest vertical distance to the tour inspection mobile terminal through a semicircle detection method, performs interaction with a data processing server, obtains the bridge defect information of said position, and confirms or updates the bridge loss information of said position according to the tour inspection condition of the bridge defect.
  • the data processing server performs storage treatment on the tour inspection basic information, the tour inspection position and the bridge defect information transmitted by the manual tour inspection mobile terminal by utilizing a data storage service module, obtains a history defect data of the bridge defect position, performs analysis and evaluation on history defect of the position by utilizing a defect priority evaluation function and selects and pushes the bridge defect information having the highest priority level to the manual tour inspection mobile terminal.
  • Patent US9129355B1 discloses a method and system to assess the damage to infrastructure using aerial images captured from an unmanned aerial vehicle (UAV), a manned aerial vehicle (MAV) or from a satellite device. Specifically, an item of infrastructure may be identified for assessing damage. The UAV, MAV, or satellite device may then capture aerial images within an area which surrounds the identified infrastructure item. Subsequently, the aerial images may be analyzed to determine a condition and the extent and/or severity of the damage to the infrastructure item. Furthermore, the aerial images along with indications of the extent of the damage may be displayed on a computing device.
  • UAV unmanned aerial vehicle
  • MAV manned aerial vehicle
  • satellite device may then capture aerial images within an area which surrounds the identified infrastructure item.
  • the aerial images may be analyzed to determine a condition and the extent and/or severity of the damage to the infrastructure item.
  • the aerial images along with indications of the extent of the damage may be displayed on a computing device.
  • the present invention relates to a system and method for providing a warning and for monitoring of a vulnerability: a potential defect in a structure and/or its related systems that is not yet apparent as a defect.
  • a type of vulnerability is identified from a grouping of elements and/or features of the structure and its systems, called findings, whose attributes meet a particular selection rules called relationship-association classifiers (RACs): a series of one or more tests of relationships between attributes of findings, the series of tests indicating whether findings are associated and collectively classified as a particular type of vulnerability or defect.
  • Findings are identified and their attributes evaluated from one or more images, typically taken during routine maintenance of the structure.
  • RACs are based on relationships between attributes of findings known or found to be correlated to a particular type of defect.
  • a RAC may be established by an optimization function or by a neural network function trained from maintenance reports and documented findings and attributes concurrent with each maintenance report.
  • Groupings identified as a vulnerability can be reported to a maintenance entity for follow up. Reporting of vulnerabilities can provide an early warning of a problem with a structure and its systems before it becomes a serious defect.
  • a small and growing crack is found above a venting system hanging on the roof of a tunnel.
  • the crack is identified, with attributes of its rate of growth (found from multiple images taken at different times) and its proximity to a venting system element.
  • a RAC may select growing cracks up to a maximum distance from a venting system element, where both the crack and the element are on the roof of a tunnel. The entire group and its location on the roof may be reported to a maintenance entity as a vulnerability to be checked.
  • Another aspect of the invention relates to providing a user, typically a maintenance entity, with a“tour” of findings and defects of a structure.
  • the tour can be in 3D. Markers designating defects of various severity are superimposed on a displayed image of the structure. Details of a defect may be displayed or its marker may be selected for more details. The details include the underlying findings— in a grouping— and their attributes and relationships of attributes that led to computing a defect function above a threshold.
  • 3D“tour” of the present invention is a way to present and orient a maintenance manager and operator, both post-design and construction functions, to a pin-pointed vulnerability in his assets. It is therefore an objective of the invention to provide a method for early identification and monitoring of defects in a structure, the method comprising steps of a. accumulating one or more images of a structure into an images database;
  • RACs relationship-associative classifiers
  • the structure comprises one or more of a tunnel, a bridge, a road, a dam, or a pipeline.
  • the findings of the structure comprise concrete or iron walls, bearings, deck, piers, abutments, traffic lane control sign (LCS), variable message sign (VMS), barriers, emergency telephone (ERT), signs, public announcements, cameras, safety, visibility sensors, C0 2 sensors, heat sensors, fire hoses, vents, doors, railings, pavement, cables, electricity tunnels, covers, traffic lights, road lamps, lighting fixtures, electricity boxes, electric cords, cracks, rust, wet areas, welding exposure, concrete segregation, broken sensors, broken fire hoses, water leaks, loose wires, soot, missing equipment, loose screws, disintegration, waste, broken pavement, inflorescence, exposed iron, missing covers, graffiti, open holes, damaged suspension cables, potholes, or any combination thereof.
  • LCS traffic lane control sign
  • VMS variable message sign
  • ERT emergency telephone
  • the vulnerability object comprises findings objects associated with findings from two or more functional groups of the structure.
  • the functional groups comprise one or more of structural, electricity, air conditioning, a lifesaving system, an air quality system, a signing system, a fire detection system, and a fire mitigation system.
  • an image processing module configured to process the images
  • a findings processing module and an objects database comprising a findings sub database and a vulnerabilities sub-database, the findings operations unit configured to i. identify findings in one or more of the images;
  • system further comprises
  • a rules engine configured to i. apply relationship-associative classifiers (RACs)— a RAC defined as a set of selection rules defining values of relationships between attributes of the findings, the relationship values indicative of a vulnerability of the structure— to one or more of the attributes of the findings objects;
  • RACs relationship-associative classifiers
  • a reporting module configured to report the vulnerability object and findings objects therein to a maintenance entity.
  • the structure comprises one or more of a tunnel, a bridge, a road, a dam, or a pipeline.
  • the findings of the structure comprise concrete or iron walls, bearings, deck, piers, abutments, traffic lane control sign (LCS), variable message sign (VMS), barriers, emergency telephone (ERT), signs, public announcements, cameras, safety, visibility sensors, C0 2 sensors, heat sensors, fire hoses, vents, doors, railings, pavement, cables, electricity tunnels, covers, traffic lights, road lamps, lighting fixtures, electricity boxes, electric cords, cracks, rust, wet areas, welding exposure, concrete segregation, broken sensors, broken fire hoses, water leaks, loose wires, soot, missing equipment, loose screws, disintegration, waste, broken pavement, inflorescence, exposed iron, missing covers, graffiti, open holes, damaged suspension cables, potholes, or any combination thereof.
  • LCS traffic lane control sign
  • VMS variable message sign
  • ERT emergency telephone
  • the attributes of the findings comprise one or more of location, color, shape, size, texture, depth, width, height, area, impact distance from a source of the finding, quantity of elements within a particular radius, distance from a particular utility, distance from a past corrective action area, influence on core infrastructure, percentage of exposure, and physical connectivity to another finding.
  • the vulnerability object comprises findings objects associated with findings from two or more functional groups of the structure.
  • the functional groups comprise one or more of structural, electricity, air conditioning, a lifesaving system, an air quality system, a signing system, a fire detection system, and a fire mitigation system.
  • Figure 1 lists steps of a method for monitoring defects in infrastructure, according to some embodiments of the invention.
  • Figures 2A-2G show a progression of an image as processed during a method for monitoring defects in infrastructure, according to some embodiments of the invention.
  • FIG. 3 shows a functional block diagram of modules in a system for monitoring defects in infrastructure, according to some embodiments of the invention.
  • Figures 4A-4C show various display outputs of a system for monitoring defects in infrastructure, according to some embodiments of the invention.
  • “Structure” can refer to a transportation structure such as a tunnel, bridge, or culvert; or any other structure such as a dam, pipeline, or water/sewage pipe. “Element” refers to any part of a structure. Examples of elements include concrete, pavement, railings, barriers, vents, signs, lights, sensors, fire hydrants, and electrical cables. Elements of a bridge may include a roadway, trusses, suspension cables, lampposts, and bridge traffic signs. Elements of a tunnel may include walls, ceiling, tiles, ventilation shafts, and CO/CO2 sensors, and safety signs.
  • “Finding” refers to an element or feature of an element in one or more images of a structure. An element or feature can be counted as a finding whether it appears normal in the image or anomalous (e.g., misshapen, enlarged, diminished, discolored, dis-textured, or missing), or whether the feature itself is an anomaly (e.g., a crack, wet spot, or rust spot, broken sign).
  • “Vulnerability” refers to a group of one or more findings whose attributes are deemed to indicate a defect or potential defect of a structure and its systems when a rule or set of rules is applied.
  • RAC Relationship-associative classifier
  • Maintenance entity refers to a party with an involvement or interest in the maintenance of a structure, its systems, or element(s) therein.
  • Examples of a maintenance entity can include, for example, a company responsible for operations, engineering, maintenance engineering, maintenance, assets inventory manager, risk assessment, maintenance planning, electricity, or plumbing; or an asset owner, or any company or person(s) involved in the infrastructural element.
  • Method 100 comprises accumulating one or more images of a structure 105.
  • a typical structure can be a transportation structure such as a tunnel, bridge, or culvert; or any other structure such as a dam or pipeline. Descriptions in this application shall be made as pertaining to tunnels; however, it is appreciated that the teachings of the invention apply to any transportation structure and other types of structures.
  • Each image is typically obtained during the course of maintenance and operations performed at the structure. Accumulating of the images 105 is typically to a database. Each image may be, for example, a photograph, a thermal image, or a LIDAR image. Images may be directly digitized upon exposure; or developed, printed, and scanned.
  • An image is typically accompanied with metadata such as the ID number of the contractor who took the image; a timestamp; data of the image-taking camera, such as location and aiming direction of the camera, f-stop, lighting, and exposure time; and/or a maintenance report. Accumulated images taken at various times contribute to a dynamic and ongoing understanding of potential defects of the structure and its elements, as further described herein.
  • Method 100 further comprises processing the images 110, in preparation for identifying findings 107 (further described herein).
  • Techniques of processing an image 110 can be, for example, filtering, normalization of color channels, cropping, resizing, translation, rotation, inversion, and rescaling.
  • Method 100 further comprises identifying findings of the structure in an accumulated image 115.
  • Findings are elements or features of elements of the structure. For example, wall segments, ceiling, tiles, ventilation shafts, fire hoses, wires, equipment, screws, pavement, lampposts, lighting fixtures, CO/CO2 sensors, and safety signs; or features thereof.
  • Findings depicted in the image may be identified, for example, by matching a pattern in the image with elements in previously analyzed accumulated images or with an original image or model of the structure.
  • findings may be identified by matching attributes (e.g., location, size, color, shape) with those of previously found findings.
  • Identified findings 115 may comprise both new findings as well as findings previously identified from earlier accumulated images.
  • a finding may be an element or feature pictured in the image in its normal condition or may— in whole or in part— have an anomaly such as a crack, rust, wet areas, welding exposure, concrete segregation, water leaks, soot, disintegration, waste, exposed iron, missing covers, graffiti, holes, potholes, among others, and combinations thereof.
  • identifying findings 115 comprises distinguishing whether an element is in its normal state; or whether the element is in an anomalous state or contains an anomalous feature. Examples of normal and anomalous states of elements, and resulting findings, are indicated in the Table 1.
  • Method 100 further comprises adding new findings to an objects database 117 and computing attributes of the identified findings 120.
  • An attribute of a finding may be the functional group to which the finding belongs. For example, cracks and segregated concrete have a functional group attribute of“structural,” while an electrical box and cables have a functional group attribute of“electrical.”
  • Other attributes of a finding may include, for example, location, color, shape, size, texture, depth, width, height, area, distance from a source of an anomaly, quantity of elements within a particular radius, distance from a particular utility, distance from a past corrective action area, degree of influence on core infrastructure, percentage of exposure, among others, and any combination thereof.
  • a finding may be assigned, according to the type of the finding, a template of attributes. For example, a crack can have an attribute of whether or not the crack is leaking. Attributes in the template are computed 120 and updated in the objects database. Attributes and relationships may be updated statistically, with a level of confidence of an evaluated attribute value (e.g., depending on image quality, perspective, analysis confidence, etc.) weighted against a level of confidence of an existing attribute value.
  • a finding’ s previous attribute values may be archived (e.g., in the objects database), thereby enabling development of a timeline history of attributes of each finding.
  • Method further comprises applying relationship-associative classifiers (RACs) to the findings 125.
  • RAC is a series of one or more tests of relationships between attributes of findings indicating whether findings are associated and collectively classified as a particular type of vulnerability or defect.
  • a RAC is designed to test mutual presence or attributes of findings that are potentially correlated to a condition of concern in the structure, and therefore identified as a vulnerability.
  • Non-limiting examples of RACs for a tunnel are
  • a RAC for a crack-density vulnerability groups cracks in a region in which all cracks are less than 1 cm from the nearest crack.
  • a RAC for proximity hazard of a leaking crack to the ventilation system associates ventilation system findings and cracks that are leaking and whose distance to a ventilation system finding is less than 10 cm.
  • a RAC for growing rust vulnerability associates a region of segregated concrete and a total rust area which is bigger than last year’s total rust area on the same segregated concrete region.
  • a RAC for a vulnerability of water damage caused by a leaking hose associates a fire hose with overlapping cracks that are leaking.
  • a RAC for emphasizing location-based vulnerabilities that associates vulnerabilities found by other RACs, such as vulnerabilities on the roof of a tunnel or a pillar of a bridge.
  • RACs may be programmed manually or computed with an optimization algorithm.
  • a neural network algorithm may be employed to learn RACs, trained, for example, by maintenance reports. The algorithm may neurally analyze attributes of findings in a concurrent and past time frame of each maintenance report.
  • Method further comprises grouping the selected findings for each RAC as a vulnerability 130.
  • step 125 may be repeated for new images, and additional findings may be added to a grouping of findings.
  • Method further comprises reporting identified vulnerabilities 135.
  • the vulnerabilities may be reported to one or more engineering entities, e.g. for follow-up action such as an inspection.
  • Reported data may be accompanied by images, findings, and attributes contributing to each vulnerability.
  • method 100 further comprises providing a 3D tour of findings and vulnerabilities of the structure 140.
  • Figure 2A shows an image accumulated 105 in a database.
  • the image depicts an interior wall of a rail tunnel.
  • Figure 2B shows the image after image processing 110, including normalization, rotation, and registration to a reference.
  • Figure 2C shows the image with superimposed outlines of findings after identifying findings 115.
  • the findings include electric wiring 205, leakage 210, planned structural holes 215, color changes 220, a jet fan 225, and railroad tracks 235.
  • Figure 2D shows the findings after applying RACs to the findings 125 and grouping findings meeting each RAC 130.
  • Short circuit vulnerabilities 240 are identified by overlap of leakage 210 and electric wiring 205 behind jet fan 225.
  • a fan damage vulnerability 242 242 is identified by direct leakage of water behind the main jack box of the jet fan.
  • Figure 2E shows a selected vulnerability 245 comprising active leakage above a main jack box of a jet fan.
  • Figure 2F shows markers 250 indicating identified defects during providing of a 3D tour of the tunnel.
  • a sidebar 255 shows a summary of the severity and numbers of defects.
  • Figure 2G shows details about the marked vulnerabilities, shown upon a user clicking a marker 250.
  • System 300 comprises one or more processors and one or more non-transitory computer-readable mediums (CRMs).
  • CRMs store instructions to the processor for operation of modules of system 300, as herein described.
  • System 300 comprises an images database 320 and an image processing module 315.
  • Images database 320 stores images of a structure.
  • a typical structure can be a transportation structure such as a tunnel, bridge, or culvert; or any other structure such as a dam or pipeline.
  • Each image is typically obtained during the course of maintenance and operations performed on the structure.
  • Each image may be a photograph, a thermal image, or a LIDAR image. Images may be directly digitized upon exposure; or developed, printed, and scanned.
  • An image is typically accompanied with metadata such as the ID number of the contractor who took the image; a timestamp; data of the image-taking camera, such as location and aiming direction of the camera, f-stop, lighting, and exposure time; and/or a maintenance report.
  • Image processing module 315 is configured to process a raw image in order to prepare the image for identification of findings.
  • Image processing module 315 may employ techniques such as filtering, normalization of color channels, cropping, resizing, translation, rotation, inversion, and rescaling.
  • Image processing module 315 may generate intermediate images processed from a raw image. Some intermediate images and segmented images may be stored, in whole or in part, in images database 320, in association with the raw image.
  • System 300 further comprises a findings processing module 325.
  • Findings processing module 325 detects and indexes findings in an image of the structure.
  • Findings processing module 325 may detect findings in an image by matching a pattern in the image with identified findings in previously processed images in images database 320.
  • findings processing module 325 may match attributes (e.g., location, size, color, shape) with those of previously found findings in an objects database 340 (further described herein).
  • Findings processing module 325 further computes attributes of findings.
  • Findings processing module 325 adds the attributes or a link thereto to a findings object 350 of the finding.
  • System 300 optionally comprises an infrastructure information database 335, which may store, for example, CAD drawings, satellite photos, and/or geo maps of the structure.
  • Elements identification module 325 may employ infrastructure information database 335 to assist in identifying findings.
  • System 300 further comprises an objects database 340.
  • Objects database 340 comprises a findings sub-database 345.
  • Findings sub-database 345 stores findings objects 350.
  • Each findings object 350 comprises or links to a findings identifier and attributes of the identified finding.
  • Objects database 340 further comprises a groupings sub-database 355.
  • Grouping sub database 355 stores grouping objects
  • System 300 further comprises a rules module 370.
  • Rules module 370 is configured to apply relationship-associative classifiers (RACs) to each finding and group findings objects 350 of findings meeting the selection rule into groupings.
  • a grouping is a group of one or more findings whose presence or attributes are of concern, because the findings in the grouping are correlated such that they may stem from the same conditions or constitute a particular risk to the structure— a vulnerability. Vulnerabilities may be further monitored by system 300 and/or reported to a maintenance entity for follow-up attention.
  • rules module 370 may apply several RACs with progressive thresholds of a particular type of vulnerability.
  • an expanding crack may not meet the growth-rate (or crack length) threshold of a RAC of the most severe crack, but may meet a lower growth-rate threshold RAC and worthy of monitoring. Beyond a particular level RAC-growth-rate threshold, cracks may be reported, along with the level of severity, to a maintenance entity.
  • a vulnerability may comprise more than one type of finding.
  • a wet crack may be grouped with rust on an electrical box.
  • a vulnerability may comprise only one finding.
  • a crack (among thousands of other cracks) in a tunnel roof may be placed in a grouping because the crack is collocated with a screw fastening a vent to the roof.
  • Findings may be grouped as a vulnerability if they are of a common functionality group, geometrical location in the structure, material type, surface structure, temperature, IR absorbance or reflectance, or caused or affected by the same external forces (such as by a shock wave or vehicular crash).
  • a vulnerabilites sub-database 355 of objects database 340 stores vulnerability objects 360.
  • a vulnerability object 360 specifies which findings objects 350 are in the vulnerability grouping.
  • Rules module 370 inspects findings objects 345 and creates new vulnerability objects 360 or adds findings to an existing vulnerability object 360.
  • Rules module 370 may be trained (i.e., supplied with new or optimized RACs) by a neural network algorithm correlating defects reported by a maintenance entity with attributes of findings recorded before the defect report.
  • System further comprises a reporting module 375, which reports the findings associated with the vulnerability object 360 as a vulnerability. Reports may present data, for example, tabular, graphical, and/or in 3D.
  • Figure 4A1 shows images 400A-400C of a crack in a tunnel from three different cameras.
  • the images are accompanied by a description 405 of present status and recommendation, based on the crack’s identifying RAC and the crack’s attributes.
  • the images are accompanied by past images 410 accumulated by system 300 and dates each past image was taken, thereby indicating a timeline depicting the progression of the crack.
  • Figures 4B1 and 4B2 shows an image 420 of a tunnel wall and roof, respectively, on which are superimposed identifiers of findings on the wall. Each identifier is disposed at the location of the finding. A user of system 400 may click on an identifier to learn more details about the underlying finding.
  • Figure 4C shows an image 440 along the length of the tunnel with superimposed identifiers of defects in the tunnel.
  • a user of system 400 may indicate in the checkboxes 445 what kinds of defects to show.
  • Figure 4D shows a user interface of a system for detecting an monitoring vulnerabilities of a bridge.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Quality & Reliability (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • General Engineering & Computer Science (AREA)
  • Evolutionary Computation (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Multimedia (AREA)
  • Biochemistry (AREA)
  • Analytical Chemistry (AREA)
  • Pathology (AREA)
  • General Health & Medical Sciences (AREA)
  • Chemical & Material Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Immunology (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to a system and method for monitoring a structural vulnerability not yet apparent as a defect. A type of vulnerability is identified from a grouping of elements and/or features of a structure and its systems, called findings, whose attributes meet a particular set of selection rules called relationship-association classifiers (RACs) — a series of one or more tests of relationships between attributes of findings, the series of tests indicating whether findings are associated and collectively classified as a particular type of vulnerability or defect. A RAC may be established by an optimization function or a neural network function, trained from maintenance reports and documented findings and attributes concurrent with each maintenance report. Findings are identified and attributes evaluated from one or more images, typically taken during routine maintenance of the structure. A grouping identified as a vulnerability can be reported to a maintenance entity for follow-up.

Description

SYSTEM AND METHOD FOR EARLY IDENTIFICATION AND
MONITORING OF DEFECTS IN TRANSPORTATION INFRASTRUCTURE
FIELD OF THE INVENTION
The present invention is in the field of infrastructure monitoring and maintenance, and in particular relates to a computer-based system and method for early identification and monitoring of defects in transportation infrastructure.
BACKGROUND TO THE INVENTION
Systems and methods for monitoring transportation infrastructure and reporting defects therein are known in the prior art:
Patent KR101604050B discloses a road tunnel inspection device comprising: a tunnel photographing part which photographs a wall or an inner space in a tunnel in order to discriminate an extent of a crack of the tunnel wall, fire breakout in the tunnel and a traffic accident of a vehicle in the tunnel, and transmits the photographed image data; a tunnel inspection part to inspect an inner surface of the tunnel using a tunnel surface inspection device; a water leakage inspection part to inspect a water leakage of the tunnel using a tunnel water leakage inspection device; a communication part to provide an interface to realize communication with an external terminal; an inspection state analysis part which analyzes an occurrence of an abnormal state in the tunnel, by analyzing the tunnel photographing part, the tunnel inspection part, and the water leakage inspection part, and generates an abnormal state notification signal in case of the occurrence of the abnormal state; and a control part to control the tunnel photographing part, the tunnel inspection part, the water leakage inspection part, the communication part, and the inspection state analysis part.
Patent application CN108053132 discloses a bridge defect smart reporting system including a manual tour inspection mobile terminal and a data processing server. The manual tour inspection mobile terminal acquires current position of the tour inspection terminal through a GPS positioning function, collects tour inspection basic information, and obtains a position with bridge defect in the shortest vertical distance to the tour inspection mobile terminal through a semicircle detection method, performs interaction with a data processing server, obtains the bridge defect information of said position, and confirms or updates the bridge loss information of said position according to the tour inspection condition of the bridge defect. The data processing server performs storage treatment on the tour inspection basic information, the tour inspection position and the bridge defect information transmitted by the manual tour inspection mobile terminal by utilizing a data storage service module, obtains a history defect data of the bridge defect position, performs analysis and evaluation on history defect of the position by utilizing a defect priority evaluation function and selects and pushes the bridge defect information having the highest priority level to the manual tour inspection mobile terminal.
Patent US9129355B1 discloses a method and system to assess the damage to infrastructure using aerial images captured from an unmanned aerial vehicle (UAV), a manned aerial vehicle (MAV) or from a satellite device. Specifically, an item of infrastructure may be identified for assessing damage. The UAV, MAV, or satellite device may then capture aerial images within an area which surrounds the identified infrastructure item. Subsequently, the aerial images may be analyzed to determine a condition and the extent and/or severity of the damage to the infrastructure item. Furthermore, the aerial images along with indications of the extent of the damage may be displayed on a computing device.
Publication “Image-Based Framework for Concrete Surface Crack Monitoring and Quantihcation”— Chen, et ah, Advances in Civil Engineering, Vol. 2010, Article ID 215295— discloses nondestructive imaging for identihcation of the most common damage types observed in civil engineering, namely, concrete surface cracks. An optical cameras provide source images. Several advanced image processing methods are applied to the images, including: (i) determination of damage occurrence using time-series images, (ii) localization of damage at each image frame, and (iii) the geometric quantihcation of damage.
SUMMARY OF THE INVENTION
The present invention relates to a system and method for providing a warning and for monitoring of a vulnerability: a potential defect in a structure and/or its related systems that is not yet apparent as a defect. A type of vulnerability is identified from a grouping of elements and/or features of the structure and its systems, called findings, whose attributes meet a particular selection rules called relationship-association classifiers (RACs): a series of one or more tests of relationships between attributes of findings, the series of tests indicating whether findings are associated and collectively classified as a particular type of vulnerability or defect. Findings are identified and their attributes evaluated from one or more images, typically taken during routine maintenance of the structure.
RACs are based on relationships between attributes of findings known or found to be correlated to a particular type of defect. A RAC may be established by an optimization function or by a neural network function trained from maintenance reports and documented findings and attributes concurrent with each maintenance report.
Groupings identified as a vulnerability can be reported to a maintenance entity for follow up. Reporting of vulnerabilities can provide an early warning of a problem with a structure and its systems before it becomes a serious defect.
For example, a small and growing crack is found above a venting system hanging on the roof of a tunnel. The crack is identified, with attributes of its rate of growth (found from multiple images taken at different times) and its proximity to a venting system element. A RAC may select growing cracks up to a maximum distance from a venting system element, where both the crack and the element are on the roof of a tunnel. The entire group and its location on the roof may be reported to a maintenance entity as a vulnerability to be checked.
Another aspect of the invention relates to providing a user, typically a maintenance entity, with a“tour” of findings and defects of a structure. The tour can be in 3D. Markers designating defects of various severity are superimposed on a displayed image of the structure. Details of a defect may be displayed or its marker may be selected for more details. The details include the underlying findings— in a grouping— and their attributes and relationships of attributes that led to computing a defect function above a threshold.
Existing 3D solutions, on the other hand, are generally systems like BIM (Building Information Modeling), which is primarily for providing architects, constructors, and designers an accurate 3D modeling of a building for design and planning purposes. The 3D“tour” of the present invention, in contrast, is a way to present and orient a maintenance manager and operator, both post-design and construction functions, to a pin-pointed vulnerability in his assets. It is therefore an objective of the invention to provide a method for early identification and monitoring of defects in a structure, the method comprising steps of a. accumulating one or more images of a structure into an images database;
b. processing the images;
c. identifying one or more findings in one of the images;
d. adding new findings to an objects database;
e. computing one or more attributes of each of the findings;
wherein the method further comprises steps of
f. applying one or more relationship-associative classifiers (RACs)— a RAC defined as a set of selection rules defining values of relationships between attributes of the findings— to the findings, wherein the findings whose attributes meet an RAC are grouped into a vulnerability group; and
g. reporting the vulnerability group to a maintenance entity.
It is a further objective of the invention to provide the abovementioned method, wherein the structure comprises one or more of a tunnel, a bridge, a road, a dam, or a pipeline.
It is a further objective of the invention to provide the abovementioned method, wherein the findings of the structure comprise concrete or iron walls, bearings, deck, piers, abutments, traffic lane control sign (LCS), variable message sign (VMS), barriers, emergency telephone (ERT), signs, public announcements, cameras, safety, visibility sensors, C02 sensors, heat sensors, fire hoses, vents, doors, railings, pavement, cables, electricity tunnels, covers, traffic lights, road lamps, lighting fixtures, electricity boxes, electric cords, cracks, rust, wet areas, welding exposure, concrete segregation, broken sensors, broken fire hoses, water leaks, loose wires, soot, missing equipment, loose screws, disintegration, waste, broken pavement, inflorescence, exposed iron, missing covers, graffiti, open holes, damaged suspension cables, potholes, or any combination thereof.
It is a further objective of the invention to provide the abovementioned method, wherein positions of the findings depicted in an image found by matching a pattern in the image with positions of matching findings in previous images. It is a further objective of the invention to provide the abovementioned method, wherein the attributes of the findings comprise one or more of location, color, shape, size, texture, depth, width, height, area, impact distance from a source of the finding, quantity of elements within a particular radius, distance from a particular utility, distance from a past corrective action area, influence on core infrastructure, percentage of exposure, and physical connectivity to another finding.
It is a further objective of the invention to provide the abovementioned method, wherein the vulnerability object comprises findings objects associated with findings from two or more functional groups of the structure.
It is a further objective of the invention to provide the abovementioned method, wherein the functional groups comprise one or more of structural, electricity, air conditioning, a lifesaving system, an air quality system, a signing system, a fire detection system, and a fire mitigation system.
It is a further objective of the invention to provide the abovementioned method, wherein the RACs are learned using a neural network technique.
It is a further objective of the invention to provide a system for identifying defects in transportation infrastructure, comprising a. an images database, storing accumulated images of a structure;
b. an image processing module, configured to process the images;
c. a findings processing module and an objects database comprising a findings sub database and a vulnerabilities sub-database, the findings operations unit configured to i. identify findings in one or more of the images;
ii. store new the identified findings as a findings object in the findings sub database;
iii. compute attributes of each the finding in a findings object corresponding to the finding; and
wherein the system further comprises
d. a rules engine, configured to i. apply relationship-associative classifiers (RACs)— a RAC defined as a set of selection rules defining values of relationships between attributes of the findings, the relationship values indicative of a vulnerability of the structure— to one or more of the attributes of the findings objects;
ii. grouping the finding objects meeting the RACs into one or more vulnerability groupings;
iii. store vulnerability objects comprising the grouped finding objects or references thereto; and
e. a reporting module, configured to report the vulnerability object and findings objects therein to a maintenance entity.
It is a further objective of the invention to provide the abovemen tioned system, wherein the structure comprises one or more of a tunnel, a bridge, a road, a dam, or a pipeline.
It is a further objective of the invention to provide the abovemen tioned system, wherein the findings of the structure comprise concrete or iron walls, bearings, deck, piers, abutments, traffic lane control sign (LCS), variable message sign (VMS), barriers, emergency telephone (ERT), signs, public announcements, cameras, safety, visibility sensors, C02 sensors, heat sensors, fire hoses, vents, doors, railings, pavement, cables, electricity tunnels, covers, traffic lights, road lamps, lighting fixtures, electricity boxes, electric cords, cracks, rust, wet areas, welding exposure, concrete segregation, broken sensors, broken fire hoses, water leaks, loose wires, soot, missing equipment, loose screws, disintegration, waste, broken pavement, inflorescence, exposed iron, missing covers, graffiti, open holes, damaged suspension cables, potholes, or any combination thereof.
It is a further objective of the invention to provide the abovemen tioned system, wherein positions of the findings depicted in an image is found by matching a pattern in the image with positions of matching findings in previous images.
It is a further objective of the invention to provide the abovemen tioned system, wherein the attributes of the findings comprise one or more of location, color, shape, size, texture, depth, width, height, area, impact distance from a source of the finding, quantity of elements within a particular radius, distance from a particular utility, distance from a past corrective action area, influence on core infrastructure, percentage of exposure, and physical connectivity to another finding.
It is a further objective of the invention to provide the abovemen tioned system, wherein the vulnerability object comprises findings objects associated with findings from two or more functional groups of the structure.
It is a further objective of the invention to provide the abovemen tioned system, wherein the functional groups comprise one or more of structural, electricity, air conditioning, a lifesaving system, an air quality system, a signing system, a fire detection system, and a fire mitigation system.
It is a further objective of the invention to provide the abovemen tioned system, wherein the RACs are learned using a neural network technique.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 lists steps of a method for monitoring defects in infrastructure, according to some embodiments of the invention.
Figures 2A-2G show a progression of an image as processed during a method for monitoring defects in infrastructure, according to some embodiments of the invention.
Figure 3 shows a functional block diagram of modules in a system for monitoring defects in infrastructure, according to some embodiments of the invention.
Figures 4A-4C show various display outputs of a system for monitoring defects in infrastructure, according to some embodiments of the invention.
DETAIFED DESCRIPTION
Definitions:
“Structure” can refer to a transportation structure such as a tunnel, bridge, or culvert; or any other structure such as a dam, pipeline, or water/sewage pipe. “Element” refers to any part of a structure. Examples of elements include concrete, pavement, railings, barriers, vents, signs, lights, sensors, fire hydrants, and electrical cables. Elements of a bridge may include a roadway, trusses, suspension cables, lampposts, and bridge traffic signs. Elements of a tunnel may include walls, ceiling, tiles, ventilation shafts, and CO/CO2 sensors, and safety signs.
“Finding” refers to an element or feature of an element in one or more images of a structure. An element or feature can be counted as a finding whether it appears normal in the image or anomalous (e.g., misshapen, enlarged, diminished, discolored, dis-textured, or missing), or whether the feature itself is an anomaly (e.g., a crack, wet spot, or rust spot, broken sign).
“Vulnerability” refers to a group of one or more findings whose attributes are deemed to indicate a defect or potential defect of a structure and its systems when a rule or set of rules is applied.
“Relationship-associative classifier (RAC)” refers to a series of one or more tests of relationships between attributes of findings, the series of tests indicating whether findings are associated and collectively classified as a particular type of vulnerability or defect.
“Maintenance entity” refers to a party with an involvement or interest in the maintenance of a structure, its systems, or element(s) therein. Examples of a maintenance entity can include, for example, a company responsible for operations, engineering, maintenance engineering, maintenance, assets inventory manager, risk assessment, maintenance planning, electricity, or plumbing; or an asset owner, or any company or person(s) involved in the infrastructural element.
Reference is now made to Figure 1, showing steps of a computer-based method 100 for monitoring defects in infrastructure, according to some embodiments of the invention.
Method 100 comprises accumulating one or more images of a structure 105. A typical structure can be a transportation structure such as a tunnel, bridge, or culvert; or any other structure such as a dam or pipeline. Descriptions in this application shall be made as pertaining to tunnels; however, it is appreciated that the teachings of the invention apply to any transportation structure and other types of structures. Each image is typically obtained during the course of maintenance and operations performed at the structure. Accumulating of the images 105 is typically to a database. Each image may be, for example, a photograph, a thermal image, or a LIDAR image. Images may be directly digitized upon exposure; or developed, printed, and scanned. An image is typically accompanied with metadata such as the ID number of the contractor who took the image; a timestamp; data of the image-taking camera, such as location and aiming direction of the camera, f-stop, lighting, and exposure time; and/or a maintenance report. Accumulated images taken at various times contribute to a dynamic and ongoing understanding of potential defects of the structure and its elements, as further described herein.
For purposes of clarity, some steps herein are described with regard to one image. It is appreciated that some or all steps may be repeated for each of the accumulated images of the structure. It is also understood that some steps of the method 100 may be performed more than once.
Method 100 further comprises processing the images 110, in preparation for identifying findings 107 (further described herein). Techniques of processing an image 110 can be, for example, filtering, normalization of color channels, cropping, resizing, translation, rotation, inversion, and rescaling.
Method 100 further comprises identifying findings of the structure in an accumulated image 115. Findings are elements or features of elements of the structure. For example, wall segments, ceiling, tiles, ventilation shafts, fire hoses, wires, equipment, screws, pavement, lampposts, lighting fixtures, CO/CO2 sensors, and safety signs; or features thereof.
Findings depicted in the image may be identified, for example, by matching a pattern in the image with elements in previously analyzed accumulated images or with an original image or model of the structure. Alternatively, or in addition, findings may be identified by matching attributes (e.g., location, size, color, shape) with those of previously found findings.
Identified findings 115 may comprise both new findings as well as findings previously identified from earlier accumulated images. A finding may be an element or feature pictured in the image in its normal condition or may— in whole or in part— have an anomaly such as a crack, rust, wet areas, welding exposure, concrete segregation, water leaks, soot, disintegration, waste, exposed iron, missing covers, graffiti, holes, potholes, among others, and combinations thereof.
In some embodiments, identifying findings 115 comprises distinguishing whether an element is in its normal state; or whether the element is in an anomalous state or contains an anomalous feature. Examples of normal and anomalous states of elements, and resulting findings, are indicated in the Table 1.
Table 1
Figure imgf000012_0001
Method 100 further comprises adding new findings to an objects database 117 and computing attributes of the identified findings 120. An attribute of a finding may be the functional group to which the finding belongs. For example, cracks and segregated concrete have a functional group attribute of“structural,” while an electrical box and cables have a functional group attribute of“electrical.”
Other attributes of a finding may include, for example, location, color, shape, size, texture, depth, width, height, area, distance from a source of an anomaly, quantity of elements within a particular radius, distance from a particular utility, distance from a past corrective action area, degree of influence on core infrastructure, percentage of exposure, among others, and any combination thereof.
A finding may be assigned, according to the type of the finding, a template of attributes. For example, a crack can have an attribute of whether or not the crack is leaking. Attributes in the template are computed 120 and updated in the objects database. Attributes and relationships may be updated statistically, with a level of confidence of an evaluated attribute value (e.g., depending on image quality, perspective, analysis confidence, etc.) weighted against a level of confidence of an existing attribute value. A finding’ s previous attribute values may be archived (e.g., in the objects database), thereby enabling development of a timeline history of attributes of each finding.
Method further comprises applying relationship-associative classifiers (RACs) to the findings 125. A RAC is a series of one or more tests of relationships between attributes of findings indicating whether findings are associated and collectively classified as a particular type of vulnerability or defect. A RAC is designed to test mutual presence or attributes of findings that are potentially correlated to a condition of concern in the structure, and therefore identified as a vulnerability.
Non-limiting examples of RACs for a tunnel are
• A RAC for a crack-density vulnerability groups cracks in a region in which all cracks are less than 1 cm from the nearest crack.
• A RAC for proximity hazard of a leaking crack to the ventilation system associates ventilation system findings and cracks that are leaking and whose distance to a ventilation system finding is less than 10 cm.
• A RAC for growing rust vulnerability associates a region of segregated concrete and a total rust area which is bigger than last year’s total rust area on the same segregated concrete region.
• A RAC for a vulnerability of water damage caused by a leaking hose associates a fire hose with overlapping cracks that are leaking.
• A RAC for emphasizing location-based vulnerabilities that associates vulnerabilities found by other RACs, such as vulnerabilities on the roof of a tunnel or a pillar of a bridge. RACs may be programmed manually or computed with an optimization algorithm. In some embodiments, a neural network algorithm may be employed to learn RACs, trained, for example, by maintenance reports. The algorithm may neurally analyze attributes of findings in a concurrent and past time frame of each maintenance report.
Method further comprises grouping the selected findings for each RAC as a vulnerability 130. In some embodiments, step 125 may be repeated for new images, and additional findings may be added to a grouping of findings.
Method further comprises reporting identified vulnerabilities 135. The vulnerabilities may be reported to one or more engineering entities, e.g. for follow-up action such as an inspection. Reported data may be accompanied by images, findings, and attributes contributing to each vulnerability.
In some embodiments, method 100 further comprises providing a 3D tour of findings and vulnerabilities of the structure 140.
Reference is now made to Figures 2A-2G. To demonstrate method 100, a non-limiting example is now described.
Figure 2A shows an image accumulated 105 in a database. The image depicts an interior wall of a rail tunnel. Figure 2B shows the image after image processing 110, including normalization, rotation, and registration to a reference. Figure 2C shows the image with superimposed outlines of findings after identifying findings 115. The findings include electric wiring 205, leakage 210, planned structural holes 215, color changes 220, a jet fan 225, and railroad tracks 235.
Figure 2D shows the findings after applying RACs to the findings 125 and grouping findings meeting each RAC 130. Short circuit vulnerabilities 240 are identified by overlap of leakage 210 and electric wiring 205 behind jet fan 225. A fan damage vulnerability 242 242 is identified by direct leakage of water behind the main jack box of the jet fan.
Figure 2E shows a selected vulnerability 245 comprising active leakage above a main jack box of a jet fan. Figure 2F shows markers 250 indicating identified defects during providing of a 3D tour of the tunnel. A sidebar 255 shows a summary of the severity and numbers of defects. Figure 2G shows details about the marked vulnerabilities, shown upon a user clicking a marker 250.
Reference is now made to Figure 3, showing a functional block diagram of a system 300 for monitoring defects in infrastructure, according to some embodiments of the invention. System 300 comprises one or more processors and one or more non-transitory computer-readable mediums (CRMs). The CRMs store instructions to the processor for operation of modules of system 300, as herein described.
System 300 comprises an images database 320 and an image processing module 315. Images database 320 stores images of a structure. A typical structure can be a transportation structure such as a tunnel, bridge, or culvert; or any other structure such as a dam or pipeline. Each image is typically obtained during the course of maintenance and operations performed on the structure. Each image may be a photograph, a thermal image, or a LIDAR image. Images may be directly digitized upon exposure; or developed, printed, and scanned. An image is typically accompanied with metadata such as the ID number of the contractor who took the image; a timestamp; data of the image-taking camera, such as location and aiming direction of the camera, f-stop, lighting, and exposure time; and/or a maintenance report.
Image processing module 315 is configured to process a raw image in order to prepare the image for identification of findings. Image processing module 315 may employ techniques such as filtering, normalization of color channels, cropping, resizing, translation, rotation, inversion, and rescaling. Image processing module 315 may generate intermediate images processed from a raw image. Some intermediate images and segmented images may be stored, in whole or in part, in images database 320, in association with the raw image.
System 300 further comprises a findings processing module 325. Findings processing module 325 detects and indexes findings in an image of the structure. Findings processing module 325 may detect findings in an image by matching a pattern in the image with identified findings in previously processed images in images database 320. Alternatively, or in addition, findings processing module 325 may match attributes (e.g., location, size, color, shape) with those of previously found findings in an objects database 340 (further described herein). Findings processing module 325 further computes attributes of findings. Findings processing module 325 adds the attributes or a link thereto to a findings object 350 of the finding.
System 300 optionally comprises an infrastructure information database 335, which may store, for example, CAD drawings, satellite photos, and/or geo maps of the structure. Elements identification module 325 may employ infrastructure information database 335 to assist in identifying findings.
System 300 further comprises an objects database 340. Objects database 340 comprises a findings sub-database 345. Findings sub-database 345 stores findings objects 350. Each findings object 350 comprises or links to a findings identifier and attributes of the identified finding. Objects database 340 further comprises a groupings sub-database 355. Grouping sub database 355 stores grouping objects
System 300 further comprises a rules module 370. Rules module 370 is configured to apply relationship-associative classifiers (RACs) to each finding and group findings objects 350 of findings meeting the selection rule into groupings. A grouping is a group of one or more findings whose presence or attributes are of concern, because the findings in the grouping are correlated such that they may stem from the same conditions or constitute a particular risk to the structure— a vulnerability. Vulnerabilities may be further monitored by system 300 and/or reported to a maintenance entity for follow-up attention. In an example of monitoring vulnerabilities, rules module 370 may apply several RACs with progressive thresholds of a particular type of vulnerability. For example, an expanding crack may not meet the growth-rate (or crack length) threshold of a RAC of the most severe crack, but may meet a lower growth-rate threshold RAC and worthy of monitoring. Beyond a particular level RAC-growth-rate threshold, cracks may be reported, along with the level of severity, to a maintenance entity.
In some embodiments, a vulnerability may comprise more than one type of finding. For example, a wet crack may be grouped with rust on an electrical box. In some embodiments, a vulnerability may comprise only one finding. For example, a crack (among thousands of other cracks) in a tunnel roof may be placed in a grouping because the crack is collocated with a screw fastening a vent to the roof. Findings may be grouped as a vulnerability if they are of a common functionality group, geometrical location in the structure, material type, surface structure, temperature, IR absorbance or reflectance, or caused or affected by the same external forces (such as by a shock wave or vehicular crash).
A vulnerabilites sub-database 355 of objects database 340 stores vulnerability objects 360. A vulnerability object 360 specifies which findings objects 350 are in the vulnerability grouping. Rules module 370 inspects findings objects 345 and creates new vulnerability objects 360 or adds findings to an existing vulnerability object 360. Rules module 370 may be trained (i.e., supplied with new or optimized RACs) by a neural network algorithm correlating defects reported by a maintenance entity with attributes of findings recorded before the defect report.
System further comprises a reporting module 375, which reports the findings associated with the vulnerability object 360 as a vulnerability. Reports may present data, for example, tabular, graphical, and/or in 3D.
For example, Figure 4A1 shows images 400A-400C of a crack in a tunnel from three different cameras. The images are accompanied by a description 405 of present status and recommendation, based on the crack’s identifying RAC and the crack’s attributes. The images are accompanied by past images 410 accumulated by system 300 and dates each past image was taken, thereby indicating a timeline depicting the progression of the crack.
Figures 4B1 and 4B2 shows an image 420 of a tunnel wall and roof, respectively, on which are superimposed identifiers of findings on the wall. Each identifier is disposed at the location of the finding. A user of system 400 may click on an identifier to learn more details about the underlying finding.
Figure 4C shows an image 440 along the length of the tunnel with superimposed identifiers of defects in the tunnel. A user of system 400 may indicate in the checkboxes 445 what kinds of defects to show.
Figure 4D shows a user interface of a system for detecting an monitoring vulnerabilities of a bridge.

Claims

1. A method 100 for early identification and monitoring of defects in a structure, the method 100 comprising steps of
a. accumulating one or more images of a structure into an images database (320) 105; b. processing the images 110;
c. identifying one or more findings (350) in a said image 115;
d. adding new findings to an objects database 117;
e. computing one or more attributes of each of the findings (350) 120;
wherein the method 100 further comprises steps of
f. applying one or more relationship-associative classifiers (RACs)— a RAC defined as a set of selection rules defining values of relationships between attributes of the findings— to the findings 125, wherein the findings whose attributes meet a said RAC are grouped into a vulnerability group 130; and
g. reporting the vulnerability group (360) to a maintenance entity 135.
2. The method of claim 1, wherein the structure comprises one or more of a tunnel, a bridge, a road, a dam, or a pipeline.
3. The method of claim 2, wherein the findings of the structure comprise concrete or iron walls, bearings, deck, piers, abutments, traffic lane control sign (LCS), variable message sign (VMS), barriers, emergency telephone (ERT), signs, public announcements, cameras, safety, visibility sensors, CO2 sensors, heat sensors, fire hoses, vents, doors, railings, pavement, cables, electricity tunnels, covers, traffic lights, road lamps, lighting fixtures, electricity boxes, electric cords, cracks, rust, wet areas, welding exposure, concrete segregation, broken sensors, broken fire hoses, water leaks, loose wires, soot, missing equipment, loose screws, disintegration, 'aste, broken pavement, inflorescence, exposed iron, missing covers, graffiti, open holes, damaged suspension cables, potholes, or any combination thereof.
4. The method of claim 1, wherein positions of the findings depicted in a said image found by matching a pattern in the image with positions of matching findings in previous images.
5. The method of claim 1, wherein the attributes of the findings comprise one or more of location, color, shape, size, texture, depth, width, height, area, impact distance from a source of the finding, quantity of elements within a particular radius, distance from a particular utility, distance from a past corrective action area, influence on core infrastructure, percentage of exposure, and physical connectivity to another finding.
6. The method of claim 1 , wherein the vulnerability object comprises findings objects associated with findings from two or more functional groups of the structure.
7. The method of claim 6, wherein the functional groups comprise one or more of structural, electricity, air conditioning, a lifesaving system, an air quality system, a signing system, a fire detection system, and a fire mitigation system.
8. The method of claim 1 , wherein the RACs are learned using a neural network technique.
9. A system 300 for identifying defects in transportation infrastructure, comprising
a. an images database 320, storing accumulated images of a structure;
b. an image processing module 315, configured to process the images;
c. a findings processing module 330 and an objects database 340 comprising a findings sub-database 345 and a vulnerabilities sub-database 355, the findings operations unit 330 configured to
i. identify findings in one or more of the images;
ii. store new the identified findings as a findings object 350 in the findings sub database 345;
iii. compute attributes of each the finding in a findings object 350 corresponding to the finding; and
wherein the system 300 further comprises
d. a rules engine 370, configured to
i. apply relationship-associative classifiers (RACs)— a RAC defined as a set of selection rules defining values of relationships between attributes of the findings, the relationship values indicative of a vulnerability of the structure— to one or more of the attributes of the findings objects 350;
ii. grouping the finding objects 350 meeting the RACs into one or more vulnerability groupings 380;
iii. store vulnerability objects 360 comprising the grouped finding objects 350 or references thereto; and e. a reporting module 375, configured to report the vulnerability object 360 and findings objects 350 therein to a maintenance entity.
10. The system of claim 9, wherein the structure comprises one or more of a tunnel, a bridge, a road, a dam, or a pipeline.
11. The system of claim 10, wherein the findings of the structure comprise concrete or iron walls, bearings, deck, piers, abutments, traffic lane control sign (LCS), variable message sign (VMS), barriers, emergency telephone (ERT), signs, public announcements, cameras, safety, visibility sensors, CO2 sensors, heat sensors, fire hoses, vents, doors, railings, pavement, cables, electricity tunnels, covers, traffic lights, road lamps, lighting fixtures, electricity boxes, electric cords, cracks, rust, wet areas, welding exposure, concrete segregation, broken sensors, broken fire hoses, water leaks, loose wires, soot, missing equipment, loose screw's, disintegration, waste, broken pavement, inflorescence, exposed iron, missing covers, graffiti, open holes, damaged suspension cables, potholes, or any combination thereof.
12. The system of claim 9, wherein positions of the findings depicted in a said image found by matching a pattern in the image with positions of matching findings in previous images.
13. The system of claim 9, wherein the attributes of the findings comprise one or more of location, color, shape, size, texture, depth, width, height, area, impact distance from a source of the finding, quantity of elements within a particular radius, distance from a particular utility, distance from a past corrective action area, influence on core infrastructure, percentage of exposure, and physical connectivity to another finding.
14. The system of claim 9, wherein the vulnerability object comprises findings objects associated with findings from two or more functional groups of the structure.
15. The system of claim 14, wherein the functional groups comprise one or more of structural, electricity, air conditioning, a lifesaving system, an air quality system, a signing system, a fire detection system, and a fire mitigation system.
16. The system of claim 9, wherein the RACs are learned using a neural network technique.
PCT/IL2019/050381 2018-04-05 2019-04-02 System and method for early identification and monitoring of defects in transportation infrastructure WO2019193592A1 (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
AU2019249431A AU2019249431A1 (en) 2018-04-05 2019-04-02 System and method for early identification and monitoring of defects in transportation infrastructure
US17/045,176 US11605158B2 (en) 2018-04-05 2019-04-02 System and method for early identification and monitoring of defects in transportation infrastructure
EP19781112.8A EP3775855A4 (en) 2018-04-05 2019-04-02 System and method for early identification and monitoring of defects in transportation infrastructure
IL277789A IL277789A (en) 2018-04-05 2020-10-05 System and method for early identification and monitoring of defects in transportation infrastructure

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862761734P 2018-04-05 2018-04-05
US62/761,734 2018-04-05

Publications (1)

Publication Number Publication Date
WO2019193592A1 true WO2019193592A1 (en) 2019-10-10

Family

ID=68101285

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/IL2019/050381 WO2019193592A1 (en) 2018-04-05 2019-04-02 System and method for early identification and monitoring of defects in transportation infrastructure

Country Status (5)

Country Link
US (1) US11605158B2 (en)
EP (1) EP3775855A4 (en)
AU (1) AU2019249431A1 (en)
IL (1) IL277789A (en)
WO (1) WO2019193592A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102019127493A1 (en) * 2019-10-11 2021-04-15 IFSB Institut für Schadensbewertung GmbH Procedure for crack classification in a building structure

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021200675A1 (en) * 2020-04-01 2021-10-07 富士フイルム株式会社 Three-dimensional display device, three-dimensional display method, and program
DE102021207204A1 (en) 2021-07-08 2023-01-12 Zf Friedrichshafen Ag System and method for estimating the depth of at least one at least partially water-filled pothole and corresponding driver assistance system
US20230419805A1 (en) * 2022-06-28 2023-12-28 Chengdu Qinchuan Iot Technology Co., Ltd. Methods and systems for fire monitoring and early warning in a smart city based on internet of things
CN116045104B (en) * 2023-01-10 2024-05-10 浙江伟众科技有限公司 Air conditioner soft and hard pipe connection sealing device and method thereof
CN117952018B (en) * 2024-03-21 2024-06-11 贵州交通建设集团有限公司 BIM-based bridge long-term performance data processing method and data processing platform

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050249414A1 (en) * 2003-04-16 2005-11-10 Fujitsu Limited Knowledge discovery device, knowledge discovery method, and computer product
US20130155061A1 (en) * 2011-12-16 2013-06-20 University Of Southern California Autonomous pavement condition assessment
US9129355B1 (en) * 2014-10-09 2015-09-08 State Farm Mutual Automobile Insurance Company Method and system for assessing damage to infrastructure

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150009331A1 (en) 2012-02-17 2015-01-08 Balaji Venkatraman Real time railway disaster vulnerability assessment and rescue guidance system using multi-layered video computational analytics
KR101604050B1 (en) 2015-04-30 2016-03-17 주식회사 맥서브 Road tunnel inspection device
WO2018165753A1 (en) * 2017-03-14 2018-09-20 University Of Manitoba Structure defect detection using machine learning algorithms
CN108053132B (en) 2017-12-26 2019-01-29 武汉理工大学 Bridge defect intelligently pushing system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050249414A1 (en) * 2003-04-16 2005-11-10 Fujitsu Limited Knowledge discovery device, knowledge discovery method, and computer product
US20130155061A1 (en) * 2011-12-16 2013-06-20 University Of Southern California Autonomous pavement condition assessment
US9129355B1 (en) * 2014-10-09 2015-09-08 State Farm Mutual Automobile Insurance Company Method and system for assessing damage to infrastructure

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
MASATO MATSUMOTO , KOJI MITANI F. NECATI CATBAS: "Bridge assessment methods using image processing and infrared thermography technology", TRANSPORTATION RESEARCH BOARD 92ND ANNUAL MEETING LOCATION, 31 December 2013 (2013-12-31), Japan, pages 1 - 14, XP009523945 *
MURRAY ALAN T; GRUBESIC TONY H: "Critical Infrastructure", 1 January 2007, SPRINGER, Berlin , Heidelberg, ISBN: 978-3-540-68055-0, article MICHAEL A P TAYLOR; GLEN M D’ESTE: "Transport network vulnerability: a method for diagnosis of critical locations in transport infrastructure systems", pages: 9 - 30, XP055643067 *
See also references of EP3775855A4 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE102019127493A1 (en) * 2019-10-11 2021-04-15 IFSB Institut für Schadensbewertung GmbH Procedure for crack classification in a building structure
DE102019127493B4 (en) 2019-10-11 2023-10-12 IFSB Institut für Schadensbewertung GmbH Method for classifying cracks in a building structure

Also Published As

Publication number Publication date
US11605158B2 (en) 2023-03-14
US20210150692A1 (en) 2021-05-20
IL277789A (en) 2020-11-30
AU2019249431A1 (en) 2020-10-29
EP3775855A1 (en) 2021-02-17
EP3775855A4 (en) 2021-06-02

Similar Documents

Publication Publication Date Title
US11605158B2 (en) System and method for early identification and monitoring of defects in transportation infrastructure
US20230081273A1 (en) Method and system for assessing damage to infrastructure
US10032267B2 (en) Automating the assessment of damage to infrastructure assets
KR101926561B1 (en) Road crack detection apparatus of patch unit and method thereof, and computer program for executing the same
Koo et al. Innovative method for assessment of underground sewer pipe condition
KR102202572B1 (en) road crack assessment method and system using drone image and artificial intelligent algorithm
Akagic et al. Pothole detection: An efficient vision based method using rgb color space image segmentation
US9365217B2 (en) Mobile pothole detection system and method
Hadjidemetriou et al. Automated detection of pavement patches utilizing support vector machine classification
CN111339905B (en) CIM well lid state visual detection system based on deep learning and multiple visual angles
CN109448365A (en) Across the scale space base land regions road traffic system integrated supervision method of one kind
CN103106766A (en) Forest fire identification method and forest fire identification system
CN111126802A (en) Highway inspection and evaluation method and system based on artificial intelligence
WO2021199915A1 (en) Degradation display system, degradation display method, and storage medium
US20230306573A1 (en) Systems and methods for assessing infrastructure
KR100993205B1 (en) System and method for detecting disaster occurrence
CN114248819A (en) Railway intrusion foreign matter unmanned aerial vehicle detection method, device and system based on deep learning
CN117474870B (en) Road pavement crack identification decision-making method and system based on big data screening
Alzarrad et al. Automatic assessment of roofs conditions using artificial intelligence (AI) and unmanned aerial vehicles (UAVs)
KR101542134B1 (en) The apparatus and method of surveillance a rock fall based on smart video analytic
JP6892197B1 (en) Deterioration display system, deterioration display method, and program
JP7174601B2 (en) Crest surface level difference extraction system and crown surface level difference extraction method
Hadjidemetriou et al. Patch defects in images using support vector machines
CN112102299A (en) Urban greening monitoring method, device, equipment and medium based on three-dimensional modeling
Xu et al. Vision-based pavement marking detection–a case study

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19781112

Country of ref document: EP

Kind code of ref document: A1

DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2019249431

Country of ref document: AU

Date of ref document: 20190402

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2019781112

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2019781112

Country of ref document: EP

Effective date: 20201105