Autonomous Pipeline Inspection
Autonomous Pipeline Inspection
SWARM ROBOTICS.
RICHARD MOLYNEUX
Date: 14/01/2023.
1
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 3
Abstract
Acknowledgments
Contents
Abstract 3
Acknowledgments 5
1. Introduction 10
1.1. Motivation. 11
1.4. Publication. 13
2. Literature Review. 15
3.1. Introduction. 32
3.2. Simulation. 33
3.3. Behaviours. 43
8 MOLYNEUX
3.4. Stigmergy. 46
3.6. Ad Hoc. 49
3.8. Simulations. 57
3.10. Discussion 70
4.1. Introduction. 72
4.3. Localization. 75
4.10. Discussion. 97
6. Conclusion. 104
References 110
10 MOLYNEUX
1. Introduction
of acoustic and radio waves with which robots would normally com-
municate. This impacts the swarm’s ability to make quick, informed
decisions as each agent is working with partial, or out of date informa-
tion.
There are many approaches that can be taken to address these issues,
from actively governing the swarm to encouraging biologically inspired
simple behaviours. Each has the potential to counteract the problems
in different ways, with the ultimate goal of creating an efficient pipeline
inspection process to sustain the water networks we rely on.
1.4. Publication. This thesis represents the authors own work and
has led to the following peer-reviewed publication:
2. Literature Review.
by the flow of the network, the user has very little control over the
direction or speed the ball takes. As such, frequency analysis is often
required to properly determine the nature of an anomaly. Additionally,
the lack of directional control means that to gain a proper coverage of
the network, the ball must be placed at different entry points so as to
avoid simply repeating the same few paths.
Perhaps the most advanced field when considering robotic pipeline in-
spection is centred around gas pipelines. Gas and oil leaks pose a
much more serious threat than water leaks, and as such extensive re-
search has been invested to ensure a thorough inspection process. Early
robotic systems have been presented that use articulated structures and
tether cables to develop snakelike robots capable of navigating complex
pipeline configurations [48]. Pipeline inspection gauges or gadgets,
commonly referred to as pigs, can be propelled by a pressure-driven
flow at speeds to gather fast inspection data [42] [13]. Unfortunately
this is not a complete method for all pipelines as obstacles and physical
barriers can disrupt this inspection method. As such, advances have
been made in crawler technology to create inspection robots of higher
maneuverability. Crawlers are typically mounted on wheels or tracks
and enable the user to assess a wide range of pipeline conditions due to
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 19
The literature in Section 2.2 evidences that aside from the charging
and power considerations, appropriate robotic platforms exist that can
navigate and inspect a network. A milestone in evidencing the feasi-
bility of autonomous inspection is the work of Parrot, C., Dodd, T.,
Boxall, J.B. and Horoshenkov, K. titled ‘Simulation of the Behaviour
of Biologically-Inspired Swarm Robots for the Autonomous Inspection
of Buried Pipes’ [44]. The work details a simulation platform that ex-
plores how a simple swarm intelligence can be applied to autonomous
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 21
The work extends further, seeking to prove not only the effectiveness
of autonomous inspection, but to provide a governing intelligence for
the swarm of robots to improve the coordination of the swarm. To
govern the movement of the swarm, the work by Parrott, C. et al. [44]
digitised the Stigmergy [16] swarm behaviour to implement an implicit
form of cooperation between the agents, based solely off choosing a
pipe when the agent reaches a junction. Provided there was communi-
cation between the agents, the agents were able to share their ‘mem-
ories’ of the network — their individual inspection histories. In doing
so, two agents sharing their inspection history were able to update
their own awareness of pipes that had been inspected most recently
to inform decisions. Each pipe was therefore anointed with a virtual
pheromone that enabled agents at a junction to choose the pipe which
most required inspection. The paper goes on to illustrate the benefits
of increased communication ranges and coordination to the efficiency
of the Stigmergy implementation, particularly with respect to network
coverage.
The application of the work of Li, X. et al. [32] into water networks
requires some consideration. The system is reliant on the initial geom-
etry of the network to be modelled before any computation can occur.
Water companies in the UK do not necessarily have the information re-
quired to build the 3D model — pipes have frequently been built on top
of other pipes and before proper documentation was implemented. As-
suming the information is available, the work details how the pipeline
wall needs to be marked in order for the robot to localise at the exact
location needed to ensure complete coverage. Applying the markings
to water networks is a task in itself; given the size of water networks in
the UK and the relative range a robot can assume to be able to inspect
from one spot, it is likely that an extremely high number of markings
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 23
Once a system has been mapped, SLAM algorithms are typically em-
ployed into robotic systems, which provides them with the ability to
quickly localise themselves. Worley, R., Yu, Y. and Anderson, S. de-
scribe a method of acoustic echo-localisation for pipe inspection robots
[60]. Underground pipeline networks are extremely dark, and as such
other visual SLAM (vSLAM) methods lose their appeal [53]. Similarly,
pipelines are often devoid of landmark features and as such become a
difficult environment with which to truly be certain that a robot has
localised. The echo system presented detects distant features and uses
acoustic processing to make measurements of the robots position. The
acoustic data is refined before a state estimation is declared, leaving
the method with a high success rate.
of objects and classes. Not only does this enable the simulation to
model dynamic systems, but it ensures cohesiveness of results. The
simulation is simply compiled beforehand and parameters are chosen
via a user interface which allows core attributes of the simulation to
be kept separate from the selected parameters. In addition, the sim-
ulation uses EPANET, a water distribution modelling software. This
allows the simulation to read in .inp files which contain data from real
water networks for reconstruction. The reconstruction is rendered us-
ing the built-in Windows Application Programming Interface — Figure
1 illustrates the EPANET render alongside the simulation counterpart
with point agents for the Net2 network.
After the simulation stores the network, the user interface allows for
parameter specification and creates the subsequent output files. Once
the parameters have been inputted, the simulation creates the agents
and their starting positions in the network. From there, the agents
traverse the network and are assumed to be continuously inspecting,
with the behaviour they are following making the decisions based on
accumulated information. A necessary distinction to make is though
the behaviour decides the optimal paths, it is the agents which actively
move through the network and follow the strict laws in place within
the system. For example, a behaviour might tell an agent to enter a
pipe for which the flow is too strong to overcome, in which case the
agent in question will forcibly stop moving and enter a rest state until
the flow allows traversal. If specified in the parameters, the simulation
can replicate dynamic water flows or impose charge requirements on
the agents. As the agents traverse the network, their communication
methods are simulated and each is provided with an individual belief
of the inspection history of the network which assists in the decision
making process. Once the simulation has concluded, the normalised
mean and standard deviation of the average Time Between Inspections
(TBI ) is outputted alongside any other specified metrics.
3.2.1. Simulation Detail. The simulation has been designed with mul-
tiple parameters and experiments in mind. As such there are many
functions and applications that require further explanation to relate
meaningful results to real networks. Similarly, due to the experimental
nature of the simulation certain assumptions have been made which
require justification. It is therefore beneficial to provide key elements
of the simulation with more detail and address the reasoning behind
specific implementations.
Once verified the parameters fall within the bounds of the system, the
program creates directories and files for the results. From here, a sim-
ulation batch is created — a grouping of simulation sets and instances
depending on the iterations specified in the interface. To lower compu-
tation time, the program supports threading, a technique that allows
separate pieces of code to run concurrently instead of consequentially.
In this instance, multiple simulations are able to run in parallel on
individual cores and processors of the computer. As a core finishes a
simulation, it is assigned a new one from the remaining batch. Upon
conclusion of the batch the results are compiled and the normalised
values are printed on the results files for the reader.
After the network is stored, the starting positions for the agents are
randomised and the agents created. The agents are assigned an index
and a behaviour which will govern their decision making processes.
Whereas the assigned behaviour uses information to decide a course of
action, the agent class controls the traversal across the network, from
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 39
At this point the simulation is executed and the agents placed in the
network. For each link in the network, the Time Since Last Inspection
(TSLI ) is initialised to zero. The Time Since Last Inspection value
for a link represents the time passed since it was last inspected by an
agent. As the agent traverses the network, the TSLI value for each
link is continuously updated and is only reset to zero upon inspection.
Figure 1 demonstrates how the render converts the TSLI value into a
link colour, to illustrate the current pipes most in need of inspection. A
recently inspected pipe is represented by a bright yellow which steadily
gets cooler the longer it goes without inspection.
broadcast. Not only does this provide all recipients with the most up-
to-date information, but it inadvertently avoids detrimental behaviours
such as agents on the same link syncing up and following one another.
The broadcast is called when the behaviour signals to the agent that
there is a transmittable to share at the next junction. A transmit-
table is individual to each behaviour, and can be any information the
behaviour needs to communicate in order to inspect as a swarm effec-
tively. Typically this includes the aforementioned agent memories, but
can also include relevant path planning information.
The platform can access the flow data from the .inp file to influence
the movement speed of the agents in a link. The flow data available
constitutes a 24 hour cycle that changes every half hour. The flow
in a link is calculated as a demand of the two junctions it connects
from which the flow impact on the movement speed is calculated. If
the impact is against the agent direction it will slow the agent, and if
it goes with the agent direction it will speed up. In addition, if the
flow impact is against the agent direction and exceeds the movement
speed, the agent enters a sleep behaviour. This behaviour stops the
agent moving for half an hour, before waking to check if the new flow
velocity is traversable. This behaviour is repeated until the flow ve-
locity subsides enough to move again, at which point the behaviour
returns to the original planning behaviour. The behaviour represents
a hardware assumption that robots are able to clamp themselves to a
pipe wall and rest, conserving energy instead of fighting the flow. It is
assumed that the robots can be equipped with flow sensing capabilities
42 MOLYNEUX
and as such, all behaviours are gifted the ability to measure the flow
velocities for the connected links at the agent’s current junction. This
enables the agents to avoid entering a link that immediately traps it in
a sleep cycle.
Figure 6 shows the simulation render of the TSLI map against the flow
velocity map. The links in the flow velocity render are small triangles,
with the thicker end representing the direction the flow is heading. The
thickness and colour of the triangle represents the flow strength. As is
evident from the TSLI map, the topmost section has gone the longest
without inspection as it has the coolest colours. The flow map advises
this is due to the strength of the flow in the connecting links slowing
agents reaching the subsection.
where TBI represents the raw TBI value and TN represents the nor-
malised value. Both the mean and standard deviation are calculated,
with low values indicating a continual inspection and an impartial in-
spection respectively.
at every possibility. The Greedy Walk therefore seeks to find the most
optimal solution it can without compromising it’s simplicity and lack
of bias. The random nature of the walks simulated ensure solutions do
not just tend to local optima, but global. As the agent follows the spec-
ified walk, it broadcasts not only the inspection memory, but the path
it is currently undertaking. This informs other agents of pipes that
have been allocated to be inspected in the near future, and therefore
aren’t in need of inspection.
This does not seem to hinder the performance of the agents as they
seem to settle in even areas with little overlap.
The iterations are random, with each walk a collection of random deci-
sions at each junction. However, the behaviour estimates the time each
link takes to inspect and the path concludes once the cumulative time
exceeds a prespecified value. By weighting each link with the time it
will take to inspect, the Greedy Walk is able to include small outlying
pipes or clusters of small pipes in the path as they take little time to
traverse, but provide a large TSLI gain.
Upon receiving a broadcast, the following agent will examine the can-
didate list for any junctions it can reach in time. If this exists it will
follow the same process the first agent and add to the candidate list.
If it cannot reach one of the candidate junctions in range, it will in-
stead find the highest TSLI junction it can reach with Dijkstra’s. By
iteratively passing a junction candidate list through the agents and
implementing a greedy Dijkstra’s approach, the agents tend to clus-
ters of agents actively inspecting together with rare satellite agents
that aggressively seek outlying nodes. It should be noted, that whilst
it seems nonsensical to calculate the shortest paths using Dijkstra’s
to then choose the most expensive of those options, the alternative is
to use a much more computationally expensive longest-path algorithm
before selecting a path that can be completed in time, a shorter one.
agents are surplus. In spite of this, the goal of the Ad Hoc approach
is to limit the frequency of communication required, particularly as
transmission times are introduced into the network. Where other be-
haviours requirement for consistent transmission compounds the effect
of longer transmission times, the Ad Hoc approach suffers only a frac-
tion of the detriment. Similarly, because of the fluidity of the behaviour
— planning around only a sole end point, the behaviour is able to re-
tain consistent inspection times when flow and communication issues
are examined in tandem.
The issue for the Chinese Postman Solution revolves around it’s com-
putational expense in larger graphs. As the graph size increases, so
too does the number of odd degree vertices. The combination of odd
degree vertices that gives the optimal pairings is iteratively calculated
by examining the lexicographic order — a technique for ordering and
swapping variables in a manner that ensures every possible combination
is examined. Therefore, the combination of odd degree vertex pairings
that finds the optimal articial path introductions increases exponen-
tially as the network grows. 12 odd degree vertices means there are
12! = 479, 001, 600 lexicographic combinations of odd pairings. Given
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 55
that the Looping network in Figure 4 has 296 odd degree vertices, a
smarter implementation is necessary.
Below the pseudocodes used in the simulation for the CPP behaviour
algorithm are detailed:
Algorithm 10 Lexicographic
1: function Lexicographic(((LexicographicList)))
2: for all LexicographicList going backwards do
3: if LexicographicsList[Index] <
LexicographicList[Index + 1] then
4: F irstCharacter ← LexicographicList[Index]
5: F irstIndex = Index
6: end if
7: end for
8: for all LexicographicList above Index do
9: if LexicographicsList[Index] < F irstCharacter then
10: CeilingCharacter ← LexicographicList[Index]
11: CeilingIndex = Index
12: break loop
13: end if
14: end for
15: Swap F irstCharacter and CeilingCharacter
16: for all LexicographicList above F irstIndex do
17: Sort into size order.
18: end for
19: end function
Algorithm 11 Fleury’s Algorithm
1: function FleurysAlgorithm((CurrentJunction, EulerianCluster))
2: CycleSize ← N umberLinksInEulerianCluster
3: for CycleSize do
4: for all ConnectedLinks do
5: if Link also has an Artif icialLink then
6: Add Link to V iableOptions
7: end if
8: end for
9: if V iableOptions is empty then
10: for all ConnectedLinks do
11: Add Link to V iableOptions
12: end for
13: end if
14: Choose random Link from V iableOptions
15: CurrentJunction ← LinkOtherJunction
16: P athList add Link
17: end for
18: return P athList
19: end function
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 59
Initially it is obvious that the more agents in a system, the more fre-
quent the inspections. This is shown by the generally linear downhill
slope of mean and standard deviations in Figure 9. As the number
of agents in a network is increased, the frequency of inspections rises
as there are simply more agents traversing the network at one time.
Early additional agents provide a much higher return likely due to low
numbers of agents in a system being unable to cover the entire sys-
tem. Therefore additional agents provide a bigger benefit than when
the swarm is already large. As the number of agents in the network
reaches 16, the introduction of more agents starts to see diminishing
returns, as is evident by the congested mean values. The network has
become saturated as agents find themselves frequently in close prox-
imity to one another, inspecting pipes that have just been inspected.
The effect is mirrored in the standard deviation of the TBI, where
additional early agents provide a much more significant benefit than
those introduced in the latter stages. Again, this indicates a critical
point where the current swarm is able to inspect the entire network
sufficiently.
60 MOLYNEUX
The mean values for each behaviour are extremely close together, es-
pecially as the network saturates with agents. However, this is to be
expected when the simulation is run without a dynamic flow present.
Without flow, the agents in a network are continuously moving and
inspecting regardless of the paths they take. As such, the mean values
tend to be quite close together. For flow-less simulations, a better indi-
cator of performance is the standard deviation. The standard deviation
of the TBI represents the disparity between the frequency that individ-
ual pipes are inspected. A low standard deviation indicates that most
pipes in the network are inspected with the same frequency, whereas
a high standard deviation highlights a discrepancy in the inspection
process.
Due to issues with the code during the research project, the Ad Hoc
behaviour has not been included in the simulations, and is instead left
as Future Work in Section 6.3.
In this instance, the range constitutes the sum of the length of the
pipes a signal can travel. That is, two agents are deemed in range of
one another if the length of the shortest path between them does not
exceed the range. The communication class calls a basic exploratory
Branch and Bound algorithm, Algorithm 12 to ascertain all junctions
and links within range. Though the simplest experiment would have
detailed the range by a linear radius with the broadcasting agent at
its epicentre, the environment of the network dictates the signals must
62 MOLYNEUX
also traverse the network, as they cannot pass through the pipe walls
or surrounding earth.
Algorithm 12 Communication Branch and Bound Algorithm
1: function Branch and Bound((Junction, InitialBroadcastRange))
2: if At a Junction then
3: Add (Junction, InitialBroadcastRange) to
BroadcastJunctions
4: else
5: DistanceF romLastJunction = LinkT ravel
6: DistanceT oN extJunction = LinkLength − LinkT ravel
7: for all Agents in Link do
8: if Agent in broadcast range then
9: Add Agent to AgentsT oBroadcastT o
10: end if
11: end for
12: Add (StartJunction, InitialBroadcastRange −
DistanceF romStart) and (EndJunction, InitialBroadcastRange−
DistanceF romEnd) to BroadcastJunctions
13: end if
14: while BroadcastJunctions non empty
15: Broadcast ← BroadcastJunctions Front
16: BroadcastJunctions remove Front
17: if Broadcast has not been broadcast to then
18: Broadcast set to broadcast to
19: for all BroadcastConnectedLinks do
20: if Agents in Link in range then
21: Add Agent to AgentsT oBroadcastT o
22: end if
23: BroadcastRemainingRange = Broadcast range
−LinkLength
24: if BroadcastRemainingRange > 0 then
25: Create Iterator until BroadcastRemainingRange
expires
26: Add Agents to AgentsT oBroadcastT o
27: end if
28: end for
29: end if
30: for all AgentsT oBroadcastT o do
31: Agent receive transmittable
32: end for
33: end function
Acoustic waves have an extended range that can travel through water,
but also propagate round corners well despite their slow propagation
66 MOLYNEUX
To compare the two ranges, the simulations have been run on the Stig-
mergy behaviour in both the Looping and Net2 networks. The Stig-
mergy behaviour has been selected because it is the behaviour that
communicates most frequently, at the exit of every junction. There-
fore the differences in the communication type, including transmission
time, will be highlighted the most. The Looping and Net2 networks
were selected for these simulations as they are the largest and smallest
networks respectively.
3.10. Discussion. The focus of this chapter was to detail the simu-
lation platform presented by Parrot, C. et al. [44] and why it is an
appropriate mechanism to model autonomous pipeline inspection. By
creating a system that can take in real networks and generate point
agents with limited hardware assumptions it has been able to give a
low-cost insight into the challenges of subterranean inspection, particu-
larly highlighting the communication difficulties faced in this particular
environment. In addition, the platform has laid the foundation from
which the rest of the thesis is built by creating a simulation capable
of easy manipulation without interfering with the core mechanics of
the system. This was exhibited in the adaptation of the simulation to
include ultrasonic and acoustic communication methods, the transmis-
sion state and three new planning algorithms.
Unfortunately the flow data itself is discrete and changes hourly, which
can cause instant fluctuations as an agent is traversing a pipe. How-
ever, though not a discrete change, it is common for flow to suddenly
fluctuate with the demands of human routine. For example, the collec-
tive early morning shower can cause a spike in flow demand, not too
distant from a discrete leap. Similarly, though the flow data available
in these simulations is repeated every 24 hours due to the availabil-
ity of the data, this fortunately mirrors the monotony of the working
week. In short, the flow data provided for these simulations is real and,
though not ideal, a fair representation of flow demands and properties.
greatly reduces how mobile the agents are. The mean is increased sim-
ply because the agents are slower at traversing the network as a whole,
and therefore reach new pipes for inspection much less frequently. In
addition, Figure 14 highlights how the Greedy Walk behaviour specifi-
cally could be improved with the addition of flow; as the algorithm uses
forward planning, so long as the flow is traversable, it will continue to
push on despite the slow rate. It is conceivable that introducing a break
function when the flow exceeds a certain value to reanalyse the future
path and instead choose a path of lesser resistance could help improve
the behaviour. Despite this, the behaviour is more fluid than the CPP
solution, which is shown to struggle further with flow in Figure 15.
In addition, the flow has a huge impact on the standard deviation of the
inspection for the Greedy Walk. This is to be expected, as particular
pipes can have consistently high flows, with extremely infrequent lulls
in which an agent can traverse it. Without accounting for the flow it
is difficult to then achieve similarly low standard deviation values, as
the small windows in which an agent can enter a pipe are not being
prioritised. As such, whole areas of a network can be cut off save for the
rare moment an agent happened to being inspecting nearby during a
lull. The Looping network particularly has topological obstacles, such
as bottlenecks to large segments of the network that are compounded
by an unusually high flow. Without any flow intelligence, a behaviours
ability to navigate flow in a network is dependent on the topology of
the network. Similarly, areas with low flow are likely to be inspected
every time they are passed, which helps cement the disparity between
the inspection frequencies.
imaginable. There is a likely scenario wherein the flow can become too
powerful, overwhelming the clamped robot and pushing it back down
the pipes with the flow. When this happens, it is important to assume
the agent is aware of the strength of the flow, and the possibility it has
been moved. In this instance, when the agent awakes it will enter a lost
state, traversing aimlessly — that is, with no governing behaviour, until
it enters the communication range of another agent. At this point the
agent receives a broadcast and position of the broadcasting agent, and
is assumed to be able to localise from that, returning to the previous
behaviour.
most water networks have a unique and random topological map. This
makes topological localisation well suited to inspection robots, as a
quick localisation process can be achieved simply by considering the
topology of the network — in this case, the junctions of a network.
By simply analysing the number of pipes at a junction and comparing
them to the topology of the network, an efficient localisation algorithm
can be implemented that uses little information and allows the robot
to simultaneously inspect as it finds itself.
The algorithm itself utilises the stored map and junction information
to correlate to the current junction it is at. As the agent continues
through the SLAM process, it can store the index of each link it chooses
for future reference. An important distinction to be made is though
the simulation assigns a connected link an index with relation to the
junction, this is unavailable to the lost agents. Because they are lost,
they do not know the direction they arrive at the junction from, so
cannot localise the ’correct’ index assigned by the simulation. The
index is a matter of perspective, however, and by storing the index of
each link from the direction the agent arrived at the junction, upon
conclusion of the SLAM algorithm it is possible to reconstruct the
path taken from when the agent initially became lost. Not only is a
perspective based index important for the SLAM behaviour, it also
allows the agent to continue inspecting as it progresses through the
SLAM process. As the agents can reconstruct their entire path, simply
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 79
storing the local TSLI values allows them to update their memory upon
conclusion of the algorithm. Though while actively localising the agent
is unable to broadcast reliable TSLI values, upon completion it can still
contribute to the swarm memory of the system.
When analysing the efficiency of the SLAM algorithm, the most no-
table feature of the simulation runs is the SLAM application in Figure
18. While the Stigmergy’s TBI values drastically drop when using the
82 MOLYNEUX
SLAM algorithm over random behaviour, the CPP actually finds ben-
efit in not localising at all. As the SLAM behaviour inevitably localises
the agent quicker than a No SLAM approach, the only conclusion that
can be drawn is when flow is introduced, the random No SLAM be-
haviour is actually a more adequate inspection process than the CPP
solution. This is unsurprising when Figure 15 is recalled — the ability
to move fluidly around the network, only piecing together the TSLI
values once localised, is still a better approach than localising quickly
to return to stagnating in a strong flow.
The Stigmergy then provides a better insight into the efficiency of the
SLAM algorithm. As is evident, for both communication ranges, the
SLAM algorithm returns a better TBI. This is because of the speed at
which it can localise to return to the Stigmergy behaviour — a func-
tionally better method of inspection. Interestingly there is very little
difference between the two communication ranges and their SLAM line.
As part of the SLAM algorithm is localising once within communication
range of another agent, it would be conventional to see a larger devia-
tion based on the communication range. This indicates that the SLAM
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 83
The proposed flow model uses Gaussian Process (GP) methods to de-
fine the relationship between the flow strength and the time of day.
Gaussian regression methods are a stochastic process used in super-
vised learning which focus on generalizing probability distributions to
a function. Using training sets it is possible to fit a continuous model
to discrete data. The principle behind the presented flow intelligence
system is to partition the network into individual pipes and fit a regres-
sion model to each, representing the flow cycle throughout a 24 hour
day. As the robots traverse the network, they can use the regression
model to predict the flow in each pipe, whilst simultaneously collecting
training data that can improve the model. The most important prop-
erty of the process is that, by implementing a regression model, the
Gaussian process can model the flow as a continuous function. This
is an important stipulation as it contradicts the discrete data provided
by water companies for this thesis. The data provided is an hourly ap-
proximation of the flow in individual pipes and is mirrored as such in
the simulation. In real life however, spikes in flow are not instantaneous
and on the hour but rather fluctuate gradually. As robots traverse the
network, a continuous models gradient will better describe the strength
of the flow than a discrete jump.
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 85
(4) w ∼ N (0, Σp ).
The likelihood is derived directly from the noise assumption and can
be factored over cases in the training set to reduce the model to
4.6.2. Function Space and the Predictive Function. Though the weight-
space view allows a direct derivation for the predictive distribution,
the function-space view considers inference in function space to predict
expected values. The calculations for mean, covariance and expected
values required for the robots to understand the flow intelligently are
much more computationally efficient due to their reliance on the kernel
function. The function-space view works under the definition that a
Gaussian process is a collection of random variables, any finite number
of which have a joint distribution. This means a process is completely
specified by its mean function and covariance function and therefore
where m(x) = E[f (x)] and k(x, x0 ) = E[(f (x)−m(x))(f (x0 )−m(x0 ))].
Specifically, the covariance function used is the squared exponential
covariance function, defined as follows:
1
(10) k(xp , xq ) = exp(− |xp − xq |2 ).
2
The above equations give the predicted mean and variance for an un-
known point under the predictive function. By consistently updating
the training data with flow data and remodeling the predictive dis-
tribution, robots are able to make more accurate predictions as the
variance drops. This pinching effect is illustrated where the variance
surrounding training data has reduced, though it remains large in ar-
eas with little training data. As the Gaussian process manipulates a
distribution as opposed to exact data, the computational complexity
to calculate the mean and variance values is low, even as the volume
of test data increases. Therefore the model simply improves as time
progresses, with little cost to the robots.
Figure 21 was created with three months worth of inspection data from
the simulation. Obtaining an appropriate amount of training data is
fundamental to the efficiency of the model and repeated recomputa-
tions of the model are likely to slow the robots considerably. It is
already assumed that robots in the network have a means of sharing
their inspection data, either by passing a communication point in the
network and uploading to a cloud or by exchanging as they pass one
another. It is therefore realistic to consider the robots also sharing
the flow data they have measured. Upon doing so, the models can be
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 91
updated with the new training data, before the new predictive distri-
bution is relayed for consideration. The mean and variance flows are
then equally calculable from Equations 12 and 13 respectively.
Given the typically short simulation time (28 days), for convenience
the simulation updates the training data at the end of a simulation, as
this allows a comparison of complete simulations with better or worse
training sets. Alternatively, it is possible to introduce a class that can
export the training data for a MATLAB reconstruction of the predictive
distribution, though due to its continuous nature, the calculations of
expected point values must be done within the simulation; the class
must contain the necessary equations to calculate the expected value
of the flow, which the agents call as they calculate their paths.
Given that the flow data is a repeated 24 hour cycle, the flow intelli-
gence records the flow in the same manner a Gaussian Process would.
The time is recorded in milliseconds mod 24 hours and each pipe is still
represented by an individual flow memory of these recordings. How-
ever, when it comes to estimating a future flow value, if an agent has
already inspected that pipe at the specified time, it is aware of the flow
rate with certainty.
94 MOLYNEUX
This method allows the simulation to record data in the same manner
as a Gaussian Process would. By iteratively filling out the timesteps
of each pipe, it is able to assimilate to perfect knowledge in a similar
manner to the GP model. The advantage remains that once a perfect
copy of the flow has been established, longer simulations can be carried
out that are similar to a Gaussian model with mature datasets. By
using this model, the flow intelligence simulations in Figure 25 were
run for the Net2 network spanning a month, three months, six months
and a year.
The simulations were run using the Greedy Walk behaviour. With
the exclusion of the Ad Hoc behaviour, the Greedy Walk is the only
behaviour that can make use of the additional flow intelligence. The
Stigmergy behaviour is solely concerned with the immediate flow which
it already has access to, and as such has no need for the additional
intelligence. In addition, the CPP is incapable of calculating a path
outside of the topological optimum. As such, the intelligence was added
to the Greedy Walk and ran for a year to demonstrate the effects of
accumulating sufficient data. Net2 was chosen due to its volatile flow.
possible to determine the current flow of the link it is in and use that
as an identifying trait, much like the number of links at a junction. If
an agent measures the flow at it’s current link, it can cross reference
it with any link with sufficient training data in the network for the
specific 24 hour time. If the current flow matches with a links expected
flow, or within the realms of the Gaussian Process standard deviation,
it can be considered. However, if the current flow is far outside the
realms of the expected flow of the link in question, it can be safely
discarded.
Given the necessarily small size of the robots, fitting in pipes as small
as 30cm, they are unable to hold a large charge. In addition, the agents
are continuously inspecting, often against strong flows that hinder their
movement, and are operating sensing and communication equipment.
As such, the robots batteries quickly drain, rendering them unable to
continue inspecting until they have recharged.
decision, and the expected charge that decision will expend, the Genetic
Algorithm component is able to find a Pareto optimal balance.
The simulation interface gives the user the option to specify which, or
both, power systems it would like to implement.
The MOGA is concerned with increasing the TSLI gain while simulta-
neously reducing the power expenditure. This translates to the follow-
ing shared fitness function:
by the shared fitness function. For example, the Greedy Walk be-
haviour would iterate through its paths, accumulating the TSLI gains
and the expected charge it would expend to inspect those pipes. De-
pending on the weightings assigned to the MOGA, the Greedy Walk
chooses the path with the highest shared fitness function.
Once the shared fitness has been created, the initial weighting is as-
signed.
6. Conclusion.
References
[1] Ahr, D., Reinelt, G., (2006) ’A tabu search algorithm for the min-max k-
Chinese Postman Problem’, Computers and Operations Research 33, 3403 -
3422
[2] Aleman, R. E., Zhang, X., Hill, R. R., (2008). ’An adaptive memory algorithm
for the split delivery vehicle routing problem’. Springer Science and Business
Media – Heuristics. 16, 441 – 473.
[3] T. Bailey and H. Durrant-Whyte, (2006) ’Simultaneous localization and map-
ping (SLAM): part II,’ Robotics and Automation Magazine, 13(3), 108-117
[4] Bonabeau, E., M. Dorigo, G. Theraulaz, ’Swarm Intelligence: From Natural
to Artificial Systems’, New York, NY: Oxford University Press, 1999.
[5] Breivoll EU. (2023). Breivoll Diagnostics - Pipeline Inspection. Available
at https://breivoll.eu/diagnostics/pipeline-inspection/ (Accessed: January
2023).
[6] Bondy, J.A. and Murty, U.S.R., 1976. Graph theory with applications (Vol.
290). London: Macmillan.
[7] Boyd, S. and Mattingley, J., 2007. Branch and bound methods. Notes for
EE364b, Stanford University, 2006, p.07.
[8] Quinonero-Candela, J., (2005), ’A Unifying View of Sparse Approximate
Gaussian Process Regression’, Journal of Machine Learning Research, 6, 1939-
1959
[9] Chakraborty, A. and Kar, A.K., 2017. Swarm intelligence: A review of algo-
rithms. Nature-inspired computing and optimization, pp.475-494.
[10] Couceiro, M.S., 2017. An overview of swarm robotics for search and rescue
applications. Artificial Intelligence: Concepts, Methodologies, Tools, and Ap-
plications, pp.1522-1561.
[11] Cui, Z. and Gao, X., 2012. Theory and applications of swarm intelligence.
Neural Computing and Applications, 21(2), pp.205-206.
[12] Dantzig, G.B. and Ramser, J.H., 1959. The truck dispatching problem. Man-
agement science, 6(1), pp.80-91.
[13] Davidson, R., 2002. An Introduction to Pipeline Pigging, Pigging Products and
Services Association, 9.
[14] Deng, Y., Chen, Y., Zhang, Y. and Mahadevan, S., 2012. Fuzzy Dijkstra al-
gorithm for shortest path problem under uncertain environment. Applied Soft
Computing, 12(3), pp.1231-1237.
[15] Discover Water. (March 2022). Discover Water - Leaking Pipes. Available at
https://www.discoverwater.co.uk/leaking-pipes (Accessed: January 2023).
[16] Dorigo, M., Bonabeau, E. and Theraulaz, G., 2000. Ant algorithms and stig-
mergy. Future generation computer systems, 16(8), pp.851-871.
[17] Dorigo, M., Gambardella, L.M., (1997), ’Ant Colonies for the Travelling Sales-
man Problem’ Biosystems, 43(2), 73-81,ISSN 0303-2647
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 111
[32] Li, X., Yu, W., Lin, X. and Iyengar, S.S., 2011. On optimizing autonomous
pipeline inspection. IEEE Transactions on Robotics, 28(1), pp.223-233.
[33] Liu, Z., Kleiner, Y., State of the art review of inspection technologies for condi-
tion assessment of water pipes, Elsevier, Measurement, vol. 46, Issue 1, January
2013.
[34] Mandal, S.K., Chan, F.T. and Tiwari, M.K., 2012. Leak detection of pipeline:
An integrated approach of rough set theory and artificial bee colony trained
SVM. Expert Systems with Applications, 39(3), pp.3071-3080.
[35] Marlow, D., et al., Condition Assessment Strategies and Protocols for Wa-
ter and Wastewater Utility Assets, Tech. Rep., Water Environment Research
Foundation, 2007.
[36] Maaref, M. and Kassas, Z.M., 2020, April. Optimal GPS integrity-constrained
path planning for ground vehicles. In 2020 IEEE/ION Position, Location and
Navigation Symposium (PLANS) (pp. 655-660). IEEE.
[37] Molyneux, R. , Parrott, C. , Horoshenkov, K. (2019), ’An Application of Path
Planning Algorithms for Autonomous Inspection of Buried Pipes with Swarm
Robots’, World Academy of Science, Engineering and Technology, Open Science
Index 153, International Journal of Mechanical and Materials Engineering,
13(9), 555 - 563.
[38] Nestleroth, J.B., 2004. Implementing current in-line inspection technologies
on crawler systems. Technology Status Report, http://www. netl. doe. gov,
pp.1-14.
[39] Noto, M. and Sato, H., 2000, October. A method for the shortest path search
by extended Dijkstra algorithm. In Smc 2000 conference proceedings. 2000 ieee
international conference on systems, man and cybernetics.’cybernetics evolving
to systems, humans, organizations, and their complex interactions’(cat. no. 0
(Vol. 3, pp. 2316-2320). IEEE.
[40] Nuchter, A., Surmann, H., Lingemann, K., Hertzberg, J. and Thrun, S., 2004,
April. 6D SLAM with an application in autonomous mine mapping. In IEEE
International Conference on Robotics and Automation, 2004. Proceedings.
ICRA’04. 2004 (Vol. 2, pp. 1998-2003). IEEE.
[41] Nur Afiqah Binti Haji, Y. et al., Development and Adaptability of In-Pipe
Inspection Robots, IOSR Journal of Mechanical and Civil Engineering, vol. 11,
Issue 4, Aug 2014.
[42] Okamoto Jr, J., Adamowski, J.C., Tsuzuki, M.S., Buiochi, F. and Camerini,
C.S., 1999. Autonomous system for oil pipelines inspection. Mechatronics, 9(7),
pp.731-743
[43] Osterhause, A., Mariak, F., (2005). ’On variants of the k-Chinese Postman
Problem’. Operations Research and Wirtschaftsinformatik, 30.
[44] Parrott, C., Dodd, T., Boxall, J.B. and Horoshenkov, K. (2020) ‘Simulation
of the Behaviour of Biologically-Inspired Swarm Robots for the Autonomous
PIPELINE INSPECTION WITH AUTONOMOUS SWARM ROBOTICS. 113
https://mathworld.wolfram.com/KoenigsbergBridgeProblem.html (Accessed:
January 2023)
[59] Worley, R. and Anderson, S. (2020) ’Topological Robot Localization in a Large-
Scale Water Pipe Network ’, Towards Autonomous Robotic Systems. Springer
International Publishing, 77 - 89.
[60] R. Worley, Y. Yu and S. Anderson,(2020) ’Acoustic Echo-Localization for Pipe
Inspection Robots,’ International Conference on Multisensor Fusion and Inte-
gration for Intelligent Systems 160-165
[61] Xu, Y., Wang, Z., Zheng, Q. and Han, Z., 2012, August. The application of
Dijkstra’s algorithm in the intelligent fire evacuation system. In 2012 4th Inter-
national Conference on Intelligent Human-Machine Systems and Cybernetics
(Vol. 1, pp. 3-6). IEEE.
[62] Yanming, G. et al., (2016), ’Deep Learning for Visual Understanding: A re-
view ’, Neurocomputing, 187, 27-48
[63] Yilin, Y., et al., (2019), ’A Survey on Deep Learning: Algorithms, Techniques
and Applications’, ACM Computing Surveys, 51(5), 1-36
[64] Zhang, S., Dubljevic, S., Pipeline crawler development for mapping gas pipeline
topology, American Control Conference, 2021.