Analysis of Selected Papers: El-Zahab and Zayed Smart Water (2019) 4:5 Page 8 of 23
Analysis of Selected Papers: El-Zahab and Zayed Smart Water (2019) 4:5 Page 8 of 23
Analysis of Selected Papers: El-Zahab and Zayed Smart Water (2019) 4:5 Page 8 of 23
– Static leak detection systems: are systems that rely on sensors and data collectors
that are placed within the water network and on valves and are capable of
transmitting periodical data to the network management office. This data can be
used to identify, localize, and pinpoint leaks.
– Dynamic leak detection systems: are systems that rely on moving leak detection
devices to suspected leakage area to perform an investigation. Therefore, they rely
initially on suspicion of an existing leak. Another approach is performing regular
surveys around cities to identify leaks as soon as possible. Those systems can
confirm the existence of leaks and immediately localize and pinpoint them.
The main distinction between the two classes is that static leak detection systems can
inform the water network management of the existence of a leak almost immediately,
whereas dynamic leak detection systems are required to have information of a leak pos-
sibility so that they can be mobilized for investigation. On the other hand, dynamic leak
detection systems can pinpoint the exact location of a leak almost immediately under
ideal operating conditions, whereas static leak detection systems will provide a location
within a certain area and they are also more prone to false alarms. It is not uncommon
to use a static leak detection system to detect leaks and a dynamic leak detection sys-
tem to pinpoint them, but that is not expected to be the most affordable route (Cataldo
et al. 2014; Lee et al. 2005). The two classes encompass a wide variety of technologies
to provide an accurate leak detection system, but the technologies are not limited to
one class. For example, acoustic technologies, specifically noise loggers, can be dynamic
and moved from one location to the other periodically to detect leaks as in (Hunaidi
and Wang 2006) or they can be left in the network as in (El-Zahab et al. 2017).