Water leak detection using pressure sensing

ABSTRACT

A system including a sensing device including a pressure sensor configured to measure pressure of water in a water system of a structure. The sensing device can be configured to generate pressure measurement data representing the pressure of the water as measured by the pressure sensor. The system also can include one or more processing units including one or more processors and one or more non-transitory storage media storing machine executable instructions configured when run on the one or more processors to perform detecting a non-cyclical pressure event corresponding to a water leak in the water system of the structure during a first time period based on an analysis of information including the pressure measurement data. The information analyzed in the analysis does not include any flow measurement data that represents a total amount of flow of the water in the water system of the structure during the first time period. The pressure sensor can be coupled to the water system of the structure at a single location of the water system of the structure when measuring the pressure of the water in the water system of the structure. Other embodiments are provided.

TECHNICAL FIELD

This disclosure relates generally to detecting leaks in a pressurizedsystem, and relates more particularly to detection of non-cyclical leaksusing pressure sensing.

BACKGROUND

Pressurized systems supply various types of materials to venues. Forexample, water-supply systems deliver potable water to buildings orvenues, such as residential homes and commercial installations. Thewater can be delivered along industrial strength pipes at significantpressure using a system of high-pressure pumps. At the interface betweenthe utility and the target building or venue, a pressure regulator canbe installed to ensure that utility-supplied water pressure is reducedto desirable levels for appliances and/or human activity. The pressureof the water within the building or venue varies as water is used or asleaks occur in the plumbing or fixtures of the building or venue. Inanother example, gas-supply systems deliver pressurized gas to buildingsor venues for gas-powered items. Leaks can also occur in gas supplylines within the venue. Other pressurized systems also exist. Leaks insupply lines can lead to loss of water, gas, or other substances andalso can reduce pressure.

BRIEF DESCRIPTION OF THE DRAWINGS

To facilitate further description of the embodiments, the followingdrawings are provided in which:

FIG. 1 illustrates an example of a local area network 100;

FIG. 2 illustrates a system diagram of an exemplary water system;

FIG. 3 illustrates a cross-sectional view of the pressure regulator ofFIG. 2;

FIG. 4A illustrates graphs showing variations in pressure and flow in awater system having a pressure regulator that results in a high pressuredroop when various fixtures of the water system are used;

FIG. 4B illustrates graphs showing variations in pressure and flow in awater system having a pressure regulator that results in a low pressuredroop when various fixtures of the water system of are used;

FIG. 5 illustrates a block diagram of an exemplary leak detectionsystem, which can be used to implement various leak detection techniquesto detect leaks in a pressurized system using pressure data, accordingto an embodiment;

FIG. 6 illustrates installation of the leak detection device of FIG. 2proximate to a kitchen sink faucet, which can be at a portion of thewater system of FIG. 2;

FIG. 7 illustrates graphs showing examples of pressure events detectedusing a first leak detection technique;

FIG. 8 illustrates graphs showing examples of pressure eventscorresponding to a tankless water heater;

FIG. 9 illustrates graphs showing examples of pressure eventscorresponding to a baseline noise signature of a water system in aparticular case;

FIG. 10 illustrates graphs showing examples of pressure eventscorresponding to a the water system analyzed in FIG. 9, as analyzed sixmonths later;

FIG. 11 illustrates a graph of a pressure sensor stream showing anexample of pressure events detected using a second leak detectiontechnique;

FIG. 12 illustrates a graph of an example pressure sensor stream havingpressure events detected using a third leak detection technique;

FIG. 13 illustrates a flow chart for a method 1300, according to anembodiment;

FIG. 14 illustrates a computer system, according to an embodiment; and

FIG. 15 illustrates a representative block diagram of an example ofelements included in circuit boards inside a chassis of the computer ofFIG. 14.

For simplicity and clarity of illustration, the drawing figuresillustrate the general manner of construction, and descriptions anddetails of well-known features and techniques may be omitted to avoidunnecessarily obscuring the present disclosure. Additionally, elementsin the drawing figures are not necessarily drawn to scale. For example,the dimensions of some of the elements in the figures may be exaggeratedrelative to other elements to help improve understanding of embodimentsof the present disclosure. The same reference numerals in differentfigures denote the same elements.

The terms “first,” “second,” “third,” “fourth,” and the like in thedescription and in the claims, if any, are used for distinguishingbetween similar elements and not necessarily for describing a particularsequential or chronological order. It is to be understood that the termsso used are interchangeable under appropriate circumstances such thatthe embodiments described herein are, for example, capable of operationin sequences other than those illustrated or otherwise described herein.Furthermore, the terms “include,” and “have,” and any variationsthereof, are intended to cover a non-exclusive inclusion, such that aprocess, method, system, article, device, or apparatus that comprises alist of elements is not necessarily limited to those elements, but mayinclude other elements not expressly listed or inherent to such process,method, system, article, device, or apparatus.

The terms “left,” “right,” “front,” “back,” “top,” “bottom,” “over,”“under,” and the like in the description and in the claims, if any, areused for descriptive purposes and not necessarily for describingpermanent relative positions. It is to be understood that the terms soused are interchangeable under appropriate circumstances such that theembodiments of the apparatus, methods, and/or articles of manufacturedescribed herein are, for example, capable of operation in otherorientations than those illustrated or otherwise described herein.

The terms “couple,” “coupled,” “couples,” “coupling,” and the likeshould be broadly understood and refer to connecting two or moreelements mechanically and/or otherwise. Two or more electrical elementsmay be electrically coupled together, but not be mechanically orotherwise coupled together. Coupling may be for any length of time,e.g., permanent or semi-permanent or only for an instant. “Electricalcoupling” and the like should be broadly understood and includeelectrical coupling of all types. The absence of the word “removably,”“removable,” and the like near the word “coupled,” and the like does notmean that the coupling, etc. in question is or is not removable.

As defined herein, two or more elements are “integral” if they arecomprised of the same piece of material. As defined herein, two or moreelements are “non-integral” if each is comprised of a different piece ofmaterial.

As defined herein, “approximately” can, in some embodiments, mean withinplus or minus ten percent of the stated value. In other embodiments,“approximately” can mean within plus or minus five percent of the statedvalue. In further embodiments, “approximately” can mean within plus orminus three percent of the stated value. In yet other embodiments,“approximately” can mean within plus or minus one percent of the statedvalue.

DESCRIPTION OF EXAMPLES OF EMBODIMENTS

Various embodiments include a system including a sensing deviceincluding a pressure sensor configured to measure pressure of water in awater system of a structure. The sensing device can be configured togenerate pressure measurement data representing the pressure of thewater as measured by the pressure sensor. The system also can includeone or more processing units including one or more processors and one ormore non-transitory storage media storing machine executableinstructions configured when run on the one or more processors toperform detecting a non-cyclical pressure event corresponding to a waterleak in the water system of the structure during a first time periodbased on an analysis of information including the pressure measurementdata. The information analyzed in the analysis does not include any flowmeasurement data that represents a total amount of flow of the water inthe water system of the structure during the first time period. Thepressure sensor can be coupled to the water system of the structure at asingle location of the water system of the structure when measuring thepressure of the water in the water system of the structure.

A number of embodiments include a method including measuring pressure ofwater in a water system of a structure at a single location in the watersystem using a pressure sensor of a sensing device to generate pressuremeasurement data representing the pressure of the water as measured bythe pressure sensor. The method also can include communicating thepressure measurement data to one or more processing units.

The method additionally can include detecting a non-cyclical pressureevent corresponding to a water leak in the water system of the structureduring a first time period based on an analysis of information includingthe pressure measurement data. The information analyzed in the analysisdoes not include any flow measurement data that represents a totalamount of flow of the water in the water system of the structure duringthe first time period.

Techniques and systems are described for detecting leaks in apressurized system using pressure data. For example, the pressurizedsystem can include a home water system in a building or venue that issupplied with water from a water-supply system. A leak detection devicewith a pressure sensor can be coupled to the home water system. The leakdetection device can be a network device with network connectivity, asexplained further below. In some examples, the leak detection device caninclude a flow sensor. The pressure sensor can monitor pressure withinthe pressurized system, and can generate pressure data that representsthe pressure. The leak detection device can analyze the pressure data toidentify leaks in the pressurized system. For example, based on theanalysis of the pressure data, the leak detection device may identify anoccurrence of a leak and/or a type of leak that has occurred. Thepressure data can be analyzed in the frequency domain, in the timedomain, or in both the frequency and time domains to identify differenttypes of leaks. The leak detection device can communicate with a cloudcomputing system for reporting information regarding leaks, requestingverification of a leak, or for exchanging other communications. A leakdetection device can be used for detecting leaks in other types ofpressurized systems, such as natural gas systems.

In some embodiments, a cloud computing system may be provided forcommunicating with one or more leak detection devices. The cloudcomputing system can analyze pressure data provided from a leakdetection device, and can determine or verify occurrences of leaks andtypes of leaks. In some examples, the cloud computing system candetermine a type of leak that has occurred based on detection ofmultiple time and/or frequency domain characteristics from the pressuredata. For example, the cloud computing system can map one or moredetected time and/or frequency domain characteristics to a type of leak.

The leak detection device and/or the cloud computing system can provideinformation to a graphical interface of a user device. The graphicalinterface can include a web interface or a mobile device interface. Thegraphical interface provides notification and interaction functions fora user of the user device. For example, the graphical interface cancommunicate or present leak information for the user, and can allow theuser to provide input to enable and disable various fixtures in thepressurized system, or to enable or disable various settings (e.g.,types of notifications such as reporting alerts, frequency ofnotifications, types of leaks to report, or any other suitable setting).

A network may be set up to provide a user of an access device withaccess to various devices connected to the network. For example, anetwork may include one or more network devices that provide a user withthe ability to remotely configure or control the network devicesthemselves or one or more electronic devices (e.g., appliances)connected to the network devices. The electronic devices may be locatedwithin an environment or a venue that can support the network. Anenvironment or a venue can include, for example, a home, an office, abusiness, an automobile, a park, an industrial or commercial plant, orthe like. A network may include one or more gateways that allow clientdevices (e.g., network devices, access devices, or the like) to accessthe network by providing wired connections and/or wireless connectionsusing radio frequency channels in one or more frequency bands. The oneor more gateways may also provide the client devices with access to oneor more external networks, such as a cloud network, the Internet, and/orother wide area networks.

A local area network can include multiple network devices that providevarious functionalities. Network devices may be accessed and controlledusing an access device and/or one or more network gateways. Examples ofnetwork devices include a leak detection device, an automation devicethat allows remote configuration or control of one or more electronicdevices connected to the home automation device, a motion sensingdevice, or other suitable network-connected device. One or more gatewaysin the local area network may be designated as a primary gateway thatprovides the local area network with access to an external network. Thelocal area network can also extend outside of a venue and may includenetwork devices located outside of the venue. For instance, the localarea network can include network devices such as exterior motionsensors, exterior lighting (e.g., porch lights, walkway lights, securitylights, or the like), garage door openers, sprinkler systems, or othernetwork devices that are exterior to the venue. It is desirable for auser to be able to access the network devices while located within thelocal area network and also while located remotely from the local areanetwork. For example, a user may access the network devices using anaccess device within the local area network or remotely from the localarea network.

A network device within the local area network may pair with or connectto a gateway, and may obtain credentials from the gateway. For example,when the network device is powered on, a list of gateways that aredetected by the network device may be displayed on an access device(e.g., via an application, program, or the like installed on andexecuted by the access device). In some embodiments, only a singlegateway is included in the local area network (e.g., any other displayedgateways may be part of other local area networks). For example, thesingle gateway may include a router. In such embodiments, only thesingle gateway may be displayed (e.g., when only the single gateway isdetected by the network device). In some embodiments, multiple gatewaysmay be located in the local area network (e.g., a router, a rangeextending device, or the like), and may be displayed. For example, arouter and a range extender (or multiple range extenders) may be part ofthe local area network. A user may select one of the gateways as thegateway with which the network device is to pair, and may enter logininformation for accessing the gateway. The login information may be thesame information that was originally set up for accessing the gateway(e.g., a network user name and password, a network security key, or anyother appropriate login information). The access device may send thelogin information to the network device, and the network device may usethe login information to pair with the gateway. The network device maythen obtain the credentials from the gateway. The credentials mayinclude a service set identification (SSID) of the local area network, amedia access control (MAC) address of the gateway, and/or the like. Thenetwork device may transmit the credentials to a server of a wide areanetwork, such as a cloud network server. In some embodiments, thenetwork device may also send to the server information relating to thenetwork device (e.g., MAC address, serial number, or the like) and/orinformation relating to the access device (e.g., MAC address, serialnumber, application unique identifier, or the like).

The server may register the gateway as a logical network, and may assignthe first logical network a network identifier (ID). The server mayfurther generate a set of security keys, which may include one or moresecurity keys. For example, the server may generate a unique key for thenetwork device and a separate unique key for the access device. Theserver may associate the network device and the access device with thelogical network by storing the network ID and the set of security keysin a record or profile. The server may then transmit the network ID andthe set of security keys to the network device. The network device maystore the network ID and its unique security key. The network device mayalso send the network ID and the access device's unique security key tothe access device. In some embodiments, the server may transmit thenetwork ID and the access device's security key directly to the accessdevice. The network device and the access device may then communicatewith the cloud server using the network ID and the unique key generatedfor each device. Each network device and access device may also beassigned a unique identifier (e.g., a universally unique identifier(UUID), a unique device identifier (UDID), globally unique identifier(GUID), or the like) by the cloud server that is separate from thenetwork ID and the unique security key of each device. Accordingly, theaccess device may perform accountless authentication to allow the userto remotely access the network device via the cloud network withoutlogging in each time access is requested. Further details relating to anaccountless authentication process are described below. Also, thenetwork device can communicate with the server regarding the logicalnetwork.

FIG. 1 illustrates an example of a local area network 100. Local areanetwork 100 is merely exemplary and is not limited to the embodimentspresented herein. The local area network can be employed in manydifferent embodiments or examples not specifically depicted or describedherein. In some embodiments, the local area network 100 can include anetwork device 102, a network device 104, and a network device 106. Insome embodiments, any of network devices 102, 104, 106 may include anInternet of Things (IoT) device. As used herein, an IoT device is adevice that includes sensing and/or control functionality as well as aWiFi™ transceiver radio or interface, a Bluetooth™ transceiver radio orinterface, a Zigbee™ transceiver radio or interface, an Ultra-Wideband(UWB) transceiver radio or interface, a WiFi-Direct transceiver radio orinterface, a Bluetooth™ Low Energy (BLE) transceiver radio or interface,an infrared (IR) transceiver, and/or any other wireless networktransceiver radio or interface that allows the IoT device to communicatewith a wide area network and with one or more other devices. In someembodiments, an IoT device does not include a cellular networktransceiver radio or interface, and thus may not be configured todirectly communicate with a cellular network. In some embodiments, anIoT device may include a cellular transceiver radio, and may beconfigured to communicate with a cellular network using the cellularnetwork transceiver radio. Network devices 102, 104, and 106, as IoTdevices or other devices, may include leak detection devices, automationnetwork devices, motion sensors, or other suitable device. Automationnetwork devices, for example, allow a user to access, control, and/orconfigure various appliances, devices, or tools located within anenvironment or venue (e.g., a television, radio, light, fan, humidifier,sensor, microwave, iron, a tool, a manufacturing device, a printer, acomputer, and/or the like), or outside of the venue (e.g., exteriormotion sensors, exterior lighting, garage door openers, sprinklersystems, or the like). For example, network device 102 may include ahome automation switch that may be coupled with a home appliance.

In some embodiments, network devices 102, 104, and 106 may be used invarious environments or venues, such as a business, a school, anestablishment, a park, an industrial or commercial plant, or any placethat can support local area network 100 to enable communication withnetwork devices 102, 104, and 106. For example, a network device canallow a user to access, control, and/or configure devices, such asappliances (e.g., a refrigerator, a microwave, a sink, or other suitableappliance), office-related devices (e.g., copy machine, printer, faxmachine, or the like), audio and/or video related devices (e.g., areceiver, a speaker, a projector, a DVD player, a television, or thelike), media-playback devices (e.g., a compact disc player, a CD player,or the like), computing devices (e.g., a home computer, a laptopcomputer, a tablet, a personal digital assistant (PDA), a computingdevice, a wearable device, or the like), lighting devices (e.g., a lamp,recessed lighting, or the like), devices associated with a securitysystem, devices associated with an alarm system, devices that can beoperated in an automobile (e.g., radio devices, navigation devices),and/or other suitable devices.

A user can communicate with network devices 102, 104, and 106 using anaccess device 108. Access device 108 can include any human-to-machineinterface with network connection capability that allows access to anetwork. For example, in some embodiments, access device 108 can includea stand-alone interface (e.g., a cellular telephone, a smartphone, ahome computer, a laptop computer, a tablet, a personal digital assistant(PDA), a computing device, a wearable device such as a smart watch, awall panel, a keypad, or the like), an interface that is built into anappliance or other device (e.g., a television, a refrigerator, asecurity system, a game console, a browser, or the like), a speech orgesture interface (e.g., a Kinect™ sensor, a Wiimote™, or the like), anIoT device interface (e.g., an Internet enabled device such as a wallswitch, a control interface, or other suitable interface), or the like.In some embodiments, access device 108 can include a cellular or otherbroadband network transceiver radio or interface, and can be configuredto communicate with a cellular or other broadband network using thecellular or broadband network transceiver radio. In some embodiments,access device 108 may not include a cellular network transceiver radioor interface. While only a single access device 108 is shown in FIG. 1,one of ordinary skill in the art will appreciate that multiple accessdevices may communicate with network devices 102, 104, and 106. The usermay interact with the network devices 102, 104, and/or 106 using anapplication, a web browser, a proprietary program, or any other programexecuted and operated by access device 108. In some embodiments, accessdevice 108 can communicate directly with network devices 102, 104,and/or 106 (e.g., through a communication signal 116). For example, theaccess device 108 can communicate directly with network device 102, 104,and/or 106 using Zigbee™ signals, Bluetooth™ signals, WiFi™ signals,infrared (IR) signals, UWB signals, WiFi-Direct signals, BLE (BluetoothLow Energy) signals, sound frequency signals, or the like. In someembodiments, access device 108 can communicate with the network devices102, 104, and/or 106 via the gateways 110, 112 (e.g., through acommunication signal 118) and/or via a cloud network 114 (e.g., througha communication signal 120).

In some embodiments, local area network 100 can include a wirelessnetwork, a wired network, or a combination of a wired and wirelessnetwork. A wireless network may include any wireless interface orcombination of wireless interfaces (e.g., Zigbee™, Bluetooth™, WiFi™, IR(infrared, UWB, WiFi-Direct, BLE, cellular, Long-Term Evolution (LTE),WiMax™, or the like). A wired network may include any wired interface(e.g., fiber, ethernet, powerline ethernet, ethernet over coaxial cable,digital signal line (DSL), or the like). The wired and/or wirelessnetworks may be implemented using various routers, access points,bridges, gateways, or the like, to connect devices in local area network100. For example, local area network 100 can include gateway 110 and/orgateway 112. Gateway 110 and/or 112 can provide communicationcapabilities to network devices 102, 104, 106 and/or access device 108via radio signals in order to provide communication, location, and/orother services to the devices. In some embodiments, gateway 110 can bedirectly connected to external network 114 and can provide othergateways and devices in the local area network with access to externalnetwork 114. Gateway 110 can be designated as a primary gateway. Whiletwo gateways 110 and 112 are shown in FIG. 1, one of ordinary skill inthe art will appreciate that any number of gateways may be presentwithin local area network 100.

The network access provided by gateway 110 and/or gateway 112 can be ofany type of network familiar to those skilled in the art that cansupport data communications using any of a variety ofcommercially-available protocols. For example, gateways 110 and/or 112can provide wireless communication capabilities for local area network100 using particular communications protocols, such as WiFi™ (e.g., IEEE802.11 family standards, or other wireless communication technologies,or any combination thereof). Using the communications protocol(s),gateways 110 and/or 112 can provide radio frequencies on which wirelessenabled devices in local area network 100 can communicate. A gateway mayalso be referred to as a base station, an access point, Node B, EvolvedNode B (eNodeB), access point base station, a Femtocell, home basestation, home Node B, home eNodeB, or the like.

In many embodiments, gateways 110 and/or 112 can include a router, amodem, a range extending device, and/or any other device that providesnetwork access among one or more computing devices and/or externalnetworks. For example, gateway 110 can include a router or access point,and gateway 112 can include a range extending device. Examples of rangeextending devices can include a wireless range extender, a wirelessrepeater, or the like.

In several embodiments, a router gateway can include access point androuter functionality, and in a number of embodiments can further includean Ethernet switch and/or a modem. For example, a router gateway canreceive and forward data packets among different networks. When a datapacket is received, the router gateway can read identificationinformation (e.g., a media access control (MAC) address) in the packetto determine the intended destination for the packet. The router gatewaycan then access information in a routing table or routing policy, andcan direct the packet to the next network or device in the transmissionpath of the packet. The data packet can be forwarded from one gateway toanother through the computer networks until the packet is received atthe intended destination.

In a number of embodiments, a range extending gateway can be used toimprove signal range and strength within a local area network. The rangeextending gateway can receive an existing signal from a router gatewayor other gateway and can rebroadcast the signal to create an additionallogical network. For example, a range extending gateway can extend thenetwork coverage of the router gateway when two or more devices on thelocal area network need to be connected with one another, but thedistance between one of the devices and the router gateway is too farfor a connection to be established using the resources from the routergateway. As a result, devices outside of the coverage area of the routergateway can be able to connect through the repeated network provided bythe range extending gateway. The router gateway and range extendinggateway can exchange information about destination addresses using adynamic routing protocol.

In various embodiments, network devices 102, 104, 106, and/or accessdevice 108 can transmit and receive signals using one or more channelsof various frequency bands provided by gateways 110 and/or 112. One ofordinary skill in the art will appreciate that any available frequencyband, including those that are currently in use or that may becomeavailable at a future date, may be used to transmit and receivecommunications according to embodiments described herein. In someexamples, network devices 102, 104, 106, access device 108, and/orgateways 110, 112 may exchange communications using channels ofdifferent WiFi™ frequency bands. For example, different channelsavailable on a 2.4 gigahertz (GHz) WiFi™ frequency band that spans from2.412 GHz to 2.484 GHz may be used. As another example, differentchannels available on a 5 GHz WiFi frequency band that spans from 4.915GHz to 5.825 GHz may be used. Other examples of frequency bands that maybe used include a 3.6 GHz frequency band (e.g., from 3.655 GHz to 3.695GHz), a 4.9 GHz frequency band (e.g., from 4.940 GHz to 4.990 GHz), a5.9 GHz frequency band (e.g., from 5.850 GHz to 5.925 GHz), or the like.Yet other examples of frequency bands that may be used includetremendously low frequency bands (e.g., less than 3 Hz), extremely lowfrequency bands (e.g., 3 Hz-30 Hz), super low frequency bands (e.g., 30Hz-300 Hz), ultra-low frequency bands (e.g., 300 Hz-3000 Hz), very lowfrequency bands (e.g., 3 KHz-30 KHz), low frequency bands (e.g., 30KHz-300 KHz), medium frequency bands (e.g., 300 KHz-3000 KHz), highfrequency bands (e.g., 3 MHz-30 MHz), very high frequency bands (e.g.,30 MHz-300 MHz), ultra-high frequency bands (e.g., 300 MHz-3000 MHz),super high frequency bands (e.g., 3 GHz-30 GHz, including WiFi bands),extremely high frequency bands (e.g., 30 GHz-300 GHz), or terahertz ortremendously high frequency bands (e.g., 300 GHz-3000 GHz).

Some or all of the channels can be available for use in a network. Forexample, channels 1-11 of the 2.4 GHz frequency may be available for usein a local area network. As another example, channels 36, 40, 44, 48,52, 56, 60, 64, 100, 104, 108, 112, 116, 132, 136, 140, 149, 153, 157,161, and 161 of the 5 GHz frequency band may be available for use in alocal area network. One of ordinary skill in the art will appreciatethat any combination of the channels available on any of the frequencybands may be available for use in a network. The channels that areavailable for use may be regulated by the country in which the networkis located.

In some embodiments, gateways 110 and/or 112 can provide access device108 and/or network devices 102, 104, 106 with access to one or moreexternal networks, such as cloud network 114, the Internet, and/or otherwide area networks. In some embodiments, network devices 102, 104, 106may connect directly to cloud network 114, for example, using broadbandnetwork access such as a cellular network. Cloud network 114 can includeone or more cloud infrastructure systems that provide cloud services. Acloud infrastructure system may be operated by a service provider. Incertain embodiments, services provided by cloud network 114 may includea host of services that are made available to users of the cloudinfrastructure system on demand, such as registration and access controlof network devices 102, 104, 106. Services provided by the cloudinfrastructure system can dynamically scale to meet the needs of itsusers. Cloud network 114 can comprise one or more computers, servers,and/or systems. In some embodiments, the computers, servers, and/orsystems that make up cloud network 114 are different from the user's ownon-premises computers, servers, and/or systems. For example, cloudnetwork 114 can host an application, and a user may, via a communicationnetwork such as the Internet, on demand, order and use the application.

In some embodiments, cloud network 114 can host a Network AddressTranslation (NAT) Traversal application in order to establish a secureconnection between a service provider of the cloud network 114 and oneor more of the network devices 102, 104, 106 and/or the access device108. A separate secure connection may be established by each networkdevice 102, 104, 106 for communicating between each network device 102,104, 106 and cloud network 114. A secure connection may also beestablished by access device 108 for exchanging communications withcloud network 114. In some examples, the secure connection may include asecure Transmission Control Protocol (TCP) connection. Gateway 110 canprovide NAT services for mapping ports and private IP addresses ofnetwork devices 102, 104, 106 and access device 108 to one or morepublic IP addresses and/or ports. Gateway 110 can provide the public IPaddresses to cloud network 114. Cloud network 114 servers can directcommunications that are destined for network devices 102, 104, 106 andaccess device 108 to the public IP addresses. In some embodiments, eachsecure connection may be kept open for an indefinite period of time sothat cloud network 114 can initiate communications with each respectivenetwork device 102, 104, 106 or access device 108 at any time. Variousprotocols may be used to establish a secure, indefinite connectionbetween each of network device 102, 104, and 106, access device 108, andthe cloud network 114. Protocols may include Session Traversal Utilitiesfor NAT (STUN), Traversal Using Relay NAT (TURN), InteractiveConnectivity Establishment (ICE), a combination thereof, or any otherappropriate NAT traversal protocol. Using these protocols, pinholes canbe created in the NAT of gateway 110 that allow communications to passfrom cloud network 114 to network devices 102, 104, 106 and accessdevice 108.

In some cases, communications between cloud network 114 and networkdevices 102, 104, 106 and/or access device 108 may be supported usingother types of communication protocols, such as a Hypertext TransferProtocol (HTTP) protocol, a Hypertext Transfer Protocol Secure (HTTPS)protocol, or the like. In some embodiments, communications initiated bycloud network 114 may be conducted over the TCP connection, andcommunications initiated by a network device may be conducted over aHTTP or HTTPS connection. In certain embodiments, cloud network 114 caninclude a suite of applications, middleware, and database serviceofferings that are delivered to a customer in a self-service,subscription-based, elastically scalable, reliable, highly available,and secure manner.

It should be appreciated that local area network 100 can have othercomponents than those depicted. Further, the embodiment shown in thefigure is only one example of a local area network that may incorporatean embodiment of the disclosure. In some other embodiments, local areanetwork 100 can have more or fewer components than shown in the figure,may combine two or more components, or may have a differentconfiguration or arrangement of components. Upon being powered on orreset, network devices (e.g., 102, 104, 106) can be registered with anexternal network (e.g., cloud network 114) and associated with a logicalnetwork within local area network 100.

As previously noted, techniques and systems are described herein fordetecting leaks in a pressurized system using pressure data. A leakdetection device can be coupled or attached to a component of thepressurized system in order to monitor pressure in the system and togenerate pressure data representing the sensed pressure. The pressuredata can be analyzed by the leak detection device and/or a cloudcomputing system to detect leaks. The leak detection device can includea network device, such as one of network devices 102, 104, or 106 shownin FIG. 1 and described above. Examples of pressurized systems in whichleaks can be detected include a home water system in a venue that issupplied with water from a water-supply system, a home gas system in avenue that is supplied with gas from a gas-supply system, or any otherpressurized system in which pressure of a substance in the system can bemonitored.

Turning ahead in the drawings, FIG. 2 illustrates a system diagram of anexemplary water system 200. Water system 200 is merely exemplary and isnot limited to the embodiments presented herein. The water system can beemployed in many different embodiments or examples not specificallydepicted or described herein. In some examples, water system 200 can bepart of a home water system. In other examples, water system 200 can bepart of a water system of another venue, such as a commercial building,an outdoor commercial establishment (e.g., a mall, a park, or othercommercial establishment), or any other venue in which a pressurizedwater system may exist.

In a number of embodiments, water can be supplied to water system 200from a water-supply utility system that delivers potable water to venuesalong industrial strength pipes at high pressure using a system ofhigh-pressure pumps. A pressure regulator 202 can be installed at theinterface between the utility system and the water system 200. Pressureregulator 202 can convert the utility supplied pressure of the water(e.g., approximately 100-150 pounds per square inch (PSI)) down topressure levels that are suitable for water system 200 in a home (e.g.,approximately 20-80 PSI), such as to ensure safety and longevity offixtures, pipes, and/or appliances in water system 200.

In several embodiments, water system 200 can include cold water lines232 and hot water lines 234 that supply cold and hot water respectivelyto various fixtures in water system 200. In some embodiments, only coldwater is supplied from the utility system, and a water heater 204 heatsthe cold water to provide hot water to the fixtures in water system 200.In some examples, water heater 204 can include a tank-type water heaterwith a reservoir of water that is heated. In other examples, waterheater 204 can include a tankless water heater that does not include areservoir. The tankless water heater may use a heat exchanger to heatwater as it flows through the heater. Any commercially availabletank-type or tankless water heater may be used. The fixtures can includea kitchen faucet 206, a dishwasher 208, and a refrigerator 210 in akitchen; faucets 236 and toilets 212 in a first, a second, and a thirdbathroom, a shower 216 in the second bathroom, a shower tub 220 in thethird bathroom, outdoor water taps 214, and a washing machine 218. Asused herein, “fixtures” can refer to appliances, faucets, or otherpieces of equipment that is attached to water system 200, which can makeuse of the water delivered by water system 200. In many embodiments,pressure regulator 202 is not considered a fixture in water system 200.

In many embodiments, a leak detection device 224 can be installed inwater system 200 to detect leaks, such as shown in FIG. 6 and describedbelow. In several embodiments, leak detection device 224 can be anetwork device, similar to the network devices 102, 104, or 106, asshown in FIG. 1 and described above. In a number of embodiments, leakdetection device 224 can include one or more sensors within piping walls230 that can be used to gather data used for leak detection. Forexample, as shown in FIG. 2, the sensors can include a pressure sensor226 and/or a flow sensor 228. In some examples, leak detection device224 can include the pressure sensor 226 and not flow sensor 228. In someembodiments in which a flow sensor 228 is included in leak detectiondevice 224, flow sensor 228 can include an in-line flow turbine sensor.A flow turbine sensor can include a rotor that is turned by a liquidforce proportional to flow of the liquid in a flow direction 222. Forexample, liquid flow of the water causes a bladed turbine inside theflow sensor 228 to turn at an angular velocity directly proportional tothe velocity of the liquid being monitored. As the blades pass beneath amagnetic pickup coil in the flow sensor 228, a pulse signal isgenerated. For example, a Hall Effect sensor can be included thatsupplies pulses used for digital or analog signal processing. Each pulsecan represent a discrete volume of liquid. A frequency of the pulsesignal can be directly proportional to angular velocity of the turbineand the flow rate. A large number of pulses can provide high resolution.In other examples, flow sensor 228 can include an ultrasonic flow sensorthat determines time of flight measurement, an acoustic (Doppler) flowsensor, or any other flow sensor that can monitor flow of a substanceand acquire flow data representing the flow. In some embodiments, leakdetection device 224 can measure water flow using flow sensor 228. Inother embodiments, leak detection device 224 can use flow sensor 228 todetect whether there is water flow without measuring the water flow. Instill other embodiments, leak detection device 224 can be devoid of aflow sensor.

In various embodiments, pressure sensor 226 in leak detection device 224can measure pressure in water system 200 and generate pressure datarepresenting the measured pressure. Leak detection device 224 canincludes a processor (e.g., a microcontroller). In some embodiments, theprocessor can provide a gating signal to close an electronic switch(e.g., a field effect transistor switch) to control sampling of pressureby the pressure sensor. In some cases, a regulated power supply of leakdetection device 224 can provide direct current power to energize thepressure sensor.

Various types of pressure sensors (e.g., 226) can be used. For example,a pressure sensor with a pressure range of 0-50 pounds per square inch(PSI) can be used. As another example, a pressure sensor with a pressurerange of 0-100 PSI can be used. A pressure sensor with a higher pressurerange can be useful for monitoring water pressure in water systems(e.g., 200) with a high supply pressure, or when a pressure regulator isnot included in the water system (e.g., 200). One example of a pressuresensor is the PPT7x Series sensor manufactured by Phoenix Sensors. Oneof ordinary skill in the art will appreciate that other suitablepressure sensors can be used.

In some embodiments, pressure sensor 226 can include a digital pressuretransducer that converts pressure into an electrical signal. Forexample, the pressure sensor can include a diaphragm with strain gaugeswired to a circuit that can measure a resistance (e.g., a Wheatstonebridge). Pressure applied to pressure sensor 226 (e.g., pressure fromwater) causes the diaphragm to deflect, which introduces strain to thestrain gauges. The strain produces an electrical resistance changeproportional to the pressure. The analog resistance can be converted toa digital signal using an analog-to-digital converter. The digitalsignal can be output as pressure data.

In many embodiments, the internal pressure in water system 200 canremain approximately constant when no water is being used by a fixture.When a water fixture valve is opened, the pressure within water system200 can force the water out of an open orifice of the fixture, which cancause the pressure of water system 200 to decrease. Pressure regulator202 can sense the pressure drop, and can allow pressurized water fromthe utility system to enter from the utility side to rebalance thepressure of water system 200 to its target or set point level, as shownin FIG. 3.

FIG. 3 illustrates a cross-sectional view of pressure regulator 202. Thecomponents in pressure regulator 202 can operate to rebalance thepressure when a pressure drop is detected. In a number of embodiments,an orifice 312 of the pressure regulator 202 can be an interface betweenthe utility system and water system 200 (FIG. 2). Orifice 312 candetermine the maximal rate of water transfer between the upstreamutility (through one or more water lines 306) and the downstream watersystem 200 (FIG. 2) (through one or more water lines 314). Pressureregulator 202 can include a restricting element 310 (also referred to asa poppet), which can move in an upward or downward direction to furtherclose orifice 312 or further open orifice 312, respectively, to adjustthe pressure of water system 200 (FIG. 2), and which can close offorifice 312 when a desired pressure balance is reached. Pressureregulator 202 can include a diaphragm 304 to sense the internal pressurelevel of water system 200 (FIG. 2), based on the pressure in water lines314. Pressure regulator 202 can include a loading element 302 (e.g., aspring, a coil, or other loading device), which can push restrictingelement 310 down to enable the inflow of water from the utility systemto water system 200 (FIG. 2) when the sum of an internal pressure 316acting along diaphragm 304 and a utility pressure 308 acting along thelower surface of restricting element 310 is not sufficient to counterthe a loading force 318 of loading element 302 on diaphragm 304. Thus,the force interactions are between loading element 302 pushing downagainst the upper surface of diaphragm 304 with loading force 318directed downward, which works against force 308 generated by theutility pressure directed upward on the lower surface of restrictingelement 310 combined with force 316 generated by internal pressure ofwater system 200 (FIG. 2) pressing upward along the lower surface ofdiaphragm 304. Loading force 318 applied by loading element 302 can beset or adjusted to a set point water pressure using a set point pressureadjustment screw 320. Loading element 302, diaphragm 304, andrestricting element 310 together can enable pressure regulator 202 tomaintain a desirable pressure in water system 200 (FIG. 2), which can benot too low during periods of heavy internal water usage and can be nottoo high when the external utility system pressure increases.

Various different properties or factors of pressure regulators (e.g.,pressure regulator 202) can lead to different styles of variations inpressure signals that occur within a building when water is used (e.g.,when water is allowed to flow out from a fixture or there is a leak inwater system 200 (FIG. 2)). For example, high pressure droop eventsand/or low pressure droop events can occur depending on the propertiesof the pressure regulator 202. As used herein, “droop” refers to anamount of deviation from the set point pressure of water system 200 at agiven downstream flow rate when water is used. For example, droop refersto the drop in pressure as a result of water usage inside a building.

Differences in pressure droop can be the result of a mixture ofdifferences between properties or factors of pressure regulators (e.g.,202), including loading force 318 of loading element 302, the surfacearea of diaphragm 304, and the size of the orifice 312 aroundrestricting element 310. For example, high droop can be attributed toone or more of a high spring constant of loading element 302 (e.g., theamount of force it takes to extend or compress loading element 302), alarge surface area of diaphragm 304, and/or a small surface area oforifice 312. In another example, low droop can be due to one or more ofa low spring constant of loading element 302, a small surface area ofdiaphragm 304, and/or a large surface area of orifice 312.

Turning ahead in the drawings, FIG. 4A illustrates graphs 400 showingvariations in pressure and flow in a water system having a pressureregulator that results in a high pressure droop when various fixtures ofthe water system are used. Specifically, a top graph of FIG. 4Aillustrates a pressure spectrogram 420, a middle graph of FIG. 4Aillustrates a pressure sensor stream 401, and a bottom graph of FIG. 4Aillustrates a flow sensor stream 430.

Pressure sensor stream 401 can be a raw pressure stream time domainsignal, as measured in PSI. Pressure sensor stream 401 shown in FIG. 4Ais sampled at 244.1406 samples per second, but other sampling rates canbe used. Pressure spectrogram 420 can be a frequency domainrepresentation using a spectrogram, where frequencies are represented inHertz (Hz). The data in pressure spectrogram 420 shown in FIG. 4A can bederived using a frequency transform, such as a fast Fourier transform(FFT). For example, the length of the transform (e.g., the NFFT variablein Matlab) can be set to 1024 (equivalent to approximately 4.19seconds), with 50% overlapped Kaiser Windows (beta 15)). Eventsdemonstrating the high pressure droop occur at pressure drops 402, 408,412, and 416. A pressure sensor (e.g., a pressure transducer or otherpressure sensing device, such as pressure sensor 226 (FIG. 2)) can beinstalled in water system 200 (FIG. 2) to monitor the pressure anddetect the pressure of water system 200, including pressure drops 402,408, 412, and 416. In the example of FIG. 4A, the pressure sensor isinstalled at the kitchen sink, causing pressure drop 402 at the kitchensink to have a significantly higher pressure drop when compared to theother three pressure drops (e.g., 408, 412, and 416). The higherpressure drop and pressure drop 402 can occur due to the pressure sensorbeing closer to the open valve orifice of the kitchen sink, which is thepoint of the largest pressure dis-equilibrium in water system 200 (FIG.2). Frequency variations 404, 410, 414, and 418 are also shown inpressure spectrogram 420, which correspond respectively to pressuredrops 402, 408, 412, and 416 in pressure sensor stream 401.

Flow sensor stream 430 can be a measure of flow through a flow sensor(e.g., 228 (FIG. 2)), as measured in gallons per minute (GPM). In someembodiments, a flow sensor (e.g., flow sensor 228 (FIG. 2)) can beinstalled in water system 200 (FIG. 2), such as at the kitchen sink, tomonitor the amount of flow of water at the flow sensor. Flow increase406 in flow sensor stream 430 can correspond to the flow of water duringpressure drop 402 at the kitchen sink. Flow increases do not occur atthe other pressure drops (e.g., 408, 412, and 416) due to the flowsensor not being installed at the fixtures causing those pressure drops.

FIG. 4B illustrates graphs 450 showing variations in pressure and flowin a water system having a pressure regulator that results in a lowpressure droop when various fixtures of the water system are used.Specifically, a top graph of FIG. 4B illustrates a pressure spectrogram470, a middle graph of FIG. 4B illustrates a pressure sensor stream 451,and a bottom graph of FIG. 4B illustrates a flow sensor stream 480.

Pressure sensor stream 451 can be a raw pressure stream time domainsignal. The sampling used for pressure sensor stream 451 can be similaror identical to the sampling used for pressure sensor stream 401 (FIG.4A). Pressure spectrogram 470 can be a frequency domain representationusing a spectrogram, which can use a similar or identical transform asused for pressure spectrogram 420 (FIG. 4A). Events demonstrating thelow pressure droop occur at pressure drops 452, 458, 462, and 466. Asdescribed above, the low pressure droop occurs instead of the highpressure droop because of different properties in the pressure regulator(e.g., 202 (FIGS. 2-3)), which enable faster rebalancing of the internalpressure. Frequency variations 454, 460, 464, and 468 are also shown inpressure spectrogram 470, which correspond respectively to pressuredrops 452, 458, 462, and 466 in pressure sensor stream 451.

Flow sensor stream 480 can be a measure of flow through a flow sensor(e.g., 228 (FIG. 2)). Flow increase 456 in flow sensor stream 480 cancorrespond to the flow of water during pressure drop 402 at the kitchensink. Flow increases do not occur at the other pressure drops (e.g.,458, 452, and 466) due to the flow sensor not being installed at thefixtures causing those pressure drops.

Leaks can occur in a pressurized system for various reasons, such asphysical damage to supply lines or fixtures, natural degradation ofmaterials, clogs in supply lines or fixtures, or other causes. Thepressure of the water within a pressurized water system (e.g., watersystem 200) varies as water is used, as discussed above, as well as whenleaks occur. Leaks also occur in gas-supply systems that deliverpressurized gas to buildings or venues for gas-powered items. Leaks canlead to losses of water, gas, or other substances, and can also reducepressure below a desired level. Leaks can cause pressure drop events,which can be high pressure droop events or low pressure droop events,depending on differences among the pressure regulator (e.g., 202 (FIGS.2-3)) being used in the system.

FIG. 5 illustrates a block diagram of an exemplary leak detection system500, which can be used to implement various leak detection techniques todetect leaks in a pressurized system (e.g., water system 200 (FIG. 2))using pressure data. Leak detection system 500 is merely exemplary andis not limited to the embodiments presented herein. The leak detectionsystem can be employed in many different embodiments or examples notspecifically depicted or described herein. For example, an unintentionalloss of water through an opening in a pressurized system (e.g., orifice,hole, puncture, crack, break, fissure, rupture, or the like) can bedetected. Some leak detection techniques use water velocity measurements(or flow) at the intersections of the utility provided upstream pressureand a venue's internal downstream pressure. Longitudinal observations ofa flow measurement signal can be used to detect a lack of quiet periodsor pauses in flow. For example, if there is not a one-hour period of noflow in a 24-hour observation period, a leak is highly likely. Unlikethese techniques that rely on flow measurement data, the systems andtechniques described herein can analyze pressure signal data in the timedomain, frequency domain, or both the time and frequency domain todetect leaks. Advantages of using pressure data to detect leaks includethe ability to provide rapid response times (e.g., in cases ofcatastrophic or large leaks), characterization of leak type, detectionof small periodic leaks, and disaggregation of water activity.

In many embodiments, leak detection system 500 can include leakdetection device 224, a cloud computing system 504, and/or a graphicalinterface 506. In many embodiments, leak detection device 224 can be anetwork device, similar to the network devices 102, 104, or 106, asshown in FIG. 1 and described above. As described below, leak detectiondevice 224 can monitor pressure and detect certain characteristics ofthe pressure to detect leaks. In some embodiments, leak detection device224 can monitor flow of water, and can supplement the pressure analysiswith flow analysis, as described above. In several embodiments, leakdetection device 224 can be installed in a pressurized system (e.g.,water system 200 (FIG. 2)). For example, leak detection device 224 canbe attached to a supply line in water system 200 (FIG. 2).

FIG. 6 illustrates installation of leak detection device 224 proximateto a kitchen sink faucet 604, which can be at a portion of water system200 (FIG. 2). Leak detection device 224 and the portion of water system200 (FIG. 2) depicted in FIG. 6 are merely exemplary and are not limitedto the embodiments presented herein. Leak detection device 224 can bedeployed and/or installed in many different embodiments or examples notspecifically depicted or described herein. In the example of FIG. 6,leak detection device 224 is installed in a cold water supply line 606of a kitchen sink faucet 604. Cold water supply line can be part of coldwater lines 232 (FIG. 2), and kitchen sink faucet 604 can include or bepart of kitchen faucet 206 (FIG. 2). For example, leak detection device224 can be threaded into a faucet bib so that the water flows throughleak detection device 224. One of ordinary skill in the art willappreciate that leak detection device 224 can be coupled with any watersupply line in water system 200 (FIG. 2) or another pressurized system.For instance, leak detection device 224 can be installed in the hotwater supply line 610, which can be part of hot water lines 234 (FIG.2). For example, leak detection device 224 can be installed in hot watersupply line when a tankless water heater is used. In many water systems(e.g., water system 200 (FIG. 2)), a cold water shutoff valve 608 and/ora hot water shutoff valve 612 can be provided at one or more fixtures toallow or disallow water to flow to the fixture (e.g., kitchen sinkfaucet 604). In many embodiments, leak detection device 224 can beinstalled in a single location of water system 200, and leak detectiondevice 224 can detect leaks in water system 200 with only a single leakdetection device (e.g., 224) with a single pressure sensor (e.g., 226).

As described above, leak detection device 224 can be a network devicewith similar functionalities as the network device 102, 104, or 106(FIG. 1), which can require power to operate. A power adapter 616 canconnect to the leak detection device 224 through a power cord 614 inorder to provide power to leak detection device 224. In someembodiments, power cord 614 can connect to the leak detection device 224and to power adapter 616 through serial connections (e.g., a UniversalSerial Bus (USB), a Lightning bus, or other serial connection), oranother suitable connection. Power adapter 616 can be plugged into apower outlet 618, which can include a 120 volt power outlet or othersuitable outlet.

Returning to FIG. 5, in a number of embodiments, leak detection device224 can include connectivity components that can allow leak detectiondevice 224 to communicate with cloud computing system 504 and, in somecases, with a user device (e.g., a user mobile device) that executes andpresents graphical interface 506 to a user. In other embodiments, cloudcomputing system 504 can communicate with the user device and presentgraphical interface 506 to the user. In a number of embodiments, theuser device can be similar or identical to access device 108 (FIG. 1).

In several embodiments, leak detection device 224 can includeconnectivity components 510, which can include radio components 511,such as a wireless transceiver radio or interface, such as a WiFi™transceiver radio or interface, a Bluetooth™transceiver radio orinterface, a Zigbee™ transceiver radio or interface, an UWB transceiverradio or interface, a WiFi-Direct transceiver radio or interface, a BLEtransceiver radio or interface, an IR transceiver, and/or any otherwireless network transceiver radio or interface that allows leakdetection device 224 to communicate with cloud computing system 504 orthe user device over a wired or wireless network. In some cases, radiocomponents 511 (e.g., wireless transceiver) can allow leak detectiondevice 224 to communicate with cloud computing system 504. Radiocomponents 511 can transmit the pressure data to the cloud computingsystem 504, which can also analyze the pressure data. In some cases,connectivity components 510 can include a cloud endpoint component 512,which can be configured to interface with cloud computing system 504.For example, cloud endpoints component 512 can stream data to cloudcomputing system 504. In some cases, connectivity components 510 caninclude a credentials and encryption component 513, which can allow leakdetection device 224 to securely access cloud computing system 504. Forexample, leak detection device 224 can have a signature that is used toaccess the cloud computing system 504. Cloud computing system 504 canprocess the signature in order to authenticate leak detection device224.

In several embodiments, leak detection device 224 can include one ormore sensors 520, such as pressure sensor 226 and/or flow sensor 228, asdescribed above in greater detail.

In many embodiments, leak detection device 224 can include firmware 515.In some embodiments, firmware 515 can include a data acquisitioncomponent 516, which can receive and/or convert signals received fromsensors 520. For example, when one or more of sensor 520 provides ananalog signal, data acquisition component can include one or moreanalog-to-digital converters to convert the analog signal to digitaldata. In several embodiments, firmware 515 can include a preliminarydetection component 517, which can perform at least in part one or moreof the leak detection techniques described herein. In a number ofembodiments, firmware 515 can include a short-term data access 518,which can store and/or access data that has been recently acquired, suchas the data sensed over the previous 2 hours. In many embodiments, thedata acquired can be uploaded to cloud computing system 504, which canstore long-term data for covering longer durations than the short-termdata stored in leak detection device 224.

Cloud computing system 504 can communicate with one or more leakdetection devices (e.g., leak detection device 224), such as leakdetection devices installed in many water systems (e.g., water system200 (FIG. 2)). In some embodiments, cloud computing system 504 can beimplemented in a dedicated cloud computing platform, a physical and/orvirtual partition of a cloud computing platform, a limited access (e.g.,subscription access) to a cloud computing platform, and/or anothersuitable cloud computing implementation. In other embodiments, cloudcomputing system 504 can be a computing system, such as computing system1400 (FIG. 14), described below, that is not part of a cloud computingplatform. In many embodiments, cloud computing system 504 can includecloud pipeline components 525. In many embodiments, cloud pipelinecomponents 525 can include a streaming gateway 526, which can acquiredata, such as on a streaming and/or continual basis, from one or moreleak detection devices (e.g., 224). In several embodiments, cloudpipeline components 525 can include a long-term storage component 527,which can store and/or access data that has been streamed from the oneor more leak detection devices (e.g., 224) to cloud computing system504. In a number of embodiments, cloud pipeline components 525 caninclude a notification queue 528. When one of the one or more leakdetection devices (e.g., 224) detects a potential leak, the leakdetection device (e.g., 224) can send a notification to cloud computingsystem 504. Cloud computing system 504 can add the receivednotifications to notification queue 528 to process the notification whenthere are sufficient resources on cloud computing system 504.

In a number of embodiments, cloud computing system 504 can include leakvalidation components 530, which can be used for detecting and/orvalidating leaks, and, in some embodiments, determining types andcharacteristics of leaks. In some embodiments, leak validationcomponents 530 can include an independent method verification component531, which can process the notification sent from the leak detectiondevice (e.g., 224) to independently determine if there is a leak basedon the additional information (e.g., historical data) available in cloudcomputing system 504.

In several embodiments, leak validation components 530 can include along-term data access component 533, which can store and/or access datastored in long-term storage 527. In a number of embodiments, independentmethod verification component 531 can detect leaks based on this largerdata set even when the leak detection device (e.g., 224) has notdetected a potential leak and/or sent or notification. In manyembodiments, independent method verification component 531 can determinea confidence level of a leak for each independent leak detectiontechnique that is used, as described below in further detail. Forexample, an approximately 80% or higher confidence level (referred toherein as a Threshold 1 confidence level) returned from a technique canindicate a strong likelihood of a leak. An approximately 60%-80%confidence level (referred to herein as a Threshold 2 confidence level)returned from a technique can indicate a weak confidence of a leak. Aless than approximately 60% confidence level (referred to herein as aThreshold 3 confidence level) returned from a technique can indicate noconfidence in a leak, as a leak is unlikely.

In many embodiments, leak validation components 530 can include anensemble voting component 532, which can use confidence levelsdetermined by independent method verification component 531 to determinewhether to indicate to a user that there is a likely leak. For example,ensemble voting component 532 can take into account the confidencelevels returned from multiple techniques, as described below in greaterdetail.

In several embodiments, cloud computing system 504 can include modelupdate components 535. Model update components 535 can be used to modeldifferent systems (e.g., water system 200 (FIG. 2)). For example, modelupdate components 535 can include a system model 536, which can storeand/or access parameters relating to the specific system (e.g., watersystem 200 (FIG. 2)) in a home metadata database 537, and which candevelop a model that characterizes properties of the specific system. Inmany embodiments, system model 536 can include a historic model of thesystem (e.g., water system 200 (FIG. 2)) For example, home metadatadatabase 537 can include information related to the plumbinginfrastructure of the system, such as the nominal pressure of thesystem; statistics related to pressure, such as mean, median, mode,and/or standard deviation, etc.; the make, model, and/or type ofpressure regulator; the location, style, size, and/or age of the system;materials of the pipes; the quantity, location, and/or types of fixturesin the system; climatic conditions during leak detection; user inputand/or feedback regarding leak notifications, such as whether there is aleak and the nature and/or size of the leak. Such information can begathered through the user, through public information records, throughinformation gathered using independent or third-party sources, and/orthrough other suitable sources.

In many embodiments, user-defined information can be included in systemmodel 536. For example, the user can specify dates and/or times when theuser expects that there will be no water usage. This information can beset by users when they go to work or on vacation. During these timeperiods, either one or a combination of the techniques described belowcan be used to search for uses of water. Any events that are triggeredcan generate an alert notification for the user. Additionally, cloudcomputing system 504 can ask the user for feedback to determine periodswhen there is expected to be minimal water usage, such as between 12a.m. and 6 a.m. This user-defined information can enable learning ofuser behavior and activity, which can allow system model 536 to detectleaks based on more accurate confidence levels.

In a number of embodiments, cloud computing system 504 can include leakedges component 540. In many embodiments, leak edges component 540 caninclude raw pressure samples 541 and/or leak features 542. Raw pressuresamples 541 can include pressure samples in a time domain that representedges. An “edge” can be a boundary at which the pressure signal exhibitsa noticeable change in behavior by either a decrease or an increase fromthe pressure values before it. Edges can include open edges, which cancorrespond to a valve open event of a fixture, which can be representedby an initial drop in pressure followed by oscillations that last for acertain amount of time, such as at least 3 seconds. A close edge cancorrespond to a valve close event of a fixture, which be represented byan initial rise in pressure followed by oscillations that last for acertain amount of time, such as at least 3 seconds. The oscillations canbe due to a “hammer” effect that occurs when fixtures are turned on oroff, based on a displacement and sloshing back and forth of fluid (e.g.,water) within the water system (e.g., 200), which results inoscillations of pressure at the pressure sensor. In some embodiments,other edges that do not meet the 3 second oscillation can becharacterized as leak edges. Signature edges for different fixturesand/or appliances in water system 200 can be stored in leak features542. In many embodiments, raw pressure signals that are determined to beleaks (e.g., through edge analysis, by any techniques described herein,through machine learning, through user feedback labeling, etc.) can bestored in raw pressure samples 541 along with their features in leakfeatures 542. These databases of leak types can be utilized for fasterverification of leaks and generation of quicker alerts when leaks aredetected. These databases also can allow comparison of different leaktypes which can increase the confidence in the nature of the leak.

In many embodiments, cloud computing system 504 can provide scalableanalytics and storage as well as elements for notifying users of leaksthrough graphical interface 506, which may include a mobile or webinterface, or another suitable interface. In many embodiments, forexample, graphical interface 506 can include a dashboard component 545,which can provide a multi report-cycle view 546, such as reports ofevents and/or leaks over a time period, aggregated statistics 547,and/or real-time displays 548, such as current status of water system200 (e.g., whether there are any current leaks detected, pressurereadings, fixtures used, etc.).

In a number of embodiments, graphical interface 506 can provide mobilealerts 550. For example, mobile alerts 550 can include leaknotifications 551, which alert the user when leak detection deviceand/or cloud computing system 504 detect a leak. In many embodiments,the user the provide feedback on whether there actually is a leak andthe size and/or nature of the leak, which can be incorporated to improvefuture leak detection. In several embodiments, mobile alerts 550 caninclude away-mode notifications, which can be alerts that there isactivity in water system 200 when the user is away and no water use isexpected. As described above, the user can input when the user is awayor expected to be away.

In various embodiments, graphical interface 506 can include editablesettings components 555, which can allow the user to input userpreferences 556, notification thresholds 557, and/or to enable ordisable alerts 558.

In many embodiments, leak detection device 224 and cloud computingsystem 504 can analyze the pressure data obtained by pressure sensor 226to detect an occurrence of leaks and/or types of leaks that haveoccurred. For example, the pressure data output from pressure sensor 226can be analyzed by the processor of leak detection device 224 in orderto detect leaks, and the pressure data and can be streamed to cloudcomputing system 504. A cloud computing fabric in the cloud computingsystem 504 can ingest data sent from multiple deployed leak detectiondevices, and can analyze the data to perform one or more leak detectiontechniques. In some cases, leak detection device 224 can communicateother information to the cloud computing system 504, such as reportinginformation regarding leaks, requesting verification of a leak, and/orother information. Pressure data from the pressure sensor 226 (and insome cases flow data from the flow sensor 228) can be analyzed in thefrequency domain, in the time domain, or in both the frequency and timedomains to identify leaks and to differentiate different types of leaks.Various different techniques for analyzing the pressure stream in thetime and/or frequency domain to detect leaks are shown below in Table 1.

TABLE 1 Technique Name Brief Description M1 Turbulence Persistentturbulence in a frequency range (duration exceeds notification timethreshold). M2 Pressure Monotonic pressure downward slope with Slopeperiodic pressure valve resets to the pressure set point. M3 PressurePressure values detected below historic Floor pressure floor. M4 StableStable pressure variation exceeds N standard Pressure deviationsrelative to typical/calibrated Variation stable pressure.

The four techniques, M1-M4, in Table 1 can be used by leak detectiondevice 224 and/or cloud computing system 504 to identify characteristicsof the pressure data to detect leaks. In some cases, leak detectiondevice 224 can include lightweight versions of algorithms that performthe four leak detection techniques M1-M4. Basic versions of thetechniques can operate within leak detection device 224 on the datacollected from the pressure sensor collected and/or stored in leakdetection device 224. For example, the techniques can be executed andrun in firmware 515 of the leak detection device 224.

In many embodiments, each of the leak detection techniques can detectnon-cyclical pressure events that correspond to water leaks.Non-cyclical pressure events can be contrasted with cyclical pressureevents. For example, a faulty toilet flapper valve on a toiler canresult in a leak in the toilet reservoir tank that is periodicallyrefilled by the toilet fill valve when the tank level drops below arefill threshold. The pressure event corresponding to these refillevents is cyclical, as the pressure event starts then is interrupted bya control system (e.g., the toilet fill valve), and the event repeatsperiodically (e.g., every 7 minutes) over time. By contrast, anon-cyclical pressure event does not repeat over time. Rather, thenon-cyclical pressure event starts, but does is not interrupted by acontrol system. Instead, the pressure event continues, except forcertain environmental factors that can temporarily limit the leak. As anexample of such an environmental factor, when an irrigation systemsprings an underground leak, water leaks out relatively steadily intothe soil surrounding the leaky pipe until the ground around the pipe issaturated, at which point the saturated ground around the pipe can limitthe leak while the water disperses in the surrounding soil.

Turning ahead in the drawings, FIG. 7 illustrates graphs 700 showingexamples of pressure events detected using leak detection technique M1.Specifically, graphs 700 include a pressure spectrogram 720 in a topgraph, a pressure sensor stream 704 in a middle graph, and a flow sensorstream 730 in a bottom graph. Pressure sensor stream 704 can be a rawpressure stream time domain signal as measured by pressure sensor 226(FIG. 2). Pressure spectrogram 720 can be a frequency domainrepresentation using a spectrogram, as transformed from pressure sensorstream 704. Flow sensor stream 480 can be a measure of flow through flowsensor 228 (FIG. 2).

In several embodiments, the first leak detection technique M1 can use afrequency domain representation (including frequency domaincharacteristics) of the raw pressure sensor samples as a basis ofanalysis. The raw pressure samples are represented by pressure sensorstream 704. The frequency domain representation is shown in pressurespectrogram 720. Technique M1 can detects persistent or prolonged narrowband nonharmonic energy that lasts beyond a system-defined temporalthreshold in a certain frequency range. The frequency energy changes canbe computed relative to a baseline that is learned during calibration ofleak detection device 224 (FIGS. 2, 5-6) when none of the water fixturesare being used and/or during low activity times (e.g., the user caninput that 1 a.m. to 5 a.m. are times when the user typically does notuse water). For example, the baseline can be updated by cloud computingsystem 504 (FIG. 5) using information detected during low activity timesto track signal changes over time. For example, M1 can detect when thereis a prolonged change (e.g., increase and/or decrease) in frequencyenergy that is observed in a frequency range. In many embodiments, thetemporal threshold can be approximately 45 minutes. In otherembodiments, it can be another suitable time period, such asapproximately 1 hours, 1.5 hours, 2 hours, 2.5 hours, or 3 hours.

In a number of embodiments, the frequency range analyzed in technique M1can be approximately 0-100 Hz. In several embodiments, the frequencyrange can be approximately 0-50 Hz. In other embodiments, the frequencyrange can be approximately 10-100 Hz, 20-90 Hz, 20-50 Hz, 30-50 Hz, oranother suitable frequency range. In many embodiments the narrow band ofenergy can have a width of less than approximately 3 Hz. In otherembodiments, the narrow band of energy can have a width of less thanapproximately 2 Hz, 1 Hz, or 0.5 Hz. The narrow band of energy can beobserved as turbulence. For example, technique M1 can detect aconsistent, prolonged turbulence introduced into the pressurized systemas a result of a leak (e.g., a perpetually open downstream orifice),which produces incessant turbulent flow and hence fluctuations in watersystem 200 (FIG. 2). The turbulence can be generated due to waterconstantly escaping water system 200 (FIG. 2) due to the leak, andpressure regulator 202 (FIG. 2) replenishing the water pressure, whichcauses a chop or turbulence in the pressure stream. As shown in FIG. 7,a leak turbulence signature 702 is visible in the frequency domain as afaint, though perceptible, and perpetual or prolonged narrow band ofenergy around the approximately 30 Hz range extending through theentirety of the pressure spectrogram 720. It can also be seen from FIG.7 that turbulence from intentional water use events (e.g., pressureevents 706, 708, and 710) drown out leak turbulence signal 702. However,the presence of the leak turbulence signal 702 is apparent anddetectable between water use events in which no water is intentionallybeing used.

In some embodiments, leak detection device 224 (FIGS. 2, 5-6) and/orcloud computing system 504 (FIG. 5) can determine the center frequency,an intensity, and/or width of the detected frequency band. Example ofleaks that can be detected using technique M1 are leaks in an irrigationsystem, such as underground leaks, ruptures of a hose in a dishwasher orclothes washing machine, among other leaks.

In instances when water heater 204 (FIG. 2) in water system 200 (FIG. 2)is a tank-type water heater, technique M1 can lessen the effectivenessof capturing leaks in hot water lines 234 (FIG. 2) when the pressuresamples are being collected by leak detection device 224 (FIGS. 2, 5-6)in a location along cold water lines 232 (FIG. 2). This result is mainlydue to the large water reservoir of water heater 204 (FIG. 2) dampeningany energy bands that would be produced along hot water lines 234 (FIG.2). In some instances, the water system 200 (FIG. 2) can include atankless water heater that does not include a reservoir of water. When atankless water heater is used, technique M1 can be used to effectivelydetect leaks in the hot water lines 234 (FIG. 2) in addition to the coldwater lines 232 (FIG. 2) when leak detection device 224 (FIGS. 2, 5-6)is located along cold water lines 232 (FIG. 2).

Turning ahead in the drawings, FIG. 8 illustrates graphs 800 showingexamples of pressure events corresponding to a tankless water heater.Specifically, graphs 800 include a flow sensor stream 810 in a topgraph, a pressure sensor stream 820 in a middle graph, and a pressurespectrogram 830 in a bottom graph. Pressure sensor stream 820 can be araw pressure stream time domain signal as measured by pressure sensor226 (FIG. 2). Pressure spectrogram 830 can be a frequency domainrepresentation using a spectrogram, as transformed from pressure sensorstream 820. Flow sensor stream 810 can be a measure of flow through flowsensor 228 (FIG. 2). In many embodiments, pressure spectrogram 830 caninclude pressure events 831 corresponding to use of the tankless waterheater that exhibit a unique signature at a band of energy. Pressureevents 831 in this case can have a center frequency of approximately 17Hz with a width of approximately 1 Hz. Signatures from pressure events831 can be used as a baseline to build a model of appliances in thehome. Any significant change (e.g., prolonged, based on the temporalthreshold described above) from the baseline of the center frequency,intensity, and/or increase in the width of the frequency could bepotential indicators of leaks that can be detected using technique M1.

Turning ahead in the drawings, FIG. 9 illustrates graphs 900 showingexamples of pressure events corresponding to a baseline noise signaturefor a water system (e.g., 200 (FIG. 2)) in a particular case.Specifically, graphs 900 include a flow sensor stream 910 in a topgraph, a pressure sensor stream 920 in a middle graph, and a pressurespectrogram 930 in a bottom graph. Pressure sensor stream 920 can be araw pressure stream time domain signal as measured by pressure sensor226 (FIG. 2). Pressure spectrogram 930 can be a frequency domainrepresentation using a spectrogram, as transformed from pressure sensorstream 920. Flow sensor stream 910 can be a measure of flow through flowsensor 228 (FIG. 2). In many embodiments, pressure spectrogram 930 caninclude pressure events 931 detected during a low water activity timeperiod (in this case, early morning hours) during the same month whenleak detection device 224 (FIGS. 2, 5-6) was first installed. Each ofpressure events 931 is a signal having a similar signature.Specifically, each of pressure events 931 is a low intensity event in anenergy band centered at approximately 5 Hz. In many embodiments,pressure spectrogram 930 can represent a baseline frequency domaincharacteristic.

Turning ahead in the drawings, FIG. 10 illustrates graphs 1000 showingexamples of pressure events corresponding to a the water system analyzedin FIG. 9, as analyzed six months later. Specifically, graphs 1000include a flow sensor stream 1010 in a top graph, a pressure sensorstream 1020 in a middle graph, and a pressure spectrogram 1030 in abottom graph. Pressure sensor stream 1020 can be a raw pressure streamtime domain signal as measured by pressure sensor 226 (FIG. 2). Pressurespectrogram 1030 can be a frequency domain representation using aspectrogram, as transformed from pressure sensor stream 1020. Flowsensor stream 1010 can be a measure of flow through flow sensor 228(FIG. 2). In many embodiments, pressure spectrogram 1030 can includepressure events 1031 during a low water activity time period (in thiscase, early morning hours) during a time period six months after thetime period analyzed in FIG. 9. When comparing pressure events 1031against the baseline, namely pressure events 931 (FIG. 9), it can beobserved that pressure events 1031 are more pronounced signatures (ofhigher intensity) at the approximately 5 Hz energy band than pressureevents 931 (FIG. 9). This change of intensity can be an indicator of aslow, persistent drip or small leak occurring in the water system (e.g.,200 (FIG. 2)).

Such a drip or small leak can occur due to a faulty washer at a fixture,or a fixture that has not been turned off properly. The waterconsumption by this type of leak is small compared to other leak types.These leaks can occur due to normal wear and tear of the fixtures overyears of usage and can be relatively inexpensive to fix. It can bepossible to detect these leaks as increased turbulence in certainfrequency bands. Such leaks generally occur on the cold water lines(e.g., 232 (FIG. 2)), and the behavior of pressure events correspondingto such leaks can be independent of whether the system (e.g., watersystem 200 (FIG. 2)) exhibits high droop events or low droop pressureevents. In many embodiments, long term monitoring of a water system(e.g., 200 (FIG. 2)) and generation of system model 536 (FIG. 5) canfacilitate using technique M1 to analyze changes in frequency energyagainst a baseline, as shown in the differences between pressure events931 (FIG. 9) and pressure events 1031. In some cases, back ground noise,such as shown in pressure events 931 (FIG. 9) and/or pressure events1031 can be an indicator of a faulty pressure regulator. Suchinformation can be used to provide users with information regarding thehealth of components in water system 200 (FIG. 2), such as pressureregulator 202 (FIGS. 2-3.

In some cases, appliances or other water fixtures can generatepersistent turbulence (which may be in bands above 50 Hz). However, thefrequency signatures of these appliances generally have a finiteduration, which can be learned through user feedback and stored in asystem model 536 (FIG. 5) of water system 200 (FIG. 2). For example,user feedback can include the user providing labels for events thatoccur. For example, cloud computing system 504 (FIG. 5) can detect thata pressure event has finished, and can direct graphical interface 506(FIG. 5) to prompt the user for information about what pressure eventwas just completed, such as a clothes washer cycle. As another example,the user can provide information, such as the irrigation schedule for awater system (e.g., 200 (FIG. 2). These pieces of information can beused to label pressure events internally and perform machine learning tomore accurately detect pressure events. System model 536 (FIG. 5) can bereferenced by leak detection device 224 (FIGS. 2, 5-6) and/or cloudcomputing system 504 (FIG. 5). Once learned, the appliance-generatedfrequency signals (or signatures) can be ignored as false positivesduring the leak detection process.

Turning ahead in the drawings, FIG. 11 illustrates a graph of a pressuresensor stream 1100 showing an example of pressure events detected usingtechnique M2. Pressure sensor stream 1100 can be a raw pressure streamtime domain signal as measured by pressure sensor 226 (FIG. 2). In manyembodiments, leak detection technique M2 can monitor a pressure streamtime domain signal in the time domain, such as pressure sensor stream1100, to detect a non-cyclical pressure event from the pressure dataover a period of time. The non-cyclical pressure event detected bytechnique M2 can include negative slopes, such as negative slope 1102,of pressure samples of pressure sensor stream 1100 with interruptions bya pressure increase, such as pressure reset boost 1104. For example,technique M2 can track the slope of successive pressure samples inpressure sensor stream 1100 in periods of non-event data, such as whenno intentional water use events are occurring. If there is a consistenttrend of monotonically decreasing samples, with a persistent negativeslope, a leak can be determined to be present in water system 200 (FIG.2). The persistent negative slope is non-cyclical because the flow ofwater never stops due to the leak. This type of event is expected tooccur in systems (e.g., water system 200 (FIG. 2)) with high pressuredroop, but in some cases will occur in systems with low pressure droop.Technique M2 can detect leaks of the nature shown in FIG. 11 regardlessof whether the leak is on cold water lines 232 (FIG. 2) or hot waterlines 234 (FIG. 2), and can be detected whether or not a tank-type waterheather (e.g., water heater 204 (FIG. 2)) or tankless water heater isused.

The monotonic downward pressure trend is generally interruptedperiodically by a pressure rise due to the pressure regulator (e.g., 202(FIGS. 2-3) activating to restore the downstream pressure to the setpoint pressure. As shown by the pressure sensor stream 1100 in FIG. 11,the result is a perpetual downtrend in pressure (e.g., negative slot1102) with periodic pressure reset boosts (e.g., pressure reset boost1104) triggered by pressure regulator activations. The data capturerepresented in FIG. 9 is during a period when no intentional water-useevents are occurring. As a result, the pressure drops are due to theloss of water from the leak while pressure boosts are due to periodicattempts by the pressure regulator (e.g., 202 (FIG. 2)) to allow waterfrom the utility into the home in order to restore the desired set pointpressure. The timing of the negative slope and the interruptions canvary, and depends on the pressure regulator set point and the pressureregulator factors described above that affect the different styles ofpressure signals that occur within a water system (e.g., 200 (FIG. 2)when water is used.

Other causes of leaks and/or environmental interruptions of the leakscan occur. For example, a leak can occur in a pipe feeding an irrigationsystem. As described briefly above, after a prolonged period of leakage,a temporary seal can be created around the leak from the externalpressure of the escaped water, causing an interruption of the leak. Theleak can then re-opened once sufficient water is dissipated into thesurrounding soil or evaporates. In another example, a leak occurring inan elevated fixture may be interrupted. For example, a leak can occur ina fixture on the second floor of a residence. The pressure in thepressurized water system of the residence will drop as water escapesfrom the leak. At some point, the decreased water pressure may becomeinsufficient (when working against gravity) to continue to push waterout of the elevated fixture, causing an interruption in the leak. Thepressure regulator may then replenish the pressure to a point that theleak continues. These types of leaks with environmental interruptionsmay be detected using leak detection technique M2.

FIG. 12 illustrates a graph of an example pressure sensor stream 1200having pressure events detected using leak detection technique M3. Leakdetection technique M3 can monitor a pressure stream time domain signalin the time domain of pressure sensor stream 1200 and can detect anon-cyclical pressure event from the pressure data over a period oftime. The non-cyclical pressure event detected by technique M3 caninvolve the pressure level falling below a pressure level threshold (orpressure floor) over a period of time. The pressure level threshold canrepresents a pressure level floor observed during normal operatingconditions of the pressurized system. For example, technique M3 canmonitor the pressure sensor stream 1200 in the time domain for prolongedperiods of significantly reduced water pressure relative to ahistorically established pressure set point range observed during normalconditions. Such a large drop in pressure can be attributed to a pipeburst or other form of catastrophic leak that results in a massiveamount of water flowing out of the pressurized system. It is noted thatFIG. 12 does not show a pressure level being below the pressure levelthreshold. Rather, pressure sensor stream 1200 shows a set pointpressure level 1202 and a pressure level threshold 1204 that is a resultof multiple high flow fixtures activated in parallel. Pressure levelthreshold 1204 shown in FIG. 12 is at approximately 31.62 PSI, and setpoint pressure level 1202 is approximately 47.18 PSI, indicating thatpressure level threshold 1204 is a drop of approximately 15-16 PSI belowset point pressure level 1202. One of ordinary skill in the art willappreciate that other pressure levels thresholds can be observed as thelowest pressure levels detected during intentional water-use events.

In some examples, pressure level threshold 1204, representing the lowestobserved pressure based on intentional water-use events, can be theresult of several simultaneous intentional water uses occurring inparallel in water system 200 (FIG. 2), as shown in FIG. 10. For example,the pressure level threshold 1204 can be set by causing varioussimultaneous intentional water-use events to occur, including a showerrunning in one bathroom, a tub running in another bathroom, an externalspigot running, a sink running, and a toilet being flushed. In someembodiments, the pressure floor of pressure level threshold 1204 can bedynamically set as new pressure floors are observed during normaloperation of the water fixtures in the pressurized system based onintentional water usage. In some embodiments, the new pressure flow canbe set if it persists for more than a time threshold, such asapproximately 1 minute, 2 minutes, 3 minutes, 5 minutes, or 10 minutes.A pressure signal that drops below pressure level threshold 1204 can beconsidered a leak and may trigger a notification to cloud computingsystem 504 (FIG. 5) and/or the user device for notifying a user quicklyto facilitate mitigating property damage. In some embodiments, techniqueM3 can trigger a notification if the pressure signal stays belowpressure level threshold 1204 for a time threshold. For example, thetime threshold can be approximately 1 minute, 5 minutes, 10 minutes, 20minutes, 30 minutes, 45 minutes, 1 hour, 1.5 hours, 2 hours, 2.5 hours,3 hours, or 4 hours. In some embodiments, the time threshold can besimilar or identical to the temporal threshold described above.

In some embodiments, it may be possible to determine when a drop belowpressure level threshold 1204 is due to legitimate intentional water-useevents. For example, pressure signatures of fixtures or appliances thatare learned, as described above, can be used to determine that a largepressure drop is due to simultaneous use of a large number of fixturesor appliances that cause the drop below pressure level threshold 1204.In such cases, a drop in pressure below pressure level threshold 1204can be disregarded.

In some cases, only drops below pressure level threshold 1204 that arenot produced by the fixture where pressure sensor 226 (FIG. 2) isinstalled (e.g., kitchen faucet 206 (FIG. 2), or another location inwhich pressure sensor 226 (FIG. 2) is installed) are considered validfor dropping below pressure level threshold 1204. This fixture wherepressure sensor 226 (FIG. 2) is located may be referred to as theinstallation-location fixture. As described briefly above and shown inFIGS. 4A and 4B, water usage at the installation-location fixture thatis proximate to the location of pressure sensor 226 (FIG. 2) will likelyhave a high pressure drop due to the proximity of theinstallation-location fixture to pressure sensor 226 (FIG. 2) and theflow of water through the fixture. In such cases, flow sensor 228 (FIG.2) can be used to determine when a pressure drop occurring at thelocation of pressure sensor 226 (FIG. 2) is due to an intentionalwater-use event. For example, events at the installation-locationfixture can be distinguished by the presence of rotation recorded by theflow sensor turbine (or rotor) installed in series with pressure sensor226 (FIG. 2) in leak detection device 224 (FIG. 2). If flow sensor 228(FIG. 2) senses that flow is occurring in the water supply line at theinstallation-location fixture, then a pressure drop below the pressurefloor can be disregarded. In some cases, a leak notification may betriggered earlier if a lowest observed pressure floor at theinstallation-location fixture, which can be lower than pressure levelthreshold 1204, is surpassed by a new lower pressure floor.

In many embodiments, leak detection technique M4 can detect leaks bymonitoring a pressure stream time domain signal detected by pressuresensor 226 (FIG. 2) in the time domain and detecting a non-cyclicalpressure event from the pressure data over a period of time. Thenon-cyclical pressure event detected by technique M4 can includevariations in stable pressure levels. For example, technique M4 cantrack stable pressure over a period of time, such by computing a roundedmode of pressure measurements over a period of time, such as theprevious 2 hours. In many embodiments, the pressure values can berounded to one digit after the decimal, such that 73.2416 PSI is roundedto 73.2 PSI. The most frequently occurring value can be returned as thestable pressure. A standard deviation of the stable pressure can becomputed using the rounded pressure values. If the standard deviation isgreater than a standard deviation of a baseline calibrated stablepressure values by a multiple of a threshold N, technique M4 candetermine that a leak has occurred that is causing incessantfluctuations in the stable pressure. In some embodiments, threshold Ncan be approximately 2, 2.5, 3, 3.5, 4, 4.5, 5, or another suitablevalue. In other embodiments, technique M4 can use a standard deviationof cloud stable pressure values calculated by cloud computing system 504(FIG. 5) during 24 hour cycles for comparison instead of the standarddeviation of the baseline calibrated stable pressure values.

In some cases, the variation in stable pressure levels from a normalrange can be due to a change in the pressure regulator (e.g., 202 (FIGS.2-3)) or a change in the properties of the pressure regulator, such asthe loading force of loading element 302 (FIG. 3), a surface area ofdiaphragm 304 (FIG. 3), a size of orifice 312 (FIG. 3) aroundrestricting element 310 (FIG. 3), or another suitable property. In someexamples, leak detection device 224 (FIGS. 2, 5-6) or cloud computingsystem 504 (FIG. 5) can cause the water supply to be shut off, such asby sending a wireless signal to a network-connected shutoff valve thatcauses the shutoff valve to turn off the water supply. In some examples,leak detection device 224 (FIGS. 2, 5-6) or cloud computing system 504(FIG. 5) can send a notification to a user device of a user (e.g.,through graphical interface 506 (FIG. 5) of a mobile application or aweb interface, for example). The user can temporarily turn off the watersupply from the utility at a main inlet valve, and can send anotification (e.g., using any suitable messaging or email service, or apush notification triggered) from the user device (e.g., graphicalinterface 506 (FIG. 5) of a mobile application or a web interface) toleak detection device 224 (FIGS. 2, 5-6) or cloud computing system 504(FIG. 5) alerting leak detection system 500. When the shutoff occursusing any of these examples, the water pressure will either stabilizeand remain constant (in which case the fluctuations are attributable tovariations in the utility pressure and the pressure regulator), or thepressure will gradually diminish without a source to replenish it, inwhich case a leak is determined to exist by leak detection technique M4.

Returning to FIG. 5, one or more of the various different leak detectiontechniques M1-M4 can be used independently to detect leaks. Once a leakhas been detected by leak detection device 224 using any of thetechniques M1-M4, leak detection device 224 or cloud computing system504 can send a notification to a user device of a user running graphicalinterface 506

The leak detection techniques M1-M4 can run in firmware 515 of leakdetection device 224. In some embodiments, when leak detection device224 detects a potential leak using one or more of the techniques M1-M4,leak detection device 224 can trigger a request for further verificationto cloud computing system 504, such as leak validation components 530.For example, when firmware 515 detects a characteristic (in the time orfrequency domain) indicating leak-like behavior using one or more oftechniques M1-M4, firmware 515 can trigger a request for furtherverification by cloud computing system 504, which can be not bound bythe memory constraints of leak detection device 224, and thus can beable to consider longer segments of data, such as data in long-termstorage 527, when verifying the presence or absence of a leak. Forexample, long-term storage 527 can store large amounts of data so thatcloud computing system 504 can look at pressure data further back intime than the pressure data available in short-term data access 518 ofleak detection device 224. Based on the larger amount of data, the cloudanalytics engine can do significantly more sophisticated analysis toverify leaks detected by leak detection device 224, as described belowin further detail.

Once a leak is detected, leak detection device 224 and/or cloudcomputing system 504 can provide information to the graphical interface506. Graphical interface 506 can be implemented as a mobile applicationinterface or a web interface on the user device. Graphical interface 506can provide notification and interaction functions for a user of theuser device. For example, graphical interface 506 can communicate orpresent leak information to the user. Leak detection device 224 and/orcloud computing system 504 can send leak notifications to graphicalinterface 506 when a leak is detected. The leak notification can bedisplayed to the user on a display of the user device so the user canfix the leak. In some embodiments, graphical interface 506 can allow theuser to provide input to enable and disable various fixtures in watersystem 200 (FIG. 2). For example, the user can remotely configure orcontrol fixtures that are controllable using the detection device 224.In some embodiments, graphical interface 506 can allow the user toenable or disable various settings, such as the types of notificationsthat are received, the frequency at which notifications are received,types of leaks to report to the user device, or any other suitablesetting.

In some embodiments, when the processing power of leak detection device224 allows, leak detection device 224 can combine the outputs of two ormore of the leak detection techniques M1-M4 to make a precise conclusionabout the type of leak that has been detected. In many embodiments,cloud computing system 504 can combine the outputs of the techniquesM1-M4 to determine a type of leak. For example, leak detection device224 and/or cloud computing system 504 can detect different types ofleaks based on one or more of leak detection techniques M1-M4identifying the frequency domain or time domain characteristics from thepressure data, as described above. Examples of leak types that can beidentified based on different combinations of the techniques M1-M4 beingsatisfied are shown below in Table 2. Leak detection device 224 and/orcloud computing system 504 can map one or more detected time and/orfrequency domain characteristics to a type of leak, as explained belowin further detail.

TABLE 2 High Pressure Low Pressure GPM Droop Home Droop Home Lower Leakon Leak on Leak on Leak on Leak Type Bound Hot Line Cold Line Hot LineCold Line Miniscule 0.01 M2 (if M1, M2 (if M4 (if M1 (if (Drip/Bleed/detectable) detectable) detectable) detectable) Seep/Ooze) Small 0.25 M2M1, M2 M4 (if M1 detectable) Medium 1 M2 M1, M2 M4 M1, M4 Large/ 5 M2,M3 M1, M2, M3 M1, M3 Catastrophic M3

Different types of leaks can include a miniscule leak that releasesapproximately 0.01-0.25 GPM, a small leak that releases approximately0.25-1.0 GPM, a medium that releases approximately 1-5 GPM, and a largeor catastrophic leak that releases approximately 5 GPM or greater. Thedifferent types of leaks can be detected based on one or more of, orvarious different combinations of, techniques M1-M4 being satisfied. Thecombinations for the miniscule, small, and medium leak types aresimilar. In some cases, the miniscule leaks are not detectable in theevent a pressure frequency characteristic, slope, or standard deviationis not discernable from the time domain or frequency domaincharacteristics described above.

In some embodiments, when leak detection system 224 sends a leaknotification to cloud detection system 504, which can indicate apotential leak, cloud detection system 504 can perform preliminarychecks of the data to determine whether the leak notification isoccurring during known irrigation times, or if the leak has a signaturethat closely matches previously dismissed leak notifications, such aprevious leak notification that the user has dismissed as not beingleaks, and cloud detection system 504 can use such preliminary checks todisregard some of the leak notifications.

In various embodiments, ensemble voting component 532 can analyze theresults of independent method verification component 531 applyingtechniques M1-M4. In many embodiments, if any of techniques M1-M4analyzed by independent method verification component 531 results in aThreshold 1 confidence level (approximately 80% of higher confidencelevel, as described above), a user leak notification can be triggered tonotify the user. In a number of embodiments, cloud computing system 504can perform an additional monitoring procedure using additional newdata, as described below, to further characterize the leak.

In several embodiments, if none of techniques M1-M4 return a Threshold 1confidence level, but one or more techniques return a Threshold 2confidence level (approximately 60% to 80% confidence level, asdescribed above), cloud computing system 504 can perform an additionalmonitoring procedure using additional new data, as described below, todetermine if any one of the outputs of techniques M1-M4 reaches aThreshold 1 confidence level or if two or more of the outputs oftechniques M1-M4 sustain the Threshold 2 confidence levels over anextended monitoring period, as described below. If either or both ofthese conditions are met, a user leak notification can be triggered tonotify the user.

In a number of embodiments, the additional monitoring procedure usingadditional data can search backward in the data over a time periodbefore the time period analyzed for the notification alert is receivedby cloud computing device 504 and/or analyze incoming data after thenotification alert is received by cloud computing device 504. Forexample, in some embodiments, the amount of additional time analyzed insearching backwards and/or analyzing forward can be a multiple (e.g., 1,2, 3, 4, 5) of the temporal threshold, as defined above. For example, ifthe temporal threshold is 45 minutes, and the multiple is 3, theadditional monitoring procedure can search back over the previous 135minutes of data and analyze the following 135 minutes of incoming data.During this analysis, the procedure can check Threshold 1 confidencelevels being reached using the same or other techniques as the one ormore techniques that resulted in the notification alert.

In some embodiments, depending on the techniques and the confidencelevels returned output, cloud computing system 504 can accuratelydetermine the size of the detected leak, such as in which leak typecategory of Table 2 the detected leak should be categorized. In a numberof embodiments, if only one technique triggers a Threshold 1 confidencelevel or if multiple methods trigger a Threshold 2 confidence level, ifcan be possible to rule out certain leaks types but nonetheless beunable to make a conclusive determination regarding which one of theleak type categories applies.

Although the above-described examples are described with reference towater leaks, the leak detection system 500 can use the same techniquesM1-M4 to monitor pressure characteristics of other pressurized systemsto detect leaks, such as in natural gas or another pressurizedsubstance.

Turning ahead in the drawings, FIG. 13 illustrates a flow chart for amethod 1300, according to an embodiment. In some embodiments, method1300 can be a method of leak detection, such as water leak detection.Method 1300 is merely exemplary and is not limited to the embodimentspresented herein. Method 1300 can be employed in many differentembodiments or examples not specifically depicted or described herein.In some embodiments, the procedures, the processes, and/or theactivities of method 1300 can be performed in the order presented. Inother embodiments, the procedures, the processes, and/or the activitiesof method 1300 can be performed in any suitable order. In still otherembodiments, one or more of the procedures, the processes, and/or theactivities of method 1300 can be combined or skipped.

Referring to FIG. 13, in some embodiments, method 1300 can include ablock 1301 of measuring pressure of water in a water system of astructure at a single location in the water system using a pressuresensor of a sensing device to generate pressure measurement datarepresenting the pressure of the water as measured by the pressuresensor. In a number of embodiments, the water system can be similar oridentical to water system 200 (FIG. 2). In several embodiments, thesensing device can be similar or identical to leak detection device 224(FIGS. 2, 5-6). In a number of embodiments, the pressure sensor can besimilar or identical to pressure sensor 226 (FIG. 2). In a number ofembodiments, the pressure measurement data can be a pressure signal,such as a sampled digital pressure signal.

In many embodiments, the single location can be similar or identical tothe installation of leak detection device 224 (FIGS. 2, 5-6) at kitchensink faucet 604 (FIG. 6), or at another suitable single location of thewater system. In some embodiments, the single location of the sensingdevice can be located between a pressure regulator of the water systemand a first fixture of the water system. The pressure regulator can besimilar or identical to pressure regulator 202 (FIGS. 2-3). The firstfixture can be similar to kitchen sink faucet 604, or another suitablesingle location.

In a number of embodiments, method 1300 additionally can include a block1302 of communicating the pressure measurement data to one or moreprocessing units. In some embodiments, the one or more processing unitscan be part of leak detection device 224 (FIGS. 2, 5-6) and/or cloudcomputing system 504 (FIG. 5). In some embodiments, when the pressuremeasurement data is communicated from leak detection device 224 (FIGS.2, 5-6) to cloud computing system 504 (FIG. 5), the pressure measurementdata can be streamed, such as through radio components 511 (FIG. 5)and/or streaming gateway 526 (FIG. 5).

In a number of embodiments, method 1300 additionally can include a block1303 of detecting a non-cyclical pressure event corresponding to a waterleak in the water system of the structure during a first time periodbased on an analysis of information comprising the pressure measurementdata. In some embodiments, the non-cyclical pressure event can besimilar or identical to leak turbulence signal 702 (FIG. 7), pressureevents 1031 (FIG. 10), the non-cyclical pressure event depicted inpressure sensor stream 1100 (FIG. 11) (including negative slot 1102(FIG. 11) and pressure reset boost 1104 (FIG. 11)), the non-cyclicalpressure event described above in conjunction with FIG. 12, and/or othersuitable non-cyclical pressure events. In many embodiments, the firsttime period can be a time period over which the leak is detected. Insome embodiments, the first time period can be the temporal thresholddescribed above, and/or the other time thresholds described above. Inother embodiments, the first time period can include time during whichdetection is being performed or in which data is being gathered for leakdetection, but in a number of embodiments can exclude time periods usedfor calibration or baseline generation of the sensing device.

In some embodiments, the information analyzed in the analysis caninclude the pressure measurement data in a time domain, and/or afrequency domain characteristic of the pressure measurement data. Forexample, the pressure measurement data in a time domain can be similarto pressure sensor stream 401 (FIG. 4A), pressure sensor stream 451(FIG. 4B), pressure sensor stream 704 (FIG. 7), pressure sensor stream820 (FIG. 8), pressure sensor stream 920 (FIG. 9), pressure sensorstream 1020 (FIG. 10), pressure sensor stream 1100 (FIG. 11), and/orpressure sensor stream 1200 (FIG. 12). The frequency domaincharacteristic can be similar or identical to pressure spectrogram 420(FIG. 4A), pressure spectrogram 470 (FIG. 4B), pressure spectrogram 720(FIG. 7), pressure spectrogram 830 (FIG. 8), pressure spectrogram 930(FIG. 9), pressure spectrogram 1030 (FIG. 10), pressure sensor stream1100 (FIG. 11), and/or pressure sensor stream 1200 (FIG. 12).

In a number of embodiments, the information analyzed in the analysisdoes not include any flow measurement data that represents an amount offlow of the water in the water system of the structure during the firsttime period. In some embodiments, flow measurement data from flow sensor228 (FIG. 2) at the single location (e.g., at kitchen sink faucet 604(FIG. 6)) can be included in the information used in the analysis, butnot flow measurement data of the total flow in the system, such as theamount of flow through pressure regulator 202 (FIGS. 2-3) or a flowmeter provided by the utility (e.g., an automatic meter reading (AMR)device). In other embodiments, no flow measurement data can be includedin the information that is used in the analysis. In some embodiments,flow turbine information regarding whether the water is flowing at flowsensor 228 (FIG. 2) can be included in the information without providingflow measurement data.

In several embodiments, block 1303 of detecting the non-cyclicalpressure event optionally can include a block 1304 of analyzing afrequency domain characteristic of the pressure measurement data toidentify a turbulence in the frequency domain characteristic whencompared to a baseline frequency domain characteristic. For example, thebaseline frequency domain characteristic can be similar to pressurespectrogram 930 (FIG. 9). In some embodiments, the turbulence can have aduration longer than a first threshold. The first threshold can be thetemporal threshold defined above, and/or the other time thresholdsdescribed above. In some embodiments, the first threshold can be 45minutes.

In some embodiments, the turbulence can be similar or identical to leakturbulence signal 702 (FIG. 7) and/or pressure events 1031 (FIG. 10). Ina number of embodiments, the turbulence can include a frequency band inthe frequency domain characteristic. In many embodiments, the frequencyband can have a center frequency and a width. In several embodiments,the center frequency and/or width can be detected by the sensing device.In a number of embodiments, block 1304 can implement an embodiment oftechnique M1.

In a number of embodiments, block 1303 of detecting the non-cyclicalpressure event optionally can include a block 1305 of trackingsuccessive pressure samples of the pressure measurement data in a timedomain. For example, the tracking can be similar or identical totracking of pressure samples in pressure sensor stream 1100 (FIG. 11),as described above in conjunction with FIG. 11.

In a number of embodiments, block 1303 of detecting the non-cyclicalpressure event next can include after block 1305 a block 1306 ofidentifying a pattern of negative slopes interrupted by periodicpressure reset boosts. For example, the negative slopes can be similaror identical to negative slope 1102 (FIG. 11). The periodic pressurereset boosts can be similar or identical to pressure reset boost 1104(FIG. 11). In several embodiments, the periodic pressure reset boostscan correspond to pressure resets activated by a pressure regulatorcoupled to the water system of the structure. The pressure regulator canbe similar or identical to pressure regulator 202 (FIGS. 2-3). In a manyembodiments, blocks 1305 and 1306 can implement an embodiment oftechnique M2.

In a number of embodiments, block 1303 of detecting the non-cyclicalpressure event optionally can include a block 1307 of detecting apressure level below a pressure level threshold. The pressure levelthreshold can be similar to pressure level threshold 1204 (FIG. 12). Inmany embodiments, the pressure level threshold can represent a pressurelevel floor observed during normal operating conditions of the watersystem.

In a number of embodiments, block 1303 of detecting the non-cyclicalpressure event optionally can include after block 1307 a block of 1308of determining that the water is not flowing at the single location ofthe sensing device when the pressure level is detected below thepressure level threshold. In some embodiments, the sensing device caninclude a flow turbine configured to determine whether the water isflowing at the single location of the sensing device. In someembodiments, the flow turbine can be similar or identical to flow sensor228 (FIG. 2). In a many embodiments, blocks 1307 and/or 1308 canimplement an embodiment of technique M3.

In a number of embodiments, block 1303 of detecting the non-cyclicalpressure event optionally can include a block 1309 of determining afirst standard deviation of pressure measurements of the pressuremeasurement data during a second time period including at least aportion of the first time period. In many embodiments, the second timeperiod can be similar or identical to the period of time described abovefor tracking stable pressure for computing rounded mode of pressuremeasurements. For example, the second time period can be 2 hours whollyor at least partially within the first time period.

In a number of embodiments, block 1303 of detecting the non-cyclicalpressure event next can include after block 1309 a block 1310 ofdetermining that the first standard deviation is greater than a secondknown stable pressure standard deviation value by a multiple of a secondthreshold. In a number of embodiments, the second threshold can besimilar or identical to threshold N described above. In someembodiments, the second threshold is 3.5. In a many embodiments, blocks1309 and 1310 can implement an embodiment of technique M4.

In a number of embodiments, method 1300 further optionally can include ablock 1311 of determining the center frequency and the width of thefrequency band.

In several embodiments, method 1300 further optionally can include ablock 1312 of transmitting a request for verification of the water leak.For example, the request for verification can be sent from the sensingdevice to a cloud computing system, such as cloud computing system 504(FIG. 5).

Turning ahead in the drawings, FIG. 14 illustrates a computer system1400, all of which or a portion of which can be suitable forimplementing an embodiment of at least a portion of network devices 102,104, and 106, access device 108, leak detection device 224 (FIGS. 2,5-6), cloud computing system 504, and/or the user device (e.g., accessdevice 108) providing graphical interface 506 (FIG. 5), and/or thetechniques (e.g., M1-M4) described above, and/or method 1300 (FIG. 13).Computer system 1400 includes a chassis 1402 containing one or morecircuit boards (not shown), a USB (universal serial bus) port 1412, aCompact Disc Read-Only Memory (CD-ROM) and/or Digital Video Disc (DVD)drive 1416, and a hard drive 1414. A representative block diagram of theelements included on the circuit boards inside chassis 1402 is shown inFIG. 15. A central processing unit (CPU) 1510 in FIG. 15 is coupled to asystem bus 1514 in FIG. 15. In various embodiments, the architecture ofCPU 1510 can be compliant with any of a variety of commerciallydistributed architecture families.

Continuing with FIG. 15, system bus 1514 also is coupled to memory 1508that includes both read only memory (ROM) and random access memory(RAM). Non-volatile portions of memory storage unit 1508 or the ROM canbe encoded with a boot code sequence suitable for restoring computersystem 1400 (FIG. 14) to a functional state after a system reset. Inaddition, memory 1508 can include microcode such as a Basic Input-OutputSystem (BIOS). In some examples, the one or more memory storage units ofthe various embodiments disclosed herein can comprise memory storageunit 1508, a USB-equipped electronic device, such as, an external memorystorage unit (not shown) coupled to universal serial bus (USB) port 1412(FIGS. 14-15), hard drive 1414 (FIGS. 14-15), and/or CD-ROM or DVD drive1416 (FIGS. 14-15). In the same or different examples, the one or morememory storage units of the various embodiments disclosed herein cancomprise an operating system, which can be a software program thatmanages the hardware and software resources of a computer and/or acomputer network. The operating system can perform basic tasks such as,for example, controlling and allocating memory, prioritizing theprocessing of instructions, controlling input and output devices,facilitating networking, and managing files. Some examples of commonoperating systems can comprise Microsoft® Windows® operating system(OS), Mac® OS, UNIX® OS, and Linux® OS.

As used herein, “processor” and/or “processing module” means any type ofcomputational circuit, such as but not limited to a microprocessor, amicrocontroller, a controller, a complex instruction set computing(CISC) microprocessor, a reduced instruction set computing (RISC)microprocessor, a very long instruction word (VLIW) microprocessor, agraphics processor, a digital signal processor, or any other type ofprocessor or processing circuit capable of performing the desiredfunctions. In some examples, the one or more processors of the variousembodiments disclosed herein can comprise CPU 1510.

In the depicted embodiment of FIG. 15, various I/O devices such as adisk controller 1504, a graphics adapter 1524, a video controller 1502,a keyboard adapter 1526, a mouse adapter 1506, a network adapter 1520,and other I/O devices 1522 can be coupled to system bus 1514. Keyboardadapter 1526 and mouse adapter 1506 are coupled to a keyboard 604 (FIGS.14 and 15) and a mouse 1410 (FIGS. 14 and 15), respectively, of computersystem 1400 (FIG. 14). While graphics adapter 1524 and video controller1502 are indicated as distinct units in FIG. 15, video controller 1502can be integrated into graphics adapter 1524, or vice versa in otherembodiments. Video controller 1502 is suitable for refreshing a monitor1406 (FIGS. 14 and 15) to display images on a screen 1408 (FIG. 14) ofcomputer system 1400 (FIG. 14). Disk controller 1504 can control harddrive 1414 (FIGS. 14 and 15), USB port 1412 (FIGS. 14 and 15), andCD-ROM or DVD drive 1416 (FIGS. 14 and 15). In other embodiments,distinct units can be used to control each of these devices separately.

In some embodiments, network adapter 1520 can comprise and/or beimplemented as a WNIC (wireless network interface controller) card (notshown) plugged or coupled to an expansion port (not shown) in computersystem 1400 (FIG. 14). In other embodiments, the WNIC card can be awireless network card built into computer system 1400 (FIG. 14). Awireless network adapter can be built into computer system 1400 (FIG.14) by having wireless communication capabilities integrated into themotherboard chipset (not shown), or implemented via one or morededicated wireless communication chips (not shown), connected through aPCI (peripheral component interconnector) or a PCI express bus ofcomputer system 1400 (FIG. 14) or USB port 1412 (FIG. 14). In otherembodiments, network adapter 1520 can comprise and/or be implemented asa wired network interface controller card (not shown).

Although many other components of computer system 1400 (FIG. 14) are notshown, such components and their interconnection are well known to thoseof ordinary skill in the art. Accordingly, further details concerningthe construction and composition of computer system 1400 (FIG. 14) andthe circuit boards inside chassis 1402 (FIG. 14) need not be discussedherein.

When computer system 1400 in FIG. 14 is running, program instructionsstored on a USB drive in USB port 1412, on a CD-ROM or DVD in CD-ROMand/or DVD drive 1416, on hard drive 1414, or in memory 1508 (FIG. 15)are executed by CPU 1510 (FIG. 15). A portion of the programinstructions, stored on these devices, can be suitable for carrying outall or at least part of the techniques described herein. In variousembodiments, computer system 1400 can be reprogrammed with one or moremodules, applications, and/or databases, such as those described herein,to convert a general purpose computer to a special purpose computer.

Although computer system 1400 is illustrated as a desktop computer inFIG. 14, there can be examples where computer system 1400 may take adifferent form factor while still having functional elements similar tothose described for computer system 1400. In some embodiments, computersystem 1400 may comprise a single computer, a single server, or acluster or collection of computers or servers, or a cloud of computersor servers. Typically, a cluster or collection of servers can be usedwhen the demand on computer system 1400 exceeds the reasonablecapability of a single server or computer. In certain embodiments,computer system 1400 may comprise a portable computer, such as a laptopcomputer. In certain other embodiments, computer system 1400 maycomprise a mobile device, such as a smartphone. In certain additionalembodiments, computer system 1400 may comprise an embedded system. Forexample, leak detection device 224 (FIGS. 2, 5-6) can include elementsthat are similar or identical to at least a portion of the elements ofcomputer system 1400, such as to provide storage, processing, and/orcommunication computing capabilities.

Although the disclosure has been described with reference to specificembodiments, it will be understood by those skilled in the art thatvarious changes may be made without departing from the spirit or scopeof the invention. Accordingly, the disclosure of embodiments of theinvention is intended to be illustrative of the scope of the inventionand is not intended to be limiting. It is intended that the scope of theinvention shall be limited only to the extent required by the appendedclaims. For example, to one of ordinary skill in the art, it will bereadily apparent that any element of FIGS. 1-15 may be modified, andthat the foregoing discussion of certain of these embodiments does notnecessarily represent a complete description of all possibleembodiments. For example, one or more of the procedures, processes, oractivities of FIG. 13 may include different procedures, processes,and/or activities and be performed by many different modules, in manydifferent orders.

Replacement of one or more claimed elements constitutes reconstructionand not repair. Additionally, benefits, other advantages, and solutionsto problems have been described with regard to specific embodiments. Thebenefits, advantages, solutions to problems, and any element or elementsthat may cause any benefit, advantage, or solution to occur or becomemore pronounced, however, are not to be construed as critical, required,or essential features or elements of any or all of the claims, unlesssuch benefits, advantages, solutions, or elements are stated in suchclaim.

Moreover, embodiments and limitations disclosed herein are not dedicatedto the public under the doctrine of dedication if the embodiments and/orlimitations: (1) are not expressly claimed in the claims; and (2) are orare potentially equivalents of express elements and/or limitations inthe claims under the doctrine of equivalents.

What is claimed is:
 1. A system comprising: a sensing device comprisinga pressure sensor configured to measure pressure of water in a watersystem of a structure, the sensing device being configured to generatepressure measurement data representing the pressure of the water asmeasured by the pressure sensor; and one or more processing unitscomprising one or more processors and one or more non-transitory storagemedia storing machine executable instructions configured when run on theone or more processors to perform: detecting a non-cyclical pressureevent corresponding to a water leak in the water system of the structureduring a first time period based on an analysis of informationcomprising the pressure measurement data, wherein the informationanalyzed in the analysis does not include any flow measurement data thatrepresents a total amount of flow of the water in the water system ofthe structure during the first time period, wherein: the pressure sensoris coupled to the water system of the structure at a single location ofthe water system of the structure when measuring the pressure of thewater in the water system of the structure.
 2. The system of claim 1,wherein: the information analyzed in the analysis further comprises: (a)the pressure measurement data in a time domain, and (b) a frequencydomain characteristic of the pressure measurement data.
 3. The system ofclaim 1, wherein: detecting the non-cyclical pressure event furthercomprises: analyzing a frequency domain characteristic of the pressuremeasurement data to identify a turbulence in the frequency domaincharacteristic when compared to a baseline frequency domaincharacteristic, the turbulence having a duration longer than a firstthreshold.
 4. The system of claim 3, wherein: the first threshold is 45minutes.
 5. The system of claim 3, wherein: the turbulence comprises afrequency band in the frequency domain characteristic; the frequencyband has a center frequency and a width; and the machine executableinstructions are further configured when run on the one or moreprocessors to perform: determining the center frequency and the width ofthe frequency band.
 6. The system of claim 1, wherein: detecting thenon-cyclical pressure event further comprises: tracking successivepressure samples of the pressure measurement data in a time domain; andidentifying a pattern of negative slopes interrupted by periodicpressure increases, the periodic pressure reset boosts corresponding topressure resets activated by a pressure regulator coupled to the watersystem of the structure.
 7. The system of claim 1, wherein: detectingthe non-cyclical pressure event further comprises: detecting a pressurelevel below a pressure level threshold, wherein the pressure levelthreshold represents a pressure level floor observed during normaloperating conditions of the water system.
 8. The system of claim 7,wherein: the sensing device further comprises a flow turbine configuredto determine whether the water is flowing at the single location of thesensing device; and detecting the non-cyclical pressure event furthercomprises: determining that the water is not flowing at the singlelocation of the sensing device when the pressure level is detected belowthe pressure level threshold.
 9. The system of claim 1, wherein:detecting the non-cyclical pressure event further comprises: determininga first standard deviation of pressure measurements of the pressuremeasurement data during a second time period comprising at least aportion of the first time period; and determining that the firststandard deviation is greater than a second known stable pressurestandard deviation value by a multiple of a second threshold.
 10. Thesystem of claim 1, wherein: the second threshold is 3.5.
 11. The systemof claim 1, wherein: the single location of the sensing device islocated between a pressure regulator of the water system and a firstfixture of the water system.
 12. The system of claim 1, wherein: themachine executable instructions are further configured when run on theone or more processors to perform: transmitting a request forverification of the water leak.
 13. A method comprising: measuringpressure of water in a water system of a structure at a single locationin the water system using a pressure sensor of a sensing device togenerate pressure measurement data representing the pressure of thewater as measured by the pressure sensor; communicating the pressuremeasurement data to one or more processing units; and detecting anon-cyclical pressure event corresponding to a water leak in the watersystem of the structure during a first time period based on an analysisof information comprising the pressure measurement data, wherein theinformation analyzed in the analysis does not include any flowmeasurement data that represents a total amount of flow of the water inthe water system of the structure during the first time period.
 14. Themethod of claim 13, wherein: the information analyzed in the analysisfurther comprises: (a) the pressure measurement data in a time domain,and (b) a frequency domain characteristic of the pressure measurementdata.
 15. The method of claim 13, wherein: detecting the non-cyclicalpressure event further comprises: analyzing a frequency domaincharacteristic of the pressure measurement data to identify a turbulencein the frequency domain characteristic when compared to a baselinefrequency domain characteristic, the turbulence having a duration longerthan a first threshold.
 16. The method of claim 15, wherein: the firstthreshold is 45 minutes.
 17. The method of claim 15, wherein: theturbulence comprises a frequency band in the frequency domaincharacteristic; the frequency band has a center frequency and a width;and the method further comprises: determining the center frequency andthe width of the frequency band.
 18. The method of claim 13, wherein:detecting the non-cyclical pressure event further comprises: trackingsuccessive pressure samples of the pressure measurement data in a timedomain; and identifying a pattern of negative slopes interrupted byperiodic pressure increases, the periodic pressure reset boostscorresponding to pressure resets activated by a pressure regulatorcoupled to the water system of the structure.
 19. The method of claim13, wherein: detecting the non-cyclical pressure event furthercomprises: detecting a pressure level below a pressure level threshold,wherein the pressure level threshold represents a pressure level floorobserved during normal operating conditions of the water system.
 20. Themethod of claim 19, wherein: the sensing device further comprises a flowturbine configured to determine whether the water is flowing at thesingle location of the sensing device; and detecting the non-cyclicalpressure event further comprises: determining that the water is notflowing at the single location of the sensing device when the pressurelevel is detected below the pressure level threshold.
 21. The method ofclaim 13, wherein: detecting the non-cyclical pressure event furthercomprises: determining a first standard deviation of pressuremeasurements of the pressure measurement data during a second timeperiod comprising at least a portion of the first time period; anddetermining that the first standard deviation is greater than a secondknown stable pressure standard deviation value by a multiple of a secondthreshold.
 22. The method of claim 13, wherein: the second threshold is3.5.
 23. The method of claim 11, wherein: the single location of thesensing device is located between a pressure regulator of the watersystem and a first fixture of the water system.
 24. The method of claim11, wherein: the machine executable instructions are further configuredwhen run on the one or more processors to perform: transmitting arequest for verification of the water leak.