Real-time monitoring to detect third-party damage

被引:0
|
作者
Leis, BN [1 ]
Francini, RB [1 ]
Stulen, FB [1 ]
Hyatt, RW [1 ]
Norman, R [1 ]
机构
[1] Battelle, Columbus, OH USA
关键词
third-party contact; mechanical damage; on-line monitoring;
D O I
暂无
中图分类号
U6 [水路运输]; P75 [海洋工程];
学科分类号
0814 ; 081505 ; 0824 ; 082401 ;
摘要
Based on data compiled in the Office of Pipeline Safety incident database, damage due to outside forces is responsible for the largest number of reportable incidents for both offshore and onshore gas-transmission pipelines. Examples of outside forces incidents for offshore lines include contact with jetting skids during construction and anchor strikes and line-pulls in service. When the damage due to third-party incidents causes an immediate rupture, on-line monitoring can help reduce the consequences of the event. However, because many third-party incidents cause damage that does not lead to immediate rupture but can grow with time, on-line monitoring can play a significant role in reducing the number of third-party damage incidents. Because such incidents can have a major environmental impact, and because such damage can become more frequent with the continued expansion offshore, significant benefits can accrue through the development and use of on-line monitoring in offshore applications. Offshore applications involve operating environments in which detection methods that could function for onshore pipelines, like satellite-based schemes, are no longer feasible. Battelle has been developing a method to detect third-party contact for onshore pipelines that is capable of being adapted to offshore pipelines. This paper reports on that technology, which is based on the detection of the propagating acoustic pressure pulse that develops from the third-party contact. This paper provides an overview of the technology and the held testing being done to demonstrate its utility for reactive detection of third-party contact with pipelines. Also, a summary is presented of other methods that, with some development, could be used to prevent third-party damage. The results indicate that with only modest development the capability for real-time monitoring exists today.
引用
收藏
页码:34 / 38
页数:3
相关论文
共 50 条
  • [31] Third-party Relationships and Third-party Protection in the European Property Law Regulations
    Mankowski, Peter
    RABELS ZEITSCHRIFT FUR AUSLANDISCHES UND INTERNATIONALES PRIVATRECHT, 2021, 85 (03): : 681 - 688
  • [32] The ICAO Conventions on Liability for Third-Party Damage Caused by Aircraft
    Abeyratne, Ruwantissa
    AIR & SPACE LAW, 2009, 34 (06): : 403 - 416
  • [33] Third-party purchase: An empirical study of third-party logistics providers in China
    Shi, Yangyan
    Zhang, Abraham
    Arthanari, Tiru
    Liu, Yanping
    Cheng, T. C. E.
    INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2016, 171 : 189 - 200
  • [34] Collateral damage of Facebook third-party applications: a comprehensive study
    Symeonidis, Iraklis
    Biczok, Gergely
    Shirazi, Fatemeh
    Perez-Sola, Cristina
    Schroers, Jessica
    Preneel, Bart
    COMPUTERS & SECURITY, 2018, 77 : 179 - 208
  • [35] Third-party purchase: an empirical study of Chinese third-party logistics users
    Shi, Yangyan
    Zhang, Abraham
    Arthanari, Tiru
    Liu, Yanping
    INTERNATIONAL JOURNAL OF OPERATIONS & PRODUCTION MANAGEMENT, 2016, 36 (03) : 286 - 307
  • [36] Third-party punishers are rewarded, but third-party helpers even more so
    Raihani, Nichola J.
    Bshary, Redouan
    EVOLUTION, 2015, 69 (04) : 993 - 1003
  • [37] Real-time Security Verification Method for China Southern Regional Frequency Regulation Market Including Third-party Independent Entities
    Liu S.
    Lou N.
    Zhang H.
    Wang K.
    Fan Z.
    Yang L.
    Dianli Xitong Zidonghua/Automation of Electric Power Systems, 2024, 48 (11): : 153 - 161
  • [38] THIRD-PARTY LITIGATION FUNDING-TIME FOR A RETHINK?
    Corbett, Val
    IRISH JURIST, 2023, 69 (69)
  • [39] VAMOS: Middleware for best-effort third-party monitoring
    Chalupa, Marek
    Muehlboeck, Fabian
    Lei, Stefanie Muroya
    Henzinger, Thomas A.
    SCIENCE OF COMPUTER PROGRAMMING, 2025, 240
  • [40] Compliance Monitoring of Third-Party Applications in Online Social Networks
    Kelbert, Florian
    Fromm, Alexander
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), 2016, : 9 - 16