Abstract
With the accelerated development of marine engineering, a growing number of marine structures are being constructed (e.g., seabed pipelines, drilling platforms, oil platforms, wind turbines). However, seismic field investigations over recent decades have shown that many marine structures [...]Abstract
This paper describes the development of a five degree of freedom towed underwater vehicle designed for condition monitoring of undersea pipelines. Its innovative design, with 6 fins actuated by 5 motors adding heave and sway capabilities to the yaw, roll and pitch movements possible [...]Abstract
Document type: Part of book or chapter of bookAbstract
Regular inspection of underwater communications (pipelines and cables) is actual problem of modern oil and gas industry. Specially equipped vessels, towed underwater devices and remote operated vehicles /ROV/ are applied for these purposes as usually, but quality of acquired data [...]Abstract
Internal inspection of pipelines is an important tool for ensuring safe and reliable delivery of fossil energy products. Current inspection systems that are propelled through the pipeline by the product flow cannot be used to inspect all pipelines because of the various physical barriers [...]Abstract
ITT Industries Space Systems Division (Space Systems) has developed an airborne natural gas leak detection system designed to detect, image, quantify, and precisely locate leaks from natural gas transmission pipelines. This system is called the Airborne Natural Gas Emission Lidar [...]Abstract
The U.S. Department of Energy, National Energy Technology Laboratory funded a Natural Gas Infrastructure Reliability program directed at increasing and enhancing research and development activities in topics such as remote leak detection, pipe inspection, and repair technologies and [...]Abstract
Uncontained, high-energy gas turbine engine fragments are a potential threat to air-transportable containers carried aboard jet aircraft. The threat to a generic example container is evaluated by probability analyses and penetration testing to demonstrate the methodology to be used [...]