994 resultados para LEAK DETECTION


Relevância:

60.00% 60.00%

Publicador:

Resumo:

El presente proyecto trata de un estudio de las distintas técnicas de monitorización superficial para la caracterización de fugas en un análogo natural. Tiene como objetivo la extrapolación de los resultados a un sistema de almacenamiento geológico de CO2. Para ello, se realizaron medidas en el área del análogo y sus alrededores para analizar la capacidad de detección de fuga de cada instrumento. A partir de esas mediciones y de las propiedades técnicas y económicas de cada método de monitorización, se determinó cuáles son los más recomendables para utilizar en una campaña inicial, de investigación o de seguimiento de caracterización superficial de un futuro sistema de almacenamiento. ABSTRACT This project is about the study of the different types of superficial monitoring techniques for the leakage characterization in a natural analogue. It aims to extrapolate the results to a geological storage system of CO2. For that purpose, measurements were made in the surrounding area of the analogue to analyze the ability of each leak detection instrument. From these measurements and the technical-economics features of each monitoring method, we established what are the most suitable for use in an initial, research or follow-up campaign of surface characterization of a future storage system.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Identifying water wastage in forms of leaks in a water distribution network of any city becomes essential as droughts are presenting serious threats to few major cities. In this paper, we propose a deployment of sensor network for monitoring water flow in any water distribution network. We cover the issues related with designing such a dedicated sensor network by considering types of sensors required, sensors' functionality, data collection, and providing computation serving as leak detection mechanism. The main focus of this paper is on appropriate network segmentation that provides the base for hierarchical approach to pipes' failure detection. We show a method for sensors allocation to the network in order to facilitate effective pipes monitoring. In general, the identified computational problem belongs to hard problems. The paper shows a heuristic method to build effective hierarchy of the network segmentation.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

The transport of fluids through pipes is used in the oil industry, being the pipelines an important link in the logistics flow of fluids. However, the pipelines suffer deterioration in their walls caused by several factors which may cause loss of fluids to the environment, justifying the investment in techniques and methods of leak detection to minimize fluid loss and environmental damage. This work presents the development of a supervisory module in order to inform to the operator the leakage in the pipeline monitored in the shortest time possible, in order that the operator log procedure that entails the end of the leak. This module is a component of a system designed to detect leaks in oil pipelines using sonic technology, wavelets and neural networks. The plant used in the development and testing of the module presented here was the system of tanks of LAMP, and its LAN, as monitoring network. The proposal consists of, basically, two stages. Initially, assess the performance of the communication infrastructure of the supervisory module. Later, simulate leaks so that the DSP sends information to the supervisory performs the calculation of the location of leaks and indicate to which sensor the leak is closer, and using the system of tanks of LAMP, capture the pressure in the pipeline monitored by piezoresistive sensors, this information being processed by the DSP and sent to the supervisory to be presented to the user in real time

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This article presents a novel approach to confidentiality violation detection based on taint marking. Information flows are dynamically tracked between applications and objects of the operating system such as files, processes and sockets. A confidentiality policy is defined by labelling sensitive information and defining which information may leave the local system through network exchanges. Furthermore, per application profiles can be defined to restrict the sets of information each application may access and/or send through the network. In previous works, we focused on the use of mandatory access control mechanisms for information flow tracking. In this current work, we have extended the previous information flow model to track network exchanges, and we are able to define a policy attached to network sockets. We show an example application of this extension in the context of a compromised web browser: our implementation detects a confidentiality violation when the browser attempts to leak private information to a remote host over the network.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fossil fuel power generation and other industrial emissions of carbon dioxide are a threat to global climate1, yet many economies will remain reliant on these technologies for several decades2. Carbon dioxide capture and storage (CCS) in deep geological formations provides an effective option to remove these emissions from the climate system3. In many regions storage reservoirs are located offshore4, 5, over a kilometre or more below societally important shelf seas6. Therefore, concerns about the possibility of leakage7, 8 and potential environmental impacts, along with economics, have contributed to delaying development of operational CCS. Here we investigate the detectability and environmental impact of leakage from a controlled sub-seabed release of CO2. We show that the biological impact and footprint of this small leak analogue (<1 tonne CO2 d−1) is confined to a few tens of metres. Migration of CO2 through the shallow seabed is influenced by near-surface sediment structure, and by dissolution and re-precipitation of calcium carbonate naturally present in sediments. Results reported here advance the understanding of environmental sensitivity to leakage and identify appropriate monitoring strategies for full-scale carbon storage operations.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Fossil fuel power generation and other industrial emissions of carbon dioxide are a threat to global climate1, yet many economies will remain reliant on these technologies for several decades2. Carbon dioxide capture and storage (CCS) in deep geological formations provides an effective option to remove these emissions from the climate system3. In many regions storage reservoirs are located offshore4, 5, over a kilometre or more below societally important shelf seas6. Therefore, concerns about the possibility of leakage7, 8 and potential environmental impacts, along with economics, have contributed to delaying development of operational CCS. Here we investigate the detectability and environmental impact of leakage from a controlled sub-seabed release of CO2. We show that the biological impact and footprint of this small leak analogue (<1 tonne CO2 d−1) is confined to a few tens of metres. Migration of CO2 through the shallow seabed is influenced by near-surface sediment structure, and by dissolution and re-precipitation of calcium carbonate naturally present in sediments. Results reported here advance the understanding of environmental sensitivity to leakage and identify appropriate monitoring strategies for full-scale carbon storage operations.