931 resultados para Steam-boiler inspection
Resumo:
The Sascha-Pelligrini low-sulphidation epithermal system is located on the western edge of the Deseado Massif, Santa Cruz Province, Argentina. Outcrop sampling has returned values of up to 160g/t gold and 796g/t silver, with Mirasol Resources and Coeur D.Alene Mines currently exploring the property. Detailed mapping of the volcanic stratigraphy has defined three units that comprise the middle Jurassic Chon Aike Formation and two units that comprise the upper Jurassic La Matilde Formation. The Chon Aike Formation consists of rhyodacite ignimbrites and tuffs, with the La Matilde Formation including rhyolite ash and lithic tuffs. The volcanic sequence is intruded by a large flow-banded rhyolite dome, with small, spatially restricted granodiorite dykes and sills cropping out across the study area. ASTER multispectral mineral mapping, combined with PIMA (Portable Infrared Mineral Analyser) and XRD (X-ray diffraction) analysis defines an alteration pattern that zones from laumontite-montmorillonite, to illite-pyritechlorite, followed by a quartz-illite-smectite-pyrite-adularia vein selvage. Supergene kaolinite and steam-heated acid-sulphate kaolinite-alunite-opal alteration horizons crop out along the Sascha Vein trend and Pelligrini respectively. Paragenetically, epithermal veining varies from chalcedonic to saccharoidal with minor bladed textures, colloform/crustiform-banded with visible electrum and acanthite, crustiform-banded grey chalcedonic to jasperoidal with fine pyrite, and crystalline comb quartz. Geothermometry of mineralised veins constrains formation temperatures from 174.8 to 205.1¡ÆC and correlates with the stability field for the interstratified illite-smectite vein selvage. Vein morphology, mineralogy and associated alteration are controlled by host rock rheology, permeability, and depth of the palaeo-water table. Mineralisation within ginguro banded veins resulted from fluctuating fluid pH associated with selenide-rich magmatic pulses, pressure release boiling and wall-rock silicate buffering. The study of the Sascha-Pelligrini epithermal system will form the basis for a deposit-specific model helping to clarify the current understanding of epithermal deposits, and may serve as a template for exploration of similar epithermal deposits throughout Santa Cruz.
Resumo:
It is widely contended that we live in a „world risk society‟, where risk plays a central and ubiquitous role in contemporary social life. A seminal contributor to this view is Ulrich Beck, who claims that our world is governed by dangers that cannot be calculated or insured against. For Beck, risk is an inherently unrestrained phenomenon, emerging from a core and pouring out from and under national borders, unaffected by state power. Beck‟s focus on risk's ubiquity and uncontrollability at an infra-global level means that there is a necessary evenness to the expanse of risk: a "universalization of hazards‟, which possess an inbuilt tendency towards globalisation. While sociological scholarship has examined the reach and impact of globalisation processes on the role and power of states, Beck‟s argument that economic risk is without territory and resistant to domestic policy has come under less appraisal. This is contestable: what are often described as global economic processes, on closer inspection, reveal degrees of territorial embeddedness. This not only suggests that "global‟ flows could sometimes be more appropriately explained as international, regional or even local processes, formed from and responsive to state strategies – but also demonstrates what can be missed if we overinflate the global. This paper briefly introduces two key principles of Beck's theory of risk society and positions them within a review of literature debating the novelty and degree of global economic integration and its impact on states pursuing domestic economic policies. In doing so, this paper highlights the value for future research to engage with questions such as "is economic risk really without territory‟ and "does risk produce convergence‟, not so much as a means of reducing Beck's thesis to a purely empirical analysis, but rather to avoid limiting our scope in understanding the complex relationship between risk and state.
Resumo:
In this paper, we present a control strategy design technique for an autonomous underwater vehicle based on solutions to the motion planning problem derived from differential geometric methods. The motion planning problem is motivated by the practical application of surveying the hull of a ship for implications of harbor and port security. In recent years, engineers and researchers have been collaborating on automating ship hull inspections by employing autonomous vehicles. Despite the progresses made, human intervention is still necessary at this stage. To increase the functionality of these autonomous systems, we focus on developing model-based control strategies for the survey missions around challenging regions, such as the bulbous bow region of a ship. Recent advances in differential geometry have given rise to the field of geometric control theory. This has proven to be an effective framework for control strategy design for mechanical systems, and has recently been extended to applications for underwater vehicles. Advantages of geometric control theory include the exploitation of symmetries and nonlinearities inherent to the system. Here, we examine the posed inspection problem from a path planning viewpoint, applying recently developed techniques from the field of differential geometric control theory to design the control strategies that steer the vehicle along the prescribed path. Three potential scenarios for surveying a ship?s bulbous bow region are motivated for path planning applications. For each scenario, we compute the control strategy and implement it onto a test-bed vehicle. Experimental results are analyzed and compared with theoretical predictions.
Resumo:
Bridges are valuable assets of every nation. They deteriorate with age and often are subjected to additional loads or different load patterns than originally designed for. These changes in loads can cause localized distress and may result in bridge failure if not corrected in time. Early detection of damage and appropriate retrofitting will aid in preventing bridge failures. Large amounts of money are spent in bridge maintenance all around the world. A need exists for a reliable technology capable of monitoring the structural health of bridges, thereby ensuring they operate safely and efficiently during the whole intended lives. Monitoring of bridges has been traditionally done by means of visual inspection. Visual inspection alone is not capable of locating and identifying all signs of damage, hence a variety of structural health monitoring (SHM) techniques is used regularly nowadays to monitor performance and to assess condition of bridges for early damage detection. Acoustic emission (AE) is one technique that is finding an increasing use in SHM applications of bridges all around the world. The chapter starts with a brief introduction to structural health monitoring and techniques commonly used for monitoring purposes. Acoustic emission technique, wave nature of AE phenomenon, previous applications and limitations and challenges in the use as a SHM technique are also discussed. Scope of the project and work carried out will be explained, followed by some recommendations of work planned in future.
Resumo:
Autonomous mini-helicopters have been seen as a viable option for aerial-based powerline inspections, however there are numerous research and engineering challenges in developing a system capable of achieving this task in a dependable manner. We have developed an autonomous helicopter as a research platform which will allow us to demonstrate proof-of-concept capabilities for powerline inspections. Through numerous development cycles and from flight test experience we have gained insights into the key challenges in this area. We discuss these insights, describe the helicopter platform and present our research progress in the area of obstacle avoidance for mini-helicopters.
Resumo:
Previous research has shown the association between stress and crash involvement. The impact of stress on road safety may also be mediated by behaviours including cognitive lapses, errors, and intentional traffic violations. This study aimed to provide a further understanding of the impact that stress from different sources may have upon driving behaviour and road safety. It is asserted that both stress extraneous to the driving environment and stress directly elicited by driving must be considered part of a dynamic system that may have a negative impact on driving behaviours. Two hundred and forty-seven public sector employees from Queensland, Australia, completed self-report measures examining demographics, subjective work-related stress, daily hassles, and aspects of general mental health. Additionally, the Driver Behaviour Questionnaire (DBQ) and the Driver Stress Inventory (DSI) were administered. All participants drove for work purposes regularly, however the study did not specifically focus on full-time professional drivers. Confirmatory factor analysis of the predictor variables revealed three factors: DSI negative affect; DSI risk taking; and extraneous influences (daily hassles, work-related stress, and general mental health). Moderate intercorrelations were found between each of these factors confirming the ‘spillover’ effect. That is, driver stress is reciprocally related to stress in other domains including work and domestic life. Structural equation modelling (SEM) showed that the DSI negative affect factor influenced both lapses and errors, whereas the DSI risk-taking factor was the strongest influence on violations. The SEMs also confirmed that daily hassles extraneous to the driving environment may influence DBQ lapses and violations independently. Accordingly, interventions may be developed to increase driver awareness of the dangers of excessive emotional responses to both driving events and daily hassles (e.g. driving fast to ‘blow off steam’ after an argument). They may also train more effective strategies for self-regulation of emotion and coping when encountering stressful situations on the road.
Resumo:
Different from conventional methods for structural reliability evaluation, such as, first/second-order reliability methods (FORM/SORM) or Monte Carlo simulation based on corresponding limit state functions, a novel approach based on dynamic objective oriented Bayesian network (DOOBN) for prediction of structural reliability of a steel bridge element has been proposed in this paper. The DOOBN approach can effectively model the deterioration processes of a steel bridge element and predict their structural reliability over time. This approach is also able to achieve Bayesian updating with observed information from measurements, monitoring and visual inspection. Moreover, the computational capacity embedded in the approach can be used to facilitate integrated management and maintenance optimization in a bridge system. A steel bridge girder is used to validate the proposed approach. The predicted results are compared with those evaluated by FORM method.
Resumo:
Asset health inspections can produce two types of indicators: (1) direct indicators (e.g. the thickness of a brake pad, and the crack depth on a gear) which directly relate to a failure mechanism; and (2) indirect indicators (e.g. the indicators extracted from vibration signals and oil analysis data) which can only partially reveal a failure mechanism. While direct indicators enable more precise references to asset health condition, they are often more difficult to obtain than indirect indicators. The state space model provides an efficient approach to estimating direct indicators by using indirect indicators. However, existing state space models to estimate direct indicators largely depend on assumptions such as, discrete time, discrete state, linearity, and Gaussianity. The discrete time assumption requires fixed inspection intervals. The discrete state assumption entails discretising continuous degradation indicators, which often introduces additional errors. The linear and Gaussian assumptions are not consistent with nonlinear and irreversible degradation processes in most engineering assets. This paper proposes a state space model without these assumptions. Monte Carlo-based algorithms are developed to estimate the model parameters and the remaining useful life. These algorithms are evaluated for performance using numerical simulations through MATLAB. The result shows that both the parameters and the remaining useful life are estimated accurately. Finally, the new state space model is used to process vibration and crack depth data from an accelerated test of a gearbox. During this application, the new state space model shows a better fitness result than the state space model with linear and Gaussian assumption.
Resumo:
Due to the limitation of current condition monitoring technologies, the estimates of asset health states may contain some uncertainties. A maintenance strategy ignoring this uncertainty of asset health state can cause additional costs or downtime. The partially observable Markov decision process (POMDP) is a commonly used approach to derive optimal maintenance strategies when asset health inspections are imperfect. However, existing applications of the POMDP to maintenance decision-making largely adopt the discrete time and state assumptions. The discrete-time assumption requires the health state transitions and maintenance activities only happen at discrete epochs, which cannot model the failure time accurately and is not cost-effective. The discrete health state assumption, on the other hand, may not be elaborate enough to improve the effectiveness of maintenance. To address these limitations, this paper proposes a continuous state partially observable semi-Markov decision process (POSMDP). An algorithm that combines the Monte Carlo-based density projection method and the policy iteration is developed to solve the POSMDP. Different types of maintenance activities (i.e., inspections, replacement, and imperfect maintenance) are considered in this paper. The next maintenance action and the corresponding waiting durations are optimized jointly to minimize the long-run expected cost per unit time and availability. The result of simulation studies shows that the proposed maintenance optimization approach is more cost-effective than maintenance strategies derived by another two approximate methods, when regular inspection intervals are adopted. The simulation study also shows that the maintenance cost can be further reduced by developing maintenance strategies with state-dependent maintenance intervals using the POSMDP. In addition, during the simulation studies the proposed POSMDP shows the ability to adopt a cost-effective strategy structure when multiple types of maintenance activities are involved.
Resumo:
Data preprocessing is widely recognized as an important stage in anomaly detection. This paper reviews the data preprocessing techniques used by anomaly-based network intrusion detection systems (NIDS), concentrating on which aspects of the network traffic are analyzed, and what feature construction and selection methods have been used. Motivation for the paper comes from the large impact data preprocessing has on the accuracy and capability of anomaly-based NIDS. The review finds that many NIDS limit their view of network traffic to the TCP/IP packet headers. Time-based statistics can be derived from these headers to detect network scans, network worm behavior, and denial of service attacks. A number of other NIDS perform deeper inspection of request packets to detect attacks against network services and network applications. More recent approaches analyze full service responses to detect attacks targeting clients. The review covers a wide range of NIDS, highlighting which classes of attack are detectable by each of these approaches. Data preprocessing is found to predominantly rely on expert domain knowledge for identifying the most relevant parts of network traffic and for constructing the initial candidate set of traffic features. On the other hand, automated methods have been widely used for feature extraction to reduce data dimensionality, and feature selection to find the most relevant subset of features from this candidate set. The review shows a trend toward deeper packet inspection to construct more relevant features through targeted content parsing. These context sensitive features are required to detect current attacks.
Resumo:
Background: Distal-to-proximal technique has been recommended for anti-cancer therapy administration. There is no evidence to suggest that a 24-hour delay of treatment is necessary for patients with a previous uncomplicated venous puncture proximal to the administration site. Objectives: This study aims to identify if the practice of 24-hour delay between a venous puncture and subsequent cannulation for anti-cancer therapies at a distal site is necessary for preventing extravasation. Methods: A prospective cohort study was conducted with 72 outpatients receiving anti-cancer therapy via an administration site distal to at least one previous uncomplicated venous puncture on the same arm in a tertiary cancer centre in Australia. Participants were interviewed and assessed at baseline data before treatment and on day 7 for incidence of extravasation/phlebitis. Results: Of 72 participants with 99 occasions of treatment, there was one incident of infiltration (possible extravasation) at the venous puncture site proximal to the administration site and two incidents of phlebitis at the administration site. Conclusions: A 24 hour delay is unnecessary if an alternative vein can be accessed for anti-cancer therapy after a proximal venous puncture. Implications for practice: Extravasation can occur at a venous puncture site proximal to an administration site in the same vein. However, the nurse can administer anti-cancer therapy at a distal site if the nurse can confidently determine the vein of choice is not in any way connected to the previous puncture site through visual inspection and palpation.
Resumo:
Trees, shrubs and other vegetation are of continued importance to the environment and our daily life. They provide shade around our roads and houses, offer a habitat for birds and wildlife, and absorb air pollutants. However, vegetation touching power lines is a risk to public safety and the environment, and one of the main causes of power supply problems. Vegetation management, which includes tree trimming and vegetation control, is a significant cost component of the maintenance of electrical infrastructure. For example, Ergon Energy, the Australia’s largest geographic footprint energy distributor, currently spends over $80 million a year inspecting and managing vegetation that encroach on power line assets. Currently, most vegetation management programs for distribution systems are calendar-based ground patrol. However, calendar-based inspection by linesman is labour-intensive, time consuming and expensive. It also results in some zones being trimmed more frequently than needed and others not cut often enough. Moreover, it’s seldom practicable to measure all the plants around power line corridors by field methods. Remote sensing data captured from airborne sensors has great potential in assisting vegetation management in power line corridors. This thesis presented a comprehensive study on using spiking neural networks in a specific image analysis application: power line corridor monitoring. Theoretically, the thesis focuses on a biologically inspired spiking cortical model: pulse coupled neural network (PCNN). The original PCNN model was simplified in order to better analyze the pulse dynamics and control the performance. Some new and effective algorithms were developed based on the proposed spiking cortical model for object detection, image segmentation and invariant feature extraction. The developed algorithms were evaluated in a number of experiments using real image data collected from our flight trails. The experimental results demonstrated the effectiveness and advantages of spiking neural networks in image processing tasks. Operationally, the knowledge gained from this research project offers a good reference to our industry partner (i.e. Ergon Energy) and other energy utilities who wants to improve their vegetation management activities. The novel approaches described in this thesis showed the potential of using the cutting edge sensor technologies and intelligent computing techniques in improve power line corridor monitoring. The lessons learnt from this project are also expected to increase the confidence of energy companies to move from traditional vegetation management strategy to a more automated, accurate and cost-effective solution using aerial remote sensing techniques.
Resumo:
Many existing schemes for malware detection are signature-based. Although they can effectively detect known malwares, they cannot detect variants of known malwares or new ones. Most network servers do not expect executable code in their in-bound network traffic, such as on-line shopping malls, Picasa, Youtube, Blogger, etc. Therefore, such network applications can be protected from malware infection by monitoring their ports to see if incoming packets contain any executable contents. This paper proposes a content-classification scheme that identifies executable content in incoming packets. The proposed scheme analyzes the packet payload in two steps. It first analyzes the packet payload to see if it contains multimedia-type data (such as . If not, then it classifies the payload either as text-type (such as or executable. Although in our experiments the proposed scheme shows a low rate of false negatives and positives (4.69% and 2.53%, respectively), the presence of inaccuracies still requires further inspection to efficiently detect the occurrence of malware. In this paper, we also propose simple statistical and combinatorial analysis to deal with false positives and negatives.