Pipe to Pipe to Pipe

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

In-Pipe Inspection Crawler Adaptable to the Pipe interior Diameter

One of the most important requirements of repairing and maintaining of pipelines is the ability to monitor and evaluate the pipe’s interior. In this paper, a novel apparatus to traverse pipes is introduced. The mechanism employs three independent rubber track units which are circumferentially spaced out 120 degree apart symmetrically. The apparatus employs an active mode to adapt to a wide rang...

متن کامل

Global opportunities in Pipe in Pipe technology

An extensive product range is mandatory to be a key player in the pipe insulation market. The polyurethane preinsulated pipe producers are responding to global opportunities by diversifying their activities into industrial, marine, oil and gas applications. Moreover, the requirements for traditional district heating preinsulated pipes including initial thermal conductivity and its ageing perfor...

متن کامل

Response of a polyvinyl chloride water pipe when transverse to an underlying pipe replaced by pipe bursting

An existing deteriorated or hydraulically undersized pipe can be replaced with a new pipe by static pipe bursting. Cavity expansion during pipe bursting induces ground movements, which may potentially damage nearby buried utilities if they are in close proximity to the pipe bursting operation. A large-scale pipe bursting experiment was performed in an 8 m long, 8 m wide, and 3 m deep test pit f...

متن کامل

Why narrow-pipe cryptographic hash functions are not a match to wide-pipe cryptographic hash functions?

In the last 7-8 months me and Klima have discovered several deficiencies of narrow-pipe cryptographic hash designs. It all started with a note to the hash-forum list that narrow-pipe hash functions are giving outputs that are pretty different than the output that we would expect from a random oracle that is mapping messages of arbitrary length to hash values of n-bits. Then together with Klima ...

متن کامل

vPipe: One Pipe to Connect Them All!

Many enterprises use the cloud to host applications such as web services, big data analytics and storage. One common characteristic among these applications is that, they involve significant I/O activities, moving data from a source to a sink, often without even any intermediate processing. However, cloud environments tend to be virtualized in nature with tenants obtaining virtual machines (VMs...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal - American Water Works Association

سال: 2015

ISSN: 0003-150X

DOI: 10.1002/j.1551-8833.2015.tb11104.x