Application of Extreme Value Analysis to Corrosion Mapping Data

نویسنده

  • Charles SCHNEIDER
چکیده

Extreme Value Analysis can be used to extrapolate sample inspection data into uninspected regions of a component. These methods can be used in conjunction with structural reliability software to predict the probability of future failure of the component. This information can help both operators and regulators make risk-based decisions on the future operation of the plant. This paper illustrates the approach with reference to a case study, based on data collected from a pipeline system in an oil platform using an ultrasonic corrosion mapping technique. Part of the pipeline system was inaccessible for inspection. In this region, therefore, it was necessary to estimate the condition of the pipe based on sample inspections in the accessible area. This was done by partitioning the pipe surface into rectangular blocks and fitting statistical distributions to the minimum wall thicknesses in these blocks. These ‘extreme value’ distributions were used to theoretically derive the corresponding distributions in the inaccessible part of the system. Structural reliability software was then used to predict the probability of future leakage. Analytic approximations were used both to verify the software and to estimate confidence limits for the predicted probabilities. The analysis showed that, for the majority of the line, the risk of leakage within its planned lifetime was negligible. However, the work highlighted the need for a better understanding of the rate of corrosion in two particular regions. As a result, a small number of ultrasonic transducers were permanently attached to these two sections of pipe. These transducers have yielded further information on the subsequent rate of corrosion. The paper will examine the assumptions underlying the analysis. It will discuss how the effect of correlation between neighbouring data points, known as data ‘clustering’, can be assessed and mitigated against. It will also provide guidance on assessing the goodness-of-fit to the distributions used.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Application of Extreme Value Statistics to Corrosion

Department of Materials Science and Processing, -Faculty of Engineering, Osaka University, 2-1 Yamadaoka, Suita 565 JAPAN Application of extreme value stati'iiics to corrosion is rcvieweJ. It is cmpha sized that the concept of corroiiion probability is important for a quanlitalivc evaluatioti Of corrosion failure and its prediction, especially for localized corrosion. Extreme value statistics i...

متن کامل

The application of Extreme value analysis method in heat wave hazard climatology; case study in Mid-Southern Iran

The application of Extreme value analysis method in heat wave hazard climatology; case study in Mid-Southern Iran Abstract Greenhouse warming poses the main cause of atmospheric hazards’ exacerbation and emergence in recent years. Earth planet has been witnessing frequent and severe natural hazards from the distant past; however, global warming has strongly influenced the occurrence of some a...

متن کامل

Estimation for the Type-II Extreme Value Distribution Based on Progressive Type-II Censoring

In this paper, we discuss the statistical inference on the unknown parameters and reliability function of type-II extreme value (EVII) distribution when the observed data are progressively type-II censored. By applying EM algorithm, we obtain maximum likelihood estimates (MLEs). We also suggest approximate maximum likelihood estimators (AMLEs), which have explicit expressions. We provide Bayes ...

متن کامل

Models for dependent extremes using stable mixtures Running/short title: Models for dependent extremes

Abstract: This paper unifies and extends results on a class of multivariate Extreme Value (EV) models studied by Hougaard, Crowder, and Tawn. In these models both unconditional and conditional distributions are EV, and all lower-dimensional marginals and maxima belong to the class. This leads to substantial economies of understanding, analysis and prediction. One interpretation of the models is...

متن کامل

A Hybrid Machine Learning Method for Intrusion Detection

Data security is an important area of concern for every computer system owner. An intrusion detection system is a device or software application that monitors a network or systems for malicious activity or policy violations. Already various techniques of artificial intelligence have been used for intrusion detection. The main challenge in this area is the running speed of the available implemen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009