Analyzing the Effectiveness of Prevention Measures for Third-Party Damage to Underground Pipelines Using a Hierarchical Fault Tree Model

Author(s):  
Dongliang Lu ◽  
Mark Stephens

This paper presents a hierarchical fault tree model for analyzing the effectiveness of measures for the prevention of third-party mechanical damage to underground pipelines. The model consists of a high level failure model that provides an overall indication of the effectiveness of a damage prevention program; and lower level fault tree models that detail the effectiveness of individual damage prevention measures. The model developed in this paper is consistent with current damage prevention and data collection practices, and it presents information in a simple and intuitive format that facilitates analysis and interpretation. The hierarchical fault tree approach developed in this paper is shown to be a useful tool for evaluating the effectiveness of various measures to prevent third-party damage and for identifying weak links in current damage management practices. It can also serve to inform the development of new damage prevention techniques and to identify information priorities relevant for future data collection and interpretation efforts aimed at reducing the frequency of third-party damage events.

Author(s):  
Qishi Chen ◽  
Kimbra Davis ◽  
Curtis Parker

Managing actual or perceived risk in today’s environment is the concern of every industry and government. For oil and gas pipelines, prevention of mechanical interference by excavation equipment is one of the most effective ways to reduce incidents and to manage operating risk. A common technique used to manage reliability, risk and safety is the fault tree method. In general terms, a fault tree model identifies important events and combinations of events, with respect to system reliability, to estimate the likelihood of system failures. When applied to damage prevention, the fault tree forms a logical representation of the manner in which the combined fault effects associated with individual prevention measures could lead to a hypothesized failure of an operator’s damage prevention program. The model presented in this paper considers performance factors such as signage, patrols, one-call practices, excavation techniques, public awareness programs and new damage prevention technologies.


Author(s):  
Joseph S. Santarelli ◽  
Wenxing Zhou ◽  
Carrie Dudley-Tatsu

Third-party damage (TPD) is any damage to underground infrastructure that occurs during work unrelated to the asset. In 2015, there were 10,107 TPD incidents in Canada causing over a billion dollars in estimated damage. TPD is the leading cause of failure for distribution gas pipelines; since distribution pipelines are generally located in areas with high population densities, TPD has significant safety and economic implications. In this study, a probabilistic model is developed to qualify the probability of failure of distribution pipelines due to TPD. The model consists of a fault tree model to quantify the probability of hit given the occurrence of third-party excavation activities and the methodology to evaluate the probability of failure given hit. Fault tree analysis (FTA) is a top down, deductive failure analysis method which uses Boolean logic to combine a series of basic events to analyze the state of a system. Earlier prior research demonstrated the ability of a FTA to quantify the probability of TPD occurring on natural gas transmission pipeline systems. These models allow for a quantitative analysis of preventative measures and, in conjunction with current practices, facilitate a predictive method to plan and optimize resource allocation for damage mitigation and emergency preparedness. The developed TPD model is validated using the data provided from a region in Southwest Ontario. The model will provide distribution companies with a practical tool to identify third-party damage hot spots, develop proactive third-party damage prevention measures, and prioritize damage repair activities using a risk-based approach.


2013 ◽  
Vol 411-414 ◽  
pp. 2527-2532 ◽  
Author(s):  
Li Xin Wei ◽  
Li Yan Han

The third-party damage is the main factor of Daqing-Harbin oil pipeline failure. This paper analyzes a variety of factors causing the third-party damage, and establishes the fault tree model. By analyzing the minimal cut set and structures importance degree of fault tree, the main factors of the third-party damage that caused pipeline failure are determined. The main factors are as follows: Lack of pipeline conditions, human vandalism, the frequency of line patrol and management systems, lack of public education and the legal concept, and construction operation injury. On the basis of analyzing the factors, the precautions of the third-party interference are proposed.


2021 ◽  
Author(s):  
Yue Wu ◽  
Zhaojun Yang ◽  
Jili Wang ◽  
Wei Hu ◽  
N. Balakrishnan

Abstract In Takagi and Sugeno (T–S) fuzzy fault tree analysis (FFTA), the construction of T-S fuzzy gates relies too much on expert experience, which will result in inevitable subjective errors. In order to overcome this disadvantage, a new method was proposed which combined importance index with T-S fuzzy fault tree model to evaluate reliability of the events. The importance index of components can be solved through Monte Carlo (MC) simulation. The proposed method is suitable for systems where exact information on the fault probabilities of the components and the magnitude of failure and effect on system are not available. The concept and calculation method of T-S probability importance was presented. Finally, the feasibility of the method is verified by analyzing the reliability of the sealing subsystem of the NC turret and the weak links of the system are obtained by the importance analysis, which will provide data for system fault diagnosis and preventive maintenance.


2015 ◽  
Vol 4 (2) ◽  
pp. 203-213 ◽  
Author(s):  
M. B. Krassovski ◽  
J. S. Riggs ◽  
L. A. Hook ◽  
W. R. Nettles ◽  
P. J. Hanson ◽  
...  

Abstract. Ecosystem-scale manipulation experiments represent large science investments that require well-designed data acquisition and management systems to provide reliable, accurate information to project participants and third party users. The SPRUCE project (Spruce and Peatland Responses Under Climatic and Environmental Change, http://mnspruce.ornl.gov) is such an experiment funded by the Department of Energy's (DOE), Office of Science, Terrestrial Ecosystem Science (TES) Program. The SPRUCE experimental mission is to assess ecosystem-level biological responses of vulnerable, high carbon terrestrial ecosystems to a range of climate warming manipulations and an elevated CO2 atmosphere. SPRUCE provides a platform for testing mechanisms controlling the vulnerability of organisms, biogeochemical processes, and ecosystems to climatic change (e.g., thresholds for organism decline or mortality, limitations to regeneration, biogeochemical limitations to productivity, and the cycling and release of CO2 and CH4 to the atmosphere). The SPRUCE experiment will generate a wide range of continuous and discrete measurements. To successfully manage SPRUCE data collection, achieve SPRUCE science objectives, and support broader climate change research, the research staff has designed a flexible data system using proven network technologies and software components. The primary SPRUCE data system components are the following: 1. data acquisition and control system – set of hardware and software to retrieve biological and engineering data from sensors, collect sensor status information, and distribute feedback to control components; 2. data collection system – set of hardware and software to deliver data to a central depository for storage and further processing; 3. data management plan – set of plans, policies, and practices to control consistency, protect data integrity, and deliver data. This publication presents our approach to meeting the challenges of designing and constructing an efficient data system for managing high volume sources of in situ observations in a remote, harsh environmental location. The approach covers data flow starting from the sensors and ending at the archival/distribution points, discusses types of hardware and software used, examines design considerations that were used to choose them, and describes the data management practices chosen to control and enhance the value of the data.


Author(s):  
M. B. Krassovski ◽  
J. S. Riggs ◽  
L. A. Hook ◽  
W. R. Nettles ◽  
P. J. Hanson ◽  
...  

Abstract. Ecosystem-scale manipulation experiments represent large science investments that require well-designed data acquisition and management systems to provide reliable, accurate information to project participants and third party users. The SPRUCE Project (Spruce and Peatland Responses Under Climatic and Environmental Change, http://mnspruce.ornl.gov) is such an experiment funded by the Department of Energy's (DOE), Office of Science, Terrestrial Ecosystem Science (TES) Program. The SPRUCE experimental mission is to assess ecosystem-level biological responses of vulnerable, high carbon terrestrial ecosystems to a range of climate warming manipulations and an elevated CO2 atmosphere. SPRUCE provides a platform for testing mechanisms controlling the vulnerability of organisms, biogeochemical processes, and ecosystems to climatic change (e.g., thresholds for organism decline or mortality, limitations to regeneration, biogeochemical limitations to productivity, the cycling and release of CO2 and CH4 to the atmosphere). The SPRUCE experiment will generate a wide range of continuous and discrete measurements. To successfully manage SPRUCE data collection, achieve SPRUCE science objectives, and support broader climate change research, the research staff has designed a flexible data system using proven network technologies and software components. The primary SPRUCE data system components are: 1. Data acquisition and control system – set of hardware and software to retrieve biological and engineering data from sensors, collect sensor status information, and distribute feedback to control components. 2. Data collection system – set of hardware and software to deliver data to a central depository for storage and further processing. 3. Data management plan – set of plans, policies, and practices to control consistency, protect data integrity, and deliver data. This publication presents our approach to meeting the challenges of designing and constructing an efficient data system for managing high volume sources of in-situ observations in a remote, harsh environmental location. The approach covers data flow starting from the sensors and ending at the archival/distribution points, discusses types of hardware and software used, examines design considerations that were used to choose them, and describes the data management practices chosen to control and enhance the value of the data.


1992 ◽  
Vol 26 (5-6) ◽  
pp. 1411-1420 ◽  
Author(s):  
S. H. Choudhury ◽  
S. L. Yu ◽  
Y. Y. Haimes

This paper presents an integrated methodology that allows determining the probability of noncompliance for a given wastewater treatment plant. The methodology applies fault-tree analysis, which uses failure probabilities of individual components, to predict the overall system failure probability. The methodology can be divided into two parts : risk identification and risk quantification. In risk identification, the key components in the system are determined by analyzing the contribution of individual component failures toward system failure (i.e., noncompliance). In risk quantification, a fault-tree model is constructed for the particular system, component failure probabilities are estimated, and the fault-tree model is evaluated to determine the probability of occurrence of the top event (i.e., noncompliance). A list can be developed that ranks critical events on the basis of their contributions to the probability of noncompliance. Such a ranking should assist managers to determine which components require most attention for a better performance of the entire system. A wastewater treatment plant for treating metal-bearing rinse water from an electroplating industry is used as an example to demonstrate the application of this methodology.


2013 ◽  
Vol 19 (3) ◽  
pp. 326-334 ◽  
Author(s):  
Caitlyn Davis-McDaniel ◽  
Mashrur Chowdhury ◽  
Weichiang Pang ◽  
Kakan Dey

Author(s):  
Abu Hanifa Md. Noman ◽  
Md. Amzad Hossain ◽  
Sajeda Pervin

Objective - The study aims to investigate credit risk management practices and credit risk management strategies of the local private commercial banks in Bangladesh. Methodology -The investigation is conducted based on primary data collected from a set of both closed end and open end questionnaire from 23 out of 39 local private commercial banks in Bangladesh. Descriptive statistics has been used in processing the data and interpreting the results. Findings - The results reveal that credit risk management practice of the sample banks is sound which is attributed to the appropriate implementation of Basel II and credit risk management guidelines the country's central bank. The findings further show that use of Credit risk grading is most popular and effective criteria for measuring the borrowing capacity of the borrowers. In order to control credit risk and preventing losses from credit exposure banks give more focus on collateralization, accurate loan pricing and third party guarantee. Loan is monitored properly and credit reminder is given to the client if principal and interest remain outstanding for three months. The study further reveals that lack of experienced and trained credit officers, lack of genuine market information and Lack of awareness regarding non-genuine borrower are the most important problems of current credit risk management practices in Bangladesh. Novelty - To the best of the knowledge of the authors the study is the first that investigates credit risk management strategies of private commercial banks, especially on Bangladesh. Type of Paper - Empirical Keyword : Bangladesh; Commercial Bank; Credit risk; Credit risk management; Credit risk management strategies.


2017 ◽  
Vol 590-591 ◽  
pp. 80-91 ◽  
Author(s):  
H. Landquist ◽  
L. Rosén ◽  
A. Lindhe ◽  
T. Norberg ◽  
I.-M. Hassellöv

Sign in / Sign up

Export Citation Format

Share Document