Rational Stress Limits and Load Factors for Finite Element Analyses in Pipeline Applications: Part III — Elastic-Plastic Load Factor Development

Author(s):  
Rhett Dotson ◽  
Chris Alexander ◽  
Ashwin Iyer ◽  
Al Gourlie ◽  
Richard Kania

In this paper, a methodology is presented to develop load factors for use in elastic-plastic assessments of pipelines and their components. The load factors are based on the pipe material properties and the ASME pipeline code’s design margin for the service and location of the pipeline installation [1, 2]. These codes are recognized by 49 CFR 192 and 195 [3, 4]. Minimum required load factors for internal pressure loads can be derived analytically based on design equations from the ASME B31 piping codes and minimum material requirements for API 5L line pipe [6]. Once the load factor is established for a particular case, the elastic-plastic methodology may be used in the Finite Element Analysis (FEA) of pipelines and related components. This methodology is particularly useful in the assessment of existing systems when linear elastic numerical analysis shows that local stresses may exceed the elastic design limits. Two case studies are presented showing analyses performed with Abaqus [5], a commercial, general purpose FEA software package. The first case study provides an assessment of a large diameter elbow where the stress on the outer fibers of the intrados exceeded the longitudinal stress limits from B31.8. The second case study examines an assessment of a tee connection where the stresses on the ID exceeded the yield strength of the component. In addition to the case studies, the paper also presents the results of a full-scale test that demonstrated what margin was present when the numerical calculations were based on specified minimum properties. This paper is not intended to revise or replace any provision of B31.4 and/or B31.8 [1, 2]. Instead, it provides the means for calculating load factors that can be used with an elastic-plastic analysis approach in a manner that provides the same design margins as the ASME B31 codes. The approach described in this paper is intended for use in the detailed FEA of pipelines and their associated components.


Author(s):  
Ashish Singla ◽  
Jyotindra Narayan ◽  
Himanshu Arora

In this paper, an attempt has been made to investigate the potential of redundant manipulators, while tracking trajectories in narrow channels. The behavior of redundant manipulators is important in many challenging applications like under-water welding in narrow tanks, checking the blockage in sewerage pipes, performing a laparoscopy operation etc. To demonstrate this snake-like behavior, redundancy resolution scheme is utilized using two different approaches. The first approach is based on the concept of task priority, where a given task is split and prioritize into several subtasks like singularity avoidance, obstacle avoidance, torque minimization, and position preference over orientation etc. The second approach is based on Adaptive Neuro Fuzzy Inference System (ANFIS), where the training is provided through given datasets and the results are back-propagated using augmentation of neural networks with fuzzy logics. Three case studies are considered in this work to demonstrate the redundancy resolution of serial manipulators. The first case study of 3-link manipulator is attempted with both the approaches, where the objective is to track the desired trajectory while avoiding multiple obstacles. The second case study of 7-link manipulator, tracking trajectory in a narrow channel, is investigated using the concept of task priority. The realistic application of minimum-invasive surgery (MIS) based trajectory tracking is considered as the third case study, which is attempted using ANFIS approach. The 5-link spatial redundant manipulator, also known as a patient-side manipulator being developed at CSIR-CSIO, Chandigarh is used to track the desired surgical cuts. Through the three case studies, it is well demonstrated that both the approaches are giving satisfactory results.



Author(s):  
Alex Ryan ◽  
Mark Leung

This paper introduces two novel applications of systemic design to facilitate a comparison of alternative methodologies that integrate systems thinking and design. In the first case study, systemic design helped the Procurement Department at the University of Toronto re-envision how public policy is implemented and how value is created in the broader university purchasing ecosystem. This resulted in an estimated $1.5 million in savings in the first year, and a rise in user retention rates from 40% to 99%. In the second case study, systemic design helped the clean energy and natural resources group within the Government of Alberta to design a more efficient and effective resource management system and shift the way that natural resource departments work together. This resulted in the formation of a standing systemic design team and contributed to the creation of an integrated resource management system. A comparative analysis of the two projects identifies a shared set of core principles for systemic design as well as areas of differentiation that reveal potential for learning across methodologies. Together, these case studies demonstrate the complementarity of systems thinking and design thinking, and show how they may be integrated to guide positive change within complex sociotechnical systems.



Risks ◽  
2021 ◽  
Vol 9 (11) ◽  
pp. 204
Author(s):  
Chamay Kruger ◽  
Willem Daniel Schutte ◽  
Tanja Verster

This paper proposes a methodology that utilises model performance as a metric to assess the representativeness of external or pooled data when it is used by banks in regulatory model development and calibration. There is currently no formal methodology to assess representativeness. The paper provides a review of existing regulatory literature on the requirements of assessing representativeness and emphasises that both qualitative and quantitative aspects need to be considered. We present a novel methodology and apply it to two case studies. We compared our methodology with the Multivariate Prediction Accuracy Index. The first case study investigates whether a pooled data source from Global Credit Data (GCD) is representative when considering the enrichment of internal data with pooled data in the development of a regulatory loss given default (LGD) model. The second case study differs from the first by illustrating which other countries in the pooled data set could be representative when enriching internal data during the development of a LGD model. Using these case studies as examples, our proposed methodology provides users with a generalised framework to identify subsets of the external data that are representative of their Country’s or bank’s data, making the results general and universally applicable.



1997 ◽  
Vol 15 (1) ◽  
pp. 40-53 ◽  
Author(s):  
E. G. Bradshaw ◽  
M. Lester

Abstract. The characteristics of substorm-associated Pi2 pulsations observed by the SABRE coherent radar system during three separate case studies are presented. The SABRE field of view is well positioned to observe the differences between the auroral zone pulsation signature and that observed at mid-latitudes. During the first case study the SABRE field of view is initially in the eastward electrojet, equatorward and to the west of the substorm-enhanced electrojet current. As the interval progresses, the western, upward field-aligned current of the substorm current wedge moves westward across the longitudes of the radar field of view. The westward motion of the wedge is apparent in the spatial and temporal signatures of the associated Pi2 pulsation spectra and polarisation sense. During the second case study, the complex field-aligned and ionospheric currents associated with the pulsation generation region move equatorward into the SABRE field of view and then poleward out of it again after the third pulsation in the series. The spectral content of the four pulsations during the interval indicate different auroral zone and mid-latitude signatures. The final case study is from a period of low magnetic activity when SABRE observes a Pi2 pulsation signature from regions equatorward of the enhanced substorm currents. There is an apparent mode change between the signature observed by SABRE in the ionosphere and that on the ground by magnetometers at latitudes slightly equatorward of the radar field of view. The observations are discussed in terms of published theories of the generation mechanisms for this type of pulsation. Different signatures are observed by SABRE depending on the level of magnetic activity and the position of the SABRE field of view relative to the pulsation generation region. A twin source model for Pi2 pulsation generation provides the clearest explanation of the signatures observed.



Author(s):  
Roi Wagner

This chapter examines two case studies that illustrate the limitations of the cognitive theory of mathematical metaphor in accounting for the formation of actual historical mathematical life worlds. The first case study deals with four medieval and early modern examples of relating algebra to geometry. These examples show that when two mathematical domains are linked, what passes between them cannot be reduced to “inferences,” as assumed by the theory of mathematical metaphor. The second case study reviews notions of infinity since early modernity and demonstrates that these notions are far too variegated and complex to be subsumed under a single metaphor—namely, George Lakoff and Rafael Núñez's basic metaphor of infinity, which tries to read all mathematical infinities as metaphorically projecting final destinations on indefinite sequences.



Author(s):  
Roi Wagner

This chapter presents two case studies that highlight the problems of mathematical semiosis: how mathematical signs obtain and change their senses. The first case study follows the paradigmatic mathematical sign, x, as it is used in applications of powers series to combinatorics via generating functions. The second case study concerns gender role stereotypes involving the so-called “stable marriage problem.” Both case studies open up questions of how meaning is transferred within and across mathematical contexts and try to substantiate the book's claims about interpretation, formalization, and constraints over mathematical objects and statements. The chapter also considers gender-neutral mathematical language in the context of sexuality.



Author(s):  
Gencer Erdogan ◽  
Phu H. Nguyen ◽  
Fredrik Seehusen ◽  
Ketil Stølen ◽  
Jon Hofstad ◽  
...  

Risk-driven testing and test-driven risk assessment are two strongly related approaches, though the latter is less explored. This chapter presents an evaluation of a test-driven security risk assessment approach to assess how useful testing is for validating and correcting security risk models. Based on the guidelines for case study research, two industrial case studies were analyzed: a multilingual financial web application and a mobile financial application. In both case studies, the testing yielded new information, which was not found in the risk assessment phase. In the first case study, new vulnerabilities were found that resulted in an update of the likelihood values of threat scenarios and risks in the risk model. New vulnerabilities were also identified and added to the risk model in the second case study. These updates led to more accurate risk models, which indicate that the testing was indeed useful for validating and correcting the risk models.



Author(s):  
Grant Goodall

Courses on invented languages can do much more than just introduce students to linguistics. Through three case studies, it is shown that as students learn how to design a language, they also learn about the design of human language in a way that is unlikely to occur in other courses. The first case study involves the creation of a lexicon, in relation to John Wilkins’ invented language of 1668 and to Saussurean arbitrariness, commonly regarded as a fundamental design property of human language. The second case study concerns phonemic inventories. By designing their own from scratch, students see the competing pressures that phonemic inventories must satisfy in all languages. The third case study concerns inflectional morphology and the pressures that determine the form of particular morphemes. All of these case studies are accessible to students and help them engage with important aspects of the design properties of human language.



2016 ◽  
pp. 1016-1037
Author(s):  
Gencer Erdogan ◽  
Fredrik Seehusen ◽  
Ketil Stølen ◽  
Jon Hofstad ◽  
Jan Øyvind Aagedal

The authors present the results of an evaluation in which the objective was to assess how useful testing is for validating and correcting security risk models. The evaluation is based on two industrial case studies. In the first case study the authors analyzed a multilingual financial Web application, while in the second case study they analyzed a mobile financial application. In both case studies, the testing yielded new information which was not found in the risk assessment phase. In particular, in the first case study, new vulnerabilities were found which resulted in an update of the likelihood values of threat scenarios and risks in the risk model. New vulnerabilities were also identified and added to the risk model in the second case study. These updates led to more accurate risk models, which indicate that the testing was indeed useful for validating and correcting the risk models.



Author(s):  
Julie Q. Morrison ◽  
Anna L. Harms

This chapter consists of three case studies that illustrate how the evaluation approaches, methods, techniques, and tools presented in Chapters 1 to 5 can be translated into practice. The first case study describes an evaluation of the Dyslexia Pilot Project, a statewide multi-tier system of supports (MTSS) initiative targeting early literacy. In this evaluation, special attention was paid to the evaluating the cost-effectiveness of serving students in kindergarten to grade 2 proactively. The second case study features the use of single-case designs and corresponding summary statistics to evaluate the collective impact of more than 500 academic and behavioral interventions provided within an MTSS framework as part of the annual statewide evaluation of the Ohio Internship Program in School Psychology. The third case study focuses on efforts to evaluate the fidelity of implementation for teacher teams’ use of a five-step process for data-based decision making and instructional planning.



Sign in / Sign up

Export Citation Format

Share Document