scholarly journals Strain Estimation Using Vetco Deformation Tool Data

Author(s):  
Michael J. Rosenfeld ◽  
Patrick C. Porter ◽  
James A. Cox

Damage to pipelines in the form of indentations and third-party damage has emerged as a key concern for operating reliability and public safety within the pipeline industry. Many operators have conducted detailed surveys of their pipelines for indentations (or simply “dents”) by means of in-line inspection tools designed to detect, measure, and report the presence, size, and location of dents, as well as other deformations such as buckles or wrinkles and ovality. Described herein is a technique suitable for processing the signal from Tuboscope-Vetco deformation ILI tools in order to derive the local cold strain associated with indentation of the pipe.

Smart Cities ◽  
2020 ◽  
Vol 3 (3) ◽  
pp. 928-951
Author(s):  
Ronghua Xu ◽  
Seyed Yahya Nikouei ◽  
Deeraj Nagothu ◽  
Alem Fitwi ◽  
Yu Chen

Due to the recent advancements in the Internet of Things (IoT) and Edge-Fog-Cloud Computing technologies, the Smart Public Safety (SPS) system has become a more realistic solution for seamless public safety services that are enabled by integrating machine learning (ML) into heterogeneous edge computing networks. While SPS facilitates convenient exchanges of surveillance data streams among device owners and third-party applications, the existing monolithic service-oriented architecture (SOA) is unable to provide scalable and extensible services in a large-scale heterogeneous network environment. Moreover, traditional security solutions rely on a centralized trusted third-party authority, which not only can be a performance bottleneck or the single point of failure, but it also incurs privacy concerns on improperly use of private information. Inspired by blockchain and microservices technologies, this paper proposed a BLockchain-ENabled Decentralized Smart Public Safety (BlendSPS) system. Leveraging the hybrid blockchain fabric, a microservices based security mechanism is implemented to enable decentralized security architecture, and it supports immutability, auditability, and traceability for secure data sharing and operations among participants of the SPS system. An extensive experimental study verified the feasibility of the proposed BlendSPS that possesses security and privacy proprieties with limited overhead on IoT based edge networks.


2019 ◽  
pp. 267
Author(s):  
Robert Diab

In the fall of 2016, Canada’s Liberal government published a Green Paper canvassing public opinion on changes to national security law. The Paper explored the possibility of new powers to compel third parties to assist with decryption, framing the discussion around a terrorism plot analogous to a ticking bomb hypothetical. The public did not support new decryption powers, and Bill C-59, now before Parliament, does not include them. This article revisits the Green Paper to shed light on deeper fault lines in debates about whether police should have a power to compel decryption. The Green Paper points to illuminating parallels between arguments for compelled decryption and for torture. The strongest arguments for each make use of ticking bomb scenarios. While the arguments have attracted much criticism, they remain plausible and undermine key assumptions of those opposed to compelled decryption. Part II of this article traces two common arguments for why state agents seek powers to compel a third party to decrypt: for justice (to secure convictions) and public safety (to prevent terrorism and other serious offences). Opponents cast doubt on the first claim by pointing to many alternative sources of evidence. They tend to dismiss the second claim, that police need decryption powers for public safety, as merely theoretical, but fail to engage its merits. Part III takes a closer look at the public safety claim in light of the torture debate and the ticking bomb scenario. Despite criticism, arguments in favour of compelled decryption based on the scenario remain theoretically plausible on consequentialist grounds, and rhetorically persuasive by aligning the need for compelled decryption with the value of life (over dignity or privacy). The public safety claim also challenges a common view among opponents of compelled decryption that such powers do not involve a trade-off between privacy and security but between two forms of security. The article concludes by considering the possible impact on the debate of a terrorist act implicating encryption.


2020 ◽  
Vol 43 ◽  
Author(s):  
Michael Tomasello

Abstract My response to the commentaries focuses on four issues: (1) the diversity both within and between cultures of the many different faces of obligation; (2) the possible evolutionary roots of the sense of obligation, including possible sources that I did not consider; (3) the possible ontogenetic roots of the sense of obligation, including especially children's understanding of groups from a third-party perspective (rather than through participation, as in my account); and (4) the relation between philosophical accounts of normative phenomena in general – which are pitched as not totally empirical – and empirical accounts such as my own. I have tried to distinguish comments that argue for extensions of the theory from those that represent genuine disagreement.


Author(s):  
Carl E. Henderson

Over the past few years it has become apparent in our multi-user facility that the computer system and software supplied in 1985 with our CAMECA CAMEBAX-MICRO electron microprobe analyzer has the greatest potential for improvement and updating of any component of the instrument. While the standard CAMECA software running on a DEC PDP-11/23+ computer under the RSX-11M operating system can perform almost any task required of the instrument, the commands are not always intuitive and can be difficult to remember for the casual user (of which our laboratory has many). Given the widespread and growing use of other microcomputers (such as PC’s and Macintoshes) by users of the microprobe, the PDP has become the “oddball” and has also fallen behind the state-of-the-art in terms of processing speed and disk storage capabilities. Upgrade paths within products available from DEC are considered to be too expensive for the benefits received. After using a Macintosh for other tasks in the laboratory, such as instrument use and billing records, word processing, and graphics display, its unique and “friendly” user interface suggested an easier-to-use system for computer control of the electron microprobe automation. Specifically a Macintosh IIx was chosen for its capacity for third-party add-on cards used in instrument control.


2008 ◽  
Vol 18 (1) ◽  
pp. 9-20 ◽  
Author(s):  
Mark Kander ◽  
Steve White

Abstract This article explains the development and use of ICD-9-CM diagnosis codes, CPT procedure codes, and HCPCS supply/device codes. Examples of appropriate coding combinations, and Coding rules adopted by most third party payers are given. Additionally, references for complete code lists on the Web and a list of voice-related CPT code edits are included. The reader is given adequate information to report an evaluation or treatment session with accurate diagnosis, procedure, and supply/device codes. Speech-language pathologists can accurately code services when given adequate resources and rules and are encouraged to insert relevant codes in the medical record rather than depend on billing personnel to accurately provide this information. Consultation is available from the Division 3 Reimbursement Committee members and from [email protected] .


2020 ◽  
Vol 51 (1) ◽  
pp. 35-49 ◽  
Author(s):  
Shoko Watanabe ◽  
Sean M. Laurent

Abstract. Previous forgiveness research has mostly focused on victims’ forgiveness of transgressors, and offenders’ post-transgression efforts intended to promote victim forgiveness have been collectively branded as apology. However, decisions concerning forgiveness frequently occur outside of dyadic contexts, and the unique roles of repentance and atonement in determining forgivability of offenders, despite their preeminence in theology and law, have received little empirical attention. Across five experiments ( N = 938), we show that repentance and atonement independently influence third-party perception of forgivability for a variety of harms, even in disinterested contexts. Our findings provide a systematic examination of decisions about forgivability disentangled from direct personal involvement, demonstrating that components of apology known to facilitate forgiveness in victims also increase perceived forgivability from unharmed observers.


Sign in / Sign up

Export Citation Format

Share Document