An Approach for Prioritizing Pipeline Water Crossings (WC) for Effective Mitigation and Monitoring

Author(s):  
Jeff Barry ◽  
Rafael G. Mora ◽  
Brian Carlin

This paper provides an approach for assessing and classifying riverine pipeline crossings to prioritize effective mitigation and monitoring. These processes require understanding of and accounting for channel processes, river dynamics, geomorphic principals and soil mechanics to estimate bed scour and bank erosion degradation mechanisms at water crossings and their potential effects on the pipeline. The intent of this paper is to share generic experiences in ranking water crossings based on their susceptibility to and identification of integrity threats under multiple existing and future hydrologic scenarios causing potential for pipeline exposure, spanning or damage. The intent is not to present or provide an analysis or review of the various methods for estimating channel bed or bank erosion. The details of such calculations are highly site specific and a variety of both qualitative and quantitative methods can be applied depending upon available site data, and as such, are outside the scope of the work presented here. Pipelines are static features within a dynamic environment with rivers and floodplains representing some of the most active areas within a landscape. Rivers can change course, migrate, deepen, and widen slowly over time or suddenly during large flood events. These hydrologic effects can impact existing pipelines thereby putting pipelines at risk for damage or failure. Understanding how rivers alter the landscape and transport water and sediment from the mountains to the sea provides a framework for realizing the potential toll that riverine changes can have on pipeline infrastructure. Further, integrating analysis of how rivers at specific pipeline crossing locations are likely to change can increase the effectiveness in protecting the environment during the design, construction, operation and integrity management of pipelines at river crossings. The paper provides an approach comprised of five (5) stages: 1. WC Inventory and Desktop Data Gathering 2. Screening Process: Preliminary WC Classification 3. Detailed Assessment 4. Final WC Classification, Prioritization, and Risk Assessment 5. Development of Mitigation and Monitoring Strategies This paper also presents two (2) case studies illustrating how assessing the geomorphic condition and processes of the river system being crossed by pipelines provides for a better understanding of susceptibility to existing hydro-geotechnical threats to the pipeline as well as the susceptibility for flood-related forces in the future. The first case study illustrates how changes to a river’s cross section as a result of construction activities upstream of a pipeline water crossing can cause significant and potentially damaging impacts, downstream. The second case study reinforces the importance of understanding the history of watershed and channel changes over time, both at the specific water crossing location, but also both upstream and downstream from the crossing itself to be able to identify and understand all potential threats to pipelines located within rivers and floodplains. A method for assessing and classifying the magnitude and probability of flood related risk at each case study is discussed. These cases are presented as generic examples for educational purposes only as every pipeline has its own specific characteristics conditions with jurisdiction-specific regulatory requirements requiring process customization and enhancements.

Author(s):  
Banks Miller ◽  
Brett Curry

This chapter explores three periods in the development of the relationship between U.S. Attorneys (USAs) and the Department of Justice. The first case study considers the executive branch’s use of USAs in attempts to rein in racial violence during Reconstruction. The second case study centers on the savings and loan crisis of the late 1980s and highlights the efforts of national principals to focus federal prosecutors on politically salient crimes. The final case study examines the USA firing scandal of 2006, an ultimately failed attempt by the George W. Bush administration to control USAs. Throughout, we emphasize the ways in which centralized control of the USAs has evolved over time.


2018 ◽  
Vol 13 (4) ◽  
pp. 539
Author(s):  
Jean Marcel Sousa Lira ◽  
Claúdio Vieira Castro ◽  
Eduardo Gomes Salgado ◽  
Luiz Alberto Beijo

<p>The certification of agricultural products is considered a strategy that promotes sustainability and appreciation of product. In coffee production, the <em>Certifica Minas Café</em> is the only public coffee certification program in Brazil. However, over the years, many coffee farms that have this certification reduce their competence to meet the requirements, stabilizing at minimum levels of compliance, which allows maintaining the certificates, but does not promote continual improvement. Therefore, this study aimed to evaluate the effect of <em>Certifica Minas</em> <em>Café</em> certification on the improvement of sustainability over time on coffee farms. For this, a case study with two properties in the south of the state of Minas Gerais was carried out, in which one of them quest to achieve continuous improvement, while the other did not. On the coffee farm of the first case was observed a reduction in investment and low concern to maintain the requirements established by the certification, while the coffee farm of the second case reduced the number of requirements requested by the certification program over time. Lastly, this paper hypothesizes that improvement of sustainability depends on understanding the benefits of certification in the long term and is related to a behaviour change by the certified farm.<strong></strong></p>


2020 ◽  
Author(s):  
Raphael Neukom ◽  
Nadine Salzmann ◽  
Christian Huggel ◽  
Veruska Mucchione ◽  
Sabine Kleppek ◽  
...  

&lt;div&gt; &lt;p&gt;The study on &amp;#8216;climate-related risks and opportunities&amp;#8217; of the Swiss Federal Office for the Environment (FOEN) provides a comprehensive analysis of climate-related risks and opportunities for Switzerland until 2060. The synthesis of the study results has been the basis for the development of adaptation strategies and measures in Switzerland. The study also identifies knowledge gaps and related missing planning tools for risks, which are difficult to assess as they typically have a low probability of occurrence but have potentially very high impacts for society and/or the environment. Such risks refer in particular to risks, which cumulate through process cascades or are triggered by meteorological/climatic extremes events, which return within shorter time intervals than expected.&lt;/p&gt; &lt;p&gt;To respond to these gaps, a collaborative effort including academic and government institutions at different administrative levels is undertaken in order to explore and analyse the potential of such cumulative risks and actions needed to manage them in Switzerland. The project focuses on two case studies, which are developed in consultation with stakeholders from science, policy and practice at the national and sub-national level.&lt;/p&gt; &lt;p&gt;The case studies analyse risks triggered by meteorological events based on projected and recently published Swiss Climate Scenarios CH2018, considering rare but plausible scenarios where such triggering events cumulate and/or occur in combinations.&lt;/p&gt; &lt;p&gt;We discuss international terminologies and experience with unexpected and cumulative extreme events and put them in relation to the Swiss context. Specifically, we present the cascading processes of the first case study, which focuses on the protective forests in the eastern Swiss Alps. Potential reduction of the protective capacity caused by extreme drought and heat and subsequent increase of risks caused by multiple natural hazards, such as fires and mass movements (snow avalanche, landslide), are assessed in this case study using semi-quantitative methods of risk analysis.&lt;/p&gt; &lt;/div&gt;


Water ◽  
2019 ◽  
Vol 11 (6) ◽  
pp. 1313 ◽  
Author(s):  
Kiss ◽  
Amissah ◽  
Fiala

Stone and concrete revetments are widely constructed to control bank erosion and thus stabilize river banks. The consequences include accelerated erosion at unrevetted downstream channel sections and in-channel incision at revetted sections. The studied section of the Tisza River (Hungary) was revetted along 49% of its banks in the 20th century with stepped-block and placed-rock revetments. We therefore aimed (1) to study the effects of revetment constructions on channel processes and (2) to evaluate the state and collapse of revetments using a DEM of the channel and ADCP measurements. In the late 19th century, the river had an equilibrium meandering channel, with alternating eroding and aggrading banks. Currently, erosional processes dominate. Thus, 65% of the total channel length is affected by bank erosion. The revetments reduced the active lateral erosional processes only temporarily, as 58% of the revetments, mainly placed-rock, are already damaged. The flow characteristics at the revetted sections were found to depend on the rate and type of revetment collapse. Large pools developed in front of the revetments, playing an important role in initiating their erosion. The placed-rock revetments can collapse by slides or by stones falling into the pool one-by-one. In this case, a knickpoint develops, propagating upstream. Thus, the collapse and accelerated bank erosion also propagate upstream. The increased hazard created by the failure of the revetments requires the re-planning of bank stabilization practices.


2018 ◽  
Vol 28 (2) ◽  
Author(s):  
T Dowling ◽  
Somikazi Deyi ◽  
Anele Gobodwana

While there have been a number of studies on the decontextualisation and secularisation of traditional ritual music in America, Taiwan and other parts of the globe, very little has been written on the processes and transformations that South Africa’s indigenous ceremonial songs go through over time. This study was prompted by the authors’ interest in, and engagement with the Xhosa initiation song Somagwaza, which has been re-imagined as a popular song, but has also purportedly found its way into other religious spaces. In this article, we attempted to investigate the extent to which the song Somagwaza is still associated with the Xhosa initiation ritual and to analyse evidence of it being decontextualised and secularised in contemporary South Africa. Our methodology included an examination of the various academic treatments of the song, an analysis of the lyrics of a popular song, bearing the same name, holding small focus group discussions, and distributing questionnaires to speakers of isiXhosa on the topic of the song. The data gathered were analysed using the constant comparative method of analysing qualitative research.


Author(s):  
Kathryn M. de Luna

This chapter uses two case studies to explore how historians study language movement and change through comparative historical linguistics. The first case study stands as a short chapter in the larger history of the expansion of Bantu languages across eastern, central, and southern Africa. It focuses on the expansion of proto-Kafue, ca. 950–1250, from a linguistic homeland in the middle Kafue River region to lands beyond the Lukanga swamps to the north and the Zambezi River to the south. This expansion was made possible by a dramatic reconfiguration of ties of kinship. The second case study explores linguistic evidence for ridicule along the Lozi-Botatwe frontier in the mid- to late 19th century. Significantly, the units and scales of language movement and change in precolonial periods rendered visible through comparative historical linguistics bring to our attention alternative approaches to language change and movement in contemporary Africa.


Author(s):  
A.C.C. Coolen ◽  
A. Annibale ◽  
E.S. Roberts

This chapter reviews graph generation techniques in the context of applications. The first case study is power grids, where proposed strategies to prevent blackouts have been tested on tailored random graphs. The second case study is in social networks. Applications of random graphs to social networks are extremely wide ranging – the particular aspect looked at here is modelling the spread of disease on a social network – and how a particular construction based on projecting from a bipartite graph successfully captures some of the clustering observed in real social networks. The third case study is on null models of food webs, discussing the specific constraints relevant to this application, and the topological features which may contribute to the stability of an ecosystem. The final case study is taken from molecular biology, discussing the importance of unbiased graph sampling when considering if motifs are over-represented in a protein–protein interaction network.


2002 ◽  
Vol 78 (4) ◽  
pp. 539-549 ◽  
Author(s):  
Paul D Anderson ◽  
John C Zasada ◽  
Glen W Erickson ◽  
Zigmond A Zasada

A white pine (Pinus strobus L.) stand at the western margin of the species range, approximately 125 years of age at present, was thinned in 1953 from 33.5 m2 ha-1 to target residual basal areas of 18.4, 23.0, 27.5, and 32.1 m2 ha-1 . Repeated measurement over the following 43-years indicated that the greatest total volume production and the greatest number of large diameter trees occurred in the unit of highest residual density. Over time, the distribution of stems was predominantly random although mortality between 1979 and 1996 resulted in a tendency for clumping in the 23.0 and 27.5 m2 ha-1 treatments. DNA analysis indicated that thinning intensity had little effect on the genetic diversity of residual white pine. This study suggests that mature white pine stands in northern Minnesota may be managed at relatively high densities without loss of productivity. However, regardless of overstory density, there was little or no white pine regeneration occurring in this stand. Key words: thinning, growth, genetic diversity, molecular markers, spatial pattern, regeneration


Author(s):  
Ashish Singla ◽  
Jyotindra Narayan ◽  
Himanshu Arora

In this paper, an attempt has been made to investigate the potential of redundant manipulators, while tracking trajectories in narrow channels. The behavior of redundant manipulators is important in many challenging applications like under-water welding in narrow tanks, checking the blockage in sewerage pipes, performing a laparoscopy operation etc. To demonstrate this snake-like behavior, redundancy resolution scheme is utilized using two different approaches. The first approach is based on the concept of task priority, where a given task is split and prioritize into several subtasks like singularity avoidance, obstacle avoidance, torque minimization, and position preference over orientation etc. The second approach is based on Adaptive Neuro Fuzzy Inference System (ANFIS), where the training is provided through given datasets and the results are back-propagated using augmentation of neural networks with fuzzy logics. Three case studies are considered in this work to demonstrate the redundancy resolution of serial manipulators. The first case study of 3-link manipulator is attempted with both the approaches, where the objective is to track the desired trajectory while avoiding multiple obstacles. The second case study of 7-link manipulator, tracking trajectory in a narrow channel, is investigated using the concept of task priority. The realistic application of minimum-invasive surgery (MIS) based trajectory tracking is considered as the third case study, which is attempted using ANFIS approach. The 5-link spatial redundant manipulator, also known as a patient-side manipulator being developed at CSIR-CSIO, Chandigarh is used to track the desired surgical cuts. Through the three case studies, it is well demonstrated that both the approaches are giving satisfactory results.


2021 ◽  
Vol 21 (1) ◽  
Author(s):  
Markus J. Ankenbrand ◽  
Liliia Shainberg ◽  
Michael Hock ◽  
David Lohr ◽  
Laura M. Schreiber

Abstract Background Image segmentation is a common task in medical imaging e.g., for volumetry analysis in cardiac MRI. Artificial neural networks are used to automate this task with performance similar to manual operators. However, this performance is only achieved in the narrow tasks networks are trained on. Performance drops dramatically when data characteristics differ from the training set properties. Moreover, neural networks are commonly considered black boxes, because it is hard to understand how they make decisions and why they fail. Therefore, it is also hard to predict whether they will generalize and work well with new data. Here we present a generic method for segmentation model interpretation. Sensitivity analysis is an approach where model input is modified in a controlled manner and the effect of these modifications on the model output is evaluated. This method yields insights into the sensitivity of the model to these alterations and therefore to the importance of certain features on segmentation performance. Results We present an open-source Python library (misas), that facilitates the use of sensitivity analysis with arbitrary data and models. We show that this method is a suitable approach to answer practical questions regarding use and functionality of segmentation models. We demonstrate this in two case studies on cardiac magnetic resonance imaging. The first case study explores the suitability of a published network for use on a public dataset the network has not been trained on. The second case study demonstrates how sensitivity analysis can be used to evaluate the robustness of a newly trained model. Conclusions Sensitivity analysis is a useful tool for deep learning developers as well as users such as clinicians. It extends their toolbox, enabling and improving interpretability of segmentation models. Enhancing our understanding of neural networks through sensitivity analysis also assists in decision making. Although demonstrated only on cardiac magnetic resonance images this approach and software are much more broadly applicable.


Sign in / Sign up

Export Citation Format

Share Document