1-20 of 38
Keywords: algorithm
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Proceedings Papers

Paper presented at the CORROSION 2019, March 24–28, 2019
Paper Number: NACE-2019-13329
... building. A robust predictive model for multiple class of corrosion inhibitors was developed using advanced machine learning algorithm such as gradient boosting machine (GBM), random forest, support vector machines (SVM) etc. The descriptors were selected using novel integrated ensemble technique...
Proceedings Papers

Paper presented at the CORROSION 2019, March 24–28, 2019
Paper Number: NACE-2019-13372
... Houston flowline corrosion Artificial Intelligence well integrity cgr prediction prediction algorithm ILI data probability corrosion feature Intelligent Corrosion Prediction using Bayesian Networks Michael Smith ROSEN UK Benton Lane Newcastle upon Tyne United Kingdom Lewis Barton ROSEN UK...
Proceedings Papers

Paper presented at the CORROSION 2019, March 24–28, 2019
Paper Number: NACE-2019-13456
... Database The most practical dataset for working with underground assets comes from the ISRIC-WISE(3) soil database.13 14 It is an extensive shapefile-based database focused on a variety of soil properties. Initially, the entire dataset was fed into the machine learning training algorithm but, many...
Proceedings Papers

Paper presented at the CORROSION 2018, April 15–19, 2018
Paper Number: NACE-2018-11563
... to identify tower(s) which may be susceptible to corrosion, without the need to excavate and examine each individual tower. The integration of corrosion science, field electrochemical measurements and assessment technologies has been used to create a proprietary algorithm that can provide a risk for targeted...
Proceedings Papers

Paper presented at the CORROSION 2017, March 26–30, 2017
Paper Number: NACE-2017-9260
.... A followed algorithm was developed using this information to calculate and rank the relative interference risk for each identified location. The algorithm included three primary risk factors; steady state induced and fault personnel safety, induced AC influenced corrosion and fault arcing pipe wall/coating...
Proceedings Papers

Paper presented at the CORROSION 2017, March 26–30, 2017
Paper Number: NACE-2017-9741
... ABSTRACT Navigation algorithms are presented that can be used to guide autonomous vehicles along a right of way to inspect poles or towers for corrosion, or to inspect enclosed spaces such as power substations. These algorithms use the combined methods of sensor feature extraction, PID...
Proceedings Papers

Paper presented at the CORROSION 2016, March 6–10, 2016
Paper Number: NACE-2016-7181
... magnetic field manuscript permission excavation algorithm defect NACE CORROSION 2016 Final Paper Remote Measurement of Stress in Carbon Steel Pipelines Developments in Remote Magnetic Monitoring Paper c2016-7181 Paul Jarram Speir Hunter Limited Mayden House, Long Bennington Business Park, Newark...
Proceedings Papers

Paper presented at the CORROSION 2014, March 9–13, 2014
Paper Number: NACE-2014-4139
... pipeline pigging materials and corrosion Upstream Oil & Gas inspection anomaly Publication Division texas 77084 geometry manuscript tolerance measurement error ili survey evaluation algorithm South Creek Drive permission non-destructive evaluation NDE Data Fusion of Non-Destructive...
Proceedings Papers

Paper presented at the CORROSION 2014, March 9–13, 2014
Paper Number: NACE-2014-4346
... on pit depths from limited empirical data used as input. Pipeline Corrosion riser corrosion Artificial Intelligence pixel Publication Division flowline corrosion Subsurface Corrosion forecasting localized-corrosion-induced damage texas 77084 algorithm South Creek Drive Profilometer...
Proceedings Papers

Paper presented at the CORROSION 2012, March 11–15, 2012
Paper Number: NACE-2012-1463
...) corrosion models are valid for the “general” rate of dissolution based on mass and charge balance on the exposed surface, however they have limited use for the quantitative assessment of corrosion related risk assessment. The present work introduces a general stochastical algorithm for the calculation...
Proceedings Papers

Paper presented at the CORROSION 2011, March 13–17, 2011
Paper Number: NACE-11307
... Reservoir Characterization pipeline evaluation network pipeline Midstream Oil & Gas warning system network interface box third-party intrusion sensor node Notification physical science inc protection pipeline operator seismic sensor distinguish threat threat algorithm...
Proceedings Papers

Paper presented at the CORROSION 2007, March 11–15, 2007
Paper Number: NACE-07229
... ABSTRACT Washing aircraft is a routine maintenance chore that is intended to reduce corrosion damage by removing corrodents. However, this exercise incurs costs that, when applied to a fleet, are substantial. The US Air Force (USAF) algorithm for setting wash intervals was based...
Proceedings Papers

Paper presented at the CORROSION 2007, March 11–15, 2007
Paper Number: NACE-07553
... and electrochemical phenomena of the corrosion using mass, energy and charge balances. Artificial Intelligence Upstream Oil & Gas Pipeline Corrosion riser corrosion field data database case materials and corrosion well integrity similar case corrosion prediction algorithm case-based reasoning...
Proceedings Papers

Paper presented at the CORROSION 2006, March 12–16, 2006
Paper Number: NACE-06323
.... This image set is analyzed by a Corrosion Detection Algorithm (CDA). The CDA assesses the coatings damage in each of the analyzed images and then generates a tank level coatings damage level. This paper will first describe the ISIS system and discuss how it is utilized on ship to perform inspections...
Proceedings Papers

Paper presented at the CORROSION 2005, April 3–7, 2005
Paper Number: NACE-05057
... prediction Artificial Intelligence well integrity localized corrosion corrosion rate materials and corrosion riser corrosion upper curve denoted pr corrosion prediction model surface morphology uniform corrosion rate lower curve denoted cr localized attack morphology algorithm localized...
Proceedings Papers

Paper presented at the CORROSION 2005, April 3–7, 2005
Paper Number: NACE-05154
... significantly between inspections, features need to be scaled in order or to make a reasonable comparison. A corrosion growth analysis must then be based upon the comparison of raw MFL data to the scaled MFL data. Differences between Defect Sizing Models/Algorithms In general, sizing algorithms will have...
Proceedings Papers

Paper presented at the CORROSION 2005, April 3–7, 2005
Paper Number: NACE-05072
.... However, it is also noted that data stored in SCADA, DCS, ODBC Compliant Databases, Data Historians, or PDAs can be retrieved by the company s Data Transfer software and communicated to the Remote Software, via the Internet, or company intranet/LAN system. All data undergoes a series of algorithms. First...
Proceedings Papers

Paper presented at the CORROSION 2004, March 28–April 1, 2004
Paper Number: NACE-04450
... a combination of software based filters and amplifiers combined with pattern recognition algorithms used in neural network development, a method of transforming raw electrochemical noise data into a process parameter value has been developed. Such approaches have been suggested and used with some success...
Proceedings Papers

Paper presented at the CORROSION 2004, March 28–April 1, 2004
Paper Number: NACE-04447
... in electrochemical noise (EN) data in the time domain. These approaches extract information from only electrochemical transients in EN data, i.e. where current and potential are correlated. An algorithm is introduced for identifying transients based on locating records where both the current and potential...
Proceedings Papers

Paper presented at the CORROSION 2004, March 28–April 1, 2004
Paper Number: NACE-04628
...-dimensional (2-D) stochastic algorithm to simulate the morphology of localized attack. The rule based algorithm operates on the assumption that the morphology of corrosion attack depends on the balance of two processes: corrosion (leading to metal loss) and precipitation (leading to metal protection...

Product(s) added to cart

Close Modal