88 research outputs found
Leak detection in pipelines using the damping of fluid transients
© 2002 American Society of Civil EngineersLeaks in pipelines contribute to damping of transient events. That fact leads to a method of finding location and magnitude of leaks. Because the problem of transient flow in pipes is nearly linear, the solution of the governing equations can be expressed in terms of a Fourier series. All Fourier components are damped uniformly by steady pipe friction, but each component is damped differently in the presence of a leak. Thus, overall leak-induced damping can be divided into two parts. The magnitude of the damping indicates the size of a leak, whereas different damping ratios of the various Fourier components are used to find the location of a leak. This method does not require rigorous determination and modeling of boundary conditions and transient behavior in the pipeline. The technique is successful in detecting, locating, and quantifying a 0.1% size leak with respect to the cross-sectional area of a pipeline.Xiao-Jian Wang, Martin F. Lambert, Angus R. Simpson, James A. Liggett, and John P. Vitkovsk
Current Distribution and random matrix ensembles for an integrable asymmetric fragmentation process
We calculate the time-evolution of a discrete-time fragmentation process in
which clusters of particles break up and reassemble and move stochastically
with size-dependent rates. In the continuous-time limit the process turns into
the totally asymmetric simple exclusion process (only pieces of size 1 break
off a given cluster). We express the exact solution of master equation for the
process in terms of a determinant which can be derived using the Bethe ansatz.
From this determinant we compute the distribution of the current across an
arbitrary bond which after appropriate scaling is given by the distribution of
the largest eigenvalue of the Gaussian unitary ensemble of random matrices.
This result confirms universality of the scaling form of the current
distribution in the KPZ universality class and suggests that there is a link
between integrable particle systems and random matrix ensembles.Comment: 11 page
Frequency domain analysis for detecting pipeline leaks
The original publication can be found at http://scitation.aip.org/hyoThis paper introduces leak detection methods that involve the injection of a fluid transient into the pipeline, with the resultant transient trace analyzed in the frequency domain. Two methods of leak detection using the frequency response of the pipeline are proposed. The inverse resonance method involves matching the modeled frequency responses to those observed to determine the leak parameters. The peak-sequencing method determines the region in which the leak is located by comparing the relative sizes between peaks in the frequency response diagram. It was found that a unique pattern was induced on the peaks of the frequency response for each specific location of the leak within the pipeline. The leak location can be determined by matching the observed pattern to patterns generated numerically within a lookup table. The procedure for extracting the linear frequency response diagram, including the optimum measurement position, the effect of unsteady friction, and the way in which the technique can be extended into pipeline networks, are also discussed within the paper.Pedro J. Lee, John P. Vítkovský, Martin F. Lambert, Angus R. Simpson and James A. Ligget
Experimental observation and analysis of inverse transients for pipeline leak detection
Fluid transients result in a substantial amount of data as pressure waves propagate throughout pipes. A new generation of leak detection and pipe roughness calibration techniques has arisen to exploit those data. Using the interactions of transient waves with leaks, the detection, location, and quantification of leakage using a combination of transient analysis and inverse mathematics is possible using inverse transient analysis (ITA). This paper presents further development of ITA and experimental observations for leak detection in a laboratory pipeline. The effects of data and model error on ITA results have been explored including strategies to minimize their effects using model error compensation techniques and ITA implementation approaches. The shape of the transient is important for successful application of ITA. A rapid input transient (which may be of small magnitude) contains maximum system response information, thus improving the uniqueness and quality of the ITA solution. The effect of using head measurements as boundary conditions for ITA has been shown to significantly reduce sensitivity, making both detection and quantification problematic. Model parsimony is used to limit the number of unknown leak candidates in ITA, thus reducing the minimization problem complexity. Experimental observations in a laboratory pipeline confirm the analysis and illustrate successful detection and quantification of both single and multiple leaks. © 2007 ASCE.John P. Vítkovský, Martin F. Lambert, Angus R. Simpson, and James A. Ligget
Adaptations of Avian Flu Virus Are a Cause for Concern
We are in the midst of a revolutionary period in the life sciences. Technological capabilities have dramatically expanded, we have a much improved understanding of the complex biology of selected microorganisms, and we have a much improved ability to manipulate microbial genomes. With this has come unprecedented potential for better control of infectious diseases and significant societal benefit. However, there is also a growing risk that the same science will be deliberately misused and that the consequences could be catastrophic. Efforts to describe or define life-sciences research of particular concern have focused on the possibility that knowledge or products derived from such research, or new technologies, could be directly misapplied with a sufficiently broad scope to affect national or global security. Research that might greatly enhance the harm caused by microbial pathogens has been of special concern (1–3). Until now, these efforts have suffered from a lack of specificity and a paucity of concrete examples of “dual use research of concern” (3). Dual use is defined as research that could be used for good or bad purposes. We are now confronted by a potent, real-world example
Discrete blockage detection in pipelines using the frequency response diagram: Numerical study
© 2008 American Society of Civil EngineersThis paper proposes the use of fluid transients as a noninvasive technique for locating blockages in transmission pipelines. By extracting the behavior of the system in the form of a frequency response diagram, discrete blockages within the pipeline were shown to induce an oscillatory pattern on the peaks of this response diagram. This pattern can be related to the location and size of the blockage. A simple analytical expression that can be used to detect, locate, and size discrete blockages is presented, and is shown able to cater for multiple blockages existing simultaneously within the system. The structure of the expression suggests that the proposed technique can be extended to situations where system parameters may not be known to a high accuracy and also to more complex network scenarios, although future studies may be required to verify these possibilities.Pedro J. Lee, John P. Vítkovský, Martin F. Lambert, Angus R. Simpson, and James A. Ligget
Leak location in pipelines using the impulse response function
Current transient-based leak detection methods for pipeline systems often rely on a good understanding of the system—including unsteady friction, pipe roughness, precise geometry and micro considerations such as minor offtakes—in the absence of leaks. Such knowledge constitutes a very high hurdle and, even if known, may be impossible to include in the mathematical equations governing system behavior. An alternative is to test the leak-free system to find precise behavior, obviously a problem if the system is not known to be free of leaks. The leak-free response can be used as a benchmark to compare with behavior of the leaking system. As an alternative, this paper uses the impulse response function (IRF) as a means of leak detection. The IRF provides a unique a relationship between an injected transient event and a measured pressure response from a pipeline. This relationship is based on the physical characteristics of the system and is useful in determining its integrity. Transient responses of completely different shapes can be directly compared using the IRF. The IRF refines all system reflections to sharp pulses, thus promoting greater accuracy in leak location, and allowing leak reflections to be detected without a leak-free benchmark, even when complex signals such as pseudo-random binary signals are injected into the system. Additionally, the IRF approach can be used to improve existing leak detection methods. In experimental tests at the University of Adelaide the IRF approach was able to detect and locate leaks accurately.Pedro J. Lee, John P. Vitkovsky, Martin F. Lambert, Angus R. Simpson and James Ligget
The impact of viral mutations on recognition by SARS-CoV-2 specific T cells.
We identify amino acid variants within dominant SARS-CoV-2 T cell epitopes by interrogating global sequence data. Several variants within nucleocapsid and ORF3a epitopes have arisen independently in multiple lineages and result in loss of recognition by epitope-specific T cells assessed by IFN-γ and cytotoxic killing assays. Complete loss of T cell responsiveness was seen due to Q213K in the A∗01:01-restricted CD8+ ORF3a epitope FTSDYYQLY207-215; due to P13L, P13S, and P13T in the B∗27:05-restricted CD8+ nucleocapsid epitope QRNAPRITF9-17; and due to T362I and P365S in the A∗03:01/A∗11:01-restricted CD8+ nucleocapsid epitope KTFPPTEPK361-369. CD8+ T cell lines unable to recognize variant epitopes have diverse T cell receptor repertoires. These data demonstrate the potential for T cell evasion and highlight the need for ongoing surveillance for variants capable of escaping T cell as well as humoral immunity.This work is supported by the UK Medical Research Council (MRC); Chinese Academy of Medical Sciences(CAMS) Innovation Fund for Medical Sciences (CIFMS), China; National Institute for Health Research (NIHR)Oxford Biomedical Research Centre, and UK Researchand Innovation (UKRI)/NIHR through the UK Coro-navirus Immunology Consortium (UK-CIC). Sequencing of SARS-CoV-2 samples and collation of data wasundertaken by the COG-UK CONSORTIUM. COG-UK is supported by funding from the Medical ResearchCouncil (MRC) part of UK Research & Innovation (UKRI),the National Institute of Health Research (NIHR),and Genome Research Limited, operating as the Wellcome Sanger Institute. T.I.d.S. is supported by a Well-come Trust Intermediate Clinical Fellowship (110058/Z/15/Z). L.T. is supported by the Wellcome Trust(grant number 205228/Z/16/Z) and by theUniversity of Liverpool Centre for Excellence in Infectious DiseaseResearch (CEIDR). S.D. is funded by an NIHR GlobalResearch Professorship (NIHR300791). L.T. and S.C.M.are also supported by the U.S. Food and Drug Administration Medical Countermeasures Initiative contract75F40120C00085 and the National Institute for Health Research Health Protection Research Unit (HPRU) inEmerging and Zoonotic Infections (NIHR200907) at University of Liverpool inpartnership with Public HealthEngland (PHE), in collaboration with Liverpool School of Tropical Medicine and the University of Oxford.L.T. is based at the University of Liverpool. M.D.P. is funded by the NIHR Sheffield Biomedical ResearchCentre (BRC – IS-BRC-1215-20017). ISARIC4C is supported by the MRC (grant no MC_PC_19059). J.C.K.is a Wellcome Investigator (WT204969/Z/16/Z) and supported by NIHR Oxford Biomedical Research Centreand CIFMS. The views expressed are those of the authors and not necessarily those of the NIHR or MRC
Evaluating the Effects of SARS-CoV-2 Spike Mutation D614G on Transmissibility and Pathogenicity.
Global dispersal and increasing frequency of the SARS-CoV-2 spike protein variant D614G are suggestive of a selective advantage but may also be due to a random founder effect. We investigate the hypothesis for positive selection of spike D614G in the United Kingdom using more than 25,000 whole genome SARS-CoV-2 sequences. Despite the availability of a large dataset, well represented by both spike 614 variants, not all approaches showed a conclusive signal of positive selection. Population genetic analysis indicates that 614G increases in frequency relative to 614D in a manner consistent with a selective advantage. We do not find any indication that patients infected with the spike 614G variant have higher COVID-19 mortality or clinical severity, but 614G is associated with higher viral load and younger age of patients. Significant differences in growth and size of 614G phylogenetic clusters indicate a need for continued study of this variant
- …