Abstract:
A system and method to detect an event associated with a first object relative to a second object and a support is provided. The system can include an antenna at a support to receive the first object, a tag reader in communication with the antenna and a tag located on the second object. In response to detecting a change in impedance of the antenna associated with the presence of the first object, the tag reader communicates a presence signal. In response to detecting the tag within a threshold proximity of the tag reader, the tag reader generates a tag signal. A remoter server is operable to detect an association of the first and second objects based on a comparison a time associated with each of the tag signal and the presence signal, and in response then creates an output indicative of a detected event based on the association for illustration.
Abstract:
In accordance with one aspect of the present technique, a method is disclosed. The method includes receiving sensor data from a first set of sensors mechanically coupled to a first riser joint of a marine riser. The method also includes analyzing the sensor data to determine a condition of the first riser joint and determining whether the condition satisfies a transmission criterion. The method further includes sending a notification including the condition to an on-vessel monitor communicatively coupled to the marine riser in response to determining that the condition satisfies the transmission criterion.
Abstract:
A control circuit can access inspection results from an inspection of a first component and then input those inspection results to a first machine learning model. The inspection results include potential wear indications. By one approach, that first machine learning model is trained using a training corpus that includes inspection results for previously inspected components that are at least similar to the first component. The first machine learning model can output assessment information that, by one approach, identifies some of the potential wear indications as being relevant. By one approach, the aforementioned assessment information may be input a second machine learning model that is trained using a training corpus that includes historical results from previous inspections of the same first component and wherein the second machine learning model outputs prediction information regarding whether a repeated physical processing of the first component will yield a particular result.
Abstract:
A method of inspecting a component includes storing at least one inspection image file in a memory and receiving a search request associated with the at least one inspection image file. The method also includes accessing a database including a plurality of image files, comparing the hash code of the at least one inspection image file to the hash code of each image file of the plurality of image files, and identifying a first subset of image files based on the hash code comparison. The method also includes comparing the feature data of the at least one inspection image file to the feature data of each image file of the first subset of image files and classifying a second subset of image files as relevant based on the feature data comparison. The method further includes generating search results based on the second subset of image files.
Abstract:
A method of inspecting a component includes storing at least one inspection image file in a memory and receiving a search request associated with the at least one inspection image file. The method also includes accessing a database including a plurality of image files, comparing the hash code of the at least one inspection image file to the hash code of each image file of the plurality of image files, and identifying a first subset of image files based on the hash code comparison. The method also includes comparing the feature data of the at least one inspection image file to the feature data of each image file of the first subset of image files and classifying a second subset of image files as relevant based on the feature data comparison. The method further includes generating search results based on the second subset of image files.
Abstract:
Methods, apparatus, systems and articles of manufacture are disclosed to facilitate proximity detection and location tracking. An example method includes receiving messages collected by a badge in an environment, the messages including signal strength and a timestamp. The example method also includes assigning a location in the environment to the badge based on a first subset of the messages. The example method also includes identifying an asset in a second subset of the messages. The example method also includes updating a current location associated with the asset based on a relative proximity of the asset to the badge, wherein the current location corresponds to a first time and the updated location corresponds to a second time, and wherein a change in location between the current location and the updated location indicates movement of the asset in the environment.
Abstract:
In various example embodiments, a system and method for facilitating proximity detection and location tracking using a mobile wireless bridge are provided. The system includes a beacon badge, a beacon tag, and a real-time location services (“RTLS”) server communicatively coupled to the beacon badge, such as via a wireless network or the like. The beacon tag broadcasts a beacon message receivable by the beacon badge. The beacon badge determines whether it is proximate to the beacon badge based on the signal strength of the received beacon message. The beacon badge further communicates identifying information contained with the received beacon message to the RTLS server. The RTLS server uses the identifying information to determine the proximate location of the beacon badge.
Abstract:
In various example embodiments, a system and method for facilitating proximity detection and location tracking using a mobile wireless bridge are provided. The system includes a beacon badge, a beacon tag, and a real-time location services (“RTLS”) server communicatively coupled to the beacon badge, such as via a wireless network or the like. The beacon tag broadcasts a beacon message receivable by the beacon badge. The beacon badge determines whether it is proximate to the beacon badge based on the signal strength of the received beacon message. The beacon badge further communicates identifying information contained with the received beacon message to the RTLS server. The RTLS server uses the identifying information to determine the proximate location of the beacon badge.
Abstract:
In one aspect, a system for estimating fatigue damage in a riser string is provided. The system includes a plurality of accelerometers which can be deployed along a riser string and a communications link to transmit accelerometer data from the plurality of accelerometers to one or more data processors in real time. With data from a limited number of accelerometers located at sensor locations, the system estimates an optimized current profile along the entire length of the riser including riser locations where no accelerometer is present. The optimized current profile is then used to estimate damage rates to individual riser components and to update a total accumulated damage to individual riser components. The number of sensor locations is small relative to the length of a deepwater riser string, and a riser string several miles long can be reliably monitored along its entire length by fewer than twenty sensor locations.
Abstract:
A role-based access control method and/or system permits end users to securely pair their mobile devices via a pairing apparatus with one or more instruments to, for example, remotely monitor operations of the instruments. In an embodiment, the process includes a pairing apparatus receiving a pairing request from an instrument including a unique access code, and receiving a pairing request from an end user mobile device that includes an end user mobile device identifier and an access code. If the unique access code matches the end user's access code, then the end user mobile device identifier is added to a security group and a successful pairing message is transmitted to at least one of the instrument and the end user mobile device.