This document discusses the advantages of using eddy current technology and specialized weld probes for weld inspection. It provides background on the development of weld probes and how they work. Weld probes allow inspection of welds through coatings with minimal lift-off sensitivity. They are well-suited for difficult-access inspections and have various applications in industries like offshore, nuclear, and rail. The document also covers standardization, equipment used, and concludes that weld probes provide a good alternative to other NDT methods for weld inspection.
Eddy current inspection is one of several NDT methods that use the principal of “electromagnetism” as the basis for conducting examinations.
Eddy currents are created through a process called electromagnetic induction. When alternating current is applied to the conductor, such as copper wire, a magnetic field develops in and around the conductor. This magnetic field expands as the alternating current rises to maximum and collapses as the current is reduced to zero. If another electrical conductor is brought into the close proximity to this changing magnetic field, current will be induced in this second conductor. Eddy currents are induced electrical currents that flow in a circular path. They get their name from “eddies” that are formed when a liquid or gas flows in a circular path around obstacles when conditions are right.
Eddy current inspection is one of several NDT methods that use the principal of “electromagnetism” as the basis for conducting examinations.
Eddy currents are created through a process called electromagnetic induction. When alternating current is applied to the conductor, such as copper wire, a magnetic field develops in and around the conductor. This magnetic field expands as the alternating current rises to maximum and collapses as the current is reduced to zero. If another electrical conductor is brought into the close proximity to this changing magnetic field, current will be induced in this second conductor. Eddy currents are induced electrical currents that flow in a circular path. They get their name from “eddies” that are formed when a liquid or gas flows in a circular path around obstacles when conditions are right.
Eddy Current Metal Testing for ConservationJason Church
This powerpoint was presented as part of a workshop on Eddy Current Testing for Conservation at the annual metting of the AIC on May 19, 2009 Los Angeles, CA.
EDDYCON C is used for detection of surface cracks in various parts, cracks in holes and multilayered structures, surface and subsurface corrosion.
Eddy current is an acceptable method for detecting conductivity of non-ferrous materials and coating thickness.
Eddy Current Metal Testing for ConservationJason Church
This powerpoint was presented as part of a workshop on Eddy Current Testing for Conservation at the annual metting of the AIC on May 19, 2009 Los Angeles, CA.
EDDYCON C is used for detection of surface cracks in various parts, cracks in holes and multilayered structures, surface and subsurface corrosion.
Eddy current is an acceptable method for detecting conductivity of non-ferrous materials and coating thickness.
Twisted Tube ® Heat Exchanger Inspection with Eddy CurrentsEddyfi
Heat exchangers are essential to the operation of many systems in various industries, processing plants and electric power generation plants, for example. A unique type of heat exchanger (HX) was introduced several years ago: the Twisted Tube® HX. They offer the highest levels of efficiency, but have always been a challenge for periodic inspections. Until now.
A twisted tube is composed of two straight, circular sections near the tubesheets, separated by a length of helical, oval tube. This helix creates a small, central circular passage along the length of the tube where traditional bobbin probes can be pushed and pulled.
However, standard ECT probes deliver suboptimal performances — detecting, characterizing, and sizing flaws are problematic because of poor signal-to-noise ratios. Flaws on the wall furthest away from the tube’s center (crest) produce much smaller, distorted signals than same-size flaws in the narrow section, closest to the tube’s center (dip). This is because of the liftoff created by the tube’s geometry between its walls and the ECT probe. This amount of liftoff translates into a lower probability of detection and less accurate sizing.
Assessing Circumferential Cracking in Non-Ferromagnetic Heat Exchanger TubesEddyfi
Heat exchangers are used to heat and cool various fluids across a wide spectrum of industries. This is especially critical to the power generation and petrochemical industries where fixed equipment reliability is paramount. Tubes in heat exchangers made of such materials as austenitic stainless steel and Inconel are plagued by circumferential cracking, which conventional, single-coil eddy current testing (ECT) cannot reliably detect.
This application note explores how an innovative probe technology is able to address this challenge.
Non-ferromagnetic heat exchanger tubing is susceptible to circumferential cracking in the vicinity of the tubesheet. These cracks are induced by the localized stress created during the tube-to-tubesheet rolling process.
Circumferential cracking is very difficult to detect and characterize with standard eddy current bobbin probes, currently the norm in the industry to inspect tubes, because:
• bobbin probes are very sensitive to tube expansion and ferromagnetic materials, out of which tubesheets are usually made. When analyzing bobbin coil data, it is very difficult to
isolate a small-volume crack from a complex signal comprised of a crack, a geometry change, and added material;
• the orientation of standard bobbin coils is not well suited to circumferential cracks because eddy currents flow parallel to the indications.
Development of remote operated inspection technique for ABWR RIP pipe welds
Study of Ultrasonic Techniques on the Inspection of NPP Components
Development of Automated Electromagnetic Techniques for Inspecting Inner Cracks of LPG Tanks
Reliability Assessment of Automated Eddy Current System for Turbine Blades
Inspection of HTHA on Reactors in CPC Refinery
Inspecting Laser Welds in Component ManufacturingEddyfi
Welding techniques are numerous and each of them has its
peculiarities. Laser beam welding (LBW) uses a laser to
concentrate heat, very quickly producing deep, narrow welds.
Laser welding is common in nuclear applications and highvolume
applications such as automotive component
manufacturing, as well as others where speed and excellent
accuracy are necessary.
Find out more at www.eddyfi.com
Assessing Flow-Accelerated Corrosion in Hard-to-Reach PlacesEddyfi
A high-temperature, high-velocity fluid races toward a 90° bend in an insulated carbon steel pipe. The outcome is inevitable: flow-accelerated corrosion (FAC) will occur at the elbow’s extrados on the inner surface of the pipe.
Similar to Weld probe presentation- Given at COTEQ, Porto Galinhas, Brazil, June 2013 (20)
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Enhancing Performance with Globus and the Science DMZGlobus
ESnet has led the way in helping national facilities—and many other institutions in the research community—configure Science DMZs and troubleshoot network issues to maximize data transfer performance. In this talk we will present a summary of approaches and tips for getting the most out of your network infrastructure using Globus Connect Server.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Weld probe presentation- Given at COTEQ, Porto Galinhas, Brazil, June 2013
1. The Advantages of using
Eddy Current Technology
for Weld Inspection
by John Hansen
2. The Theory Behind Eddy
Current Inspection
Eddy currents are created by using a coil to
induce an ac current into a conductive
material.
The current is concentrated at the surface
and in ferrous material there is little or no
penetration.
3. Changes in the impedance
with a simple coil are indicated
with lift-off giving a distinctly
different signal to a defect.
This for weld inspection makes
inspection very difficult. So
there has to be a better
way……….
4. History Of The WeldProbe
• 1966: Admiralty Materials Laboratory in the UK
develops the Amlec for ferrous weld inspection
(Hocking NDT License the technology) using a simple
absolute probe.
• 1982: The Hocking WeldScan probe was developed by
John Calvert and John Hansen and others for use with
impedance plane eddy current instruments.
• 2000: Inspection procedure is standardised by BS
EN1711 eddy current examination of welds by complex
plane analysis.
5. Why Use Eddy Current Probes
For Weld Inspection?
• MPI and Dye Penetrant inspection require the
removal of the coating before inspection, costing
both money and time.
• Eddy current probes allow welds to be efficiently
inspected for near-surface cracks.
• Eddy current can inspect welds through paint or
metallic coatings.
6. Why Use A Special Probe
For Weld Inspection?
By using a differential coil configuration, eddy
current weld probes:
• Allow inspection without the need to remove any
coating / paint
• Are in-sensitive to lift-off and variations in
material properties caused by the heat affected
zone unlike a simple absolute probe.
7. Probe Anatomy
• A probe was designed with two orthogonal tangential
interleaved coils.
• The coils positioning and accuracy of manufacture is critical to
producing signals as required in the inspection procedure.
8. Scanning With An Eddy Current
WeldProbe
• The active part of the probe is 3mm x 3mm.
• In order to scan the material, multiple scans need to performed. These are:
1. Zigzag scan of
the toe in the
HAZ (heat
affected zone)
along the length
of the toe
2. Scan of the weld
cap
3. A sweep along the
toe
9. What Makes The Weld Probe
So Special?
• Minimal spurious signals caused by lift-off because of
differential connection
• Sensitive to linear or near linear indications (e.g. cracks),
insensitive to symmetrical indications (e.g. holes and pits)
• Low lift-off sensitivity variation; 8 db per mm as compared
with the pencil probe at 40 db per mm.
10. • Directionality means that the defects in line with scan
give a positive indication and defects at right angle
give a negative indication with a null at + and - 45o.
• The probe has been
modeled and it shows an
extremely linear field in the
active area leading to good
sizing capability and
excellent lift off
characteristics.
Probe Response
11. Applications:
Offshore
• Widely used for weld inspection
where it replaces MPI due to not
needing to remove surface
coating
• Readily applicable to
rope access inspection.
So further reducing the
cost of inspection
12. Nuclear
• Widely used in the nuclear NDT industry.
• Used for conventional manual inspection and also in
automated scanners.
13. Rail
Rail Head
Web
Foot
• Used for manual
inspection of defects in
rail and wheels.
• Axle inspection where
it has been shown to be
much more reliable
than UT.
• Weld inspection on
chassis and bogeys.
14. Other Applications
• Bridges.
• Ships/Submarines
• Cranes
• Steel framed buildings.
• Modern Art
• Overhead traffic lights.
• Amusement rides.
• Prison bars to detect saw cuts.
15. Equipment Used To Perform A
WeldProbe Inspection.
• Impedance Plane Display Eddy
Current Instrument (e.g. Vantage
or Veritor).
• Weld probe.
• Paint probe to assess coating
thickness and compensate
calibration by means of shims.
• Test block with 2, 1 and 0.5mm
Notches and four 0.5mm shims.
16. Standardisation
• The technique has been widely accepted by various bodies including
BINDT-PCN, DNV and Lloyds Register.
• In 2000 BS EN1711 “Eddy current examination of welds by complex plane
analysis” was issued. Topics covered by this standard include:
• Equipment and Settings.
• Personnel Requirements.
• Calibration and Calibration Blocks.
• Acceptance Criteria and Weld Considerations.
• Scanning Methods.
• Coating Measurements.
• Testing Plans.
• Detectability of Flaws.
• Method Flow Diagrams.
• Non-acceptable Indications.
• Recording and Reporting of Inspections.
17. Weld Probe Specification
• Straight, 90deg Inline, 90deg Right Angle
• Diameters 11.0 (Small), 16 (Medium), 32mm (Large)
• Dis-connectable and integral probe cables
• Cable lengths from 1.5 to 50meters
• Frequency range 100, 20, 100-600kHz (Fe NFE)
• Minimal lift off signal, can find cracks though paint, oil
and conductive and nonconductive coatings
• Made from hard wearing PET
• Stainless steel and ceramic tips available on request
18. ETher NDE Weld Probes
Standard Bridge - Straight Standard Bridge – 90 Degree Inline
Standard Bridge – 90 Degree Transverse
24. Advantages of EC NDT with
Weld Probes
• Due to their size weld probes are much more suited to
difficult access inspections plus custom versions can be
used to further improve accessibility.
• The equipment is much more portable.
• There is a Euro Normstandardising the procedure for
application (BS EN 1711:2000)
• Weld probes are smaller
• Can apply to a vast range of applications
• Quick inspection time.
• Can inspect through paint or metallic coatings.
• Insensitive to Lift off in comparison with conventional
absolute probes
• Huge range of standard probes available.
25. Negatives of EC NDT with
Weld Probes
• Sensitivity reduces with increasing coating
thickness 8dB/mm put procedure for
compensating for this.
• Not good at discriminating or classifying
defects beyond 5 mm depth in Ferrous
material.
• Requires manual calibration on a test block.
• Standard probes will operate to 100oC and
there are special probes for use at up to 200oC
26. Conclusions
The WeldProbe provides a good alternative to MPI inspection as:
• It is not necessaryto remove the surface coating.
• Better suited for rope access inspectors.
• The probe is relatively easy to use so finds application in
axle inspection.
• National standards, training courses with operator
certification and acceptance by certifying authorities mean
that the WeldProbe becomes a recognised solution.
• Mature technology with over 30 years of application
success