Next Article in Journal
Design and Experimental Investigation of a Hybrid Rotor Permanent Magnet Modular Machine with 3D Flux Paths Accounting for Recyclability of Permanent Magnet Material
Previous Article in Journal
A New Simulation Model for Vertical Spiral Ground Heat Exchangers Combining Cylindrical Source Model and Capacity Resistance Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Research on a Safety Assessment Method for Leakage in a Heavy Oil Gathering Pipeline

1
School of Civil Engineering and Mapping, Southwest Petroleum University, Chengdu 610500, China
2
Petroleum Engineering School, Southwest Petroleum University, Chengdu 610500, China
*
Author to whom correspondence should be addressed.
Energies 2020, 13(6), 1340; https://doi.org/10.3390/en13061340
Submission received: 4 December 2019 / Revised: 27 January 2020 / Accepted: 10 February 2020 / Published: 13 March 2020
(This article belongs to the Section B: Energy and Environment)

Abstract

:
At present, the number of oil and gas gathering and transportation pipelines is numerous, and leakage accidents occur frequently. Each year, due to pipeline failure, there are immeasurable consequences for people and the environment around the affected pipelines. In order to reduce the risk of leakage accidents in heavy oil gathering pipelines and prevent the occurrence of major spills, it is of great significance to carry out safety assessments of them. However, failure data of these pipelines is seriously deficient and statistical methods used to evaluate pipeline safety are incompatible. Therefore, this paper proposes a risk assessment system for heavy oil gathering pipelines in the absence of failure data. Firstly, a Bayesian network (BN) for the leak safety evaluation of heavy oil gathering pipelines is established via mapping from a bow-tie (BT) model. Then, information diffusion theory is combined with fuzzy set theory to obtain the failure probability of each factor affecting the pipeline failure, and then the failure probability of the pipeline is obtained by the full probability formula. In addition, in order to assess the extent of consequences due to accidents, variable fuzzy set theory is used to comprehensively consider the consequences of the leakage of heavy oil gathering pipelines. Finally, the above two parts are combined to form a safety assessment system to realize risk management and control for pipelines, which is necessary to ensure the safety of heavy oil gathering pipelines.

Graphical Abstract

1. Introduction

With the sharp demand for oil and gas consumption, the construction speed of oil and gas gathering and transportation networks is increasing. For oil and gas fields, gathering pipeline networks are usually large and complex [1]. Once a leakage accident occurs, it is very likely to cause casualties, economic losses, and ecological environment damage around the pipeline. It has been proven that the total reserve of heavy oil in the world is about 4 × 109 billion barrels, which is three times the known amount of conventional crude oil resources, thus, more and more attention will be paid to heavy oil exploitation and transportation in the future. However, heavy oil pipes leak more frequently and have higher risk than normal ones because of heated or high temperature transportation. Therefore, carrying out safety assessment for them and reducing the probability of accidents is one of the most important issues in the operation and management of oil and gas fields [2,3].
Safety assessment is a systematic and scientific approach to analyzing risk in industrial systems. In 1992, the Gulf Press of the United States first published the monograph “Pipeline Risk Management Handbook” by W. Kent Muhlbauer, which is the world’s first monograph on the risk assessment of oil and gas pipelines. It completely described a risk scoring method and pipeline risk assessment model [4]. Recently, more and more experts and scholars have begun to realize the need for safety in heavy oil gathering pipelines. A number of methods have been proposed for initial safety assessment, including an analytical hierarchy process (AHP), fuzzy logic [5,6,7] (FL), fault tree analysis [8,9] (FTA), event tree analysis [3] (ETA), and a bow-tie model [10,11,12,13,14,15], and so on.
However, the above methods are slightly insufficient for the safety assessment of heavy oil gathering pipelines, mainly because the results of the assessment are more subjective, or require complete and reliable failure data [16,17,18], where the development status does not match the current safety assessment of heavy oil gathering pipelines. Moreover, research on the consequences of failure have concentrated on certain specific consequences [19,20,21,22,23,24]. However, the types of consequences of pipeline leakage are diverse, and research on a single type of leakage consequence clearly cannot meet the requirements of severity assessment. Therefore, this paper proposes a safety assessment system which consists of two parts, one is the failure possibility research, and the other is a comprehensive evaluation of the leakage consequences.
The following work is carried out in this paper. Information diffusion theory is combined with fuzzy set theory to obtain the failure probability of each factor affecting pipeline fault. Then, the fault probability of the pipeline can be obtained by the full probability formula, and the Bayesian network (BN) is used as the carrier to update the probabilities of nodes. Furthermore, variable fuzzy set theory is used to comprehensively evaluate the consequences of leakage and determine the severity of the consequences. Finally, the above two parts form a safety evaluation system to realize risk management and control of pipelines.

2. Methodology for Uncertainty in Risk Analysis

2.1. Bayesian Network

2.1.1. Theoretical Basis

The BN has been described as a belief network or probability network [25]. It is a directed acyclic graph structure based on graph theory and probability theory. Here, we let B = (G, P) = (X, E, P), which is used to represent a BN, where G represents a directed acyclic graph of the variable domain, P represents a set of conditional probabilities, and a directed acyclic figure, such as G = (X, E), where X represents a set of random variables and E represents a set of directed edges. For each node x1X in the directed acyclic graph G, a conditional probability table is assigned. Each edge e1E corresponds to an interdependent relationship (Figure 1).
Figure 1. A typical 6-node Bayesian network (BN).
Figure 1. A typical 6-node Bayesian network (BN).
Energies 13 01340 g001
where X = {X1, X2, X3, ···, Xn} is used to represent the set of random variables, x={x1, x2, x3, ···, xn} represents the value of the random variable, and the variable in X corresponds to the nodes in the BN. Here, E1, E2, E3, E4, and E5 are directed edges. For example, E1 is a directed line segment of the X2 node pointing to the X1 node, indicating the dependency of the X1 and X2 nodes. Moreover, X2 is the parent node of X1 and X1 is a child node of X2. Here, X4, X5, and X6, having no parent node, are also called root nodes. Each root node has prior probability, and a non-root node has a conditional probability table for the corresponding parent nodes. The prior probability means that the node has an independent probability of occurrence (Table 1). There are only two possible states, namely, Y (occurs) or N (does not occur), and the probability value in the table indicates the probability that the node is in a different state. The sum of all probability values in each prior probability is l. The conditional probability represents the causal relationship between the parent node and the child node. Table 2 shows the probability of the child node variable X1 = f (X2, X3), given the parent node variables X2 and X3, that is, the conditional probability of the variable X1 when its parent nodes X2 and X3 take each possible value.
In addition, the BN can describe multiple states of random events. Taking the X1 node as an example, the traditional method represented by the failed fault tree can only describe the two states of the event X1 node, namely, “occurrence” and “does not happen”. However, in engineering practice, the X1 node tends to present a variety of states, and a BN can effectively resolve this contradiction, where X1 events would be described as “does not happen”, “may happen”, “certainly occur”, and so on. It can be seen from the analysis that the BN has obvious advantages in dealing with the uncertainty problem and can be applied to the problem of constant probability change in the security risk analysis of leakage failure in heavy oil gathering pipelines.

2.1.2. Establishment of Bayesian Network

There are usually two methods for establishing a BN. One is based on expert knowledge and experience, which is efficient, intuitive, and concise. However, a complex BN will result in a situation where the logic is not strict and not considered well. The other method is to convert the corresponding BN through a mapping structure based on logically strong fault tree analysis or event tree analysis. The heavy oil gathering pipeline system, having numerous failure causes, is complicated. Therefore, this research adopts the second method, that is, to establish a logically strong bow-tie (BT) model and then to map it into a BN structure [26].
The transformation of the BT model and BN mainly includes two aspects, namely, graphics conversion and numerical conversion (Figure 2). In the BT model, basic events, the intermediate events, and the top event are respectively represented as the root nodes, along with the child nodes and the leaf node in the equivalent BN, and the security barriers correspond to the security nodes, but the logical relationships between the security nodes, consequence nodes, and leaf node need to be considered. The probability of the basic events is assigned as the prior probability to the corresponding root nodes in the BN, and the conditional probability table is assigned to the intermediate nodes and the leaf node.

2.2. The Idea of Calculating Failure Probability

The average failure probability of pipeline leakage is often expressed as the number of failures per unit time/total length, which is usually inaccurate. In order to gain more accurate results, a complete failure statistics database is required. China’s failure data of heavy oil gathering pipelines are incomplete at present. In order to more accurately express the actual leakage failure probability. This paper proposes a new node-based probability solution. Take Figure 1 as an example. First, we make full use of intermediate node failure data, which are more specific. Then, information diffusion theory is used to improve the accuracy of the average failure probability of the intermediate nodes (X2, X3). Then, the failure probability of leaf node (X1) can be determined by BN software. Finally, through the comparison of the failure possibility of the intermediate nodes, caused by the failure of the parent nodes (X4, X5, X6), fuzzy set theory is used to transform the expert experience into the subjective possibility. Then, the failure probability of the parent nodes can be obtained by the failure probability of the intermediate nodes. The calculation process is shown in Figure 3.

2.2.1. The Failure Probability of Intermediate Nodes

Information diffusion theory is used to improve overall distribution accuracy by optimizing the use of small sample information, that is, to transform single-valued samples into set-valued samples and perform set-valued fuzzy processing on these samples.
Here, we assume that the average failure probability values of pipeline corrosion indicators in the past m years are x1, x2, …, xt, respectively, and the set of samples recorded as the average failure probability are denoted by X = {x1, x2, …, xj, …, xt}, where m is the total number of samples. Here, Ui = {u1, u2, …,ui, …, ur} is a subset of information diffusion and each xj within the X set, where i = 1, 2, …, r. The ui value is a discrete real value obtained by discrete spacing at a fixed interval. Any sample point of xj spreads the entropy information it represents to all points in the average failure probability set Ui, and the corresponding diffusion estimation expression is shown in Equation (1):
f i ( u j ) = 1 h 2 π exp [ ( x i u j ) 2 2 h 2 ]
where h is the information diffusion coefficient, which is determined by the minimum average failure probability a, the maximum average failure probability b, and the number of leakage average failure probability sample t. Its formula is as follows:
h = { 0.8146 ( b a ) t = 5 0.5690 ( b a ) t = 6 0.4560 ( b a ) t = 7 0.3860 ( b a ) t = 8 0.3362 ( b a ) t = 9 0.2986 ( b a ) t = 10 2.6851 ( b a ) / ( t 1 ) t > 11
Remember that C i = j = 1 r f i ( u j ) , i = 1 , 2 , t , where C i is the total amount of information that the sample x i normally diffuses into the domain, which is and normalized to the following:
μ x i ( u j ) = f i ( u j ) C i , i = 1 , 2 , t ; j = 1 , 2 , r
where μ x i ( u j ) is the normalized information distribution of the average failure probability of the sample ( x i ). Here, we let Q = i = 1 t j = 1 r μ x i ( u j ) , where Q is the sum of the average number of failure probability samples ( x i ). Under ideal conditions, Q = t , however, because there is a rounding error in the calculation, Q t , which is easy to know.
P ( u j ) = i = 1 t μ x i ( u j ) Q
where P ( u j ) is the frequency at which the average failure probability sample falls at u j , which can be used as the failure probability value at u j , and P ( u u j ) is the value of the probability of surpassing u j in the sample.
P ( u u j ) = k = j r P ( u k ) , j = 1 , 2 , , r
Due to the complexity of the gathering pipeline system, it is almost impossible to ensure the absolute safety of the system. In addition, an abnormally high level of safety means that the cost of input is immeasurable. Elucidating how to measure the relationship between the degree of safety and spending is worthy of consideration. To make the calculation result more operable and the evaluation more straightforward, this paper introduces failure probability, P0, which represents a certain expected value, indicating the ratio of the allowable over-period probability Pa to the maximum over-probability Pm, and the expression of this is P 0 = β × P a / P m , where β is the adjustment factor, β = 1 represents safety assessment of the leakage accident for the first time, and each calculation can be appropriately raised or lowered by the manager according to the last safety assessment. Here, P0 can be divided into five levels. The higher the P0 value, the higher the acceptable degree of overtaking probability and that the middle and lower values are acceptable (Figure 4).

2.2.2. Fuzzy set theory

Failure data of the existing sub-nodes and root nodes are obviously insufficient, where neither the information diffusion method nor the statistical method cannot be used to calculate the failure probability. Therefore, it is necessary to combine the experience of experts and field operators to determine the probability of occurrence for child nodes and root nodes. However, when the evaluator expresses an opinion on the evaluation subject, the evaluation results are subjective, and the process of semantic value conversion occurs. It is difficult to ensure that different evaluators express the same inner feelings for the same semantic expression. Thus, fuzzy set theory is introduced to transform the linguistic variables of experts and field operators into certain numerical variables [27,28].
Suppose the fuzzy number on the domain R is M. Considering the membership function μ M ¯ , where R [ 0 , 1 ] of M, the triangular fuzzy number can be expressed as M = ( l , m , u ) , and its membership function expression is given as follows:
μ M ¯ ( x ) = { 0 y l ( y l ) / ( m l ) l y m ( u y ) / ( u m ) m y u 0 y u
In Equation (6), l, m, and u represent the lower bound of the triangular fuzzy number, the most likely value and the upper bound, respectively, where α = m l , β = u m . Here, α , β are the degree of ambiguity. If α , β < 0.5 , the ambiguity is too small. If α , β > 1 the ambiguity is too ambiguous. Usually, α , β [ 0.5 , 1 ] is more suitable.
• Decision Matrix
Taking the intermediate X2 node as an example to solve the prior failure probability of the parent nodes, the failure probability of the parent nodes (root nodes) is represented by Ps and s = 1, 2, and 3, represent nodes X3, X4, and X5, respectively. Three industry experts were selected to evaluate the probability of failure probability. According to the experience and failure data, a fuzzy number ( ( l 1 , m 1 , u 1 ) , ( l 2 , m 2 , u 2 ) , and ( l 3 , m 3 , u 3 ) ) was obtained for the influence of the activity of the child nodes, respectively. The initial triangular fuzzy evaluation table is shown in Table 3.
The operation method of two triangular fuzzy numbers M1 and M2 is described in [29], where the three fuzzy numbers of Cqs are combined into a fuzzy number according to the rule of l 1 + l 2 + l 3 3 , m 1 + m 2 + m 3 3 , u 1 + u 2 + u 3 3 .
• Determine initial likelihood
Through the calculation of Equation (7), the initial probabilities of C1, C2, and C3 are D c 1 = ( 0.26 , 0.45 , 0.83 ) , D c 2 = ( 0.18 , 0.33 , 0.56 ) , and D c 3 = ( 0.14 , 0.22 , 0.37 ) , respectively.
D c q = q = 1 3 a q s ÷ q = 1 3 s = 1 3 a q s
• Defuzzification
F ( D c 1 D c 2 ) = { 1 m 1 m 2 l 2 u 1 ( m 1 u 1 ) ( m 2 l 2 ) m 1 m 2 , u 1 > l 2 0 other
The initial failure probability was defuzzified and then normalized to obtain the operational misoperation, maintenance misoperation, and construction misoperation, which were 0.54, 0.35, and 0.11, respectively. Then, the failure probability value of all root nodes can be solved step by step.

2.2.3. The updating of nodes failure probability in Bayesian Network

The failure probability of the root nodes, child nodes, intermediate nodes and leaf node of the entire BN can be obtained by the above method. When the data are accumulated to a certain amount, the prior failure probability of nodes can be updated, thereby obtaining posterior probability. The failure probability of the resulting nodes will be closer to the actual situation by updating the failure data, where the updating process is shown in Figure 5.
Compared with long-distance pipelines, heavy oil gathering pipelines have the characteristics of having long lines, a wide area, many stations, dense pipelines, crossover with each other, and imperfect data records. Li Yarong [30] combined a fuzzy comprehensive evaluation method with the Kent pipeline evaluation method to construct a fuzzy comprehensive evaluation system for risk in natural gas gathering and transportation pipelines, which could evaluate the risk of natural gas gathering pipelines objectively and semi-quantitatively. Qin Chuan [31] used the theory of pre-hazard analysis to establish a pre-hazard analysis table to determine the probability of accidents and the level of accidents in a gathering pipeline. Zeng Xuanwei [32] calculated the failure probability of a gathering pipeline by weighting the failure possibility factors and evaluating the consequence level of pipeline accidents. The above method is slightly insufficient in terms of the safety evaluation of heavy oil gathering and transportation pipelines. There are two main disadvantages, however. On the one hand, the evaluation results are more subjective, while, on the other hand, the data requirements are too high. After analysis, heavy oil gathering pipeline leakage usually has four consequences, namely, casualties, direct economic losses, environmental pollution, and negative social impacts, while an industry norm in China "Production Safety Accident Reporting and Investigation Regulations" only gives the scope of casualties and direct economic losses. If only the casualties and direct economic losses are taken into account, the evaluation of the consequences is one-sided. Environmental pollution and negative social impacts caused by pipeline leakage are also receiving more and more attention. In addition, the consequences of environmental pollution and negative social impacts are ambiguous and cannot be accurately quantified. Secondly, the leakage of previous gathering pipelines indicates different leakage consequences resulting in different impacts for oilfields. At present, the production concept in China is centered on the safety of production, and the benefits and environmental and social impacts are three-fold. Therefore, based on the consideration of personal injury and direct economic loss, this research conforms to the current development theme, increasing the indicators of environmental damage and social influence factors, and applying variable fuzzy set theory to evaluate the consequences of leakage failure of heavy oil gathering pipelines comprehensively.

2.3. Assessment of Leakage Consequence Rating

2.3.1. Variable Fuzzy Set Principle

One of the most basic concepts in fuzzy set theory is ambiguity. The degree of membership can express the difference between objective things [33,34], while variable fuzzy set theory describes things by relative membership. The intermediate transition state of the difference is a dynamic description of ambiguity in a precise mathematical language [35].
Suppose that the fuzzy concept A on the domain Z assigns a value of 0 and 1 to the left and right endpoints of the A-dimensional difference intermediate transition segment. Therefore, a continuum with an interval of 0 to 1 is formed on the number axis from 0 to 1 [36]. This is relative to a reference frame for a time-space condition. For any element z ( z Z ) in Z, the relative memberships of the object z, representing the concept of attraction and repulsion, are denoted by μ A ( z ) and μ A c ( z ) , where μ A ( z ) + μ A c ( z ) = 1 and 0 μ A ( z ) 1 , 0 μ A c ( z ) 1 .

2.3.2. Relative Difference Function Model

Taking environmental damage as an example, we let the interval [a, b] be the fuzzy variable set attraction domain of the leakage effect of the domain Z environment destruction, where a denotes that the environmental damage is light, b denotes that the environmental damage is heavy, and interval [c, d] is the range field containing the upper and lower bounds of [a, b]. It can be seen from the fuzzy set complement algorithm that the intervals [c, a] and [b, d] are the exclusion domains of the fuzzy variable set and that M represents the qualitative change points from a to b. We let the relative difference function be D A ( z ) = μ A ( z ) μ A c ( z ) , and z is the specific quantitative value of the environmental damage caused by the leakage of the collecting pipeline in a certain year. If D A ( z ) > 0 , this means that z falls on the interval [a, b], and, at this point, z is attractive if D A ( z ) < 0 , which means that z falls on the interval [c, a] and [b, d], and, at this point, z is repulsive. When things change from attractive to repulsive, they must pass the point of gradual change. The relationship of z between each interval and the mass change point M is shown in Figure 6 below.
In Figure 6, the endpoints c and a of the interval divide the variable domain of environmental destruction into different sub-intervals. When x falls in different intervals, there will be a corresponding difference in the function model at this time. From the set of complement operations and the definition of relative difference function, we can obtain the following formula:
μ A ( z ) = [ D A ( z ) + 1 ] / 2
When z falls to the left of point M, the corresponding relative difference function model is as follows:
{ μ A ( z ) = [ ( z a M a ) γ + 1 ] / 2 ; z [ a , M ] μ A ( z ) = [ 1 ( z a c a ) γ ] / 2 ; z [ c , a ]
When z falls to the right of point M, the corresponding relative difference function model is as follows:
{ μ A ( z ) = [ ( z b M b ) γ + 1 ] / 2 ; z [ M , b ] μ A ( z ) = [ 1 ( z b d b ) γ ] / 2 ; z [ b , d ]
where γ is a non-negative exponent, usually taken as 1, and satisfies the following conditions: (1) When z = a or b, μ A ( z ) = 0.5; (2) when z = M, μ A ( z ) = 1; (3) when z = c or d when μ A ( z ) = 0; (4) when μ A ( z ) = μ A c ( z ) , D = 0.5.

2.3.3. Comprehensive relative membership

After determining the relative difference function model of the object to be evaluated, the variable fuzzy set comprehensive evaluation model proposed by Chen, S. [37,38] can calculate the comprehensive relative membership degree of the leakage consequence of the q-th year to the consequence level g via the following equation:
u q g = { 1 + [ q = 1 m [ ω q ( 1 μ A ( z s ) g ) ] w q = 1 m [ ω i μ A ( z s ) g ] w ] η w } 1
where q is the year of the consequence safety assessment, g the consequence level division; η is the variable optimization standard parameter; w is the distance parameter; ω is the weight of failure consequence type; η and w have four combinations: (1) η = 1, w = 1; (2) η = 1, w = 2; (3) η = 2, w = 1; (4) η = 2, w = 2.

2.3.4. Level eigenvalues and comprehensive evaluation

The formula for calculating the level eigenvalue of the q-th year to be evaluated is as follows:
H q = ( 1 , 2 , , c ) U q g T
where c is the consequence level. The consequence level of this paper is divided into four levels, so c = 4 and T is the transposed matrix. The final comprehensive evaluation result of the q-year consequences is calculated according to Equation (14):
H q ¯ ( u ) = q = 1 4 H q / 4
When H q ¯ ( u ) is greater than the midpoint of the two-level interval, the consequence evaluation takes a larger level, otherwise a smaller consequence level is taken (Table 4).

3. Case study

Safety assessment is an important part of integrity management and is the basis for conducting pipeline integrity testing and evaluation. At present, there are more than 9500 kilometers of metal gathering and transportation pipelines in A oilfield ,which is located in the northwestern area of China. The gathering and transportation pipelines account for about 80% of the total length of the pipelines. These pipelines pass through the Gobi Desert, along with passage over railways, highways, national roads, woods, scenic areas, etc., which have complex terrain and present frequent leakage in pipelines.
Up to now, there is no standard for the risk analysis of heavy oil gathering and transportation pipelines in the Chinese A oilfield. According to the national requirements for pipeline integrity, all pipeline safety assessments must be completed within three years. Therefore, it is urgent to combine the regional characteristics of the A oilfield and formulate corresponding safety evaluation methods to guide on-site risk safety evaluation work.

3.1. Establishment of BT Model

3.1.1. Risk Identification

Risk identification is the most important basic work of safety evaluation. The completeness and accuracy of risk identification is directly related to the consistency between the established evaluation model and the evaluation object and the reliability of the evaluation results. After on-the-spot investigation, the risk sources of the A oilfield gathering pipelines can be divided into the following four aspects:
  • Third-party damage
    The heavy oil gathering pipelines in the A oilfield are staggered vertically and horizontally, and there are more pipelines for parallel or crossing roads. Ground protection devices or protective measures are not in place. Here, the marking piles of pipelines are fewer in number and seriously damaged, where only the text can be distinguished. Moreover, it is generally considered that the linear direction between the wellhead and the metering station is the pipeline direction, which often results in serious construction damage. At last, due to the special geographical environment of the A oilfield, which is sparsely populated, locomotives often ignore the road and randomly shuttle, usually causing pipeline stress or fatigue damage.
  • Corrosion
    Corrosion mainly includes internal corrosion and external corrosion. The medium transported by heavy oil gathering pipelines is generally a multi-phase flow with oil, gas, water, hydrocarbon and solid coexistence. The transport medium has a high degree of mineralization and can easily generate ions. There are also corrosive media such as dissolved oxygen, carbon dioxide, sulfides, and a large number of sulfate-reducing bacteria, along with mud sand, resulting in fouling, corrosion, and the abrasion of pipelines. On-site investigation of the corrosion causes of heavy oil gathering and transportation pipelines in the A oilfield mainly includes the following aspects: Some working areas have reservoirs, resulting in a high groundwater level, and water content in produced oil is ~85–92%, where some samples have high soil salinity. The transport medium contains more impurities, such as saprophytic bacteria, iron bacteria and sulfate reducing bacteria, etc. Some insulation layers are severely destroyed, and some are directly exposed to the outside, where the maintenance condition of which is not ideal. Moreover, the sulfur content in the produced oil is 0.34%, the acid value is 2.11 mg KOH/g, and the salt content is 15.93 mg of NaCl/L.
  • Misoperation
    There are many accessories and auxiliary facilities for heavy oil gathering pipelines, and the operators will make mistakes if they pay little attention to them. In the past accident records, accidental operation has caused pipelines to overpressurize and explode, to date resulting in the death of one staff member and many injuries. In addition, the frequency of regular safety training and job training is also one of the main sources of misoperation.
  • Material/Welding/Accessories
    The construction time of heavy oil gathering pipelines in the A oilfield is relatively long. Due to the welding technology level and the limited welding process at the time of pipeline construction, there is a large number of weld crack defects in the pipelines. With the long-term operation of the pipelines, the defects in initial small weld seams continue to expand and become larger, which brings about great hidden dangers to the safe operation of the pipeline. The quality of welding and maintenance will also directly affect the operating life of the pipelines. In the welding construction process, defects such as wear and dents often occur. If the defects are not discovered in time or are not fixed, they will become weak points of destruction during operation, especially in the later stages of service, where it is easy to induce damage. After on-site investigation, although the pipeline construction has been carried out by units with more than three years of construction experience, it has also been found that some construction misoperation still exists and that inspections are not in place. For example, anti-corrosion layers of different pipelines in the same operation area are very different. After running for many years, some are still intact, while some have already begun to fall off and even be destroyed. Leakage failure caused by weld defects occurs more frequently, which is inferred to be due to the quality of pipe welding construction. In addition, the maintenance situation is also uneven, and some pipeline accessories are exposed to the atmosphere and obviously fall off, but nobody cares.

3.1.2. Establishment of BT Model

The analysis of 3.1.1 examined accidents and the characteristics of heavy oil gathering and transportation pipelines in the A oilfield, such as frequent ground activities and the violation of regulations, etc. According to the characteristics of the types of consequences of leakage failure and the evaluation of the consequences of pipeline leakage in today’s society, direct economic losses (pool fires), environmental damage (water pollution and soil pollution), social impacts, and personal injuries (explosions, fires casualties) are considered here. The BT model of the heavy oil gathering pipeline was established as shown in Figure 7.
The specific event descriptions in the BT model are shown in Table 5.

3.1.3. Conversion of BT model and BN

From the conversion method of BN introduced in Section 2.1.2, the BN for the safety evaluation of heavy oil gathering pipelines can be obtained from the BT model (Figure 8).

3.2. Failure Probability Calculation of Intermediate Nodes

The leakage data of the gathering pipelines in the A oilfield of Northwest China from 2011-2016 is given in Table 6.
The outcome of intermediate nodes, such as corrosion, third-party damage, misoperation, and material/weld/pipe accessories was given by the formula of average failure probability and the results are shown in Table 7.
Taking third-party damage as an example to calculate the failure probability by using information diffusion theory, the minimum average probability of failure in the observed sample is 0.0269, and the maximum value is 0.0560. Therefore, the domain can be set to [0.024, 0.0600] and the dispersion is {0.0240, 0.0280, 0.0320, 0.0360, 0.0400, 0.0440, 0.0480, 0.0520, 0.0560, 0.0600}, with an interval of 0.004. The information of the above formula (~1–5) can be used to obtain the probability of surpassing, that is, the probability of leakage failure under certain expected values. In the same way, the probability of leakage failure of the misoperation, corrosion and material/welding/pipe accessories at a certain expected value is 0.0400, 0.0004, 0.0005, 0.0125, respectively.

3.3. Solution of the Leaf Node and Root Nodes’ Probability

According to the failure data, the objective failure probability of the intermediate nodes can be obtained by information diffusion theory. Then, to obtain the subjective failure probability, fuzzy set theory is used for the failure data. Finally, the subjective failure probability and the objective failure probability can be used comprehensively to derive the root nodes’ failure probabilities. The probability of a priori failure of all root nodes and the failure probability rankings are shown in Table 8.
As can be seen from Section 2.1.1, a BN inference requires solving the a priori failure probability of the parent node by setting the conditional probability of the child node firstly, and then realizing the probability estimation of the leaf node in the BN. The prior failure probabilities of corrosion, third-party damage, misoperation, and material/welding/pipeline accessory are 0.0400, 0.0004, 0.0005, and 0.0125, respectively, and the leaf node leakage probability is 0.065 times/(km·year). At present, there are several more comprehensive failure databases in the world, including the European EGIG (European Natural Gas Pipeline Incident Data Organization) database, the US PHMSA (Pipeline and Hazardous Materials Safety Administration) database, and the Canadian EUB (Albert Energy and Utilities Commission) database. The probability of leakage failures derived from their failure data is approximately 1.4 × 10−3, 4.19 × 10−3, and 1.1 × 10−2 times / (km·year), respectively [39]. Because most of the transport media in the gathering pipelines is untreated or coarsely treated, the failure probability of them is higher than that of long-distance pipelines. Obviously, we can still see the gap between China and developed countries in terms of pipeline safety. There is still a long way to go in terms of mitigating leakage risk, and continuous measures need to be taken to reduce the probability of pipeline leakage.

3.4. Analysis of Failure Consequences of Heavy Oil Gathering Pipeline

Establishing a scientific and complete consequence index system is the premise and basis for the safety assessment of the gathering pipeline. According to the characteristics of the types of consequences of the leakage failure and the current development theme, this paper uses the “Production Safety Accident Reporting and Investigation Regulations”. In addition to personal injury and direct economic loss, environmental damage and social impact are also considered. The above four types of consequences are classified in Table 9.
Personal injury and death in Table 2 includes both injuries and deaths. Combined with the operation of the heavy oil gathering pipeline in the A oilfield for many years, the number of deaths caused by leakage is less. In order to get closer to the consequences of personal injury and death caused by leakage, a more stringent classification was set based on the "Production Safety Accident Reporting and Investigation Regulations". In addition, in order to better clarify the meaning of the number of injuries and deaths, the value of the injury was limited to from 0–1, which is a comprehensive quantitative value of the number of people and the degree of injury, that is, as long as someone is injured, the value is limited to the interval of [0,1], according to the severity of the injury and the number of people. The value of death is greater than 1. At present, there are no relevant recovery standards for environmental damage caused by oil and gas pipeline leakage, so this paper gives a grade standard according to experience by environmental recovery personnel. The social impact coefficient is manifested by social impacts such as panic caused by leakage and explosion, bad maintenance, and repairs for frequent pipeline leakage, and even social panic. Based on the annual frequency of leakage, we set the received maximum number of leakages to 1, so the value of the social impact coefficient is 0–1. The higher the frequency of pipeline leakage every year, the higher the social impact coefficient, which denotes a more serious impact on society.

3.4.1. Standard Interval of the Indicator Level

According to the interval division result of the security level of the consequences in Table 9, the ranking evaluation matrix and the variable interval matrix are Iab and Icd, respectively.
I a b = ( [ 0 , 0.5 ] [ 0.5 , 1 ] [ 1 , 3 ] [ 3 , 10 ] [ 0 , 0.1 ] [ 0.1 , 0.5 ] [ 0.5 , 1 ] [ 1 , 3 ] [ 0 , 10 ] [ 10 , 50 ] [ 50 , 100 ] [ 100 , 500 ] [ 0 , 0.2 ] [ 0.2 , 0.5 ] [ 0.5 , 0.7 ] [ 0.7 , 1 ] ) I c d = ( [ 0 , 1 ] [ 0 , 3 ] [ 0.5 , 10 ] [ 1 , 10 ] [ 0 , 0.5 ] [ 0 , 1 ] [ 0.1 , 3 ] [ 0.5 , 3 ] [ 0 , 50 ] [ 0 , 100 ] [ 10 , 500 ] [ 50 , 500 ] [ 0 , 0.5 ] [ 0 , 0.7 ] [ 0.2 , 1 ] [ 0.5 , 1 ] )
Firstly, we determined the point equaling to 1 membership degree in each level interval, and then obtained the matrix M by combining the characteristics of the consequence level interval with the physical meaning of the parameter M [40].
M = ( 0 0.75 2 10 0 0.3 0.75 3 0 30 75 500 0 0.35 0.6 1 )
The data on the consequences of the 2011-2016 heavy oil gathering pipeline leakage are shown in Table 10.

3.4.2. Determination of Comprehensive Membership

From Equations (2) to (3), taking the 2011 data as an example for calculation, the matrix of relative membership degree can be calculated by the combination of the four kinds of consequence type weights ω i = ( 0.39 , 0.23 , 0.21 , 0.17 ) , and then brought into Equation (4), where the relative membership matrix U 2011 h of each consequence level is as follows:
U 2011 = ( 0.80 0.20 0 0 0.17 0.66 0.17 0 0.33 0.33 0.14 0.19 0.38 0.16 0.33 0.13 ) U 2011 h = ( 0.22 0.42 0.07 0.29 0.30 0.45 0.08 0.17 0.31 0.44 0.09 0.16 0.29 0.44 0.08 0.18 )
Combined with the Equations (5) to (6), the four combined eigenvalues of the failure consequence level of the heavy oil gathering pipeline in 2011 are 2.786, 1.780, 1.811 and 2.096, respectively. Similarly, the combined eigenvalues of 2012-2016 can be calculated (Table 11), and the trend with time here is shown in Figure 9.
The mean level eigenvalues in Table 10 shows that although the consequence levels in 2011-2016 are at level 2 to level 3, it can be clearly seen that the eigenvalue levels show a significant upward trend (Figure 3). The solid line in the figure is the contour line of the annual eigenvalue level connected in chronological order, the dashed line is the trend line of the trend fitting, which is fitted with the equation y = 0.0252x − 48.541 and the correlation coefficient is 0.9438. It can be seen from the figure that if the relevant measures are not taken, a major accident phase will be entered, suggesting a major accident in 2025, thus, corresponding measures must to be taken to avoid further consequences.

4. Conclusions

In this paper, the safety evaluation of heavy oil gathering pipeline leakage is carried out, and a corresponding safety evaluation system is proposed. The following conclusions can be drawn: With more complete failure data, as a breakthrough, improved information diffusion theory has been used to correct the failure probability of the previously used statistical methods. Moreover, risk factors lacking failure data have been calculated by fuzzy set theory, then the failure probability of each risk factor has been obtained. In addition, this has been carried out via the comprehensive consideration of the consequences of leakage, adopting variable fuzzy set theory to calculate the consequences for various levels of leakage. In the operation and maintenance of pipelines, corresponding mitigation measures should be taken in combination with the probability of pipeline leakage failure and the severity of the consequences in order to reduce or control risks and avoid greater leakage consequences. While, at present, this article presents no separation between accidents on land and under water because of the lack of accurate data, and, as we know, such accidents can be different in their environmental and economic scale, so it is worth considering this distinction in further research and risk management in the future.

Author Contributions

Conceptualization, X.C. and P.Z.; methodology, P.Z.; software, X.C.; writing—original draft preparation, X.C. and C.F.; scene researching X.C.; writing—review and editing, X.C.; supervision, P.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China, grant number 50974105, and the Research Fund for the Doctoral Program of Higher Education of China, grant number 20105121110003.

Acknowledgments

The authors are grateful to the National Natural Science Foundation of China for their support. The authors also acknowledge the provision of the heavy oil gathering pipeline leakage data and consequence data of the northwestern A oilfield.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. He, G.; Li, Y.; Lin, M.; Liao, K.; Liang, Y. Optimization of Gathering and Transmission Pipe Network Layout in Gas Field and Pipeline Route in 3D Terrain. J. Pipeline Syst. Eng. Pract. 2019, 10, 1190–1204. [Google Scholar] [CrossRef]
  2. Leung, T.; Hartloper, C.; Smith, J.; Botros, K.K.; Golshan, H.; Glenb, T. Application of EVM to determine pipe internal surface conditions in complex natural gas lateral networks. J. Nat. Gas Sci. Eng. 2015, 24, 217–227. [Google Scholar] [CrossRef]
  3. Zhang, P.; Qin, G.; Wang, Y. Risk assessment system for oil and gas pipelines laid in one ditch based on quantitative risk analysis. Energies 2019, 12, 981. [Google Scholar] [CrossRef] [Green Version]
  4. Muhlbauer, W.K. Pipeline Risk Management Manual, 3rd ed.; Gulf Publishing Companies: Houston, TX, USA, 2004; ISBN 978-0-7506-7579-6. [Google Scholar]
  5. Bertuccio, I.; Moraleda, M.V.B. Risk assessment of corrosion in oil and gas pipelines using fuzzy logic. Corros. Eng. Sci. Technol. 2012, 47, 553–558. [Google Scholar] [CrossRef]
  6. Arvind, K.R.M.; Chandima, R. Generic approach for risk assessment of offshore piping subjected to vibration induced fatigue. Corros. Eng. Sci. Technol. 2018, 4, 9017–9025. [Google Scholar]
  7. Abbas, R.; Banafsheh, Z.; Massoud, T. Integrated risk assessment of urban water supply systems from source to tap. Stoch. Environ. Res. Risk Assess. 2013, 27, 923–944. [Google Scholar]
  8. Cheliyan, A.S.; Bhattacharyya, S.K. Fuzzy fault tree analysis of oil and gas leakage in subsea production systems. J. Ocean. Eng. Sci. 2018, 3, 38–48. [Google Scholar] [CrossRef]
  9. Qi, J.; Hu, X.; Gao, X. Quantitative risk analysis of subsea pipeline and riser: An experts’ assessment approach using fuzzy fault tree. Int. J. Reliab. Saf. 2014, 8, 33–50. [Google Scholar] [CrossRef]
  10. Anjuman, S.; Rehan, S.; Solomon, T. Risk analysis for oil & gas pipelines: A sustainability assessment approach using fuzzy based bow-tie analysis. J. Loss Prev. Proc. Ind. 2012, 25, 505–523. [Google Scholar]
  11. Muniz, M.; Vinicios, P.; Lima, G.; Brito, A.; Caiado, R.G.G.; Quelhas, O.L.G. Bow tie to improve risk management of natural gas pipelines. Process Saf. Prog. 2018, 37, 169–175. [Google Scholar] [CrossRef]
  12. Dawotola, A.W.; Vrijling, J.K. Decision analysis framework for risk management of crude oil pipeline system advances in decision sciences. Adv. Decis. Sci. 2011, 2011, 456824. [Google Scholar]
  13. Bilal, Z.; Mohammed, K.; Brahim, H. Bayesian network and bow tie to analyze the risk of fire and explosion of pipelines. Process Saf. Prog. 2017, 36, 202–212. [Google Scholar] [CrossRef]
  14. He, R.; Li, X.; Chen, G. A quantitative risk analysis model considering uncertain information. Process Saf. Environ. Protect. 2018, 18, 361–370. [Google Scholar] [CrossRef]
  15. Alexander, G.U.; Atsushi, A. Pipeline risk assessment using artificial intelligence: A case from the colombian oil network. Process Saf. Prog. 2018, 37, 110–116. [Google Scholar]
  16. Shan, K.; Shuai, J.; Xu, K.; Zheng, W. Failure probability assessment of gas transmission pipelines based on historical failure-related data and modification factors. J. Nat. Gas Sci. Eng. 2018, 52, 356–366. [Google Scholar] [CrossRef]
  17. Li, X.; Chen, G.; Zhu, H.; Zhang, R. Quantitative risk assessment of submarine pipeline instability. J. Loss Prev. Proc. Ind. 2017, 45, 108–115. [Google Scholar] [CrossRef]
  18. Roberto, B. A statistical analysis of causes and consequences of the release of hazardous materials from pipelines. The influence of layout. J. Loss Prev. Process Ind. 2018, 56, 458–466. [Google Scholar]
  19. Ma, H.; Yuan, L.; Zhong, M.; Li, X.; Xie, Q.; Xie, X. Study on ground vibration mode of physical explosion of high pressure natural gas pipeline. Acoust. Phys. 2019, 65, 583–592. [Google Scholar]
  20. Zardasti, L.; Yahaya, N.; Valipour, A.; Rashid, A.S.A.; Noor, N.M. Review on the identification of reputation loss indicators in an onshore pipeline explosion event. J. Loss Prev. Process Ind. 2017, 48, 71–86. [Google Scholar] [CrossRef]
  21. Jang, C.B.; Choi, S.W.; Baek, J.B. CFD modeling and fire damage analysis of jet fire on hydrogen pipeline in a pipe rack structure. Int. J. Hydrog. Energy 2015, 40, 15760–15772. [Google Scholar] [CrossRef] [Green Version]
  22. Lyu, S.; Zhang, Y.; Wang, W.; Ma, S.; Huang, Y. Simulation Study on Influence of Natural Gas Pipeline Pressure on Jet Fire. IOP Conf. Ser. Earth Environ. Sci. 2019, 242, 1307–1315. [Google Scholar] [CrossRef]
  23. Lotoesmith, B.J. Large scale experiments to study fires following the rupture of high pressure pipelines conveying natural gas and natural gas/hydrogen mixtures. Process Saf. Environ. Protect. 2013, 91, 101–111. [Google Scholar] [CrossRef]
  24. Han, Z.Y.; Weng, W.G. Comparison study on qualitative and quantitative risk assessment methods for urban natural gas pipeline network. J. Hazard. Mater. 2011, 189, 509–518. [Google Scholar] [CrossRef] [PubMed]
  25. Kabir, S.; Papadopoulos, Y. Applications of Bayesian networks and Petri nets in safety, reliability, and risk assessments: A review. Saf. Sci. 2019, 115, 154–175. [Google Scholar] [CrossRef]
  26. Abimbola, M.; Khan, F.; Khakzad, N.; Butt, S. Safety and risk analysis of managed pressure drilling operation using Bayesian network. Saf. Sci. 2015, 76, 133–144. [Google Scholar] [CrossRef]
  27. Cattaneo, M.E.G.V. The likelihood interpretation as the foundation of fuzzy set theory. Int. J. Approx. Reason. 2017, 90, 333–340. [Google Scholar] [CrossRef]
  28. Diker, M. Textures and fuzzy unit operations in rough set theory: An approach to fuzzy rough set models. Fuzzy Sets Syst. 2018, 336, 27–53. [Google Scholar] [CrossRef]
  29. Zhang, Q.; Lv, H.; Yang, Y. Effect evaluation of high-speed railway skylight construction based on triangular fuzzy number. J. Southwest Jiaotong Univ. 2018, 53, 798–805. [Google Scholar]
  30. Li, Y. Environmental risk assessment of natural gas gathering and transportation pipeline based on fuzzy comprehensive evaluation. Channel Sci. 2014, 6, 47–51. [Google Scholar]
  31. Qin, C. Safety risk analysis of natural gas gathering and transportation pipeline based on PHA. J. Inner Mong. Petrochem. Ind. 2015, 41, 67–68. [Google Scholar]
  32. Zeng, X. Research and Application of risk Assessment Technology for gathering and Transportation Pipeline. J. Chem. Manag. 2018, 21, 153. [Google Scholar]
  33. Mandal, P.; Ranadive, A.S. On the structure of fuzzy variable precision rough sets based on generalized residuted lattices. J. Intell. Fuzzy Syst. 2017, 32, 483–497. [Google Scholar] [CrossRef]
  34. Jia, J.; Wang, X.; Naima, A.M.H.; Zhao, W.; Liu, Y. Flood-Risk Zoning Based on Analytic Hierarchy Process and Fuzzy Variable Set Theory. Nat. Hazards Rev. 2019, 20, 6988–6996. [Google Scholar] [CrossRef]
  35. Wang, W.C.; Xu, D.M.; Chau, K.W.; Lei, G.J. Assessment of River Water Quality Based on Theory of Variable Fuzzy Sets and Fuzzy Binary Comparison Method. Water Resour. Manag. 2014, 28, 4183–4200. [Google Scholar] [CrossRef]
  36. Aggarwal, M. Probabilistic variable precision fuzzy rough sets. IEEE Trans. Fuzzy Syst. 2016, 24, 29–39. [Google Scholar] [CrossRef]
  37. Chen, S.; Guo, Y. Variable fuzzy sets and its application in comprehensive risk evaluation for flood—Control engineering system. Fuzzy Optim. Decis. Mak. 2006, 5, 153–162. [Google Scholar]
  38. Chen, S.; Xue, Z.; Li, M. Variable Sets principle and method for flood classification. Sci. China-Technol. Sci. 2013, 56, 2343–2348. [Google Scholar] [CrossRef]
  39. Li, P. Research on Safety Evaluation of Existing Buildings Based on the Theory Variable Fuzzy Sets. Ph.D. Thesis, Xi’an University of Architecture and Technology, Xi’an, China, 2016. [Google Scholar]
  40. Zhang, H.B. Research on Quantitative Risk Evaluation Technology of Long-Term Natural Gas Pipelines Based on Failure Database. Ph.D. Thesis, China University of Geosciences, Beijing, China, 2013. [Google Scholar]
Figure 2. Bow-tie (BT) model mapped to a BN.
Figure 2. Bow-tie (BT) model mapped to a BN.
Energies 13 01340 g002
Figure 3. Calculation of the node failure probability.
Figure 3. Calculation of the node failure probability.
Energies 13 01340 g003
Figure 4. Classification standard of intermediate node failure possibility.
Figure 4. Classification standard of intermediate node failure possibility.
Energies 13 01340 g004
Figure 5. Flow chart of updating the probability of nodes.
Figure 5. Flow chart of updating the probability of nodes.
Energies 13 01340 g005
Figure 6. Positional relationship between points x, M, and intervals.
Figure 6. Positional relationship between points x, M, and intervals.
Energies 13 01340 g006
Figure 7. BT model diagram of heavy oil gathering pipeline.
Figure 7. BT model diagram of heavy oil gathering pipeline.
Energies 13 01340 g007
Figure 8. The BN of safety evaluation of heavy oil gathering pipelines.
Figure 8. The BN of safety evaluation of heavy oil gathering pipelines.
Energies 13 01340 g008
Figure 9. Trend graph of mean of level eigenvalues over time.
Figure 9. Trend graph of mean of level eigenvalues over time.
Energies 13 01340 g009
Table 1. Marginal probability table.
Table 1. Marginal probability table.
NodesX1X5
StateYNYN
Probability0.30.70.80.2
Table 2. Conditional probability table of node X1.
Table 2. Conditional probability table of node X1.
(X2, X3)
X2 = YX2 = N
X3 = YX3 = NX3 = YX3 = N
X1 P ( X 1 = Y | X 1 , X 3 ) P1P2P3P4
P ( X 1 = N | X 1 , X 3 ) 1 − P11 − P21 − P31 − P4
Table 3. Trigonometric fuzzy evaluation of third-party damage.
Table 3. Trigonometric fuzzy evaluation of third-party damage.
PP1P2P3
P1(1,1,1)(1,1.5,2)(1.5,2,2.5)
(0.5,1,1.5)(1.5,2,2.5)
(1.5,2,2.5)(1.5,2,2.5)
P2(1/2,1/1.5,1/0.5)(1,1,1)(1.5,2,2.5)
(1/0.5,1,1/0.5)(1,1.5,2)
(1/2.5,1/2,1/1.5)(0.5,1,1.5)
P3(1/2.5,1/2,1/1.5)(1/2.5,1/2,1/1.5)(1,1,1)
(1/2.5,1/2,1/1.5)(1/2,1/1.5,1)
(1/2.5,1/2,1/1.5)(1/1.5,1,1/0.5)
Table 4. Judgment criteria for the consequences level.
Table 4. Judgment criteria for the consequences level.
H Q ¯ ( u ) [1,1.5)[1.5,2)[2,2.5)[2.5,3)[3,3.5)[3.5,4]
RankLevel 1Level 2-Level 2+Level 3-Level 3+level 4
Table 5. Descriptions of root nodes in the BT model.
Table 5. Descriptions of root nodes in the BT model.
No.DescriptionNo.Description
X1H2S contentX27earthquake
X2CO2 contentX28landslide
X3the free water contentX29debris flow
X4the chloride contentX30ground subsidence
X5the pipeline operation periodX31staff training
X6the internal coatingX32the operating procedure
X7the corrosion inhibitorX33the SCADA communication system
X8pipe piggingX34the maintenance plan
X9the external coating materialX35the maintenance procedure
X10external coating defectsX36the maintenance method
X11insulation strippingX37the maintenance work check
X12cathodic protectionX38a coated mouth
X13stray currentX39backfill quality
X14the time of using an external anti-corrosion layerX40construction inspection
X15the soil PHX41poor geological conditions
X16salt contentX42welding inspection
X17soil porosityX43the welding method
X18soil resistivityX44porosity
X19construction activityX45slag
X20traffic activityX46not welded
X21terrorist activitiesX47the poor quality of accessories
X22the line signX48installation is not standardized
X23stacking pressureX49a crack
X24ground device protectionX50a scratch
X25the covering soil thicknessX51a depression defect
X26pipe diameter
Table 6. Time-dependent variation of leakage times of gathering pipelines due to different reasons.
Table 6. Time-dependent variation of leakage times of gathering pipelines due to different reasons.
YearsIntermediate Node (Reasons)
CorrosionThird-Party DamageMisoperationMaterial/Welding/Pipe Accessories
201135532214
201231266128
201353231063
201452058212
201542325115
20162564384
Table 7. Failure probability of intermediate nodes.
Table 7. Failure probability of intermediate nodes.
YearsAverage Failure Probability
CorrosionThird-Party DamageMisoperationMaterial/Welding/Pipe Accessories
20110.03740.0003160.0002110.0225
20120.03280.0006320.0006320.0135
20130.05600.0003160.00110.0066
20140.05470.0005260.0008440.0223
20150.04450.0002110.0005260.0121
20160.02690.0004220.0003160.0088
Table 8. Prior failure probability of root nodes.
Table 8. Prior failure probability of root nodes.
No.DescriptionP0SequenceNo.DescriptionP0Sequence
X1CO2 content1.46 × 10−33X27Earthquake1.56 × 10−548
X2H2S content1.51 × 10−34X28Landslide4.18 × 10−651
X3Free water content1.08 × 10−36X29Debris flow4.60 × 10−545
X4Chloride content2.56 × 10−422X30Ground subsidence1.51 × 10−549
X5Pipeline operation period1.96 × 10−31X31Staff training1.74 × 10−430
X6Internal coating1.10 × 10−37X32Operating procedure7.43 × 10−540
X7Corrosion inhibitor1.68 × 10−32X33SCADA communication system3.68 × 10−547
X8Pipe pigging4.53 × 10−415X34Maintenance plan8.26 × 10−539
X9External coating material1.23 × 10−433X35Maintenance procedure1.07 × 10−437
X10External coating defect3.27 × 10-420X36Maintenance method1.85 × 10-429
X11Insulation stripping2.18 × 10-426X37Maintenance work check1.12 × 10-435
X12Cathodic protection4.23 × 10-418X38Coated mouth2.25 × 10-424
X13Stray current1.89 × 10-428X39Backfill quality9.56 × 10-538
X14Time of using external anti-corrosion layer1.01 × 10-38X40Construction inspection6.24 × 10-542
X15Soil PH5.11 × 10-413X41Poor geological conditions3.74 × 10-546
X16Salt content5.11 × 10-413X42Welding inspection7.29 × 10-410
X17Soil porosity1.47 × 10-432X43Welding method6.44 × 10-541
X18Soil resistivity2.93 × 10-421X44Porosity1.19 × 10-434
X19Construction activity8.28 × 10-69X45Slag2.37 × 10-423
X20Traffic activity2.22 × 10-525X46Not welded4.42 × 10-416
X21Terrorist activities1.27 × 10-650X47Poor quality of accessories6.35 × 10-411
X22Line sign5.77 × 10-543X48Installation is not standardized1.48 × 10-35
X23Stacking pressure5.10 × 10-544X49Crack1.92 × 10-427
X24Ground device protection1.11 × 10-436X50Scratch4.29 × 10-417
X25Staff training1.67 × 10-431X51Depression defect3.33 × 10-419
X26Pipe diameter6.02 × 10-512
Table 9. Standard for the value of leakage consequences of heavy oil gathering pipelines.
Table 9. Standard for the value of leakage consequences of heavy oil gathering pipelines.
Consequence LevelGeneral Accident (Level 1)Large Accident (Level 2)Major Accident (Level 3)Special Major Accident (Level 4)
Personal injury/person~0–0.5~0.5–1~1–3~3–10
Direct economic loss/100 million ¥~0–0.1~0.1–0.5~0.5–1~1–2
Environmental damage recovery/million ¥~0–10~10–5050–100~100–500
Social impact coefficient~0–0.2~0.2–0.5~0.5–0.7~0.7–1
Note: The boundary in the table contains the lower bound value and does not contain the upper bound value.
Table 10. Data on the types of leakage consequences of heavy oil gathering pipelines in the A oilfield.
Table 10. Data on the types of leakage consequences of heavy oil gathering pipelines in the A oilfield.
YearType of Consequence
Personal Injury/PersonDirect Economic Loss/100 Million ¥Environmental Damage Recovery/Million ¥Social Impact Coefficient
20110.20.301640.57
20120.60.421490.45
20130.80.321940.61
20140.70.242140.60
20150.40.341610.76
20160.30.201140.34
Table 11. Level characteristic values of comprehensive evaluation of consequences in 2011-2016.
Table 11. Level characteristic values of comprehensive evaluation of consequences in 2011-2016.
YearNormalized Membership under
Parameter Combination
Mean Level
Eigenvalues H ¯
Grade
α = 1, p = 1α = 1, p = 2α = 2, p = 1α = 2, p = 2
20112.7681.7801.8112.0222.096Level 2-
20121.9522.0632.4882.0572.088Level 2-
20132.0972.1072.1042.1892.124Level 2-
20142.1632.1722.1052.1832.156Level 2-
20152.3532.1092.1082.1342.176Level 2-
20162.3842.1722.1092.1852.213Level 2-

Share and Cite

MDPI and ACS Style

Zhang, P.; Chen, X.; Fan, C. Research on a Safety Assessment Method for Leakage in a Heavy Oil Gathering Pipeline. Energies 2020, 13, 1340. https://doi.org/10.3390/en13061340

AMA Style

Zhang P, Chen X, Fan C. Research on a Safety Assessment Method for Leakage in a Heavy Oil Gathering Pipeline. Energies. 2020; 13(6):1340. https://doi.org/10.3390/en13061340

Chicago/Turabian Style

Zhang, Peng, Xiangsu Chen, and Chaohai Fan. 2020. "Research on a Safety Assessment Method for Leakage in a Heavy Oil Gathering Pipeline" Energies 13, no. 6: 1340. https://doi.org/10.3390/en13061340

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop