The objective of an In-line Inspection (ILI) is to evaluate the internal integrity of the pipeline without the need to stop its operation. More specifically, it aims to:
Detect internal anomalies such as corrosion, wall loss, cracks, dents, or deformations.
Accurately measure the wall thickness along the entire pipeline.
Precisely locate irregularities using positioning systems (GPS or magnetic markers).
Prevent failures that could result in leaks, ruptures, or service interruptions.
Generate reliable data for maintenance, repair, or replacement planning.
Comply with international standards and regulations for pipeline safety.
To achieve this, tools (PIGs) are used, which contain various sensors responsible for collecting data during the run. These tools include MFL sensors (Magnetic Flux Leakage), GEO sensors (geometrical sensors), gyros (to measure bends), IMU (to locate the tool), odometers (to measure distance), among other sensors and devices useful for the analysis.
It is important to mention that there are two types of tools used in ILI: freeswimming and tethered. The freeswimming tool requires installations on the client’s transportation pipelines in order to be used (a launcher and a receiver). It is the easiest to use and the least invasive, since the tool can be operated without stopping production or excavating the area. The freeswimming tool is propelled by the client’s own product or by another liquid that does not affect production or the tool.
On the other hand, the tethered tool requires a mechanism for its operation, which is mounted on specialized trucks. With the tethered tool, the area where the inspection will take place must be excavated, and the pipe must be opened in order to insert the tool. In most cases, production must also be stopped to use this tool.
The analysis I perform may vary depending on the type of tool, but the differences are minimal, and most of the data I use in my work comes from a freeswimming tool.
Data Collection
1.- The first step is to agree with the client on a specific date, on which the company’s tool will be transported to the client’s facilities. The facility must have a launcher or receiver to run a freeswimming tool; otherwise, a tethered tool will be used. A technician, with the assistance of the client’s pipeline operators, will place the tool. Once the tool is in position, a propulsion method is applied, causing the tool to move through the pipeline while rotating and collecting data through its sensors.
2.- The technician retrieves the tool, either from the receiver or using the tethered tool’s truck mechanism.
3.- The technician extracts the data collected by the tool and uploads it to the database.
Data Processing, Data Analysis, and Reporting Findings
1.- This is where my role as a data analyst begins. The first step is to download the data from the cloud in order to process it.
2.- Once the data is downloaded, we upload it to the company’s software, which transforms the data into signals and some graphs to facilitate the initial analysis (we conduct two analyses). In this software, we review the tool’s data and identify both defects and the pipeline components. During this process, we must determine whether what we see is an anomaly that threatens the pipeline’s integrity, or just part of its manufacturing. We also document all components that make up the pipeline. It is worth noting that during the first analysis we may detect critical anomalies. If this happens, we prepare a preliminary report(required by some clients) so they can act as quickly as possible.
3.- After completing the first analysis, we upload the modified data to another database.
4.- We then carry out a second, smaller analysis, but first we need to clean the data again in a different format. To do this, we download the data modified during the first analysis, this time as tables. At the company, queries are executed through predefined scripts that cannot be easily changed due to internal policies. For this reason, once we download the tables, we must clean them in Excel. Each client has different requirements for which columns must be included and how the data should be organized, which vary depending on the client’s needs and the pipeline’s characteristics.
5.- Once we have the cleaned table, we generate charts using the company’s software.
6.- We analyze both the table and the charts in order to create the final client reports, where we present our findings and recommendations to ensure the pipeline’s integrity and determine if repairs are needed.
7.- Finally, we discuss the report with the client, addressing questions and providing recommendations.
*It is important to note that I cannot share all the information or images from the company due to confidentiality policies. The images included were obtained from the internet, and certain names, concepts, and explanations have been omitted to comply with company compliance requirements. *