User's Manual
2 
TableofContents
GUTERMANN ............................................................................................................................... 1
1. Introduction.................................................................................................................5
1.1. SystemComponents ................................................................................................................  6
1.2. Radiologgers ........................................................................................................................... 6
1.3. SystemCommunicationLink ................................................................................................... 6
2. ZONESCAN800software..............................................................................................6
2.2. InitialZS800CommlinkSetup ..................................................................................................  7
2.2. CheckRadioConnection ..........................................................................................................  8
2.3. InitialZS820CommlinkSetup ..................................................................................................  8
1 ZonescanLoggersProcessFlowChart...........................................................................9
3. CreatinganewDatabase............................................................................................10
3.1 InsertingaNewLogger ..........................................................................................................  11
3.2 InsertMulipleLoggers ...........................................................................................................  11
3.3 LoggerSetup–MeasurementSettings ................................................................................. 12
3.4 Zonescan820SensitivityBoost .............................................................................................  13
4 ProgrammingtheLoggers..........................................................................................14
4.1 Programming‐Correlation .................................................................................................... 15
4.2 Whenalogger(s)failstosynchronize ................................................................................... 16
5 DeployingtheZonescanLoggers................................................................................17
5.1 DeployingtheLoggersinthefield .........................................................................................  18
6 ImportingaDigitalMapintotheZonescanSoftware..................................................19
7 DownloadingthedataintheLoggers.........................................................................24
7.1 SettingtheThresholdLeakLevels .........................................................................................  25
7.2 StarttheDownload ............................................................................................................... 26
8 TheNoiseLoggingPrincipal........................................................................................28
Tab.2Thefirstsampletakenof12dBisplottedonthehistogrambelowinFig.A.....................................29
Tab.3thesecondsampletakenof12dBisplottedonthehistogrambelowinFig.B.................................30
Tab.4thethirdsampletakenof12dBisplottedonthehistogrambelowinFig.C....................................31
Tab.5thefourthsampletakenof21dBisplottedonthehistogrambelowinFig.D..................................32
Tab.6thefifthsampletakenof18dBisplottedonthehistogrambelowinFig.E.....................................33
Tab.7thesixthsampletakenof12dBisplottedonthehistogrambelowinFig.F.....................................34
Tab.8theseventhsampletakenof13dBisplottedonthehistogrambelowinFig.G................................35
Tab.9theeighthsampletakenof12dBisplottedonthehistogrambelowinFig.H..............36
9 AnalysingResults.......................................................................................................37
9.1 NoLeakResult ....................................................................................................................... 38
9.2 PossibleLeakResult .............................................................................................................. 39
9.3 ProbableLeakResult ............................................................................................................. 40
9.4 Interpretingnoiseloggingresults ......................................................................................... 41
9.5 Whichloggerisclosertotheleak? ........................................................................................  43
9.6 WhatistheLeakValue? ........................................................................................................ 44
9.7 ReliabilityofResults .............................................................................................................. 44
10 PerformingCorrelations.............................................................................................45
10.1 Correlationbetweentwologgers ..........................................................................................  45
10.2 TheCorrelationResult ...........................................................................................................  47
10.3 ExhaustiveCorrelation .......................................................................................................... 48
11 InterpretingtheCorrelationResults...........................................................................49
12 ProjectManagement..................................................................................................52
13 AppendixSection.......................................................................................................53










