The petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipelines. It also tries to identify essential risk factors in flowline projects, as well as their likelihood and severity, in order to reduce loss of life and increased expenditures as a result of safety issues. The monetary quantification was used to determine the leakage-induced environmental losses. Using a 5-by-5 probability-currency matrix, the level of environmental risk was evaluated the safety and risk-based inspection (RBI) is evaluated through the use of specific schedules to determine the likelihood of failure (LOF) and Consequence of Failure (COF). The risk level appears in the matrix, and appropriate maintenance steps should be taken to reduce risks, such as injecting corrosion inhibitors to protect the Pipelines, activating cathodic protection or coating. Overall, this research contributes to the prevention of petroleum product leakage due to the corrosion consequences in the transportation sector. Also, encourage non-environmental risk decision-makers to gain a better understanding of the risk level.
Visible light communication (VLC) is an upcoming wireless technology for next-generation communication for high-speed data transmission. It has the potential for capacity enhancement due to its characteristic large bandwidth. Concerning signal processing and suitable transceiver design for the VLC application, an amplification-based optical transceiver is proposed in this article. The transmitter consists of a driver and laser diode as the light source, while the receiver contains a photodiode and signal amplifying circuit. The design model is proposed for its simplicity in replacing the trans-impedance and transconductance circuits of the conventional modules by a simple amplification circuit and interface converter. Th
... Show MoreBecause of vulnerable threats and attacks against database during transmission from sender to receiver, which is one of the most global security concerns of network users, a lightweight cryptosystem using Rivest Cipher 4 (RC4) algorithm is proposed. This cryptosystem maintains data privacy by performing encryption of data in cipher form and transfers it over the network and again performing decryption to original data. Hens, ciphers represent encapsulating system for database tables
Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
The focus of this article, reviewed a generalized of contraction mapping and nonexpansive maps and recall some theorems about the existence and uniqueness of common fixed point and coincidence fixed-point for such maps under some conditions. Moreover, some schemes of different types as one-step schemes ,two-step schemes and three step schemes (Mann scheme algorithm, Ishukawa scheme algorithm, noor scheme algorithm, .scheme algorithm, scheme algorithm Modified scheme algorithm arahan scheme algorithm and others. The convergence of these schemes has been studied .On the other hands, We also reviewed the convergence, valence and stability theories of different types of near-plots in convex metric space.
The using of recycled aggregates from construction and demolition waste (CDW) can preserve natural aggregate resources, reduce the demand for landfill, and contribute to a sustainable built environment. Concrete demolition waste has been proven to be an excellent source of aggregates for new concrete production. At a technical, economic, and environmental level, roller compacted concrete (RCC) applications benefit various civil construction projects. Roller Compacted Concrete (RCC) is a homogenous mixture that is best described as a zero-slump concrete placed with compacting equipment, uses in storage areas, dams, and most often as a basis for rigid pavements. The mix must be sufficiently dry to support
... Show MoreThe water injection of the most important technologies to increase oil production from petroleum reservoirs. In this research, we developed a model for oil tank using the software RUBIS for reservoir simulation. This model was used to make comparison in the production of oil and the reservoir pressure for two case studies where the water was not injected in the first case study but adding new vertical wells while, later, it was injected in the second case study. It represents the results of this work that if the water is not injected, the reservoir model that has been upgraded can produce only 2.9% of the original oil in the tank. This case study also represents a drop in reservoir pressure, which was not enough to support oil production
... Show MoreThere are a few studies that discuss the medical causes for diabetic foot (DF) ulcerations in Iraq, one of them in Wasit province. The aim of our study was to analyze the medical, therapeutic, and patient risk factors for developing DF ulcerations among diabetic patients in Baghdad, Iraq.