The petroleum industry, which is one of the pillars of the national economy, has the potential to generate vast wealth and employment possibilities. The transportation of petroleum products is complicated and changeable because of the hazards caused by the corrosion consequences. Hazardous chemical leaks caused by natural disasters may harm the environment, resulting in significant economic losses. It significantly threatens the aim for sustainable development. When a result, determining the likelihood of leakage and the potential for environmental harm, it becomes a top priority for decision-makers as they develop maintenance plans. This study aims to provide an in-depth understanding of the risks associated with oil and gas pipelines. It also tries to identify essential risk factors in flowline projects, as well as their likelihood and severity, in order to reduce loss of life and increased expenditures as a result of safety issues. The monetary quantification was used to determine the leakage-induced environmental losses. Using a 5-by-5 probability-currency matrix, the level of environmental risk was evaluated the safety and risk-based inspection (RBI) is evaluated through the use of specific schedules to determine the likelihood of failure (LOF) and Consequence of Failure (COF). The risk level appears in the matrix, and appropriate maintenance steps should be taken to reduce risks, such as injecting corrosion inhibitors to protect the Pipelines, activating cathodic protection or coating. Overall, this research contributes to the prevention of petroleum product leakage due to the corrosion consequences in the transportation sector. Also, encourage non-environmental risk decision-makers to gain a better understanding of the risk level.
Transdermal drug delivery has made an important contribution to medical practice but has yet to fully achieve its potential as an alternative to oral delivery and hypodermic injections. Transdermal therapeutic systems have been designed to provide controlled continuous delivery of drugs through the skin to the systemic circulation. A transdermal patch is an adhesive patch that has a coating of drug; the patch is placed on the skin to deliver particular amount of drug into the systemic circulation over a period of time. The transdermal drug delivery systems (TDDS) review articles provide information regarding the transdermal drug delivery systems and its evaluation process as a ready reference for the research scientist who is involved
... Show MoreThe No Mobile Phone Phobia or Nomophobia notion is referred to the psychological condition once humans have a fear of being disconnected from mobile phone connectivity. Hence, it is considered as a recent age phobia that emerged nowadays as a consequence of high engagement between people, mobile data, and communication inventions, especially the smart phones. This review is based on earlier observations and current debate such as commonly used techniques that modeling and analyzing this phenomenon like statistical studies. All that in order to possess preferable comprehension concerning human reactions to the speedy technological ubiquitous. Accordingly, humans ought to restrict their utilization of mobile phones instead of prohibit
... Show MoreTesting is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evalua
... Show MoreCassava, a significant crop in Africa, Asia, and South America, is a staple food for millions. However, classifying cassava species using conventional color, texture, and shape features is inefficient, as cassava leaves exhibit similarities across different types, including toxic and non-toxic varieties. This research aims to overcome the limitations of traditional classification methods by employing deep learning techniques with pre-trained AlexNet as the feature extractor to accurately classify four types of cassava: Gajah, Manggu, Kapok, and Beracun. The dataset was collected from local farms in Lamongan Indonesia. To collect images with agricultural research experts, the dataset consists of 1,400 images, and each type of cassava has
... Show MoreThis research involves studying the mechanical properties and corrosion behavior of “low carbon steel” (0.077wt% C) before and after welding using Arc, MIG and TIG welding. The mechanical properties include testing of microhardness, tensile strength, the results indicate that microhardness of TIG, MIG welding is more than arc welding, while tensile strength in arc welding more than TIG and MIG.
The corrosion behavior of low carbon weldments was performed by potentiostat at scan rate 3mV.sec-1 in 3.5% NaCl to show the polarization resistance and calculate the corrosion rate from data of linear polarization by “Tafel extrapolation method”. The results indicate that the TIG welding increase the corrosion current d
... Show MoreFocusing on the negative role of default risk on banks, as it is one of the most important risks facing banks, which are difficult to determine accurately, and its reflection on the indicators of profitability of cash flows. The increasing competition between banks led to an increase in the credit facilities granted by banks, and was accompanied by an increase in exposure to the risks of default, which led to an impact on the level of performance of banks in terms of achieving the required return according to the levels of high competition. Therefore, the problem of this study focused on the extent to which the risk indicators of default affect the profitability indicators of the cash flows of the banks research sample in the profit
... Show MoreIn this work the design and construction of a flash photolysis pulsed HCl laser was presented. The parameters of the pumping source and discharge current density was obtained, which sufficient to shift the flash lamp spectrum towards uv portion of spectrum. The maximum pulse laser energy parameters was measured. Total pressure and ratio of active gases to optimized the output pulse energy were measured , where at 125 mbar of total pressure and 1:7:14 Cl2:H2: He ratio, the laser energy was measured to be 200 mJ at pumping four flash lamps energy in the order of 6400J .The resonator consists of copper a near hemispherical mirror with the radius of curvature 3m coated by gold and reflectivity 98%,the output coupler sapphire mirror of
... Show MoreIn the current worldwide health crisis produced by coronavirus disease (COVID-19), researchers and medical specialists began looking for new ways to tackle the epidemic. According to recent studies, Machine Learning (ML) has been effectively deployed in the health sector. Medical imaging sources (radiography and computed tomography) have aided in the development of artificial intelligence(AI) strategies to tackle the coronavirus outbreak. As a result, a classical machine learning approach for coronavirus detection from Computerized Tomography (CT) images was developed. In this study, the convolutional neural network (CNN) model for feature extraction and support vector machine (SVM) for the classification of axial
... Show MoreThe evolution of cryptography has been crucial to preservation subtle information in the digital age. From early cipher algorithms implemented in earliest societies to recent cryptography methods, cryptography has developed alongside developments in computing field. The growing in cyber threats and the increase of comprehensive digital communications have highlighted the significance of selecting effective and robust cryptographic techniques. This article reviews various cryptography algorithms, containing symmetric key and asymmetric key cryptography, via evaluating them according to security asset, complexity, and execution speed. The main outcomes demonstrate the growing trust on elliptic curve cryptography outstanding its capabi
... Show More