Browse Items (4 total)

  • Tags: Integrity

Security-critical software applications contain confidential information which has to be protected from leaking to unauthorized systems. With language-based techniques, the confidentiality of applications can be enforced. Such techniques are for…

Pipeline (Asset) Integrity management is now a major focus for most pipeline operators and asset holders. The reason for this renewed interest may be attributed to a couple of factors, which include new legislation, technical advancements, strict…

This paper deals with the design and simulation of a Split Ring Resonator (SRR) for the detection of leaks, corrosion and cracks in pipeline networks intended for transporting crude oil, natural gas, petroleum products and other fluid products. The…

A method was developed for classifying petroleum into four types according to their origin and integrity: marine, non-marine, degraded and thermally transformed. The method was based on the relative proportions of functional groups measured by FTIR…
Output Formats

atom, dcmes-xml, json, omeka-xml, rss2