Security-critical software applications contain confidential information which has to be protected from leaking to unauthorized systems. With language-based techniques, the confidentiality of applications can be enforced. Such techniques are for…
Pipeline (Asset) Integrity management is now a major focus for most pipeline operators and asset holders. The reason for this renewed interest may be attributed to a couple of factors, which include new legislation, technical advancements, strict…
This paper deals with the design and simulation of a Split Ring Resonator (SRR) for the detection of leaks, corrosion and cracks in pipeline networks intended for transporting crude oil, natural gas, petroleum products and other fluid products. The…
A method was developed for classifying petroleum into four types according to their origin and integrity: marine, non-marine, degraded and thermally transformed. The method was based on the relative proportions of functional groups measured by FTIR…