TAILIEUCHUNG - PIPELINE PIGGING TECHNOLOGY- P5

PIPELINE PIGGING TECHNOLOGY- P5: Why pig a pipeline? This paper introduces a number of reasons for doing so, together with a discussion of the advantages and alternatives. In general terms, however, pigging is not an operation to be undertaken lightly. There are often technical problems to be resolved and the operation requires careful control and co-ordination. | Pipeline Pigging Technology items . observations. The user moves between screens using the function keys. Hi To incorporate as much flexibility as possible into the design Several categories of data are implemented in library form to avoid data duplication provide searching facilities and to allow for the possibility of extending data types. Example anode type library inspection equipment library. A system-parameter library holds details such as terminal and output device characteristics to accommodate future requirements and parameter values used by a number of functions scaling details etc. . A parameter-driven library was designed in order to hold observations made during surveys . SU suspensions and their parameters . length height . In this way new observations and parameters can easily be added by the users. iv To provide adequate security restrictions for the system It is important to protect the data from unauthorized use. Access to the system is based on each user having a unique user identification and password. Access to a specific category of functions is restricted by the user s security classification. On logging onto the system the user is presented with a menu of the available categories based on his classification. To provide a secure system it is important that users remember to log off at the end of each session and also not to leave a logged-on terminal unattended. To minimize the possibility of a breach in security a timeout facility is incorporated into the system so that any terminal which has had no activity for a given period of time is automatically logged off. System functions There are five categories of functions available on the system. Each user has access to one or more of these depending on their security classification. Interactive editing The functions available in this category are used to input or amend any item of information held on the database. The data entered is validated against the 102 Please purchase PDF .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.