Upload
sikiruolayinka
View
33
Download
4
Embed Size (px)
Citation preview
04/18/2023
PROJECT PROPOSAL
FOUNTAIN UNIVERSITY OSOGBO
NAME: SIKIRU, HAMMED OLAYINKA
MATRIC NO: FUO/NAS/10079
COURSE: COMPUTER SCIENCE
PROJECT TOPIC: WEB BASED IMPLEMENTATION OF AN INTELLIGENT
PIPELINE THEFT DETECTION AND REPORTING SYSTEM
PROJECT SUPERVISOR: MR R.A AZEEZ
1
04/18/2023
INTRODUCTION
Nigeria’s Oil companies are battling against rising theft costing an estimated 150,000
barrels of crude a day; the stolen oil fuels a lucrative black market in Nigeria, Africa’s
top oil exporter, as well as in neighboring countries (World oil, 2012). Nigeria has
faced unprecedented challenges with regard to losses in production occasioned by
incessant vandalism of crude oil export pipelines and domestic crude oil and
petroleum product pipelines. The country is losing about 300,000 barrels of crude
daily to oil theft. In 2013, Nigeria – Africa’s largest oil producer, suffered severe
attacks on its critical export pipeline system leading to the loss and/or deferment of
about 300,000 barrels/day. 2
04/18/2023
The most common technology to protect pipelines from occasional leaks is
COMPUTATIONAL PIPELINE MONITORING or CPM.
CPM takes information from the field related to pressures, flows, and
temperatures to estimate the hydraulic behavior of the product being
transported. Once the estimation is completed, the results are compared to
other field references to detect the presence of an anomaly or unexpected
situation, which may be related to a leak.
3
04/18/2023
STATEMENT OF THE PROBLEMWithout adequate provision for the prompt reporting of pipe line damage
due to vandalism by unscrupulous individuals, the following problems listed
below may occur:
Explosions: Gas explosions are very dangerous and can lead to several deadly
casualties
Environmental Pollution: The exposure of the leaking fuel line can lead to
the contamination of the environment which may affect living condition of
inhabitants of that area as well as crop and live stock
4
04/18/2023
Equipment Damages: Destruction of the pipeline can lead to damages of the
equipment for the pipeline supply chain which will incur cost on the gas
company
Fuel Scarcity: As more pipe lines are vandalized, the supply of gas to the end
distributors will be hinder leading the scarcity of the fuel
Loss of Investors: Frequent stealing of the gas from the area will drive away
foreign investor interested in gas fuel production.
5
04/18/2023
AIMS AND OBJECTIVES OF THE PROPOSED SYSTEM
The aim of this research work is to :
To design a web-based system to intelligently monitor oil theft and pipeline
vandalism.
The objectives of this research is to:
To provide a system that can trigger an alarm system that alert stakeholders
to take necessary action to prevent oil theft.
To generate appropriate report for decision making with respect to oil theft
and pipeline vandalism.6
04/18/2023
JUSTIFICATION OF THE STUDY
7
This research, an Intelligent Oil Theft Reporting System will give immediate
report on changes in pressure and hydraulic mechanism of the system if
applied in pipelines used by Oil and Gas producing companies.
The reporting systems will provide timely data that can be used to detect
pipeline vandalisation before disaster strikes.
The information on this research could minimize loss by gas production and
distribution companies.
04/18/2023
SCOPE AND LIMITATION
8
The scope of this research project will cover the design and the implementation
of an Intelligent Oil Theft Detection and Reporting System which will provide
online data and updates on the processes going on in the pipelines.
This research project will be limited to the simulation of the data supplied by the
sensors installed on the pipelines to detect changes in parameters and damages.
No real life gas sensor detection device or gas pipes will be used for this research
as there is limited access and finances available for such heavy duty tools.
04/18/2023
METHODOLOGY
9
Source for the Data necessary for this project will be collected through
extensive research from journals, materials from the library and the
World Wide Web.
The database for the system will be designed using the SQL Database
Management System. The programming language that will control the
automation of the system as well as provide the user interface for the
user will be built using the Microsoft Visual Basic .NET High Level
Programming Language.
04/18/2023
SYSTEM ARCHITECTURE
10
04/18/2023
SYSTEM REQUIREMENTS
11
HARDWARE REQUIREMENT
For proper installation of the system,
the following minimum hardware
requirements are:
Monitor: 15” Color monitor
Processor capacity: 2GHZ
microprocessor
Minimum of 512MB RAM
Hard Disk: 120GB
SOFTWARE REQUIREMENT
The software requirements for
the installation of the system are
listed below:
Microsoft Access
.NET Framework
Visual Studio 2008 or higher
Windows Operating System
04/18/2023
REFERENCES
12
Mohitpour, Mo (2003). Pipeline Design and Construction: A Practical Approach.
ASME Press. ISBN 978-0791802021
http://www.worldoil.com/Oil-bunkering-in-Nigeria-7-of-Nigerias-crude-oil-stolen-dai
ly.html 2012
"Fuel theft in the USA reaches $8 Billion in 2008 : RFID Switchboard". Rfidsb.com.
Retrieved 2011-12-17.
Obas Esiedesa (2014): Finding solution to Nigeria’s $11b annual crude theft
http://dailyindependentnig.com/2014/03/finding-solution-to-nigerias-11b-annual-cr
ude-theft/
http://www.dbnetsolutions.co.uk/Articles/BenefitsOfWebBasedApplications.aspx20
07
http://indepthresearch.org/index.php/consultancy-services/systems-analysis/webba
sedsystems.html November 09,2014
04/18/202313
THANKS FOR LISTENING