Pipeline Integrity Management: PPSA 2010 Technical Seminar-Aberdeen
Pipeline Integrity Management: PPSA 2010 Technical Seminar-Aberdeen
Pipeline Integrity Management: PPSA 2010 Technical Seminar-Aberdeen
Engineering Consultancy
Services for Pipeline Integrity
Review and recommendations
for Selected Offshore Pipelines
2
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
- Corrosion (Internal/External)
- Mechanical Damage
- Incorrect Operations
- Loss of Ground Support
- Stress Corrosion Cracking
3
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
4
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
Selection
of Pipeline
Segment
Enablers
Threat
Identification
and Risk
Assessment
Baseline
Assessment
Plan and
Integrity Plans
Identify New
Segment
ILI
DA
Facility
Survey
Inspection
Discovery
Management
Continual
Evaluation &
Assessments
Prevention and
Mitigation
Management
of Change
Process
Risk
Reporting &
Performance
Measurement
Document
Repair &
Remediation
Comm. Plan
Environment &
Safety
Process
5
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
Engineering Consultancy study follows the methodology laid out by QP. The
overall objective of the study is to:
Evaluate the condition of the 51 selected offshore pipelines
Establish their fitness-for-purpose and need for any remedial work
Determine the level of risk associated with continuing operating life
Identify the remedial measures and costs required to bring operation risks in
line with standard industry practice levels
Other deliverables:
PIM document philosophy (Corporate Philosophy and Codes of Practices)
GIS based Pipeline Management Integrity System (PIMS)
6
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
7
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
Phase 3
Phase 4
Define SOW for FEED
Phase 5
Phase 2
IMPs
8
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
Volume of data
More than 5 GB of data gathered,
checked & loaded including:
Engineering evaluation
Evaluation of the severity of over:
600,000 ILI anomalies
4,600 pipeline spans
500 crossings
100 stabilizations
600 anodes (CP)
Written deliverablesmore than
350 reports prepared
250 risk profiles (before & after
remediation)
51 IMPs developed
Identified & provided cost estimate for:
Over 800 remediation activities
Severity
NFA01
NFA02
PS102
PS103
10
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
Facility/GIS
Database
Integrity Planning
Risk Assessment
Feature Assessment
Data Alignment Module
Application Clients
Enterprise
Integrity
Database
Web
Server
11
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
Data Alignment
Tools to load & align data
various data types and
formats in-line & aboveground inspections for
Feature Assessment
Analyze and prioritize data
Repair management
14
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
Risk Assessment
Generate a risk profile including
15
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
Integrity Planning
PipeView Integrity provides
the ability to generate integrity
plans
Create an auditable
documented process for
integrity management that is
compliant with regulations
Ensure company standards
are achieved by incorporating
the clients guidelines on bestpractices for mitigation and
remediation
Calculate the most costeffective mitigation strategies
for the clients pipelines
16
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
17
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved
Mitigated/Monitored
by
ILI/auto UT/inhibition/sampling
CP surveys/anode retrofits/coating
Repair anomalous spans, crossings
Control internal corrosion risk
As long as pipelines are regularly monitored for all relevant threats, maintained &
remediated as required they can continue to be operated beyond design life
indefinitely until economically unviable
Life extension relies more and more heavily on effective use of increasing volumes
of data as the life extension process matures.
18
Confidential & Proprietary Information
GE and Al Shaheen 2010 All Rights Reserved