Every Organization Is a Complex ICT System

Author(s):  
Sriram Birudavolu ◽  
Biswajit Nag
Keyword(s):  
2021 ◽  
Vol 31 (3) ◽  
pp. 755-761
Author(s):  
Jinyan Shang ◽  
Yanbo Li ◽  
Kangni Chen ◽  
Heping Li

Author(s):  
Takayuki Kuroda ◽  
Takuya Kuwahara ◽  
Kouki Yonaga ◽  
Takao Osaki ◽  
Masamichi J. Miyama ◽  
...  

2021 ◽  
Author(s):  
Usman Ahmed ◽  
Zhiheng Zhang ◽  
Ruben Ortega Alfonzo

Abstract Horizontal well completions are often equipped with Inflow Control Devices (ICDs) to optimize flow rates across the completion for the whole length of the interval and to increase the oil recovery. The ICD technology has become useful method of optimizing production from horizontal wells in a wide range of applications. It has proved to be beneficial in horizontal water injectors and steam assisted gravity drainage wells. Traditionally the challenges related to early gas or water breakthrough were dealt with complex and costly workover/intervention operations. ICD manipulation used to be done with down-hole tractor conveyed using an electric line (e-line) cable or by utilization of a conventional coiled tubing (CT) string. Wellbore profile, high doglegs, tubular ID, drag and buoyancy forces added limitations to the e-line interventions even with the use of tractor. Utilization of conventional CT string supplement the uncertainties during shifting operations by not having the assurance of accurate depth and forces applied downhole. A field in Saudi Arabia is completed with open-hole packer with ICD completion system. The excessive production from the wells resulted in increase of water cut, hence ICD's shifting was required. As operations become more complex due to fact that there was no mean to assure that ICD is shifted as needed, it was imperative to find ways to maximize both assurance and quality performance. In this particular case, several ICD manipulating jobs were conducted in the horizontal wells. A 2-7/8-in intelligent coiled tubing (ICT) system was used to optimize the well intervention performance by providing downhole real-time feedback. The indication for the correct ICD shifting was confirmed by Casing Collar Locator (CCL) and Tension & Compression signatures. This paper will present the ICT system consists of a customized bottom-hole assembly (BHA) that transmits Tension, compression, differential pressure, temperature and casing collar locator data instantaneously to the surface via a nonintrusive tube wire installed inside the coiled tubing. The main advantages of the ICT system in this operation were: monitoring the downhole force on the shifting tool while performing ICD manipulation, differential pressure, and accurately determining depth from the casing collar locator. Based on the known estimated optimum working ranges for ICD shifting and having access to real-time downhole data, the operator could decide that required force was transmitted to BHA. This bring about saving job time while finding sleeves, efficient open and close of ICD via applying required Weight on Bit (WOB) and even providing a mean to identify ICD that had debris accumulation. The experience acquired using this method in the successful operation in Saudi Arabia yielded recommendations for future similar operations.


2015 ◽  
Vol 33 (1) ◽  
pp. 159-168
Author(s):  
Artur Szleszyński

Abstract The work presents the proposition of inference system that evaluates the possibility of information confidentiality attribute violation. Crisp and fuzzy variables have been defined. Values of output variables from fuzzy logic system have been presented. The way of counting the modified value of information confidentiality attribute has been described.


Author(s):  
Holger Schmidt

In this paper, the author aim to present a threat and risk-driven methodology to security requirements engineering. The chosen approach has a strong focus on gathering, modeling, and analyzing the environment in which a secure ICT-system to be built is located. The knowledge about the environment comprises threat and risk models. As presented in the paper, this security-relevant knowledge is used to assess the adequacy of security mechanisms, which are then selected to establish security requirements.


2010 ◽  
pp. 1-22
Author(s):  
Nalin Sharda

Modern information and communication technology (ICT) systems can help us in building travel recommender systems and virtual tourism communities. Tourism ICT systems have come a long way from the early airline ticket booking systems. Travel recommender systems have emerged in recent years, facilitating the task of destination selection as well activities at the destination. A move from purely text-based recommender systems to visual recommender systems is being proposed, which can be facilitated by the use of the Web 2.0 technologies to create virtual travel communities. Delivering a good user experience is important to make these technologies widely accepted and used. This chapter presents an overview of the historical perspective of tourism ICT systems and their current state of development vis-à-vis travel recommender systems and tourism communities. User experience is an important aspect of any ICT system. How to define user experience and measure it through usability testing is also presented.


2019 ◽  
Vol 2 (S1) ◽  
Author(s):  
David Ryan ◽  
Miguel Ponce De Leon ◽  
Niall Grant ◽  
Bernard Butler ◽  
Steffen Vogel ◽  
...  

Abstract The management and transmission networks is becoming increasingly complex due to the proliferation of renewables-based distributed energy resources (DER). Existing control systems for DER are based on static specifications from interdependent network connection documents. Such systems are inflexible and their maintenance requires concerted effort between grid stakeholders. In this paper we present a new supplementary control approach to increase the agility of the electricity grid. The ICT system that underlies smart grids has the potential to offer, by analogy with ICT based network management, a control plane overlay for the modern smart grid. Policy-based Network Management (PBNM) is widely deployed in managed telecoms networks. We outline how PBNM can augment the management of power and energy networks and report on our initial work to validate the approach. To configure the PBNM system, we have used text mining to derive connection parameters at the LV level. In our simulations, PBNM was used in collaboration with a Volt-VAr optimisation (VVO) to tune the connection settings at each DER to manage the voltage across all the buses. We argue that the full benefits will be realised when stakeholders focus on agreeing relatively stable high-level connection policies, the policies being refined dynamically, and algorithms such as VVO that set connection parameters so they are consistent with those high-level policies. Thus faults, power quality issues and regulatory infringement can be identified sooner, and power flow can be optimised.


Technologies ◽  
2018 ◽  
Vol 6 (4) ◽  
pp. 116 ◽  
Author(s):  
Francisco Lacueva-Pérez ◽  
Lea Hannola ◽  
Jan Nierhoff ◽  
Stelios Damalas ◽  
Soumyajit Chatterjee ◽  
...  

The introduction of innovative digital tools for supporting manufacturing processes has far-reaching effects at an organizational and individual level due to the development of Industry 4.0. The FACTS4WORKERS project funded by H2020, i.e., Worker-Centric Workplaces in Smart Factories, aims to develop user-centered assistance systems in order to demonstrate their impact and applicability at the shop floor. To achieve this, understanding how to develop such tools is as important as assessing if advantages can be derived from the ICT system created. This study introduces the technology of a workplace solution linked to the industrial challenge of self-learning manufacturing workplaces. Subsequently, a two-step approach to evaluate the presented system is discussed, consisting of the one used in FACTS4WORKERS and the one used in the “Heuristics for Industry 4.0” project. Both approaches and the use case are introduced as a base for presenting the comparison of the results collected in this paper. The comparison of the results for the presented use case is extended with the results for the rest of the FACTS4WORKERS use cases and with future work in the framework.


Sign in / Sign up

Export Citation Format

Share Document