The Hard Case for Whole Drilling Optimization

2021 ◽  
Author(s):  
Carlos Damski ◽  
Sameh El Afifi

Abstract Today every Oil & Gas company is searching for the elusive drilling optimization process. Authors argue that a global drilling optimization is only achieved calculating the actual ROI – based on money spent in drilling vs total production of the well. As this is impractical, this paper presents a framework to measure engineering and management aspects of this optimization. Engineering approach looks into "doing things right," while managerial attitude is "doing the right things." Drilling optimization is centered in using existing (and upcoming) data from rig and its analyses. Engineers look into hydraulics, WOB, etc., with the purpose to calculate ideal/best ROP parameters and eventually to avoid problems, such as stuck pipe. This is done by direct calculation and/or running simulated models to spot deviations. Management is concerned with relative efficiency of the process (KPIs) compared to a baseline (offset wells, planned durations, technical limits, etc.). They concentrate at comparisons and focus at how to mitigate operational risks (time, costs, HSE, etc.) while producing the "best well". Those two intertwined optimization processes are depicted and explained in the next sessions. Authors' experience has shown that TL (Technical Limit), ILT (Invisible Lost Time) and NPT (Non-Productive time) are façades from the engineering and management efforts in drilling optimization. For example, there is no unique way to describe "Technical Limit" in drilling. We will describe the technical components for it under physics and models, as well as under historical-coaching-KPI approach. Same for ILT and NPT. Under a unique framework, users can understand and clarify the confusion in the current marketplace to better data and data processing to achieve optimization. The so called "data analytics" is dissected and formalized so all parties involved: technicians, service providers, operators, equipment suppliers, managers, finances, etc., can fully understand where data can be used (also how they are collected and quality checked) and what processes are needed to achieve each step of the drilling optimization. Unlike any product or service available today, the framework described in this article looks in the drilling optimization with a holistic view. Efforts so far have been scattered and there is a lack of an overall framework. The best results come from the combination of those two approaches.

Land ◽  
2021 ◽  
Vol 10 (3) ◽  
pp. 273
Author(s):  
Mahsa Mesgar ◽  
Diego Ramirez-Lovering

Informal settlements represent a challenging operational context for local government service providers due to precarious contextual conditions. Location choice and land procurement for public infrastructure raise the complicated question: who has the right to occupy, control, and use a piece of land in informal settlements? There is currently a dearth of intelligence on how to identify well-located land for public infrastructure, spatially and with careful consideration for safeguarding the claimed rights and preventing conflicts. Drawing on a case study of green infrastructure retrofit in seven informal settlements in Makassar, Indonesia, we classify the informal settlers’ land rights into four types: ownership, use, control, and management. This exploratory study uses a typological approach to investigate the spatial dimension of land rights in informal settlements. We introduce non-registrable land interests and the partial, dynamic, and informal land use rights that impact the land procurement for infrastructure retrofit. We also create a simple spatial matrix describing the control/power, responsibilities and land interests of different stakeholders involved in the location decision making for public infrastructure. We argue that without sufficient understanding of non-formal land rights, land procurement proposals for the public infrastructure upgrades can be frustrated by the individual or group claims on the land, making the service provision impossible in informal settlements.


2018 ◽  
Vol 35 (4) ◽  
pp. 940-964 ◽  
Author(s):  
Mukesh Kumar ◽  
K.S. Sujit ◽  
Vincent Charles

Purpose The purpose of this paper is to propose the microeconomics concept of elasticity to estimate the SERVQUAL gap elasticity to derive important insights for service providers to develop the right strategies to bridge the overall gap in service. Design/methodology/approach The dimensions of SERVQUAL adopted from Parasuraman et al. (1988) and Kumar et al. (2009) are first verified for their unidimensionality using structural equation modeling and reliability in the context of United Arab Emirates banking industry. Furthermore, the technique of dominance analysis is used to derive the relative importance of dimensions for different groups of banks. Finally, the stepwise log-linear regression models are used to estimate the gap elasticity to measure the responsiveness of the overall SERVQUAL gap to a change in customers’ perception on different dimension. Findings The results reveal that the dimension which is prioritized as the most important dimension need not to be the one to be targeted under the resource constraint to react faster to the changes of customers’ banking behavior. Originality/value This is probably the first attempt to examine the service quality through gap elasticity. This method is especially useful when the traditional approach to measure relative importance of critical factors fails to clearly discriminate between two or more dimensions, which, in turn, may lead to failure in decision making to choose the right strategies to bridge the overall gap in the service.


2020 ◽  
Vol 6 (1) ◽  
pp. 100
Author(s):  
Liudmyla Panova ◽  
Vitalii Makhinchuk

The purpose of the article is to examine the civil law nature of electronic money. The subject of the research is the features of the civil law nature of electronic money. Methodology. Research methods are chosen based on the object, subject and purpose of the study. The study used general scientific and special methods of legal science. Thus, the analysis and synthesis method as well as the logical method were used to formulate a holistic view on electronic money, their features and legal nature. The logical-semantic method was used to establish the meaning of the concepts “electronic money”, “non-cash money”, “payment instrument”, “electronic payment instrument”. The comparative method was used when analyzing scientific categories, definitions and approaches. The legal modeling method was applied to formulate the author’s definition of the term “electronic money”. Results. The article generalizes scientific views on the civil law nature of electronic money. A distinction has been made between electronic money and currency unit, non-cash money and the right to claim. As the result it has been established that electronic money is the monetary obligation. Practical implication. The study should assist in developing the unified approach to the issue of the civil law nature of electronic money. Value/originality. As the result of the study the author’s definition of the concept “electronic money” with regard to its civil law nature has been proposed.


2002 ◽  
Vol 1 (4) ◽  
Author(s):  
Gordon A. Gow ◽  
Mark Ihnat

This paper reports on a recently concluded empirical study into the development of Wireless E9-1-1 (emergency service) in Canada that initially focussed on privacy concerns raised in the context of an emerging location based service (LBS) for mobile phone users. In light of existing regulatory arrangements this paper concludes that in Canada the emerging Wireless E9-1-1 system establishes a reasonable level of protection for the privacy rights of mobile phone users who choose to contact emergency services. However, an important and surprising issue was raised in the proceedings regarding the obligation of wireless service providers offering prepaid mobile phone service to obtain verifiable subscriber records from their customers. This paper provides details regarding the issue and contributes a number of points to an emerging debate concerning the right to anonymity for customers who elect to use prepaid or other services provided over commercial networks.


2021 ◽  
pp. 1-13
Author(s):  
Roman Bulgachev ◽  
Michael Cromarty ◽  
Lee Milburn ◽  
Kevan Davies

Summary bp’s (“the company’s”) wells organization manages its operational risks through what is known as the “three lines of defense” model. This is a three-tiered approach; the first line of defense is self-verification, which wells assets apply to prevent or mitigate operational risks. The second line of defense is conducted by the safety and operational risk function using deep technical expertise. The third line of defense is provided by group audit. In this paper, we discuss the wells self-verification program evolution from its first implementation and share case studies, results, impact, lessons learned, and further steps planned as part of the continuous improvement cycle. The company’s wells organization identified nine major accident risks that have the potential to result in significant health, safety, and environment (HSE) impacts. Examples include loss of well control (LoWC), offshore vessel collision, and dropped objects. The central risk team developed bowties for these risks, with prevention barriers on cause legs and mitigation barriers on consequence legs. Detailed risk bowties are fundamental to wells self-verification, adding technical depth to allow more focused verification to be performed when compared with the original bowties, because verification is now conducted using checklists targeting barriers at their component level, defined as critical tasks and equipment. Barriers are underpinned by barrier enablers (underlying supporting systems and processes) such as control of work, safe operating limits, inspection and maintenance, etc. Checklists are standardized and are available through a single, global digital application. This permits the verifiers, typically wellsite leaders, to conduct meaningful verification conversations, record the resulting actions, track them to closure within the application, and gain a better understanding of any cumulative impacts, ineffective barriers, and areas to focus on. Self-verification results are reviewed at rig, region, wells, and upstream levels. Rigs and regions analyze barrier effectiveness and gaps and implement corrective actions with contractors at the rig or region level. Global insights are collated monthly and presented centrally to wells leadership. Common themes and valuable learnings are then addressed at the functional level, shared across the organization, or escalated by the leadership. The self-verification program at the barrier component level proved to be an effective risk management tool for the company’s wells organization. It helps to continuously identify risks, address gaps, and learn from them. Recorded assessments not only provide the wells organization with barrier performance data but also highlight opportunities to improve. Leadership uses the results from barrier verification to gain a holistic view of how major accident risks are managed. Program evolution has also eliminated duplicate reviews, improved clarity of barrier components, and improved sustainability through applying a systematic approach, standardization, digitization, and procedural discipline.


2021 ◽  
Author(s):  
Vallet Laurent ◽  
Gutarov Pavel ◽  
Chevallier Bertrand ◽  
Converset Julien ◽  
Paterson Graeme ◽  
...  

Abstract In the current economic environment, delivering wells on time and on budget is paramount. Well construction is a significant cost of any field development and it is more important than ever to minimize these costs and to avoid unnecessary lost time and non-productive time. Invisible lost time and non-productive time can represent as much as 40% of the cost of well construction and can lead to more severe issues such as delaying first oil, losing the well or environmental impact. There has been much work developing systems to optimize well construction, but the industry still fails to routinely detect and avoid problematic events such as stuck pipe, kicks, losses and washouts. Standardizing drilling practice can help also to improve the efficiency, this practice has shown a 30% cost reduction through repetitive and systematic practices, automation becomes the key process to realize it and Machine Learning introduced by new technologies is the key to achieve it. Drilling data analysis is key to understanding reasons for bad performances and detecting at an early stage potential downhole events. It can be done efficiently to provide to the user tools to look at the well construction process in its whole instead of looking at the last few hours as it is done at the rig site. In order to analyze the drilling data, it is necessary to have access to reliable data in Real-Time to compare with a data model considering the context (BHA, fluids, well geometry). Well planning, including multi-well offset analysis of risks, drilling processes and geology enables a user to look at the full well construction process and define levels of automation. This paper applies machine learning to a post multi-well analysis of a deepwater field development known for its drilling challenges. Minimizing the human input through automation allowed us to compare offset wells and to define the root cause for non-productive time. In our case study an increase of the pressure while drilling should have led to immediate mitigation measures to avoid a wiper trip. This paper presents techniques used to systematize surface data analysis and a workflow to identify at an early stage a near pack off which was spotted in an automatic way. The application of this process during operations could have achieved a 10%-time reduction of the section 12 ¼’’.


Dental Update ◽  
2001 ◽  
Vol 28 (8) ◽  
pp. 404-410
Author(s):  
P.J. Turner ◽  
S. Weerakone

2019 ◽  
Vol 59 (2) ◽  
pp. 639
Author(s):  
Michael Lynn ◽  
David Wirrpanda

As oil and gas operators and service providers look to embrace automation and analytics, many of the traditional partnerships with Aboriginal communities relating to employment and career pathways are likely to be challenged. The paper explores how digital trends are affecting, and are likely to affect, Indigenous communities in their partnerships with oil and gas organisations. Workplace roles and activities are evolving in our increasingly digitised world, causing a perceived threat to employment for minority groups such as Indigenous communities. In order to ensure the ongoing presence of opportunities for Indigenous workers in the ‘future of work’, oil and gas organisations will need to augment digital technologies to cater for and enhance existing and future roles. This paper presents a framework for Indigenous communities, governments, oil and gas operators and service providers to embrace digitisation and create sustainable relationships. An approach is considered to engage with Indigenous communities with objectives of executing on their Reconciliation Action Plans and addressing culture and employment challenges that arise through digitisation. The framework positions oil and gas operators and service providers to pivot themselves not only to sustain, but also to enhance Indigenous employment opportunities in a digital workplace. Digitisation is here, but with the right approach it can positively affect and shape partnerships between oil and gas organisations and Indigenous communities.


2017 ◽  
Vol 2017 ◽  
pp. 1-14 ◽  
Author(s):  
Keyang Liu ◽  
Weiming Zhang ◽  
Xiaojuan Dong

With the growth of cloud computing technology, more and more Cloud Service Providers (CSPs) begin to provide cloud computing service to users and ask for users’ permission of using their data to improve the quality of service (QoS). Since these data are stored in the form of plain text, they bring about users’ worry for the risk of privacy leakage. However, the existing watermark embedding and encryption technology is not suitable for protecting the Right to Be Forgotten. Hence, we propose a new Cloud-User protocol as a solution for plain text outsourcing problem. We only allow users and CSPs to embed the ciphertext watermark, which is generated and embedded by Trusted Third Party (TTP), into the ciphertext data for transferring. Then, the receiver decrypts it and obtains the watermarked data in plain text. In the arbitration stage, feature extraction and the identity of user will be used to identify the data. The fixed Hamming distance code can help raise the system’s capability for watermarks as much as possible. Extracted watermark can locate the unauthorized distributor and protect the right of honest CSP. The results of experiments demonstrate the security and validity of our protocol.


Sign in / Sign up

Export Citation Format

Share Document