Analysis of Plug Drilling and Stuck Pipe Performance Metrics

2021 ◽  
Author(s):  
Paul Brown ◽  
Brian Gunby

Abstract A large collection of data recorded during coiled tubing (CT) operations has been analyzed using proprietary pattern recognition algorithms to identify downhole events with a high degree of confidence. These events include the drilling of plugs and stuck pipe incidents. Key performance indicator (KPI) metrics derived from this analysis provide insight into industry trends over time and by region, and can provide useful performance benchmarks for service providers and operator companies. Depth, weight and pressure data from multiple sources has been streamed and stored on a shared platform over a five year period, creating a record of over 39,000 data files. This data was processed to generate KPI-type statistics for over 500,000 detected plugs and 760 possible stuck pipe scenarios, based on analysis of depth and weight signatures. Using surface measurements to quantify downhole events has some limitations, but the method has proven sufficiently robust to allow useful trends to be observed and evaluated. While the analysis is confidential to the parties involved, a contributing company can compare their ‘performance’ statistics (as evaluated by the third party algorithms) against averages representative of the industry at large, arranged by year and geographic region, to identify areas of relative strength or weakness. An operator company can likewise compare metrics for different service providers (derived solely from jobs performed for their company) for those which elect to share data in this fashion. This paper presents statistics for plug drilling operations and stuck pipe incidents in North America between 2016-2020, a period of significant change in the CT industry. Examples show how average plug drilling times have generally decreased, with less frequent use of short trips and fewer pipe cycles. The data shows that, for some companies, faster operations have come at the expense of more frequent or severe stuck pipe incidents, whereas other companies have experienced fewer such problems. This comparative analysis illustrates how downhole outcomes can be deduced from surface measurements, and resulting performance metrics can vary widely between companies, fields and geographic regions.

Author(s):  
Jin Han ◽  
Jing Zhan ◽  
Xiaoqing Xia ◽  
Xue Fan

Background: Currently, Cloud Service Provider (CSP) or third party usually proposes principles and methods for cloud security risk evaluation, while cloud users have no choice but accept them. However, since cloud users and cloud service providers have conflicts of interests, cloud users may not trust the results of security evaluation performed by the CSP. Also, different cloud users may have different security risk preferences, which makes it difficult for third party to consider all users' needs during evaluation. In addition, current security evaluation indexes for cloud are too impractical to test (e.g., indexes like interoperability, transparency, portability are not easy to be evaluated). Methods: To solve the above problems, this paper proposes a practical cloud security risk evaluation method of decision-making based on conflicting roles by using the Analytic Hierarchy Process (AHP) with Aggregation of Individual priorities (AIP). Results: Not only can our method bring forward a new index system based on risk source for cloud security and corresponding practical testing methods, but also can obtain the evaluation result with the risk preferences of conflicting roles, namely CSP and cloud users, which can lay a foundation for improving mutual trusts between the CSP and cloud users. The experiments show that the method can effectively assess the security risk of cloud platforms and in the case where the number of clouds increased by 100% and 200%, the evaluation time using our methodology increased by only by 12% and 30%. Conclusion: Our method can achieve consistent decision based on conflicting roles, high scalability and practicability for cloud security risk evaluation.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2021 ◽  
Vol 13 (13) ◽  
pp. 7354
Author(s):  
Jiekun Song ◽  
Xiaoping Ma ◽  
Rui Chen

Reverse logistics is an important way to realize sustainable production and consumption. With the emergence of professional third-party reverse logistics service providers, the outsourcing model has become the main mode of reverse logistics. Whether the distribution of cooperative profit among multiple participants is fair or not determines the quality of the implementation of the outsourcing mode. The traditional Shapley value model is often used to distribute cooperative profit. Since its distribution basis is the marginal profit contribution of each member enterprise to different alliances, it is necessary to estimate the profit of each alliance. However, it is difficult to ensure the accuracy of this estimation, which makes the distribution lack of objectivity. Once the actual profit share deviates from the expectation of member enterprise, the sustainability of the reverse logistics alliance will be affected. This study considers the marginal efficiency contribution of each member enterprise to the alliance and applies it to replace the marginal profit contribution. As the input and output data of reverse logistics cannot be accurately separated from those of the whole enterprise, they are often uncertain. In this paper, we assume that each member enterprise’s input and output data are fuzzy numbers and construct an efficiency measurement model based on fuzzy DEA. Then, we define the characteristic function of alliance and propose a modified Shapley value model to fairly distribute cooperative profit. Finally, an example comprising of two manufacturing enterprises, one sales enterprise, and one third-party reverse logistics service provider is put forward to verify the model’s feasibility and effectiveness. This paper provides a reference for the profit distribution of the reverse logistics.


2021 ◽  
pp. 1-12
Author(s):  
Gokay Saldamli ◽  
Richard Chow ◽  
Hongxia Jin

Social networking services are increasingly accessed through mobile devices. This trend has prompted services such as Facebook and Google+to incorporate location as a de facto feature of user interaction. At the same time, services based on location such as Foursquare and Shopkick are also growing as smartphone market penetration increases. In fact, this growth is happening despite concerns (growing at a similar pace) about security and third-party use of private location information (e.g., for advertising). Nevertheless, service providers have been unwilling to build truly private systems in which they do not have access to location information. In this paper, we describe an architecture and a trial implementation of a privacy-preserving location sharing system called ILSSPP. The system protects location information from the service provider and yet enables fine grained location-sharing. One main feature of the system is to protect an individual’s social network structure. The pattern of location sharing preferences towards contacts can reveal this structure without any knowledge of the locations themselves. ILSSPP protects locations sharing preferences through protocol unification and masking. ILSSPP has been implemented as a standalone solution, but the technology can also be integrated into location-based services to enhance privacy.


Author(s):  
Wei Zhang ◽  
Yifan Dou

Problem definition: We study how the government should design the subsidy policy to promote electric vehicle (EV) adoptions effectively and efficiently when there might be a spatial mismatch between the supply and demand of charging piles. Academic/practical relevance: EV charging infrastructures are often built by third-party service providers (SPs). However, profit-maximizing SPs might prefer to locate the charging piles in the suburbs versus downtown because of lower costs although most EV drivers prefer to charge their EVs downtown given their commuting patterns and the convenience of charging in downtown areas. This conflict of spatial preferences between SPs and EV drivers results in high overall costs for EV charging and weak EV adoptions. Methodology: We use a stylized game-theoretic model and compare three types of subsidy policies: (i) subsidizing EV purchases, (ii) subsidizing SPs based on pile usage, and (iii) subsidizing SPs based on pile numbers. Results: Subsidizing EV purchases is effective in promoting EV adoptions but not in alleviating the spatial mismatch. In contrast, subsidizing SPs can be more effective in addressing the spatial mismatch and promoting EV adoptions, but uniformly subsidizing pile installation can exacerbate the spatial mismatch and backfire. In different situations, each policy can emerge as the best, and the rule to determine which side (SPs versus EV buyers) to subsidize largely depends on cost factors in the charging market rather than the EV price or the environmental benefits. Managerial implications: A “jigsaw-piece rule” is recommended to guide policy design: subsidizing SPs is preferred if charging is too costly or time consuming, and subsidizing EV purchases is preferred if charging is sufficiently fast and easy. Given charging costs that are neither too low nor too high, subsidizing SPs is preferred only if pile building downtown is moderately more expensive than pile building in the suburbs.


2021 ◽  
Vol 13 (1) ◽  
pp. 20-39
Author(s):  
Ahmed Aloui ◽  
Okba Kazar

In mobile business (m-business), a client sends its exact locations to service providers. This data may involve sensitive and private personal information. As a result, misuse of location information by the third party location servers creating privacy issues for clients. This paper provides an overview of the privacy protection techniques currently applied by location-based mobile business. The authors first identify different system architectures and different protection goals. Second, this article provides an overview of the basic principles and mechanisms that exist to protect these privacy goals. In a third step, the authors provide existing privacy protection measures.


Sign in / Sign up

Export Citation Format

Share Document