ict system
Recently Published Documents


TOTAL DOCUMENTS

126
(FIVE YEARS 39)

H-INDEX

6
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Usman Ahmed ◽  
Zhiheng Zhang ◽  
Ruben Ortega Alfonzo

Abstract Horizontal well completions are often equipped with Inflow Control Devices (ICDs) to optimize flow rates across the completion for the whole length of the interval and to increase the oil recovery. The ICD technology has become useful method of optimizing production from horizontal wells in a wide range of applications. It has proved to be beneficial in horizontal water injectors and steam assisted gravity drainage wells. Traditionally the challenges related to early gas or water breakthrough were dealt with complex and costly workover/intervention operations. ICD manipulation used to be done with down-hole tractor conveyed using an electric line (e-line) cable or by utilization of a conventional coiled tubing (CT) string. Wellbore profile, high doglegs, tubular ID, drag and buoyancy forces added limitations to the e-line interventions even with the use of tractor. Utilization of conventional CT string supplement the uncertainties during shifting operations by not having the assurance of accurate depth and forces applied downhole. A field in Saudi Arabia is completed with open-hole packer with ICD completion system. The excessive production from the wells resulted in increase of water cut, hence ICD's shifting was required. As operations become more complex due to fact that there was no mean to assure that ICD is shifted as needed, it was imperative to find ways to maximize both assurance and quality performance. In this particular case, several ICD manipulating jobs were conducted in the horizontal wells. A 2-7/8-in intelligent coiled tubing (ICT) system was used to optimize the well intervention performance by providing downhole real-time feedback. The indication for the correct ICD shifting was confirmed by Casing Collar Locator (CCL) and Tension & Compression signatures. This paper will present the ICT system consists of a customized bottom-hole assembly (BHA) that transmits Tension, compression, differential pressure, temperature and casing collar locator data instantaneously to the surface via a nonintrusive tube wire installed inside the coiled tubing. The main advantages of the ICT system in this operation were: monitoring the downhole force on the shifting tool while performing ICD manipulation, differential pressure, and accurately determining depth from the casing collar locator. Based on the known estimated optimum working ranges for ICD shifting and having access to real-time downhole data, the operator could decide that required force was transmitted to BHA. This bring about saving job time while finding sleeves, efficient open and close of ICD via applying required Weight on Bit (WOB) and even providing a mean to identify ICD that had debris accumulation. The experience acquired using this method in the successful operation in Saudi Arabia yielded recommendations for future similar operations.


2021 ◽  
Vol 26 (4) ◽  
pp. 111-120
Author(s):  
Łukasz Goździaszek

Abstract The aim of the article is to present the legal provisions used to identify taxpayers (and similarly other entities) using electronic communication in the times of COVID-19, in the light of the construction of public ICT systems for submitting declarations and applications. The COVID-19 pandemic accelerated the IT transformation, including the benefits of switching to digital tools, unless the legislator had already imposed an obligation to use electronic communication. For tax purposes, the range of possible signatures has not been limited to a qualified electronic signature, a trusted signature, a personal signature, and possibly a simple identity verification mechanism using an account in an ICT system secured only with a password. It is often used to sign the so-called “authorization data” (“tax data”). The new facilitations in the field of creating a trusted profile should translate into the popularization of the trusted signature, especially as there are more and more non-tax online services provided by public entities.


2021 ◽  
Author(s):  
Vijayakumar Sathya ◽  
Venkatesan Srinivasadesi ◽  
Shyi-Long Lee ◽  
Vediappen Padmini

Abstract Pyridine based organic fluorophore has been synthesized for the detection of phenylalanine (PA). The quenching has been observed between fluorophore and PA through ICT system as noticed by colorimetric and fluorimetric techniques. Under optimized conditions, the fluorophore detects PA selectively in the presence of other biomolecules. The practical application of the fluorophore has been successfully applied in human blood serum and urine.


2021 ◽  
pp. 123-136
Author(s):  
Masaki Umejima ◽  
Cherry H. Y. Wong ◽  
Jiro Kokuryo ◽  
Jun Murai ◽  
David Farber ◽  
...  

AbstractA pre-existing partnership between the Japanese Government and Keio University paved the way for K-12 education to embrace distance learning. The university has been engaging in the revision of educational ICT policies in Japan for many years. In Japan, universities have been accumulating knowledge in distance learning practices since the emergence of the Internet, though earlier educational ICT policy required the ICT system in K-12 education to depend on dedicated Internet lines. In December 2019, the Japanese Ministry of Education, Culture, Sports, Science, and Technology (MEXT) announced a new ICT policy to allow K-12 education to launch distance learning classes via public cloud on the Internet. The university’s experience with running distance learning, bundled with the stipulations of the new educational ICT policy, enabled K-12 education to carry out distance learning. New subjects can be taught daily, and continuity of education is ensured in disaster situations, such as the Covid-19 pandemic. The research team at Keio University built the “Nagasaki-Takaoka Model” as a reference model with the added aim of ensuring data security and trust in the open network. In December 2020, Takaoka City successfully deployed the “Nagasaki-Takaoka Model” across all public schools.


2021 ◽  
Vol 4 (S3) ◽  
Author(s):  
Anna Volkova ◽  
Jonas Terzer ◽  
Hermann de Meer

AbstractIn order to evaluate the effectiveness of innovative services and technologies spanning over the ICT-enabled power system, realistic models are required. Although nowadays there is a wide range of power system data models, these models do not include a lifelike representation of the ICT system architecture and do not consider the level of interconnectedness of the two systems. In this paper, we propose a methodology for quantification of the geospatial relations between ICT and power system based on openly available data. We describe a graph-theoretic approach, formulate a problem of assessing geospatial relations and discuss the methods required to process publicly available data, retrieve scenarios for different regions and quantify the level of interdependence between ICT and power system.


2021 ◽  
Vol 2021 ◽  
pp. 1-18
Author(s):  
Tommaso Bosi ◽  
Andrea D’Ariano

An important objective for train operating companies is to let users, especially commuters, directly query the ICT system about trains’ availability calendar, based on an online approach, and give them clear and brief information, expressed through “intelligent” phrases instead of bit maps. This paper provides a linear programming model of this problem and a fast and flexible heuristic algorithm to create descriptive sentences from train calendars. The algorithmic method, based on the “Divide and Conquer” approach, takes the calendar period queried in its whole and divides it into subsets, which are successively processed one by one. The dominant limitation of previous methods is their strong dependence on the size and complexity of instances. On the contrary, our computational findings show that the proposed online algorithm has a very limited and constant computation time, even when increasing the problem complexity, keeping its processing time between 0 and 16 ms, while producing good quality solutions that differ by an average surplus of 0.13 subsentences compared to benchmark state-of-art solutions.


2021 ◽  
Vol 11 (11) ◽  
pp. 5165
Author(s):  
Michail Smyrlis ◽  
Iason Somarakis ◽  
George Spanoudakis ◽  
George Hatzivasilis ◽  
Sotiris Ioannidis

Digital technologies are facilitating our daily activities, and thus leading to the social transformation with the upcoming 5G communications and the Internet of Things. However, mainstream and sophisticated attacks are remaining a threat, both for individuals and organisations. Cyber Range emerges as a promising solution to effectively train people in cybersecurity aspects. A Training Programme is considered adequate only if it can adapt to the scope of the attacks they cover and if the trainees apply the learning material to the operational system. Therefore, this study introduces the model-driven CYber Range Assurance platform (CYRA). The solution allows a trainee to be trained for known and new cyber-attacks by adapting to the continuously evolving threat landscape and examines if the trainees transfer the acquired knowledge to the working environment. Furthermore, this paper presents a use case on an operational backend ICT system, showing how the CYRA platform was utilised to increase the security posture of the organisation.


2021 ◽  
Vol 16 (1) ◽  
Author(s):  
Hyoungshim Choi ◽  
Young-il Jung ◽  
Hongsoo Kim

Abstract Background The Systems for Person-Centered Elder Care (SPEC), a complex intervention, was conducted to examine its effectiveness as a technology-enhanced, multidisciplinary, and integrated care model for frail older persons among ten nursing homes (NHs) in South Korea where formal long-term care has recently been introduced. The purpose of this study was to evaluate the implementation fidelity of the SPEC intervention and to identify moderating factors that influence the implementation fidelity. Methods This study was a process evaluation based on an evidence-based framework for implementation fidelity using a mixed-methods design. Quantitative data from consultant logbooks, NH documentations, an information and communications technology (ICT) system, and a standardized questionnaire were collected from April 2015 to December 2016 and analyzed by calculating the descriptive statistics. Semi-structured focus group interviews were held with multidisciplinary teams from the participating NHs. Qualitative data from a semi-structured questionnaire and the focus group interviews were analyzed using content analysis. Results The SPEC program demonstrated good implementation fidelity, and adherence to the SPEC program was strong in all aspects, such as content, coverage, frequency, and duration. Of the participating on-site coordinators, 60% reported that the SPEC model positively impacted needs assessment and the reporting system for resident care. The important facilitating factors were tailored facilitating strategies, assurance of the quality of delivery, and recruitment strategies. Conclusion The effectiveness of the SPEC program was driven by good implementation fidelity. The key factors of good implementation fidelity were tailored delivery of evidence-based interventions over process evaluation work, facilitating strategies, and ICT support. Larger implementation studies with a more user-friendly ICT system are recommended. Trial registration ISRCTN registry, ISRCTN11972147. Registered on 16 March 2015


Author(s):  
Takayuki Kuroda ◽  
Takuya Kuwahara ◽  
Kouki Yonaga ◽  
Takao Osaki ◽  
Masamichi J. Miyama ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document