Research on transmission of technology of downward information security for wellbore trajectory control

نویسندگان

  • Lin DeShu
  • Feng Ding
چکیده

Information transmission is an important part of the wellbore trajectory automatic control system. Combined with the characteristics of the guided drilling system, drilling fluid pulse is selected as a tool for trajectory control. Negative pulse transmission of drilling fluid is one of the key technologies to realize wellbore trajectory automatic control. In this paper, the working principle of negative pulse propagation of drilling fluid is introduced. The characteristics of negative pulse propagation and signal pretreatment of drilling fluid are analyzed emphatically. Signal correlation analysis method is proposed for signal transmission of drilling fluid negative impulse well. In this paper, the propagation characteristics of drilling fluid pressure pulsed downward transmission system are studied deeply. The influence of various drilling parameters on the drilling fluid pressure pulse is analyzed, and the model of drilling fluid pressure pulse is presented. Experimental results show that the proposed method can effectively separate useful signals from interfering signals. It is verified by field experiment that the success rate of information decode system designed by this method is high, which can meet the requirement of well trajectory precise control.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Wellbore Trajectory Optimization of an Iranian Oilfield Based on Mud Pressure and Failure Zone

Determination of the borehole and fracture initiation positions is the main aim of a borehole stability analysis. A wellbore trajectory optimization with the help of the mud pressure may be unreasonable since the mud pressure can only reflect the degree of difficulty for the initial damage to occur at the wellbore rather than the extent of the wellbore damage. In this work, we investigate...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Privacy and Security of Big Data in THE Cloud

Big data has been arising a growing interest in both scien- tific and industrial fields for its potential value. However, before employing big data technology into massive appli- cations, a basic but also principle topic should be investigated: security and privacy. One of the biggest concerns of big data is privacy. However, the study on big data privacy is still at a very early stage. Many or...

متن کامل

Adaptive Robust Control for Trajectory Tracking of Autonomous underwater Vehicles on Horizontal Plane

This manuscript addresses trajectory tracking problem of autonomous underwater vehicles (AUVs) on the horizontal plane. Adaptive sliding mode control is employed in order to achieve a robust behavior against some uncertainty and ocean current disturbances, assuming that disturbance and its derivative are bounded by unknown boundary levels. The proposed approach is based on a dual layer adaptive...

متن کامل

On the design and security of a lattice-based threshold secret sharing scheme

In this paper, we introduce a method of threshold secret sharing scheme (TSSS) in which secret reconstruction is based on Babai's nearest plane algorithm. In order to supply secure public channels for transmitting shares to parties, we need to ensure that there are no quantum threats to these channels. A solution to this problem can be utilization of lattice-based cryptosystems for these channe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • EURASIP J. Information Security

دوره 2017  شماره 

صفحات  -

تاریخ انتشار 2017