Academic literature on the topic 'FLOODING CONTROL PROTOCOL'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'FLOODING CONTROL PROTOCOL.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "FLOODING CONTROL PROTOCOL"

1

Ghori, Muhammad Rizwan, Tat-Chee Wan, Gian Chand Sodhy, and Amna Rizwan. "Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks." Electronics 10, no. 18 (September 16, 2021): 2274. http://dx.doi.org/10.3390/electronics10182274.

Full text
Abstract:
The standard Bluetooth Low-Energy mesh networks assume the use of flooding for multihop communications. The flooding approach causes network overheads and delays due to continuous message broadcasting in the absence of a routing mechanism. Among the routing protocols, AODV is one of the most popular and robust routing protocol for wireless ad hoc networks. In this paper, we optimized the AODV protocol for Bluetooth Low-Energy communication to make it more efficient in comparison to the mesh protocol. With the proposed protocol (Optimized AODV (O-AODV)), we were able to achieve lower overheads, end-to-end delay, and average per-hop one-way delay in comparison to the BLE mesh (flooding) protocol and AODV protocol for all three scenarios (linear topology with ten nodes, multipath topology with six and ten nodes). In addition, the proposed protocol exhibited practically constant route requests and route reply setup times. Furthermore, the proposed protocol demonstrated a better Packet Delivery Ratio (PDR) for O-AODV (84%) in comparison to AODV (71%), but lower than the PDR of the mesh (flooding) protocol with 93%.
APA, Harvard, Vancouver, ISO, and other styles
2

ZHANG, YING, and MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS." Journal of Interconnection Networks 07, no. 04 (December 2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.

Full text
Abstract:
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenance. In this paper, we propose a framework of constrained flooding protocols. The framework incorporates a reinforcement learning kernel, a differential delay mechanism, and a constrained and probabilistic retransmission policy. This type of protocol takes the advantages of robustness from flooding, but maintains energy efficiency by constraining retransmissions. Without the use of any control packets, such a protocol adapts to the specific routing requirements of the task and the dynamic changes of the network. We analyze this framework in simulation using some real-world applications in sensor networks.
APA, Harvard, Vancouver, ISO, and other styles
3

Tang, Churan, and Linghua Zhang. "An Improved Flooding Routing Protocol for Wireless Sensor Networks Based on Network-Coding." ITM Web of Conferences 17 (2018): 02001. http://dx.doi.org/10.1051/itmconf/20181702001.

Full text
Abstract:
A central question in wireless sensor network research is how to reduce the consumption of the energy of the sensor nodes. Theoretically, the network coding technology proposed by Ahlswede et al (2000) can improve the network reliability and network throughput, increase the robustness and save energy. Based on the classic flooding routing protocol, the present study proposes a new flooding control protocol, i.e. NC-Flooding for wireless sensor networks. NC-Flooding protocol introduces five mechanisms to enhance the efficiency of wireless sensor networks. As shown by MATLAB simulation results, NC-Flooding protocol reduces the number of broadcasts of wireless sensor networks, increases the throughput of the network and increases the bandwidth utilization. We conclude that NC-Flooding protocol reduces data forwarding cost and node energy consumption and extends nodes’ life cycle, thus increasing network utilization.
APA, Harvard, Vancouver, ISO, and other styles
4

Singh, Prabhdeep, Anuj Kumar Gupta, and Ravinder Singh. "Improved priority-based data aggregation congestion control protocol." Modern Physics Letters B 34, no. 02 (December 20, 2019): 2050029. http://dx.doi.org/10.1142/s0217984920500293.

Full text
Abstract:
With advancement in multimedia applications, Wireless sensor networks (WSNs) are becoming popular due to their inherent characteristics and wide range of applications. However, WSNs contain very small sensor nodes, these nodes are battery constrained. Also, the batteries of these sensor nodes are not either replaceable or rechargeable. Therefore, many energy efficient protocols have been implemented so far to improve the network lifetime. However, the data aggregation at sink may suffer from data flooding issue, which reduces the network lifetime of WSNs. For handling this issue, in this paper, an effective data aggregation approach is designed. We have designed a priority-based data aggregation control protocol, which considers token bucket, Lempel–Ziv–Welch (LZW) compression and a hybrid of ant colony optimization and particle swarm optimization-based soft computing approach. Extensive experiments reveal that the presented protocol provides better network lifetime in contrast to the existing energy efficient protocols.
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Shihri, Fatima, and Mohammed Arafah. "Reliable and Energy Efficient Routing Protocol for Under Water Sensor Networks." International Journal on Semantic Web and Information Systems 13, no. 2 (April 2017): 14–26. http://dx.doi.org/10.4018/ijswis.2017040102.

Full text
Abstract:
The authors proposed a Reliable and energy efficient Routing Protocol (RRP) for underwater sensor network, integrating the desired features of the Directional Flooding based Routing (DFR) and Vector Based Void Avoidance (VBVA) protocols. The new algorithm considers reliability and takes into consideration the residual energy for each node before choosing the forwarding node. RRP relies on a packet flooding technique to increase reliability. However, to prevent a packet from flooding to the whole network, they control the number of nodes forwarding a packet by measuring a link quality between nodes in a hop by hop. To mitigate the effect of the inherent void problem, the authors consider residual energy, link quality, and distance from destination node to choose a reliable path to forward packet to destination. The authors observe that RRP protocol has better performance in terms of the packet delivery ratio than the DFR protocol due to the void avoidance technique.
APA, Harvard, Vancouver, ISO, and other styles
6

Prabhu. M, Mr Dinesh, and Dr Dinesh Senduraja. "MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach." International Journal of Engineering and Computer Science 10, no. 12 (December 15, 2021): 25453–58. http://dx.doi.org/10.18535/ijecs/v10i12.4641.

Full text
Abstract:
In Wireless sensor Network, several researchers have provided different routing protocol for sensor networks, particularly routing protocols depending on clusters protocols. Reliability of nodes is necessary parameter in effective sensor networks. We use MAC protocol for controlling the network packets. This is because the usage of cluster based routing has several merits like minimized control messages, re-usability of bandwidth and enhanced power control. Different cluster based routing protocol is proposed by many researchers for the purpose of reducing the consumption energy in wireless sensor networks. Those techniques reduces the energy consumption but with several disadvantages like lack of QoS, inefficient transmission, etc., To overcome those problems, modified QoS enhanced base station controlled in Mistrial Approach (flooding Technique) for wireless sensor networks is proposed in this work. Here we reduce the number of retransmission and detect the overlay packets in networks using proposed approach. Simulation results show the better energy consumption, Maximum Life time & Efficient Bandwidth is achieved by flooding management when compared to the conventional techniques
APA, Harvard, Vancouver, ISO, and other styles
7

Shams Shafigh, Alireza, Kamran Abdollahi, and Marjan Kouchaki. "Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol." Journal of Electrical and Computer Engineering 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/389812.

Full text
Abstract:
Multicast routing is an efficient method to lead data packets from one source group to several nodes as destination group. Although multicast routing algorithms could be efficient in many situations but their routing mechanism like as route request flooding packets likely results in poor performance in comparison to unicast routing algorithms. In this research, two efficient methods are proposed to improve the performance of On Demand Multicast Routing Protocol (ODMRP). The main proposed method tries to establish a small, efficient, and high-quality forwarding group. This is achieved by augmenting the Join Query packets with additional information such as speed, power level of node, and link bandwidths. Besides, the control overhead is further reduced by restricting the domain of control packet flooding (by restricting the domain of control packet flooding). The performance evaluation shows that the proposed scheme increases the packet delivery rate by up to 40%, while reducing average end-to-end delay and consumed power by about 35% and 45%, respectively.
APA, Harvard, Vancouver, ISO, and other styles
8

Dey, Tanay, M. M. A. Hashem, and Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS." IIUM Engineering Journal 11, no. 2 (November 19, 2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.

Full text
Abstract:
Due to mobility of nodes in ad hoc networks, the most challenging issue is to design and to make sound analysis of a routing protocol that determines its robustness to deliver packets in low routing packet overhead. In this paper, we thoroughly analyzed the Adaptive Monitor Based Routing (AMBR) protocol by varying different parameters that affect a routing protocol to measure its performance. Analysis shows that it requires less routing control overhead comparing with other prevalent routing protocols. An improved analytical model is also presented in this paper. All these analyses firmly prove that AMBR is a sound and robust protocol in terms of flooding, routing overhead and hence, enhances reliability
APA, Harvard, Vancouver, ISO, and other styles
9

Chou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen, and Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks." Wireless Communications and Mobile Computing 2020 (November 20, 2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.

Full text
Abstract:
Software-defined networking controllers use the OpenFlow discovery protocol (OFDP) to collect network topology status. The OFDP detects the link between switches by generating link layer discovery protocol (LLDP) packets. However, OFDP is not a security protocol. Attackers can use it to perform topology discovery via injection, man-in-the-middle, and flooding attacks to confuse the network topology. This study proposes a correlation-based topology anomaly detection mechanism. Spearman’s rank correlation is used to analyze the network traffic between links and measure the round-trip time of each LLDP frame to determine whether a topology discovery via man-in-the-middle attack exists. This study also adds a dynamic authentication key and counting mechanism in the LLDP frame to prevent attackers from using topology discovery via injection attack to generate fake links and topology discovery via flooding attack to cause network routing or switching abnormalities.
APA, Harvard, Vancouver, ISO, and other styles
10

Elejla, Omar E., Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan, and Iznan H. Hasbullah. "Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks." Applied Sciences 12, no. 12 (June 16, 2022): 6150. http://dx.doi.org/10.3390/app12126150.

Full text
Abstract:
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 networks. However, it exposes IPv6 networks to some security threats since ICMPv6 messages are not verified or authenticated, and they are mandatory messages that cannot be blocked or disabled. One of the threats currently facing IPv6 networks is the exploitation of ICMPv6 messages by malicious actors to execute distributed denial of service (DDoS) attacks. Therefore, this paper proposes a deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks by introducing an ensemble feature selection technique that utilizes chi-square and information gain ratio methods to select significant features for attack detection with high accuracy. In addition, a long short-term memory (LSTM) is employed to train the detection model on the selected features. The proposed approach was evaluated using a synthetic dataset for false-positive rate (FPR), detection accuracy, F-measure, recall, and precision, achieving 0.55%, 98.41%, 98.39%, 97.3%, and 99.4%, respectively. Additionally, the results reveal that the proposed approach outperforms the existing approaches.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "FLOODING CONTROL PROTOCOL"

1

Hussein, Abedellatif Mohammed. "Flooding control in route discovery for reactive routing in mobile ad hoc networks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4495.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

KUMAR, S. P. AJITH. "ROUTING AND CONGESTION CONTROL IN OPPORTUNISTIC NETWORKS." Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14606.

Full text
Abstract:
ABSTRACT Opportunistic networks are one of the most interesting evolutions of MANETs. Mobile nodes are enabled to communicate with each other in opportunistic networks even if there is no route to connect them. Also, nodes are not having knowledge about the network topology, which (instead) is necessary in MANET routing protocols. In this network routes are building dynamically, whenever messages are en route between the sender and the destination(s), and any potential node can be opportunistically used as the next hop, provided it is bringing the message nearer to the destination. These necessities make opportunistic networks a challenging and demanding research field. In this project, a new routing protocol named as Reduced Flooding Epidemic Protocol (RFEP) for infrastructure-less is proposed and is an existing Epidemic routing protocol improvement model. Its objective is to reduce the amount of flooding done in the Epidemic protocol. Therefore it reduces the resource consumption and network bandwidth and as well as power of nodes that helps in maximizing the network lifetime. Also a method for congestion control is proposed here for opportunistic networks. Congestion is an important problem in this network because some nodes having better connection comparing with other nodes and so the load is unfairly distributed towards them. Therefore, a threshold based packet forwarding scheme is proposed in this work to overcome this issue. Number of nodes is selected as the subsequent hop to forward the packets whose utility metric computed based on its social metrics, delay and packet dropping probability which is higher than the current host by the predefined threshold. The outcome shows that it generated very good results in terms of delivery probability, overhead ratio and reduced number of packets dropped.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "FLOODING CONTROL PROTOCOL"

1

Al-Bahadili, Hussein, Abdel Rahman Alzoubaidi, and Ali Al-Khalidi. "Comparing Various Route Discovery Algorithms in Ad Hoc Wireless Networks." In Simulation in Computer Network Design and Modeling, 196–215. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch010.

Full text
Abstract:
Dynamic (reactive or on-demand) routing protocols used in wireless ad hoc networks suffer from transmitting a huge number of control packets during the route discovery phase of the protocols, which increases the overhead significantly. Therefore, a number of optimization protocols have been developed throughout the years. This chapter compares the performance of various route discovery algorithms in ad hoc wireless networks, namely, pure flooding, probabilistic, Location-Aided Routing scheme 1 (LAR-1), LAR-1-Probabilsitic (LAR-1P), and Optimal Multipoint Relying (OMPR). The results obtained through the different simulations are analyzed and compared. This chapter will help practitioners of various kinds (academics, professionals, researchers, and students) grasp a solid understanding of the behavior of ad hoc wireless network route discovery algorithms and develop an appreciation for flooding optimization mechanisms. It also substantiates the case of experimenting via simulation with such models and shows how the different simulation parameters interplay.
APA, Harvard, Vancouver, ISO, and other styles
2

Afzal, Saad. "Implementation of Flooding Free Routing in Smart Grid." In Smart Grid as a Solution for Renewable and Efficient Energy, 298–322. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0072-8.ch013.

Full text
Abstract:
Smart Grid is a communication and automatic control capabilities in electric power grid system for improving efficiency, reliability, management, capabilities and security of electric power grid. Routing is important in Smart Grid to send data from one point to another point. Routing in Smart Grid is necessary to search /identify destination point/node for communication and to computer the best available route in the network topology among which the data to be sent during communication. Smart Grid can be a combination of fixed nodes (home appliances, smart meter, control centre, etc.) but the nature of communication between fixed nodes is dynamic due to the switch on/off or the fluctuation in electricity flow. Therefore the fixed nodes can also be disappeared from the network topology in Smart Grid. Existing routing protocols for Smart Grid are based on flooding mechanism. We would like to examine the feasibility of flooding free routing in Smart Grid. Then we will propose a flooding-free routing for Smart.
APA, Harvard, Vancouver, ISO, and other styles
3

Mnif, Kais, and Michel Kadoch. "Performance Enhancement of Routing Protocols in Mobile Ad hoc Networks." In Innovations in Mobile Multimedia Communications and Applications, 50–61. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-563-6.ch004.

Full text
Abstract:
This paper proposes to use virtual backbone structure to handle control messages in ad hoc networks. This structure is effective in reducing the overhead of disseminating control information. In the first part, the approach to build the virtual backbone on the setup phase is presented. The construction of backbone is based on the Minimum Connected Dominating Set (MCDS). The novelty is in the way on finding the MCDS. A Linear Programming approach is used to build a Minimum Dominating Set (MDS). Then, a spanning tree algorithm is applied to provide the MCDS. A theoretical analysis based on probabilistic approach is developed to evaluate the size of MCDS. Different techniques of diffusion in ad hoc networks are presented and compared. The flooding technique is simple and efficient, but it is expensive in term of bandwidth consumption and causes broadcast storm problem. Simulation results show that technique using virtual backbone performs flooding and it is compared to MPR (Multipoint Relay). The second part of this paper presents a distributed procedure to maintain the backbone when the mobility of terminals is introduced. A maintenance procedure will be executed by the node which changes its position. This procedure is distributed and guarantees the node connectivity to the backbone. The authors believe that the maintenance of the backbone with small size will be more effective. Simulation results show the performance of this procedure when mobility and scalability are considered.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "FLOODING CONTROL PROTOCOL"

1

McInnes, Allan I. "Model-checking the Flooding Time Synchronization Protocol." In 2009 IEEE International Conference on Control and Automation (ICCA). IEEE, 2009. http://dx.doi.org/10.1109/icca.2009.5410508.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Terada, Shinsuke, Takumi Miyoshi, Hiroaki Morino, Masakatsu Ogawa, and Kaoru Sezaki. "AD HOC Routing Protocol with Flooding Control using Unidirectional Links." In 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394291.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Yamamura, Natsuru, and Takuo Nakashima. "Flooding Features for the AODV Protocol under the Different Communication Distances." In 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC). IEEE, 2009. http://dx.doi.org/10.1109/icicic.2009.213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sawant, Khushboo, Manoj Kumar Rawat, and Aakansha Jain. "Implementation of energy aware secure routing protocol over flooding environment in MANET." In 2015 International Conference on Computer, Communication and Control (IC4). IEEE, 2015. http://dx.doi.org/10.1109/ic4.2015.7375560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mkuzangwe, Nenekazi N. P., Andre McDonald, and Fulufhelo V. Nelwamondo. "Implementation of anomaly detection algorithms for detecting Transmission Control Protocol Synchronized flooding attacks." In 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2015. http://dx.doi.org/10.1109/fskd.2015.7382282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Elamsy, Tarik, and Randa El-Marakby. "Flooding Zone Control Protocol (FZCP): enhancing the reliability of real-time multimedia delivery in WSNs." In 2009 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2009. http://dx.doi.org/10.1109/isspit.2009.5407585.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sha, Y., W. Xiong, L. C. Zhu, L. L. Zhang, Z. W. Zhang, and Q. W. Fan. "Research of a flooding control routing protocol based on location prediction in an Ad Hoc network." In International Conference on Computer Science and Technology. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/iccst140991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rekha, S. Nithya, and C. Chandrasekar. "A comparative analysis of probabilistic broadcasting to reduce flooding with FSR (Fisheye State Routing) protocol and grid FSR using MANET." In PROCEEDINGS OF THE SIXTH GLOBAL CONFERENCE ON POWER CONTROL AND OPTIMIZATION. AIP, 2012. http://dx.doi.org/10.1063/1.4769018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Barros, Urlan S. de, Tiago de C. Freire, Michele N. Lima, Luiz H. A. Correia, and Aldri L. dos Santos. "O impacto de ataques RoQ em redes 802.11 com controle de potência de transmissão." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2009. http://dx.doi.org/10.5753/sbseg.2009.20623.

Full text
Abstract:
O IEEE 802.11 possui duas funções coordenadoras, denominadas DCF e PCF, responsáveis pelo controle de acesso ao meio. Além disso, técnicas de controle de potência de transmissão (CPT) têm sido utilizadas para assegurar que a rede tenha uma maior economia de energia e uma maior vazão de dados através do reuso espacial. Contudo, tanto o 802.11 quanto as técnicas de CPT são vulneráveis a ataques de redução da qualidade de serviço (RoQ), devido à necessidade das estações manterem um comportamento de transmissão padrão. Os ataques RoQ têm a finalidade de aumentar a vazão do tráfego dos atacantes com o intuito de produzir um dano máximo na rede e evitar mecanismos de detecção ou prevenção. Este trabalho analisa como os ataques RoQ, self-whiper, flooding e round-robin afetam o protocolo IEEE 802.11 padrão e as técnicas de CPT. Resultados mostram que a técnica AEWMA apresentou a maior economia de energia na presença de qualquer ataque. Além disso, o reuso espacial não foi afetado, exceto diante do ataque self-whisper com 30% e 50% de atacantes.
APA, Harvard, Vancouver, ISO, and other styles
10

Mai, Kahnery, Nathan Watts, and George Herman. "Screen Factor Polymer Characterization: Improved Screen Factor Technique, Apparatus, and Analysis." In SPE International Conference on Oilfield Chemistry. SPE, 2023. http://dx.doi.org/10.2118/213837-ms.

Full text
Abstract:
Abstract Improvement of mobility control in conventional oil reservoirs is commonly achieved through polymer flooding. This enhanced oil recovery (EOR) technology involves the addition of hydrolyzed polyacrylamide (HPAM) to the injection fluid to increase the viscosity of the displacing phase in the reservoir. The mobility improvement of a polymer flood is defined as the resistance factor (RF), which is experimentally measured by comparing the flow characteristics (e.g., pressure drop, flow rate) of the polymer solution against its solvent (or other simulate fluid for the waterflood). Equations for these comparisons are built upon Darcy's law for fluid flow, which applies in low shear rate conditions (like deep reservoir flow) where the pressure drop in a given section of the porous media is linearly related to the flow rate for a given fluid viscosity. However, the viscosity of HPAM solutions follow non-Newtonian behavior that changes with shear rate, typically following a shear-thinning trend. Flow through complex porous media that is representative of the reservoir can introduce elongational (or extensional) flow, which can cause a "shear-thickening" region where the polymer's apparent (in-situ) viscosity increases according to its viscoelastic characteristics. Since predicting the RF potential of a polymer solution is a primary goal of laboratory screening and formulation work for EOR projects, polymer evaluations often incorporate experimental methods that probe this viscoelastic potential. Screen factor (SF) is a long-established method that is often considered to characterize polymer solutions' viscoelasticity with a relatively simple apparatus and fast measurement. This study introduces a new method for conducting screen factor measurements that improves upon the original design and protocol (as described in API RP 63). Validating the efficacy of the new design required an in-depth examination into the nature of SF measurements. The proposed novel design and methodology was able to replicate benchmark results generated according to API RP 63 while improving ease of use, measurement precision and accuracy, and level of data generation to allow for in-depth measurement analysis. While investigating the principles that govern standard gravity drainage screen factor, it was found that the solvent flows under non-linear conditions, precluding the application of linear flow equations (such as Darcy's law) and explaining why SF is a wholly unique value that cannot be directly related to other measurements (e.g., porous media RF or in-situ viscosity). Through rate controlled experiments with the screen pack from a SF setup (five 100 mesh screens), it was determined that screen factor does not appear to be a purely viscoelastic measurement, but rather exerted a shear rate in the transition regime from viscous to viscoelastic flow under the studied conditions. While useful applications of screen factor are recognized, the discussed analyses bring attention to the limitations of SF. In reference to RF results generated in porous media (Berea core), alternative laboratory experiments (e.g., CaBER evaluation or RF with an in-line filter) are shown to provide more effective characterization of the studied polymers' viscoelastic potential compared to screen factor measurements.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography