Academic literature on the topic 'Remotely deployed wireless'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Remotely deployed wireless.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Remotely deployed wireless"

1

Chowdhury, Chandreyee, Nauman Aslam, Ghufran Ahmed, Samiran Chattapadhyay, Sarmistha Neogy, and Li Zhang. "Novel Algorithms for Reliability Evaluation of Remotely Deployed Wireless Sensor Networks." Wireless Personal Communications 98, no. 1 (September 4, 2017): 1331–60. http://dx.doi.org/10.1007/s11277-017-4921-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Razaque, Abdul, and Khaled Elleithy. "AUTOMATIC ENERGY SAVING (AES) MODELTO BOOST UBIQUITOUS WIRELESS SENSOR NETWORKS (WSNs)." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 5 (August 23, 2013): 1569–79. http://dx.doi.org/10.24297/ijct.v10i5.4144.

Full text
Abstract:
We deploy BT node (sensor) that offers passive and active sensing capability to save energy. BT node works in passive mode for outdoor communication and active for indoor communication. The BT node is supported with novel automatic energy saving (AES) mathematical model to decide either modes. It provides robust and faster communication with less energy consumption. To validate this approach, we use two types of simulations: Test bed simulation is performed to automate the server through mobile phone using AES model. Ns2 simulation is done to simulate the behavior of network with supporting mathematical model. The main objective of this research is to access remotely available several types of servers, laptops, desktops and other static and moving objects. This prototype is initially deployed to control MSCS [13] & [14] from remote place through mobile device. The prototype can further be implemented to handle several objects simultaneously in university and other organizations consuming less energy and resources.
APA, Harvard, Vancouver, ISO, and other styles
3

Goyal, Sonia, and Manjeet Singh Patterh. "Performance of BAT Algorithm on Localization of Wireless Sensor Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 6, no. 3 (May 30, 2013): 351–58. http://dx.doi.org/10.24297/ijct.v6i3.4481.

Full text
Abstract:
Many applications of wireless sensor networks (WSN) require information about the geographical location of each sensor node. Devices that form WSN are expected to be remotely deployed in large numbers in a sensing field, and to self -organize to perform sensing and acting task. The goal of localization is to assign geographical coordinates to each device with unknown position in the deployment area. Recently, the popular strategy is to apply optimization algorithms to solve the localization problem. In this paper, the bat algorithm is implemented to estimate the sensor‟s position.
APA, Harvard, Vancouver, ISO, and other styles
4

Amira, Abbes, Mazen A. R. Saghir, Naeem Ramzan, Christos Grecos, and Florian Scherb. "A Reconfigurable Wireless Environment for ECG Monitoring and Encryption." International Journal of Embedded and Real-Time Communication Systems 4, no. 3 (July 2013): 72–87. http://dx.doi.org/10.4018/ijertcs.2013070104.

Full text
Abstract:
Connected health is the convergence of medical devices, security devices, and communication technologies. It enables patients to be monitored and treated remotely from their home or primary care facility rather than attend outpatient clinics or be admitted to hospital. Patients’ data and medical records within a connected health system should be securely transmitted and saved for further analysis and diagnosis. This paper presents a reconfigurable wireless system for electrocardiogram (ECG) monitoring which can be deployed in a connected health environment. Efficient field programmable gate array (FPGA) implementation for the ECG encryption block has been carried out on the RC10 prototyping board using the advanced encryption standard (AES) algorithm. Results presented have shown that the proposed AES implementation outperforms the existing FPGA-based systems in different key performance metrics and that ECG signals acquired using the VitalSens device can be encrypted/decrypted in real-time. A software based evaluation approach has been also performed to validate the proposed hardware implementation. The proposed solution can be deployed for electronic archiving of health records information systems and health monitoring technologies in personalized medicine.
APA, Harvard, Vancouver, ISO, and other styles
5

Dhoot, Anshita. "A Survey of Internet of Things." SYNCHROINFO JOURNAL 6, no. 5 (2020): 25–32. http://dx.doi.org/10.36724/2664-066x-2020-6-2-25-32.

Full text
Abstract:
The growing era of technology through the internet, Internet of Things (i.e. IoT) has a powerful and strong industrial system that provides an opportunity to grow and applications to use ubiquitously. Its applications use sensor, wireless, mobile and RFID technology devices. In recent years IoT applications are enhancing to being deployed as well as developed. The IoT promises to have a great future era of the Internet uses that involves machine-to-machine communication. It helps to enable the sensor network as well as technologies, even IoT got involved in our day-to-day routine such that it supports to control and to monitor a human being's mundane by providing mobile access, remotely. Undoubtedly, remote access is the incredible feature of the IoT which has been given to this world. The main objective of IoT is to provide remotely accessible at low-cost that too by often visits through electronic devices. This paper presents the maximum possibilities of challenges, applications, security issues and techniques of IoT.
APA, Harvard, Vancouver, ISO, and other styles
6

Teixidó, Pedro, Juan Gómez-Galán, Fernando Gómez-Bravo, Trinidad Sánchez-Rodríguez, Javier Alcina, and Juan Aponte. "Low-Power Low-Cost Wireless Flood Sensor for Smart Home Systems." Sensors 18, no. 11 (November 7, 2018): 3817. http://dx.doi.org/10.3390/s18113817.

Full text
Abstract:
This paper presents the design of a wireless flood sensor to detect the presence of water on home floors, providing early warning of water leaks. A wireless sensor network has been deployed to gather the measurements from the sensor nodes. A control central coordinates the network and processes the data. Users can remotely inquire for the presence of water, status of the batteries for a specific node, the type of liquid and information about its functionality and alarms, thanks to a proprietary software application. The alerts are also communicated to the user within the home through an audible siren. The designed device is optimized in terms of costs, ease of deployment and maintenance, thus making it widely acceptable to end users.
APA, Harvard, Vancouver, ISO, and other styles
7

Kanwal, T., S. Altaf, and M. K. Javed. "Environmental Monitoring Smart System with Self-Sustaining Wireless Sensor Network Using Data Validation Algorithms." Journal of Engineering Sciences 7, no. 1 (2020): E10—E19. http://dx.doi.org/10.21272/jes.2020.7(1).e3.

Full text
Abstract:
Study in Wireless Sensor Network (WSN) has been becoming an emerging and promising research topic aiming for the advancement in the Internet of Things (IoT) for a reliable connection. The capability of the wireless sensor to be used in a complex environment can become hard to reach areas and also be able to communicate in an ad-hoc manner, attracted researchers in recent times. Development in wireless sensor network producing a lot of new applications to sense environment remotely are facing challenges restricting it to perform up to its potential. Data validation and data reliability are such existing problems in this domain that needed to be addressed. Because sensed data cannot be blindly trusted upon, as it may have faults and errors occurred with-in the sensing environment. Besides, to guarantee the active state of the sensing system in a remote area is also essential in terms of power usage and management. The focus of the paper is data validation acquired from sensors deployed in remote areas. Although, lots of data validation algorithms have been proposed by researchers to identify single data fault. However, our research identifies multiple faults, namely spike fault, out of range fault, outliers, and stuck at fault using a hybrid form of an algorithm. A comparison with the existing algorithm shows that the proposed algorithm improved data validation by 97 % in detecting multiple data faults using Artificial Intelligence techniques. Keywords: wireless sensor network, data validation, feature extraction, feature identification, algorithm.
APA, Harvard, Vancouver, ISO, and other styles
8

Mahfoudhi, Farouk, Ashish Kumar Sultania, and Jeroen Famaey. "Over-the-Air Firmware Updates for Constrained NB-IoT Devices." Sensors 22, no. 19 (October 6, 2022): 7572. http://dx.doi.org/10.3390/s22197572.

Full text
Abstract:
The Internet of Things (IoT) is being deployed to provide smart solutions for buildings, logistics, hospitals, and many more. It is growing with billions of connected devices. However, with such tremendous growth, maintenance and support are the hidden burdens. The devices deployed for IoT generally have a light microcontroller, low-power, low memory, and lightweight software. The software, which includes firmware and applications, can be managed remotely via a wireless connection. This improves flexibility, installation time, accessibility, effectiveness, and cost. The firmware can be updated constantly to remove known bugs and improve the functionality of the device. This work presents an approach to update firmware over-the-air (OTA) for constrained IoT devices. We used Narrowband IoT (NB-IoT) as the wireless communication standard to communicate between the managing server and devices. NB-IoT is one of the most promising low power wide area (LPWA) network protocols that supports more than 50k devices within a cell using a licensed spectrum. This work is a proof of concept demonstrating the usage of NB-IoT to update firmware for constrained devices. We also calculated the overall power consumption and latency for different sizes of the firmware.
APA, Harvard, Vancouver, ISO, and other styles
9

Xiao, Jin Chao, Peng Zeng, Hua Liang Zhang, and Dong Li. "Ant-Colony-Based Geographic and Energy Balance Routing for Sensor Networks." Applied Mechanics and Materials 241-244 (December 2012): 1049–55. http://dx.doi.org/10.4028/www.scientific.net/amm.241-244.1049.

Full text
Abstract:
Recent advances in wireless sensor networks (WSNs) now witness the increased interest in the potential use in applications. Sensors are expected to be remotely deployed in large numbers and operate autonomously in unattended environments. In this paper, Ant-colony-based Geographic and Energy Balance Routing (AGEBR) was utilized to establish wireless sensor networks which had survival cycles. This Ant-colony-based routing can modify the geographic information based on the distribution characteristics of the ant colony algorithm, and finally achieve fast convergence and high efficiency. As a result, the sensor networks which did not have lasting energy supplement or only had limited energy complement could last a longer period without losing their sensing ability. Experimental results demonstrated that the proposed approach can keep balance of the network energy consumption, prolong the network lifetime, and enhance the successful sending rate without congestion.
APA, Harvard, Vancouver, ISO, and other styles
10

Chandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." International Journal of Ambient Computing and Intelligence 10, no. 1 (January 2019): 96–116. http://dx.doi.org/10.4018/ijaci.2019010106.

Full text
Abstract:
The wireless medical sensor networks WMSN play a crucial role in healthcare monitoring remotely. In remote healthcare monitoring, the sensor nodes are deployed in patient's body for collecting physiological data and transmit these data over an insecure channel. The patient's health information is highly sensitive and important. Any malicious modification in physiological data will make wrong diagnoses and harm the patient health. Therefore, privacy, data security, and user authentication are extremely important for accessing patient's real-time heath information over an insecure channel. In this regard, this article proposes a secure and robust two-factor based remote user authentication protocol for healthcare monitoring. The authentication proof has done with the help of BAN logic, which ensures that the proposed scheme provides mutual authentication and session key agreement securely. The informal security verification proves that the developed protocol is secure from various security attacks. The simulation of the proposed scheme has been done using AVISPA tool, whose simulation results confirm that the proposed scheme is secure from active and passive attacks. Performance evaluation shows that the proposed protocol is efficient in terms of security features, computation cost, communication cost, and execution time.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Remotely deployed wireless"

1

Chandrakar, Preeti. "A Secure Remote User Authentication Protocol for Healthcare Monitoring Using Wireless Medical Sensor Networks." In Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery, 549–72. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-8052-3.ch029.

Full text
Abstract:
The wireless medical sensor networks WMSN play a crucial role in healthcare monitoring remotely. In remote healthcare monitoring, the sensor nodes are deployed in patient's body for collecting physiological data and transmit these data over an insecure channel. The patient's health information is highly sensitive and important. Any malicious modification in physiological data will make wrong diagnoses and harm the patient health. Therefore, privacy, data security, and user authentication are extremely important for accessing patient's real-time heath information over an insecure channel. In this regard, this article proposes a secure and robust two-factor based remote user authentication protocol for healthcare monitoring. The authentication proof has done with the help of BAN logic, which ensures that the proposed scheme provides mutual authentication and session key agreement securely. The informal security verification proves that the developed protocol is secure from various security attacks. The simulation of the proposed scheme has been done using AVISPA tool, whose simulation results confirm that the proposed scheme is secure from active and passive attacks. Performance evaluation shows that the proposed protocol is efficient in terms of security features, computation cost, communication cost, and execution time.
APA, Harvard, Vancouver, ISO, and other styles
2

Singh, Mandeep, Navjyot Kaur, Amandeep Kaur, and Gaurav Pushkarna. "A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks." In Sensor Technology, 881–94. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2454-1.ch042.

Full text
Abstract:
Wireless sensor networks have gained attention over the last few years and have significant applications for example remote supervising and target watching. They can communicate with each other though wireless interface and configure a network. Wireless sensor networks are often deployed in an unfriendly location and most of time it works without human management; individual node may possibly be compromised by the adversary due to some constraints. In this manner, the security of a wireless sensor network is critical. This work will focus on evaluation of mining techniques that can be used to find malicious nodes. The detection mechanisms provide the accuracy of the classification using different algorithm to detect the malicious node. Pragmatically the detection accuracy of J48 is 99.17%, Random Forest is 80.83%, NF Tree is 81.67% and BF Tree is 72.33%. J48 have very high detection accuracy as compared with BF Tree, NF Tree Random Forest.
APA, Harvard, Vancouver, ISO, and other styles
3

Chander, Bhanu. "Wireless Body Sensor Networks for Patient Health Monitoring." In Advances in Healthcare Information Systems and Administration, 132–54. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-0261-7.ch006.

Full text
Abstract:
Remote medical health management is the most attractive research field in the domain of WSN. Wireless body area network (WBAN) produces constant, unbroken observation of the patient. Basically, WBAN acts as the appliance of internet of things (IoT) which offers an opportunity to a medical examiner to supervise chronic disease. Dissimilar protocols, guidelines, policies have been developed and developing in the last decade. In WBAN, minute power sensor nodes deployed toward capturing unusual essential signs of patients at home, hospitals in support of analysis purpose and furthermore advise suitable procedures. The main goal of this chapter is to introduce a complete and advanced understanding of WBANs, energy savings methods, human activity monitoring procedures, challenges and research issues, applications, and a comprehensive literature survey.
APA, Harvard, Vancouver, ISO, and other styles
4

Khan, Asfandyar, Azween Abdullah, and Nurul Hasan. "Event Based Data Gathering in Wireless Sensor Networks." In Wireless Sensor Networks and Energy Efficiency, 445–62. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0101-7.ch021.

Full text
Abstract:
Wireless sensor networks (WSANs) are increasingly being used and deployed to monitor the surrounding physical environments and detect events of interest. In wireless sensor networks, energy is one of the primary issues and requires the conservation of energy of the sensor nodes, so that network lifetime can be maximized. It is not recommended as a way to transmit or store all data of the sensor nodes for analysis to the end user. The purpose of this “Event Based Detection” Model is to simulate the results in terms of energy savings during field activities like a fire detection system in a remote area or habitat monitoring, and it is also used in security concerned issues. The model is designed to detect events (when occurring) of significant changes and save the data for further processing and transmission. In this way, the amount of transmitted data is reduced, and the network lifetime is increased. The main goal of this model is to meet the needs of critical condition monitoring applications and increase the network lifetime by saving more energy. This is useful where the size of the network increases. Matlab software is used for simulation.
APA, Harvard, Vancouver, ISO, and other styles
5

Chaturvedi, Pooja, and Ajai Kumar Daniel. "Scheduling Optimization Based on Energy Prediction Using ARIMA Model in WSN." In Information Security Practices for the Internet of Things, 5G, and Next-Generation Wireless Networks, 245–76. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-6684-3921-0.ch012.

Full text
Abstract:
Wireless sensor networks (WSNs) have attracted great attention because of their applicability in a variety of applications in day-to-day life such as structural monitoring, healthcare, surveillance, etc. Energy conservation is a challenging issue in the context of WSN as these networks are usually deployed in hazardous and remote applications where human intervention is not possible; hence, recharging or replacing the battery of sensor nodes is not feasible often. Apart from energy conservation, target coverage is also a major challenge. Scheduling the nodes to exist in active and sleep modes is an efficient mechanism to address the energy efficiency and coverage problem. The chapter proposes an ARIMA model-based energy consumption prediction approach such that the set cover scheduling may be optimized. The chapter compares the efficiency of several ARIMA-based models, and the results show that the ARIMA (0,1,2) model provides best results for the considered scenario in terms of energy consumption.
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmedi, Figene, Lule Ahmedi, Brendan O'Flynn, Arianit Kurti, Sylë Tahirsylaj, Eliot Bytyçi, Besmir Sejdiu, and Astrit Salihu. "InWaterSense." In Innovations and Trends in Environmental and Agricultural Informatics, 58–85. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5978-8.ch003.

Full text
Abstract:
A shift in the water monitoring approach from traditional grab sampling to novel wireless sensors is gaining in popularity not only among researchers but also in the market. These latest technologies readily enable numerous advantageous monitoring arrangements like remote, continuous, real-time, and spatially dense and broad in coverage measurements, and identification of long-term trends of parameters of interest. Thus, a WSN system is implemented in a river in Kosovo as part of the InWaterSense project to monitor its water quality parameters. It is one of the first state-of-the-art technology demonstration systems of its kind in the domain of water monitoring in developing countries like Kosovo. Water quality datasets are transmitted at pre-programmed intervals from sensing stations deployed in the river to the server at university via the GPRS network. Data is then made available through a portal to different target groups (policymakers, water experts, and citizens). Moreover, the InWaterSense system behaves intelligently like staying in line with water quality regulatory standards.
APA, Harvard, Vancouver, ISO, and other styles
7

Hu, Xie, Huikun Pei, Bingcai Liu, Chen Wang, and Changjin Hao. "Real Time Warning Model of Transmission Tower Tilt Based on Multi-Sensor Data." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2021. http://dx.doi.org/10.3233/faia210220.

Full text
Abstract:
Transmission line operation environment is complex, prone to tilt collapse accident, so a transmission tower tilt real-time early warning model based on multi-sensor data is established to judge whether the tower is stable operation by detecting the tilt state of the early warning tower. The pressure and inclination sensors are deployed at different positions of the transmission tower to collect the inclination and stress of the tower in real time, and transmit them to the remote monitoring terminal through the wireless network to send out an alarm. The operators can timely adjust according to the alarm situation to maintain the safe operation of the transmission line. The experimental results show that the model can realize the real-time warning of transmission tower tilt, the measurement accuracy can meet the needs of comprehensive detection of tower state, and the application can effectively ensure the safety of staff and reduce the work intensity.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Remotely deployed wireless"

1

Platt, Stephen R., Jeff A. Hawks, Mark E. Rentschler, Lee Redden, Shane Farritor, and Dmitry Oleynikov. "Modular Wireless Wheeled In Vivo Surgical Robots." In ASME 2008 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/detc2008-49157.

Full text
Abstract:
Minimally invasive abdominal surgery (laparoscopy) results in superior patient outcomes as measured by less painful recovery and an earlier return to functional health compared to conventional open surgery. However, the difficulty of manipulating traditional laparoscopic tools from outside the patient’s body generally limits these benefits to patients undergoing procedures with relatively low complexity. The use of miniature in vivo robots that fit entirely inside the peritoneal cavity represents a novel approach to laparoscopic surgery. Our previous work has demonstrated that mobile and fixedbased in vivo robots can successfully operate within the abdominal cavity and provide surgical vision and task assistance. All of these robots used tethers for power and data transmission. This paper describes recent work focused on developing a modular wireless mobile platform that can be used for in vivo sensing and manipulation applications. The robot base can accommodate a variety of payloads. Details of the designs and results of ex vivo and in vivo tests of robots with biopsy grasper and physiological sensor payloads are presented. These types of self-contained surgical devices are much more transportable and much lower in cost than current robotic surgical assistants. These attributes could ultimately allow such devices to be carried and deployed by non-medical personnel at the site of an injury. A remotely located surgeon could then use these robots to provide critical first response medical intervention irrespective of the location of the patient.
APA, Harvard, Vancouver, ISO, and other styles
2

Ali Adem, Mohammed. "Energy Optimization of Wireless Sensor Network Using Neuro-Fuzzy Algorithms." In LatinX in AI at Neural Information Processing Systems Conference 2019. Journal of LatinX in AI Research, 2019. http://dx.doi.org/10.52591/lxai2019120814.

Full text
Abstract:
Wireless sensor network (WSN) is one of the recent technologies in communication and engineering world to assist various civilian and military applications. They are deployed remotely in sever environment which doesn’t have an infrastructure. Energy is a limited resource that needs efficient management to work without any failure. Energy efficient clustering of WSN is the ultimate mechanism to conserve energy for longtime. The major objective of this research is to efficiently consume energy based on the Neuro-Fuzzy approach particularly adaptive Neuro fuzzy inference system (ANFIS). The significance of this study is to examine the challenges of energy efficient algorithms and the network lifetime on WSN so that they can assist several applications. Clustering is one of the hierarchical based routing protocols, which manage the communication between sensor nodes and sink via Cluster Head (CH), CH is responsible to send and receive information from multiple sensor nodes and multiple base stations (BS). There are various algorithms that can efficiently select appropriate CH and localize the membership of cluster with fuzzy logic classification parameters to minimize periodic clustering which consumes more energy and we have applied neural network learning algorithm to learn various patterns based on the fuzzy rules and measured how much energy has saved from random clustering. Finally, we have compared to our Neuro-Fuzzy logic and consequently demonstrated that our Neuro-Fuzzy model outperforms than random model.
APA, Harvard, Vancouver, ISO, and other styles
3

Shafer, Michael W., Robert MacCurdy, and Ephrahim Garcia. "Testing of Vibrational Energy Harvesting on Flying Birds." In ASME 2013 Conference on Smart Materials, Adaptive Structures and Intelligent Systems. American Society of Mechanical Engineers, 2013. http://dx.doi.org/10.1115/smasis2013-3063.

Full text
Abstract:
Discrete animal-mounted sensors and tags have a wide range of potential applications for researching wild animals and their environments. The devices could be used to monitor location, metabolic output, or used as environmental monitoring sentinels. These applications are made possible by recent decreases in the size, mass, and power consumption of modern microelectronics. Despite these performance increases, for extended deployments these systems need to generate power in-situ. In this work, we explore a device that was recently deployed to test the concept of vibrational piezoelectric energy harvesting on flying birds. We explain the development of the device and introduce test results conducted on flying pigeons (Columba livia). The 12 g testing device consisted of a miniature data acquisition system and a piezoelectric energy harvester. The system recorded both the harvested power and the in-flight accelerations of the bird. The energy harvester included a wireless receiver, battery and linear servo. By remotely actuating the linear servo, we were able to arrest the energy harvester for portions of the flight. In doing so, we will be able to compare flight accelerations of a bird with a simple proof mass and with a dynamic mass without having to stop the flight of the bird. The comparison of these two cases allows for the assessment of the feasibility of employing vibrational energy harvesting on a flying bird. We present the initial results of this testing with regard to the harvested power and the in-flight acceleration profiles.
APA, Harvard, Vancouver, ISO, and other styles
4

Feng, M., Y. X. Tao, E. Inclan, and R. Bartra. "Evaluation of Energy Usage for a Teaching and Research Complex." In ASME 2006 International Mechanical Engineering Congress and Exposition. ASMEDC, 2006. http://dx.doi.org/10.1115/imece2006-14959.

Full text
Abstract:
The evaluation of energy performance for a teaching and research complex located in South Florida was carried out by auditing the energy bills, on-site data monitoring, and numerical simulation by computer. To facilitate the process of on-site data monitoring, a remotely controlled, wireless thermal monitoring system was deployed in the building. The system can automatically collect the temperature, relative humidity ratio, illumination intensity, and building electricity usage data for analysis. The contribution and savings potential of each energy consumption component is analyzed for the whole building. From the audit result it is obvious that laboratory equipment is the dominant electricity consumption factor. The fluctuation pattern of electricity usage due to artificial lighting demonstrates the effectiveness of occupancy sensors for energy saving during evenings, weekends and holidays. The trend of HVAC chilled water consumption rate follows closely with the indoor and outdoor temperature difference. Since the HVAC coil load represents the building's total cooling requirement, the ratio between chilled water rate and temperature difference reflects the building's comprehensive thermal resistance. This coefficient can be used as a new building energy index for future energy audits of similar buildings. Finally, computer software simulates several proposed energy saving scenarios, e.g. reducing the HVAC fresh air percentage, adding energy wheel to recycle the wasted cooling, etc. The result shows that installing energy wheel can save more cooling load than other methods, however such benefit is compromised by its extra motor electricity usage.
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yigang, Zheng Chen, Xianghai Meng, Zhixiong Zhang, Jian Zou, Le Zhang, and Fei Lan. "Overview the 5 Years Experience of Intelligent Separate-Layer Injection Technology in B Offshore Oilfield." In International Petroleum Technology Conference. IPTC, 2021. http://dx.doi.org/10.2523/iptc-21329-ms.

Full text
Abstract:
Abstract Nowadays intelligent injection is considered as a new frontier for offshore oilfield. In order to improve the water injection indicators such as allocation frequency and qualification rate, intelligent separate-layer injection technology (ISIT) was researched, deployed and optimized in B offshore oilfield from 2015. In the course of 5 years’ project operation, some experience of success or failure was achieved. B offshore oilfield is the largest offshore oilfield in China with 33 water flooding oilfields and more than 800 water injection wells. With the continuous development, the problem of injection management mainly reflected in the contradiction between increasing demand of allocation and limited operation time and space was exposed. Two kinds of ISIT, cable implanted intelligent separate-layer injection technology(CISIT) and wireless intelligent separate-layer injection technology(WISIT), were deployed to solve the above problem. CISIT controlled the distributor downhole by electricity while WISIT controlled the distributor downhole by pressure pulse. By the use of ISIT, downhole nozzle's action, packer testing and downhole data monitoring could be remotely controlled on the ground. During the 5 years’ test, ISIT was optimized from the field breakdown including large flow range flowing test, cable protection project, efficient coding mode, water seepage resistance and so on. With the continuous optimization and quality control improvement, ISIT has overcome many problems, such as downhole short circuit and communication loss, and is becoming more stable and reliable. At present, ISIT can meet the needs of large flow injection(max 800m3/d per layer) and can adapt to the high frequency of acidizing and fracturing in offshore oilfield. The failure rate of ISIT has dropped to nearly 20% in 2020. As of December 2020, ISIT has formed series products for different internal diameter wells and applied in 156 water injection wells in B offshore oilfield. The average allocation frequency has increased from less than one time to 2 times per year. Through the application of ISIT, B offshore oilfield has accumulatively saved more than 2100 days of platform occupation and more than 73 million RMB yuan of allocation cost. The use of ISIT makes B offshore oilfield's injection become more efficient and intelligent. The 5 years’ experience of ISIT applicationin B offshore oilfield has a fairly referential significance for other offshore oilfields.
APA, Harvard, Vancouver, ISO, and other styles
6

Liebeck, Martin, Shamma AlShehhi, Mohammad Hariz, Khaled Eissa Hammadi, Alfredo Eduado Freites Camacaro, Mahdi Abdulla Al Baloushi, Ahmed AlShmakhy, et al. "IOT Technology Demonstration in ADNOC Onshore Fields. Real Time Monitoring at a Minimum Cost." In Abu Dhabi International Petroleum Exhibition & Conference. SPE, 2021. http://dx.doi.org/10.2118/208144-ms.

Full text
Abstract:
Abstract In brownfields, controlling well integrity is critical in maintaining production and ensuring safety of the personnel and infrastructures. Equally important is optimizing and allocating production in wells by closely following wellhead upstream pressures (and temperatures). In the current situation, field crews have to move from well to well. This method is time consuming, exposes personnel to driving hazards and potentially dangerous areas. In addition, human reading of manual pressure gauges can result in large discrepancy in the reported values. Together with the low frequency of manual readings, this method does not allow for pro-active well intervention and can result in higher downtime in case of well tripping. Deploying remote monitoring with classical telemetry in fields with limited telecommunication infrastructure is costly and complex. Low Range Wide Area Network (LoRaWAN), a public wireless network technology developed in 2009, changes the situation. It enables low power compact battery sensors with up to 10 km radio range. This performance is sufficient to connect, in one go, most onshore wells without power nor connectivity. This paper describes a pilot project to evaluate the adequacy of this technology in ADNOC Onshore fields. The objective is to assess performance of LoRaWAN deployed Sensors along four metrics: deployment time, deployment cost, Base station radio coverage and data availability. The pilot uses a plug-in ATEX- certified Wireless Pressure and Temperature (P&T) sensors developed by the vendor SRETT, commercial LoRaWAN Base stations, and proprietary software to provide remote access to the data via cloud data storage and web based application. For this pilot, four Base stations were deployed in two giant oil fields collecting data from four well heads each equipped with two sensors (P&T). This combination allowed testing wireless link quality over eight radio paths, some with terrain obstacles between Sensors and Base stations. The complete system was fully tested and validated at the shop prior to field deployment. Performances during the deployment was evaluated, and Sensor behaviors were monitored over a three-month period. In the current environment, maintaining a high HSE standard on aging infrastructure must be made at a controlled cost. LoRaWAN IoT remote monitoring technology is cost effective and efficient to deploy. Once deployed, it will enable preventative safe detection of wells with potential issues, improved accuracy and understanding of production events and lead to a reduction of potential adverse situations thanks to an optimized intervention strategy.
APA, Harvard, Vancouver, ISO, and other styles
7

Hallouda, Aya, Ibrahim Habib, Abdelrahman El Maradny, Abdelrahman Abouklila, Hussein Mesharafa, and Mahmoud Sofrata. "The Integration of Remotely Operated Vehicles ROVS and Autonomous Underwater Vehicles AUVS Using Subsea Wireless Communication." In International Petroleum Technology Conference. IPTC, 2022. http://dx.doi.org/10.2523/iptc-22157-ea.

Full text
Abstract:
Abstract The proposed technology provides subsea autonomous solutions using artificial intelligence and communication software. These integrate wirelessly between Remotely Operated Vehicles (ROVs) and Autonomous Underwater Vehicles (AUVs). This is a significant improvement on the current pre-programmed mode of AUVs and the subsea communications and operation of autonomous robotics. Furthermore, the technology allows underwater wireless communication between autonomous subsea robotics and introduces new operational opportunities using simultaneous multi-robotic subsea arrays. Underwater vehicles are used for a wide variety of operations that include – but are not limited to inspection/identification, oceanography, survey missions or samples picking. Underwater vehicles may be manned or unmanned. Among the unmanned vehicles, there are ROVs and AUVs. An Autonomous Underwater Vehicle (AUV) is a robot that travels underwater without requiring input from an operator. AUVs constitute part of a larger group of undersea systems known as unmanned underwater vehicles, a classification that includes the mentioned non-autonomous Remotely Operated underwater Vehicles (ROVs) – controlled and powered from the surface by an operator/pilot via an umbilical or using remote control. ROVs are unmanned underwater vehicles connected to a base station, which may be a ship. As mentioned ROVs are connected to the ship by means of cables; this implies that the maximum achievable distance between the ROV and the base station is limited by the length of the cable. AUVs are unmanned underwater vehicles, which are connected to a docking station by means of a wireless communication. Typically, AUVs are propelled through the energy stored in batteries housed in their body. This means that the operative range of an AUV is limited by the capacity of the battery. This type of underwater vehicles has recently become an attractive alternative for underwater search and exploration since they are cheaper than manned vehicles. Over the past years, there have been abundant attempts to develop underwater vehicles to meet the challenge of exploration and extraction programs in the oceans. Recently, researchers have focused on the development of AUVs for long-term data collection in oceanography and coastal management. The oil and gas industry uses AUVs to make detailed maps of the seafloor before they start building subsea infrastructure; pipelines and sub-sea completions can be installed in the most cost effective manner with minimum disruption to the environment. In addition, post-lay pipe surveys are now possible, which includes pipeline inspection. The use of AUVs for pipeline inspection and inspection of underwater man-made structures is becoming more common. With the adoption of AUV technology becoming more widespread, the limitations of the 5 technology are being explored and addressed. The average AUV charge lasts about 24- hours on an underwater AUV, but sometimes it is necessary to deploy them for the kinds of several day missions that some unmanned systems are equipped to undertake. Like most robots, the unmanned mechanisms contain batteries that require regular recharging. Docking stations that communicate directly with underwater vehicles, guiding them to where they can recharge and transfer data have been developed. Any data the AUV has gathered, such as images of the seabed, could be uploaded to the docking station and transmitted to home base, which could direct new instructions to the robot any underwater vehicle requiring the need of a wireless communication with the docking station faces at least the problem of the limitations for wireless communications in water
APA, Harvard, Vancouver, ISO, and other styles
8

Fu, Jin, Xi Wang, Guobin Yang, Shunyuan Zhang, Chen Chen, and Haochen Han. "An Intelligent Completion and Artificial Lift Technology to Develop Large Carbonate Reservoirs: Novel Completion and Zonal Water Injection via Remote Control Methods to Develop Horizontal Wells." In SPE Trinidad and Tobago Section Energy Resources Conference. SPE, 2021. http://dx.doi.org/10.2118/200915-ms.

Full text
Abstract:
Abstract There are several large carbonate reservoirs that have drawn great attention of researchers in recent years. After optimization of drilling technologies, how to deploy artificial lift technologies to develop them more efficiently is another concern. Conventional zonal water injection technologies require repetitive operation with wirelines and cables, causing extensive tests and low efficiency. However, an intelligent zonal water injection string consisting of several preset cable packers, water injection pressure gauges, formation pressure gauges and downhole flow meters has simply optimized water injection parameters and efficiently developed all reservoirs in some China's mature oilfields, especially when the string is integrated with remote monitoring and control methodologies. With the rapid development of horizontal drilling and extended reach well drilling technologies, borehole conditions are becoming more and more complicated, which has brought more challenges to water adsorption testing of horizontal intervals and deployment of zonal water injection instruments. Compared with vertical wells, the water adsorption test and string running are more challenging for horizontal wells, in which we are faced by many a problem during zonal water injection, such as competitive slack off and tight pull, excessive or inadequate water injection, complicated operation process. Besides, well deviation, dog leg and horizontal section length shall be all taken into consideration during zonal water injection for horizontal wells. Therefore, novel strings and tools should be deployed. Now tight pull, slack off and long operation periods are common problems during zonal water injection of horizontal intervals. After dedicated research, a set of wireless intelligent water injection strings for horizontal wells has been invented. Based on pressure pulse water distribution technique, the water injection string is eligible for 32-stage adjustment, so one strip may accomplish testing, adjusting, injection, measurement and downhole data collection, in addition to automatic error correction during water injection. The field trial shows that this novel string may be tripped in and out smoothly, packers are set securely and released easily, in order to adjust opening of each water injection nozzle in the ground, with an error of no more than ±10%. Therefore, the novel completion and water zonal water injection string is capable of injecting water precisely via remote control methods. The wireless intelligent water injection string for horizontal wells that combines testing, adjusting, injection, measuring and data collection in one trip provides us with many downhole data, such as pressure, flow rate, temperature and so on. Therefore, water injection volume for each zone is monitored and controlled down hole. This technology is applicable for both horizontal and vertical wells that require zonal water injection.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography