Gotowa bibliografia na temat „FLOODING CONTROL PROTOCOL”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „FLOODING CONTROL PROTOCOL”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Artykuły w czasopismach na temat "FLOODING CONTROL PROTOCOL"

1

Ghori, Muhammad Rizwan, Tat-Chee Wan, Gian Chand Sodhy i Amna Rizwan. "Optimization of the AODV-Based Packet Forwarding Mechanism for BLE Mesh Networks". Electronics 10, nr 18 (16.09.2021): 2274. http://dx.doi.org/10.3390/electronics10182274.

Pełny tekst źródła
Streszczenie:
The standard Bluetooth Low-Energy mesh networks assume the use of flooding for multihop communications. The flooding approach causes network overheads and delays due to continuous message broadcasting in the absence of a routing mechanism. Among the routing protocols, AODV is one of the most popular and robust routing protocol for wireless ad hoc networks. In this paper, we optimized the AODV protocol for Bluetooth Low-Energy communication to make it more efficient in comparison to the mesh protocol. With the proposed protocol (Optimized AODV (O-AODV)), we were able to achieve lower overheads, end-to-end delay, and average per-hop one-way delay in comparison to the BLE mesh (flooding) protocol and AODV protocol for all three scenarios (linear topology with ten nodes, multipath topology with six and ten nodes). In addition, the proposed protocol exhibited practically constant route requests and route reply setup times. Furthermore, the proposed protocol demonstrated a better Packet Delivery Ratio (PDR) for O-AODV (84%) in comparison to AODV (71%), but lower than the PDR of the mesh (flooding) protocol with 93%.
Style APA, Harvard, Vancouver, ISO itp.
2

ZHANG, YING, i MARKUS FROMHERZ. "A ROBUST AND EFFICIENT FLOODING-BASED ROUTING FOR WIRELESS SENSOR NETWORKS". Journal of Interconnection Networks 07, nr 04 (grudzień 2006): 549–68. http://dx.doi.org/10.1142/s0219265906001855.

Pełny tekst źródła
Streszczenie:
Flooding protocols for wireless networks in general have been shown to be very inefficient and therefore are mainly used in network initialization or route discovery and maintenance. In this paper, we propose a framework of constrained flooding protocols. The framework incorporates a reinforcement learning kernel, a differential delay mechanism, and a constrained and probabilistic retransmission policy. This type of protocol takes the advantages of robustness from flooding, but maintains energy efficiency by constraining retransmissions. Without the use of any control packets, such a protocol adapts to the specific routing requirements of the task and the dynamic changes of the network. We analyze this framework in simulation using some real-world applications in sensor networks.
Style APA, Harvard, Vancouver, ISO itp.
3

Tang, Churan, i Linghua Zhang. "An Improved Flooding Routing Protocol for Wireless Sensor Networks Based on Network-Coding". ITM Web of Conferences 17 (2018): 02001. http://dx.doi.org/10.1051/itmconf/20181702001.

Pełny tekst źródła
Streszczenie:
A central question in wireless sensor network research is how to reduce the consumption of the energy of the sensor nodes. Theoretically, the network coding technology proposed by Ahlswede et al (2000) can improve the network reliability and network throughput, increase the robustness and save energy. Based on the classic flooding routing protocol, the present study proposes a new flooding control protocol, i.e. NC-Flooding for wireless sensor networks. NC-Flooding protocol introduces five mechanisms to enhance the efficiency of wireless sensor networks. As shown by MATLAB simulation results, NC-Flooding protocol reduces the number of broadcasts of wireless sensor networks, increases the throughput of the network and increases the bandwidth utilization. We conclude that NC-Flooding protocol reduces data forwarding cost and node energy consumption and extends nodes’ life cycle, thus increasing network utilization.
Style APA, Harvard, Vancouver, ISO itp.
4

Singh, Prabhdeep, Anuj Kumar Gupta i Ravinder Singh. "Improved priority-based data aggregation congestion control protocol". Modern Physics Letters B 34, nr 02 (20.12.2019): 2050029. http://dx.doi.org/10.1142/s0217984920500293.

Pełny tekst źródła
Streszczenie:
With advancement in multimedia applications, Wireless sensor networks (WSNs) are becoming popular due to their inherent characteristics and wide range of applications. However, WSNs contain very small sensor nodes, these nodes are battery constrained. Also, the batteries of these sensor nodes are not either replaceable or rechargeable. Therefore, many energy efficient protocols have been implemented so far to improve the network lifetime. However, the data aggregation at sink may suffer from data flooding issue, which reduces the network lifetime of WSNs. For handling this issue, in this paper, an effective data aggregation approach is designed. We have designed a priority-based data aggregation control protocol, which considers token bucket, Lempel–Ziv–Welch (LZW) compression and a hybrid of ant colony optimization and particle swarm optimization-based soft computing approach. Extensive experiments reveal that the presented protocol provides better network lifetime in contrast to the existing energy efficient protocols.
Style APA, Harvard, Vancouver, ISO itp.
5

Al-Shihri, Fatima, i Mohammed Arafah. "Reliable and Energy Efficient Routing Protocol for Under Water Sensor Networks". International Journal on Semantic Web and Information Systems 13, nr 2 (kwiecień 2017): 14–26. http://dx.doi.org/10.4018/ijswis.2017040102.

Pełny tekst źródła
Streszczenie:
The authors proposed a Reliable and energy efficient Routing Protocol (RRP) for underwater sensor network, integrating the desired features of the Directional Flooding based Routing (DFR) and Vector Based Void Avoidance (VBVA) protocols. The new algorithm considers reliability and takes into consideration the residual energy for each node before choosing the forwarding node. RRP relies on a packet flooding technique to increase reliability. However, to prevent a packet from flooding to the whole network, they control the number of nodes forwarding a packet by measuring a link quality between nodes in a hop by hop. To mitigate the effect of the inherent void problem, the authors consider residual energy, link quality, and distance from destination node to choose a reliable path to forward packet to destination. The authors observe that RRP protocol has better performance in terms of the packet delivery ratio than the DFR protocol due to the void avoidance technique.
Style APA, Harvard, Vancouver, ISO itp.
6

Prabhu. M, Mr Dinesh, i Dr Dinesh Senduraja. "MAC chastised Dynamism Efficient in Wireless Device Lattice Spending Mistralapproach". International Journal of Engineering and Computer Science 10, nr 12 (15.12.2021): 25453–58. http://dx.doi.org/10.18535/ijecs/v10i12.4641.

Pełny tekst źródła
Streszczenie:
In Wireless sensor Network, several researchers have provided different routing protocol for sensor networks, particularly routing protocols depending on clusters protocols. Reliability of nodes is necessary parameter in effective sensor networks. We use MAC protocol for controlling the network packets. This is because the usage of cluster based routing has several merits like minimized control messages, re-usability of bandwidth and enhanced power control. Different cluster based routing protocol is proposed by many researchers for the purpose of reducing the consumption energy in wireless sensor networks. Those techniques reduces the energy consumption but with several disadvantages like lack of QoS, inefficient transmission, etc., To overcome those problems, modified QoS enhanced base station controlled in Mistrial Approach (flooding Technique) for wireless sensor networks is proposed in this work. Here we reduce the number of retransmission and detect the overlay packets in networks using proposed approach. Simulation results show the better energy consumption, Maximum Life time & Efficient Bandwidth is achieved by flooding management when compared to the conventional techniques
Style APA, Harvard, Vancouver, ISO itp.
7

Shams Shafigh, Alireza, Kamran Abdollahi i Marjan Kouchaki. "Developing a Fuzzy Logic Based on Demand Multicast Routing Protocol". Journal of Electrical and Computer Engineering 2012 (2012): 1–14. http://dx.doi.org/10.1155/2012/389812.

Pełny tekst źródła
Streszczenie:
Multicast routing is an efficient method to lead data packets from one source group to several nodes as destination group. Although multicast routing algorithms could be efficient in many situations but their routing mechanism like as route request flooding packets likely results in poor performance in comparison to unicast routing algorithms. In this research, two efficient methods are proposed to improve the performance of On Demand Multicast Routing Protocol (ODMRP). The main proposed method tries to establish a small, efficient, and high-quality forwarding group. This is achieved by augmenting the Join Query packets with additional information such as speed, power level of node, and link bandwidths. Besides, the control overhead is further reduced by restricting the domain of control packet flooding (by restricting the domain of control packet flooding). The performance evaluation shows that the proposed scheme increases the packet delivery rate by up to 40%, while reducing average end-to-end delay and consumed power by about 35% and 45%, respectively.
Style APA, Harvard, Vancouver, ISO itp.
8

Dey, Tanay, M. M. A. Hashem i Subroto Kumar Mondal. "ON PERFORMANCE ANALYSIS OF AMBR PROTOCOL IN MOBILE AD HOC NETWORKS". IIUM Engineering Journal 11, nr 2 (19.11.2010): 240–54. http://dx.doi.org/10.31436/iiumej.v11i2.28.

Pełny tekst źródła
Streszczenie:
Due to mobility of nodes in ad hoc networks, the most challenging issue is to design and to make sound analysis of a routing protocol that determines its robustness to deliver packets in low routing packet overhead. In this paper, we thoroughly analyzed the Adaptive Monitor Based Routing (AMBR) protocol by varying different parameters that affect a routing protocol to measure its performance. Analysis shows that it requires less routing control overhead comparing with other prevalent routing protocols. An improved analytical model is also presented in this paper. All these analyses firmly prove that AMBR is a sound and robust protocol in terms of flooding, routing overhead and hence, enhances reliability
Style APA, Harvard, Vancouver, ISO itp.
9

Chou, Li-Der, Chien-Chang Liu, Meng-Sheng Lai, Kai-Cheng Chiu, Hsuan-Hao Tu, Sen Su, Chun-Lin Lai, Chia-Kuan Yen i Wei-Hsiang Tsai. "Behavior Anomaly Detection in SDN Control Plane: A Case Study of Topology Discovery Attacks". Wireless Communications and Mobile Computing 2020 (20.11.2020): 1–16. http://dx.doi.org/10.1155/2020/8898949.

Pełny tekst źródła
Streszczenie:
Software-defined networking controllers use the OpenFlow discovery protocol (OFDP) to collect network topology status. The OFDP detects the link between switches by generating link layer discovery protocol (LLDP) packets. However, OFDP is not a security protocol. Attackers can use it to perform topology discovery via injection, man-in-the-middle, and flooding attacks to confuse the network topology. This study proposes a correlation-based topology anomaly detection mechanism. Spearman’s rank correlation is used to analyze the network traffic between links and measure the round-trip time of each LLDP frame to determine whether a topology discovery via man-in-the-middle attack exists. This study also adds a dynamic authentication key and counting mechanism in the LLDP frame to prevent attackers from using topology discovery via injection attack to generate fake links and topology discovery via flooding attack to cause network routing or switching abnormalities.
Style APA, Harvard, Vancouver, ISO itp.
10

Elejla, Omar E., Mohammed Anbar, Shady Hamouda, Serri Faisal, Abdullah Ahmed Bahashwan i Iznan H. Hasbullah. "Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks". Applied Sciences 12, nr 12 (16.06.2022): 6150. http://dx.doi.org/10.3390/app12126150.

Pełny tekst źródła
Streszczenie:
Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as the Internet Control Message Protocol version six (ICMPv6), an essential protocol to the IPv6 networks. However, it exposes IPv6 networks to some security threats since ICMPv6 messages are not verified or authenticated, and they are mandatory messages that cannot be blocked or disabled. One of the threats currently facing IPv6 networks is the exploitation of ICMPv6 messages by malicious actors to execute distributed denial of service (DDoS) attacks. Therefore, this paper proposes a deep-learning-based approach to detect ICMPv6 flooding DDoS attacks on IPv6 networks by introducing an ensemble feature selection technique that utilizes chi-square and information gain ratio methods to select significant features for attack detection with high accuracy. In addition, a long short-term memory (LSTM) is employed to train the detection model on the selected features. The proposed approach was evaluated using a synthetic dataset for false-positive rate (FPR), detection accuracy, F-measure, recall, and precision, achieving 0.55%, 98.41%, 98.39%, 97.3%, and 99.4%, respectively. Additionally, the results reveal that the proposed approach outperforms the existing approaches.
Style APA, Harvard, Vancouver, ISO itp.

Rozprawy doktorskie na temat "FLOODING CONTROL PROTOCOL"

1

Hussein, Abedellatif Mohammed. "Flooding control in route discovery for reactive routing in mobile ad hoc networks /". Online version of thesis, 2007. http://hdl.handle.net/1850/4495.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

KUMAR, S. P. AJITH. "ROUTING AND CONGESTION CONTROL IN OPPORTUNISTIC NETWORKS". Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14606.

Pełny tekst źródła
Streszczenie:
ABSTRACT Opportunistic networks are one of the most interesting evolutions of MANETs. Mobile nodes are enabled to communicate with each other in opportunistic networks even if there is no route to connect them. Also, nodes are not having knowledge about the network topology, which (instead) is necessary in MANET routing protocols. In this network routes are building dynamically, whenever messages are en route between the sender and the destination(s), and any potential node can be opportunistically used as the next hop, provided it is bringing the message nearer to the destination. These necessities make opportunistic networks a challenging and demanding research field. In this project, a new routing protocol named as Reduced Flooding Epidemic Protocol (RFEP) for infrastructure-less is proposed and is an existing Epidemic routing protocol improvement model. Its objective is to reduce the amount of flooding done in the Epidemic protocol. Therefore it reduces the resource consumption and network bandwidth and as well as power of nodes that helps in maximizing the network lifetime. Also a method for congestion control is proposed here for opportunistic networks. Congestion is an important problem in this network because some nodes having better connection comparing with other nodes and so the load is unfairly distributed towards them. Therefore, a threshold based packet forwarding scheme is proposed in this work to overcome this issue. Number of nodes is selected as the subsequent hop to forward the packets whose utility metric computed based on its social metrics, delay and packet dropping probability which is higher than the current host by the predefined threshold. The outcome shows that it generated very good results in terms of delivery probability, overhead ratio and reduced number of packets dropped.
Style APA, Harvard, Vancouver, ISO itp.

Części książek na temat "FLOODING CONTROL PROTOCOL"

1

Al-Bahadili, Hussein, Abdel Rahman Alzoubaidi i Ali Al-Khalidi. "Comparing Various Route Discovery Algorithms in Ad Hoc Wireless Networks". W Simulation in Computer Network Design and Modeling, 196–215. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0191-8.ch010.

Pełny tekst źródła
Streszczenie:
Dynamic (reactive or on-demand) routing protocols used in wireless ad hoc networks suffer from transmitting a huge number of control packets during the route discovery phase of the protocols, which increases the overhead significantly. Therefore, a number of optimization protocols have been developed throughout the years. This chapter compares the performance of various route discovery algorithms in ad hoc wireless networks, namely, pure flooding, probabilistic, Location-Aided Routing scheme 1 (LAR-1), LAR-1-Probabilsitic (LAR-1P), and Optimal Multipoint Relying (OMPR). The results obtained through the different simulations are analyzed and compared. This chapter will help practitioners of various kinds (academics, professionals, researchers, and students) grasp a solid understanding of the behavior of ad hoc wireless network route discovery algorithms and develop an appreciation for flooding optimization mechanisms. It also substantiates the case of experimenting via simulation with such models and shows how the different simulation parameters interplay.
Style APA, Harvard, Vancouver, ISO itp.
2

Afzal, Saad. "Implementation of Flooding Free Routing in Smart Grid". W Smart Grid as a Solution for Renewable and Efficient Energy, 298–322. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-5225-0072-8.ch013.

Pełny tekst źródła
Streszczenie:
Smart Grid is a communication and automatic control capabilities in electric power grid system for improving efficiency, reliability, management, capabilities and security of electric power grid. Routing is important in Smart Grid to send data from one point to another point. Routing in Smart Grid is necessary to search /identify destination point/node for communication and to computer the best available route in the network topology among which the data to be sent during communication. Smart Grid can be a combination of fixed nodes (home appliances, smart meter, control centre, etc.) but the nature of communication between fixed nodes is dynamic due to the switch on/off or the fluctuation in electricity flow. Therefore the fixed nodes can also be disappeared from the network topology in Smart Grid. Existing routing protocols for Smart Grid are based on flooding mechanism. We would like to examine the feasibility of flooding free routing in Smart Grid. Then we will propose a flooding-free routing for Smart.
Style APA, Harvard, Vancouver, ISO itp.
3

Mnif, Kais, i Michel Kadoch. "Performance Enhancement of Routing Protocols in Mobile Ad hoc Networks". W Innovations in Mobile Multimedia Communications and Applications, 50–61. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60960-563-6.ch004.

Pełny tekst źródła
Streszczenie:
This paper proposes to use virtual backbone structure to handle control messages in ad hoc networks. This structure is effective in reducing the overhead of disseminating control information. In the first part, the approach to build the virtual backbone on the setup phase is presented. The construction of backbone is based on the Minimum Connected Dominating Set (MCDS). The novelty is in the way on finding the MCDS. A Linear Programming approach is used to build a Minimum Dominating Set (MDS). Then, a spanning tree algorithm is applied to provide the MCDS. A theoretical analysis based on probabilistic approach is developed to evaluate the size of MCDS. Different techniques of diffusion in ad hoc networks are presented and compared. The flooding technique is simple and efficient, but it is expensive in term of bandwidth consumption and causes broadcast storm problem. Simulation results show that technique using virtual backbone performs flooding and it is compared to MPR (Multipoint Relay). The second part of this paper presents a distributed procedure to maintain the backbone when the mobility of terminals is introduced. A maintenance procedure will be executed by the node which changes its position. This procedure is distributed and guarantees the node connectivity to the backbone. The authors believe that the maintenance of the backbone with small size will be more effective. Simulation results show the performance of this procedure when mobility and scalability are considered.
Style APA, Harvard, Vancouver, ISO itp.

Streszczenia konferencji na temat "FLOODING CONTROL PROTOCOL"

1

McInnes, Allan I. "Model-checking the Flooding Time Synchronization Protocol". W 2009 IEEE International Conference on Control and Automation (ICCA). IEEE, 2009. http://dx.doi.org/10.1109/icca.2009.5410508.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
2

Terada, Shinsuke, Takumi Miyoshi, Hiroaki Morino, Masakatsu Ogawa i Kaoru Sezaki. "AD HOC Routing Protocol with Flooding Control using Unidirectional Links". W 2007 IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications. IEEE, 2007. http://dx.doi.org/10.1109/pimrc.2007.4394291.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Yamamura, Natsuru, i Takuo Nakashima. "Flooding Features for the AODV Protocol under the Different Communication Distances". W 2009 Fourth International Conference on Innovative Computing, Information and Control (ICICIC). IEEE, 2009. http://dx.doi.org/10.1109/icicic.2009.213.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Sawant, Khushboo, Manoj Kumar Rawat i Aakansha Jain. "Implementation of energy aware secure routing protocol over flooding environment in MANET". W 2015 International Conference on Computer, Communication and Control (IC4). IEEE, 2015. http://dx.doi.org/10.1109/ic4.2015.7375560.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
5

Mkuzangwe, Nenekazi N. P., Andre McDonald i Fulufhelo V. Nelwamondo. "Implementation of anomaly detection algorithms for detecting Transmission Control Protocol Synchronized flooding attacks". W 2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). IEEE, 2015. http://dx.doi.org/10.1109/fskd.2015.7382282.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
6

Elamsy, Tarik, i Randa El-Marakby. "Flooding Zone Control Protocol (FZCP): enhancing the reliability of real-time multimedia delivery in WSNs". W 2009 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT). IEEE, 2009. http://dx.doi.org/10.1109/isspit.2009.5407585.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Sha, Y., W. Xiong, L. C. Zhu, L. L. Zhang, Z. W. Zhang i Q. W. Fan. "Research of a flooding control routing protocol based on location prediction in an Ad Hoc network". W International Conference on Computer Science and Technology. Southampton, UK: WIT Press, 2014. http://dx.doi.org/10.2495/iccst140991.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

Rekha, S. Nithya, i C. Chandrasekar. "A comparative analysis of probabilistic broadcasting to reduce flooding with FSR (Fisheye State Routing) protocol and grid FSR using MANET". W PROCEEDINGS OF THE SIXTH GLOBAL CONFERENCE ON POWER CONTROL AND OPTIMIZATION. AIP, 2012. http://dx.doi.org/10.1063/1.4769018.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Barros, Urlan S. de, Tiago de C. Freire, Michele N. Lima, Luiz H. A. Correia i Aldri L. dos Santos. "O impacto de ataques RoQ em redes 802.11 com controle de potência de transmissão". W Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2009. http://dx.doi.org/10.5753/sbseg.2009.20623.

Pełny tekst źródła
Streszczenie:
O IEEE 802.11 possui duas funções coordenadoras, denominadas DCF e PCF, responsáveis pelo controle de acesso ao meio. Além disso, técnicas de controle de potência de transmissão (CPT) têm sido utilizadas para assegurar que a rede tenha uma maior economia de energia e uma maior vazão de dados através do reuso espacial. Contudo, tanto o 802.11 quanto as técnicas de CPT são vulneráveis a ataques de redução da qualidade de serviço (RoQ), devido à necessidade das estações manterem um comportamento de transmissão padrão. Os ataques RoQ têm a finalidade de aumentar a vazão do tráfego dos atacantes com o intuito de produzir um dano máximo na rede e evitar mecanismos de detecção ou prevenção. Este trabalho analisa como os ataques RoQ, self-whiper, flooding e round-robin afetam o protocolo IEEE 802.11 padrão e as técnicas de CPT. Resultados mostram que a técnica AEWMA apresentou a maior economia de energia na presença de qualquer ataque. Além disso, o reuso espacial não foi afetado, exceto diante do ataque self-whisper com 30% e 50% de atacantes.
Style APA, Harvard, Vancouver, ISO itp.
10

Mai, Kahnery, Nathan Watts i George Herman. "Screen Factor Polymer Characterization: Improved Screen Factor Technique, Apparatus, and Analysis". W SPE International Conference on Oilfield Chemistry. SPE, 2023. http://dx.doi.org/10.2118/213837-ms.

Pełny tekst źródła
Streszczenie:
Abstract Improvement of mobility control in conventional oil reservoirs is commonly achieved through polymer flooding. This enhanced oil recovery (EOR) technology involves the addition of hydrolyzed polyacrylamide (HPAM) to the injection fluid to increase the viscosity of the displacing phase in the reservoir. The mobility improvement of a polymer flood is defined as the resistance factor (RF), which is experimentally measured by comparing the flow characteristics (e.g., pressure drop, flow rate) of the polymer solution against its solvent (or other simulate fluid for the waterflood). Equations for these comparisons are built upon Darcy's law for fluid flow, which applies in low shear rate conditions (like deep reservoir flow) where the pressure drop in a given section of the porous media is linearly related to the flow rate for a given fluid viscosity. However, the viscosity of HPAM solutions follow non-Newtonian behavior that changes with shear rate, typically following a shear-thinning trend. Flow through complex porous media that is representative of the reservoir can introduce elongational (or extensional) flow, which can cause a "shear-thickening" region where the polymer's apparent (in-situ) viscosity increases according to its viscoelastic characteristics. Since predicting the RF potential of a polymer solution is a primary goal of laboratory screening and formulation work for EOR projects, polymer evaluations often incorporate experimental methods that probe this viscoelastic potential. Screen factor (SF) is a long-established method that is often considered to characterize polymer solutions' viscoelasticity with a relatively simple apparatus and fast measurement. This study introduces a new method for conducting screen factor measurements that improves upon the original design and protocol (as described in API RP 63). Validating the efficacy of the new design required an in-depth examination into the nature of SF measurements. The proposed novel design and methodology was able to replicate benchmark results generated according to API RP 63 while improving ease of use, measurement precision and accuracy, and level of data generation to allow for in-depth measurement analysis. While investigating the principles that govern standard gravity drainage screen factor, it was found that the solvent flows under non-linear conditions, precluding the application of linear flow equations (such as Darcy's law) and explaining why SF is a wholly unique value that cannot be directly related to other measurements (e.g., porous media RF or in-situ viscosity). Through rate controlled experiments with the screen pack from a SF setup (five 100 mesh screens), it was determined that screen factor does not appear to be a purely viscoelastic measurement, but rather exerted a shear rate in the transition regime from viscous to viscoelastic flow under the studied conditions. While useful applications of screen factor are recognized, the discussed analyses bring attention to the limitations of SF. In reference to RF results generated in porous media (Berea core), alternative laboratory experiments (e.g., CaBER evaluation or RF with an in-line filter) are shown to provide more effective characterization of the studied polymers' viscoelastic potential compared to screen factor measurements.
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii