Owing to the special nature of oil well exploration and oil drilling, the larger part of the oil pumping units (OPU’s) is spread over barren hills, mountains, deserts, and therefore; the existing oil pumping system still adopt manual control. It has evident drawbacks of frequent manual administration within the harsh oilfield environment to examine the OPU status and collect health analysis .It leads to drop in oil production due to the difficulties in locating and repairing in reasonable time resulting in oil production drop. A sensor network based intelligent control system is proposed, and applied for remote oil-well health monitoring and power economy. The proposed sensor network consists of basic sensors such as Temperature sensor, Gas sensor and level sensor that are used for oil well data sensing. The sensed data is given to the controller inbuilt with CAN module for processing. The CAN bus is used to enable exchange of information between modules. The speed of the motor can be controlled according the level of the oil. The CAN module will broadcast the sensed parameters to the Raspberry pi using RS232 serial port interface and real time remote monitoring can be performed from any part of the globe through the web. The IP address can be viewed within the LCD connected to the controller. A false alarm is indicated if any malfunction occurs.
I. INTRODUCTION
In recent years, there has been an increasing interest in the adoption of emerging sensing technologies for instrumentation within a variety of structural systems. WSN‟s are mainly aimed to control and monitor various applications with relatively low power consumption. A benefit of wireless structural monitoring systems is that they are inexpensive to install bec...
... middle of paper ...
...J., Vol. 9, no. 11, pp. 1589–1595, Nov. 2009
[4] D. G. Senesky, B. Jamshidi, K. Cheng, and A. P. Pisano, “Harsh environment silicon carbide sensors for health and performance monitoring of aerospace systems: A review,” IEEE Sensors J., Vol. 9, no. 11, pp. 1472–1478, Nov. 2009
[5] M. J. Whelan, M. V. Gangone, and K. D. Janoyan, “Highway bridge assessment using an adaptive real-time wireless sensor network,” IEEE Sensors J., Vol. 9, no. 11, pp. 1405–1413, Nov. 2009
[6] K. Sampigethaya, R. Poovendran, L. Bushnell, M. Li, R. Robinson, and S. Lintelman, “Secure wireless collection and distribution of commercial airplane health data,” IEEE Aerosp. Electron. Syst. Mag., Vol. 24, no. 7, pp. 14–20, Jul. 2009
[7] Steve Corrigan, “Introduction to the Controller Area Network”, Published by Texas Instruments Application Report,SLOA101A, August 2002–Revised July 2008
Hendricks et al., (1999). U.S. Department of Transportation,National Highway Traffic Safety Administration, Traffic Safety Programs Office of Research and Traffic Records Under Contract No. DTNH22-94-C-05020. Retrieve From.
The project that will be examined is an upgrade to our main Human-Machine Interface (HMI) software: Cimplicity, to SQL Server and to the Windows OS. Cimplicity is a product of the GEFanuc group of General Electric. This group develops a full suite of applications used in the manufacturing environment. By way of introduction, the manufacturing floor environment uses a variety of types of equipment. To control these machines, a specialized computer is used. For the purposes of simplicity (not the program), this paper will refer to them all as PLC's or Programmable Logic Controllers. Most of these PLC's are accessible via the ethernet and communicate to our Protocol Data Units (PDU) in the computer room. These PDU's have Cimplicity installed on them in the form of projects that are named for the various areas or functions of our plant such as GA or General Assembly. The project we are undertaking will be a fundamental change to these PDU's in our computer room. The servers currently run Windows NT and will be upgraded to Windows Server 2003 or Windows 2000 and SQL Server will will be upgraded from version 7 to SQL 2000.
The placement of implantable chips into patients for the purpose of accurately identifying patients and properly storing their medical history records has become a subject of a strong debate. Making sure patients are properly identified before a procedure and storing their health history records for future use has been difficult, if not impossible. The idea of being able to retrieve accurate patient’s medical history for a follow up care without relying on patient’s memory is a challenging task for many healthcare organizations. Many ideas and technologies have been introduced over the years to help solve this problem, but unfortunately the problem is still not fully resolved. There are still many errors in the healthcare due in part by improper record keeping and inaccurate patient identification. One idea that has being in discussion to eliminate these problems for good, is the introduction of a chip or radio frequency identification (RFID) technology implanted into human for the purpose storing medical data and accurately identify patients. VeriChip Corporation is currently the maker of this implantable RFID chip. They are the only corporation cleared by the U.S. Food and Drug Administration (FDA) to make this implantable radio frequency transponder system for humans for the purpose of identifying patients and storing their health history information. The chip was first developed for the use of radar systems by Scottish physicist, Sir Robert Alexander Watson-Watt in 1935 just before World War II. (Roberti, 2007). This technology helps identify approaching planes of the enemy from mile away. Today, RFID has several uses. It is used for animal tracking. It is attached to merchandise in stores to prevent theft. It can be instal...
There are three exploratory oil rigs that have been drilling under contract for several years along the Angola coast. Each oil rig owned by a United States drilling company. The case study focuses on a small oil rig called the “Explorer IV” housing 180 staff, 30 of these being American expatriate workers or “Expat”, and the top administrator in authority regarding life on the rig is an Expat himself. The purpose of the oil rig’s purpose is for drilling oil and to house all of the staff drilling and operating the rig. The rig is approximately 200 feet by 100 feet so cramped and tight living spaces is to be expected. However, there is a difference in living quarters, quality of food, medical care, and means of transportation between the Angolan’s and the Expats.
During 2003-2007, cisco registered a top durable top line growth period. They take a strong ability to manufacture and design new products with how the new world processes information. They have strong strategic industry partners and they have a good customer relationship. Cisco is a company that focuses on their core competencies. When they monitor and manage more than 10,000 devices, it becomes time consuming. Even with these problems cisco systems does have many strength...
Shuster, Laurie A. "Artificial Intelligence Helps Bring Objectivity To Bridge Health Evaluations." Civil Engineering (08857024) 82.9 (2012): 40-41. Business Source Elite. Web. 23 March 2014.
The Unistep IRP Elexol EtherIO 24 Module is a network board that enables multiple devices to connect to an Ethernet network, communicate with each other, and relay information when changes occur. The IRP module is a micro-controller, integrated with many features for interacting with devices connected on a generic local area network; this module was designed to be used in conjunction with other network devices or modules. Some of the applications for the device include industrial automation, digital input and output functions, system monitoring, remote data accessing, controlled machinery, and remote power control.
Multiphase pumps are innovative, reliable and proven. Operators can take tremendous advantages and benefits while venturing into full field developments. It is of the firm opinion that the study has been successful in achieving the set objectives and answering the research questions satisfactorily. The study is reliable and authentic considering that most of the data has been obtained from oil field operators who would benefit from better performances of the pumping systems and therefore have valid reasons to provide accurate data for research. The study being based on secondary data, collation of such data and the analysis has been a continuation of the past works and the same has been acknowledged. The generic criterion for the operation of various pumps has been recognized and also the most suitable multiphase pump for various emerging situations has been indicated. The study has brought out these facts in the observations and recommendations sections. Furthermore, limitations of the research have been identified and points for future scope for research are listed. In conclusion, it can be stated with confidence that the multiphase pumps are the future of oil field operations with capabilities almost matching single phase pumps for all parameters. With the available evidence based on the data from the existing fields, Helico-Axial pumps and Electric submersible
Disclaimer; this is intended to be an introductory technical article; certain details have been excluded in the interests of space and clarity. Network design examples are presented to illustrate specific technical points and are not intended to fully complete.
In the past 60 years technology has grown by leaps and bounds. Computers are a common fixture of most homes. The Internet was created. Everyone carries cell phones that have more computing power than desktop PC’s did just ten years ago. And this march forward in technology also effected the aviation industry as well. The Boeing 787-8 Dreamliner is Boeing’s newest, most modern, and most technologically advanced commercial aircraft. However, it’s development also raised some security concerns. Fears that the Dreamliner’s network could be vulnerable to hackers or other cyber attacks lead the Federal Aviation Administration (FAA) to issue a Special Conditions Notice to Boeing to prove that the Dreamliner’s network is secure.
... in Wireless Sensor Networks: Current proposal and Future Development, IEEE Xplore, Hong Kong, Oct- 2007.
The propose research will address a problem confronting many two year institutions in the present-day (i.e. how to best plan, design, and implement WLAN technologies). While WLAN technologies offer the benefits of mobility, reduced installation time, and decreased cost, many challenges must be met by institutions deploying them (Geier, 2005). These issues are related to security, speed, interoperability, and equipment selection, ease of use, reliability, signal interference, installation, and health risks.
Only commercialized in the United States about five or six years ago, a new process of extracting natural gas has emerged called fracking. The natural gas that is extracted from the shale can be into the thousands of feet below the earth’s surface. This new process gives us the opportunity to extract gas that we thought was unreachable through relatively new technological advancements in the field.
This paper is going to discuss wireless security from a broad view where I will go into why exactly wireless security is so important especially today as the ways in which we are communicating is changing dramatically. From there I will discuss the multiple wireless securities that are available to give a better understanding of the options given. Then I will go into why exactly not protecting your wireless can be so dangerous with some descriptions on the most dangerous wireless attacks out there today. Finally I will then discuss how we can better prepare for these types of attacks with a synopsis on several effective security methods that will help to ensure data is securely passed and kept hidden.
Wireless technology has become the wave of the future. From cellular phones to wireless point of sale devices, wireless networks and technology is all around us. In order to jump on the wireless train, one must first understand the different standards. To properly and safely utilize wireless technology the user also must understand the various types of wireless security. Once grasping these technologies and standards, anyone can implement a wireless network in their home.