期刊文献+

油气井射孔层位的深度定位方法 被引量:4

Depth Positioning Method of Well Perforation Layer
下载PDF
导出
摘要 无论用什么方式进行射孔 ,都必须准确无误地把射孔枪送到目的层段 ,否则 ,射孔方法再好也没用。习惯上把这项对射孔层点火深度进行准确定位的工作称为射孔校深。目前各地区均按自己的习惯采取略有不同的校深方法 ,文章介绍的校深方法是在参阅各类方法和总结东海多口井实践的基础上完善并确立的。同时对影响射孔深度定位精度的主要因素进行了分析 ,并提出了解决该问题的相应办法。 Whatever method of perforation used,it is the must to set the perforating gun accuarately at the target formation. The accarate depth positioning for the gun fire at the perforated layer is used to be called the perforation depth calibration. Nowadays,the calibration method with a little variation are used by different fields. Referring to all kinds of using method,this paper introduce such methods on the basis of multiple well practice of the East China Sea.Factors influencing accuracy of calibration are analized and resolvement of those problems are supplied as well.
作者 倪德忠
出处 《海洋石油》 CAS 2004年第2期88-92,共5页 Offshore Oil
关键词 油气井 射孔 深度定位 误差分析 perforation depth positioning error analysis.
  • 相关文献

参考文献2

二级参考文献1

  • 1李民刚.生产测井技术[M].北京:石油工业出版社,1998..

同被引文献29

  • 1刘振岭.自然伽玛射线校深在油管传输射孔中的应用[J].油气井测试,1991(1):54-55. 被引量:1
  • 2朱爱秋,朱贵宝.射孔器材产品质量现状分析[J].石油工业技术监督,2004,20(8):23-24. 被引量:1
  • 3陈凤波;刘洪涞.数控射孔深度系统校正[A],2002.
  • 4Thlone W, Ahn G J, Pai T, et al. Access control in collabora- tive systems [ J ]. ACM Computing Surveys, 2005,37 ( 1 ) : 29- 41.
  • 5Thomas R K, Sandhu R S. Task-based authorization controls (TBAC) :a family of models for active and enterprise-orien- ted authorization management [ C ]//Proc of the IFIP WG11.3 workshop on database security. London: Chapman & Hal, 1997 : 13-19.
  • 6Sandhu R S, Coynek E J, Feinsteink H L, et al. Role-based access control models [ J ]. IEEE Computer, 1996,29 ( 2 ) :38- 47.
  • 7Oh S ,Park S. Task-role based access control (T-RBAC) :an improved access control method for enterprise environment [C]//Proc of the llth international conference on database and expert systems applications. Berlin : Springer, 2000 : 264 - 273.
  • 8Georgiadis C K, Mavfidis I, Pangalos G, et al. Flexible team- based access control using contexts [ C]//Proc of the ACM symp on access control models and technologies. New York: ACM,2001:21-27.
  • 9Bijon K Z, Sandhu R S, Krishnan R. A group-centric model for collaboration with expedient insiders in multilevel systems [ C ]//Proc of the 2012 international conference on collabora- tion technologies and systems. Piscataway, NJ : IEEE, 2012 : 419-426.
  • 10Kanso A, Yahyaoui H, Almulla M. Keyed Hash function based on a chaotic map [ J]. Information Sciences,2012,186 ( 1 ) : 249 -264.

引证文献4

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部