The array laterolog is an important tool for complex formation logging evaluation due to its high resolution and large detection depth.However,its logging responses are seriously affected by leakage events due to the ...The array laterolog is an important tool for complex formation logging evaluation due to its high resolution and large detection depth.However,its logging responses are seriously affected by leakage events due to the surrounding rock and by mud invasion.These factors must be considered when inverting array lateral logging data,so that the inversion results reflect the true formation conditions as much as possible.The difficulties encountered in the inversion of array lateral logging data are:too many inversion parameters cause the calculation of the Jacobian matrix to be difficult and the time required to select the initial inversion values due to the slow forward-modeling speed.In this paper,we develop a fast processing method for array laterolog data.First,it is important to clearly define the main controlling factors for the array laterolog response,such as thickness,the surrounding rock,and invasion.Second,based on a depth-window technique,processing the array laterolog data for the entire well is transformed into multiple 2 D inversions of the layers using a series of continuous depth windows.For each formation in a depth window,combined with the1 D equivalent fast-forward algorithm,rapid extraction of the radial resistivity profile of the formation is achieved.Finally,the 1 D inversion result is used as the initial state to further eliminate the influence of surrounding rocks and layer thicknesses on the apparent resistivity response.Numerical simulation results show that the factors affecting the response of the array laterolog are the invasion properties,the layer thicknesses,and the surrounding rocks;the windowing technique greatly reduces the number of inversion parameters needed and improves the inversion speed.A real application of the method shows that 2 D inversion can rapidly reconstruct the actual resistivity distribution and improve the accuracy of reservoir saturation calculations.展开更多
This study delved on the ballast water management methods among international vessels docking at Loboc Port, Iloilo City, Philippines and other factors that are considered during ballast operation. The respondents of ...This study delved on the ballast water management methods among international vessels docking at Loboc Port, Iloilo City, Philippines and other factors that are considered during ballast operation. The respondents of this study were the seafarers from the 15 international vessels docking at Loboc Port. The findings of the study revealed that the international vessels docking at Loboc Port used the sequential method, flow-through method, chlorination method, hydrogen peroxide, UV (ultraviolet) irradiation and filtration method in ballasting. In order to prevent transfer of alien invasive species, government authorities such as MARINA (Maritime Industry Authority) and Philippine Coast Guard should strictly monitor and implement the ballast water management methods used by international vessels based on the guidelines set by the IMO (International Maritime Organization).展开更多
The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The ...The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The most fundamental parameter, POD, is normally related to a number of factors such as the event of interest, the sensitivity of the sensor, the installation quality of the system, and the reliability of the sensing equipment. The suppression of nuisance alarms without degrading sensitivity in fiber optic intrusion detection systems is key to maintaining acceptable performance. Signal processing algorithms that maintain the POD and eliminate nuisance alarms are crucial for achieving this. In this paper, a robust event classification system using supervised neural networks together with a level crossings (LCs) based feature extraction algorithm is presented for the detection and recognition of intrusion and non-intrusion events in a fence-based fiber-optic intrusion detection system. A level crossings algorithm is also used with a dynamic threshold to suppress torrential rain-induced nuisance alarms in a fence system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100mm/hr with the simultaneous detection of intrusion events. The use of a level crossing based detection and novel classification algorithm is also presented for a buried pipeline fiber optic intrusion detection system for the suppression of nuisance events and discrimination of intrusion events. The sensor employed for both types of systems is a distributed bidirectional fiber-optic Mach-Zehnder (MZ) interferometer.展开更多
基金supported by the National Science and Technology Major Project of China(NO.2017ZX05005-005-005,NO.2016ZX05014-002-001 and No.2016ZX05002-005-001)the Strategic Priority Research Program of the Chinese Academy of Sciences,Grant No.XDA14010204
文摘The array laterolog is an important tool for complex formation logging evaluation due to its high resolution and large detection depth.However,its logging responses are seriously affected by leakage events due to the surrounding rock and by mud invasion.These factors must be considered when inverting array lateral logging data,so that the inversion results reflect the true formation conditions as much as possible.The difficulties encountered in the inversion of array lateral logging data are:too many inversion parameters cause the calculation of the Jacobian matrix to be difficult and the time required to select the initial inversion values due to the slow forward-modeling speed.In this paper,we develop a fast processing method for array laterolog data.First,it is important to clearly define the main controlling factors for the array laterolog response,such as thickness,the surrounding rock,and invasion.Second,based on a depth-window technique,processing the array laterolog data for the entire well is transformed into multiple 2 D inversions of the layers using a series of continuous depth windows.For each formation in a depth window,combined with the1 D equivalent fast-forward algorithm,rapid extraction of the radial resistivity profile of the formation is achieved.Finally,the 1 D inversion result is used as the initial state to further eliminate the influence of surrounding rocks and layer thicknesses on the apparent resistivity response.Numerical simulation results show that the factors affecting the response of the array laterolog are the invasion properties,the layer thicknesses,and the surrounding rocks;the windowing technique greatly reduces the number of inversion parameters needed and improves the inversion speed.A real application of the method shows that 2 D inversion can rapidly reconstruct the actual resistivity distribution and improve the accuracy of reservoir saturation calculations.
文摘This study delved on the ballast water management methods among international vessels docking at Loboc Port, Iloilo City, Philippines and other factors that are considered during ballast operation. The respondents of this study were the seafarers from the 15 international vessels docking at Loboc Port. The findings of the study revealed that the international vessels docking at Loboc Port used the sequential method, flow-through method, chlorination method, hydrogen peroxide, UV (ultraviolet) irradiation and filtration method in ballasting. In order to prevent transfer of alien invasive species, government authorities such as MARINA (Maritime Industry Authority) and Philippine Coast Guard should strictly monitor and implement the ballast water management methods used by international vessels based on the guidelines set by the IMO (International Maritime Organization).
文摘The success of any perimeter intrusion detection system depends on three important performance parameters: the probability of detection (POD), the nuisance alarm rate (NAR), and the false alarm rate (FAR). The most fundamental parameter, POD, is normally related to a number of factors such as the event of interest, the sensitivity of the sensor, the installation quality of the system, and the reliability of the sensing equipment. The suppression of nuisance alarms without degrading sensitivity in fiber optic intrusion detection systems is key to maintaining acceptable performance. Signal processing algorithms that maintain the POD and eliminate nuisance alarms are crucial for achieving this. In this paper, a robust event classification system using supervised neural networks together with a level crossings (LCs) based feature extraction algorithm is presented for the detection and recognition of intrusion and non-intrusion events in a fence-based fiber-optic intrusion detection system. A level crossings algorithm is also used with a dynamic threshold to suppress torrential rain-induced nuisance alarms in a fence system. Results show that rain-induced nuisance alarms can be suppressed for rainfall rates in excess of 100mm/hr with the simultaneous detection of intrusion events. The use of a level crossing based detection and novel classification algorithm is also presented for a buried pipeline fiber optic intrusion detection system for the suppression of nuisance events and discrimination of intrusion events. The sensor employed for both types of systems is a distributed bidirectional fiber-optic Mach-Zehnder (MZ) interferometer.