Academic literature on the topic 'Destination sequence Number'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Destination sequence Number.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Destination sequence Number"

1

Jhaveri, Rutvij H., Aneri Desai, Ankit Patel, and Yubin Zhong. "A Sequence Number Prediction Based Bait Detection Scheme to Mitigate Sequence Number Attacks in MANETs." Security and Communication Networks 2018 (November 15, 2018): 1–13. http://dx.doi.org/10.1155/2018/3210207.

Full text
Abstract:
The characteristics of MANET such as decentralized architecture, dynamic topologies make MANETs susceptible to various security attacks. Sequence number attacks are such type of security threats which tend to degrade the network functioning and performance by sending fabricated route reply packets (RREP) with the objective of getting involved in the route and drop some or all of the data packets during the data transmission phase. The sequence number adversary attempts to send a fabricated high destination number in the RREP packet which attracts the sender to establish a path through the adversary node. This paper proposes a proactive secure routing mechanism which is an improvement over the authors previously proposed scheme. It makes use of linear regression mechanism to predict the maximum destination sequence number that the neighboring node can insert in the RREP packet. As an additional security checkpoint, it uses a bait detection mechanism to establish confidence in marking a suspicious node as a malicious node. The proposed approach works in collaboration with the ad hoc on-demand distance vector routing (AODV) protocol. The simulation results depict that the approach improves the network performance in the presence of adversaries as compared to previously proposed scheme.
APA, Harvard, Vancouver, ISO, and other styles
2

Smiley, Alison, Carolyn MacGregor, Robert E. Dewar, and Chris Blamey. "Evaluation of Prototype Highway Tourist Signs for Ontario." Transportation Research Record: Journal of the Transportation Research Board 1628, no. 1 (1998): 34–40. http://dx.doi.org/10.3141/1628-05.

Full text
Abstract:
Information load and comprehension of new tourist signs for Ontario highways were evaluated. In a laboratory study involving 288 subjects, drivers searched for target destinations on timed sequences of slides of signs and identified whether their target was present, and, if so, its direction and distance. Performance was assessed in relation to number of names, number of signs in a sequence, arrow shapes, pictograph effectiveness, and sign organization. Signs used a letter height of 19 cm (7.5 in.). Subjects were allowed reading time equivalent to that available to drivers driving at 80 km/h (50 mph), who must time-share sign reading and vehicle control tasks. The results showed that with four or five names per sign, approximately one in eight subjects reported an incorrect direction for their target destination. Thus, a maximum of three names per sign was recommended. Results showed that a 70-degree chevron was as effective as a gerber arrow, that the number of signs in a sequence (two, three, or four) did not affect performance, and that having left followed by right destinations on a single sign resulted in equivalent performance to signs with left and right destinations on separate signs. The presence of pictographs increased the number of incorrect responses. Comprehension of 11 pictographs was assessed for 150 subjects. For 5 of 11 pictographs, comprehension was less than 85 percent.
APA, Harvard, Vancouver, ISO, and other styles
3

Brych, Vasyl, and Olexander Kyfyak. "Theoretical and methodological bases of formation of tourist destinations in western Ukrainian border regions." Herald of Ternopil National Economic University, no. 4(98) (February 20, 2021): 114. http://dx.doi.org/10.35774/visnyk2020.04.114.

Full text
Abstract:
Introduction. Tourist activity in the western Ukrainian border regions is organized in such a way that a tourist destination becomes a key element of the tourism system. However, their small number and some problems with their creation require theoretical and methodological support, which determines the relevance of the scientific article.Purpose and methods. Definition of basic theories, basic scientific approaches and formation of an ideal image of a tourist destination for the western Ukrainian border regions. The methodological basis of the study are general scientific and theoretical methods:– analysis and synthesis - to determine the basic theories and scientific approaches to the formation of tourist destinations;– expert assessment – to establish the main components of tourist destinations and determine their types;– idealization – to form an ideal image of a tourist destination;– induction, deduction – to determine the basic principles of a systematic approach which is based on the consideration of a tourist destination as a whole object.Results. Based on the analysis of theories of local government, the most important theories are identified and their role in the formation of tourist destinations. In particular, the use of the theory of dualism implies that the formation of tourist destinations must take into account the balance of state and local interests and the inadmissibility of the separation of individual management tasks into local and state. The theory of a free community gives the community the right to independently manage its territory, its resources, determine activities, implement advanced technologies, and so on. No less important for the formation of tourist destinations is the general theory of municipal government or socio-economic theory, which is based not on human rights, but economic necessity and practicality.The analysis of the territories of western Ukrainian border regions on the provision of tourist resources, the organization of cross-border cooperation, which helped to determine the main scientific approaches to the formation of tourist destinations and establish the main components of a tourist destination, determine its types by scale and radius.Conclusions. Defining basic theories and scientific approaches to the formation of tourist destinations, creating an ideal image of a tourist destination for the western Ukrainian border regions will contribute to their further successful operation.Discussion. Prospects for further research include the study of foreign experience, the use of a cluster approach, ranking and sequence of actions in the theoretical and methodological support of the formation of tourist destinations.
APA, Harvard, Vancouver, ISO, and other styles
4

Sasirekha, V., and S. Nithyadevi. "Detecting and Preventing a Black Hole Attack in VANET." Asian Journal of Computer Science and Technology 8, S1 (2019): 7–9. http://dx.doi.org/10.51983/ajcst-2019.8.s1.2015.

Full text
Abstract:
In recent years, Vehicular Adhoc Network is one of fastest ongoing emerging field in the networking industry. But it faces lot of challenges today. Security is the major concern in the VANET. Now a day’s hacking is the hobby of the programmers. Lots of applications were developed for security attack. VANET is a dynamic network, it require secure communication. The VANET is vulnerable to various types of attacks. In this paper we have focused on black hole attack. The Black hole attack may interrupt the packets and insert the false information in the packets and sends to the other vehicle. The receiver of the vehicles is directly affected. Here we developed a mechanism with AODV protocol called blackhole attack detection and prevention which is mainly focused on vehicles sequence number. The source vehicles sequence number compared with the destination vehicles sequence number. If it is larger than the destination vehicle then the vehicle is marked as malicious vehicle. And this vehicles information is send to the Road Side Unit(RSU). The Road Side Unit analyzes the malicious vehicle and blocks the vehicle.
APA, Harvard, Vancouver, ISO, and other styles
5

Kumar, Kamlesh, and Bobby Sharma. "Multicasting Model for Efficient Data Transmission in VANET." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (2023): 408–14. http://dx.doi.org/10.17762/ijritcc.v11i7s.7016.

Full text
Abstract:
VANETs (Vehicle Ad hoc Networks) are networks made up of a number of vehicular nodes that are free to enter and leave the network. The Location Aided Routing (LAR) protocol is the one that is most frequently utilized among them. Here, the route request packets are flooded across many pathways to the source node using the broadcasting strategy. The vehicles that have a direct path to the destination send the route reply packets back to the source. The least number of hops and the sequence number are used to determine the route from source to destination. This research study has used the multicasting approach to construct a path from the source node to the destination node. Within this multicasting strategy, the root nodes from the network are selected for data routing. The path between the source and the destination is chosen using a root node. The suggested approach is put into practice using the NS2, and some parametric values are computed to produce analytical findings.
APA, Harvard, Vancouver, ISO, and other styles
6

Paelke, Gretchen M. "A Comparison of Route Guidance Destination Entry Methods." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 37, no. 9 (1993): 569–73. http://dx.doi.org/10.1177/154193129303700911.

Full text
Abstract:
This paper examined four touchscreen methods for entering a destination into a route guidance system. Three of the interfaces were character entry-based including: 1) A method using a sequence of two buttons for each alphanumeric entry (referred to as Doublepress), 2) A Qwerty keypad layout, and 3) A phone-based keypad where letters were entered using their corresponding number key. The fourth interface provided an alphabetic list through which a user scrolled to select a city or street name. Sixteen subjects used each of the interfaces to enter destinations in a laboratory study while “parked” and while driving a simulator. The entry methods were evaluated based on entry time, driving performance, errors, preferences and perceived difficulty. Overall address entry times were fastest for the Phonepad (43 seconds) and Qwerty (45 seconds) methods followed by the Scrolling list (56 seconds) and Doublepress (75 seconds) methods. Entry time was significantly affected by driver age. Driving performance (deviation of lane position) was significantly worse when entering a destination as compared to baseline driving. Participants rated the difficulty of destination entry only slightly higher than that of conventional driving tasks. There was no evident preference for a particular entry method.
APA, Harvard, Vancouver, ISO, and other styles
7

Shiftan, Yoram. "Practical Approach to Model Trip Chaining." Transportation Research Record: Journal of the Transportation Research Board 1645, no. 1 (1998): 17–23. http://dx.doi.org/10.3141/1645-03.

Full text
Abstract:
The need to model trip chaining has been discussed widely in the travel demand literature, but new approaches generally have been limited to academic research. Trip chaining was modeled in an actual urban area model. The model was developed for Boise, Idaho, on the basis of a household survey of 1,600 households. For this model, a tour was defined as a sequence of trip segments that start at home and end at home. The model distinguishes between two main types of tours: A tour that includes one or more work destinations is defined as a work-related tour (WRT); all other tours are defined as nonwork-related tours (NWRT). A model system was developed by assuming the hierarchy of the model components. The highest-level model estimates auto ownership for the household. On the basis of auto ownership, the frequency of WRT is estimated, and on the basis of the frequency of WRT, the frequency of NWRT is modeled. These three model components produce the number of WRT and NWRT for each household. All subsequent models are estimated at the tour level. The WRT model system includes work destination choice model, tour type model including the number of stops on the way to and from work and midday trips, and secondary destination choice model for all nonwork destinations. The NWRT model was developed in the same way with some structural differences.
APA, Harvard, Vancouver, ISO, and other styles
8

Elkabour, Ahmed, and Dr. Rahma Teirab Abaker Haroun. "Mitigating Routing Attacks in Mobile Ad Hoc Networks." International Journal for Innovation Education and Research 7, no. 7 (2019): 227–33. http://dx.doi.org/10.31686/ijier.vol7.iss7.1603.

Full text
Abstract:
Abstract - Mobile Ad hoc Networks have been highly vulnerable to attacks due to the dynamic nature of its network infrastructure. Among these attacks, routing attacks have received considerable attention since it could cause the most devastating damage to MANET. In existing solutions typically attempt to isolate malicious nodes based on binary or naive fuzzy response decisions. However, binary responses may result in the unexpected network partition, causing additional damages to the network infrastructure. In this paper proposes a risk-aware response mechanism to systematically cope with the identified routing attacks. To avoid the routing attacks Dijkstra’s and Destination sequenced Distance Vector algorithm are used. Dijkstra's algorithm solves the single-source shortest-path problem when all edges have non-negative weights. The primary improvement for ad hoc networks made in DSDV over conventional distance vector is the addition of a sequence number in each routing table entry.
 Index Terms - Intrusion response, risk aware, dempster- shafer theory, Dijkstra’s algorithm, Destination sequenced Distance Vector.
APA, Harvard, Vancouver, ISO, and other styles
9

Mamei, Marco, Nicola Bicocchi, Marco Lippi, Stefano Mariani, and Franco Zambonelli. "Evaluating Origin–Destination Matrices Obtained from CDR Data." Sensors 19, no. 20 (2019): 4470. http://dx.doi.org/10.3390/s19204470.

Full text
Abstract:
Understanding and correctly modeling urban mobility is a crucial issue for the development of smart cities. The estimation of individual trips from mobile phone positioning data (i.e., call detail records (CDR)) can naturally support urban and transport studies as well as marketing applications. Individual trips are often aggregated in an origin–destination (OD) matrix counting the number of trips from a given origin to a given destination. In the literature dealing with CDR data there are two main approaches to extract OD matrices from such data: (a) in time-based matrices, the analysis focuses on estimating mobility directly from a sequence of CDRs; (b) in routine-based matrices (OD by purpose) the analysis focuses on routine kind of movements, like home-work commute, derived from a trip generation model. In both cases, the OD matrix measured by CDR counts is scaled to match the actual number of people moving in the area, and projected to the road network to estimate actual flows on the streets. In this paper, we describe prototypical approaches to estimate OD matrices, describe an actual implementation, and present a number of experiments to evaluate the results from multiple perspectives.
APA, Harvard, Vancouver, ISO, and other styles
10

Huang, Chin-Tser, Mohamed G. Gouda, and E. N. Elnozahy. "Convergence of IPsec in presence of resets." Journal of High Speed Networks 15, no. 2 (2006): 173–83. https://doi.org/10.3233/hsn-2006-285.

Full text
Abstract:
IPsec is the current security standard for the Internet Protocol IP. According to this standard, a selected computer pair (p, q) in the Internet can be designated a “security association”. This designation guarantees that all sent IP messages whose original source is computer p and whose ultimate destination is computer q cannot be replayed in the future (by an adversary between p and q) and still be received by computer q as fresh messages from p. This guarantee is provided by adding increasing sequence numbers to all IP messages sent from p to q. Thus, p needs to always remember the sequence number of the last sent message, and q needs to always remember the sequence number of the last received message. Unfortunately, when computer p or q is reset these sequence numbers can be forgotten, and this leads to two bad possibilities: unbounded number of fresh messages from p can be discarded by q, and unbounded number of replayed messages can be accepted by q. In this paper, we propose two operations, “SAVE” and “FETCH”, to prevent these possibilities. The SAVE operation can be used to store the last sent sequence number in persistent memory of p once every Kp sent messages, and can be used to store the last received sequence number in persistent memory of q once every Kq received messages. The FETCH operation can be used to fetch the last stored sequence number for a computer when that computer wakes up after a reset. We show that the following three conditions hold when SAVE and FETCH are adopted in both p and q. First, when p is reset, at most 2Kp sequence numbers will be lost but no fresh message sent from p to q will be discarded if no message reorder occurs. Second, when q is reset, the number of discarded fresh messages is bounded by 2Kq. In either case, no replayed message will be accepted by q.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Destination sequence Number"

1

Yannam, Adilakshmi, Shaik Salma Begum, Ragavamsi Davuluri, and Ashok Reddy kandula. "DETECTION OF BLACKHOLE ATTACK BASED ON DSN AND PDR IN MANETS." In Futuristic Trends in Network & Communication Technologies Volume 2 Book 19. Iterative International Publishers, Selfypage Developers Pvt Ltd, 2023. http://dx.doi.org/10.58532/v2bs19p1ch8.

Full text
Abstract:
MANETs are more vulnerable to different kinds of network attacks due to its phenomina. A blackhole attack is a kind of routing attack which can destroy all connections and successful transmission of the data in MANETs. This paper proposed a method considering the Blackhole attack problem while implementing the Adhoc On Demand Distance Vector routing. In this, features are extracted and analyzed by simulating the blackhole attack, when a blackhole attack present in the network. Then, we proposed detection method using the Destination sequence number, packet drop ratio and the waiting of a node. To improve the behavioral performance of the network in terms of attack, detection rate and time and to achieve the better throughput this method was proposed. Theresults of this simulation shows that this proposed one is effective and reliable for detecting blackhole attacks
APA, Harvard, Vancouver, ISO, and other styles
2

Rosa, Lélio Galdino, Maria Henriqueta Sperandio Garcia Gimenes Minasse, Sérgio Domingos de Oliveira, and Monique Laurencia dos Santos Cunha. "Brewery Tourism in Niterói/RJ: A contribution to the valorization of the tourist destination." In A LOOK AT DEVELOPMENT. Seven Editora, 2023. http://dx.doi.org/10.56238/alookdevelopv1-095.

Full text
Abstract:
According to the Ministry of Agriculture, Livestock and Supply (MAPA) in 2020, the production of craft beer in Brazil showed considerable growth, reaching the number of 1383 producing units. The state of Rio de Janeiro follows this growth, and the number of breweries registered and operating in the market increased significantly from 2017 to 2020, presenting a growth of 21.4% in this period. The city of Niterói, located in the metropolitan region of Rio de Janeiro, emerges in the Brazilian scenario as one of the municipalities with the best human development index (HDI), standing out in the national scenario, as well as in the production of craft beers. However, it is believed that, despite the competition, there is still room for investments in the area, since demand has also risen, coupled with the fact that consumers are increasingly demanding and want better quality products, especially when referring to special beers. We highlight the binomial welcome and reception of visitors with the appreciation of beer, placing them as an identity asset of a locality and its people. Still, the events in which beer complements this celebration, as well as identify that the joint participation of the community and visitors or tourists is increasingly common. In order to offer products and services that are compatible with the growing demand of this public, several routes and itineraries with the beer theme appear in Brazil. In this way, the planning, organization and training of brewing enterprises is fundamental to achieve and even exceed the expectations of its consumers. Taking into account these characteristics, this research aimed to propose the organization of routes or paths of beer tourism in the city of Niterói. To develop it, we opted for the methodology of descriptive, bibliographic and documentary study, concomitant with the netgraphic research. The research is characterized as exploratory, requiring data collection in order to trace possible brewing routes in Niterói and their respective locations through the use of forms adapted from INVTur - Inventory of Tourism Offer, of the Ministry of Tourism. Thus, a total of 78 enterprises located in Niterói were identified. These, in turn, were subdivided into 26 home microbreweries, 18 brewing bars, 27 gypsy microbreweries and 7 own breweries. From the observations presented, the research resulted in the proposition of three itineraries, called Brewing Paths, aligning them with Niemeyer, consecrated local tourist attraction, namely: Ocean Way, which includes three breweries with factory; Icaraí Way, composed of the Biergarten and two beer bars; and the Guanabara Way, which includes Vila Cervejeira and two breweries with factories. In possession of this information, a Brewery Tourist Map of Niterói was created, and it was made available to the competent bodies of Niteroienses. It is noteworthy, however, that these paths are organizational proposals, and the sequence or punctual options of visits should be decided by specialized tourism agencies or even by the people or groups themselves interested in the theme.
APA, Harvard, Vancouver, ISO, and other styles
3

Papachristodoulou, Despo, Alison Snape, William H. Elliott, and Daphne C. Elliott. "Protein sorting and delivery." In Biochemistry and Molecular Biology. Oxford University Press, 2018. http://dx.doi.org/10.1093/hesc/9780198768111.003.0031.

Full text
Abstract:
This chapter discusses proteins which are synthesized on cytosolic ribosomes but function in different cellular locations. These are targeted to their destinations by a number of mechanisms. The chapter mentions GTP-binding proteins with slow GTPase activity. These are important in many protein transport processes, acting as molecular switches. The proteins undergo allosteric changes when GTP replaces GDP or bound GTP is hydrolysed. The chapter examines proteins destined for the lumen of the rough ER. These traverse the ER membrane as they are synthesized. The chapter then looks at the peptide signal sequence which is first synthesized on free cytosolic ribosomes. A signal-recognition particle (SRP) docks the ribosome to a translocon site in the ER membrane.
APA, Harvard, Vancouver, ISO, and other styles
4

Patel, Bhaskar N., and S. G. Prajapati. "Performance Comparison of AODV and DSDV Routing Protocols of MANET." In Technological Advancements and Applications in Mobile Ad-Hoc Networks. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0321-9.ch008.

Full text
Abstract:
A mobile ad hoc network is a collection of mobile nodes communicating without wired network and infrastructure or centralized control. Due to limited transmission range of wireless network, more than single hops may be required to transfer data across the network. In order to reliable communication within the network, a routing protocol is used which are call MANET routing protocol. The major function of such an MANET routing protocol is to establishment short and real route between a pair of nodes so that messages may be delivered in a timely manner. This chapter examines two routing protocols for mobile ad hoc networks– the Destination Sequenced Distance Vector (DSDV), the pro-active routing protocol, and the Ad hoc On- Demand Distance Vector routing (AODV), an re-active routing protocol. The authors compare both protocols based on packet delivery fraction and average delay with changing number of source nodes and pause time.
APA, Harvard, Vancouver, ISO, and other styles
5

Shen Jian, Wang Chen, Wang Anxi, Li Lei, Yang Yu, and Wang Jin. "Performance Comparison of Typical Routing Protocols in Ad-hoc Networks." In Frontiers in Artificial Intelligence and Applications. IOS Press, 2015. https://doi.org/10.3233/978-1-61499-484-8-463.

Full text
Abstract:
Mobile Ad-hoc Network (MANET) is a continuously self-configuring, infrastructure-less network. Each device in MANET moves independently and frequently, where the links between the devices are changeable and the whole topology of network is uncertain. To improve the feasibility of such network, a great deal of network-layer protocols has been designed to establish the reliable connections. In this paper, we compared the three typical routing protocols: Destination-Sequenced Distance-Vector Routing (DSDV), Dynamic Source Routing (DSR) and Ad-hoc On-Demand Distance Vector Routing (AODV), in terms of the packet delivery radio, normalized routing overhead and average end-to-end delay. Simulation results show that AODV has the best performance, except the situation where the number of sessions exceeds 10. In addition, we a developed performance analysis software named Performance Analysis Tool of Ad-hoc Routing Protocols (PATAPro), which can help us easily analyze the protocol performance. The description of PATAPro is presented in the appendix of this paper.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Destination sequence Number"

1

Vethanayagam, N., and R. I. MacDonald. "Demonstration of a Novel Optical Code Division Multiplex system at 800 MChips/s." In Photonic Switching. Optica Publishing Group, 1991. http://dx.doi.org/10.1364/phs.1991.we5.

Full text
Abstract:
Direct sequence Code Division Multiple Access (CDMA) provides a method of exploiting the wide bandwidth offered by optical fibres without the added complexity of wideband electronics. Each data bit is encoded with a code sequence (of N chips) which represents the destination address of each data bit. The correct selection of orthogonal codes allows the data bit destined for a given receiver to be extracted in the presence of noise (i.e., interference from other users in the system). Due to the uni-polar nature of light, coding schemes used in conventional CDMA cannot be applied directly to optical CDMA. Coding schemes have been proposed for optical CDMA [1] [2] but they have a number of limitations which include high bandwidth expansion factors and significant cross-talk levels. These problems can be overcome by employing complementary correlation detection which generates bi-polar electrical signals from received uni-polar optical ones [3]. Correctly selected codes (Alberta codes) are truly orthogonal for complementary correlation detection.
APA, Harvard, Vancouver, ISO, and other styles
2

Hennessey, Michael P., Derek A. Olson, and Cheri Shakiban. "Steering Options for Maneuvering a Particle on a Surface." In ASME 2019 International Mechanical Engineering Congress and Exposition. American Society of Mechanical Engineers, 2019. http://dx.doi.org/10.1115/imece2019-10241.

Full text
Abstract:
Abstract We consider the general problem of steering an infinitesimal propelled and steerable particle with no rotational inertia traversing on a mathematically smooth (vs. frictionless) surface, where both the speed and body yaw rate serve as inputs to the system and lateral motion is not allowed, i.e. through a no sideslip condition. More specifically, focus is on derivation of relevant state equations in control input form, numerical and visual confirmation of state equation accuracy through specific simulations, and exploring interesting approaches to nonholonomic path planning with associated numerical simulation and visualization. Given the state equations (3rd order), in the interests of practical validation, they were exercised by considering motion on a number of smooth surfaces. The surfaces were selected for a variety of reasons, such as: the resulting qualitative trajectory is known a priori, there exists an opportunity to check numerical results with respect to previous results, or the surfaces are iconic and/or are geometrically rich. Nonholonomic steering on the surface is a very interesting and challenging problem and several approaches are investigated: (1) steering using sinusoids (detailed), (2) steering on a trajectory, and (3) “drive-and-turn” (valid in this case). Prior to implementing the steering using sinusoids algorithm, it was necessary to transform the system into “one-chained” form. The first step entailed conversion to an approximate one-chained form model that possesses a certain structure, from which the process established by Murray and Sastry can be successfully launched, where two special smooth scalar functions of the states are sought that possess special relationships to Lie-related distribution spaces associated with the control input vectors. Inputs are then transformed as well via specialized Lie derivatives. It was demonstrated through simulation that steering to an arbitrary system state on a faceted surface can be accomplished with sinusoidal inputs in only one maneuver set (i.e. maneuver A & B). Using this fact, the work presented culminates with steering to an arbitrary system state on a smooth surface that can be accomplished by essentially iterating on a steering algorithm that assumes the particle is on a plane tangent to the smooth surface at the desired destination. In this regard, it is shown that a sequence of maneuver sets converges rather quickly in the example demonstrated. Applications of this work pertain to the fairly general situation of steering a vehicle on a smooth surface, a practical vehicle navigation and control problem.
APA, Harvard, Vancouver, ISO, and other styles
3

Arif, Muhammad, and Abdulla Mohammed Al Jneibi. "Driving Operations Excellence During Covid-19 Pandemic by Capitalizing on Digitalization." In ADIPEC. SPE, 2022. http://dx.doi.org/10.2118/211264-ms.

Full text
Abstract:
Abstract The COVID-19 pandemic has caused significant disturbances to the ways businesses operate, and has driven the entire industry to re-evaluate its operations. Although the full impact of the disruption will not be understood for some time, however, many companies are now beginning to re-examine and use lessons learned to become more resilient moving forward. The Fourth Industrial Revolution (4.0) in Oil & Gas Industry creates a dynamic landscape where Operational Excellence (OE) strives for stability, quality, and efficiency while continuing to serve an increasingly demanding customer. Operational excellence is a journey, not a sole destination. Operational Excellence is a key strategic enabler to mitigate the impact of COVID-19 on shape the business of tomorrow. In line with the company vision of digitalization, a number of initiatives were considered for studies and further evaluations to facilitate remote operations through digitization. Below is list of initiatives those were successfully implemented to promote remote field operations. Critical equipment like compressors and pumps startup sequences development. Establish communication of wells subsurface (downhole) sensors with the control room for real time data monitoring. Development of wells start up sequences to facilities wells startup from control room. Real time monitoring of wells annulus pressure from control room compared to traditional field monitoring. Reset of Emergency Shutdown Valves (ESD) from control room instead of field. All of the above proposals have already been implemented. In-house field operations implementation resulted in huge Capital as well as Operating Expenditure saving. By enhancing remote operations, essential benefits are achieved including capability to faster and more effective decision-making and improved HSE measures. Enhance production and reservoir optimization by real time data monitoring and troubleshooting. Enhanced well integrity by real time annulus pressure monitoring. Enhanced HSE by eliminating Confined Space Entries (CSEs) and exposure to toxic H2S. Reduction and operating expenditure (OPEX) Reduced dependency on human leading to less human error. Reduction in capital expenditure (CAPEX) Enhanced life of critical equipment Operational Excellence played its role with a value improvement objective. Rather than replacing successful practices and programs, Operational Excellence knitted them into a larger, fully integrated tapestry woven to increase value produced within the overall business strategy which is very evident in this scenario. This case study is blend of Digitalization, Operations Excellence and innovation representing Management support to employee to solve current issues during COVID-19 pandemic. Such support is always beneficial for the company and employees.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!