Didn't find any results in this catalog!
But we have some results in other catalogs.Search results for: WELLBORE INTEGRITY
-
Structural Integrity and Life-Integritet I Vek Konstrukcija
Journals -
Genome Integrity
Journals -
Public Integrity
Journals -
Laboratory research on the influence of swelling clay on the quality of borehole cementing and evaluation of clay-cutting wellbore tool prototype
PublicationSwelling clay phenomenon is frequently observed during oil and gas drilling operations and has a significant impact on the quality of cementing procedure. Certain types of clayey minerals increase their volume in contact with water-based drilling fluids. After drilling is completed, borehole remains unsupported and filled with waterbased drilling fluids for several hours, before a casing string is inserted and secured with cement....
-
Structural Integrity
Journals -
Determining required safety integrity level
PublicationOne of the most important stage of technical system functional safety analysis is defining the safety-related functions as well as determining safety integrity level (SIL) for each defined function. A properly carried out hazard identyfication process is the necessary condition for correct definition of the safety-related functions. Determining the safety integrity level (SIL) is based on risk assessment taking into account risk...
-
Wellcome Open Research
Journals -
Local Melatoninergic System as the Protector of Skin Integrity
Publication -
Integrity level verification for safety-related functions
PublicationThis article describes methods for safety integrity level (SIL) verification of safety-related functions with regard to probabilistic criteria given international standards IEC 61508 and IEC 61511. These functions are to be realized using the electrical, electronic and programmable electronic (E/E/PE) systems or safety instrumented systems (SIS). Some methods are proposed for quantitative probabilistic modelling taking into account...
-
Modern approaches to file system integrity checking
PublicationOne of the means to detect intruder's activity is totrace all unauthorized changes in a file system.Programs which fulfill this functionality are called fileintegrity checkers. This paper concerns modernapproach to file system integrity checking. It reviewsarchitecture of popular systems that are widely used inproduction environment as well as scientific projects,which not only detect intruders but also take actions tostop their...