Wellbore Design - A Safety Critical Process Human and Software Factors.

Slides:



Advertisements
Similar presentations
Point of Sale (POS) Client & Back Office Server. Operational Concept What is our Objective? What is our Objective? What are our Goals? What are our Goals?
Advertisements

We have developed CV easy management (CVem) a fast and effective fully automated software solution for effective and rapid management of all personnel.
Software for Professional Services Time & Expense Recording Billing Project Management Management Information Resource Planning Accounting.
Case Study By: Susan Gulick Principal Consultant – Solutions Partners, Inc. May 18, 2005 Oracle Self-Service HR.
Overview of IS Controls, Auditing, and Security Fall 2005.
Student Getting Started Guide Updated June Ensure that you are connected to the Internet. 2. Launch your web browser (Internet Explorer, Firefox,
With TimeCard appointments are tagged with information that converts them into time sheets. This way users can report time and expenses from their Outlook.
Software Delivery. Software Delivery Management  Managing Requirements and Changes  Managing Resources  Managing Configuration  Managing Defects 
CS540 Software Design Lecture 1 1 Lecture 1: Introduction to Software Design Anita S. Malik Adapted from Budgen (2003) Chapters 1.
16.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
1. Failure is when users do not feel they get what they paid for. 2. Failure is when the overall organization fails to adopt the solution.
Two main requirements: 1. Implementation Inspection policies (scheduling algorithms) that will extand the current AutoSched software : Taking to account.
GMetrix SMS Testing Center Guide.
Systems Analysis and Design in a Changing World, 6th Edition
1 of 5 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Introductory CMS Training Welcome to the new Montana State University Content Management System!
Maintaining and Updating Windows Server 2008
Why Cryptosystems Fail Ross Anderson Presented by Su Zhang 1.
Release & Deployment ITIL Version 3
Project Proposal: Academic Job Market and Application Tracker Website Project designed by: Cengiz Gunay Client: Cengiz Gunay Audience: PhD candidates and.
Rigid Pavement Design Deficiencies
S/W Project Management
Margaret J. Cox King’s College London
Committing to the future easyEmission - Testing Module for Engines.
Software Quality Assurance Lecture #8 By: Faraz Ahmed.
Lecture 1 What is Modeling? What is Modeling? Creating a simplified version of reality Working with this version to understand or control some.
CPIS 357 Software Quality & Testing
Investigating jobs in IT
Microsoft ® Office Access ™ 2007 Training Choose between Access and Excel ICT Staff Development presents:
Choose between Access and Excel Right questions, right program If you’re having trouble choosing between Access and Excel, take a moment to answer an important.
Moodle (Course Management Systems). Assignments 1 Assignments are a refreshingly simple method for collecting student work. They are a simple and flexible.
Project Tracking. Questions... Why should we track a project that is underway? What aspects of a project need tracking?
SurplusSurplus Surplus Forum January 8, SurplusSurplus Changes at Surplus Presented by Margaret Chambers, Director.
© 2013 Fluor. All Rights Reserved. Process Data in SmartPlant Instrumentation Fluor’s SmartPlant Implementation Initiative By: John Dressel.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
SAM 2010 v1.5 Student Walkthrough. Initial Set Up 1.Ensure that you are connected to the Internet. 2.Launch your web browser (Internet Explorer 7 or 8,
ITGS Case Study Theatre Booking System Ayushi Pradhan.
CHAPTER TEN AUTHORING.
© 2001 Business & Information Systems 2/e1 Chapter 8 Personal Productivity and Problem Solving.
Professional IT Roles Investigate IT professional roles. Find out what each role involves, what the job entails. Identify what personal qualities are needed.
+ EOIS-CaMS DATA MIA EOIS-CaMS Data Management, Integrity and Analysis (Data MIA) Prepared by: Robyn Cook-Ritchie, RCR Consulting ManagementIntegrity Analysis.
Principles of Information Systems, Sixth Edition Systems Design, Implementation, Maintenance, and Review Chapter 13.
Software Testing Reference: Software Engineering, Ian Sommerville, 6 th edition, Chapter 20.
BA Team: Product Ownership, Analysis, and Solution Design BA Bi-Weekly Mini-meeting May 19, Acceptance Criteria Defining Success one Story.
TESTING LEVELS Unit Testing Integration Testing System Testing Acceptance Testing.
Search Engine Optimization © HiTech Institute. All rights reserved. Slide 1 What is Solution Assessment & Validation?
9 Systems Analysis and Design in a Changing World, Fourth Edition.
BSBPMG501A Manage Project Integrative Processes Manage Project Integrative Processes Project Integration Processes – Part 1 Diploma of Project Management.
Connecting with Computer Science2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering.
Principles of Information Systems, Sixth Edition 1 Systems Design, Implementation, Maintenance, and Review Chapter 13.
Software Quality Assurance SOFTWARE DEFECT. Defect Repair Defect Repair is a process of repairing the defective part or replacing it, as needed. For example,
Why Cryptosystems Fail R. Anderson, Proceedings of the 1st ACM Conference on Computer and Communications Security, 1993 Reviewed by Yunkyu Sung
Software Testing Reference: Software Engineering, Ian Sommerville, 6 th edition, Chapter 20.
Child Care Subsidy Program Online Billing Provider Training Spring 2016.
Invoices Training Presentation for Supply Chain Platform: BAE Systems May 2015.
Softheme Service Model Software Outsourcing Solutions.
In an increasingly competitive industry is certified by a recognized provider as Microsoft exam will dramatically improve your chances busy. Microsoft.
STEPS TO SUCCESS.
What is a CAT? What is a CAT?.
DCR ARB Presentation Team 5: Tour Conductor.
Basic User Site Access Training & Producing Reports
Systems Analysis and Design
To the ETS – Agreement Management Online Training Course
Using Your Assess System
Domain Matching for Contract Association Requests
AppointmentmentPeach Appointment Manager
Benefits of PowerPoint
To the ETS – Agreement Management Online Training Course
Ski Clubs and E-Commerce
NOTICE! These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Presentation transcript:

Wellbore Design - A Safety Critical Process Human and Software Factors

The Human Factor

Tubular Design Issues More complex, with increased number of HPHT wells. Higher Temperatures represent one of the main causes of this increased complexity. Stress Analyses: Temperature profiles for both Initial Conditions and Final Conditions (Load Cases) were traditionally assumed/estimated. For many challenging projects, such as HPHT wells, this is not accurate enough.

Increased Complexity Computer based models are used in performing thermal simulations Complex Wellbore Design => More Complex Computer Apps: –Harder to learn –Harder to maintain knowledge –Easier to use wrongly, to select wrong options

The Designing Engineer Must master 3 things: A.Domain Expertise B.Actual Operations – to prevent from presenting a theoretical solution without practicality C.In-depth knowledge of the Computer App that is being used in the design. Most satisfy A & B, but are deficient in C.

Deficiency in Mastering the App Most engineers tasked with designing the well are using the app only once every 6 to 12 months: –Lack of adequate training –Hard to maintain expert knowledge –Easy to make usability mistakes

The Risks of App Deficiency Computer App Results are used in real life It is here that one simulates real life situations within the world of the software. It requires all of A, B & C to make sure that the two realities are in sync. The designer must understand what the app is capable of doing and how it should be used correctly

Misusing the App - Example Simulating a Hydrocarbon Gas Production Operation, to be used for stress analysis of tubular strings. The user must choose the proper theory for modeling the hydrocarbon flow: Black Oil or VLE Incorrectly, the VLE model was used Consequently, the resulting temperatures were too low

Produced Fluid Temperature

The Actual Mistake The designer, more than likely because he did not properly understand how the app works, did not investigate the Design Parameters diagram Flow Parameters were outside the contour lines For the App employed, this causes an extrapolation during the calculations, and thus the results are less accurate.

Phase Diagram Flow Parameters were outside the contour lines

The Software Factor

Landmark Initiative In 2002 Landmark put in place a Safety Critical Systems Network of Excellence Details about this can be found in SPE papers: –SPE –SPE Landmark has a process for managing safety critical defects reported on released versions of applications.

Defect Tracking System – SC option

How will you know about it? 1.The defect will immediately be available on the LGC web site ( 2.Via the monthly Critical Defects Report, sent to clients via 3.The Product Manager in consultation with the Systems Development Director may issue a special note to clients.

WellCat Defect WellCat Severity SC PEF 21 Reported on 12/9/2002 Index: MultiString – Results – MultiString AFE Summary Current Status: In Progress Current Design allows for wrong MultiString APB pressures to be calculated PROBLEM: Incorrect (by a significant margin) MultiString AFE pressures are obtained if the final conditions of the analysis is linked to a Prod operation which has a significant annular (A annulus) pressure defined in addition to the pressure from initial conditions. This problem exists in SP3. WORKAROUND In such a situation, the user will have to edit the input file prior to calculating the MultiString AFE calculation. To do this you have to select Diagnostics from the Calculate dialog and select the Edit Input File check box. Scroll down to the IPRES cards and notice the IPRES data grouped with headers 0 2; 1 2; 2 2; 3 3, etc. Edit the second set of data labeled as 1 2. In all subsequent rows of each group, the first column represents depth, in feet, while the second column represents pressure, in psi. Make sure that the pressures at the top and at the bottom of the string are the same as the pressures shown in the FPRES card for the same group of data (1 25). You can now select OK from the input file dialog. This should give you the correct answer. Critical Bugs Report - Example

The App’s connection to Real World Input Input = actual well data + settings & selections in the app The App is composed of algorithms that are based on certain theories The App Results

When should we call a defect SC? If the Results do not correspond to the actual theory (existing within the algorithms of the app) applied with the set of input data as defined and selected in the app.

How to Catch SC Defects? SC defects can mostly be identified by proper Interpretation of results, performed by an experienced design engineer (A+B+C): –Look for Suspect results –Hand checking some results when possible The Human Factor can be key in catching Software SC defects.

The Data Base

Integrated DB Mandates Sophisticated Security Systems Integrated DB (such as EDM) are deployed at corporate level. There are Multiple Users for one large DB Each User: customized access to appropriate data Customized level of control, based on skill level

Effects of Integration in One DB No specialized standalone communities No “personalized” versions of the data All engineers using the same data Data in the DB must be of high and dependable quality.

DB Owners Must Have Excellently designed security systems Well understood ADMINISTRATION of the security – especially User Creation. This should be approved as a policy by business managers. High quality and varied training courses for DB users to continuously amend their security access as life goes on

Recommendations The design should be performed by an engineer with proper experience in all A, B, and C. Each design should be reviewed by another engineer who also has proper experience in all A, B, and C. DB - professionals, with a mix of both DB admin skills and technical domain knowledge, are needed in constructing security systems within any environment with centralized technical DB. (DB admin skills generally fall outside the domain of engineers)