2007
DOI: 10.1007/s11770-007-0042-7
|View full text |Cite
|
Sign up to set email alerts
|

Remote wireless transmission and error recovery of log data

Abstract: Remote transmission of log data is an urgent problem for service companies. Remote transmission technology of log data here refers to both the transmission solution in combination with the CifNet multi-well data management system to automate the transmission, storage, management, and retrieval of log data to reduce turn-over time. It is an applied digital signature technology to implement breakpoint transmission and error recovery and ensure the effectiveness and reliability of log data transmission.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…The bottom layer of CIFLog platform adopts CIFPlus data storage format [29,30]. The bottom layer of this format uses table structure and data block to store data, in which the physical structure takes 4096 bytes as its unit, and each 4096 bytes is called a record block.…”
Section: Analysis Model Of Augmented-dimensional Display Of Crossplotsmentioning
confidence: 99%
“…The bottom layer of CIFLog platform adopts CIFPlus data storage format [29,30]. The bottom layer of this format uses table structure and data block to store data, in which the physical structure takes 4096 bytes as its unit, and each 4096 bytes is called a record block.…”
Section: Analysis Model Of Augmented-dimensional Display Of Crossplotsmentioning
confidence: 99%
“…10 patent [10], remote wireless transmission [11][12][13], etc. These systems improve the downhole transmission rate up to Megabit.…”
Section: Open Access Cnmentioning
confidence: 99%
“…P2P protocols are usually blocked by firewalls on enterprise networks due to their known use for illegal file sharing and identity theft. However, P2P communication can be tunneled over an authorized protocol (e.g., HTTP) to cloak/mask its identity in order to penetrate the firewall [7]. In addition, a more clandestine way to conduct espionage over the enterprise network is to use a covert channel Figure 2).…”
Section: Example Threatsmentioning
confidence: 99%