Model-based system-of-systems(SOS)engineering(MBSoSE)is becoming a promising solution for the design of SoS with increasing complexity.However,bridging the models from the design phase to the simulation phase poses si...Model-based system-of-systems(SOS)engineering(MBSoSE)is becoming a promising solution for the design of SoS with increasing complexity.However,bridging the models from the design phase to the simulation phase poses significant challenges and requires an integrated approach.In this study,a unified requirement modeling approach is proposed based on unified architecture framework(UAF).Theoretical models are proposed which compose formalized descriptions from both topdown and bottom-up perspectives.Based on the description,the UAF profile is proposed to represent the SoS mission and constituent systems(CS)goal.Moreover,the agent-based simulation information is also described based on the overview,design concepts,and details(ODD)protocol as the complement part of the SoS profile,which can be transformed into different simulation platforms based on the eXtensible markup language(XML)technology and model-to-text method.In this way,the design of the SoS is simulated automatically in the early design stage.Finally,the method is implemented and an example is given to illustrate the whole process.展开更多
It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle acc...It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.展开更多
System of systems architecture(SoSA) has received increasing emphasis by scholars since Zachman ignited its flame in 1987. Given its complexity and abstractness, it is critical to validate and evaluate SoSA to ensur...System of systems architecture(SoSA) has received increasing emphasis by scholars since Zachman ignited its flame in 1987. Given its complexity and abstractness, it is critical to validate and evaluate SoSA to ensure requirements have been met.Multiple qualities are discussed in the literature of SoSA evaluation, while research on functionality is scarce. In order to assess SoSA functionality, an extended influence diagram(EID) is developed in this paper. Meanwhile, a simulation method is proposed to elicit the conditional probabilities in EID through designing and executing SoSA. An illustrative anti-missile architecture case is introduced for EID development, architecture design, and simulation.展开更多
The complexity of business and information systems(IS)alignment is a growing concern for researchers and practitioners alike.The extant research on alignment architecture fails to consider the human viewpoint,which ma...The complexity of business and information systems(IS)alignment is a growing concern for researchers and practitioners alike.The extant research on alignment architecture fails to consider the human viewpoint,which makes it difficult to embrace emergent complexity.This paper contributes to the extant literature in the following ways.First,we combine an enterprise architecture(EA)framework with a human viewpoint to address alignment issues in the architecture design phase;second,we describe a dynamic alignment model by developing a humancentered meta-model that explains first-and second-order changes and their effects on alignment evolution.This paper provides better support for the theoretical research and the practical application of dynamic alignment.展开更多
In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork model...In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints.展开更多
Currently, enterprise intelligent systems are built without expressed assumptions likely to enable harmonizing the field and correctly attributing the intelligence label to enterprise systems within the way they are b...Currently, enterprise intelligent systems are built without expressed assumptions likely to enable harmonizing the field and correctly attributing the intelligence label to enterprise systems within the way they are built. In the present paper we propose three base assumptions for an enterprise intelligent system architecture as related to 1) Cognitive Enterprise, 2) Embodied Cognition and 3) Agent Paradigm. The aim is to open up possibility to deal with intelligence at the early stages of enterprise architecture and related disciplines such as system engineering and software development. In addi-tion, we suggest possible expectations from Enterprise Intelligent Systems Architecture and propose an architectural frame based on the cognitive architecture CogAff. Compared with similar works, we noted differences in the fact that our work takes into consideration the cognitive aspect of the firm and the general aspect of intelligence.展开更多
Energy consumption has been one of the major challenges and concerns for the electronic devices design, especially in high-performance multi- and many-core systems. A highly integrated many-core chip is prone to be ex...Energy consumption has been one of the major challenges and concerns for the electronic devices design, especially in high-performance multi- and many-core systems. A highly integrated many-core chip is prone to be extremely high-power consumption that exceeds the chip's power budget set leaded by cooling, packaging and/or the capacity of the power supply. When this situation happens, various parts of the many-core chip will have to be deliberately switched off (darkened) so that the chip is still in compliance with its power budget, which is referred as "dark silicon". Therefore, the research on energy efficient computing is a current trend and will continue to be an active area in the coming years.展开更多
This paper investigates the distributed model predictive control(MPC)problem of linear systems where the network topology is changeable by the way of inserting new subsystems,disconnecting existing subsystems,or merel...This paper investigates the distributed model predictive control(MPC)problem of linear systems where the network topology is changeable by the way of inserting new subsystems,disconnecting existing subsystems,or merely modifying the couplings between different subsystems.To equip live systems with a quick response ability when modifying network topology,while keeping a satisfactory dynamic performance,a novel reconfiguration control scheme based on the alternating direction method of multipliers(ADMM)is presented.In this scheme,the local controllers directly influenced by the structure realignment are redesigned in the reconfiguration control.Meanwhile,by employing the powerful ADMM algorithm,the iterative formulas for solving the reconfigured optimization problem are obtained,which significantly accelerate the computation speed and ensure a timely output of the reconfigured optimal control response.Ultimately,the presented reconfiguration scheme is applied to the level control of a benchmark four-tank plant to illustrate its effectiveness and main characteristics.展开更多
More than two decades ago, object-oriented representation of AEC (architecture engineering and construction) projects started to offer the promise of seamless communication of semantic data models between computer-b...More than two decades ago, object-oriented representation of AEC (architecture engineering and construction) projects started to offer the promise of seamless communication of semantic data models between computer-based systems used from the design stage to the operation of the facilities. BIM (building information modelling) emerged and appeared as a means to store all relevant data generated during the life-cycle of the facilities. But this upstream view of the built environment, arising from the design and construction stages, extended to the downstream operations where building and industrial facilities appeared more and more as huge dynamic data producers and concentrators while being operated. This created new challenges leading to what is referred to as ISCs (intelligent and smart constructions). The current state of the art is that final constructions still contain various and increasingly versatile control and service systems, which are hardly standardised, and not interconnected among themselves. Monitoring, maintenance and services are done by specialised companies, each responsible of different systems, which are relying on customised software and techniques to meet specific user needs and are based on monolithic applications that require manual configuration for specific uses, maintenance and support. We demonstrate in this paper that the early promises of integration across the actors and along the life-time of facilities have gone a long way but will only be delivered through enhanced standardisation of computerized models, representations, services and operations still not yet fully accomplished 25 years after work started.展开更多
This work proposes a new design and architecture of a flexible biaxial solar tracker. A new approach was adopted with the use of a two separated cards, the smart and power card in a scalable concept. This module allow...This work proposes a new design and architecture of a flexible biaxial solar tracker. A new approach was adopted with the use of a two separated cards, the smart and power card in a scalable concept. This module allows a more saving of energy in comparison with the fixed systems for PV (photovoltaic) application and allows hire performances for CSP (concentrated solar power) systems. It provides a significant added value for higher power applications in comparison with the existing system. The developed sun tracking system is autonomous, flexible, scalable and low cost system.展开更多
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems...Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.展开更多
The Internet is playing an important role in information retrieval, and additionally industrial process manipulation. This paper describes an approach to writing requirements specifications for Internet-based control ...The Internet is playing an important role in information retrieval, and additionally industrial process manipulation. This paper describes an approach to writing requirements specifications for Internet-based control systems, from which architectures can be derived. The requirements specifications developed are described in terms of a functional model, which is then extended to form an information architecture. Distinct from the functional model, the information architecture provides an indication as to the architectural structure of subsequently developed Internet-based control systems. Three general control structures are generated from the analysis of an information architecture. An integrated-distributed architecture is derived as an ideal implementation, in which a control system is linked to the Internet at all levels of a control system hierarchy.展开更多
Deepfake has emerged as an obstinate challenge in a world dominated by light.Here,the authors introduce a new deepfake detection method based on Xception architecture.The model is tested exhaustively with millions of ...Deepfake has emerged as an obstinate challenge in a world dominated by light.Here,the authors introduce a new deepfake detection method based on Xception architecture.The model is tested exhaustively with millions of frames and diverse video clips;accuracy levels as high as 99.65%are reported.These are the main reasons for such high efficacy:superior feature extraction capabilities and stable training mechanisms,such as early stopping,characterizing the Xception model.The methodology applied is also more advanced when it comes to data preprocessing steps,making use of state-of-the-art techniques applied to ensure constant performance.With an ever-rising threat from fake media,this piece of research puts great emphasis on stringent memory testing to keep at bay the spread of manipulated content.It also justifies better explanation methods to justify the reasoning done by the model for those decisions that build more trust and reliability.The ensemble models being more accurate have been studied and examined for establishing a possibility of combining various detection frameworks that could together produce superior results.Further,the study underlines the need for real-time detection tools that can be effective on different social media sites and digital environments.Ethics,protecting privacy,and public awareness in the fight against the proliferation of deepfakes are important considerations.By significantly contributing to the advancements made in the technology that has actually advanced detection,it strengthens the safety and integrity of the cyber world with a robust defense against ever-evolving deepfake threats in technology.Overall,the findings generally go a long way to prove themselves as the crucial step forward to ensuring information authenticity and the trustworthiness of society in this digital world.展开更多
Offshore Nile Delta gas reservoirs are dominated by slope-channel systems of Plio-Pleistocene age. High-quality, three-dimensional seismic imaging has significantly helped in defining the geomorphology and architectur...Offshore Nile Delta gas reservoirs are dominated by slope-channel systems of Plio-Pleistocene age. High-quality, three-dimensional seismic imaging has significantly helped in defining the geomorphology and architectures of these channels. Integrating seismic, logs and core data from four wells resulted in understanding of different stages of channel development and reservoir quality. The studied reservoirs that are largely controlled by episodes of transgressive-regressive events resulted in deposition of fine grained sediment and shale. Sienna channel complex consists of unconfined channel system with clearly defined development stages. The stages include amalgamated or stacked channels followed by channel abandonment phases and local flooding events. The depositional pattern continued through the Late Pliocene-Pleistocene. SimSat-P1 and SimSat-P2 reservoirs are characterized by isolated sand bodies, most probably relics of fan depositional setting. The depositional scenario that is largely controlled by successive transgression and flooding events resulted in deposition of interbedded, sheet-like, fine grained sediment and shale.展开更多
基金Fifth Electronic Research Institute of the Ministry of Industry and Information Technology(HK07202200877)Pre-research Project on Civil Aerospace Technologies of CNSA(D020101)+2 种基金Zhejiang Provincial Science and Technology Plan Project(2022C01052)Frontier Scientific Research Program of Deep Space Exploration Laboratory(2022-QYKYJHHXYF-018,2022-QYKYJH-GCXD-001)Zhiyuan Laboratory(ZYL2024001)。
文摘Model-based system-of-systems(SOS)engineering(MBSoSE)is becoming a promising solution for the design of SoS with increasing complexity.However,bridging the models from the design phase to the simulation phase poses significant challenges and requires an integrated approach.In this study,a unified requirement modeling approach is proposed based on unified architecture framework(UAF).Theoretical models are proposed which compose formalized descriptions from both topdown and bottom-up perspectives.Based on the description,the UAF profile is proposed to represent the SoS mission and constituent systems(CS)goal.Moreover,the agent-based simulation information is also described based on the overview,design concepts,and details(ODD)protocol as the complement part of the SoS profile,which can be transformed into different simulation platforms based on the eXtensible markup language(XML)technology and model-to-text method.In this way,the design of the SoS is simulated automatically in the early design stage.Finally,the method is implemented and an example is given to illustrate the whole process.
文摘It’s possible for malicious operators to seize hold of electrical control systems, for instance, the engine control unit of driverless vehicles, from various vectors, e.g. autonomic control system, remote vehicle access, or human drivers. To mitigate potential risks, this paper provides the inauguration study by proposing a theoretical framework in the physical, human and cyber triad. Its goal is to, at each time point, detect adversary control behaviors and protect control systems against malicious operations via integrating a variety of methods. This paper only proposes a theoretical framework which tries to indicate possible threats. With the support of the framework, the security system can lightly reduce the risk. The development and implementation of the system are out of scope.
基金supported by the National Natural Science Foundation of China(71571189)
文摘System of systems architecture(SoSA) has received increasing emphasis by scholars since Zachman ignited its flame in 1987. Given its complexity and abstractness, it is critical to validate and evaluate SoSA to ensure requirements have been met.Multiple qualities are discussed in the literature of SoSA evaluation, while research on functionality is scarce. In order to assess SoSA functionality, an extended influence diagram(EID) is developed in this paper. Meanwhile, a simulation method is proposed to elicit the conditional probabilities in EID through designing and executing SoSA. An illustrative anti-missile architecture case is introduced for EID development, architecture design, and simulation.
文摘The complexity of business and information systems(IS)alignment is a growing concern for researchers and practitioners alike.The extant research on alignment architecture fails to consider the human viewpoint,which makes it difficult to embrace emergent complexity.This paper contributes to the extant literature in the following ways.First,we combine an enterprise architecture(EA)framework with a human viewpoint to address alignment issues in the architecture design phase;second,we describe a dynamic alignment model by developing a humancentered meta-model that explains first-and second-order changes and their effects on alignment evolution.This paper provides better support for the theoretical research and the practical application of dynamic alignment.
基金supported by the National Natural Science Foundation of China(61272011)
文摘In order to solve the problem that the ripple-effect analy- sis for the operational architecture of air defense systems (OAADS) is hardly described in quantity with previous modeling approaches, a supernetwork modeling approach for the OAADS is put for- ward by extending granular computing. Based on that operational units and links are equal to different information granularities, the supernetwork framework of the OAADS is constructed as a “four- network within two-layer” structure by forming dynamic operating coalitions, and measuring indexes of the ripple-effect analysis for the OAADS are given combining with Laplace spectral radius. In this framework, via analyzing multidimensional attributes which inherit relations between operational units in different granular scales, an extended granular computing is put forward integrating with a topological structure. Then the operation process within the supernetwork framework, including transformation relations be- tween two layers in the vertical view and mapping relations among functional networks in the horizontal view, is studied in quantity. As the application case shows, comparing with previous modeling approaches, the supernetwork model can validate and analyze the operation mechanism in the air defense architecture, and the ripple-effect analysis can be used to confirm the key operational unit with micro and macro viewpoints.
文摘Currently, enterprise intelligent systems are built without expressed assumptions likely to enable harmonizing the field and correctly attributing the intelligence label to enterprise systems within the way they are built. In the present paper we propose three base assumptions for an enterprise intelligent system architecture as related to 1) Cognitive Enterprise, 2) Embodied Cognition and 3) Agent Paradigm. The aim is to open up possibility to deal with intelligence at the early stages of enterprise architecture and related disciplines such as system engineering and software development. In addi-tion, we suggest possible expectations from Enterprise Intelligent Systems Architecture and propose an architectural frame based on the cognitive architecture CogAff. Compared with similar works, we noted differences in the fact that our work takes into consideration the cognitive aspect of the firm and the general aspect of intelligence.
文摘Energy consumption has been one of the major challenges and concerns for the electronic devices design, especially in high-performance multi- and many-core systems. A highly integrated many-core chip is prone to be extremely high-power consumption that exceeds the chip's power budget set leaded by cooling, packaging and/or the capacity of the power supply. When this situation happens, various parts of the many-core chip will have to be deliberately switched off (darkened) so that the chip is still in compliance with its power budget, which is referred as "dark silicon". Therefore, the research on energy efficient computing is a current trend and will continue to be an active area in the coming years.
基金the National Natural Science Foundation of China(61833012,61773162,61590924)the Natural Science Foundation of Shanghai(18ZR1420000)。
文摘This paper investigates the distributed model predictive control(MPC)problem of linear systems where the network topology is changeable by the way of inserting new subsystems,disconnecting existing subsystems,or merely modifying the couplings between different subsystems.To equip live systems with a quick response ability when modifying network topology,while keeping a satisfactory dynamic performance,a novel reconfiguration control scheme based on the alternating direction method of multipliers(ADMM)is presented.In this scheme,the local controllers directly influenced by the structure realignment are redesigned in the reconfiguration control.Meanwhile,by employing the powerful ADMM algorithm,the iterative formulas for solving the reconfigured optimization problem are obtained,which significantly accelerate the computation speed and ensure a timely output of the reconfigured optimal control response.Ultimately,the presented reconfiguration scheme is applied to the level control of a benchmark four-tank plant to illustrate its effectiveness and main characteristics.
文摘More than two decades ago, object-oriented representation of AEC (architecture engineering and construction) projects started to offer the promise of seamless communication of semantic data models between computer-based systems used from the design stage to the operation of the facilities. BIM (building information modelling) emerged and appeared as a means to store all relevant data generated during the life-cycle of the facilities. But this upstream view of the built environment, arising from the design and construction stages, extended to the downstream operations where building and industrial facilities appeared more and more as huge dynamic data producers and concentrators while being operated. This created new challenges leading to what is referred to as ISCs (intelligent and smart constructions). The current state of the art is that final constructions still contain various and increasingly versatile control and service systems, which are hardly standardised, and not interconnected among themselves. Monitoring, maintenance and services are done by specialised companies, each responsible of different systems, which are relying on customised software and techniques to meet specific user needs and are based on monolithic applications that require manual configuration for specific uses, maintenance and support. We demonstrate in this paper that the early promises of integration across the actors and along the life-time of facilities have gone a long way but will only be delivered through enhanced standardisation of computerized models, representations, services and operations still not yet fully accomplished 25 years after work started.
文摘This work proposes a new design and architecture of a flexible biaxial solar tracker. A new approach was adopted with the use of a two separated cards, the smart and power card in a scalable concept. This module allows a more saving of energy in comparison with the fixed systems for PV (photovoltaic) application and allows hire performances for CSP (concentrated solar power) systems. It provides a significant added value for higher power applications in comparison with the existing system. The developed sun tracking system is autonomous, flexible, scalable and low cost system.
基金funded by the National Natural Science Foundation of China(62072056,62172058)the Researchers Supporting Project Number(RSP2023R102)King Saud University,Riyadh,Saudi Arabia+4 种基金funded by the Hunan Provincial Key Research and Development Program(2022SK2107,2022GK2019)the Natural Science Foundation of Hunan Province(2023JJ30054)the Foundation of State Key Laboratory of Public Big Data(PBD2021-15)the Young Doctor Innovation Program of Zhejiang Shuren University(2019QC30)Postgraduate Scientific Research Innovation Project of Hunan Province(CX20220940,CX20220941).
文摘Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems.
基金This work was supported in part by the EPSRC under Grant GR/R13371/01.
文摘The Internet is playing an important role in information retrieval, and additionally industrial process manipulation. This paper describes an approach to writing requirements specifications for Internet-based control systems, from which architectures can be derived. The requirements specifications developed are described in terms of a functional model, which is then extended to form an information architecture. Distinct from the functional model, the information architecture provides an indication as to the architectural structure of subsequently developed Internet-based control systems. Three general control structures are generated from the analysis of an information architecture. An integrated-distributed architecture is derived as an ideal implementation, in which a control system is linked to the Internet at all levels of a control system hierarchy.
文摘Deepfake has emerged as an obstinate challenge in a world dominated by light.Here,the authors introduce a new deepfake detection method based on Xception architecture.The model is tested exhaustively with millions of frames and diverse video clips;accuracy levels as high as 99.65%are reported.These are the main reasons for such high efficacy:superior feature extraction capabilities and stable training mechanisms,such as early stopping,characterizing the Xception model.The methodology applied is also more advanced when it comes to data preprocessing steps,making use of state-of-the-art techniques applied to ensure constant performance.With an ever-rising threat from fake media,this piece of research puts great emphasis on stringent memory testing to keep at bay the spread of manipulated content.It also justifies better explanation methods to justify the reasoning done by the model for those decisions that build more trust and reliability.The ensemble models being more accurate have been studied and examined for establishing a possibility of combining various detection frameworks that could together produce superior results.Further,the study underlines the need for real-time detection tools that can be effective on different social media sites and digital environments.Ethics,protecting privacy,and public awareness in the fight against the proliferation of deepfakes are important considerations.By significantly contributing to the advancements made in the technology that has actually advanced detection,it strengthens the safety and integrity of the cyber world with a robust defense against ever-evolving deepfake threats in technology.Overall,the findings generally go a long way to prove themselves as the crucial step forward to ensuring information authenticity and the trustworthiness of society in this digital world.
文摘Offshore Nile Delta gas reservoirs are dominated by slope-channel systems of Plio-Pleistocene age. High-quality, three-dimensional seismic imaging has significantly helped in defining the geomorphology and architectures of these channels. Integrating seismic, logs and core data from four wells resulted in understanding of different stages of channel development and reservoir quality. The studied reservoirs that are largely controlled by episodes of transgressive-regressive events resulted in deposition of fine grained sediment and shale. Sienna channel complex consists of unconfined channel system with clearly defined development stages. The stages include amalgamated or stacked channels followed by channel abandonment phases and local flooding events. The depositional pattern continued through the Late Pliocene-Pleistocene. SimSat-P1 and SimSat-P2 reservoirs are characterized by isolated sand bodies, most probably relics of fan depositional setting. The depositional scenario that is largely controlled by successive transgression and flooding events resulted in deposition of interbedded, sheet-like, fine grained sediment and shale.