In conventional oil and gas operations, a wellbore is drilled to a desired path with a thousand lengths of drill string, which include drill pipe and a bottom hole assembly (BHA). Throughout the drilling process, several operational parameters are set to affect Rate of Penetration (ROP). These parameters may include surface weight on bit (WOB), rotations per minute (RPM), flow rate, standard pipe pressure, etc. The drilling performance and true downhole drilling parameters may be monitored during the drilling operation to ensure the drilling is in the right direction under correct safety protocols. The attainment of a higher ROP is sought as it can lead to lower overall drilling costs and faster production time.
ROP optimization is one of the most challenging tasks in drilling a wellbore. Drilling mechanics involves numerous quasi-static and dynamic processes that are non-local, non-linear, coupled, with non-trivial boundary conditions (bit-rock interface, BHA-well bore contacts, etc.). In most cases, surface measurements represent the primary source of data acquisition but are commonly associated with low sampling rates, poor resolution, and noisy, unfiltered data. Additionally, any downhole measurements are subject to telemetry bandwidth and latency inherent for any downhole to surface communications.
Implementations of the disclosure may be better understood by referencing the accompanying drawings.
The description that follows includes example systems, methods, techniques, and program flows that embody aspects of the disclosure. However, it is understood that this disclosure may be practiced without these specific details. In some instances, well-known instruction instances, protocols, structures, and techniques have not been shown in detail in order not to obfuscate the description.
Example implementations may improve drilling efficiency of drilling a wellbore based on estimating downhole (at-bit) parameters (such as at bit WOB, at bit torque on bit (TOB), depth of cut, etc.) by using measurements made at the surface of the wellbore. These estimated downhole (at-bit) parameters may then be used to determine the drilling efficiency of the drilling of the wellbore using a bit-rock interaction model to estimate true at bit drilling parameters. In some implementations, drilling parameter adjustments may be recommended and/or performed in response to this downhole estimation.
Example implementations may map out a signature of the drilling system response, wherein the signature may be defined by the relationship between the input and output parameters. In some implementations, the signature may be defined by varying the input parameters. Examples of the input parameters may include a weight on bit (WOB), hook load, rotations per minute (RPM), flow rate of the drilling mud, etc. Examples of output parameters may include rate of penetration (ROP), torque on bit (TOB), (and surface torque), stand pipe pressure etc. As further described below, input and output parameters at a surface of the wellbore may be used to infer measurements of parameters at or near the drill bit (such as WOB, TOB, rate of penetration, etc.).
Example implementations may be data driven and supported by simple yet robust models. Example operations may process and analyze the data in real-time to estimate the at-bit parameters and may provide a reasonable recommendation to improve drilling efficiency. In some implementations, recommendations to improve the drilling efficiency may be provided and/or actually implemented. For example, drilling parameters of a current drilling operation may be changed based on these recommendations. The at-bit parameters may be input into the models of the drilling operation. The models may relate drilling operations parameters measured at the surface (such as surface WOB, rotations of the drill string per unit of time (e.g., rotations per minute (RPM)), drilling fluid flow rate, etc.) to performance variables (such as rate of penetration (ROP), torque on bit (TOB), standpipe pressure (SPP), etc.) as a function of wellbore geometry, attributes of the drill string, attributes of the bottom hole assembly (BHA), attributes of the drill bit, properties of the rock being drilled, properties of the drilling fluid, etc.
The raw data analysis may include filtering, calibration, and correction of several spurious effects. These operations may be needed to provide a reliable estimate of the at-bit parameters. The real time analysis may attempt to identify performance limitations, including bit wear, bit cleaning problem, vibrations, and bit or BHA design, etc. Some implementations may rely on specific drilling events (such as tagging bottom when the drill bit is lowered until its contact the bottom of the wellbore and start propagating the wellbore) to map the bit-rock drilling signature (“drilling signature”). Some implementations may also track while drilling how a drill bit response diverges from either or both the current drilling signature or last drilling signature. In some implementations, if there is a divergence, a new mapping test may be performed (take off bottom and tag again or drill off). The analysis may also track how key model parameters evolve over time from stand to stand (such as drilling efficiency, relative state of wear, etc.).
In some implementations, objectives of post job analysis may include (1) comparison of performances objectively after a thorough quality control of the data and (2) relating drilling performance to other measurements related to rock properties (wireline data, core data) or related to bit wear (dull grade), downhole vibrations (downhole recorded accelerations), (3) documenting know-how with objective facts but also tune real time algorithms settings.
Example implementations may quantitatively determine the drilling efficiency through statistical analysis of bit-rock drilling response through surface drilling operation data. The performance of a drilling operation (typically characterized by its drilling speed) may be influenced by one or more factors. These factors may include both surface drilling parameters (such as WOB, RPM, flow rate, etc.) and downhole at bit situations (such as true at bit WOB transmitted to the bit, bit state of wear, bit cleaning efficiency, vibrations, etc.).
Thus, example implementations may be in contrast to conventional approaches to determining drilling efficiency that are based on Mechanical Specific Energy (MSE) and/or Drilling Specific Energy (DSE). These conventional approaches determine the amount of work performed for a given drilling operation. This amount of work is divided by the volume of rock removed for a given unit of time. This provides the energy needed to remove this volume of rock. However, these conventional approaches (in contrast to example implementations) are unable to identify the underlying problem that may be causing the change in drilling efficiency. For example, these conventional approaches (in contrast to example implementations) are not able to identify if the change in drilling efficiency is due to insufficient cleaning downhole, changes in the type of rock being drilled, the drill bit is wearing out, etc. These conventional approaches may only identify that more energy is needed to remove a given volume of rock for a given unit of time. Additionally, instead of using bit-rock interaction models, these conventional approaches are just looking at a final value that is often compared to an arbitrary threshold value derived from wireline logs. Therefore, these conventional approaches are unable to determine how or why the MSE or DSE arrived at their final values, without relying on extra-assumptions, observations or data.
In contrast, example implementations may use an actual bit rock interaction model to derive various components and may use data driven techniques to ascertain the current level of drilling performance. Example implementations may estimate actual at-bit parameters but also may periodically check against the fitted model for any variation from the current actual bit rock interaction model.
Thus, some implementations may use the interaction between the drill bit and the rock of the surrounding formation into which the wellbore is being drilled (the bit-rock interaction) to determine drilling efficiency. The bit-rock interaction may be defined on different drilling characteristics (such as a depth of cut, a weight-on-bit (WOB), a torque-on-bit (TOB), etc.).
Some implementations may include a ROP optimization to improve downhole drilling performance in both real-time and post-analysis settings. Some implementations may be used to assess the drilling efficiency and provide a comprehensive performance index in terms of performance targets, limits, dysfunctions, and recommendations for improving overall performance.
Some implementations may quantify the drilling efficiency using a performance index (PI). Some implementations may derive the drilling performance index (PI) based on a drill bit-rock interface response (bit response). Building upon the assessment of drilling efficiency through the analysis of the bit response, example implementations may also provide a quantitative index. The utilization of a quantitative index may enhance the robustness and reliability of the evaluation process, as such utilization may allow for a systematic and data-driven analysis of the drilling performance. Example implementations may represent a significant advancement in the field, offering a real-time and a more comprehensive and accurate understanding of the efficiency of drilling operations based on the parameters derived from the bit response.
A computer 132 at the surface of the wellbore 116 may detect various drilling operational parameters at the surface of the drilling operation. Examples of such drilling operational parameters detected at the surface may include WOB, rotations of the drill string per unit of time (such as rotations per minute (RPM), a flow rate of the drilling fluid flow into and/or out of the wellbore, etc.). An example of the computer 132 is depicted in
A logging tool 126 can be integrated into a bottom hole assembly (BHA) 128 near the drill bit 114. As the drill bit 114 extends the wellbore 116 through the formations 118, the BHA 128 may collect measurements relating to various formation properties and information regarding tool orientation and various other drilling conditions.
Example implementations may use different drilling operational parameters at the surface of a wellbore being drilled to determine parameters downhole at the drill bit used for drilling the wellbore (at-bit parameters). Evaluation of a drilling efficiency of the drilling of the wellbore may be based on these at-bit parameters. Example drilling operational parameters may include various operational parameters at the surface of the wellbore being drilled. For example, the drilling operational parameters may include hook load (H), rate of penetration at the surface of the wellbore (ROP) (Vs), a rotations per unit of time (e.g., RPM), a surface Rate of Penetration (ROP) at the surface (Vs), etc. Example at bit parameters may include different parameters at the drill bit (such as Weight on Bit (WOB) at the drill bit, ROP at the bit (Vb), Torque on Bit (TOB), a depth of cut, etc.
To illustrate,
Also as shown, surface measurements may be estimated—including a hook load (H) 202, a surface torque, a rotations per unit of time (e.g., RPM), and a surface Rate of Penetration (ROP) at the surface (Vs) 204. Additionally, the at bit parameters may be determined—including Weight on Bit (WOB) (or W) 208, ROP at the bit (Vb) 206, Torque on Bit (TOB), and a depth of cut.
The bit-rock interface (the interface between the drill bit and the rock being drilled) may be modeled by a relationship between axial force (weight-on-bit) and depth of cut (equal to ROP divided by RPM) (as defined by Equation 1):
and db is depth of cut at the bit
τ is the time, and Ω is the RPM at the bit.
The depth of cut ds at surface and db at the bit and defined by Equation (2):
A change
In the WOB (W) in relation to the change in depth of cut d (depth of cut at the bit, we drop the subscript for the sake of simplicity) may be defined by either Equations (3) and (4)—depending on whether the depth of cut (d) is less than or greater than d(which is the depth of cut where the drilling operations move from Regime I to Regime II (which is further described below)):
where ε is a measure of the rock apparent strength (function of the rock strength, mud and pore pressure as well as bit design). The number ζ (characterizes ratio between weight and torque for an ideally sharp bit (no chamfer nor wear flat at the tip of the cutting elements). The parameter Scharacterizes the relation between weight-on-bit and depth of cut in regime I, and is controlled by not only the apparent rock strength but also the bit state of wear (wear flat or chamfer), S
>ζε.
Equation (1) may be solved (combined with torque vs depth of cut and torque vs weight-on-bit relations) to derive an estimate of the bit rock interaction model parameters. In particular, the following may be solved: 1) w that relates to the bit state of wear and 2) w
or onset of poor bit cleaning (founder point) And 3) the apparent rock strength, ε
Example operations for performing a drilling efficiency evaluation are now described.
At block 302, drilling of the wellbore is calibrated while tripping the drill string in hole. For example, with reference to
At block 304, tagging bottom evaluation is performed. For example, with reference to
Data of different drilling attributes may be measured during the tag bottom event. To illustrate,
In some implementations, in order to harmonize drill bits of different diameters and geometry (such as size, shape, quantity of cutting blades, etc.), a further scaling may be implemented—whereby the measured value of WOB and TOB at surface is converted to scaled WOB(w, w
, w
(which are further described below)) and scaled TOB(t, t
, t
(which are further described below)). To accomplish this the actually bit geometry may be transformed to an equivalent bit with an equivalent single cutter of unit length. The measured parameters of WOB and TOB are now transformed to scaled WOB (which is the equivalent vertical force per unit length) and scaled TOB (which is the horizontal force per unit length). The computer 132 may calculate this scaling based on actual geometry of actual tools used. In this way results between different drilling operations may be compared and assessed in harmonized way.
At block 306, the torque-weight-depth of cut (t-w-d) signature is mapped based on tagging bottom evaluation to create the t-w-d signature for the drilling operation. For example, with reference to
In particular, in some implementations, a drilling operation may be postulated into two independent processes—frictional contact and cutting. Therefore, the torque on the drill string (t) and WOB (w) may be decomposed as follows in Equations (5) and (6), respectively:
The cutting components may be related to the depth of cut (d) based on Equations (8) and (9) as follows:
With the known ζ and μγ, the bit response may be defined by Equations (10)-(13) as follows:
wherein β=μγζ
In some implementations, the bit response model may assume that there exist three distinct operating regimes (Regime I, Regime II, and Regime III) that may be directly associated with the contact force with the depth of cut.
To illustrate,
In Regime I 806, the initial drilling may be characterized by a progressive increase of force with depth of cut. In Regime I 806, the contact force (wf) increases with depth of cut until conformal contact between the wear flat or chamfers and the rock occurs (onset of regime II). In Regime II 808, the contact forces may be fully mobilized and may not be increased any more since the contact force has reached a maximum value. Also, in Regime II 808, the response is incrementally similar to the response of an ideally sharp tool. The offset (or intercept along the w axis) or onset of regime II are controlled by the bit state of wear. In some implementations, it is necessary to keep the drilling operation in Regime II 808 to realize the optimized result. As shown, in the Regime II 808, a small increase in the weight on bit 804 results in a large increase in the depth of cut 802.
In Regime III 810, there may be a lack of uniqueness in the bit response. In Regime III 810, there is a path A and a path B. With the path A, the drilling operation may be under kinematic control—with the contact force increasing rapidly while depth of cut increasing slowly. With the path B, the drilling operation may be under force control—with the depth of cut decreasing as the contact force is increasing. In some implementations, path B may be a result of lack of cleaning of cuttings at or near the drill bit. The combinations of μ, γ, and ε represent the slope of different Regimes in the t-w-d space, which may be further employed to determine the specific regime the current drilling operations are within (as shown in
Also shown in the graph 800 of is the depth of cut where the drilling operations move from the Regime I 806 to the Regime II 808. Additionally, w
may be defined as the amount of WOB needed to mobilize the drill bit to overcome the frictional component. The w
may be defined as the amount of WOB corresponding to d
, which is the depth of cut where the drilling operations move from the Regime II 808 to the Regime III 810 (where there may not be sufficient cleaning of the cuttings at or near the drill bit).
The Regime I 806 may be defined as the frictional contact regime, which ends at w. The WOB (wf
) is the amount of weight applied to the drill bit that is carried by the wear flat. The slope (S
is the slope in the Regime I 806. In the Regime II 808, the slope of the line ζε (E. This slope of the line may also represent a measure of the rock strength (rock's resistance to drilling).
Based on the determined drilling efficiency derived from the calculated bit-response model, a corresponding decision may be made to improve the drilling performance. If it is detected that the drilling is in the Regime I 806, WOB may be increased to move the drilling into the Regime II 808 to provide a better ROP. If it is detected that the drilling is within the Regime II 808, then the current parameter settings may be maintained or adjusted to move closer to the founder point. If it is detected that the drilling is within the Regime III 810, then at least one of the WOB or the RPM may be decreased to move the drilling operation back to the Regime II 808. Alternatively or in addition, the flow rate of the drilling fluid in the wellbore may be increased to move the drilling operation back to the Regime II 808.
Returning to the operations of the flowchart 300, after mapping the t-w-d signature at block 306, operations continue at block 308.
At block 308, key model parameters (such as rock strength (ζε), relative state of wear, founder point, etc.) are estimated and the bit response model is built. For example, with reference to ) from the point along the x-axis 804 of the graph 800 of
−d
. In some implementations, the w
(WOB), the t
(TOB), and the expected d
(DOC) (the most optimal parameters for drilling) may be determined from the founder point.
At block 310, the drilling response is constructed in the space of operating parameters (WOB, RPM) with isoline of ROP based on the bit response model. For example, with reference to
To illustrate,
The graph 1100 also includes a number of ROP lines 1106-1118. The graph 1100 also includes a line 1126 which is the top drive limit. The graph 1100 includes a line 1128 which is the drill string buckling limit. The graph 1100 also includes the Regime III 1130, the Regime II 1132, and Regime I 1134. As shown in the graph 1100, above a certain WOB, the drilling operation falls into the Regime III 1130 where the bit response is different (less efficient) than in the Regime II 1132. The graph 1100 also includes a region 1155 where there may be lateral vibration of the drill string. As shown, the region 1155 generally occurs where the RPMs are high and the WOB is low. The graph 1100 includes a region 1157 where there may be torsional vibration of the drill string. As shown, the region 1157 generally occurs where the RPMs are relatively lower and WOB higher.
At block 312, the wellbore is drilled for a defined depth. For example, with reference to
At block 314, a determination is made of whether the response to drilling the wellbore diverges from the previous t-w-d signature (but not beyond a divergence threshold). For example, with reference to
At block 316, the current bit response model is adjusted based on estimated new key model parameters. For example, with reference to
At block 318, a determination is made of whether the response to drilling the wellbore diverges beyond a divergence threshold. For example, with reference to
At block 320, a drill off test (hook position on surface is locked and the system let to drill) or a new tag bottom event is performed to derive the new bit-rock response model from drill bit. For example, with reference to
Operations continue at the flowchart 400 of
At block 402, the drilling efficiency of the drilling of the wellbore for the defined depth is determined. For example, with reference to
At block 404, a determination is made of whether the drilling operation should be updated based on the drilling efficiency. For example, with reference to
At block 406, the drilling operation is updated. For example, with reference to
At block 408, a determination is made of whether drilling of the wellbore is complete. For example, with reference to
If the drilling of the wellbore is not complete, operations of the flowchart 400 continue at transition B, which continues at transition B of the flowchart 300, which continues at block 312, where the wellbore is again drilled for a defined depth. If the drilling of the wellbore is complete, operations of the flowchart 400 are complete.
Thus, once the calibration has been completed, the tag bottom event may be expected to occur right after a connection. From the data recorded during this event, the bit-rock interface model parameters may be derived—which allows for identification of the extent of the drilling regimes (I inefficient, II efficient, III founder) and relate weight-on-bit, torque-on-bit and rate of penetration (or depth of cut). From the model parameters, isoline of constant rate of penetration in the space of operating parameters (WOB-RPM) may be constructed, in which system and context limiters such as top drive limit, buckling limit, vibrations zones are added (as shown in
Also, once drilling starts, the drilling response may be monitored while the stand is drilled (drilling for a defined depth) against the response derived during the tag bottom event. If the response drifts too far from the response, one or more drilling parameters (e.g., WOB, RPM, flow rate of drilling fluid, etc.) may be adjusted to assess the drift: change of formation, founder point, etc. Then from stand to stand, the performances may be tracked by interpreting variations in the system response to infer slow variation in system response (wear, hole cleaning, bit cleaning, etc.).
Example implementations may rely on specific drilling events—tagging bottom, drill off, etc.—to map the bit-rock drilling signature, and track while drilling how the response diverges from the current/last signature, requesting then the driller to run a new “mapping test” (drill off). The analysis may also track how key model parameters evolve over time (from stand to stand) such as drilling efficiency, relative state of wear, etc.
In some implementations, the output from the tag bottom event 1202 may include values of drilling parameters (such as hook load, torque, and ROP) over time during a tag bottom event 1202 when the drill bit interacts with a bottom of the wellbore. In this example, the output of the tag bottom event 1202 includes a graph 1208 of the hook load over time, a graph 1210 of the torque of the drill string over time, and a graph 1212. Another example of the graph 1208 is depicted in
The deriving of the bit-rock model parameters 1204 may include graphs 1214-1218. The graph 1214 may map the torque on bit (along a y-axis) to weight on bit (WOB) (along an x-axis) across Regions I, II, and III. An example of the graph 1214 is depicted in that relates to the bit state of wear, w
or onset of poor bit cleaning (founder point), a measure of apparent rock strength, etc.). In some implementations, a Markov Chain based method may be used to derive a probability distribution of the model parameters (mean and standard deviation).
With model parameters, a map 1220 of the drilling response (ROP) in the space of controlling parameters (WOB, RPM) may be generated. The map 1220 may include isolines of ROP and allow for prediction in terms of performance. An example of the map 1220 is depicted in
In some implementations, the output from the tag bottom event 1402 may include values of drilling parameters (such as hook load, torque, and ROP) over time during a tag bottom event 1402 when the drill bit interacts with a bottom of the wellbore. In this example, the output of the tag bottom event 1402 includes a graph 1408 of the hook load over time, a graph 1410 of the torque of the drill string over time, and a graph 1412. Another example of the graph 1408 is depicted in
After tagging bottom, drilling may be resumed. As shown in graphs 1408-1412, the drilling response moves from the tag bottom target value to a new operational point. For example, in the graph 1408, the hook load response moves from the tag bottom event 1452 to a new operational point 1453. In the graph 1410, the torque response moves from the tag bottom event 1454 to a new operational point 1455. In the graph 1412, the ROP response moves from the tag bottom event 1456 to a new operational point 1457. In some implementations, operations may compare the current response (at the new operational point) with the model prediction. If the two differ, operations may try to adjust the model parameters by still solving Equation (1).
As the range of parameters varies over a much lower range when drilling (as compared to when tagging bottom), the new estimate may be less reliable (as compared to tag bottom). In some implementations, when deviation between prediction and model is larger than a threshold, a tag bottom event may be re-executed to re-derive the model parameters. This approach may also be combined with automation and control, whereby the control parameters may be varied as required to derive robust estimate of the model parameters. An algorithm may be used to identify the range of variations.
The deriving of the bit-rock model parameters 1204 may include graphs 1414-1418. The graphs 1414-1418 depict the drilling response moving away from the reference signature derived during the tag bottom event. The graph 1414 may map the torque on bit (along a y-axis) to weight on bit (WOB) (along an x-axis) across Regions I, II, and III. As shown, the graph 1414 includes a point 1458 associated with the tag bottom event and a point 1459 associated with the new operational point. The graph 1416 may map the depth of cut (along a y-axis) to a WOB (along the x-axis) across Regions I, II, and III. The graph 1416 includes a point 1460 associated with the tag bottom event and a point 1460 associated with the new operational point. The graph 1418 may map the depth of cut (along a y-axis) to a torque on bit (along the x-axis) across Regions I, II, and III. The graph 1418 includes a point 1462 associated with the tag bottom event and a point 1463 associated with the new operational point.
With model parameters, multiple interpretations may be generated. For example, a first interpretation 1470 and a second interpretation 1472 may be generated. An example of the first interpretation 1470 is depicted in
The first interpretation 1470 and the second interpretation 1472 may include different graphs of a bit response—including 1) a graph that depicts a bit response in the torque on bit and the weight on bit, 2) a graph that depicts a bit response that includes a depth of cut and the weight on bit, and 3) a graph that depicts a bit response that includes a depth of cut and the torque on bit.
As shown, the graph 1502 includes a line 1512 associated with the tag bottom event and a line 1514 associated with the new operational point. The graph 1504 includes a line 1516 associated with the tag bottom event and a line 1518 associated with the new operational point. The graph 1506 includes a line 1520 associated with the tag bottom event and a line 1522 associated with the new operational point.
As shown, the graph 1602 includes a line 1612 associated with the tag bottom event and a point 1614 associated with the new operational point. The graph 1604 includes a line 1616 associated with the tag bottom event and a point 1618 associated with the new operational point. The graph 1606 includes a line 1620 associated with the tag bottom event and a point 1622 associated with the new operational point.
At block 1802, a determination is made of whether the drilling operation is only in Regime I. For example with reference to
Returning to operations of the flowchart 1800, if the drilling operation is only in Regime I, operations continue at block 1804. Otherwise, operations of the flowchart 1800 continue at block 1806.
At block 1804, the performance index (q) for drilling efficiency is defined by Equation (14):
For example, with reference to
At block 1806, a determination is made of whether the drilling operation is in Regime III. For example with reference to
At block 1808, a determination is made of whether the drilling operation is in both Regime I and Regime II. For example, with reference to
At block 1810, the performance index (q) for drilling efficiency is defined by Equation (15):
2006. The efficiency can also be read as the ratio of the current depth of cut to the depth of cut if the bit was sharp (no chamfer, no wear flat). For example, with reference to
If the result of the analysis reveals that the drilling response is characterized by Regimes III, then consider that for a point representative of regime, part of the weight on bit beyond the onset of the Regime III 2010, (w−w) corresponds to an increase of the apparent weight mobilized by frictional contact (w
+Δw) due to the accumulation of debris around the bit body or shock arrestors touching the formation see Equation (16):
The parameter κ provides the information about the type of Regime III. In some implementations, Regime III may be one of three types. Operations of the flowchart 1800 continue at transition point A, which continues at transition point A of the flowchart 1900. Operations of the flowchart 1900 are now described. From transition point A, operations of the flowchart 1900 continue at block 1902.
At block 1902, a determination is made of whether κ<=1. For example with reference to
At block 1904, it is determined that Regime III is of type A wherein excess WOB (w−w) beyond Regime III threshold caused by an increase of the weight mobilized by frictional contact (an extension of Regime I) caused for example by shock arrestor or secondary cutting structure. For example, with reference to
At block 1906, a determination is made of whether κ>1. For example, with reference to
At block 1908, it is determined that Regime III is of type B—part of the WOB associated with Regime II is transferred to Regime I (part of Regime II transferred to Regime I) associated with excessive bit cleaning issue that leads to a drop in rate of penetration when
For example with reference to
Beside the performance index for tag on bottom event, drilling on bottom performance index may also defined based on the location of the operating point in the t-w space when the model cannot be efficiently inverted while drilling the stand. During the tag on bottom event, it is observed that the depth of cut at the bit ramps up from 0 to the target value and may provide a complete map of the bit-rock interface signature. However, when drilling in the steady state condition, it may become challenging to replicate the entire bit response, making it nearly impossible to calculate the performance index by ratio between the Regime II and the Regime I. Despite this limitation, valuable insights may still be derived from the contrasting characteristics of the bit-rock interface signature (the value of μγ′ and 1/ζ exhibit distinct characteristics). As a result, it is feasible to partition the t-w space into distinct regions to evaluate the drilling efficiency effectively.
While the aspects of the disclosure are described with reference to various implementations and exploitations, it will be understood that these aspects are illustrative and that the scope of the claims is not limited to them. In general, example implementations as described herein may be implemented with facilities consistent with any hardware system or hardware systems. Many variations, modifications, additions, and improvements are possible.
Plural instances may be provided for components, operations or structures described herein as a single instance. Finally, boundaries between various components, operations and data stores are somewhat arbitrary, and particular operations are illustrated in the context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within the scope of the disclosure. In general, structures and functionality presented as separate components in the example configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements may fall within the scope of the disclosure.
The flowcharts are provided to aid in understanding the illustrations and are not to be used to limit scope of the claims. The flowcharts depict example operations that can vary within the scope of the claims. Additional operations may be performed; fewer operations may be performed; the operations may be performed in parallel; and the operations may be performed in a different order. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by program code. The program code may be provided to a processor of a general-purpose computer, special purpose computer, or other programmable machine or apparatus.
Use of the phrase “at least one of” preceding a list with the conjunction “and” should not be treated as an exclusive list and should not be construed as a list of categories with one item from each category, unless specifically stated otherwise. A clause that recites “at least one of A, B, and C” can be infringed with only one of the listed items, multiple of the listed items, and one or more of the items in the list and another item not listed. As used herein, the term “or” is inclusive unless otherwise explicitly noted. Thus, the phrase “at least one of A, B, or C” is satisfied by any element from the set {A, B, C} or any combination thereof, including multiples of any element.
As will be appreciated, aspects of the disclosure may be embodied as a system, method or program code/instructions stored in one or more machine-readable media. Accordingly, aspects may take the form of hardware, software (including firmware, resident software, micro-code, etc.), or a combination of software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” The functionality presented as individual modules/units in the example illustrations can be organized differently in accordance with any one of platform (operating system and/or hardware), application ecosystem, interfaces, programmer preferences, programming language, administrator preferences, etc.
Any combination of one or more machine-readable medium(s) may be utilized. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable storage medium may be, for example, but not limited to, a system, apparatus, or device, that employs any one of or combination of electronic, magnetic, optical, electromagnetic, infrared, or semiconductor technology to store program code. More specific examples (a non-exhaustive list) of the machine-readable storage medium would include the following: a portable computer diskette, a hard disk, a random-access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a machine-readable storage medium may be any tangible medium that can contain or store a program for use by or in connection with an instruction execution system, apparatus, or device. A machine-readable storage medium is not a machine-readable signal medium.
A machine-readable signal medium may include a propagated data signal with machine readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A machine-readable signal medium may be any machine-readable medium that is not a machine-readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a machine-readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as the Java® programming language, C++ or the like; a dynamic programming language such as Python; a scripting language such as Perl programming language or PowerShell script language; and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The program code may execute entirely on a stand-alone machine, may execute in a distributed manner across multiple machines, and may execute on one machine while providing results and or accepting input on another machine.
The program code/instructions may also be stored in a machine-readable medium that can direct a machine to function in a particular manner, such that the instructions stored in the machine-readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
Any one of the previously described functionalities may be partially (or entirely) implemented in hardware and/or on the processor 2101. For example, the functionality may be implemented with an application specific integrated circuit, in logic implemented in the processor 2101, in a co-processor on a peripheral device or card, etc. Further, realizations may include fewer or additional components not illustrated in
While the aspects of the disclosure are described with reference to various implementations and exploitations, it will be understood that these aspects are illustrative and that the scope of the claims is not limited to them. In general, techniques for simulating drill bit abrasive wear and damage during the drilling of a wellbore as described herein may be implemented with facilities consistent with any hardware system or hardware systems. Many variations, modifications, additions, and improvements are possible.
Plural instances may be provided for components, operations or structures described herein as a single instance. Finally, boundaries between various components, operations and data stores are somewhat arbitrary, and particular operations are illustrated in the context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within the scope of the disclosure. In general, structures and functionality presented as separate components in the example configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements may fall within the scope of the disclosure.
Implementation #1: A method comprising: measuring, at a surface of a wellbore during drilling of the wellbore, at least one drilling operational parameter; determining at least one at-bit model parameter, at a drill bit used for drilling the wellbore, based on the at least one drilling operational parameter measured at the surface of the wellbore; and determining a drilling efficiency based on the at least one at-bit model parameter.
Implementation #2: The method of Implementation #1, further comprising: transforming the at least one drilling operational parameter to at least one scaled drilling operational parameter based on transformation of the drill bit to an equivalent singular blade at unit length.
Implementation #3: The method of any one of Implementations #1-2, wherein determining the at least one at-bit parameter, at the drill bit used for drilling the wellbore, based on the at least one drilling operational parameter measured at the surface of the wellbore comprises: creating a bit-rock interaction model.
Implementation #4: The method of any one of Implementations #1-3, wherein determining the at least one at-bit parameter, at the drill bit used for drilling the wellbore, based on the at least one drilling operational parameter measured at the surface of the wellbore comprises: performing the following during drilling of the wellbore, monitoring, during drilling of the wellbore, whether the bit-rock interaction model is changing based on the at least one drilling operational parameter; and in response to the bit-rock interaction model changing, adjusting the bit-rock interaction model based on changes to the at least one drilling operational parameter.
Implementation #5: The method of any one of Implementations #1-4, wherein the at least one drilling operational parameter comprises at least one of weight on bit, rotations per unit of time of the drill string, or a flow rate of a drilling mud.
Implementation #6: The method of any one of Implementations #1-5, wherein the at least one at-bit parameter comprises at least one of weight on bit, torque on bit, or depth of cut.
Implementation #7: The method of any one of Implementations #1-6 further comprising: modifying at least one operational attribute of the drilling of the wellbore based on the drilling efficiency, wherein the at least one operational attribute of the drilling of the wellbore comprises at least one of weight on bit, rotations of a drill string used for drilling the wellbore per unit of time, or a flow rate of a drilling fluid flowing in the wellbore.
Implementation #8: The method of any one of Implementations #1-7, further comprising: determining at least one of different drilling regimes, a founder point, or a limiter point based on the bit-rock interaction model; and classifying the drilling of the wellbore based on the at least one of the different drilling regimes, the founder point, or the limiter point; and determining a current weight on bit (WOB) of the drilling of the wellbore; comparing the current WOB of the drilling of the wellbore to at least one of the founder point or the limiter point; calculating a performance index for drilling the wellbore based on the comparing; and modifying an operation of the drilling of the wellbore based on the different drilling regimes and based on the performance index.
Implementation #9: The method of any one of Implementations #1-8, further comprising: performing a postmortem analysis of the drilling of the wellbore based on previously recorded at least one drilling operational parameter.
Implementation #10: The method of any one of Implementations #1-9, further comprising: using the postmortem analysis to inform decisions on drilling of a different wellbore to be drilled, in response to determining that at least one condition of the wellbore and the different wellbore are the same or substantially the same.
Implementation #11: The method of any one of Implementations #1-10, further comprising: logging, into a database, at least one of the informing of decisions on the drilling of the different wellbore, the at least one drilling operational parameter measured during drilling of the wellbore, and the performance index calculated for the drilling of the wellbore; and assessing overall metrics of effectivity of automated decision making with respect to the drilling efficiency.
Implementation #12: The method of any one of Implementations #1-11, further comprising: tracking and classifying, over a defined depth of the drilling of the wellbore, the drilling efficiency; and displaying the tracking and classifying, over the defined depth of the drilling of the wellbore, of the drilling efficiency in a form of at least one of a bar chart, a stacked bar chart, or a histogram.
Implementation #13: A non-transitory, computer-readable medium having instructions stored thereon that are executable by a processor, the instructions comprising: instructions to measure, at a surface of a wellbore during drilling of the wellbore, at least one drilling operational parameter; instructions to determine at least one at-bit parameter, at a drill bit used for drilling the wellbore, based on the at least one drilling operational parameter measured at the surface of the wellbore; and instructions to determine a drilling efficiency based on the at least one at-bit parameter.
Implementation #14: The non-transitory, computer-readable medium of Implementation #13, wherein the instructions comprise, instructions to transform the at least one drilling operational parameter to at least one scaled drilling operational parameter based on transformation of the drill bit to an equivalent singular blade at unit length.
Implementation #15: The non-transitory, computer-readable medium of any one of Implementations #13-14, wherein the instructions to determine the at least one at-bit parameter, at the drill bit used for drilling the wellbore, based on the at least one drilling operational parameter measured at the surface of the wellbore comprises: instructions to create a bit-rock interaction model.
Implementation #16: The non-transitory, computer-readable medium of any one of Implementations #13-15, wherein the instructions to determine the at least one at-bit parameter, at the drill bit used for drilling the wellbore, based on the at least one drilling operational parameter measured at the surface of the wellbore comprise: instructions to perform the following during drilling of the wellbore, instructions to monitor, during drilling of the wellbore, whether the bit-rock interaction model is changing based on the at least one drilling operational parameter; and in response to the bit-rock interaction model changing, instructions to adjust the bit-rock interaction model based on changes to the at least one drilling operational parameter.
′ Implementation #17: An apparatus comprising: a processor; and a computer-readable medium having instructions stored thereon that are executable by the processor to cause the processor to, measure, at a surface of a wellbore during drilling of the wellbore, at least one drilling operational parameter; determine at least one at-bit parameter, at a drill bit used for drilling the wellbore, based on the at least one drilling operational parameter measured at the surface of the wellbore; and determine a drilling efficiency based on the at least one at-bit parameter.
Implementation #18: The apparatus of Implementation #17, wherein the instructions comprise instructions executable by the processor to cause the processor to, transform the at least one drilling operational parameter to at least one scaled drilling operational parameter based on transformation of the drill bit to an equivalent singular blade at unit length.
Implementation #19: The apparatus of any one of Implementations #17-18, wherein the instructions executable by the processor to cause the processor to determine the at least one at-bit parameter, at the drill bit used for drilling the wellbore, based on the at least one drilling operational parameter measured at the surface of the wellbore comprises: instructions executable by the processor to cause the processor to create a bit-rock interaction model.
Implementation #20: The apparatus of any one of Implementations #17-19, wherein the instructions executable by the processor to cause the processor to determine the at least one at-bit parameter, at the drill bit used for drilling the wellbore, based on the at least one drilling operational parameter measured at the surface of the wellbore comprise instructions executable by the processor to cause the processor to, perform the following during drilling of the wellbore, monitor, during drilling of the wellbore, whether the bit-rock interaction model is changing based on the at least one drilling operational parameter; and in response to the bit-rock interaction model changing, adjust the bit-rock interaction model based on changes to the at least one drilling operational parameter.
Number | Date | Country | |
---|---|---|---|
63516593 | Jul 2023 | US |