For oil and gas exploration and production, a network of wells, installations and other conduits may be established by connecting sections of metal pipe together. For example, a well installation may be completed, in part, by lowering multiple sections of metal pipe (i.e., a casing string) into a wellbore, and cementing the casing string in place. In some well installations, multiple casing strings are employed (e.g., a concentric multi-string arrangement) to allow for different operations related to well completion, production, or enhanced oil recovery (EOR) options.
Corrosion of metal pipes is an ongoing issue. Efforts to mitigate corrosion include use of corrosion-resistant alloys, coatings, treatments, and corrosion transfer, among others. To enhance wellbore productivity, it may be valuable to employ corrosion monitoring. Efforts to improve corrosion monitoring are ongoing. For downhole casing strings, various types of corrosion monitoring tools are available. One type of corrosion monitoring tool uses electromagnetic (EM) fields to estimate pipe thickness or other corrosion indicators. As an example, a downhole tool may collect data in the form of magnitude and phase of eddy currents from casing strings to produce an EM log. The EM log data may be interpreted to determine condition and thickness of production and inter mediate casing strings, tubing, collars, filters, packers, and perforations. Traditionally, an inversion algorithm may be used to determine the pipe status. Similarly, the downhole tool may be used in leak source applications to obtain acoustic wavefield vibrations and acoustic wavefield vibrations, which are traditionally used in beamforming. Beamforming is a form of inversion that may be used to determine a leak source in a pipe string.
However, when determining properties, such as corrosion, inversion algorithms fall short of efficiently solving for pipe properties even when using a simplified radial one-dimensional model. Similarly, beamforming algorithms may also fall short for efficiently solving for leak location parameters in a two-dimensional model, even with using high-performance computing or graphic processing unit (GPU). For inversion and beamforming, the traditional bottleneck of efficiency may be identified in the forward model. Additionally, the data has to be sent to remote data center and the 2-D beamforming results or 1-D inversion may only be obtained as a post-processing answer product, which reduces their value for real-time decision-making.
These drawings illustrate certain aspects of some examples of the present disclosure and should not be used to limit or define the disclosure.
The present disclosure relates to subterranean operations and, more particularly, embodiments disclosed herein provide methods and systems for improving efficiency for solving for pipe properties and leak source location parameters. Specifically, improving the inversion for solving for pipe properties and beamforming for identifying a leak source location. For inversion and beamforming, the traditional bottleneck of efficiency may be identified in the forward model. An improvement of traditional forward modeling may lie in a Fourier Neural Operator (FNO) or a Physics-Informed Neural Operator (PINO). Herein, FNO or PINO applications may be implemented interchangeably. Additionally, FNO or PINO applications may be defined broadly as a neural operator. A neural operator may be defined as an FNO, PINO, or any other acceptable neural operator. Neural operators, unlike the neural network, may map a function to another function. Traditional complex numerical calculation, such as solving a partial differential equation (PDE), traditionally performed by a forward model may be replaced with a FNO or PINO to implement a neural operator. FNO's and PINO's may be used with downhole measurements in inversion and beamforming to determine pipe properties or a leak source location.
In logging systems, such as, for example, logging systems utilizing the downhole tool 100, a digital telemetry system may be employed, wherein an electrical circuit may be used to both supply power to downhole tool 100 and to transfer data between display and storage unit 120 and downhole tool 100. A DC voltage may be provided to downhole tool 100 by a power supply located above ground level, and data may be coupled to the DC power conductor by a baseband current pulse system. Alternatively, downhole tool 100 may be powered by batteries located within the downhole tool assembly, and/or the data provided by downhole tool 100 may be stored within the downhole tool assembly, rather than transmitted to the surface during logging (corrosion detection).
Downhole tool 100 may be used for excitation of transmitter 154. Transmitter 154 may broadcast electromagnetic fields into subterranean formation 142. It should be noted that broadcasting EM fields may also be referred to as transmitting EM fields. The EM fields from transmitter 154 may be referred to as a primary EM field. The primary EM fields may produce Eddy currents in casing string 108 and pipe string 138. These Eddy currents, in turn, produce secondary EM fields that may be sensed and/or measured with the primary EM fields by receivers 104. Characterization of casing string 108 and pipe string 138, including determination of pipe attributes, may be performed by measuring and processing these EM fields. Pipe attributes may include, but are not limited to, pipe thickness, pipe conductivity, and/or pipe permeability.
As illustrated, receivers 104 may be positioned on the downhole tool 100 at selected distances (e.g., axial spacing) away from transmitters 154. The axial spacing of receivers 104 from transmitters 154 may vary, for example, from about 0 inches (0 cm) to about 40 inches (101.6 cm) or more. It should be understood that the configuration of downhole tool 100 shown on
Broadcasting of EM fields by the transmitter 154 and the sensing and/or measuring of secondary EM fields by receivers 104 may be controlled by display and storage unit 120, which may include an information handling system 144. As illustrated, the information handling system 144 may be a component of the display and storage unit 120. Alternatively, the information handling system 144 may be a component of downhole tool 100. An information handling system 144 may include any instrumentality or aggregate of instrumentalities operable to compute, estimate, classify, process, transmit, broadcast, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes. For example, an information handling system 144 may be a personal computer, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price.
Information handling system 144 may include a processing unit 146 (e.g., microprocessor, central processing unit, etc.) that may process EM log data by executing software or instructions obtained from a local non-transitory computer readable media 148 (e.g., optical disks, magnetic disks). The non-transitory computer readable media 148 may store software or instructions of the methods described herein. Non-transitory computer readable media 148 may include any instrumentality or aggregation of instrumentalities that may retain data and/or instructions for a period of time. Non-transitory computer readable media 148 may include, for example, storage media such as a direct access storage device (e.g., a hard disk drive or floppy disk drive), a sequential access storage device (e.g., a tape disk drive), compact disk, CD-ROM, DVD, RAM, ROM, electrically erasable programmable read-only memory (EEPROM), and/or flash memory; as well as communications media such wires, optical fibers, microwaves, radio waves, and other EM and/or optical carriers; and/or any combination of the foregoing. Information handling system 144 may also include input device(s) 150 (e.g., keyboard, mouse, touchpad, etc.) and output device(s) 152 (e.g., monitor, printer, etc.). The input device(s) 150 and output device(s) 152 provide a user interface that enables an operator to interact with downhole tool 100 and/or software executed by processing unit 146, For example, information handling system 144 may enable an operator to select analysis options, view collected log data, view analysis results, and/or perform other tasks.
Downhole tool 100 may use any suitable EM technique based on Eddy current (“EC”) for inspection of concentric pipes (e.g., casing string 108 and pipe string 138). EC techniques may be particularly suited for characterization of a multi-string arrangement in which concentric pipes are used. EC techniques may include, but are not limited to, frequency-domain EC techniques and time-domain EC techniques.
In frequency domain EC techniques, transmitter 154 of downhole tool 100 may be fed by a continuous sinusoidal signal, producing primary magnetic fields that illuminate the concentric pipes (e.g., casing string 108 and pipe string 138). The primary EM fields produce Eddy currents in the concentric pipes. These Eddy currents, in turn, produce secondary EM fields that may be sensed and/or measured with the primary EM fields by the receivers 104. Characterization of the concentric pipes may be performed by measuring and processing these EM fields.
In time domain EC techniques, which may also be referred to as pulsed EC (“PEC”), transmitter 154 may be fed by a pulse. Transient primary EM fields may be produced due the transition of the pulse from “off” to “on” state or from “on” to “off” state (more common). These transient EM fields produce EC in the concentric pipes (e.g., casing string 108 and pipe string 138). The EC, in turn, produce secondary EM fields that may be sensed and/or measured by receivers 104 placed at some distance on the downhole tool 100 from transmitter 154, as shown on
It should be understood that while casing string 108 is illustrated as a single casing string, there may be multiple layers of concentric pipes disposed in the section of wellbore 102 with casing string 108. EM log data may be obtained in two or more sections of wellbore 102 with multiple layers of concentric pipes. For example, downhole tool 100 may make a first measurement of pipe string 138 comprising any suitable number of joints 130 connected by collars 132. Measurements may be taken in the time-domain and/or frequency range. Downhole tool 100 may make a second measurement in a casing string 108 of first casing 134, wherein first casing 134 comprises any suitable number of pipes connected by collars 132. Measurements may be taken in the time-domain and/or frequency domain. These measurements may be repeated any number of times and for second casing 136 and/or any additional layers of casing string 108. In this disclosure, as discussed further below, methods may be utilized to determine the location of any number of collars 132 in casing string 108 and/or pipe string 138. Determining the location of collars 132 in the frequency domain and/or time domain may allow for accurate processing of recorded data in determining properties of casing string 108 and/or pipe string 138 such as corrosion. As mentioned above, measurements may be taken in the frequency domain and/or the time domain.
In frequency domain EC, the frequency of the excitation may be adjusted so that multiple reflections in the wall of the pipe (e.g., casing string 108 or pipe string 138) are insignificant, and the spacing between transmitters 154 and/or receiver 104 is large enough that the contribution to the mutual impedance from the dominant (but evanescent) waveguide mode is small compared to the contribution to the mutual impedance from the branch cut component. The remote-field eddy current (RFEC) effect may be observed. In a RFEC regime, the mutual impedance between the coil of transmitter 154 and coil of one of the receivers 104 may be sensitive to the thickness of the pipe wall. To be more specific, the phase of the impedance varies as:
and the magnitude of the impedance shows the dependence:
where ω is the angular frequency of the excitation source, μ is the magnetic permeability of the pipe, σ is the electrical conductivity of the pipe, and t is the thickness of the pipe. By using the common definition of skin depth for the metals as:
The phase of the impedance varies as:
and the magnitude of the impedance shows the dependence:
In RFEC, the estimated quantity may be the overall thickness of the metal. Thus, for multiple concentric pipes, the estimated parameter may be the overall or sum of the thicknesses of the pipes. The quasi-linear variation of the phase of mutual impedance with the overall metal thickness may be employed to perform fast estimation to estimate the overall thickness of multiple concentric pipes. For this purpose, for any given set of pipes dimensions, material properties, and tool configuration, such linear variation may be constructed quickly and may be used to estimate the overall thickness of concentric pipes. Information handling system 144 may enable an operator to select analysis options, view collected log data, view analysis results, and/or perform other tasks.
Monitoring the condition of pipe string 138 and casing string 108 may be performed on information handling system 144 in oil and gas field operations. Information handling system 144 may be utilized with EM (EM) Eddy Current (EC) techniques to inspect pipe string 138 and casing string 108. EM EC techniques may include frequency-domain EC techniques and time-domain EC techniques. In time-domain and frequency-domain techniques, one or more transmitters 154 may be excited with an excitation signal which broadcast an EM field and receiver 104 may sense and/or measure the reflected excitation signal, a secondary EM field, for interpretation. The received signal is proportional to the amount of metal that is around transmitter 154 and receiver 104. For example, less signal magnitude is typically an indication of more metal, and more signal magnitude is an indication of less metal. This relationship may be utilized to determine metal loss, which may be due to an abnormality related to the pipe such as corrosion or buckling.
Due to eddy current physics and EM attenuation, pipe string 138 and/or casing string 108 may generate an electrical signal that is in the opposite polarity to the incident signal and results in a reduction in the received signal. Typically, more metal volume translates to more lost signal. As a result, by inspecting the signal gains, it is possible to identify zones with metal loss (such as corrosion). In order to distinguish signals that originate from anomalies at different pipes of a multiple nested pipe configuration, multiple transmitter-receiver spacing, and frequencies may be utilized. For example, short spaced transmitters 154 and receivers 104 may be sensitive to first casing 134, while longer spaced transmitters 154 and receivers 104 may be sensitive to second casing 136 and/or deeper (3rd, 4th, etc.) pipes. By analyzing the signal levels at these different channels with inversion methods, it is possible to relate a certain received signal to a certain metal loss or gain at each pipe. In addition to loss of metal, other pipe properties such as magnetic permeability and conductivity may also be estimated by inversion methods. It should be noted that inversion methods may include model-based inversion which may include forward modeling.
Each receiver from high-resolution receivers 400 and low-resolution receivers 404 may be configured to record complex-valued measurements (amplitude and phase). Further, traditional operations may only measure the far field. Therefore, taking the far field and comparing it to the near field, individual pipe thickness may be extrapolated.
In examples, downhole tool 100 may not only be applied to EM implementations for tubular inspection. For example,
The processing may be performed real-time during data acquisition or after recovery of downhole tool 100. Processing may alternatively occur downhole or may occur both downhole and at surface. In some embodiments, signals recorded by downhole tool 100 may be conducted to information handling system 144 by way of conveyance 106. Information handling system 144 may process the signals, and the information contained therein may be displayed for an operator to observe and stored for future processing and reference. Information handling system 144 may also contain an apparatus for supplying control signals and power to downhole tool 100.
Systems and methods of the present disclosure may be implemented, at least in part, with Information handling system 144. While shown at surface 122, information handling system 144 may also be located at another location, such as remote from wellbore 102. Information handling system 144 may include any instrumentality or aggregate of instrumentalities operable to compute, estimate, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes. For example, an information handling system 144 may be a personal computer, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price. Information handling system 144 may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU) or hardware or software control logic, ROM, and/or other types of nonvolatile memory. Additional components of the information handling system 144 may include one or more disk drives, one or more network ports for communication with external devices as well as various input and output (I/O) devices, such as an input device(s) 150, a mouse, and an output device(s) 152. Information handling system 144 may also include one or more buses operable to transmit communications between the various hardware components. Furthermore, output device(s) 152 may provide an image to a user based on activities performed by personal computer.
For example, producing images of geological structures created from recorded signals. By way of example, video display unit may produce a plot of depth versus the two cross-axial components of the gravitational field and versus the axial component in wellbore 102 coordinates. The same plot may be produced in coordinates fixed to the Earth, such as coordinates directed to the North, East and directly downhole (Vertical) from the point of entry to the wellbore. A plot of overall (average) density versus depth in wellbore or vertical coordinates may also be provided. A plot of density versus distance and direction from the wellbore 102 versus vertical depth may be provided. It should be understood that many other types of plots are possible when the actual position of the measurement point in North, East and Vertical coordinates is taken into account. Additionally, hard copies of the plots may be produced in paper logs for further use.
Alternatively, systems and methods of the present disclosure may be implemented, at least in part, with non-transitory computer-readable media 148. Non-transitory computer-readable media 148 may include any instrumentality or aggregation of instrumentalities that may retain data and/or instructions for a period of time. Non-transitory computer-readable media 148 may include, for example, storage media such as a direct access storage device (e.g., a hard disk drive or floppy disk drive), a sequential access storage device (e.g., a tape disk drive), compact disk, CD-ROM, DVD, RAM, ROM, electrically erasable programmable read-only memory (EEPROM), and/or flash memory; as well as communications media such wires, optical fibers, microwaves, radio waves, and other EM and/or optical carriers; and/or any combination of the foregoing.
In examples, rig 506 includes a load cell (not shown) which may determine the amount of pull on conveyance 106 at the surface of wellbore 102. Information handling system 144 may comprise a safety valve (not illustrated) which controls the hydraulic pressure that drives drum 526 on vehicle 504 which may reel up and/or release conveyance 106 which may move downhole tool 100 up and/or down wellbore 102. The safety valve may be adjusted to a pressure such that drum 526 may only impart a small amount of tension to conveyance 106 over and above the tension necessary to retrieve conveyance 106 and/or downhole tool 100 from wellbore 102. The safety valve is typically set a few hundred pounds above the amount of desired safe pull on conveyance 106 such that once that limit is exceeded, further pull on conveyance 106 may be prevented.
As illustrated in
Instrument section 602 may house at least one transducer 536. As describe above, transducer 536 may operate and function and operate to generate a pressure pulse that travels through wellbore fluids. The pressure pulse may have a frequency range from 10 Hz˜20 kHz. It should be noted that the pulse signal may be emitted with different frequency content. In examples, transducers 536 may be referred to as a transmitter, which generates a pressure pulse, travelling in the wellbore fluids to interact with wellbore 102 (e.g., referring to
Acoustic waves emitted from downhole tool 100 and traveling through wellbore 102 may be received and processed, as described in
Each individual component discussed above may be coupled to system bus 904, which may connect each and every individual component to each other. System bus 904 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. A basic input/output (BIOS) stored in ROM 908 or the like, may provide the basic routine that helps to transfer information between elements within information handling system 144, such as during start-up. Information handling system 144 further includes storage devices 914 or computer-readable storage media such as a hard disk drive, a magnetic disk drive, an optical disk drive, tape drive, solid-state drive, RAM drive, removable storage devices, a redundant array of inexpensive disks (RAID), hybrid storage device, or the like. Storage device 914 may include software modules 916, 918, and 920 for controlling processor 902. Information handling system 144 may include other hardware or software modules. Storage device 914 is connected to the system bus 904 by a drive interface. The drives and the associated computer-readable storage devices provide nonvolatile storage of computer-readable instructions, data structures, program modules and other data for information handling system 144. In one aspect, a hardware module that performs a particular function includes the software component stored in a tangible computer-readable storage device in connection with the necessary hardware components, such as processor 902, system bus 904, and so forth, to carry out a particular function. In another aspect, the system may use a processor and computer-readable storage device to store instructions which, when executed by the processor, cause the processor to perform operations, a method or other specific actions. The basic components and appropriate variations may be modified depending on the type of device, such as whether information handling system 144 is a small, handheld computing device, a desktop computer, or a computer server. When processor 902 executes instructions to perform “operations”, processor 902 may perform the operations directly and/or facilitate, direct, or cooperate with another device or component to perform the operations.
As illustrated, information handling system 144 employs storage device 914, which may be a hard disk or other types of computer-readable storage devices which may store data that are accessible by a computer, such as magnetic cassettes, flash memory cards, digital versatile disks (DVDs), cartridges, random access memories (RAMs) 910, read only memory (ROM) 908, a cable containing a bit stream and the like, may also be used in the exemplary operating environment. Tangible computer-readable storage media, computer-readable storage devices, or computer-readable memory devices, expressly exclude media such as transitory waves, energy, carrier signals, EM waves, and signals per se.
To enable user interaction with information handling system 144, an input device 922 represents any number of input mechanisms, such as a microphone for speech, a touch-sensitive screen for gesture or graphical input, keyboard, mouse, motion input, speech and so forth. Additionally, input device 922 may receive acoustic or EM measurements from downhole tool 100, discussed above. An output device 924 may also be one or more of a number of output mechanisms known to those of skill in the art. In some instances, multimodal systems enable a user to provide multiple types of input to communicate with information handling system 144. Communications interface 926 generally governs and manages the user input and system output. There is no restriction on operating on any particular hardware arrangement and therefore the basic hardware depicted may easily be substituted for improved hardware or firmware arrangements as they are developed.
With continued reference to
Chipset 1000 may also interface with one or more communication interfaces 926 that may have different physical interfaces. Such communication interfaces may include interfaces for wired and wireless local area networks, for broadband wireless networks, as well as personal area networks. Some applications of the methods for generating, displaying, and using the GUI disclosed herein may include receiving ordered datasets over the physical interface or be generated by the machine itself by processor 902 analyzing data stored in storage device 914 or RAM 910. Further, information handling system 144 receive inputs from a user via user interface components 1004 and execute appropriate functions, such as browsing functions by interpreting these inputs using processor 902.
In examples, information handling system 144 may also include tangible and/or non-transitory computer-readable storage devices for carrying or having computer-executable instructions or data structures stored thereon. Such tangible computer-readable storage devices may be any available device that may be accessed by a general purpose or special purpose computer, including the functional design of any special purpose processor as described above. By way of example, and not limitation, such tangible computer-readable devices may include RAM, ROM, EEPROM, CD-ROM or other optical disk storage, magnetic disk storage or other magnetic storage devices, or any other device which may be used to carry or store desired program code in the form of computer-executable instructions, data structures, or processor chip design. When information or instructions are provided via a network, or another communications connection (either hardwired, wireless, or combination thereof), to a computer, the computer properly views the connection as a computer-readable medium. Thus, any such connection is properly termed a computer-readable medium. Combinations of the above should also be included within the scope of the computer-readable storage devices.
Computer-executable instructions include, for example, instructions and data which cause a general-purpose computer, special purpose computer, or special purpose processing device to perform a certain function or group of functions. Computer-executable instructions also include program modules that are executed by computers in stand-alone or network environments. Generally, program modules include routines, programs, components, data structures, objects, and the functions inherent in the design of special-purpose processors, etc. that perform particular tasks or implement particular abstract data types. Computer-executable instructions, associated data structures, and program modules represent examples of the program code means for executing blocks of the methods disclosed herein. The particular sequence of such executable instructions or associated data structures represents examples of corresponding acts for implementing the functions described in such blocks.
In additional examples, methods may be practiced in network computing environments with many types of computer system configurations, including personal computers, hand-held devices, multi-processor systems, microprocessor-based or programmable consumer electronics, network PCs, minicomputers, mainframe computers, and the like. Examples may also be practiced in distributed computing environments where tasks are performed by local and remote processing devices that are linked (either by hardwired links, wireless links, or by a combination thereof) through a communications network. In a distributed computing environment, program modules may be located in both local and remote memory storage devices.
A data agent 1102 may be a desktop application, website application, or any software-based application that is run on information handling system 144. As illustrated, information handling system 144 may be disposed at any rig site (e.g., referring to
Secondary storage computing device 1104 may operate and function to create secondary copies of primary data objects (or some components thereof) in various cloud storage sites 1106A-N. Additionally, secondary storage computing device 1104 may run determinative algorithms on data uploaded from one or more information handling systems 144, discussed further below. Communications between the secondary storage computing devices 1104 and cloud storage sites 1106A-N may utilize REST protocols (Representational state transfer interfaces) that satisfy basic C/R/U/D semantics (Create/Read/Update/Delete semantics), or other hypertext transfer protocol (“HTTP”)-based or file-transfer protocol (“FTP”)-based protocols (e.g., Simple Object Access Protocol).
In conjunction with creating secondary copies in cloud storage sites 1106A-N, the secondary storage computing device 1104 may also perform local content indexing and/or local object-level, sub-object-level or block-level deduplication when performing storage operations involving various cloud storage sites 1106A-N. Cloud storage sites 1106A-N may further record and maintain, EM logs, map DTC codes, store repair and maintenance data, store operational data, and/or provide outputs from determinative algorithms that are located in cloud storage sites 1106A-N. In a non-limiting example, this type of network may be utilized as a platform to store, backup, analyze, import, preform extract, transform and load (“ETL”) processes, mathematically process, apply machine learning models, and augment EM measurement data sets.
The structure of, and the data contained within a dataset provided to a machine learning algorithm may vary depending on the intended function of the resulting machine learning model. The rows of data, or data points, within a dataset may contain one or more independent values. Additionally, datasets may contain corresponding dependent values. The independent values of a dataset may be referred to as “features,” and a collection of features may be referred to as a “feature space.” If dependent values are available in a dataset, they may be referred to as outcomes or “target values.” Although dependent values may be a necessary component of a dataset for certain algorithms, not all algorithms require a dataset with dependent values. Furthermore, both the independent and dependent values of the dataset may comprise either numerical or categorical values.
While it may be true that machine learning model development is more successful with a larger dataset, it may also be the case that the whole dataset isn't used to train the model. A test dataset may be a portion of the original dataset which is not presented to the algorithm for model training purposes. Instead, the test dataset may be used for what may be known as “model validation,” which may be a mathematical evaluation of how successfully a machine learning algorithm has learned and incorporated the underlying relationships within the original dataset into a machine learning model. This may include evaluating model performance according to whether the model is over-fit or under-fit. As it may be assumed that all datasets contain some level of error, it may be important to evaluate and optimize the model performance and associated model fit by means of model validation. In general, the variability in model fit (e.i. whether a model is over-fit or under-fit) may be described by the “bias-variance trade-off” As an example, a model with high bias may be an under-fit model, where the developed model is over-simplified, and has either not fully learned the relationships within the dataset or has over-generalized the underlying relationships. A model with high variance may be an over-fit model which has overlearned about non-generalizable relationships within training dataset which may not be present in the test dataset. In a non-limiting example, these non-generalizable relationships may be driven by factors such as intrinsic error, data heterogeneity, and the presence of outliers within the dataset. The selected ratio of training data to test data may vary based on multiple factors, including, in a non-limiting example, the homogeneity of the dataset, the size of the dataset, the type of algorithm used, and the objective of the model. The ratio of training data to test data may also be determined by the validation method used, wherein some non-limiting examples of validation methods include k-fold cross-validation, stratified k-fold cross-validation, bootstrapping, leave-one-out cross-validation, resubstituting, random subsampling, and percentage hold-out.
In addition to the parameters that exist within the dataset, such as the independent and dependent variables, machine learning algorithms may also utilize parameters referred to as “hyperparameters.” Each algorithm may have an intrinsic set of hyperparameters which guide what and how an algorithm learns about the training dataset by providing limitations or operational boundaries to the underlying mathematical workflows on which the algorithm functions. Furthermore, hyperparameters may be classified as either model hyperparameters or algorithm parameters.
Model hyperparameters may guide the level of nuance with which an algorithm learns about a training dataset, and as such model hyperparameters may also impact the performance or accuracy of the model that is ultimately generated. Modifying or tuning the model hyperparameters of an algorithm may result in the generation of substantially different models for a given training dataset. In some cases, the model hyperparameters selected for the algorithm may result in the development of an over-fit or under-fit model. As such, the level to which an algorithm may learn the underlying relationships within a dataset, including the intrinsic error, may be controlled to an extent by tuning the model hyperparameters.
Model hyperparameter selection may be optimized by identifying a set of hyperparameters which minimize a predefined loss function. An example of a loss function for a supervised regression algorithm may include the model error, wherein the optimal set of hyperparameters correlates to a model which produces the lowest difference between the predictions developed by the produced model and the dependent values in the dataset. In addition to model hyperparameters, algorithm hyperparameters may also control the learning process of an algorithm, however algorithm hyperparameters may not influence the model performance. Algorithm hyperparameters may be used to control the speed and quality of the machine learning process. As such, algorithm hyperparameters may affect the computational intensity associated with developing a model from a specific dataset.
Machine learning algorithms, which may be capable of capturing the underlying relationships within a dataset, may be broken into different categories. One such category may include whether the machine learning algorithm functions using supervised, unsupervised, semi-supervised, or reinforcement learning. The objective of a supervised learning algorithm may be to determine one or more dependent variables based on their relationship to one or more independent variables. Supervised learning algorithms are named as such because the dataset includes both independent and corresponding dependent values where the dependent value may be thought of as “the answer,” that the model is seeking to predict from the underlying relationships in the dataset. As such, the objective of a model developed from a supervised learning algorithm may be to predict the outcome of one or more scenarios which do not yet have a known outcome. Supervised learning algorithms may be further divided according to their function as classification and regression algorithms. When the dependent variable is a label or a categorical value, the algorithm may be referred to as a classification algorithm. When the dependent variable is a continuous numerical value, the algorithm may be a regression algorithm. In a non-limiting example, algorithms utilized for supervised learning may include Neural Networks, K-Nearest Neighbors, Naïve Bayes, Decision Trees, Classification Trees, Regression Trees, Random Forests, Linear Regression, Support Vector Machines (SVM), Gradient Boosting Regression, and Perception Back-Propagation.
The objective of unsupervised machine learning may be to identify similarities and/or differences between the data points within the dataset which may allow the dataset to be divided into groups or clusters without the benefit of knowing which group or cluster the data may belong to. Datasets utilized in unsupervised learning may not include a dependent variable as the intended function of this type of algorithm is to identify one or more groupings or clusters within a dataset. In a non-limiting example, algorithms which may be utilized for unsupervised machine learning may include K-means clustering, K-means classification, Fuzzy C-Means, Gaussian Mixture, Hidden Markov Model, Neural Networks, and Hierarchical algorithms.
In examples to determine a relationship using machine learning, machine learning model 1200 may be a neural network (NN), as illustrated in
Traditionally, to use a neural operator the input measurement sets may be along the same axis. However, with EM applications, the material function a(r) and physical response u(z) are EM measurements from near field 408, transition zone 410, and far field 412 (e.g., referring to
In acoustic applications, leak sources are defined in a 2D domain (z,r). However, measurements are obtained as reflected acoustic wave 800 (e.g., referring to
Material function 1300 may be defined as material function a(r) that may be two or more material properties such as magnetic permeability Mu(x) and electrical conductivity Sigma(x). Spikes 1302 may indicate magnetic permeability or electrical conductivity from pipe string 138, first casing 134, and second casing 136. Further, Phase(x) represents EM measurements from near field 408, transition zone 410, and far field 412 along the depth of wellbore 102. Phase(x) may be represented as the phase and or amplitude response from near field 408, transition zone 410, and far field 412. In examples, amplitude and phase may be combined.
Block 1704 may perform a Fourier Transform for each input channel of uplifted high dimension input data. Herein, each input channel may be defined as individual Nx-Ny, if x is 2D (x,y) images. Each input channel may process in parallel inside the FNO layers. The Fourier Transform may perform on Nx-Ny grid, in other words, it may follow x definition in material function a(x). After the Fourier Transform, each input channel may be mapped to the kernel R in frequency domain in block 1706, equivalent to Win block 1710 the special domain. Kernel R is a neural kernel inside a neural operator and may map the material to its physical response in a frequency domain. Kernel R is a global kernel in a time domain since the basis function in a Fourier Transform is a global function. Block 1708 performs an inverse Fourier Transform. In examples, blocks 1704, 1706, and 1708 may be combined into block 1710. Blocks 1704, 1706, and 1708 or alternatively block 1710 may be performed for a sufficient number of Fourier Tlayers.
Herein, a sufficient number of Fourier T layers may be defined as the number of Fourier T layers within a threshold of at least 95% of a target goal. The target goal may be numerically tested and verified. In examples, a sufficient number of Fourier T layers may be adjusted to a predetermined number. Block 1712 may map the high dimension to its original dimension. The output of FNO or PINO operator 1700 may be defined as physical response u(x). FNO or PINO operator 1700 is an operator approximation and may map an input function to another function. If during the training, PDE equation is used for error function calculation. FNO and PINO have similar structures. The only difference is that PINO uses PDE equation to evaluate the FNO network by inputting material function a(x) and predicted physical response to PDE equation to substituting the original cost function, which may be defined by predicted response and numerical forward modeling difference. Thus, the training grid size x and prediction grid size x may be different.
Additionally, neural operators may require that there are the same number of points sampled in material function a(x) and physical response u(x). However, material function a(x) and physical response u(x) are not the same in wellbore logging scenarios. This is because the material functions 1300 (e.g., referring to
For example,
For example,
With continued reference to block 2210, a threshold may be manually selected and optionally adjusted. Examples of a threshold may range between 50%-90%, 90%-99%, or 99%-99.9%, or the like. If the accuracy index is less than the threshold, block 2212 adjusts the neural operator in block 2208 and blocks 2208 and 2210 are repeated with the adjusted neural operator. Herein, adjusting the neural operator may be an iterative process. In examples, it may only be adjusted by 5% or less for every sampled point in every iteration until an acceptable threshold is achieved. Additionally, a threshold may require an adjustable input. However, if the average of the data set is within a threshold, the material function a(x) is output at block 2214. Additionally, the neural operator from block 2208 may be accepted as a valid neural operator for future operations once the accuracy index is within the threshold. Workflow 2200 is a detailed workflow which outputs material function a(x), however a more general workflow which also produces a material function a(x) may be implemented.
A more general approach to FNO or PINO neural operations may be applied with EM implementation.
For example,
In other examples, a neural operator may be applied to acoustic measurements.
Acoustic implementation of neural operators may still be possible even if velocity model 1604 (e.g., referring to
A more general approach to FINO or PINO neural operations may be applied with acoustic implementation.
Currently, inversion algorithms and beamforming are the primary implementation standard in the art. However, when determining pipe properties inversion algorithms fall short of efficiently solving for pipe status parameters even with using a simplified radial 1-D model. Similarly, beamforming algorithms may also fall short for efficiently solving for leak location parameters in 2-D, even with using high-performance computing or GPUs. The methods and systems discussed above are an improvement over current technology. Specifically, the methods and systems utilized above may implement a neural operator such as FNO or PINO to substitute the numerical forward modelling, update inputted functions of material function a(x) or physical response u(x) to align on the same axis, or change the leak source measurements from time domain to spatial domain. Finally, all measurements may be merged into a single function to minimize running time.
The systems and methods may include any of the various features disclosed herein, including one or more of the following statements.
Statement 1: A method may comprise obtaining one or more measurements, performing a measurement normalization on the one or more measurements to form one or more normalized measurements, forming a material function with the one or more normalized measurements, and forming a neural operator generated physical response with a neural operator and the material function.
Statement 2: The method of statement 1, wherein the neural operator is a Fourier Neural Operator (FNO) or a Physics-Informed Neural Operator (PINO).
Statement 3: The method of any preceding statements 1 or 2, wherein the one or more measurements are electromagnetic (EM) measurements from a near field, a transition zone, and a far field.
Statement 4: The method of any preceding statements 1, 2, or 3, further comprising forming an accuracy index with the neural operator generated physical response and the one or more normalized measurements.
Statement 5: The method of statement 4 further comprising comparing the accuracy index to a threshold.
Statement 6: The method of statement 5, further comprising accepting the neural operator if the accuracy index is greater than the threshold.
Statement 7: The method of statement 5, further comprising adjusting the material function if the neural operator is below the threshold.
Statement 8: A method may comprise obtaining one or more measurements, forming a beamforming map with the one or more measurements, and forming a neural operator leak source location map with a neural operator and the one or more measurements.
Statement 9: The method of statement 8, wherein the neural operator is a Fourier Neural Operator (FNO) or a physics-Informed Neural Operator (PINO).
Statement 10: The method of any preceding statements 8 or 9, wherein the one or more measurements are a reflected acoustic wave.
Statement 11: The method of statement 10, further performing a cross correlation with at least the beamforming map and the neural operator leak source location map.
Statement 12: The method of statement 11, wherein a cross correlation forms a comparison index.
Statement 13: The method of statement 12, further comprising accepting the neural operator if the comparison index is 1.
Statement 14: The method of statement 12, further comprising adjusting the neural operator if the comparison index is −1 or 0.
Statement 15: A non-transitory storage computer-readable medium storing one or more instructions that, when executed by a processor, may cause the processor to perform a measurement normalization on one or more measurements to form one or more normalized measurements, form a material function with the one or more normalized measurements, and form a neural operator generated physical response with a neural operator and the material function.
Statement 16: The non-transitory storage computer-readable medium of statement 15, wherein the neural operator is a Fourier Neural Operator (FNO) or a Physics-Informed Neural Operator (PINO).
Statement 17: The non-transitory storage computer-readable medium of any preceding statements 15 or 16, wherein the one or more measurements are electromagnetic (EM) from a near field, a transition zone, and a far field.
Statement 18: The non-transitory storage computer-readable medium of any preceding statements 15, 16, or 17, wherein the one or more instructions, that when executed by the processor, further cause the processor to form an accuracy index with the neural operator generated physical response and the one or more normalized measurements, and compare the accuracy index to a threshold.
Statement 19: The non-transitory storage computer-readable medium of statement 18, wherein the one or more instructions, that when executed by the processor, further cause the processor to accept the neural operator if the accuracy index is greater than the threshold.
Statement 20: The non-transitory storage computer-readable medium of statement 18, wherein the one or more instructions, that when executed by the processor, further cause the processor to adjust the material function if the neural operator is below the threshold.
The preceding description provides various embodiments of the systems and methods of use disclosed herein which may contain different method blocks and alternative combinations of components. It should be understood that, although individual embodiments may be discussed herein, the present disclosure covers all combinations of the disclosed embodiments, including, without limitation, the different component combinations, method block combinations, and properties of the system. It should be understood that the compositions and methods are described in terms of “including,” “containing,” or “including” various components or blocks, the compositions and methods can also “consist essentially of” or “consist of” the various components and blocks. Moreover, the indefinite articles “a” or “an,” as used in the claims, are defined herein to mean one or more than one of the element that it introduces.
For the sake of brevity, only certain ranges are explicitly disclosed herein. However, ranges from any lower limit may be combined with any upper limit to recite a range not explicitly recited, as well as ranges from any lower limit may be combined with any other lower limit to recite a range not explicitly recited, in the same way, ranges from any upper limit may be combined with any other upper limit to recite a range not explicitly recited. Additionally, whenever a numerical range with a lower limit and an upper limit is disclosed, any number and any included range falling within the range are specifically disclosed. In particular, every range of values (of the form, “from about a to about b,” or, equivalently, “from approximately a to b,” or, equivalently, “from approximately a-b”) disclosed herein is to be understood to set forth every number and range encompassed within the broader range of values even if not explicitly recited. Thus, every point or individual value may serve as its own lower or upper limit combined with any other point or individual value or any other lower or upper limit, to recite a range not explicitly recited.
Therefore, the present embodiments are well adapted to attain the ends and advantages mentioned as well as those that are inherent therein. The particular embodiments disclosed above are illustrative only and may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. Although individual embodiments are discussed, the disclosure covers all combinations of all of the embodiments. Furthermore, no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. Also, the terms in the claims have their plain, ordinary meaning unless otherwise explicitly and clearly defined by the patentee. It is therefore evident that the particular illustrative embodiments disclosed above may be altered or modified and all such variations are considered within the scope and spirit of those embodiments. If there is any conflict in the usages of a word or term in this specification and one or more patent(s) or other documents that may be incorporated herein by reference, the definitions that are consistent with this specification should be adopted.