This disclosure relates generally to determining rock strengths, and more particularly, to a systems and methods for digitally determining rock strengths in situ using penetration gradients.
In the oil and gas industry, field development can depend upon a fracturing plan. Proper rock characterization enables design of the fracturing plan. Rock characterization is performed by determining properties of a formation. For fracturing, rock fracability is a characterization that indicates the tendency of a rock to fail in response to force (e.g., loading). Rock fracability is dependent upon rock strength. Rock strength is a measure of force required to rupture a rock and is dependent on multiple properties such as density, porosity, grain size and shape, and integrity.
In general, different rocks differ in their strength; denser rocks such as dolomites and limestones are stronger than less dense rocks such as shales or sandstones. Strength is generally characterized by greater surface area contact between grains, but the behavior of solid materials under force is complex; therefore, to develop the fracturing plan, rock strength is measured in labs using rock samples (e.g., core samples) to determine resistance to deformation under force. For instance, a scratch test measures a resistance of the rock sample to indentation due to a constant compression load, while triaxial load frame testing measures a resistance of the rock sample to shearing due to a constant compression load from a pressurized fluid. Indirect methods may also be used to estimate rock strength. For instance, mechanical earth models (MEMs) that illustrate relationships between different properties and rock fracability may be generated from logging data such as seismic data, mud logs, well logs, image data, in situ temperature, stress, and pressure measurements, or a combination thereof.
Various details of the present disclosure are hereinafter summarized to provide a basic understanding. This summary is not an extensive overview of the disclosure and is neither intended to identify certain elements of the disclosure, nor to delineate the scope thereof. Rather, the primary purpose of this summary is to present some concepts of the disclosure in a simplified form prior to the more detailed description that is presented hereinafter.
According to an embodiment consistent with the present disclosure, a system can include a computer-readable medium storing computer-executable instructions and one or more processors communicatively coupled to a computer-readable medium storing computer-executable instructions, which, when executed by the one or more processors cause the one or processors to receive data of a fracking stage, determine a penetration gradient of the fracking stage based on the data, and classify the fracking stage based on the penetration gradient.
In another embodiment consistent with the present disclosure, a method for determining a strength of a formation material can include receiving, using one or more sensors, data of a fracking stage, determining a penetration gradient of the fracking stage based on the data, and classifying the fracking stage based on the penetration gradient.
Any combinations of the various embodiments and implementations disclosed herein can be used in a further embodiment, consistent with the disclosure. These and other aspects and features are better appreciated according to the following description of certain embodiments presented herein in accordance with the disclosure and the accompanying drawings and claims.
Embodiments of the present disclosure will now be described in detail with reference to the accompanying Figures. Further, in the following detailed description of embodiments of the present disclosure, numerous specific details are set forth in order to provide a more thorough understanding of the claimed subject matter. However, it will be apparent to one of ordinary skill in the art that the embodiments disclosed herein may be practiced without these specific details. In other instances, well-known features have not been described in detail to avoid unnecessarily complicating the description. Additionally, it will be apparent to one of ordinary skill in the art that the scale of the elements presented in the accompanying Figures may vary without departing from the scope of the present disclosure.
Embodiments in accordance with the present disclosure generally relate to determining rock strengths, and more particularly, to systems and methods for digitally determining rock strengths in situ using penetration gradients. As described above, rock strength can be measured in labs using rock samples from core samples or estimated using indirect methods, such as MEMs. Lab data, as used herein, collectively refers to lab measurements and indirect methods of estimating rock strength. However, the lab data does not include in situ measurements of a formation in response to fracking. Examples are described herein in which a system is used for determining rock strengths in situ using one or more penetration gradients. The penetration gradients can be used to validate the lab data and improve rock strength estimates derived from the lab data. By validating lab data and improving rock strength estimates, the penetration gradients may be used to improve a fracking plan for each fracking stage. Additionally, the system can be used in other industries outside of oil and gas, for example, in the mining industry, the quarry industry, the hydrological industry, or like industries in which drilling or quarrying of subterranean formations can performed. Thus, the system as described herein can be used in any environment or industry to improve rock strength determinations.
The system can include a perforation device having a logging device and a shaped charge device. The shaped charge device is to create a cluster of one or more perforation tunnels in the formation material of a fracking stage. The logging device is to detect a depth of each perforation tunnel of the one or more perforation tunnels. A strength tester (e.g., implemented as computer-executable instructions) of the system is to receive the one or more depths of the fracking stage and determine a corrected shaped charge force per cluster of the fracking stage. The strength tester is to determine a penetration gradient of each cluster of the fracking stage based on the one or more depths and the corrected shaped charge force. The strength tester uses Equation 1, for example, to determine the penetration gradient:
where n is a number of perforation tunnels of a cluster, and where a unit of the penetration gradient is Newtons per inch (N/in). The strength tester divides the corrected shaped charge force of the cluster by a depth of each perforation tunnel of the one or more perforation tunnels of the cluster, respectively, to determine a penetration gradient for each perforation tunnel. The strength tester sums the penetration gradients of each perforation tunnel to determine the penetration gradient of the cluster. In response to a fracking stage including multiple clusters, the strength tester sums the penetration gradients of each cluster of the fracking stage to determine a penetration gradient of the fracking stage.
The strength tester may output a plot of the penetration gradient of the fracking stage versus lab data. The lab data may be uniaxial compressive strength (UCS) measurements, for example. The UCS measurements may represent mechanical, geological, or petrophysical data for a type of rock, for example. In some embodiments, the strength tester determines, using the plot, a risk profile for the cluster of the one or more perforation tunnels in a formation of the fracking stage and outputs a classification of the fracking stage based on the risk profile. Based on the classification, the shaped charge device may create one or more additional tunnels in the formation of the fracking stage. By enabling in situ determination of rock strength of a formation material of a fracking stage, the system enables improving a determination of a number of perforation clusters within the fracking stage. Improving the determination of the number of perforation clusters within the fracking stage improves resource extraction from the fracking stage.
The data of the logging device 116 (e.g., the data detected by the sensor 118) is input to the strength tester 108 of the system 100. In a non-limiting example, the data is stored to a computer-readable medium 106 of the system 100 by the processor 102. The strength tester 108 is a computer application including computer-executable instructions stored to the computer-readable medium 106, for example. Execution of the computer-executable instructions by the processor 102 causes the processor 102 to determine a penetration gradient of the fracking stage based on the data. In a non-limiting example, the processor 102 retrieves the data from the computer-readable medium 106 to determine the penetration gradient of the fracking stage. In another non-limiting example, the processor 102 receives the sensor data from the logging device 116 to determine the penetration gradient of the fracking stage. The strength tester 108 uses Equation 1, as described herein, to determine the penetration gradient of the fracking stage. For example, the processor 102 determines a corrected shaped charge force of the cluster. The corrected shaped charge force of the cluster corrects for the energy loss (e.g., force loss) due to casing. In a non-limiting example, the processor 102 determines the corrected shaped charge force of the cluster by looking up a value stored to the computer-readable medium 106 as the lab data 110. The value may be a result of a yard test, for example. The processor 102 determines the penetration gradient of the cluster based on the corrected shaped charge force and the depth of each perforation tunnel of the one or more perforation tunnels. In a non-limiting example, the cluster includes multiple perforation tunnels, and the processor 102 determines a penetration gradient of each perforation tunnel of the multiple perforation tunnels by dividing the corrected shaped charge force by a depth for each perforation tunnel. The processor 102 sums the penetration gradients of each perforation tunnel of the multiple perforation tunnels to determine the penetration gradient of the cluster. In another non-limiting example, the fracking stage includes multiple clusters, and the processor 102 determines the penetration gradient of the fracking stage by summing the penetration gradient of each cluster of the multiple clusters.
The strength tester 108 classifies the fracking stage based on the penetration gradient of the fracking stage. In a non-limiting example, the strength tester 108 outputs a plot of each penetration gradient associated with the fracking stage versus lab data 110 associated with the fracking stage (e.g., the plot 300 of penetration gradients of multiple fracking stages, as described herein with respect to
In a non-limiting example, the processor 102 causes the shaped charge device 114 to create one or more additional perforation tunnels in the fracking stage based on the classification of the fracking stage. For example, in response to the risk, the strength tester 108 may determine a number of clusters to create in the fracking stage to improve resource extraction. The strength tester 108 may compare the number of clusters to a number of clusters of a perforation plan for the fracking stage and increase or decrease the number of clusters of the perforation plan for the fracking stage to be equivalent to the number of clusters determined in response to the risk.
The strength tester 108 may output the penetration gradient of the fracking stage, the classification of the fracking stage, the risk associated with the fracking stage, the number of clusters determined in response to the risk, the perforation plan, an updated perforation plan, or a combination thereof, as strength test data 120. In a non-limiting example, the processor 102 causes a display device 122 to display the strength test data 120, as described with respect to
Using the strength tester 108 for determining a penetration gradient of a fracking stage in situ eliminates an uncertainty caused by reliance upon lab data 110 alone, minimizes human errors resulting from measurements of the lab data 110, and improves recovery of resources of the fracking stage. Furthermore, because the strength tester 108 stores strength test data in digital form (e.g., in the computer-readable medium 106), this can improve recovery of resources by increasing a pool of available strength test data for formations of different materials.
In a non-limiting example, a computer system, as described with respect to
In some applications, the multiple fracking stages 210 can form part of an oil or gas infrastructure. For example, the multiple fracking stages 210 can correspond to different sections within an upstream sector. The upstream sector (also known as exploration and production) covers exploration, recovery, and production of crude oil and natural gas. Examples are presented herein in which the strength tester 218 is used for improving a determination of a number of perforation tunnels within each of the multiple fracking stages 210 to facilitate recovery and production in the upstream sector. However, in other examples, the strength tester 218 can be used in other industries.
In some examples, the strength tester 218 can output strength test data 220 characterizing the respective strength for each fracking stage of the multiple fracking stages 210. The strength test data 220 can then be rendered on a display device (e.g., the display device 122 described with respect to
In a non-limiting example, the shaped charge device 208 creates a cluster of multiple perforation tunnels 212 in a formation material of a fracking stage 210a. The shaped charge device 208 may create the cluster using techniques described with respect to
In a non-limiting example, the strength tester 218 outputs a plot of the penetration gradient associated with the fracking stage 210a versus lab data 214 associated with the fracking stage 210a. The lab data 214 may be the lab data 110 of
In a non-limiting example, the process is repeated for each fracking stage of the multiple fracking stages 210. In some example, a number of clusters of perforation tunnels 212 in a first fracking stage of the multiple fracking stages 210 is different than a number of clusters of perforation tunnels 212 in a second fracking stage of the multiple fracking stages 210.
In view of the foregoing structural and functional features described herein, an example method will be better appreciated with reference to
In a non-limiting example, the method 500 can begin at 502 by receiving data (e.g., data of sensor 118, as described with respect to
In view of the foregoing structural and functional description, those skilled in the art will appreciate that portions of the embodiments described herein may be implemented as a method, data processing system, or computer program product (e.g., computer application). Accordingly, these portions of the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware, such as shown and described with respect to the computer system of
Certain embodiments described herein have also been described herein with reference to block illustrations of methods, systems, and computer program products. It will be understood that blocks of the illustrations, and combinations of blocks in the illustrations, can be implemented by computer-executable instructions. These computer-executable instructions may be provided to one or more processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus (or a combination of devices and circuits) to produce a machine, such that the instructions, which execute via the processor, implement the functions specified in the block or blocks. These computer-executable instructions may also be stored in a computer-readable medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable medium result in an article of manufacture including instructions which implement the function specified in the flowchart block or blocks. The computer-executable instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
Computer system 600 includes processing unit 602, system memory 604, and system bus 606 that couples various system components, including the system memory 604, to processing unit 602. Dual microprocessors and other multi-processor architectures also can be used as processing unit 602. System bus 606 may be any of several types of bus structure including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. System memory 604 includes read only memory (ROM) 610 and random access memory (RAM) 612. A basic input/output system (BIOS) 614 can reside in ROM 610 containing the basic routines that help to transfer information among elements within computer system 600.
Computer system 600 can include a hard disk drive 616, magnetic disk drive 618, e.g., to read from or write to removable disk 620, and an optical disk drive 622, e.g., for reading CD-ROM disk 624 or to read from or write to other optical media. Hard disk drive 616, magnetic disk drive 618, and optical disk drive 622 are connected to system bus 606 by a hard disk drive interface 626, a magnetic disk drive interface 628, and an optical drive interface 630, respectively. The drives and associated computer-readable media provide nonvolatile storage of data, data structures, and computer-executable instructions for computer system 600. Although the description of computer-readable media above refers to a hard disk, a removable magnetic disk and a CD, other types of media that are readable by a computer, such as magnetic cassettes, flash memory cards, digital video disks and the like, in a variety of forms, may also be used in the operating environment; further, any such media may contain computer-executable instructions for implementing one or more parts of embodiments shown and described herein.
A number of program modules may be stored in drives and RAM 612, including operating system 632, one or more computer application programs 634, other program modules 636, and program data 638. In some examples, the computer application programs 634 can include one or more sets of computer-executable instructions of the strength tester 108 of
A user may enter commands and information into computer system 600 through one or more input devices 640, such as a pointing device (e.g., a mouse, touch screen), keyboard, microphone, joystick, game pad, scanner, and the like. The input device 640 may be the input device 104, for example. The user can employ input device 640 to edit or modify the strength tester 108 of
Computer system 600 may operate in a networked environment using logical connections to one or more remote computers, such as remote computer 648. Remote computer 648 may be a workstation, computer system, router, peer device, or other common network node, and typically includes many or all the elements described relative to computer system 600. The logical connections, schematically indicated at 650, can include a local area network (LAN) and a wide area network (WAN). When used in a LAN networking environment, computer system 600 can be connected to the local network through a network interface or adapter 652. When used in a WAN networking environment, computer system 600 can include a modem, or can be connected to a communications server on the LAN. The modem, which may be internal or external, can be connected to system bus 606 via an appropriate port interface. In a networked environment, computer application programs 634 or program data 638 depicted relative to computer system 600, or portions thereof, may be stored in a remote memory storage device 654.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to limit this disclosure. As used herein, the singular forms “a,” “an,” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “contains”, “containing”, “includes”, “including,” “comprises”, and/or “comprising,” and variations thereof, when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Also, the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting. The use of “including,” “comprising,” “having,” “containing,” “involving,” and variations thereof herein, is meant to encompass items listed thereafter and equivalents thereof as well as additional items. While the disclosure has described several exemplary embodiments, it will be understood by those skilled in the art that various changes can be made, and equivalents can be substituted for elements thereof, without departing from the spirit and scope of the invention.
In addition, many modifications will be appreciated by those skilled in the art to adapt a particular instrument, situation, or material to embodiments of the disclosure without departing from the essential scope thereof. Therefore, it is intended that the invention not be limited to the particular embodiments disclosed, or to the best mode contemplated for carrying out this invention, but that the invention will include all embodiments falling within the scope of the appended claims. While the present disclosure has been described with respect to a limited number of embodiments, those skilled in the art, having benefit of this disclosure, will appreciate that other embodiments may be devised which do not depart from the scope of the disclosure as described herein. Accordingly, the scope of the disclosure should be limited only by the attached claims.
Number | Name | Date | Kind |
---|---|---|---|
6679323 | Vargervik et al. | Jan 2004 | B2 |
8096355 | McDaniel | Jan 2012 | B2 |
8126646 | Grove et al. | Feb 2012 | B2 |
9328606 | D'Angelo | May 2016 | B2 |
9376902 | Prioul et al. | Jun 2016 | B2 |
9725993 | Yang | Aug 2017 | B1 |
10352153 | Bell | Jul 2019 | B2 |
10364387 | Collier | Jul 2019 | B2 |
11326422 | Burky | May 2022 | B2 |
11499401 | Eitschberger | Nov 2022 | B2 |
11585646 | Haggerty | Feb 2023 | B2 |
20070044969 | Grove | Mar 2007 | A1 |
20160348479 | Oehring et al. | Dec 2016 | A1 |
20210215039 | Scharf et al. | Jul 2021 | A1 |
20210270115 | Pfutzner et al. | Sep 2021 | A1 |
Number | Date | Country |
---|---|---|
101476488 | Jul 2009 | CN |
2457082 | May 2012 | EP |
Entry |
---|
Kahraman, S., Aloglu, A.S., Aydin, B. and Saygin, E., 2017. The needle penetration test for predicting coal strength. Journal of the Southern African Institute of Mining and Metallurgy, 117(6), pp. 587-591. |
Zhang, Hui, Deng, Qiao, Li, Jun, Hou, Xuejun, and Hao Wang. “A New Method of Estimating Penetration Depth With Different Perforation Parameters.” Paper presented at the ISRM International Symposium—10th Asian Rock Mechanics Symposium, Singapore, Oct. 2018. |
Harvey, J., Grove, B. and Zhan, L., 2012, February. Stressed rock penetration depth correlation. In SPE International Symposium and Exhibition on Formation Damage Control. OnePetro. |
Huang, H., 2012, March. Effects of high pressure strength of rock material on penetration by shaped charge jet. In AIP Conference Proceedings (vol. 1426, No. 1, pp. 1153-1156). American Institute of Physics. |
Number | Date | Country | |
---|---|---|---|
20240218778 A1 | Jul 2024 | US |