Oil and gas extraction from subsurface rock formations requires drilling of wells using drilling rigs mounted on the ground surface or offshore rig platforms. While drilling, logging while drilling (LWD) tools may be used to measure properties of the subsurface rock formations. Typically, LWD logs are transmitted to the surface at regular intervals using a telemetry method. LWD logs may be processed to, among other things, determine subsurface lithology, guide the direction of drilling, and identify and avoid drilling hazards.
This summary is provided to introduce a selection of concepts that are further described below in the detailed description. This summary is not intended to identify key or essential features of the claimed subject matter, nor is it intended to be used as an aid in limiting the scope of the claimed subject matter.
Embodiments disclosed herein generally relate to a method for constructing a high fidelity logging while drilling (LWD) log based on the temporal history of a drilling operation and the entirety of the an LWD tool memory. The method includes obtaining a temporal well depth log and a plurality of temporal logging while drilling (LWD) logs from a drilling operation, wherein the drilling operation includes a drill bit traversing through a subsurface at a plurality of depths and obtaining a temporal record of operational drilling parameters from the drilling operation. The method further includes determining, using a first machine-learning model, a temporal history of the drilling operation, wherein the first machine-learning model accepts, at least in part, the temporal well depth log and the temporal record of operational drilling parameters. The method further includes constructing, using the temporal well depth log and the plurality of temporal LWD logs, a plurality of temporal property logs at each depth in the plurality of depths, wherein each temporal property log includes a plurality of data points. The method further includes identifying and removing outlier data points from each of the temporal property logs based on the temporal history and processing the plurality of temporal property logs with, at least, a second machine-learning model to form a plurality of corrected temporal property logs. The method further includes aggregating the plurality of corrected temporal property logs to form a plurality of high fidelity LWD logs and determining a lithology of the subsurface using, at least in part, the plurality of high fidelity LWD logs.
Embodiments disclosed herein generally relate to a non-transitory computer-readable memory comprising computer-executable instructions stored thereon that, when executed on a processor, cause the processor to perform the following steps. The steps include receiving a temporal well depth log and a plurality of temporal logging while drilling (LWD) logs from a drilling operation, wherein the drilling operation includes a drill bit traversing through a subsurface at a plurality of depths and receiving a temporal record of operational drilling parameters from the drilling operation. The steps further include determining, using a first machine-learning model, a temporal history of the drilling operation, wherein the first machine-learning model accepts, at least in part, the temporal well depth log and the temporal record of operational drilling parameters and constructing, using the temporal well depth log and the plurality of temporal LWD logs, a plurality of temporal property logs at each depth in the plurality of depths, wherein each temporal property log comprises a plurality of data points. The steps further include identifying and removing outlier data points from each of the temporal property logs based on the temporal history and processing the plurality of temporal property logs with, at least, a second machine-learning model to form a plurality of corrected temporal property logs. The steps further include aggregating the plurality of corrected temporal property logs to form a plurality of high fidelity LWD logs and determining a lithology of the subsurface using, at least in part, the plurality of high fidelity LWD logs.
Embodiments disclosed herein generally relate to a system that includes a well site performing a drilling operation, where the drilling operation comprises a drill bit traversing through a subsurface, a plurality of logging while drilling (LWD) tools configured to measure properties of the subsurface, and a temporal record of operational drilling parameters of the well site. The system further includes a temporal well depth log and a plurality of temporal LWD logs, one for each LWD tool, where each temporal LWD log includes measurements of an associated property of the subsurface over a period of time. The system further includes a first machine-learning model, a second machine-learning model, and a computer with one or more computer processors and a non-transitory computer-readable memory storing computer-executable instructions that when executed on the one or more computer processors cause the one or more compute processors to perform the following steps. The steps include: receiving the temporal well depth log and the plurality of temporal logging while drilling (LWD) logs; receiving the temporal record of operational drilling parameters; and determining, using the first machine-learning model, a temporal history of the drilling operation, where the first machine-learning model accepts, at least in part, the temporal well depth log and the temporal record of operational drilling parameters. The steps further include: constructing, using the temporal well depth log and the plurality of temporal LWD logs, a plurality of temporal property logs at each depth in the plurality of depths, where each temporal property log comprises a plurality of data points; identifying and removing outlier data points from each of the temporal property logs based on the temporal history; and processing the plurality of temporal property logs with, at least, the second machine-learning model to form a plurality of corrected temporal property logs. The steps further include: aggregating the plurality of corrected temporal property logs to form a plurality of high fidelity LWD logs; and determining a lithology of the subsurface using, at least in part, the plurality of high fidelity LWD logs.
Other aspects and advantages of the claimed subject matter will be apparent from the following description and the appended claims.
Specific embodiments of the disclosed technology will now be described in detail with reference to the accompanying figures. Like elements in the various figures are denoted by like reference numerals for consistency.
In the following detailed description of embodiments of the disclosure, numerous specific details are set forth in order to provide a more thorough understanding of the disclosure. However, it will be apparent to one of ordinary skill in the art that the disclosure may be practiced without these specific details. In other instances, well-known features have not been described in detail to avoid unnecessarily complicating the description.
Throughout the application, ordinal numbers (e.g., first, second, third, etc.) may be used as an adjective for an element (i.e., any noun in the application). The use of ordinal numbers is not to imply or create any particular ordering of the elements nor to limit any element to being only a single element unless expressly disclosed, such as using the terms “before,” “after,” “single,” and other such terminology. Rather, the use of ordinal numbers is to distinguish between the elements. By way of an example, a first element is distinct from a second element, and the first element may encompass more than one element and succeed (or precede) the second element in an ordering of elements.
It is to be understood that the singular forms “a,” “an,” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to “acoustic signal” includes reference to one or more of such acoustic signals.
Terms such as “approximately,” “substantially,” etc., mean that the recited characteristic, parameter, or value need not be achieved exactly, but that deviations or variations, including for example, tolerances, measurement error, measurement accuracy limitations and other factors known to those of skill in the art, may occur in amounts that do not preclude the effect the characteristic was intended to provide.
It is to be understood that one or more of the steps shown in the flowchart may be omitted, repeated, and/or performed in a different order than the order shown. Accordingly, the scope disclosed herein should not be considered limited to the specific arrangement of steps shown in the flowchart.
Although multiple dependent claims are not introduced, it would be apparent to one of ordinary skill that the subject matter of the dependent claims of one or more embodiments may be combined with other dependent claims.
For the purpose of drilling a new section of wellbore (102), a drill string (108) is suspended within the wellbore (102). The drill string (108) may include one or more drill pipes connected to form conduit and a bottom hole assembly (BHA) (114) disposed at the distal end of the conduit. The BHA (114) may include a drill bit (110) to cut into the subsurface rock. The drill string (108) may be suspended in a wellbore (102) by a derrick (118). A crown block may be mounted at the top of the derrick (118), and a traveling block may hang down from the crown block by means of a cable or drilling line. One end of the cable may be connected to a draw works, which is a reeling device that may be used to adjust the length of the cable so that the traveling block may move up or down the derrick (118). The traveling block may include a hook on which a top drive is supported.
The top drive is coupled to the top of the drill string (108) and is operable to rotate the drill string (108). Alternatively, the drill string (108) may be rotated by means of a rotary table on the drilling floor. Drilling fluid (112) (commonly called mud) may be stored in a mud pit (not shown), and at least one pump may pump the mud from the mud pit into the drill string (108). The mud may flow into the drill string (108) through appropriate flow paths in the top drive (or a rotary swivel if a rotary table is used instead of a top drive to rotate the drill string (108)).
While cutting rock with a drill bit (110), typically, the drilling fluid (112) is circulated (with a pump) through the drill string (108), out of the drilling fluid nozzle of the drill bit (110), and back to the surface (104) through the presumably annular space between the wellbore (102) and the drill string (108). To guide the drill bit (110), monitor the drilling process, and collect data about the subsurface formations (106), among other objectives, the BHA (114) of the drill string (108) may be outfitted with “logging while drilling” (LWD) tools, “measurement while drilling” (MWD) tools, and a telemetry module. An MWD or LWD tool is generally a collection of sensors and hardware (measuring devices), where each sensor records a sensed property or downhole drilling parameter in an associated log during the drilling process. The measurements may be transmitted to the surface using any suitable telemetry system known in the art. The BHA (114) and the drill string (108) may include other drilling tools known in the art but not specifically shown. Additionally, MWD and LWD logs may be recorded while drilling and stored on onboard tool memory. By means of example, common logs, or information collected by LWD devices, may include, but are not limited to, the density of the subsurface formations (106), the porosity of the subsurface formations (106), and temperature.
Typically, throughout the entire period of a drilling operation, the parameters measured by the LWD logging tools are recorded with respect to time in their respective tool memories. Upon returning to the surface, LWD logs may be retrieved from their respective tool memories to generate high resolution recorded-mode LWD well logs. Additionally, while drilling, coarser real-time LWD logs are also generated at the surface by a LWD engineer using a subsampled set of data that is telemetered to the surface with telemetry such as hydraulic mud-pulse or other means.
In some implementations, an operations system (120) may be disposed at or communicate with the well site (100). Operations system (120) may be configured to monitor and control at least a portion of a drilling operation at the well site (100) by providing controls to various components of the drilling operation. In one or more embodiments, the operations system (120) may receive data from one or more sensors arranged to measure controllable parameters of the drilling operation. As a nonlimiting example, sensors may be arranged to measure WOB (weight on bit), RPM (rotations per minute of the drill string; i.e., rotational speed), GPM (flow rate of the mud pumps in gallons per minute), and ROP (rate of penetration of the drilling operation). The operations system (120) may further include a geosteering system. The geosteering system guides the direction of the drill bit (110). Generally, the goal of the geosteering system is to steer, horizontally and laterally, the drill bit (110) through the “pay zone” (i.e., the high production zone of a reservoir) in real time.
In practice, while drilling a wellbore (102) the drill bit (110) does not progress through the subsurface formations (106) monotonically with time. That is, various surface or subsurface events may cause the drilling operation to be paused or for the drill bit (110) to be retracted. These events may include, but are not limited to: making drill string (108) connections; circulating drilling fluid (112); cleaning the wellbore (102); and removing and/or freeing drilling equipment stuck or lodged in the wellbore (102). For example, when using a top drive, drill string (108) connections are typically made every 90 feet. Further, when using a Kelly bushing and a rotary table, the drill string (108) must be retracted by 30 feet in order to add a single 30 foot section of drill pipe to the drill string (108). During the drilling operation, drilling fluid (112) may be circulated in order to control the density and/or rheology of the contents of the wellbore (102). During a period of drilling fluid (112) circulation, the drill bit (110) may be retracted by distances of hundreds of feet or more. Further, portions of the wellbore (102) may swell or otherwise constrict the wellbore (102) requiring that the drill bit (110) be retracted to make multiple cutting passes through those portions of the wellbore (102). One with ordinary skill in the art will appreciate that there are many events during a drilling operation that could trigger the need to pause, reverse, cycle, slow, or otherwise alter the progression of the drill bit (110) through one or more subsurface formations (106) during a drilling operation, such that not all possible events need be enumerated herein without posing a limitation on the instant disclosure.
To make the recorded-mode LWD logs, the recorded datasets from the various LWD tools are automatically processed, calibrated, and combined together using a time-depth merge algorithm. The result of these processes is one or more measured parameters each displayed in a column against a single, shared, increasing depth axis on a composite depth (measured depth) log. In other words, the time-depth merge algorithm, when applied to recorded-mode LWD logs, produces conventional LWD logs (200) as those shown in
Further, using certain physical principles as guiding constraints along with artificial intelligence (AI) methods and algorithms, embodiments disclosed herein exploit the repeat-pass recorded tool data, to improve the precision of the well log data, refine the interpretation of certain targeted quantities (such as formation porosity, a measurement better measured with deep water based mud filtrate invasion to minimize effect of hydrocarbons), and extract formation dynamics, which can change and evolve rapidly in time, due to drilling-related perturbations of the near-wellbore formation, such as drilling fluid invasion.
In many instances, the progression of the drill bit (110) through the subsurface (i.e., increasing well depths (212)) is not strictly monotonic with respect to operation time. In general, a drill bit (110) may be paused, cycled, and/or retracted many times during a drilling operation.
In general, the measurements acquired by an LWD tool at a given well depth (212) may be temporally separated by minutes, hours, or even days. Over the elapsed time various properties of the subsurface formations (106) may change. As another example,
The examples of
where MV is the measured value and e represents random error. The drill bit history is a temporal record of prior drill string events and measured values. Currently, in the art, conventional LWD logs (200), like those shown in
In accordance with one or more embodiments, one or more machine-learning models is/are used to construct a temporal history of the drill string operation, correct property logs, and determine petrophysical properties of a subsurface based on observed changes in measured properties with time. Machine learning, broadly defined, is the extraction of patterns and insights from data. The phrases “artificial intelligence”, “machine learning”, “deep learning”, and “pattern recognition” are often convoluted, interchanged, and used synonymously throughout the literature. This ambiguity arises because the field of “extracting patterns and insights from data” was developed simultaneously and disjointedly among a number of classical arts like mathematics, statistics, and computer science. For consistency, the term machine learning, or machine-learned, will be adopted herein, however, one skilled in the art will recognize that the concepts and methods detailed hereafter are not limited by this choice of nomenclature.
Machine-learning model types may include, but are not limited to, neural networks, random forests, generalized linear models, and Bayesian regression. Machine-learned model types are usually associated with additional “hyperparameters” which further describe the model. For example, hyperparameters providing further detail about a neural network may include, but are not limited to, the number of layers in the neural network, choice of activation functions, inclusion of batch normalization layers, and regularization strength. Commonly, in the literature, the selection of hyperparameters surrounding a model is referred to as selecting the model “architecture”.
Once a machine-learning model type and architecture have been selected, the machine-learned model is typically trained using a training set of data. The training data is composed of input and target pairs. Common training techniques, such as early stopping, adaptive or scheduled learning rates, and cross-validation may be used during training without departing from the scope of this disclosure.
In some embodiments, the selected machine-learning model type is a neural network. A diagram of a neural network is shown in
Nodes (602) and edges (604) carry additional associations. Namely, every edge is associated with a numerical value. The edge numerical values, or even the edges (604) themselves, are often referred to as “weights” or “parameters”. While training a neural network (600), numerical values are assigned to each edge (604). Additionally, every node (602) is associated with a numerical variable and an activation function. Activation functions are not limited to any functional class, but traditionally follow the form
A=ƒ(Σi∈(incoming)[(node value)i(edge value)i]),
where i is an index that spans the set of “incoming” nodes (602) and edges (604) and f is a user-defined function. Incoming nodes (602) are those that, when viewed as a graph (as in
and rectified linear unit function ƒ(x)=max(0, x), however, many additional functions are commonly employed. Every node (602) in a neural network (600) may have a different associated activation function. Often, as a shorthand, activation functions are described by the function ƒ by which it is composed. That is, an activation function composed of a linear function ƒ may simply be referred to as a linear activation function without undue ambiguity.
When the neural network (600) receives an input, the input is propagated through the network according to the activation functions and incoming node (602) values and edge (604) values to compute a value for each node (602). That is, the numerical value for each node (602) may change for each received input. Occasionally, nodes (602) are assigned fixed numerical values, such as the value of 1, that are not affected by the input or altered according to edge (604) values and activation functions. Fixed nodes (602) are often referred to as “biases” or “bias nodes” (606), displayed in
In some implementations, the neural network (600) may contain specialized layers (605), such as a normalization layer, or additional connection procedures, like concatenation. One skilled in the art will appreciate that these alterations do not exceed the scope of this disclosure.
As noted, the training procedure for the neural network (600) comprises assigning values to the edges (604). To begin training the edges (604) are assigned initial values. These values may be assigned randomly, assigned according to a prescribed distribution, assigned manually, or by some other assignment mechanism. Once edge (604) values have been initialized, the neural network (600) may act as a function, such that it may receive inputs and produce an output. As such, at least one input is propagated through the neural network (600) to produce an output. Recall, that a given training data set will be composed of inputs and associated target(s), where the target(s) represent the “ground truth”, or the otherwise desired output. The neural network (600) output is compared to the associated input data target(s). The comparison of the neural network (600) output to the target(s) is typically performed by a so-called “loss function”; although other names for this comparison function such as “error function” and “cost function” are commonly employed. Many types of loss functions are available, such as the mean-squared-error function, however, the general characteristic of a loss function is that the loss function provides a numerical evaluation of the similarity between the neural network (600) output and the associated target(s). The loss function may also be constructed to impose additional constraints on the values assumed by the edges (604), for example, by adding a penalty term, which may be physics-based, or a regularization term. Generally, the goal of a training procedure is to alter the edge (604) values to promote similarity between the neural network (600) output and associated target(s) over the data set. Thus, the loss function is used to guide changes made to the edge (604) values, typically through a process called “backpropagation”.
While a full review of the backpropagation process exceeds the scope of this disclosure, a brief summary is provided. Backpropagation consists of computing the gradient of the loss function over the edge (604) values. The gradient indicates the direction of change in the edge (604) values that results in the greatest change to the loss function. Because the gradient is local to the current edge (604) values, the edge (604) values are typically updated by a “step” in the direction indicated by the gradient. The step size is often referred to as the “learning rate”, similar to but not to be confused with, the learning rate of gradient boosted trees, and need not remain fixed during the training process. Additionally, the step size and direction may be informed by previously seen edge (604) values or previously computed gradients. Such methods for determining the step direction are usually referred to as “momentum” based methods.
Once the edge (604) values have been updated, or altered from their initial values, through a backpropagation step, the neural network (600) will likely produce different outputs. Thus, the procedure of propagating at least one input through the neural network (600), comparing the neural network (600) output with the associated target(s) with a loss function, computing the gradient of the loss function with respect to the edge (604) values, and updating the edge (604) values with a step guided by the gradient, is repeated until a termination criterion is reached. Common termination criteria are: reaching a fixed number of edge (604) updates, otherwise known as an iteration counter; a diminishing learning rate; noting no appreciable change in the loss function between iterations; reaching a specified performance metric as evaluated on the data or a separate hold-out data set. Once the termination criterion is satisfied, and the edge (604) values are no longer intended to be altered, the neural network (600) is said to be “trained”.
In accordance with one or more embodiments,
The temporal well depth log (701) and the temporal record of operational drilling parameters (704) are processed by a first machine-learning model (706). The first machine-learning model (706) assigns a drilling event to each time during the drilling operation. In other words, the first machine-learning model outputs a temporal history (708), where the temporal history includes a collection of ordered drilling events.
The temporal well depth log (701) may be evaluated with the plurality of temporal LWD logs (702) to create a plurality of temporal property logs (710). A temporal property log indicates the values of a property of measured quantity, as sensed by an LWD tool, with respect to time (e.g.,
In accordance with one or more embodiments, the plurality of temporal property logs (710), after erroneous data points have been identified and removed, is processed by a second machine-learned model (714). The second machine-learning model (714) accepts a temporal property log along with the temporal history (708) and outputs a corrected temporal property log. The second machine-learning model (714) effectively acts as a surrogate for EQ. 1, where the second machine-learning model (714) is capable of predicting a measured value of a temporal log while accounting for the time elapsed and history of drilling events. In accordance with one or more embodiments, the second machine-learned model (714) is trained using a loss function that is regularized or constrained with physical information. For example, the loss function may require that the predicted value of temperature increase monotonically with well depth (212) after accounting for drilling events. In accordance with one or more embodiments, the second machine-learned model determines a corrected formation temperature for each true vertical depth (502) taking into account the temporal history of the drill bit (110), elapsed time, and current drilling event. The corrected formation temperature is then used to correct the measured values of other properties (e.g., density, porosity, etc.). When applied to each temporal property log, the second machine-learning model produces a plurality of corrected temporal property logs (716). In one or more embodiments, a single machine-learning model is constructed to perform the functions of the first and second machine-learning models such that only one machine-learned model is required.
In accordance with one or more embodiments, the plurality of corrected temporal property logs (716) is analyzed to characterize properties of the subsurface formations (106) as shown in Block 718. For example, changes in measured values with respect to time, after correction of drilling events, is used to provide enhanced petrophysical interpretation of the subsurface. In accordance with one or more embodiments, the plurality of corrected temporal property logs (716) is used to construct a hydrocarbon quick-look log. The hydrocarbon quick-look log depicts differences in measured properties and/or parameters of the subsurface formations (106) temporally to highlight the sweeping away of hydrocarbons by drilling fluid (112) invasion. In accordance with one or more embodiments, the hydrocarbon quick-look log is used to calibrate a change in shallow resistivity and/or shallow nuclear magnetic resonance (NMR).
In accordance with one or more embodiments, the plurality of corrected temporal property logs (716) is used to improve true formation resistivity (Rt) inversion. This is done by comparing successive passes (repeat data points) at each given depth with invasion under a monotonicity constraint. For example, accounting for drilling events, a level of invasion should increase monotonically with time, typically levelling off with drilling fluid (112) saturation. Thus, in one or more embodiments, any of the one more machine-learning models may include, and/or be trained with, a physics-based or physics-informed penalty or regularization term. For example, in one or more embodiments, any of the one or more machine-learning models may include a penalty term enforcing a monotonicity constraint on a measured property with respect to well depth.
In accordance with one or more embodiments, the measured values of the corrected property logs (716) are shifted to account for time-dependent factors and drilling events. Once shifted, the measured values in each log in a the plurality of corrected temporal property logs (716) are aggregated, as depicted in Block 720. For example, in one or more embodiments, the aggregation may involve an average where the measured values in a corrected temporal property log are combined into one mean value. Because a corrected temporal property log (716) exists for each well depth (212), the aggregated values may be collected to form an LWD log similar to the conventional LWD logs of
Returning once more to the temporal depth log (701), the temporal depth log (701) may be analyzed to determine a velocity profile of the drill bit (724). As previously stated, the temporal depth log (701) consists of the location of the drill bit (110) in terms of well depth (212) with respect to operation time. As such, the derivative of the temporal depth log (701) with respect to time yields the velocity of the drill bit (110) at each time during drilling (the drill bit velocity profile (726)). One with ordinary skill in the art will recognize that many methods may be employed to determine the derivative of the temporal well depth log (701). For example, a forward or centered finite difference method may be applied to the temporal well depth log (701) to determine the velocity profile of the drill bit (724). Typically, conventional LWD logs (200) are filtered. For example, a moving average or convolution filter may be employed to smooth a conventional LWD log. These filters are considered “windowed” filters as they act on a specified number of adjacent data points forming a window. As shown in Block 728, in one or more embodiments, an adaptive filter is applied to the high fidelity LWD logs (722). The adaptive filter is a windowed filter, however, the window size (or the number of adjacent data points considered) is not fixed. Rather, the window size is locally dependent on the drill bit velocity profile (726). The result of the adaptive filter applied to the high fidelity LWD logs (722) is a plurality of filtered high fidelity LWD logs (730). In some embodiments, the adaptive filter may be adjusted to increase the spatial resolution (well depth (212) resolution) of the resulting filtered high fidelity LWD logs (730).
In accordance with one or more embodiments,
The temporal well depth log (701), the temporal record of operational drilling parameters (704), and the one or more temporal LWD logs (703) are processed by a machine-learning model, depicted in
In one or more embodiments, each of the one or more corrected LWD logs (754) may be temporally aggregated, as depicted in Block 756. For example, in one or more embodiments, the aggregation may involve an average where the measured values in a corrected LWD log are combined into one mean value. In one or more embodiments, the aggregated values may be collected to form an LWD log similar to the conventional LWD logs of
Returning once more to the temporal depth log (701), the temporal depth log (701) may be analyzed to determine a velocity profile of the drill bit (724). As previously stated, the temporal depth log (701) consists of the location of the drill bit (110) in terms of well depth (212) with respect to operation time. As such, the derivative of the temporal depth log (701) with respect to time yields the velocity of the drill bit (110) at each time during drilling (the drill bit velocity profile (726)). One with ordinary skill in the art will recognize that many methods may be employed to determine the derivative of the temporal well depth log (701). For example, a forward or centered finite difference method may be applied to the temporal well depth log (701) to determine the velocity profile of the drill bit (724). Typically, conventional LWD logs (200) are filtered. For example, a moving average or convolution filter may be employed to smooth a conventional LWD log. These filters are considered “windowed” filters as they act on a specified number of adjacent data points forming a window. As shown in Block 728, in one or more embodiments, an adaptive filter is applied to the high fidelity LWD logs (722). The adaptive filter is a windowed filter, however, the window size (or the number of adjacent data points considered) is not fixed. Rather, the window size is locally dependent on the drill bit velocity profile (726). The result of the adaptive filter applied to the high fidelity LWD logs (722) is filtered high fidelity LWD logs (730). In some embodiments, the adaptive filter may be adjusted to increase the spatial resolution (well depth (212) resolution) of the resulting filtered high fidelity LWD logs (730).
In accordance with one or more embodiments, one or more of the machine-learning models may be trained to recognize various formation property changes with time. For example, one or more machine-learning models may be configured to detect approaching adjacent formations to aid in geosteering. In one or more embodiments, a machine-learning model is configured to compare shallow, medium, and deep resistivity sensors to sense whether drilling is occurring in a homogeneous formation, or approaching an adjacent formation which have drastic characteristics in terms of resistivity, such as a tight formation with high resistivity or water zone with low resistivity, so that complex horizontal wells can be placed in targeted reservoirs. In one or more embodiments, a machine-learning model is configured to detect fine-particle invasion. For example, by comparing the shallowest density measurements on different passes and how these measurements evolve with time, the second machine-learning model can detect fine-particle invasion through a drop in the computed porosity. Further, shallow NMR measurements can also show decreased relaxation times as a result of fine-particle invasion. Additionally, drilling fluid invasion that may have been detected through similar means, although it should be a higher-order perturbation to these quantities. In accordance with one or more embodiments, a machine-learning model is configured to determine drilling-induced formation fracturing. For example, a decrease in drilling fluid returns can be used as a gross indicator of formation fracturing. Finer fracturing can be indicated by an increase in porosity from shallow density measurements, changes in shallow NMR relaxation times (increasing), as well as changes in resistivity measurements (for example, increasing the induction resistivity due to oil-base mud invading into radial fractures).
In accordance with one or more embodiments, a machine-learning model may be configured to determine borehole diameter and/or shape changes. Borehole constriction can in an extreme case show up as an increase in surface torque. It can also show up as a shift in borehole fluid corrections for density or resistivity readings. “Egging” or ellipsoidal deformation of a borehole due to geological stress may show up in azimuthally-binned tool measurements, such as ultrasonic caliper (different diameter readings at different angles), azimuthal density (different stand-offs at different angles), azimuthal resistivity (shift in image coloration due to inaccurately-applied borehole fluid corrections at certain angles). In one or more embodiments, a machine-learning model may be configured to determine all of the identified quantities of the previously described embodiments. In practice, a machine-learning model configured to determine multiple quantities may take advantage of a principle known in the literature as joint learning, where the machine-learning model may exploit correlations between targets. In one or more embodiments, the second machine-learning model estimates the temperature of the downhole drilling fluid (112) at each depth and for each pass (time), taking into account the speed and pre-history of the logging tool and in particular, the cooling effect from the injection of drilling fluid (112). The estimated downhole drilling fluid (112) temperature is used to correct the measured resistivities and other downhole LWD measurements that exhibit a temperature dependence. Again, as previously stated, in one or more embodiments, a single machine-learning model is constructed to perform the functions of the first machine-learning model (drilling event identification) and second machine-learning models such that only one machine-learning model is required.
In accordance with one or more embodiments,
In one or more embodiments, the one or more machine-learning models (808) provides corrected LWD logs such that the measured values of the LWD logs may be averaged to create high-fidelity LWD logs. In other words, measured values (i.e., LWD tool measurements or signals) recorded during repeat passes of the drill bit (110) may be average temporally resulting in a multi-pass averaged signal for each well depth. Additionally, the one or more machine-learning models (808) provides an improved estimate of true resistivity, Rt (812). In one or more embodiments, the machine-learning models (808) predict the temperature of the drilling fluid (112) at each depth and for each pass (820), taking into account the speed and pre-history of the drill bit (110) and in particular, the cooling effect from the pumping of drill fluid (112) into the wellbore (102). Knowledge of the downhole drilling fluid (112) temperature is used to correct the measured resistivities and other downhole LWD measurements that exhibit a temperature dependence.
Finally, in accordance with one or more embodiments, the one or more machine-learned models (808) evaluates the temporal differences (818) in LWD logs at one or more well depths in order to determine a parameter of the subsurface formation (106) and/or reservoir. In other words, the time rate of change, and the magnitude of change in one or more quantities measured by LWD tools is/are used to determine properties of the reservoir. Determination of subsurface formation (106) and/or reservoir properties may aid in the geosteering of the drill bit (110) during a drilling operation.
In accordance with one or more embodiments,
In Block 910, using a first machine-learning model (706), a temporal history (708) of the drilling operation is determined. The temporal history (708) is composed of, at least, and ordered time history of drilling events. The drilling events in the temporal history (708) are identified by the first machine-learning model (706) and may include events such as drilling fluid (112) circulation and drill string (108) connections. As depicted in Block 912, a plurality of temporal property logs (710) is constructed. For a given well depth (212) and property (or LWD tool measurement), a temporal property log indicates the time-ordered measured values of said property at the given well depth (212). In Block 914, zero or more data points are removed from each temporal property log in the plurality of temporal property logs (710). Data points are identified according to the time at which they were measured and the associated determined drilling event. For example, in one or more embodiments, temperature data points recorded during drilling fluid (112) circulation events are removed from the plurality of temporal property logs (710).
In Block 916, the plurality of temporal property logs (710) is processed with a second machine-learned model (714) to form a plurality of corrected temporal property logs (716). In one or more embodiments, the measured values in the plurality of temporal property logs (716) have been adjusted to account for time-dependent behavior, environmental effects, drilling events, and historical drilling events. As such, the plurality of corrected temporal property logs is aggregated to form high fidelity LWD logs (722), as shown in Block 920. In one or more embodiments, at each well depth (212) the measured values of a given property (or quantity measured by an LWD tool) are averaged to form a high fidelity LWD log of that property. The high fidelity LWD logs (722) are distinct from conventional LWD logs (200) because they make use of all the data acquired by the LWD tools as opposed to only using the first measured value with respect to time at each well depth (212). In Block 922, the high fidelity LWD logs (722) are used to determine petrophysical properties of the subsurface near the wellbore (102). For example, in one or more embodiments, the lithology of the subsurface is determined using, at least in part, the high fidelity LWD logs (722).
In accordance with one or more embodiments,
In Block 958, using a third machine-learning model, the measured values of each of the one or more temporal LWD logs are corrected based on the temporal well depth log and the temporal record of operational drilling parameters to form one or more corrected LWD logs. In Block 60, zero or more data points are removed from each corrected LWD logs. Data points may be identified using physics-informed constraints (e.g., a non-negative bound).
In Block 962, each of the corrected LWD logs is temporally aggregated to form high fidelity LWD logs. In one or more embodiments, at each well depth (212) the measured values of a given property (or quantity measured by an LWD tool) are averaged to form a high fidelity LWD log of that property. The high fidelity LWD logs are distinct from conventional LWD logs (200) because they make use of all the data acquired by the LWD tools as opposed to only using the first measured value with respect to time at each well depth (212). In Block 964, the high fidelity LWD logs are used to determine petrophysical properties of the subsurface near the wellbore (102). For example, in one or more embodiments, the lithology of the subsurface is determined using, at least in part, the high fidelity LWD logs (722).
While one or more embodiments have been presented herein using the context of logging while drilling (LWD), it is emphasized that the methods described herein may be readily applied to coiled tubing LWD, TLC wireline passes, or multi-purpose logging passes (e.g., where logging tools are traveling along with a tool performing discrete station measurements, such as a formation sampler or formation pressure measurement tool).
Embodiments of the instant disclosure provide for one or more of the following advantages. Using the plurality of corrected temporal property logs (716), a hydrocarbon quick-look log may be constructed and processed differentially. The hydrocarbon quick-look log depicts the sweeping away of the hydrocarbons by drilling fluid (112) invasion. The hydrocarbon quick-look log may be constructed by plotting resistivity values with respect to time at a series of well depths (212). The hydrocarbon quick-look log may then be used in turn to highlight and calibrate changes in shallow resistivity or shallow NMR. Further, the plurality of corrected temporal property logs (716) may be used to improve Rt (true formation resistivity) inversion using multi-depth resistivity array data. Additionally, certain logging tools, such as multi-pole sonic logging tools or pulsed-NMR logging tools, have highly configurable excitation modes and may intentionally be logged across the target reservoir in multiple successive logging passes while being configured into different transmitter modes so as to perform significantly different target measurements in the various passes. While there exist efficient ways to combine and display such deliberately multi-pass log acquisitions, the motion in LWD acquisition mode is rarely as perfectly regular from pass to pass as in a wireline acquisition, due to the vagaries and surprises of the drilling process and because the freshly-drilled subsurface is also undergoing rapid changes at drilling time, due to drilling fluid (112) invasion, near wellbore formation stress redistribution, hole swelling, temperature equilibration, etc.
The machine-learned models presented herein are capable of interpreting and correcting repeat-pass data acquired even in the presence of drilling events and irregularities. As such, the corrected data can be used to improve the self-consistent interpretation of intentionally multi-pass and repeat LWD logging acquisitions, as well as in updating property values that are rapidly evolving in time due to drilling-related perturbations such as mud filtrate invasion. Further, formation properties such as permeability or relative permeability as a function of saturation may be characterized (718) from the corrected temporal property logs (716). Aggregation of the corrected temporal property logs allows for measured values to be averaged over multiple passed of the LWD tools over a given well depth (212). Aggregation, such as averaging, improves the precision of the measured values. Further advantages include detecting changes in subsurface formation (106) properties due to fine particle invasion, drilling-induced formation fracturing, and borehole diameter or shape changes. For example, by comparing the shallowest density measurement on different passes of the LWD tools at a given well depth (212) may indicate fine particle invasion via a notable drop in the computed porosity. Shallow NMR measurements can also show decreased relaxation times as a result of fine particle invasion. A decrease in drilling fluid (112) returns can be a gross indicator of formation fracturing. Finer fracturing can be indicated by an increase in porosity from shallow density measurements, changes in shallow NMR relaxation times (increasing), as well as changes in resistivity measurements (for example, increasing the induction resistivity due to oil-base mud invading into radial fractures). These changes are better highlighted when using corrected temporal property logs. Finally, wellbore (102) constriction can, in an extreme case, show up as an increase in surface torque (an operational drilling parameter). However, it can also show up as a shift in borehole fluid corrections for density or resistivity readings.
The computer (1002) can serve in a role as a client, network component, a server, a database or other persistency, or any other component (or a combination of roles) of a computer system for performing the subject matter described in the instant disclosure. In some implementations, one or more components of the computer (1002) may be configured to operate within environments, including cloud-computing-based, local, global, or other environment (or a combination of environments).
At a high level, the computer (1002) is an electronic computing device operable to receive, transmit, process, store, or manage data and information associated with the described subject matter. According to some implementations, the computer (1002) may also include or be communicably coupled with an application server, e-mail server, web server, caching server, streaming data server, business intelligence (BI) server, or other server (or a combination of servers).
The computer (1002) can receive requests over network (1030) from a client application (for example, executing on another computer (1002) and responding to the received requests by processing the said requests in an appropriate software application. In addition, requests may also be sent to the computer (1002) from internal users (for example, from a command console or by other appropriate access method), external or third-parties, other automated applications, as well as any other appropriate entities, individuals, systems, or computers.
Each of the components of the computer (1002) can communicate using a system bus (1003). In some implementations, any or all of the components of the computer (1002), both hardware or software (or a combination of hardware and software), may interface with each other or the interface (1004) (or a combination of both) over the system bus (1003) using an application programming interface (API) (1012) or a service layer (1013) (or a combination of the API (1012) and service layer (1013). The API (1012) may include specifications for routines, data structures, and object classes. The API (1012) may be either computer-language independent or dependent and refer to a complete interface, a single function, or even a set of APIs. The service layer (1013) provides software services to the computer (1002) or other components (whether or not illustrated) that are communicably coupled to the computer (1002). The functionality of the computer (1002) may be accessible for all service consumers using this service layer. Software services, such as those provided by the service layer (1013), provide reusable, defined business functionalities through a defined interface. For example, the interface may be software written in JAVA, C++, or other suitable language providing data in extensible markup language (XML) format or another suitable format. While illustrated as an integrated component of the computer (1002), alternative implementations may illustrate the API (1012) or the service layer (1013) as stand-alone components in relation to other components of the computer (1002) or other components (whether or not illustrated) that are communicably coupled to the computer (1002). Moreover, any or all parts of the API (1012) or the service layer (1013) may be implemented as child or sub-modules of another software module, enterprise application, or hardware module without departing from the scope of this disclosure.
The computer (1002) includes an interface (1004). Although illustrated as a single interface (1004) in
The computer (1002) includes at least one computer processor (1005). Although illustrated as a single computer processor (1005) in
The computer (1002) also includes a memory (1006) that holds data for the computer (1002) or other components (or a combination of both) that can be connected to the network (1030). The memory may be a non-transitory computer readable medium. For example, memory (1006) can be a database storing data consistent with this disclosure. Although illustrated as a single memory (1006) in
The application (1007) is an algorithmic software engine providing functionality according to particular needs, desires, or particular implementations of the computer (1002), particularly with respect to functionality described in this disclosure. For example, application (1007) can serve as one or more components, modules, applications, etc. Further, although illustrated as a single application (1007), the application (1007) may be implemented as multiple applications (1007) on the computer (1002). In addition, although illustrated as integral to the computer (1002), in alternative implementations, the application (1007) can be external to the computer (1002).
There may be any number of computers (1002) associated with, or external to, a computer system containing computer (1002), wherein each computer (1002) communicates over network (1030). Further, the term “client,” “user,” and other appropriate terminology may be used interchangeably as appropriate without departing from the scope of this disclosure. Moreover, this disclosure contemplates that many users may use one computer (1002), or that one user may use multiple computers (1002).
Although only a few example embodiments have been described in detail above, those skilled in the art will readily appreciate that many modifications are possible in the example embodiments without materially departing from this invention. Accordingly, all such modifications are intended to be included within the scope of this disclosure as defined in the following claims.
Number | Date | Country | |
---|---|---|---|
63516754 | Jul 2023 | US |