Reservoir simulation

Model-Based Evaluation of Surveillance-Program Effectiveness With Proxies

This paper proposes a framework based on proxies and rejection sampling (filtering) to perform multiple history-matching runs with a manageable number of reservoir simulations.

jpt-2015-09-surveillancehero.jpg
Fig. 1: Tornado chart for NPV. A=Unit 1 permeability multiplier, B=Unit 2 permeability multiplier, C=relative permeability curve endpoint, D=Unit 1 porosity multiplier, E=Unit 2 porosity multiplier.

This paper proposes a framework based on proxies and rejection sampling (filtering) to perform multiple history-matching runs with a manageable number of reservoir simulations. The proposed work flow enables qualitative and quantitative analysis of a surveillance plan. Qualitatively, heavy-hitter-alignment analysis for the objective function and the observed data provides actionable measures for screening different surveillance designs. Quantitatively, the evaluation of expected uncertainty reduction from different surveillance plans allows for optimal design and selection of surveillance plans.

Introduction

In this work flow, the authors perform a set of training simulations (determined by experimental design) and use the result to build proxies for the objective function and each of the surveillance data points.

×
SPE_logo_CMYK_trans_sm.png
Continue Reading with SPE Membership
SPE Members: Please sign in at the top of the page for access to this member-exclusive content. If you are not a member and you find JPT content valuable, we encourage you to become a part of the SPE member community to gain full access.