--> Abstract: Deriving Permeability Transforms for Reservoir Simulation Models: A Practical Example, by J. Gidman and D. J. Fischer; #90942 (1997).
[First Hit]

Datapages, Inc.Print this page

Abstract: Deriving Permeability Transforms for Previous HitReservoirNext Hit Simulation Models: A Practical Example

GIDMAN, JUNE and DENNIS J. FISCHER

Simulation is an important tool for Previous HitreservoirNext Hit management. Populating the simulation grid with structure, Previous HitporosityNext Hit, permeability, and saturation data is one of its technical challenges. Of these variables permeability is particularly problematic. Currently there are no logging tools that provide generally acceptable measures of permeability. Instead, most often core data are used to derive a correlation-based Previous HitporosityNext Hit/permeability transform. While there is commonly some relationship between Previous HitporosityNext Hit and permeability, this relationship is rarely sufficient by itself to adequately predict permeability.

We take various approaches to Previous HitpredictingNext Hit permeability, based on core and log data. Core and log data must first be quality controlled and depth matched. Since Previous HitporosityNext Hit is an important component of most transforms, it is essential that Previous HitporosityNext Hit derived from log interpretation compares well to Previous HitporosityNext Hit from core. We find that permeability predictions based on a combination of regression and model-based techniques most often provide the best results. There is generally some fine tuning to take into account Vshale, fluid content (gas, oil, or water), Previous HitreservoirNext Hit lithology, and borehole rugosity. Our assessment of the best transforms is made by comparison of core and log data on depth plots. The calculated data are subsequently input to geostatistical modeling, scale-up, history matching, and Previous HitreservoirNext Hit simulation. The transforms are specific to the Previous HitreservoirTop studied, but the approaches can be applied to other fields where there is core and log data.

AAPG Search and Discovery Article #90942©1997 AAPG International Conference and Exhibition, Vienna, Austria