Prediction of Hydrocarbon Reservoirs Permeability Using Support Vector Machine

被引:60
|
作者
Gholami, R. [3 ]
Shahraki, A. R. [2 ]
Paghaleh, M. Jamali [1 ]
机构
[1] Islamic Azad Univ, Zahedan Branch, Zahedan 98168, Iran
[2] Univ Sistan & Baluchestan, Dept Ind Engn, Zahedan, Iran
[3] Shahrood Univ Technol, Fac Min Petr & Geophys, Shahrood, Iran
关键词
COMPONENT ANALYSIS; GENETIC ALGORITHM; NEURAL-NETWORKS; KERNEL; CLASSIFICATION; PERFORMANCE; INDUCTION; PARAMETER; DESIGN; MODEL;
D O I
10.1155/2012/670723
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Permeability is a key parameter associated with the characterization of any hydrocarbon reservoir. In fact, it is not possible to have accurate solutions to many petroleum engineering problems without having accurate permeability value. The conventional methods for permeability determination are core analysis and well test techniques. These methods are very expensive and time consuming. Therefore, attempts have usually been carried out to use artificial neural network for identification of the relationship between the well log data and core permeability. In this way, recent works on artificial intelligence techniques have led to introduce a robust machine learning methodology called support vector machine. This paper aims to utilize the SVM for predicting the permeability of three gas wells in the Southern Pars field. Obtained results of SVM showed that the correlation coefficient between core and predicted permeability is 0.97 for testing dataset. Comparing the result of SVM with that of a general regression neural network (GRNN) revealed that the SVM approach is faster and more accurate than the GRNN in prediction of hydrocarbon reservoirs permeability.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] Prediction of Epileptic Seizures using Support Vector Machine and Regularization
    Ahmad, Shaikh Rezwan Rafid
    Sayeed, Samee Mohammad
    Ahmed, Zaziba
    Siddique, Nusayer Masud
    Parvez, Mohammad Zavid
    2020 IEEE REGION 10 SYMPOSIUM (TENSYMP) - TECHNOLOGY FOR IMPACTFUL SUSTAINABLE DEVELOPMENT, 2020, : 1217 - 1220
  • [32] Prediction of equipment maintenance using optimized support vector machine
    Zeng, Yi
    Jiang, Wei
    Zhu, Changan
    Liu, Jianfeng
    Teng, Weibing
    Zhang, Yidong
    COMPUTATIONAL INTELLIGENCE, PT 2, PROCEEDINGS, 2006, 4114 : 570 - 579
  • [33] Prediction of unusual plasma discharge by using Support Vector Machine
    Nakagawa, Shota
    Hochin, Teruhisa
    Nomiya, Hiroki
    Nakanishi, Hideya
    Shoji, Mamoru
    FUSION ENGINEERING AND DESIGN, 2021, 167 (167)
  • [34] Prediction of energy consumption in buildings using support vector machine
    Samardzioska, Todorka
    Zileska Pancovska, Valentina
    Petrusheva, Silvana
    Sekovska, Blagica
    Tehnicki Vjesnik, 2021, 28 (02): : 649 - 656
  • [35] Runtime Prediction of Optimizers Using Improved Support Vector Machine
    El Afia, Abdellatif
    Sarhani, Malek
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 337 - 350
  • [36] Prediction of Sudden Cardiac Death Using Support Vector Machine
    Sheela, C. Jenefar
    Vanitha, L.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 377 - 381
  • [37] PREDICTION OF TBM PENETRATION RATE USING SUPPORT VECTOR MACHINE
    Afradi, Alireza
    Ebrahimabadi, Arash
    Hallajian, Tahereh
    GEOSABERES, 2020, 11 : 467 - 479
  • [38] Prediction of Software Defects using Twin Support Vector Machine
    Agarwal, Sonali
    Tomar, Divya
    Siddhant
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS AND COMPUTER NETWORKS (ISCON), 2014, : 128 - 132
  • [39] Using support vector machine for characteristics prediction of hydraulic valve
    Ma, Jian-Wei
    Wang, Fu-Ji
    Jia, Zhen-Yuan
    Wei, Wei-Li
    INTERNATIONAL JOURNAL OF COMPUTER APPLICATIONS IN TECHNOLOGY, 2011, 41 (3-4) : 287 - 295
  • [40] Software Defect Prediction Using Dynamic Support Vector Machine
    Shuai, Bo
    Li, Haifeng
    Li, Mengjun
    Zhang, Quan
    Tang, Chaojing
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 260 - 263