نتایج جستجو برای: to verify avo anomalies from ghar reservoir
تعداد نتایج: 11802318 فیلتر نتایج به سال:
avo analysis in ghar sand stone reservoir in aboozar oil field located in north-west of persian gulf
avo theory was introduced around 20 years ago. in recent years, this technique was become to a major tool in hydrocarbon sources exploration. by the help of this method with the suitable understanding from underground layers and knowing how to use this technology, quantitative specifications of reservoir can be recognized. avo analysis is a seismic technique that by using of pre-stack data, est...
avo analysis is a technique which is widely used in industry and is applied on seismic prestack data. results from changes in seismic wave reflection amplitude versus offset can be used in extracting elastic properties and hence lithology and reservoirs pore fluid identification. before performing avo analysis studies, processing steps should be ensured that changes in reflection amplitude are ...
We investigate the sensitivity of AVO attributes to uncertainty in migration velocity in a synthetic dataset. The synthetic data was built using a earth model with typical rock properties from a real North Sea turbidite field. The model includes a thick overburden layer with complex velocity anomalies. We examine the sensitivity of AVO response due to the presence of this complex layer and quan...
Measuring reflection amplitude versus offset (AVO) has proved to be effective in reservoir characterization. Experience shows that AVO inversion methods based on amplitude-preserved prestack migration typically provides a more accurate lithology estimate than NMO-based AVO analysis. However, some artifacts may be introduced into the migration section due to an undersampled acquisition geometry,...
power transformers are important equipments in power systems. thus there is a large number of researches devoted of power transformers. however, there is still a demand for future investigations, especially in the field of diagnosis of transformer failures. in order to fulfill the demand, the first part reports a study case in which four main types of failures on the active part are investigate...
Reflection amplitude as a function of offset is effective in characterizing lithology in oil producing basins. Experience shows that AVO inversion methods based on amplitude-preserved prestack migration typically provides a more accurate lithology estimation than NMO-based AVO analysis. However, some artifacts may be introduced into the migration section, which can obscure the estimate of reser...
Aligned vertical fractures introduce velocity anisotropy which is directly related to parameters, such as fracture density, fracture shape and fracture contents. Effective medium models allow us to study qPand qS-wave velocity anisotropy in rocks with aligned vertical fractures, intersecting fracture sets and aligned fractures with smallscale porosity. Spatially varying fracture density distrib...
INTRODUCTION The use of hodograms in interpretation of AVO cross-plots is a relatively recent innovation (Keho, 2000). Often, when comparing models of attributes to the actual seismic attributes, we find that anomalous zones are much closer to the background trend than the model indicates. One reason for this concerns wavelet effects. The AVO hodogram takes wavelet effects into account and can ...
AVO analysis of seismic data is based on the assumption that transitions in the earth consist of jump discontinuities only. The generalization of this type of transition to a more realistic class of transitions shows a drastic change in observed AVO behavior, especially for the large angles currently attained by increasing cable lengths. We propose a simple approach that accounts for this anoma...
implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید