Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 584-586.

• Interdiscipline & Application • Previous Articles     Next Articles

Research on Well Distribution in Carbonate Reservoirs Based on Novel Genetic Algorithm

JIANG Rui-zhong, YANG Yi-bo   

  1. College of Petroleum Engineering,China University of Petroleum,Qingdao,Shangdong 266580,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: Tahe Oilfield belongs to carbonate rock field.Due to the randomness of zave development,it is necessary to establish reasonable well position at the beginning of development to improve the development effect to the maximum extent.The traditional genetic algorithm was improved in multiple sections and a new genetic algorithm was put forward,which is used in the domain of oil and gas field development.The introduction of elimination operator,elite files and the new co-evolution between the various groups,greatly improve the optimization performance.Finally,by means of the actual development of the geological model of the oil field,the relevant simulation and calculation are done,and the final recovery ratio and accumulated produced oil is more than 5% higher than the result of traditional algorithm.The effect of this algorithm is good.

Key words: Elimination operator, Elite file, New co-evolution, Well position optimization

CLC Number: 

  • TP309
[1]BITTENCOURT A C,HORNE R N.Reservoir development and design optimization[C]∥SPE AnnualTechnical Conference and Exhibition.San Antonio,SPE,1997:SPE 38895.
[2]MORALES A N,NASRABADI H,ZHU D.A new modified genetic algorithm for well placement optimization under geological uncertainties[C]∥SPE EUROPEC/EAGE Annual Conference and Exhibition.Vienna:SPE,2011:SPE143617.
[3]姜瑞忠,刘明明,徐建春,等.遗传算法在苏里格气田井位优化中的应用[J].天然气地球科学,2014,25(10):1603-1609.
[4]高雪笛,周丽娟,张树东,等.基于改进遗传算法的测试数据自动生成的研究[J].计算机科学,2017,44(3):209-214.
[5]吉根林.遗传算法研究综述[J].计算机应用与软件,2004,21(2):69-73.
[6]熊伟清,魏平,赵杰煜.遗传算法的早熟现象研究 [J].计算机应用研究,2001,18(9):12-14.
[7]王出航,刘峰.采用遗传算法和WSN的智能灯控方法设计[J].控制工程,2017,24(2):341-345.
[8]金希东.遗传算法及其应用 [D].成都:西南交通大学,1996.
[9]胡仕成,徐晓飞,李向阳.项目优化调度的病毒协同进化遗传算法[J].软件学报,2004,15(1):49-57.
[10]苗金凤,王洪国,邵增珍,等.基于多级搜索区域的协同进化遗传算法 [J].计算机应用研究,2010,27(9):3345-3347.
[11]王鸿磊,徐平平,朱文祥,等.WSN低能耗数据收集遗传粒子群算法研究[J].计算机科学,2017,44(3):79-83.
[12]袁勇,梁永全.基于协同进化遗传算法的多议题谈判[J].计算机工程,2009,35(4):187-189.
[13]王厅长,邱建东,商庆健,等.病毒协同进化遗传算法在自动化立体仓库货位优化中应用的研究[J].计算机科学,2014,41(11A):35-38.
[14]宋洵成,邹德永.采用遗传算法的PDC钻头侧向力平衡优化设计[J].中国石油大学学报(自然科学版),2006,30(4):50-52.
[1] NING Han-yang, MA Miao, YANG Bo, LIU Shi-chang. Research Progress and Analysis on Intelligent Cryptology [J]. Computer Science, 2022, 49(9): 288-296.
[2] TANG Ling-tao, WANG Di, ZHANG Lu-fei, LIU Sheng-yun. Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy [J]. Computer Science, 2022, 49(9): 297-305.
[3] LIU Jie-ling, LING Xiao-bo, ZHANG Lei, WANG Bo, WANG Zhi-liang, LI Zi-mu, ZHANG Hui, YANG Jia-hai, WU Cheng-nan. Network Security Risk Assessment Framework Based on Tactical Correlation [J]. Computer Science, 2022, 49(9): 306-311.
[4] LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325.
[5] DOU Jia-wei. Privacy-preserving Hamming and Edit Distance Computation and Applications [J]. Computer Science, 2022, 49(9): 355-360.
[6] GAO Chun-gang, WANG Yong-jie, XIONG Xin-li. MTDCD:A Hybrid Defense Mechanism Against Network Intrusion [J]. Computer Science, 2022, 49(7): 324-331.
[7] LIANG Zhen-zhen, XU Ming. Key Agreement Scheme Based on Ocean Acoustic Channel [J]. Computer Science, 2022, 49(6): 356-362.
[8] DU Hong-yi, YANG Hua, LIU Yan-hong, YANG Hong-peng. Nonlinear Dynamics Information Dissemination Model Based on Network Media [J]. Computer Science, 2022, 49(6A): 280-284.
[9] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[10] WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473.
[11] LIANG Yi-wen, DU Yu-song. Timing Attack Resilient Sampling Algorithms for Binary Gaussian Based on Knuth-Yao [J]. Computer Science, 2022, 49(6A): 485-489.
[12] YAN Meng, LIN Ying, NIE Zhi-shen, CAO Yi-fan, PI Huan, ZHANG Lan. Training Method to Improve Robustness of Federated Learning [J]. Computer Science, 2022, 49(6A): 496-501.
[13] CHEN Yan-bing, ZHONG Chao-ran, ZHOU Chao-ran, XUE Ling-yan, HUANG Hai-ping. Design of Cross-domain Authentication Scheme Based on Medical Consortium Chain [J]. Computer Science, 2022, 49(6A): 537-543.
[14] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[15] LIU Lin-yun, CHEN Kai-yan, LI Xiong-wei, ZHANG Yang, XIE Fang-fang. Overview of Side Channel Analysis Based on Convolutional Neural Network [J]. Computer Science, 2022, 49(5): 296-302.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!