Fluid migration pathway determination

10481297 · 2019-11-19

Assignee

Inventors

Cpc classification

International classification

Abstract

A method of determining a migration pathway of a subterranean fluid through a geological volume is provided. The starting object is located within the geological volume. The starting object defines an initial fluid boundary. Data points are distributed through the geological volume. The data points are associated with values of one or more geological attributes. The method includes the steps of: defining an expression which determines a change in position of the fluid boundary at the data points over an iteration based on the values of the one or more attributes; and applying the expression at the data points for successive iterations to evolve the fluid boundary over the successive iterations. The migration pathway of the subterranean fluid through the geological volume can then be determined from the evolution of the fluid boundary.

Claims

1. A method of determining a migration pathway of a subterranean fluid through a geological volume, the method comprising: placing sources at one or more source locations; placing surface receivers at varying distances and azimuths from the one or more source locations; carrying out seismic testing by imparting energy to the earth from the sources at the one or more source locations and measuring return energy to the receivers; analyzing seismic testing results to generate data points distributed through a geological volume, each data point being associated with values of one or more geological attributes derived from the results of the seismic testing and at least some of which are indicative of possibility for fluid migration at the data point; identifying a starting object within the geological volume, wherein the starting object defines an initial position of a fluid boundary at a plurality of the data points; defining an expression which determines a change in position of the fluid boundary at the data points from forces acting on the object at the fluid boundary, wherein the forces are determined from the values of the one or more geological attributes associated with the data points and the forces are (i) force normal to the object boundary, (ii) directional force on the object, and (iii) curvature force which minimizes curvature of the object boundary; and applying the expression at the data points for successive iterations to evolve the position of the fluid boundary over the successive iterations, whereby the migration pathway of the subterranean fluid through the geological volume can be determined from the evolution of the position of the fluid boundary.

2. The method of claim 1, wherein the starting object is a source reservoir and the successive iterations are forward in time such that the migration pathway provides for a flow of the fluid from the source reservoir.

3. The method of claim 1, wherein the starting object is a destination reservoir and the successive iterations are backwards in time such that the migration pathway provides a flow of the fluid to the destination reservoir.

4. The method of claim 1, wherein the values of a plurality of geological attributes are provided at the data points, and wherein, in the defining step, the values of the attributes are scaled relative to each other.

5. The method of claim 1, wherein the applying step uses a level set approach to apply the expression at the data points for the successive iterations.

6. The method of claim 1, wherein the geological attributes include seismic attributes selected from a group consisting of: seismic amplitude, seismic higher order derivative, seismic phase, amplitude vs. offset data, chaos, variance, curvature, dip, dip deviation, fracture enhancement attributes, and velocity change attributes based on non-rigid matching.

7. The method of claim 1, comprising: displaying the evolved fluid boundary as a geobody.

8. A method of operating a well comprising: performing the method according to claim 1; and managing the operation of the well using the determined migration pathway.

9. The method of claim 8, wherein managing the operation of the well comprises at least one of reducing fluid flow into the migration pathway or blocking fluid flow into the migration pathway.

10. A method of determining a location of a hydrocarbon deposit, including the steps of: performing the method according to claim 1; and determining the location of the hydrocarbon deposit using the determined migration pathway.

11. The method of claim 10, wherein the step of determining the location of the hydrocarbon deposit comprises using the determined migration pathway and seismic data to determine the location of the hydrocarbon deposit.

12. The method of claim 1 wherein at least some of the geological attributes associated with the data points are indicative of porosity, rock fault or rock fracture.

13. A method of managing hydrocarbon extraction, comprising: carrying out seismic testing by imparting energy to the earth from sources at one or more source locations and measuring return energy to receivers at surface receiver locations at varying distances and azimuths from the one or more source locations; analyzing results of the seismic testing to generate data points distributed through a geological volume, each data point being associated with values of one or more geological attributes derived from the results of the seismic testing and at least some of which are indicative of possibility for fluid migration at the data point; determining a starting object which is located within the geological volume and which defines an initial position of a fluid boundary at a plurality of the data points; defining an expression which determines a change in position of the fluid boundary at the data points from forces acting on the object at the fluid boundary, where the forces are determined from the values of the one or more geological attributes associated with the data points and the forces are (i) force normal to the object boundary, (ii) directional force on the object, and (iii) curvature force which minimizes curvature of the object boundary; applying the expression at the data points for successive iterations to evolve the position of the fluid boundary over the successive iterations, whereby the migration pathway of the subterranean fluid through the geological volume can be determined from the evolution of the position of the fluid boundary; and modifying operation of one or more hydrocarbon extraction wells so as to inhibit flow along the predicted migration pathway or so as to access hydrocarbon which has already flowed along the predicted pathway.

14. The method of claim 13 wherein at least some of the geological attributes associated with the data points are indicative of porosity, rock fault or rock fracture.

15. The method of claim 13, wherein the applying step uses a level set approach to apply the expression at the data points for the successive iterations.

16. The method of claim 13, wherein the geological attributes include seismic attributes selected from a group consisting of: seismic amplitude, seismic higher order derivative, seismic phase, amplitude vs. offset data, chaos, variance, curvature, dip, dip deviation, fracture enhancement attributes, and velocity change attributes based on non-rigid matching.

17. The method of claim 13, wherein the starting object is a source reservoir and the successive iterations are forward in time such that the migration pathway provides for a flow of the fluid from the source reservoir.

18. The method of claim 13, wherein the starting object is a destination reservoir and the successive iterations are backwards in time such that the migration pathway provides a flow of the fluid to the destination reservoir.

19. The method of claim 13, wherein the values of a plurality of geological attributes are provided at the data points, and wherein, in the defining step, the values of the attributes are scaled relative to each other.

Description

BRIEF DESCRIPTION OF THE DRAWINGS

(1) Embodiments of the invention will now be described by way of example with reference to the accompanying drawings in which:

(2) FIG. 1 is a schematic illustration of the normal force F.sub.n(x) acting on an object (dark ellipse in left hand image) shrinking it when the normal force is negative (1) and expanding it when the normal force is positive (+1);

(3) FIG. 2 is a schematic illustration of the directional force F.sub.e in the form of a uniform vector field acting on an object (dark ellipse in left hand image);

(4) FIG. 3 is a schematic illustration of the directional force F.sub.e in the form of forces pointing towards a contour 10 and acting on an object (dark ellipse in left hand image), the forces reducing with distance from the contour 10;

(5) FIG. 4 is a schematic illustration of the curvature force F.sub.c(x) acting on an object;

(6) FIG. 5 illustrates vertically upwards flow, the starting object being a solid outline ellipse and the resulting object being a dashed outline ellipse, with (a) showing a pure vertical flow, (b) showing resultant forces (grey arrows) applied when combining vertical forces (solid arrows) and normal forces (dashed arrows), and (c) showing the result of the combined forces;

(7) FIG. 6 shows a seismic cube from West Loppa;

(8) FIG. 7 shows the seismic cube of FIG. 6 with the extracted horizons corresponding to first and second formations overlain with seismic amplitudes; and

(9) FIGS. 8(a) to (e) show the evolution of a fluid boundary with time overlain on the seismic cube from West Loppa.

DESCRIPTION

(10) The ensuing description provides preferred exemplary embodiment(s) only, and is not intended to limit the scope, applicability or configuration of the invention. Rather, the ensuing description of the preferred exemplary embodiment(s) will provide those skilled in the art with an enabling description for implementing a preferred exemplary embodiment of the invention, it being understood that various changes may be made in the function and arrangement of elements without departing from the scope of the invention.

(11) Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that embodiments maybe practiced without these specific details. For example, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.

(12) Also, it is noted that embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed, but could have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination corresponds to a return of the function to the calling function or the main function.

(13) As disclosed herein, the term computer readable medium may represent one or more devices for storing data, including read only memory (ROM), random access memory (RAM), magnetic RAM, core memory, magnetic disk storage mediums, optical storage mediums, flash memory devices and/or other machine readable mediums for storing information. The term computer-readable medium includes, but is not limited to portable or fixed storage devices, optical storage devices, wireless channels and various other mediums capable of storing, containing or carrying instruction(s) and/or data.

(14) Furthermore, embodiments may be implemented by hardware, software, firmware, middleware, microcode, hardware description languages, or any combination thereof. When implemented in software, firmware, middleware or microcode, the program code or code segments to perform the necessary tasks may be stored in a machine readable medium such as storage medium. A processor(s) may perform the necessary tasks. A code segment may represent a procedure, a function, a subprogram, a program, a routine, a subroutine, a module, a software package, a class, or any combination of instructions, data structures, or program statements. A code segment may be coupled to another code segment or a hardware circuit by passing and/or receiving information, data, arguments, parameters, or memory contents. Information, arguments, parameters, data, etc., may be passed, forwarded, or transmitted via any suitable means including memory sharing, message passing, token passing, network transmission, etc.

(15) The geological volume may be treated as being a collection of horizon surfaces (often referred to as seismic events or strata) that are defined at the positions of seismic data zero-crossings, maximum values or minimum values. Known methods by which such a sparse surface representation of a seismic data volume may be obtained are diverse, including manual interpretation, connected component labelling of extrema cubes and extrema classification.

(16) Extrema detection, in particular, is a well known concept in signal and image processing, and there are many algorithms and techniques for performing such detection. For example, applying the extrema classification method discussed in U.S. Pat. No. 7,248,539, it is possible to obtain a sub-sample precision representation of all extrema within a seismic volume using volume reflection spectral decompositions (as discussed in WO 98/37437).

(17) A particular advantage of using the approach of U.S. Pat. No. 7,248,539 for extracting connected horizon surfaces is that it can provide robust and versatile solutions even when faulted or chaotic regions are encountered.

(18) More generally, extrema classification methods for horizon extraction can provide very good characterization of the local signal shape, as well as shape similarity throughout the area of interest.

(19) Fault identification in seismic data can be performed e.g., by using swarm intelligence through the deployment of artificial ants (Ant Tracking) into attribute volumes, as described in U.S. Pat. No. 7,203,342 and in Pedersen, S. I., T. Randen, L. Snneland, and O. Steen, Automatic Fault Extraction Using Artificial Ants, 72ND SEG ANNUAL MEETING, Salt Lake City (2002).

(20) Analysis, for example through calculation of seismic attributes, and information from well logs (as described in WO 2008/086352), can also reveal 3D sub-volumes containing fracture networks. In particular, fracture enhancement attributes enhance signals caused by fractures in seismic data.

(21) Having identified sub-volumes of interest, fracture extraction can be performed on the fracture enhancement attributes, to obtain a geometrical representation of the fracture networks. Fracture extraction can proceed by identifying discontinuities in the fracture enhancement attribute. One example of a fracture network extraction procedure is again described in U.S. Pat. No. 7,203,342.

(22) Another approach is non-rigid matching (NRM), as disclosed in U.S. Pat. No. 6,574,563. In a reservoir with production/injection, the seismic signal generally changes over time. Seismic surveys shot over the same area at intervals of time can provide time-lapse seismic surveys. Analyzing time-lapse seismic surveys can give valuable information about production, remaining hydrocarbons, evolution of injected fluid, etc. In particular, uplift or compaction can be observed by the displacement of seismic reflectors. Further discussion of NRM can be found in M. Nickel, and L. Snneland, Non-Rigid Matching of Migrated Time-Lapse Seismic, 61ST EAGE CONFERENCE & EXHIBITION P065 (1999); and M. Nickel, and L. Snneland, Well Performance Analysis Using 4D Seismic, 71ST EAGE CONFERENCE & EXHIBITION, Amsterdam P106 (2009).

(23) In particular, by applying such techniques, it is possible to obtain a geological volume in which data points distributed throughout the volume are associated with respective seismic and geometrical attributes. Typical seismic attributes are seismic amplitudes and phases for the data points. These amplitudes and phases can be, for example, the starting values for the extrema classification method of U.S. Pat. No. 7,248,539. Typical geometric attributes are the horizontal and vertical positions of the respective data points, and the proximity to faults and fractures, as identified, for example, by the approach of U.S. Pat. No. 7,203,342.

(24) A starting point for one method of the present invention may be the location of a fluid reservoir within a geological volume, the reservoir defining an initial fluid boundary. In an embodiment of the present invention, an expression is defined which determines a change in position of the fluid boundary, and the expression is applied for successive iterations to evolve the fluid boundary over the successive iterations. From this evolution, the migration pathway of the fluid through the geological volume may be determined.

(25) There are various possible deformable models or active contour approaches that may be used to extract an object by deforming curve/curve deformation, and thereby evolve/evolving the object boundary. The two main approaches are parametric and geometric active contours (see, e.g., Chenyang Xu, Anthony Yezzi Jr., and Jerry L. Prince, On the Relationship between Parametric and Geometric Active Contours, PROCEEDINGS OF 34TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, pp. 483-489 (October 2000); and Tim McInerney and Demetri Terzopoulos, Deformable Models in Medical Image Analysis: A Survey, MEDICAL IMAGE ANALYSIS, Vol 1: pp. 91-108 (1996)).

(26) In the parametric active contour approach, also called the Snake method, an initial, explicitly defined contour is deformed based on a set of forces applied to it. These forces can be determined from an image on which the object extraction takes place. The geometric active contour approach, also called the level sets approach, is an implicit method, such that there is no explicit moving contour (see SETHIANJ. A. LEVEL SET METHODS AND FAST MARCHING METHODS, CAMBRIDGE University Press, 1996)). A level set function is deformed based on a set of forces applied to it, where the forces can be determined from an image on which the object extraction takes place. The resulting contour is obtained by taking the zero level of the function (where the function is equal to zero)hence the name level sets.

(27) In an embodiment of the present invention, the level set approach, which is now describe in more detail, may be used. The level set algorithm is based on solving the differential equation given by:
.sub.t+F.sub.n(x)+F.sub.e(x).Math.F.sub.c(x)=0(1)
where is the level set function.

(28) The level set function is defined in every voxel (data point) of the image, and is an implicit formulation of the movement of an object boundary submitted to forces. The object (i.e., fluid) boundary is given by:
(t)={x=(x.sub.1,x.sub.2,x.sub.3)|(x,t)=0}(2)
and we assume that >0 inside the object and <0 outside the object. As the function is updated in each voxel, the object boundary evolves.

(29) The vector x corresponds to the voxel position and in the case of a seismic cube
x=(x.sub.inline,x.sub.crossline,x.sub.vertical).
The level set equation given by Eq. (1) can be divided in three distinct terms, excluding the time derivative .sub.t. The first term, called normal force, describes the motion in a direction normal to the object boundary as shown in FIG. 1. F.sub.n(x) gives the magnitude of this force for each voxel.

(30) The second term, called directional force, describes the motion in a direction given by the vector F.sub.e(x), where F.sub.e=(F.sub.inline, F.sub.crossline, F.sub.vertical) for the case of a seismic cube. Examples can be seen in FIGS. 2 and 3.

(31) The third term, called the curvature force, describes the motion such that the boundary mean curvature is minimized and the boundary appears smooth. F.sub.c(x) governs the strength of this force. The boundary mean curvature is given by

(32) = .Math. .Math. .Math. = 1 2 ( 22 + 33 ) + 2 2 ( 11 + 33 ) + 3 2 ( 11 + 22 ) ( 1 2 + 2 2 + 3 2 ) 3 / 2 - 2 ( 12 1 2 + 23 2 3 + 13 1 3 ) ( 1 2 + 2 2 + 3 2 ) 3 / 2 ( 3 )
where .sub.i, i=(1,2,3) denotes the partial derivative of with respect to x.sub.i. FIG. 4 shows an example of this force applied to an object.

(33) The level set algorithm can be implemented using an iterative numerical scheme given by
.sup.n+1=.sup.nt(F.sub.n.sup.n+F.sub.e.Math..sup.nF.sub.c.sup.n.sup.n(4)
The level set function can thus be updated until the force terms reach an equilibrium position, or a specified number of iterations is reached. The initial function .sup.0 at the starting iteration corresponds to an object at a known location within a geological volume and having a defined object boundary.

(34) Both the spatial and time derivatives can be calculated using finite differences. The order of the finite difference scheme can be selected based on an evaluation of the need of precision versus the computational effort. First order schemes for both spatial and time derivatives can be sufficiently precise and are computationally efficient.

(35) In order to ensure the stability of this explicit time scheme, the CFL (Courant-Friedrich-Levy) condition may be used, which states that the boundary of the object can move no more than one voxel per iteration. This translates mathematically to

(36) t max x [ .Math. F n .Math. .Math. .Math. i = 1 3 .Math. i .Math. x i .Math. + .Math. i = 1 3 .Math. F e , i .Math. x i + .Math. i = 1 3 .Math. 2 F c .Math. x i 2 ] ( 5 )
where represents all possible voxels and is the CFL factor and thus 0<<1.

(37) The level set algorithm can be time-consuming, particularly on large data sets. Thus in order to improve efficiency, a narrow band implementation can be adopted (see, e.g., Sethian, J. A. Level Set Methods and Fast Marching Methods, CAMBRIDGE UNIVERSITY PRESS (1996)) whereby the calculations take place only in a band around the current boundary. The band is updated every iteration. In addition, to improve the computational complexity and the storage requirements a Dynamic Tubular Grid data structure can be implemented (see Nielsen, M. B., and K. Museth. Dynamic Tubular Grid: An Efficient Data Structure and Algorithms for High Resolution Level sets, JOURNAL OF SCIENTIFIC COMPUTING 26, no. 3, 261-299 (2006)).

(38) Additional features can be implemented with the level set approach described above. For example, objects such as horizon interpretations, point sets or surfaces can be defined as barriers, through which the object cannot evolve. A stopping criterion can be introduced by specifying a number of iterations after which a voxel is considered fixed. When voxels in a certain region no longer change, i.e., the object boundary no longer moves, the voxels are taken out of the narrow band. This significantly increases the efficiency of the computations, as the number of calculations is reduced. In addition, it is possible to visualize the regions where the boundary has stopped in the output, which can be useful as a quality indicator of the result. However, care must be taken when using the stopping criterion, as there is a risk of voxels being taken out of the narrow band before they reach an equilibrium position. This can happen when one voxel has a force value that is significantly larger than all the others, as the CFL time step is a global value calculated using the maximum force value taken over the whole domain.

(39) In an embodiment of the present invention, a leakage path from a reservoir can be extracted using the level set approach and by specifying forces based on seismic attributes.

(40) There are various possibilities for the different pathways a fluid can follow in the subsurface. The fluid can pass through an impermeable layer because of fracturing caused by stress generated by pore-pressure build-up in underlying porous layers. The fluid can also migrate laterally in a porous layer. The fluid can also migrate through open faults or fractures. When such possibilities are combined, the resulting path can be complex. Each of these possibilities is now considered in turn.

(41) If the stress in the cap rock seal above a reservoir increase, there is a risk of the cap rock being compromised. In an embodiment of the present invention, the velocity change attribute determined using non-rigid matching can be used to identify likely cap rock fracturing. More particularly, an increased stress in the cap rock causes the velocity in the cap rock to increase. In contrast, within a porous layer newly invaded fluids cause the pore pressure to increase, decreasing the velocity in the layer. Thus a combination of velocity increase in the cap rock and a velocity decrease in a porous layer above the cap rock can be an indicator of cap rock fracturing.

(42) Turning to lateral fluid migration in a porous layer, such layers may be identified in various ways. For example, in an embodiment of the present invention, where there are layers of porous sand and non-porous shale, in order to estimate where the sand layers exist, an assumption may be made that the acoustic impedance of shale is higher than that of sand. In an embodiment of the present invention, a further assumption may be made that all negative reflectors are the top of a porous layer. Such an approach tends to over-estimate the number of porous layers, but over-estimation may be preferably to under-estimation.

(43) Porous layers can also be identified using methods, such as amplitude-versus-offset (AVO) analysis, interpreted surfaces or well logs (see for example, overviews of AVO analysis in Veeken, P and Rauch-Davies, M., AVO Attribute Analysis And Seismic Reservoir Characterization, FIRST BREAK, Volume 24, pp. 41-52, (February 2006) and Castagna, J. P. and Swan, H. W., Principles of AVO Crossplotting, THE LEADING EDGE, Volume 4, pp 337-344 (April, 1997).

(44) In an embodiment of the present invention, the identification of fluid flow in porous layers can be improved by combining a porous layer with a decreased NRM velocity (caused by fluid flow in the porous layer leading to an increase in pore pressure).

(45) As to open faults or fractures, in an embodiment of the present invention, these can be identified using the Ant Tracking approach. In general, Ant Tracking identifies all fault and fracture discontinuities, regardless of whether they are open or closed. In some embodiments of the present invention, additional information e.g., derived from palinspastic reconstruction (which reconstructs faults to their position before faulting, hence giving useful information on the geomechanical properties during time) or general stress field knowledge can help to separate between closed and open discontinuities.

(46) In an embodiment of the present invention, the attributes described above can then be used as inputs to the level set approach, through F.sub.n(x) and F.sub.e(x).

(47) In embodiments of the present invention, the attributes may be combined into normal and directional forces, or possibly used as additional constraints. The level set approach takes into account the value of the forces compared to each other. Therefore, the values of the different attributes are comparable. If this is not done appropriately, the risk is that too much emphasis is put on a certain attribute compared to the others. This would then give an unwanted behaviour of the corresponding level set forces.

(48) As an example, seismic data can have very different amplitude values from one survey to another (one survey could have value ranges from 0.02 to 0.02 while another could have value ranges from 40 000 to +40 000), while fault attributes derived from AntTracking are in the range [1, 1]. Thus, in embodiments of the present invention, the value ranges for the different attributes used are examined, taking into account the value ranges that are of interest for the specific case (for instance, for a given attribute having values between 10 and 10, interest might be focused on the values ranging from 0 to 2), and then the value ranges are scaled such that they are comparable.

(49) Having scaled the attributes, in embodiments of the present invention, the following assumptions are made: the seismic data has been depth converted and the escaping reservoir fluid is lighter than the formation fluid in the overlying layers. Under these assumptions, the reservoir fluid is expected to migrate through a gravitational-driven flow.

(50) Thus, in an embodiment of the present invention, any upwards flow (e.g., in a fault or in a break in an impermeable layer) can be simulated using the vertical component of the directional force (see FIG. 2) in the level set formulation (Eq. 1). However, using only the vertical component is generally not suitable as the object is then incapable of growing diagonally upwards, as would be expected in a fault. As such, in an embodiment of the present invention, a normal force may be used, such that F.sub.n=|F.sub.e,vert| with >0. In this way, in embodiments of the present invention, global growth can be in the direction specified, but with an added lateral component.

(51) FIGS. 5(a) to (c) illustrate this type of force. In FIG. 5(a), only a vertical force is applied, hence the initial object (denoted by the solid boundary) is shifted vertically. FIG. 5(b) shows the components of the normal force 52 and the vertical force 51 applied on the initial object 53 (with in this case 1). The resultant force 50a and 50b always has an upwards-pointing vertical component 60(due to 1). When these forces are applied, as shown in FIG. 5(c), the vertical shift is smaller than in (a), but the object increases in size due to the added normal force.

(52) The above description of vertical flow, in accordance with embodiments of the present invention, is relevant both for fault attributes and for the NRM attribute related to breaking through a reservoir seal, although the details of the force description may differ. For growth in a porous layer, methods in accordance with embodiments of the present invention, may generally use only normal forces, unless the layer being analysed is significantly tilted.

(53) In some cases it might be necessary to use additional constraints as a means of directing the flow in a certain direction. For example, in some embodiments of the present invention, it may be desirable to stop the flow at a certain horizon, or limit the fluid flow to only a zone of interest within the reservoir/overburden.

(54) By way of example, embodiments of the present invention have been applied to the West Loppa seismic survey.

(55) FIG. 6 shows a seismic cube from the seismic survey. A first formation of interest 1 is a possible source rock. A second formation of interest 2 is a possible reservoir. Faults and fractures 3 between these formations have been identified by AntTracking.

(56) FIG. 7 shows the seismic cube of FIG. 6 with the extracted horizons corresponding to the first formation of interest 1 and th2 second formation of interest 2 overlain with seismic amplitudes, in accordance with an embodiment of the present invention. The seismic amplitudes suggest that both formations contain hydrocarbon, and a question is whether a migration pathway exists whereby the hydrocarbon from the first formation can flow into the second formation, i.e., whether the first formation can be a source formation to the second formation.

(57) The starting object for the level set approach in accordance with an embodiment of the present invention is the apparent hydrocarbon-bearing zone in the first formation 1, the object (i.e., fluid) boundary being determined from the upper surface of the formation. In accordance with an embodiment of the present invention, seismic amplitude and AntTracking value ranges were appropriately scaled. In accordance with an embodiment of the present invention, flow in the faults and fractures 3 between the first 1 and second 2 formations was modelled in the level set equation by a vertical force modified by a normal force, as discussed above in relation to FIGS. 5(b) and (c). Flow in the first and second formations was modelled by normal forces.

(58) FIGS. 8(a) to (e) show the evolution of the fluid boundary with time resulting from the use of the level set approach, in accordance with an embodiment of the present invention. Above the first formation 1, there are several possible leakage pathways from the first formation. However, based on the results of FIG. 8, the most interesting is a pathway at the right hand side, which appears to show that the first formation can indeed be a source formation to the second formation 2.

(59) Embodiments of the present invention thus facilitate a user to obtain possible fluid migration pathways. Although described above in relation to forward iterations (i.e., for flow from a source to a destination), in some embodiments of the present invention, backward iterations can also be used e.g., in order to explore possible sources for a reservoir. As such, embodiments of the present invention provide for identifying probable locations of hydrocarbons in a formation and mapping of deposits to other deposit locations. For example, potential locations of hydrocarbon deposits may be confirmed/identified by determining the likelihood of a flow from a known hydrocarbon deposit to the proposed deposit location. In embodiments of the present invention, a determined fluid pathway for flow of hydrocarbons from or to a location of a hydrocarbon deposit/reservoir may be displayed to a user and/or input into a seismic/reservoir model to understand a probable location of hydrocarbon deposits and/or properties of the reservoir.

(60) All references referred to above are hereby incorporated by reference for all purposes.