WO2011146161A1 - Method and system for checkpointing during simulations - Google Patents

Method and system for checkpointing during simulations Download PDF

Info

Publication number
WO2011146161A1
WO2011146161A1 PCT/US2011/028350 US2011028350W WO2011146161A1 WO 2011146161 A1 WO2011146161 A1 WO 2011146161A1 US 2011028350 W US2011028350 W US 2011028350W WO 2011146161 A1 WO2011146161 A1 WO 2011146161A1
Authority
WO
WIPO (PCT)
Prior art keywords
correlation
checkpoint
data
time
memory
Prior art date
Application number
PCT/US2011/028350
Other languages
French (fr)
Inventor
Lijian Tan
John E. Anderson
Original Assignee
Exxonmobil Upstream Research Company
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Exxonmobil Upstream Research Company filed Critical Exxonmobil Upstream Research Company
Priority to CA2796631A priority Critical patent/CA2796631C/en
Priority to RU2012154894/08A priority patent/RU2573269C2/en
Priority to BR112012025845A priority patent/BR112012025845A2/en
Priority to AU2011256799A priority patent/AU2011256799B2/en
Priority to KR1020127032886A priority patent/KR101931935B1/en
Priority to CN201180024861.8A priority patent/CN102906728B/en
Priority to SG2012073813A priority patent/SG184808A1/en
Priority to EP11783895.3A priority patent/EP2572292A4/en
Publication of WO2011146161A1 publication Critical patent/WO2011146161A1/en

Links

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V1/00Seismology; Seismic or acoustic prospecting or detecting
    • G01V1/28Processing seismic data, e.g. for interpretation or for event detection
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V99/00Subject matter not provided for in other groups of this subclass
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V1/00Seismology; Seismic or acoustic prospecting or detecting
    • G01V1/28Processing seismic data, e.g. for interpretation or for event detection
    • G01V1/282Application of seismic models, synthetic seismograms
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V1/00Seismology; Seismic or acoustic prospecting or detecting
    • G01V1/001Acoustic presence detection
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V1/00Seismology; Seismic or acoustic prospecting or detecting
    • G01V1/003Seismic data acquisition in general, e.g. survey design
    • G01V1/005Seismic data acquisition in general, e.g. survey design with exploration systems emitting special signals, e.g. frequency swept signals, pulse sequences or slip sweep arrangements
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V1/00Seismology; Seismic or acoustic prospecting or detecting
    • G01V1/28Processing seismic data, e.g. for interpretation or for event detection
    • G01V1/30Analysis
    • G01V1/301Analysis for determining seismic cross-sections or geostructures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/10Complex mathematical operations
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V2210/00Details of seismic processing or analysis
    • G01V2210/60Analysis
    • G01V2210/67Wave propagation modeling
    • G01V2210/675Wave equation; Green's functions
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01VGEOPHYSICS; GRAVITATIONAL MEASUREMENTS; DETECTING MASSES OR OBJECTS; TAGS
    • G01V2210/00Details of seismic processing or analysis
    • G01V2210/60Analysis
    • G01V2210/67Wave propagation modeling
    • G01V2210/679Reverse-time modeling or coalescence modelling, i.e. starting from receivers

Definitions

  • the invention relates generally to the field of geophysical prospecting, and more particularly to seismic data processing. Specifically, the invention relates to a method and system for storing checkpoints to improve the efficiency of computer simulations that access simulation data in reverse time order, such as in migration of seismic data.
  • Many parameter estimation, inversion and imaging methods compute a forward simulation applying a sequence of steps extrapolating forward in time from an initial state.
  • the associated inverse or imaging method applies an adjoint operator stepping backwards in time from a final time state.
  • the method may then generate information about the system by cross correlating the forward simulation with the adjoint simulation at the same time steps.
  • the information generated may then be used to improve the simulation parameters used to fit the available data, as well for other purposes.
  • the information may be used to generate a gradient or a Hessian relating changes in an objective function to changes in the simulation parameters.
  • the information may be used to create an image as done in Reverse Time Depth Migration (RTM).
  • RTM Reverse Time Depth Migration
  • RTM Reverse Time depth Migration
  • a forward simulation wavefield state termed herein a full state checkpoint
  • a full state checkpoint may be defined as including all the information needed to either perform a cross-correlation or to restart a forward simulation from a given time step.
  • Full state checkpoints can then be saved at a smaller number of carefully chosen time steps so that the forward simulation can be restarted from the saved checkpoints and propagated to desired time steps.
  • the term checkpoint may also be used to refer to the aforementioned carefully chosen time steps, as contrasted with data saved at such time steps.
  • the forward simulation can be recomputed at time steps in reverse time order as needed starting from the saved checkpoints.
  • the checkpoint memory is reused for new checkpoints whenever it is no longer needed. The trade-off is performing more computation to minimize the input/output and storage requirements. This technique may be useful whenever the data sizes involved are much larger than the memory storage available.
  • the checkpointing method may be particularly important for RTM that includes the physics of wavefield attenuation (e.g., imaging using both P-waves and S-waves), as the time reversal strategy of forward simulation using wavefield checkpointing is always stable.
  • an alternative RTM implementation strategy of saving boundary values and the final wavefield state and doing reverse time extrapolation of the source wavefield simulation can be unstable. Further, the instability in this technique makes it an inappropriate application strategy when attenuation is included as part of the physics in the forward simulation.
  • An exemplary embodiment of the present techniques provides a method for lowering a computational cost of a computer simulation.
  • the method includes performing a checkpointing strategy, wherein the checkpointing strategy includes storing a correlation checkpoint (sometimes called a "correlation buffer” herein) at a time step, wherein the correlation checkpoint comprises data used to correlate a forward propagated value generated by the computer simulation, and wherein the computer simulation cannot be restarted from the values stored in the correlation checkpoint.
  • the checkpointing strategy also includes allocating a storage space for the correlation checkpoint, and running the computer simulation at each of a plurality of time steps. At each of the plurality of time steps a backwards propagated value from measured data is correlated to the forward propagated value from the computer simulation. The forward propagated value is stored in the correlation checkpoint.
  • the method may also include storing a full state checkpoint, and restarting the simulation from the full state checkpoint. Further, the method may include determining an optimum location for storing a checkpoint, wherein the optimum location is storage space allocated in a graphics processor unit (GPU) memory, a random access memory (RAM), a RAM disk, a disk drive, or any combinations thereof. The determination of the optimum location is based, at least in part, on the access speed of the storage space.
  • the storage space used for the correlation checkpoint may be less than a storage space used for a full state checkpoint.
  • Optimizing the checkpointing strategy may include determining a computing cost associated with storing the correlation checkpoint.
  • the computing cost may be minimized based, at least in part, on an access speed for each of a plurality of storage units and the ratio in a storage space required for a full state checkpoint to a storage space required for the correlation checkpoint.
  • a table that includes the time steps and a type of checkpoint to be stored at each of the time steps may be generated.
  • Determining the computing cost may include computing a maximum number of correlation checkpoints that can be stored in a fast storage unit, and computing a maximum number of correlation checkpoints that can be stored in a slow storage unit. If any correlation checkpoints can be stored in fast storage, compute an optimal number of sweeps if only using fast storage and add to a list. A minimum number of sweeps if only using fast storage can be computed and added to the list. If any correlation checkpoints can be stored in slow storage a minimum number of sweeps if using all types of storage can be computed and added to the list. An optimal number of sweeps if using all of the fast storage and storing at least one correlation checkpoint in slow storage can be computed and added to list if less than the last value on the list. An integer value nearest to each value on the list can be added to the list. The cost for each value on the list can be computed and a minimum cost can be returned.
  • the method may include generating an image of a subsurface region from seismic data.
  • the method may also include history matching reservoir data to a reservoir simulation.
  • Another exemplary embodiment provides a method for comparing collected data to simulated data.
  • the method includes backwards propagating the collected data across a grid and running a computer simulation to generate forward propagated data across the grid.
  • a number of correlation buffers can be stored during the computer simulation, wherein the simulation cannot be restarted from any of correlation buffers.
  • the data stored in the correlation buffers may be compared to the backwards propagated data at each point in the grid.
  • the method may include storing a full state checkpoint (also called a "full state buffer” herein) during the simulation, wherein the simulation can be restarted from the full state checkpoint.
  • the method may also include calculating a cost for storing a full state checkpoint, and determining a time step for storing a full state checkpoint based, at least in part, on the cost.
  • the forward propagated data may be correlated to backwards-propagated data in a next time step.
  • the method may include storing a plurality of correlation checkpoints in a fast storage medium and storing at least one correlation checkpoint in a slow storage medium. Further, the method may include storing at least one full state checkpoint, wherein the simulation can be restarted from the full state checkpoint. The method may include storing the at least one full state checkpoint in a fast storage medium.
  • the system includes a processor and a storage system, wherein the storage system includes data structures that represent measured data and a propagation algorithm configured to propagate the measured data backwards in time across a grid.
  • the storage system also includes a computer simulation configured to generate forward-in-time simulated data across the grid.
  • the system further includes a memory, wherein the memory includes code to direct the processor to propagate the measured data backwards-in-time across the grid, populate the grid with forward-in-time simulated data from the computer simulation, store a correlation checkpoint at a time step during the computer simulation, and correlate the backwards propagated data to the simulated data stored in the correlation checkpoint.
  • the processor may include a single core, a multiple core, a graphics- processing unit, or any combinations thereof.
  • the correlation checkpoint may be stored in the memory.
  • the memory may include a random access memory (RAM), a RAM disk, a graphics processing unit memory, or any combinations thereof.
  • the memory may include code configured to store a full state checkpoint at a time step, wherein the computer simulation can be restarted from the full state checkpoint.
  • Another exemplary embodiment of the present techniques provides a method for migrating seismic data to generate seismic images.
  • the method includes propagating measured seismic data backwards in time across a seismic grid, propagating simulated excitation pulses forwards in time across the seismic grid, and storing at least one correlation checkpoint, wherein the correlation checkpoint comprises only simulated excitation pulses used for a cross-correlation of interest.
  • the intensity of the measured seismic data is cross- correlated with the simulated excitation pulses at each point in the seismic grid using the data from the correlation checkpoint.
  • the method may include storing at least one full state checkpoint at a time step, wherein the at least one full state checkpoint comprises all data needed to restart the propagation from the time step.
  • the propagation of the simulated excitation pulses forwards in time may be performed using a full two-way, wave equation.
  • the propagation of the simulated excitation pulses forwards in time may be performed using based on Kirchhoff, Beam or one-way wave equation migration techniques.
  • FIG. 1 is a diagram of a region of interest, illustrating a single seismic experiment in a land environment, in accordance with an exemplary embodiment of the present techniques
  • Fig. 2 is a schematic diagram illustrating the operation of reverse time migration (RTM), in accordance with an exemplary embodiment of the present techniques
  • Fig. 3A is a process flow diagram showing a method for performing a reverse time cross-correlation, such as RTM, in accordance with an exemplary embodiment of the present techniques
  • FIG. 3B is a process flow diagram showing a forward propagation of a wavefield for a reverse time cross-correlation, in accordance with an exemplary embodiment of the present techniques
  • FIG. 4 is a diagram useful in illustrating the minimum computational effort using a full state checkpoint at time index k, in accordance with exemplary embodiments of the present techniques
  • FIGs. 5A-B are diagrams useful in illustrating the time steps at which full state or correlation checkpoints may be stored, in accordance with exemplary embodiments of the present techniques
  • FIGs. 6A-C are diagrams useful in illustrating the operation of the Griewank and optimal checkpointing schemes for a simplified simulation having 55 time steps, in accordance with exemplary embodiments of the present techniques
  • Figs. 7A-C are diagrams that compare checkpointing for standard correlations versus checkpointing when a past state in adjoint computation influences cross-correlation with a current state in forward computation, in accordance with exemplary embodiments of the present techniques;
  • FIGs. 8A-E are diagrams useful in illustrating a number of situations in which the amount of fast and slow memory is varied, while the storage space required by each type of checkpoint is assumed to be the same, in accordance with exemplary embodiments of the present techniques;
  • Figs. 9A-E are diagrams useful in illustrating a number of situations in which the amount of fast and slow memory is varied, wherein the storage space required for a correlation checkpoint is two and a full state checkpoint is three, in accordance with exemplary embodiments of the present techniques;
  • Fig. 10 is a process flow diagram of a method for implementing a simulation which uses correlation checkpoints, in accordance with exemplary embodiments of the present techniques
  • FIG. 11 is a process flow diagram of a method for computing a minimum cost without any checkpoints, in accordance with exemplary embodiments of the present techniques
  • Fig. 12 is a process flow diagram of a method for computing a minimum cost and a best location for cross-correlating n states, in accordance with exemplary embodiments of the present techniques
  • Fig. 13 is a process flow diagram showing how to pre-compute a table of minimum costs associated with a checkpoint taken at the optimal k location, in accordance with exemplary embodiments of the present techniques
  • Fig. 14 is a process flow diagram of a method for computing minimum cost and optimal checkpointing strategy for correlating n states with nf_used fast memory state buffers and ns ised slow memory state buffers in the situation that the starting checkpoint is in StartType storage, in accordance with exemplary embodiments of the present techniques;
  • Fig. 17 is a graph showing the performance improvement of the optimal checkpointing strategy with both fast and slow storage, over optimal checkpointing strategy with only fast storage, and over Griewank checkpointing strategy, in accordance with exemplary embodiments of the present techniques
  • Fig. 18 is a block diagram of an exemplary cluster computing system 1800 that may be used to implement the present techniques, in accordance with exemplary embodiments of the present techniques.
  • Algorithm carries its normal meaning and refers without limitation to any series of repeatable steps that result in a discrete “Value.”
  • an algorithm may include any mathematical, statistical, positional and/or relational calculation between any numbers of user-specified, preset, automatically- determined, and/or industry- or system- acceptable data elements.
  • various algorithms may be performed on subject data elements in relation to a previously defined data evaluation sample in order to produce a single, meaningful data value.
  • Computer-readable medium or “Non-transitory, computer-readable medium” as used herein refers to any non-transitory storage and/or transmission medium that participates in providing instructions to a processor for execution. Such a medium may include, but is not limited to, non-volatile media and volatile media. Non-volatile media includes, for example, NVRAM, or magnetic or optical disks. Volatile media includes dynamic memory, such as main memory.
  • Computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, an array of hard disks, a magnetic tape, or any other magnetic medium, magneto-optical medium, a CD-ROM, a holographic medium, any other optical medium, a RAM, a PROM, and EPROM, a FLASH- EPROM, a solid state medium like a memory card, any other memory chip or cartridge, or any other tangible medium from which a computer can read data or instructions.
  • a "Coordinate system” is a rectangular (Cartesian) coordinate domain with spatial coordinates (x, y, z) and time coordinate t. Seismic data is typically collected and stored in a coordinate system.
  • the spatial coordinates x and y may represent orthogonal horizontal coordinate directions, such as the in-line and cross-line directions of the survey in which the data are acquired.
  • the spatial coordinate z usually represents the vertical coordinate direction, such as depth measured positive downward.
  • Cross-correlation is a process that measures how much two time series of numbers resemble each other.
  • the cross-correlation may be linear or non-linear, may consider aspects of mutual information (such as those based on entropy), or may be performed by any other technique deemed useful to a user.
  • a cross- correlation between an excitation pulse projected forward in time and a seismic trace projected back in time is used to migrate the received energy to a reflection point in the subsurface, identifying the location (see migration).
  • to display or "displaying” includes a direct act that causes displaying of a graphical representation of a physical object, as well as any indirect act that facilitates displaying a graphical representation of a physical object.
  • Indirect acts include providing a website through which a user is enabled to affect a display, hyperlinking to such a website, or cooperating or collaborating with an entity who performs such direct or indirect acts.
  • a first party may operate alone or in cooperation with a third party vendor to enable the information to be generated on a display device.
  • the display device may include any device suitable for displaying the reference image, such as without limitation a virtual reality display, a 3-d display, a CRT monitor, a LCD monitor, a plasma device, a flat panel device, a printer, a plotter, or any other type of output device.
  • the display device may include a device, which has been calibrated with any conventional software intended to be used in evaluating, correcting, and/or improving display results.
  • Formation refers to a body of rock or other subsurface solids that is sufficiently distinctive and continuous that it can be mapped, for example, by seismic techniques.
  • a formation can be a body of rock of predominantly one type or a combination of types.
  • a formation can contain one or more hydrocarbon-bearing zones. Note that the terms formation, reservoir, and interval may be used interchangeably, but will generally be used to denote progressively smaller subsurface regions, zones or volumes.
  • a formation will generally be the largest subsurface region
  • a reservoir will generally be a region within the formation and will generally be a hydrocarbon-bearing zone (a formation, reservoir, or interval having oil, gas, heavy oil, and any combination thereof), and an interval will generally refer to a sub-region or portion of a reservoir.
  • a hydrocarbon- bearing zone can be separated from other hydrocarbon-bearing zones by zones of lower permeability such as mudstones, shales, or shale-like (highly compacted) sands.
  • a hydrocarbon-bearing zone includes heavy oil in addition to sand, clay, or other porous solids.
  • Gyr refers to active elements, which are sensitive to seismic signals and a supporting body (or structure) which holds the active elements.
  • Active elements typically comprise piezoelectric elements, but may also include optical elements, micro- machined electro-mechanical sensor elements, and the like.
  • Hydrocarbons are generally defined as molecules formed primarily of carbon and hydrogen atoms such as oil and natural gas. Hydrocarbons may also include other elements, such as, but not limited to, halogens, metallic elements, nitrogen, oxygen and/or sulfur. Hydrocarbons may be produced from hydrocarbon reservoirs through wells penetrating a hydrocarbon containing formation. Hydrocarbons derived from a hydrocarbon reservoir may include, but are not limited to, kerogen, bitumen, pyrobitumen, asphaltenes, oils or combinations thereof. Hydrocarbons may be located within or adjacent to mineral matrices within the earth. Matrices may include, but are not limited to, sedimentary rock, sands, silicilytes, carbonates, diatomites and other porous media.
  • Hydrophone refers to active elements that are sensitive to pressure (sound) waves in a marine environment.
  • the hydrophone also includes a supporting body (or structure) which holds the active elements.
  • Active elements typically comprise piezoelectric elements, but may also include other sound detecting elements.
  • Impedance is the product of seismic velocity and the density. Impedance typically varies among different rock layers, e.g., opposing sides of an interface have different impedances. Two types of impedance terms are generally defined, I p and I s , wherein I p is P-wave impedance, also called acoustic impedance, and I s is S-wave impedance, also called shear impedance.
  • I p P-wave impedance
  • I s S-wave impedance
  • the reflection coefficient of an interface generally depends on the contrast in these impedances and density of the rock on either side of the interface. Specifically, the contrast in these properties of geological layers affects the reflection coefficient at the boundary separating the two layers.
  • One geophysical process for determining the impedance and/or the density structure of a subsurface region based on recorded seismic reflection data is seismic inversion.
  • “Inversion” or “Seismic inversion” is a process by which one attempts to find a model of subsurface properties that reproduces a measured seismic response within a tolerance and satisfies geological and geophysical constraints.
  • Kirchhoff migration is an inverse backscattering method of inversion that relies on the statistical constructive interference of signal and the destructive interference of noise. It is a two-step operation that first upward projects or ray- traces from every depth point to the surface and builds a travel timetable of potential ray paths to surface locations. It then sums the samples for every surrounding trace at a time based on their source and receiver locations as defined by the travel timetable. Kirchhoff migration may be based on a one-way wave equation, and may be less accurate than a full two-way wave equation method, such as Reverse Time Migration (RTM), discussed herein.
  • RTM Reverse Time Migration
  • Marine environment refers to any offshore location.
  • the offshore location may be in shallow waters or in deep waters.
  • the marine environment may be an ocean body, a bay, a large lake, an estuary, a sea, or a channel.
  • “Migration” is typically performed during the data processing stage of seismic imaging in order to accurately position the subsurface seismic reflectors.
  • the need for seismic migration arises because variable seismic velocities and dipping reflectors cause seismic reflections in unmigrated seismic images to appear at incorrect locations.
  • Seismic migration is an inversion operation in which the seismic reflections are moved or "migrated" to their true subsurface positions.
  • CMP common-midpoint
  • CMP stacking is a data processing procedure in which a number of seismic data traces having the same source-receiver midpoint but different offsets are summed to form a stacked data trace that simulates a zero-offset data trace for the midpoint in question.
  • Such "poststack” migration can be done, for example, by integration along diffraction curves (known as "Kirchhoff ' migration), by numerical finite difference or phase-shift downward-continuation of the wavefield, or by equivalent operations in frequency-wavenumber or other domains.
  • prestack migration techniques can be applied before stacking of the seismic data traces. These "prestack” migration techniques are applied to the individual nonzero-offset data traces and the migrated results are then stacked to form the final image. Prestack migration typically produces better images than poststack migration. However, prestack migration is generally much more expensive (i.e., computationally demanding) than poststack migration. Accordingly, the use of prestack migration has typically been limited to situations where poststack migration does not provide an acceptable result, e.g., where the reflectors are steeply dipping. In some cases, reflector dip can exceed 90 degrees. As is well known in the seismic prospecting art, it may be possible to image these "overturned” reflectors using data from seismic "turning rays.”
  • prestack migration There are two general types of prestack migration, prestack time migration and prestack depth migration.
  • a background seismic wave-propagation velocity model to describe the seismic wave propagation velocity in the subsurface is needed in the seismic imaging.
  • the seismic imaging method used is prestack time migration (PSTM).
  • PSTM prestack time migration
  • PSDM prestack depth migration
  • a "mode-converted seismic wave” is a reflected P-wave or S-wave that has a different mode from the source seismic wave. Seismic waves have two modes. In a first mode, the seismic wave is a P-wave (or compression wave) that extends in the direction of propagation of the seismic wave. In a second mode, the seismic wave is an S-wave (or shear wave) oriented generally perpendicular to the direction of propagation of the seismic wave.
  • a source seismic wave produced by a seismic source is directed into a subterranean structure, which can have a subsurface reflector (e.g., an interface to a layer of hydrocarbons, a layer of water, or another layer of interest).
  • the seismic wave is reflected from the subsurface reflector, where the reflected seismic wave can be measured by a seismic sensor (or plural seismic sensors) (e.g., geophones or other seismic sensors).
  • mode conversion can occur upon reflection from the subsurface reflector.
  • a source P-wave can be reflected as an S-wave, or alternatively, a source S-wave can be reflected as a P-wave.
  • a reflected seismic wave that has a mode different from the mode of the source seismic wave is referred to as a mode-converted seismic wave.
  • a seismic surveying technique estimates absorption parameters for mode-converted seismic waves, which allows the seismic surveying technique to take into account absorption effects associated with mode-converted seismic waves. Considering absorption effects of reflected mode-converted seismic waves, as well as absorption effects of reflected pure (or single-mode) seismic waves, allows the seismic surveying technique to be more accurate than conventional surveying techniques (which typically just compute pure wave absorption parameters).
  • Multicomponent survey refers to seismic surveys that use multi-component receivers that record two or more components of the seismic energy incident on the receiver.
  • a 3-component (3-C) seismic receiver contains three orthogonal geophones and so can record the x-, y- and z-components of the particle motion at the receiver (the particle motion may be the particle displacement, particle velocity or particle acceleration or even, in principle, a higher derivative of the particle displacement).
  • a 4- component (4-C) seismic receiver can alternatively be used.
  • a 4-C receiver contains a pressure sensor such as a hydrophone in addition to three orthogonal sensors and so can record the pressure of the water column (which is a scalar quantity) in addition to the x-, y- and z-components of the particle motion.
  • a pressure sensor such as a hydrophone in addition to three orthogonal sensors and so can record the pressure of the water column (which is a scalar quantity) in addition to the x-, y- and z-components of the particle motion.
  • a "one-way wave equation” is an evolution equation in one of the space directions that approximately describes the downward or upward propagation of a wavefield, but not both simultaneously. Similar equations exist to relate various types of electromagnetic data.
  • the terms “optimal,” “optimizing, “ “optimize,” “optimality, “ and “optimization” are not intended to be limiting in the sense of requiring the present invention to find the best solution or to make the best decision. Although a mathematically optimal solution may in fact arrive at the best of all mathematically available possibilities, real-world embodiments of optimization routines, methods, models, and processes may work towards such a goal without ever actually achieving perfection. Accordingly, one of ordinary skill in the art having benefit of the present disclosure will appreciate that these terms, in the context of the scope of the present invention, are more general.
  • the terms can describe working towards a solution, which may be the best available solution, a preferred solution, or a solution that offers a specific benefit within a range of constraints. Further, the terms may refer to improving or refining a current solution. The terms may also refer to searching for a high point or a maximum for an objective function or processing to reduce a penalty function.
  • “Pixel” means the smallest addressable point in the image or simulation grid.
  • one computation cell in a seismic grid may represent a pixel in the image data.
  • Poststack refers to processing after individual sensor recordings have been summed or stacked.
  • Poststack attributes include, for example, reflection intensity, instantaneous frequency, reflection heterogeneity, acoustic impedance, velocity, dip, depth and azimuth.
  • PP and PS represent mode conversion events that take place during seismic surveys.
  • Acoustic energy emitted by the seismic source may predominantly be a pressure-wave (or P-wave).
  • P-wave pressure-wave
  • S-wave shear wave
  • the seismic wavefield acquired at the receivers may therefore contain both P-waves and S-waves.
  • P-waves events arising from arrival of P-waves may be referred to as PP events, since they involve acoustic energy that is both emitted as a P-wave and recorded at the receiver as a P-wave.
  • PS events Events arising from arrival of S-waves may be referred to as PS events, since they involve acoustic energy that is emitted as a P-wave but underwent a mode conversion to an S-wave upon reflection and is therefore recorded on the receiver as an S-wave.
  • PP events occur more prominently in vertical components of the acquired seismic data, whereas PS events appear more prominently in the horizontal components of the acquired seismic data.
  • P-wave and S-wave are types of seismic waves that occur in the subsurface.
  • P waves are longitudinal compression waves that propagate with particle motion perpendicular to the wavefronts as alternate compression and rarefaction waves.
  • P-wave receivers are responsive to vertical particle motion with respect to the surface of the earth.
  • S- waves or shear waves are polarized parallel to the wavefronts and are classified as S H waves and as S v waves for isotopic media.
  • S H waves particle motion is horizontal in a plane that is transverse with respect to the line of profile.
  • the particle motion for S v waves is in a vertical plane that is perpendicular to the S H particle motion and parallel to the line of profile.
  • Shear waves cannot propagate in a fluid because fluids have no shear strength.
  • Some media are birefringent to S-waves because of being anisotropic. That is, the acoustic energy splits into ordinary and an extraordinary ray paths characterized by different propagation velocities as fast (S f ) and slow (S s ) waves) during transit through a medium and with different polarization directions than pure S H or S v waves.
  • P-wave exploration comprises the workhorse of seismic surveys.
  • special studies for example, using the techniques described herein, may allow for additional exploration of the anisotropic characteristics of selected rock formations due to stress and fracturing. These studies may be performed by combining S-wave and P-wave technology in a single survey.
  • Receiveivers are devices, usually placed in an array or grid-like pattern on the surface of the Earth or just beneath, used to detect reflections of vibrations from rock strata. Measurement of the amplitude and arrival time of an arriving reflected wave at numerous locations allows the mapping of rock strata, and provides information about the thickness and composition of the rock strata (e.g., layers).
  • the receivers may include geophones, hydrophones, vibration detectors, accelerometers, or any other detector capable of accurately measuring the amplitudes of reflected waves.
  • a three-dimensional receiver may, for example, have accelerometers along each of the x, y, and z-axes to determine motion in all three directions.
  • a four dimensional receiver may combine a three-dimensional receiver with an amplitude detector, such as a hydrophone, to determine the intensity of a P-wave. Either three-dimensional or four-dimensional receivers may be used to detect both P-waves and S- waves propagated from the subsurface.
  • a “reservoir” or “hydrocarbon reservoir” is defined as a pay zone (for example, hydrocarbon-producing zones) that includes sandstone, limestone, chalk, coal and some types of shale. Pay zones can vary in thickness from less than one foot (0.3048 m) to hundreds of feet (hundreds of m). The permeability of the reservoir formation provides the potential for production.
  • Reservoir properties and “Reservoir property values” are defined as quantities representing physical attributes of rocks containing reservoir fluids.
  • the term "Reservoir properties" as used in this application includes both measurable and descriptive attributes. Examples of measurable reservoir property values include impedance to p-waves, impedance to s-waves, porosity, permeability, water saturation, and fracture density. Examples of descriptive reservoir property values include facies, lithology (for example, sandstone or carbonate), and environment-of-deposition (EOD). Reservoir properties may be populated into a reservoir framework of computational cells to generate a reservoir model.
  • a "rock physics model” relates petrophysical and production-related properties of a rock formation to the bulk elastic properties of the rock formation.
  • petrophysical and production-related properties may include, but are not limited to, porosity, pore geometry, pore connectivity volume of shale or clay, estimated overburden stress or related data, pore pressure, fluid type and content, clay content, mineralogy, temperature, and anisotropy and examples of bulk elastic properties may include, but are not limited to, P-impedance and S-impedance.
  • a rock physics model may provide values that may be used as a velocity model for a seismic survey.
  • Seismic attenuation is the frequency-dependent reduction in amplitude or energy in a seismic wave as the wave passes farther away from a source due to microscopic frictional forces and scattering from thin layers. It is often described in terms of a seismic quality factor, Q. Seismic attenuation is affected by fluid saturations, clay content and thin- layering. If sufficient attenuation occurs, the improvement provided by increased spatial sampling of seismic data (e.g., measuring both P and S-waves) may be minimal. Seismic quality factor, Q, estimates are valuable for seismic imaging, processing, and reservoir characterization applications. Examples of such applications include amplitude and phase compensation, wavelet processing, acquisition design, and lithology/fluid identification.
  • seismic attenuation may be directly related to permeability (via a squirt flow mechanism, for example).
  • rock physics models may be combined with recent advances in imaging to determine links between estimated seismic quality factors and reservoir parameters.
  • “Seismic data acquisition” means the sensing, processing and recording of the seismic waves.
  • a "seismic data trace” is the record of a selected seismic attribute (e.g., seismic amplitude or acoustic impedance) at a single x-y (map) location.
  • a seismic trace can be represented as a stack of cells or by a continuous curve (known as a "trace") whose amplitudes reflect the attribute values at each z (or t) data point for the x-y location in question.
  • a trace is collected for each dimension. Accordingly, it will be clearly understood that the techniques described below apply to traces collected in all of the dimensions. However, for simplicity of explanation, the description herein focuses on a single trace for each receiver.
  • Seismic data refers to a multidimensional matrix containing information obtained about points in the subsurface structure of a field using seismic methods. At least three dimensions in the seismic data may represent the location of each point in space-time, for example, x, y, and t, where x and y represent to the location of the point in an x, y grid on the surface, and t represents the time for a reflected elastic wave to reach the surface. Depending on the properties of the geological layers, t may generally represent the depth of the point below the surface of the earth.
  • the multidimensional matrix will contain at least one other dimensional representing the signal value at each location.
  • this dimension may represent any seismic data that may be connected to a particular point in the field, including such seismic data as offset gathers, offset stacks, angle gathers, angle stacks, Ip, I s , V p , V s , p, and ⁇ , among others.
  • “Seismic reflection surveys” are the most common type of seismic survey, are performed by initiating a shock wave at the earth's surface and monitoring at a plurality of surface locations the reflections of this disturbance from the underlying subterranean formations. These reflections occur from regions where there is a change in the acoustic impedance of the earth, generally the interface between adjacent strata.
  • the devices used to monitor the reflections are termed geophones or receivers.
  • the signal recorded by each geophone represents as a function of time the amplitude of the reflections detected by that geophone. To a good approximation, the reflections detected by each geophone occur from a point on each reflective surface located on a vertical line passing through the midpoint between the source and geophone.
  • each geophone records a signal ("Trace") which represents features of the formations vertically beneath a known point on the surface of the earth.
  • a "structured grid” is a grid in which each cell can be addressed by index (i, j) in two dimensions or (i, j, k) in three dimensions. All cells of a structural grid have similar shape and the same number of vertices, edges and faces. In this way, topological structure of the grid (i.e., boundary and adjacency relationships between cells, faces, edges, and vertices) is fully defined by the indexing (e.g., cell (i, j) is adjacent to cell (i+1, j)).
  • the most commonly used structured grids are Cartesian or radial in which each cell has four edges in two dimensions or six faces in three dimensions. Structured grids typically are used with seismic data volumes.
  • an optimal checkpointing scheme is implemented that distinguishes between a storage space used to save a complete forward simulation state that includes all the information needed to restart the forward simulator at a given time step (a full state checkpoint), versus that required only for doing a correlation calculation (a correlation checkpoint). Further, the techniques distinguish between the access speeds and storage capacity differences for multiple types of storage to optimize the mixture of full state and correlation checkpoints saved.
  • the computational speedup associated with this invention over the traditional Griewank checkpointing strategy may range from twenty percent to over three-hundred percent, for seismic reverse time depth migration (RTM) and full wavefield inversion (FWI) applications in a cluster-computing environment.
  • RTM seismic reverse time depth migration
  • FWI full wavefield inversion
  • the techniques described herein are not limited to RTM or, indeed, any seismic imaging application, but may be used in any number of applications that need to correlate a first data stream, presented in reverse time order, with a second data stream, presented in forward time order.
  • a complete seismic data record may have nine components recorded: three representing particle velocities in each of three dimensions; and six stress tensor fields, from which information about P- waves and S-waves can be extracted.
  • the full state checkpoints include all parameters and variables needed to restart the computation of forward simulation time steps, which may require the saving of dense grids of many wavefield components plus additional buffers required for the implementation of boundary conditions. See, e.g., Marcinkovich, C. and K. Olsen, "On the implementation of perfectly matched layers in a three-dimensional fourth-order velocity-stress finite difference scheme," 108 JOURNAL OF GEOPHYSICAL RESEARCH (NO. B5) 2276 (2003).
  • the correlation wavefields may be only required on a less dense grid in a subset of the full model volume and may only include a subset of the wavefield components, and may requires less numerical precision. For example, if obtaining the P-P Image in RTM is the only goal for a specific application, there may only be a need to correlate one wavefield (i.e. the pressure component of the wavefield), even though nine components are used for computation. As another example, double precision may be desired for computation, but only single precision is needed for cross- correlation.
  • the present techniques also provide for calculating an optimal balance between saving full state checkpoints and correlation checkpoints.
  • the present techniques distinguish between memory size and speed and, thus, the savings over Griewank techniques may be significantly more in a hierarchical environment that includes such technologies as graphical processing units (GPU) and solid state disk drives (SSD) as well as traditional random access memory (RAM) and disk storage. Accordingly, application software developed using this technology may be portable and flexible in changing computer environments.
  • the derived optimal checkpointing strategy applies to time-stepping methods in general. Therefore, it can be used for adjoint state gradient computation as required for doing time-domain full waveform inversion, as well as for reverse time depth migration.
  • the present techniques are not limited to RTM which is merely used as an example, herein. RTM is more clearly explained with respect to a single seismic source excitation, or "experiment,” as illustrated in Fig. 1.
  • Fig. 1 is a drawing of a region of interest 100, illustrating a single seismic experiment in a land environment, in accordance with an exemplary embodiment of the present techniques. It will be understood by one of skill in the art that a large number of seismic experiments will be performed over the region of interest 100 to effectively image the subsurface structure.
  • a salt dome 102 is protruding towards the surface 104.
  • the sides of the salt dome 102 may be vertical or even inverted, for example, side 106, making imaging by many techniques difficult.
  • the salt dome 102 may trap hydrocarbon deposits, such as oil 108, in oil sands or porous rock under a layer of cap rock 110, located above the salt dome 102.
  • Other deposits, such as oil and or gas 1 12 may be located in layers of rock 1 14 along the side, e.g., side 106, of the salt dome 102.
  • Still other hydrocarbons, such as deposit 1 16 may be located in layers of rock 1 18 that are more remote from the salt dome 102.
  • a seismic experiment may be performed by placing one or more sources 120 along the surface 104 of the region of interest 100 along with one or more receivers 122.
  • each of the receivers 122 may be a three-dimensional or four dimensional receiver cables to detect both P-waves and S-waves.
  • the source 120 creates a pulse, which may be conducted into the subsurface 124 as a wave 126.
  • the pulse wave 126 propagates in all directions, the illustration in Fig. 1 is simplified, for example, to show only the propagation of the pulse wave 126 towards the salt dome 102.
  • Part of the energy of the pulse wave 126 may reach the receivers 122 having not been reflected from any surface, but, instead, having traveled directly through the subsurface 124 to the receivers 122, for example, as a direct wave 128.
  • a reflected wave 130 may be created from the wave 126.
  • the reflected wave 130 may be partly or fully mode converted, e.g., an impinging P- wave may have S-wave components. If the reflected wave 130 has S-wave components, the S-waves may be attenuated by rocks containing substantial concentrations of fluids, for example, deposit 1 16. This attenuation may be termed Q attenuation.
  • the effective determination of Q attenuation of S-waves may be useful for enhancing the accuracy of the seismic imaging, allowing the location of layers, e.g.
  • the area of interest 102 may be divided into a three-dimensional grid of computational cells.
  • the grid will generally be a regular grid, allowing the computational cells to be assigned to coordinates that indicate the location.
  • the techniques are not limited to regular grids, as unstructured computational meshes may be used. However, unstructured computational meshes may add significant overhead, as each computational cell may contain location information.
  • Each computational cell may represent, or contain, a seismic data volume that has associated properties, such as velocity, impedance, and the like. Further, the speeds and directions of seismic wave fronts, such as P-waves or S-waves, may be calculated in each seismic data volume, using the properties for that seismic data volume.
  • the migration process "moves" the source and receiver to associate a reflection with the computational cell in which it originated.
  • This technique can be used to generate an image of the subsurface.
  • the RTM process can be more clearly seen by examining a cross section of the area of interest 100 along the seismic source and receivers, as discussed in further detail with respect to Fig. 2.
  • Fig. 2 is a schematic 200 illustrating the operation of reverse time migration (RTM), in accordance with an exemplary embodiment of the present techniques.
  • Each of the computational cells may be illustrated as computational cells 202 in the schematic 200.
  • the computational cells 202 may not be the minimum size on which the seismic data is collected or modeled, but may represent groups of smaller volumes 204 that have been combined, for example, to ease the computational complexity, or separated for computation, for example, to improve the accuracy of the image.
  • the size of the computational cells 202 is discussed in greater detail below.
  • RTM treats each seismic experiment separately and migrates the data by simulating the physical process used to collect it.
  • the algorithm utilizes a velocity model 206 of the wave propagation velocity of the area being imaged.
  • the velocity model 206 generally comprises the rock properties in each of the computational cells 202, such as density, impedance, and the like, which may be used by a wave propagation algorithm to calculate velocity and direction of a wave.
  • a wave propagation algorithm can be used to propagate a pulse from a location of a source 208 into the subsurface. As discussed herein, this may be performed using computational cells that are on a finer timescale than the computational cells 202. This propagation may provide an approximation, as a function of time, of the energy that may be reflected from each subsurface reflector, e.g., saltdome 210, and recorded at the receivers 212.
  • the source wavefield 214 travels primarily downward it may be labeled as D(xs, x, t), where xs is a vector in three-dimensional space representing the location of the source, x is a vector in three-dimensional space representing the location of an image point 216, and t is a value representing the time from the start of the seismic experiment (i.e., to represents the initial generation of the pulse wave).
  • the data traces 218 recorded at the receivers 212 may be propagated backward in time to simulate the motion of energy from, as yet unknown, reflection points to the receivers 212.
  • the backwards propagation can be performed by an adjoint operator, which maps the traces as wavefields 220 into the subsurface.
  • the receiver wavefields 220 may be labeled as U(xs, XR, X, t), where xs is a vector in three-dimensional space representing the location of the source, XR is a vector in three-dimensional space representing the location of the receiver, x is a vector in three-dimensional space representing the location of the image point 216, and t is a value representing the time from the start of the seismic experiment (t max represents the end of the data collection experiment).
  • the imaging principle used in RTM is that energy recorded by the receivers
  • 1(x) is the migrated image at subsurface location x, e.g., image point
  • the weighting function in Eqn. 1 indicates that the source wavefield 214 (D) is forward propagated along time t, and the receiver wavefield 220 (U) may be backward propagated from final time t max (thus, the name Reverse Time Migration).
  • the product of the two wavefields 214 and 220 e.g., the cross-correlation may be summed at each image point 216
  • the computation of the imaging condition requires that the value of the source wavefield 214 and receiver wavefield 220 be available at the same time t.
  • the most straightforward approach would be to compute and store one of the wavefields (e.g., the source wavefield 214), for all t of interest (e.g., t 0 to t max ).
  • the other wavefield e.g., the receiver wavefield 220
  • this approach can be impractical, since a great deal of data storage would be required to store the source wavefield 214. Therefore, the practical application of RTM requires that one recompute the source wavefield 214 periodically.
  • the image, I(x), where x is a location vector (x, y, z), represents the reflectivity of the subsurface as a function of position.
  • the reflectivity is large at locations where the impedance changes appreciably.
  • the RTM algorithm will yield nonzero image values at any point where there is any correlation between source and receiver wavefields 214 and 220. This may occur at locations other than those corresponding to true reflections, e.g., image point 216, leading to image artifacts that appear as a low-frequency noise superimposed upon the true reflectors.
  • a number of methods for removing these artifacts, among them low-cut filtering, application of Laplacian filters, etc, are available for this purpose.
  • RTM uses the full wave equation to propagate energy through the subsurface and, thus, it is a computationally expensive migration algorithm.
  • Prestack RTM in which individual shots are migrated separately, has only become computationally feasible in the last few years, due to the advent of cost-effective computing clusters.
  • clusters of many thousands of multi-CPU nodes may be linked together to form a computing cluster.
  • Each shot to be migrated can be assigned to a set of nodes in the cluster, and the property models (velocity, density, etc) for the area surrounding the shot can be read into the memory associated with the assigned nodes.
  • an optimization scheme is used to calculate a tradeoff between computer memory and computational overhead.
  • this scheme may store full state checkpoints (from which either a correlation may be performed or from which the propagation operation may be resumed), correlation checkpoints (including only the data needed for the cross-correlation calculation at a particular time), or a combination thereof.
  • checkpointing makes the practical implementation of RTM feasible. Further, checkpointing is even more important for embodiments that take into account inelastic propagation effects ("Q") or compute many wavefield components such as both the S-wavefield and the P-wavefield.
  • the computational model can be divided into computation cells 202, or smaller volumes 204.
  • the spacing of the computational cells is such that there are several grid blocks per minimum wavelength. For typical models, the spacing may be about 25 meters. Thus, with models of regions of interest having dimensions on the order of tens of kilometers, the number of grid cells in each dimension may be several hundred to more than one thousand. Thus, the total number of computational cells 202 may be, for example, greater than one billion.
  • the computations may be performed by running a finite-difference stencil over the entire grid, in order to compute the wavefield derivatives required for modeling the wave equation at each computational cell 202. Therefore, many billions of floating point operations can be performed at each time step.
  • the required grid spacing ⁇ e.g., the size for the computational cells 202, or smaller volumes 204, can be computed using the formula shown in Eqn. 2.
  • v min is the minimum velocity
  • max is the maximum frequency
  • N is the number of points per minimum wavelength, which may be about 5-10 points. This spacing, or smaller, may avoid the introduction of numerical dispersion into the propagated wavefield.
  • the total number of time steps may also be very large. Seismic data are recorded for a total time of about ten seconds. The data are typically stored with a sample interval of 2-4 milliseconds, meaning that each trace 218 may include about 2500-5000 samples. However, the RTM wave-equation solution must be computed on a much finer time step, given by the Courant-Friedrichs-Levy (CFL) stability condition shown in Eqn. 3.
  • CFL Courant-Friedrichs-Levy
  • Eqn. 3 is a constant of order one that depends on the dimension and the exact algorithm used.
  • k may be ⁇ j ⁇ f° r two-dimensional equations or f° r three- dimensional equations. Further, k may be larger if the equations are higher order in time or smaller if the equations are lower order in time.
  • a ten-second total propagation time requires 20000 time steps. This indicates that each expensive time step must be computed very many times.
  • Eqns. 2 and 3 it can be noted that the total computational cost is proportional to f ax, so doubling the maximum frequency to be migrated increases the computational cost by a factor of 16. Since the interpretability of seismic images is normally better when the frequency bandwidth is larger, the dependence of cost on frequency tends to quickly drive up the time required to obtain high quality images.
  • Fig. 3A is a process flow diagram showing a method for performing a reverse time cross-correlation, such as RTM, in accordance with an exemplary embodiment of the present techniques.
  • the process can begin at block 302 with the initialization of a reverse time migration (RTM) correlation image, for example, by setting all points in the image volume to zero.
  • RTM reverse time migration
  • an adjoint wavefield can be initialized, for example, by setting the adjoint wavefield to match a receiver wavefield at the maximum recording time.
  • the optimum time locations for storing checkpoint buffers and/or full state buffers can be calculated. The optimal time locations may also be calculated prior to running the simulation, and stored in a table for use in later simulations.
  • the adjoint wavefield may then be calculated at a first time step j, as shown at block 308.
  • the first time step j may correspond to the final time in the simulation.
  • the wavefield in the correlation buffer is accessed from a database of stored forward simulation states 314, contained in a storage unit (such as a memory or hard drive).
  • a storage unit such as a memory or hard drive.
  • the forward simulation wavefield state is cross- correlated with the adjoint wavefield for time step j, wherein the results are summed into a correlation volume within the correlation image.
  • the correlation operator 3 ⁇ 4(c ; , 3 ⁇ 4) can represent a more general operator than just a simple mathematical cross-correlation for some applications. The important feature is that this operator requires the subset of the forward simulation state c ; and the adjoint state t at the same time step j as input.
  • j may be decremented, and, at block 322, a determination may be made as to whether the adjoint propagation is finished. If not, process flow returns to block 308 to continue at the next time step.
  • process flow proceeds to block 324, at which various post-processing and output steps may be performed.
  • post-processing may include, for example, forming sub-surface offset gathers from the migrated points.
  • the offset gathers may be converted to reflection angle gathers to form a final image.
  • filtering calculations may be implemented to decrease noise, such as a Laplacian algorithm, as discussed above.
  • the process ends at block 326, wherein a data representation of the image is output or stored.
  • the data representation may include an image of a sub-set of the results.
  • the output may include only reflection angle gathers.
  • generating the data representation may include other steps to form a complete image.
  • mute and stack operations may be performed to generate a full seismic image.
  • present techniques are not limited to seismic imaging, and may be used for any number of other simulations that cross-correlate forward simulation data with data projected in a reverse-time order.
  • Fig. 3B is a process flow diagram showing a forward propagation of a wavefield for a reverse time cross-correlation, in accordance with an exemplary embodiment of the present techniques.
  • the steps in Fig. 3B may be executed if no correlation buffer is found at block 310.
  • the wave equations for the forward simulation may be propagated across the grid. The propagation may be performed by taking a sequence of (n+1) states s i starting with s 0 and n procedure calls f t at ⁇ that are generated according to s M ⁇ — f i iS ; ) , e.g. , the propagation of the forward excitation pulse.
  • the receiver wavefield can be propagated backwards in time and cross-correlated at each computational cell (x) with the forward-in- time simulation of a source wavefield. This means that the forward-in-time source simulation must be accessed in reversed time order. Since storing all of the forward in time points for a cross-correlation may not be feasible, due to memory and access time limitations, at block 330, forward simulation wavefields 314 can be stored for various time steps, as discussed herein. These forward simulation wavefields can be considered checkpoints that contain correlation buffers for the cross-correlation with the reverse data projection.
  • Each of the checkpoints in the database 314 may be a full state checkpoint, which may be used to restart a propagation calculation, or only a smaller correlation checkpoint used for determine the cross-correlation at a particular time step.
  • the source wavefield may be propagated one-step forward in time.
  • a determination is made as to whether the forward propagation is finished. If not, flow proceeds to block 328 to continue the calculation. If so, flow returns to block 312 (Fig. 3(A)) at which the cross-correlation is resumed.
  • the determination of the time steps e.g., the checkpointing process at block 306) at which to save full state checkpoints versus only correlation checkpoints is discussed below.
  • each full state checkpoint ⁇ requires the same amount of memory of size S.
  • each correlation checkpoint c t requires the same amount of memory of size C.
  • the additional memory requirement during the process of 3 ⁇ 4(c ; , 3 ⁇ 4) , c i />(3 ⁇ 4) , f t or is not considered part of the memory constraint.
  • the Griewank checkpointing strategy assumes that the memory required to save a full state checkpoint (the variable S) is identical to that required to save the information necessary to do a cross-correlation (the variable C) for the imaging step. For example, if a reverse time migration based on velocity-stress propagators is being performed, there may only be a need to correlate pressure, instead of all components of particle velocity and stress. This can easily increase the ratio of S/C to 4 or even up to 9. If perfectly matched layer (PML) boundary conditions are used, the S/C ratio may increase by another factor of two or three near the boundary of the earth model. Thus, propagation of waves may take place on a fine grid, but imaging may be performed on a coarser grid.
  • PML perfectly matched layer
  • the resulting S/C ratio would be eight. If some accuracy in the cross-correlation step may be sacrificed by storing a compressed correlation checkpoint, the S/C ratio can be increased by another factor of two. The S/C ratio components mentioned here would be multiplied together to yield the S/C ratio needed for this algorithm. Therefore, indeed, there could be a substantial difference between S and C. Given that reverse time depth migration is very computationally expensive, the present techniques may provide a substantial decrease in computational overhead by exploiting the difference between S and C.
  • the total memory cost is (n-l)C and the total forward computation effort is n (the total forward computation effort is 2n-l assuming each adjoint step requires the same effort as a forward step). It may be noted that the correlation at state zero is ignored, since state 0 usually corresponds to zero wavefields for reverse time migration applications. However, the techniques described herein can be easily modified to accommodate nonzero initial wavefields.
  • the notation J(n, M) may be used to represent the computation effort or cost for correlating n states (state 1 to state n) under memory constraint M.
  • the adjoint state n is known, and state 0 can always be recovered during computation with no computation effort, by either resetting everything to zero or loading state 0 from memory (which is not part of M).
  • the adjoint state at adjoint state 1 is used (instead of at adjoint state 0).
  • n c is the number of correlations possible given memory M and correlation buffer size C.
  • Fig. 4 is a schematic diagram illustrating the minimum computational effort using a full state checkpoint at time index k, in accordance with exemplary embodiments of the present techniques. If an optimization goal assumed herein is the minimization of J(n,M) using one checkpoint 402 at time step k, then for the correlation step 404 at and above time step index k, k forward steps can be used to get to the checkpoint location plus J(n-k, MS) for the time forward and adjoint stepping needed for time step indices k+1 to n. The memory available is reduced by S due to the checkpoint 402 of the state buffer at time step index k. The computational effort 406 for both forward and adjoint time stepping for indices 0 to k-1 would be J(k-1,M), as shown in Eqn. 5.
  • JaM _ one _ cp (n,M , k) k + J(n - k , M - S) + J(k - ⁇ ,M) Eqn. 5 Further, Eqn. 6 allows for minimizing J(n,M) under the restriction that there is either no checkpoint used or at least one checkpoint at some state k (state k is between state 0 and state n).
  • J (n, M) min ⁇ J no (n, M), mm [J add one (n, M, k)] ⁇ Eqn. 6
  • the memory constraint size is always changing in units of S and there are an integral number of checkpoint state buffers n s with memory equal to n s S.
  • the memory associated with the n c correlation buffers is equal to (n c - 1)C.
  • the total memory associated with the combination of both checkpoint state buffers and correlation buffers is shown in Eqn. 7.
  • the above equation is iteratively solved to find a numerical solution for a desired problem size and memory footprint.
  • Figs. 5A-B are schematic diagrams illustrating the time steps at which full state or correlation checkpoints may be stored, in accordance with exemplary embodiments of the present techniques.
  • correlation checkpoints 502 may be stored before a full state checkpoint 504 at time step k.
  • the total computation effort may be given in Eqn. 8.
  • ⁇ J k + n c + 2 + J(k - l - n c , M) + J(n - k,M - S - n c C) Eqn. 8
  • the total computation effort is shown in Eqn. 9.
  • the storage ratio (S/C) of full state checkpoints to correlation checkpoints may often be around 10, thus, this provides a convenient ratio to use for comparing the computational effort for optimal checkpointing, described herein, to Griewank checkpointing.
  • n provides the number of time steps required for the forward and adjoint computations.
  • the column labeled “ideal” provides the computational cost for time-stepping to enable correlation of the forward and adjoint simulations in an environment where memory is plentiful and the cost is the minimum possible.
  • the column labeled "optimal checkpointing” shows the results obtained using both full state checkpoints and correlation checkpoints.
  • the column labeled "ratio" is calculated by the ratio of the Griewank computation results divided by the Optimal checkpointing results, and provides the speedup possible with this new method compared to using only the Griewank optimal checkpointing strategy.
  • Table 1 Costs for Optimal Checkpointing versus Griewank Checkpointing
  • Figs. 6A-C are schematic diagrams illustrating the operation of the Griewank and optimal checkpointing schemes for a simplified simulation having 55 time steps, in accordance with exemplary embodiments of the present techniques. For each of the examples, the number of steps (55) and the amount of storage space (20) is the same.
  • a Griewank checkpointing algorithm shown in Fig. 6A, only full states (indicated by horizontal lines) are saved, allowing a complete restart of the propagation algorithm from each saved state.
  • the backwards propagated wavefield is run backward in time one time step to time step 54.
  • the forward propagation wavefield is restored at time step 50 (64) and advanced to time step 54, and the cross-correlation is again performed. This procedure is repeated for time steps 53, 52, 51, and the correlation is performed using the full state checkpoint itself at time step 50 (604).
  • the memory used for time step 50 is then released, and the cross-correlation proceeds with the forward simulations run from time step 35 (606).
  • the released memory is used for storing checkpoints from time step 35 (606), such as a checkpoint at time step 45 (608).
  • the checkpoint at time step 45 (608) is used to run forward simulations for time steps 49 through 46 wherein at each time step, the forward propagated wavefield is cross correlated with the backwards propagated wavefield from the receiver.
  • the memory is released, and used for another checkpoint at time step 41 (610). The procedure is repeated until the cross- correlation has been performed for all time steps.
  • the spacing between checkpoints is not uniform in Fig. 6A; in the first sweep for example, the checkpoints are at 50, 45, 41, 38 and 36, rather than for example 50, 45, 40 and 36.
  • the numbers shown in the drawing were determined to be optimal using an optimization algorithm (Griewank optimization in the case of Fig. 6A), whereas other possible choices of checkpoint location may or may not be optimal.
  • the amount of memory utilized is decreased, it can be seen that the amount of calculations is substantially increased. Since the amount of memory and the access time for the memory are often limiting, the procedure may substantially improve the running time, making the full RTM feasible. However, the number of calculations and amount of memory used in Griewank checkpointing may still be problematic for complex seismic imaging calculations, such as RTM.
  • This may provide significant benefits for both calculation and memory.
  • the optimal memory utilization shown in Fig. 6B may result if it is assumed that the memory used to hold a correlation checkpoint is 1/10 the size of the memory used to hold a full state checkpoint. In this condition, far fewer full simulation runs may be needed.
  • longer lines indicate full state checkpoints while shorter lines indicate correlation checkpoints.
  • a full simulation run 612 is started from the zero point 614.
  • a correlation checkpoint or correlation buffer
  • time step 35 656
  • time step 54 time step 54
  • the available memory M 20 with 20 correlation buffers.
  • the cross-correlation may then be performed with the backwards propagated wavefield from the receiver at each of these points.
  • the cross-correlation is repeated at each of these time steps using the correlation checkpoint at that time step, and then the procedure is repeated for a third run 626 of the full simulation.
  • the optimal checkpointing strategy provides a substantial savings in calculation time, with only 101 forward wave propagation steps performed, versus 209 forward wave propagation steps for the Griewank checkpointing procedure.
  • Fig. 6C shows an optimal checkpointing run in the same amount of memory as in 6A and 6B, but with a 5 to 1 relationship in size between a full state checkpoint and a correlation checkpoint.
  • the procedure is generally the same as in 6B, but a full state checkpoint 628 is saved during a first full simulation run 630.
  • correlation checkpoints are saved between time step 49 (632) and time step 54 (634). The cross-correlation may then be performed at time step 55, and then with each of the values between time steps 54 and 49.
  • the full simulation run is repeated from time step 31 (628) three more times, as indicated by reference number 636, and the cross-correlation is run at each time step.
  • the memory is freed and three final full simulation runs 638 are performed from the zero time step, with cross-correlations performed for each of the saved correlation checkpoints.
  • the forward wave propagation steps is only 147 for this situation, which is still significantly less that 209 forward wave propagation steps of Griewank checkpointing.
  • the optimal checkpointing technology may provide between 10 percent to over 400 percent speedup for RTM over the earlier Griewank checkpointing strategy, depending on the computer hardware environment and problem size for a given RTM application.
  • the checkpointing strategy discussed herein is not limited to direct correlations, but may be used for correlations in which a current state is dependent on a past state, as may be needed with respect to some FWI gradient computations and some automatic differentiation formulae.
  • Figs. 7A-C are schematic diagrams comparing checkpointing for a standard correlation versus checkpointing when a past state in adjoint computation influences cross- correlation with a current state in forward computation, in accordance with exemplary embodiments of the present techniques.
  • Fig. 7A illustrates a standard correlation condition
  • Fig. 7B illustrates a standard correlation condition in addition to a shifted correlation condition, for example, when running reservoir simulations in which past conditions influence current conditions.
  • an upward arrow 702 represents forward computation and a downward arrow 704 represents an adjoint simulation, e.g., in which values calculated at a previous time step influences values calculated at a later time step.
  • a horizontal bi-direction arrow 706 represents a standard correlation condition and a diagonal bi-direction arrow 708 represents a shifted correlation condition.
  • a bold horizontal line 710 represents a full state checkpoint with size S
  • a dotted horizontal line 712 represents a correlation checkpoint with size C.
  • Fig. 7B the optimal checkpointing strategy is modified to work for the latter case as demonstrated in Fig. 7C.
  • Fig. 7C provides a minimum memory use.
  • three types of correlation are used, i.e., correlating the adjoint wavefield with a forward wavefield, correlating the adjoint wavefield with a snapshot buffer in storage, and correlating the adjoint wavefield with a correlation buffer in storage).
  • This may be better understood by considering the cross-correlation problem as a chain-reverse problem.
  • Embodiments of the present techniques may provide a more efficient way to reverse a chain calculation that correlates results from a forward simulation with results from a backward, or adjoint, simulation, e.g., a reversed chain. It can be applied for standard cross-correlation as illustrated in Figure 7A. It can also be applied to modified cross-correlation as illustrated in Figure 7B and more detail in Figure 7C. Other cross-correlation conditions may also benefit from the present technique so long as the implementation is based on using a reversed chain.
  • exemplary embodiments of the present techniques can also optimize the storage of checkpoints based on the speed of the storage available.
  • GPUs graphical processing units
  • CPU memory the fastest storage
  • solid state disk memory the slowest storage
  • the slow storage (with size 5 ) requires cost W $ , ⁇ ⁇ writing a full state checkpoint or a correlation checkpoint, respectively, and cost R s s , R ⁇ ? for reading a full state checkpoint or a correlation checkpoint, respectively.
  • the computational effort for evolving any state to the next state is one, the full state checkpoint is of size S, and the correlation checkpoint is of size C.
  • the cost function may be defined as shown in Eqn. 10.
  • the cost function on the left side of the equation is the minimum of the three choices listed on the right hand side.
  • J F (n, M F , M S ) is the cost of cross-correlating n states with
  • J s (n, M F , M S ) is similar except that the first state in slow storage J F 0 cp (n, M F ,M S ) , and J m s cp (n, M F ,M S ) , follow the same definitions with the constraint that no full state checkpoints are allowed and, thus, only correlation checkpoints are stored.
  • R F or R ⁇ the first state in slow storage J F 0 cp (n, M F ,M S )
  • i and j are the number of correlation buffers we want to use.
  • f no cp (n,M F ,M s ) can be explicitly evaluated instead of relying on the above recursive formulation.
  • Figs. 8 and 9 The results of determining optimal checkpoints in storage having two different access speeds are shown in Figs. 8 and 9.
  • the techniques described herein work for any implementations having a non-zero access cost to fast storage.
  • a long horizontal line represents a full state checkpoint
  • a short horizontal line represents a correlation checkpoint
  • any line having a diamond at the end is stored in slow memory.
  • FIGS. 8A-E are schematic diagrams illustrating a number of situations in which the amount of fast and slow memory is varied, while the storage space used for each type of checkpoint remains the same, in accordance with exemplary embodiments of the present techniques.
  • the costs for accessing storage i.e. time for I/O
  • the storage used for a full state checkpoint may be substantially greater than that used for a correlation checkpoint in the case S is substantially greater than C.
  • FIGs. 9A-E are schematic diagrams illustrating a number of situations in which the amount of fast and slow memory is varied, wherein the storage space used for a correlation checkpoint is two and a full state checkpoint is three, in accordance with exemplary embodiments of the present techniques.
  • Table 2 provides a comparison of the solution time (including both forward and adjoint computation) between the optimal checkpoint techniques disclosed herein and the Griewank checkpoint strategy.
  • J n * ocp (n,M F ,M S ) can be determined explicitly.
  • J n * ocp (n,m,M F ,M S ) which is the cost of cross- correlating n steps by m forward sweeps using no full state checkpoints with state 0 in * storage (either F or 5) and a memory constraint of M F ,M S .
  • the procedure shown in Eqn.12 can be used to determine the cost with storing full state checkpoints.
  • J 1 J ( r F (t F + ⁇ ) + n F (W F +R F )
  • n F m(n-m,mn ⁇ ,),t ⁇ -n* -S*ni
  • Eqn. 16 may be used to get the best m and correspond J n * ocp (n,M F ,M S ) .
  • Proper bounds should be considered while applying these above formulations. For example if m o F pt is not n
  • J * o cp (n,M F ,M S ) can be explicitly determined, a recursive formulation is still used to find J * (n,M F ,M S ) .
  • the symbol " ⁇ " is used to mean "on the order of. This pre-tabulated data needs a storage of size ⁇ nxn F xn s .
  • Fig. 10 is a process flow diagram for implementing a simulation, which uses correlation checkpoints, in accordance with exemplary embodiments of the present techniques.
  • the process begins at block 1002 with the calculation of the optimal checkpointing strategy. This calculation may be performed using the formulations discussed above.
  • the required storage is allocated. This may be limited by the storage available, the size of the full state checkpoints and correlation checkpoints, and the like.
  • the checkpointing strategy and correlation calculations are implemented, for example, by looping through a series of checkpointing instructions.
  • a checkpointing strategy may be expressed in the form of an ordered list of instructions.
  • Table 3, below provides an example of an instruction set that may be used for implementing a checkpointing strategy.
  • an "instruction number” is associated with a sequence of operations to be done when that "instruction number” is encountered.
  • (0 74 S) says do instruction type zero and forward time step 74 steps and then save a state buffer in slow memory.
  • (1 S F) means do an adjoint time step and correlate. Then release storage space from slow memory from the last state buffer saved there. Then reload the forward simulation from the last state buffer saved in fast memory.
  • (2 55 10F 4S) means forward compute 55 time steps and save fast correlation buffers for steps 45-54 in fast storage and save correlation buffers for steps 41-44 in slow storage. Note that the correlation information for step 55 is available in the forward simulation data for step 55 and does not have to be saved separately.
  • (3 F) reloads the forward wavefield state from the last state buffer stored in fast storage.
  • Table 3 Exemplary instructions for implementing a checkpointing strategy
  • Appendices A and B are source code listings of two examples of a computer program that could be used to generate an optimal checkpointing strategy such as that embodied by the above list of instructions, given only the parameters specified above, i.e. S, C, etc.
  • the programs of Appendices A and B use the checkpointing strategy of the present invention; however, where it would be optimal, the program will select Griewank checkpointing.
  • Fig. 11 is a process flow diagram of a method for computing a minimum cost without any full state checkpoints, in accordance with exemplary embodiments of the present techniques.
  • the method begins at block 1 102 with the initialization of an empty list to store the potential optimal number of sweeps.
  • the first value of this list is initialized to be equal to n, the number of time steps in the forward simulation.
  • the optimal number of sweeps if using only fast correlation buffers is computed using the formula «i
  • the value of m F is added
  • the optimal number of sweeps if using all of the fast correlation buffers and at least one correlation buffer is computed using the formula: m F&S • 7(l + n c F )
  • m F p s is added to the list if and only if m F&s ⁇ m F p s ⁇ last value in list.
  • m t ⁇ is added to the list.
  • the list is regenerated to include the nearest integers within the same range. For example, if the original list is (17, 10, 1), then the new list should be (17,16, 11, 10,9,2, 1). This may help to account for the rounding of real numbers to integer numbers.
  • the minimum cost is returned.
  • Fig. 12 is a process flow diagram of a method for computing the minimum cost and the best location for cross-correlating n states, in accordance with exemplary embodiments of the present techniques.
  • the method assumes that nf ised fast memory checkpoint state buffers and ns_used slow memory checkpoint state buffers are already used and that the starting full state checkpoint is stored in StartType storage and the first full state checkpoint in stored in KType storage. (The italicized terms are used in C and C++ implementations of the present inventive method, and appear again in equations below.)
  • StartType denotes the type of storage, fast or slow, associated with the full state checkpoint from which the forward simulation is initiated.
  • KType denotes the type of storage, fast or slow, associated with the full state checkpoint to be stored at time index k.
  • StartType can take on two values, F for fast memory or S for slow memory
  • nfjised is the number of fast memory checkpoint state buffers currently in use. The currently available fast memory for new checkpoints of either state or correlation information does not include the space for fast memory checkpoint state buffers currently in use.
  • ns_used is the number of slow memory checkpoint state buffers currently in use and the currently available slow memory does not include the space for the slow memory checkpoint state buffers currently in use.
  • process flow proceeds to block 1204 where a huge cost (e.g., lelO) is returned to identify that it is impossible.
  • a huge cost e.g., lelO
  • n 2. If so, then the best first full state checkpoint location must be 1, and the corresponding cost is returned at block 1208.
  • the previous best k is obtained from a pre-computed table. This value in the table is calculated for correlating n-1 states with the same memory constraint and the same starting full state checkpoint and first full state checkpoint storage- type requirement.
  • the cost is given by the formula: k + W + J F ( « - k,nf _ used + 1, ns _ used) + R + R s startType + J St ⁇ ?e (k - 1, nf _ used, ns _ used)]
  • the cost is given by the formula: k + Wl + 7 s (n - k, nf _ used, ns _ used + l) + R c s + R rt2 ⁇ e + JS ⁇ P * (k - ⁇ , nf _ used, ns _ used)]
  • J * (n, nf _used, ns _used) ⁇ J * (n,M F - nf _used x S,M s - ns _used x S) has been used to indicate that the storage is reduced by unit of S.
  • the pre- computed table is updated with the computed minimum cost and the best location of the first checkpoint.
  • Fig. 13 is a process flow diagram showing how to pre-compute the table of minimum costs associated with a full state checkpoint taken at the optimal k location, in accordance with exemplary embodiments of the present techniques.
  • the method begins at block 1302 with the allocation of arrays to store the table. For example, two five dimension arrays: J_with_cp[2][2][n][nfMax][nsMax] and BestK[2][2][n][nfMax][nsMax], may be allocated to keep track of the minimum cost and the best location of the first checkpoint.
  • all values in the array are initialized to -1.
  • the first dimension represents the storage type for the starting checkpoint.
  • the second dimension represents the storage type for the first checkpoint.
  • the third dimension represents the number of states to be correlated.
  • the fourth dimension represents the maximum number of checkpoints in fast storage.
  • the fifth dimension represents the maximum number of checkpoints in slow storage.
  • a counter is tracked for looping through I from 2 to n, where I represents the number of states to be correlated.
  • another counter is tracked for looping through J from 0 to nfMax, where nfMax is the number of fast memory state buffers that have been used.
  • a third counter is tracked for looping through K from 0 to nSMax, where nsMax is the number of slow memory state buffers that have been used.
  • the minimum cost and the best location of the first checkpoint are computed for cross-correlating I states with J fast memory full state checkpoint buffers, and with K slow memory full state checkpoint buffers already used for the 4 cases: 1) Starting with a full state checkpoint in fast storage, calculate the cost for a first full state checkpoint in slow storage. 2) Starting with a full state checkpoint in fast storage, calculate the cost for a first full state checkpoint in slow storage. 3) Starting with a checkpoint in slow storage, calculate the cost for a first full state checkpoint in fast storage. 4) Finally, starting with a full state checkpoint in slow storage, calculate the cost for a first full state checkpoint in slow storage.
  • the obtained results are used to update the corresponding table entry for J with cp and BestK.
  • Each of these four steps for block 1304 can be computed using the method of figure 12.
  • the cost calculation 1212 requires knowledge of the cost of a full state store for the specified storage type, how many restores will be done for a given full state checkpoint at the specified time step, and the cost of a full state restore for the specified storage type.
  • n s > 2 the above outlined process may be applied recursively to optimally locate additional full state checkpoints.
  • Fig. 14 is a process flow diagram of a method for computing minimum cost and optimal checkpointing strategy for correlating n states with nf_used fast memory state buffers and ns ised slow memory state buffers in the situation that the starting checkpoint is in StartType storage, in accordance with exemplary embodiments of the present techniques.
  • the method begins at block 1402, where the cost associated with the first full state checkpoint in fast storage is obtained from table J_with_cp, and the corresponding best location of the full state checkpoint from table BestK.
  • the cost with the first full state checkpoint in slow storage is obtained from table J_with_cp, and the corresponding best location of the checkpoint is obtained from table BestK. Tables generated by the method of Fig.
  • the location of the optimal first checkpoint has an explicit form (as determined by the Griewank checkpointing strategy).
  • the graph was generated assuming that recovering from forward simulation state zero required no effort.
  • the identification of a minimum 1602 may be complicated.
  • this technique may provide a check- pointing strategy with additional cost less than 1% away from the optimal checkpointing strategy obtained from a full search.
  • n max j a bie For very large n, memory for cost and BestK tables and table computation time can become large.
  • a practical implementation strategy for very large n can be to compute optimal tables for a reasonable size of n max j a bie and then to switch to the Griewank full state checkpointing strategy to find BestK if n > n max jabh and to use the tables if n ⁇ n max _ t abie-
  • the Griewank value for BestK can be estimated without the need for a table. Usually this yields a check-pointing strategy that is only a few percent more expensive than the optimal one found with a full-sized table.
  • Fig. 17 is a graph 1700 showing the performance improvement of the optimal checkpointing strategy over checkpointing using the Griewank procedure, in accordance with exemplary embodiments of the present techniques.
  • the relation between performance and available memory typically has a shape shown in Fig. 17.
  • the top solid line 1702 is the optimal performance calculated for using two levels of storage, e.g., a fast storage and a slow storage.
  • the middle solid line 1704 is the optimal performance calculated for using a single level of storage.
  • the lower dotted line 1706 is the performance calculated for using Griewank checkpointing.
  • performance initially increases with more available storage (usually as more computational nodes are added), since less re-computation of full state checkpoints will be required.
  • Scaling loss becomes dominant, and performance falls off.
  • Scaling loss is a result of adding more computing units to a problem, wherein the efficiency of each computing unit is reduced due to the increased overhead caused by using multiple units, for example, communication between the units or between the units and storage systems. Scaling loss may be due to a lack of ideal scalability of the application. Further, the benefit from reduction of re-computation becomes marginal.
  • the performance uplift from the optimal checkpointing strategy depends on the available storage. For example, if sufficient storage is available, the performance uplift of the optimal checkpointing over Griewank checkpointing can be the ratio between point A 1708 and point F 1710. If storage is constrained (which is usually the case), the performance uplift may be the ratio between point A 1712 and point D 1714.
  • the optimal checkpointing strategy of the present techniques may be used to obtain enhanced efficiency for any number of computationally-intensive large-storage processes, for example, using a table-driven software implementation.
  • the processes that will benefit from the techniques involve a time-stepping forward simulation that is accessed in reverse-time order to correlate with a backward time stepping computation.
  • the optimal checkpointing procedure is used in seismic imaging applications.
  • the optimal checkpointing procedure may provide improved computational efficiency for prestack shot-record RTM, Prestack simultaneous source RTM, Prestack shot-record FWI Gradient, Prestack shot-record FWI Hessian, Prestack simultaneous source FWI Gradient, Prestack simultaneous source Hessian, and similar seismic calculations.
  • the computer simulator in each of these applications may be based on a seismic wave equation, for example, using anisotropic visco- elastic physics.
  • the recorded data may include particle velocity, pressure, stress, acceleration, or any combinations thereof.
  • the forward time-stepping seismic simulation can apply different levels of physics ranging from simple constant-density acoustic, variable-density acoustic, visco-anisotropic acoustic, isotropic elastic, anisotropic elastic and up to fully anisotropic -visco-elastic simulation.
  • the correlation of the forward simulation with adjoint simulations states generated from the measured data may be used to generate seismic images, to correct velocity models, estimate stiffness coefficients, estimate source wavelets, and estimate attenuation quality factors, among others.
  • the correlation step only requires that the source- excitation wavefield and the receiver backward-in-time propagated wavefield at the same time be cross-correlated and summed for all time steps.
  • a propagation or simulation may be performed in a reverse time step order or in a forward time step order and the result is the same.
  • the RTM example discussed above has a source excitation wavefield that is naturally accessible in a forward-time order accessed in reverse-time order while the receiver wavefield is marched backward in time.
  • the optimal checkpointing strategy can also apply to implementations in which the receiver wavefield is checkpointed during backward-in-time propagation and then accessed in forward-time order to match the source excitation wavefield being forwardly propagated in time.
  • the optimal checkpointing strategy can be used for history matching of hydrocarbon reservoir simulations.
  • the data collected from the reservoir may include fluid volumes and types produced from a well, bottom hole temperatures, and stratigraphic rock records, among others.
  • the computer simulation may be based on a multi-phase expression of Darcy's law for fluid flow.
  • the correlation may be used to adjust parameters such as porosity, permeability, fluid saturations, and pressure distributions, among others.
  • the correlation may also be used to generate production predictions for the reservoir and for reservoir management tasks. Such tasks may include determining locations for new wells, and determining whether to converting producers to injectors, among others.
  • the present techniques may be used for basin modeling.
  • the stratigraphic rock record may be one of the measured parameters.
  • the computer simulation is based on tectonic deformation of a basin and a model of the sedimentation processes that formed the basin.
  • the output from the correlation may assist with the determination of sedimentation rates and accommodation space available as a function of position and geologic time. Further, the output may include the historical shape of the basin over geologic time and the history of depth of burial and thermal history for target reservoirs and source rocks.
  • Another embodiment of the present techniques may be used in determining heat transfer in a heavy oil reservoir, such as the bitumen reservoirs in Cold Lake in Canada.
  • the measured data may include temperature measurements, rock type and hydrocarbon type measurements, thermal expansion, subsidence associated with hydrocarbon production, and the like.
  • the computer simulation may be based on diffusion equation for heat transfer, coupled with equations for rock, and heavy oil stiffness coefficients as a function of temperature, coupled with heavy oil phase relationships as a function of temperature and pressure, among others.
  • the results of the correlation may be used to determine thermal conductivity and subsurface temperature in the overburden, and reservoir intervals and changes in phase for the hydrocarbon components, among others.
  • the techniques are not limited to hydrocarbon systems.
  • embodiments of the present techniques may be used to determine heat transfer through or across objects.
  • the techniques may be used to compare temperature at the skin of the spacecraft with simulated results generated from a forward finite element analysis.
  • the techniques may also benefit other diverse applications as climate simulations, simulations of nuclear weapon detonations, and the like.
  • Fig. 18 is a block diagram of an exemplary cluster computing system 1800 that may be used to implement the present techniques, in accordance with exemplary embodiments of the present techniques.
  • the cluster computing system 1800 illustrated has four computing units 1802, each of which may perform calculations for part of the seismic imaging.
  • the present techniques are not limited to this configuration, as any number of computing configurations may be selected. For example, a smaller simulation, such as a seismic imaging calculation, may be run on a single computing unit 1802, such as a workstation, while a large simulation may be run on a cluster computing system 1800 having 10, 100, 1000, or even more computing units 1802.
  • the cluster computing system 1800 may be accessed from one or more client systems 1804 over a network 1806, for example, through a high speed network interface 1808.
  • the network 1806 may include a local area network (LAN), a wide area network (WAN), the Internet, or any combinations thereof.
  • Each of the client systems 1804 may have non-transitory, computer readable memory 1810 for the storage of operating code and programs, including random access memory (RAM) and read only memory (ROM).
  • RAM random access memory
  • ROM read only memory
  • the operating code and programs may include the code used to implement all or any portions of the methods discussed herein, for example, as discussed with respect to Figs. 3 and 10-14.
  • non-transitory computer readable media may hold full state checkpoints, correlation checkpoints, and simulation results, such as a data representation of a subsurface space.
  • the client systems 1804 can also have other non-transitory, computer readable media, such as storage systems 1812.
  • the storage systems 1812 may include one or more hard drives, one or more optical drives, one or more flash drives, any combinations of these units, or any other suitable storage device.
  • the storage systems 1812 may be used for the storage of checkpoints, code, models, data, and other information used for implementing the methods described herein.
  • the data storage system may hold checkpoints for the optimal checkpointing strategy.
  • the high speed network interface 1808 may be coupled to one or more communications busses in the cluster computing system 1800, such as a communications bus 1814.
  • the communication bus 1814 may be used to communicate instructions and data from the high speed network interface 1808 to a cluster storage system 1816 and to each of the computing units 1802 in the cluster computing system 1800.
  • the communications bus 1814 may also be used for communications among computing units 1802 and the storage array 1816.
  • a high speed bus 1818 can be present to increase the communications rate between the computing units 1802 and/or the cluster storage system 1816.
  • the cluster storage system 1816 can have one or more non-transitory, computer readable media devices, such as storage arrays 1820 for the storage of checkpoints, data, visual representations, results, code, or other information, for example, concerning the implementation of and results from the methods of Figs. 3 and 10-14.
  • the storage arrays 1820 may include any combinations of hard drives, optical drives, flash drives, holographic storage arrays, or any other suitable devices.
  • Each of the computing units 1802 can have a processor 1822 and associated local tangible, computer readable media, such as memory 1824 and storage 1826.
  • Each of the processors 1822 may be a multiple core unit, such as a multiple core CPU or a GPU.
  • the memory 1824 may include ROM and/or RAM used to store code, for example, used to direct the processor 1822 to implement the methods discussed with respect to Figs. 3 and 10-14.
  • the storage 1826 may include one or more hard drives, one or more optical drives, one or more flash drives, or any combinations thereof.
  • the storage 1826 may be used to provide storage for checkpoints, intermediate results, data, images, or code associated with operations, including code used to implement the method of Figs. 3 and 10-14.
  • the present techniques are not limited to the architecture or unit configuration illustrated in Fig. 18.
  • any suitable processor-based device may be utilized for implementing all or a portion of embodiments of the present techniques, including without limitation personal computers, networks personal computers, laptop computers, computer workstations, GPUs, mobile devices, and multi-processor servers or workstations with (or without) shared memory.
  • embodiments may be implemented on application specific integrated circuits (ASICs) or very large scale integrated (VLSI) circuits.
  • ASICs application specific integrated circuits
  • VLSI very large scale integrated circuits.
  • persons of ordinary skill in the art may utilize any number of suitable structures capable of executing logical operations according to the embodiments.
  • the algorithm used needs to compute the number of store and restore operations for each type of memory and for each type of operation. This information is used to compute the cost of the forward simulation time reversal.
  • the algorithm used provides a Griewank solution whenever C is greater than or equal to S. In that case, the full state check-points done by Griewank that could have been done by only storing the information needed for doing a correlation are reported by the algorithm as if they were stores of correlation information.
  • the three examples labeled A, B and C compare (1) the computer cost of a time-reversal strategy using Griewank check-pointing to RAM, (2) the present invention using only check-pointing to RAM, and (3) the present invention using check-pointing to both RAM and disk. These examples assume that n is equal to 40,000 time steps and a computer environment that can support 100 restart state buffers in RAM and 100 restart state buffers on disk.
  • the present invention can provide a speedup of 1.30x over the Griewank check-pointing strategy with all Griewank check-points going to RAM.
  • Example B Optimal in Memory
  • correlation buffers provide a 1.44x speedup for the forward simulation time reversal and an overall speedup of 1.29x over using "Griewank in Memory” for doing RTM.
  • Example C Optimal in Memory and Disk
  • n is equal to 40,000 time steps and a computer environment that can support 20 restart state buffers in RAM and 100 restart state buffers on disk.
  • the RAM available is smaller than in the examples above and that the advantage associated with this invention is greater.
  • the present invention applied in Example G can provide a speedup of 1.67x over the Griewank check-pointing strategy with all Griewank check-points going to RAM in Example D and an even larger speedup over the Griewank check-pointing strategy with all Griewank check-points going to disk in Example E.
  • Example F Optimal in Memory and Disk
  • the present invention can provide a speedup of 1.97x over a Griewank check-pointing strategy with all check-points saved in RAM.
  • Example H Optimal in Memory and Disk
  • Example K Optimal in Memory and Disk
  • Example M Optimal in Memory and Disk
  • the present invention can provide a speedup of 893x over a Griewank check-pointing strategy with all check-points saved in RAM.
  • an algorithm of the present invention is able to use storage less than a restart state buffer if it is enough to contain a correlation buffer.
  • This source code provides an example implementation of the present inventive method incorporating a two-level storage optimal check pointing strategy.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Remote Sensing (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • General Physics & Mathematics (AREA)
  • Acoustics & Sound (AREA)
  • General Life Sciences & Earth Sciences (AREA)
  • Geophysics (AREA)
  • Environmental & Geological Engineering (AREA)
  • Geology (AREA)
  • Data Mining & Analysis (AREA)
  • Mathematical Physics (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Optimization (AREA)
  • Computational Mathematics (AREA)
  • Mathematical Analysis (AREA)
  • Pure & Applied Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Algebra (AREA)
  • Geophysics And Detection Of Objects (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Retry When Errors Occur (AREA)
  • Processing Or Creating Images (AREA)

Abstract

Method and system for more efficient checkpointing strategy in cross correlating (316) a forward (328) and backward (308) propagated wave such as in migrating (326) or inverting seismic data. The checkpointing strategy includes storing in memory forward simulation data at a checkpointed time step, wherein the stored data are sufficient to do a cross correlation at that time step but not to restart the forward simulation. At other checkpoints, a greater amount of data sufficient to restart the simulation may be stored in memory (314). Methods are disclosed for finding an optimal combination, i.e. one that minimizes computation time (1132), of the two types of checkpoints for a given amount of computer memory (1004), and for locating a checkpoint at an optimal time step (306, 1214, 1310). The optimal checkpointing strategy (1002) also may optimize (1408) on use of fast (1402) vs. slow (1404) storage.

Description

METHOD AND SYSTEM FOR
CHECKPOINTING DURING SIMULATIONS
CROSS-REFERENCE TO RELATED APPLICATION
[0001] This application claims the benefit of U.S. Provisional Patent Application 61/346,298, filed May 19, 2010, entitled METHOD AND SYSTEM FOR CHECKPOINTING DURING SIMULATIONS, the entirety of which is incorporated by reference herein.
FIELD OF THE INVENTION
[0002] The invention relates generally to the field of geophysical prospecting, and more particularly to seismic data processing. Specifically, the invention relates to a method and system for storing checkpoints to improve the efficiency of computer simulations that access simulation data in reverse time order, such as in migration of seismic data.
BACKGROUND OF THE INVENTION
[0003] This section is intended to introduce various aspects of the art, which may be associated with exemplary embodiments of the present techniques. This discussion is believed to assist in providing a framework to facilitate a better understanding of particular aspects of the present techniques. Accordingly, it should be understood that this section should be read in this light, and not necessarily as admissions of prior art.
[0004] Many parameter estimation, inversion and imaging methods compute a forward simulation applying a sequence of steps extrapolating forward in time from an initial state. The associated inverse or imaging method applies an adjoint operator stepping backwards in time from a final time state. The method may then generate information about the system by cross correlating the forward simulation with the adjoint simulation at the same time steps. The information generated may then be used to improve the simulation parameters used to fit the available data, as well for other purposes. As an example, the information may be used to generate a gradient or a Hessian relating changes in an objective function to changes in the simulation parameters. In another example, the information may be used to create an image as done in Reverse Time Depth Migration (RTM).
[0005] These techniques require the forward-in-time simulation to be accessed in reverse time order for the cross-correlation computations. However, the size of the information needed to save the forward simulation for all time steps often exceeds the available memory storage. [0006] For example, pre-stack Reverse Time depth Migration (RTM) is commonly used to image subsurface earth structures when doing hydrocarbon exploration with seismic data. During RTM, the receiver wavefield recorded in a seismic experiment is propagated backwards in time and cross-correlated with the forward-in-time simulation of the source wavefield. The means that the forward-in-time source simulation must be accessed in reversed time order. The straightforward approach would be to compute and save all time steps of the forward-propagated source wavefield at all subsurface locations. This can be impractical due to the huge data volumes involved. As an example, for a standard test project, the Society of Exploration Geophysicists (SEG) Advanced Modeling (SEAM) project, this could mean keeping 40,000 time steps of an 84-gigabyte subsurface volume for a total of about 3.36 petabytes of data. Not only is the amount of storage required problematic, but the access times required to move that amount of data may also be problematic.
[0007] To decrease the storage needed, a forward simulation wavefield state, termed herein a full state checkpoint, may be defined as including all the information needed to either perform a cross-correlation or to restart a forward simulation from a given time step. Full state checkpoints can then be saved at a smaller number of carefully chosen time steps so that the forward simulation can be restarted from the saved checkpoints and propagated to desired time steps. (The term checkpoint may also be used to refer to the aforementioned carefully chosen time steps, as contrasted with data saved at such time steps.) Thus, the forward simulation can be recomputed at time steps in reverse time order as needed starting from the saved checkpoints. The checkpoint memory is reused for new checkpoints whenever it is no longer needed. The trade-off is performing more computation to minimize the input/output and storage requirements. This technique may be useful whenever the data sizes involved are much larger than the memory storage available.
[0008] Griewank and Walther proposed an "optimal" way to choose which time steps should be checkpointed given that a specified amount of memory is available in which to save the checkpointed forward simulation wavefield states. See, e.g., Griewank, A., "Achieving logarithmic growth of temporal and spatial complexity in reverse automatic differentiation," 1 Optimization Methods and Software 35-54 (1992); Griewank, A., Evaluating Derivatives: Principles and Techniques of Algorithmic Differentiation, Society for Industrial and Applied Mathematics (Philadelphia, PA, 2000); Griewank, A. and A. Walther, "Algorithm 799: An implementation of checkpointing for the reverse or adjoint mode of computational differentiation," 26 ACM Transactions on Mathematical Software 19-45 (2000).
[0009] In the SEAM example, it may be assumed that there are 40,000 time steps in the forward simulation. Using storage or memory to save 100-source wavefield state buffer checkpoints at any one time, the forward simulation can be accessed in reverse order using 1 14,747 forward simulation time steps, using the Griewank checkpointing scheme. Thus, a factor of roughly 400 in storage space is saved at an expense of doing 2.87 times as much computation for the forward simulation. For the RTM application, re-computing time steps for the forward simulation from checkpoints can often be faster than doing the input/output required to access the stored forward simulation time steps, even if sufficient disk space is available to store all of the forward simulation time steps in the case of slow disk and fast computation.
[0010] Symes applied Griewank optimal checkpointing as an effective implementation strategy for reverse time migration. Symes, W.W., 2007, Reverse time migration with optimal checkpointing, 72 Geophysics (No. 5), P.SM213-SM221. The checkpointing method may be particularly important for RTM that includes the physics of wavefield attenuation (e.g., imaging using both P-waves and S-waves), as the time reversal strategy of forward simulation using wavefield checkpointing is always stable. In comparison, an alternative RTM implementation strategy of saving boundary values and the final wavefield state and doing reverse time extrapolation of the source wavefield simulation can be unstable. Further, the instability in this technique makes it an inappropriate application strategy when attenuation is included as part of the physics in the forward simulation.
[0011] The checkpointing method for doing time reversal of a forward simulation has much more general application than just for RTM. Applications are quite general and associated with any time-stepping forward simulator. These include reservoir simulators, fluid flow, heat transfer, geologic basin modeling, as well as seismic full wavefield inversion (FWI). See, e.g., Tarantola, A., 1984, Inversion of seismic reflection data in the acoustic approximation: 49 Geophysics 1259-1266; Tarantola, A., Inverse Problem Theory: Method for Data Fitting and Model Parameter Estimation, Elsevier 125-133, 144-258 (1987); Plessix, R. E., "A review of the adjoint-state method for computing the gradient of a functional with geophysical applications," 167 Geophysical Journal International 495-503 (2006). Krebs, J. R., J. E. Anderson, D. Hinkley, R. Neelamani, S. Lee, A. Baumstein, M. D. Lacasse, "Fast Full- Wavefield Seismic Inversion Using Encoded Sources," 74 Geophysics P.WCC177- WCC188 (2009). The techniques may also apply to methods of automatic differentiation. See, e.g., Griewank, A., Juedes, D., and Srinivasan, "ADOL-C, a package for the automatic differentiation of algorithms written in C/C++," Preprint MCS-180-1190, Mathematics and Computer Science Division, Argonne National Laboratory, Argonne, Illinois (1990); Griewank, A., Evaluating Derivatives: Principles and Techniques of Algorithmic Differentiation, Society for Industrial and Applied Mathematics (Philadelphia, PA, 2000).
SUMMARY OF THE INVENTION
[0012] An exemplary embodiment of the present techniques provides a method for lowering a computational cost of a computer simulation. The method includes performing a checkpointing strategy, wherein the checkpointing strategy includes storing a correlation checkpoint (sometimes called a "correlation buffer" herein) at a time step, wherein the correlation checkpoint comprises data used to correlate a forward propagated value generated by the computer simulation, and wherein the computer simulation cannot be restarted from the values stored in the correlation checkpoint. The checkpointing strategy also includes allocating a storage space for the correlation checkpoint, and running the computer simulation at each of a plurality of time steps. At each of the plurality of time steps a backwards propagated value from measured data is correlated to the forward propagated value from the computer simulation. The forward propagated value is stored in the correlation checkpoint.
[0013] The method may also include storing a full state checkpoint, and restarting the simulation from the full state checkpoint. Further, the method may include determining an optimum location for storing a checkpoint, wherein the optimum location is storage space allocated in a graphics processor unit (GPU) memory, a random access memory (RAM), a RAM disk, a disk drive, or any combinations thereof. The determination of the optimum location is based, at least in part, on the access speed of the storage space. The storage space used for the correlation checkpoint may be less than a storage space used for a full state checkpoint. Optimizing the checkpointing strategy may include determining a computing cost associated with storing the correlation checkpoint. The computing cost may be minimized based, at least in part, on an access speed for each of a plurality of storage units and the ratio in a storage space required for a full state checkpoint to a storage space required for the correlation checkpoint. A table that includes the time steps and a type of checkpoint to be stored at each of the time steps may be generated.
[0014] Determining the computing cost may include computing a maximum number of correlation checkpoints that can be stored in a fast storage unit, and computing a maximum number of correlation checkpoints that can be stored in a slow storage unit. If any correlation checkpoints can be stored in fast storage, compute an optimal number of sweeps if only using fast storage and add to a list. A minimum number of sweeps if only using fast storage can be computed and added to the list. If any correlation checkpoints can be stored in slow storage a minimum number of sweeps if using all types of storage can be computed and added to the list. An optimal number of sweeps if using all of the fast storage and storing at least one correlation checkpoint in slow storage can be computed and added to list if less than the last value on the list. An integer value nearest to each value on the list can be added to the list. The cost for each value on the list can be computed and a minimum cost can be returned.
[0015] The method may include generating an image of a subsurface region from seismic data. The method may also include history matching reservoir data to a reservoir simulation.
[0016] Another exemplary embodiment provides a method for comparing collected data to simulated data. The method includes backwards propagating the collected data across a grid and running a computer simulation to generate forward propagated data across the grid. A number of correlation buffers can be stored during the computer simulation, wherein the simulation cannot be restarted from any of correlation buffers. The data stored in the correlation buffers may be compared to the backwards propagated data at each point in the grid.
[0017] The method may include storing a full state checkpoint (also called a "full state buffer" herein) during the simulation, wherein the simulation can be restarted from the full state checkpoint. The method may also include calculating a cost for storing a full state checkpoint, and determining a time step for storing a full state checkpoint based, at least in part, on the cost. The forward propagated data may be correlated to backwards-propagated data in a next time step.
[0018] The method may include storing a plurality of correlation checkpoints in a fast storage medium and storing at least one correlation checkpoint in a slow storage medium. Further, the method may include storing at least one full state checkpoint, wherein the simulation can be restarted from the full state checkpoint. The method may include storing the at least one full state checkpoint in a fast storage medium.
[0019] Another exemplary embodiment of the present techniques provides a system for correlating simulated data to collected data. The system includes a processor and a storage system, wherein the storage system includes data structures that represent measured data and a propagation algorithm configured to propagate the measured data backwards in time across a grid. The storage system also includes a computer simulation configured to generate forward-in-time simulated data across the grid. The system further includes a memory, wherein the memory includes code to direct the processor to propagate the measured data backwards-in-time across the grid, populate the grid with forward-in-time simulated data from the computer simulation, store a correlation checkpoint at a time step during the computer simulation, and correlate the backwards propagated data to the simulated data stored in the correlation checkpoint.
[0020] The processor may include a single core, a multiple core, a graphics- processing unit, or any combinations thereof. The correlation checkpoint may be stored in the memory. The memory may include a random access memory (RAM), a RAM disk, a graphics processing unit memory, or any combinations thereof. The memory may include code configured to store a full state checkpoint at a time step, wherein the computer simulation can be restarted from the full state checkpoint.
[0021] Another exemplary embodiment of the present techniques provides a method for migrating seismic data to generate seismic images. The method includes propagating measured seismic data backwards in time across a seismic grid, propagating simulated excitation pulses forwards in time across the seismic grid, and storing at least one correlation checkpoint, wherein the correlation checkpoint comprises only simulated excitation pulses used for a cross-correlation of interest. The intensity of the measured seismic data is cross- correlated with the simulated excitation pulses at each point in the seismic grid using the data from the correlation checkpoint.
[0022] The method may include storing at least one full state checkpoint at a time step, wherein the at least one full state checkpoint comprises all data needed to restart the propagation from the time step. The propagation of the simulated excitation pulses forwards in time may be performed using a full two-way, wave equation. The propagation of the simulated excitation pulses forwards in time may be performed using based on Kirchhoff, Beam or one-way wave equation migration techniques.
BRIEF DESCRIPTION OF THE DRAWINGS
[0023] The advantages of the present techniques are better understood by referring to the following detailed description and the attached drawings, in which:
[0024] Fig. 1 is a diagram of a region of interest, illustrating a single seismic experiment in a land environment, in accordance with an exemplary embodiment of the present techniques;
[0025] Fig. 2 is a schematic diagram illustrating the operation of reverse time migration (RTM), in accordance with an exemplary embodiment of the present techniques;
[0026] Fig. 3A is a process flow diagram showing a method for performing a reverse time cross-correlation, such as RTM, in accordance with an exemplary embodiment of the present techniques;
[0027] Fig. 3B is a process flow diagram showing a forward propagation of a wavefield for a reverse time cross-correlation, in accordance with an exemplary embodiment of the present techniques;
[0028] Fig. 4 is a diagram useful in illustrating the minimum computational effort using a full state checkpoint at time index k, in accordance with exemplary embodiments of the present techniques;
[0029] Figs. 5A-B are diagrams useful in illustrating the time steps at which full state or correlation checkpoints may be stored, in accordance with exemplary embodiments of the present techniques;
[0030] Figs. 6A-C are diagrams useful in illustrating the operation of the Griewank and optimal checkpointing schemes for a simplified simulation having 55 time steps, in accordance with exemplary embodiments of the present techniques;
[0031] Figs. 7A-C are diagrams that compare checkpointing for standard correlations versus checkpointing when a past state in adjoint computation influences cross-correlation with a current state in forward computation, in accordance with exemplary embodiments of the present techniques;
[0032] Figs. 8A-E are diagrams useful in illustrating a number of situations in which the amount of fast and slow memory is varied, while the storage space required by each type of checkpoint is assumed to be the same, in accordance with exemplary embodiments of the present techniques;
[0033] Figs. 9A-E are diagrams useful in illustrating a number of situations in which the amount of fast and slow memory is varied, wherein the storage space required for a correlation checkpoint is two and a full state checkpoint is three, in accordance with exemplary embodiments of the present techniques;
[0034] Fig. 10 is a process flow diagram of a method for implementing a simulation which uses correlation checkpoints, in accordance with exemplary embodiments of the present techniques;
[0035] Fig. 11 is a process flow diagram of a method for computing a minimum cost without any checkpoints, in accordance with exemplary embodiments of the present techniques;
[0036] Fig. 12 is a process flow diagram of a method for computing a minimum cost and a best location for cross-correlating n states, in accordance with exemplary embodiments of the present techniques;
[0037] Fig. 13 is a process flow diagram showing how to pre-compute a table of minimum costs associated with a checkpoint taken at the optimal k location, in accordance with exemplary embodiments of the present techniques;
[0038] Fig. 14 is a process flow diagram of a method for computing minimum cost and optimal checkpointing strategy for correlating n states with nf_used fast memory state buffers and ns ised slow memory state buffers in the situation that the starting checkpoint is in StartType storage, in accordance with exemplary embodiments of the present techniques;
[0039] Fig. 15 is a graph showing the relation between the minimum cost and location of the first full state checkpoint (k) for the cross-correlation of 266 steps using four buffers when S/C=12, and Rs=Ws=Rc=Wc=0, in accordance with exemplary embodiments of the present techniques;
[0040] Fig. 16 is a graph showing the relation between the minimum cost and location of the first full state checkpoint for the cross-correlation of 266 steps using four buffers when S/C=12, Rs=Ws=12, and Rc=Wc=l, in accordance with exemplary embodiments of the present techniques;
[0041] Fig. 17 is a graph showing the performance improvement of the optimal checkpointing strategy with both fast and slow storage, over optimal checkpointing strategy with only fast storage, and over Griewank checkpointing strategy, in accordance with exemplary embodiments of the present techniques
[0042] Fig. 18 is a block diagram of an exemplary cluster computing system 1800 that may be used to implement the present techniques, in accordance with exemplary embodiments of the present techniques.
DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS
[0043] In the following detailed description section, the specific embodiments of the present techniques are described in connection with example embodiments. However, to the extent that the following description is specific to a particular embodiment or a particular use of the present techniques, this is intended to be for exemplary purposes only and simply provides a description of the exemplary embodiments. Accordingly, the present techniques are not limited to the specific embodiments described below, but rather, such techniques include all alternatives, modifications, and equivalents falling within the true spirit and scope of the appended claims.
[0044] At the outset, and for ease of reference, certain terms used in this application and their meanings as used in this context are set forth. To the extent a term used herein is not defined below, it should be given the broadest definition persons in the pertinent art have given that term as reflected in at least one printed publication or issued patent. Further, the present techniques are not limited by the usage of the terms shown below, as all equivalents, synonyms, new developments, and terms or techniques that serve the same or a similar purpose are considered to be within the scope of the present claims.
[0045] "Algorithm" carries its normal meaning and refers without limitation to any series of repeatable steps that result in a discrete "Value." For example, an algorithm may include any mathematical, statistical, positional and/or relational calculation between any numbers of user-specified, preset, automatically- determined, and/or industry- or system- acceptable data elements. In several embodiments, various algorithms may be performed on subject data elements in relation to a previously defined data evaluation sample in order to produce a single, meaningful data value.
[0046] "Computer-readable medium" or "Non-transitory, computer-readable medium" as used herein refers to any non-transitory storage and/or transmission medium that participates in providing instructions to a processor for execution. Such a medium may include, but is not limited to, non-volatile media and volatile media. Non-volatile media includes, for example, NVRAM, or magnetic or optical disks. Volatile media includes dynamic memory, such as main memory. Common forms of computer-readable media include, for example, a floppy disk, a flexible disk, a hard disk, an array of hard disks, a magnetic tape, or any other magnetic medium, magneto-optical medium, a CD-ROM, a holographic medium, any other optical medium, a RAM, a PROM, and EPROM, a FLASH- EPROM, a solid state medium like a memory card, any other memory chip or cartridge, or any other tangible medium from which a computer can read data or instructions.
[0047] As used herein, a "Coordinate system" is a rectangular (Cartesian) coordinate domain with spatial coordinates (x, y, z) and time coordinate t. Seismic data is typically collected and stored in a coordinate system. The spatial coordinates x and y may represent orthogonal horizontal coordinate directions, such as the in-line and cross-line directions of the survey in which the data are acquired. The spatial coordinate z usually represents the vertical coordinate direction, such as depth measured positive downward.
[0048] "Cross-correlation" is a process that measures how much two time series of numbers resemble each other. The cross-correlation may be linear or non-linear, may consider aspects of mutual information (such as those based on entropy), or may be performed by any other technique deemed useful to a user. As used herein, a cross- correlation between an excitation pulse projected forward in time and a seismic trace projected back in time is used to migrate the received energy to a reflection point in the subsurface, identifying the location (see migration).
[0049] As used herein, "to display" or "displaying" includes a direct act that causes displaying of a graphical representation of a physical object, as well as any indirect act that facilitates displaying a graphical representation of a physical object. Indirect acts include providing a website through which a user is enabled to affect a display, hyperlinking to such a website, or cooperating or collaborating with an entity who performs such direct or indirect acts. Thus, a first party may operate alone or in cooperation with a third party vendor to enable the information to be generated on a display device. The display device may include any device suitable for displaying the reference image, such as without limitation a virtual reality display, a 3-d display, a CRT monitor, a LCD monitor, a plasma device, a flat panel device, a printer, a plotter, or any other type of output device. The display device may include a device, which has been calibrated with any conventional software intended to be used in evaluating, correcting, and/or improving display results.
[0050] "Exemplary" is used exclusively herein to mean "serving as an example, instance, or illustration." Any embodiment described herein as "exemplary" is not to be construed as preferred or advantageous over other embodiments. [0051] "Formation" refers to a body of rock or other subsurface solids that is sufficiently distinctive and continuous that it can be mapped, for example, by seismic techniques. A formation can be a body of rock of predominantly one type or a combination of types. A formation can contain one or more hydrocarbon-bearing zones. Note that the terms formation, reservoir, and interval may be used interchangeably, but will generally be used to denote progressively smaller subsurface regions, zones or volumes. More specifically, a formation will generally be the largest subsurface region, a reservoir will generally be a region within the formation and will generally be a hydrocarbon-bearing zone (a formation, reservoir, or interval having oil, gas, heavy oil, and any combination thereof), and an interval will generally refer to a sub-region or portion of a reservoir. A hydrocarbon- bearing zone can be separated from other hydrocarbon-bearing zones by zones of lower permeability such as mudstones, shales, or shale-like (highly compacted) sands. In one or more embodiments, a hydrocarbon-bearing zone includes heavy oil in addition to sand, clay, or other porous solids.
[0052] "Geophone" refers to active elements, which are sensitive to seismic signals and a supporting body (or structure) which holds the active elements. Active elements typically comprise piezoelectric elements, but may also include optical elements, micro- machined electro-mechanical sensor elements, and the like.
[0053] "Hydrocarbons" are generally defined as molecules formed primarily of carbon and hydrogen atoms such as oil and natural gas. Hydrocarbons may also include other elements, such as, but not limited to, halogens, metallic elements, nitrogen, oxygen and/or sulfur. Hydrocarbons may be produced from hydrocarbon reservoirs through wells penetrating a hydrocarbon containing formation. Hydrocarbons derived from a hydrocarbon reservoir may include, but are not limited to, kerogen, bitumen, pyrobitumen, asphaltenes, oils or combinations thereof. Hydrocarbons may be located within or adjacent to mineral matrices within the earth. Matrices may include, but are not limited to, sedimentary rock, sands, silicilytes, carbonates, diatomites and other porous media.
[0054] "Hydrophone" refers to active elements that are sensitive to pressure (sound) waves in a marine environment. The hydrophone also includes a supporting body (or structure) which holds the active elements. Active elements typically comprise piezoelectric elements, but may also include other sound detecting elements.
[0055] "Impedance" is the product of seismic velocity and the density. Impedance typically varies among different rock layers, e.g., opposing sides of an interface have different impedances. Two types of impedance terms are generally defined, Ip and Is, wherein Ip is P-wave impedance, also called acoustic impedance, and Is is S-wave impedance, also called shear impedance. The reflection coefficient of an interface generally depends on the contrast in these impedances and density of the rock on either side of the interface. Specifically, the contrast in these properties of geological layers affects the reflection coefficient at the boundary separating the two layers. One geophysical process for determining the impedance and/or the density structure of a subsurface region based on recorded seismic reflection data is seismic inversion.
[0056] "Inversion" or "Seismic inversion" is a process by which one attempts to find a model of subsurface properties that reproduces a measured seismic response within a tolerance and satisfies geological and geophysical constraints. There are a large number of well-known methods of seismic inversion. These well-known methods fall into one of two categories, iterative inversion and non-iterative inversion. Non-iterative inversion is accomplished by assuming some simple background model and updating the model based on the input data. In comparison, iterative inversion uses the updated model as input to another step of inversion. (See Migration).
[0057] "Kirchhoff migration" is an inverse backscattering method of inversion that relies on the statistical constructive interference of signal and the destructive interference of noise. It is a two-step operation that first upward projects or ray- traces from every depth point to the surface and builds a travel timetable of potential ray paths to surface locations. It then sums the samples for every surrounding trace at a time based on their source and receiver locations as defined by the travel timetable. Kirchhoff migration may be based on a one-way wave equation, and may be less accurate than a full two-way wave equation method, such as Reverse Time Migration (RTM), discussed herein.
[0058] "Marine environment" refers to any offshore location. The offshore location may be in shallow waters or in deep waters. The marine environment may be an ocean body, a bay, a large lake, an estuary, a sea, or a channel.
[0059] "Migration" is typically performed during the data processing stage of seismic imaging in order to accurately position the subsurface seismic reflectors. The need for seismic migration arises because variable seismic velocities and dipping reflectors cause seismic reflections in unmigrated seismic images to appear at incorrect locations. Seismic migration is an inversion operation in which the seismic reflections are moved or "migrated" to their true subsurface positions. There are many different seismic migration techniques. Some of these migration techniques are applied after common-midpoint (CMP) stacking of the data traces. As is known in the art, CMP stacking is a data processing procedure in which a number of seismic data traces having the same source-receiver midpoint but different offsets are summed to form a stacked data trace that simulates a zero-offset data trace for the midpoint in question. Such "poststack" migration can be done, for example, by integration along diffraction curves (known as "Kirchhoff ' migration), by numerical finite difference or phase-shift downward-continuation of the wavefield, or by equivalent operations in frequency-wavenumber or other domains.
[0060] Other seismic migration techniques can be applied before stacking of the seismic data traces. These "prestack" migration techniques are applied to the individual nonzero-offset data traces and the migrated results are then stacked to form the final image. Prestack migration typically produces better images than poststack migration. However, prestack migration is generally much more expensive (i.e., computationally demanding) than poststack migration. Accordingly, the use of prestack migration has typically been limited to situations where poststack migration does not provide an acceptable result, e.g., where the reflectors are steeply dipping. In some cases, reflector dip can exceed 90 degrees. As is well known in the seismic prospecting art, it may be possible to image these "overturned" reflectors using data from seismic "turning rays."
[0061] There are two general types of prestack migration, prestack time migration and prestack depth migration. A background seismic wave-propagation velocity model to describe the seismic wave propagation velocity in the subsurface is needed in the seismic imaging. In a region where the subsurface seismic wave velocity varies only in the vertical direction, the seismic imaging method used is prestack time migration (PSTM). In a region where the subsurface seismic wave propagation velocity varies in both vertical and lateral (or horizontal) direction, prestack depth migration (PSDM), needs to be used to give accurate results.
[0062] A "mode-converted seismic wave" is a reflected P-wave or S-wave that has a different mode from the source seismic wave. Seismic waves have two modes. In a first mode, the seismic wave is a P-wave (or compression wave) that extends in the direction of propagation of the seismic wave. In a second mode, the seismic wave is an S-wave (or shear wave) oriented generally perpendicular to the direction of propagation of the seismic wave. A source seismic wave produced by a seismic source (e.g., an explosive, an air gun, etc.) is directed into a subterranean structure, which can have a subsurface reflector (e.g., an interface to a layer of hydrocarbons, a layer of water, or another layer of interest). The seismic wave is reflected from the subsurface reflector, where the reflected seismic wave can be measured by a seismic sensor (or plural seismic sensors) (e.g., geophones or other seismic sensors). In many cases, mode conversion can occur upon reflection from the subsurface reflector. For example, a source P-wave can be reflected as an S-wave, or alternatively, a source S-wave can be reflected as a P-wave. A reflected seismic wave that has a mode different from the mode of the source seismic wave is referred to as a mode-converted seismic wave. A seismic surveying technique according to some embodiments estimates absorption parameters for mode-converted seismic waves, which allows the seismic surveying technique to take into account absorption effects associated with mode-converted seismic waves. Considering absorption effects of reflected mode-converted seismic waves, as well as absorption effects of reflected pure (or single-mode) seismic waves, allows the seismic surveying technique to be more accurate than conventional surveying techniques (which typically just compute pure wave absorption parameters).
[0063] "Multicomponent survey" refers to seismic surveys that use multi-component receivers that record two or more components of the seismic energy incident on the receiver. For example, a 3-component (3-C) seismic receiver contains three orthogonal geophones and so can record the x-, y- and z-components of the particle motion at the receiver (the particle motion may be the particle displacement, particle velocity or particle acceleration or even, in principle, a higher derivative of the particle displacement). In a marine seismic survey, a 4- component (4-C) seismic receiver can alternatively be used. A 4-C receiver contains a pressure sensor such as a hydrophone in addition to three orthogonal sensors and so can record the pressure of the water column (which is a scalar quantity) in addition to the x-, y- and z-components of the particle motion.
[0064] A "one-way wave equation" is an evolution equation in one of the space directions that approximately describes the downward or upward propagation of a wavefield, but not both simultaneously. Similar equations exist to relate various types of electromagnetic data.
[0065] As used herein, the terms "optimal," "optimizing, " "optimize," "optimality, " and "optimization" (as well as linguistically related words and phrases) are not intended to be limiting in the sense of requiring the present invention to find the best solution or to make the best decision. Although a mathematically optimal solution may in fact arrive at the best of all mathematically available possibilities, real-world embodiments of optimization routines, methods, models, and processes may work towards such a goal without ever actually achieving perfection. Accordingly, one of ordinary skill in the art having benefit of the present disclosure will appreciate that these terms, in the context of the scope of the present invention, are more general. The terms can describe working towards a solution, which may be the best available solution, a preferred solution, or a solution that offers a specific benefit within a range of constraints. Further, the terms may refer to improving or refining a current solution. The terms may also refer to searching for a high point or a maximum for an objective function or processing to reduce a penalty function.
[0066] "Pixel" means the smallest addressable point in the image or simulation grid. For example, in seismic imaging, one computation cell in a seismic grid may represent a pixel in the image data.
[0067] "Poststack" refers to processing after individual sensor recordings have been summed or stacked. Poststack attributes include, for example, reflection intensity, instantaneous frequency, reflection heterogeneity, acoustic impedance, velocity, dip, depth and azimuth.
[0068] "PP" and "PS" represent mode conversion events that take place during seismic surveys. Acoustic energy emitted by the seismic source may predominantly be a pressure-wave (or P-wave). When the acoustic energy undergoes reflection an interface, it may also undergo a partial mode conversion to a shear wave (S-wave). As a result, the seismic wavefield acquired at the receivers may therefore contain both P-waves and S-waves. Events arising from arrival of P-waves may be referred to as PP events, since they involve acoustic energy that is both emitted as a P-wave and recorded at the receiver as a P-wave. Events arising from arrival of S-waves may be referred to as PS events, since they involve acoustic energy that is emitted as a P-wave but underwent a mode conversion to an S-wave upon reflection and is therefore recorded on the receiver as an S-wave. PP events occur more prominently in vertical components of the acquired seismic data, whereas PS events appear more prominently in the horizontal components of the acquired seismic data.
[0069] "P-wave" and "S-wave" are types of seismic waves that occur in the subsurface. P waves are longitudinal compression waves that propagate with particle motion perpendicular to the wavefronts as alternate compression and rarefaction waves. P-wave receivers are responsive to vertical particle motion with respect to the surface of the earth. S- waves or shear waves are polarized parallel to the wavefronts and are classified as SH waves and as Sv waves for isotopic media. In the context of this disclosure, for SH waves, particle motion is horizontal in a plane that is transverse with respect to the line of profile. The particle motion for Sv waves is in a vertical plane that is perpendicular to the SH particle motion and parallel to the line of profile. Shear waves cannot propagate in a fluid because fluids have no shear strength. Some media are birefringent to S-waves because of being anisotropic. That is, the acoustic energy splits into ordinary and an extraordinary ray paths characterized by different propagation velocities as fast (Sf) and slow (Ss) waves) during transit through a medium and with different polarization directions than pure SH or Sv waves.
[0070] P-wave exploration comprises the workhorse of seismic surveys. However, special studies, for example, using the techniques described herein, may allow for additional exploration of the anisotropic characteristics of selected rock formations due to stress and fracturing. These studies may be performed by combining S-wave and P-wave technology in a single survey.
[0071] "Receivers" are devices, usually placed in an array or grid-like pattern on the surface of the Earth or just beneath, used to detect reflections of vibrations from rock strata. Measurement of the amplitude and arrival time of an arriving reflected wave at numerous locations allows the mapping of rock strata, and provides information about the thickness and composition of the rock strata (e.g., layers). The receivers may include geophones, hydrophones, vibration detectors, accelerometers, or any other detector capable of accurately measuring the amplitudes of reflected waves. A three-dimensional receiver may, for example, have accelerometers along each of the x, y, and z-axes to determine motion in all three directions. A four dimensional receiver may combine a three-dimensional receiver with an amplitude detector, such as a hydrophone, to determine the intensity of a P-wave. Either three-dimensional or four-dimensional receivers may be used to detect both P-waves and S- waves propagated from the subsurface.
[0072] A "reservoir" or "hydrocarbon reservoir" is defined as a pay zone (for example, hydrocarbon-producing zones) that includes sandstone, limestone, chalk, coal and some types of shale. Pay zones can vary in thickness from less than one foot (0.3048 m) to hundreds of feet (hundreds of m). The permeability of the reservoir formation provides the potential for production.
[0073] "Reservoir properties" and "Reservoir property values" are defined as quantities representing physical attributes of rocks containing reservoir fluids. The term "Reservoir properties" as used in this application includes both measurable and descriptive attributes. Examples of measurable reservoir property values include impedance to p-waves, impedance to s-waves, porosity, permeability, water saturation, and fracture density. Examples of descriptive reservoir property values include facies, lithology (for example, sandstone or carbonate), and environment-of-deposition (EOD). Reservoir properties may be populated into a reservoir framework of computational cells to generate a reservoir model.
[0074] A "rock physics model" relates petrophysical and production-related properties of a rock formation to the bulk elastic properties of the rock formation. Examples of petrophysical and production-related properties may include, but are not limited to, porosity, pore geometry, pore connectivity volume of shale or clay, estimated overburden stress or related data, pore pressure, fluid type and content, clay content, mineralogy, temperature, and anisotropy and examples of bulk elastic properties may include, but are not limited to, P-impedance and S-impedance. A rock physics model may provide values that may be used as a velocity model for a seismic survey.
[0075] "Seismic attenuation" is the frequency-dependent reduction in amplitude or energy in a seismic wave as the wave passes farther away from a source due to microscopic frictional forces and scattering from thin layers. It is often described in terms of a seismic quality factor, Q. Seismic attenuation is affected by fluid saturations, clay content and thin- layering. If sufficient attenuation occurs, the improvement provided by increased spatial sampling of seismic data (e.g., measuring both P and S-waves) may be minimal. Seismic quality factor, Q, estimates are valuable for seismic imaging, processing, and reservoir characterization applications. Examples of such applications include amplitude and phase compensation, wavelet processing, acquisition design, and lithology/fluid identification. Furthermore, unlike many other seismic attributes, seismic attenuation may be directly related to permeability (via a squirt flow mechanism, for example). In exemplary embodiments of the present techniques, rock physics models may be combined with recent advances in imaging to determine links between estimated seismic quality factors and reservoir parameters.
[0076] "Seismic data acquisition" means the sensing, processing and recording of the seismic waves.
[0077] A "seismic data trace" is the record of a selected seismic attribute (e.g., seismic amplitude or acoustic impedance) at a single x-y (map) location. A seismic trace can be represented as a stack of cells or by a continuous curve (known as a "trace") whose amplitudes reflect the attribute values at each z (or t) data point for the x-y location in question. For a three-dimensional or a four dimensional receiver, a trace is collected for each dimension. Accordingly, it will be clearly understood that the techniques described below apply to traces collected in all of the dimensions. However, for simplicity of explanation, the description herein focuses on a single trace for each receiver.
[0078] "Seismic data" refers to a multidimensional matrix containing information obtained about points in the subsurface structure of a field using seismic methods. At least three dimensions in the seismic data may represent the location of each point in space-time, for example, x, y, and t, where x and y represent to the location of the point in an x, y grid on the surface, and t represents the time for a reflected elastic wave to reach the surface. Depending on the properties of the geological layers, t may generally represent the depth of the point below the surface of the earth. The multidimensional matrix will contain at least one other dimensional representing the signal value at each location. For example, this dimension may represent any seismic data that may be connected to a particular point in the field, including such seismic data as offset gathers, offset stacks, angle gathers, angle stacks, Ip, Is, Vp, Vs, p, and μ, among others.
[0079] "Seismic reflection surveys" are the most common type of seismic survey, are performed by initiating a shock wave at the earth's surface and monitoring at a plurality of surface locations the reflections of this disturbance from the underlying subterranean formations. These reflections occur from regions where there is a change in the acoustic impedance of the earth, generally the interface between adjacent strata. The devices used to monitor the reflections are termed geophones or receivers. The signal recorded by each geophone represents as a function of time the amplitude of the reflections detected by that geophone. To a good approximation, the reflections detected by each geophone occur from a point on each reflective surface located on a vertical line passing through the midpoint between the source and geophone. Thus, for every seismic disturbance ("Shot"), each geophone records a signal ("Trace") which represents features of the formations vertically beneath a known point on the surface of the earth.
[0080] A "structured grid" is a grid in which each cell can be addressed by index (i, j) in two dimensions or (i, j, k) in three dimensions. All cells of a structural grid have similar shape and the same number of vertices, edges and faces. In this way, topological structure of the grid (i.e., boundary and adjacency relationships between cells, faces, edges, and vertices) is fully defined by the indexing (e.g., cell (i, j) is adjacent to cell (i+1, j)). The most commonly used structured grids are Cartesian or radial in which each cell has four edges in two dimensions or six faces in three dimensions. Structured grids typically are used with seismic data volumes.
Overview
[0081] In an exemplary embodiment of the present techniques, an optimal checkpointing scheme is implemented that distinguishes between a storage space used to save a complete forward simulation state that includes all the information needed to restart the forward simulator at a given time step (a full state checkpoint), versus that required only for doing a correlation calculation (a correlation checkpoint). Further, the techniques distinguish between the access speeds and storage capacity differences for multiple types of storage to optimize the mixture of full state and correlation checkpoints saved. The computational speedup associated with this invention over the traditional Griewank checkpointing strategy may range from twenty percent to over three-hundred percent, for seismic reverse time depth migration (RTM) and full wavefield inversion (FWI) applications in a cluster-computing environment. However, the techniques described herein are not limited to RTM or, indeed, any seismic imaging application, but may be used in any number of applications that need to correlate a first data stream, presented in reverse time order, with a second data stream, presented in forward time order.
[0082] Griewank checkpointing strategy does not involve saving correlation buffers.
Griewank saves only full state checkpoints. To be precise, Griewank uses the full state checkpoint both for correlation and for restarting simulation. The technique disclosed herein gains an advantage relative to the Griewank checkpointing strategy by taking advantage of the fact that the storage required for performing a correlation can be lower, both in access speed and storage size, than that required for storing a complete forward simulation state. For example, a complete seismic data record may have nine components recorded: three representing particle velocities in each of three dimensions; and six stress tensor fields, from which information about P- waves and S-waves can be extracted. In a seismic forward simulation, the full state checkpoints include all parameters and variables needed to restart the computation of forward simulation time steps, which may require the saving of dense grids of many wavefield components plus additional buffers required for the implementation of boundary conditions. See, e.g., Marcinkovich, C. and K. Olsen, "On the implementation of perfectly matched layers in a three-dimensional fourth-order velocity-stress finite difference scheme," 108 JOURNAL OF GEOPHYSICAL RESEARCH (NO. B5) 2276 (2003).
[0083] In contrast, the correlation wavefields (correlation checkpoints) may be only required on a less dense grid in a subset of the full model volume and may only include a subset of the wavefield components, and may requires less numerical precision. For example, if obtaining the P-P Image in RTM is the only goal for a specific application, there may only be a need to correlate one wavefield (i.e. the pressure component of the wavefield), even though nine components are used for computation. As another example, double precision may be desired for computation, but only single precision is needed for cross- correlation.
[0084] As computing resources become more complex, e.g., optimized for particular application, the present techniques also provide for calculating an optimal balance between saving full state checkpoints and correlation checkpoints. In exemplary embodiments, the present techniques distinguish between memory size and speed and, thus, the savings over Griewank techniques may be significantly more in a hierarchical environment that includes such technologies as graphical processing units (GPU) and solid state disk drives (SSD) as well as traditional random access memory (RAM) and disk storage. Accordingly, application software developed using this technology may be portable and flexible in changing computer environments.
[0085] The derived optimal checkpointing strategy applies to time-stepping methods in general. Therefore, it can be used for adjoint state gradient computation as required for doing time-domain full waveform inversion, as well as for reverse time depth migration. However, as noted above, the present techniques are not limited to RTM which is merely used as an example, herein. RTM is more clearly explained with respect to a single seismic source excitation, or "experiment," as illustrated in Fig. 1.
[0086] Fig. 1 is a drawing of a region of interest 100, illustrating a single seismic experiment in a land environment, in accordance with an exemplary embodiment of the present techniques. It will be understood by one of skill in the art that a large number of seismic experiments will be performed over the region of interest 100 to effectively image the subsurface structure. In the region of interest 100 shown in Fig. 1, a salt dome 102 is protruding towards the surface 104. The sides of the salt dome 102 may be vertical or even inverted, for example, side 106, making imaging by many techniques difficult.
[0087] The salt dome 102 may trap hydrocarbon deposits, such as oil 108, in oil sands or porous rock under a layer of cap rock 110, located above the salt dome 102. Other deposits, such as oil and or gas 1 12, may be located in layers of rock 1 14 along the side, e.g., side 106, of the salt dome 102. Still other hydrocarbons, such as deposit 1 16, may be located in layers of rock 1 18 that are more remote from the salt dome 102. [0088] A seismic experiment may be performed by placing one or more sources 120 along the surface 104 of the region of interest 100 along with one or more receivers 122. In embodiments, each of the receivers 122 may be a three-dimensional or four dimensional receiver cables to detect both P-waves and S-waves. When triggered, the source 120 creates a pulse, which may be conducted into the subsurface 124 as a wave 126. Although the pulse wave 126 propagates in all directions, the illustration in Fig. 1 is simplified, for example, to show only the propagation of the pulse wave 126 towards the salt dome 102. Part of the energy of the pulse wave 126 may reach the receivers 122 having not been reflected from any surface, but, instead, having traveled directly through the subsurface 124 to the receivers 122, for example, as a direct wave 128.
[0089] When the pulse wave 126 impinges on a reflector, e.g., a layer with different impedance, such as the salt dome 102, a reflected wave 130 may be created from the wave 126. The reflected wave 130 may be partly or fully mode converted, e.g., an impinging P- wave may have S-wave components. If the reflected wave 130 has S-wave components, the S-waves may be attenuated by rocks containing substantial concentrations of fluids, for example, deposit 1 16. This attenuation may be termed Q attenuation. The effective determination of Q attenuation of S-waves may be useful for enhancing the accuracy of the seismic imaging, allowing the location of layers, e.g. , rock layers 118 that hold fluids, such as hydrocarbons, aquifers, and the like. Simpler imaging techniques often use only the P-wave reflections for the imaging. However, in exemplary embodiments of the present techniques, both P-waves and S-waves are used for the imaging, allowing the determination and quantification of Q attenuation.
[0090] The use of two-way wave calculations in RTM allows other effects to be determined. For example, a portion of the pulse wave 126 may not be reflected at the surface of the salt dome 102, but may, instead, be refracted into the salt dome 102. The refracted wave 132 may travel through the salt dome 102, prior to being refracted back towards the receivers 122, as wave 134, by another surface of the salt dome 102. Simpler imaging techniques, such as Kirchhoff migration, or migrations based on one-way wave equations, may not be able to capture this anisotropy. Thus, these techniques may miss components of the subsurface 124, such as steep reflectors (side 106), refractive subsurface layers (salt dome 102), and the like.
[0091] For purposes of the seismic imaging computations, the area of interest 102 may be divided into a three-dimensional grid of computational cells. In seismic calculations, the grid will generally be a regular grid, allowing the computational cells to be assigned to coordinates that indicate the location. The techniques are not limited to regular grids, as unstructured computational meshes may be used. However, unstructured computational meshes may add significant overhead, as each computational cell may contain location information. Each computational cell may represent, or contain, a seismic data volume that has associated properties, such as velocity, impedance, and the like. Further, the speeds and directions of seismic wave fronts, such as P-waves or S-waves, may be calculated in each seismic data volume, using the properties for that seismic data volume. In effect, the migration process "moves" the source and receiver to associate a reflection with the computational cell in which it originated. This technique can be used to generate an image of the subsurface. The RTM process can be more clearly seen by examining a cross section of the area of interest 100 along the seismic source and receivers, as discussed in further detail with respect to Fig. 2.
[0092] Fig. 2 is a schematic 200 illustrating the operation of reverse time migration (RTM), in accordance with an exemplary embodiment of the present techniques. Each of the computational cells may be illustrated as computational cells 202 in the schematic 200. The computational cells 202 may not be the minimum size on which the seismic data is collected or modeled, but may represent groups of smaller volumes 204 that have been combined, for example, to ease the computational complexity, or separated for computation, for example, to improve the accuracy of the image. The size of the computational cells 202 is discussed in greater detail below.
[0093] In a basic form, RTM treats each seismic experiment separately and migrates the data by simulating the physical process used to collect it. As shown in Fig. 2, the algorithm utilizes a velocity model 206 of the wave propagation velocity of the area being imaged. The velocity model 206 generally comprises the rock properties in each of the computational cells 202, such as density, impedance, and the like, which may be used by a wave propagation algorithm to calculate velocity and direction of a wave.
[0094] A wave propagation algorithm, usually finite-difference or pseudospectral, can be used to propagate a pulse from a location of a source 208 into the subsurface. As discussed herein, this may be performed using computational cells that are on a finer timescale than the computational cells 202. This propagation may provide an approximation, as a function of time, of the energy that may be reflected from each subsurface reflector, e.g., saltdome 210, and recorded at the receivers 212. Since the source wavefield 214 travels primarily downward it may be labeled as D(xs, x, t), where xs is a vector in three-dimensional space representing the location of the source, x is a vector in three-dimensional space representing the location of an image point 216, and t is a value representing the time from the start of the seismic experiment (i.e., to represents the initial generation of the pulse wave).
[0095] Just as the source wavefield is propagated forward in time to simulate illumination of the reflectors, the data traces 218 recorded at the receivers 212 may be propagated backward in time to simulate the motion of energy from, as yet unknown, reflection points to the receivers 212. The backwards propagation can be performed by an adjoint operator, which maps the traces as wavefields 220 into the subsurface. As the receiver wavefields 220 generally travel upwards, they may be labeled as U(xs, XR, X, t), where xs is a vector in three-dimensional space representing the location of the source, XR is a vector in three-dimensional space representing the location of the receiver, x is a vector in three-dimensional space representing the location of the image point 216, and t is a value representing the time from the start of the seismic experiment (tmax represents the end of the data collection experiment).
[0096] The imaging principle used in RTM is that energy recorded by the receivers
212 at a time must have reflected from a location, e.g., image point 216, such that the source wavefield 214 was nonzero and the back-propagated receiver wavefield 220 was nonzero at the same propagation time t. Its ability to image locations that have been illuminated by overturned energy distinguishes RTM from other wave-equation based migration algorithms.
To compute the image at a given subsurface location x, for a given shot at xs, there must be a quantity that is nonzero when energy from the source that could have reflected from x and reached the receivers at a time t when a received wavefield is also nonzero. The total time of the experiment is tmax so the event time t ranges from 0 to tmax. Mathematically, this can be expressed as the cross-correlation of the source wavefield 214 and receiver wavefield 220.
I(x) = j" D(xs,x,t) x U(xs,xR,x, t)dt Eqn. 1
½ xs 0
[0097] In Eqn. 1, 1(x) is the migrated image at subsurface location x, e.g., image point
216. The weighting function in Eqn. 1 indicates that the source wavefield 214 (D) is forward propagated along time t, and the receiver wavefield 220 (U) may be backward propagated from final time tmax (thus, the name Reverse Time Migration). The product of the two wavefields 214 and 220 (e.g., the cross-correlation) may be summed at each image point 216
(x). This is done for each source location xs and each receiver location XR. The resulting image may be summed for all source and receiver locations to provide a final image.
[0098] The computation of the imaging condition requires that the value of the source wavefield 214 and receiver wavefield 220 be available at the same time t. The most straightforward approach would be to compute and store one of the wavefields ( e.g., the source wavefield 214), for all t of interest (e.g., t0 to tmax). The other wavefield (e.g., the receiver wavefield 220) could then be computed and multiplied with the source wavefield 214. However, for most problems, this approach can be impractical, since a great deal of data storage would be required to store the source wavefield 214. Therefore, the practical application of RTM requires that one recompute the source wavefield 214 periodically.
[0099] The image, I(x), where x is a location vector (x, y, z), represents the reflectivity of the subsurface as a function of position. The reflectivity is large at locations where the impedance changes appreciably. However, as can be seen from Eqn. 1, the RTM algorithm will yield nonzero image values at any point where there is any correlation between source and receiver wavefields 214 and 220. This may occur at locations other than those corresponding to true reflections, e.g., image point 216, leading to image artifacts that appear as a low-frequency noise superimposed upon the true reflectors. A number of methods for removing these artifacts, among them low-cut filtering, application of Laplacian filters, etc, are available for this purpose.
[0100] As mentioned previously, RTM uses the full wave equation to propagate energy through the subsurface and, thus, it is a computationally expensive migration algorithm. Prestack RTM, in which individual shots are migrated separately, has only become computationally feasible in the last few years, due to the advent of cost-effective computing clusters. Typically, clusters of many thousands of multi-CPU nodes may be linked together to form a computing cluster. Each shot to be migrated can be assigned to a set of nodes in the cluster, and the property models (velocity, density, etc) for the area surrounding the shot can be read into the memory associated with the assigned nodes. The shot can then be migrated, using the forward and backward solutions of the wave equation described above and the result can be stored on disk to be summed with results of the other migrated shots. In an exemplary embodiment of the present techniques, an optimization scheme is used to calculate a tradeoff between computer memory and computational overhead. As discussed below, this scheme may store full state checkpoints (from which either a correlation may be performed or from which the propagation operation may be resumed), correlation checkpoints (including only the data needed for the cross-correlation calculation at a particular time), or a combination thereof. The use of checkpointing makes the practical implementation of RTM feasible. Further, checkpointing is even more important for embodiments that take into account inelastic propagation effects ("Q") or compute many wavefield components such as both the S-wavefield and the P-wavefield.
[0101] The computational model can be divided into computation cells 202, or smaller volumes 204. The spacing of the computational cells is such that there are several grid blocks per minimum wavelength. For typical models, the spacing may be about 25 meters. Thus, with models of regions of interest having dimensions on the order of tens of kilometers, the number of grid cells in each dimension may be several hundred to more than one thousand. Thus, the total number of computational cells 202 may be, for example, greater than one billion. The computations may be performed by running a finite-difference stencil over the entire grid, in order to compute the wavefield derivatives required for modeling the wave equation at each computational cell 202. Therefore, many billions of floating point operations can be performed at each time step.
[0102] The required grid spacing Δ , e.g., the size for the computational cells 202, or smaller volumes 204, can be computed using the formula shown in Eqn. 2.
Δχ≤ Eqn. 2 f max N
In Eqn. 2, vmin is the minimum velocity, max is the maximum frequency, and N is the number of points per minimum wavelength, which may be about 5-10 points. This spacing, or smaller, may avoid the introduction of numerical dispersion into the propagated wavefield.
[0103] The total number of time steps may also be very large. Seismic data are recorded for a total time of about ten seconds. The data are typically stored with a sample interval of 2-4 milliseconds, meaning that each trace 218 may include about 2500-5000 samples. However, the RTM wave-equation solution must be computed on a much finer time step, given by the Courant-Friedrichs-Levy (CFL) stability condition shown in Eqn. 3.
Δχ
At≤ k Eqn. 3 v mm■
In Eqn. 3, : is a constant of order one that depends on the dimension and the exact algorithm used. For example, k may be ^j^ f°r two-dimensional equations or f°r three- dimensional equations. Further, k may be larger if the equations are higher order in time or smaller if the equations are lower order in time. For typical conditions, At ~ 0.5 msec, and, thus, a ten-second total propagation time requires 20000 time steps. This indicates that each expensive time step must be computed very many times. Furthermore, using Eqns. 2 and 3 it can be noted that the total computational cost is proportional to f ax, so doubling the maximum frequency to be migrated increases the computational cost by a factor of 16. Since the interpretability of seismic images is normally better when the frequency bandwidth is larger, the dependence of cost on frequency tends to quickly drive up the time required to obtain high quality images.
[0104] Fig. 3A is a process flow diagram showing a method for performing a reverse time cross-correlation, such as RTM, in accordance with an exemplary embodiment of the present techniques. In this embodiment, the process can begin at block 302 with the initialization of a reverse time migration (RTM) correlation image, for example, by setting all points in the image volume to zero. At block 304, an adjoint wavefield can be initialized, for example, by setting the adjoint wavefield to match a receiver wavefield at the maximum recording time. At block 306, the optimum time locations for storing checkpoint buffers and/or full state buffers can be calculated. The optimal time locations may also be calculated prior to running the simulation, and stored in a table for use in later simulations.
[0105] The adjoint wavefield may then be calculated at a first time step j, as shown at block 308. The first time step j may correspond to the final time in the simulation. At block 310, a determination is made as to whether a forward correlation buffer exists for time step j. If the correlation buffer exists, either as an independent correlation checkpoint, or as part of a full state checkpoint, process flow proceeds to block 312. If at block 310, it is determined that a correlation buffer does not exist at a particular time step j, flow may proceed to the steps shown in Fig. 3B to calculate the necessary information associated with the forwardly propagating source excitation wavefield necessary to do the correlation at this time step.
[0106] At block 312, the wavefield in the correlation buffer is accessed from a database of stored forward simulation states 314, contained in a storage unit (such as a memory or hard drive). At block 316, the forward simulation wavefield state is cross- correlated with the adjoint wavefield for time step j, wherein the results are summed into a correlation volume within the correlation image. The correlation image may then be generated by the formula: g = ^¾(c;,^.) , wherein ¾ is the "cross-correlation" operation,
! = 0
and is the correlation information subset of the full source excitation wavefield state st , which is expressed as c; = pis^ . The correlation operator ¾(c;, ¾) can represent a more general operator than just a simple mathematical cross-correlation for some applications. The important feature is that this operator requires the subset of the forward simulation state c; and the adjoint state t at the same time step j as input.
[0107] At block 318, the adjoint wavefield may be back-propagated one-step backward in time, i.e., j = 7-1. Then another sequence of (n+1) adjoint states sj. may be generated with terminal s~„and n procedure calls ft at ^ that are generated according to — fj QSj ) , e.g. , back-propagated from the recorded traces. At block 320, j may be decremented, and, at block 322, a determination may be made as to whether the adjoint propagation is finished. If not, process flow returns to block 308 to continue at the next time step.
[0108] If at block 322, the adjoint propagation is finished, process flow proceeds to block 324, at which various post-processing and output steps may be performed. For embodiments that are used to generate seismic images, such post-processing may include, for example, forming sub-surface offset gathers from the migrated points. The offset gathers may be converted to reflection angle gathers to form a final image. Further, filtering calculations may be implemented to decrease noise, such as a Laplacian algorithm, as discussed above. The process ends at block 326, wherein a data representation of the image is output or stored. The data representation may include an image of a sub-set of the results. For example, in seismic imaging, the output may include only reflection angle gathers. In other embodiments, generating the data representation may include other steps to form a complete image. For example, in seismic imaging, mute and stack operations may be performed to generate a full seismic image. However, one of ordinary skill in the art will recognize that the present techniques are not limited to seismic imaging, and may be used for any number of other simulations that cross-correlate forward simulation data with data projected in a reverse-time order.
[0109] Fig. 3B is a process flow diagram showing a forward propagation of a wavefield for a reverse time cross-correlation, in accordance with an exemplary embodiment of the present techniques. The steps in Fig. 3B may be executed if no correlation buffer is found at block 310. At block 328, the wave equations for the forward simulation may be propagated across the grid. The propagation may be performed by taking a sequence of (n+1) states si starting with s0 and n procedure calls ft at ^ that are generated according to sM <— fi iS;) , e.g. , the propagation of the forward excitation pulse. [0110] As indicated in the equations above, the receiver wavefield can be propagated backwards in time and cross-correlated at each computational cell (x) with the forward-in- time simulation of a source wavefield. This means that the forward-in-time source simulation must be accessed in reversed time order. Since storing all of the forward in time points for a cross-correlation may not be feasible, due to memory and access time limitations, at block 330, forward simulation wavefields 314 can be stored for various time steps, as discussed herein. These forward simulation wavefields can be considered checkpoints that contain correlation buffers for the cross-correlation with the reverse data projection. Each of the checkpoints in the database 314 may be a full state checkpoint, which may be used to restart a propagation calculation, or only a smaller correlation checkpoint used for determine the cross-correlation at a particular time step. At block 332, the source wavefield may be propagated one-step forward in time. At block 336, a determination is made as to whether the forward propagation is finished. If not, flow proceeds to block 328 to continue the calculation. If so, flow returns to block 312 (Fig. 3(A)) at which the cross-correlation is resumed. The determination of the time steps (e.g., the checkpointing process at block 306) at which to save full state checkpoints versus only correlation checkpoints is discussed below.
[0111] In exemplary embodiments of the present techniques, a number of assumptions are made to improve the checkpointing process, and are used in the discussion to follow. Specifically, that each full state checkpoint^, requires the same amount of memory of size S. Further, that each correlation checkpoint ct requires the same amount of memory of size C. In addition, that each procedure call ft requires the same amount of computation effort 1, and that there is no computation effort for ¾(c;, ¾) or ς. = p{s^) . The additional memory requirement during the process of ¾(c;, ¾) , ci = />(¾) , ft or is not considered part of the memory constraint.
[0112] The Griewank checkpointing strategy assumes that the memory required to save a full state checkpoint (the variable S) is identical to that required to save the information necessary to do a cross-correlation (the variable C) for the imaging step. For example, if a reverse time migration based on velocity-stress propagators is being performed, there may only be a need to correlate pressure, instead of all components of particle velocity and stress. This can easily increase the ratio of S/C to 4 or even up to 9. If perfectly matched layer (PML) boundary conditions are used, the S/C ratio may increase by another factor of two or three near the boundary of the earth model. Thus, propagation of waves may take place on a fine grid, but imaging may be performed on a coarser grid. For the case where correlation can also be done on every other sample in every spatial dimension, the resulting S/C ratio would be eight. If some accuracy in the cross-correlation step may be sacrificed by storing a compressed correlation checkpoint, the S/C ratio can be increased by another factor of two. The S/C ratio components mentioned here would be multiplied together to yield the S/C ratio needed for this algorithm. Therefore, indeed, there could be a substantial difference between S and C. Given that reverse time depth migration is very computationally expensive, the present techniques may provide a substantial decrease in computational overhead by exploiting the difference between S and C.
The optimal strategy without memory constraints
[0113] If there is no memory constraint, then the optimal strategy (in the sense of least computation effort) could be detailed as:
For i=0,n-l
ct = p(Sj ) , Store ct
sM ^ ft{st
Figure imgf000031_0001
For i=n- 1 , 1 g = g + 9i(ci, si)
[0114] In this strategy, the total memory cost is (n-l)C and the total forward computation effort is n (the total forward computation effort is 2n-l assuming each adjoint step requires the same effort as a forward step). It may be noted that the correlation at state zero is ignored, since state 0 usually corresponds to zero wavefields for reverse time migration applications. However, the techniques described herein can be easily modified to accommodate nonzero initial wavefields.
[0115] In the discussion to follow, the notation J(n, M) may be used to represent the computation effort or cost for correlating n states (state 1 to state n) under memory constraint M. In this case, it may be assumed that the adjoint state n is known, and state 0 can always be recovered during computation with no computation effort, by either resetting everything to zero or loading state 0 from memory (which is not part of M). After computation, the adjoint state at adjoint state 1 is used (instead of at adjoint state 0). [0116] Further, the notation Jno («, ) is used herein to represent the computation effort for correlating n states under memory constraint M without using any full state checkpoints (i.e. , storing only correlation checkpoints). In the case where M is large and there is sufficient memory to hold all of the correlation checkpoints in appropriate buffers, this can be simply expressed as Jno cp (n, M) = n for M≥(n - 1) .
The optimal strategy with memory constraints
[0117] In general, in one sweep of computation, nc = \ + MI C correlation buffers may be held in memory, i.e. nc is the number of correlations possible given memory M and correlation buffer size C. This assumes that the function call tofi does not put a constraint on memory or that the state buffer results from the forward simulation may be used to perform the correlation. Therefore, the computation required while saving correlation buffers but without checkpointing any forward simulation states can be calculated by the formula shown in Eqn. 4.
nc = l + M I C, t = n /nc ,r = n - tnc
*»M < (n - l)C Eqn. 4
Figure imgf000032_0001
In Eqs. 4, t = the number of sweeps to do using all nc correlation buffers, and r = remainder = the number of correlations to do on the last pass where only a portion or none of the correlation buffers are used. Note that if r is equal to zero, then this last partial pass does not need to be done. It should be understood that in Eqn. 4, and other similar equations, integer arithmetic is used instead of floating point arithmetic.
[0118] Fig. 4 is a schematic diagram illustrating the minimum computational effort using a full state checkpoint at time index k, in accordance with exemplary embodiments of the present techniques. If an optimization goal assumed herein is the minimization of J(n,M) using one checkpoint 402 at time step k, then for the correlation step 404 at and above time step index k, k forward steps can be used to get to the checkpoint location plus J(n-k, MS) for the time forward and adjoint stepping needed for time step indices k+1 to n. The memory available is reduced by S due to the checkpoint 402 of the state buffer at time step index k. The computational effort 406 for both forward and adjoint time stepping for indices 0 to k-1 would be J(k-1,M), as shown in Eqn. 5.
JaM _ one_ cp (n,M , k) = k + J(n - k , M - S) + J(k - \,M) Eqn. 5 Further, Eqn. 6 allows for minimizing J(n,M) under the restriction that there is either no checkpoint used or at least one checkpoint at some state k (state k is between state 0 and state n).
J (n, M) = min {Jno (n, M), mm [Jadd one (n, M, k)] } Eqn. 6
- k=\n-\ - - [0119] As can be seen in the above formulation, the memory constraint size is always changing in units of S and there are an integral number of checkpoint state buffers ns with memory equal to nsS. The memory associated with the nc correlation buffers is equal to (nc- 1)C. The total memory associated with the combination of both checkpoint state buffers and correlation buffers is shown in Eqn. 7.
nsS + (nc - Y)C≤M Eqn. 7
In an exemplary embodiment, the above equation is iteratively solved to find a numerical solution for a desired problem size and memory footprint.
[0120] Figs. 5A-B are schematic diagrams illustrating the time steps at which full state or correlation checkpoints may be stored, in accordance with exemplary embodiments of the present techniques. For example, as shown in Fig. 5A correlation checkpoints 502 may be stored before a full state checkpoint 504 at time step k. However, for any case using a correlation checkpoint before a full state checkpoint, there is a corresponding case that does not use correlation checkpoints before full state checkpoints that is at least as efficient. In Fig. 5A, the cost 506 to reach the first of nc correlation checkpoints 508 before the state checkpoint 504 at k can be expressed as J = J(k - \ - nc ,M) . The cost of the correlation checkpoints 508 can be expressed as J = nc + 2 . Finally, the cost 510 to reach the end time step 512 from the full state checkpoint 504 may be represented as J = J(n - k,M - S - ncC) . Based on these, if the optimal case stores nc buffers before a full state checkpoint 504 at some time step k, as illustrated in Fig. 5A, then the total computation effort may be given in Eqn. 8. ∑J = k + nc + 2 + J(k - l - nc , M) + J(n - k,M - S - ncC) Eqn. 8
[0121] In Fig. 5B, the cost 514 to reach a full state checkpoint 516 at k - nc can be expressed as J = J(k - \ - nc, M) . The cost 518 to reach the first of nc correlation checkpoints 520 stored before the end time step 522, from the full state checkpoint 516, may be represented as J = J(n - k, M - S) . Thus, in a case in which no correlation checkpoints are stored before the full state checkpoint 516, the total computation effort is shown in Eqn. 9.
∑J = k + nc + 2 + J(k - l - nc ,M) + J(n - k,M - S) . Eqn. 9
[0122] As can be seen by the formulations in Eqns. 8 and 9, the latter case is at least as good as the previous case (which stores correlation checkpoints before a full state checkpoint). Therefore, in exemplary embodiments, only the latter case needs to be considered.
Optimal checkpointing versus Griewank checkpointing
[0123] The storage ratio (S/C) of full state checkpoints to correlation checkpoints may often be around 10, thus, this provides a convenient ratio to use for comparing the computational effort for optimal checkpointing, described herein, to Griewank checkpointing. In Table 1, below, n provides the number of time steps required for the forward and adjoint computations. The column labeled "ideal" provides the computational cost for time-stepping to enable correlation of the forward and adjoint simulations in an environment where memory is plentiful and the cost is the minimum possible. The column labeled "Griewank checkpointing" assumes that ns=M/S state buffers are available and no correlation checkpoints are used. The column labeled "optimal checkpointing" shows the results obtained using both full state checkpoints and correlation checkpoints. The column labeled "ratio" is calculated by the ratio of the Griewank computation results divided by the Optimal checkpointing results, and provides the speedup possible with this new method compared to using only the Griewank optimal checkpointing strategy.
[0124] Two observations may be made from the results in Table 1. First, that by exploiting the difference between state buffer and correlation buffer, the computational effort can be reduced. Further, actual application of this optimal checkpointing strategy requires some pre-computation to find the optimal strategy. However, the pre-computation effort is negligible compared with the total computation effort in applications such as reverse time migration and gradient computation.
[0125] Further, it may be noted that typical parameters that apply to common Linux cluster applications of 3-D reverse time migration could correspond to the line with 4000 time steps, 10 state buffers and M=100 where the ratio (speed increase) is roughly 1.28. If a company were to have a $20 million computer system working exclusively on reverse time migration, then the economic value of this algorithm change would be on the order of $5.6 million in increased production. Total computational effort Ideal Griewank Optimal Ratio
Checkpointing Checkpointing
(Forward + Adjoint)
n=55, 2 state buffers (M=20) 109 264 156 1.6923 n=1000, 2 state buffers (M=20) 1999 13171 9901 1.3303 n=1000, 10 state buffers (M=100) 1999 4548 3392 1.3408 n=2000, 10 state buffers (M=100) 3999 10184 7545 1.3501 n=4000, 10 state buffers (M=100) 7999 22184 1731 1 1.2815 n=1000, 100 state buffers 1999 2898 1999 1.4497 ( =1000)
n=2000, 100 state buffers 3999 5898 4998 1.1801 (M=1000)
n=4000, 100 state buffers 7999 11898 1 1025 1.0792 ( =1000)
Table 1 : Costs for Optimal Checkpointing versus Griewank Checkpointing
[0126] Figs. 6A-C are schematic diagrams illustrating the operation of the Griewank and optimal checkpointing schemes for a simplified simulation having 55 time steps, in accordance with exemplary embodiments of the present techniques. For each of the examples, the number of steps (55) and the amount of storage space (20) is the same. Fig. 6A illustrates a Griewank checkpointing strategy having a cost J of 210 for the case of n = 55, M = 20, S = 10 (i.e., no correlation checkpoints). Fig. 6B illustrates an optimal checkpointing strategy with J = 102 for the case of n = 55, M = 20, C = 1, S = 10. Fig. 6C illustrates an optimal checkpointing strategy with J = 148 for the case of n = 55, M = 20, C = 2, S = 10 (middle). In a Griewank checkpointing algorithm, shown in Fig. 6A, only full states (indicated by horizontal lines) are saved, allowing a complete restart of the propagation algorithm from each saved state. In operation, the algorithm performs multiple iterations of the forward simulation. For example, in a first run 602, full states are saved during the forward propagation of the excitation pulse at time step 35 (606) and at time step 50 (604). This fully utilizes the available memory M = 20. The algorithm then advances forward propagation time steps to time step 55 and performs the cross-correlation with the backwards propagated wavefield from the receivers. Then the backwards propagated wavefield is run backward in time one time step to time step 54. The forward propagation wavefield is restored at time step 50 (64) and advanced to time step 54, and the cross-correlation is again performed. This procedure is repeated for time steps 53, 52, 51, and the correlation is performed using the full state checkpoint itself at time step 50 (604).
[0127] The memory used for time step 50 is then released, and the cross-correlation proceeds with the forward simulations run from time step 35 (606). The released memory is used for storing checkpoints from time step 35 (606), such as a checkpoint at time step 45 (608). The checkpoint at time step 45 (608) is used to run forward simulations for time steps 49 through 46 wherein at each time step, the forward propagated wavefield is cross correlated with the backwards propagated wavefield from the receiver. After the cross-correlation is done using the full state checkpoint at time step 45 (608), the memory is released, and used for another checkpoint at time step 41 (610). The procedure is repeated until the cross- correlation has been performed for all time steps. It may be noted that the spacing between checkpoints is not uniform in Fig. 6A; in the first sweep for example, the checkpoints are at 50, 45, 41, 38 and 36, rather than for example 50, 45, 40 and 36. This is because the numbers shown in the drawing were determined to be optimal using an optimization algorithm (Griewank optimization in the case of Fig. 6A), whereas other possible choices of checkpoint location may or may not be optimal. Although the amount of memory utilized is decreased, it can be seen that the amount of calculations is substantially increased. Since the amount of memory and the access time for the memory are often limiting, the procedure may substantially improve the running time, making the full RTM feasible. However, the number of calculations and amount of memory used in Griewank checkpointing may still be problematic for complex seismic imaging calculations, such as RTM.
[0128] In an exemplary embodiment of the present techniques, two distinct types of checkpoints are saved, a full state checkpoint from which the simulation may be restarted (or a cross-correlation may be performed) and a smaller checkpoint that only holds the wavefield data needed for the cross-correlation. This may provide significant benefits for both calculation and memory. For example, the optimal memory utilization shown in Fig. 6B may result if it is assumed that the memory used to hold a correlation checkpoint is 1/10 the size of the memory used to hold a full state checkpoint. In this condition, far fewer full simulation runs may be needed. As used in Fig. 6C, longer lines indicate full state checkpoints while shorter lines indicate correlation checkpoints. During a first run in Fig.
6B, a full simulation run 612 is started from the zero point 614. During the full simulation run 612, a correlation checkpoint (or correlation buffer) is saved at every point from time step 35 (616) to time step 54, thus exhausting the available memory M = 20 with 20 correlation buffers. There is no need to store correlation information in step 55, as the information is contained in the forward simulation data itself. The cross-correlation may then be performed with the backwards propagated wavefield from the receiver at each of these points. Once the cross-correlation is completed for time steps 55 to 35, a second run 620 of the full simulation is performed from the zero time step. During the second run 620 of the full simulation, a correlation checkpoint is saved at every time step from time step 14 (622) to time step 33 (624), again exhausting M = 20. The cross-correlation is repeated at each of these time steps using the correlation checkpoint at that time step, and then the procedure is repeated for a third run 626 of the full simulation. As can be seen, for equal resources, the optimal checkpointing strategy provides a substantial savings in calculation time, with only 101 forward wave propagation steps performed, versus 209 forward wave propagation steps for the Griewank checkpointing procedure.
[0129] In summary of Fig. 6B, the optimum strategy of the present invention for C = 1, which may be determined by trying all combinations of % and nc that that satisfy Eqn. 7, and selecting the one (or one of several) that gives the lowest value for J using Equation 6, turns out to be satisfied by using no full state buffers at all, but rather using the available memory M = 20 entirely for correlation buffers. As will be seen next in discussion of Fig. 6C, an optimum strategy for a greater value of C (C = 2) involves using one full state buffer and five correlation buffers at a time.
[0130] Even if the storage space for a correlation checkpoint is closer in size to that required for a full state checkpoint, the optimal checkpointing procedure may provide a substantial savings. For example, Fig. 6C shows an optimal checkpointing run in the same amount of memory as in 6A and 6B, but with a 5 to 1 relationship in size between a full state checkpoint and a correlation checkpoint. The procedure is generally the same as in 6B, but a full state checkpoint 628 is saved during a first full simulation run 630. During the first full simulation run, correlation checkpoints are saved between time step 49 (632) and time step 54 (634). The cross-correlation may then be performed at time step 55, and then with each of the values between time steps 54 and 49. The full simulation run is repeated from time step 31 (628) three more times, as indicated by reference number 636, and the cross-correlation is run at each time step. The memory is freed and three final full simulation runs 638 are performed from the zero time step, with cross-correlations performed for each of the saved correlation checkpoints. As can be seen from 6C, the forward wave propagation steps is only 147 for this situation, which is still significantly less that 209 forward wave propagation steps of Griewank checkpointing.
[0131] The optimal checkpointing technology may provide between 10 percent to over 400 percent speedup for RTM over the earlier Griewank checkpointing strategy, depending on the computer hardware environment and problem size for a given RTM application. Further, the checkpointing strategy discussed herein is not limited to direct correlations, but may be used for correlations in which a current state is dependent on a past state, as may be needed with respect to some FWI gradient computations and some automatic differentiation formulae.
[0132] Figs. 7A-C are schematic diagrams comparing checkpointing for a standard correlation versus checkpointing when a past state in adjoint computation influences cross- correlation with a current state in forward computation, in accordance with exemplary embodiments of the present techniques. Fig. 7A illustrates a standard correlation condition, while Fig. 7B illustrates a standard correlation condition in addition to a shifted correlation condition, for example, when running reservoir simulations in which past conditions influence current conditions. Fig. 7C illustrates the application of the optimal checkpointing strategy for a case having 12 steps, a memory of 6, and in which C = 2 and S = 3. In Figs. 7A-C, an upward arrow 702 represents forward computation and a downward arrow 704 represents an adjoint simulation, e.g., in which values calculated at a previous time step influences values calculated at a later time step. A horizontal bi-direction arrow 706 represents a standard correlation condition and a diagonal bi-direction arrow 708 represents a shifted correlation condition. Further, a bold horizontal line 710 represents a full state checkpoint with size S, and a dotted horizontal line 712 represents a correlation checkpoint with size C.
[0133] For many applications (e.g., reverse time migration or some of the gradient computation algorithms), it is only required to correlate the corresponding states n
(i.e., g = yil si, ~si) as shown in Fig. 7A). However, in some cases (such as for some
!=0
gradient computation algorithms used in reservoir simulations), we need to correlate not only
n
the corresponding state but also the neighboring state (i.e., g = ^[¾1 (s! ,s!.) + ¾2 (s!.,s!+1 )] as
!=0
shown in Fig. 7B). In exemplary embodiments of the present technique, the optimal checkpointing strategy is modified to work for the latter case as demonstrated in Fig. 7C.
[0134] Implementation of the optimal checkpointing strategy in the way described in
Fig. 7C provides a minimum memory use. However, three types of correlation are used, i.e., correlating the adjoint wavefield with a forward wavefield, correlating the adjoint wavefield with a snapshot buffer in storage, and correlating the adjoint wavefield with a correlation buffer in storage). This may be better understood by considering the cross-correlation problem as a chain-reverse problem. Embodiments of the present techniques may provide a more efficient way to reverse a chain calculation that correlates results from a forward simulation with results from a backward, or adjoint, simulation, e.g., a reversed chain. It can be applied for standard cross-correlation as illustrated in Figure 7A. It can also be applied to modified cross-correlation as illustrated in Figure 7B and more detail in Figure 7C. Other cross-correlation conditions may also benefit from the present technique so long as the implementation is based on using a reversed chain.
Extension of the optimal checkpointing to two levels of storage with different access speeds
[0135] In addition to allowing for the storage of either full state checkpoints or correlation checkpoints, exemplary embodiments of the present techniques can also optimize the storage of checkpoints based on the speed of the storage available. In present computing architectures, it is common to have multiple levels of storage with different access rates. For example, computations may be performed on graphical processing units (GPUs) using the GPU memory (the fastest storage), or in CPU memory, solid state disk memory, and disk storage (the slowest storage). To simplify the explanation of this concept, two levels of storage may be assumed, e.g., CPU memory and disk.
[0136] In determining the optimal distribution of checkpoints, two assumptions may be made. First, it can be assumed that the fast storage with size MF requires a cost of W , WF for writing a full state checkpoint or a correlation checkpoint, respectively, and a cost of Rg , R for reading a full state checkpoint or a correlation checkpoint, respectively.
Further, it can be assumed that the slow storage (with size 5 ) requires cost W$ , Ψς ϊοτ writing a full state checkpoint or a correlation checkpoint, respectively, and cost Rs s , R<? for reading a full state checkpoint or a correlation checkpoint, respectively. In addition, it may be assumed that the computational effort for evolving any state to the next state is one, the full state checkpoint is of size S, and the correlation checkpoint is of size C.
[0137] Similar to before, the cost function may be defined as shown in Eqn. 10. The cost function on the left side of the equation is the minimum of the three choices listed on the right hand side. Rs + J {k - l,M ' )}} Rs' + J* (k - l,MF ,MS)]}
Figure imgf000039_0001
Eqn. 10
In Eqn. 10, * can be replaced with F or 5* to indicate whether the starting checkpoint is in fast storage or slow storage. Thus, JF (n, MF , MS) is the cost of cross-correlating n states with
MF fast storage and Ms slow storage for the case in which the first state in fast storage (i.e. if the first state needs to be recovered for recomputation, that information is in fast storage). The term, Js (n, MF , MS) , is similar except that the first state in slow storage JF 0 cp(n, MF ,MS) , and Jm s cp(n, MF ,MS) , follow the same definitions with the constraint that no full state checkpoints are allowed and, thus, only correlation checkpoints are stored. In addition, it can be noted that RF or R<? is used for the fourth term in the second and third lines, instead of RF or R , because even though a full state checkpoint is in storage, only the correlation buffer portion of the full state checkpoint is read if the purpose is not to restart the simulation. However, this may depend on the actual implementation cost of recovering a correlation buffer of a stored full state checkpoint.
[0138] The computation of the cost function, fno cp (n,MF ,MS) , is more complicated than for the explicit form ofJKO (η, Μ) , used in the one storage case. However, it may be performed using a similar recursion technique, as shown in Eqn. 11.
Figure imgf000040_0001
In Eqn. 1 1, i and j are the number of correlation buffers we want to use. The formulation is simplified by not expressing the fact that n-l-i-j > 0. Moreover, for the case that n-l-i-j = 0, the second line in the minimum equation would not be counted any more. As discussed further below, fno cp (n,MF ,Ms) can be explicitly evaluated instead of relying on the above recursive formulation.
[0139] The results of determining optimal checkpoints in storage having two different access speeds are shown in Figs. 8 and 9. For the example shown in Figs. 8 and 9, the cost of accessing fast memory is assumed to be zero (i.e., WF = RF = WF = RF = 0 ) for simplicity of explanation. However, the techniques described herein work for any implementations having a non-zero access cost to fast storage. Further, a long horizontal line represents a full state checkpoint, a short horizontal line represents a correlation checkpoint, and any line having a diamond at the end is stored in slow memory. [0140] Figs. 8A-E are schematic diagrams illustrating a number of situations in which the amount of fast and slow memory is varied, while the storage space used for each type of checkpoint remains the same, in accordance with exemplary embodiments of the present techniques. In Figs. 8A-E, the speed for the slow memory is assumed to be Wc s = R = Ws s = R = 0.2 . The amount of storage space each type of checkpoint uses is assumed to be C = S = 2 (matching the Griewank assumption). In Fig. 8A, the amount of memory is ? = 3 and s = 0 . In 8B, MF = 2 and Ms = 3 . In 8C, = 2 and Ms = 12 . In 8D, MF = 14 and Ms = 0 . Finally, in 8E, MF = 3 and Ms = 20. As can be seen in Figs. 8A-E, the amount and types of storage present can have a substantial effect on the outcome of the optimization. For example, in Figs. 8C and 8D, the amount of total storage is the same, but the difference in storage speed causes a difference in the obtained optimal checkpointing strategy.
[0141] Generally, the costs for accessing storage (i.e. time for I/O) will differ based on the size of information. For example, as discussed herein, the storage used for a full state checkpoint may be substantially greater than that used for a correlation checkpoint in the case S is substantially greater than C.
[0142] Figs. 9A-E are schematic diagrams illustrating a number of situations in which the amount of fast and slow memory is varied, wherein the storage space used for a correlation checkpoint is two and a full state checkpoint is three, in accordance with exemplary embodiments of the present techniques. Thus, in Figs. 9A-E, Wc s = R = 1.0 ,
W = R = 1.5 , C = 2, and S = 3. In Fig. 9A the amount of memory is MF = 3 and Ms = 0 .
In 9B, MF = 2 and Ms = 3 . In 9C, MF = 2 and Ms = 12 . In 9D, MF = 14 and Ms = 0 . Finally, in 9E, MF = 3 and Ms = 20. It can be noted that the amounts of memory used in each of Figs. 9(a) through (e) corresponds to the amount of memory used in each of Figs. 8A through E, showing the change in strategy that occurs when the memory utilization is different for full state checkpoints versus correlation checkpoints.
[0143] The comparison of Figs. 8E and 9E illustrates that the penalty of using the slow storage can completely change the strategy, even though the total storage is apparently large enough for both cases. Thus, performing RTM with checkpointing to a very large disk can be slower than the same using checkpointing to a much smaller number of distributed RAM buffers on a parallel computer.
[0144] Table 2 provides a comparison of the solution time (including both forward and adjoint computation) between the optimal checkpoint techniques disclosed herein and the Griewank checkpoint strategy. In this example, 1000 states are being cross-correlated, C = 1 Gb and S = 10 Gb. Further, different combinations of storage are shown, and the access costs are assumed to be W; R? = 2s and W! = Rf = 5s .
Figure imgf000042_0002
Table 2: Solution costs comparison between optimal checkpointing and Griewank checkpointing with ( W = R = 2s, W = R = 5s ), C = \Gb, S = lOGb , and n=1000.
Explicit evaluation of costs
[0145] Instead of using a recursive formulation, Jn * ocp(n,MF ,MS) can be determined explicitly. To reach the solution, consider Jn * ocp(n,m,MF ,MS) , which is the cost of cross- correlating n steps by m forward sweeps using no full state checkpoints with state 0 in * storage (either F or 5) and a memory constraint of MF ,MS . Thus, the procedure shown in Eqn.12 can be used to determine the cost with storing full state checkpoints.
M M"
Figure imgf000042_0001
tF(tF +1)
J1 =J( rF(tF +\) + nF(WF +RF)
ts(ts +1)
f (n,m,MF,Ms) = Jl rs(ts +\) + ns(JVc +Rc)
The minimum may then be determined from the formulae shown in Eqn. 13, as shown Eqn.13. Jlcp(n,MF ,Ms) = m{nJ:ocp(n,m,MF ,MS) Eqn.13 m
[0146] To minimize J* (n,m,MF ,MS) , three cases can be considered. First, no storage at all may be used, in which m = n. Second, using only fast storage may be used, which provides the formula in Eqn.14. m >
nr F + 1 m(m + l) (n - m)(n + nF - m)
f (n,m,MF ,Ms)*{m-X)R (n-m)(WF +RF)
Figure imgf000043_0001
Eqn.14
[0147] a third case, both fast storage and slow storage are used and
In this case, the speed is improved by using as much fast storage as possible tlr + tlr +1
(otherwise there is no need to use the slow storage). This case provides the formula in Eqn. 15.
n, _ V ,nc M
'C
nF = m(n-m,mn^,),t -n* -S*ni
ns = m{n-m-nF ,mnc s),ts =n / s ,rs =ns -tsnc s
Rr) \m +
Figure imgf000044_0001
Eqn.15
Based on these cases, m can be searched around the 5 critical values shown in Eqn.16.
nr +1 Yir +nr +1
Eqn. 16 may be used to get the best m and correspond Jn * ocp(n,MF ,MS) . Proper bounds should be considered while applying these above formulations. For example if mo F pt is not n
between— and n, then it doesn't need to considered.
nc +1 Efficient computation of the optimal checkpointing strategy.
[0148] Although J* o cp(n,MF ,MS) can be explicitly determined, a recursive formulation is still used to find J* (n,MF ,MS) . Using the recursive formulation, the cost for correlating n states using nF fast storage buffers (nF =MF I S ) and ns (ns = Ms I S ) slow storage buffers can be pre-determined with an effort ~ n1 xnF xns . Here the symbol "~" is used to mean "on the order of. This pre-tabulated data needs a storage of size ~ nxnF xns . Once we have the pre-tabulated cost data, we only need effort ~ n1 to compute the optimal two-level storage checkpointing strategy for given capacity constraints of the two types of storage. The most computational intensive step is the pre-computation of cost table, j" (n, MF , MS) (for correlating up-to n states with storage constraint MF ,MS ), with effort ~ n1 x nF x ns . Although it is only a one time effort, it is of value to make this step efficient. In an exemplary embodiment, this may be performed using an additional tabulation of k (the first full state checkpoint location). After the additional tabulation of k, the actual determination of checkpointing strategy will take an effort of ~ n , instead of ~ n1. The techniques and formulations discussed above may be used to determine optimal numbers and locations for checkpoints, as discussed with respect to the methods shown in Figs. 10-14.
[0149] Fig. 10 is a process flow diagram for implementing a simulation, which uses correlation checkpoints, in accordance with exemplary embodiments of the present techniques. The process begins at block 1002 with the calculation of the optimal checkpointing strategy. This calculation may be performed using the formulations discussed above. At block 1004, the required storage is allocated. This may be limited by the storage available, the size of the full state checkpoints and correlation checkpoints, and the like. At block 1006, the checkpointing strategy and correlation calculations are implemented, for example, by looping through a series of checkpointing instructions.
[0150] For example, a checkpointing strategy may be expressed in the form of an ordered list of instructions. Table 3, below, provides an example of an instruction set that may be used for implementing a checkpointing strategy. In this example, an "instruction number" is associated with a sequence of operations to be done when that "instruction number" is encountered. There can be multiple ways to define such an instruction set but having one version such as given below is sufficient to enable the technology.
Instruction Instruction
number
-1 Exit the instruction loop. All done.
0 Do a forward time step N times and then save a state buffer in the specified memory type.
For example, (0 74 S) says do instruction type zero and forward time step 74 steps and then save a state buffer in slow memory.
1 Do an adjoint backward time step and correlate with the correlation part of the forward simulation state information that is in memory for the specified storage type. Release storage space for this memory type. Reload the forward simulation state from the specified memory type.
For example, (1 S F) means do an adjoint time step and correlate. Then release storage space from slow memory from the last state buffer saved there. Then reload the forward simulation from the last state buffer saved in fast memory.
2 Do a forward time step N times and store the specified number of buffers in fast and slow storage choosing the intervals at the end of the forward simulation time steps. Then do adjoint time steps and correlate information for each of the saved correlation buffers. The release the storage space for the saved correlation buffers.
For example, (2 55 10F 4S) means forward compute 55 time steps and save fast correlation buffers for steps 45-54 in fast storage and save correlation buffers for steps 41-44 in slow storage. Note that the correlation information for step 55 is available in the forward simulation data for step 55 and does not have to be saved separately.
3 Reload the forward wavefield from the last saved state buffer in the specified storage type.
For example, (3 F) reloads the forward wavefield state from the last state buffer stored in fast storage.
Table 3 : Exemplary instructions for implementing a checkpointing strategy
[0151] An example of the use of the instructions to implement a checkpointing procedure is presented below. In this case, the correlation has 266 time steps with S = 12, C = 1, MF = 10, Ms = 40, an access cost of Rs = Ws = 2 and Rc = Wc = 0.6 for slow storage, and zero access cost to fast storage.
(0 74 S), (0 71 S), (0 66 S), (2 55 10F 4S), (3 S), (2 40 10F 4S), (3 S), (2 25 10F 3S), (3 S), (2 11 10F OS), (1 S S), (2 65 10F 16S), (3 S), (2 38 10F 16S), (3 S), (2 11 10F OS), (1 S S), (2 70 10F 28S), (3 S, 2 31 10F 9S), (3 S), (2 1 1 10F OS), (1 S F), (2 73 10F 40S), (3 F), (2 22 10F OS), (3 F), (2 11 10F OS),
Appendices A and B are source code listings of two examples of a computer program that could be used to generate an optimal checkpointing strategy such as that embodied by the above list of instructions, given only the parameters specified above, i.e. S, C, etc. The programs of Appendices A and B use the checkpointing strategy of the present invention; however, where it would be optimal, the program will select Griewank checkpointing.
Fig. 11 is a process flow diagram of a method for computing a minimum cost without any full state checkpoints, in accordance with exemplary embodiments of the present techniques. The method begins at block 1 102 with the initialization of an empty list to store the potential optimal number of sweeps. At block 1104, the first value of this list is initialized to be equal to n, the number of time steps in the forward simulation.
[0152] At block 1106, the maximum number of correlation buffers that can be held in fast storage and slow storage is calculated by the formulas nc F = ^ Q and nc s = ^ Q · At block 1 108, a determination is made as to whether at least one fast correlation checkpoint buffer is available, i.e., nc F > \ . If no fast correlation checkpoint buffers are available, process flow proceeds to block 1 118.
[0153] If there is at least one fast correlation buffer available, then at block 11 10, the minimum number of sweeps required if using only fast correlation buffers is computed using the formula mF = \ n l(nF + 1) |. At block 1 112, the optimal number of sweeps if using only fast correlation buffers is computed using the formula «i At block 11 14, the value of mF is added
Figure imgf000047_0001
to the list if and only if mF < mF pt < n . At block 1 1 16, mF is added to the list. [0154] At block 1 1 18, a determination is made as to whether at least one slow correlation checkpoint buffer is available, i.e., nc s≥\ . If no slow correlation checkpoint buffers are available, process flow proceeds to block 1128.
[0155] If there is at least one slow correlation buffer available, at block 1 120, the minimum number of sweeps required using all types of correlation buffers is computed using the formula mF&s = \ n l(nF + nc s + 1) |. At block 1 122, the optimal number of sweeps if using all of the fast correlation buffers and at least one correlation buffer is computed using the formula: m F&S 7(l + nc F ) | n | F (l + Wc )
R: + - _ + (l +
Figure imgf000047_0002
At block 1 124, mF p s is added to the list if and only if mF&s < mF p s < last value in list. At block 1 126, mt^ is added to the list.
[0156] At block 1128, the list is regenerated to include the nearest integers within the same range. For example, if the original list is (17, 10, 1), then the new list should be (17,16, 11, 10,9,2, 1). This may help to account for the rounding of real numbers to integer numbers. [0157] At block 1130, the corresponding cost of each potential optimal sweep number in the new list is computed using the following formulations. n F = mm · {n - m, mnc F ), t . F = n n F / / F , r F = n F - S c F nc F
/ nc
ns = mm(n - m - nF , mnc ), ts = n / s , rs = ns - tsnc
/ nc
m(m + l)
Jo = m - l)Rs +
Ji = Jo + t + 1} 4 + r F (tF + 1) + nF (WF + RF ) j:ocp (n, m,MF , MS ) = Jx + rs (ts + 1) + ns (W* + Rc s ) where mF&s is used to define M F and M s before using the preceding formulations. At block 1132, the minimum cost is returned.
[0158] Fig. 12 is a process flow diagram of a method for computing the minimum cost and the best location for cross-correlating n states, in accordance with exemplary embodiments of the present techniques. The method assumes that nf ised fast memory checkpoint state buffers and ns_used slow memory checkpoint state buffers are already used and that the starting full state checkpoint is stored in StartType storage and the first full state checkpoint in stored in KType storage. (The italicized terms are used in C and C++ implementations of the present inventive method, and appear again in equations below.) StartType denotes the type of storage, fast or slow, associated with the full state checkpoint from which the forward simulation is initiated. KType denotes the type of storage, fast or slow, associated with the full state checkpoint to be stored at time index k. "StartType" can take on two values, F for fast memory or S for slow memory, "nfjised" is the number of fast memory checkpoint state buffers currently in use. The currently available fast memory for new checkpoints of either state or correlation information does not include the space for fast memory checkpoint state buffers currently in use. Likewise, "ns_used" is the number of slow memory checkpoint state buffers currently in use and the currently available slow memory does not include the space for the slow memory checkpoint state buffers currently in use.
[0159] At block 1202, a determination is made as to whether the situation is possible.
If the situation is not possible, process flow proceeds to block 1204 where a huge cost (e.g., lelO) is returned to identify that it is impossible. [0160] At block 1206, a determination is made as to whether n = 2. If so, then the best first full state checkpoint location must be 1, and the corresponding cost is returned at block 1208.
[0161] At block 1210, the previous best k is obtained from a pre-computed table. This value in the table is calculated for correlating n-1 states with the same memory constraint and the same starting full state checkpoint and first full state checkpoint storage- type requirement.
[0162] At block 1212, for each k within a certain distance, e.g., S/C+l, away from the previous best k, the corresponding cost should the first full state checkpoint be put at location k is computed. If the first full state checkpoint is required to be in fast storage (i.e., KType=F), the cost is given by the formula: k + W + JF (« - k,nf _ used + 1, ns _ used) + R + Rs startType + JSt?e (k - 1, nf _ used, ns _ used)]
[0163] If the first full state checkpoint is not required to be in fast storage, the cost is given by the formula: k + Wl + 7s (n - k, nf _ used, ns _ used + l) + Rc s + R rt2^e + JS→P* (k - \, nf _ used, ns _ used)]
In the equations above, the following definition: J*(n, nf _used, ns _used)≡ J*(n,MF - nf _used x S,Ms - ns _used x S) has been used to indicate that the storage is reduced by unit of S. At block 1214, the pre- computed table is updated with the computed minimum cost and the best location of the first checkpoint.
[0164] Fig. 13 is a process flow diagram showing how to pre-compute the table of minimum costs associated with a full state checkpoint taken at the optimal k location, in accordance with exemplary embodiments of the present techniques. The method begins at block 1302 with the allocation of arrays to store the table. For example, two five dimension arrays: J_with_cp[2][2][n][nfMax][nsMax] and BestK[2][2][n][nfMax][nsMax], may be allocated to keep track of the minimum cost and the best location of the first checkpoint. As part of the allocation, all values in the array are initialized to -1. In both arrays, the first dimension represents the storage type for the starting checkpoint. The second dimension represents the storage type for the first checkpoint. The third dimension represents the number of states to be correlated. The fourth dimension represents the maximum number of checkpoints in fast storage. The fifth dimension represents the maximum number of checkpoints in slow storage.
[0165] At block 1304, a counter is tracked for looping through I from 2 to n, where I represents the number of states to be correlated. At block 1306, another counter is tracked for looping through J from 0 to nfMax, where nfMax is the number of fast memory state buffers that have been used. At block 1308, a third counter is tracked for looping through K from 0 to nSMax, where nsMax is the number of slow memory state buffers that have been used.
[0166] At block 1310, the minimum cost and the best location of the first checkpoint are computed for cross-correlating I states with J fast memory full state checkpoint buffers, and with K slow memory full state checkpoint buffers already used for the 4 cases: 1) Starting with a full state checkpoint in fast storage, calculate the cost for a first full state checkpoint in slow storage. 2) Starting with a full state checkpoint in fast storage, calculate the cost for a first full state checkpoint in slow storage. 3) Starting with a checkpoint in slow storage, calculate the cost for a first full state checkpoint in fast storage. 4) Finally, starting with a full state checkpoint in slow storage, calculate the cost for a first full state checkpoint in slow storage. The obtained results are used to update the corresponding table entry for J with cp and BestK. Each of these four steps for block 1304 can be computed using the method of figure 12. The cost calculation 1212 requires knowledge of the cost of a full state store for the specified storage type, how many restores will be done for a given full state checkpoint at the specified time step, and the cost of a full state restore for the specified storage type. When ns > 2, the above outlined process may be applied recursively to optimally locate additional full state checkpoints.
[0167] Fig. 14 is a process flow diagram of a method for computing minimum cost and optimal checkpointing strategy for correlating n states with nf_used fast memory state buffers and ns ised slow memory state buffers in the situation that the starting checkpoint is in StartType storage, in accordance with exemplary embodiments of the present techniques. The method begins at block 1402, where the cost associated with the first full state checkpoint in fast storage is obtained from table J_with_cp, and the corresponding best location of the full state checkpoint from table BestK. At block 1404, the cost with the first full state checkpoint in slow storage is obtained from table J_with_cp, and the corresponding best location of the checkpoint is obtained from table BestK. Tables generated by the method of Fig. 13 may be used at both block 1402 and block 1404. At block 1406, the cost without using any checkpoint, and the corresponding optimal number of sweeps, is determined (see Fig. 11). At block 1408, According to which cost (from step 1, 2 or 3) is the minimum, the optimal checkpointing strategy is recursively output.
Identification of minimum costs in checkpointing calculations
[0168] Fig. 15 is a graph showing the relation between the minimum cost and location of the first full state checkpoint (k) for the cross-correlation of 266 steps using four buffers when S/C = 12, and Rs = Ws = Rc = Wc = 0, in accordance with exemplary embodiments of the present techniques. In the special case of S/C = 1 and Rs = Ws = Rc = Wc = 0, the location of the optimal first checkpoint has an explicit form (as determined by the Griewank checkpointing strategy). However, once we have S > C, the location of the optimal first checkpoint becomes complicated even in the simple case that Rs = Ws = Rc = Wc = 0 still holds. In the example shown in Fig. 15, there are three local minima 1502 for the choice of first checkpoint. When Rs, Ws, Rc, and Wc are not 0 anymore, the behavior becomes even more nonlinear as shown in Fig. 16.
[0169] Fig. 16 is a graph showing the relation between the minimum cost and location of the first full state checkpoint for the cross-correlation of 266 steps using four buffers when S/C = 12, Rs = Ws = 12, and Rc = Wc = 1, in accordance with exemplary embodiments of the present techniques. In this example, the graph was generated assuming that recovering from forward simulation state zero required no effort. As can be seen from the graph in Fig. 16, the identification of a minimum 1602 may be complicated. One important observation from the numerical experiments with the recursive formulation is that while (1) keeping the available storage the same (i.e., If and Ms are the same) and (2) the starting full state checkpoint type and the first full state checkpoint type (i.e., in fast or slow storage) the same, the second local minimum gradually becomes the global minimum when increasing n. Another important observation is that the distance between the two local minimum is roughly within distance -S/C+1 away. With these two observations, we can search the first checkpoint location (k) among a small number of possibilities. This leads to an algorithm, which pre-computes a cost table with an effort of only ~ n x nF x ns as compared to ~ n2 x nF x ns .
[0170] Searching only near the expected checkpoint location significantly reduces the strategy computation cost by a factor of ~n with some sacrifice of the strategy quality.
However, this technique may provide a check- pointing strategy with additional cost less than 1% away from the optimal checkpointing strategy obtained from a full search.
[0171] For very large n, memory for cost and BestK tables and table computation time can become large. A practical implementation strategy for very large n can be to compute optimal tables for a reasonable size of nmaxjabie and then to switch to the Griewank full state checkpointing strategy to find BestK if n > nmaxjabh and to use the tables if n < nmax_tabie- The Griewank value for BestK can be estimated without the need for a table. Usually this yields a check-pointing strategy that is only a few percent more expensive than the optimal one found with a full-sized table.
The performance uplift obtained from the optimal checkpointing strategy.
[0172] Fig. 17 is a graph 1700 showing the performance improvement of the optimal checkpointing strategy over checkpointing using the Griewank procedure, in accordance with exemplary embodiments of the present techniques. The relation between performance and available memory typically has a shape shown in Fig. 17. In the graph 1700, the top solid line 1702 is the optimal performance calculated for using two levels of storage, e.g., a fast storage and a slow storage. The middle solid line 1704 is the optimal performance calculated for using a single level of storage. The lower dotted line 1706 is the performance calculated for using Griewank checkpointing. As shown in the graph 1700, performance initially increases with more available storage (usually as more computational nodes are added), since less re-computation of full state checkpoints will be required.
[0173] However, after the available storage is beyond a certain point (e.g., point A
1708 or point F 1710), the scaling loss becomes dominant, and performance falls off. Scaling loss is a result of adding more computing units to a problem, wherein the efficiency of each computing unit is reduced due to the increased overhead caused by using multiple units, for example, communication between the units or between the units and storage systems. Scaling loss may be due to a lack of ideal scalability of the application. Further, the benefit from reduction of re-computation becomes marginal. The performance uplift from the optimal checkpointing strategy depends on the available storage. For example, if sufficient storage is available, the performance uplift of the optimal checkpointing over Griewank checkpointing can be the ratio between point A 1708 and point F 1710. If storage is constrained (which is usually the case), the performance uplift may be the ratio between point A 1712 and point D 1714.
Applications [0174] The optimal checkpointing strategy of the present techniques may be used to obtain enhanced efficiency for any number of computationally-intensive large-storage processes, for example, using a table-driven software implementation. Generally, the processes that will benefit from the techniques involve a time-stepping forward simulation that is accessed in reverse-time order to correlate with a backward time stepping computation.
[0175] For example, in exemplary embodiments the optimal checkpointing procedure is used in seismic imaging applications. In these embodiments, the optimal checkpointing procedure may provide improved computational efficiency for prestack shot-record RTM, Prestack simultaneous source RTM, Prestack shot-record FWI Gradient, Prestack shot-record FWI Hessian, Prestack simultaneous source FWI Gradient, Prestack simultaneous source Hessian, and similar seismic calculations. The computer simulator in each of these applications may be based on a seismic wave equation, for example, using anisotropic visco- elastic physics. The recorded data may include particle velocity, pressure, stress, acceleration, or any combinations thereof. Some tables for the time-reversal optimal checkpointing strategy can be precomputed and saved. In each of these applications, the forward time-stepping seismic simulation can apply different levels of physics ranging from simple constant-density acoustic, variable-density acoustic, visco-anisotropic acoustic, isotropic elastic, anisotropic elastic and up to fully anisotropic -visco-elastic simulation. The correlation of the forward simulation with adjoint simulations states generated from the measured data may be used to generate seismic images, to correct velocity models, estimate stiffness coefficients, estimate source wavelets, and estimate attenuation quality factors, among others.
[0176] It may be noted that the correlation step only requires that the source- excitation wavefield and the receiver backward-in-time propagated wavefield at the same time be cross-correlated and summed for all time steps. Thus, a propagation or simulation may be performed in a reverse time step order or in a forward time step order and the result is the same. The RTM example discussed above has a source excitation wavefield that is naturally accessible in a forward-time order accessed in reverse-time order while the receiver wavefield is marched backward in time. Alternatively, the optimal checkpointing strategy can also apply to implementations in which the receiver wavefield is checkpointed during backward-in-time propagation and then accessed in forward-time order to match the source excitation wavefield being forwardly propagated in time. Both implementations are covered by the methods described here. [0177] In addition to these applications, the present techniques may be used for any number of other applications. For example, in an embodiment the optimal checkpointing strategy can be used for history matching of hydrocarbon reservoir simulations. In this application, the data collected from the reservoir may include fluid volumes and types produced from a well, bottom hole temperatures, and stratigraphic rock records, among others. The computer simulation may be based on a multi-phase expression of Darcy's law for fluid flow. The correlation may be used to adjust parameters such as porosity, permeability, fluid saturations, and pressure distributions, among others. The correlation may also be used to generate production predictions for the reservoir and for reservoir management tasks. Such tasks may include determining locations for new wells, and determining whether to converting producers to injectors, among others.
[0178] In another embodiment, the present techniques may be used for basin modeling. In this application, the stratigraphic rock record may be one of the measured parameters. The computer simulation is based on tectonic deformation of a basin and a model of the sedimentation processes that formed the basin. The output from the correlation may assist with the determination of sedimentation rates and accommodation space available as a function of position and geologic time. Further, the output may include the historical shape of the basin over geologic time and the history of depth of burial and thermal history for target reservoirs and source rocks.
[0179] Another embodiment of the present techniques may be used in determining heat transfer in a heavy oil reservoir, such as the bitumen reservoirs in Cold Lake in Canada. In this application, the measured data may include temperature measurements, rock type and hydrocarbon type measurements, thermal expansion, subsidence associated with hydrocarbon production, and the like. The computer simulation may be based on diffusion equation for heat transfer, coupled with equations for rock, and heavy oil stiffness coefficients as a function of temperature, coupled with heavy oil phase relationships as a function of temperature and pressure, among others. The results of the correlation may be used to determine thermal conductivity and subsurface temperature in the overburden, and reservoir intervals and changes in phase for the hydrocarbon components, among others.
[0180] The techniques are not limited to hydrocarbon systems. For example, embodiments of the present techniques may be used to determine heat transfer through or across objects. For example, in an atmospheric reentry of a spacecraft, the techniques may be used to compare temperature at the skin of the spacecraft with simulated results generated from a forward finite element analysis. The techniques may also benefit other diverse applications as climate simulations, simulations of nuclear weapon detonations, and the like.
Exemplary Cluster Computing System
[0181] Fig. 18 is a block diagram of an exemplary cluster computing system 1800 that may be used to implement the present techniques, in accordance with exemplary embodiments of the present techniques. The cluster computing system 1800 illustrated has four computing units 1802, each of which may perform calculations for part of the seismic imaging. However, one of ordinary skill in the art will recognize that the present techniques are not limited to this configuration, as any number of computing configurations may be selected. For example, a smaller simulation, such as a seismic imaging calculation, may be run on a single computing unit 1802, such as a workstation, while a large simulation may be run on a cluster computing system 1800 having 10, 100, 1000, or even more computing units 1802.
[0182] The cluster computing system 1800 may be accessed from one or more client systems 1804 over a network 1806, for example, through a high speed network interface 1808. The network 1806 may include a local area network (LAN), a wide area network (WAN), the Internet, or any combinations thereof. Each of the client systems 1804 may have non-transitory, computer readable memory 1810 for the storage of operating code and programs, including random access memory (RAM) and read only memory (ROM). The operating code and programs may include the code used to implement all or any portions of the methods discussed herein, for example, as discussed with respect to Figs. 3 and 10-14. Further, the non-transitory computer readable media may hold full state checkpoints, correlation checkpoints, and simulation results, such as a data representation of a subsurface space. The client systems 1804 can also have other non-transitory, computer readable media, such as storage systems 1812. The storage systems 1812 may include one or more hard drives, one or more optical drives, one or more flash drives, any combinations of these units, or any other suitable storage device. The storage systems 1812 may be used for the storage of checkpoints, code, models, data, and other information used for implementing the methods described herein. For example, the data storage system may hold checkpoints for the optimal checkpointing strategy.
[0183] The high speed network interface 1808 may be coupled to one or more communications busses in the cluster computing system 1800, such as a communications bus 1814. The communication bus 1814 may be used to communicate instructions and data from the high speed network interface 1808 to a cluster storage system 1816 and to each of the computing units 1802 in the cluster computing system 1800. The communications bus 1814 may also be used for communications among computing units 1802 and the storage array 1816. In addition to the communications bus 1814 a high speed bus 1818 can be present to increase the communications rate between the computing units 1802 and/or the cluster storage system 1816.
[0184] The cluster storage system 1816 can have one or more non-transitory, computer readable media devices, such as storage arrays 1820 for the storage of checkpoints, data, visual representations, results, code, or other information, for example, concerning the implementation of and results from the methods of Figs. 3 and 10-14. The storage arrays 1820 may include any combinations of hard drives, optical drives, flash drives, holographic storage arrays, or any other suitable devices.
[0185] Each of the computing units 1802 can have a processor 1822 and associated local tangible, computer readable media, such as memory 1824 and storage 1826. Each of the processors 1822 may be a multiple core unit, such as a multiple core CPU or a GPU. The memory 1824 may include ROM and/or RAM used to store code, for example, used to direct the processor 1822 to implement the methods discussed with respect to Figs. 3 and 10-14. The storage 1826 may include one or more hard drives, one or more optical drives, one or more flash drives, or any combinations thereof. The storage 1826 may be used to provide storage for checkpoints, intermediate results, data, images, or code associated with operations, including code used to implement the method of Figs. 3 and 10-14.
[0186] The present techniques are not limited to the architecture or unit configuration illustrated in Fig. 18. For example, any suitable processor-based device may be utilized for implementing all or a portion of embodiments of the present techniques, including without limitation personal computers, networks personal computers, laptop computers, computer workstations, GPUs, mobile devices, and multi-processor servers or workstations with (or without) shared memory. Moreover, embodiments may be implemented on application specific integrated circuits (ASICs) or very large scale integrated (VLSI) circuits. In fact, persons of ordinary skill in the art may utilize any number of suitable structures capable of executing logical operations according to the embodiments.
Examples:
[0187] The Society of Exploration Geophysicists (SEG) Advanced Modeling (SEAM) example described in the "Background" section can be worked using Griewank "optimal" check-pointing and using the present invention for different computer configurations.
[0188] The straightforward, i.e. no checkpointing at all, method that saves all time steps of the forward simulation could mean keeping 40,000 time steps of an 84 gigabyte subsurface volume or roughly 3.36 petabytes of data. Examples for doing RTM on SEAM data demonstrate that the present invention provides the largest advantages over Griewank check-pointing to RAM when RAM is very limited in size compared to the size of the application problem.
[0189] These SEAM RTM application examples use RAM for "fast memory" and disk for "slow memory" and assume that the cost of reading or writing a restart state buffer to disk is five cost units, the cost of reading or writing a correlation buffer from disk is two, and that the cost of computing a forward time step is one and the cost of doing a backward time step is one. The cost of reading or writing a restart state buffer or correlation buffer using RAM is taken to be zero. Also, an S/C ratio of 12 is assumed. The "Forward Cost" is the number of cost units required to provide the forward simulation information in time-reversal order and includes both the cost of forward time stepping and the cost of doing store and restore operations. The "Total Cost" is the number of cost units required to do both the forward simulation time reversal and backward time stepping to implement RTM.
[0190] The following information is tabulated for each example. The algorithm used needs to compute the number of store and restore operations for each type of memory and for each type of operation. This information is used to compute the cost of the forward simulation time reversal. The algorithm used provides a Griewank solution whenever C is greater than or equal to S. In that case, the full state check-points done by Griewank that could have been done by only storing the information needed for doing a correlation are reported by the algorithm as if they were stores of correlation information.
Figure imgf000057_0001
from fast memory
nWrites[F] The number of stores of full restart states to fast memory
nReadc[S] The number of restores of information needed for doing the correlation computation from slow memory
nWritec[S] The number of stores of information needed for doing the correlation computation to slow memory
nReads[S] The number of restores of full restart states from slow memory
nWrites[S] The number of stores of full restart states to slow memory
[0191] The three examples labeled A, B and C compare (1) the computer cost of a time-reversal strategy using Griewank check-pointing to RAM, (2) the present invention using only check-pointing to RAM, and (3) the present invention using check-pointing to both RAM and disk. These examples assume that n is equal to 40,000 time steps and a computer environment that can support 100 restart state buffers in RAM and 100 restart state buffers on disk. The present invention can provide a speedup of 1.30x over the Griewank check-pointing strategy with all Griewank check-points going to RAM.
Example A: Griewank in Memory
S=84G
Fast Memory=8316G (99 state buffers)
Forward Cost= 114750
Total Cost= 154646
nReadc[F]=39248 nWritec[F]=38540 nReads[F]=751 nWrites[F]=708 nReadc[S]=0 nWritec[S]=0 nReads[S]=0 nWrites[S]=0
Example B: Optimal in Memory
S=84G
C=7G Fast Memory=8316G (use as either state or correlation buffers)
Forward Cost=79262
Total Cost= 119261
nReadc[F]=39957 nWritec[F]=39916 nReads[F]=42 nWrites[F]=41 ,nReadc[S]=0 nWritec[S]=0 nReads[S]=0 nWrites[S]=0
The use of correlation buffers provides a 1.44x speedup for the forward simulation time reversal and an overall speedup of 1.29x over using "Griewank in Memory" for doing RTM.
Example C: Optimal in Memory and Disk
S=84G
C=7G
Fast Memory=8316G (use as either state or correlation buffers)
Slow Memory=8400G (use as either state or correlation buffers)
Forward Cost=79163
Total Cost=l 19162
nReadc[F]=39934 nWritec[F]=39934 nReads[F]=1 nWrites[F]=0 nReadc[S]=32 nWritec[S]=0 nReads[S]=32 nWrites[S]=32
[0192] Although the disk space available can hold 100 restart state buffers or 1200 correlation buffers, the algorithm of the invention chooses to use only 32 restart state buffers on disk. The high cost of doing input and output operations to disk discourages the algorithm from using all of the disk space that is available. Most of the speedup in this case comes from the S/C ratio and only an incremental speedup is gained from having disk available. Example C provides an overall speedup of 1.30x over using "Griewank in Memory" for doing RTM.
[0193] The next three examples assume that n is equal to 40,000 time steps and a computer environment that can support 20 restart state buffers in RAM and 100 restart state buffers on disk. Note that the RAM available is smaller than in the examples above and that the advantage associated with this invention is greater. The present invention applied in Example G can provide a speedup of 1.67x over the Griewank check-pointing strategy with all Griewank check-points going to RAM in Example D and an even larger speedup over the Griewank check-pointing strategy with all Griewank check-points going to disk in Example E.
Example D: Griewank in Memory
S=84G
Fast Memory=1680G (20 restart state buffers)
Forward Cost= 185055
Total Cost=225054
nReadc[F]=33275 nWritec[F]=27439 nReads[F]=6724 nWrites[F]=5836 nReadc[S]=0 nWritec[S]=0 nReads[S]=0 nWrites[S]=0
Example E: Griewank on Disk
S=84G
Slow Memory=8400G (100 restart state buffers)
Forward Cost=513685
Total Cost=553684
Griewank in disk: S=84G, C=84G, n=40,000, M[F]=0, M[S]=8400G (100 Buffers)
Forward cost=513685 =114750+(39248+38540+751 +708)*5 (Computed from adding the I/O cost from a previous case)
Note that Griewank checkpointing to disk is more expensive than Griewank checkpointing to RAM in this example due to the cost of input and output operations to disk.
Example F: Optimal in Memory and Disk
S=84G
C=7G
Fast Memory=1680G (use as either state or correlation buffers)
Slow Memory=8400G (use as either state or correlation buffers)
Forward Cost=94655
Total Cost=134654
nReadc[F]=39710 nWritec[F]=39692 nReads[F]=33 nWrites[F]=18 nReadc[S]=100 nWritec[S]=0 nReads[S]=156 nWrites[S]=100 This solution saves 100 restart state checkpoints to disk and does 156 restores of restart checkpoint information from disk. An additional 18 restart state checkpoints are done in RAM. A total of 33 restore operations are done on the restart state checkpoints in RAM. No correlation buffers are saved to disk.
[0194] The next two examples assume a computer environment that can support only
10 restart state buffers in RAM and 50 restart state buffers on disk. In this environment, the present invention can provide a speedup of 1.97x over a Griewank check-pointing strategy with all check-points saved in RAM.
Example G: Griewank in Memory
S=84G
Fast Memory=840G (10 restart state buffers)
Forward Cost=269620
Total Cost=309619
nReadc[F]=24586 nWritec[F]=14547 nReads[F]=15413 nWrites[F]=10039 nReadc[S]=0 nWritec[S]=0 nReads[S]=0 nWrites[S]=0
Example H: Optimal in Memory and Disk
S=84G
C=7G
Fast Memory=840G (use as either state or correlation buffers)
Slow Memory=4200G (use as either state or correlation buffers)
Forward Cost=l 16736
Total Cost=156735 nReadc[F]=39356 nWritec[F]=39327 nReads[F]=44 nWrites[F]=29 nReadc[S]=266 nWritec[S]=0 nReads[S]=333 nWrites[S]=266 The cost of the time reversal of the forward propagating excitation pulse wavefield for Example H has a speedup of 2.3x over that in Example G. The full RTM application for Example H has a speedup of 1.97x over that in Example G.
[0195] The next two examples assume a computer environment that can support only 5 restart state buffers in RAM and 25 restart state buffers on disk. In this environment, the present invention can provide a speedup of 2.9x over a Griewank check-pointing strategy with all check-points saved in RAM.
Example J: Griewank in Memory
S=84G
Fast Memory=420G (5 restart state buffers)
Forward Cost=483735
Total Cost=523734
nReadc[F]=121 13 nWritec[F]=3224 nReads[F]=27886 nWrites[F]=8889 nReadc[S]=0 nWritec[S]=0 nReads[S]=0 nWrites[S]=0
Example K: Optimal in Memory and Disk
S=84G
C=7G
Fast Memory=420G (use as either state or correlation buffers)
Slow Memory=2100G (use as either state or correlation buffers)
Forward Cost=138318
Total Cost=178317
nReadc[F]=38915 nWritec[F]=38830 nReads[F]=176 nWrites[F]=85 nReadc[S]=350 nWritec[S]=0 nReads[S]=558 nWrites[S]=350
[0196] The next two examples assume a computer environment that can support only
2 restart state buffers in RAM and 10 restart state buffers on disk. In this environment, the present invention can provide a speedup of 5.7x over a Griewank check-pointing strategy with all check-points saved in RAM. Example L: Griewank in Memory
S=84G
Fast Memory=168G (2 restart state buffers)
Forward Cost= 1804685
Total Cost= 1844684
nReadc[F]=1914 nWritec[F]=62 nReads[F]=38085 nWrites[F]=1852 nReadc[S]=0 nWritec[S]=0 nReads[S]=0 nWrites[S]=0
Example M: Optimal in Memory and Disk
S=84G
C=7G
Fast Memory=168G (use as either state or correlation buffers)
Slow Memory=840G (use as either state or correlation buffers)
Forward Cost=280124
Total Cost=320123
nReadc[F]=37505 nWritec[F]=37295 nReads[F]=757 nWrites[F]=210 nReadc[S]=461 nWritec[S]=0 nReads[S]=1276 nWrites[S]=461
[0197] The next two examples assume a computer environment that can support only 1 restart state buffers in RAM and 5 restart state buffers on disk. In this environment, the present invention can provide a speedup of 20x over a Griewank check-pointing strategy with all check-points saved in RAM.
Example N: Griewank in Memory
S=84G
Fast Memory=84G (1 restart state buffers)
Forward Cost=7502798
Total Cost=7542797
nReadc[F]=282 nWritec[F]=1 nReads[F]=39717 nWrites[F]=281 nReadc[S]=0 nWritec[S]=0 nReads[S]=0 nWrites[S]=0
Example O: Optimal in Memory and Disk S=84G
C=7G
Fast Memory=84G (use as either state or correlation buffers)
Slow Memory=420G (use as either state or correlation buffers)
Forward Cost=336109
Total Cost=376108
nReadc[F]=35758 nWritec[F]=35758 nReads[F]=9 nWrites[F]=0 nReadc[S]=1262 nWritec[S]=0 nReads[S]=2970 nWrites[S]=1262 [0198] The final two examples assume a computer environment that can support only
0.5 restart state buffers in RAM and 2.5 restart state buffers on disk, the present invention can provide a speedup of 893x over a Griewank check-pointing strategy with all check-points saved in RAM.
Example P: Griewank in Memory
S=84G
Fast Memory=42G (0 restart state buffers)
Forward Cost=8000200
Total Cost=8000600
nReadc[F]=0 nWritec[F]=0 nReads[F]=39999 nWrites[F]=0 nReadc[S]=0 nWritec[S]=0 nReads[S]=0 nWrites[S]=0
Example Q: Optimal in Memory and Disk
S=84G
C=7G
Fast Memory=42G (use as correlation buffers)
Slow Memory=210G (use as either state or correlation buffers)
Forward Cost=855154
Total Cost=895153
nReadc[F]=21768 nWritec[F]=21768 nReads[F]=27 nWrites[F]=0 nReadc[S]= 14604
nWritec[S]=14254 nReads[S]=3600 nWrites[S]=350 Thus an algorithm of the present invention is able to use storage less than a restart state buffer if it is enough to contain a correlation buffer.
[0199] While the present techniques may be susceptible to various modifications and alternative forms, the exemplary embodiments discussed above have been shown only by way of example. However, it should again be understood that the present techniques are not intended to be limited to the particular embodiments disclosed herein. Indeed, the present techniques include all alternatives, modifications, and equivalents falling within the true spirit and scope of the appended claims.
APPENDIX A
[0200] The source code shown below is a naive implementation of the optimal check pointing strategy of the present invention with just the addition of the concept of a "correlation buffer" to that of the "state buffer" for demonstration of the idea.
{
II II APPENDIX B
[0201] This source code provides an example implementation of the present inventive method incorporating a two-level storage optimal check pointing strategy.
{ _D, _D, _D, _D,
{
{
{
{

Claims

1. A method for lowering a computational cost of a computer simulation, comprising:
performing a checkpointing strategy, wherein the checkpointing strategy comprises: storing a correlation checkpoint at a time step, wherein the correlation checkpoint comprises data used to correlate a forward propagated value generated by the computer simulation, and wherein the computer simulation cannot be restarted from the values stored in the correlation checkpoint;
allocating a storage space for the correlation checkpoint; and
running the computer simulation at each of a plurality of time steps, wherein at each of the plurality of time steps:
a backwards propagated value from measured data is correlated to the forward propagated value from the computer simulation, wherein the forward propagated value is stored in the correlation checkpoint.
2. The method of claim 1, further comprising:
storing a full state checkpoint; and
restarting the simulation from the full state checkpoint.
3. The method of claim 1, further comprising determining an optimum location for storing either a full state checkpoint or a correlation checkpoint, wherein the optimum location is storage space allocated in a graphics processor unit (GPU) memory, a random access memory (RAM), a RAM disk, a disk drive, or any combinations thereof, and wherein the determination of the optimum location is based, at least in part, on the access speed of the storage space.
4. The method of claim 1, wherein a storage space used for the correlation checkpoint is less than a storage space used for a full state checkpoint.
5. The method of claim 1, further comprising optimizing the checkpointing strategy by steps comprising:
determining a computing cost associated with storing the correlation checkpoint; minimizing the computing cost based, at least in part, on an access speed for each of a plurality of storage units, and the ratio in storage space required for a full state checkpoint to storage space required for the correlation checkpoint; and generating a table comprising the plurality of time steps and a type of checkpoint to be stored at each of the plurality of time steps.
6. The method of claim 5, wherein determining the computing cost comprises: computing a maximum number of correlation checkpoints that can be stored in a fast storage unit;
computing a maximum number of correlation checkpoints that can be stored in a slow storage unit;
if any correlation checkpoints can be stored in fast storage:
compute an optimal number of sweeps if only using fast storage and add to a list;
compute a minimum number of sweeps if only using fast storage and add to the list;
if any correlation checkpoints can be stored in slow storage:
compute a minimum number of sweeps if using all types of storage and add to the list;
compute an optimal number of sweeps if using all of the fast storage and storing at least one correlation checkpoint in slow storage, add to list if less than last value on list;
add an integer value nearest to each value on the list to the list;
compute the cost for each value on the list; and
return the minimum cost.
7. The method of claim 1, further comprising generating an image of a subsurface region from seismic data.
8. The method of claim 1, further comprising history matching reservoir data to a reservoir simulation.
9. A method for comparing collected data to simulated data, comprising:
backwards propagating the collected data across a grid;
running a computer simulation to generate forward propagated data across the grid, wherein:
a plurality of correlation buffers are stored during the computer simulation; and
the simulation cannot be restarted from any of the plurality of correlation buffers; and
correlating the data stored in the correlation buffers to the backwards propagated data at each point in the grid.
10. The method of claim 9, comprising storing a full state checkpoint during the simulation, wherein the simulation can be restarted from the full state checkpoint.
1 1. The method of claim 9, further comprising:
calculating a cost for storing a full state checkpoint; and
determining a time step for storing a full state checkpoint based, at least in part, on the cost.
12. The method of claim 1, wherein the forward propagated data is correlated to backwards propagated data in a next time step.
13. The method of claim 1, further comprising:
storing a plurality of correlation checkpoints in a fast storage medium; and storing at least one correlation checkpoint in a slow storage medium.
14. The method of claim 13, further comprising storing at least one full state checkpoint, wherein the simulation can be restarted from the full state checkpoint.
15. The method of claim 14, further comprising storing the at least one full state checkpoint in a fast storage medium.
16. A system for correlating simulated data to collected data, comprising:
a processor;
a storage system, comprising data structures representing:
measured data;
a propagation algorithm configured to propagate the measured data backwards-in-time across a grid;
a computer simulation configured to generate forward-in-time simulated data across the grid; and
a memory, wherein the memory comprises code to direct the processor to:
propagate the measured data backwards-in-time across the grid; populate the grid with forward-in-time simulated data from the computer simulation;
store a correlation checkpoint at a time step during the computer simulation; and
correlate the backwards propagated data to the simulated data stored in the correlation checkpoint.
17. The system of claim 16, wherein the processor comprises a single core, a multiple core, a graphics processing unit, or any combinations thereof.
18. The system of claim 16, wherein the correlation checkpoint is stored in the memory.
19. The system of claim 16, wherein the memory comprises a random access memory (RAM), a RAM disk, a graphics processing unit memory, or any combinations thereof.
20. The system of claim 16, wherein the memory comprises code to store a full state checkpoint at a time step, wherein the computer simulation can be restarted from the full state checkpoint.
21. The method of claim 1, wherein propagating simulated excitation pulses forwards in time is performed using a full two-way, wave equation.
22. The method of claim 1, wherein propagating simulated excitation pulses forwards in time is performed using based on Kirchhoff, Beam or one-way wave equation migration techniques.
23. A computer implemented method for solving a problem of imaging or inverting seismic data where a time-stepping forward seismic simulation must be accessed in reverse-time order to correlate with a backward time stepping adjoint computation, comprising:
determining and implementing a checkpointing strategy that reduces computation time for a fixed amount of available computer memory M, including data storage, by selecting a combination of nc memory buffers of size C sized to store data from a forward simulation needed to perform a correlation at a checkpointed time step without storing all data needed to restart the simulation from the time step, and ns memory buffers of size S sized to store all data needed to restart the forward simulation from a checkpointed time step, wherein ncC + nsS < M, nc > 1 and ns > 0;
performing the imaging or inverting on the computer using saved data from the selected memory buffers.
24. The method of claim 23, wherein the checkpointing strategy is based at least in part on different access speeds of memory resources.
25. The method of claim 23, wherein the checkpointing strategy includes optimizing which time steps are selected as restart checkpoints, for a pre-selected total number of time steps in the forward simulation.
26. The method of claim 25, wherein the optimizing which time steps are selected as restart checkpoints is based on minimizing a computation cost function.
27. The method of claim 23, wherein C depends upon what type of correlation is used in the imaging or inverting.
PCT/US2011/028350 2010-05-19 2011-03-14 Method and system for checkpointing during simulations WO2011146161A1 (en)

Priority Applications (8)

Application Number Priority Date Filing Date Title
CA2796631A CA2796631C (en) 2010-05-19 2011-03-14 Method and system for checkpointing during simulations
RU2012154894/08A RU2573269C2 (en) 2010-05-19 2011-03-14 Method and system for generating control points during simulation
BR112012025845A BR112012025845A2 (en) 2010-05-19 2011-03-14 method and system to set verification during simulations
AU2011256799A AU2011256799B2 (en) 2010-05-19 2011-03-14 Method and system for checkpointing during simulations
KR1020127032886A KR101931935B1 (en) 2010-05-19 2011-03-14 Method and system for checkpointing during simulations
CN201180024861.8A CN102906728B (en) 2010-05-19 2011-03-14 Method and system for checkpointing during simulations
SG2012073813A SG184808A1 (en) 2010-05-19 2011-03-14 Method and system for checkpointing during simulations
EP11783895.3A EP2572292A4 (en) 2010-05-19 2011-03-14 Method and system for checkpointing during simulations

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US34629810P 2010-05-19 2010-05-19
US61/346,298 2010-05-19

Publications (1)

Publication Number Publication Date
WO2011146161A1 true WO2011146161A1 (en) 2011-11-24

Family

ID=44973196

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2011/028350 WO2011146161A1 (en) 2010-05-19 2011-03-14 Method and system for checkpointing during simulations

Country Status (11)

Country Link
US (1) US8756042B2 (en)
EP (1) EP2572292A4 (en)
KR (1) KR101931935B1 (en)
CN (1) CN102906728B (en)
AU (1) AU2011256799B2 (en)
BR (1) BR112012025845A2 (en)
CA (1) CA2796631C (en)
MY (1) MY175034A (en)
RU (1) RU2573269C2 (en)
SG (1) SG184808A1 (en)
WO (1) WO2011146161A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102866423A (en) * 2012-09-13 2013-01-09 浪潮(北京)电子信息产业有限公司 Seismic prestack time migration processing method and system

Families Citing this family (71)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
ES2341065B1 (en) * 2007-10-25 2011-06-13 Airbus España, S.L. METHODS AND SYSTEMS FOR IMPROVING BADS USED IN COMPUTATIONAL FLUID DYNAMICS.
CN102741854B (en) * 2009-10-23 2015-08-19 埃克森美孚上游研究公司 Utilize the method that gradient information is optimized
US8694299B2 (en) 2010-05-07 2014-04-08 Exxonmobil Upstream Research Company Artifact reduction in iterative inversion of geophysical data
EP2577353A4 (en) * 2010-06-02 2017-11-22 Exxonmobil Upstream Research Company Efficient computation of wave equation migration angle gathers
US9366776B2 (en) * 2010-11-30 2016-06-14 Schlumberger Technology Corporation Integrated formation modeling systems and methods
US9046626B2 (en) * 2011-01-10 2015-06-02 Westerngeco L.L.C. Performing reverse time imaging of multicomponent acoustic and seismic data
US9291733B2 (en) * 2011-01-31 2016-03-22 Cggveritas Services Sa Device and method for determining S-wave attenuation in near-surface condition
CA2825395A1 (en) 2011-03-30 2012-10-04 Partha S. Routh Convergence rate of full wavefield inversion using spectral shaping
AU2012260584B2 (en) * 2011-05-24 2015-09-10 Geco Technology B.V. Imaging by extrapolation of vector-acoustic data
US9176930B2 (en) * 2011-11-29 2015-11-03 Exxonmobil Upstream Research Company Methods for approximating hessian times vector operation in full wavefield inversion
RU2612896C2 (en) 2012-03-08 2017-03-13 Эксонмобил Апстрим Рисерч Компани Orthogonal coding source and receiver
US20130311149A1 (en) * 2012-05-17 2013-11-21 Yaxun Tang Tomographically Enhanced Full Wavefield Inversion
US9665604B2 (en) * 2012-07-31 2017-05-30 Schlumberger Technology Corporation Modeling and manipulation of seismic reference datum (SRD) in a collaborative petro-technical application environment
US9429912B2 (en) * 2012-08-17 2016-08-30 Microsoft Technology Licensing, Llc Mixed reality holographic object development
EP2901363A4 (en) * 2012-09-28 2016-06-01 Exxonmobil Upstream Res Co Fault removal in geological models
US9857488B2 (en) 2012-11-20 2018-01-02 International Business Machines Corporation Efficient wavefield compression in seismic imaging
SG11201503218RA (en) 2012-11-28 2015-06-29 Exxonmobil Upstream Resarch Company Reflection seismic data q tomography
US10591638B2 (en) * 2013-03-06 2020-03-17 Exxonmobil Upstream Research Company Inversion of geophysical data on computer system having parallel processors
US9262560B2 (en) * 2013-03-13 2016-02-16 Saudi Arabian Oil Company Automatic recovery of reservoir simulation runs from processing system failures
AU2014237711B2 (en) * 2013-03-15 2017-06-01 Chevron U.S.A. Inc. Beam inversion by Monte Carlo back projection
US10088588B2 (en) * 2013-04-03 2018-10-02 Cgg Services Sas Device and method for stable least-squares reverse time migration
BR112015025516A2 (en) 2013-05-24 2017-07-18 Exxonmobil Upstream Res Co multiparameter inversion through displacement-dependent elastic fwi
US10459117B2 (en) 2013-06-03 2019-10-29 Exxonmobil Upstream Research Company Extended subspace method for cross-talk mitigation in multi-parameter inversion
US9702998B2 (en) 2013-07-08 2017-07-11 Exxonmobil Upstream Research Company Full-wavefield inversion of primaries and multiples in marine environment
CN104376026B (en) * 2013-08-18 2018-04-13 复旦大学 Table lookup method based on grid and multidimensional tree mixed structure
US9772413B2 (en) 2013-08-23 2017-09-26 Exxonmobil Upstream Research Company Simultaneous sourcing during both seismic acquisition and seismic inversion
US10036818B2 (en) 2013-09-06 2018-07-31 Exxonmobil Upstream Research Company Accelerating full wavefield inversion with nonstationary point-spread functions
US9910189B2 (en) 2014-04-09 2018-03-06 Exxonmobil Upstream Research Company Method for fast line search in frequency domain FWI
US10267937B2 (en) 2014-04-17 2019-04-23 Saudi Arabian Oil Company Generating subterranean imaging data based on vertical seismic profile data and ocean bottom sensor data
US9562983B2 (en) * 2014-04-17 2017-02-07 Saudi Arabian Oil Company Generating subterranean imaging data based on vertical seismic profile data
EP3140675A1 (en) 2014-05-09 2017-03-15 Exxonmobil Upstream Research Company Efficient line search methods for multi-parameter full wavefield inversion
US10185046B2 (en) 2014-06-09 2019-01-22 Exxonmobil Upstream Research Company Method for temporal dispersion correction for seismic simulation, RTM and FWI
US9689999B2 (en) * 2014-06-13 2017-06-27 Pgs Geophysical As Seismic imaging using higher-order reflections
EP3158367A1 (en) 2014-06-17 2017-04-26 Exxonmobil Upstream Research Company Fast viscoacoustic and viscoelastic full-wavefield inversion
US10838092B2 (en) 2014-07-24 2020-11-17 Exxonmobil Upstream Research Company Estimating multiple subsurface parameters by cascaded inversion of wavefield components
US10422899B2 (en) * 2014-07-30 2019-09-24 Exxonmobil Upstream Research Company Harmonic encoding for FWI
US9551210B2 (en) * 2014-08-15 2017-01-24 Carbo Ceramics Inc. Systems and methods for removal of electromagnetic dispersion and attenuation for imaging of proppant in an induced fracture
WO2016054008A1 (en) * 2014-10-02 2016-04-07 Conocophillips Company Pulsed marine source
US10386511B2 (en) 2014-10-03 2019-08-20 Exxonmobil Upstream Research Company Seismic survey design using full wavefield inversion
EP3210050A1 (en) 2014-10-20 2017-08-30 Exxonmobil Upstream Research Company Velocity tomography using property scans
US10803534B2 (en) * 2014-10-31 2020-10-13 Exxonmobil Upstream Research Company Handling domain discontinuity with the help of grid optimization techniques
AU2015363241A1 (en) 2014-12-18 2017-06-29 Exxonmobil Upstream Research Company Scalable scheduling of parallel iterative seismic jobs
US10520618B2 (en) * 2015-02-04 2019-12-31 ExxohnMobil Upstream Research Company Poynting vector minimal reflection boundary conditions
US10317546B2 (en) 2015-02-13 2019-06-11 Exxonmobil Upstream Research Company Efficient and stable absorbing boundary condition in finite-difference calculations
SG11201704623RA (en) 2015-02-17 2017-09-28 Exxonmobil Upstream Res Co Multistage full wavefield inversion process that generates a multiple free data set
US10317551B2 (en) * 2015-06-01 2019-06-11 Pgs Geophysical As Using seabed sensors and sea-surface reflections for structural imaging of a subsurface location in a geological formation
AU2016270000B2 (en) 2015-06-04 2019-05-16 Exxonmobil Upstream Research Company Method for generating multiple free seismic images
US10838093B2 (en) 2015-07-02 2020-11-17 Exxonmobil Upstream Research Company Krylov-space-based quasi-newton preconditioner for full-wavefield inversion
US10310113B2 (en) 2015-10-02 2019-06-04 Exxonmobil Upstream Research Company Q-compensated full wavefield inversion
US10520619B2 (en) 2015-10-15 2019-12-31 Exxonmobil Upstream Research Company FWI model domain angle stacks with amplitude preservation
CN105354385B (en) * 2015-11-13 2019-10-01 电子科技大学 A kind of ordering of grids implementation method in semiconductor technology emulation
EP3394642B1 (en) * 2015-12-22 2022-02-16 Shell Internationale Research Maatschappij B.V. Method and system for generating a seismic gather
WO2017188873A1 (en) * 2016-04-29 2017-11-02 Telefonaktiebolaget Lm Ericsson (Publ) Encoding and decoding using a polar code
US10768324B2 (en) 2016-05-19 2020-09-08 Exxonmobil Upstream Research Company Method to predict pore pressure and seal integrity using full wavefield inversion
WO2018017108A1 (en) * 2016-07-22 2018-01-25 Schlumberger Technology Corporation Modeling of oil and gas fields for appraisal and early development
WO2018053051A1 (en) * 2016-09-13 2018-03-22 Purdue Research Foundation System and method for divide-and conquer checkpointing
US10345466B2 (en) * 2017-07-25 2019-07-09 Advanced Geophysical Technology Inc. Memory efficient Q-RTM computer method and apparatus for imaging seismic data
GB2590330B (en) * 2018-10-11 2023-01-04 Landmark Graphics Corp Calibrating time-lapse seismic images for production operations
US11644593B2 (en) 2018-10-11 2023-05-09 Landmark Graphics Corporation Calibrating time-lapse seismic images for production operations
US11073629B2 (en) * 2018-10-16 2021-07-27 Halliburton Energy Services, Inc. Method to improve DAS channel location accuracy using global inversion
US11080141B2 (en) 2019-01-22 2021-08-03 International Business Machines Corporation Automatic restarting and reconfiguration of physics-based models in event of model failure
US11360224B2 (en) 2019-05-03 2022-06-14 Exxonmobil Upstream Research Company Inversion, migration, and imaging related to isotropic wave-mode- independent attenuation
US11500116B2 (en) * 2019-05-15 2022-11-15 Saudi Arabian Oil Company Identifying characteristics of a subterranean region using vector-based wavefield separation of seismic data from the subterranean region
US11187820B1 (en) * 2019-06-18 2021-11-30 Euram Geo-Focus Technologies Corporation Methods of oil and gas exploration using digital imaging
US11346967B2 (en) * 2019-09-10 2022-05-31 Advanced Geophysical Technology Inc. Systems and methods for providing amplitude versus offset compliant migration gathers
US20220236439A1 (en) * 2021-01-23 2022-07-28 Manzar Fawad Rock physics model for shale volume estimation in subsurface reservoirs
KR102424206B1 (en) * 2021-03-23 2022-07-22 국방과학연구소 Reverse simulation engine server and reverse simulation method thereof for developing defense systems based on simulation models
US20220413176A1 (en) * 2021-06-28 2022-12-29 Halliburton Energy Services, Inc. Annulus Velocity Independent Time Domain Structure Imaging In Cased Holes Using Multi-Offset Secondary Flexural Wave Data
US11867857B2 (en) * 2021-07-13 2024-01-09 Saudi Arabian Oil Company Method and system for updating a seismic velocity model
CN113706603B (en) * 2021-10-28 2022-02-22 中国科学院地质与地球物理研究所 Method for classifying and characterizing porosity connectivity of shale organic matter
CN118468798B (en) * 2024-07-11 2024-10-01 北京开源芯片研究院 Method and device for generating check point, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5504678A (en) * 1994-06-03 1996-04-02 Exxon Production Research Company Method for seismic data processing using depth slice decomposition
US20100054082A1 (en) * 2008-08-29 2010-03-04 Acceleware Corp. Reverse-time depth migration with reduced memory requirements
US20100088494A1 (en) * 2008-10-02 2010-04-08 International Business Machines Corporation Total cost based checkpoint selection
US20100118651A1 (en) * 2008-11-10 2010-05-13 Chevron U.S.A. Inc. Method for generation of images related to a subsurface region of interest

Family Cites Families (134)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3812457A (en) 1969-11-17 1974-05-21 Shell Oil Co Seismic exploration method
US3864667A (en) 1970-09-11 1975-02-04 Continental Oil Co Apparatus for surface wave parameter determination
US3984805A (en) 1973-10-18 1976-10-05 Daniel Silverman Parallel operation of seismic vibrators without phase control
US4168485A (en) 1974-08-12 1979-09-18 Continental Oil Company Simultaneous use of pseudo-random control signals in vibrational exploration methods
US4675851A (en) 1982-09-09 1987-06-23 Western Geophysical Co. Method for seismic exploration
US4545039A (en) 1982-09-09 1985-10-01 Western Geophysical Co. Of America Methods for seismic exploration
US4575830A (en) 1982-10-15 1986-03-11 Schlumberger Technology Corporation Indirect shearwave determination
US4562540A (en) 1982-11-12 1985-12-31 Schlumberger Technology Corporation Diffraction tomography system and methods
US4594662A (en) 1982-11-12 1986-06-10 Schlumberger Technology Corporation Diffraction tomography systems and methods with fixed detector arrays
JPS606032A (en) 1983-06-22 1985-01-12 Honda Motor Co Ltd Control method of operating condition of internal- combustion engine
US4924390A (en) 1985-03-04 1990-05-08 Conoco, Inc. Method for determination of earth stratum elastic parameters using seismic energy
US4715020A (en) 1986-10-29 1987-12-22 Western Atlas International, Inc. Simultaneous performance of multiple seismic vibratory surveys
FR2589587B1 (en) 1985-10-30 1988-02-05 Inst Francais Du Petrole MARINE SEISMIC PROSPECTION METHOD USING A CODE VIBRATORY SIGNAL AND DEVICE FOR IMPLEMENTING SAME
US4707812A (en) 1985-12-09 1987-11-17 Atlantic Richfield Company Method of suppressing vibration seismic signal correlation noise
US4823326A (en) 1986-07-21 1989-04-18 The Standard Oil Company Seismic data acquisition technique having superposed signals
US4686654A (en) 1986-07-31 1987-08-11 Western Geophysical Company Of America Method for generating orthogonal sweep signals
US4766574A (en) 1987-03-31 1988-08-23 Amoco Corporation Method for depth imaging multicomponent seismic data
US4953657A (en) 1987-11-30 1990-09-04 Halliburton Geophysical Services, Inc. Time delay source coding
US4969129A (en) 1989-09-20 1990-11-06 Texaco Inc. Coding seismic sources
US4982374A (en) 1989-10-23 1991-01-01 Halliburton Geophysical Services, Inc. Method of source coding and harmonic cancellation for vibrational geophysical survey sources
GB9011836D0 (en) 1990-05-25 1990-07-18 Mason Iain M Seismic surveying
US5469062A (en) 1994-03-11 1995-11-21 Baker Hughes, Inc. Multiple depths and frequencies for simultaneous inversion of electromagnetic borehole measurements
GB2322704B (en) 1994-07-07 1998-12-09 Geco As Method of Processing seismic data
US5583825A (en) 1994-09-02 1996-12-10 Exxon Production Research Company Method for deriving reservoir lithology and fluid content from pre-stack inversion of seismic data
US5924049A (en) 1995-04-18 1999-07-13 Western Atlas International, Inc. Methods for acquiring and processing seismic data
CA2188255C (en) 1995-04-18 2003-03-25 Craig J. Beasley Method for providing uniform subsurface coverage in the presence of steep dips
US5721710A (en) 1995-09-29 1998-02-24 Atlantic Richfield Company High fidelity vibratory source seismic method with source separation
US5719821A (en) 1995-09-29 1998-02-17 Atlantic Richfield Company Method and apparatus for source separation of seismic vibratory signals
US5790473A (en) 1995-11-13 1998-08-04 Mobil Oil Corporation High fidelity vibratory source seismic method for use in vertical seismic profile data gathering with a plurality of vibratory seismic energy sources
US5822269A (en) 1995-11-13 1998-10-13 Mobil Oil Corporation Method for separation of a plurality of vibratory seismic energy source signals
US5715213A (en) 1995-11-13 1998-02-03 Mobil Oil Corporation High fidelity vibratory source seismic method using a plurality of vibrator sources
US5838634A (en) 1996-04-04 1998-11-17 Exxon Production Research Company Method of generating 3-D geologic models incorporating geologic and geophysical constraints
US5798982A (en) 1996-04-29 1998-08-25 The Trustees Of Columbia University In The City Of New York Method for inverting reflection trace data from 3-D and 4-D seismic surveys and identifying subsurface fluid and pathways in and among hydrocarbon reservoirs based on impedance models
GB9612471D0 (en) 1996-06-14 1996-08-14 Geco As Method and apparatus for multiple seismic vibratory surveys
US5878372A (en) 1997-03-04 1999-03-02 Western Atlas International, Inc. Method for simultaneous inversion processing of well log data using a plurality of earth models
US6014342A (en) 1997-03-21 2000-01-11 Tomo Seis, Inc. Method of evaluating a subsurface region using gather sensitive data discrimination
US5999489A (en) 1997-03-21 1999-12-07 Tomoseis Inc. High vertical resolution crosswell seismic imaging
US5920838A (en) 1997-06-02 1999-07-06 Carnegie Mellon University Reading and pronunciation tutor
FR2765692B1 (en) 1997-07-04 1999-09-10 Inst Francais Du Petrole METHOD FOR 3D MODELING THE IMPEDANCE OF A HETEROGENEOUS MEDIUM
GB2329043B (en) 1997-09-05 2000-04-26 Geco As Method of determining the response caused by model alterations in seismic simulations
US5999488A (en) 1998-04-27 1999-12-07 Phillips Petroleum Company Method and apparatus for migration by finite differences
US6219621B1 (en) 1998-06-30 2001-04-17 Exxonmobil Upstream Research Co. Sparse hyperbolic inversion of seismic data
US6388947B1 (en) 1998-09-14 2002-05-14 Tomoseis, Inc. Multi-crosswell profile 3D imaging and method
US6574564B2 (en) 1998-10-01 2003-06-03 Institut Francais Du Petrole 3D prestack seismic data migration method
FR2784195B1 (en) 1998-10-01 2000-11-17 Inst Francais Du Petrole METHOD FOR PERFORMING IN 3D BEFORE SUMMATION, A MIGRATION OF SEISMIC DATA
US6225803B1 (en) 1998-10-29 2001-05-01 Baker Hughes Incorporated NMR log processing using wavelet filter and iterative inversion
US6021094A (en) 1998-12-03 2000-02-01 Sandia Corporation Method of migrating seismic records
US6754588B2 (en) 1999-01-29 2004-06-22 Platte River Associates, Inc. Method of predicting three-dimensional stratigraphy using inverse optimization techniques
US6549854B1 (en) 1999-02-12 2003-04-15 Schlumberger Technology Corporation Uncertainty constrained subsurface modeling
US6058073A (en) 1999-03-30 2000-05-02 Atlantic Richfield Company Elastic impedance estimation for inversion of far offset seismic sections
FR2792419B1 (en) 1999-04-16 2001-09-07 Inst Francais Du Petrole METHOD FOR OBTAINING AN OPTIMAL MODEL OF A PHYSICAL CHARACTERISTICS IN A HETEROGENEOUS ENVIRONMENT, SUCH AS THE BASEMENT
GB9927395D0 (en) 1999-05-19 2000-01-19 Schlumberger Holdings Improved seismic data acquisition method
US6327537B1 (en) 1999-07-19 2001-12-04 Luc T. Ikelle Multi-shooting approach to seismic modeling and acquisition
FR2798197B1 (en) 1999-09-02 2001-10-05 Inst Francais Du Petrole METHOD FOR FORMING A MODEL OF A GEOLOGICAL FORMATION, CONSTRAINED BY DYNAMIC AND STATIC DATA
EP1094338B1 (en) 1999-10-22 2006-08-23 Jason Geosystems B.V. Method of estimating elastic parameters and rock composition of underground formations using seismic data
FR2800473B1 (en) 1999-10-29 2001-11-30 Inst Francais Du Petrole METHOD FOR 2D OR 3D MODELING A HETEROGENEOUS MEDIUM SUCH AS THE BASEMENT DESCRIBED BY SEVERAL PHYSICAL PARAMETERS
US6480790B1 (en) 1999-10-29 2002-11-12 Exxonmobil Upstream Research Company Process for constructing three-dimensional geologic models having adjustable geologic interfaces
EP1248957A1 (en) 2000-01-21 2002-10-16 Schlumberger Holdings Limited System and method for estimating seismic material properties
DE60112895D1 (en) 2000-01-21 2005-09-29 Schlumberger Holdings SYSTEM AND METHOD OF SEISMIC WAVELOCK SEPARATION
US6826486B1 (en) 2000-02-11 2004-11-30 Schlumberger Technology Corporation Methods and apparatus for predicting pore and fracture pressures of a subsurface formation
FR2805051B1 (en) 2000-02-14 2002-12-06 Geophysique Cie Gle METHOD OF SEISMIC MONITORING OF AN UNDERGROUND AREA BY SIMULTANEOUS USE OF MULTIPLE VIBROISISMIC SOURCES
GB2359363B (en) 2000-02-15 2002-04-03 Geco Prakla Processing simultaneous vibratory seismic data
US6687659B1 (en) 2000-03-24 2004-02-03 Conocophillips Company Method and apparatus for absorbing boundary conditions in numerical finite-difference acoustic applications
US6317695B1 (en) 2000-03-30 2001-11-13 Nutec Sciences, Inc. Seismic data processing method
CA2426160A1 (en) 2000-10-17 2002-04-25 David Lee Nyland Method of using cascaded sweeps for source coding and harmonic cancellation
AU2002239619A1 (en) 2000-12-08 2002-06-18 Peter J. Ortoleva Methods for modeling multi-dimensional domains using information theory to resolve gaps in data and in theories
FR2818753B1 (en) 2000-12-21 2003-03-21 Inst Francais Du Petrole METHOD AND DEVICE FOR SEISMIC PROSPECTION BY SIMULTANEOUS EMISSION OF SEISMISK SIGNALS OBTAINED BY CODING A SIGNAL BY RANDOM PSEUDO SEQUENCES
FR2821677B1 (en) 2001-03-05 2004-04-30 Geophysique Cie Gle IMPROVEMENTS TO TOMOGRAPHIC INVERSION PROCESSES OF POINTED EVENTS ON MIGREE SEISMIC DATA
US6751558B2 (en) 2001-03-13 2004-06-15 Conoco Inc. Method and process for prediction of subsurface fluid and rock pressures in the earth
US6927698B2 (en) 2001-08-27 2005-08-09 Larry G. Stolarczyk Shuttle-in receiver for radio-imaging underground geologic structures
US6545944B2 (en) 2001-05-30 2003-04-08 Westerngeco L.L.C. Method for acquiring and processing of data from two or more simultaneously fired sources
US6882958B2 (en) 2001-06-28 2005-04-19 National Instruments Corporation System and method for curve fitting using randomized techniques
GB2379013B (en) 2001-08-07 2005-04-20 Abb Offshore Systems Ltd Microseismic signal processing
US6593746B2 (en) 2001-08-27 2003-07-15 Larry G. Stolarczyk Method and system for radio-imaging underground geologic structures
US7672824B2 (en) 2001-12-10 2010-03-02 Westerngeco L.L.C. Method for shallow water flow detection
FR2833384B1 (en) * 2001-12-10 2004-04-02 Tsurf METHOD, DEVICE AND PROGRAM PRODUCT FOR THREE-DIMENSIONAL MODELING OF A GEOLOGICAL VOLUME
US7069149B2 (en) 2001-12-14 2006-06-27 Chevron U.S.A. Inc. Process for interpreting faults from a fault-enhanced 3-dimensional seismic attribute volume
US7330799B2 (en) 2001-12-21 2008-02-12 Société de commercialisation des produits de la recherche appliquée-Socpra Sciences et Génie s.e.c. Method and algorithm for using surface waves
US6842701B2 (en) 2002-02-25 2005-01-11 Westerngeco L.L.C. Method of noise removal for cascaded sweep data
GB2387226C (en) 2002-04-06 2008-05-12 Westerngeco Ltd A method of seismic surveying
FR2839368B1 (en) 2002-05-06 2004-10-01 Total Fina Elf S A METHOD OF DECIMATING SEISMIC TRACES PILOTED BY THE SEISMIC PATH
US6832159B2 (en) 2002-07-11 2004-12-14 Schlumberger Technology Corporation Intelligent diagnosis of environmental influence on well logs with model-based inversion
FR2843202B1 (en) 2002-08-05 2004-09-10 Inst Francais Du Petrole METHOD FOR FORMING A REPRESENTATIVE MODEL OF THE DISTRIBUTION OF A PHYSICAL QUANTITY IN AN UNDERGROUND AREA, FREE OF THE EFFECT OF CORRECTED NOISES BINDING EXPLORATION DATA
WO2004034088A2 (en) 2002-10-04 2004-04-22 Paradigm Geophysical Corporation Method and system for limited frequency seismic imaging
GB2396448B (en) 2002-12-21 2005-03-02 Schlumberger Holdings System and method for representing and processing and modeling subterranean surfaces
US6735527B1 (en) 2003-02-26 2004-05-11 Landmark Graphics Corporation 3-D prestack/poststack multiple prediction
US6999880B2 (en) 2003-03-18 2006-02-14 The Regents Of The University Of California Source-independent full waveform inversion of seismic data
US7184367B2 (en) 2003-03-27 2007-02-27 Exxonmobil Upstream Research Company Method to convert seismic traces into petrophysical property logs
US7436734B2 (en) 2003-04-01 2008-10-14 Exxonmobil Upstream Research Co. Shaped high frequency vibratory source
US7072767B2 (en) 2003-04-01 2006-07-04 Conocophillips Company Simultaneous inversion for source wavelet and AVO parameters from prestack seismic data
NO322089B1 (en) 2003-04-09 2006-08-14 Norsar V Daglig Leder Procedure for simulating local preamp deep-migrated seismic images
GB2400438B (en) 2003-04-11 2005-06-01 Westerngeco Ltd Determination of waveguide parameters
US6970397B2 (en) 2003-07-09 2005-11-29 Gas Technology Institute Determination of fluid properties of earth formations using stochastic inversion
US6882938B2 (en) 2003-07-30 2005-04-19 Pgs Americas, Inc. Method for separating seismic signals from two or more distinct sources
US6944546B2 (en) 2003-10-01 2005-09-13 Halliburton Energy Services, Inc. Method and apparatus for inversion processing of well logging data in a selected pattern space
US6901333B2 (en) 2003-10-27 2005-05-31 Fugro N.V. Method and device for the generation and application of anisotropic elastic parameters
US7046581B2 (en) 2003-12-01 2006-05-16 Shell Oil Company Well-to-well tomography
US20050128874A1 (en) 2003-12-15 2005-06-16 Chevron U.S.A. Inc. Methods for acquiring and processing seismic data from quasi-simultaneously activated translating energy sources
FR2872584B1 (en) 2004-06-30 2006-08-11 Inst Francais Du Petrole METHOD FOR SIMULATING THE SEDIMENT DEPOSITION IN A BASIN RESPECTING THE SEDIMENT SEQUENCE THICKNESS
US7646924B2 (en) 2004-08-09 2010-01-12 David Leigh Donoho Method and apparatus for compressed sensing
US7480206B2 (en) 2004-09-13 2009-01-20 Chevron U.S.A. Inc. Methods for earth modeling and seismic imaging using interactive and selective updating
GB2422433B (en) 2004-12-21 2008-03-19 Sondex Wireline Ltd Method and apparatus for determining the permeability of earth formations
US7373251B2 (en) 2004-12-22 2008-05-13 Marathon Oil Company Method for predicting quantitative values of a rock or fluid property in a reservoir using seismic data
US7230879B2 (en) 2005-02-12 2007-06-12 Chevron U.S.A. Inc. Method and apparatus for true relative amplitude correction of seismic data for normal moveout stretch effects
WO2006090374A2 (en) 2005-02-22 2006-08-31 Paradigm Geophysical Ltd. Multiple suppression in angle domain time and depth migration
US7840625B2 (en) 2005-04-07 2010-11-23 California Institute Of Technology Methods for performing fast discrete curvelet transforms of data
US7271747B2 (en) 2005-05-10 2007-09-18 Rice University Method and apparatus for distributed compressed sensing
US7405997B2 (en) 2005-08-11 2008-07-29 Conocophillips Company Method of accounting for wavelet stretch in seismic data
RU2440604C2 (en) 2005-10-18 2012-01-20 Синвент Ас Viewing response data of geologic environment using streaming processors
AU2006235820B2 (en) 2005-11-04 2008-10-23 Westerngeco Seismic Holdings Limited 3D pre-stack full waveform inversion
FR2895091B1 (en) 2005-12-21 2008-02-22 Inst Francais Du Petrole METHOD FOR UPDATING A GEOLOGICAL MODEL WITH SEISMIC DATA
US7196969B1 (en) * 2006-02-09 2007-03-27 Pgs Geophysical As Three-dimensional two-way acoustic wave equation pre-stack imaging systems and methods
GB2436626B (en) 2006-03-28 2008-08-06 Westerngeco Seismic Holdings Method of evaluating the interaction between a wavefield and a solid body
US7620534B2 (en) 2006-04-28 2009-11-17 Saudi Aramco Sound enabling computerized system for real time reservoir model calibration using field surveillance data
US20070274155A1 (en) 2006-05-25 2007-11-29 Ikelle Luc T Coding and Decoding: Seismic Data Modeling, Acquisition and Processing
US7725266B2 (en) 2006-05-31 2010-05-25 Bp Corporation North America Inc. System and method for 3D frequency domain waveform inversion based on 3D time-domain forward modeling
US7599798B2 (en) 2006-09-11 2009-10-06 Westerngeco L.L.C. Migrating composite seismic response data to produce a representation of a seismic volume
AU2007302695B2 (en) * 2006-09-28 2011-05-26 Exxonmobil Upstream Research Company Iterative inversion of data from simultaneous geophysical sources
ATE543109T1 (en) 2007-01-20 2012-02-15 Spectraseis Ag TIME REVERSAL RESERVOIR LOCALIZATION
JP2009063942A (en) 2007-09-10 2009-03-26 Sumitomo Electric Ind Ltd Far-infrared camera lens, lens unit, and imaging apparatus
US20090070042A1 (en) 2007-09-11 2009-03-12 Richard Birchwood Joint inversion of borehole acoustic radial profiles for in situ stresses as well as third-order nonlinear dynamic moduli, linear dynamic elastic moduli, and static elastic moduli in an isotropically stressed reference state
US20090083006A1 (en) 2007-09-20 2009-03-26 Randall Mackie Methods and apparatus for three-dimensional inversion of electromagnetic data
US20090164186A1 (en) 2007-12-20 2009-06-25 Bhp Billiton Innovation Pty Ltd. Method for determining improved estimates of properties of a model
US8577660B2 (en) 2008-01-23 2013-11-05 Schlumberger Technology Corporation Three-dimensional mechanical earth modeling
EP2105765A1 (en) 2008-03-28 2009-09-30 Schlumberger Holdings Limited Simultaneous inversion of induction data for dielectric permittivity and electric conductivity
US8494777B2 (en) 2008-04-09 2013-07-23 Schlumberger Technology Corporation Continuous microseismic mapping for real-time 3D event detection and location
US8345510B2 (en) 2008-06-02 2013-01-01 Pgs Geophysical As Method for aquiring and processing marine seismic data to extract and constructively use the up-going and down-going wave-fields emitted by the source(s)
CN102124374B (en) 2008-08-15 2013-07-17 Bp北美公司 Method for separating independent simultaneous sources
US8296069B2 (en) 2008-10-06 2012-10-23 Bp Corporation North America Inc. Pseudo-analytical method for the solution of wave equations
US7616523B1 (en) 2008-10-22 2009-11-10 Pgs Geophysical As Method for combining pressure and motion seismic signals from streamers where sensors are not at a common depth
US9213119B2 (en) 2008-10-29 2015-12-15 Conocophillips Company Marine seismic acquisition
US20100142316A1 (en) 2008-12-07 2010-06-10 Henk Keers Using waveform inversion to determine properties of a subsurface medium
US8223587B2 (en) * 2010-03-29 2012-07-17 Exxonmobil Upstream Research Company Full wavefield inversion using time varying filters
US8437998B2 (en) * 2010-09-27 2013-05-07 Exxonmobil Upstream Research Company Hybrid method for full waveform inversion using simultaneous and sequential source method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5504678A (en) * 1994-06-03 1996-04-02 Exxon Production Research Company Method for seismic data processing using depth slice decomposition
US20100054082A1 (en) * 2008-08-29 2010-03-04 Acceleware Corp. Reverse-time depth migration with reduced memory requirements
US20100088494A1 (en) * 2008-10-02 2010-04-08 International Business Machines Corporation Total cost based checkpoint selection
US20100118651A1 (en) * 2008-11-10 2010-05-13 Chevron U.S.A. Inc. Method for generation of images related to a subsurface region of interest

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
See also references of EP2572292A4 *
SYMES.: "Reverse Time Migration with Optimal Checkpointing", GEOPHYSICS, vol. 72, no. 5, September 2007 (2007-09-01), pages SM213 - SM221., XP001506322, Retrieved from the Internet <URL:http://www.caam.rice.edu/caam/trs/2006/TR06-18.pdf> [retrieved on 20110430] *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102866423A (en) * 2012-09-13 2013-01-09 浪潮(北京)电子信息产业有限公司 Seismic prestack time migration processing method and system
CN102866423B (en) * 2012-09-13 2015-07-22 浪潮(北京)电子信息产业有限公司 Seismic prestack time migration processing method and system

Also Published As

Publication number Publication date
BR112012025845A2 (en) 2016-06-28
EP2572292A4 (en) 2017-11-29
CN102906728A (en) 2013-01-30
RU2012154894A (en) 2014-06-27
CA2796631C (en) 2017-03-28
KR20130105792A (en) 2013-09-26
SG184808A1 (en) 2012-11-29
US20110288831A1 (en) 2011-11-24
AU2011256799B2 (en) 2016-02-25
CA2796631A1 (en) 2011-11-24
RU2573269C2 (en) 2016-01-20
EP2572292A1 (en) 2013-03-27
MY175034A (en) 2020-06-03
AU2011256799A1 (en) 2012-11-29
US8756042B2 (en) 2014-06-17
CN102906728B (en) 2017-04-26
KR101931935B1 (en) 2019-03-20

Similar Documents

Publication Publication Date Title
CA2796631C (en) Method and system for checkpointing during simulations
Etgen et al. Computational methods for large-scale 3D acoustic finite-difference modeling: A tutorial
McMechan Migration by extrapolation of time-dependent boundary values
Zeng et al. An improved vacuum formulation for 2D finite-difference modeling of Rayleigh waves including surface topography and internal discontinuities
Tsvankin et al. Seismic anisotropy in exploration and reservoir characterization: An overview
Robertsson et al. An efficient method for calculating finite-difference seismograms after model alterations
US8352190B2 (en) Method for analyzing multiple geophysical data sets
US11815642B2 (en) Elastic full wavefield inversion with refined anisotropy and VP/VS models
US20100054082A1 (en) Reverse-time depth migration with reduced memory requirements
US20140129479A1 (en) Method to aid in the exploration, mine design, evaluation and/or extraction of metalliferous mineral and/or diamond deposits
Engquist et al. Seismic imaging and optimal transport
US20220373703A1 (en) Methods and systems for generating an image of a subterranean formation based on low frequency reconstructed seismic data
US11947062B2 (en) Velocity tomography using time lags of wave equation migration
Rusmanugroho et al. 3D, 9C seismic modeling and inversion of Weyburn Field data
Lu et al. Comparison of elastic and acoustic reverse-time migration on the synthetic elastic Marmousi-II OBC dataset
Gibson Jr et al. Modeling and velocity analysis with a wavefront-construction algorithm for anisotropic media
Wason et al. Seismic modeling and inversion
Dong et al. Fast 3D target-oriented reverse-time datuming
Alaei et al. Geological modelling and finite difference forward realization of a regional section from the Zagros fold-and-thrust belt
Young Reverse-Time Migration of a Methane Gas Hydrate Distributed Acoustic Sensing Three-Dimensional Vertical Seismic Profile Dataset
Zheng et al. Improved numerical solution of anisotropic poroelastic wave equation in microseismicity: Graphic process unit acceleration and moment tensor implementation
Pinto Guerrero 2-D and 2.5-D Multi-scale Full-Waveform Inversion in frequency domain for high-resolution P-wave velocity (Vp) and quality factor (Q) models at Sleipner field.
WO2024191795A1 (en) Seismic imaging framework
Kamei Strategies for visco-acoustic waveform inversion in the Laplace-Fourier domain, with application to the Nankai subduction zone
Bilgi Investigation of Seismic Surveys and Enhancement of Seismic Images

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201180024861.8

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 11783895

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2796631

Country of ref document: CA

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2011256799

Country of ref document: AU

Date of ref document: 20110314

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 2011783895

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 20127032886

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2012154894

Country of ref document: RU

Kind code of ref document: A

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112012025845

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112012025845

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20121009