466
Views
0
CrossRef citations to date
0
Altmetric
Research Article

An identification problem related to mud filtrate invasion phenomenon during drilling operations

Pages 2401-2428 | Received 29 Apr 2020, Accepted 28 Mar 2021, Published online: 19 Apr 2021

Abstract

In this paper, we study two identification problems related to the mud filtrate invasion phenomenon. We want to determine a parameter (the invasion rate) in the coefficients of the parabolic equation that describes the mud filtrate invasion phenomenon. In the first problem, we determine this parameter starting from the observed values of the mud filtrate dispersion. We reduce the problem to an optimal control problem and prove the existence of the optimal control. In the second problem, we determine the invasion rate imposing the minimum condition of the quantity of mud filtrate that diffuses into the oil reservoir. We also reduce the identification problem to an optimal control problem. We prove the existence of the optimal control and we obtain a simple explicit form of this optimal control. A numerical example is presented for the second problem.

2010 Mathematics Subject Classifications:

1. Introduction

In this paper, we study two identification problems related to the invasion phenomenon arising in the borehole drilling process. During this process the drilling mud is pumped inside of the drill bore (towards the drill bit) and then circulated back to the surface through the annular space between the borehole and the drill bore wall. The drilling mud has sufficiently high density in order to avoid eruptive phenomena so that the hydrostatic pressure of the mud column is higher than the fluid formation pressure. This difference in pressure generates an undesirable phenomenon: the water from the drilling mud (hereinafter referred to as the mud filtrate) invades the formation and radially displaces the hydrocarbons and water from the formation. This invasion alters the reservoir properties in the vicinity of the well bore. The permeability, the porosity and the electrical resistivity of the reservoir are affected. For this reason, the invaded zone is also called the damaged zone.

During the mud filtrate invasion process, a part of the solid particles contained in the drilling mud penetrates the porous medium and another part is deposited on the well wall forming the mudcake. The most used model of the invasion phenomena is the so-called linear single phase mud filtrate invasion model. This model contains two parts:

  • the mudcake thickness model;

  • the mud filtrate invasion through the porous media model [Citation1].

a. The mudcake thickness model

Let ξc be the mudcake thickness, xw the well radius, h the reservoir (formation) thickness, Φc, ρc the porosity and the mudcake density, respectively, Φ the formation porosity, cs the solid particle dispersion in the drilling mud, k and kc the reservoir permeability and the mudcake permeability, respectively, u(t) the volumetric flow rate (or invasion rate) (see Figure ). Then, the mudcake growth is described by the following Cauchy problem [Citation1]: (1) dξcdt=cu(t)xwξc(t),(1) (2) ξc(0)=0,(2) where (3) u(t)=uMkcklnrerwkcklnrerwln(1ξc(t)rw),(3) (4) uM=2πkhΔpμflnrerw,(4) and c=(1Φ)cs2πh(1Φc)ρc.

Figure 1. The geometry of the mud-invasion phenomenon. A, wellbore; B, mudcake; C, the invaded zone; D, the drainage zone; xw, the wellbore radius; xe, the drainage radius; ξc, the mudcake thickness; dp, the penetration depth.

Figure 1. The geometry of the mud-invasion phenomenon. A, wellbore; B, mudcake; C, the invaded zone; D, the drainage zone; xw, the wellbore radius; xe, the drainage radius; ξc, the mudcake thickness; dp, the penetration depth.

From (Equation2), (Equation3) and (Equation4) we obtain that uM=u(0) is the maximum value of filtration rate.

b. The mud filtrate dispersion through the porous media model.

In [Citation1], the authors propose the following model in order to determine the mud filtrate dispersion C in the invaded zone: (5) Ct=1xx(xDCx)u(t)2πxhΦ(1SwirSor)Cx,(5) for (t,x)(0,T)×(xw,xe), (6) C(0,x)=C0(x),x(xw,xe),(6) (7) C(t,xw)=Cw,C(t,xe)=0,t(0,T).(7) The mixed problem (Equation5)–(Equation7) describes the mud filtrate invasion through the porous media. The initial condition (Equation6) specifies that at t = 0 the mud filtrate dispersion is C0. In the Dirichlet boundary conditions (Equation7), Cw represents the mud filtrate dispersion at the wall well. Instead of conditions (Equation7), the Dirichlet–Neumann boundary conditions can also be used [Citation2, p.747]: (8) C(t,xw)=Cw,Cx(t,xe)=0,t(0,T).(8) The first term in the right member of Equation (Equation5) is the conductive term. Here D is the diffusion coefficient. Based on experimental results, several authors proposed for D the following formula [Citation1,Citation3,Citation4]: (9) D=α(u(t)2πxh)β,(9) where α>0 and β>1 are empirical parameters. For example, in the sandstone formation α=51.7 and β=1.25 [Citation1]. The second term of the right member of Equation (Equation5) is the convective term, where Swir and Sor are the irreducible water saturation and the residual oil saturation, respectively [Citation1].

If we use the following dimensionless variables, denoted by tilde superscript, (10) x~=xxw,L=xexw,ξ~c=ξcxw,t~=tt0,C~=CCw,C~0=C0Cw,u~=uuM,D~=Dα(uM2πxwh)β,(10) where t0=2πxw2hΦ(1SwirSor)uM.The model (Equation1)–(Equation2), (Equation5)–(Equation7) becomes (11) dξcdt=c1u(t)1ξc(t),(11) (12) ξc(0)=0,(12) (13) Ct=1Pe1xx(x(u(t)x)βCx)u(t)xCx,(13) (14) C(0,x)=C0,x(1,L),(14) (15) C(t,1)=1,C(t,L)=0,t(0,T),(15) and the Dirichlet–Neumann boundary conditions (Equation8) become (16) C(t,1)=1,Cx(t,L)=0,t(0,T),(16) where c1=Φ(1Φ)(1SwirSor)cs(1Φc)ρcand (17) Pe=rw2αt0(uM2πxwh)β(17) is the Péclet number. In (Equation11)–(Equation16), the tilde notation was omitted.

For convenience we write Equation (Equation13) under the form (18) Ct=x(Pe1xβuβ(t)Cx)+(Pe1xβ1uβ(t)x1u(t))Cx,(18) for (t,x)Q, where Q:=(0,T)×(1,L).Hereinafter we will call the problems (Equation11)–(Equation12) and (Equation18), (Equation14), (Equation15) the linear single phase mud filtrate invasion model.

If all the physical properties of the oil reservoir are known, then we can determine the mudcake thickness by solving the Cauchy problem (Equation11)–(Equation12). Once the mud filtrate thickness is determined we obtain the mud filtrate dispersion by solving the parabolic mixed problem (Equation18), (Equation14), (Equation15) (or (Equation16)). If we do not know all the physical properties of the oil reservoir and mudcake then we can put the problem of determining these unknown properties using other observed physical properties. Thus we obtain an identification problem which we reduce to an optimal control problem in the coefficients of a parabolic equation.

In the first identification problem, we are dealing with in this paper we aim at determining the volumetric flow rate (or invasion rate) u starting from the observed values, available at a time T, of the mud filtrate dispersion. This objective will be achieved by solving the minimization problem Minimize12C(T,)Cref()L2(1,L)2,subject to (Equation18), (Equation14), (Equation15), for all u in an admissible set U, where Cref is a reference (observed) concentration. Once the invasion rate is obtained we can also determine the mudcake thickness ξc by solving (Equation1)–(Equation2).

In the second identification problem, we aim at determining the volumetric flow rate u that produces a minimum amount of mud filtrate that invades the reservoir. Thus we obtain the following minimization problem Minimize1LC(T,x)dx,subject to (Equation18), (Equation14), (Equation16), for all u in a some set U.

The structure of the paper is: in Section 2 we deal with first identification problem. Here we prove the existence for the state system and the existence for the optimal control. We obtain the first-order condition of optimality using the system of first order variations and the dual system. Section 3 contains the second identification problem. In this case, we obtain a simple explicit form of optimal control u. In Section 4, we give some numerical results and the last section contains the conclusion of the paper.

2. Dirichlet boundary conditions

In this section, we study an identification problem related to the state systems (Equation18), (Equation14), (Equation15). The purpose of this problem is to determine the filtration rate u starting from the observed values of the mud filtrate dispersion C available at a time T. We consider that the filtration rate u(t) is the control and that the solution C(t,x) of the mixed problem (Equation18), (Equation14), (Equation15) is the state variable. The analysis of the invasion phenomenon presented in the introduction leads us to the conclusion that the filtration rate u(t) varies between a maximum value and a minimum value. These values are determined by the physical characteristics of the reservoir (formation) and of the drilling mud, and by the pressure difference value Δp. We can also consider that the rate of variation of filtration rate is bounded. Starting from these observations, we will consider the set U under the form of (19) U={uW1,(0,T);umu(t)1,u(0)=1,u(T)=um,|u(t)|u,a.e.t(0,T)},(19) where umR, 0<um<1, u>0 are given constants. In what follows, we call the set U as the control set.

In what follows we use the standard notations for the Sobolev spaces Wm,p, Hm=Wm,2, H01 and the Lebesgue spaces Lp, 1p, mN. We denote by C([0,T];X) the space of X-valued continuous functions on [0,T] and by Lp(0,T;X) the space of X-valued Lp-Bochner integrable functions on (0,T). We denote by H1(0,T;X) the space of functions uL2(0,T;X) with dudtL2(0,T;X). X above is a Banach space.

We define the functional cost (20) J1(u)=12C(T,)Cref()L2(1,L)2,(20) where function Cref(x) represents a known reference (observed) mud filtrate dispersion. This dispersion can be experimentally determined by using reservoir resistivity measurements and resistivity-water saturation correlations [Citation5]. Our goal is to determine u=u that minimizes J on the set U. We introduce the following minimization problem: (21) infuUJ1(u),(21) where the control set U is given in (Equation19).

Let us consider the change of variable (22) C=y+LxL1.(22) The state system (Equation18), (Equation14), (Equation15) becomes (23) yt=x(a(u)yx)+b(u)yx+f(u),(t,x)Q,(23) (24) y(0,x)=y0(x),x(1,L),(24) (25) y(t,1)=y(t,L)=0,t(0,T).(25) The coefficients of Equation (Equation23) depend on x and t (the dependence on t is achieved by the control u). The key to us is the dependence of the coefficients of Equation (Equation23) on control u. Therefore, in order not to complicate the notations, we write (26) a(u)=Pe1xβuβ(t),(26) (27) b(u)=Pe1xβ1uβ(t)x1u(t),(27) (28) f(u)=Pe1(β1)(L1)1xβ1uβ(t)(L1)1x1u(t),(28) (29) y0(x)=C0(x)+(L1)1(xL).(29) The functional cost (Equation20) takes the following form: (30) J(u)=12yu(T,)yref()L2(1,L)2,(30) where (31) yref(x)=Cref(x)LxL1(31) and yu is the solution of (Equation23)–(Equation25) corresponding to uU. Problem (Equation21) becomes (P) infuUJ(u),(P) where the control set is given by (Equation19). We call this minimization problem problem (P).

In the following, we will use the notations a(u), b(u), f(u) for the derivatives of the functions a, b, f with respect to u, calculated for u=u, namely: a(u):=βPe1xβ(u(t))β1,b(u):=βPe1xβ1(u(t))β1x1and f(u):=β(β1)Pe(L1)(u(t))β1xβ+11(L1)x.

Remark 2.1

From (Equation26), (Equation27), (Equation28) we obtain that the functions a(u), b(u), f(u) have the following properties:

(i) a(u), b(u), f(u),a(u),b(u),f(u),ax(u),bx(u),fx(u)L(Q) and the norms in L(Q) of these functions are bounded by positive constants that do not depend on uU. In what follows we use several times this property;

(ii) am>0 exists so that ama(u) a. e. (t,x)Q, ()uU;

(iii) the positive constants La,Lb and Lf exist so that for all u1, u2U we have (32) |a(u1)a(u2)|La|u1(t)u2(t)|,(32) (33) |b(u1)b(u2)|Lb|u1(t)u2(t)|,(33) (34) |f(u1)f(u2)|Lf|u1(t)u2(t)|,(34) for all x[1,L] and a.e. t(0,T);

(iv) conditions of the types (Equation32), (Equation33) and (Equation34) also occur for the derivatives a,b and f with Lipschitz constants La, Lb and Lf respectively.

The structure of this section is the following: first we prove the existence of the solution of the state system (Equation18), (Equation14), (Equation15). Then, we prove the existence of an optimal control u that minimizes the functional cost (Equation30). In order to obtain the necessary condition of optimality, we introduce the system of first-order variations, we prove the existence and the unicity of the solution of this system and we highlight the connection that exists between the state system and the first order variations system. At the end of this section, we introduce the dual system and we obtain the necessary condition of optimality.

2.1. Existence for the state system

Let us denote V=H01(1,L), H=L2(1,L) and V=H1(1,L) the dual of V. We identify H with its own dual and we have VHHV, with continuous and dense embeddings. In what follows, we denote φt,φx the partial derivative of the function φ(t,x) with respect to t and x and φL(Q)=φ for φL(Q). For convenience, we shall not write the arguments of the function in the integrands.

Definition 2.1

A function yL2(0,T;V) with dydtL2(0,T;V) is a solution of problem (Equation23)–(Equation25) if (35) 0Tdydt(t),ψ(t)V,Vdt+0T1L(a(u)yxψxb(u)yxψ)dxdt=0T1Lf(u)ψdxdt,forallψL2(0,T;V)(35) and (36) y(0)=y0.(36)

We note that the conditions φL2(0,T;V) and dφdtL2(0,T;V) imply that φC([0,T],H) and therefore (Equation36) makes sense.

We consider the family of operators A(t):VV, defined on V, a.e. t(0,T) by (37) A(t)y,ψV,V=1L(a(u)yxψx(t)b(u)yxψ)dx,()ψV(37) and introduce the Cauchy problem (38) dydt(t)+A(t)y(t)=f(u)(t),a.e.t(0,T)(38) (39) y(0)=y0.(39) Equation (Equation38) can be written as (40) dydt(t),ψV,V+A(t),ψV,V=f(u),ψV,Va.e.t(0,T),()ψV.(40) The problems (Equation38)–(Equation39) and (Equation23)–(Equation25) are equivalent [Citation6,Citation7].

Theorem 2.1

Let y0H. Then for every uU, the problem (Equation23)–(Equation25) has a unique solution yu, (41) yuC([0,T];H)L2(0,T;V)H1(0,T;V)(41) which satisfies the following estimate: (42) supt[0,T]yu(t)H2+0Tyu(t)V2dtC,(42) (43) 0Tdyudt(t)V2dtC1,(43) where the constants C and C1 depend on T, on the structure of the system (Equation23)–(Equation25) and on the norm of the initial data (Equation24). Moreover if uiU,i=1,2 and yui,i=1,2 are the corresponding solutions of the state system then the estimate (44) yu1yu2L(0,T;H)2+yu1yu2L2(0,T;V)2C2u1u22,(44) takes place, where C2 depends only on L, T and on the structure of the system (Equation23)–(Equation25).

Proof.

From (Equation28) and (Equation19), we obtain that fuW1,(0,T;C[1,L]), for all uU. It is easy to see that the family of operators defined by (Equation37) has the following properties:

(i) A(t) is linear and continuous from V to V, (45) A(t)yVC3yV,forallt[0,T],(45) where C3 is a positive constant which depends only on the norms of the coefficients a(u) and b(u) (see Remark 2.1, i);

(ii) ϖ,γ>0 exist such that we have (46) A(t)y,yV,VϖyV2γyH2,(46) for all yV and a.e. t(0,T). The existence and uniqueness of the solution of the problem (Equation23)–(Equation25) is now obtained from a standard result [Citation8, Theorem 2, p.513]. In order to obtain the estimate (Equation42) we test (Equation38) at yuL2(0,T;V), we integrate on (0,t) and we use Gronwall's lemma.

In order to obtain the estimate (Equation43), we start from Equation (Equation38) and we obtain (47) 0Tdyudt(t)V2dt20Tf(u)V2dt+20TA(t)yu(t)V2dt.(47) The estimate (Equation43) results from (Equation47) if we take into account the estimates (Equation45) and (Equation42) and the Remark 2.1i.

The goal next is to establish the estimate (Equation44). If u1,u2U and yu1,yu2 are the corresponding solutions of the state system (Equation23)–(Equation25), we have (48) dyuidt(t)+Ai(t)yui(t)=f(ui),a.e.t(0,T),i=1,2(48) (49) yui(0)=y0,i=1,2,(49) where Aj(t)=1L(a(uj)yxψx(t)b(uj)yxψ)dx,()ψV,j=1,2.Subtracting the equations and the initial conditions corresponding to these two Cauchy problems (Equation48)–(Equation49) we get (50) ddt(yu1yu2)(t)+A1(t)(yu1yu2)(t)+(A1(t)A2(t))yu2(t)=f(u1)f(u2),a.e.t(0,T),(50) (51) (yu1yu2)(0)=0.(51) We test (Equation50) for yu1yu2 and integrate on (0,t). We perform the same calculations we made when we got the estimate (Equation42) and we obtain (Equation44) where (52) C2=exp(am+bxu+2)min{1;am}{(La2am+Lb2)C+Lf2(L1)T},(52) and C is the constant which appears in (Equation42).

2.2. Existence in (P)

In this section, we show that the minimization problem (P) subject to (Equation23)–(Equation25) where the cost functional is given by (Equation30) and the set U is given by (Equation19) has a solution.

Theorem 2.2

The problem (P) has at least one solution u with the corresponding state (53) yC([0,T];H)L2(0,T;V)H1(0,T;V).(53)

Proof.

The functional J has an infimum because J(u)0 for all uU. Let us denote (54) d=infuUJ(u).(54) It is clear that d0. Let us consider a minimizing sequence (un)n1, unU and (yun)n1 the corresponding sequence state. Then we have (55) d12yun(T,)yref()L2(1,L)2d+1n.(55) The function yn is the unique solution of the Cauchy problem (56) dyundt(t)+A(t)yun(t)=f(un),a.e.t(0,T)yun(0)=y0(56) and verifies the conditions: (57) 0Tdyundt(t),ψ(t)V,Vdt+0T1L(a(un)yxunψxb(un)yxunψ)dxdt=0T1Lf(un)ψdxdt,forallψL2(0,T;V),(57) (58) yun(0)=y0.(58) From Theorem 2.1 we obtain that for each nN the solution yun of (Equation23)–(Equation25) exists and is unique and from (Equation42) and (Equation43) we obtain (59) yun(t)H2+0tyunV2dsC,a.e.t(0,T)(59) and (60) 0Tdyundt(t)V2dtC1,(60) where C,C1 are positive constants that do not depend on un. We obtain from (Equation59) that the sequence (yun)n is bounded in L(0,T;H)L2(0,T;V) and from (Equation60) we obtain that the sequence (dyundt)n is bounded in L2(0,T;V). From these and from (un)nU we obtain that (eventually passing to subsequences): (61) unuweakstarinL(0,T),asn,(61) (62) dundtdudtweakstarinL(0,T),asn.(62) (63) yunyweakstarinL(0,T;H),asn,(63) (64) yunyweaklyinL2(0,T;V),asn,(64) (65) dyundtdydtweaklyinL2(0,T;V),asn.(65) From the definition of the set U we obtain that uU. From (Equation61), (Equation62) and Arzelà's theorem we obtain that (66) un(t)u(t)uniformlyon[0,T].(66) From (Equation64), (Equation65) and from Aubin–Lions' lemma (Théorème 1.20, [Citation8, p.58], [Citation9]) we reach the conclusion that (67) yunystronglyinL2(0,T;H).(67) In what follows, we show that y is the solution of the problem (Equation23), (Equation25) which corresponds to u=u i.e. y verifies (68) 0Tdydt(t),ψ(t)V,Vdt+0T1L(a(u)yxψxb(u)yxψ)dxdt=0T1Lf(u)ψdx,dt,forallψL2(0,T;V),(68) (69) y(0)=y0.(69) First, we can easily see that we obtain from (Equation65) that (70) limn0Tdyundt(t),ψ(t)V,Vdt=0Tdydt(t),ψ(t)V,Vdt.(70) We write (71) 0T1L(a(un)yxuna(u)yx)ψxdxdt=0T1L(a(un)a(u))yxunψxdxdt+0T1La(u)(yxunyx)ψxdxdt,(71) in order to show that the second term in the left-hand side of (Equation57) converges for n to the left-hand side of (Equation68). From (Equation64) we obtain that the second term in the right-hand side of (Equation71) converges to zero. From (Equation32), we obtain |0T1L(a(un)a(u))yxunψxdxdt|0T1L|a(un)a(u)||yxun||ψx|dxdtLaunuyxunL2(0,T;V)ψL2(0,T;V),for every ψL2(0,T;V). We obtain from (Equation42) and from the previous inequality that limn0T1L(a(un)a(u))yxunψxdxdt=0,and from (Equation71) we reach the conclusion that (72) limn0T1La(un)yxunψxdxdt=0T1La(u)yxψxdxdt.(72) Similarly we get (73) limn0T1Lb(un)yxunψxdxdt=0T1Lb(u)yxψxdxdt,(73) (74) limn0T1Lf(un)ψdxdt=0T1Lf(u)ψdxdt.(74) Passing to the limit in (Equation57) for n we obtain (Equation68) and thus y is the solution of the problem (Equation23)-(Equation25) corresponding to u=u. The fact that y verifies the initial condition (Equation24) follows from the Arzelà–Ascoli theorem [Citation10, Theorem 3.1, p.55]. From (Equation44) and (Equation66) we obtain that yny strongly in C([0,T];H). We reach the conclusion that yn(t)y(t)stronglyinH,uniformlyon[0,T],from where we obtain that (75) y(T)=limnyn(T).(75) We pass to the limit in (Equation55) as n. From (Equation75) and from the weakly lower semicontinuity of the norm H we get (76) J(u)liminfn12yun(T,)yref()L2(1,L)2=limn12yun(T,)yref()L2(1,L)2=d(76) so u is a solution of problem (P).

2.3. The system of first-order variations

The results given by Theorem 2.1 allow us to introduce the control-to-state mapping S [Citation11]. We define (77) X:=L(0,T),Y:=C([0,T];H)L2(0,T;V),(77) (78) S:UXY,S(u):=yu,(78) where yu is the unique solution of the problem (Equation23)–(Equation25). Let u be the solution of the problem (P), y=S(u) the solution of the problem (Equation23)-(Equation25) corresponding to u=u, λ(0,1), uU and let us denote (79) uλ(t)=u(t)+λw(t),a.e.t(0,T),(79) where w=uu. It is clear that uλU, wW1,(0,T) and |w(t)|2, a.e. t(0,T).

Let us consider the system: (80) zt(a(u)zx)xb(u)zx=(a(u)yx)xw+b(u)yxw+f(u)w,(t,x)Q,z(0,x)=0,x(1,L),z(t,1)=z(t,L)=0,a.e.t(0,T).(80) We denote (Equation80) the first-order variation system.

Theorem 2.3

For every wW1,(0,T) the system (Equation80) has a unique solution (81) zC([0,T];H)L2(0,T;V)H1(0,T;V),(81) which satisfies the estimate (82) supt[0,T]z(t)H2+0Tz(t)V2dtC4wX2,(82) where the positive constant C4 depends only on the structure of the system (Equation80).

Proof.

Taking into account that yL2(0,T;V) we have 0T1L(a(u)wyx)24uMa(u)L(Q)0TyxHdt,from where we obtain that a(u)wyxL2(0,T;H). In a similar way, we prove that b(u)wyxL2(0,T;H) and f(u)wL2(0,T;H). The family of operators A(t):VV, defined on V, a.e. t(0,T), (83) A(t)y,ψV,V=1L(a(u)yxψxb(u)yxψ)dx,()ψV(83) has the properties (i) and (ii) from Theorem 2.1. The existence and uniqueness of the solution of the system (Equation80) now result from Lions' theorem [Citation8, Theorem 2, p.513]. In order to obtain the estimate (Equation82) we follow the steps that we made when proving the estimate (Equation42).

Remark 2.2

Let X=L(0,T), Y=C([0,T];H)L2(0,T;V). We define the linear mapping (84) G:XY,XwG(w):=z(84) where z is the unique solution of the system of first-order variations (Equation80). Then the inequality (Equation82) leads us to the inequality (85) G(w)YC4wX.(85) In particular (Equation85) means that the linear map D is continuous from X to Y.

Let yλ be the solution of (Equation23)–(Equation25) corresponding to u=uλ and let (86) zλ=yλyλ.(86) From (Equation44), we obtain (87) 0tzxλH2dτ1λC2uλuX2=CwX2,(87) and it is easy to see that zλC([0,T];H)L2(0,T;V)H1(0,T;V) is the unique solution of the following problem: ztλ=(a(uλ)zxλ)x+b(uλ)zxλ+(a(uλ)a(u)λyx)x+b(uλ)b(u)λyx+f(uλ)f(u)λ, (88) zλ(0,x)=0,x(1,L),(88) zλ(t,1)=zλ(t,L)=0,a.e.t(0,T).

Proposition 2.1

We have (89) limλ0zλzL(0,T;H)L2(0,T;V)=0,(89) where z is the unique solution of the system (Equation80).

Proof.

We obtain from (Equation80) and (Equation88) that the function zλz is the solution of the system (zλz)t=((a(uλ)a(u))zxλ)x+(a(u)(zλz)x)x+(b(uλ)b(u))zxλ+b(u)(zλz)x+((a(uλ)a(u)λa(u)w)yx)x+(b(uλ)b(u)λb(u)w)yx+f(uλ)f(u)λf(u)w, (90) zλ(0,x)=0,x(1,L),(90) zλ(t,1)=zλ(t,L)=0,a.e.t(0,T).The system (Equation90) is equivalent to the following Cauchy problem: (91) ddt(zλz)(t)+A(t)(zλz)(t)=g(t),a.e.t(0,T)(91) (92) (zλz)(0)=0,(92) where A(t)y(t),ψV,V=1L(a(u)yxψx(t)b(u)yxψ)dx,()ψVand gL2(0,T;V) is given by g(t),ψV,V=1L(b(uλ)b(u)a(uλ)+a(u))zxλψdx+1L(b(uλ)b(u)λb(u)wa(uλ)a(u)λ+a(u)w)yxψdx+1L(f(uλ)f(u)λf(u)w)ψdx,()ψV.We test (Equation91) for zλzL2(0,T;V) and we integrate on (0,t).We obtain: 12zλzH2+0t1La(u)((zλz)x)2dxdτ=0t1L(a(uλ)a(u))zxλ(zλz)xdxdτ+0t1L(b(uλ)b(u))zxλ(zλz)dxdτ120t1Lbx(u)(zλz)2dxdτ0t1L(a(uλ)a(u)λa(u)w)yx(zλz)xdxdτ+0t1L(b(uλ)b(u)λb(u)w)yx(zλz)dxdτ+0t1L(f(uλ)f(u)λf(u)w)(zλz)dxdτ.From (Equation32), (Equation33), (Equation34), (Equation87) and after a few calculations involving Cauchy's inequality we obtain (93) zλzH2+am0tzλzV2dτ(am+bx+32)0tzλzH2dτ+λ2wX4(2La2am+2Lb2++Lf2T2+(2La2am+Lb22)0tyxH2dτ).(93)

Gronwall's lemma, (Equation42), the inequality |w(t)|2uM, a.e. t(0,T) and Remark 2.1 i lead us to the estimate: (94) zλzH2+0tzλzV2dτλ2C5,(94) where the constants C5 depend only on the structure of the system (Equation23)–(Equation25). The result (Equation89) is obtained by passing to the limit in (Equation94) for λ0.

Remark 2.3

Proposition 2.1 implies that the map S given by (Equation78) is Gâteaux differentiable and its Gâteaux derivative is the map defined by (Equation84) (95) S(u)(w)=G(w),forallwX.(95)

We use this results in order to obtain the necessary condition of optimality.

2.4. The dual system and the necessary condition of optimality

First, in order to obtain the necessary condition of optimality we introduce the functional (96) J0:YR,J0(ψ):=121L(ψ(T,x)yref(x))2dx,(96) The functional cost J (Equation30) is written as (97) J:UR,J=J0S.(97) Recall that the map S is Gâteaux differentiable and its Gâteaux derivative S(u):XY is the map G defined by (Equation84). The chain rule for the Gâteaux differentiability shows us that the Gâteaux derivative of J calculated in u, J(u):XR is (98) J(u),wX,X=1L(y(T,x)yref(x))z(T,x)dx,(98) where z is the solution of system of first order variations (Equation80). Taking into account that U is convex and closed and J is Gâteaux differentiable, the necessary condition of optimality is [Citation12, Theorem 1-2.1, p.1180]: (99) J(u),uuX,X0foreveryuU.(99) From (Equation98) and (Equation99), we obtain that the necessary condition of optimality (100) 1L(y(T,x)yref(x))z(T,x)dt0(100) holds for every uU, where z=G(w) is the solution of system (Equation80) and w=uu.

We introduce the dual system: (101) pt=(a(u)px)x+(b(u)p)xinQ,(101) (102) p(T,x)=y(T,x)yref(x)in(1,L),(102) (103) p(t,1)=0,p(t,L)=0a.e.t(0,T).(103)

Theorem 2.4

The system (Equation101)–(Equation103) has a unique solution (104) pC([0,T],H)L2(0,T;V)H1(0,T;V).(104)

Proof.

We make the transformation τ=Tt and we use Lions' theorem [Citation8, Theorem 2, p.513].

Theorem 2.5

Let u be a solution of the problem (P), y=S(u) and p the solution of the dual system (Equation101)–(Equation103). Then u satisfies the necessary condition (105) 0T(u(t)u(t))Φ(t)dt0,(105) for all uU, where (106) Φ(t):=1L(a(u)pxyxb(u)pyxf(u)p)dx,a.e.t(0,T),(106) and p is the solution of the dual system (Equation101)–(Equation103).

Proof.

Let z be the unique solution of the system (Equation80). We have (107) 0Tzt(t),ψ(t)V,Vdt+0T1L(a(u)zxψxb(u)zxψ)dxdt=0T1La(u)wyxψxdxdt+0T1Lb(u)wyxψdxdt+0T1Lf(u)wψdxdt,forallψV,(107) (108) z(0,x)=0in(1,L),(108) and (109) 0Tpt(t),ψ(t)V,Vdt0T1L(a(u)pxψxb(u)pxψ)dxdt=0,forallψV,(109) (110) p(0,x)=y(t,x)yref(x)in(1,L).(110) If we write (Equation107) for ψ=p, we integrate by parts and use (Equation109) for ψ=z and sum those equalities we obtain (111) 1L(y(T,x)yref(x))z(T,x)dx=0T1La(u)wyxpxdxdt+0T1Lb(u)wyxpdxdt+0T1Lf(u)wpdxdt.(111) Condition (Equation105) is now obtained from (Equation111) and (Equation100).

From (Equation106) we obtain that 0T|Φ(t)|dt0T1L|a(u)||px||yx|dxdt+0T1L|b(u)||p||yx|dxdt+0T1L|f(u)||p|dxdt(a(u)+b(u))yL2(0,T;V)pL2(0,T;V)+f(u)(L1)TpL2(0,T;V),so ΦL1(0,T), and inequality (Equation105) implies that (112) Φ(t)N~U(u),(112) where (113) N~U(u)={wL1(0,T);0T(uu)wdt0foralluU}(113) is the normal cone in L1(0,T) to U at uU [Citation13, p.5].

In order to obtain the optimality condition (Equation105), (Equation106) in explicit form we follow the steps presented in [Citation14]. For θ:R[1,1] let us denote by signz the graph signz={1,on{z>0},[1,1],on{z=0},1,on{z<0}.The following result occurs:

Proposition 2.2

[Citation15, Proposition 2.9]

Let u the solution of problem (P), y=S(u) the solution of the state system corresponding to u. Then the optimality condition (Equation105) reads (114) ΦNU(u)L1(0,T),(114) where Φ is given by (Equation106). Moreover ΦNU(u)L1(0,T) if and only if it has the representation (115) Φ(t)=θ(t)+μ(t)inD(0,T),(115) (116) u(t)usign(θ(t))a.e.t(0,T),(116) where μ, θL1(0,T), (117) {μ(t)0a.e.in{t[0,T]:u(t)=um},μ(t)=0a.e.in{t[0,T]:u(t)(um,1)},μ(t)0a.e.in{t[0,T]:u(t)=1},(117) and (118) θ(t)={0a.e.in{t[0,T];|(u)(t)|<u}v(t)u(t)a.e.in{t[0,T];|(u)(t)|=u},(118) with νL1(0,T), ν0 a.e. t(0,T).

In what follows, we will see that in the case of Dirichlet–Neumann boundary conditions an explicit form of the optimal control u can be obtained.

3. Dirichlet–Neumann boundary conditions

In this section, we consider the following problem: (119) infuU1LC(T,x)dx,(119) where C(t,x) is the solution of the system (Equation18), (Equation14), (Equation15). With the above notations, this system can be written under the form: (120) Ct=(a(u)Cx)x+b(u)Cx,(t,x)Q,(120) (121) C(0,x)=0in(1,L),(121) (122) C(t,1)=1,Cx(t,L)=0in(0,T),(122) where a and b are given by (Equation26) and (Equation27), respectively.

Let us consider the change of function (123) C=y+1.(123) Problem (Equation119) becomes (P2) infuUJ(u),(P2) where (124) J(u)=1L(y(T,x)+1)dx(124) and y is the solution of the following problem: (125) yt=(a(u)yx)x+b(u)yx,(125) (126) y(0,x)=1in(1,L),(126) (127) y(t,1)=0;yx(t,L)=0in(0,T).(127) The definition of the control set U is the same as in Section 2.1. We call this minimization problem problem (P2).

We consider the following space: V0={vH1(1,L);v(1)=0},and we denote its dual by V0. If H=L2(1,L), then we have the continuous and dense embeddings V0HHV0.

Definition 3.1

A function yL2(0,T;V0) with yL2(0,T;V0) is a solution of problem (Equation125)–(Equation127) if (128) 0Tyt(t),ψ(t)V0,V0dt+0T1L(a(u)yxψxb(u)yxψ)dxdt=0(128) for all ψL2(0,T;V0) and (129) y(0)=1.(129)

The solution of (Equation125)–(Equation127) is the solution of the following Cauchy problem: (130) dydt(t)+A(t)y(t)=0,a.e.t(0,T),(130) (131) y(0)=1,(131) where the family of operators A(t):V0V0 is given by (Equation37).

Theorem 3.1

Let uU. The problem (Equation125)–(Equation127) has a unique solution yuC([0,T];H)L2(0,T;V0)H1(0,T;V0)satisfying the estimates (132) supt[0,T]yu(t)H2+0Tyu(t)V02dtC6,(132) (133) 0Tdyudt(t)V02dtC7,(133) and 1y(t,x)0 a.e. in (0,L) for all t[0,T].

Proof.

The existence and uniqueness of the solution of the problem (Equation125)–(Equation127), which has the properties (Equation132), (Equation133) is the same as in the proof of Theorem 2.1 from Section 2.1. In order to prove the negativity of the solution we consider its positive part y+=max{y,0}. We have to show that y+=0 a.e. on (1,L) for each t[0,T]. By using Stampacchia's lemma [Citation6, Corollary 2.15, p.289] we have that (y(t))+V0 a.e. t(0,T) and yx+={yxa.e.ony>00,a.e.ony0.We test (Equation130) for y+L2(0,T;V0) and integrate on (0,t). After some algebra we obtain (y(t))+H2+am0tyx+H2dτb2am0t(y(t))+H2dτ.This implies that (y(t))+H2b2am0t(y(τ))+H2dτand the use of Gronwall's lemma leads us to conclude that (y(t))+=0. This implies that y(t,x)0 a.e. (t,x)Q. Similarly we show that y(t,x)1 (t,x)Q. The fact that we have 1y(t,x)0 implies 0C(t,x)1 (see (Equation123)).

Theorem 3.2

Problem (P2) has at least one solution u with the corresponding state yC([0,T];H)L2(0,T;V0)H1(0,T;V0).

Proof.

The proof is the same as in Theorem 2.2.

We are now able to present the explicit form of the optimal control. In that follows we essentially use the result presented in [Citation15, Proposition 3.2].

Proposition 3.1

If (134) Pe(β+1)(β+2)2uMβ1,(134) then a solution u of the problem (P2) has the form (135) u(t)={u(0)utfort[0,t1)umfort[t1,t2)u(tT)+u(T)fort[t2,T],(135) where (136) t1=u(0)umu,t2=Tu(T)umu.(136) For uM, um, u, u(0), u(T) fixed the function u is unique.

Proof.

The necessary condition of optimality is obtained in the same way as in the case of Dirichlet type boundary conditions. This condition is: 0T(u(t)u(t))Φ(t)dt0,for all uU, where (137) Φ(t):=1L(a(u)pxb(u)p)yxdx,a.e.t(0,T),(137) and p is the solution of the dual system: (138) pt=(a(u)px)x+(b(u)p)x,(t,x)Q,(138) (139) p(T,x)=1,x(1,L),(139) (140) p(t,1)=px(t,L)=0,a.e.t(0,T).(140) According to Proposition 2.2, we have Φ(t)=θ(t)+μ(t)a.e.t(0,T),u(t)usign(θ(t))a.e.t(0,T).The sign of function Φ can be established as follows. We obtain from Theorem 3.1 that y(t,x)0 a.e. (t,x)Q and from (Equation127) we obtain yx(t,1)0 and yx(t,L)=0.

In order to establish the sign of yx we consider the sequence (y0,n)nNV0 so that y0,ny0=1 in H, y0,n(x)[1,0], y0,n(1)=0 and y0,n(x)0 a.e. x(1,L). Let us consider the problem (141) yt=(ayx)x+byx,(141) (142) y(0,x)=y0,n(x)in(1,L),(142) (143) y(t,1)=0;yx(t,L)=0in(0,T).(143) This problem has a unique solution (144) ynL(0,T;V0)L2(0,T;H2(1,L))H1(0,T;H)(144) (see [Citation16, Theorem 5, p.382]). In addition we have yn(t,x)[1,0] a.e. in Q [Citation8, Theorem 2, p.534, Theorem 3, p.535]. As previously done in the demonstration of Theorem 2.2 we show that (eventually passing to a subsequence) the sequence (yn)nN weakly converges in L2(0,T;V0) to the solution of the problem (Equation125)–(Equation127). Let yn and ym the solutions of (Equation141)–(Equation143) corresponding to y0,n and y0,m. Arguing as in the demonstration of (Equation44), Theorem 2.1, we obtain (145) ynymL(0,T;H)+ynymL2(0,T;V0)C8y0,ny0,mH.(145) From y0,ny0 strongly in H and (Equation145) we obtain that (yn)nN is Cauchy in L2(0,T;V0) so yny strongly in L2(0,T;V0). Hence, we obtain that yxnyx strongly in L2(0,T;H) and so (yxn)+(yx)+. It is easy to see that yxn is the weak solution of the problem (146) zt=(a(u)zx)x+(ax(u)+b(u))zx+(axx(u)+bx(u))z,(146) (147) z(0,x)=y0,n(x),(147) (148) z(t,1)0,z(t,L)=0.(148) If we argue as in Theorem 3.1 (or from [Citation8, Theorem 2, p.534]) we obtain yxn0, a.e. in Q. Hence, we get 0=(yxn)+(yx)+, so yx0 a.e. in Q.

If we make the transformation τ=Tt and we use Lions' theorem [Citation8, Theorem 2, p.513] we obtain that (Equation138)–(Equation140) has a unique solution pC(0,T;H)L2(0,T;V0)H1(0,T;V0)and p0 a.e. in Q [Citation8, Theorem 2, p.534]. From (Equation140) we obtain that px(t,1)0 and px(t,L)=0.

In order to obtain the sign of px we consider the sequence (p0,n)nNV0 so that p0,ny0=1 in H, p0,n(x)[0,1], p0,n(1)=0 and p0,n(x)0 a.e. x(1,L). Let us consider the problem (149) pt=(a(u)px)x+(b(u)p)x,(t,x)Q,(149) (150) p(T,x)=p0,n(x),x(1,L),(150) (151) p(t,1)=px(t,L)=0,a.e.t(0,T).(151) This problem has a unique solution (152) pnL(0,T;V0)L2(0,T;H2(1,L))H1(0,T;H),(152) [Citation16, Theorem 5, p.382]. In addition we have pn(t,x)[0,1] a.e. in Q [Citation8, Theorem 2, p.534, Theorem 3, p.535]. Let vn=pxn. Then vn is the solution of the following problem: (153) vtn=(a(u)vxn)x+(ax(u)+b(u))vxn+(axx(u)+2bx(u))vn+bxx(u)pn,(t,x)Q,(153) (154) vn(T,x)=p0,n(x),x(1,L),(154) (155) vn(t,1)0,vn(t,L)=0,a.e.t(0,T).(155) If we take τ=Tt, problem (Equation153)–(Equation155) become (156) vtn=(a(u)vxn)x+(ax(u)b(u))vxn+(axx(u)2bx(u))vnbxx(u)pn,(τ,x)Q,(156) (157) vn(0,x)=p0,n(x),x(1,L),(157) (158) vn(τ,1)0,vn(τ,L)=0,a.e.τ(0,T).(158) We multiply (Equation156) by v and integrate on (0,t)×(1,L). After some algebra we obtain 12(vn(t))H2+am0t(vxn(τ))H2dτax(u)b(u)0t(vxn(τ))H(vn(τ))Hdτ+axx(u)2b(x)u0t(vn(τ))H2dτ+0t1Lbxx(u)pn(vn)dxdτ.

Condition (Equation134) assures us that bxx(u)0. Due to the fact that pn0 we obtain that the last term in the right member of the last inequality is negative. Cauchy's inequality leads us to (159) (vn(t))H2+am0t(vxn(τ))H2dτ(axbam+2axx2bx)0t(vn(τ))H2dτ.(159) The use of Gronwall's lemma leads us to conclude from (Equation159) that (vn(t))=0. This implies that pxn=vn0 a.e. on Q. We note that from (Equation134) we get that b(u)0 a.e. on Q. If we argue as before we obtain that pnp strongly in L2(0,T;V0), where p is the solution of (Equation138)–(Equation140). Hence, we reach the conclusion that pxnpx strongly in L2(0,T;H) and so pxn=(pxn)+(px)+ strongly in L2(0,T;H). We obtain that px=(px)+ so px0 a.e. in Q. From (Equation137) we obtain that Φ(t)>0 for all t(0,T). The expression (Equation135) of the optimal control u now results from [Citation15, Proposition 3.2].

4. Numerical results

In this section, we present some numerical results. Our objective is to highlight two main aspects:

  1. presenting the way the mud filtrate dispersion varies in the invaded (damaged) zone and of the mud cake growth;

  2. the use of formula (Equation135) in order to obtain the mud filtrate dispersion.

In order to achieve these goals we consider the wellbore geometry and the physical properties of the reservoir and drilling mud shown in [Citation1,Citation17], for wells no. 1 to 3 and [Citation18], for well no. 4. (see Tables  and ). We take the values α=51.7 and β=1.25 for the coefficients α and β from formula (Equation9). Thus we obtain (β+1)(β+2)uMβ1/2=3.656 (we use dimensionless values so uM=1). In order to obtain the mud filtrate dispersion and the mudcake growth we use the linear single phase mud filtrate invasion model (Equation1), (Equation2), (Equation5), (Equation6) with Dirichlet–Neumann boundary conditions (Equation8). We made the calculations only for the first well and for T = 528 hours. The results are shown in Figures  and . In order to use the formula (Equation135) we need the values of parameters uM, um, and u. From the four wells we obtained these values from formula (Equation3) and they are presented in Table . From β=1.25 we obtain (β+1)(β+2)uMβ1/2=3.656 (we use dimensionless values so uM=1). Condition (Equation134) is satisfied only by the first three wells. The values of filtration rate u are presented in Figures  and . We calculate the mud filtrate dispersion by solving the mixed problem (Equation5), (Equation6), (Equation8). These values are presented in Figures  and . Let C1 and C2 the mud filtrate dispersion determined by using for the filtration rate u, the formulas (Equation135) and (Equation3), respectively. In order to compare these values of mud filtrate dispersion we use the formula (160) ΔC=maxt[0,T]|C1(T,x)C2(T,x)|.(160) The results obtained are presented in Table . We performed all the calculations using Octave.

Figure 2. Mud filtrate dispersion: Dirichlet–Neumann boundary condition, well no. 1.

Figure 2. Mud filtrate dispersion: Dirichlet–Neumann boundary condition, well no. 1.

Figure 3. Mudcake growth: Dirichlet–Neumann boundary conditions, well no. 1.

Figure 3. Mudcake growth: Dirichlet–Neumann boundary conditions, well no. 1.

Figure 4. The optimal control (filtration rate) for Dirichlet–Neumann boundary conditions, well no 1: red dashed line – optimal control obtained with formulas (Equation3); blue line – optimal control obtained with formula (Equation135).

Figure 4. The optimal control (filtration rate) for Dirichlet–Neumann boundary conditions, well no 1: red dashed line – optimal control obtained with formulas (Equation3(3) u(t)=uMkckln⁡rerwkckln⁡rerw−ln⁡(1−ξc(t)rw),(3) ); blue line – optimal control obtained with formula (Equation135(135) u∗(t)={u(0)−u∞tfort∈[0,t1)umfort∈[t1,t2)u∞(t−T)+u(T)fort∈[t2,T],(135) ).

Figure 5. Mud filtrate dispersion values, well no 1: red dashed line – optimal control obtained with formulas (Equation3); blue line – optimal control obtained with formula (Equation135).

Figure 5. Mud filtrate dispersion values, well no 1: red dashed line – optimal control obtained with formulas (Equation3(3) u(t)=uMkckln⁡rerwkckln⁡rerw−ln⁡(1−ξc(t)rw),(3) ); blue line – optimal control obtained with formula (Equation135(135) u∗(t)={u(0)−u∞tfort∈[0,t1)umfort∈[t1,t2)u∞(t−T)+u(T)fort∈[t2,T],(135) ).

Figure 6. The optimal control (filtration rate) for Dirichlet–Neumann boundary conditions, well no 2: red dashed line – optimal control obtained with formulas (Equation3); blue line – optimal control obtained with formula (Equation135).

Figure 6. The optimal control (filtration rate) for Dirichlet–Neumann boundary conditions, well no 2: red dashed line – optimal control obtained with formulas (Equation3(3) u(t)=uMkckln⁡rerwkckln⁡rerw−ln⁡(1−ξc(t)rw),(3) ); blue line – optimal control obtained with formula (Equation135(135) u∗(t)={u(0)−u∞tfort∈[0,t1)umfort∈[t1,t2)u∞(t−T)+u(T)fort∈[t2,T],(135) ).

Figure 7. Mud filtrate dispersion values, well no 2: red dashed line – optimal control obtained with formulas (Equation3); blue line – optimal control obtained with formula (Equation135).

Figure 7. Mud filtrate dispersion values, well no 2: red dashed line – optimal control obtained with formulas (Equation3(3) u(t)=uMkckln⁡rerwkckln⁡rerw−ln⁡(1−ξc(t)rw),(3) ); blue line – optimal control obtained with formula (Equation135(135) u∗(t)={u(0)−u∞tfort∈[0,t1)umfort∈[t1,t2)u∞(t−T)+u(T)fort∈[t2,T],(135) ).

Figure 8. The optimal control (filtration rate) for Dirichlet–Neumann boundary conditions, well no 3: red dashed line – optimal control obtained with formulas (Equation3); blue line – optimal control obtained with formula (Equation135).

Figure 8. The optimal control (filtration rate) for Dirichlet–Neumann boundary conditions, well no 3: red dashed line – optimal control obtained with formulas (Equation3(3) u(t)=uMkckln⁡rerwkckln⁡rerw−ln⁡(1−ξc(t)rw),(3) ); blue line – optimal control obtained with formula (Equation135(135) u∗(t)={u(0)−u∞tfort∈[0,t1)umfort∈[t1,t2)u∞(t−T)+u(T)fort∈[t2,T],(135) ).

Figure 9. Mud filtrate dispersion values, well no 3: red dashed line – optimal control obtained with formulas (Equation3); blue line – optimal control obtained with formula (Equation135).

Figure 9. Mud filtrate dispersion values, well no 3: red dashed line – optimal control obtained with formulas (Equation3(3) u(t)=uMkckln⁡rerwkckln⁡rerw−ln⁡(1−ξc(t)rw),(3) ); blue line – optimal control obtained with formula (Equation135(135) u∗(t)={u(0)−u∞tfort∈[0,t1)umfort∈[t1,t2)u∞(t−T)+u(T)fort∈[t2,T],(135) ).

Table 1. Well data, Windarto et al. [Citation1], wells 1 to 3, and Wu et al. [Citation18], well 4.

Table 2. Additional parameters, Windarto et al. [Citation1], wells 1 to 3, and Wu et al. [Citation18], well 4.

Table 3. The values of parameters uM, um, u, T and Pe.

Table 4. Comparison of mud filtrate dispersion values (formula (Equation160)).

We find that condition (Equation134) is fulfilled only for the first three wells. The optimal control u obtained with formulas (Equation160) (red line) and (Equation135), respectively (blue line), are presented in Figures .

5. Conclusion

In this paper, we have studied two inverse problems related to the invasion phenomenon. Our goal was to obtain as much information about the invasion rate as possible, if we do not have complete information about the values of all the physical quantities that appear in the mathematical model that describes the invasion phenomenon. We reduced these identification problems to two optimal control problems (minimization problems) in which the control is the invasion rate. We prove the existence of the solution of the state systems and the existence solution of minimization problems. We introduce the first-order variation systems, the dual systems and we prove that these systems have unique solutions. For each of the two problems we obtain the necessary condition of optimality by using the dual system. For the second problem we obtain a simple explicit form of control (filtration rate). We apply this explicit form of control in order to obtain the variation of the invasion rate using the data of three wells. Calculations can be made only if we know the values of Pe, uM, um, and u. Regarding the value u we can get information on the upper bound of this quantity (by using the formulas  (Equation3) and (Equation1)).

Acknowledgements

The author thanks the anonymous reviewers for the observations of an earlier form of this paper. The author acknowledges that the work of this paper was done during the doctoral internship at SCOSAAR, Romanian Academy.

Disclosure statement

No potential conflict of interest was reported by the author(s).

References

  • Windarto, Gunawan AY, Sukarno P, et al. Modeling of formation damage due to mud filtrate invasion in a radial flow system. J Pet Sci Eng. 2012;100:99–105.
  • Civan F. Reservoir formation damage. Fundamentals, assessment, and mitigation. Amsterdam: Elsevier; 2007.
  • Donaldson EC, Chernoglazov V. Characterization of drilling mud fluid invasion. J Pet Sci Eng. 1987;1:3–13.
  • Parn-anurak S, Engler TW. Modeling of fluid filtration and nearwellbore damage along a horizontal well. J Pet Sci Eng. 2005;46:149–160.
  • Fertl WH. Log-derived evaluation of shaly classic reservoirs. J Pet Technol. 1987;39(2):175–187.
  • Marinoschi G. Functional approach to nonlinear models of water flow in soils. Dordrecht: Springer; 2006.
  • Marinoschi G, Favini A. Degenerate nonlinear diffusion equation. Berlin: Springer; 2012.
  • Dautray R, Lions JL. Mathematical analysis and numerical methods for science and technology. Vol. 5. Berlin: Springer-Verlag; 1992.
  • Aubin JP. Une théorème de compacité. C R Acad Sci Paris Série I. 1963;256:5042–5044.
  • Lang S. Real analysis. London: Addison-Wesley Publishing Company; 1983.
  • Colli P, Gilardi G, Marinoschi G. A boundary control problem for a possibly singular phase field system with dynamic boundary conditions. J Math Anal Appl. 2016;434:432–463.
  • Oden JT, Kikuchy T. Theory of variational inequalities with applications to problems of flow through porous media. Int J Engng Sci. 1980;18:1173–1284.
  • Barbu V. Mathematical methods in optimization of differential systems. Dordrecht: Kluwer Academic Publishers; 1994.
  • Marinoschi G, Mininni RM, Romanelli S. An optimal control problem in coefficients for a strongly degenerate parabolic equation with interior degeneracy. J Optim Theory Appl. 2017;173:56–77.
  • Fragnelli G, Marinoschi G, Mininni RR, et al. Identification of a diffusion coefficient in strongly degenerate parabolic equations with interior degeneracy. J Evol Equ. 2014;15(1):27–51.
  • Evans LC. Partial differential equations. Providence (RI): American Mathematical Society; 2010.
  • Boaca T, Malureanu I. Determination of oil reservoir permeability from resistivity measurement: a parabolic identification problem. J Pet Sci Eng. 2017;153:345–354.
  • Wu J, Torres-Verdin C, Sempehrnoori K, et al. The influence of water-base mud properties and petrophysical parameters on mudcake growth, filtrate invasion, and formation pressure. Petrophysics. 2005;46(1):14–32.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.