SlideShare a Scribd company logo
Tetrahedral mesh generation

        Robustness test




           Schlumberger public   1
Behind the scene – Tetrahedral Mesh Generation
• Maybe the only volume representation that can:
     Be used as a support for dynamic computations/processings
     Capture the full complexity of a geological model
     Be easily locally/globally adapted to a given problem




                                                                      Schlumberger public
                                                                  2
Behind the scene – Tetrahedral Mesh Generation




                                                          Schlumberger public
                                Fine grained control of
                                mesh anisotropy and
                                heterogeneity



                                                    3
Behind the scene – Tetrahedral Mesh Generation

 Unstructured mesh
                                          Input data
 generation robustness test




                                                         Schlumberger public
                                   532 random
                                   fractures, 3 faults
                                                    4
Behind the scene – Tetrahedral Mesh Generation

     Random angles,
     random intersections                        Input data




                                                              Schlumberger public
                No preprocessing of input data
                                                          5
Behind the scene – Tetrahedral Mesh Generation

                                 Unstructured mesh construction




                                                                      Schlumberger public
 ~300k
 elements




    A large majority of elements have a nice shape/aspect ratio
                                                                  6
Behind the scene – Tetrahedral Mesh Generation

 [Solid slice through the mesh]       Unstructured mesh construction




                                                                            Schlumberger public
       All fractures are represented by triangular facets in the mesh   7
Behind the scene – Tetrahedral Mesh Generation

                               Unstructured mesh construction




                                                                    Schlumberger public
       Integrating fauted horizon surfaces into the mesh        8
Behind the scene – Tetrahedral Mesh Generation


   [Upper layer hidden (transparent)]




                                                                      Schlumberger public
     Tetrahedral mesh containing fractures, faults and horizons   9

More Related Content

Viewers also liked

Reservoir Simulation
Reservoir SimulationReservoir Simulation
Reservoir SimulationModesty Jnr.
 
Sherritt(2009)Advances In Steady State Process Modeling Of Oil Shale Retorting
Sherritt(2009)Advances In Steady State Process Modeling Of Oil Shale RetortingSherritt(2009)Advances In Steady State Process Modeling Of Oil Shale Retorting
Sherritt(2009)Advances In Steady State Process Modeling Of Oil Shale Retortingrsherritt
 
Source Rock Engineering Simulation Slides
Source Rock Engineering Simulation SlidesSource Rock Engineering Simulation Slides
Source Rock Engineering Simulation Slides
SHennings
 
Motion blur photography-(catherine)
Motion blur photography-(catherine)Motion blur photography-(catherine)
Motion blur photography-(catherine)Catherine Dewilde
 
Vanishing point slideshow
Vanishing point slideshowVanishing point slideshow
Vanishing point slideshow
Brooke Nelson
 
Surfactant flooding reservoir simulation
Surfactant flooding reservoir simulationSurfactant flooding reservoir simulation
Surfactant flooding reservoir simulation
Hesham Mokhtar Ali
 
Motion blur
Motion blurMotion blur
Motion blur
changehee lee
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and Radiosity
Michael Heron
 
Mesh generation in CFD
Mesh generation in CFDMesh generation in CFD
Mesh generation in CFD
George Mathew Thekkekara
 
Convex Hull - Chan's Algorithm O(n log h) - Presentation by Yitian Huang and ...
Convex Hull - Chan's Algorithm O(n log h) - Presentation by Yitian Huang and ...Convex Hull - Chan's Algorithm O(n log h) - Presentation by Yitian Huang and ...
Convex Hull - Chan's Algorithm O(n log h) - Presentation by Yitian Huang and ...
Amrinder Arora
 
Quadtree In Game
Quadtree In GameQuadtree In Game
Quadtree In Game
Dương Nyl
 
Petrel introduction course guide
Petrel introduction course guidePetrel introduction course guide
Petrel introduction course guide
Marc Diviu Franco
 
Development of Oil and Gas in Pennsylvania Where Subsurface Owners Are Unknow...
Development of Oil and Gas in Pennsylvania Where Subsurface Owners Are Unknow...Development of Oil and Gas in Pennsylvania Where Subsurface Owners Are Unknow...
Development of Oil and Gas in Pennsylvania Where Subsurface Owners Are Unknow...
Lisa McManus
 
Greedy Algorithms
Greedy AlgorithmsGreedy Algorithms
Greedy Algorithms
Amrinder Arora
 
Semester Project in Reservoir Simulation
Semester Project in Reservoir SimulationSemester Project in Reservoir Simulation
Semester Project in Reservoir SimulationKonstantinos D Pandis
 
gsm based led scrolling board ppt
gsm based led scrolling board pptgsm based led scrolling board ppt
gsm based led scrolling board ppt
sodabathula gandhi
 
3D Facies Modeling
3D Facies Modeling3D Facies Modeling
3D Facies Modeling
Marc Diviu Franco
 

Viewers also liked (18)

Reservoir Simulation
Reservoir SimulationReservoir Simulation
Reservoir Simulation
 
Sherritt(2009)Advances In Steady State Process Modeling Of Oil Shale Retorting
Sherritt(2009)Advances In Steady State Process Modeling Of Oil Shale RetortingSherritt(2009)Advances In Steady State Process Modeling Of Oil Shale Retorting
Sherritt(2009)Advances In Steady State Process Modeling Of Oil Shale Retorting
 
Source Rock Engineering Simulation Slides
Source Rock Engineering Simulation SlidesSource Rock Engineering Simulation Slides
Source Rock Engineering Simulation Slides
 
Motion blur photography-(catherine)
Motion blur photography-(catherine)Motion blur photography-(catherine)
Motion blur photography-(catherine)
 
Vanishing point slideshow
Vanishing point slideshowVanishing point slideshow
Vanishing point slideshow
 
Surfactant flooding reservoir simulation
Surfactant flooding reservoir simulationSurfactant flooding reservoir simulation
Surfactant flooding reservoir simulation
 
Motion blur
Motion blurMotion blur
Motion blur
 
GRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and RadiosityGRPHICS08 - Raytracing and Radiosity
GRPHICS08 - Raytracing and Radiosity
 
Shale & tight reservoir simulation cmg
Shale & tight reservoir simulation cmgShale & tight reservoir simulation cmg
Shale & tight reservoir simulation cmg
 
Mesh generation in CFD
Mesh generation in CFDMesh generation in CFD
Mesh generation in CFD
 
Convex Hull - Chan's Algorithm O(n log h) - Presentation by Yitian Huang and ...
Convex Hull - Chan's Algorithm O(n log h) - Presentation by Yitian Huang and ...Convex Hull - Chan's Algorithm O(n log h) - Presentation by Yitian Huang and ...
Convex Hull - Chan's Algorithm O(n log h) - Presentation by Yitian Huang and ...
 
Quadtree In Game
Quadtree In GameQuadtree In Game
Quadtree In Game
 
Petrel introduction course guide
Petrel introduction course guidePetrel introduction course guide
Petrel introduction course guide
 
Development of Oil and Gas in Pennsylvania Where Subsurface Owners Are Unknow...
Development of Oil and Gas in Pennsylvania Where Subsurface Owners Are Unknow...Development of Oil and Gas in Pennsylvania Where Subsurface Owners Are Unknow...
Development of Oil and Gas in Pennsylvania Where Subsurface Owners Are Unknow...
 
Greedy Algorithms
Greedy AlgorithmsGreedy Algorithms
Greedy Algorithms
 
Semester Project in Reservoir Simulation
Semester Project in Reservoir SimulationSemester Project in Reservoir Simulation
Semester Project in Reservoir Simulation
 
gsm based led scrolling board ppt
gsm based led scrolling board pptgsm based led scrolling board ppt
gsm based led scrolling board ppt
 
3D Facies Modeling
3D Facies Modeling3D Facies Modeling
3D Facies Modeling
 

Recently uploaded

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Tetrahedral mesh generation - robustness test

  • 1. Tetrahedral mesh generation Robustness test Schlumberger public 1
  • 2. Behind the scene – Tetrahedral Mesh Generation • Maybe the only volume representation that can:  Be used as a support for dynamic computations/processings  Capture the full complexity of a geological model  Be easily locally/globally adapted to a given problem Schlumberger public 2
  • 3. Behind the scene – Tetrahedral Mesh Generation Schlumberger public Fine grained control of mesh anisotropy and heterogeneity 3
  • 4. Behind the scene – Tetrahedral Mesh Generation Unstructured mesh Input data generation robustness test Schlumberger public 532 random fractures, 3 faults 4
  • 5. Behind the scene – Tetrahedral Mesh Generation Random angles, random intersections Input data Schlumberger public No preprocessing of input data 5
  • 6. Behind the scene – Tetrahedral Mesh Generation Unstructured mesh construction Schlumberger public ~300k elements A large majority of elements have a nice shape/aspect ratio 6
  • 7. Behind the scene – Tetrahedral Mesh Generation [Solid slice through the mesh] Unstructured mesh construction Schlumberger public All fractures are represented by triangular facets in the mesh 7
  • 8. Behind the scene – Tetrahedral Mesh Generation Unstructured mesh construction Schlumberger public Integrating fauted horizon surfaces into the mesh 8
  • 9. Behind the scene – Tetrahedral Mesh Generation [Upper layer hidden (transparent)] Schlumberger public Tetrahedral mesh containing fractures, faults and horizons 9