Download Free Log Data Acquisition And Book in PDF and EPUB Free Download. You can read online Log Data Acquisition And and write the review.

While the first well logs recorded seventy years ago had no provision for data quality control, the development of increasingly sophisticated logging techniques has led to the introduction of a large number of tests to validate acquired data. Log quality can be assured by stringent control of depth, calibrations, signal processing and operating procedures. This work gives a thorough description of these features. The meaningful interpretation of well logs depends on valid input. An understanding of log acquisition, and the performance of rigorous quality checks are the prerequisites for an accurate evaluation of a formation. These elements also enable log users to make decisions based on calculated risks. The book is primarily written for earth science specialists who use log data. It also addresses the needs of logging engineers who seek a better understanding of the log acquisition process. Exercises and their solutions are scattered in the book to complement practical chapters. Contents : I. Premises. 1. Introduction. 2. Evaluation of hydrocarbon volume. 3. Data collection and decision-making. 4. Elements of metrology I: error analysis. 5. Elements of metrology II: volume considerations. 6. Elements of metrology III: other attributes. 7. Mathematical preliminary: propagation of errors. II. Data acquisition. 8. Data acquisition. 9. Sensor and source technology. 10. Effect of measurement duration on precision. 11. Signal processing: filtering. 12. Enhancement of vertical resolution through processing. 13. Tool response. 14. Environmental corrections. 15. The real environment. 16. Density logging. 17. Calibration. 18. Monitoring of tool behavior. 19. Measurement of depth. 20. Directional surveys. III. Data quality control. 21. Data quality plan. 22. Completeness of information. 23. Data management. 24. Log quality checks. 25. Data quality evaluation. 26. Images and nuclear magnetic resonance. 27. Comparison of logged data with other information. 28. Optimum logging and uncertainty management. Bibliography. Index.
This book explains in detail all the physical principles on which are based the logging tools Wireline (WL) and Logging While Drilling (LWD). It describes as well the fundamental tools of the principal service companies, focusing on the factors that influence measurement and on the main applications in geology, geophysics, and petrophysics. As such it constitutes a reference document for all geologists and engineers involved in petroleum exploration and field development.
Logging has come a long way from the simple electrical devices of the early years. Today's tools are considerably more accurate and are used for an increasingly diverse number of tasks. Among these are tools that characterise geological properties of rocks in the borehole. Combined with new technology to drill deviated wells, the geoscientist now has tools which allow him to characterise and develop reservoirs more accurately than ever. This book, written for researchers, graduate students and practising geoscientists, documents these techniques and illustrates their use in a number of typical case studies.
Following the success of the Drilling Data Handbook, Editions Technip has designed this book to cover the well logging principles and its applications. This well logging handbook first edition starts with a summary on geology and petrophysics focusing mainly on its applications. The wide range of logging measurements and applications is covered through eleven sections, each of them organized into four chapters. All in all, this is a strongly-bound, user-friendly book with useful information for those involved in all aspects and applications of well-logging. The paging is notched and externally labelled alphabetically to allow a quick access.
The Acquisition of Logging Data
Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log data and detect malicious activity. The book consists of 22 chapters that cover the basics of log data; log data sources; log storage technologies; a case study on how syslog-ng is deployed in a real environment for log collection; covert logging; planning and preparing for the analysis log data; simple analysis techniques; and tools and techniques for reviewing logs for potential problems. The book also discusses statistical analysis; log data mining; visualizing log data; logging laws and logging mistakes; open source and commercial toolsets for log data collection and analysis; log management procedures; and attacks against logging systems. In addition, the book addresses logging for programmers; logging and compliance with regulations and policies; planning for log analysis system deployment; cloud logging; and the future of log standards, logging, and log analysis. This book was written for anyone interested in learning more about logging and log management. These include systems administrators, junior security engineers, application developers, and managers. - Comprehensive coverage of log management including analysis, visualization, reporting and more - Includes information on different uses for logs -- from system operations to regulatory compliance - Features case Studies on syslog-ng and actual real-world situations where logs came in handy in incident response - Provides practical guidance in the areas of report, log analysis system selection, planning a log analysis system and log data normalization and correlation
Introduction to Data Acquisition & Control; Analog and Digital Signals; Signal Conditioning; The Personal Computer for Real Time Work; Plug-in Data Acquisition Boards; Serial Data Communications; Distributed & Standalone Loggers/Controllers; IEEE 488 Standard; Ethernet & LAN Systems; The Universal Serial Bus (USB); Specific Techniques; The PCMCIA Card; Appendix A: Glossary; Appendix B: IBM PC Bus Specifications; Appendix C: Review of the Intel 8255 PPI Chip; Appendix D: Review of the Intel 8254 Timer-Counter Chip; Appendix E: Thermocouple Tables; Appendix F: Numbers Systems; Appendix G: GPIB (IEEE-488) Mnemonics & their Definition; Appendix H: Practical Laboratories & Demonstrations; Appendix I: Command Structure & Programming.
This book Understanding Pore Space through Log Measurements deals with porosity, insight on pore shape connectedness, grain size, grain aspect ratio, permeability etc. Most of the published literature is focused on permeability from log measurements and log analytic techniques for porosity and fluid saturation determination. On the other hand, this book aims at looking at porosity distribution, pore shape, and pore connectedness using log measurements and thus bringing pore space into focus. A compilation of available knowledge from this perspective will lead the reader to better understanding of reservoir characterization takeaways, which exploration and exploitation managers and workers will be looking for. - Offers insight into influence of pore attributes on macroscopic pore space descriptors - Grain characters that influence the properties of the pore space - Guides on how to best model the inversion of log data into these attributes
Borehole imaging is among the fastest and most accurate methods for collecting high resolution subsurface data. Recent breakthroughs in acquisition, tool design, and modeling software provide real-time subsurface images of incredible detail, from the drill bit straight to a workstation. This text portrays key applications of dipmeter and image log data across the exploration and production life cycle.