Professional Documents
Culture Documents
a r t i c l e i n f o a b s t r a c t
Article history: Kick is a downhole phenomenon which can lead to blowout, and so early detection is important. In
Received 18 February 2020 addition to early detection, the need to prevent false alarm is also useful in order to minimize wastage
Received in revised form 16 May 2020 of operation time. A major challenge in ensuring early detection is that it increases the chances of false
Accepted 28 May 2020
alarm. While several data-driven approaches have been used in the past, there is also ongoing research
Available online 10 June 2020
on the use of derived indicators such as d-exponent for kick detection. This article presents a data-driven
approach which uses d-exponent and standpipe pressure for kick detection. The data-driven approach
Keywords:
presented in this article serves as a complementary methodology to other stand-alone kick detection
Drilling
Kick detection equations, and uses d-exponent and standpipe pressure as inputs.
Machine learning This paper proposes a methodology which uses the long short-term memory recurrent neural network
Long short-term memory (LSTM) (LSTM-RNN) to capture temporal relationships between time series data comprising of d-exponent data
Recurrent neural network (RNN) and standpipe pressure data with the aim of increasing the chances of achieving early kick detection
Time series data without false alarm. The methodology involves obtaining the slope trend of the d-exponent data and the
peak reduction in the standpipe pressure data for training the LSTM-RNN for kick detection. Field data is
used for training and testing. Early detection was achieved without false alarm.
© 2020 Institution of Chemical Engineers. Published by Elsevier B.V. All rights reserved.
(i.e. influx of hydrocarbon into the well bore) can occur. This can
be very dangerous especially if it is a gas influx, as this can lead N refers to rotary speed and Db refers to bit size.
to blowout when the gas influx is not properly controlled. There- Several researchers have utilized machine learning and a com-
fore, occurrence of kick is detected by locating sensors to monitor bination of different sensors for kick detection. This can be seen in
Table 1.
In addition to the articles on machine learning approach for
kick detection presented in Table 1, a systematic approach for kick
∗ Corresponding author. detection was presented in the article by Karimi et al., (Karimi and
E-mail address: fikhan@mun.ca (F. Khan). Van, 2015). The systematic approach shows how kick occurrence
https://doi.org/10.1016/j.psep.2020.05.046
0957-5820/© 2020 Institution of Chemical Engineers. Published by Elsevier B.V. All rights reserved.
A. Osarogiagbon et al. / Process Safety and Environmental Protection 142 (2020) 126–137 127
Table 1
Listing of selected techniques for kick detection using machine learning that have been reported since 2001.
Fig. 2. A simple ANN (diagram drawn with the aid of the website alexlenail, 2020.
Fig. 3. A hidden layer node in simple ANN and RNN a. ANN b. RNN.
Gf t = Fs {(Xt × wf ) + (Ot−1 × vf ) + bf } (8) Eq.s 13 shows how the memory cell value is updated as a func-
tion of its previous value, the forget gate, the input gate and the cell
Gc t = Fh {(Xt × wc) + (Ot−1 × vc) + bc} (9) gate.
Got = Fs {(Xt × wo) + (Ot−1 × vo) + bo} (10) Ct = (Gf t × Ct−1 ) + (Gc t × Git ) (13)
Git refers to input gate, Gf t refers to forget gate, Gc t refers to cell The output from the LSTM unit is shown in Eq. 14 as a function
candidate or gate, Got refers to output gate. wi, wf , wc, wo, vi, vf , vc of output gate and memory cell value.
and vo are weights associated with the respective gates, while bi,
bf , bc and bo are the corresponding bias values for their respective Ot = Got × Fh {Ct } (14)
A. Osarogiagbon et al. / Process Safety and Environmental Protection 142 (2020) 126–137 131
Table 2 Table 4
Configuration of the LSTM-RNN and simple ANN. Actual kick onset time from the article (Tang et al., 2019) and the higher resolution
actual kick onset time obtained by close scrutiny of the d-exponent data.
LSTM-RNN Simple ANN
Case Kick onset time from Kick onset time by further scrutiny of
Input layer 2 inputs for sequence 2 inputs for sequence
(Tang et al., 2019) in the d-exponent data in hours, minutes
data data
hours and minutes and seconds
Hidden layer 50 LSTM units 1000 nodes with
hyperbolic tangent 1 01:06 01:06:29
activation function 2 10:52 10:51:31
Output layer 2 nodes with softmax 2 nodes with softmax 3 12:07 12:06:41
activation function activation function 4 18:37 18:36:41
With the introduction of the LSTM, improvement has been tion time for the same RNN-LSTM configuration and training data
achieved in comparison to traditional RNN in a number of appli- when training is done at different point in time. This is due to the
cations. An example of this is language modeling by Sundermeyer random initialization of the parameters of the network. The mode
et al., (Sundermeyer et al., 2015). of learning/training implemented for ANN and LSTM-RNN of this
work is supervised learning.
2.3.3. Configuration of the LSTM-RNN and simple ANN An ensemble of LSTM-RNNs was used because random errors
A large number of hidden layer weights can help the neu- from several classifiers can be suppressed by averaging (Anifowose
ral network capture more information (Hagan et al., 1996). This et al., 2017). Based on this, a committee (or an ensemble) of thirty
observation motivates the use of a large number of LSTM units for independent LSTM-RNNs of the same configuration were used for
LSTM-RNN implementation and a large number of hidden layer training; and detection was done by considering the mode output
nodes for simple ANN implementation. However, more weights (majority decision) of the committee of LSTM-RNNs at each point
will result in the requirement of more training time or computing in time. Similarly, an ensemble of thirty independent simple ANNs
resources as well as the possibility of poor training due to over- with the same configuration was also used for training and detec-
fitting (Hagan et al., 1996). In this article, the number of LSTM tion. MATLAB R2018b and R2019a were used for the simulations.
hidden layer units and the number of hidden layer nodes for simple
ANN were chosen to sufficiently capture the learnable features of 3. Data used for verifying methodology
the data. Table 2 shows the configuration of the neural networks
implemented. The data used for this study were obtained from the article by
Tang et al., (Tang et al., 2019). The smoothed DPG (d-exponent)
2.3.4. Training an ensemble of LSTM-RNNs and an ensemble of data and SPP data of Fig. 6, Fig. 8, Fig. 10 and Fig. 12, represent-
simple ANNs ing cases 1, 2, 3 and 4, of (Tang et al., 2019) were obtained. This
Several factors, such as the optimization algorithm used, num- was done by reverse engineering the figures using WebPlotDigi-
ber of training epochs, regularization method etc., can influence tizer and UN-SCAN-IT software. These software have been used in
the learning performance as well as training time of the neural some articles for data extraction and analysis (Phattanawasin et al.,
network implemented (Alom et al., 2019). The Adam optimiza- 2016) (Mani et al., 2018). The values obtained by reverse engineer-
tion algorithm was used for training, although other optimization ing are provided as supplementary data in Appendix A. The figures
algorithms such as RMSProp could also be successfully used for obtained through reverse engineering resemble their original coun-
training, Adam was chosen simply because it combines the advan- terparts. While it can be argued that the data obtained through
tages of RMSProp (good for handling cases with on-line settings) reverse engineering will have some errors, the ability of an algo-
and AdaGrad (good for handling sparse gradients) (Kingma and Ba, rithm to learn and perform detection despite the imperfection in
2015). In order to prevent error due to exploding gradient, the gra- the data obtained could be seen as a plus for the algorithm; this is
dient errors could be clipped at an absolute maximum value of 15, comparable to having a machine learning method that is developed
based on a case study in the PhD dissertation by Mikolov (Mikolov, with regularization capabilities to enhance learning with noisy data
2012). Because the task is to perform binary classification, rather (Dan Foresee and Hagan, 1997). The data obtained was processed
than regression, the optimization algorithm aimed at minimizing to have a time axis resolution of 1 s. Fig. 5 and Fig. 6 shows the SPP
cross entropy error rather than root mean square error of the train- and d-exponent data obtained for case 1.
ing data (Bishop, 2006). Table 3 summarises the approach used for
training the configured LSTM-RNN and simple ANN. 3.1. Estimated time of kick occurrence
Weights were initialised using Gaussian distribution with a
mean value of 0 and a standard deviation value of 0.01. The bias The task is defined as a binary classification problem, and so the
values were initialised to 0. Variations can occur in terms of detec- output data event is described as either kick or no-kick. Because the
Table 3
Training the LSTM-RNN and simple ANN algorithms.
Optimization algorithm Adam A recent and robust method (Alom et al., 2019) (Kingma and Ba, 2015).
Regularization method L2 Regularization Based on the articles (Alom et al., 2019) (Kingma and Ba, 2015).
Factor for L2 Regularization 0.0004 Based on the article (Alom et al., 2019).
Gradient threshold method L2 norm Based on the articles (Pascanu et al., 2013) and (Kingma and Ba, 2015).
Gradient threshold value 15 Inspired by the work (Mikolov, 2012).
Maximum Epochs 50 Sufficient for learning the test data.
Initial learning rate 0.001 Based on the article (Kingma and Ba, 2015).
ˇ1 0.9 Based on the article (Kingma and Ba, 2015).
ˇ2 0.999 Based on the article (Kingma and Ba, 2015).
ε 0.00000001 Based on the article (Kingma and Ba, 2015).
Training type Offline training
132 A. Osarogiagbon et al. / Process Safety and Environmental Protection 142 (2020) 126–137
ANN and LSTM-RNN to be implemented will undergo supervised ations already suppressed. This was done by using a median filter
learning, the output/target data will be specified as a kick or no-kick with a kernel size of 51 (Tang et al., 2019). Thus the step described in
event at every point in time for which we have SPP and d-exponent section 2.2.1 (Filtering) is skipped. The methodology implemented
data. The no-kick event occurs from start time (based on the drilling in (Tang et al., 2019) utilized long sliding window of 3 min, 5 min
data) till the time just before kick onset, while the kick event occurs and 1 min; this gives an indication that window sizes within this
from the point of kick onset till the end of data collected; this can range can be utilized for the d-exponent data obtained. Therefore,
be seen in the figures in Section 4. sliding window sizes of 2 min, 3 min and 4 min are used for obtain-
Table 2 in the article (Tang et al., 2019) shows the estimated kick ing the slope of the d-exponent data. Fig. 8 shows that higher slope
onset time, which is obtained by observing the trend in the DPG (d- values of d-exponent data are likely to be in the region of no kick.
exponent) data. This kick onset time given in Table 2 of (Tang et al.,
2019) has a resolution of 1 min. Because the SPP and d-exponent 4. Results and discussion
data obtained through reverse engineering has a resolution of 1
s, the d-exponent data is further scrutinized to obtain the time in Considering that data corresponding to four cases are available,
seconds when the kick is most likely to have occurred. This is done four categories of training and testing will be done. Category 1
by: (i) considering the d-exponent data points between -30 s and involves using all data points/samples of case 2, case 3 and case
+30 s of the kick onset time given by Table 2 of (Tang et al., 2019), 4 to train while all data points/samples of case 1 is used for testing.
(ii) obtaining the time with the maximum d-exponent value within Category 2 involves training with all data points/samples of cases
the region of consideration, and (iii) choosing the next time value 1, 3 and 4 while all data points/samples of case 2 is used for testing.
after the time with the maximum d-exponent value as the kick Category 3 involves training with all data points/samples of cases
onset time. This is because the kick onset is estimated as the time 1, 2 and 4 while all data points/samples of case 3 is used for testing.
when the d-exponent data begins to deviate from the previously Category 4 involves training with all data points/samples of cases
noticed increasing trend (Tang et al., 2019). Table 4 gives the kick 1, 2 and 3, while all data points/samples of case 4 is used for testing.
onset time from (Tang et al., 2019) and the higher resolution kick In addition, the final part of this section (section 4.5) compares the
onset time obtained by further observing the d-exponent data. result obtained with the proposed methodology to that of published
methodology. All figures of section 4 are a plot of kick/no-kick event
3.2. An example of obtaining peak reduction in SPP data vs time. In the vertical axis of the figures of section 4, the value 1
represents kick and 0 represents no-kick event.
The figures showing peak reduction in SPP data assuming case
1 is to be used for testing and cases 2, 3 and 4 used for training 4.1. Category 1 testing
are provided as supplementary data in Appendix A. Fig. 7 clearly
shows relatively high values of the peak reduction in the SPP data Fig. 9 and Fig. 10 provide a graphical illustration of the per-
after kick onset time (01:06:29, as shown in Table 4 for case 1). formance of the methodology. Fig. 9 represents the actual events
that are of interest to detect and Fig. 10 shows detection with the
3.3. An example of obtaining the slope trend of the d-exponent LSTM-RNN implementation and sliding window size of 4 min for
data obtaining the slope of the d-exponent. Fig. 10 shows that the algo-
rithm can detect the kick event to a good degree after a short delay.
The figures showing the slope trend of the d-exponent data Table 5 shows that the LSTM-RNN and simple ANN detected
assuming case 1 is to be used for testing and cases 2, 3 and 4 used kick for the d-exponent sliding window sizes considered with-
for training are provided as supplementary data in Appendix A. It out false alarm. The results also show that detection time was
should be noted that the d-exponent data obtained has noisy vari- very similar for the different sliding window sizes considered
A. Osarogiagbon et al. / Process Safety and Environmental Protection 142 (2020) 126–137 133
Fig. 7. Peak reduction in SPP data for case 1. In this scenario, case 2, 3 and 4 are for training while case 1 is for testing.
Fig. 8. Slope trend of d-exponent data for case 1 (using sliding window of 3 min). In this scenario, cases 2, 3 and 4 are for training while case 1 is for testing.
Fig. 10. Kick onset detection for case 1 using LSTM-RNN with peak reduction in standpipe pressure data and slope trend of d-exponent data (using sliding window size of 4
min) as input.
Table 5
Kick onset time for category 1 testing.
for the LSTM-RNN methodology. Details of the results for cat- alarm. Although the use of different sliding window sizes still
egory 1 testing are available as the supplementary data in resulted in successful detection, there is a significant variation
Appendix B. between detection time achieved between the 2 min sliding win-
dow and the 4 min sliding window. A possible reason for this is that
while the d-exponent shows a decreasing trend at around 10:52
4.2. Category 2 testing
AM, the SPP data shows decreasing trend at around 11:02 AM (Tang
et al., 2019).
Fig. 11 shows the actual kick and no-kick events and Fig. 12
shows detection with the LSTM-RNN implementation and sliding
window size of 4 min for obtaining the slope of the d-exponent. 4.3. Category 3 testing
Fig. 12 shows that the methodology proposed can detect the events
to a good degree with insignificant delay for the sliding window size Fig. 13 shows the actual kick and no-kick events and Fig. 14
of 4 min. shows detection with the LSTM-RNN implementation and slid-
Table 6 shows that the LSTM-RNN and simple ANN detect kick ing window size of 4 min for obtaining the slope of the
for the d-exponent sliding window sizes considered without false d-exponent. Fig. 14 also shows that the algorithm can detect
134 A. Osarogiagbon et al. / Process Safety and Environmental Protection 142 (2020) 126–137
Fig. 12. Kick onset detection for case 2 using LSTM-RNN with peak reduction in standpipe pressure data and slope trend of d-exponent data (using sliding window size of 4
min) as input.
Table 6
Kick onset time for category 2.
Fig. 14. Kick onset detection for case 3 using LSTM-RNN with peak reduction in standpipe pressure data and slope trend of d-exponent data (using sliding window size of 4
min) as input.
the events to a good degree although with some delay. Table 7 4.4. Category 4 testing
shows that the LSTM-RNN and simple ANN detected kick
for d-exponent sliding window sizes considered without false Fig. 15 shows the actual kick and no-kick events and Fig. 16
alarm. shows detection with the LSTM-RNN implementation and sliding
Table 7
Kick onset time for category 3.
Fig. 16. Kick onset detection for case 4 using LSTM-RNN with peak reduction in standpipe pressure data and slope trend of d-exponent data (using sliding window size of 4
min) as input.
Fig. 17. Kick onset detection for case 4 using simple ANN with peak reduction in standpipe pressure data and slope trend of d-exponent data (using window size of 4 min)
as input.
Table 8
Kick onset time for category 4.
Table 9
Summary of different trials for case 4 using different simple ANN configurations.
Number of nodes in Number of additional hidden False alarm(s) Time of first false alarm Sliding window size for
first hidden layer layers with 1000 nodes occurred? occurrence d-exponent slope extraction
window size of 4 min for obtaining the slope of the d-exponent. min) with those in Table 2 of Reference (Tang et al. (2019)) (also
Fig. 17 shows multiple false alarm when simple ANN is used as using 3-minute long sliding window). It should be noted that the
opposed to the nearly perfect detection with LSTM-RNN shown in aim of the comparison is not to claim superiority of methodology
Fig. 16. Table 8 also shows that the LSTM-RNN detected kick for but to show that the methodology presented here can complement
the sliding window sizes considered without false alarm. Unfor- the methodology presented in (Mao and Zhang, 2019) and (Tang
tunately, the simple ANN had multiple false alarms. Based on this, et al. (2019)). The methodology of (Mao and Zhang, 2019) and (Tang
several configurations were tested for simple ANN implementation. et al. (2019)) can be used without having a database for training,
Also, different window sizes for extracting slope of d-exponent data whereas the methodology presented here is a data driven approach.
were also tried, but all resulted in false alarm. These results are The performance of the proposed LSTM-RNN methodology
summarized in Table 9. depends on the quantity of training data. More training data will
offer the LSTM-RNN a better opportunity to capture the relationship
4.5. Validation of the developed methodology between input parameters required to detect kick.
One of the extra requirements of using a data driven approach
Table 10 compares the results obtained using the proposed is the requirement of training time and software/hardware to per-
methodology (using LSTM-RNN and a sliding window length of 3 form training. The training time depends on several factors such
136 A. Osarogiagbon et al. / Process Safety and Environmental Protection 142 (2020) 126–137
Table 10
Comparison of results: proposed methodology vs (Tang et al. (2019)).
Case Number / Category Kick occurrence Methodology of (Tang et al., 2019) T Proposed methodology
ime only available in hours and minutes) using LSTM-RNN
Table 11 complement the methodology used in (Tang et al., 2019) and (Mao
Training time for the different categories.
and Zhang, 2019) with sufficient training data.
Case Number / Category Average training time for an It is recommended that continual training and testing be con-
LSTM-RNN in seconds ducted by acquiring more data in order to improve the confidence
1 8 in the proposed method prior to field implementation. This is gen-
2 5 erally the requirement for any machine learning based method, as
3 8 performance depends on the data used in training it. Therefore, it is
4 8
recommended that petroleum drilling companies set up accessible
large database of sensor data and the corresponding events in order
to facilitate the implementation of the methodology proposed here
as computational strength (e.g. number of processing cores/units), for kick detection during drilling.
size of data etc. For example, the training time achieved by using
Nvidia GeForce GTX 1050 through MATLAB R2018b is shown in
Declaration of Competing Interest
Table 11.
The training time values in Table 11 need to be multiplied by 30
The authors declare that they have no known competing finan-
to get total training time, this is because we utilized an ensemble of
cial interests or personal relationships that could have appeared to
thirty identical LSTM-RNNs for a category. This results in about 240
influence the work reported in this paper.
s (4 min) for each of three categories of training and 150 s for one
category. While this training time may not be too high, the value
could increase when more training data is available. Acknowledgement
Although the work presented here utilized data driven approach
for d-exponent and SPP, further work could involve utilizing data The authors gratefully acknowledge the Niger Delta Develop-
driven approach for d-exponent and FPG, considering that FPG ment Commission for their financial support, as well as the financial
utilises both SPP and flow measurements as shown by Eq. 2. support provided through Canada Research Chair Program in Off-
Although the data in (Tang et al., 2019) may be used for this, the flow shore Safety and Risk Engineering.
paddle malfunctioned in one of the cases thereby limiting the avail-
able cases from 4 to 3. One of the draw backs of data driven approach
References
is that it depends on the availability of data. However, once suffi-
cient training data is available, the data driven approach provides a Alom, M.Z., Taha, T.M., Yakopcic, C., Westberg, S., Sidike, P., Nasrin, M.S., Hasan, M.,
valuable means of complementing direct equation approach. Arti- Essen, B.C.V., Awwal, A.A.S., Asari, V.K., 2019. A State-of-the-Art Survey on Deep
cle (Mao and Zhang, 2019) indicates the availability of data from 15 Learning Theory and Architectures. Electronics 8 (3), 292, http://dx.doi.org/10.
3390/electronics8030292.
wells with 24,546 drilling hours of 23 kick events. The data driven
Mao, Y., Zhang, P., 2019. An automated kick alarm system based on statistical analysis
methodology proposed in this work can be used for the data in (Mao of real-time drilling data. Old Spe J., http://dx.doi.org/10.2118/197275-MS.
and Zhang, 2019). This is because (Mao and Zhang, 2019) contains Tang, H., Zhang, S., Zhang, F., Venugopal, S., 2019. Time series data analysis for
automatic flow influx detection during drilling. J. Pet. Sci. Eng. 172, 1103–1111,
more drilling time data and kick events in comparison to (Tang et al.,
http://dx.doi.org/10.1016/j.petrol.2018.09.018.
2019) and the performance of data driven methodology especially Hargreaves, D., Jardine, S., Jeffryes, B., 2001. Early kick detection for deepwater
with the use of deep learning is likely to improve with more data as drilling: New probabilistic methods applied in the Field. In: SPE Annual Techni-
seen in Fig. 7 of (Alom et al., 2019) and Fig. 2 of (Tang et al., 2018). cal Conference and Exhibition, New Orleans, http://dx.doi.org/10.2118/71369-
MS.
Nybo, R., Bjorkevoll, K.S., Rommetveit, R., 2008a. Spotting a false alarm. Integrating
experience and Real-time analysis with artificial intelligence. In: SPE Intelli-
5. Conclusions gent Energy Conference and Exhibition, Amsterdam, http://dx.doi.org/10.2118/
112212-MS.
Nybo, R., Bjorkevoll, K.S., Rommetveit, R., Skalle, P., Herbert, M., 2008b. Improved
We have proposed a methodology for the successful use of data- and robust drilling simulators using past Real-time measurements and artificial
driven approach for kick detection by using an ensemble of LSTM- intelligence. In: SPE Europec/EAGE Annual Conference and Exhibition, Rome,
RNNs. The aim of using LSTM-RNN is to overcome the challenges http://dx.doi.org/10.2118/113776-MS.
Kamyab, M., Shadizadeh, S.R., Jazayeri-rad, H., Dinarvand, N., 2010. Early kick detec-
of learning how to utilize d-exponent and stand pipe pressure data tion using Real time data analysis with dynamic neural network: a Case study
for early kick detection without false alarm. in Iranian oil fields. In: Annual SPE International Conference and Exhibition,
The use of an ensemble of LSTM-RNNs is able to achieve early Tinapa-Calaber, http://dx.doi.org/10.2118/136995-MS.
Haibo, L., Tang, Y., Li, X., Luo, Y., 2014. Research on drilling kick and loss moni-
kick detection without miss and false alarm in all the four drilling
toring method based on Bayesian classification. Pak. J. Stat. Oper. Res. 30 (6),
cases considered here, whereas the ensemble of simple ANNs is 1251–1266.
able to do the same only for three out of the four cases. It could Yin, H., Si, M., Wang, H., 2014. The warning model of the early kick based on BP
neural network. Pak. J. Stat. Oper. Res. 30 (6), 1047–1056.
be argued that the performance of the simple ANN may improve
Pournazari, P., Ashok, P., van Oort, E., Unrau, S., Lai, S., 2015. Enhanced kick detection
with a sufficient amount of training data and or certain network with Low-cost rig sensors through automated pattern recognition and Real-
configuration/training options. time sensor calibration. In: SPE Middle East Intelligent Oil & Gas Conference &
Comparing the result of the methodology presented here with Exhibition, Abu Dhabi, http://dx.doi.org/10.2118/176790-MS.
Liang, H., Zou, J., Liang, W., 2017. An early intelligent diagnosis model for drilling
the result achieved in (Tang et al., 2019) shows that the ensem- overflow based on GA–BP algorithm. Cluster Comput., 1–20, http://dx.doi.org/
ble LSTM-RNN methodology being introduced here can be used to 10.1007/s10586-017-1152-5.
A. Osarogiagbon et al. / Process Safety and Environmental Protection 142 (2020) 126–137 137
Alouhali, R., Aljubran, M., Gharbi, S., Al-yami, A., 2018. Drilling through data: auto- Kingma, D.P., Ba, J.L., 2015. Adam: A Method for Stochastic Optimization. ICLR
mated kick detection using data mining. SPE International Heavy Oil Conference https://hdl.handle.net/11245/1.505367.
and Exhibition, http://dx.doi.org/10.2118/193687-MS. Mikolov, T., Ph.D. thesis 2012. Statistical Language Models Based on Neural Net-
Xie, H., Shanmugam, A.K., Issa, R.R.A., 2018. Big data analysis for monitoring of kick works. Brno University of Technology.
formation in complex underwater drilling projects. J. Comput. Civ. Eng. 32 (5), Bishop, C.M., 2006. Pattern Recognition and Machine Learning. Springer, New York,
http://dx.doi.org/10.1061/(ASCE)CP.1943-5487.0000773. NY.
Fjetland, A.K., Zhou, J., Abeyrathna, D., Gravdal, J.E., 2019. Kick detection and influx Pascanu, R., Mikolov, T., Bengio, Y., 2013. On the difficulty of training recurrent neu-
size estimation during offshore drilling operations using deep learning. In: Pro- ral networks. Atlanta, Georgia, USA, JMLR: W&CP In: Proceedings of the 30th
ceedings of the 14th IEEE Conference on Industrial Electronics and Applications, International Conference on Machine Learning, 28.
ICIEA, pp. 2321–2326, http://dx.doi.org/10.1109/ICIEA.2019.8833850, art. no. Anifowose, F.A., Labadin, J., Abdulraheem, A., 2017. Ensemble machine learning: an
8833850. untapped modeling paradigm for petroleum reservoir characterization. J. Pet.
Karimi, V.A., Van, O.E., 2015. Early kick detection and well control decision–making Sci. Eng. 151, 480–487, http://dx.doi.org/10.1016/j.petrol.2017.01.024.
for managed pressure drilling automation. J. Nat. Gas Sci. Eng. 27 (1), 354–366, Phattanawasin, P., Burana-osot, J., Sotanaphun, U., Kumsum, A., 2016. Stability-
http://dx.doi.org/10.1016/j.jngse.2015.08.067. indicating TLC–Image analysis method for determination of andrographolide
Graves, A., 2012. Supervised Sequence Labelling With Recurrent Neural Networks. in bulk drug and Andrographis paniculata formulations. Acta Chromatogr. 28
Chapter 4, 385. Springer. (4), 525–540, http://dx.doi.org/10.1556/1326.2016.28.4.12.
Zhang, D., Chen, Y., Meng, J., 2018. Synthetic Well Logs Generation Via Recurrent Mani, S., Sharma, S., Singh, D.K.A., 2018. web plot digitizer software: can it be used
Neural Networks. Pet. Explor. Dev. 45 (4), 629–639, http://dx.doi.org/10.1016/ to measure neck posture in clinical practice? Asian J. Pharm. Clin. Res. 11 (2),
S1876-3804(18)30068-5. 86–87, http://dx.doi.org/10.22159/ajpcr.2018.v11s2.28589.
alexlenail.me/NN-SVG/ retrieved 28th of August, 2019. Dan Foresee, F., Hagan, M.T., 1997. Gauss-Newton approximation to Bayesian learn-
Hagan, M.T., Demuth, H.B., Beale, M., 1996. Neural Networks Design. PWS Publishing ing. Proc. Int. Conf. Neural Netw. 3 (June), 1930–1935.
Company, Boston, MA, USA. Tang, A., Tam, R., Cadrin-Chênevert, A., Guest, W., Chong, J., Barfett, J., et al., 2018.
Hochreiter, S., Schmidhuber, J., 1997. Long short-term memory. Neural Comput. 9 Canadian association of radiologists white paper on artificial intelligence in
(8), 1735–1780. radiology. Can. Assoc. Radiol. J. 69 (2), 120–135, http://dx.doi.org/10.1016/j.carj.
Sundermeyer, M., Ney, H., Schlüter, R., 2015. From feedforward to recurrent LSTM 2018.02.002.
neural networks for language modeling. IEEEACM Trans. Audio Speech Lang.
Process. 23 (3), 517–529, http://dx.doi.org/10.1109/TASLP.2015.2400218.