2011
DOI: 10.1016/j.envsoft.2011.02.008
|View full text |Cite
|
Sign up to set email alerts
|

Solving iTOUGH2 simulation and optimization problems using the PEST protocol

Abstract: 7The PEST protocol has been implemented into the iTOUGH2 code, allowing the user to 8 link any simulation program (with ASCII-based inputs and outputs) to iTOUGH2's 9 sensitivity analysis, inverse modeling, and uncertainty quantification capabilities. These 10 application models can be pre-or postprocessors of the TOUGH2 non-isothermal 11 multiphase flow and transport simulator, or programs that are unrelated to the TOUGH 12 suite of codes. PEST-style template and instruction files are used, respectively, to p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
8
1

Relationship

4
5

Authors

Journals

citations
Cited by 64 publications
(29 citation statements)
references
References 44 publications
0
29
0
Order By: Relevance
“…Rounding out the simulation components we used for estimating the oil and gas flow rate is the iTOUGH2 code with uncertainty and sensitivity analysis capabilities (11,12). Briefly, iTOUGH2 is a wrapper around the codes described above that calls the forward model repeatedly while varying key input parameters to produce multiple results as a function of input parameter variations.…”
Section: Methodsmentioning
confidence: 99%
“…Rounding out the simulation components we used for estimating the oil and gas flow rate is the iTOUGH2 code with uncertainty and sensitivity analysis capabilities (11,12). Briefly, iTOUGH2 is a wrapper around the codes described above that calls the forward model repeatedly while varying key input parameters to produce multiple results as a function of input parameter variations.…”
Section: Methodsmentioning
confidence: 99%
“…If parameters of a pre-processor are varied as part of the analysis (as is done here for the parameters of the dual-permeability model, which enter the mesh generator), the PEST protocol is employed, as described in Finsterle and Zhang (2011). All simulations for the local and global sensitivity analysis are independent from each other and thus can be run in parallel, supported by iTOUGH2-PVM (Finsterle, 1998).…”
Section: Sensitivity Analysis Methodsmentioning
confidence: 99%
“…Main methods for gradient-based optimization are the Levenberg-Marquardt formulation and the conjugate gradient or quasi-Newton approaches. For the Levenberg-Marquardt formulation, studies and algorithm development are included by Zhang et al [2003], Tonkin and Doherty [2005], Finsterle and Kowalsky [2011], and Finsterle and Zhang [2011]. For the conjugate gradient or quasi-Newton approach, Cheng et al [2003] and Oyerinde et al [2009] are examples.…”
Section: Literature Reviewmentioning
confidence: 99%