2014
DOI: 10.1007/s11242-014-0277-8
|View full text |Cite
|
Sign up to set email alerts
|

A Fast Algorithm for Invasion Percolation

Abstract: We present a computationally fast Invasion Percolation (IP) algorithm. IP is a numerical approach for generating realistic fluid distributions for quasi-static (i.e., slow) immiscible fluid invasion in porous media. The algorithm proposed here uses a binary-tree data structure to identify the site (pore) connected to the invasion cluster that is the next to be invaded. Gravity is included. Trapping is not explicitly treated in the numerical examples but can be added, for example, using a Hoshen-Kopelman algori… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 12 publications
(16 citation statements)
references
References 16 publications
(18 reference statements)
0
14
0
Order By: Relevance
“…Wilkinson and Willemson, 1983;Masson and Pride, 2014]. In all these cases, no significant anisotropy was observed across the seismic band of frequencies (1 to 10 4 Hz) despite anisotropy being present in the fluid patch shapes.…”
Section: Discussionmentioning
confidence: 93%
“…Wilkinson and Willemson, 1983;Masson and Pride, 2014]. In all these cases, no significant anisotropy was observed across the seismic band of frequencies (1 to 10 4 Hz) despite anisotropy being present in the fluid patch shapes.…”
Section: Discussionmentioning
confidence: 93%
“…When using fast algorithms (e.g. Sheppard et al, 1999;Masson and Pride, 2014) for solving the NTIP problem in step 2, the CPU time to percolation for systems having N total sites and M NT invaded sites at percolation is at most (…”
Section: Efficiencymentioning
confidence: 99%
“…This data structure permits us to find the site with the largest invasion potential in ( ) O 1 operation and to insert new neighbor sites in ( ( )) O n log operations, where ≤ n N is the number of active sites in the list (e.g. Schwarzer et al, 1999;Sheppard et al, 1999;Masson and Pride, 2014). I refer to Masson and Pride (2014) for a detailed implementation of NTIP using a perfectly balanced binary tree that strictly guarantees…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations