Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
ATTENUATION OF UNWANTED ACOUSTIC SIGNALS BY SEMBLANCE CRITERION MODIFICATION
Document Type and Number:
WIPO Patent Application WO/2010/083180
Kind Code:
A2
Abstract:
Methods and related systems are described for modified semblance criterions based on the approach of thresholding the signal energy. A first criterion is derived by posing the problem as that of detecting a signal with energy (or amplitude) greater than the specified threshold and deriving the generalized likelihood ratio test statistic. A second criterion is derived using the same method by posing the problem as that of rejecting any signal with energy (or amplitude) below a specified threshold and detecting it if its energy is above another threshold greater than or equal to the first. These appropriately modify the original semblance criterion which is shown to be equivalent to the GLRT test statistic in the absence of any threshold on the signal amplitude. In addition simpler modifications are also described. Tests on synthetic data illustrate the effectiveness of all these modifications which perform comparably well at suppressing unwanted arrivals while accurately processing the desired signals.

Inventors:
BOSE SANDIP (US)
DUMONT ALAIN (JP)
VALERO HENRI-PIERRE (US)
Application Number:
PCT/US2010/020835
Publication Date:
July 22, 2010
Filing Date:
January 13, 2010
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
SCHLUMBERGER SERVICES PETROL (FR)
SCHLUMBERGER CA LTD (CA)
SCHLUMBERGER HOLDINGS
SCHLUMBERGER TECHNOLOGY BV (NL)
PRAD RES & DEV LTD
BOSE SANDIP (US)
DUMONT ALAIN (JP)
VALERO HENRI-PIERRE (US)
International Classes:
E21B47/16; E21B47/14; G01V1/40
Foreign References:
US4594691A1986-06-10
US5150331A1992-09-22
US6427124B12002-07-30
US6748329B22004-06-08
US6154705A2000-11-28
US7423930B22008-09-09
Attorney, Agent or Firm:
RAYBAUD, Helene (Intellectual Property Law DepartmentOne Hampshire Stree, Cambridge Massachusetts, US)
Download PDF:
Claims:
CLAIMS

What is claimed is:

1. A method of processing borehole sonic data comprising: receiving multi-channel sonic data representing sonic energy measured in a borehole, the multi-channel data including data from each of two or more channels; combining the data from two or more of the channels to generate stacked sonic data; calculating coherent energy associated with the stacked sonic data; and attenuating unwanted signals based at least in part on the calculated coherent energy.

2. A method according to claim 1 wherein the attenuation of unwanted signals is based at least in part on comparing the calculated coherent energy to a predetermined threshold.

3. A method according to claim 2 wherein the unwanted signals are removed in cases where the calculated coherent energy is less than the predetermined threshold.

4. A method according to claim 1 further comprising calculating semblance values based on the coherent energy wherein the semblance values are attenuated in cases where the calculated coherent energy is less than the predetermined threshold.

5. A method according to claim 1 further comprising: calculating a probability function of a criterion to decide if the signal should be attenuated or not; and calculating semblance values based on the calculation of the probability function and the calculated coherent energy, wherein the semblance values are attenuated based on the calculated probability function.

6. A method according to claim 5 wherein the probability function includes a likelihood function or a log likelihood function.

7. A method according to claim 5 wherein the probability function corresponds to detecting signals above a predetermined threshold energy.

8. A method according to claim 5 wherein the probability function corresponds to rejecting signals below a predetermined threshold energy.

9. A method according to claim 2 wherein the predetermined threshold is a fixed value.

10. A method according to claim 2 wherein the predetermined threshold is a function of a parameter associated with the sonic data.

11. A method according to claim 10 wherein the predetermined threshold is a function of slowness and/or time so as to apply to an expected type of signal.

12. A method according to claim 11 wherein the signal type is an unwanted tool-propagated signal or casing arrival.

13. A method according to claim 11 wherein the signal type is a compressional signal arrival of interest.

14. A method according to claim 1 wherein the multi-channel sonic data is measured during a drilling operation using a plurality of sonic receivers mounted on a drill collar body.

15. A method according to claim 14 wherein the method is carried out using a processing system housed within the drill collar body.

16. A method according to claim 1 wherein the multi-channel sonic data is measured using a wireline tool having at least one sonic source and a plurality of sonic receivers mounted thereon.

17. A system for processing borehole sonic data comprising: a storage system adapted and configured to receive multi-channel sonic data representing sonic energy measured in a borehole, the multi-channel data including data from each of two or more channels; and a processor adapted and configured to combine the data from two or more of the channels to generate stacked sonic data, calculate coherent energy associated with the stacked sonic data, and attenuate unwanted signals based at least in part on comparing the calculated coherent energy to a predetermined threshold.

18. A system according to claim 17 further comprising a tool body suitable for downhole deployment, wherein the storage system and processor are housed within the tool body.

19. A system according to claim 18 further comprising a plurality of downhole sonic receivers mounted on a drill collar adapted to measure the multi-channel sonic energy, wherein the tool body is positioned on the drill collar and the storage system records the sonic measurements from the sonic receivers.

20. A system according to claim 17 wherein the multi-channel sonic data is measured using a wireline tool having at least one sonic source and a plurality of sonic receivers mounted thereon, and wherein the processing system is located on the surface.

21. A system according to claim 17 wherein the processor is further adapted and configured to calculate semblance values based on the calculated coherent energy, the semblance values being attenuated in cases where the calculated coherent energy is less than the predetermined threshold.

22. A system according to claim 17 wherein the processor is further adapted and configured to calculate a probability function of a criterion to decide if the signal should be attenuated or not, and to calculate semblance values based on the calculation of the probability function and the calculated coherent energy, and wherein the semblance values are attenuated based on the calculated probability function.

23. A system according to claim 22 wherein the probability function includes a likelihood function or a log likelihood function.

24. A system according to claim 22 wherein the probability function corresponds to detecting signals above a predetermined threshold energy.

25. A system according to claim 22 wherein the probability function corresponds to rejecting signals below a predetermined threshold energy.

26. A system according to claim 17 wherein the predetermined threshold is a function of a parameter associated with the sonic data.

27. A system according to claim 26 wherein the predetermined threshold is a function of slowness and/or time so as to apply to an expected type of unwanted signal.

Description:
Attenuation of Unwanted Acoustic Signals by Semblance Criterion Modification

BACKGROUND OF THE INVENTION

1. Field of the Invention

[0001] This patent specification relates acoustic measurements made in a borehole. More particularly, this patent specification relates to methods and systems for reducing unwanted signals from acoustic data gathered from boreholes.

2. Background of the Invention

[0002] The semblance criterion is the basis for a widely used method for estimating sonic slowness especially with P&S logging. For example, see C. V. Kimbal and T. Marzetta Semblance Processing of borehole acoustic array data. Geophysics, 49(3):264- 281, March 1984 (hereinafter "Kimball 1984") which is incorporated by reference herein. With P&S logging, i.e., monopole logging for compressional and shear using the head waves, an array-based non-dispersive processing is used which is suitable for detecting signals irrespective of their energy. This property is invaluable for detecting compressional arrivals which are usually weak relative to other arrivals and accurately extracting their slowness and for this reason it has been extremely successful and widely used. [0003] However a side effect of the same property of invariance to signal amplitude is that it also responds to very weak events such as weak tool or casing arrivals or even acquisition artifacts. While such unwanted semblance peaks if they exist can be handled by a variety of methods, these become a more serious issue for LWD applications where the processing has to be conducted downhole. Even when the sonic hardware is designed to attenuate the tool arrivals and further mitigation is possible with advanced processing techniques, there may still exist a need to avoid such spurious semblance peaks on tool arrivals.

SUMMARY OF THE INVENTION

[0004] According to embodiments, a method of processing borehole sonic data is provided. Multi-channel sonic data is received which represents sonic energy measured in a borehole. The multi-channel data includes data from each of two or more channels. The data from two or more of the channels is combined to generate stacked sonic data. Coherent energy associated with the stacked sonic data is calculated. Unwanted signals are then attenuated based at least in part on comparing the calculated coherent energy to a predetermined threshold.

[0005] Additionally, according to some embodiments a system for processing borehole sonic data is provided. A storage system adapted and configured to receive multi-channel sonic data representing sonic energy measured in a borehole, the multichannel data including data from each of two or more channels. A processor is adapted and configured to combine the data from two or more of the channels to generate stacked sonic data, calculate coherent energy associated with the stacked sonic data, and attenuate unwanted signals based at least in part on comparing the calculated coherent energy to a predetermined threshold. [0006] Further features and advantages of the invention will become more readily apparent from the following detailed description when taken in conjunction with the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

[0007] The present invention is further described in the detailed description which follows, in reference to the noted plurality of drawings by way of non-limiting examples of exemplary embodiments of the present invention, in which like reference numerals represent similar parts throughout the several views of the drawings, and wherein: [0008] Fig. 1 illustrates a wellsite system in which the present invention can be employed, according to some embodiments;

[0009] Fig. 2 illustrates a sonic logging-while-drilling tool, according to some embodiments;

[0010] Fig. 3 is a plot showing the behavior of various modified semblance criterions, according to some embodiments;

[0011] Fig. 4 is a plot showing a slowness estimation error probability distribution; [0012] Fig. 5 shows a plot for a case where the threshold is restricted to the region around 60 μs/ft to suppress an LWD collar arrival, according to certain embodiments; [0013] Fig. 6 is a waveform plot showing the synthetic data used for performance comparisons; and

[0014] Fig. 7a-e are contour plots showing a comparison of the performance of various semblance modification embodiments using the synthetic data shown in Fig. 6. DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS [0015] In the following detailed description of the preferred embodiments, reference is made to accompanying drawings, which form a part hereof, and within which are shown by way of illustration specific embodiments by which the invention may be practiced. It is to be understood that other embodiments may be utilized and structural changes may be made without departing from the scope of the invention.

[0016] The particulars shown herein are by way of example and for purposes of illustrative discussion of the embodiments of the present invention only and are presented in the cause of providing what is believed to be the most useful and readily understood description of the principles and conceptual aspects of the present invention. In this regard, no attempt is made to show structural details of the present invention in more detail than is necessary for the fundamental understanding of the present invention, the description taken with the drawings making apparent to those skilled in the art how the several forms of the present invention may be embodied in practice. Further, like reference numbers and designations in the various drawings indicated like elements. [0017] According to some embodiments, a given threshold on the received acoustic energy is used to suppress semblance output on weaker arrivals such as collar arrivals. This can be accomplished via a modification of the semblance criterion. One approach is based on the interpretation of the semblance as a test statistic for detecting coherent arrivals of any energy, as explained below, and modifies this to incorporate the energy threshold requirement. This leads to two new candidate modifications based on implementing the threshold in the detection problem formulation in two different ways as detailed below. According to other embodiments, intuitive and heuristic arguments are used to obtain relatively simple modifications. According to these embodiments, the coherent energy is thresholded and the minimum energy threshold is subtracted from both coherent and incoherent energy. The performance of the modified criterions is examined and various embodiments are compared on synthetic data.

[0018] Fig. 1 illustrates a wellsite system in which the present invention can be employed. The wellsite can be onshore or offshore. In this exemplary system, a borehole 11 is formed in subsurface formations by rotary drilling in a manner that is well known. Embodiments of the invention can also use directional drilling, as will be described hereinafter.

[0019] A drill string 12 is suspended within the borehole 11 and has a bottom hole assembly 100 which includes a drill bit 105 at its lower end. The surface system includes platform and derrick assembly 10 positioned over the borehole 11, the assembly 10 including a rotary table 16, kelly 17, hook 18 and rotary swivel 19. The drill string 12 is rotated by the rotary table 16, energized by means not shown, which engages the kelly 17 at the upper end of the drill string. The drill string 12 is suspended from a hook 18, attached to a traveling block (also not shown), through the kelly 17 and a rotary swivel 19 which permits rotation of the drill string relative to the hook. As is well known, a top drive system could alternatively be used.

[0020] In the example of this embodiment, the surface system further includes drilling fluid or mud 26 stored in a pit 27 formed at the well site. A pump 29 delivers the drilling fluid 26 to the interior of the drill string 12 via a port in the swivel 19, causing the drilling fluid to flow downwardly through the drill string 12 as indicated by the directional arrow 8. The drilling fluid exits the drill string 12 via ports in the drill bit 105, and then circulates upwardly through the annulus region between the outside of the drill string and the wall of the borehole, as indicated by the directional arrows 9. In this well known manner, the drilling fluid lubricates the drill bit 105 and carries formation cuttings up to the surface as it is returned to the pit 27 for recirculation.

[0021] The bottom hole assembly 100 of the illustrated embodiment a logging-while- drilling (LWD) module 120, a measuring- while-drilling (MWD) module 130, a roto- steerable system and motor 150, and drill bit 105.

[0022] The LWD module 120 is housed in a special type of drill collar, as is known in the art, and can contain one or a plurality of known types of logging tools. It will also be understood that more than one LWD and/or MWD module can be employed, e.g. as represented at 120A. (References, throughout, to a module at the position of 120 can alternatively mean a module at the position of 120A as well.) The LWD module includes capabilities for measuring, processing, and storing information, as well as for communicating with the surface equipment. In the present embodiments, the LWD module includes a sonic measuring device. Further, according to some embodiments, the various processing steps described herein are carried out in a processor located within LWD module 120.

[0023] The MWD module 130 is also housed in a special type of drill collar, as is known in the art, and can contain one or more devices for measuring characteristics of the drill string and drill bit. The MWD tool further includes an apparatus (not shown) for generating electrical power to the downhole system. This may typically include a mud turbine generator powered by the flow of the drilling fluid, it being understood that other power and/or battery systems may be employed. In the present embodiment, the MWD module includes one or more of the following types of measuring devices: a weight-on-bit measuring device, a torque measuring device, a vibration measuring device, a shock measuring device, a stick slip measuring device, a direction measuring device, and an inclination measuring device.

[0024] Fig. 2 illustrates a sonic logging-while-drilling tool which can be the LWD tool 120, or can be a part of an LWD tool suite 120A of the type described in U.S. Patent No. 6,308,137, incorporated herein by reference. In a disclosed embodiment, as shown in Fig. 2, an offshore rig 210 is employed, and a sonic transmitting source or array 214 is deployed near the surface of the water. Alternatively, any other suitable type of uphole or downhole source or transmitter can be provided. For example, downhole source 240 can be used, according to some embodiments. An uphole processor controls the firing of the transmitter 214. The uphole equipment can also include acoustic receivers and a recorder for capturing reference signals near the source. The uphole equipment further includes telemetry equipment for receiving MWD signals from the downhole equipment. The telemetry equipment and the recorder are typically coupled to a processor so that recordings may be synchronized using uphole and downhole clocks. The downhole LWD module 200 includes at least acoustic receivers 231 and 232, which are coupled to a signal processor so that recordings may be made of signals detected by the receivers in synchronization with the firing of the signal source.

[0025] The classical semblance criterion as proposed in Kimball 1984, and how it is used for estimating slowness will now be reviewed. Given an array of waveforms, xι(t),l = 1,...,L, we proceed by placing windows of specified length TV at time locations and moveouts given by τ and p respectively, and computing the semblance criterion given by the following for each of these windows.

1 \y ∑r ] \ * i \ f * ι '\ ~ ifi (l)

[0026] The moveout corresponding to the peaks of the semblance above are then declared to be the slowness of the non-dispersive components in the received data. [0027] For discrete time sampled systems, the integrals in the above equation (1) are replaced by sums over corresponding windows:

1 I ^ n -L.V- . I 1 ' Vv - ^ A " i " (2)

[0028] where ∑) δ is a time-shift operator that shifts the input by δ t (which need not be a multiple of the time sampling period).

[0029] ^ This criterion has been studied and is widely used in the processing of non- dispersive arrivals as it has been successful in identifying arrivals irrespective of amplitude. For example, see E. J. Douze and S. J. Laster Statistics of semblance Geophysics, 44(12): 1999-2003, December 1979, (hereinafter "Douze 1979"), which is incorporated herein by reference. [0030] Signal Detection Problem

[0031] It will now be shown that the semblance criterion is simply the likelihood ratio test statistic for a detection (hypothesis testing) problem. To see this, let us consider the signal detection problem for the case where we observe Y LxN comprising length-iV w traces collected at L receivers and are trying to detecting if a common (but unknown) signal / (transposed to indicate it is a row vector) is present in all receivers. [0032] In other words we have the following hypothesis testing problem:

H 0 : F = N

vs. H 1 [ Y = Is' + N where 1 is a column vector of all l's, and is used to indicate that the same signal trace / is present irPall receivers under hypothesis Hl. N represents the noise which is assumed to follow the white Gaussian distribution with unknown variance σ 2 .

[0033] This hypothesis testing problem can be solved by computing the Generalized Likelihood Ratio Test (GLRT) statistic and comparing to a threshold. Harry L. Van Trees Detection, Estimation and Modulation Theory, Part I. Wiley, New York, 1968 (hereinafter "Van Trees 1968") incorporated herein by reference. The GLRT is obtained by computing the likelihood function under each hypothesis and taking the ratio of its maximized value for each hypothesis. Note that the likelihood function is obtained from the probability model for the observed data; it is simply the probability density function evaluated at the observed value expressed as a function of the parameters of the probability model, i.e., when we have a observable X with a probability from a model parameterized by θ, we can write the likelihood function for a given observed value x as L(θ\x) Rather than the ratio of likelihoods, we can equivalently consider the difference of the log of the likelihood functions and get i(- r η:> ^- in; ex L I ' θ [ W " , H p ■■■■ i iu c< L IJ β n 11 " , ^ where LL is the log-likelihood function.

[0034] According to some embodiments, we compute the log likelihood function under H 1 using the assumption of white Gaussian noise like so Λ,..Z.

LL \σ : . φ ' - H] ) - K W <τ ~' 1 J.

(4)

N L , where IHI refers to the Frobenius norm of the argument and K = 1 ^log(2;τ) is a

constant. The quantity inside the Frobenius norm can be shown to consist of where P 1 = -j-1, 1 is the projection onto the subspace of \_ while P 1 is the projection operator on the orthogonal complement of that space.

[0035] The log likelihood in equation (4) can be maximized with respect to the unknown signal s by minimizing the Frobenius norm in equation (5). It is easily seen that

this is obtained by setting s = —V ■ Y which makes the second term in (5) equal to zero.

Finally we maximize the likelihood with respect to σ 2 by setting

\Pr ¥

X tJ , L by using the fact that -nlog x - b/x is maximized when x = b/n.

[0036] Substituting these estimates back into the expression for the log-likelihood function in equation (4), we get where K is the same constant as in equation (4).

[0037] Carrying out a similar development for the log likelihood under Ho, we obtain

V w

111

A , \ X, L J (7) with K being the same constant as above.

[0038] Therefore we can now obtain the GLRT statistic by taking the difference of (6) and (7) and canceling the common terms:

[0039] We note as before that

^ 1 > ! m " and therefore we have

Λ «-l

< 'C L f ϊ } >

(8) where v — •>

Ii Λl 11 1' - J * in

15 ' /J l i v r V 3 ^u (9)

[0040] We observe that the last quantity p has exactly the same form as the semblance of equation (2) used in non-dispersive processing. Since the GLRT is a monotonic function of the semblance p, we hold the latter to be equivalent to the former for the purpose of detecting a signal present in all the sensors.

[0041] Therefore we can interpret our slowness processing methodology as running a detector for each of a number of time- window locations and moveouts and estimating the slowness of propagating non-dispersive components as those values of the moveout where the detector output shows a local peak. [0042] We note that the semblance criterion is invariant to any scaling of the data and so is effective at detecting weak arrivals such as the compressional even with widely varying amplitudes. Hence it is widely used in the commercial processing.

[0043] Proposals for Modification of Semblance

[0044] We now turn to addressing the issue (particularly for LWD) resulting from the same scale invariance, namely that in some cases, weak undesired arrivals such as tool or casing (even after mitigation steps in hardware and/or pre-processing) could register as high semblance events thereby masking or confusing the downhole processing of the true arrivals.

[0045] Using the insight obtained from the previous section, we can address this issue by requiring a minimum energy threshold for the signal to be detected. We consider two different ways of incorporating this requirement in the signal detection problem and derive suitable modifications in each case to the detection test statistic and therefore the semblance in the following two subsections.

[0046] Detection of signal above threshold

[0047] According to some embodiments, the detection problem is set up as a hypothesis testing problem as before but with the additional requirement that the signal present under H 1 meets some specified threshold on its energy (or amplitude):

H 0 : F = N

vs. H 1 : F = k' + iV,|/| 2 > £ 2 where now we have imposed a threshold ε 2 on the energy of the unknown signal. [0048] The maximized log likelihood under H 0 is identical to that of the previous section. We therefore look at the quantity under H 1 . As before we compute -V u . L

LL[Vi \Y, Hi) -■- Λ " P 1 I-- fnΛ

(10)

[0049] We first maximize this with respect to / subject to the following constraint on the signal norm

[0050] Focusing on the term containing s_\ we seek to minimize it in order to maximize the log likelihood and find that the minimizing argument under the constraint is given by

■s lr

with the signal amplitude estimate given by

It can be shown that the quadratic terms in braces in equation (1) equal

[0051] The second term (times L) further simplifies after some algebra to m iϊUf Hi' ■ V Ip (2JU' • 1 ' J! - iπ iKi ' Af iij/ • V iI i) -.-.-. |ii f Vjj " - υuixHl. Le -~ JjJ 1 ' ■ Yψr '- ' i'

[0052] Repeating the same steps as in the previous section we obtain the GLRT statistic for this problem as

Λ « .l 1

(14) where we have defined an analogous (modified) semblance criterion >.'

L P !! / (15) with v defined in (13).

[0053] Rejection of signal below threshold

[0054] According to some embodiments a more general scenario is used where a threshold under H 0 is also invoked. In other words, we expect that a signal could be present below a threshold but interpret it as a spurious arrival rather than the desired signal. Of course we need to also have a threshold to declare signal presence, and the latter threshold must be greater than the former.

[0055] In other words, we consider the detection problem as before but with the following modifications:

#o : F = !/ + Λ ψ| 2 ≤ f o 2 where we now consider the signal energy to obey thresholds εo and ε \ under Ho and H 1 respectively with ε\ > εo.

[0056] The maximization of the log likelihood under H 1 is exactly the same as the previous section with ε \ replacing ε in the corresponding expressions.

[0057] The maximization under Ho is now also similar to that for H 1 but with the difference that the estimate for the signal amplitude is given by ij.l/ < Ηi

- - - ■■ π. i i j l t i i .

L instead of the max function of equation (12). [0058] Working through the remaining steps we find that we can then express the GLRT statistic as

-V u ,i - mini Lt [I I' Y\ I (2| l f r - I]JIn(If 1 I, Y

1 IJlEi Yl ;- — UK Xl Lf ] . \! -Y I* V — in.u<(Lf] . N | ! (16)

[0059] This can again be put into a semblance-like form (with some work) as before where

' 1 I

LW (17) with

[0060] Behavior

[0061] We now take a look at the behavior of the new semblance criterions according to the embodiments described above. We first note that the modified criterion of equation (15) equals the standard semblance quantity when the signal estimate exceeds the threshold

V-Y

L and we have absolutely no difference from the standard output. However when the signal norm is below the threshold, the semblance drops rapidly towards zero equaling it at half the threshold value. Below that it turns negative, but that can be ignored as it implies that the presence of signal above the desired threshold is extremely unlikely and in practice we saturate it at zero.

[0062] Simple Thresholded Semblance

[0063] The above property of a likelihood ratio detector motivates a much simpler modification of the semblance. According to some embodiments, we simply threshold the coherent energy at the specified energy threshold and compute the corresponding semblance.

L i (19) where T τ is the thresholding function:

[0064] In other words, we consider the coherent energy only if it exceeds the stated threshold while computing the semblance and call this modification the thresholded semblance. Clearly this exactly equals the original semblance when the coherent energy exceeds the threshold. [0065] Subtracted semblance

[0066] Another modification is inspired by the form of equation (17). According to these embodiments, we subtract the energy threshold from both the coherent and total energy to correspond to rejection of any signals present below the threshold. [0067] Thus we get the following form: i n:iγ(U Il I ■ Vjj - - i f f ' r i i'b 111 ..xi* L jV l * t.W? ) (20) where we have thresholded the quantities to keep everything positive and have set a small positive minimum δ to keep the semblance stable (this is usually used in a standard semblance as well).

[0068] Alternatively we could modify the numerator of the semblance quantity by attenuating it when it falls below a given threshold.

[0069] The modified semblance of equations (17) and (18) is a general expression, reducing to the single threshold case of (15) when so = 0 and to the original semblance when ει = 0. However we note that while V 1 reduces to 1 Θ Y 2 when the signal estimate as shown above exceeds the threshold ε \ , the same is not true for vo. Therefore the modified semblance of equation (17) is never exactly equal to the original unmodified semblance but is smaller or attenuated. This attenuation bias however becomes small as the signal amplitude rises well above the threshold, the extent of the bias being dependent on the value of the original semblance. The modified semblance of equation (20) exhibits similar behavior. This point is illustrated in Fig. 3 as described below. [0070] Fig. 3 is a plot showing the behavior of various modified semblance criterions, according to some embodiments. The behavior is shown for two cases, with the signal and total energy varied so as keep the original semblance respectively /7= 1.0 and /7 = 0.8. The thresholds shown in Fig. 3 are chosen so that we get a semblance value of zero at the same value of signal amplitude. The modified semblance outputs of equations (15), (17), (19) and (20) are shown as a function of signal amplitude for two values of the original semblance (1.0 and 0.8). In particular, curve 330 is the output of equation (15) for original semblance of 1.0. Curve 334 is the output of equation (17) for the original semblance of

1.0. Curve 320 is the output of equation (19) for the original semblance of 1.0. Curve 332 is the output of equation (20) for the original semblance of 1.0. Curve 340 is the output of equation (15) for the original semblance of 0.8. Curve 344 is the output of equation (17) for the original semblance of 0.8. Curve 322 is the output of equation (19) for the original semblance of 0.8. Curve 342 is the output of equation (20) for the original semblance of 0.8. As mentioned, the thresholds for each case are chosen so as to align the zero cutoff for each modified criterion. In particular, the threshold for the embodiments of equation (15) are ε = 2; the thresholds for the embodiments of equation (17) are £Q = 0.5 and £ \ = 1.5; the threshold for the embodiments of equations (19) and (20) are 1. It can be observed that while the "LR" (equation (15), curves 330 and 340) and "Thr" (equation (19), curves 320 and 322) criterion give back the original semblance above its threshold, the other two (equation (17), curves 334 and 344; and equation (20), curves 332 and 342) show a bias especially when the original semblance is below 1. However this bias quickly becomes small as signal amplitude increases and for values well above the threshold, the difference from the original is small.

[0071] The signal detection performance has been examined based on Monte Carlo simulations using 10000 trials using signal + noise and noise only data to estimate the probability of detection (PD) for a given probability of false alarm (PFA) of 0.01. This was repeated for a number of signal levels keeping the noise level fixed. It has been found that embodiments described with respect to equations (15), (17), (19) and (20) are all effective. In particular, while the original, unthreholded semblance detects signals below the desired level, the modified criterions successfully discriminate against such cases. [0072] The slowness estimation accuracy has been evaluated using the modified criterions and compare to that of the original unthresholded semblance. We again ran Monte Carlo simulations to tabulate the deviation of the semblance peak slowness from the true value. Fig. 4 is a plot showing the slowness estimation error probability distribution. Plot 410 shows the slowness estimation error probability distribution at an SNR of 5dB for the original and each of the modified criterions. It can be observed from Fig. 4 that the error distribution is virtually identical for all cases and the slowness measurement is not compromised by the use of the modifications to suppress the weak signals. [0073] According to some embodiments, the impact of the threshold can be further minimized by customizing it to the slowness-time region where we expect the unwanted arrivals. For example, if the unwanted signal is a weak collar arrival, we may know the approximate slowness of that and can customize the threshold around it. The signal energy threshold is set as a function of slowness so as to apply in the vicinity of the expected collar slowness. A similar customization could be done around the expected time of arrival of the signal. Fig. 5 shows a plot 510 for a case where the threshold is restricted to the region around 60 μs/ft to suppress an LWD collar arrival. According to other embodiments, if we can predict the time of arrival as well, we could similarly restrict the threshold in the time domain too. [0074] Results comparison

[0075] We now compare the performance of the modified semblance criterions with the original one starting with a synthetic example. A synthetic waveform was constructed containing two components with moveouts of 60 μs/ft and 80 μs/ft respectively. The first component is taken as a weak undesired arrival (amplitude = 1) such as the collar while the second is the desired signal such as the compressional, (amplitude = 5). Noise was added corresponding to an SNR of 20 dB. [0076] Fig. 6 is a waveform plot showing the synthetic data used for performance comparisons. The synthetic data illustrated in Fig. 6 shows two arrivals: a "tool" arrival 610 with an amplitude of 1, and a "compressional" arrival 612 with an amplitude of 5. Fig. 7a-e are contour plots showing a comparison of the performance of various semblance modification embodiments using the synthetic data shown in Fig. 6. Fig. 7a shows the contour plot of the original semblance on the STC plane. We see the presence of two arrivals, namely arrival 710 which corresponds to the tool arrival 610 from Fig. 6, and arrival 712 which corresponds to the compressional arrival 612 from Fig. 6. Fig. 7b shows a contour plot of the first modified criterion, according to equation (15) with a threshold of 2. In Fig. 7b, arrival 714 corresponds to the compressional arrival 612. It can also be seen form Fig. 7b that the first undesired arrival, the tool arrival 610 from Fig. 6, is effectively suppressed. Interestingly we see that the long tail of the STC contours of arrival 714 also gets truncated as the threshold operates to remove the contribution from the weak cauda of the second component. Fig. 7c shows a contour plot of the second modified criterion, according to equation (17), with thresholds of 0.5 and 1.5, and arrival 716 which corresponds to the compressional arrival 612 of Fig. 6. Fig 7d show a contour plot of the modified semblance obtained by subtracting the threshold from the coherent and total energy, according to equation (19). Arrival 718 corresponds to the compressional arrival 612 of Fig. 6. The contours are sharper and show lower semblance consistent with the behavior seen in fig. 3, curves 332 and 342. Finally Fig. 7e shows a contour plot for the thresholded semblance, which is simply a masked portion of the original semblance contour but retaining the peaks of interest, according to equation (20). Arrival 720 corresponds to the compressional arrival 612 of Fig. 6. Note that in all the cases shown in Figs. 7b-e, the estimated slowness is very close to the true value of 80. [0077] The modified semblance criterion have also been evaluated on LWD field data in a location where the formation is fast and the compressional arrival comes close to the tool arrival. It was observed that the collar arrival, which was apparent after the conventional semblance processing, was effectively removed using each of the modified semblance criterions with no impact on the main arrival.

[0078] Whereas many alterations and modifications of the present invention will no doubt become apparent to a person of ordinary skill in the art after having read the foregoing description, it is to be understood that the particular embodiments shown and described by way of illustration are in no way intended to be considered limiting. Further, the invention has been described with reference to particular preferred embodiments, but variations within the spirit and scope of the invention will occur to those skilled in the art. It is noted that the foregoing examples have been provided merely for the purpose of explanation and are in no way to be construed as limiting of the present invention. While the present invention has been described with reference to exemplary embodiments, it is understood that the words, which have been used herein, are words of description and illustration, rather than words of limitation. Changes may be made, within the purview of the appended claims, as presently stated and as amended, without departing from the scope and spirit of the present invention in its aspects. Although the present invention has been described herein with reference to particular means, materials and embodiments, the present invention is not intended to be limited to the particulars disclosed herein; rather, the present invention extends to all functionally equivalent structures, methods and uses, such as are within the scope of the appended claims.