Mineral exploration with 3-D controlled-source electromagnetic method: A synthetic study of Sukhoi Log gold deposit

M. Malovichko, A. V. Tarasov, N. Yavich, M. S. Zhdanov

    Research output: Contribution to journalArticlepeer-review

    9 Citations (Scopus)

    Abstract

    This paper presents a feasibility study of using the controlled-source frequency-domain electromagnetic (CSEM) method in mineral exploration. The method has been widely applied for offshore hydrocarbon exploration; however, nowadays this method is rarely used on land. In order to conduct this study, we have developed a fully parallelized forward modelling finitedifference (FD) code based on the iterative solver with contraction-operator preconditioner. The regularized inversion algorithm uses the Gauss-Newton method to minimize the Tikhonov parametric functional with the Laplacian-type stabilizer. A 3-D parallel inversion code, based on the iterative finite-difference solver with the contraction-operator preconditioner, has been evaluated for the solution of the large-scale inverse problems. Using the computer simulation for a synthetic model of Sukhoi Log gold deposit, we have compared the CSEM method with the conventional direct current sounding and the CSEM survey with a single remote transmitter. Our results suggest that, a properly designed electromagnetic survey together with modern 3-D inversion could provide detailed information about the geoelectrical structure of the mineral deposit.

    Original languageEnglish
    Pages (from-to)1698-1716
    Number of pages19
    JournalGeophysical Journal International
    Volume219
    Issue number3
    DOIs
    Publication statusPublished - 30 Aug 2019

    Keywords

    • Controlled source electromagnetics (CSEM)
    • Electrical properties
    • Electromagnetic theory
    • Inverse theory
    • Numerical solutions

    Fingerprint

    Dive into the research topics of 'Mineral exploration with 3-D controlled-source electromagnetic method: A synthetic study of Sukhoi Log gold deposit'. Together they form a unique fingerprint.

    Cite this