14,223 research outputs found
Metal System for Chemical Reactions and for Studying Properties of Gases and Liquids
An all-metal system, made of copper, is herein described. It is suitable for working with those chemicals which do not attack copper. In particular it has been found very useful in the purification of BF3 and B(CH3)3. Some important features of such a system are (1) a complete absence of contaminants; (2) reactions may be carried out up to 500°C; (3) pressures up to several hundred pounds per square inch may be used; (4) flow of gases from very low to very high pressures may be easily controlled; (5) the system is very rugged. This latter point is particularly desirable where noxious or inflammable gases (such as B(CH3)3) are used. A method is also described whereby gases from sealed-off containers under either high or low pressures may be easily retrieved without introducing impurities. Other important advantages of such a system are mentioned in the text
Performance Characterization Using AoI in a Single-loop Networked Control System
The joint design of control and communication scheduling in a Networked
Control System (NCS) is known to be a hard problem. Several research works have
successfully designed optimal sampling and/or control strategies under
simplified communication models, where transmission delays/times are negligible
or fixed. However, considering sophisticated communication models, with random
transmission times, result in highly coupled and difficult-to-solve optimal
design problems due to the parameter inter-dependencies between
estimation/control and communication layers. To tackle this problem, in this
work, we investigate the applicability of Age-of-Information (AoI) for solving
control/estimation problems in an NCS under i.i.d. transmission times. Our
motivation for this investigation stems from the following facts: 1) recent
results indicate that AoI can be tackled under relatively sophisticated
communication models, and 2) a lower AoI in an NCS may result in a lower
estimation/control cost. We study a joint optimization of sampling and
scheduling for a single-loop stochastic LTI networked system with the objective
of minimizing the time-average squared norm of the estimation error. We first
show that under mild assumptions on information structure the optimal control
policy can be designed independently from the sampling and scheduling policies.
We then derive a key result that minimizing the estimation error is equivalent
to minimizing a function of AoI when the sampling decisions are independent of
the state of the LTI system. Noting that minimizing the function of AoI is a
stochastic combinatorial optimization problem and is hard to solve, we resort
to heuristic algorithms obtained by extending existing algorithms in the AoI
literature. We also identify a class of LTI system dynamics for which
minimizing the estimation error is equivalent to minimizing the expected AoI.Comment: 7 pages, IEEE Infocom AoI Workshop, 201
Economic Analysis of Transaction Cost on Kolaramma Tank Watershed in Eastern Dry Zone of Karnataka
The transaction cost incurred on the Kolaramma tank watershed in the Kolar district of Karnataka, with a geographical area of 6,570 hectares and covering 26 catchments has been found to be Rs 78,89,210. The decomposition of this transaction cost into information, contractual and enforcement costs has revealed that enforcement cost amounted to a vast share of 82.0 per cent, followed by contractual cost (13.6%) and information cost (4.4%) in the total transaction cost. Considering the overall transaction cost, the investment on information and contractual cost has been quite less. These need to be increased by economizing on the administrative expenses of the implementing agency. Any additional investment on information and contractual cost would greatly benefit the actual beneficiaries in the watershed.Resource /Energy Economics and Policy,
Multi-aspect, robust, and memory exclusive guest os fingerprinting
Precise fingerprinting of an operating system (OS) is critical to many security and forensics applications in the cloud, such as virtual machine (VM) introspection, penetration testing, guest OS administration, kernel dump analysis, and memory forensics. The existing OS fingerprinting techniques primarily inspect network packets or CPU states, and they all fall short in precision and usability. As the physical memory of a VM always exists in all these applications, in this article, we present OS-Sommelier+, a multi-aspect, memory exclusive approach for precise and robust guest OS fingerprinting in the cloud. It works as follows: given a physical memory dump of a guest OS, OS-Sommelier+ first uses a code hash based approach from kernel code aspect to determine the guest OS version. If code hash approach fails, OS-Sommelier+ then uses a kernel data signature based approach from kernel data aspect to determine the version. We have implemented a prototype system, and tested it with a number of Linux kernels. Our evaluation results show that the code hash approach is faster but can only fingerprint the known kernels, and data signature approach complements the code signature approach and can fingerprint even unknown kernels
An architecture for object-oriented intelligent control of power systems in space
A control system for autonomous distribution and control of electrical power during space missions is being developed. This system should free the astronauts from localizing faults and reconfiguring loads if problems with the power distribution and generation components occur. The control system uses an object-oriented simulation model of the power system and first principle knowledge to detect, identify, and isolate faults. Each power system component is represented as a separate object with knowledge of its normal behavior. The reasoning process takes place at three different levels of abstraction: the Physical Component Model (PCM) level, the Electrical Equivalent Model (EEM) level, and the Functional System Model (FSM) level, with the PCM the lowest level of abstraction and the FSM the highest. At the EEM level the power system components are reasoned about as their electrical equivalents, e.g, a resistive load is thought of as a resistor. However, at the PCM level detailed knowledge about the component's specific characteristics is taken into account. The FSM level models the system at the subsystem level, a level appropriate for reconfiguration and scheduling. The control system operates in two modes, a reactive and a proactive mode, simultaneously. In the reactive mode the control system receives measurement data from the power system and compares these values with values determined through simulation to detect the existence of a fault. The nature of the fault is then identified through a model-based reasoning process using mainly the EEM. Compound component models are constructed at the EEM level and used in the fault identification process. In the proactive mode the reasoning takes place at the PCM level. Individual components determine their future health status using a physical model and measured historical data. In case changes in the health status seem imminent the component warns the control system about its impending failure. The fault isolation process uses the FSM level for its reasoning base
- …
