5,259 research outputs found
Recommended from our members
The unsteady flow of a weakly compressible fluid in a thin porous layer. I: Two-dimensional theory
We consider the problem of determining the pressure and velocity fields for a weakly compressible fluid flowing in a two-dimensional reservoir in an inhomogeneous, anisotropic porous medium, with vertical side walls and variable upper and lower boundaries, in the presence of vertical wells injecting or extracting fluid. Numerical solution of this problem may be expensive, particularly in the case that the depth scale of the layer h is small compared to the horizontal length scale l. This is a situation which occurs frequently in the application to oil reservoir recovery. Under the assumption that epsilon=h/l<<1, we show that the pressure field varies only in the horizontal direction away from the wells (the outer region). We construct two-term asymptotic expansions in epsilon in both the inner (near the wells) and outer regions and use the asymptotic matching principle to derive analytical expressions for all significant process quantities. This approach, via the method of matched asymptotic expansions, takes advantage of the small aspect ratio of the reservoir, epsilon, at precisely the stage where full numerical computations become stiff, and also reveals the detailed structure of the dynamics of the flow, both in the neighborhood of wells and away from wells
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples
Alignment of LHCb tracking stations with tracks fitted with a Kalman filter
The LHCb detector, operating at the Large Hadron Collider at CERN, is a single arm spectrometer optimized for the detection of the forward b anti-b production for b physics studies. The reconstruction of vertices and tracks is done by silicon micro-strips and gaseous straw-tube based detectors. In order to achieve good mass resolution for resonances the tracking detectors should be aligned to a precision of the order of ten microns. A software framework has been developed to achieve these goals and has been tested in various configurations. After a description of the software, we present alignment results and show in particular for the first time that a global solving for alignment using a locally parameterized track trajectory can be achieved
Competitive market for multiple firms and economic crisis
The origin of economic crises is a key problem for economics. We present a
model of long-run competitive markets to show that the multiplicity of
behaviors in an economic system, over a long time scale, emerge as statistical
regularities (perfectly competitive markets obey Bose-Einstein statistics and
purely monopolistic-competitive markets obey Boltzmann statistics) and that how
interaction among firms influences the evolutionary of competitive markets. It
has been widely accepted that perfect competition is most efficient. Our study
shows that the perfectly competitive system, as an extreme case of competitive
markets, is most efficient but not stable, and gives rise to economic crises as
society reaches full employment. In the economic crisis revealed by our model,
many firms condense (collapse) into the lowest supply level (zero supply,
namely bankruptcy status), in analogy to Bose-Einstein condensation. This
curious phenomenon arises because perfect competition (homogeneous
competitions) equals symmetric (indistinguishable) investment direction, a fact
abhorred by nature. Therefore, we urge the promotion of monopolistic
competition (heterogeneous competitions) rather than perfect competition. To
provide early warning of economic crises, we introduce a resolving index of
investment, which approaches zero in the run-up to an economic crisis. On the
other hand, our model discloses, as a profound conclusion, that the
technological level for a long-run social or economic system is proportional to
the freedom (disorder) of this system; in other words, technology equals the
entropy of system. As an application of this new concept, we give a possible
answer to the Needham question: "Why was it that despite the immense
achievements of traditional China it had been in Europe and not in China that
the scientific and industrial revolutions occurred?"Comment: 17 pages; 3 figure
First studies of T-station alignment with simulated data
The alignment of the tracking stations using tracks fitted using standard LHCb track fit is studied. The procedure is presented together with two examples using simulated data. The first scenario presents the alignment of the IT and OT layers using beam-gas events at 450~GeV with no magnetic field. The second scenario is the alignment of the OT layers and IT boxes, layers and ladders with magnet-on data using minimum bias events at nominal energy. The results are validated by refitting J/ tracks using the misaligned geometry compared to the re-aligned case as well as the default. It is shown that after alignment the J mass resolution is degraded by at most 3~\%
Formal Security Analysis and Performance Evaluation of the Linkable Anonymous Access Protocol
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014International audienceThe introduction of e-Health applications has not only brought benefits, but also raised serious concerns regarding security and privacy of health data. The increasing demands of accessing health data, highlighted critical questions and challenges concerning the confidentiality of electronic patient records and the efficiency of accessing these records. Therefore, the aim of this paper is to provide secure and efficient access to electronic patient records. In this paper, we propose a novel protocol called the Linkable Anonymous Access protocol (LAA). We formally verify and analyse the protocol against security properties such as secrecy and authentication using the Casper/FDR2 verification tool. In addition, we have implemented the protocol using the Java technology to evaluate its performance. Our formal security analysis and performance evaluation proved that the LAA protocol supports secure access to electronic patient records without compromising performance
- âŠ