6,021 research outputs found
Recommended from our members
The unsteady flow of a weakly compressible fluid in a thin porous layer. I: Two-dimensional theory
We consider the problem of determining the pressure and velocity fields for a weakly compressible fluid flowing in a two-dimensional reservoir in an inhomogeneous, anisotropic porous medium, with vertical side walls and variable upper and lower boundaries, in the presence of vertical wells injecting or extracting fluid. Numerical solution of this problem may be expensive, particularly in the case that the depth scale of the layer h is small compared to the horizontal length scale l. This is a situation which occurs frequently in the application to oil reservoir recovery. Under the assumption that epsilon=h/l<<1, we show that the pressure field varies only in the horizontal direction away from the wells (the outer region). We construct two-term asymptotic expansions in epsilon in both the inner (near the wells) and outer regions and use the asymptotic matching principle to derive analytical expressions for all significant process quantities. This approach, via the method of matched asymptotic expansions, takes advantage of the small aspect ratio of the reservoir, epsilon, at precisely the stage where full numerical computations become stiff, and also reveals the detailed structure of the dynamics of the flow, both in the neighborhood of wells and away from wells
Back flushing on milking machine teat cups
THE possibility of replacing the dipping of teat cups between cows with a system of back flushing with water has been investigated for some time by different workers
How early studies on secreted and membrane protein quality control gave rise to the ER associated degradation (ERAD) pathway: The early history of ERAD
AbstractAll newly synthesized proteins are subject to quality control check-points, which prevent aberrant polypeptides from harming the cell. For proteins that ultimately reside in the cytoplasm, components that also reside in the cytoplasm were known for many years to mediate quality control. Early biochemical and genetic data indicated that misfolded proteins were selected by molecular chaperones and then targeted to the proteasome (in eukaryotes) or to proteasome-like particles (in bacteria) for degradation. What was less clear was how secreted and integral membrane proteins, which in eukaryotes enter the endoplasmic reticulum (ER), were subject to quality control decisions. In this review, we highlight early studies that ultimately led to the discovery that secreted and integral membrane proteins also utilize several components that constitute the cytoplasmic quality control machinery. This component of the cellular quality control pathway is known as ER associated degradation, or ERAD. This article is part of a Special Issue entitled: Functional and structural diversity of endoplasmic reticulum
Bulletin No. 201 - Economic Insects in Some Streams of Northern Utah
The food of trout in our mountain streams is mainly insects. It is, in part, land insects that fall on the water and are taken as they float upon its surface, but in a much larger part it is insects that grow up in the water and are taken in their immature stages. These are the constant and dependable food-supply. They have been little studied hitherto. This bulletin is a report of a preliminary examination of some Utah streams, made for the purpose of discovering what forms of life are present in the streams and in what relative abundance. Some are beneficial and some injurious to trout, being competitors with them for food
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols
We define a sequent calculus to formally specify, simulate, debug and verify security protocols. In our sequents we distinguish between the current knowledge of principals and the current global state of the session. Hereby, we can describe the operational semantics of principals and of an intruder in a simple and modular way. Furthermore, using proof theoretic tools like the analysis of permutability of rules, we are able to find efficient proof strategies that we prove complete for special classes of security protocols including Needham-Schroeder. Based on the results of this preliminary analysis, we have implemented a Prolog meta-interpreter which allows for rapid prototyping and for checking safety properties of security protocols, and we have applied it for finding error traces and proving correctness of practical examples
- …