1,443 research outputs found

    Gravity-Driven Reacting Flows in a Confined Porous Aquifer

    Get PDF
    We develop a model for the dynamics of a reactive gravity-driven flow in a porous layer of finite depth, accounting for the change in permeability and density across the dissolution front. We identify that the two controlling parameters are the mobility ratio across the reaction front and the ratio of the buoyancy-driven flow to the fluid injection rate. We present some numerical solutions for the evolution of a two-dimensional dissolution front, and develop an approximate analytic solution for the limit of large injection rate compared to the buoyancy-driven flow. The model predictions are compared with some new analogue laboratory experiments in which fresh water displaces a saturated aqueous solution initially confined within a two-dimensional reactive permeable matrix composed of salt powder and glass ballotini. We also present self-similar solutions for an axisymmetric gravity-driven reactive current moving through a porous layer of finite depth. The solutions illustrate how the reaction front becomes progressively wider as the ratio of the buoyancy-driven flow to the injection rate increases, and also as the mobility contrast across the front increases

    Three-dimensional buoyancy-driven flow along a fractured boundary

    Get PDF
    We describe the steady motion of a buoyant fluid migrating through a porous layer along a plane, inclined boundary from a localized well. We first describe the transition from an approximately radially spreading current near the source, to a flow which runs upslope, as it spreads in the cross-slope direction. Using the model, we predict the maximum injection rate for which, near the source, the flow does not fully flood the porous layer. We then account for the presence of a fracture on the boundary through which some of the flow can drain upwards, and calculate how the current is partitioned between the fraction that drains and the remainder which continues running upslope. The fraction that drains increases with the permeability of the fracture and also with the distance from the source, as the flow slows and has more time to drain. We introduce new scalings and some asymptotic solutions to describe both the flow near the fracture and the three-dimensional surface of the injected fluid as it spreads upslope. We extend the model to the case of multiple fractures, so that the current eventually drains away as it flows over successive fractures. We calculate the shape of the region that is invaded by the buoyant fluid and we show that this flow, draining through a series of discrete fractures, may be approximated by a flow that continuously drains through its upper boundary. The effective small uniform permeability of this upper boundary is given by \textbackslash{k}_{b} \textbackslashapprox \textbackslashint \textbackslashnolimits {k}_{f} \textbackslashhspace{0.167em} \textbackslashmathrm{d} x/ {D}_{F} \textbackslash, where \textbackslash\textbackslashint \textbackslashnolimits {k}_{f} \textbackslashhspace{0.167em} \textbackslashmathrm{d} x\textbackslash is the integral of permeability across the width of the fracture and \textbackslash{D}_{F} \textbackslash is the inter-fracture spacing. Finally, we discuss the relevance of the work for CO2 sequestration and we compare some simple predictions of the plume shape, volume and volume flux derived from our model with data from the Sleipner project, Norway for the plume of CO2 which developed in Horizon 1

    Self-similar dynamics of liquid injected into partially saturated aquifers

    Full text link

    Formalising attack trees to support economic analysis

    Get PDF
    Attack trees and attack graphs are both examples of what one might term attack modelling techniques. The primary purpose of such techniques is to help establish and enumerate the ways in which a system could be compromised; as such, they play a key role in the (security) risk analysis process. Given their role and the consequent need to ensure that they are correct, there are good reasons for capturing such artefacts in a formal manner. We describe such a formal approach, which has been motivated by a desire to model attacks from the perspectives of attackers, to support economic analysis. As an illustration, we consider exploitation cost

    Formalising attack trees to support economic analysis

    Get PDF
    Attack trees and attack graphs are both examples of what one might term attack modelling techniques. The primary purpose of such techniques is to help establish and enumerate the ways in which a system could be compromised; as such, they play a key role in the (security) risk analysis process. Given their role and the consequent need to ensure that they are correct, there are good reasons for capturing such artefacts in a formal manner. We describe such a formal approach, which has been motivated by a desire to model attacks from the perspectives of attackers, to support economic analysis. As an illustration, we consider exploitation cost
    • …
    corecore