1,377 research outputs found
Control and operational models for vacuum equipment
perational models which describe the behaviour and the physical values associated with the vacuum equipment as seen by an operator have been studied for some time at CERN. Recently, they have been completed by control models, which define in a formal way the data structures required to access the physical values described in the operational model. The control models also define the operations that an application program has to send to the vacuum equipment to modify its state. Object Modelling Techniques (OMT) have been used to formalise the description of the models. In order to test the validity of the concepts, we have made a working prototype in the LEP accelerator. This prototype is being built on top of the CERN SL-Equip equipment access package and uses the "cdev" C++ library, developed at TJNAF, for the interface to application programs. SL-Equip is used for data transmission between front-end computers and vacuum equipment. We use the "cdev" networking facilities to communicate between the workstation and the front-end computers, and the "cdev" generic server as the framework for implementing the vacuum controls software. These packages were used in order to minimise the required software investment, but also to prove that these models are hardware and software independent
First Experience with Control and Operational Models for Vacuum Equipment in the AD Decelerator
Control and Operational models for Vacuum Equipment have been studied at CERN for several years [1]. A prototype implementation was tried out on ion gauges in LEP followed by a full-scale implementation for all vacuum equipment to be controlled in the newly built AD ring. In order to meet the tight time schedule, the existing hardware and software infrastructure of the PS complex has been used. The model server was built on top of this infrastructure. This has introduced some restrictions with respect to a full implementation of the models, but made the server available for all vacuum equipment already installed in the various accelerators which are connected to this control system. In order to test the server, a simplified man-machine interface has been created. This interface presents the available acquisition and control values in a very homogeneous way to the operator, making the advantage of the chosen model approach evident. It also makes additional diagnostic information, previously unavailable, accessible to the vacuum operators
LHCb trigger streams optimization
The LHCb experiment stores around collision events per year. A
typical physics analysis deals with a final sample of up to events.
Event preselection algorithms (lines) are used for data reduction. Since the
data are stored in a format that requires sequential access, the lines are
grouped into several output file streams, in order to increase the efficiency
of user analysis jobs that read these data. The scheme efficiency heavily
depends on the stream composition. By putting similar lines together and
balancing the stream sizes it is possible to reduce the overhead. We present a
method for finding an optimal stream composition. The method is applied to a
part of the LHCb data (Turbo stream) on the stage where it is prepared for user
physics analysis. This results in an expected improvement of 15% in the speed
of user analysis jobs, and will be applied on data to be recorded in 2017.Comment: Submitted to CHEP-2016 proceeding
Scattering of neutrinos on a polarized electron target as a test for new physics beyond the Standard Model
In this paper, we analyze the scattering of the neutrino beam on the
polarized electron target, and predict the effects of two theoretically
possible scenarios beyond the Standard Model. In both scenarios, Dirac
neutrinos are assumed to be massive.
First, we consider how the existence of CP violation phase between the
complex vector V and axial A couplings of the Left-handed neutrinos affects the
azimuthal dependence of the differential cross section. The future superbeam
and neutrino factory experiments will provide the unique opportunity for the
leptonic CP violation studies, if the large magnetized sampling calorimeters
with good event reconstruction capabilities are build.
Next, we take into account a scenario with the participation of the exotic
scalar S coupling of the Right-handed neutrinos in addition to the standard
vector V and axial A couplings of the Left-handed neutrinos. The main goal is
to show how the presence of the R-handed neutrinos, in the above process
changes the spectrum of recoil electrons in relation to the expected Standard
Model prediction, using the current limits on the non-standard couplings. The
interference terms between the standard and exotic couplings in the
differential cross section depend on the angle between the transverse
incoming neutrino polarization and the transverse electron polarization of the
target, and do not vanish in the limit of massless neutrino. The detection of
the dependence on this angle in the energy spectrum of recoil electrons would
be a signature of the presence of the R-handed neutrinos in the
neutrino-electron scattering. To make this test feasible, the polarized
artificial neutrino source needs to be identified.Comment: 11 pages, 3 eps figures, revtex, submitted to publicatio
Remote device access in the new accelerator controls middleware
This paper presents the Remote Device Access (RDA) package developed at CERN in the framework of the joint PS/SL Controls Middleware project. The package design reflects the Accelerator Device Model in which devices, named entities in the control system, can be controlled via properties. RDA implements this model in a distributed environment with devices residing in servers that can run anywhere in the controls network. It provides a location-independent and reliable access to the devices from control programs. By invoking the device access methods, clients can read, write and subscribe to device property values. We describe the architecture and design of RDA its API, and CORBA-based implementations in Java and C++. First applications of RDA in the CERN accelerator control systems are described as well
Methodical aspects of assessment of the level of economic security on the forest sector of the economy
Purpose: The main objective of this study is to develop a methodology for monitoring threats to the economic security of the forestry sector. Design/Methodology/Approach: Based on the principle of consistency, the authors proposed a proper algorithm for assessing the level of economic security of forestry which includes a list of parameters and evaluation criteria. The researchers also described the stages of its implementation and interpreted the results. Findings: The researchers considered the objective and subjective factors that have a negative impact on the forestry sector itself and on the effectiveness of the use of forest resources. The authors argue that there are two groups of threats to the economic security: threats to the forestry sector itself and threats related to the use of forest resources. Practical Implications: The study has practical significance as its results may be used both in forestry to assess the level of economic security of the industry, and in other industries. Originality/Value: The authors contributed to the development of methods for monitoring the threats to economic security in the forestry sector. These methods are aimed at identifying the main risks to the development of the forestry sector that belong to two different groups. The researchers developed the criteria for assessing possible risks and threats to the economic security of the forestry sector.peer-reviewe
- …