1,377 research outputs found

    Control and operational models for vacuum equipment

    Get PDF
    perational models which describe the behaviour and the physical values associated with the vacuum equipment as seen by an operator have been studied for some time at CERN. Recently, they have been completed by control models, which define in a formal way the data structures required to access the physical values described in the operational model. The control models also define the operations that an application program has to send to the vacuum equipment to modify its state. Object Modelling Techniques (OMT) have been used to formalise the description of the models. In order to test the validity of the concepts, we have made a working prototype in the LEP accelerator. This prototype is being built on top of the CERN SL-Equip equipment access package and uses the "cdev" C++ library, developed at TJNAF, for the interface to application programs. SL-Equip is used for data transmission between front-end computers and vacuum equipment. We use the "cdev" networking facilities to communicate between the workstation and the front-end computers, and the "cdev" generic server as the framework for implementing the vacuum controls software. These packages were used in order to minimise the required software investment, but also to prove that these models are hardware and software independent

    First Experience with Control and Operational Models for Vacuum Equipment in the AD Decelerator

    Get PDF
    Control and Operational models for Vacuum Equipment have been studied at CERN for several years [1]. A prototype implementation was tried out on ion gauges in LEP followed by a full-scale implementation for all vacuum equipment to be controlled in the newly built AD ring. In order to meet the tight time schedule, the existing hardware and software infrastructure of the PS complex has been used. The model server was built on top of this infrastructure. This has introduced some restrictions with respect to a full implementation of the models, but made the server available for all vacuum equipment already installed in the various accelerators which are connected to this control system. In order to test the server, a simplified man-machine interface has been created. This interface presents the available acquisition and control values in a very homogeneous way to the operator, making the advantage of the chosen model approach evident. It also makes additional diagnostic information, previously unavailable, accessible to the vacuum operators

    LHCb trigger streams optimization

    Full text link
    The LHCb experiment stores around 101110^{11} collision events per year. A typical physics analysis deals with a final sample of up to 10710^7 events. Event preselection algorithms (lines) are used for data reduction. Since the data are stored in a format that requires sequential access, the lines are grouped into several output file streams, in order to increase the efficiency of user analysis jobs that read these data. The scheme efficiency heavily depends on the stream composition. By putting similar lines together and balancing the stream sizes it is possible to reduce the overhead. We present a method for finding an optimal stream composition. The method is applied to a part of the LHCb data (Turbo stream) on the stage where it is prepared for user physics analysis. This results in an expected improvement of 15% in the speed of user analysis jobs, and will be applied on data to be recorded in 2017.Comment: Submitted to CHEP-2016 proceeding

    Scattering of neutrinos on a polarized electron target as a test for new physics beyond the Standard Model

    Full text link
    In this paper, we analyze the scattering of the neutrino beam on the polarized electron target, and predict the effects of two theoretically possible scenarios beyond the Standard Model. In both scenarios, Dirac neutrinos are assumed to be massive. First, we consider how the existence of CP violation phase between the complex vector V and axial A couplings of the Left-handed neutrinos affects the azimuthal dependence of the differential cross section. The future superbeam and neutrino factory experiments will provide the unique opportunity for the leptonic CP violation studies, if the large magnetized sampling calorimeters with good event reconstruction capabilities are build. Next, we take into account a scenario with the participation of the exotic scalar S coupling of the Right-handed neutrinos in addition to the standard vector V and axial A couplings of the Left-handed neutrinos. The main goal is to show how the presence of the R-handed neutrinos, in the above process changes the spectrum of recoil electrons in relation to the expected Standard Model prediction, using the current limits on the non-standard couplings. The interference terms between the standard and exotic couplings in the differential cross section depend on the angle α\alpha between the transverse incoming neutrino polarization and the transverse electron polarization of the target, and do not vanish in the limit of massless neutrino. The detection of the dependence on this angle in the energy spectrum of recoil electrons would be a signature of the presence of the R-handed neutrinos in the neutrino-electron scattering. To make this test feasible, the polarized artificial neutrino source needs to be identified.Comment: 11 pages, 3 eps figures, revtex, submitted to publicatio

    Remote device access in the new accelerator controls middleware

    Get PDF
    This paper presents the Remote Device Access (RDA) package developed at CERN in the framework of the joint PS/SL Controls Middleware project. The package design reflects the Accelerator Device Model in which devices, named entities in the control system, can be controlled via properties. RDA implements this model in a distributed environment with devices residing in servers that can run anywhere in the controls network. It provides a location-independent and reliable access to the devices from control programs. By invoking the device access methods, clients can read, write and subscribe to device property values. We describe the architecture and design of RDA its API, and CORBA-based implementations in Java and C++. First applications of RDA in the CERN accelerator control systems are described as well

    Methodical aspects of assessment of the level of economic security on the forest sector of the economy

    Get PDF
    Purpose: The main objective of this study is to develop a methodology for monitoring threats to the economic security of the forestry sector. Design/Methodology/Approach: Based on the principle of consistency, the authors proposed a proper algorithm for assessing the level of economic security of forestry which includes a list of parameters and evaluation criteria. The researchers also described the stages of its implementation and interpreted the results. Findings: The researchers considered the objective and subjective factors that have a negative impact on the forestry sector itself and on the effectiveness of the use of forest resources. The authors argue that there are two groups of threats to the economic security: threats to the forestry sector itself and threats related to the use of forest resources. Practical Implications: The study has practical significance as its results may be used both in forestry to assess the level of economic security of the industry, and in other industries. Originality/Value: The authors contributed to the development of methods for monitoring the threats to economic security in the forestry sector. These methods are aimed at identifying the main risks to the development of the forestry sector that belong to two different groups. The researchers developed the criteria for assessing possible risks and threats to the economic security of the forestry sector.peer-reviewe
    corecore