4 resultados para Topological Flow Field
Resumo:
1st European IAHR Congress,6-4 May, Edinburg, Scotland
Resumo:
Canadian Journal of Civil Engineering 36(10) 1605–16
Resumo:
Zero valent iron nanoparticles (nZVI) are considered very promising for the remediation of contaminated soils and groundwaters. However, an important issue related to their limited mobility remains unsolved. Direct current can be used to enhance the nanoparticles transport, based on the same principles of electrokinetic remediation. In this work, a generalized physicochemical model was developed and solved numerically to describe the nZVI transport through porous media under electric field, and with different electrolytes (with different ionic strengths). The model consists of the Nernst–Planck coupled system of equations, which accounts for the mass balance of ionic species in a fluid medium, when both the diffusion and electromigration of the ions are considered. The diffusion and electrophoretic transport of the negatively charged nZVI particles were also considered in the system. The contribution of electroosmotic flow to the overall mass transport was included in the model for all cases. The nZVI effective mobility values in the porous medium are very low (10−7–10−4 cm2 V−1 s−1), due to the counterbalance between the positive electroosmotic flow and the electrophoretic transport of the negatively charged nanoparticles. The higher the nZVI concentration is in the matrix, the higher the aggregation; therefore, low concentration of nZVI suspensions must be used for successful field application.
Resumo:
Information systems are widespread and used by anyone with computing devices as well as corporations and governments. It is often the case that security leaks are introduced during the development of an application. Reasons for these security bugs are multiple but among them one can easily identify that it is very hard to define and enforce relevant security policies in modern software. This is because modern applications often rely on container sharing and multi-tenancy where, for instance, data can be stored in the same physical space but is logically mapped into different security compartments or data structures. In turn, these security compartments, to which data is classified into in security policies, can also be dynamic and depend on runtime data. In this thesis we introduce and develop the novel notion of dependent information flow types, and focus on the problem of ensuring data confidentiality in data-centric software. Dependent information flow types fit within the standard framework of dependent type theory, but, unlike usual dependent types, crucially allow the security level of a type, rather than just the structural data type itself, to depend on runtime values. Our dependent function and dependent sum information flow types provide a direct, natural and elegant way to express and enforce fine grained security policies on programs. Namely programs that manipulate structured data types in which the security level of a structure field may depend on values dynamically stored in other fields The main contribution of this work is an efficient analysis that allows programmers to verify, during the development phase, whether programs have information leaks, that is, it verifies whether programs protect the confidentiality of the information they manipulate. As such, we also implemented a prototype typechecker that can be found at http://ctp.di.fct.unl.pt/DIFTprototype/.