95 resultados para Leaking.
Resumo:
Dating of a hornblende concentrate by the 40Ar/39Ar method gives an age of 23.4±5.5 m.y. for a dacite boulder from conglomerate in Deep Sea Drilling Project Hole 439. The conglomerate clasts range up to 1 meter in diameter and are nearly monolithologic, suggesting that a nearby former volcano erupted the dacite. The dacite is only 90 km landward from the Japan Trench, whereas modern trench-related volcanoes lie at least 120 km from their trenches. The dacite locality is on strike with and is probably an extension of a magmatic arc on the island of Hokkaido that crosses the Kuril arc at an angle of 65° and which was active 16 to 36 m.y. ago. The part of the former arc landward from the Kuril arc argues against an origin from a leaking subduction zone or from subduction of an active spreading ridge. The part seaward both from the Kuril and Japan arcs weakens an explanation based on migration of a trench-trenchtrench triple junction. The magmatic rocks probably formed along a middle-Tertiary plate boundary that had stepped seaward from a more-landward Cretaceous position. Later, the boundary stepped farther seaward at the Kuril arc and landward again at the Japan arc. If so, the present Japan subduction zone must have consumed most of the strata that had accumulated between it and the earlier trench.
Resumo:
The deployment of CCS (carbon capture and storage) at industrial scale implies the development of effective monitoring tools. Noble gases are tracers usually proposed to track CO2. This methodology, combined with the geochemistry of carbon isotopes, has been tested on available analogues. At first, gases from natural analogues were sampled in the Colorado Plateau and in the French carbogaseous provinces, in both well-confined and leaking-sites. Second, we performed a 2-years tracing experience on an underground natural gas storage, sampling gas each month during injection and withdrawal periods. In natural analogues, the geochemical fingerprints are dependent on the containment criterion and on the geological context, giving tools to detect a leakage of deep-CO2 toward surface. This study also provides information on the origin of CO2, as well as residence time of fluids within the crust and clues on the physico-chemical processes occurring during the geological story. The study on the industrial analogue demonstrates the feasibility of using noble gases as tracers of CO2. Withdrawn gases follow geochemical trends coherent with mixing processes between injected gas end-members. Physico-chemical processes revealed by the tracing occur at transient state. These two complementary studies proved the interest of geochemical monitoring to survey the CO2 behaviour, and gave information on its use.
Resumo:
Direct Steam Generation (DSG) in Linear Fresnel (LF) solar collectors is being consolidated as a feasible technology for Concentrating Solar Power (CSP) plants. The competitiveness of this technology relies on the following main features: water as heat transfer fluid (HTF) in Solar Field (SF), obtaining high superheated steam temperatures and pressures at turbine inlet (500ºC and 90 bar), no heat tracing required to avoid HTF freezing, no HTF degradation, no environmental impacts, any heat exchanger between SF and Balance Of Plant (BOP), and low cost installation and maintenance. Regarding to LF solar collectors, were recently developed as an alternative to Parabolic Trough Collector (PTC) technology. The main advantages of LF are: the reduced collector manufacturing cost and maintenance, linear mirrors shapes versus parabolic mirror, fixed receiver pipes (no ball joints reducing leaking for high pressures), lower susceptibility to wind damages, and light supporting structures allowing reduced driving devices. Companies as Novatec, Areva, Solar Euromed, etc., are investing in LF DSG technology and constructing different pilot plants to demonstrate the benefits and feasibility of this solution for defined locations and conditions (Puerto Errado 1 and 2 in Murcia Spain, Lidellin Newcastle Australia, Kogran Creek in South West Queensland Australia, Kimberlina in Bakersfield California USA, Llo Solar in Pyrénées France,Dhursar in India,etc). There are several critical decisions that must be taken in order to obtain a compromise and optimization between plant performance, cost, and durability. Some of these decisions go through the SF design: proper thermodynamic operational parameters, receiver material selection for high pressures, phase separators and recirculation pumps number and location, pipes distribution to reduce the amount of tubes (reducing possible leaks points and transient time, etc.), etc. Attending to these aspects, the correct design parameters selection and its correct assessment are the main target for designing DSG LF power plants. For this purpose in the recent few years some commercial software tools were developed to simulatesolar thermal power plants, the most focused on LF DSG design are Thermoflex and System Advisor Model (SAM). Once the simulation tool is selected,it is made the study of the proposed SFconfiguration that constitutes the main innovation of this work, and also a comparison with one of the most typical state-of-the-art configuration. The transient analysis must be simulated with high detail level, mainly in the BOP during start up, shut down, stand by, and partial loads are crucial, to obtain the annual plant performance. An innovative SF configurationwas proposed and analyzed to improve plant performance. Finally it was demonstrated thermal inertia and BOP regulation mode are critical points in low sun irradiation day plant behavior, impacting in annual performance depending on power plant location.
Resumo:
Los algoritmos basados en registros de desplazamiento con realimentación (en inglés FSR) se han utilizado como generadores de flujos pseudoaleatorios en aplicaciones con recursos limitados como los sistemas de apertura sin llave. Se considera canal primario a aquel que se utiliza para realizar una transmisión de información. La aparición de los ataques de canal auxiliar (en inglés SCA), que explotan información filtrada inintencionadamente a través de canales laterales como el consumo, las emisiones electromagnéticas o el tiempo empleado, supone una grave amenaza para estas aplicaciones, dado que los dispositivos son accesibles por un atacante. El objetivo de esta tesis es proporcionar un conjunto de protecciones que se puedan aplicar de forma automática y que utilicen recursos ya disponibles, evitando un incremento sustancial en los costes y alargando la vida útil de aplicaciones que puedan estar desplegadas. Explotamos el paralelismo existente en algoritmos FSR, ya que sólo hay 1 bit de diferencia entre estados de rondas consecutivas. Realizamos aportaciones en tres niveles: a nivel de sistema, utilizando un coprocesador reconfigurable, a través del compilador y a nivel de bit, aprovechando los recursos disponibles en el procesador. Proponemos un marco de trabajo que nos permite evaluar implementaciones de un algoritmo incluyendo los efectos introducidos por el compilador considerando que el atacante es experto. En el campo de los ataques, hemos propuesto un nuevo ataque diferencial que se adapta mejor a las condiciones de las implementaciones software de FSR, en las que el consumo entre rondas es muy similar. SORU2 es un co-procesador vectorial reconfigurable propuesto para reducir el consumo energético en aplicaciones con paralelismo y basadas en el uso de bucles. Proponemos el uso de SORU2, además, para ejecutar algoritmos basados en FSR de forma segura. Al ser reconfigurable, no supone un sobrecoste en recursos, ya que no está dedicado en exclusiva al algoritmo de cifrado. Proponemos una configuración que ejecuta múltiples algoritmos de cifrado similares de forma simultánea, con distintas implementaciones y claves. A partir de una implementación sin protecciones, que demostramos que es completamente vulnerable ante SCA, obtenemos una implementación segura a los ataques que hemos realizado. A nivel de compilador, proponemos un mecanismo para evaluar los efectos de las secuencias de optimización del compilador sobre una implementación. El número de posibles secuencias de optimizaciones de compilador es extremadamente alto. El marco de trabajo propuesto incluye un algoritmo para la selección de las secuencias de optimización a considerar. Debido a que las optimizaciones del compilador transforman las implementaciones, se pueden generar automáticamente implementaciones diferentes combinamos para incrementar la seguridad ante SCA. Proponemos 2 mecanismos de aplicación de estas contramedidas, que aumentan la seguridad de la implementación original sin poder considerarse seguras. Finalmente hemos propuesto la ejecución paralela a nivel de bit del algoritmo en un procesador. Utilizamos la forma algebraica normal del algoritmo, que automáticamente se paraleliza. La implementación sobre el algoritmo evaluado mejora en rendimiento y evita que se filtre información por una ejecución dependiente de datos. Sin embargo, es más vulnerable ante ataques diferenciales que la implementación original. Proponemos una modificación del algoritmo para obtener una implementación segura, descartando parcialmente ejecuciones del algoritmo, de forma aleatoria. Esta implementación no introduce una sobrecarga en rendimiento comparada con las implementaciones originales. En definitiva, hemos propuesto varios mecanismos originales a distintos niveles para introducir aleatoridad en implementaciones de algoritmos FSR sin incrementar sustancialmente los recursos necesarios. ABSTRACT Feedback Shift Registers (FSR) have been traditionally used to implement pseudorandom sequence generators. These generators are used in Stream ciphers in systems with tight resource constraints, such as Remote Keyless Entry. When communicating electronic devices, the primary channel is the one used to transmit the information. Side-Channel Attack (SCA) use additional information leaking from the actual implementation, including power consumption, electromagnetic emissions or timing information. Side-Channel Attacks (SCA) are a serious threat to FSR-based applications, as an attacker usually has physical access to the devices. The main objective of this Ph.D. thesis is to provide a set of countermeasures that can be applied automatically using the available resources, avoiding a significant cost overhead and extending the useful life of deployed systems. If possible, we propose to take advantage of the inherent parallelism of FSR-based algorithms, as the state of a FSR differs from previous values only in 1-bit. We have contributed in three different levels: architecture (using a reconfigurable co-processor), using compiler optimizations, and at bit level, making the most of the resources available at the processor. We have developed a framework to evaluate implementations of an algorithm including the effects introduced by the compiler. We consider the presence of an expert attacker with great knowledge on the application and the device. Regarding SCA, we have presented a new differential SCA that performs better than traditional SCA on software FSR-based algorithms, where the leaked values are similar between rounds. SORU2 is a reconfigurable vector co-processor. It has been developed to reduce energy consumption in loop-based applications with parallelism. In addition, we propose its use for secure implementations of FSR-based algorithms. The cost overhead is discarded as the co-processor is not exclusively dedicated to the encryption algorithm. We present a co-processor configuration that executes multiple simultaneous encryptions, using different implementations and keys. From a basic implementation, which is proved to be vulnerable to SCA, we obtain an implementation where the SCA applied were unsuccessful. At compiler level, we use the framework to evaluate the effect of sequences of compiler optimization passes on a software implementation. There are many optimization passes available. The optimization sequences are combinations of the available passes. The amount of sequences is extremely high. The framework includes an algorithm for the selection of interesting sequences that require detailed evaluation. As existing compiler optimizations transform the software implementation, using different optimization sequences we can automatically generate different implementations. We propose to randomly switch between the generated implementations to increase the resistance against SCA.We propose two countermeasures. The results show that, although they increase the resistance against SCA, the resulting implementations are not secure. At bit level, we propose to exploit bit level parallelism of FSR-based implementations using pseudo bitslice implementation in a wireless node processor. The bitslice implementation is automatically obtained from the Algebraic Normal Form of the algorithm. The results show a performance improvement, avoiding timing information leakage, but increasing the vulnerability against differential SCA.We provide a secure version of the algorithm by randomly discarding part of the data obtained. The overhead in performance is negligible when compared to the original implementations. To summarize, we have proposed a set of original countermeasures at different levels that introduce randomness in FSR-based algorithms avoiding a heavy overhead on the resources required.
Resumo:
When linacs operate above 8MV an undesirable neutron field is produced whose spectrum has three main components: the direct spectrum due to those neutrons leaking out from the linac head, the scattered spectrum due to neutrons produced in the head that collides with the nuclei in the head losing energy and the third spectrum due to room-return effect. The third category of spectrum has mainly epithermal and thermal neutrons being constant at any location in the treatment hall. These neutrons induce activation in the linac components, the concrete walls and in the patient body. Here the induced radioisotopes have been identified in concrete samples located in the hall and in one of the wedges. The identification has been carried out using a gamma-ray spectrometer.
Resumo:
Semipermeable cell walls or apoplastic “membranes” have been hypothesized to be present in various plant tissues. Although often associated with suberized or lignified walls, the wall component that confers osmotic semipermeability is not known. In muskmelon (Cucumis melo L.) seeds, a thin, membranous endosperm completely encloses the embryo, creating a semipermeable apoplastic envelope. When dead muskmelon seeds are allowed to imbibe, solutes leaking from the embryo are retained within the envelope, resulting in osmotic water uptake and swelling called osmotic distention (OD). The endosperm envelope of muskmelon seeds stained with aniline blue, which is specific for callose (β-1,3-glucan). Outside of the aniline-blue-stained layer was a Sudan III- and IV-staining (lipid-containing) layer. In young developing seeds 25 d after anthesis (DAA) that did not exhibit OD, the lipid layer was already present but callose had not been deposited. At 35 DAA, callose was detected as distinct vesicles or globules in the endosperm envelope. A thick callose layer was evident at 40 DAA, coinciding with development of the capacity for OD. Removal of the outer lipid layer by brief chloroform treatment resulted in more rapid water uptake by both viable and nonviable (boiled) seeds, but did not affect semipermeability of the endosperm envelope. The aniline-blue-staining layer was digested by β-1,3-glucanase, and these envelopes lost OD. Thus, apoplastic semipermeability of the muskmelon endosperm envelope is dependent on the deposition of a thick callose-containing layer outside of the endosperm cell walls.
Resumo:
The control of radioactive backgrounds will be key in the search for neutrinoless double beta decay at the SNO+ experiment. Several aspects of the SNO+ back- grounds have been studied. The SNO+ tellurium purification process may require ultra low background ethanol as a reagent. A low background assay technique for ethanol was developed and used to identify a source of ethanol with measured 238U and 232Th concentrations below 2.8 10^-13 g/g and 10^-14 g/g respectively. It was also determined that at least 99:997% of the ethanol can be removed from the purified tellurium using forced air ow in order to reduce 14C contamination. In addition, a quality-control technique using an oxygen sensor was studied to monitor 222Rn contamination due to air leaking into the SNO+ scintillator during transport. The expected sensitivity of the technique is 0.1mBq/L or better depending on the oxygen sensor used. Finally, the dependence of SNO+ neutrinoless double beta decay sensitivity on internal background levels was studied using Monte Carlo simulation. The half-life limit to neutrinoless double beta decay of 130Te after 3 years of operation was found to be 4.8 1025 years under default conditions.
Resumo:
Long distance transport of amino acids is mediated by several families of differentially expressed amino acid transporters. The two genes AAP1 and AAP2 encode broad specificity H+-amino acid co-transporters and are expressed to high levels in siliques of Arabidopsis, indicating a potential role in supplying the seeds with organic nitrogen. The expression of both genes is developmentally controlled and is strongly induced in siliques at heart stage of embryogenesis, shortly before induction of storage protein genes. Histochemical analysis of transgenic plants expressing promoter-GUS fusions shows that the genes have non-overlapping expression patterns in siliques. AAP1 is expressed in the endosperm and the cotyledons whereas AAP2 is expressed in the vascular strands of siliques and in funiculi. The endosperm expression of AAP1 during early stages of seed development indicates that the endosperm serves as a transient storage tissue for organic nitrogen. Amino acids are transported in both xylem and phloem but during seed filling are imported only via the phloem. AAP2, which is expressed in the phloem of stems and in the veins supplying seeds, may function in uptake of amino acids assimilated in the green silique tissue, in the retrieval of amino acids leaking passively out of the phloem and in xylem-to-phloem transfer along the path. The promoters provide excellent tools to study developmental, hormonal and metabolic control of nitrogen nutrition during development and may help to manipulate the timing and composition of amino acid import into seeds.
Resumo:
National Highway Traffic Safety Administration, Washington, D.C.
Resumo:
National Highway Safety Bureau, Washington, D.C.
Resumo:
National Highway Traffic Safety Administration, Washington, D.C.