A review of the pressure transient analysis of flow in reservoirs having natural fractures,vugs and/or caves is presented to provide an insight into how much kn... 相似文献
During the past decade, rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices. Service providers have hosted multiple servers to ensure seamless online services to end-users. To ensure the security of this online communication, researchers have proposed several multi-server authentication schemes incorporating various cryptographic primitives. Due to the low power and computational capacities of mobile devices, the hash-based multi-server authenticated key agreement schemes with offline Registration Server (RS) are the most efficient choice. Recently, Kumar-Om presented such a scheme and proved its security against all renowned attacks. However, we find that their scheme bears an incorrect login phase, and is unsafe to the trace attack, the Session-Specific Temporary Information Attack (SSTIA), and the Key Compromise Impersonation Attack (KCIA). In fact, all of the existing multi-server authentication schemes (hash-based with offline RS) do not withstand KCIA. To deal with this situation, we propose an improved hash-based multi-server authentication scheme (with offline RS). We analyze the security of the proposed scheme under the random oracle model and use the ‘‘Automated Validation of Internet Security Protocols and Applications’’ (AVISPA) tool. The comparative analysis of communication overhead and computational complexity metrics shows the efficiency of the proposed scheme. 相似文献
A hybrid model integrates a first-principles model with a data-driven model which predicts certain unknown dynamics of the process, resulting in higher accuracy than first-principles model. Additionally, a hybrid model has better extrapolation capabilities compared with a data-based model, which is useful for process control and optimization purposes. Nonetheless, the domain of applicability (DA) of a hybrid model is finite and should be taken into account when developing a hybrid model-based predictive controller in order to maximize its performance. To this end, a Control Lyapunov–Barrier Function-based model predictive controller (CLBF-based MPC) is developed which utilizes a deep hybrid model (DHM), that is, a deep neural network (DNN) combined with a first-principles model. Additionally, theoretical guarantees are provided on stability as well as on system states to stay within the DA of the DHM. The efficacy of the proposed control framework is demonstrated on a continuous stirred tank reactor. 相似文献
Biogenic nanoarchitectured magnetic materials have drawn serious attention throughout the last decade. We have attempted the Helleborus niger flower extract functionalized and templated biogenic synthesis of Cu nanoparticles supported Fe3O4 as a likewise novel material. The plant phytomolecules were deployed as a non-toxic sustainable reductant and an outstanding capping agent to stabilize the synthesized NPs. The synthesized Cu/H.niger@Fe3O4 nanocomposite was undergone comprehensive characterizations through Fourier transformed infrared spectroscopy (FT-IR), electron microscopy (SEM and TEM), energy dispersive X-ray spectroscopy (EDX), elemental mapping, vibrating sample magnetometer (VSM), X-ray diffraction (XRD) and inductively coupled plasma (ICP) techniques. The material was catalytically explored in the synthesis of diverse pyrano[3,2-c]chromene derivatives by coupling 4-hydroxycoumarin, malononitrile and a range of aldehydes in hot water when it afforded excellent yields. Based on its core magnetism, the catalyst was easily recovered using a magnet and reused for 8 successive times without considerable loss in catalytic activity. After the chemical application, the synthesized Cu/H.niger@Fe3O4 nanocomposite was engaged in biological assays like study of anti-oxidant properties by DPPH mediated free radical scavenging test using BHT as a reference molecule. Thereafter, on having a significant IC50 value in radical scavenging assay, we extended the bio-application of the desired nanocomposite in anticancer study of A549 and H358 human lung cell lines in-vitro through MTT assay. The cell viability of malignant lung cell line reduced dose-dependently in the presence of desired nanocomposite. So, these results suggest that synthesized Cu/H.niger@Fe3O4 as a chemotherapeutic nanomaterial have a suitable anticancer activity against lung cell lines.
Modern shared-memory multi-core processors typically have shared Level 2 (L2) or Level 3 (L3) caches. Cache bottlenecks and replacement strategies are the main problems of such architectures, where multiple cores try to access the shared cache simultaneously. The main problem in improving memory performance is the shared cache architecture and cache replacement. This paper documents the implementation of a Dual-Port Content Addressable Memory (DPCAM) and a modified Near-Far Access Replacement Algorithm (NFRA), which was previously proposed as a shared L2 cache layer in a multi-core processor. Standard Performance Evaluation Corporation (SPEC) Central Processing Unit (CPU) 2006 benchmark workloads are used to evaluate the benefit of the shared L2 cache layer. Results show improved performance of the multicore processor’s DPCAM and NFRA algorithms, corresponding to a higher number of concurrent accesses to shared memory. The new architecture significantly increases system throughput and records performance improvements of up to 8.7% on various types of SPEC 2006 benchmarks. The miss rate is also improved by about 13%, with some exceptions in the sphinx3 and bzip2 benchmarks. These results could open a new window for solving the long-standing problems with shared cache in multi-core processors. 相似文献
Pandemics have always been a nightmare for humanity, especially in developing countries. Forced lockdowns are considered one of the effective ways to deal with spreading such pandemics. Still, developing countries cannot afford such solutions because these may severely damage the country’s economy. Therefore, this study presents the proactive technological mechanisms for business organizations to run their standard business processes during pandemic-like situations smoothly. The novelty of this study is to provide a state-of-the-art solution to prevent pandemics using industrial internet of things (IIoT) and blockchain-enabled technologies. Compared to existing studies, the immutable and tamper-proof contact tracing and quarantine management solution is proposed. The use of advanced technologies and information security is a critical area for practitioners in the internet of things (IoT) and corresponding solutions. Therefore, this study also emphasizes information security, end-to-end solution, and experimental results. Firstly, a wearable wristband is proposed, incorporating 4G-enabled ultra-wideband (UWB) technology for smart contact tracing mechanisms in industries to comply with standard operating procedures outlined by the world health organization (WHO). Secondly, distributed ledger technology (DLT) omits the centralized dependency for transmitting contact tracing data. Thirdly, a privacy-preserving tracing mechanism is discussed using a public/private key cryptography-based authentication mechanism. Lastly, based on geofencing techniques, blockchain-enabled machine-to-machine (M2M) technology is proposed for quarantine management. The step-by-step methodology and test results are proposed to ensure contact tracing and quarantine management. Unlike existing research studies, the security aspect is also considered in the realm of blockchain. The practical implementation of the proposed solution also obtains the results. The results indicate the successful implementation of blockchain-enabled contact tracing and isolation management using IoT and geo-fencing techniques, which could help battle pandemic situations. Researchers can also consider the 5G-enabled narrowband internet of things (NB-IoT) technologies to implement contact tracing solutions. 相似文献
Internet of underwater things (IoUT) for underwater monitoring is known worldwide for smart interlinked underwater things that exhibit the capacity to monitor the vast unexplored waters of the oceans. Concept of IoUT has been derived from Internet of Things (IoT) in order to acquire the exquisite benefits of networking in underwater environment. IOT standards and technologies do not work well in underwater environment, such as infrared, Wi-Fi, and radio frequency (RF) due to high channel errors and limited range up to few meters. Acoustic waves, however, can be used to communicate both in shallow and deep oceans due to their low frequency (kHZ) signal. In context of IoUT, communication based on acoustic links enables different applications such as underwater exploration, environmental monitoring, and disaster prevention even without availability of GPS facility like free space environment. In unpredictable and changing underwater environment, energy efficiency becomes a major challenge during data routing along multiple devices. Batteries of the sensor nodes, autonomous underwater vehicle (AUV), and remotely operated vehicle (ROV) cannot be removed with easiness and difficult to recharge, and the only way out is efficient sensor node selection for relaying to save massive amount of energy. Energy aware channel routing protocol (ECARP) does not consider the depth of the node while selecting the relay nodes to forward the data. Relay node selection in underwater Internet of things (IOUT) is a primary problem addressed in this research based on channel state information (CSI) for establishing best path to relay information among IOUT devices. Our major focus was to develop better technique for the relay node selection using a CSI and select relay node by looking at its depth from ocean surface and residual energy in the proposed ED-CARP. Simulation results validate that proposed ED-CARP can decrease the communication cost and increase the network lifetime. 相似文献