The existence of resonance peaks in neutron absorption spectra in the epithermal range of energies enables unique non-destructive testing techniques. The deep penetration of epithermal neutrons provides the opportunity to perform a compositional analysis of a sample which is opaque to X-rays and thermal neutrons. The neutron resonances in the transmission spectra constitute a characteristic pattern for many isotopes, which can be used to identify the isotope and to map the distribution of the isotope in a sample. The neutron transmission spectra can be measured with the time of flight (TOF) technique using a pulsed neutron source. Combining this method with a high resolution neutron counting detector enables substantial improvements of spatial resolution of neutron resonance transmission imaging. Such a detector has been developed to register neutrons with 55 J.UIl spatial and 10-1000 ns temporal resolution Our proof-of-principle experiments at the ISIS pulsed neutron spallation source demonstrate that compositional analysis of multi-element samples can now be performed with -150 J.UIl spatial resolution. Images of a test mask consisting of <200 J.UIl thick foils of Au, Ag, In and Gd were collected in the 1-100 eV energy range. The experimental results demonstrate the potential for compositional analysis via resonance absorption transmission with high spatial resolution. In-bulk temperature measurement through Doppler broadening analysis will also benefit from this technique.
Trusted computing is gaining an increasing acceptance in the industry and finding its way to cloud computing. With this penetration, the question arises whether the concept of hard-wired security modules will cope with the increasing sophistication and security requirements of future IT systems and the ever expanding threats and violations. So far, embedding cryptographic hardware engines into the Trusted Platform Module (TPM) has been regarded as a security feature. However, new developments in cryptanalysis, side-channel analysis, and the emergence of novel powerful computing systems, such as quantum computers, can render this approach useless. Given that, the question arises: Do we have to throw away all TPMs and loose the data protected by them, if someday a cryptographic engine on the TPM becomes insecure? To address this question, we present a novel architecture called Sustainable Trusted Platform Module (STPM), which guarantees a secure update of the TPM cryptographic engines without compromising the system's trustworthiness. The STPM architecture has been implemented as a proof-of-concept on top of a Xilinx Virtex-5 FPGA platform, demonstrating a test case with an update of the fundamental hash engine of the TPM.
7his paper was~epared Fwprafitallm *TM I WE SPE India oil and Gas CMfer~Ce and Exhibiticm held in M Oelhi, India, 17.19 Fab~1S98. 7his paper was selected fcf preaantation by an SPE Prcgram Committee following review of inforinatiw contained in m abstract subrnifted by the author(s) Cmtents d the paper, as prasentad, have not bean revmwed by !he Scciely of Petroleum Engineers and are subjed to correction by the author(s) 7he material, as presented, doss noI necessarily reflect any psition of tk Society of Petroleum Eqinoers, Is oficars, or membsrs. Papers presented at SPE meetings are subjecl fo pbTication review by Editorial Committees of tie Society of Pefroleum Engineers. Electronic reproduction, distribution, or elwage of any part of this paper for commercial purposes without the writ!en ansent of the Society of Petroleum Engineers is prohibited. Permission to reproduca in print is restricted 10 an abstract of not more than 300 words, illustratmns may not be copied. The abstract must mntain canapicuous acknowledgment of wkre and by whom fhe pa~er was presented Write Libfarian, SPE, PO Box 83383e. Richardson. TX 7~-3~, U.SA,. fex 01-972-952-9435. AbstractThe PY-3 field, located some 18km offshore TamiI Nadu in the Cauvery Basin in southeast India, was discovered by ONGC in 1988. The field which lies in license CY-OS-90/l was awarded to the consortium in the 4th exploration licensing round offered in 1991. The appraisal of the PY-3 field has shown the structure to be complex from a subsurface perspective.The reservoir comprises moderate to low quality Cretaceus sandstones of the Nannilam Formation. The sands were deposited as debriflow deposits in a trough formed by basement highs to the east and west of the field.Laterally the reservoir exhibits significant variation in rese~oir quality. Variations in the overburden stratigraphy, result in large velocity variations and hence difficulty in modelling the depth to top structure which does not exhibit closure in time.These substiface uncertainties have been accommodated by adopting a phased development. me initial phase of development activity commenced in 1996 with first production in 1997. The development comprises subsea wells tied back to a floating production unit. A total of four wells have been used to develop the field, two of which were re-entries of existing appraisal wells.Further development of the PY-3 field, involving potential water injection or infilI drilling, will be implemented depending upon early reservoir performance.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.