12 results on '"Blond P"'
Search Results
2. Numerical Simulation Of Impregnation In Porous Media By Self-organized Gradient Percolation Method
- Author
-
Nguyen, Anh Khoa, Blond, Eric, Sayet, Thomas, Batakis, Athanasios, De Bilbao, E., and Duong, Minh Duc
- Subjects
Physics - Computational Physics - Abstract
The aim of this work is to develop a new numerical method to overcome the computational difficulties of numerical simulation of unsaturated impregnation in porous media. The numerical analysis by classical methods (F.E.M, theta-method, ...) for this phenomenon require small time-step and space discretization to ensure both convergence and accuracy. Yet this leads to a high computational cost. Moreover, a very small time-step can lead to spurious oscillations that impact the precision of the results. Thus, we propose to use a Self-organized Gradient Percolation (SGP) algorithm to reduce the computational cost and overcome these numerical drawbacks. The (SGP) method is based on gradient percolation theory, relevant to calculation of local saturation. The initialization of this algorithm is driven by an analytic solution of the homogenous diffusion equation, which is a convolution between a Probability Density Function (PDF) and a smoothing function. Thus, we propose to reproduce the evolution of the capillary pressure profiles by the evolution of the standard deviation of the PDF. This algorithm is validated by comparing the results with the capillary pressure profiles and the mass gain curve obtained by finite element simulations and experimental measurements, respectively. The computational time of the proposed algorithm is lower than that of finite element models for one-dimension case. In conclusion, the SGP method permits to reduce the computational cost and does not produce spurious oscillations. The work is still going on for extension in 3D and the first results are promising.
- Published
- 2018
3. Simulation of the impregnation in the porous media by the Self- organized Gradient Percolation method
- Author
-
Nguyen, Anh Khoa, Blond, Eric, Sayet, Thomas, De Bilbao, E., Batakis, Athanasios, and Duong, Minh Duc
- Subjects
Condensed Matter - Soft Condensed Matter ,Physics - Classical Physics ,Physics - Data Analysis, Statistics and Probability - Abstract
Many processes can correspond to reactive impregnation in porous solids. These processes are usually numerically computed by classical methods like finite element method, finite volume method, etc. The disadvantage of these methods remains in the computational time. The convergence and accuracy require a small step-time and a small mesh size, which is expensive in computational time and can induce a spurious oscillation. In order to avoid this problem, we propose a Self-organized Gradient Percolation algorithm. This method permits to reduce the CPU time drastically.
- Published
- 2018
4. Modeling of Coal Drying before Pyrolysis
- Author
-
Kolani, Damintode, Blond, Eric, Gasser, Alain, Rozhkova, Tatiana, and Landreau, Matthieu
- Subjects
Condensed Matter - Materials Science - Abstract
The coking process is composed of two main stages: drying process and pyrolysis of coal. A heat and mass transfer model was developed to simulate the drying process of coal. The mechanisms of heat and mass transfer described in the model are: conduction through the coal cake; conduction and convection through the gas in pores; generation, flux and condensation of water vapor. The model has been implemented in finite element software. It requires basic data on the coke oven charge properties and oven dimensions as input. These input data were obtained by experiments or from the literature. The proposed model includes condensation and evaporation allowing us to reproduce the temperature plateau observed experimentally.
- Published
- 2013
- Full Text
- View/download PDF
5. I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users' Privacy
- Author
-
Blond, Stevens Le, Chao, Zhang, Legout, Arnaud, Ross, Keith W., and Dabbous, Walid
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
In this paper, we show how to exploit real-time communication applications to determine the IP address of a targeted user. We focus our study on Skype, although other real-time communication applications may have similar privacy issues. We first design a scheme that calls an identified targeted user inconspicuously to find his IP address, which can be done even if he is behind a NAT. By calling the user periodically, we can then observe the mobility of the user. We show how to scale the scheme to observe the mobility patterns of tens of thousands of users. We also consider the linkability threat, in which the identified user is linked to his Internet usage. We illustrate this threat by combining Skype and BitTorrent to show that it is possible to determine the file-sharing usage of identified users. We devise a scheme based on the identification field of the IP datagrams to verify with high accuracy whether the identified user is participating in specific torrents. We conclude that any Internet user can leverage Skype, and potentially other real-time communication systems, to observe the mobility and file-sharing usage of tens of millions of identified users., Comment: This is the authors' version of the ACM/USENIX Internet Measurement Conference (IMC) 2011 paper
- Published
- 2011
6. One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
- Author
-
Blond, Stevens Le, Manils, Pere, Abdelberi, Chaabane, Kaafar, Mohamed Ali Dali, Castelluccia, Claude, Legout, Arnaud, and Dabbous, Walid
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in practice to trace a significant number of streams originating from secure (i.e., proxied) applications. In this paper, we show that linkability allows us to trace 193% of additional streams, including 27% of HTTP streams possibly originating from "secure" browsers. In particular, we traced 9% of Tor streams carried by our instrumented exit nodes. Using BitTorrent as the insecure application, we design two attacks tracing BitTorrent users on Tor. We run these attacks in the wild for 23 days and reveal 10,000 IP addresses of Tor users. Using these IP addresses, we then profile not only the BitTorrent downloads but also the websites visited per country of origin of Tor users. We show that BitTorrent users on Tor are over-represented in some countries as compared to BitTorrent users outside of Tor. By analyzing the type of content downloaded, we then explain the observed behaviors by the higher concentration of pornographic content downloaded at the scale of a country. Finally, we present results suggesting the existence of an underground BitTorrent ecosystem on Tor.
- Published
- 2011
7. Pushing BitTorrent Locality to the Limit
- Author
-
Blond, Stevens Le, Legout, Arnaud, and Dabbous, Walid
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, it dramatically increases the traffic on inter-ISP links. To solve this issue, the idea to keep a fraction of the P2P traffic local to each ISP was introduced a few years ago. Since then, P2P solutions exploiting locality have been introduced. However, several fundamental issues on locality still need to be explored. In particular, how far can we push locality, and what is, at the scale of the Internet, the reduction of traffic that can be achieved with locality? In this paper, we perform extensive experiments on a controlled environment with up to 10,000 BitTorrent clients to evaluate the impact of high locality on inter-ISP links traffic and peers download completion time. We introduce two simple mechanisms that make high locality possible in challenging scenarios and we show that we save up to several orders of magnitude inter-ISP traffic compared to traditional locality without adversely impacting peers download completion time. In addition, we crawled 214,443 torrents representing 6,113,224 unique peers spread among 9,605 ASes. We show that whereas the torrents we crawled generated 11.6 petabytes of inter-ISP traffic, our locality policy implemented for all torrents could have reduced the global inter-ISP traffic by up to 40%.
- Published
- 2010
- Full Text
- View/download PDF
8. Compromising Tor Anonymity Exploiting P2P Information Leakage
- Author
-
Manils, Pere, Abdelberri, Chaabane, Blond, Stevens Le, Kaafar, Mohamed Ali, Castelluccia, Claude, Legout, Arnaud, and Dabbous, Walid
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Cryptography and Security - Abstract
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war between these users and anti-piracy groups, more and more users are moving to anonymizing networks in an attempt to hide their identity. However, when not designed to protect users information, a P2P protocol would leak information that may compromise the identity of its users. In this paper, we first present three attacks targeting BitTorrent users on top of Tor that reveal their real IP addresses. In a second step, we analyze the Tor usage by BitTorrent users and compare it to its usage outside of Tor. Finally, we depict the risks induced by this de-anonymization and show that users' privacy violation goes beyond BitTorrent traffic and contaminates other protocols such as HTTP.
- Published
- 2010
9. De-anonymizing BitTorrent Users on Tor
- Author
-
Blond, Stevens Le, Manils, Pere, Chaabane, Abdelberi, Kaafar, Mohamed Ali, Legout, Arnaud, Castellucia, Claude, and Dabbous, Walid
- Subjects
Computer Science - Networking and Internet Architecture ,Computer Science - Cryptography and Security - Abstract
Some BitTorrent users are running BitTorrent on top of Tor to preserve their privacy. In this extended abstract, we discuss three different attacks to reveal the IP address of BitTorrent users on top of Tor. In addition, we exploit the multiplexing of streams from different applications into the same circuit to link non-BitTorrent applications to revealed IP addresses., Comment: Poster accepted at the 7th USENIX Symposium on Network Design and Implementation (NSDI '10), San Jose, CA : United States (2010)
- Published
- 2010
10. Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
- Author
-
Blond, Stevens Le, Legout, Arnaud, Fessant, Fabrice Le, Dabbous, Walid, and Kaafar, Mohamed Ali
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using these exploits for a period of 103 days, we collected 148 million IPs downloading 2 billion copies of contents. We identify the IP address of the content providers for 70% of the BitTorrent contents we spied on. We show that a few content providers inject most contents into BitTorrent and that those content providers are located in foreign data centers. We also show that an adversary can compromise the privacy of any peer in BitTorrent and identify the big downloaders that we define as the peers who subscribe to a large number of contents. This infringement on users' privacy poses a significant impediment to the legal adoption of BitTorrent.
- Published
- 2010
11. Pushing BitTorrent Locality to the Limit
- Author
-
Blond, Stevens Le, Legout, Arnaud, and Dabbous, Walid
- Subjects
Computer Science - Networking and Internet Architecture - Abstract
Peer-to-peer (P2P) locality has recently raised a lot of interest in the community. Indeed, whereas P2P content distribution enables financial savings for the content providers, it dramatically increases the traffic on inter-ISP links. To solve this issue, the idea to keep a fraction of the P2P traffic local to each ISP was introduced a few years ago. Since then, P2P solutions exploiting locality have been introduced. However, several fundamental issues on locality still need to be explored. In particular, how far can we push locality, and what is, at the scale of the Internet, the reduction of traffic that can be achieved with locality? In this paper, we perform extensive experiments on a controlled environment with up to 10 000 BitTorrent clients to evaluate the impact of high locality on inter-ISP links traffic and peers download completion time. We introduce two simple mechanisms that make high locality possible in challenging scenarios and we show that we save up to several orders of magnitude inter-ISP traffic compared to traditional locality without adversely impacting peers download completion time. In addition, we crawled 214 443 torrents representing 6 113 224 unique peers spread among 9 605 ASes. We show that whereas the torrents we crawled generated 11.6 petabytes of inter-ISP traffic, our locality policy implemented for all torrents would have reduced the global inter-ISP traffic by 40%.
- Published
- 2008
12. Defense Economic Impact Modeling System (DEIMS). A New Concept in Economic Forecasting for Defense Expenditures.
- Author
-
Department of Defense, Washington, DC. and Blond, David L.
- Abstract
The Defense Economic Impact Modeling System (DEIMS) analyzes the economic effect of defense expenditures on the United States economy by using a consistent, reliable framework of economic models and government policy assumptions. Planning information on defense requirements is also provided to private sector firms. The DEIMS allows the Department of Defense to analyze the impact of alternative defense budgets on key industrial sectors, skilled labor categories, and raw material requirements at a level of product disaggregation consistent with the Department of Commerce's four-digit Standard Industrial Classification categories. It combines (1) a macroeconomic model adapted to integrate the impact on key industrial sectors of specific defense production requirements; (2) a producer price modeling system; (3) a 400 sector, commodity-based, input-output and employment model; (4) a 161 category skilled-lab or requirements model; and (5) a 72-commodity, quantity-based, strategic materials requirements model. All models are maintained by Data Resources, Inc. DEIMS output display tables are designed to provide forecasts of future defense needs and thus stimulate more active competition among companies. (Sample tables and listings of sectors, skill categories, and strategic materials requirements covered in the model are appended.) (YLB)
- Published
- 1982
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.