Energy Technology Data Exchange (ETDEWEB)
Wilson, M.F.; Henderson-Sellers, A.; Dickinson, R.E.; Kennedy, P.J.
1987-03-01
The soils data of Wilson and Henderson-Sellers have been incorporated into the land-surface parameterization scheme of the NCAR Community Climate Model after Dickinson. A stand-alone version of this land-surface scheme, termed the Biosphere-Atmosphere Transfer Scheme (BATS), has been tested in a series of sensitivity experiments designed to assess the sensitivity of the scheme to the inclusion of variable soil characteristics. The cases investigated were for conditions designed to represent a low-latitude, evergreen forest; a low-latitude sand desert; a high-latitude coniferous forest; high-latitude tundra; and prairie grasslands, each for a specified time of year. The tundra included spring snowmelt and the grassland incorporated snow accumulation. The sensitivity experiments included varying the soil texture from a coarse texture typical of sand through a medium texture typical of loam to a fine texture typical of clay. The sensitivity of the formation to the specified total and upper soil column depth and the response to altering the parameterization of the soil albedo dependence upon soil wetness and snow-cover were also examined. The biosphere-atmosphere transfer scheme showed the greatest sensitivity to the soil texture variation, particularly to the associated variation in the hydraulic conductivity and diffusivity parameters. There was only a very small response to the change in the soil albedo dependence on wetness and, although the sensitivity to the snow-covered soil albedo via the response to roughness length/snowmasking depth was significant, the results were predictable. Soil moisture responses can also be initiated by changes in vegetation characteristics such as the stomatal resistance through changed canopy interaction which modify the radiation and water budgets of the soil surface.
Energy Technology Data Exchange (ETDEWEB)
Henderson-Sellers, A. (Macquarie Univ., North Ryde, New South Wales (Australia))
1993-02-01
Land-surface schemes developed for incorporation into global climate models include parameterizations that are not yet fully validated and depend upon the specification of a large (20-50) number of ecological and soil parameters, the values of which are not yet well known. There are two methods of investigating the sensitivity of a land-surface scheme to prescribed values: simple one-at-a-time changes or factorial experiments. Factorial experiments offer information about interactions between parameters and are thus a more powerful tool. Here the results of a suite of factorial experiments are reported. These are designed (i) to illustrate the usefulness of this methodology and (ii) to identify factors important to the performance of complex land-surface schemes. The Biosphere-Atmosphere Transfer Scheme (BATS) is used and its sensitivity is considered (a) to prescribed ecological and soil parameters and (b) to atmospheric forcing used in the off-line tests undertaken. Results indicate that the most important atmospheric forcings are mean monthly temperature and the interaction between mean monthly temperature and total monthly precipitation, although fractional cloudiness and other parameters are also important. The most important ecological parameters are vegetation roughness length, soil porosity, and a factor describing the sensitivity of the stomatal resistance of vegetation to the amount of photosynthetically active solar radiation and, to a lesser extent, soil and vegetation albedos. Two-factor interactions including vegetation roughness length are more important than many of the 23 specified single factors. The results of factorial sensitivity experiments such as these could form the basis for intercomparison of land-surface parameterization schemes and for field experiments and satellite-based observation programs aimed at improving evaluation of important parameters.
Energy Technology Data Exchange (ETDEWEB)
Dickinson, R.E.; Henderson-Sellers, A.; Kennedy, P.J.
1993-08-01
A comprehensive model of land-surface processes has been under development suitable for use with various National Center for Atmospheric Research (NCAR) General Circulation Models (GCMs). Special emphasis has been given to describing properly the role of vegetation in modifying the surface moisture and energy budgets. The result of these efforts has been incorporated into a boundary package, referred to as the Biosphere-Atmosphere Transfer Scheme (BATS). The current frozen version, BATS1e is a piece of software about four thousand lines of code that runs as an offline version or coupled to the Community Climate Model (CCM).
Michael Keller; Maria Assunção Silva-Dias; Daniel C. Nepstad; Meinrat O. Andreae
2004-01-01
The Large-Scale Biosphere-Atmosphere Experiment in Amazonia (LBA) is a multi-disciplinary, multinational scientific project led by Brazil. LBA researchers seek to understand Amazonia in its global context especially with regard to regional and global climate. Current development activities in Amazonia including deforestation, logging, cattle ranching, and agriculture...
Ecological research in the large-scale biosphere-atmosphere experiment in Amazonia: early results
Keller, M.; Alencar, A.; Asner, G.P.; Braswell, B.; Bustamante, M.; Davidson, E.; Feldpausch, T.; Fernandes, E.; Goulden, M.; Kabat, P.; Kruijt, B.; Luizão, F.; Miller, S.; Markewitz, D.; Nobre, A.D.; Nobre, C.A.; Priante Filho, N.; Rocha, da H.; Silva Dias, P.; Randow, von C.; Vourlitis, G.L.
2004-01-01
The Large-scale Biosphere-Atmosphere Experiment in Amazonia (LBA) is a multinational, interdisciplinary research program led by Brazil. Ecological studies in LBA focus on how tropical forest conversion, regrowth, and selective logging influence carbon storage,. nutrient dynamics, trace gas fluxes,
Studying biosphere-atmosphere exchange of CO2 through Carbon-13 stable isotopes
Velde, van der I.R.
2015-01-01
Summary Thesis ‘Studying biosphere-atmosphere exchange of CO2 through
carbon-13 stable isotopes’
Ivar van der Velde
Making predictions of future climate is difficult, mainly due to large uncertainties in the carbon cycle. The rate at which carbon is stored in the oceans and
Integrating Biodiversity into Biosphere-Atmosphere Interactions Using Individual-Based Models (IBM)
Wang, B.; Shugart, H. H., Jr.; Lerdau, M.
2017-12-01
A key component regulating complex, nonlinear, and dynamic biosphere-atmosphere interactions is the inherent diversity of biological systems. The model frameworks currently widely used, i.e., Plant Functional Type models) do not even begin to capture the metabolic and taxonomic diversity found in many terrestrial systems. We propose that a transition from PFT-based to individual-based modeling approaches (hereafter referred to as IBM) is essential for integrating biodiversity into research on biosphere-atmosphere interactions. The proposal emerges from our studying the interactions of forests with atmospheric processes in the context of climate change using an individual-based forest volatile organic compounds model, UVAFME-VOC. This individual-based model can explicitly simulate VOC emissions based on an explicit modelling of forest dynamics by computing the growth, death, and regeneration of each individual tree of different species and their competition for light, moisture, and nutrient, from which system-level VOC emissions are simulated by explicitly computing and summing up each individual's emissions. We found that elevated O3 significantly altered the forest dynamics by favoring species that are O3-resistant, which, meanwhile, are producers of isoprene. Such compositional changes, on the one hand, resulted in unsuppressed forest productivity and carbon stock because of the compensation by O3-resistant species. On the other hand, with more isoprene produced arising from increased producers, a possible positive feedback loop between tropospheric O3 and forest thereby emerged. We also found that climate warming will not always stimulate isoprene emissions because warming simultaneously reduces isoprene emissions by causing a decline in the abundance of isoprene-emitting species. These results suggest that species diversity is of great significance and that individual-based modelling strategies should be applied in studying biosphere-atmosphere interactions.
A new MV bus transfer scheme for nuclear power plants
International Nuclear Information System (INIS)
Chang, C.K.
2015-01-01
The auxiliary power system of many generating stations consists of offsite power supply system and onsite power supply system, including emergency diesel generators (EDG) to provide secure power to auxiliary loads. If a normal power supply fails to supply power, then the power source is transferred to a standby power supply. In the case of nuclear power plants (NPP), the unit auxiliary transformer (UAT) and standby auxiliary transformer (SAT) - or station service transformer - are installed and powered from 2 offsite power circuits to meet regulatory requirements. The transfer methods of a motor bus from a normal source to a standby source used in power generating stations are fast bus transfer, in-phase transfer, or residual transfer. Fast bus transfer method is the most popular and residual voltage transfer method that is used as a backup in medium voltage buses in general. The use of the advanced technology like open circuit voltage prediction and digital signal processing algorithms can improve the reliability of fast transfer scheme. However, according to the survey results of the recent operation records in nuclear power plants, there were many instances where the fast transfer scheme has failed. To assure bus transfer in any conditions and circumstances, un-interruptible bus transfer scheme utilizing the state of the art medium voltage UPS (Un-interruptible Power Supply) is discussed and elaborated
Evolutionary algorithm based heuristic scheme for nonlinear heat transfer equations.
Ullah, Azmat; Malik, Suheel Abdullah; Alimgeer, Khurram Saleem
2018-01-01
In this paper, a hybrid heuristic scheme based on two different basis functions i.e. Log Sigmoid and Bernstein Polynomial with unknown parameters is used for solving the nonlinear heat transfer equations efficiently. The proposed technique transforms the given nonlinear ordinary differential equation into an equivalent global error minimization problem. Trial solution for the given nonlinear differential equation is formulated using a fitness function with unknown parameters. The proposed hybrid scheme of Genetic Algorithm (GA) with Interior Point Algorithm (IPA) is opted to solve the minimization problem and to achieve the optimal values of unknown parameters. The effectiveness of the proposed scheme is validated by solving nonlinear heat transfer equations. The results obtained by the proposed scheme are compared and found in sharp agreement with both the exact solution and solution obtained by Haar Wavelet-Quasilinearization technique which witnesses the effectiveness and viability of the suggested scheme. Moreover, the statistical analysis is also conducted for investigating the stability and reliability of the presented scheme.
Evolutionary algorithm based heuristic scheme for nonlinear heat transfer equations.
Directory of Open Access Journals (Sweden)
Azmat Ullah
Full Text Available In this paper, a hybrid heuristic scheme based on two different basis functions i.e. Log Sigmoid and Bernstein Polynomial with unknown parameters is used for solving the nonlinear heat transfer equations efficiently. The proposed technique transforms the given nonlinear ordinary differential equation into an equivalent global error minimization problem. Trial solution for the given nonlinear differential equation is formulated using a fitness function with unknown parameters. The proposed hybrid scheme of Genetic Algorithm (GA with Interior Point Algorithm (IPA is opted to solve the minimization problem and to achieve the optimal values of unknown parameters. The effectiveness of the proposed scheme is validated by solving nonlinear heat transfer equations. The results obtained by the proposed scheme are compared and found in sharp agreement with both the exact solution and solution obtained by Haar Wavelet-Quasilinearization technique which witnesses the effectiveness and viability of the suggested scheme. Moreover, the statistical analysis is also conducted for investigating the stability and reliability of the presented scheme.
Regulation control and energy management scheme for wireless power transfer
Miller, John M.
2015-12-29
Power transfer rate at a charging facility can be maximized by employing a feedback scheme. The state of charge (SOC) and temperature of the regenerative energy storage system (RESS) pack of a vehicle is monitored to determine the load due to the RESS pack. An optimal frequency that cancels the imaginary component of the input impedance for the output signal from a grid converter is calculated from the load of the RESS pack, and a frequency offset f* is made to the nominal frequency f.sub.0 of the grid converter output based on the resonance frequency of a magnetically coupled circuit. The optimal frequency can maximize the efficiency of the power transfer. Further, an optimal grid converter duty ratio d* can be derived from the charge rate of the RESS pack. The grid converter duty ratio d* regulates wireless power transfer (WPT) power level.
SEURAT: SPH scheme extended with ultraviolet line radiative transfer
Abe, Makito; Suzuki, Hiroyuki; Hasegawa, Kenji; Semelin, Benoit; Yajima, Hidenobu; Umemura, Masayuki
2018-05-01
We present a novel Lyman alpha (Ly α) radiative transfer code, SEURAT (SPH scheme Extended with Ultraviolet line RAdiative Transfer), where line scatterings are solved adaptively with the resolution of the smoothed particle hydrodynamics (SPH). The radiative transfer method implemented in SEURAT is based on a Monte Carlo algorithm in which the scattering and absorption by dust are also incorporated. We perform standard test calculations to verify the validity of the code; (i) emergent spectra from a static uniform sphere, (ii) emergent spectra from an expanding uniform sphere, and (iii) escape fraction from a dusty slab. Thereby, we demonstrate that our code solves the {Ly} α radiative transfer with sufficient accuracy. We emphasize that SEURAT can treat the transfer of {Ly} α photons even in highly complex systems that have significantly inhomogeneous density fields. The high adaptivity of SEURAT is desirable to solve the propagation of {Ly} α photons in the interstellar medium of young star-forming galaxies like {Ly} α emitters (LAEs). Thus, SEURAT provides a powerful tool to model the emergent spectra of {Ly} α emission, which can be compared to the observations of LAEs.
Dar A. Robertsa; Michael Keller; Joao Vianei Soares
2003-01-01
We summarize early research on land-cover, land-use, and biophysical properties of vegetation from the Large Scale Biosphere Atmosphere (LBA) experiment in AmazoËnia. LBA is an international research program developed to evaluate regional function and to determine how land-use and climate modify biological, chemical and physical processes there. Remote sensing has...
Advances in understanding, models and parameterisations of biosphere-atmosphere ammonia exchange
Flechard, C. R.; Massad, R.-S.; Loubet, B.; Personne, E.; Simpson, D.; Bash, J. O.; Cooter, E. J.; Nemitz, E.; Sutton, M. A.
2013-03-01
-chemical species schemes. Their level of complexity depends on their purpose, the spatial scale at which they are applied, the current level of parameterisation, and the availability of the input data they require. State-of-the-art solutions for determining the emission/sink Γ potentials through the soil/canopy system include coupled, interactive chemical transport models (CTM) and soil/ecosystem modelling at the regional scale. However, it remains a matter for debate to what extent realistic options for future regional and global models should be based on process-based mechanistic versus empirical and regression-type models. Further discussion is needed on the extent and timescale by which new approaches can be used, such as integration with ecosystem models and satellite observations.
Advances in understanding, models and parameterizations of biosphere-atmosphere ammonia exchange
Flechard, C. R.; Massad, R.-S.; Loubet, B.; Personne, E.; Simpson, D.; Bash, J. O.; Cooter, E. J.; Nemitz, E.; Sutton, M. A.
2013-07-01
Atmospheric ammonia (NH3) dominates global emissions of total reactive nitrogen (Nr), while emissions from agricultural production systems contribute about two-thirds of global NH3 emissions; the remaining third emanates from oceans, natural vegetation, humans, wild animals and biomass burning. On land, NH3 emitted from the various sources eventually returns to the biosphere by dry deposition to sink areas, predominantly semi-natural vegetation, and by wet and dry deposition as ammonium (NH4+) to all surfaces. However, the land/atmosphere exchange of gaseous NH3 is in fact bi-directional over unfertilized as well as fertilized ecosystems, with periods and areas of emission and deposition alternating in time (diurnal, seasonal) and space (patchwork landscapes). The exchange is controlled by a range of environmental factors, including meteorology, surface layer turbulence, thermodynamics, air and surface heterogeneous-phase chemistry, canopy geometry, plant development stage, leaf age, organic matter decomposition, soil microbial turnover, and, in agricultural systems, by fertilizer application rate, fertilizer type, soil type, crop type, and agricultural management practices. We review the range of processes controlling NH3 emission and uptake in the different parts of the soil-canopy-atmosphere continuum, with NH3 emission potentials defined at the substrate and leaf levels by different [NH4+] / [H+] ratios (Γ). Surface/atmosphere exchange models for NH3 are necessary to compute the temporal and spatial patterns of emissions and deposition at the soil, plant, field, landscape, regional and global scales, in order to assess the multiple environmental impacts of airborne and deposited NH3 and NH4+. Models of soil/vegetation/atmosphere NH3 exchange are reviewed from the substrate and leaf scales to the global scale. They range from simple steady-state, "big leaf" canopy resistance models, to dynamic, multi-layer, multi-process, multi-chemical species schemes
Advances in understanding, models and parameterizations of biosphere-atmosphere ammonia exchange
Directory of Open Access Journals (Sweden)
C. R. Flechard
2013-07-01
-chemical species schemes. Their level of complexity depends on their purpose, the spatial scale at which they are applied, the current level of parameterization, and the availability of the input data they require. State-of-the-art solutions for determining the emission/sink Γ potentials through the soil/canopy system include coupled, interactive chemical transport models (CTM and soil/ecosystem modelling at the regional scale. However, it remains a matter for debate to what extent realistic options for future regional and global models should be based on process-based mechanistic versus empirical and regression-type models. Further discussion is needed on the extent and timescale by which new approaches can be used, such as integration with ecosystem models and satellite observations.
Directory of Open Access Journals (Sweden)
Manab Kumar Dutta
2015-01-01
Full Text Available ABSTRACT Temporal variation of atmospheric O3 and its biosphere atmosphere exchange were monitored in the Sundarbans mangrove forest from January 2011 to December 2011 on bimonthly basis. O3 mixing ratios at 10 m and 20 m heights over the forest atmosphere ranged between 14.66 1.88 to 37.90 0.91 and 19.32 6.27 to 39.80 10.13 ppbv respectively having maximal premonsoon and minimal monsoon periods. Average daytime O3 mixing ratio was 1.69 times higher than nighttime indicates significant photo chemical production of O3 in forest atmosphere. Annual averaged O3 mixing ratio in 10 m height was 13.2 lower than 20 m height induces exchange of O3 across mangrove biosphere atmosphere interface depending upon micrometeorological conditions of the forest ecosystem. Annual average biosphere atmosphere O3 exchange flux in this mangrove forest environment was 0.441 g m-2 s-1. Extrapolating the value for entire forest surface area the mangrove ecosystem acts as a sink of 58.4GgO3 annually indicating significant contribution of Sundarbans mangroves towards regional atmospheric O3 budget as well as climate change.
Directory of Open Access Journals (Sweden)
S. L. Heck
2012-02-01
Full Text Available There is a widely recognized need to improve our understanding of biosphere-atmosphere carbon exchanges in areas of complex terrain including the United States Mountain West. CO2 fluxes over mountainous terrain are often difficult to measure due to unusual and complicated influences associated with atmospheric transport. Consequently, deriving regional fluxes in mountain regions with carbon cycle inversion of atmospheric CO2 mole fraction is sensitive to filtering of observations to those that can be represented at the transport model resolution. Using five years of CO2 mole fraction observations from the Regional Atmospheric Continuous CO2 Network in the Rocky Mountains (Rocky RACCOON, five statistical filters are used to investigate a range of approaches for identifying regionally representative CO2 mole fractions. Test results from three filters indicate that subsets based on short-term variance and local CO2 gradients across tower inlet heights retain nine-tenths of the total observations and are able to define representative diel variability and seasonal cycles even for difficult-to-model sites where the influence of local fluxes is much larger than regional mole fraction variations. Test results from two other filters that consider measurements from previous and following days using spline fitting or sliding windows are overly selective. Case study examples showed that these windowing-filters rejected measurements representing synoptic changes in CO2, which suggests that they are not well suited to filtering continental CO2 measurements. We present a novel CO2 lapse rate filter that uses CO2 differences between levels in the model atmosphere to select subsets of site measurements that are representative on model scales. Our new filtering techniques provide guidance for novel approaches to assimilating mountain-top CO2 mole fractions in carbon cycle inverse models.
Transfer pricing as tax avoidance under different legislative schemes
Holzmann, Carolin Maria
2016-01-01
This paper investigates transfer pricing as tax avoidance before and after reforms of anti-avoidance legislation. The reforms introduced and tightened obligatory documentation requirements for transfer prices to enforce that multinational enterprises (MNEs) set internal transfer prices at an arm’s-length. Linking data from the Microdatabase Statistics on International Trade in Services that comprehends prices of MNEs’ international service transactions to the Microdatabase Direct Investment, ...
A scheme for distributed quantum search through simultaneous state transfer mechanism
International Nuclear Information System (INIS)
Gupta, M.; Pathak, A.
2007-01-01
Using a quantum network model, we present a scheme for distributed implementation of Grover's algorithm. The proposed scheme can implement a quantum search over data bases stored in different computers. Entanglement is used to carry out different non-local operations over the spatially distributed quantum computers. A method to transfer the combined state of many qubits over the entanglement and subsequently refreshing the entangled pair is presented. This method of simultaneous s tate transfer from one computer to the other, is shown to result in a constant communication complexity. (Abstract Copyright [2007], Wiley Periodicals, Inc.)
HR Division
2001-01-01
As part of the process of streamlining procedures, the HR and AS Divisions have jointly developed a system whereby annual and compensatory leave will henceforth be automatically transferred1) to saved leave accounts. Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'2)Previously, every person taking part in the scheme has been individually issued with a form for the purposes of requesting the transfer of leave to the leave account and the transfer has then had to be done manually by HR Division. To streamline the procedure, unused leave of all those taking part in the saved leave scheme at the closure of the leave-year accounts will henceforth be transferred automatically to the saved leave account on that date. This simplification is in the interest of all parties concerned. This automatic transfer procedure has a number of advantages for participants in the SLS scheme. First, staff members will no longer have to take any administrative steps. Secondly, the new proced...
Saved Leave Scheme (SLS) : Simplified procedure for the transfer of leave to saved leave accounts
HR Division
2001-01-01
As part of the process of streamlining procedures, the HR and AS Divisions have jointly developed a system whereby annual and compensatory leave will henceforth be automatically transferred1) to saved leave accounts. Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'2) annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No. 22 B) can be transferred to the saved leave account at the end of the leave year (30 September). Previously, every person taking part in the scheme has been individually issued with a form for the purposes of requesting the transfer of leave to the leave account and the transfer has then had to be done manually by HR Division. To streamline the procedure, unused leave of all those taking part in the saved leave scheme at the closure of of the leave-year accounts will henceforth be transferred automatically to the saved leave account on that date. This simplification is in the ...
REMINDER Saved Leave Scheme (SLS) : Transfer of leave to saved leave accounts
HR Division
2002-01-01
Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'*) annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No. 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that, since last year, unused leave of all those taking part in the saved leave scheme at the closure of the leave-year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2002 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they are still participants in the schem...
Multiscale solutions of radiative heat transfer by the discrete unified gas kinetic scheme
Luo, Xiao-Ping; Wang, Cun-Hai; Zhang, Yong; Yi, Hong-Liang; Tan, He-Ping
2018-06-01
The radiative transfer equation (RTE) has two asymptotic regimes characterized by the optical thickness, namely, optically thin and optically thick regimes. In the optically thin regime, a ballistic or kinetic transport is dominant. In the optically thick regime, energy transport is totally dominated by multiple collisions between photons; that is, the photons propagate by means of diffusion. To obtain convergent solutions to the RTE, conventional numerical schemes have a strong dependence on the number of spatial grids, which leads to a serious computational inefficiency in the regime where the diffusion is predominant. In this work, a discrete unified gas kinetic scheme (DUGKS) is developed to predict radiative heat transfer in participating media. Numerical performances of the DUGKS are compared in detail with conventional methods through three cases including one-dimensional transient radiative heat transfer, two-dimensional steady radiative heat transfer, and three-dimensional multiscale radiative heat transfer. Due to the asymptotic preserving property, the present method with relatively coarse grids gives accurate and reliable numerical solutions for large, small, and in-between values of optical thickness, and, especially in the optically thick regime, the DUGKS demonstrates a pronounced computational efficiency advantage over the conventional numerical models. In addition, the DUGKS has a promising potential in the study of multiscale radiative heat transfer inside the participating medium with a transition from optically thin to optically thick regimes.
Mielikainen, Jarno; Huang, Bormin; Huang, Allen H.
2015-10-01
Next-generation mesoscale numerical weather prediction system, the Weather Research and Forecasting (WRF) model, is a designed for dual use for forecasting and research. WRF offers multiple physics options that can be combined in any way. One of the physics options is radiance computation. The major source for energy for the earth's climate is solar radiation. Thus, it is imperative to accurately model horizontal and vertical distribution of the heating. Goddard solar radiative transfer model includes the absorption duo to water vapor,ozone, ozygen, carbon dioxide, clouds and aerosols. The model computes the interactions among the absorption and scattering by clouds, aerosols, molecules and surface. Finally, fluxes are integrated over the entire longwave spectrum.In this paper, we present our results of optimizing the Goddard longwave radiative transfer scheme on Intel Many Integrated Core Architecture (MIC) hardware. The Intel Xeon Phi coprocessor is the first product based on Intel MIC architecture, and it consists of up to 61 cores connected by a high performance on-die bidirectional interconnect. The coprocessor supports all important Intel development tools. Thus, the development environment is familiar one to a vast number of CPU developers. Although, getting a maximum performance out of MICs will require using some novel optimization techniques. Those optimization techniques are discusses in this paper. The optimizations improved the performance of the original Goddard longwave radiative transfer scheme on Xeon Phi 7120P by a factor of 2.2x. Furthermore, the same optimizations improved the performance of the Goddard longwave radiative transfer scheme on a dual socket configuration of eight core Intel Xeon E5-2670 CPUs by a factor of 2.1x compared to the original Goddard longwave radiative transfer scheme code.
Development of highly accurate approximate scheme for computing the charge transfer integral
Energy Technology Data Exchange (ETDEWEB)
Pershin, Anton; Szalay, Péter G. [Laboratory for Theoretical Chemistry, Institute of Chemistry, Eötvös Loránd University, P.O. Box 32, H-1518 Budapest (Hungary)
2015-08-21
The charge transfer integral is a key parameter required by various theoretical models to describe charge transport properties, e.g., in organic semiconductors. The accuracy of this important property depends on several factors, which include the level of electronic structure theory and internal simplifications of the applied formalism. The goal of this paper is to identify the performance of various approximate approaches of the latter category, while using the high level equation-of-motion coupled cluster theory for the electronic structure. The calculations have been performed on the ethylene dimer as one of the simplest model systems. By studying different spatial perturbations, it was shown that while both energy split in dimer and fragment charge difference methods are equivalent with the exact formulation for symmetrical displacements, they are less efficient when describing transfer integral along the asymmetric alteration coordinate. Since the “exact” scheme was found computationally expensive, we examine the possibility to obtain the asymmetric fluctuation of the transfer integral by a Taylor expansion along the coordinate space. By exploring the efficiency of this novel approach, we show that the Taylor expansion scheme represents an attractive alternative to the “exact” calculations due to a substantial reduction of computational costs, when a considerably large region of the potential energy surface is of interest. Moreover, we show that the Taylor expansion scheme, irrespective of the dimer symmetry, is very accurate for the entire range of geometry fluctuations that cover the space the molecule accesses at room temperature.
A gas dynamics scheme for a two moments model of radiative transfer
International Nuclear Information System (INIS)
Buet, Ch.; Despres, B.
2007-01-01
We address the discretization of the Levermore's two moments and entropy model of the radiative transfer equation. We present a new approach for the discretization of this model: first we rewrite the moment equations as a Compressible Gas Dynamics equation by introducing an additional quantity that plays the role of a density. After that we discretize using a Lagrange-projection scheme. The Lagrange-projection scheme permits us to incorporate the source terms in the fluxes of an acoustic solver in the Lagrange step, using the well-known piecewise steady approximation and thus to capture correctly the diffusion regime. Moreover we show that the discretization is entropic and preserve the flux-limited property of the moment model. Numerical examples illustrate the feasibility of our approach. (authors)
Elnaggar, Sameh Y.
2017-02-01
Similar to the hybridization of three atoms, three coupled resonators interact to form bonding, anti-bonding, and non-bonding modes. The non-bonding mode enables an electromagnetic induced transparency like transfer of energy. Here, the non-bonding mode, resulting from the strong electric coupling of two dielectric resonators and an enclosure, is exploited to show that it is feasible to transfer power over a distance comparable to the operating wavelength. In this scheme, the enclosure acts as a mediator. The strong coupling permits the excitation of the non-bonding mode with high purity. This approach is different from resonant inductive coupling, which works in the sub-wavelength regime. Optimal loads and the corresponding maximum efficiency are determined using two independent methods: Coupled Mode Theory and Circuit modelling. It is shown that, unlike resonant inductive coupling, the figure of merit depends on the enclosure quality and not on the load, which emphasizes the role of the enclosure as a mediator. Briefly after the input excitation is turned on, the energy in the receiver builds up via all coupled and spurious modes. As time elapses, all modes except the non-bonding cease to sustain. Due to the strong coupling between the dielectrics and the enclosure, such systems have unique properties such as high and uniform efficiency over large distances and minimal fringing fields. These properties suggest that electromagnetic induced transparency like schemes that rely on the use of dielectric resonators can be used to power autonomous systems inside an enclosure or find applications when exposure to the fields needs to be minimal. Finite Element computations are used to verify the theoretical predictions by determining the transfer efficiency, field profile, and coupling coefficients for two different systems. It is shown that the three resonators must be present for efficient power transfer; if one or more are removed, the transfer efficiency reduces
An asymptotic preserving unified gas kinetic scheme for gray radiative transfer equations
International Nuclear Information System (INIS)
Sun, Wenjun; Jiang, Song; Xu, Kun
2015-01-01
The solutions of radiative transport equations can cover both optical thin and optical thick regimes due to the large variation of photon's mean-free path and its interaction with the material. In the small mean free path limit, the nonlinear time-dependent radiative transfer equations can converge to an equilibrium diffusion equation due to the intensive interaction between radiation and material. In the optical thin limit, the photon free transport mechanism will emerge. In this paper, we are going to develop an accurate and robust asymptotic preserving unified gas kinetic scheme (AP-UGKS) for the gray radiative transfer equations, where the radiation transport equation is coupled with the material thermal energy equation. The current work is based on the UGKS framework for the rarefied gas dynamics [14], and is an extension of a recent work [12] from a one-dimensional linear radiation transport equation to a nonlinear two-dimensional gray radiative system. The newly developed scheme has the asymptotic preserving (AP) property in the optically thick regime in the capturing of diffusive solution without using a cell size being smaller than the photon's mean free path and time step being less than the photon collision time. Besides the diffusion limit, the scheme can capture the exact solution in the optical thin regime as well. The current scheme is a finite volume method. Due to the direct modeling for the time evolution solution of the interface radiative intensity, a smooth transition of the transport physics from optical thin to optical thick can be accurately recovered. Many numerical examples are included to validate the current approach
Energy Technology Data Exchange (ETDEWEB)
Sun, Wenjun, E-mail: sun_wenjun@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, P.O. Box 8009, Beijing 100088 (China); Jiang, Song, E-mail: jiang@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, P.O. Box 8009, Beijing 100088 (China); Xu, Kun, E-mail: makxu@ust.hk [Department of Mathematics and Department of Mechanical and Aerospace Engineering, Hong Kong University of Science and Technology, Hong Kong (China); Li, Shu, E-mail: li_shu@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, P.O. Box 8009, Beijing 100088 (China)
2015-12-01
This paper presents an extension of previous work (Sun et al., 2015 [22]) of the unified gas kinetic scheme (UGKS) for the gray radiative transfer equations to the frequency-dependent (multi-group) radiative transfer system. Different from the gray radiative transfer equations, where the optical opacity is only a function of local material temperature, the simulation of frequency-dependent radiative transfer is associated with additional difficulties from the frequency-dependent opacity. For the multiple frequency radiation, the opacity depends on both the spatial location and the frequency. For example, the opacity is typically a decreasing function of frequency. At the same spatial region the transport physics can be optically thick for the low frequency photons, and optically thin for high frequency ones. Therefore, the optical thickness is not a simple function of space location. In this paper, the UGKS for frequency-dependent radiative system is developed. The UGKS is a finite volume method and the transport physics is modeled according to the ratio of the cell size to the photon's frequency-dependent mean free path. When the cell size is much larger than the photon's mean free path, a diffusion solution for such a frequency radiation will be obtained. On the other hand, when the cell size is much smaller than the photon's mean free path, a free transport mechanism will be recovered. In the regime between the above two limits, with the variation of the ratio between the local cell size and photon's mean free path, the UGKS provides a smooth transition in the physical and frequency space to capture the corresponding transport physics accurately. The seemingly straightforward extension of the UGKS from the gray to multiple frequency radiation system is due to its intrinsic consistent multiple scale transport modeling, but it still involves lots of work to properly discretize the multiple groups in order to design an asymptotic preserving (AP
Energy Technology Data Exchange (ETDEWEB)
Randerson, J.T.; Still, C.J.; Balle, J.J.; Fung, I.Y.; Doney, S.C.; Tans, P.P.; Conway, T.J.; White, J.W.C.; Vaughn, B.; Suits, N.; Denning, A.S. [CALTECH, Pasadena, CA (United States). Div. of Geology & Planetary Science
2002-07-01
Estimating discrimination against C-13 during photosynthesis at landscape, regional, and biome scales is difficult because of large-scale variability in plant stress, vegetation composition, and photosynthetic pathway. The authors present estimates of C-13 discrimination for northern biomes based on a biosphere-atmosphere model and on National Oceanic and Atmospheric Administration Climate Monitoring and Diagnostics Laboratory and Institute of Arctic and Alpine Research remote flask measurements. With the inversion approach, solutions were found for three ecophysiological parameters of the northern biosphere {delta}{sup 13}C discrimination, a net primary production light use efficiency, and a temperature sensitivity of heterotrophic respiration (a Q10 factor) that provided a best fit between modeled and observed {delta}{sup 13}C and CO{sub 2}. The analysis attempted to explicitly correct for fossil fuel emissions, remote C4 ecosystem fluxes, ocean exchange, and isotopic disequilibria of terrestrial heterotrophic respiration caused by the Suess effect. A photosynthetic discrimination was obtained for arctic and boreal biomes between 19.0 and 19.6%. The inversion analysis suggests that Q10 and light use efficiency values that minimize the cost function covary. The optimal light use efficiency was 0.47 gC MJ{sup -1} photosynthetically active radiation, and the optimal Q10 value was 1.52. Fossil fuel and ocean exchange contributed proportionally more to month-to-month changes in the atmospheric growth rate of {delta}{sup 13}C and CO{sub 2} during winter months, suggesting that remote atmospheric observations during the summer may yield more precise estimates of the isotopic composition of the biosphere.
Zhang, Chuang; Guo, Zhaoli; Chen, Songze
2017-12-01
An implicit kinetic scheme is proposed to solve the stationary phonon Boltzmann transport equation (BTE) for multiscale heat transfer problem. Compared to the conventional discrete ordinate method, the present method employs a macroscopic equation to accelerate the convergence in the diffusive regime. The macroscopic equation can be taken as a moment equation for phonon BTE. The heat flux in the macroscopic equation is evaluated from the nonequilibrium distribution function in the BTE, while the equilibrium state in BTE is determined by the macroscopic equation. These two processes exchange information from different scales, such that the method is applicable to the problems with a wide range of Knudsen numbers. Implicit discretization is implemented to solve both the macroscopic equation and the BTE. In addition, a memory reduction technique, which is originally developed for the stationary kinetic equation, is also extended to phonon BTE. Numerical comparisons show that the present scheme can predict reasonable results both in ballistic and diffusive regimes with high efficiency, while the memory requirement is on the same order as solving the Fourier law of heat conduction. The excellent agreement with benchmark and the rapid converging history prove that the proposed macro-micro coupling is a feasible solution to multiscale heat transfer problems.
Braghiere, Renato; Quaife, Tristan; Black, Emily
2016-04-01
Incoming shortwave radiation is the primary source of energy driving the majority of the Earth's climate system. The partitioning of shortwave radiation by vegetation into absorbed, reflected, and transmitted terms is important for most of biogeophysical processes, including leaf temperature changes and photosynthesis, and it is currently calculated by most of land surface schemes (LSS) of climate and/or numerical weather prediction models. The most commonly used radiative transfer scheme in LSS is the two-stream approximation, however it does not explicitly account for vegetation architectural effects on shortwave radiation partitioning. Detailed three-dimensional (3D) canopy radiative transfer schemes have been developed, but they are too computationally expensive to address large-scale related studies over long time periods. Using a straightforward one-dimensional (1D) parameterisation proposed by Pinty et al. (2006), we modified a two-stream radiative transfer scheme by including a simple function of Sun zenith angle, so-called "structure factor", which does not require an explicit description and understanding of the complex phenomena arising from the presence of vegetation heterogeneous architecture, and it guarantees accurate simulations of the radiative balance consistently with 3D representations. In order to evaluate the ability of the proposed parameterisation in accurately represent the radiative balance of more complex 3D schemes, a comparison between the modified two-stream approximation with the "structure factor" parameterisation and state-of-art 3D radiative transfer schemes was conducted, following a set of virtual scenarios described in the RAMI4PILPS experiment. These experiments have been evaluating the radiative balance of several models under perfectly controlled conditions in order to eliminate uncertainties arising from an incomplete or erroneous knowledge of the structural, spectral and illumination related canopy characteristics typical
Energy Technology Data Exchange (ETDEWEB)
Shen, Jinmei; Arritt, R.W. [Iowa State Univ., Ames, IA (United States)
1996-12-31
The importance of land-atmosphere interactions and biosphere in climate change studies has long been recognized, and several land-atmosphere interaction schemes have been developed. Among these, the Simple Biosphere scheme (SiB) of Sellers et al. and the Biosphere Atmosphere Transfer Scheme (BATS) of Dickinson et al. are two of the most widely known. The effects of GCM subgrid-scale inhomogeneities of surface properties in general circulation models also has received increasing attention in recent years. However, due to the complexity of land surface processes and the difficulty to prescribe the large number of parameters that determine atmospheric and soil interactions with vegetation, many previous studies and results seem to be contradictory. A GCM grid element typically represents an area of 10{sup 4}-10{sup 6} km{sup 2}. Within such an area, there exist variations of soil type, soil wetness, vegetation type, vegetation density and topography, as well as urban areas and water bodies. In this paper, we incorporate both BATS and SiB2 land surface process schemes into a nonhydrostatic, compressible version of AMBLE model (Atmospheric Model -- Boundary-Layer Emphasis), and compare the surface heat fluxes and mesoscale circulations calculated using the two schemes. 8 refs., 5 figs.
Scott, R. L.; Barron-Gafford, G.; Biederman, J. A.
2016-12-01
Around one-third of Earth's land surface is classified as semiarid, and carbon dioxide exchange in these regions has been shown to be an important regulator of both the trend and interannual variability of the terrestrial carbon sink. Fifteen years ago, when we began making measurements of biosphere-atmospheric exchanges of energy, water vapor, and carbon dioxide using eddy covariance in southern Arizona USA, there was paucity of semiarid observations in flux networks like Ameriflux. We started by establishing riparian sites across a woody plant encroachment gradient to quantify the productivity and consumptive plant water use along a iconic and ecologically important desert river. Soon thereafter, we added semiarid grassland, shrubland, and savanna sites that do not have access to groundwater in order to better understand how water limitation and changes in vegetation structure affect ecosystem productivity. Here, we highlight the value of multiyear, multisite flux data for addressing regional to global scale problems associated with groundwater pumping, land cover change, drought, and climate change. For the riparian sites, we find that ecosystem water availability is altered by vegetation structure such that ecosystems with more deeply rooted trees have higher productivity but at a cost of greater groundwater use. For the non-riparian sites, precipitation strongly controls ecosystem water availability and the resultant productivity, but differences in ecosystem structure impact water use efficiency due to the partitioning of evapotranspiration into its component sources. Also, the productivity at sites with more grass, and less woody, plants responds more quickly to precipitation fluctuations including long-term drought conditions. In semiarid regions, variability in water and carbon fluxes is much larger than in more mesic climes. Across our riparian and non-riparian sites, access to more stable groundwater reserves reduces variability in water and carbon
Scott, Russell; Biederman, Joel
2017-04-01
Around one-third of Earth's land surface is classified as semiarid, and carbon dioxide exchange in these regions has been shown to be an important regulator of both the trend and interannual variability of the terrestrial carbon sink. Fifteen years ago, when we began making measurements of biosphere-atmospheric exchanges of energy, water vapor, and carbon dioxide using eddy covariance in southern Arizona USA, there was paucity of semiarid observations in flux networks like AmeriFlux and EuroFlux. We started by establishing riparian sites across a woody plant encroachment gradient to quantify the productivity and consumptive plant water use along a iconic and ecologically important desert river. Soon thereafter, we added semiarid grassland, shrubland, and savanna sites that do not have access to groundwater in order to better understand how water limitation and changes in vegetation structure affect ecosystem productivity. Here, we highlight the value of multiyear, multisite flux data for addressing regional to global scale problems associated with groundwater pumping, land cover change, drought, and climate change. For the riparian sites, we find that ecosystem water availability is altered by vegetation structure such that ecosystems with more deeply rooted trees have higher productivity but at a cost of greater groundwater use. For the non-riparian sites, precipitation strongly controls ecosystem water availability and the resultant productivity, but differences in ecosystem structure impact water use efficiency due to the partitioning of evapotranspiration into its component sources. Also, the productivity at sites with more grass, and less woody, plants responds more quickly to precipitation fluctuations including long-term drought conditions. In semiarid regions, variability in water and carbon fluxes is much larger than in more mesic climes. Across our riparian and non-riparian sites, access to more stable groundwater reserves reduces variability in water and
Directory of Open Access Journals (Sweden)
M. T. Johnson
2010-10-01
Full Text Available The ocean-atmosphere flux of a gas can be calculated from its measured or estimated concentration gradient across the air-sea interface and the transfer velocity (a term representing the conductivity of the layers either side of the interface with respect to the gas of interest. Traditionally the transfer velocity has been estimated from empirical relationships with wind speed, and then scaled by the Schmidt number of the gas being transferred. Complex, physically based models of transfer velocity (based on more physical forcings than wind speed alone, such as the NOAA COARE algorithm, have more recently been applied to well-studied gases such as carbon dioxide and DMS (although many studies still use the simpler approach for these gases, but there is a lack of validation of such schemes for other, more poorly studied gases. The aim of this paper is to provide a flexible numerical scheme which will allow the estimation of transfer velocity for any gas as a function of wind speed, temperature and salinity, given data on the solubility and liquid molar volume of the particular gas. New and existing parameterizations (including a novel empirical parameterization of the salinity-dependence of Henry's law solubility are brought together into a scheme implemented as a modular, extensible program in the R computing environment which is available in the supplementary online material accompanying this paper; along with input files containing solubility and structural data for ~90 gases of general interest, enabling the calculation of their total transfer velocities and component parameters. Comparison of the scheme presented here with alternative schemes and methods for calculating air-sea flux parameters shows good agreement in general. It is intended that the various components of this numerical scheme should be applied only in the absence of experimental data providing robust values for parameters for a particular gas of interest.
Johnson, M. T.
2010-10-01
The ocean-atmosphere flux of a gas can be calculated from its measured or estimated concentration gradient across the air-sea interface and the transfer velocity (a term representing the conductivity of the layers either side of the interface with respect to the gas of interest). Traditionally the transfer velocity has been estimated from empirical relationships with wind speed, and then scaled by the Schmidt number of the gas being transferred. Complex, physically based models of transfer velocity (based on more physical forcings than wind speed alone), such as the NOAA COARE algorithm, have more recently been applied to well-studied gases such as carbon dioxide and DMS (although many studies still use the simpler approach for these gases), but there is a lack of validation of such schemes for other, more poorly studied gases. The aim of this paper is to provide a flexible numerical scheme which will allow the estimation of transfer velocity for any gas as a function of wind speed, temperature and salinity, given data on the solubility and liquid molar volume of the particular gas. New and existing parameterizations (including a novel empirical parameterization of the salinity-dependence of Henry's law solubility) are brought together into a scheme implemented as a modular, extensible program in the R computing environment which is available in the supplementary online material accompanying this paper; along with input files containing solubility and structural data for ~90 gases of general interest, enabling the calculation of their total transfer velocities and component parameters. Comparison of the scheme presented here with alternative schemes and methods for calculating air-sea flux parameters shows good agreement in general. It is intended that the various components of this numerical scheme should be applied only in the absence of experimental data providing robust values for parameters for a particular gas of interest.
Lahariya, Chandrakant; Mishra, Ashok; Nandan, Deoki; Gautam, Praveen; Gupta, Sanjay
2011-01-01
Conditional Cash Transfer (CCT) schemes have shown largely favorable changes in the health seeking behavior. This evaluation study assesses the process and performance of an Additional Cash Incentive (ACI) scheme within an ongoing CCT scheme in India, and document lessons. A controlled before and during design study was conducted in Madhya Pradesh state of India, from August 2007 to March 2008, with increased in institutional deliveries as a primary outcome. In depth interviews, focus group discussions and household surveys were done for data collection. Lack of awareness about ACI scheme amongst general population and beneficiaries, cumbersome cash disbursement procedure, intricate eligibility criteria, extensive paper work, and insufficient focus on community involvement were the major implementation challenges. There were anecdotal reports of political interference and possible scope for corruption. At the end of implementation period, overall rate of institutional deliveries had increased in both target and control populations; however, the differences were not statistically significant. No cause and effect association could be proven by this study. Poor planning and coordination, and lack of public awareness about the scheme resulted in low utilization. Thus, proper IEC and training, detailed implementation plan, orientation training for implementer, sufficient budgetary allocation, and community participation should be an integral part for successful implementation of any such scheme. The lesson learned this evaluation study may be useful in any developing country setting and may be utilized for planning and implementation of any ACI scheme in future.
Transferability Of DEMETER. A Case Study Of The Irrigation Scheme Of Veiga De Chaves
Baptista, A.; Sousa, V.
2006-08-01
DEMETER is a research and demonstration project, designed to assess and demonstrate how the integration of Earth Observation techniques in routine Irrigation Advisory Services can improve efficiency in the use of irrigation water. The objectives of this paper are: (1) to analyze the interest in the feasibility of transferring the DEMETER technology to the irrigation scheme of Chaves: (2) to identify the factors that, in general, favour the usefulness of this technology. The irrigation infrastructure and methods, the size and number of irrigation parcels and the main crops grown at the irrigation scheme of Chaves have been recorded. Also a socio-economic description has been done. Field visits, interviews with the staff of water association, and an inquiry to a sample of 107 farmers were made. The main results are: each farmer pays an area based annual fee, independent of the amount of water used for irrigation; most of the irrigated parcels are of very small size, 0.3 ha in average, mostly irrigated by surface methods; the most representative crops grown are potato, forage maize, and several different horticultural crops; an important part of the production is for self-consumption. The farmers are aging and the new generations prefer other jobs than agriculture. A considerable number of farmers have another job in the nearby cities. The small size of the irrigated parcels limits the use of earth observation technologies to expensive high space resolution images. For the time being, farmers do not feel the need for an irrigation advisory service, manly because there is plenty of water which is not bought proportionally to its use. However, circumstances are changing rapidly and, relatively new for the region, environmental concerns related with irrigation, manly nitrate leaching by excess watering of crops prompts the need for an irrigation advisory service in order to maintain crop production with a more rational use of water. The DEMETER technology could be a
Wei, Linyang; Qi, Hong; Sun, Jianping; Ren, Yatao; Ruan, Liming
2017-05-01
The spectral collocation method (SCM) is employed to solve the radiative transfer in multi-layer semitransparent medium with graded index. A new flexible angular discretization scheme is employed to discretize the solid angle domain freely to overcome the limit of the number of discrete radiative direction when adopting traditional SN discrete ordinate scheme. Three radial basis function interpolation approaches, named as multi-quadric (MQ), inverse multi-quadric (IMQ) and inverse quadratic (IQ) interpolation, are employed to couple the radiative intensity at the interface between two adjacent layers and numerical experiments show that MQ interpolation has the highest accuracy and best stability. Variable radiative transfer problems in double-layer semitransparent media with different thermophysical properties are investigated and the influence of these thermophysical properties on the radiative transfer procedure in double-layer semitransparent media is also analyzed. All the simulated results show that the present SCM with the new angular discretization scheme can predict the radiative transfer in multi-layer semitransparent medium with graded index efficiently and accurately.
Laborda, Eduardo; Gómez-Gil, José María; Molina, Angela
2017-06-28
A very general and simple theoretical solution is presented for the current-potential-time response of reversible multi-electron transfer processes complicated by homogeneous chemical equilibria (the so-called extended square scheme). The expressions presented here are applicable regardless of the number of electrons transferred and coupled chemical processes, and they are particularized for a wide variety of microelectrode geometries. The voltammetric response of very different systems presenting multi-electron transfers is considered for the most widely-used techniques (namely, cyclic voltammetry, square wave voltammetry, differential pulse voltammetry and steady state voltammetry), studying the influence of the microelectrode geometry and the number and thermodynamics of the (electro)chemical steps. Most appropriate techniques and procedures for the determination of the 'interaction' between successive transfers are discussed. Special attention is paid to those situations where homogeneous chemical processes, such as protonation, complexation or ion association, affect the electrochemical behaviour of the system by different stabilization of the oxidation states.
Directory of Open Access Journals (Sweden)
Kalyani Raghunathan
Full Text Available There is considerable global evidence on the effectiveness of cash transfers in improving health and nutrition outcomes; however, the evidence from South Asia, particularly India, is limited. In the context of India where more than a third of children are undernourished, and where there is considerable under-utilization of health and nutrition interventions, it is opportune to investigate the impact of cash transfer programs on the use of interventions. We study one conditional cash transfer program, Mamata scheme, implemented in the state of Odisha, in India that targeted pregnant and lactating women. Using survey data on 1161 households from three districts in the state of Odisha, we examine the effect of the scheme on eight outcomes: 1 pregnancy registration; 2 receipt of antenatal services; 3 receipt of iron and folic acid (IFA tablets; 4 exposure to counseling during pregnancy; 5 exposure to postnatal counseling; 6 exclusive breastfeeding; 7 full immunization; and 8 household food security. We conduct regression analyses and correct for endogeneity using nearest-neighbor matching and inverse-probability weighting models. We find that the receipt of payments from the Mamata scheme is associated with a 5 percentage point (pp increase in the likelihood of receiving antenatal services, a 10 pp increase in the likelihood of receiving IFA tablets, and a decline of 0.84 on the Household Food Insecurity Access Scale. These results provide the first quantitative estimates of effects associated with the Mamata scheme, which can inform the design of government policies related to conditional cash transfers.
Johnson, M. T.
2010-02-01
The transfer velocity determines the rate of exchange of a gas across the air-water interface for a given deviation from Henry's law equilibrium between the two phases. In the thin film model of gas exchange, which is commonly used for calculating gas exchange rates from measured concentrations of trace gases in the atmosphere and ocean/freshwaters, the overall transfer is controlled by diffusion-mediated films on either side of the air-water interface. Calculating the total transfer velocity (i.e. including the influence from both molecular layers) requires the Henry's law constant and the Schmidt number of the gas in question, the latter being the ratio of the viscosity of the medium and the molecular diffusivity of the gas in the medium. All of these properties are both temperature and (on the water side) salinity dependent and extensive calculation is required to estimate these properties where not otherwise available. The aim of this work is to standardize the application of the thin film approach to flux calculation from measured and modelled data, to improve comparability, and to provide a numerical framework into which future parameter improvements can be integrated. A detailed numerical scheme is presented for the calculation of the gas and liquid phase transfer velocities (ka and kw respectively) and the total transfer velocity, K. The scheme requires only basic physical chemistry data for any gas of interest and calculates K over the full range of temperatures, salinities and wind-speeds observed in and over the ocean. Improved relationships for the wind-speed dependence of ka and for the salinity-dependence of the gas solubility (Henry's law) are derived. Comparison with alternative schemes and methods for calculating air-sea flux parameters shows good agreement in general but significant improvements under certain conditions. The scheme is provided as a downloadable program in the supplementary material, along with input files containing molecular
Wide Area Protection Scheme Preventing Cascading Events Caused by Load Flow Transferring
DEFF Research Database (Denmark)
Liu, Zhou; Chen, Zhe; Sun, Haishun
2013-01-01
Load flow transferring after an initial contingency is regarded as one of the main reasons of causing unexpected cascading trips. A multi agent system (MAS) based wide area protection strategy is proposed in this paper to predict the load flow transferring from the point of view of impedance relays...
Ghara, Raghunath; Mellema, Garrelt; Giri, Sambit K.; Choudhury, T. Roy; Datta, Kanan K.; Majumdar, Suman
2018-05-01
Three-dimensional radiative transfer simulations of the epoch of reionization can produce realistic results, but are computationally expensive. On the other hand, simulations relying on one-dimensional radiative transfer solutions are faster but limited in accuracy due to their more approximate nature. Here, we compare the performance of the reionization simulation codes GRIZZLY and C2-RAY which use 1D and 3D radiative transfer schemes, respectively. The comparison is performed using the same cosmological density fields, halo catalogues, and source properties. We find that the ionization maps, as well as the 21-cm signal maps from these two simulations are very similar even for complex scenarios which include thermal feedback on low-mass haloes. The comparison between the schemes in terms of the statistical quantities such as the power spectrum of the brightness temperature fluctuation agrees with each other within 10 per cent error throughout the entire reionization history. GRIZZLY seems to perform slightly better than the seminumerical approaches considered in Majumdar et al. which are based on the excursion set principle. We argue that GRIZZLY can be efficiently used for exploring parameter space, establishing observations strategies, and estimating parameters from 21-cm observations.
Directory of Open Access Journals (Sweden)
Mohadeseh Kanafchian
2017-04-01
In this paper, we first give a brief introduction into chaotic image encryption and then we investigate some important properties and behaviour of the logistic map. The logistic map, aperiodic trajectory, or random-like fluctuation, could not be obtained with some choice of initial condition. Therefore, a noisy logistic map with an additive system noise is introduced. The proposed scheme is based on the extended map of the Clifford strange attractor, where each dimension has a specific role in the encryption process. Two dimensions are used for pixel permutation and the third dimension is used for pixel diffusion. In order to optimize the Clifford encryption system we increase the space key by using the noisy logistic map and a novel encryption scheme based on the Clifford attractor and the noisy logistic map for secure transfer images is proposed. This algorithm consists of two parts: the noisy logistic map shuffle of the pixel position and the pixel value. We use times for shuffling the pixel position and value then we generate the new pixel position and value by the Clifford system. To illustrate the efficiency of the proposed scheme, various types of security analysis are tested. It can be concluded that the proposed image encryption system is a suitable choice for practical applications.
Trujillo Bueno, J.; Fabiani Bendicho, P.
1995-12-01
Iterative schemes based on Gauss-Seidel (G-S) and optimal successive over-relaxation (SOR) iteration are shown to provide a dramatic increase in the speed with which non-LTE radiation transfer (RT) problems can be solved. The convergence rates of these new RT methods are identical to those of upper triangular nonlocal approximate operator splitting techniques, but the computing time per iteration and the memory requirements are similar to those of a local operator splitting method. In addition to these properties, both methods are particularly suitable for multidimensional geometry, since they neither require the actual construction of nonlocal approximate operators nor the application of any matrix inversion procedure. Compared with the currently used Jacobi technique, which is based on the optimal local approximate operator (see Olson, Auer, & Buchler 1986), the G-S method presented here is faster by a factor 2. It gives excellent smoothing of the high-frequency error components, which makes it the iterative scheme of choice for multigrid radiative transfer. This G-S method can also be suitably combined with standard acceleration techniques to achieve even higher performance. Although the convergence rate of the optimal SOR scheme developed here for solving non-LTE RT problems is much higher than G-S, the computing time per iteration is also minimal, i.e., virtually identical to that of a local operator splitting method. While the conventional optimal local operator scheme provides the converged solution after a total CPU time (measured in arbitrary units) approximately equal to the number n of points per decade of optical depth, the time needed by this new method based on the optimal SOR iterations is only √n/2√2. This method is competitive with those that result from combining the above-mentioned Jacobi and G-S schemes with the best acceleration techniques. Contrary to what happens with the local operator splitting strategy currently in use, these novel
Charge transfer excitations from excited state Hartree-Fock subsequent minimization scheme
International Nuclear Information System (INIS)
Theophilou, Iris; Tassi, M.; Thanos, S.
2014-01-01
Photoinduced charge-transfer processes play a key role for novel photovoltaic phenomena and devices. Thus, the development of ab initio methods that allow for an accurate and computationally inexpensive treatment of charge-transfer excitations is a topic that nowadays attracts a lot of scientific attention. In this paper we extend an approach recently introduced for the description of single and double excitations [M. Tassi, I. Theophilou, and S. Thanos, Int. J. Quantum Chem. 113, 690 (2013); M. Tassi, I. Theophilou, and S. Thanos, J. Chem. Phys. 138, 124107 (2013)] to allow for the description of intermolecular charge-transfer excitations. We describe an excitation where an electron is transferred from a donor system to an acceptor one, keeping the excited state orthogonal to the ground state and avoiding variational collapse. These conditions are achieved by decomposing the space spanned by the Hartree-Fock (HF) ground state orbitals into four subspaces: The subspace spanned by the occupied orbitals that are localized in the region of the donor molecule, the corresponding for the acceptor ones and two more subspaces containing the virtual orbitals that are localized in the neighborhood of the donor and the acceptor, respectively. Next, we create a Slater determinant with a hole in the subspace of occupied orbitals of the donor and a particle in the virtual subspace of the acceptor. Subsequently we optimize both the hole and the particle by minimizing the HF energy functional in the corresponding subspaces. Finally, we test our approach by calculating the lowest charge-transfer excitation energies for a set of tetracyanoethylene-hydrocarbon complexes that have been used earlier as a test set for such kind of excitations
GPU-BASED MONTE CARLO DUST RADIATIVE TRANSFER SCHEME APPLIED TO ACTIVE GALACTIC NUCLEI
International Nuclear Information System (INIS)
Heymann, Frank; Siebenmorgen, Ralf
2012-01-01
A three-dimensional parallel Monte Carlo (MC) dust radiative transfer code is presented. To overcome the huge computing-time requirements of MC treatments, the computational power of vectorized hardware is used, utilizing either multi-core computer power or graphics processing units. The approach is a self-consistent way to solve the radiative transfer equation in arbitrary dust configurations. The code calculates the equilibrium temperatures of two populations of large grains and stochastic heated polycyclic aromatic hydrocarbons. Anisotropic scattering is treated applying the Heney-Greenstein phase function. The spectral energy distribution (SED) of the object is derived at low spatial resolution by a photon counting procedure and at high spatial resolution by a vectorized ray tracer. The latter allows computation of high signal-to-noise images of the objects at any frequencies and arbitrary viewing angles. We test the robustness of our approach against other radiative transfer codes. The SED and dust temperatures of one- and two-dimensional benchmarks are reproduced at high precision. The parallelization capability of various MC algorithms is analyzed and included in our treatment. We utilize the Lucy algorithm for the optical thin case where the Poisson noise is high, the iteration-free Bjorkman and Wood method to reduce the calculation time, and the Fleck and Canfield diffusion approximation for extreme optical thick cells. The code is applied to model the appearance of active galactic nuclei (AGNs) at optical and infrared wavelengths. The AGN torus is clumpy and includes fluffy composite grains of various sizes made up of silicates and carbon. The dependence of the SED on the number of clumps in the torus and the viewing angle is studied. The appearance of the 10 μm silicate features in absorption or emission is discussed. The SED of the radio-loud quasar 3C 249.1 is fit by the AGN model and a cirrus component to account for the far-infrared emission.
International Nuclear Information System (INIS)
Zhen-Gang, Shi; Xiong-Wen, Chen; Xi-Xiang, Zhu; Ke-Hui, Song
2009-01-01
This paper proposes a simple scheme for realizing one-qubit and two-qubit quantum gates as well as multiqubit entanglement based on dc-SQUID charge qubits through the control of their coupling to a 1D transmission line resonator (TLR). The TLR behaves effectively as a quantum data-bus mode of a harmonic oscillator, which has several practical advantages including strong coupling strength, reproducibility, immunity to 1/f noise, and suppressed spontaneous emission. In this protocol, the data-bus does not need to stay adiabatically in its ground state, which results in not only fast quantum operation, but also high-fidelity quantum information processing. Also, it elaborates the transfer process with the 1D transmission line. (general)
Rai, Rajesh Kumar; Singh, Prashant Kumar
2012-01-01
Alongside endorsing Millennium Development Goal 5 in 2000, India launched its National Population Policy in 2000 and the National Health Policy in 2002. However, these have failed thus far to reduce the maternal mortality ratio (MMR) by the targeted 5.5% per annum. Under the banner of the National Rural Health Mission, the Government of India launched a national conditional cash transfer (CCT) scheme in 2005 called Janani Suraksha Yojana (JSY), aimed to encourage women to give birth in health facilities which, in turn, should reduce maternal deaths. Poor prenatal care in general, and postnatal care in particular, could be considered the causes of the high number of maternal deaths in India (the highest in the world). Undoubtedly, institutional delivery in India has increased and MMR has reduced over time as a result of socioeconomic development coupled with advancement in health care including improved women's education, awareness and availability of health services. However, in the light of its performance, we argue that the JSY scheme was not well enough designed to be considered as an effective pathway to reduce MMR. We propose that the service-based CCT is not the solution to avoid/reduce maternal deaths and that policy-makers and programme managers should reconsider the 'package' of continuum of care and maternal health services to ensure that they start from adolescence and the pre-pregnancy period, and extend to delivery, postnatal and continued maternal health care.
Energy Technology Data Exchange (ETDEWEB)
Yang, Z.L. [Univ. of Arizona, Tucson, AZ (United States); Pitman, A.J. [Macquarie Univ., Sydney (Australia); McAvaney, B. [Bureau of Meterology Research Centre, Melbourne (Australia)] [and others
1995-07-01
This study describes the first order impacts of incorporating a complex land-surface scheme, the bare essentials of surface transfer (BEST), into the Australian Bureau of Meteorology Research Centre (BMRC) global atmospheric general circulation model (GCM). Land seasonal climatologies averaged over the last six years of integrations after equilibrium from the GCM with BEST and without BEST (the control) are compared. The modeled results are evaluated with comprehensive sources of data, including the layer-cloud climatologies project (ISCCP) data from 1983 to 1991 and the surface-observed global data of Warrent et al., a five-year climatology of surface albedo estimated from earth radiation budget experiment (ERBE) top-of-the-atmosphere (TOA) radiative fluxes, global grid point datasets of precipitation, and the climatological analyses of surface evaporation and albedo. Emphasis is placed on the surface evaluation of simulations of land-surface conditions such as surface roughness, surface albedo and the surface wetness factor, and on their effects on surface evaporation, precipitation, layer-cloud and surface temperature. The improvements due to the inclusion of BEST are: a realistic geographical distribution of surface roughness, a decrease in surface albedo over areas with seasonal snow cover, an an increase in surface albedo over snow-free land. The simulated reduction in surface evaporation due, in part, to the bio-physical control of vegetation, is also consistent with the previous studies. Since the control climate has a dry bias, the overall simulations from the GCM with BEST are degraded, except for significant improvements for the northern winter hemisphere because of the realistic vegetation-masking effects. The implications of our results for synergistic developments of other aspects of model parameterization schemes such as boundary layer dynamics, clouds, convection and rainfall are discussed. 82 refs., 9 figs., 3 tabs.
Intercomparison between BATS and LSPM surface schemes, using point micrometeorological data set
Energy Technology Data Exchange (ETDEWEB)
Ruti, P.M.; Cacciamani, C.; Paccagnella, T. [Servizio Meteorologico Regionale, Bologna (Italy); Cassardo, C. [Turin Univ., Alessandria (Italy). Dipt. di Scienze e Technologie Avanzate; Longhetto, A. [Turin Univ. (Italy). Ist. di Fisica Generale; Bargagli, A. [ENEA, Roma (Italy). Gruppo di Dinamica dell`Atmosfera e dell`Oceano
1997-08-01
This work has been developed with the aim to create an archive of climatological values of sensible, latent and ground-atmosphere heat fluxes in the Po valley (CLIPS experiment); due to the unavailability of climatological archives of turbulent fluxes at synoptic scale, we have used the outputs of ``stand-alone`` runnings of biospheric models; this archive could be used to check the parametrizations of large- and mesoscale models in the surface layer. We started to check the reliability of our proposal by testing the model outputs by a comparison with observed data. We selected a flat, rural area in the middle-east Po valley (San Pietro Capofiume, Italy) and used the data gathered in the experimental campaign SPCFLUX93 carried out there. The models adopted for the intercomparison have been the biosphere-atmosphere transfer scheme (BATS) of Dickinson et al. (1986 version) and the land surface process model (LSPM) of Cassardo et al. (1996 version). An improved version of BATS has been implemented by us changing in a substantial way the soil thermal and hydrological subroutines. The upper boundary conditions used for all models were taken by interpolating the synoptic observations carried out at San Pietro Capofiume (Italy) station; the algorithm used for the interpolations was tested with the data achieved in a fortnight campaign (SPCFLUX93) carried out at the same location during June 1993, showing a good agreement between interpolated and observed variables. Two experiments have been carried out; in the first one, the vegetation parameter set used by BATS has been used to force all models, while in the second one a vegetation cover value closest to the observations in the site has been used. 30 refs.
Kosgey, I.S.; Kahi, A.K.; Arendonk, van J.A.M.
2005-01-01
The potential benefits of closed adult nucleus multiple ovulation and embryo transfer (MOET) and conventional progeny testing (CNS) schemes, and the logistics of their integration into large-scale continuous production of crossbred cattle were studied by deterministic simulation. The latter was
Energy Technology Data Exchange (ETDEWEB)
Ohsuga, Ken; Takahashi, Hiroyuki R. [National Astronomical Observatory of Japan, Osawa, Mitaka, Tokyo 181-8588 (Japan)
2016-02-20
We develop a numerical scheme for solving the equations of fully special relativistic, radiation magnetohydrodynamics (MHDs), in which the frequency-integrated, time-dependent radiation transfer equation is solved to calculate the specific intensity. The radiation energy density, the radiation flux, and the radiation stress tensor are obtained by the angular quadrature of the intensity. In the present method, conservation of total mass, momentum, and energy of the radiation magnetofluids is guaranteed. We treat not only the isotropic scattering but also the Thomson scattering. The numerical method of MHDs is the same as that of our previous work. The advection terms are explicitly solved, and the source terms, which describe the gas–radiation interaction, are implicitly integrated. Our code is suitable for massive parallel computing. We present that our code shows reasonable results in some numerical tests for propagating radiation and radiation hydrodynamics. Particularly, the correct solution is given even in the optically very thin or moderately thin regimes, and the special relativistic effects are nicely reproduced.
Directory of Open Access Journals (Sweden)
S. Fares
2009-06-01
Full Text Available Biosphere-atmosphere interactions were investigated on a sandy dune Mediterranean ecosystem in a field campaign held in 2007 within the frame of the European Projects ACCENT and VOCBAS. The campaign was carried out in the Presidential estate of Castelporziano, a peri-urban park close to Rome. Former campaigns (e.g. BEMA performed in Castelporziano investigated the emission of biogenic volatile organic compounds (BVOC. These campaigns focused on pseudosteppe and evergreen oak groves whereas the contribution of the largely biodiverse dune vegetation, a prominent component of the Mediterranean ecosystem, was overlooked. While specific aspects of the campaign will be discussed in companion papers, the general climatic and physiological aspects are presented here, together with information regarding BVOC emission from the most common plant species of the dune ecosystem. During the campaign regular air movements were observed, dominated by moderate nocturnal land breeze and diurnal sea breeze. A regular daily increase of ozone concentration in the air was also observed, but daily peaks of ozone were lower than those measured in summer on the same site. The site was ideal as a natural photochemical reactor to observe reaction, transport and deposition processes occurring in the Mediterranean basin, since the sea-land breeze circulation allowed a strong mixing between biogenic and anthropogenic emissions and secondary pollutants. Measurements were run in May, when plant physiological conditions were optimal, in absence of severe drought and heat stress. Foliar rates of photosynthesis and transpiration were as high as generally recorded in unstressed Mediterranean sclerophyllous plants. Most of the plant species emitted high level of monoterpenes, despite measurements being made in a period in which emissions of volatile isoprenoids could be restrained by developmental and environmental factors, such as leaf age and relatively low air temperature
International Nuclear Information System (INIS)
Chen, W.-P.; Huang, W.-N.; Chen, P.-S.; Fan, T.-Y.; Chen, M.-P.; Teng, C.-C.
2006-01-01
In this paper, the novel design concept for highly effective magnetic flux coupling (HEMFC) schemes, based on enhancement of path guiding effect for leakage flux transmitting, is proposed for a non-contact power transfer system. Two implementation techniques are presented herein utilizing simple structure opinions of specific slant air gap as well as adding of metal bushing components. Both simulation and experimental results demonstrate that the improvement of magnetic coupling ratio and overall system efficiency are achieved by applying the two HEMFC schemes as the power transmitting devices
International Nuclear Information System (INIS)
Capdevila, R.; Perez-Segarra, C.D.; Oliva, A.
2010-01-01
In the present work four different spatial numerical schemes have been developed with the aim of reducing the false-scattering of the numerical solutions obtained with the discrete ordinates (DOM) and the finite volume (FVM) methods. These schemes have been designed specifically for unstructured meshes by means of the extrapolation of nodal values of intensity on the studied radiative direction. The schemes have been tested and compared in several 3D benchmark test cases using both structured orthogonal and unstructured grids.
Verhagen, Evert; Voogt, Nelly; Bruinsma, Anja; Finch, Caroline F
2014-04-01
Evidence of effectiveness does not equal successful implementation. To progress the field, practical tools are needed to bridge the gap between research and practice and to truly unite effectiveness and implementation evidence. This paper describes the Knowledge Transfer Scheme integrating existing implementation research frameworks into a tool which has been developed specifically to bridge the gap between knowledge derived from research on the one side and evidence-based usable information and tools for practice on the other.
Xamán, J.; Zavala-Guillén, I.; Hernández-López, I.; Uriarte-Flores, J.; Hernández-Pérez, I.; Macías-Melo, E. V.; Aguilar-Castro, K. M.
2018-03-01
In this paper, we evaluated the convergence rate (CPU time) of a new mathematical formulation for the numerical solution of the radiative transfer equation (RTE) with several High-Order (HO) and High-Resolution (HR) schemes. In computational fluid dynamics, this procedure is known as the Normalized Weighting-Factor (NWF) method and it is adopted here. The NWF method is used to incorporate the high-order resolution schemes in the discretized RTE. The NWF method is compared, in terms of computer time needed to obtain a converged solution, with the widely used deferred-correction (DC) technique for the calculations of a two-dimensional cavity with emitting-absorbing-scattering gray media using the discrete ordinates method. Six parameters, viz. the grid size, the order of quadrature, the absorption coefficient, the emissivity of the boundary surface, the under-relaxation factor, and the scattering albedo are considered to evaluate ten schemes. The results showed that using the DC method, in general, the scheme that had the lowest CPU time is the SOU. In contrast, with the results of theDC procedure the CPU time for DIAMOND and QUICK schemes using the NWF method is shown to be, between the 3.8 and 23.1% faster and 12.6 and 56.1% faster, respectively. However, the other schemes are more time consuming when theNWFis used instead of the DC method. Additionally, a second test case was presented and the results showed that depending on the problem under consideration, the NWF procedure may be computationally faster or slower that the DC method. As an example, the CPU time for QUICK and SMART schemes are 61.8 and 203.7%, respectively, slower when the NWF formulation is used for the second test case. Finally, future researches to explore the computational cost of the NWF method in more complex problems are required.
Krishnan, Anand; Amarchand, Ritvik; Byass, Peter; Pandav, Chandrakant; Ng, Nawi
2014-01-31
Haryana was the first state in India to launch a conditional cash transfer (CCT) scheme in 1994. Initially it targeted all disadvantaged girls but was revised in 2005 to restrict it to second girl children of all groups. The benefit which accrued at girl attaining 18 years and subject to conditionalities of being fully immunized, studying till class 10 and remaining unmarried, was increased from about US$ 500 to US$ 2000. Using a mixed methods approach, we evaluated the implementation and possible impact of these two schemes. A survey was conducted among 200 randomly selected respondents of Ballabgarh Block in Haryana to assess their perceptions of girl children and related schemes. A cohort of births during this period was assembled from population database of 28 villages in this block and changes in sex ratio at birth and in immunization coverage at one year of age among boys and girls was measured. Education levels and mean age at marriage of daughters were compared with daughters-in-law from outside Haryana. In-depth interviews were conducted among district level implementers of these schemes to assess their perceptions of programs' implementation and impact. These were analyzed using a thematic approach. The perceptions of girls as a liability and poor (9% to 15%) awareness of the schemes was noted. The cohort analysis showed that while there has been an improvement in the indicators studied, these were similar to those seen among the control groups. Qualitative analysis identified a "conspiracy of silence" - an underplaying of the pervasiveness of the problem coupled with a passive implementation of the program and a clash between political culture of giving subsidies and a bureaucratic approach that imposed many conditionalities and documentary needs for availing of benefits. The apparent lack of impact on the societal mindset calls for a revision in the current approach of addressing a social issue by a purely conditional cash transfer program.
Energy Technology Data Exchange (ETDEWEB)
Buet, Ch.; Despres, B
2007-07-01
We address the discretization of the Levermore's two moments and entropy model of the radiative transfer equation. We present a new approach for the discretization of this model: first we rewrite the moment equations as a Compressible Gas Dynamics equation by introducing an additional quantity that plays the role of a density. After that we discretize using a Lagrange-projection scheme. The Lagrange-projection scheme permits us to incorporate the source terms in the fluxes of an acoustic solver in the Lagrange step, using the well-known piecewise steady approximation and thus to capture correctly the diffusion regime. Moreover we show that the discretization is entropic and preserve the flux-limited property of the moment model. Numerical examples illustrate the feasibility of our approach. (authors)
Directory of Open Access Journals (Sweden)
Kebiao Mao
2017-07-01
Full Text Available This work made an improvement upon and a further evaluation of previous work for estimating water vapor content from near-infrared around 1 μm from MODIS data. The accuracy of RM-NN is determined by the complicated relationship of the geophysical parameters. An advanced scheme is proposed for building different training databases for different seasons in different regions to reduce the complexity. The training database includes three parts. The first part is a simulation database by MODTRAN for different weather conditions, which is made as a basic database; the second part is reliable field measurement data in observation stations; and the third part is the MYD05_L2 product on clear days, which is produced by the standard product algorithm for water vapor content. The comparative analyses based on simulation data indicate that maximum accuracy of single condition could be improved by about 34% relative to the “all conditions” results. Two study regions in China and America are selected as test areas, and the evaluation shows that the mean and the standard deviation of estimation error are about 0.08 g cm−2 and 0.09 g cm−2, respectively. All the analysis indicates that the advanced scheme can improve the retrieval accuracy of water vapor content, which can make full use of the advantages of previous methods.
Directory of Open Access Journals (Sweden)
Ma Cecilia Catubig
2015-11-01
Full Text Available This paper evaluates current payment schemes employed by the Pantawid Pamilyang Pilipino Program (4Ps in the Philippines using six assessment criteria: transaction cost, security/risks, speed and timeliness, acceptability, resilience and flexibility. Employing data collected at the regional level, we establish four main findings: (1 all 4Ps payment conduits present trade-offs; (2 a payment approach that uses mainstream financial infrastructure is beneficial if cost, speed and simplicity of the payment system are critical; (3 competition for 4Ps contracts for Payment Service Providers (PSPs has improved the quality of payment services and minimized costs; and (4 the efficiency of the program is greatly influenced by the commitment of the PSP to deliver the cash benefits to the recipients in a timely manner rather than by maximizing conduit branches.
D'Alessandro, Valerio; Binci, Lorenzo; Montelpare, Sergio; Ricci, Renato
2018-01-01
Open-source CFD codes provide suitable environments for implementing and testing low-dissipative algorithms typically used to simulate turbulence. In this research work we developed CFD solvers for incompressible flows based on high-order explicit and diagonally implicit Runge-Kutta (RK) schemes for time integration. In particular, an iterated PISO-like procedure based on Rhie-Chow correction was used to handle pressure-velocity coupling within each implicit RK stage. For the explicit approach, a projected scheme was used to avoid the "checker-board" effect. The above-mentioned approaches were also extended to flow problems involving heat transfer. It is worth noting that the numerical technology available in the OpenFOAM library was used for space discretization. In this work, we additionally explore the reliability and effectiveness of the proposed implementations by computing several unsteady flow benchmarks; we also show that the numerical diffusion due to the time integration approach is completely canceled using the solution techniques proposed here.
Sol Galligani, Victoria; Wang, Die; Alvarez Imaz, Milagros; Salio, Paola; Prigent, Catherine
2017-10-01
In the present study, three meteorological events of extreme deep moist convection, characteristic of south-eastern South America, are considered to conduct a systematic evaluation of the microphysical parameterizations available in the Weather Research and Forecasting (WRF) model by undertaking a direct comparison between satellite-based simulated and observed microwave radiances. A research radiative transfer model, the Atmospheric Radiative Transfer Simulator (ARTS), is coupled with the WRF model under three different microphysical parameterizations (WSM6, WDM6 and Thompson schemes). Microwave radiometry has shown a promising ability in the characterization of frozen hydrometeors. At high microwave frequencies, however, frozen hydrometeors significantly scatter radiation, and the relationship between radiation and hydrometeor populations becomes very complex. The main difficulty in microwave remote sensing of frozen hydrometeor characterization is correctly characterizing this scattering signal due to the complex and variable nature of the size, composition and shape of frozen hydrometeors. The present study further aims at improving the understanding of frozen hydrometeor optical properties characteristic of deep moist convection events in south-eastern South America. In the present study, bulk optical properties are computed by integrating the single-scattering properties of the Liu(2008) discrete dipole approximation (DDA) single-scattering database across the particle size distributions parameterized by the different WRF schemes in a consistent manner, introducing the equal mass approach. The equal mass approach consists of describing the optical properties of the WRF snow and graupel hydrometeors with the optical properties of habits in the DDA database whose dimensions might be different (Dmax') but whose mass is conserved. The performance of the radiative transfer simulations is evaluated by comparing the simulations with the available coincident
Klotz, Daniel; Herrnegger, Mathew; Schulz, Karsten
2016-04-01
This contribution presents a framework, which enables the use of an Evolutionary Algorithm (EA) for the calibration and regionalization of the hydrological model COSEROreg. COSEROreg uses an updated version of the HBV-type model COSERO (Kling et al. 2014) for the modelling of hydrological processes and is embedded in a parameter regionalization scheme based on Samaniego et al. (2010). The latter uses subscale-information to estimate model via a-priori chosen transfer functions (often derived from pedotransfer functions). However, the transferability of the regionalization scheme to different model-concepts and the integration of new forms of subscale information is not straightforward. (i) The usefulness of (new) single sub-scale information layers is unknown beforehand. (ii) Additionally, the establishment of functional relationships between these (possibly meaningless) sub-scale information layers and the distributed model parameters remain a central challenge in the implementation of a regionalization procedure. The proposed method theoretically provides a framework to overcome this challenge. The implementation of the EA encompasses the following procedure: First, a formal grammar is specified (Ryan et al., 1998). The construction of the grammar thereby defines the set of possible transfer functions and also allows to incorporate hydrological domain knowledge into the search itself. The EA iterates over the given space by combining parameterized basic functions (e.g. linear- or exponential functions) and sub-scale information layers into transfer functions, which are then used in COSEROreg. However, a pre-selection model is applied beforehand to sort out unfeasible proposals by the EA and to reduce the necessary model runs. A second optimization routine is used to optimize the parameters of the transfer functions proposed by the EA. This concept, namely using two nested optimization loops, is inspired by the idea of Lamarckian Evolution and Baldwin Effect
International Nuclear Information System (INIS)
Knoepfel, Rahel; Becker, Erich
2011-01-01
A new and numerically efficient method to compute radiative flux densities and heating rates in a general atmospheric circulation model is presented. Our method accommodates the fundamental differences between the troposphere and middle atmosphere in the long-wave regime within a single parameterization that extends continuously from the surface up to the mesopause region and takes the deviations from the gray limit and from the local thermodynamic equilibrium into account. For this purpose, frequency-averaged Eddington-type transfer equations are derived for four broad absorber bands. The frequency variation inside each band is parameterized by application of the Elsasser band model extended by a slowly varying envelope function. This yields additional transfer equations for the perturbation amplitudes that are solved numerically along with the mean transfer equations. Deviations from local thermodynamic equilibrium are included in terms of isotropic scattering, calculating the single scattering albedo from the two-level model for each band. Solar radiative flux densities are computed for four energetically defined bands using the simple Beer-Bougert-Lambert relation for absorption within the atmosphere. The new scheme is implemented in a mechanistic general circulation model from the surface up to the mesopause region. A test simulation with prescribed concentrations of the radiatively active constituents shows quite reasonable results. In particular, since we take the full surface energy budget into account by means of a swamp ocean, and since the internal dynamics and turbulent diffusion of the model are formulated in accordance with the conservation laws, an equilibrated climatological radiation budget is obtained both at the top of the atmosphere and at the surface.
DEFF Research Database (Denmark)
Wahlgren, Bjarne; Aarkrog, Vibe
Bogen er den første samlede indføring i transfer på dansk. Transfer kan anvendes som praksis-filosofikum. Den giver en systematisk indsigt til den studerende, der spørger: Hvordan kan teoretisk viden bruges til at reflektere over handlinger i situationer, der passer til min fremtidige arbejdsplads?...
International Nuclear Information System (INIS)
Kim, Jong Tae; Ha, Kwang Soon; Kim, Hwan Yeol; Park, Rae Joon; Song, Jin Ho
2010-01-01
, unsteady turbulence models based on filtered or volume-averaged governing equations have been applied for the turbulent natural convection heat transfer. Tran et al. used large eddy simulation (LES) for the analysis of molten corium coolability. The numerical instability is related to a gravitational force of the molten corium. A staggered grid method on an orthogonal structured grid is used to prohibit a pressure oscillation in the numerical solution. But it is impractical to use the structured grid for a partially filled spherical pool, a cone-type pool or triangular pool. An unstructured grid is an alternative for the nonrectangular pools. In order to remove the checkerboard- like pressure oscillation on the unstructured grid, some special interpolation scheme is required. In order to evaluate in-vessel coolability of the molten corium for a pressurized water reactor (PWR), thermo-hydraulic analysis code LILAC had been developed. LILAC has a capability of multi-layered conjugate heat transfer with melt solidification. A solution domain can be 2-dimensional, axisymmetric, and 3-dimensional. LILAC is based on the unstructured mesh technology to discretized non-rectangular pool geometry. Because of too limited man-power to maintain the code, it becomes more and more difficult to implement new physical and numerical models in the code along with increased complication of the code. Recently, open source CFD code OpenFOAM has been released and applied to many academic and engineering areas. OpenFOAM is based on the very similar numerical schemes to the LILAC code. It has many physical and numerical models for multi-physics analysis. And because it is based on object-oriented programming, it is known that new models can be easily implemented and is very fast with a lower possibility of coding errors. This is a very attractive feature for the development, validation and maintenance of an analysis code. On the contrary to commercial CFD codes, it is possible to modify and add
African Journals Online (AJOL)
This paper reports on further studies on long range energy transfer between curcumine as donor and another thiazine dye, thionine, which is closely related to methylene blue as energy harvester (Figure 1). Since thionine is known to have a higher quantum yield of singlet oxygen sensitization than methylene blue [8], it is ...
Challenges in quantifying biosphere-atmosphere exchange of nitrogen species
Energy Technology Data Exchange (ETDEWEB)
Sutton, M.A. [Centre for Ecology and Hydrology (CEH), Edinburgh Research Station, Bush Estate, Penicuik, EH26 0QB (United Kingdom)], E-mail: ms@ceh.ac.uk; Nemitz, E. [Centre for Ecology and Hydrology (CEH), Edinburgh Research Station, Bush Estate, Penicuik, EH26 0QB (United Kingdom); Erisman, J.W. [ECN, Clean Fossil Fuels, PO Box 1, 1755 ZG Petten (Netherlands); Beier, C. [Riso National Laboratory, PO Box 49, DK-4000 Roskilde (Denmark); Bahl, K. Butterbach [Institute of Meteorology and Climate Research, Atmos. Environ. Research (IMK-IFU), Research Centre Karlsruhe GmbH, Kreuzeckbahnstr. 19, 82467 Garmisch-Partenkirchen (Germany); Cellier, P. [INRA Unite Mixte de Recherche, 78850 Thiverval-Grignon (France); Vries, W. de [Alterra, Green World Research, PO Box 47, 6700 AA Wageningen (Netherlands); Cotrufo, F. [Dip. Scienze Ambientali, Seconda Universita degli Studi di Napoli, via Vivaldi 43, 81100 Caserta (Italy); Skiba, U.; Di Marco, C.; Jones, S. [Centre for Ecology and Hydrology (CEH), Edinburgh Research Station, Bush Estate, Penicuik, EH26 0QB (United Kingdom); Laville, P.; Soussana, J.F.; Loubet, B. [INRA Unite Mixte de Recherche, 78850 Thiverval-Grignon (France); Twigg, M.; Famulari, D. [Centre for Ecology and Hydrology (CEH), Edinburgh Research Station, Bush Estate, Penicuik, EH26 0QB (United Kingdom); Whitehead, J.; Gallagher, M.W. [School of Earth, Atmospheric and Environmental Sciences, University of Manchester, Williamson Building, Oxford Road, Manchester, M13 9PL (United Kingdom); Neftel, A.; Flechard, C.R. [Agroscope FAL Reckenholz, Federal Research Station for Agroecology and Agriculture, PO Box, CH 8046 Zurich (Switzerland)] (and others)
2007-11-15
Recent research in nitrogen exchange with the atmosphere has separated research communities according to N form. The integrated perspective needed to quantify the net effect of N on greenhouse-gas balance is being addressed by the NitroEurope Integrated Project (NEU). Recent advances have depended on improved methodologies, while ongoing challenges include gas-aerosol interactions, organic nitrogen and N{sub 2} fluxes. The NEU strategy applies a 3-tier Flux Network together with a Manipulation Network of global-change experiments, linked by common protocols to facilitate model application. Substantial progress has been made in modelling N fluxes, especially for N{sub 2}O, NO and bi-directional NH{sub 3} exchange. Landscape analysis represents an emerging challenge to address the spatial interactions between farms, fields, ecosystems, catchments and air dispersion/deposition. European up-scaling of N fluxes is highly uncertain and a key priority is for better data on agricultural practices. Finally, attention is needed to develop N flux verification procedures to assess compliance with international protocols. - Current N research is separated by form; the challenge is to link N components, scales and issues.
Challenges in quantifying biosphere-atmosphere exchange of nitrogen species
DEFF Research Database (Denmark)
Sutton, M.A.; Nemitz, E.; Erisman, J.W.
2007-01-01
Recent research in nitrogen exchange with the atmosphere has separated research communities according to N form. The integrated perspective needed to quantify the net effect of N on greenhouse-gas balance is being addressed by the NitroEurope Integrated Project (NEU). Recent advances have depende...
2014-01-01
Introduction Haryana was the first state in India to launch a conditional cash transfer (CCT) scheme in 1994. Initially it targeted all disadvantaged girls but was revised in 2005 to restrict it to second girl children of all groups. The benefit which accrued at girl attaining 18 years and subject to conditionalities of being fully immunized, studying till class 10 and remaining unmarried, was increased from about US$ 500 to US$ 2000. Using a mixed methods approach, we evaluated the implementation and possible impact of these two schemes. Methods A survey was conducted among 200 randomly selected respondents of Ballabgarh Block in Haryana to assess their perceptions of girl children and related schemes. A cohort of births during this period was assembled from population database of 28 villages in this block and changes in sex ratio at birth and in immunization coverage at one year of age among boys and girls was measured. Education levels and mean age at marriage of daughters were compared with daughters-in-law from outside Haryana. In-depth interviews were conducted among district level implementers of these schemes to assess their perceptions of programs’ implementation and impact. These were analyzed using a thematic approach. Results The perceptions of girls as a liability and poor (9% to 15%) awareness of the schemes was noted. The cohort analysis showed that while there has been an improvement in the indicators studied, these were similar to those seen among the control groups. Qualitative analysis identified a “conspiracy of silence” - an underplaying of the pervasiveness of the problem coupled with a passive implementation of the program and a clash between political culture of giving subsidies and a bureaucratic approach that imposed many conditionalities and documentary needs for availing of benefits. Conclusion The apparent lack of impact on the societal mindset calls for a revision in the current approach of addressing a social issue by a purely
DEFF Research Database (Denmark)
van Leeuwen, Theo
2013-01-01
This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....
J.K. Hoogland (Jiri); C.D.D. Neumann
2000-01-01
textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing
Zhu, Mingyue; Liu, Qian; Chen, Wei; Yin, Yuanyuan; Ge, Lan; Li, Henan; Wang, Kun
2017-11-08
The efficient separation of photogenerated electron-hole pairs in photoactive materials is highly desired, allowing their transfer to specific sites for undergoing redox reaction in various applications. The construction of ternary heterojunctions is a practical strategy to enhance the migration of photogenerated electron that realizes the synergistic effect of multicomponents rather than the simple overlay of single component. Here, we demonstrate an available way to fabricate new BiOCl/BiVO 4 /nitrogen-doped graphene quantum dot (N-GQD) ternary heterojunctions that exhibit higher efficiency in charge separation than any binary heterojunction or pure material under visible-light irradiation. UV-vis diffuse reflectance spectroscopy demonstrated that the proposed BiOCl/BiVO 4 /N-GQD ternary heterojunctions possess the narrower band gap energy. More importantly, the ternary heterojunctions reveal the prolonged lifetime of photogenerated charges and enhanced the separation efficiency of photogenerated electron-hole pairs, which may be ascribed to sensitization based on an internal Z-scheme charge transfer at the interface of N-GQDs with oxygen functional groups. Furthermore, we examine the photoactive performance of proposed ternary heterojunctions in aqueous solution by using the photodegradation of bisphenol A as a model system and BiOCl/BiVO 4 /N-GQD ternary heterojunctions also display a dramatically enhanced photodegradation rate. The proposed charge separation and transfer process of BiOCl/BiVO 4 /N-GQD ternary heterojunctions for the enhanced photoactivity were deduced by electrochemical measurements, photoluminescence, and electron spin resonance. The results demonstrate that a Z-scheme charge process was formed between BiOCl/BiVO 4 binary heterojunctions and N-GQDs, leading to an efficient charge carrier separation and strong photocatalytic ability. Notably, this work may assist in a better understanding of the role of N-GQDs in kinds of heterojunctions
International Nuclear Information System (INIS)
Biswas, Ayan K.; Bandyopadhyay, Supriyo; Atulasimha, Jayasimha
2013-01-01
We show that the energy dissipated to write bits in spin-transfer-torque random access memory can be reduced by an order of magnitude if a surface acoustic wave (SAW) is launched underneath the magneto-tunneling junctions (MTJs) storing the bits. The SAW-generated strain rotates the magnetization of every MTJs' soft magnet from the easy towards the hard axis, whereupon passage of a small spin-polarized current through a target MTJ selectively switches it to the desired state with > 99.99% probability at room temperature, thereby writing the bit. The other MTJs return to their original states at the completion of the SAW cycle
Marozas, J. A.; Hohenberger, M.; Rosenberg, M. J.; Turnbull, D.; Collins, T. J. B.; Radha, P. B.; McKenty, P. W.; Zuegel, J. D.; Marshall, F. J.; Regan, S. P.; Sangster, T. C.; Seka, W.; Campbell, E. M.; Goncharov, V. N.; Bowers, M. W.; Di Nicola, J.-M. G.; Erbert, G.; MacGowan, B. J.; Pelz, L. J.; Moody, J.; Yang, S. T.
2018-05-01
Cross-beam energy transfer (CBET) results from two-beam energy exchange via seeded stimulated Brillouin scattering, which detrimentally reduces laser-energy absorption for direct-drive inertial confinement fusion. Consequently, ablation pressure and implosion velocity suffer from the decreased absorption, reducing target performance in both symmetric and polar direct drive. Additionally, CBET alters the time-resolved scattered-light spectra and redistributes absorbed and scattered-light-changing shell morphology and low-mode drive symmetry. Mitigating CBET is demonstrated in inertial confinement implosions at the National Ignition Facility by detuning the laser-source wavelengths (±2.3 Å UV) of the interacting beams. In polar direct drive, wavelength detuning was shown to increase the equatorial region velocity experimentally by 16% and to alter the in-flight shell morphology. These experimental observations are consistent with design predictions of radiation-hydrodynamic simulations that indicate a 10% increase in the average ablation pressure. These results indicate that wavelength detuning successfully mitigates CBET. Simulations predict that optimized phase plates and wavelength-detuning CBET mitigation utilizing the three-legged beam layout of the OMEGA Laser System significantly increase absorption and achieve >100-Gbar hot-spot pressures in symmetric direct drive.
Additive operator-difference schemes splitting schemes
Vabishchevich, Petr N
2013-01-01
Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy
Marozas, J. A.
2017-10-01
Cross-beam energy transfer (CBET) has been shown to significantly reduce the laser absorption and implosion speed in direct-drive implosion experiments on OMEGA and the National Ignition Facility (NIF). Mitigating CBET assists in achieving ignition-relevant hot-spot pressures in deuterium-tritium cryogenic OMEGA implosions. In addition, reducing CBET permits lower, more hydrodynamically stable, in-flight aspect ratio ignition designs with smaller nonuniformity growth during the acceleration phase. Detuning the wavelengths of the crossing beams is one of several techniques under investigation at the University of Rochester to mitigate CBET. This talk will describe these techniques with an emphasis on wavelength detuning. Recent experiments designed and predicted using multidimensional hydrodynamic simulations including CBET on the NIF have exploited the wavelength arrangement of the NIF beam geometry to demonstrate CBET mitigation through wavelength detuning in polar-direct-drive (PDD) implosions. Shapes and trajectories inferred from time-resolved x-ray radiography of the imploding shell, scattered-light spectra, and hard x-ray spectra generated by suprathermal electrons all indicate a reduction in CBET. These results and their implications for direct-drive ignition will be presented and discussed. In addition, hydrodynamically scaled ignition-relevant designs for OMEGA implosions exploiting wavelength detuning will be presented. Changes required to the OMEGA laser to permit wavelength detuning will be discussed. Future plans for PDD on the NIF including more-uniform implosions with CBET mitigation will be explored. This material is based upon work supported by the Department of Energy National Nuclear Security Administration under Award Number DE-NA0001944.
Energy Technology Data Exchange (ETDEWEB)
Helby, Peter
2000-04-01
As a policy instrument, voluntary agreements often fascinate policy-makers.This is fuelled by a number of assumed advantages, such as the opportunity for co-operation rather than confrontation, speed and flexibility and the cost-effectiveness. Some advantages might even be accentuated at the European level: Co-operation has added advantage at the European level where the culture of consensus decision is strong. Flexibility is extra attractive for policy makers dealing with an economy less homogeneous than the average national economy. Speed is certainly welcomed by policy-makers otherwise faced with the slow-winding European legislative process. Cost-effectiveness is eagerly sought by European policy makers facing tight administrative budgets and staff limits. This report examines lessons from the VAIE case studies that may be useful to policy makers engaged in the development of voluntary approaches at the European level. These case studies are about voluntary agreement schemes for industrial energy efficiency deployed in Denmark, France, Germany, Netherlands, and Sweden. For a summary of these case studies, please refer to the the VAIE final report. More detailed information is available in the VAIE national reports. It needs to be emphasised that the empirical base is very narrow. The 'lessons' presented can only be hypotheses, based on an inductive leap from a very narrow experience. The reader will need to check these hypotheses against her own broader experience and personal judgement. According to the principle of subsidiarity, voluntary agreements should be implemented at the European level only if that would have significant advantage over national action. Action at the European level, rather than the national level, would have these potential advantages: Being more consistent with the development of the single market; Allowing higher demands on energy efficiency without negative effect on competitiveness and employment; Stimulating company
Nigeria's first national social protection scheme | IDRC ...
International Development Research Centre (IDRC) Digital Library (Canada)
2017-06-14
Jun 14, 2017 ... Women and children at an IDP Camp in DRC ... The cash transfer was provided through the Nigerian Ekiti State Social Security Scheme, ... national policy conference to discuss the findings with media and policy stakeholders.
REMINDER: Saved Leave Scheme (SLS)
2003-01-01
Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...
Massina, Christopher James
The feasibility of conducting long duration human spaceflight missions is largely dependent on the provision of consumables such as oxygen, water, and food. In addition to meeting crew metabolic needs, water sublimation has long served as the primary heat rejection mechanism in space suits during extravehicular activity (EVA). During a single eight hour EVA, approximately 3.6 kg (8 lbm) of water is lost from the current suit. Reducing the amount of expended water during EVA is a long standing goal of space suit life support systems designers; but to date, no alternate thermal control mechanism has demonstrated the ability to completely eliminate the loss. One proposed concept is to convert the majority of a space suit's surface area into a radiator such that the local environment can be used as a radiative thermal sink for rejecting heat without mass loss. Due to natural variations in both internal (metabolic) loads and external (environmental) sink temperatures, radiative transport must be actively modulated in order to maintain an acceptable thermal balance. Here, variable emissivity electrochromic devices are examined as the primary mechanism for enabling variable heat rejection. This dissertation focuses on theoretical and empirical evaluations performed to determine the feasibility of using a full suit, variable emissivity radiator architecture for space suit thermal control. Operational envelopes are described that show where a given environment and/or metabolic load combination may or may not be supported by the evaluated thermal architecture. Key integration considerations and guidelines include determining allowable thermal environments, defining skin-to-radiator heat transfer properties, and evaluating required electrochromic performance properties. Analysis also considered the impacts of dynamic environmental changes and the architecture's extensibility to EVA on the Martian surface. At the conclusion of this work, the full suit, variable emissivity
Charge Transfer Scheme for Atmospheric Ice Sensing
Directory of Open Access Journals (Sweden)
Umair Najeeb MUGHAL
2015-01-01
Full Text Available The atmospheric icing parameters are being measured nowadays with the aid of more customized yet limited commercial equipment. The parameters include atmospheric ice detection, icing load and icing rate. The robustness of such equipment is usually under scrutiny when it comes to cold/harsh environment operations. This phenomenon was experienced consistently by the atmospheric Icing Research Team at Narvik University College during data retrieval exercises from its atmospheric icing stations installed at Fargnesfjellet during 2012-13. In this paper it is aimed to address the potential feasibility to produce a robust hardware addressing the icing measurements signals, which includes instrumentation hardware giving icing indications, icing type and de- icing rate measurements in a single platform (not commercially available till date.
Lattice-Boltzmann scheme for natural convection in porous media
Sman, van der R.G.M.
1997-01-01
A lattice-Boltzmann scheme for natural convection in porous media is developed and applied to the heat transfer problem of a 1000 kg potato packaging. The scheme has features new to the field of LB schemes. It is mapped on a orthorhombic lattice instead of the traditional cubic lattice. Furthermore
Sman, van der R.G.M.
2006-01-01
In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the
Scheme Program Documentation Tools
DEFF Research Database (Denmark)
Nørmark, Kurt
2004-01-01
are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....
Multiresolution signal decomposition schemes
J. Goutsias (John); H.J.A.M. Heijmans (Henk)
1998-01-01
textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis
Carbon cycle, chemical erosion of continents and transfers to the oceans
International Nuclear Information System (INIS)
Amiotte Suchet, P.
1995-01-01
This study tries to define the processes that control the CO 2 consumption due to the chemical erosion of continents, to appreciate the spatial-temporal fluxes of consumed CO 2 , and to estimate the transfers of dissolved mineral carbon from the continents to the oceans. Complementary approaches using different scales of time and space are necessary to study all these processes. Chemical alteration of minerals from continental rocks is due to the carbonic acid indirectly produced by atmospheric CO 2 via the photosynthesis and the degradation of organic matter in soils. The transfer of dissolved CO 2 towards the oceans is done by the drainage waters of the river basins. Continental erosion develops at the interfaces of the biosphere, atmosphere and ocean reservoirs and is controlled by numerous geological, hydro-climatical, biological and anthropic factors. Seasonal variations of CO 2 consumption has been studied for the Garonne (France), Congo and Ubangui basins to determine the mechanisms that control this consumption. A predictive model has been developed to simulate the consumed CO 2 fluxes on continental surfaces for which the spatial distribution of lithology and drainage is known. This model has been validated using available data from the Garonne (France), Congo and Amazone basins. (J.S.). 272 refs., 78 figs., 41 tabs., 1 annexe
Directory of Open Access Journals (Sweden)
R. Sitharthan
2016-09-01
Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.
Threshold Signature Schemes Application
Directory of Open Access Journals (Sweden)
Anastasiya Victorovna Beresneva
2015-10-01
Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.
An efficient numerical scheme for the simulation of parallel-plate active magnetic regenerators
DEFF Research Database (Denmark)
Torregrosa-Jaime, Bárbara; Corberán, José M.; Payá, Jorge
2015-01-01
A one-dimensional model of a parallel-plate active magnetic regenerator (AMR) is presented in this work. The model is based on an efficient numerical scheme which has been developed after analysing the heat transfer mechanisms in the regenerator bed. The new finite difference scheme optimally com...... to the fully implicit scheme, the proposed scheme achieves more accurate results, prevents numerical errors and requires less computational effort. In AMR simulations the new scheme can reduce the computational time by 88%....
DEFF Research Database (Denmark)
Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela
2013-01-01
of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...
Energy Technology Data Exchange (ETDEWEB)
Willcock, J J; Lumsdaine, A; Quinlan, D J
2008-08-19
Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.
Evaluating statistical cloud schemes
Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix
2015-01-01
Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...
Gamma spectrometry; level schemes
International Nuclear Information System (INIS)
Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.
1977-01-01
The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr
International Nuclear Information System (INIS)
2002-04-01
This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)
Fragment separator momentum compression schemes
Energy Technology Data Exchange (ETDEWEB)
Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)
2011-07-21
We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.
Fragment separator momentum compression schemes
International Nuclear Information System (INIS)
Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.
2011-01-01
We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.
Fast multilevel radiative transfer
International Nuclear Information System (INIS)
Paletou, Frederic; Leger, Ludovick
2007-01-01
The vast majority of recent advances in the field of numerical radiative transfer relies on approximate operator methods better known in astrophysics as Accelerated Lambda-Iteration (ALI). A superior class of iterative schemes, in term of rates of convergence, such as Gauss-Seidel and successive overrelaxation methods were therefore quite naturally introduced in the field of radiative transfer by Trujillo Bueno and Fabiani Bendicho [A novel iterative scheme for the very fast and accurate solution of non-LTE radiative transfer problems. Astrophys J 1995;455:646]; it was thoroughly described for the non-LTE two-level atom case. We describe hereafter in details how such methods can be generalized when dealing with non-LTE unpolarised radiation transfer with multilevel atomic models, in monodimensional geometry
Directory of Open Access Journals (Sweden)
J.-P. Vergnes
2012-10-01
Full Text Available Groundwater is a non-negligible component of the global hydrological cycle, and its interaction with overlying unsaturated zones can influence water and energy fluxes between the land surface and the atmosphere. Despite its importance, groundwater is not yet represented in most climate models. In this paper, the simple groundwater scheme implemented in the Total Runoff Integrating Pathways (TRIP river routing model is applied in off-line mode at global scale using a 0.5° model resolution. The simulated river discharges are evaluated against a large dataset of about 3500 gauging stations compiled from the Global Data Runoff Center (GRDC and other sources, while the terrestrial water storage (TWS variations derived from the Gravity Recovery and Climate Experiment (GRACE satellite mission help to evaluate the simulated TWS. The forcing fields (surface runoff and deep drainage come from an independent simulation of the Interactions between Soil-Biosphere-Atmosphere (ISBA land surface model covering the period from 1950 to 2008. Results show that groundwater improves the efficiency scores for about 70% of the gauging stations and deteriorates them for 15%. The simulated TWS are also in better agreement with the GRACE estimates. These results are mainly explained by the lag introduced by the low-frequency variations of groundwater, which tend to shift and smooth the simulated river discharges and TWS. A sensitivity study on the global precipitation forcing used in ISBA to produce the forcing fields is also proposed. It shows that the groundwater scheme is not influenced by the uncertainties in precipitation data.
Energy Technology Data Exchange (ETDEWEB)
Hayashi, K.; Endo, S. [Nishimatsu Construction Co. Ltd., Tokyo (Japan)
1998-01-01
Hongkong Route 3 construction under the BOT scheme (covering the basic plan, design, and construction, and the management of the completed tunnel as a private, toll facility) is described. The new route aims at dealing with aggravating traffic conditions as part of the major highway network joining Hongkong and Guanzhou, China proper. It is a dual three lane system, consisting of a 3.7km-long road tunnel, a 1.5km-long southern approach, and a 6.3km-long northern approach. Geologically speaking, the tunnel section as a whole is on a relatively hard and stable basement made of fine-grain granite and granitic diorite. Also introduced in this report are the project-executing organization and the flow of tendering under the BOT scheme. Since the shortening of the construction time is quite important in the 30-year BOT franchise period, rapid boring technologies were introduced into tunnel excavation. The 5.6m long-hole blasting enabled a maximum monthly progress of 460m. For the assurance of high boring accuracy and cycle time reduction, a fully automatic boring machine was adopted for speedy positioning and marking. An emulsion-type explosive was used, which can be pump-fed under pressure, for shortening the charging time. 5 figs.
Biosphere-Atmosphere Exchange of NOx and O3 in Central Amazon
Wiedemann, K. T.; Swofsy, S. C.; Munger, J. W.; Saleska, S. R.; Rizzo, L. V.; Silva Campos, K.
2017-12-01
The primary source of atmospheric OH is the photolysis of O3 in the presence of water vapor. NOx gases are the main precursors of O3 and OH. In NOx-rich environments that have both high humidity and high solar radiation, OH concentrations are enhanced, making tropical forests dominant in global oxidation of long lived gases. The Amazon rain forest has a unique combination of vegetation with diverse characteristics, climate, and a dynamic land use, factors that altogether govern the emission and fate of trace gases, particle formation and atmospheric chemistry. Understanding the interactions among the mechanisms that govern local precursor emissions will lead to a better description of the local atmospheric chemistry and its global impacts. As part of the GoAmazon project, an array of complementary measurements was conducted in a research site in central Amazon, near Santarem (PA, Brazil), inside the Tapajos National Forest. The research site is surrounded by intact rain forest in a 6km radius, and a 45m canopy. The 67m tower was assembled in the site in 2001 for flux measurements (CO2 and H2O). In mid 2014 additional instrumentation were added, measuring NOx, O3, CH4, and SO2 fluxes and profiles. The low concentrations of SO2 (up to 0.1ppb during the peak of the dry season), and a small vertical gradient, suggest the predominance of biogenic sources. O3 show no significant seasonality between the daytime and nighttime vertical profiles, but occasional nighttime high concentrations for levels below canopy were observed. Hourly ozone fluxes suggest a production of O3 under canopy. NO soil emissions are indicated by concentrations in the ppb range for lower profile levels, decreasing to a few hundreds ppt above the canopy, and emission rates of NO from Amazonian soils may be higher than expected from earlier measurements. Daytime data indicate that not all of this NOx escapes to the atmosphere, however. Fluxes of NO average 133x109 molec cm-2 s-1, a factor of 4 higher than previously observed in white sand soils in the Amazon[1], and a factor of 3 to 14 higher than fluxes observed for yellow clay soils[2], while Fluxes of NO2 average 0.84x109 molec cm-2 s-1.[1] Kaplan, W.A., Wofsy, S.C., Keller, M., and da Costa, J.M. J of Geophys Res, Vol 93, D2, 1389, 1988. [2] Bakwin, P.S., Wofsy, S.C., and Fan, S.M. J. of Geophys Res, Vol 95, D10, 16765, 1990.
Biosphere-Atmosphere Exchange of NOx, CH4, and O3 in Central Amazon
Wiedemann, K. T.; Munger, J. W.; Wofsy, S. C.; Budney, J.; Rizzo, L. V.; Campos, K.; Rocha, H.; Freitas, H.
2016-12-01
Oxidation by OH is the dominant pathway for removing important trace gases such as CH4, CO, CH3Br, and HCFCs. The primary source of atmospheric OH is the photolysis of O3 in the presence of water vapor, and NOx are the main precursors of O3 and OH. Thus, in NOx-rich environments that have both high humidity and high solar radiation, OH concentrations are enhanced, and therefore, tropical forests dominate global oxidation of long-lived gases. The Amazon rain forest has a unique combination of vegetation with diverse characteristics, climate, and a dynamic land use, factors that altogether govern the emission and fate of trace-gases and control particle formation and atmospheric chemistry. Understanding the interactions among the mechanisms that govern local precursor emissions will lead to a better description of the local atmospheric chemistry, which have global impacts. As part of the GoAmazon project, an array of complementary measurements was conducted in a research site in central Amazon, southeast of Santarem (PA, Brazil), situated inside the Tapajos National Forest. The site where the measurements were taken is surrounded by intact rain forest in a 6 km radius, and a 45 m closed canopy. In the east side out of this radius (upwind), some settlements are distributed in a stripe along a road, which were cleared for agriculture and are sparsely populated. The 67 m tower was assembled in the site in 2001 for flux measurements (CO2 and H2O), and included CO in order to assess local and regional biomass burning. In mid 2014 additional instrumentation were added, measuring NOx, O3, CH4, and SO2 fluxes and profiles. The SO2 measurements (until early 2015) showed concentrations up to 0.1 ppb during the peak of the dry season, and a small vertical gradient, suggesting the predominance of biogenic sources. Preliminary results show no significant seasonality in the daytime and nighttime O3 vertical profiles. Occasionally, nighttime profiles showed high concentrations for levels below canopy, even near the ground. It is possibly caused by the breaking of nocturnal atmospheric stability, causing the concentrations of O3 to increase significantly in all profile levels. NO soil emissions are indicated by concentrations in the ppb range for lower profile levels, and concentrations decreasing to a few hundreds ppt above the canopy.
Monitoring and modelling of biosphere/atmosphere exchange of gases and aerosols in Europe
Energy Technology Data Exchange (ETDEWEB)
Erisman, Jan Willem [Energy Research Centre of the Netherlands (ECN), P.O. Box 1, 1755 ZG Petten (Netherlands)]. E-mail: erisman@ecn.nl; Vermeulen, Alex [Energy Research Centre of the Netherlands (ECN), P.O. Box 1, 1755 ZG Petten (Netherlands); Hensen, Arjan [Energy Research Centre of the Netherlands (ECN), P.O. Box 1, 1755 ZG Petten (Netherlands); Flechard, Chris [Energy Research Centre of the Netherlands (ECN), P.O. Box 1, 1755 ZG Petten (Netherlands); Daemmgen, Ulrich [Federal Agricultural Research Centre, Institute of Agroecology, D-38116 Braunschweig, (Germany); Fowler, David [CEH, Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Sutton, Mark [CEH, Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Gruenhage, Ludger [Institute for Plant Ecology, Justus-Liebig-University, D-35392 Giessen (Germany); Tuovinen, Juha-Pekka [Finnish Meteorological Institute, FIN-00810 Helsinki (Finland)
2005-02-01
Monitoring and modelling of deposition of air pollutants is essential to develop and evaluate policies to abate the effects related to air pollution and to determine the losses of pollutants from the atmosphere. Techniques for monitoring wet deposition fluxes are widely applied. A recent intercomparison experiment, however, showed that the uncertainty in wet deposition is relatively high, up to 40%, apart from the fact that most samplers are biased because of a dry deposition contribution. Wet deposition amounts to about 80% of the total deposition in Europe with a range of 10-90% and uncertainty should therefore be decreased. During recent years the monitoring of dry deposition has become possible. Three sites have been operational for 5 years. The data are useful for model development, but also for model evaluation and monitoring of progress in policy. Data show a decline in SO{sub 2} dry deposition, whereas nitrogen deposition remained constant. Furthermore, surface affinities for pollutants changed leading to changes in deposition. Deposition models have been further developed and tested with dry deposition measurements and total deposition measurements on forests as derived from throughfall data. The comparison is reasonable given the measurement uncertainties. Progress in ozone surface exchange modelling and monitoring shows that stomatal uptake can be quantified with reasonable accuracy, but external surface uptake yields highest uncertainty. - Monitoring and modelling of the deposition of sulphur and nitrogen components and the exposure of ozone has gained much progress through the research within BIATEX.
DEFF Research Database (Denmark)
Kjær, Poul F.
2018-01-01
Departing from the paradox that globalisation has implied an increase, rather than a decrease, in contextual diversity, this paper re-assesses the function, normative purpose and location of Regulatory Governance Frameworks in world society. Drawing on insights from sociology of law and world...... society studies, the argument advanced is that Regulatory Governance Frameworks are oriented towards facilitating transfers of condensed social components, such as economic capital and products, legal acts, political decisions and scientific knowledge, from one legally-constituted normative order, i.......e. contextual setting, to another. Against this background, it is suggested that Regulatory Governance Frameworks can be understood as schemes which act as ‘rites of passage’ aimed at providing legal stabilisation to social processes characterised by liminality, i.e ambiguity, hybridity and in-betweenness....
Towards Symbolic Encryption Schemes
DEFF Research Database (Denmark)
Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik
2012-01-01
, namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....
Energy Technology Data Exchange (ETDEWEB)
Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.
2014-07-25
This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.
New analytic unitarization schemes
International Nuclear Information System (INIS)
Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.
2009-01-01
We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.
Indian Academy of Sciences (India)
Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...
Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.
2012-01-01
Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free
Alternative reprocessing schemes evaluation
International Nuclear Information System (INIS)
1979-02-01
This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented
Introduction to association schemes
Seidel, J.J.
1991-01-01
The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs
Reaction schemes of immunoanalysis
International Nuclear Information System (INIS)
Delaage, M.; Barbet, J.
1991-01-01
The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr
Alternative health insurance schemes
DEFF Research Database (Denmark)
Keiding, Hans; Hansen, Bodil O.
2002-01-01
In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...
Fast multilevel radiative transfer
Paletou, Frédéric; Léger, Ludovick
2007-01-01
The vast majority of recent advances in the field of numerical radiative transfer relies on approximate operator methods better known in astrophysics as Accelerated Lambda-Iteration (ALI). A superior class of iterative schemes, in term of rates of convergence, such as Gauss-Seidel and Successive Overrelaxation methods were therefore quite naturally introduced in the field of radiative transfer by Trujillo Bueno & Fabiani Bendicho (1995); it was thoroughly described for the non-LTE two-level atom case. We describe hereafter in details how such methods can be generalized when dealing with non-LTE unpolarised radiation transfer with multilevel atomic models, in monodimensional geometry.
International Nuclear Information System (INIS)
Li Bingxi; Kudo, Kazuhiko
2001-05-01
A quantitative evaluation of a radiative heat transfer is important in sodium combustion because a large amount of aerosol particles, which are produced as a result of the combustion, exists in a combustion region. In this study, a development of radiation model with aerosols and optical property measurement has been carried out for the purpose of evaluating radiative heat transfer based on a optical property, diameter, number density and statistical and spatial distribution of aerosol particles. In 2000 research, one dimensional analysis program of the Monte Carlo method has been developed. This program evaluates a radiative transmission intensity based on an optical property and a statistic and spatial diameter distribution of airborne particles. Using this program, an optical property can be estimated from experimental conditions (e.g. diameter distribution) and results (radiative transmission intensity). As a result of numerical analyses which evaluate an influence of a size parameter (relation between a particle diameter [D] and wavelength [λ] :=πD/λ) on the accuracy evaluation, an optical property can be estimated within 3% accuracy though an angle distribution measurement of radiative transmission intensity is necessary when the size parameter becomes large. (author)
On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
Directory of Open Access Journals (Sweden)
Wang Daoshun
2010-01-01
Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.
Selectively strippable paint schemes
Stein, R.; Thumm, D.; Blackford, Roger W.
1993-03-01
In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.
Scalable Nonlinear Compact Schemes
Energy Technology Data Exchange (ETDEWEB)
Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)
2014-04-01
In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.
Transfer maps and projection formulas
Tabuada, Goncalo
2010-01-01
Transfer maps and projection formulas are undoubtedly one of the key tools in the development and computation of (co)homology theories. In this note we develop an unified treatment of transfer maps and projection formulas in the non-commutative setting of dg categories. As an application, we obtain transfer maps and projection formulas in algebraic K-theory, cyclic homology, topological cyclic homology, and other scheme invariants.
TRANSFERENCE BEFORE TRANSFERENCE.
Bonaminio, Vincenzo
2017-10-01
This paper is predominantly a clinical presentation that describes the transmigration of one patient's transference to another, with the analyst functioning as a sort of transponder. It involves an apparently accidental episode in which there was an unconscious intersection between two patients. The author's aim is to show how transference from one case may affect transference in another, a phenomenon the author calls transference before transference. The author believes that this idea may serve as a tool for understanding the unconscious work that takes place in the clinical situation. In a clinical example, the analyst finds himself caught up in an enactment involving two patients in which he becomes the medium of what happens in session. © 2017 The Psychoanalytic Quarterly, Inc.
Mukherjee, Saradiya; Singh, Aditya
2018-02-05
One of the constraints in the utilisation of maternal healthcare in India is the out-of-pocket expenditure. To improve the utilisation and to reduce the out-of-pocket expenditure, India launched a cash incentive scheme, Janani Suraksha Yojana (JSY), which provides monetary incentive to the mothers delivering in public facility. However, no study has yet examined the extent to which the JSY payments reduce the maternal healthcare induced catastrophic out-of-pocket expenditure burden of the households. This paper therefore attempts to examine the extent to which the JSY reduces the catastrophic expenditure estimate household expenditure on maternity, i.e. , all direct and indirect expenditure. The study used data on 396 mothers collected through a primary survey conducted in the rural areas of the Varanasi district of Uttar Pradesh state in 2013-2014. The degree and variation in the catastrophic impact of households' maternity spending was computed as share of out-of-pocket payment in total household income in relation to specific thresholds, across socioeconomic categories. Logistic regression was used to understand the determinants of catastrophic expenditure and whether the JSY has any role in influencing the expenditure pattern. Results revealed that the JSY beneficiaries on an average spent about 8.3% of their Annual Household Consumption Expenditure on maternity care. The JSY reimbursement could reduce this share only by 2.1%. The study found that the expenditure on antenatal and postnatal care made up a significant part of the direct medical expenditure on maternity among the JSY beneficiaries. The indirect or non-medical expenditure was about four times higher than the direct expenditure on maternity services. The out-of-pocket expenditure across income quintiles was found to be regressive i.e. the poor paid a greater proportion of their income towards maternity care than the rich. Results also showed that the JSY reimbursement helped only about 8% households
Yasas, F M
1977-01-01
In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.
Bonus schemes and trading activity
Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.
2014-01-01
Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of
DEFF Research Database (Denmark)
Juhl, Hans Jørn; Stacey, Julia
2001-01-01
. In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...
International Nuclear Information System (INIS)
Grashilin, V.A.; Karyshev, Yu.Ya.
1982-01-01
A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given
Comparative evaluation of remote maintenance schemes for fusion DEMO reactor
Energy Technology Data Exchange (ETDEWEB)
Utoh, Hiroyasu, E-mail: uto.hiroyasu@jaea.go.jp; Tobita, Kenji; Someya, Youji; Asakura, Nobuyuki; Sakamoto, Yoshiteru; Hoshino, Kazuo; Nakamura, Makoto
2015-10-15
Highlights: • Various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. • The banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme. • The key engineering issues are in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability. - Abstract: Maintenance schemes are one of the critical issues in DEMO design, significantly affecting the configuration of in-vessel components, the size of toroidal field (TF) coil, the arrangement of poloidal field (PF) coils, reactor building, hot cell and so forth. Therefore, the maintenance schemes should satisfy many design requirements and criteria to assure reliable and safe plant operation and to attain reasonable plant availability. The plant availability depends on reliability of remote maintenance scheme, inspection of pipe connection and plasma operation. In this paper, various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. From the view points of the reliability of inspection on hot cell, TF coil size, stored energy of PF coil and portability of segment, the banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme, and it has key engineering issues such as in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability.
Comparative evaluation of remote maintenance schemes for fusion DEMO reactor
International Nuclear Information System (INIS)
Utoh, Hiroyasu; Tobita, Kenji; Someya, Youji; Asakura, Nobuyuki; Sakamoto, Yoshiteru; Hoshino, Kazuo; Nakamura, Makoto
2015-01-01
Highlights: • Various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. • The banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme. • The key engineering issues are in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability. - Abstract: Maintenance schemes are one of the critical issues in DEMO design, significantly affecting the configuration of in-vessel components, the size of toroidal field (TF) coil, the arrangement of poloidal field (PF) coils, reactor building, hot cell and so forth. Therefore, the maintenance schemes should satisfy many design requirements and criteria to assure reliable and safe plant operation and to attain reasonable plant availability. The plant availability depends on reliability of remote maintenance scheme, inspection of pipe connection and plasma operation. In this paper, various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. From the view points of the reliability of inspection on hot cell, TF coil size, stored energy of PF coil and portability of segment, the banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme, and it has key engineering issues such as in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability.
Packet reversed packet combining scheme
International Nuclear Information System (INIS)
Bhunia, C.T.
2006-07-01
The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)
International Nuclear Information System (INIS)
Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu
2014-01-01
We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)
Electricity storage using a thermal storage scheme
Energy Technology Data Exchange (ETDEWEB)
White, Alexander, E-mail: ajw36@cam.ac.uk [Hopkinson Laboratory, Cambridge University Engineering Department, Trumpington Street, Cambridge. CB2 1PZ (United Kingdom)
2015-01-22
The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on “sensible heat” storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.
A Hybrid Data Compression Scheme for Improved VNC
Xiaozheng (Jane) Zhang; Hirofumi Takahashi
2007-01-01
Virtual Network Computing (VNC) has emerged as a promising technology in distributed computing environment since its invention in the late nineties. Successful application of VNC requires rapid data transfer from one machine to another over a TCP/IP network connection. However transfer of screen data consumes much network bandwidth and current data encoding schemes for VNC are far from being ideal. This paper seeks to improve screen data compression techniques to enable VNC over slow connecti...
Modified Aggressive Packet Combining Scheme
International Nuclear Information System (INIS)
Bhunia, C.T.
2010-06-01
In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)
Transmission usage cost allocation schemes
International Nuclear Information System (INIS)
Abou El Ela, A.A.; El-Sehiemy, R.A.
2009-01-01
This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)
An introduction to the UNCLE finite element scheme
International Nuclear Information System (INIS)
Enderby, J.A.
1983-01-01
UNCLE is a completely general finite element scheme which provides common input, output, equation-solving and other facilities for a family of finite element codes for linear and non-linear stress analysis, heat transfer etc. This report describes the concepts on which UNCLE is based and gives a general account of the facilities provided. (author)
An introduction to the UNCLE finite element scheme
Energy Technology Data Exchange (ETDEWEB)
Enderby, J A [UK Atomic Energy Authority, Northern Division, Risley Nuclear Power Development Establishment, Risley, Warrington (United Kingdom)
1983-05-01
UNCLE is a completely general finite element scheme which provides common input, output, equation-solving and other facilities for a family of finite element codes for linear and non-linear stress analysis, heat transfer etc. This report describes the concepts on which UNCLE is based and gives a general account of the facilities provided. (author)
Dexter energy transfer pathways.
Skourtis, Spiros S; Liu, Chaoren; Antoniou, Panayiotis; Virshup, Aaron M; Beratan, David N
2016-07-19
Energy transfer with an associated spin change of the donor and acceptor, Dexter energy transfer, is critically important in solar energy harvesting assemblies, damage protection schemes of photobiology, and organometallic opto-electronic materials. Dexter transfer between chemically linked donors and acceptors is bridge mediated, presenting an enticing analogy with bridge-mediated electron and hole transfer. However, Dexter coupling pathways must convey both an electron and a hole from donor to acceptor, and this adds considerable richness to the mediation process. We dissect the bridge-mediated Dexter coupling mechanisms and formulate a theory for triplet energy transfer coupling pathways. Virtual donor-acceptor charge-transfer exciton intermediates dominate at shorter distances or higher tunneling energy gaps, whereas virtual intermediates with an electron and a hole both on the bridge (virtual bridge excitons) dominate for longer distances or lower energy gaps. The effects of virtual bridge excitons were neglected in earlier treatments. The two-particle pathway framework developed here shows how Dexter energy-transfer rates depend on donor, bridge, and acceptor energetics, as well as on orbital symmetry and quantum interference among pathways.
Coordinated renewable energy support schemes
DEFF Research Database (Denmark)
Morthorst, P.E.; Jensen, S.G.
2006-01-01
. The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...
CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...
African Journals Online (AJOL)
This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...
hybrid modulation scheme fo rid modulation scheme fo dulation
African Journals Online (AJOL)
eobe
control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.
Zhao, Wenjie; Peng, Yiran; Wang, Bin; Yi, Bingqi; Lin, Yanluan; Li, Jiangnan
2018-05-01
A newly implemented Baum-Yang scheme for simulating ice cloud optical properties is compared with existing schemes (Mitchell and Fu schemes) in a standalone radiative transfer model and in the global climate model (GCM) Community Atmospheric Model Version 5 (CAM5). This study systematically analyzes the effect of different ice cloud optical schemes on global radiation and climate by a series of simulations with a simplified standalone radiative transfer model, atmospheric GCM CAM5, and a comprehensive coupled climate model. Results from the standalone radiative model show that Baum-Yang scheme yields generally weaker effects of ice cloud on temperature profiles both in shortwave and longwave spectrum. CAM5 simulations indicate that Baum-Yang scheme in place of Mitchell/Fu scheme tends to cool the upper atmosphere and strengthen the thermodynamic instability in low- and mid-latitudes, which could intensify the Hadley circulation and dehydrate the subtropics. When CAM5 is coupled with a slab ocean model to include simplified air-sea interaction, reduced downward longwave flux to surface in Baum-Yang scheme mitigates ice-albedo feedback in the Arctic as well as water vapor and cloud feedbacks in low- and mid-latitudes, resulting in an overall temperature decrease by 3.0/1.4 °C globally compared with Mitchell/Fu schemes. Radiative effect and climate feedback of the three ice cloud optical schemes documented in this study can be referred for future improvements on ice cloud simulation in CAM5.
Non-interactive and Reusable Non-malleable Commitment Schemes
DEFF Research Database (Denmark)
Damgård, Ivan Bjerre; Groth, Jens
2003-01-01
version based on the strong RSA assumption. For UC commitments, we show that existence of a UC commitment scheme in the CRS model (interactive or not) implies key exchange and - for a uniform reference string - even implies oblivious transfer. This indicates that UC commitment is a strictly stronger...... primitive than NM. Finally, we show that our strong RSA based construction can be used to improve the most efficient known UC commitment scheme so it can work with a CRS of size independent of the number of players, without loss of efficiency....
BOT schemes as financial model of hydro power projects
International Nuclear Information System (INIS)
Grausam, A.
1997-01-01
Build-operate-transfer (BOT) schemes are the latest methods adopted in the developing infrastructure projects. This paper outlines the project financing through BOT schemes and briefly focuses on the factors particularly relevant to hydro power projects. Hydro power development provides not only the best way to produce electricity, it can also solve problems in different fields, such as navigation problems in case of run-of-the river plants, ground water management systems and flood control etc. This makes HPP projects not cheaper, but hydro energy is a clean and renewable energy and the hydro potential worldwide will play a major role to meet the increased demand in future. 5 figs
Good governance for pension schemes
Thornton, Paul
2011-01-01
Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.
Optimum RA reactor fuelling scheme
International Nuclear Information System (INIS)
Strugar, P.; Nikolic, V.
1965-10-01
Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr
A Novel Iris Segmentation Scheme
Directory of Open Access Journals (Sweden)
Chen-Chung Liu
2014-01-01
Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.
Numerical schemes for explosion hazards
International Nuclear Information System (INIS)
Therme, Nicolas
2015-01-01
In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called
Breeding schemes in reindeer husbandry
Directory of Open Access Journals (Sweden)
Lars Rönnegård
2003-04-01
Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.
Energy technology transfer to developing countries
International Nuclear Information System (INIS)
Butera, F.; Farinelli, U.
1992-01-01
With the use of critical analyses of some examples of technology transfer by industrialized to third world countries, this paper illustrates the importance, in technology transfer, of giving due consideration to the specific social and marketing contexts of the targeted developing country and its physical and financial capability to acquire all the technology necessary to make the total realization of a desired industrial scheme feasible from the economic, technical and social points of view. It also indicates that the most effective transfers are those in which efforts are made to optimize local work force learning levels, process scheme efficiency and cost through the careful integration of innovative with conventional technologies
Methods of Dust Air Flows Reduction at Ore Transfer Facilities of Mining and Processing Plants
Directory of Open Access Journals (Sweden)
Gulmira K. Saparova
2013-01-01
Full Text Available The article describes the most typical schemes of ore stationary transfers. Aspirate units, depending on dust intensity are divided into three groups. Typical schemes of stationary transfers were presented. On the ground of the research, the classification of ore transfer facilities types at mining and processing plants was offered
Indian Academy of Sciences (India)
First page Back Continue Last page Overview Graphics. Heat transfer. Heat conduction in solid slab. Convective heat transfer. Non-linear temperature. variation due to flow. HEAT FLUX AT SURFACE. conduction/diffusion.
International Nuclear Information System (INIS)
Saad, M.A.
1985-01-01
Heat transfer takes place between material systems as a result of a temperature difference. The transmission process involves energy conversions governed by the first and second laws of thermodynamics. The heat transfer proceeds from a high-temperature region to a low-temperature region, and because of the finite thermal potential, there is an increase in entropy. Thermodynamics, however, is concerned with equilibrium states, which includes thermal equilibrium, irrespective of the time necessary to attain these equilibrium states. But heat transfer is a result of thermal nonequilibrium conditions, therefore, the laws of thermodynamics alone cannot describe completely the heat transfer process. In practice, most engineering problems are concerned with the rate of heat transfer rather than the quantity of heat being transferred. Resort then is directed to the particular laws governing the transfer of heat. There are three distinct modes of heat transfer: conduction, convection, and radiation. Although these modes are discussed separately, all three types may occur simultaneously
DEFF Research Database (Denmark)
Nielsen, Søren Bo
2014-01-01
Against a background of rather mixed evidence about transfer pricing practices in multinational enterprises (MNEs) and varying attitudes on the part of tax authorities, this paper explores how multiple aims in transfer pricing can be pursued across four different transfer pricing regimes. A MNE h...
A perturbational h4 exponential finite difference scheme for the convective diffusion equation
International Nuclear Information System (INIS)
Chen, G.Q.; Gao, Z.; Yang, Z.F.
1993-01-01
A perturbational h 4 compact exponential finite difference scheme with diagonally dominant coefficient matrix and upwind effect is developed for the convective diffusion equation. Perturbations of second order are exerted on the convective coefficients and source term of an h 2 exponential finite difference scheme proposed in this paper based on a transformation to eliminate the upwind effect of the convective diffusion equation. Four numerical examples including one- to three-dimensional model equations of fluid flow and a problem of natural convective heat transfer are given to illustrate the excellent behavior of the present exponential schemes. Besides, the h 4 accuracy of the perturbational scheme is verified using double precision arithmetic
Technology transfer and innovation
International Nuclear Information System (INIS)
Ashworth, Graham; Thornton, Anna
1987-01-01
The aims of the conference were advice, assistance and action for all those with technology to licence or inventions to patent, and for people seeking financial help and advice. There was a free exchange of ideas and information. Of the forty or so papers collected together, many are concerned with the financial aspects of new ventures, others look at technology transfer from academic institutes and schemes which support technological problems. One paper on fast reactor collaboration in Europe, is indexed separately. (U.K.)
International Nuclear Information System (INIS)
Brodsky, Stanley J.
1998-01-01
Commensurate scale relations are perturbative QCD predictions which relate observable to observable at fixed relative scale, such as the ''generalized Crewther relation'', which connects the Bjorken and Gross-Llewellyn Smith deep inelastic scattering sum rules to measurements of the e + e - annihilation cross section. All non-conformal effects are absorbed by fixing the ratio of the respective momentum transfer and energy scales. In the case of fixed-point theories, commensurate scale relations relate both the ratio of couplings and the ratio of scales as the fixed point is approached. The relations between the observables are independent of the choice of intermediate renormalization scheme or other theoretical conventions. Commensurate scale relations also provide an extension of the standard minimal subtraction scheme, which is analytic in the quark masses, has non-ambiguous scale-setting properties, and inherits the physical properties of the effective charge α V (Q 2 ) defined from the heavy quark potential. The application of the analytic scheme to the calculation of quark-mass-dependent QCD corrections to the Z width is also reviewed
Multiuser switched diversity scheduling schemes
Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim
2012-01-01
Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.
Nonlinear secret image sharing scheme.
Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young
2014-01-01
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.
Multiuser switched diversity scheduling schemes
Shaqfeh, Mohammad
2012-09-01
Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.
A Hybrid Data Compression Scheme for Improved VNC
Directory of Open Access Journals (Sweden)
Xiaozheng (Jane Zhang
2007-04-01
Full Text Available Virtual Network Computing (VNC has emerged as a promising technology in distributed computing environment since its invention in the late nineties. Successful application of VNC requires rapid data transfer from one machine to another over a TCP/IP network connection. However transfer of screen data consumes much network bandwidth and current data encoding schemes for VNC are far from being ideal. This paper seeks to improve screen data compression techniques to enable VNC over slow connections and present a reasonable speed and image quality. In this paper, a hybrid technique is proposed for improving coding efficiency. The algorithm first divides a screen image into pre-defined regions and applies encoding schemes to each area according to the region characteristics. Second, correlation of screen data in consecutive frames is exploited where multiple occurrences of similar image contents are detected. The improved results are demonstrated in a dynamic environment with various screen image types and desktop manipulation.
Electrical Injection Schemes for Nanolasers
DEFF Research Database (Denmark)
Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten
2014-01-01
Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....
Signal multiplexing scheme for LINAC
International Nuclear Information System (INIS)
Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra
2004-01-01
For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)
Capacity-achieving CPM schemes
Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido
2008-01-01
The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...
International Nuclear Information System (INIS)
Ardisson, Claire; Ardisson, Gerard.
1976-01-01
A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr
Homogenization scheme for acoustic metamaterials
Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping
2014-01-01
the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost
Homogenization scheme for acoustic metamaterials
Yang, Min
2014-02-26
We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.
New practicable Siberian Snake schemes
International Nuclear Information System (INIS)
Steffen, K.
1983-07-01
Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)
Nonlinear Secret Image Sharing Scheme
Directory of Open Access Journals (Sweden)
Sang-Ho Shin
2014-01-01
efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2m bit-per-pixel (bpp, respectively.
DEFF Research Database (Denmark)
Rohde, Carsten; Rossing, Christian Plesner
trade internally as the units have to decide what prices should be paid for such inter-unit transfers. One important challenge is to uncover the consequences that different transfer prices have on the willingness in the organizational units to coordinate activities and trade internally. At the same time...... the determination of transfer price will affect the size of the profit or loss in the organizational units and thus have an impact on the evaluation of managers‟ performance. In some instances the determination of transfer prices may lead to a disagreement between coordination of the organizational units...
SiB3 Modeled Global 1-degree Hourly Biosphere-Atmosphere Carbon Flux, 1998-2006
National Aeronautics and Space Administration — The Simple Biosphere Model, Version 3 (SiB3) was used to produce a global data set of hourly carbon fluxes between the atmosphere and the terrestrial biosphere for...
The micrometeorological flux measurement technique known as relaxed eddy accumulation (REA) holds promise as a powerful new tool for ecologists. The more popular eddy covariance (eddy correlation) technique requires the use of sensors that can respond at fast rates (10 Hz), and t...
Support Schemes and Ownership Structures
DEFF Research Database (Denmark)
Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana
, Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...
[PICS: pharmaceutical inspection cooperation scheme].
Morénas, J
2009-01-01
The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.
Project financing renewable energy schemes
International Nuclear Information System (INIS)
Brandler, A.
1993-01-01
The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)
Network Regulation and Support Schemes
DEFF Research Database (Denmark)
Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik
2009-01-01
-in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...
Distance labeling schemes for trees
DEFF Research Database (Denmark)
Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben
2016-01-01
We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...
Small-scale classification schemes
DEFF Research Database (Denmark)
Hertzum, Morten
2004-01-01
Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...
Stable radio frequency dissemination by simple hybrid frequency modulation scheme.
Yu, Longqiang; Wang, Rong; Lu, Lin; Zhu, Yong; Wu, Chuanxin; Zhang, Baofu; Wang, Peizhang
2014-09-15
In this Letter, we propose a fiber-based stable radio frequency transfer system by a hybrid frequency modulation scheme. Creatively, two radio frequency signals are combined and simultaneously transferred by only one laser diode. One frequency component is used to detect the phase fluctuation, and the other one is the derivative compensated signal providing a stable frequency for the remote end. A proper ratio of the frequencies of the components is well maintained by parameter m to avoid interference between them. Experimentally, a stable 200 MHz signal is transferred over 100 km optical fiber with the help of a 1 GHz detecting signal, and fractional instability of 2×10(-17) at 10(5) s is achieved.
"Transfer Shock" or "Transfer Ecstasy?"
Nickens, John M.
The alleged characteristic drop in grade point average (GPA) of transfer students and the subsequent rise in GPA was investigated in this study. No statistically significant difference was found in first term junior year GPA between junior college transfers and native Florida State University students after the variance accounted for by the…
Cambridge community Optometry Glaucoma Scheme.
Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R
2015-04-01
With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.
New schemes for particle accelerators
International Nuclear Information System (INIS)
Nishida, Y.
1985-01-01
In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here
Khlebnikov, Vitaly; Geades, Nicolas; Klomp, DWJ; Hoogduin, Hans; Gowland, Penny; Mougin, Olivier
PURPOSE: To compare two pulsed, volumetric chemical exchange saturation transfer (CEST) acquisition schemes: steady state (SS) and pseudosteady state (PS) for the same brain coverage, spatial/spectral resolution and scan time. METHODS: Both schemes were optimized for maximum sensitivity to amide
Chan, Carmen W. H.; Leung, Doris Y. P.; Lee, Diana T. F.; Chair, Sek Ying; Ip, Wan Yim; Sit, Janet W. H.
2018-01-01
Hong Kong has introduced a senior intake admission scheme which is similar to the US model of credit transfer from community college programmes to university bachelor programmes. The study aimed to assess the outcomes, in terms of generic capabilities, of introducing a senior intake articulation scheme to a bachelor of nursing curriculum in Hong…
A Memory Efficient Network Encryption Scheme
El-Fotouh, Mohamed Abo; Diepold, Klaus
In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.
An Arbitrated Quantum Signature Scheme without Entanglement*
International Nuclear Information System (INIS)
Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun
2017-01-01
Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)
197Au(d,3He)196Pt reaction and the supersymmetry scheme
International Nuclear Information System (INIS)
Vergnes, M.; Berrier-Ronsin, G.; Rotbard, G.; Vernotte, J.; Langevin- Joliot, H.; Gerlic, E.; Wiele, J. van de; Guillot, J.
1981-01-01
The 197 Au(d, 3 He) 196 Pt reaction has been studied at Esub(d) = 108 MeV. An important breakdown of the selection rules of the supersymmetry scheme is observed for the 2 2 + level. The generally strong excitation of the 2 2 + level by transfer reactions in the Pt region leads to question the validity of the supersymmetry scheme at least for this level
Money Laundering Detection Framework to Link the Disparate and Evolving Schemes
Murad Mehmet; Miguel Fuentes Buchholtz
2013-01-01
Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of...
Department of Homeland Security — ixed rail transit external system transfers for systems within the Continental United States, Alaska, Hawaii, the District of Columbia, and Puerto Rico. The modes of...
International Nuclear Information System (INIS)
1998-01-01
On the base of technological opportunities and of the environmental target of the various sectors of energy system this paper intend to conjugate the opportunity/objective with economic and social development through technology transfer and information dissemination [it
A literature survey on numerical heat transfer
Shih, T. M.
1982-12-01
Technical papers in the area of numerical heat transfer published from 1977 through 1981 are reviewed. The journals surveyed include: (1) ASME Journal of Heat Transfer, (2) International Journal of Heat and Mass Transfer, (3) AIAA Journal, (4) Numerical Heat Transfer, (5) Computers and Fluids, (6) International Journal for Numerical Methods in Engineering, (7) SIAM Journal of Numerical Analysis, and (8) Journal of Computational Physics. This survey excludes experimental work in heat transfer and numerical schemes that are not applied to equations governing heat transfer phenomena. The research work is categorized into the following areas: (A) conduction, (B) boundary-layer flows, (C) momentum and heat transfer in cavities, (D) turbulent flows, (E) convection around cylinders and spheres or within annuli, (F) numerical convective instability, (G) radiation, (H) combustion, (I) plumes, jets, and wakes, (J) heat transfer in porous media, (K) boiling, condensation, and two-phase flows, (L) developing and fully developed channel flows, (M) combined heat and mass transfer, (N) applications, (O) comparison and properties of numerical schemes, and (P) body-fitted coordinates and nonuniform grids.
Multilocus sequence typing scheme for the Mycobacterium abscessus complex.
Macheras, Edouard; Konjek, Julie; Roux, Anne-Laure; Thiberge, Jean-Michel; Bastian, Sylvaine; Leão, Sylvia Cardoso; Palaci, Moises; Sivadon-Tardy, Valérie; Gutierrez, Cristina; Richter, Elvira; Rüsch-Gerdes, Sabine; Pfyffer, Gaby E; Bodmer, Thomas; Jarlier, Vincent; Cambau, Emmanuelle; Brisse, Sylvain; Caro, Valérie; Rastogi, Nalin; Gaillard, Jean-Louis; Heym, Beate
2014-01-01
We developed a multilocus sequence typing (MLST) scheme for Mycobacterium abscessus sensu lato, based on the partial sequencing of seven housekeeping genes: argH, cya, glpK, gnd, murC, pta and purH. This scheme was used to characterize a collection of 227 isolates recovered between 1994 and 2010 in France, Germany, Switzerland and Brazil. We identified 100 different sequence types (STs), which were distributed into three groups on the tree obtained by concatenating the sequences of the seven housekeeping gene fragments (3576bp): the M. abscessus sensu stricto group (44 STs), the "M. massiliense" group (31 STs) and the "M. bolletii" group (25 STs). SplitTree analysis showed a degree of intergroup lateral transfers. There was also evidence of lateral transfer events involving rpoB. The most prevalent STs in our collection were ST1 (CC5; 20 isolates) and ST23 (CC3; 31 isolates). Both STs were found in Europe and Brazil, and the latter was implicated in a large post-surgical procedure outbreak in Brazil. Respiratory isolates from patients with cystic fibrosis belonged to a large variety of STs; however, ST2 was predominant in this group of patients. Our MLST scheme, publicly available at www.pasteur.fr/mlst, offers investigators a valuable typing tool for M. abscessus sensu lato in future epidemiological studies throughout the world. Copyright © 2013 Institut Pasteur. Published by Elsevier Masson SAS. All rights reserved.
Decoupling schemes for the SSC Collider
International Nuclear Information System (INIS)
Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.
1993-05-01
A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper
Renormalization scheme-invariant perturbation theory
International Nuclear Information System (INIS)
Dhar, A.
1983-01-01
A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)
Wireless Broadband Access and Accounting Schemes
Institute of Scientific and Technical Information of China (English)
无
2003-01-01
In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.
A user-driven treadmill control scheme for simulating overground locomotion.
Kim, Jonghyun; Stanley, Christopher J; Curatalo, Lindsey A; Park, Hyung-Soon
2012-01-01
Treadmill-based locomotor training should simulate overground walking as closely as possible for optimal skill transfer. The constant speed of a standard treadmill encourages automaticity rather than engagement and fails to simulate the variable speeds encountered during real-world walking. To address this limitation, this paper proposes a user-driven treadmill velocity control scheme that allows the user to experience natural fluctuations in walking velocity with minimal unwanted inertial force due to acceleration/deceleration of the treadmill belt. A smart estimation limiter in the scheme effectively attenuates the inertial force during velocity changes. The proposed scheme requires measurement of pelvic and swing foot motions, and is developed for a treadmill of typical belt length (1.5 m). The proposed scheme is quantitatively evaluated here with four healthy subjects by comparing it with the most advanced control scheme identified in the literature.
Tightly Secure Signatures From Lossy Identification Schemes
Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi
2015-01-01
International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...
Transitionless quantum driving based wireless power transfer
Paul, Koushik; Sarma, Amarendra K.
2017-01-01
Shortcut to adiabaticity (STA) techniques have the potential to drive a system beyond the adiabatic limits. Here, we present a robust and efficient method for wireless power transfer (WPT) between two coils based on the so-called transitionless quantum driving (TQD) algorithm. We show that it is possible to transfer power between the coils significantly fast compared to its adiabatic counterpart. The scheme is fairly robust against the variations in the coupling strength and the coupling dist...
Performance evaluation of time-delay control schemes for uninterruptible power supplies
DEFF Research Database (Denmark)
Loh, P.C; Tang, Y.; Blaabjerg, Frede
2008-01-01
a more powerful processor. Avoiding these added complexities, this paper presents and compares a number of time-delay control schemes for UPS control, where the main building blocks needed are readily available memory storages and simple transfer functions formulated with either no or at least one......-matching characteristic, the presented control schemes are expected to be more robust and less sensitive to implementation noises. In addition, the presented control schemes are deduced to have fast dynamic response, implying that the supplypsilas output voltage is virtually not influenced by any transient load...
Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme
Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook
1995-01-01
Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.
Optimal Sales Schemes for Network Goods
DEFF Research Database (Denmark)
Parakhonyak, Alexei; Vikander, Nick
consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...
THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES
African Journals Online (AJOL)
PUBLICATIONS1
ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.
Arbitrated quantum signature scheme with message recovery
International Nuclear Information System (INIS)
Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin
2004-01-01
Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission
A methodology for the transfer of probabilities between accident severity categories
International Nuclear Information System (INIS)
Whitlow, J.D.; Neuhauser, K.S.
1993-01-01
This paper will describe a methodology which has been developed to allow accident probabilities associated with one severity category scheme to be transferred to another severity category scheme, permitting some comparisons of different studies at the category level. In this methodology, the severity category schemes to be compared are mapped onto a common set of axes. The axes represent critical accident environments (e.g., impact, thermal, crush, puncture) and indicate the range of accident parameters from zero (no accident) to the most sever credible forces. The choice of critical accident environments for the axes depends on the package being transported and the mode of transportation. The accident probabilities associated with one scheme are then transferred to the other scheme. This transfer of category probabilities is based on the relationships of the critical accident parameters to probability of occurrence. The methodology can be employed to transfer any quantity between category schemes if the appropriate supporting information is available. (J.P.N.)
Network coding multiuser scheme for indoor visible light communications
Zhang, Jiankun; Dang, Anhong
2017-12-01
Visible light communication (VLC) is a unique alternative for indoor data transfer and developing beyond point-to-point. However, for realizing high-capacity networks, VLC is facing challenges including the constrained bandwidth of the optical access point and random occlusion. A network coding scheme for VLC (NC-VLC) is proposed, with increased throughput and system robustness. Based on the Lambertian illumination model, theoretical decoding failure probability of the multiuser NC-VLC system is derived, and the impact of the system parameters on the performance is analyzed. Experiments demonstrate the proposed scheme successfully in the indoor multiuser scenario. These results indicate that the NC-VLC system shows a good performance under the link loss and random occlusion.
Technology transfer - north/south
Energy Technology Data Exchange (ETDEWEB)
Ercan, Y [Gazi University, Ankara (Turkey). Faculty of Engineering and Architecture
1991-01-01
Technology transfer is needed to the developing countries in the fields of fuel, combustion equipment, and operations to maximise combustion efficiency and minimise the harmful emissions. Channels of technology transfer available include: direct foreign investment, joint ventures, patent and licence purchases, industrial co-operation and technical aid, importation of technical goods, and turn-key projects. Dependency on totally imported technology and equipment both in boilers and flue gas treatment systems, however, results in high investment costs and may limit extensive use of power plants based on coal. If technologies to improve the efficiencies and emission behaviour of coal utilizing facilities are transferred to developing countries, a business scheme mutually beneficial both to the developing countries and the coal producing countries can be reached, which will boost the industrialization of the developing countries. 11 refs., 3 figs., 1 tab.
Quantum Secure Communication Scheme with W State
International Nuclear Information System (INIS)
Wang Jian; Zhang Quan; Tang Chaojng
2007-01-01
We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.
Labeling schemes for bounded degree graphs
DEFF Research Database (Denmark)
Adjiashvili, David; Rotbart, Noy Galil
2014-01-01
We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...
Smith, Nanette R.
1995-01-01
The objective of this summer's work was to attempt to enhance Technology Application Group (TAG) ability to measure the outcomes of its efforts to transfer NASA technology. By reviewing existing literature, by explaining the economic principles involved in evaluating the economic impact of technology transfer, and by investigating the LaRC processes our William & Mary team has been able to lead this important discussion. In reviewing the existing literature, we identified many of the metrics that are currently being used in the area of technology transfer. Learning about the LaRC technology transfer processes and the metrics currently used to track the transfer process enabled us to compare other R&D facilities to LaRC. We discuss and diagram impacts of technology transfer in the short run and the long run. Significantly, it serves as the basis for analysis and provides guidance in thinking about what the measurement objectives ought to be. By focusing on the SBIR Program, valuable information regarding the strengths and weaknesses of this LaRC program are to be gained. A survey was developed to ask probing questions regarding SBIR contractors' experience with the program. Specifically we are interested in finding out whether the SBIR Program is accomplishing its mission, if the SBIR companies are providing the needed innovations specified by NASA and to what extent those innovations have led to commercial success. We also developed a survey to ask COTR's, who are NASA employees acting as technical advisors to the SBIR contractors, the same type of questions, evaluating the successes and problems with the SBIR Program as they see it. This survey was developed to be implemented interactively on computer. It is our hope that the statistical and econometric studies that can be done on the data collected from all of these sources will provide insight regarding the direction to take in developing systematic evaluations of programs like the SBIR Program so that they can
Quantum state transfer with untunable couplings
International Nuclear Information System (INIS)
Gagnebin, P. K.; Skinner, S. R.; Behrman, E. C.; Steck, J. E.
2007-01-01
We present a general scheme for implementing bidirectional quantum state transfer in a quantum swapping channel. Unlike many other schemes for quantum computation and communication, our method does not require qubit couplings to be switched on and off. The only control variable is the bias acting on individual qubits. We show how to derive the parameters of the system (fixed and variable) such that perfect state transfer can be achieved. Since these parameters vary linearly with the pulse width, our scheme allows flexibility in the time scales under which qubits evolve. Unlike quantum spin networks, our scheme allows the transmission of several quantum states at a time, requiring only a two qubit separation between quantum states. By pulsing the biases of several qubits at the same time, we show that only eight bias control lines are required to achieve state transfer along a channel of arbitrary length. Furthermore, when the information to be transferred is purely classical in nature, only three bias control lines are required, greatly simplifying the circuit complexity
Secure Dynamic access control scheme of PHR in cloud computing.
Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching
2012-12-01
With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access
International Nuclear Information System (INIS)
Boury, C.
1986-01-01
This paper emphasizes in the specific areas of design, engineering and component production. This paper presents what Framatome has to offer in these areas and its export oriented philosophy. Then, a typical example of this technology transfer philosophy is the collaboration with the South Korean firm, Korea Heavy Industries Corporation (KHIC) for the supply of KNU 9 and KNU 10 power stations
Electrical injection schemes for nanolasers
DEFF Research Database (Denmark)
Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten
2013-01-01
The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...
Scheme of thinking quantum systems
International Nuclear Information System (INIS)
Yukalov, V I; Sornette, D
2009-01-01
A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field
International Nuclear Information System (INIS)
Morch, Stein
2004-01-01
The article asserts that there could be an investment boom for wind, hydro and bio power in a common Norwegian-Swedish market scheme for green certificates. The Swedish authorities are ready, and the Norwegian government is preparing a report to the Norwegian Parliament. What are the ambitions of Norway, and will hydro power be included? A green certificate market common to more countries have never before been established and requires the solution of many challenging problems. In Sweden, certificate support is expected to promote primarily bioenergy, wind power and small-scale hydro power. In Norway there is an evident potential for wind power, and more hydro power can be developed if desired
Pomeranchuk conjecture and symmetry schemes
Energy Technology Data Exchange (ETDEWEB)
Galindo, A.; Morales, A.; Ruegg, H. [Junta de Energia Nuclear, Madrid (Spain); European Organization for Nuclear Research, Geneva (Switzerland); University of Geneva, Geneva (Switzerland)
1963-01-15
Pomeranchuk has conjectured that the cross-sections for charge-exchange processes vanish asymptotically as the energy tends to infinity. (By ''charge'' it is meant any internal quantum number, like electric charge, hypercharge, .. . ). It has been stated by several people that this conjecture implies equalities among the total cross-sections whenever any symmetry scheme is invoked for the strong interactions. But to our knowledge no explicit general proof of this statement has been given so far. We want to give this proof for any compact Lie group. We also prove, under certain assumptions, that the equality of the total cross-sections implies that s{sup -l} times the charge-exchange forward scattering absorptive amplitudes tend to zero as s -> ∞.
Matroids and quantum-secret-sharing schemes
International Nuclear Information System (INIS)
Sarvepalli, Pradeep; Raussendorf, Robert
2010-01-01
A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.
Mode-to-mode energy transfers in convective patterns
Indian Academy of Sciences (India)
Abstract. We investigate the energy transfer between various Fourier modes in a low- dimensional model for thermal convection. We have used the formalism of mode-to-mode energy transfer rate in our calculation. The evolution equations derived using this scheme is the same as those derived using the hydrodynamical ...
How can conceptual schemes change teaching?
Wickman, Per-Olof
2012-03-01
Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.
International Nuclear Information System (INIS)
Anon.
1977-01-01
Illustrated by the example of the FRG's nuclear energy exports, it is shown that the nuclear technology transfer leads to new dimensions of intergovernmental relations, which hold within themselves on account of multiple state-to-state, scientific, industrial and - last but not least - personal contacts the chance of far-reaching friendships between countries and people. If the chance is taken, this can also be seen as an important contribution towards maintaining the peace. (orig.) [de
Resonance ionization scheme development for europium
Energy Technology Data Exchange (ETDEWEB)
Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)
2017-11-15
Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.
Secure RAID Schemes for Distributed Storage
Huang, Wentao; Bruck, Jehoshua
2016-01-01
We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...
Pan, Daniel; Wilson, Karl A; Tan-Wilson, Anna
2017-01-01
The technique described here, transfer zymography, was developed to overcome two limitations of conventional zymography. When proteolytic enzymes are resolved by nonreducing SDS-PAGE into a polyacrylamide gel with copolymerized protein substrate, the presence of the protein substrate can result in anomalous, often slower, migration of the protease and an estimated mass higher than its actual mass. A further drawback is that the presence of a high background of substrate protein interferes with proteomic analysis of the protease band by excision, tryptic digestion, and LC-MS/MS analysis. In transfer zymography, the proteolytic enzymes are resolved by conventional nonreducing SDS-PAGE, without protein substrate in the gel. The proteins in the resolving gel are then electrophoretically transferred to a receiving gel that contains the protein substrate, by a process similar to western blotting. The receiving gel is then processed in a manner similar to conventional zymography. SDS is removed by Triton X-100 and incubated in conditions suitable for the proteolytic activity. After protein staining, followed by destaining, bands representing regions with active protease are visualized as clear bands in a darkly stained background. For proteomic analysis, electrophoresis is carried out simultaneously on a second resolving gel, and the bands corresponding to the clear regions in the receiving gel after zymogram development are excised for proteomic analysis.
A new access scheme in OFDMA systems
Institute of Scientific and Technical Information of China (English)
GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping
2006-01-01
This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.
A Spatial Domain Quantum Watermarking Scheme
International Nuclear Information System (INIS)
Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang
2016-01-01
This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)
Quantum signature scheme for known quantum messages
International Nuclear Information System (INIS)
Kim, Taewan; Lee, Hyang-Sook
2015-01-01
When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)
Children's schemes for anticipating the validity of nets for solids
Wright, Vince; Smith, Ken
2017-09-01
There is growing acknowledgement of the importance of spatial abilities to student achievement across a broad range of domains and disciplines. Nets are one way to connect three-dimensional shapes and their two-dimensional representations and are a common focus of geometry curricula. Thirty-four students at year 6 (upper primary school) were interviewed on two occasions about their anticipation of whether or not given nets for the cube- and square-based pyramid would fold to form the target solid. Vergnaud's ( Journal of Mathematical Behavior, 17(2), 167-181, 1998, Human Development, 52, 83-94, 2009) four characteristics of schemes were used as a theoretical lens to analyse the data. Successful schemes depended on the interaction of operational invariants, such as strategic choice of the base, rules for action, particularly rotation of shapes, and anticipations of composites of polygons in the net forming arrangements of faces in the solid. Inferences were rare. These data suggest that students need teacher support to make inferences, in order to create transferable schemes.
The Improvement on the Xinjiekou Subway Transfer Channel of Nanjing
Xu, X. D.; Zheng, C. J.
The subway, which is an effective way to alleviate the traffic congestion, has gradually been constructed in many cities. With the completion of the construction, the transfer station will become the factor that affects the efficiency of the whole transport network. Based on investigation and analysis of the present situation of the passenger flow, the essay will make a prediction with the multiple linear regression and put forward two kinds of transfer channel improvement schemes for xinjiekou transfer station.
DEFF Research Database (Denmark)
Kjær, Poul F.
to specific logics of temporalisation and spatial expansion of a diverse set of social processes in relation to, for example, the economy, politics, science and the mass media. On this background, the paper will more concretely develop a conceptual framework for classifying different contextual orders...... that the essential functional and normative purpose of regulatory governance is to facilitate, stabilise and justify the transfer of condensed social components (such as economic capital and products, political decisions, legal judgements, religious beliefs and scientific knowledge) from one social contexts...
Money Laundering Detection Framework to Link the Disparate and Evolving Schemes
Directory of Open Access Journals (Sweden)
Murad Mehmet
2013-09-01
Full Text Available Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing to detect money laundering. Our framework captures an ongoing single scheme as an event, and associations among such ongoing sequence of events to capture complex relationships among evolving money laundering schemes. The framework can detect associated multiple money laundering networks even in the absence of some evidence. We validated the accuracy of detecting evolving money laundering schemes using a multi-phases test methodology. Our test used data generated from real-life cases, and extrapolated to generate more data from real-life schemes generator that we implemented.
Anonymous Credential Schemes with Encrypted Attributes
Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.
2011-01-01
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted
Community healthcare financing scheme: findings among residents ...
African Journals Online (AJOL)
... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...
Improved Load Shedding Scheme considering Distributed Generation
DEFF Research Database (Denmark)
Das, Kaushik; Nitsas, Antonios; Altin, Müfit
2017-01-01
With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...
A generalized scheme for designing multistable continuous ...
Indian Academy of Sciences (India)
In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...
Consolidation of the health insurance scheme
Association du personnel
2009-01-01
In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).
A hierarchical classification scheme of psoriasis images
DEFF Research Database (Denmark)
Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær
2003-01-01
A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...
Privacy Preserving Mapping Schemes Supporting Comparison
Tang, Qiang
2010-01-01
To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >
Mixed ultrasoft/norm-conserved pseudopotential scheme
DEFF Research Database (Denmark)
Stokbro, Kurt
1996-01-01
A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...
International Nuclear Information System (INIS)
Gerber, G.B.
1993-01-01
The research project described here had the aim to obtain further information on the transfer of nuclides during pregnancy and lactation. The tests were carried out in mini-pigs and rats receiving unchanging doses of radionuclides with the food. The following findings were revealed for the elements examined: Fe, Se, Cs and Zn were characterized by very high transfer levels in the mother, infant and foetus. A substantial uptake by the mother alone was observed for Co, Ag and Mn. The uptake by the foetus and infant here was 1 to 10 times lower. A preferential concentration in certain tissues was seen for Sr and Tc; the thyroid levels of Tc were about equally high in mothers and infants, while Sr showed less accumulation in the maternal bone. The lanthanide group of substances (Ce, Eu and Gd as well as Y and Ru) were only taken up to a very limited extent. The uptake of the examined radionuclides (Fe, Co, Ag, Ce) with the food ingested was found here to be ten times greater in rats as compared to mini-pigs. This showed that great caution must be observed, if the behaviour of radionuclides in man is extrapolated from relevant data obtained in rodents. (orig./MG) [de
Labelling schemes: From a consumer perspective
DEFF Research Database (Denmark)
Juhl, Hans Jørn; Stacey, Julia
2000-01-01
Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...
Birkhoffian Symplectic Scheme for a Quantum System
International Nuclear Information System (INIS)
Su Hongling
2010-01-01
In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)
Autonomous droop scheme with reduced generation cost
DEFF Research Database (Denmark)
Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede
2013-01-01
Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....
International Nuclear Information System (INIS)
Bhunia, C.T.
2007-07-01
Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)
Analysis of central and upwind compact schemes
International Nuclear Information System (INIS)
Sengupta, T.K.; Ganeriwal, G.; De, S.
2003-01-01
Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property
Role of national centers of research and development in nuclear technology transfer
International Nuclear Information System (INIS)
Graf, J.-J.; Millies, Pierre.
1977-01-01
National Research Centers are shown to play a leading role in nuclear technology transfer, whatever may be the directing scheme of nuclear development in the country envisaged. The first act of the Center consists in training specialists in the various nuclear fields. It must ensure the transfer of technological knowledge towards industry (in metallurgy, mechanics, electronics) and other nuclear auxiliary techniques, together with the transfer towards administration (laws). A simplified scheme of nuclear development strategy based on the French scheme (the French Atomic Energy Commission (CEA) with its subsidiary Companies) is presented that is usable for developing countries [fr
Symmetric weak ternary quantum homomorphic encryption schemes
Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao
2016-03-01
Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.
Ponzi scheme diffusion in complex networks
Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue
2017-08-01
Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.
Optimal Face-Iris Multimodal Fusion Scheme
Directory of Open Access Journals (Sweden)
Omid Sharifi
2016-06-01
Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.
A Privacy Model for RFID Tag Ownership Transfer
Directory of Open Access Journals (Sweden)
Xingchun Yang
2017-01-01
Full Text Available The ownership of RFID tag is often transferred from one owner to another in its life cycle. To address the privacy problem caused by tag ownership transfer, we propose a tag privacy model which captures the adversary’s abilities to get secret information inside readers, to corrupt tags, to authenticate tags, and to observe tag ownership transfer processes. This model gives formal definitions for tag forward privacy and backward privacy and can be used to measure the privacy property of tag ownership transfer scheme. We also present a tag ownership transfer scheme, which is privacy-preserving under the proposed model and satisfies the other common security requirements, in addition to achieving better performance.
ULTRA-SHARP nonoscillatory convection schemes for high-speed steady multidimensional flow
Leonard, B. P.; Mokhtari, Simin
1990-01-01
For convection-dominated flows, classical second-order methods are notoriously oscillatory and often unstable. For this reason, many computational fluid dynamicists have adopted various forms of (inherently stable) first-order upwinding over the past few decades. Although it is now well known that first-order convection schemes suffer from serious inaccuracies attributable to artificial viscosity or numerical diffusion under high convection conditions, these methods continue to enjoy widespread popularity for numerical heat transfer calculations, apparently due to a perceived lack of viable high accuracy alternatives. But alternatives are available. For example, nonoscillatory methods used in gasdynamics, including currently popular TVD schemes, can be easily adapted to multidimensional incompressible flow and convective transport. This, in itself, would be a major advance for numerical convective heat transfer, for example. But, as is shown, second-order TVD schemes form only a small, overly restrictive, subclass of a much more universal, and extremely simple, nonoscillatory flux-limiting strategy which can be applied to convection schemes of arbitrarily high order accuracy, while requiring only a simple tridiagonal ADI line-solver, as used in the majority of general purpose iterative codes for incompressible flow and numerical heat transfer. The new universal limiter and associated solution procedures form the so-called ULTRA-SHARP alternative for high resolution nonoscillatory multidimensional steady state high speed convective modelling.
Multidimensional flux-limited advection schemes
International Nuclear Information System (INIS)
Thuburn, J.
1996-01-01
A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion
Finite-volume scheme for anisotropic diffusion
Energy Technology Data Exchange (ETDEWEB)
Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)
2016-02-01
In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.
Vector domain decomposition schemes for parabolic equations
Vabishchevich, P. N.
2017-09-01
A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.
The new WAGR data acquisition scheme
International Nuclear Information System (INIS)
Ellis, W.E.; Leng, J.H.; Smith, I.C.; Smith, M.R.
1976-06-01
The existing WAGR data acquisition equipment was inadequate to meet the requirements introduced by the installation of two additional experimental loops and was in any case due for replacement. A completely new scheme was planned and implemented based on mini-computers, which while preserving all the useful features of the old scheme provided additional flexibility and improved data display. Both the initial objectives of the design and the final implementation are discussed without introducing detailed descriptions of hardware or the programming techniques employed. Although the scheme solves a specific problem the general principles are more widely applicable and could readily be adapted to other data checking and display problems. (author)
Kinematic reversal schemes for the geomagnetic dipole.
Levy, E. H.
1972-01-01
Fluctuations in the distribution of cyclonic convective cells, in the earth's core, can reverse the sign of the geomagnetic field. Two kinematic reversal schemes are discussed. In the first scheme, a field maintained by cyclones concentrated at low latitude is reversed by a burst of cyclones at high latitude. Conversely, in the second scheme, a field maintained predominantly by cyclones in high latitudes is reversed by a fluctuation consisting of a burst of cyclonic convection at low latitude. The precise fluid motions which produce the geomagnetic field are not known. However, it appears that, whatever the details are, a fluctuation in the distribution of cyclonic cells over latitude can cause a geomagnetic reversal.
Autonomous Droop Scheme With Reduced Generation Cost
DEFF Research Database (Denmark)
Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng
2014-01-01
) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...
Cognitive radio networks dynamic resource allocation schemes
Wang, Shaowei
2014-01-01
This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off
Algebraic K-theory of generalized schemes
DEFF Research Database (Denmark)
Anevski, Stella Victoria Desiree
and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....
Research on Matrix-type Packet Loss Compensation Scheme for Wireless Video Transmission on Subway
Directory of Open Access Journals (Sweden)
Fan Qing-Wu
2017-01-01
Full Text Available As the mainstream wireless LAN technology, Wi-Fi can achieve fast data transfer. With the subway moving in a high speed, video data transmission between the metro and the ground is achieved through Wi-Fi technology. This paper aims at solving the Caton problem caused by switching packet loss in the process of playing real-time video on the train terminal, and proposes matrix-type packet loss compensation scheme. Finally, the feasibility of the scheme is verified by experiments.
A survey of Strong Convergent Schemes for the Simulation of ...
African Journals Online (AJOL)
We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...
Setting aside transactions from pyramid schemes as impeachable ...
African Journals Online (AJOL)
These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...
Betatron tune correction schemes in nuclotron
International Nuclear Information System (INIS)
Shchepunov, V.A.
1992-01-01
Algorithms of the betatron tune corrections in Nuclotron with sextupolar and octupolar magnets are considered. Second order effects caused by chromaticity correctors are taken into account and sextupolar compensation schemes are proposed to suppress them. 6 refs.; 1 tab
A Directed Signature Scheme and its Applications
Lal, Sunder; Kumar, Manoj
2004-01-01
This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.
ONU Power Saving Scheme for EPON System
Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki
PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.
Verifiable Secret Redistribution for Threshold Sharing Schemes
National Research Council Canada - National Science Library
Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M
2002-01-01
.... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...
Boson expansion theory in the seniority scheme
International Nuclear Information System (INIS)
Tamura, T.; Li, C.; Pedrocchi, V.G.
1985-01-01
A boson expansion formalism in the seniority scheme is presented and its relation with number-conserving quasiparticle calculations is elucidated. Accuracy and convergence are demonstrated numerically. A comparative discussion with other related approaches is given
Designing optimal sampling schemes for field visits
CSIR Research Space (South Africa)
Debba, Pravesh
2008-10-01
Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...
Secret Sharing Schemes and Advanced Encryption Standard
2015-09-01
25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption
Cost Comparison Among Provable Data Possession Schemes
2016-03-01
of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk
A Classification Scheme for Production System Processes
DEFF Research Database (Denmark)
Sørensen, Daniel Grud Hellerup; Brunø, Thomas Ditlev; Nielsen, Kjeld
2018-01-01
Manufacturing companies often have difficulties developing production platforms, partly due to the complexity of many production systems and difficulty determining which processes constitute a platform. Understanding production processes is an important step to identifying candidate processes...... for a production platform based on existing production systems. Reviewing a number of existing classifications and taxonomies, a consolidated classification scheme for processes in production of discrete products has been outlined. The classification scheme helps ensure consistency during mapping of existing...
A scheme for the hadron spectrum
International Nuclear Information System (INIS)
Hoyer, P.
1978-03-01
A theoretically self-consistent dual scheme is proposed for the hadron spectrum, which follows naturally from basic requirements and phenomenology. All resonance properties and couplings are calculable in terms of a limited number of input parameters. A first application to ππ→ππ explains the linear trajectory and small daughter couplings. The Zweig rule and the decoupling of baryonium from mesons are expected to be consequences of the scheme. (Auth.)
A Practical Voter-Verifiable Election Scheme.
Chaum, D; Ryan, PYA; Schneider, SA
2005-01-01
We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the vot...
Sellafield site (including Drigg) emergency scheme manual
International Nuclear Information System (INIS)
1987-02-01
This Emergency Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. This manual covers the general principles of the total emergency scheme and those detailed procedures which are not specific to any single department. (U.K.)
Signature scheme based on bilinear pairs
Tong, Rui Y.; Geng, Yong J.
2013-03-01
An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.
An Optimization Scheme for ProdMod
International Nuclear Information System (INIS)
Gregory, M.V.
1999-01-01
A general purpose dynamic optimization scheme has been devised in conjunction with the ProdMod simulator. The optimization scheme is suitable for the Savannah River Site (SRS) High Level Waste (HLW) complex operations, and able to handle different types of optimizations such as linear, nonlinear, etc. The optimization is performed in the stand-alone FORTRAN based optimization deliver, while the optimizer is interfaced with the ProdMod simulator for flow of information between the two
Employee-referral schemes and discrimination law
Connolly, M.
2015-01-01
Employee-referral schemes (‘introduce a friend’) are in common usage in recruitment. They carry a potential to discriminate by perpetuating an already unbalanced workforce (say, by gender and ethnicity). With this, or course, comes the risk of litigation and bad publicity as well as any inherent inefficiencies associated with discrimination. This article is threefold. First, it examines the present state of the law. Second, it is based on a survey of employers who use these schemes. Third, it...
Basis scheme of personnel training system
International Nuclear Information System (INIS)
Rerucha, F.; Odehnal, J.
1998-01-01
Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel
Navigators’ Behavior in Traffic Separation Schemes
Directory of Open Access Journals (Sweden)
Zbigniew Pietrzykowski
2015-03-01
Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.
Quantum state transfer and network engineering
Nikolopoulos, Georgios M
2013-01-01
Faithful communication is a necessary precondition for large-scale quantum information processing and networking, irrespective of the physical platform. Thus, the problems of quantum-state transfer and quantum-network engineering have attracted enormous interest over the last years, and constitute one of the most active areas of research in quantum information processing. The present volume introduces the reader to fundamental concepts and various aspects of this exciting research area, including links to other related areas and problems. The implementation of state-transfer schemes and the en
A Classification Scheme for Literary Characters
Directory of Open Access Journals (Sweden)
Matthew Berry
2017-10-01
Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.
Canonical, stable, general mapping using context schemes.
Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict
2015-11-15
Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
Cancelable remote quantum fingerprint templates protection scheme
International Nuclear Information System (INIS)
Liao Qin; Guo Ying; Huang Duan
2017-01-01
With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)
Efficient multiparty quantum-secret-sharing schemes
International Nuclear Information System (INIS)
Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei
2004-01-01
In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information
A hybrid convection scheme for use in non-hydrostatic numerical weather prediction models
Directory of Open Access Journals (Sweden)
Volker Kuell
2008-12-01
Full Text Available The correct representation of convection in numerical weather prediction (NWP models is essential for quantitative precipitation forecasts. Due to its small horizontal scale convection usually has to be parameterized, e.g. by mass flux convection schemes. Classical schemes originally developed for use in coarse grid NWP models assume zero net convective mass flux, because the whole circulation of a convective cell is confined to the local grid column and all convective mass fluxes cancel out. However, in contemporary NWP models with grid sizes of a few kilometers this assumption becomes questionable, because here convection is partially resolved on the grid. To overcome this conceptual problem we propose a hybrid mass flux convection scheme (HYMACS in which only the convective updrafts and downdrafts are parameterized. The generation of the larger scale environmental subsidence, which may cover several grid columns, is transferred to the grid scale equations. This means that the convection scheme now has to generate a net convective mass flux exerting a direct dynamical forcing to the grid scale model via pressure gradient forces. The hybrid convection scheme implemented into the COSMO model of Deutscher Wetterdienst (DWD is tested in an idealized simulation of a sea breeze circulation initiating convection in a realistic manner. The results are compared with analogous simulations with the classical Tiedtke and Kain-Fritsch convection schemes.
Heat transfer: Pittsburgh 1987
International Nuclear Information System (INIS)
Lyczkowski, R.W.
1987-01-01
This book contains papers divided among the following sections: Process Heat Transfer; Thermal Hydraulics and Phase Change Phenomena; Analysis of Multicomponent Multiphase Flow and Heat Transfer; Heat Transfer in Advanced Reactors; General Heat Transfer in Solar Energy; Numerical Simulation of Multiphase Flow and Heat Transfer; High Temperature Heat Transfer; Heat Transfer Aspects of Severe Reactor Accidents; Hazardous Waste On-Site Disposal; and General Papers
Information transfer via implicit encoding with delay time modulation in a time-delay system
Energy Technology Data Exchange (ETDEWEB)
Kye, Won-Ho, E-mail: whkye@kipo.go.kr [Korean Intellectual Property Office, Government Complex Daejeon Building 4, 189, Cheongsa-ro, Seo-gu, Daejeon 302-701 (Korea, Republic of)
2012-08-20
A new encoding scheme for information transfer with modulated delay time in a time-delay system is proposed. In the scheme, the message is implicitly encoded into the modulated delay time. The information transfer rate as a function of encoding redundancy in various noise scales is presented and it is analyzed that the implicit encoding scheme (IES) has stronger resistance against channel noise than the explicit encoding scheme (EES). In addition, its advantages in terms of secure communication and feasible applications are discussed. -- Highlights: ► We propose new encoding scheme with delay time modulation. ► The message is implicitly encoded with modulated delay time. ► The proposed scheme shows stronger resistance against channel noise.
Proper use of colour schemes for image data visualization
Vozenilek, Vit; Vondrakova, Alena
2018-04-01
With the development of information and communication technologies, new technologies are leading to an exponential increase in the volume and types of data available. At this time of the information society, data is one of the most important arguments for policy making, crisis management, research and education, and many other fields. An essential task for experts is to share high-quality data providing the right information at the right time. Designing of data presentation can largely influence the user perception and the cognitive aspects of data interpretation. Significant amounts of data can be visualised in some way. One image can thus replace a considerable number of numeric tables and texts. The paper focuses on the accurate visualisation of data from the point of view of used colour schemes. Bad choose of colours can easily confuse the user and lead to the data misinterpretation. On the contrary, correctly created visualisations can make information transfer much simpler and more efficient.
Fast and efficient wireless power transfer via transitionless quantum driving.
Paul, Koushik; Sarma, Amarendra K
2018-03-07
Shortcut to adiabaticity (STA) techniques have the potential to drive a system beyond the adiabatic limits. Here, we present a robust and efficient method for wireless power transfer (WPT) between two coils based on the so-called transitionless quantum driving (TQD) algorithm. We show that it is possible to transfer power between the coils significantly fast compared to its adiabatic counterpart. The scheme is fairly robust against the variations in the coupling strength and the coupling distance between the coils. Also, the scheme is found to be reasonably immune to intrinsic losses in the coils.
Improving a Spectral Bin Microphysical Scheme Using TRMM Satellite Observations
Li, Xiaowen; Tao, Wei-Kuo; Matsui, Toshihisa; Liu, Chuntao; Masunaga, Hirohiko
2010-01-01
Comparisons between cloud model simulations and observations are crucial in validating model performance and improving physical processes represented in the mod Tel.hese modeled physical processes are idealized representations and almost always have large rooms for improvements. In this study, we use data from two different sensors onboard TRMM (Tropical Rainfall Measurement Mission) satellite to improve the microphysical scheme in the Goddard Cumulus Ensemble (GCE) model. TRMM observed mature-stage squall lines during late spring, early summer in central US over a 9-year period are compiled and compared with a case simulation by GCE model. A unique aspect of the GCE model is that it has a state-of-the-art spectral bin microphysical scheme, which uses 33 different bins to represent particle size distribution of each of the seven hydrometeor species. A forward radiative transfer model calculates TRMM Precipitation Radar (PR) reflectivity and TRMM Microwave Imager (TMI) 85 GHz brightness temperatures from simulated particle size distributions. Comparisons between model outputs and observations reveal that the model overestimates sizes of snow/aggregates in the stratiform region of the squall line. After adjusting temperature-dependent collection coefficients among ice-phase particles, PR comparisons become good while TMI comparisons worsen. Further investigations show that the partitioning between graupel (a high-density form of aggregate), and snow (a low-density form of aggregate) needs to be adjusted in order to have good comparisons in both PR reflectivity and TMI brightness temperature. This study shows that long-term satellite observations, especially those with multiple sensors, can be very useful in constraining model microphysics. It is also the first study in validating and improving a sophisticated spectral bin microphysical scheme according to long-term satellite observations.
International Nuclear Information System (INIS)
Ota, Yoshifumi; Higurashi, Akiko; Nakajima, Teruyuki; Yokota, Tatsuya
2010-01-01
A vector radiative transfer model has been developed for a coupled atmosphere-ocean system. The radiative transfer scheme is based on the discrete ordinate and matrix operator methods. The reflection/transmission matrices and source vectors are obtained for each atmospheric or oceanic layer through the discrete ordinate solution. The vertically inhomogeneous system is constructed using the matrix operator method, which combines the radiative interaction between the layers. This radiative transfer scheme is flexible for a vertically inhomogeneous system including the oceanic layers as well as the ocean surface. Compared with the benchmark results, the computational error attributable to the radiative transfer scheme has been less than 0.1% in the case of eight discrete ordinate directions. Furthermore, increasing the number of discrete ordinate directions has produced computations with higher accuracy. Based on our radiative transfer scheme, simulations of sun glint radiation have been presented for wavelengths of 670 nm and 1.6 μm. Results of simulations have shown reasonable characteristics of the sun glint radiation such as the strongly peaked, but slightly smoothed radiation by the rough ocean surface and depolarization through multiple scattering by the aerosol-loaded atmosphere. The radiative transfer scheme of this paper has been implemented to the numerical model named Pstar as one of the OpenCLASTR/STAR radiative transfer code systems, which are widely applied to many radiative transfer problems, including the polarization effect.
Discrete diffusion Lyman α radiative transfer
Smith, Aaron; Tsang, Benny T.-H.; Bromm, Volker; Milosavljević, Miloš
2018-06-01
Due to its accuracy and generality, Monte Carlo radiative transfer (MCRT) has emerged as the prevalent method for Lyα radiative transfer in arbitrary geometries. The standard MCRT encounters a significant efficiency barrier in the high optical depth, diffusion regime. Multiple acceleration schemes have been developed to improve the efficiency of MCRT but the noise from photon packet discretization remains a challenge. The discrete diffusion Monte Carlo (DDMC) scheme has been successfully applied in state-of-the-art radiation hydrodynamics (RHD) simulations. Still, the established framework is not optimal for resonant line transfer. Inspired by the DDMC paradigm, we present a novel extension to resonant DDMC (rDDMC) in which diffusion in space and frequency are treated on equal footing. We explore the robustness of our new method and demonstrate a level of performance that justifies incorporating the method into existing Lyα codes. We present computational speedups of ˜102-106 relative to contemporary MCRT implementations with schemes that skip scattering in the core of the line profile. This is because the rDDMC runtime scales with the spatial and frequency resolution rather than the number of scatterings—the latter is typically ∝τ0 for static media, or ∝(aτ0)2/3 with core-skipping. We anticipate new frontiers in which on-the-fly Lyα radiative transfer calculations are feasible in 3D RHD. More generally, rDDMC is transferable to any computationally demanding problem amenable to a Fokker-Planck approximation of frequency redistribution.
An adaptive scaling and biasing scheme for OFDM-based visible light communication systems.
Wang, Zhaocheng; Wang, Qi; Chen, Sheng; Hanzo, Lajos
2014-05-19
Orthogonal frequency-division multiplexing (OFDM) has been widely used in visible light communication systems to achieve high-rate data transmission. Due to the nonlinear transfer characteristics of light emitting diodes (LEDs) and owing the high peak-to-average-power ratio of OFDM signals, the transmitted signal has to be scaled and biased before modulating the LEDs. In this contribution, an adaptive scaling and biasing scheme is proposed for OFDM-based visible light communication systems, which fully exploits the dynamic range of the LEDs and improves the achievable system performance. Specifically, the proposed scheme calculates near-optimal scaling and biasing factors for each specific OFDM symbol according to the distribution of the signals, which strikes an attractive trade-off between the effective signal power and the clipping-distortion power. Our simulation results demonstrate that the proposed scheme significantly improves the performance without changing the LED's emitted power, while maintaining the same receiver structure.
Properties of the DREAM scheme and its optimization for application to proteins
International Nuclear Information System (INIS)
Westfeld, Thomas; Verel, René; Ernst, Matthias; Böckmann, Anja; Meier, Beat H.
2012-01-01
The DREAM scheme is an efficient adiabatic homonuclear polarization-transfer method suitable for multi-dimensional experiments in biomolecular solid-state NMR. The bandwidth and dynamics of the polarization transfer in the DREAM experiment depend on a number of experimental and spin-system parameters. In order to obtain optimal results, the dependence of the cross-peak intensity on these parameters needs to be understood and carefully controlled. We introduce a simplified model to semi-quantitatively describe the polarization-transfer patterns for the relevant spin systems. Numerical simulations for all natural amino acids (except tryptophane) show the dependence of the cross-peak intensities as a function of the radio-frequency-carrier position. This dependency can be used as a guide to select the desired conditions in protein spectroscopy. Practical guidelines are given on how to set up a DREAM experiment for optimized Cα/Cβ transfer, which is important in sequential assignment experiments.
Financial incentive schemes in primary care
Directory of Open Access Journals (Sweden)
Gillam S
2015-09-01
Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care
2007-01-01
As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...
HR Department
2007-01-01
As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...
Billett, Stephen
1998-01-01
Transfer involves disembodying knowledge and transferring it for use in different contexts. Vocational knowledge arises in communities of practice, and difficulties arise in transferring it from one distinct community, such as a workplace, to another, such as a classroom. (SK)
International Nuclear Information System (INIS)
Guo, Su; Liu, Deyou; Chen, Xingying; Chu, Yinghao; Xu, Chang; Liu, Qunming; Zhou, Ling
2017-01-01
Highlights: •A nonlinear dynamic model of recirculation DSG parabolic trough is developed. •Collector row, water separator and spray attemperator are modeled, respectively. •The dynamic behaviors of the collector field are simulated and analyzed. •Transfer functions of water level and outlet fluid temperature are derived. •Multi-model switching generalized predictive control strategy is developed. -- Abstract: This work describes and evaluates a new nonlinear dynamic model, and a new generalized predictive control scheme for a collector field of direct steam generation parabolic troughs in recirculation mode. Modeling the dynamic behaviors of collector fields is essential to design, testing and validation of automatic control systems for direct steam generation parabolic troughs. However, the behaviors of two-phase heat transfer fluids impose challenges to simulating and developing process control schemes. In this work, a new nonlinear dynamic model is proposed, based on the nonlinear distributed parameter and the nonlinear lumped parameter methods. The proposed model is used to simulate and analyze the dynamic behaviors of the entire collector field for recirculation mode direct steam generation parabolic troughs under different weather conditions, without excessive computational costs. Based on the proposed model, transfer functions for both the water level of the separator and outlet steam temperatures are derived, and a new multi-model switching generalized predictive control scheme is developed for simulated control of the plant behaviors for a wide region of operational conditions. The proposed control scheme achieves excellent control performance and robustness for systems with long delay, large inertia and time-varying parameters, and efficiently solves the model mismatching problem in direct steam generation parabolic troughs. The performances of the model and control scheme are validated with design data from the project of Integration of Direct
International technology transfer
International Nuclear Information System (INIS)
Kwon, Won Gi
1991-11-01
This book introduces technology progress and economic growth, theoretical consideration of technology transfer, policy and mechanism on technology transfer of a developed country and a developing country, reality of international technology transfer technology transfer and industrial structure in Asia and the pacific region, technology transfer in Russia, China and Eastern Europe, cooperation of science and technology for development of Northeast Asia and strategy of technology transfer of Korea.
Technology transfer by multinationals
Kostyantyn Zuzik
2003-01-01
The paper analyses the issue of technology transfer by multinational corporations. The following questions are explored: (a) world market of technologies, the role of MNCs (b) Choice of the technology transfer mode, Dunning's OLI-theory as a factor of the choice of the mode of transfer (c) measurement and profitability of technology transfer (d) transfer of technology through partnerships, JVs, alliances and through M&As (e) aspects of technology transfer by services multinationals. Paper uti...
A fast resonance interference treatment scheme with subgroup method
International Nuclear Information System (INIS)
Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.
2015-01-01
A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)
Causes and Consequences of a Father's Child Leave: Evidence from a Reform of Leave Schemes
DEFF Research Database (Denmark)
Nielsen, Helena Skyt
are the most progressive when it comes to family-friendly policies. An extensive reform of child leave schemes in Denmark affected couples differently depending on whether the parents where employed in the same or in different parts of the public sector. Based on a difference-in-differences strategy, I find...... that economic incentives are very important for intra-household leave-sharing. Increasing the couples' after tax income by $9 per day of leave which is transferred from the mother to the father is found to lead to a one day transfer. This corresponds to a supply elasticity close to unity....
How update schemes influence crowd simulations
International Nuclear Information System (INIS)
Seitz, Michael J; Köster, Gerta
2014-01-01
Time discretization is a key modeling aspect of dynamic computer simulations. In current pedestrian motion models based on discrete events, e.g. cellular automata and the Optimal Steps Model, fixed-order sequential updates and shuffle updates are prevalent. We propose to use event-driven updates that process events in the order they occur, and thus better match natural movement. In addition, we present a parallel update with collision detection and resolution for situations where computational speed is crucial. Two simulation studies serve to demonstrate the practical impact of the choice of update scheme. Not only do density-speed relations differ, but there is a statistically significant effect on evacuation times. Fixed-order sequential and random shuffle updates with a short update period come close to event-driven updates. The parallel update scheme overestimates evacuation times. All schemes can be employed for arbitrary simulation models with discrete events, such as car traffic or animal behavior. (paper)
Asynchronous discrete event schemes for PDEs
Stone, D.; Geiger, S.; Lord, G. J.
2017-08-01
A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.
An adaptive Cartesian control scheme for manipulators
Seraji, H.
1987-01-01
A adaptive control scheme for direct control of manipulator end-effectors to achieve trajectory tracking in Cartesian space is developed. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for online implementation with high sampling rates.
A Traffic Restriction Scheme for Enhancing Carpooling
Directory of Open Access Journals (Sweden)
Dong Ding
2017-01-01
Full Text Available For the purpose of alleviating traffic congestion, this paper proposes a scheme to encourage travelers to carpool by traffic restriction. By a variational inequity we describe travelers’ mode (solo driving and carpooling and route choice under user equilibrium principle in the context of fixed demand and detect the performance of a simple network with various restriction links, restriction proportions, and carpooling costs. Then the optimal traffic restriction scheme aiming at minimal total travel cost is designed through a bilevel program and applied to a Sioux Fall network example with genetic algorithm. According to various requirements, optimal restriction regions and proportions for restricted automobiles are captured. From the results it is found that traffic restriction scheme is possible to enhance carpooling and alleviate congestion. However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.
Quantum Watermarking Scheme Based on INEQR
Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou
2018-04-01
Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.
Improvement of One Quantum Encryption Scheme
Cao, Zhengjun; Liu, Lihua
2012-01-01
Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.
Geneflow and Cumulative discounted Revenues of Dairy Cattle Cross-Breeding Schemes
International Nuclear Information System (INIS)
Kosgey, I.S.; Bebe, B.O.; Kahi, A.K.; Arendonk, J.A.M.V.
1999-01-01
A simulation study Using Matrix formulation was used to asses the flow of genes from the nucleus to the commercial population for three nucleus dairy cattle crossbreeding schemes involving indigenous (Zebu or native ) and exotic (European) animals under Kenyan conditions: Artificial insemination (A.I.) or natural mating F 1 production, continuous crossbred (F 2 inter se) production and multiple ovulation and embryo transfer (MOET) F 1 production. The latter two schemes used MOET in the nucleus. cumulative discounted expressions (CDES) and cumulative discounted Revenues (CDR) were calculated to rank these schemes. The Pathways considered were sires and dams to produce sires and dams. The evaluation Criterion was milk production measured in age class 3 through 10 in F 1 and F 2 cow populations. the schemes were evaluated over a 30-year projected period with assumed interest rates of 0% and 10%. Further, the genetic level between the indigenous nucleus animals, the F 1 males and commercial female population was calculated by defining the incidence vector h as the difference between the three groups. The F 1 A.I. or natural scheme had higher CDES of 0.978 and 0.161 at 0% and 10% interest rates respectively. The corresponding values for F 1 MOET scheme were 0.735 and 0.070 and those of F 2 inter se were 0.676 and 0.079 at 0% and 10% interest rates, respectively. For a nucleus with 64 dams, CDR (US$) were 95.50 and 15.80 at 0% and 10% interest rates, respectively for F 1 A.I. or natural scheme. The F 1 MOET scheme had corresponding values of 62.05 and 6.90 while F 2 inter se had 66.10 and 7.75. Under both interest rates, the F 1 A.I. or natural mating schemes had higher CDES and CDR than the other two schemes and is faster in dissemination of genes to the commercial population. F 2 inter se was intermediate. The genetic level of nucleus animal is higher than of F 1 male and females because indigenous nucleus females contribute 50% of the genes. F 2 cows are expected to
DEFF Research Database (Denmark)
Alrabadi, Osama; Papadias, C.B.; Kalis, A.
2009-01-01
A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO sys...
A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes
DEFF Research Database (Denmark)
Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis
2009-01-01
array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...
Efficient authentication scheme based on near-ring root extraction problem
Muthukumaran, V.; Ezhilmaran, D.
2017-11-01
An authentication protocolis the type of computer communication protocol or cryptography protocol specifically designed for transfer of authentication data between two entities. We have planned a two new entity authentication scheme on the basis of root extraction problem near-ring in this article. We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform of near-ring N. The security issues also discussed.
Carbon trading: Current schemes and future developments
International Nuclear Information System (INIS)
Perdan, Slobodan; Azapagic, Adisa
2011-01-01
This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: → The paper provides an extensive overview of mandatory emissions trading schemes around the world. → Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. → The expansion requires considerable technical fixes and harmonisation of different trading systems. → Clear policy signals, political support and a stable economic environment are needed for the expansion. → A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.
Pressure correction schemes for compressible flows
International Nuclear Information System (INIS)
Kheriji, W.
2011-01-01
This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)
Small but effective: India's targeted unconditional cash transfers
Puja Dutta; Stephen Howes; Rinku Murgai
2010-01-01
India's approach to social security stresses the provision of subsidized food and public works. Targeted, unconditional cash transfers are little used, and have been little evaluated. An evaluation of cash transfers for the elderly and widows based on national household survey data and surveys on social pension utilization in two of India's states, Karnataka and Rajasthan, reveal that these social pension schemes work reasonably well. Levels of leakage (corruption) are low, funds flow disprop...
EPU correction scheme study at the CLS
Energy Technology Data Exchange (ETDEWEB)
Bertwistle, Drew, E-mail: drew.bertwistle@lightsource.ca; Baribeau, C.; Dallin, L.; Chen, S.; Vogt, J.; Wurtz, W. [Canadian Light Source Inc. 44 Innovation Boulevard, Saskatoon, SK S7N 2V3 (Canada)
2016-07-27
The Canadian Light Source (CLS) Quantum Materials Spectroscopy Center (QMSC) beamline will employ a novel double period (55 mm, 180 mm) elliptically polarizing undulator (EPU) to produce photons of arbitrary polarization in the soft X-ray regime. The long period and high field of the 180 mm period EPU will have a strong dynamic focusing effect on the storage ring electron beam. We have considered two partial correction schemes, a 4 m long planar array of BESSY-II style current strips, and soft iron L-shims. In this paper we briefly consider the implementation of these correction schemes.
Verification of an objective analysis scheme
International Nuclear Information System (INIS)
Cats, G.J.; Haan, B.J. de; Hafkenscheid, L.M.
1987-01-01
An intermittent data assimilation scheme has been used to produce wind and precipitation fields during the 10 days after the explosion at the Chernobyl nuclear power plant on 25 April 1986. The wind fields are analyses, the precipitation fields have been generated by the forecast model part of the scheme. The precipitation fields are of fair quality. The quality of the wind fields has been monitored by the ensuing trajectories. These were found to describe the arrival times of radioactive air in good agreement with most observational data, taken all over Europe. The wind analyses are therefore considered to be reliable. 25 refs.; 13 figs
Optimal powering schemes for legged robotics
Muench, Paul; Bednarz, David; Czerniak, Gregory P.; Cheok, Ka C.
2010-04-01
Legged Robots have tremendous mobility, but they can also be very inefficient. These inefficiencies can be due to suboptimal control schemes, among other things. If your goal is to get from point A to point B in the least amount of time, your control scheme will be different from if your goal is to get there using the least amount of energy. In this paper, we seek a balance between these extremes by looking at both efficiency and speed. We model a walking robot as a rimless wheel, and, using Pontryagin's Maximum Principle (PMP), we find an "on-off" control for the model, and describe the switching curve between these control extremes.
System Protection Schemes in Eastern Denmark
DEFF Research Database (Denmark)
Rasmussen, Joana
outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... effective measures, because they are associated with large reactive power losses in the transmission system. Ordered reduction of wind generation is considered an effective measure to maintain voltage stability in the system. Reactive power in the system is released due to tripping of a significant amount...... system. In that way, the power system capability could be extended beyond normal limits....
Group Buying Schemes : A Sustainable Business Model?
Köpp, Sebastian; Mukhachou, Aliaksei; Schwaninger, Markus
2013-01-01
Die Autoren gehen der Frage nach, ob "Group Buying Schemes" wie beispielsweise von den Unternehmen Groupon und Dein Deal angeboten, ein nachhaltiges Geschäftsmodell sind. Anhand der Fallstudie Groupon wird mit einem System Dynamics Modell festgestellt, dass das Geschäftsmodell geändert werden muss, wenn die Unternehmung auf Dauer lebensfähig sein soll. The authors examine if group buying schemes are a sustainable business model. By means of the Groupon case study and using a System Dynami...
New Imaging Operation Scheme at VLTI
Haubois, Xavier
2018-04-01
After PIONIER and GRAVITY, MATISSE will soon complete the set of 4 telescope beam combiners at VLTI. Together with recent developments in the image reconstruction algorithms, the VLTI aims to develop its operation scheme to allow optimized and adaptive UV plane coverage. The combination of spectro-imaging instruments, optimized operation framework and image reconstruction algorithms should lead to an increase of the reliability and quantity of the interferometric images. In this contribution, I will present the status of this new scheme as well as possible synergies with other instruments.
Hilbert schemes of points and Heisenberg algebras
International Nuclear Information System (INIS)
Ellingsrud, G.; Goettsche, L.
2000-01-01
Let X [n] be the Hilbert scheme of n points on a smooth projective surface X over the complex numbers. In these lectures we describe the action of the Heisenberg algebra on the direct sum of the cohomologies of all the X [n] , which has been constructed by Nakajima. In the second half of the lectures we study the relation of the Heisenberg algebra action and the ring structures of the cohomologies of the X [n] , following recent work of Lehn. In particular we study the Chern and Segre classes of tautological vector bundles on the Hilbert schemes X [n] . (author)
Security problem on arbitrated quantum signature schemes
International Nuclear Information System (INIS)
Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon
2011-01-01
Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.
Optimal sampling schemes applied in geology
CSIR Research Space (South Africa)
Debba, Pravesh
2010-05-01
Full Text Available Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology UP 2010 2 / 47 Outline 1 Introduction to hyperspectral remote... sensing 2 Objective of Study 1 3 Study Area 4 Data used 5 Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology...
Quadratically convergent MCSCF scheme using Fock operators
International Nuclear Information System (INIS)
Das, G.
1981-01-01
A quadratically convergent formulation of the MCSCF method using Fock operators is presented. Among its advantages the present formulation is quadratically convergent unlike the earlier ones based on Fock operators. In contrast to other quadratically convergent schemes as well as the one based on generalized Brillouin's theorem, this method leads easily to a hybrid scheme where the weakly coupled orbitals (such as the core) are handled purely by Fock equations, while the rest of the orbitals are treated by a quadratically convergent approach with a truncated virtual space obtained by the use of the corresponding Fock equations
Security problem on arbitrated quantum signature schemes
Energy Technology Data Exchange (ETDEWEB)
Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)
2011-12-15
Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.
Clocking Scheme for Switched-Capacitor Circuits
DEFF Research Database (Denmark)
Steensgaard-Madsen, Jesper
1998-01-01
A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....
Analysis of Program Obfuscation Schemes with Variable Encoding Technique
Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi
Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.
Investigation of schemes for incorporating generator Q limits in the ...
Indian Academy of Sciences (India)
Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...
Benchmark results in radiative transfer
International Nuclear Information System (INIS)
Garcia, R.D.M.; Siewert, C.E.
1986-02-01
Several aspects of the F N method are reported, and the method is used to solve accurately some benchmark problems in radiative transfer in the field of atmospheric physics. The method was modified to solve cases of pure scattering and an improved process was developed for computing the radiation intensity. An algorithms for computing several quantities used in the F N method was done. An improved scheme to evaluate certain integrals relevant to the method is done, and a two-term recursion relation that has proved useful for the numerical evaluation of matrix elements, basic for the method, is given. The methods used to solve the encountered linear algebric equations are discussed, and the numerical results are evaluated. (M.C.K.) [pt
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment
Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda
2017-01-01
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment. PMID:28629131
Variable-flavor-number scheme in analysis of heavy-quark electro-production data
International Nuclear Information System (INIS)
Alekhin, S.; Bluemlein, J.; Klein, S.; Moch, S.
2009-08-01
We check the impact of the factorization scheme employed in the calculation of the heavy-quark deep-inelastic scattering (DIS) electro-production on the PDFs determined in the NNLO QCD analysis of the world inclusive neutral-current DIS data combined with the ones on the neutrino-nucleon DIS di-muon production and the fixed-target Drell-Yan process. The charm-quark DIS contribution is calculated in the general-mass variable-flavor-number (GMVFN) scheme: At asymptotically large values of the momentum transfer Q it is given by the zero-mass 4-flavor scheme and at the value of Q equal to the charm-quark mass it is smoothly matched with the 3-flavor scheme using the Buza-Matiounine-Smith-van Neerven prescription. The PDFs obtained in this variant of the fit are very similar to the ones obtained in the fit with a 3-flavor scheme employed. Our 5-flavor PDFs derived from the 3-flavor ones using the NNLO matching conditions are used to calculate the rates of W ± /Z and t anti t production at the Tevatron collider and the LHC at NNLO. (orig.)
Gaudreau, Louis; Bogan, Alex; Korkusinski, Marek; Studenikin, Sergei; Austing, D. Guy; Sachrajda, Andrew S.
2017-09-01
Long distance entanglement distribution is an important problem for quantum information technologies to solve. Current optical schemes are known to have fundamental limitations. A coherent photon-to-spin interface built with quantum dots (QDs) in a direct bandgap semiconductor can provide a solution for efficient entanglement distribution. QD circuits offer integrated spin processing for full Bell state measurement (BSM) analysis and spin quantum memory. Crucially the photo-generated spins can be heralded by non-destructive charge detection techniques. We review current schemes to transfer a polarization-encoded state or a time-bin-encoded state of a photon to the state of a spin in a QD. The spin may be that of an electron or that of a hole. We describe adaptations of the original schemes to employ heavy holes which have a number of attractive properties including a g-factor that is tunable to zero for QDs in an appropriately oriented external magnetic field. We also introduce simple throughput scaling models to demonstrate the potential performance advantage of full BSM capability in a QD scheme, even when the quantum memory is imperfect, over optical schemes relying on linear optical elements and ensemble quantum memories.
A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.
Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda
2017-06-17
In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.
Cures for the shock instability: Development of a shock-stable Roe scheme
Kim, S S; Rho, O H; Kyu-Hong, S
2003-01-01
This paper deals with the development of an improved Roe scheme that is free from the shock instability and still preserves the accuracy and efficiency of the original Roe's Flux Difference Splitting (FDS). Roe's FDS is known to possess good accuracy but to suffer from the shock instability, such as the carbuncle phenomenon. As the first step towards a shock-stable scheme, Roe's FDS is compared with the HLLE scheme to identify the source of the shock instability. Through a linear perturbation analysis on the odd-even decoupling problem, damping characteristic is examined and Mach number-based functions f and g are introduced to balance damping and feeding rates, which leads to a shock-stable Roe scheme. In order to satisfy the conservation of total enthalpy, which is crucial in predicting surface heat transfer rate in high-speed steady flows, an analysis of dissipation mechanism in the energy equation is carried out to find out the error source and to make the proposed scheme preserve total enthalpy. By modif...
Sources of funding for community schemes
Energy Technology Data Exchange (ETDEWEB)
NONE
1999-11-01
There is an increasing level of interest amongst community groups in the UK to become involved in the development of renewable energy schemes. Often however these community groups have only limited funds of their own, so any additional funds that can be identified to help fund their renewable energy scheme can be very useful. There are a range of funding sources available that provide grants or loans for which community groups are eligible to apply. Few of these funding sources are targeted towards renewable energy specifically, nevertheless the funds may be applicable to renewable energy schemes under appropriate circumstances. To date, however, few of these funds have been accessed by community groups for renewable energy initiatives. One of the reasons for this low take-up of funds on offer could be that the funding sources may be difficult and time-consuming to identify, especially where the energy component of the fund is not readily apparent. This directory draws together details about many of the principal funding sources available in the UK that may consider providing funds to community groups wanting to develop a renewable energy scheme. (author)
The QKD network: model and routing scheme
Yang, Chao; Zhang, Hongqi; Su, Jinhai
2017-11-01
Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.
SYNTHESIS OF VISCOELASTIC MATERIAL MODELS (SCHEMES
Directory of Open Access Journals (Sweden)
V. Bogomolov
2014-10-01
Full Text Available The principles of structural viscoelastic schemes construction for materials with linear viscoelastic properties in accordance with the given experimental data on creep tests are analyzed. It is shown that there can be only four types of materials with linear visco-elastic properties.
BPHZL-subtraction scheme and axial gauges
Energy Technology Data Exchange (ETDEWEB)
Kreuzer, M.; Rebhan, A.; Schweda, M.; Piguet, O.
1986-03-27
The application of the BPHZL subtraction scheme to Yang-Mills theories in axial gauges is presented. In the auxillary mass formulation we show the validity of the convergence theorems for subtracted momentum space integrals, and we give the integral formulae necessary for one-loop calculations. (orig.).
The data cyclotron query processing scheme
R.A. Goncalves (Romulo); M.L. Kersten (Martin)
2010-01-01
htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot
THE DEVELOPMENT OF FREE PRIMARY EDUCATION SCHEME ...
African Journals Online (AJOL)
user
Education scheme in Western Region and marked a radical departure from the hitherto ... academic symposia, lectures, debates, reputable journals and standard .... Enrolment in Primary Schools in the Western Region by Sex, 1953 – 1960. Year Boys .... “Possibly no single decision of the decade prior to independence had.
High Order Semi-Lagrangian Advection Scheme
Malaga, Carlos; Mandujano, Francisco; Becerra, Julian
2014-11-01
In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).
An HFB scheme in natural orbitals
International Nuclear Information System (INIS)
Reinhard, P.G.; Rutz, K.; Maruhn, J.A.
1997-01-01
We present a formulation of the Hartree-Fock-Bogoliubov (HFB) equations which solves the problem directly in the basis of natural orbitals. This provides a very efficient scheme which is particularly suited for large scale calculations on coordinate-space grids. (orig.)
A classification scheme for LWR fuel assemblies
Energy Technology Data Exchange (ETDEWEB)
Moore, R.S.; Williamson, D.A.; Notz, K.J.
1988-11-01
With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.
The EU Greenhouse Gas Emissions Trading Scheme
Woerdman, Edwin; Woerdman, Edwin; Roggenkamp, Martha; Holwerda, Marijn
2015-01-01
This chapter explains how greenhouse gas emissions trading works, provides the essentials of the Directive on the European Union Emissions Trading Scheme (EU ETS) and summarizes the main implementation problems of the EU ETS. In addition, a law and economics approach is used to discuss the dilemmas
International Nuclear Information System (INIS)
Pinto, H.V.
1976-02-01
Calibration in energy and efficiency of the system used. Obtainement of singles gamma ray spectra of low and high energy. Reduction of the data obtained in the spectrometer by means of computer: localization and determination of the areas of the peaks, also the analysis of the shape of the peaks for identification of doublets. Checking of the decay scheme [pt
Parallel knock-out schemes in networks
Broersma, H.J.; Fomin, F.V.; Woeginger, G.J.
2004-01-01
We consider parallel knock-out schemes, a procedure on graphs introduced by Lampert and Slater in 1997 in which each vertex eliminates exactly one of its neighbors in each round. We are considering cases in which after a finite number of rounds, where the minimimum number is called the parallel
Nonclassical lightstates in optical communication schemes
International Nuclear Information System (INIS)
Mattle, K. U.
1997-11-01
The present thesis is a result in theoretical and experimental work on quant information and quant communication. The first part describes a new high intense source for polarization entangled photon pairs. The high quality of the source is clearly demonstrated by violating a Bell-inequality in less than 5 minutes with 100 standard deviations. This new source is a genius tool for new experiments in the field of fundamental physics as well as applied physics. The next chapter shows an experimental implementation of an optical dense quantum coding scheme. The combination of Bell-state generation and analysis of this entangled states leads to a new nonclassical communication scheme, where the channel capacity is enhanced. A single two state photon can be used for coding and decoding 1.58 bit instead of 1 bit for classical two state systems. The following chapter discusses two photon interference effects for two independent light sources. In an experiment two independent fluorescence pulses show this kind of interference effects. The fifth chapter describes 3-photon interference effects. This nonclassical interference effect is the elementary process for the quantum teleportation scheme. In this scheme an unknown particle state is transmitted from A to B without sending the particle itself. (author)
The complete flux scheme in cylindrical coordinates
Anthonissen, M.J.H.; Thije Boonkkamp, ten J.H.M.
2014-01-01
We consider the complete ¿ux (CF) scheme, a ¿nite volume method (FVM) presented in [1]. CF is based on an integral representation for the ¿uxes, found by solving a local boundary value problem that includes the source term. It performs well (second order accuracy) for both diffusion and advection
Traffic calming schemes : opportunities and implementation strategies.
Schagen, I.N.L.G. van (ed.)
2003-01-01
Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and
Harmonic generation with multiple wiggler schemes
Energy Technology Data Exchange (ETDEWEB)
Bonifacio, R.; De Salvo, L.; Pierini, P. [Universita degli Studi, Milano (Italy)
1995-02-01
In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.
Zero leakage quantization scheme for biometric verification
Groot, de J.A.; Linnartz, J.P.M.G.
2011-01-01
Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new verification scheme, which protects the secrets of the enrolled users. We will show that zero leakage is achieved if
A classification scheme for LWR fuel assemblies
International Nuclear Information System (INIS)
Moore, R.S.; Williamson, D.A.; Notz, K.J.
1988-11-01
With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs
Asynchronous schemes for CFD at extreme scales
Konduri, Aditya; Donzis, Diego
2013-11-01
Recent advances in computing hardware and software have made simulations an indispensable research tool in understanding fluid flow phenomena in complex conditions at great detail. Due to the nonlinear nature of the governing NS equations, simulations of high Re turbulent flows are computationally very expensive and demand for extreme levels of parallelism. Current large simulations are being done on hundreds of thousands of processing elements (PEs). Benchmarks from these simulations show that communication between PEs take a substantial amount of time, overwhelming the compute time, resulting in substantial waste in compute cycles as PEs remain idle. We investigate a novel approach based on widely used finite-difference schemes in which computations are carried out asynchronously, i.e. synchronization of data among PEs is not enforced and computations proceed regardless of the status of messages. This drastically reduces PE idle time and results in much larger computation rates. We show that while these schemes remain stable, their accuracy is significantly affected. We present new schemes that maintain accuracy under asynchronous conditions and provide a viable path towards exascale computing. Performance of these schemes will be shown for simple models like Burgers' equation.
Generalization of binary tensor product schemes depends upon four parameters
International Nuclear Information System (INIS)
Bashir, R.; Bari, M.; Mustafa, G.
2018-01-01
This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)
LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica
Caprio, M. A.
2005-09-01
LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.
Barron, Randall F
2016-01-01
Cryogenic Heat Transfer, Second Edition continues to address specific heat transfer problems that occur in the cryogenic temperature range where there are distinct differences from conventional heat transfer problems. This updated version examines the use of computer-aided design in cryogenic engineering and emphasizes commonly used computer programs to address modern cryogenic heat transfer problems. It introduces additional topics in cryogenic heat transfer that include latent heat expressions; lumped-capacity transient heat transfer; thermal stresses; Laplace transform solutions; oscillating flow heat transfer, and computer-aided heat exchanger design. It also includes new examples and homework problems throughout the book, and provides ample references for further study.
A novel secret image sharing scheme based on chaotic system
Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu
2012-04-01
In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.
Simple Numerical Schemes for the Korteweg-deVries Equation
International Nuclear Information System (INIS)
McKinstrie, C. J.; Kozlov, M.V.
2000-01-01
Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves
Simple Numerical Schemes for the Korteweg-deVries Equation
Energy Technology Data Exchange (ETDEWEB)
C. J. McKinstrie; M. V. Kozlov
2000-12-01
Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.
International Nuclear Information System (INIS)
Mieussens, Luc
2013-01-01
The unified gas kinetic scheme (UGKS) of K. Xu et al. (2010) [37], originally developed for multiscale gas dynamics problems, is applied in this paper to a linear kinetic model of radiative transfer theory. While such problems exhibit purely diffusive behavior in the optically thick (or small Knudsen) regime, we prove that UGKS is still asymptotic preserving (AP) in this regime, but for the free transport regime as well. Moreover, this scheme is modified to include a time implicit discretization of the limit diffusion equation, and to correctly capture the solution in case of boundary layers. Contrary to many AP schemes, this method is based on a standard finite volume approach, it does neither use any decomposition of the solution, nor staggered grids. Several numerical tests demonstrate the properties of the scheme
International Nuclear Information System (INIS)
2003-08-01
This book deals with analysis of heat transfer which includes nonlinear analysis examples, radiation heat transfer, analysis of heat transfer in ANSYS, verification of analysis result, analysis of heat transfer of transition with automatic time stepping and open control, analysis of heat transfer using arrangement of ANSYS, resistance of thermal contact, coupled field analysis such as of thermal-structural interaction, cases of coupled field analysis, and phase change.
A classification scheme for risk assessment methods.
Energy Technology Data Exchange (ETDEWEB)
Stamp, Jason Edwin; Campbell, Philip LaRoche
2004-08-01
This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In
New advection schemes for free surface flows
International Nuclear Information System (INIS)
Pavan, Sara
2016-01-01
The purpose of this thesis is to build higher order and less diffusive schemes for pollutant transport in shallow water flows or 3D free surface flows. We want robust schemes which respect the main mathematical properties of the advection equation with relatively low numerical diffusion and apply them to environmental industrial applications. Two techniques are tested in this work: a classical finite volume method and a residual distribution technique combined with a finite element method. For both methods we propose a decoupled approach since it is the most advantageous in terms of accuracy and CPU time. Concerning the first technique, a vertex-centred finite volume method is used to solve the augmented shallow water system where the numerical flux is computed through an Harten-Lax-Van Leer-Contact Riemann solver. Starting from this solution, a decoupled approach is formulated and is preferred since it allows to compute with a larger time step the advection of a tracer. This idea was inspired by Audusse, E. and Bristeau, M.O. [13]. The Monotonic Upwind Scheme for Conservation Law, combined with the decoupled approach, is then used for the second order extension in space. The wetting and drying problem is also analysed and a possible solution is presented. In the second case, the shallow water system is entirely solved using the finite element technique and the residual distribution method is applied to the solution of the tracer equation, focusing on the case of time-dependent problems. However, for consistency reasons the resolution of the continuity equation must be considered in the numerical discretization of the tracer. In order to get second order schemes for unsteady cases a predictor-corrector scheme is used in this work. A first order but less diffusive version of the predictor-corrector scheme is also introduced. Moreover, we also present a new locally semi-implicit version of the residual distribution method which, in addition to good properties in
Scheme for Quantum Computing Immune to Decoherence
Williams, Colin; Vatan, Farrokh
2008-01-01
A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report
A methodology for the transfer of probabilities between accident severity categories
International Nuclear Information System (INIS)
Whitlow, J.D.; Neuhauser, K.S.
1991-01-01
A methodology has been developed which allows the accident probabilities associated with one accident-severity category scheme to be transferred to another severity category scheme. The methodology requires that the schemes use a common set of parameters to define the categories. The transfer of accident probabilities is based on the relationships between probability of occurrence and each of the parameters used to define the categories. Because of the lack of historical data describing accident environments in engineering terms, these relationships may be difficult to obtain directly for some parameters. Numerical models or experienced judgement are often needed to obtain the relationships. These relationships, even if they are not exact, allow the accident probability associated with any severity category to be distributed within that category in a manner consistent with accident experience, which in turn will allow the accident probability to be appropriately transferred to a different category scheme
Elucidation of molecular kinetic schemes from macroscopic traces using system identification.
Directory of Open Access Journals (Sweden)
Miguel Fribourg
2017-02-01
Full Text Available Overall cellular responses to biologically-relevant stimuli are mediated by networks of simpler lower-level processes. Although information about some of these processes can now be obtained by visualizing and recording events at the molecular level, this is still possible only in especially favorable cases. Therefore the development of methods to extract the dynamics and relationships between the different lower-level (microscopic processes from the overall (macroscopic response remains a crucial challenge in the understanding of many aspects of physiology. Here we have devised a hybrid computational-analytical method to accomplish this task, the SYStems-based MOLecular kinetic scheme Extractor (SYSMOLE. SYSMOLE utilizes system-identification input-output analysis to obtain a transfer function between the stimulus and the overall cellular response in the Laplace-transformed domain. It then derives a Markov-chain state molecular kinetic scheme uniquely associated with the transfer function by means of a classification procedure and an analytical step that imposes general biological constraints. We first tested SYSMOLE with synthetic data and evaluated its performance in terms of its rate of convergence to the correct molecular kinetic scheme and its robustness to noise. We then examined its performance on real experimental traces by analyzing macroscopic calcium-current traces elicited by membrane depolarization. SYSMOLE derived the correct, previously known molecular kinetic scheme describing the activation and inactivation of the underlying calcium channels and correctly identified the accepted mechanism of action of nifedipine, a calcium-channel blocker clinically used in patients with cardiovascular disease. Finally, we applied SYSMOLE to study the pharmacology of a new class of glutamate antipsychotic drugs and their crosstalk mechanism through a heteromeric complex of G protein-coupled receptors. Our results indicate that our methodology
An authentication scheme for secure access to healthcare services.
Khan, Muhammad Khurram; Kumari, Saru
2013-08-01
Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.
A hybrid Lagrangian Voronoi-SPH scheme
Fernandez-Gutierrez, D.; Souto-Iglesias, A.; Zohdi, T. I.
2017-11-01
A hybrid Lagrangian Voronoi-SPH scheme, with an explicit weakly compressible formulation for both the Voronoi and SPH sub-domains, has been developed. The SPH discretization is substituted by Voronoi elements close to solid boundaries, where SPH consistency and boundary conditions implementation become problematic. A buffer zone to couple the dynamics of both sub-domains is used. This zone is formed by a set of particles where fields are interpolated taking into account SPH particles and Voronoi elements. A particle may move in or out of the buffer zone depending on its proximity to a solid boundary. The accuracy of the coupled scheme is discussed by means of a set of well-known verification benchmarks.
Exclusion from the Health Insurance Scheme
2003-01-01
A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635
A numerical relativity scheme for cosmological simulations
Daverio, David; Dirian, Yves; Mitsou, Ermis
2017-12-01
Cosmological simulations involving the fully covariant gravitational dynamics may prove relevant in understanding relativistic/non-linear features and, therefore, in taking better advantage of the upcoming large scale structure survey data. We propose a new 3 + 1 integration scheme for general relativity in the case where the matter sector contains a minimally-coupled perfect fluid field. The original feature is that we completely eliminate the fluid components through the constraint equations, thus remaining with a set of unconstrained evolution equations for the rest of the fields. This procedure does not constrain the lapse function and shift vector, so it holds in arbitrary gauge and also works for arbitrary equation of state. An important advantage of this scheme is that it allows one to define and pass an adaptation of the robustness test to the cosmological context, at least in the case of pressureless perfect fluid matter, which is the relevant one for late-time cosmology.
Expert Performance Transfer: Making Knowledge Transfer Count
International Nuclear Information System (INIS)
Turner, C.L.; Braudt, T.E.
2011-01-01
'Knowledge Transfer' is a high-priority imperative as the nuclear industry faces the combined effects of an aging workforce and economic pressures to do more with less. Knowledge Transfer is only a part of the solution to these challenges, however. The more compelling and immediate need faced by industry is Accomplishment Transfer, or the transference of the applied knowledge necessary to assure optimal performance transfer from experienced, high-performing staff to inexperienced staff. A great deal of industry knowledge and required performance information has been documented in the form of procedures. Often under-appreciated either as knowledge stores or as drivers of human performance, procedures, coupled with tightly-focused and effective training, are arguably the most effective influences on human and plant performance. (author)
A new chaotic secure communication scheme
International Nuclear Information System (INIS)
Hua Changchun; Yang Bo; Ouyang Gaoxiang; Guan Xinping
2005-01-01
A new chaotic secure communication scheme is constructed. Unified chaotic system is used to encrypt the emitted signal. Different from the existing chaotic secure communication methods, the useful information is embodied in the parameter of chaotic systems in this Letter. The receiver is designed which can succeed in recovering the former signal. Finally computer simulations are done to verify the proposed methods, and the results show that the obtained theoretic results are feasible and efficient
On Some Incompatible Properties of Voting Schemes
Chevallier-Mames , Benoît; Fouque , Pierre-Alain; Pointcheval , David; Stern , Julien; Traoré , Jacques
2010-01-01
In this paper, we study the problem of simultaneously achieving several security properties, for voting schemes, without non-standard assumptions. More specifically, we focus on the universal veriability of the computation of the tally, on the unconditional privacy/anonymity of the votes, and on the receipt-freeness properties, for the most classical election processes. Under usual assumptions and efficiency requirements, we show that a voting system that wants to publish the final list of th...
Conservative Semidiscrete Difference Schemes for Timoshenko Systems
Júnior, D. S. Almeida
2014-01-01
We present a parameterized family of finite-difference schemes to analyze the energy properties for linearly elastic constant-coefficient Timoshenko systems considering shear deformation and rotatory inertia. We derive numerical energies showing the positivity, and the energy conservation property and we show how to avoid a numerical anomaly known as locking phenomenon on shear force. Our method of proof relies on discrete multiplier techniques.
Droop Scheme With Consideration of Operating Costs
DEFF Research Database (Denmark)
Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede
2014-01-01
considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady...... state will meet the intended objectives, as demonstrated in the experiment with a defined objective of minimizing the total microgrid operating cost....
A Scheme of Controlled Quantum State Swapping
International Nuclear Information System (INIS)
Zha Xinwei; Zou Zhichun; Qi Jianxia; Song Haiyang
2012-01-01
A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state, i.e., Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie. The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice, Bob, and Charlie.
Efficient Scheme for Chemical Flooding Simulation
Directory of Open Access Journals (Sweden)
Braconnier Benjamin
2014-07-01
Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].
The Emergent Universe scheme and tunneling
Energy Technology Data Exchange (ETDEWEB)
Labraña, Pedro [Departamento de Física, Universidad del Bío-Bío, Avenida Collao 1202, Casilla 5-C, Concepción, Chile and Departament d' Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat (Spain)
2014-07-23
We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.
Evolutionary Algorithm for Optimal Vaccination Scheme
International Nuclear Information System (INIS)
Parousis-Orthodoxou, K J; Vlachos, D S
2014-01-01
The following work uses the dynamic capabilities of an evolutionary algorithm in order to obtain an optimal immunization strategy in a user specified network. The produced algorithm uses a basic genetic algorithm with crossover and mutation techniques, in order to locate certain nodes in the inputted network. These nodes will be immunized in an SIR epidemic spreading process, and the performance of each immunization scheme, will be evaluated by the level of containment that provides for the spreading of the disease
Kaufmann, Cornel; Schmid, Christian; Boes, Stefan
2017-09-01
The extent to which premium subsidies can influence health insurance choices is an open question. In this paper, we explore the regional variation in subsidy schemes in Switzerland, designed as either in-kind or cash transfers, to study their impact on the choice of health insurance deductibles. Using health survey data and a difference-in-differences methodology, we find that in-kind transfers increase the likelihood of choosing a low deductible plan by approximately 4 percentage points (or 7%). Our results indicate that the response to in-kind transfers is strongest among women, middle-aged and unmarried individuals, which we explain by differences in risk-taking behavior, health status, financial constraints, health insurance and financial literacy. We discuss our results in the light of potential extra-marginal effects on the demand for health care services, which are however not supported by our data. Copyright © 2017 Elsevier B.V. All rights reserved.
DEFF Research Database (Denmark)
Christensen, Thomas Højlund
2011-01-01
tion and transport is usually the most costly part of any waste management system; and when waste is transported over a considerable distance or for a long time, transferring the waste from the collection vehicles to more efficient transportation may be economically beneficial. This involves...... a transfer station where the transfer takes place. These stations may also be accessible by private people, offering flexibility to the waste system, including facilities for bulky waste, household hazardous waste and recyclables. Waste transfer may also take place on the collection route from small...... describes the main features of waste transfer stations, including some considerations about the economical aspects on when transfer is advisable....
INFORMATION FROM THE CERN HEALTH INSURANCE SCHEME
Tel : 7-3635
2002-01-01
Please note that, from 1 July 2002, the tariff agreement between CERN and the Hôpital de la Tour will no longer be in force. As a result the members of the CERN Health Insurance Scheme will no longer obtain a 5% discount for quick payment of bills. More information on the termination of the agreement and the implications for our Health Insurance Scheme will be provided in the next issue of the CHIS Bull', due for publication in the first half of July. It will be sent to your home address, so, if you have moved recently, please check that your divisional secretariat has your current address. Tel.: 73635 The Organization's Health Insurance Scheme (CHIS) has launched its own Web pages, located on the Website of the Social & Statutory Conditions Group of HR Division (HR-SOC). The address is short and easy-to-remember www.cern.ch/chis The pages currently available concentrate on providing basic information. Over the coming months it is planned to fill out the details and introduce new topics. Please give us ...
Doppler Shift Compensation Schemes in VANETs
Directory of Open Access Journals (Sweden)
F. Nyongesa
2015-01-01
Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.
Boudot's Range-Bounded Commitment Scheme Revisited
Cao, Zhengjun; Liu, Lihua
Checking whether a committed integer lies in a specific interval has many cryptographic applications. In Eurocrypt'98, Chan et al. proposed an instantiation (CFT Proof). Based on CFT, Boudot presented a popular range-bounded commitment scheme in Eurocrypt'2000. Both CFT Proof and Boudot Proof are based on the encryption E(x, r)=g^xh^r mod n, where n is an RSA modulus whose factorization is unknown by the prover. They did not use a single base as usual. Thus an increase in cost occurs. In this paper, we show that it suffices to adopt a single base. The cost of the modified Boudot Proof is about half of that of the original scheme. Moreover, the key restriction in the original scheme, i.e., both the discrete logarithm of g in base h and the discrete logarithm of h in base g are unknown by the prover, which is a potential menace to the Boudot Proof, is definitely removed.
An evaluation scheme for nanotechnology policies
International Nuclear Information System (INIS)
Soltani, Ali M.; Tabatabaeian, Seyed H.; Hanafizadeh, Payam; Bamdad Soofi, Jahanyar
2011-01-01
Dozens of countries are executing national nanotechnology plans. No rigorous evaluation scheme for these plans exists, although stakeholders—especially policy makers, top-level agencies and councils, as well as the society at large—are eager to learn the outcome of these policies. In this article, we recommend an evaluation scheme for national nanotechnology policies that would be used to review the whole or any component part of a national nanotechnology plan. In this scheme, a component at any level of aggregation is evaluated. The component may be part of the plan’s overarching policy goal, which for most countries is to create wealth and improve the quality of life of their nation with nanotechnology. Alternatively, the component may be a programme or an activity related to a programme. The evaluation could be executed at different times in the policy’s life cycle, i.e., before the policy is formulated, during its execution or after its completion. The three criteria for policy evaluation are appropriateness, efficiency and effectiveness. The evaluator should select the appropriate qualitative or quantitative methods to evaluate the various components of national nanotechnology plans.
Parallel S/sub n/ iteration schemes
International Nuclear Information System (INIS)
Wienke, B.R.; Hiromoto, R.E.
1986-01-01
The iterative, multigroup, discrete ordinates (S/sub n/) technique for solving the linear transport equation enjoys widespread usage and appeal. Serial iteration schemes and numerical algorithms developed over the years provide a timely framework for parallel extension. On the Denelcor HEP, the authors investigate three parallel iteration schemes for solving the one-dimensional S/sub n/ transport equation. The multigroup representation and serial iteration methods are also reviewed. This analysis represents a first attempt to extend serial S/sub n/ algorithms to parallel environments and provides good baseline estimates on ease of parallel implementation, relative algorithm efficiency, comparative speedup, and some future directions. The authors examine ordered and chaotic versions of these strategies, with and without concurrent rebalance and diffusion acceleration. Two strategies efficiently support high degrees of parallelization and appear to be robust parallel iteration techniques. The third strategy is a weaker parallel algorithm. Chaotic iteration, difficult to simulate on serial machines, holds promise and converges faster than ordered versions of the schemes. Actual parallel speedup and efficiency are high and payoff appears substantial
Optimization of a middle atmosphere diagnostic scheme
Akmaev, Rashid A.
1997-06-01
A new assimilative diagnostic scheme based on the use of a spectral model was recently tested on the CIRA-86 empirical model. It reproduced the observed climatology with an annual global rms temperature deviation of 3.2 K in the 15-110 km layer. The most important new component of the scheme is that the zonal forcing necessary to maintain the observed climatology is diagnosed from empirical data and subsequently substituted into the simulation model at the prognostic stage of the calculation in an annual cycle mode. The simulation results are then quantitatively compared with the empirical model, and the above mentioned rms temperature deviation provides an objective measure of the `distance' between the two climatologies. This quantitative criterion makes it possible to apply standard optimization procedures to the whole diagnostic scheme and/or the model itself. The estimates of the zonal drag have been improved in this study by introducing a nudging (Newtonian-cooling) term into the thermodynamic equation at the diagnostic stage. A proper optimal adjustment of the strength of this term makes it possible to further reduce the rms temperature deviation of simulations down to approximately 2.7 K. These results suggest that direct optimization can successfully be applied to atmospheric model parameter identification problems of moderate dimensionality.
Computing with high-resolution upwind schemes for hyperbolic equations
International Nuclear Information System (INIS)
Chakravarthy, S.R.; Osher, S.; California Univ., Los Angeles)
1985-01-01
Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and glitches, relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes. 21 references
Error forecasting schemes of error correction at receiver
International Nuclear Information System (INIS)
Bhunia, C.T.
2007-08-01
To combat error in computer communication networks, ARQ (Automatic Repeat Request) techniques are used. Recently Chakraborty has proposed a simple technique called the packet combining scheme in which error is corrected at the receiver from the erroneous copies. Packet Combining (PC) scheme fails: (i) when bit error locations in erroneous copies are the same and (ii) when multiple bit errors occur. Both these have been addressed recently by two schemes known as Packet Reversed Packet Combining (PRPC) Scheme, and Modified Packet Combining (MPC) Scheme respectively. In the letter, two error forecasting correction schemes are reported, which in combination with PRPC offer higher throughput. (author)
Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme
Directory of Open Access Journals (Sweden)
Raman Kumar
2014-01-01
Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.
A rational function based scheme for solving advection equation
International Nuclear Information System (INIS)
Xiao, Feng; Yabe, Takashi.
1995-07-01
A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author)
A Survey on Simultaneous Wireless Information and Power Transfer
Perera, T. D. P.; Jayakody, D. N. K.; De, S.; Ivanov, M. A.
2017-01-01
This paper presents a comprehensive study related to simultaneous wireless information and power transfer (SWIPT) in different types of wireless communication setups. Harvesting energy using SWIPT is an appealing solution in the context of extending battery life of wireless devices for a fully sustainable communication system. Strong signal power increases power transfer, but also causes more interference in information transfer, causing realization of the SWIPT challenging problem. This article provides an overview of technical evolution of SWIPT. A survey and qualitative comparison of the existing SWIPT schemes is provided to demonstrate their limitations in the current and 5G networks. Open challenges are emphasized and guidelines are provided to adapt the existing schemes in order to overcome these limitations and make them fit for integrating with the modern and emerging next generation communication networks, such as 5G systems.
Kakac, Sadik; Pramuanjaroenkij, Anchasa
2014-01-01
Intended for readers who have taken a basic heat transfer course and have a basic knowledge of thermodynamics, heat transfer, fluid mechanics, and differential equations, Convective Heat Transfer, Third Edition provides an overview of phenomenological convective heat transfer. This book combines applications of engineering with the basic concepts of convection. It offers a clear and balanced presentation of essential topics using both traditional and numerical methods. The text addresses emerging science and technology matters, and highlights biomedical applications and energy technologies. What’s New in the Third Edition: Includes updated chapters and two new chapters on heat transfer in microchannels and heat transfer with nanofluids Expands problem sets and introduces new correlations and solved examples Provides more coverage of numerical/computer methods The third edition details the new research areas of heat transfer in microchannels and the enhancement of convective heat transfer with nanofluids....
DEFF Research Database (Denmark)
Skiba, U.; Drewer, J.; Tang, Y.S.
2009-01-01
The NitroEurope project aims to improve understanding of the nitrogen (N) cycle at the continental scale and quantify the major fluxes of reactive N by a combination of reactive N measurements and modelling activities. As part of the overall measurement strategy, a network of 13 flux ‘super sites...
Høyerby, Mikkel Christian Wendelboe; Andersen, Michael A. E.
2005-01-01
This paper presents a low-cost analogue control scheme for class-D audio power amplifiers. The scheme is based around bandpass current-mode (BPCM) control, and provides ample stability margins and low distortion over a wide range of operating conditions. Implementation is very simple and does not require the use of operational amplifiers. Small-signal behavior of the controller is accurately predicted, and design is carried out using standard transfer function based linear control methodology...
SUNDÉN, B
2012-01-01
Presenting the basic mechanisms for transfer of heat, Introduction to Heat Transfer gives a deeper and more comprehensive view than existing titles on the subject. Derivation and presentation of analytical and empirical methods are provided for calculation of heat transfer rates and temperature fields as well as pressure drop. The book covers thermal conduction, forced and natural laminar and turbulent convective heat transfer, thermal radiation including participating media, condensation, evaporation and heat exchangers.
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.
He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk
2014-10-01
The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.
A New Adaptive Hungarian Mating Scheme in Genetic Algorithms
Directory of Open Access Journals (Sweden)
Chanju Jung
2016-01-01
Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings
Directory of Open Access Journals (Sweden)
Caixue Zhou
2017-01-01
Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.
Switched-based interference reduction scheme for open-access overlaid cellular networks
Radaydeh, Redha Mahmoud Mesleh
2012-06-01
Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.
An Efficient Diffusion Scheme for Chaos-Based Digital Image Encryption
Directory of Open Access Journals (Sweden)
Jun-xin Chen
2014-01-01
Full Text Available In recent years, amounts of permutation-diffusion architecture-based image cryptosystems have been proposed. However, the key stream elements in the diffusion procedure are merely depending on the secret key that is usually fixed during the whole encryption process. Cryptosystems of this type suffer from unsatisfactory encryption speed and are considered insecure upon known/chosen plaintext attacks. In this paper, an efficient diffusion scheme is proposed. This scheme consists of two diffusion procedures, with a supplementary diffusion procedure padded after the normal diffusion. In the supplementary diffusion module, the control parameter of the selected chaotic map is altered by the resultant image produced after the normal diffusion operation. As a result, a slight difference in the plain image can be transferred to the chaotic iteration and bring about distinct key streams, and hence totally different cipher images will be produced. Therefore, the scheme can remarkably accelerate the diffusion effect of the cryptosystem and will effectively resist known/chosen plaintext attacks. Theoretical analyses and experimental results prove the high security performance and satisfactory operation efficiency of the proposed scheme.
Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks
Directory of Open Access Journals (Sweden)
Ying Zhang
2016-01-01
Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.
A method of LED free-form tilted lens rapid modeling based on scheme language
Dai, Yidan
2017-10-01
According to nonimaging optical principle and traditional LED free-form surface lens, a new kind of LED free-form tilted lens was designed. And a method of rapid modeling based on Scheme language was proposed. The mesh division method was applied to obtain the corresponding surface configuration according to the character of the light source and the desired energy distribution on the illumination plane. Then 3D modeling software and the Scheme language programming are used to generate lens model respectively. With the help of optical simulation software, a light source with the size of 1mm*1mm*1mm in volume is used in experiment, and the lateral migration distance of illumination area is 0.5m, in which total one million rays are computed. We could acquire the simulated results of both models. The simulated output result shows that the Scheme language can prevent the model deformation problems caused by the process of the model transfer, and the degree of illumination uniformity is reached to 82%, and the offset angle is 26°. Also, the efficiency of modeling process is greatly increased by using Scheme language.
Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.
Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei
2016-01-29
In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.
A Fuzzy Commitment Scheme with McEliece's Cipher
Directory of Open Access Journals (Sweden)
Deo Brat Ojha
2010-04-01
Full Text Available In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one of the interesting candidates for post quantum cryptography. Hence our interest to deal with this system with fuzzy commitment scheme. The concept itself is illustrated with the help of a simple situation and the validation of mathematical experimental verification is provided.
Color encryption scheme based on adapted quantum logistic map
Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.
2014-04-01
This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.
Quantum Communication Scheme Using Non-symmetric Quantum Channel
International Nuclear Information System (INIS)
Cao Haijing; Chen Zhonghua; Song Heshan
2008-01-01
A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel
Intramolecular Energy Transfer, Charge Transfer & Hydrogen Bond
Indian Academy of Sciences (India)
Ultrafast Dynamics of Chemical Reactions in Condensed Phase: Intramolecular Energy Transfer, Charge Transfer & Hydrogen Bond · PowerPoint Presentation · Slide 3 · Slide 4 · Slide 5 · Slide 6 · Slide 7 · Slide 8 · Slide 9 · Slide 10 · Slide 11 · Slide 12 · Slide 13 · Slide 14 · Slide 15 · Slide 16 · Slide 17 · Slide 18 · Slide 19.
Not Available
1980-03-07
A heat transfer system for a nuclear reactor is described. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.
International Nuclear Information System (INIS)
Bernstein, I.
1978-01-01
A nuclear fuel transfer machine for transferring fuel assemblies through the fuel transfer tube of a nuclear power generating plant containment structure is described. A conventional reversible drive cable is attached to the fuel transfer carriage to drive it horizontally through the tube. A shuttle carrying a sheave at each end is arranged in parallel with the carriage to also travel into the tube. The cable cooperating with the sheaves permit driving a relatively short fuel transfer carriage a large distance without manually installing sheaves or drive apparatus in the tunnel. 8 claims, 3 figures
Cannon, R D
2013-01-01
Electron Transfer Reactions deals with the mechanisms of electron transfer reactions between metal ions in solution, as well as the electron exchange between atoms or molecules in either the gaseous or solid state. The book is divided into three parts. Part 1 covers the electron transfer between atoms and molecules in the gas state. Part 2 tackles the reaction paths of oxidation states and binuclear intermediates, as well as the mechanisms of electron transfer. Part 3 discusses the theories and models of the electron transfer process; theories and experiments involving bridged electron transfe
A practicable γ5-scheme in dimensional regularization
International Nuclear Information System (INIS)
Koerner, J.G.; Kreimer, D.; Schilcher, K.
1991-08-01
We present a new simple Υ 5 regularization scheme. We discuss its use in the standard radiative correction calculations including the anomaly contributions. The new scheme features an anticommuting Υ 5 which leads to great simplifications in practical calculations. We carefully discuss the underlying mathematics of our Υ 5 -scheme which is formulated in terms of simple projection operations. (orig.)
Digital Signature Schemes with Complementary Functionality and Applications
S. N. Kyazhin
2012-01-01
Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.
A combined spectrum sensing and OFDM demodulation scheme
Heskamp, M.; Slump, Cornelis H.
2009-01-01
In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation
Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme
Ingvarson, Lawrence
2009-01-01
The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…
On doublet composite schemes of leptons and quarks
International Nuclear Information System (INIS)
Pirogov, Yu.F.
1981-01-01
All simplest doublet composite schemes are classified. Four different doublet schemes are shown to be available. A new scheme with charge doublet Q=(2/3, -1/3) rather advantageous as compared with the previous ones is being considered. Some difficulties in interpreting the colour as an effective symmetry are pointed out [ru
Finite Difference Schemes as Algebraic Correspondences between Layers
Malykh, Mikhail; Sevastianov, Leonid
2018-02-01
For some differential equations, especially for Riccati equation, new finite difference schemes are suggested. These schemes define protective correspondences between the layers. Calculation using these schemes can be extended to the area beyond movable singularities of exact solution without any error accumulation.
Schemes for Greenberger-Horne-Zeilinger and cluster state preparation
International Nuclear Information System (INIS)
Song Jie; Xia Yan; Song Heshan
2008-01-01
Schemes to generate Greenberger-Horne-Zeilinger (GHZ) and cluster states of three atoms are proposed in a two-mode cavity. The advantages of the schemes are their robustness against decoherence due to spontaneous emission of the excited states and decay of the cavity modes. Moreover, the schemes can be generalized to generate N-atom entangled states
Handover Based IMS Registration Scheme for Next Generation Mobile Networks
Directory of Open Access Journals (Sweden)
Shireen Tahira
2017-01-01
Full Text Available Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.
Numerical Schemes for Rough Parabolic Equations
Energy Technology Data Exchange (ETDEWEB)
Deya, Aurelien, E-mail: deya@iecn.u-nancy.fr [Universite de Nancy 1, Institut Elie Cartan Nancy (France)
2012-04-15
This paper is devoted to the study of numerical approximation schemes for a class of parabolic equations on (0,1) perturbed by a non-linear rough signal. It is the continuation of Deya (Electron. J. Probab. 16:1489-1518, 2011) and Deya et al. (Probab. Theory Relat. Fields, to appear), where the existence and uniqueness of a solution has been established. The approach combines rough paths methods with standard considerations on discretizing stochastic PDEs. The results apply to a geometric 2-rough path, which covers the case of the multidimensional fractional Brownian motion with Hurst index H>1/3.
Cryptanalysis of Two Fault Countermeasure Schemes
DEFF Research Database (Denmark)
Banik, Subhadeep; Bogdanov, Andrey
2015-01-01
function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...... is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...
A general scheme for obtaining graviton spectrums
International Nuclear Information System (INIS)
GarcIa-Cuadrado, G
2006-01-01
The aim of this contribution is to present a general scheme for obtaining graviton spectra from modified gravity theories, based on a theory developed by Grishchuk in the mid 1970s. We try to be pedagogical, putting in order some basic ideas in a compact procedure and also giving a review of the current trends in this arena. With the aim to fill a gap for the interface between quantum field theorists and observational cosmologist in this matter, we highlight two interesting applications to cosmology: clues as to the nature of dark energy; and the possibility of reconstruction of the scalar potential in scalar-tensor gravity theories
Pay-what-you-want pricing schemes
DEFF Research Database (Denmark)
Kahsay, Goytom Abraha; Samahita, Margaret
2015-01-01
Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular. We develop a model incorporating self-image into the buyer’s utility function and introduce heterogeneity in consumption utility and image-sensitivity, generating different purchase decisions and optimal prices across...... individuals. When a good’s fixed price is lower than a threshold fair value, PWYW can lead to a lower utility. This may result in a lower purchase rate and higher average price, accounting for previously unexplained field experimental evidence. An increase in the threshold value decreases the buyer’s utility...... and may further lower the purchase rate, resulting in a further increase in purchase price....
Investigation of a monochromator scheme for SPEAR
International Nuclear Information System (INIS)
Wille, K.; Chao, A.W.
1984-08-01
The possibility of mono-chromatizing SPEAR for the purpose of increasing the hadronic event rate at the narrow resonances was investigated. By using two pairs of electostatic skew quads in monochromator scheme it is found that the event rate can be increased by a factor of 2 for the mini beta optics assuming the luminosity is kept unchanged. An attempt to increase this enhancement factor by major rearrangements of the ring magnets has encountered serious optical difficulties; although enhancement factor of 8 seems possible in principle, this alternative is not recommended
SCHEME ANALYSIS TREE DIMENSIONS AND TOLERANCES PROCESSING
Directory of Open Access Journals (Sweden)
Constanta RADULESCU
2011-07-01
Full Text Available This paper presents one of the steps that help us to determine the optimal tolerances depending on thetechnological capability of processing equipment. To determine the tolerances in this way is necessary to takethe study and to represent schematically the operations are used in technological process of making a piece.Also in this phase will make the tree diagram of the dimensions and machining tolerances, dimensions andtolerances shown that the design execution. Determination processes, and operations of the dimensions andtolerances tree scheme will make for a machined piece is both indoor and outdoor.
Small hydro schemes in Turtmanntal, Switzerland
International Nuclear Information System (INIS)
2008-01-01
This two-part report for the Swiss Federal Office of Energy (SFOE) presents several variants and two preliminary projects with respect to schemes for the use of hydropower in the Turtmanntal valley in the Swiss Alps. The various possible sites for the power stations both on the left and right-hand sides of the main valley are described. Technical details and prognoses for costs and energy production are discussed for all these variants. In the second part of the report, preliminary projects for hydropower installations on the Braendji and Piji streams are presented. Costs and economic viability are discussed and time-scales for the realisation are examined.
A Classification Scheme for Glaciological AVA Responses
Booth, A.; Emir, E.
2014-12-01
A classification scheme is proposed for amplitude vs. angle (AVA) responses as an aid to the interpretation of seismic reflectivity in glaciological research campaigns. AVA responses are a powerful tool in characterising the material properties of glacier ice and its substrate. However, before interpreting AVA data, careful true amplitude processing is required to constrain basal reflectivity and compensate amplitude decay mechanisms, including anelastic attenuation and spherical divergence. These fundamental processing steps can be difficult to design in cases of noisy data, e.g. where a target reflection is contaminated by surface wave energy (in the case of shallow glaciers) or by energy reflected from out of the survey plane. AVA methods have equally powerful usage in estimating the fluid fill of potential hydrocarbon reservoirs. However, such applications seldom use true amplitude data and instead consider qualitative AVA responses using a well-defined classification scheme. Such schemes are often defined in terms of the characteristics of best-fit responses to the observed reflectivity, e.g. the intercept (I) and gradient (G) of a linear approximation to the AVA data. The position of the response on a cross-plot of I and G then offers a diagnostic attribute for certain fluid types. We investigate the advantages in glaciology of emulating this practice, and develop a cross-plot based on the 3-term Shuey AVA approximation (using I, G, and a curvature term C). Model AVA curves define a clear lithification trend: AVA responses to stiff (lithified) substrates fall discretely into one quadrant of the cross-plot, with positive I and negative G, whereas those to fluid-rich substrates plot diagonally opposite (in the negative I and positive G quadrant). The remaining quadrants are unoccupied by plausible single-layer responses and may therefore be diagnostic of complex thin-layer reflectivity, and the magnitude and polarity of the C term serves as a further indicator
Simplified scheme or radioactive plume calculations
International Nuclear Information System (INIS)
Gibson, T.A.; Montan, D.N.
1976-01-01
A simplified mathematical scheme to estimate external whole-body γ radiation exposure rates from gaseous radioactive plumes was developed for the Rio Blanco Gas Field Nuclear Stimulation Experiment. The method enables one to calculate swiftly, in the field, downwind exposure rates knowing the meteorological conditions and γ radiation exposure rates measured by detectors positioned near the plume source. The method is straightforward and easy to use under field conditions without the help of mini-computers. It is applicable to a wide range of radioactive plume situations. It should be noted that the Rio Blanco experiment was detonated on May 17, 1973, and no seep or release of radioactive material occurred
Secure Biometric E-Voting Scheme
Ahmed, Taha Kh.; Aborizka, Mohamed
The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.
Addressing Longevity’ Heterogeneity in Pension Scheme Design
Ayuso, Mercedes; Bravo, Jorge Miguel; Holzmann, Robert
2017-01-01
Ayuso, M., Bravo, J. M., & Holzmann, R. (2017). Addressing Longevity’ Heterogeneity in Pension Scheme Design. Journal of Finance and Economics, 6(1), 1-21. DOI: 10.12735/jfe.v6n1p1 This paper demonstrates that the link between heterogeneity in longevity and lifetime income across countries is mostly high and often increasing; that it translates into an implicit tax/subsidy, with rates reaching 20 percent and higher in some countries; that such rates risk perverting redistributive objective...
New Financing Schemes of Public Infrastructure
Directory of Open Access Journals (Sweden)
Ignacio de la Riva
2017-01-01
Full Text Available Public works procurements and concessions are traditional legal techniques used to shape the financing of public infrastructure. Fiscal constraints faced by public administrations at the end of the 20th century, and the subsequent increase of private participation in the provision of public goods and services, encouraged the development of new legal schemes allowing a higher degree of private investment in public infrastructure; such as Public Private Partnerships, project finance, securitizations, the shadow toll, turn-key agreements, public leasing and public trusts.
Opportunistic-harvesting: RF wireless power transfer scheme for multiple access relays system
Rajaram, A.; Jayakody, D.N.K.; Srinivasan, K.; Chen, B.; Sharma, V.
2017-01-01
Wireless communications have become one of the main stake holders on which our contemporary world relies for carrying out many daily activities. In this era, the number of connected devices is increasing rapidly, contemplating not only smart phone, but also growing connectivity of machines, sensors,
Transfer function combinations
Zhou, Liang; Schott, Mathias; Hansen, Charles
2012-01-01
Direct volume rendering has been an active area of research for over two decades. Transfer function design remains a difficult task since current methods, such as traditional 1D and 2D transfer functions, are not always effective for all data sets. Various 1D or 2D transfer function spaces have been proposed to improve classification exploiting different aspects, such as using the gradient magnitude for boundary location and statistical, occlusion, or size metrics. In this paper, we present a novel transfer function method which can provide more specificity for data classification by combining different transfer function spaces. In this work, a 2D transfer function can be combined with 1D transfer functions which improve the classification. Specifically, we use the traditional 2D scalar/gradient magnitude, 2D statistical, and 2D occlusion spectrum transfer functions and combine these with occlusion and/or size-based transfer functions to provide better specificity. We demonstrate the usefulness of the new method by comparing to the following previous techniques: 2D gradient magnitude, 2D occlusion spectrum, 2D statistical transfer functions and 2D size based transfer functions. © 2012 Elsevier Ltd.
International Nuclear Information System (INIS)
Hasatani, Masanobu; Itaya, Yoshinori
1985-01-01
In order to develop energy-saving techniques and new energy techniques, and also most advanced techniques by making industrial equipment with high performance, heat transfer performance frequently becomes an important problem. In addition, the improvement of conventional heat transfer techniques and the device of new heat transfer techniques are often required. It is most proper that chemical engineers engage in the research and development for enhancing heat transfer. The research and development for enhancing heat transfer are important to heighten heat exchange efficiency or to cool equipment for preventing overheat in high temperature heat transfer system. In this paper, the techniques of enhancing radiative heat transfer and the improvement of radiative heat transfer characteristics are reported. Radiative heat transfer is proportional to fourth power of absolute temperature, and it does not require any heat transfer medium, but efficient heat-radiation converters are necessary. As the techniques of enhancing radiative heat transfer, the increase of emission and absorption areas, the installation of emissive structures and the improvement of radiative characteristics are discussed. (Kako, I.)
Transfer function combinations
Zhou, Liang
2012-10-01
Direct volume rendering has been an active area of research for over two decades. Transfer function design remains a difficult task since current methods, such as traditional 1D and 2D transfer functions, are not always effective for all data sets. Various 1D or 2D transfer function spaces have been proposed to improve classification exploiting different aspects, such as using the gradient magnitude for boundary location and statistical, occlusion, or size metrics. In this paper, we present a novel transfer function method which can provide more specificity for data classification by combining different transfer function spaces. In this work, a 2D transfer function can be combined with 1D transfer functions which improve the classification. Specifically, we use the traditional 2D scalar/gradient magnitude, 2D statistical, and 2D occlusion spectrum transfer functions and combine these with occlusion and/or size-based transfer functions to provide better specificity. We demonstrate the usefulness of the new method by comparing to the following previous techniques: 2D gradient magnitude, 2D occlusion spectrum, 2D statistical transfer functions and 2D size based transfer functions. © 2012 Elsevier Ltd.
DEFF Research Database (Denmark)
Bateman, I.J.; Brouwer, R.; Ferrini, S.
We develop and test guidance principles for benefits transfers. These argue that when transferring across relatively similar sites, simple mean value transfers are to be preferred but that when sites are relatively dissimilar then value function transfers will yield lower errors. The paper also...... provides guidance on the appropriate specification of transferable value functions arguing that these should be developed from theoretical rather than ad-hoc statistical principles. These principles are tested via a common format valuation study of water quality improvements across five countries. Results...... support our various hypotheses providing a set of principles for future transfer studies. The application also considers new ways of incorporating distance decay, substitution and framing effects within transfers and presents a novel water quality ladder....
DEFF Research Database (Denmark)
Yoshida, Hiroko; Clavreul, Julie; Scheutz, Charlotte
2014-01-01
on existing emission and operational data, which are gathered under either compulsory monitoring or reporting requirements under law. In this study, an LCA was conducted using three input data sources: Information compiled under compulsory disclosure requirements (the European Pollutant Release and Transfer......, an LCA based on the data collection scheme underestimates impact potential due to limitations of substance coverage. Besides differences between data collection schemes, the results showed that 3-13,500% of the impacts came from background systems, such as from the provisioning of fuel, electricity......, and chemicals, which do not need to be disclosed currently under E-PRTR. The incidental release of pollutants was also assessed by employing a scenario-based approach, the results of which demonstrated that these non-routine emissions could increase overall WWTP greenhouse gas emissions by between 113 and 210...
Numerical Modeling of Ablation Heat Transfer
Ewing, Mark E.; Laker, Travis S.; Walker, David T.
2013-01-01
A unique numerical method has been developed for solving one-dimensional ablation heat transfer problems. This paper provides a comprehensive description of the method, along with detailed derivations of the governing equations. This methodology supports solutions for traditional ablation modeling including such effects as heat transfer, material decomposition, pyrolysis gas permeation and heat exchange, and thermochemical surface erosion. The numerical scheme utilizes a control-volume approach with a variable grid to account for surface movement. This method directly supports implementation of nontraditional models such as material swelling and mechanical erosion, extending capabilities for modeling complex ablation phenomena. Verifications of the numerical implementation are provided using analytical solutions, code comparisons, and the method of manufactured solutions. These verifications are used to demonstrate solution accuracy and proper error convergence rates. A simple demonstration of a mechanical erosion (spallation) model is also provided to illustrate the unique capabilities of the method.
Computational Approach to Electron Charge Transfer Reactions
DEFF Research Database (Denmark)
Jónsson, Elvar Örn
-molecular mechanics scheme, and tools to analyse statistical data and generate relative free energies and free energy surfaces. The methodology is applied to several charge transfer species and reactions in chemical environments - chemical in the sense that solvent, counter ions and substrate surfaces are taken...... in to account - which directly influence the reactants and resulting reaction through both physical and chemical interactions. All methods are though general and can be applied to different types of chemistry. First, the basis of the various theoretical tools is presented and applied to several test systems...... and asymmetric charge transfer reactions between several first-row transition metals in water. The results are compared to experiments and rationalised with classical analytic expressions. Shortcomings of the methods are accounted for with clear steps towards improved accuracy. Later the analysis is extended...
Password Authentication Based on Fractal Coding Scheme
Directory of Open Access Journals (Sweden)
Nadia M. G. Al-Saidi
2012-01-01
Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.
Finite-difference schemes for anisotropic diffusion
Energy Technology Data Exchange (ETDEWEB)
Es, Bram van, E-mail: es@cwi.nl [Centrum Wiskunde and Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands)
2014-09-01
In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.
Studies of the plasma droplet accelerator scheme
International Nuclear Information System (INIS)
Mori, W.B.; Joshi, C.; Dawson, J.M.; Lee, K.; Forslund, D.W.; Kindel, J.M.
1985-01-01
In the plasma droplet accelerator scheme, proposed by R. Palmer, a sequence of liquid micro-spheres generated by a jet printer are ionized by an incoming intense laser. The hope is that the micro-spheres now acting as conducting balls will allow efficient coupling of the incoming laser radiation into an accelerating mode. Motivated by this the authors have carried out 2D, particle simulations in order to answer some of the plasma physics questions hitherto unaddressed. In particular they find that at least for laser intensities exceeding v 0 /c=0.03 (/sup ∼/10 13 w/cm 2 for a CO 2 laser), the incident laser light is rather efficiently absorbed in a hot electron distribution. Up to 70% of the incident energy can be absorbed by these electrons which rapidly expand and fill the vacuum space between the microspheres with a low density plasma. These results indicate that it is advisable to stay clear of plasma formation and thus put on an upper limit on the maximum surface fields that can be tolerated in the droplet-accelerator scheme
Studies of the plasma droplet accelerator scheme
International Nuclear Information System (INIS)
Mori, W.B.; Dawson, J.M.; Forslund, D.W.; Joshi, C.; Kindel, J.M.; Lee, K.
1985-01-01
In the plasma droplet accelerator scheme, proposed by R. Palmer, a sequence of liquid micro-spheres generated by a jet printer are ionized by an incoming intense laser. The hope is that the micro-spheres now acting as conducting balls will allow efficient coupling of the incoming laser radiation into an accelerating mode. Motivated by this we have carried out 2D, particle simulations in order to answer some of the plasma physics questions hitherto unaddressed. In particular we find that at least for laser intensities exceeding v /SUB o/ /c=0.03 ( about10 13 w/cm 2 for a CO 2 laser), the incident laser light is rather efficiently absorbed in a hot electron distribution. Up to 70% of the incident energy can be absorbed by these electrons which rapidly expand and fill the vacuum space between the microspheres with a low density plasma. These results indicate that it is advisable to stay clear of plasma formation and thus put on an upper limit on the maximum surface fields that can be tolerated in the droplet-accelerator scheme
Privacy protection schemes for fingerprint recognition systems
Marasco, Emanuela; Cukic, Bojan
2015-05-01
The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.
Lightweight SIP/SDP compression scheme (LSSCS)
Wu, Jian J.; Demetrescu, Cristian
2001-10-01
In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.
Special Semaphore Scheme for UHF Spacecraft Communications
Butman, Stanley; Satorius, Edgar; Ilott, Peter
2006-01-01
A semaphore scheme has been devised to satisfy a requirement to enable ultrahigh- frequency (UHF) radio communication between a spacecraft descending from orbit to a landing on Mars and a spacecraft, in orbit about Mars, that relays communications between Earth and the lander spacecraft. There are also two subsidiary requirements: (1) to use UHF transceivers, built and qualified for operation aboard the spacecraft that operate with residual-carrier binary phase-shift-keying (BPSK) modulation at a selectable data rate of 8, 32, 128, or 256 kb/s; and (2) to enable low-rate signaling even when received signals become so weak as to prevent communication at the minimum BPSK rate of 8 kHz. The scheme involves exploitation of Manchester encoding, which is used in conjunction with residual-carrier modulation to aid the carrier-tracking loop. By choosing various sequences of 1s, 0s, or 1s alternating with 0s to be fed to the residual-carrier modulator, one would cause the modulator to generate sidebands at a fundamental frequency of 4 or 8 kHz and harmonics thereof. These sidebands would constitute the desired semaphores. In reception, the semaphores would be detected by a software demodulator.
A subgrid parameterization scheme for precipitation
Directory of Open Access Journals (Sweden)
S. Turner
2012-04-01
Full Text Available With increasing computing power, the horizontal resolution of numerical weather prediction (NWP models is improving and today reaches 1 to 5 km. Nevertheless, clouds and precipitation formation are still subgrid scale processes for most cloud types, such as cumulus and stratocumulus. Subgrid scale parameterizations for water vapor condensation have been in use for many years and are based on a prescribed probability density function (PDF of relative humidity spatial variability within the model grid box, thus providing a diagnosis of the cloud fraction. A similar scheme is developed and tested here. It is based on a prescribed PDF of cloud water variability and a threshold value of liquid water content for droplet collection to derive a rain fraction within the model grid. Precipitation of rainwater raises additional concerns relative to the overlap of cloud and rain fractions, however. The scheme is developed following an analysis of data collected during field campaigns in stratocumulus (DYCOMS-II and fair weather cumulus (RICO and tested in a 1-D framework against large eddy simulations of these observed cases. The new parameterization is then implemented in a 3-D NWP model with a horizontal resolution of 2.5 km to simulate real cases of precipitating cloud systems over France.
Extended lattice Boltzmann scheme for droplet combustion.
Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas
2017-05-01
The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n-butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.
Single particle level scheme for alpha decay
International Nuclear Information System (INIS)
Mirea, M.
1998-01-01
The fine structure phenomenon in alpha decay was evidenced by Rosenblum. In this process the kinetic energy of the emitted particle has several determined values related to the structure of the parent and the daughter nucleus. The probability to find the daughter in a low lying state was considered strongly dependent on the spectroscopic factor defined as the square of overlap between the wave function of the parent in the ground state and the wave functions of the specific excited states of the daughter. This treatment provides a qualitative agreement with the experimental results if the variations of the penetrability between different excited states are neglected. Based on single particle structure during fission, a new formalism explained quantitatively the fine structure of the cluster decay. It was suggested that this formalism can be applied also to alpha decay. For this purpose, the first step is to construct the level scheme of this type of decay. Such a scheme, obtained with the super-asymmetric two-center potential, is plotted for the alpha decay of 223 Ra. It is interesting to note that, diabatically, the level with spin 3/2 emerging from 1i 11/2 (ground state of the parent) reaches an excited state of the daughter in agreement with the experiment. (author)
Present and future nuclear power financing schemes
International Nuclear Information System (INIS)
Diel, R.
1977-01-01
The financial requirement for nuclear power plants in the Federal Republic of Germany for the period up until 1985 was estimated to run up to some DM 100 billion already in the Nuclear Energy Study published by the Dresdner Bank in 1974. This figure is not changed in any way by the reduction the nuclear power program has suffered in the meantime, because the lower requirement for investment capital is more than offset by the price increases that have occurred meanwhile. A capital requirement in the order of DM 100 billion raises major problems for the power producing industry and the banks which, however, are not going to hamper the further expansion of nuclear power, because new financing schemes have been specially developed for the nuclear field. They include financing by leasing, the use of funds from real estate credit institutions for long term financing, borrowing of long term funds in the Euro market, and financing through subsidiaries of the utilities. The new financing schemes also apply to the large financial requirement associated with the nuclear fuel cycle, waste management in particular. In this sector the utilities agree to bear the economic risk of the companies implementing the respective projects. Accordingly, financing will not entail any major difficulties. Another area of great importance is export financing. The German-Brazilian nuclear agreement is a model of this instrument. (orig.) [de
International Nuclear Information System (INIS)
Beloshitsky, P.
1992-06-01
A versatile magnet lattice for a tau-charm factory is considered in this report. The main feature of this lattice is the possibility to use it for both standard flat beam scheme and beam monochromatization scheme. The detailed description of the lattice is given. The restrictions following the compatibility of both schemes are discussed
Enhanced arbitrated quantum signature scheme using Bell states
International Nuclear Information System (INIS)
Wang Chao; Liu Jian-Wei; Shang Tao
2014-01-01
We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme
Improvement of a Quantum Proxy Blind Signature Scheme
Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui
2018-06-01
Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.
A group signature scheme based on quantum teleportation
International Nuclear Information System (INIS)
Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu
2010-01-01
In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.
Quantum election scheme based on anonymous quantum key distribution
International Nuclear Information System (INIS)
Zhou Rui-Rui; Yang Li
2012-01-01
An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)
A group signature scheme based on quantum teleportation
Energy Technology Data Exchange (ETDEWEB)
Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)
2010-05-01
In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.
International Nuclear Information System (INIS)
Kim, Chang Hyun
1997-02-01
A simplified computational scheme for thermal analysis of the LWR spent fuel dry storage and transportation casks has been developed using two-step thermal analysis method incorporating effective thermal conductivity model for the homogenized spent fuel assembly. Although a lot of computer codes and analytical models have been developed for application to the fields of thermal analysis of dry storage and/or transportation casks, some difficulties in its analysis arise from the complexity of the geometry including the rod bundles of spent fuel and the heat transfer phenomena in the cavity of cask. Particularly, if the disk-type structures such as fuel baskets and aluminium heat transfer fins are included, the thermal analysis problems in the cavity are very complex. To overcome these difficulties, cylindrical coordinate system is adopted to calculate the temperature profile of a cylindrical cask body using the multiple cylinder model as the step-1 analysis of the present study. In the step-2 analysis, Cartesian coordinate system is adopted to calculate the temperature distributions of the disk-type structures such as fuel basket and aluminium heat transfer fin using three- dimensional conduction analysis model. The effective thermal conductivity for homogenized spent fuel assembly based on Manteufel and Todreas model is incorporated in step-2 analysis to predict the maximum fuel temperature. The presented two-step computational scheme has been performed using an existing HEATING 7.2 code and the effective thermal conductivity for the homogenized spent fuel assembly has been calculated by additional numerical analyses. Sample analyses of five cases are performed for NAC-STC including normal transportation condition to examine the applicability of the presented simplified computational scheme for thermal analysis of the large LWR spent fuel dry storage and transportation casks and heat transfer characteristics in the cavity of the cask with the disk-type structures
Estimating plume dispersion: a comparison of several sigma schemes
International Nuclear Information System (INIS)
Irwin, J.S.
1983-01-01
The lateral and vertical Gaussian plume dispersion parameters are estimated and compared with field tracer data collected at 11 sites. The dispersion parameter schemes used in this analysis include Cramer's scheme, suggested for tall stack dispersion estimates, Draxler's scheme, suggested for elevated and surface releases, Pasquill's scheme, suggested for interim use in dispersion estimates, and the Pasquill--Gifford scheme using Turner's technique for assigning stability categories. The schemes suggested by Cramer, Draxler and Pasquill estimate the dispersion parameters using onsite measurements of the vertical and lateral wind-velocity variances at the effective release height. The performances of these schemes in estimating the dispersion parameters are compared with that of the Pasquill--Gifford scheme, using the Prairie Grass and Karlsruhe data. For these two experiments, the estimates of the dispersion parameters using Draxler's scheme correlate better with the measurements than did estimates using the Pasquill--Gifford scheme. Comparison of the dispersion parameter estimates with the measurement suggests that Draxler's scheme for characterizing the dispersion results in the smallest mean fractional error in the estimated dispersion parameters and the smallest variance of the fractional errors
Ionic character of polar crystals: An extended Mulliken scheme for electronegativities
International Nuclear Information System (INIS)
Watson, R.E.; Bennett, L.H.; Davenport, J.W.
1983-01-01
The total energy of an atom can be expressed in terms of the charge q on the atom as E(q) = E(0)+αq+βq 2 +γq 3 . It is shown that the expected charge transfer q, which brings the intra-atomic energy of the atoms to a minimum, between otherwise isolated noninteracting atoms, is proportional to the difference in the α's of the constituent elements, i.e., q = c Δα. Thus α provides a well-defined electronegativity scale, and if the third-order term γq 3 may be neglected, then α = Phi/sub m/, which is the original Mulliken scale. The quadratic term βq 2 acts to oppose charge transfer, and therefore the coefficient c, relating q to Δα, depends on what elements are involved and on their relative concentration in a well-defined manner. This implies an asymmetry in charge transfer with concentration. Spectroscopic data indicate that γ, though small, is not negligible and, in such a case Phi/sub m/ is not a proper electronegativity. The extended Mulliken scheme, involving α and β, is relevant to the energetics of charge transfer and hence to the ionic character of insulating and semiconducting compounds. It allows simple baseline estimates to be made of such character. Other factors contribute to charge transfer and some of the complications associated with transition-metal compound formation are explored
A numerical scheme for the generalized Burgers–Huxley equation
Directory of Open Access Journals (Sweden)
Brajesh K. Singh
2016-10-01
Full Text Available In this article, a numerical solution of generalized Burgers–Huxley (gBH equation is approximated by using a new scheme: modified cubic B-spline differential quadrature method (MCB-DQM. The scheme is based on differential quadrature method in which the weighting coefficients are obtained by using modified cubic B-splines as a set of basis functions. This scheme reduces the equation into a system of first-order ordinary differential equation (ODE which is solved by adopting SSP-RK43 scheme. Further, it is shown that the proposed scheme is stable. The efficiency of the proposed method is illustrated by four numerical experiments, which confirm that obtained results are in good agreement with earlier studies. This scheme is an easy, economical and efficient technique for finding numerical solutions for various kinds of (nonlinear physical models as compared to the earlier schemes.
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Directory of Open Access Journals (Sweden)
Jun-Sub Kim
2013-01-01
Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.
Hilbert schemes of points and infinite dimensional Lie algebras
Qin, Zhenbo
2018-01-01
Hilbert schemes, which parametrize subschemes in algebraic varieties, have been extensively studied in algebraic geometry for the last 50 years. The most interesting class of Hilbert schemes are schemes X^{[n]} of collections of n points (zero-dimensional subschemes) in a smooth algebraic surface X. Schemes X^{[n]} turn out to be closely related to many areas of mathematics, such as algebraic combinatorics, integrable systems, representation theory, and mathematical physics, among others. This book surveys recent developments of the theory of Hilbert schemes of points on complex surfaces and its interplay with infinite dimensional Lie algebras. It starts with the basics of Hilbert schemes of points and presents in detail an example of Hilbert schemes of points on the projective plane. Then the author turns to the study of cohomology of X^{[n]}, including the construction of the action of infinite dimensional Lie algebras on this cohomology, the ring structure of cohomology, equivariant cohomology of X^{[n]} a...
A simple language to script and simulate breeding schemes: the breeding scheme language
It is difficult for plant breeders to determine an optimal breeding strategy given that the problem involves many factors, such as target trait genetic architecture and breeding resource availability. There are many possible breeding schemes for each breeding program. Although simulation study may b...
Furniture and Timber Training Board, Fourth Year's Scheme; Training Grants Scheme, 1969-70.
British Furniture and Timber Training Board, Wembly (England).
This booklet explains what training grants are offered by the Furniture and Timber Training Board of Great Britain, indicates how to claim them, and outlines the Board's training philosophy. Foldouts present conditions which apply in whole or in part to the Training Grants Scheme, followed by guidelines for completing forms. The main section…
The Performance-based Funding Scheme of Universities
Directory of Open Access Journals (Sweden)
Juha KETTUNEN
2016-05-01
Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally
Wireless adiabatic power transfer
International Nuclear Information System (INIS)
Rangelov, A.A.; Suchowski, H.; Silberberg, Y.; Vitanov, N.V.
2011-01-01
Research highlights: → Efficient and robust mid-range wireless energy transfer between two coils. → The adiabatic energy transfer is analogous to adiabatic passage in quantum optics. → Wireless energy transfer is insensitive to any resonant constraints. → Wireless energy transfer is insensitive to noise in the neighborhood of the coils. - Abstract: We propose a technique for efficient mid-range wireless power transfer between two coils, by adapting the process of adiabatic passage for a coherently driven two-state quantum system to the realm of wireless energy transfer. The proposed technique is shown to be robust to noise, resonant constraints, and other interferences that exist in the neighborhood of the coils.
Radioecology. Transfers of radioelements
International Nuclear Information System (INIS)
Foulquier, L.
2002-01-01
The study of the cycle of radioelements in the environment requires the measurement of the radionuclides present in all parts of the ecosystems. The knowledge of the mechanisms of radioactive pollutant transfers and of the kinetics of the exchanges between a source term, the vectors and the constituents of the biosphere represents heart of the work of radio-ecologists. This article describes briefly the techniques used for the measurement of radionuclides in the environment and for the study of their physical dispersion mechanisms. Then, it treats more carefully of the transfer mechanisms in different environments: 1 - tools for the evaluation of transfers: metrology, atmospheric and liquid dispersion phenomena; 2 - processes of radioelement transfers: transfers in aquatic ecosystems, transfers in terrestrial environment. (J.S.)
An efficient compression scheme for bitmap indices
Energy Technology Data Exchange (ETDEWEB)
Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie
2004-04-13
When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time
Franchise Bidding in the Water Industry- Auction Schemes and Investment Incentives
Urs Meister
2004-01-01
The periodical re-auction of a water monopoly concession causes the danger of underinvestment. If the life-time of specific assets such as water pipes exceeds the contract length and transferring the ownership of assets is difficult, the incumbent franchisee faces a hold-up problem. Using a simple auction model that considers the specifics of the piped water sector this paper shows that investment incentives may vary depending on the applied auction scheme. The model is designed as a two stag...
International Nuclear Information System (INIS)
Oberlin, J.C.; Frick, G.; Kempfer, C.; North, C.
1988-09-01
The state of work on the Vivitron gas transfer system and the system functions are summarized. The system has to: evacuate the Vivitron reservoir; transfer gas from storage tanks to the Vivitron; recirculate gas during operation; transfer gas from the Vivitron to storage tanks; and assure air input. The system is now being installed. Leak alarms are given by SF6 detectors, which set off a system of forced ventilation. Another system continuously monitors the amount of SF6 in the tanks [fr
Transfer vibration through spine
Benyovszky, Adam
2012-01-01
Transfer Vibration through Spine Abstract In the bachelor project we deal with the topic of Transfer Vibration through Spine. The problem of TVS is trying to be solved by the critical review method. We analyse some diagnostic methods and methods of treatment based on this principle. Close attention is paid to the method of Transfer Vibration through Spine that is being currently solved by The Research Institute of Thermomechanics in The Czech Academy of Sciences in cooperation with Faculty of...
A security scheme of SMS system
Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck
2005-02-01
With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.
Nonparametric Transfer Function Models
Liu, Jun M.; Chen, Rong; Yao, Qiwei
2009-01-01
In this paper a class of nonparametric transfer function models is proposed to model nonlinear relationships between ‘input’ and ‘output’ time series. The transfer function is smooth with unknown functional forms, and the noise is assumed to be a stationary autoregressive-moving average (ARMA) process. The nonparametric transfer function is estimated jointly with the ARMA parameters. By modeling the correlation in the noise, the transfer function can be estimated more efficiently. The parsimonious ARMA structure improves the estimation efficiency in finite samples. The asymptotic properties of the estimators are investigated. The finite-sample properties are illustrated through simulations and one empirical example. PMID:20628584
Bacon, D H
2013-01-01
Basic Heat Transfer aims to help readers use a computer to solve heat transfer problems and to promote greater understanding by changing data values and observing the effects, which are necessary in design and optimization calculations.The book is concerned with applications including insulation and heating in buildings and pipes, temperature distributions in solids for steady state and transient conditions, the determination of surface heat transfer coefficients for convection in various situations, radiation heat transfer in grey body problems, the use of finned surfaces, and simple heat exc
Containment condensing heat transfer
International Nuclear Information System (INIS)
Gido, R.G.; Koestel, A.
1983-01-01
This report presents a mechanistic heat-transfer model that is valid for large scale containment heat sinks. The model development is based on the determination that the condensation is controlled by mass diffusion through the vapor-air boundary layer, and the application of the classic Reynolds' analogy to formulate expressions for the transfer of heat and mass based on hydrodynamic measurements of the momentum transfer. As a result, the analysis depends on the quantification of the shear stress (momentum transfer) at the interface between the condensate film and the vapor-air boundary layer. In addition, the currently used Tagami and Uchida test observations and their range of applicability are explained
Simon, E.; Meixner, F.X.; Ganzeveld, L.N.; Kesselmeier, J.
2005-01-01
Detailed one-dimensional multilayer biosphere-atmosphere models, also referred to as CANVEG models, are used for more than a decade to describe coupled water-carbon exchange between the terrestrial vegetation and the lower atmosphere. Within the present study, a modified CANVEG scheme is described.
Introduction to the theory of schemes
Manin, Yuri I
2018-01-01
This English edition of Yuri I. Manin's well-received lecture notes provides a concise but extremely lucid exposition of the basics of algebraic geometry and sheaf theory. The lectures were originally held in Moscow in the late 1960s, and the corresponding preprints were widely circulated among Russian mathematicians. This book will be of interest to students majoring in algebraic geometry and theoretical physics (high energy physics, solid body, astrophysics) as well as to researchers and scholars in these areas. "This is an excellent introduction to the basics of Grothendieck's theory of schemes; the very best first reading about the subject that I am aware of. I would heartily recommend every grad student who wants to study algebraic geometry to read it prior to reading more advanced textbooks." - Prof. Alexander Beilinson.
Pay-what-you-want pricing schemes
DEFF Research Database (Denmark)
Kahsay, Goytom Abraha; Samahita, Margaret
this threshold, however, PWYW can lead to a lower utility. This may result in a lower purchase rate and higher average price, in line with previously unexplained evidence from field experiments. Moreover, an increase in the threshold value decreases the buyer's utility and may further lower the purchase rate......Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular in a wide range of industries. We develop a model incorporating self-image into the buyer's utility function and introduce heterogeneity in consumption utility and image-sensitivity, which generates different purchase...... decisions and optimal prices across individuals. When a good is sold at a fixed price higher than a threshold value, a price that the individual thinks is fair, the adoption of PWYW increases his utility and hence results in a weakly higher purchase rate. When a good is sold at a fixed price lower than...
International Nuclear Information System (INIS)
Yang, W.F.; Yuan, S.G.; Fang, K.M.; Shen, S.F.; Mou, W.T.; Zhang, X.Q.; Li, Z.Q.
1997-01-01
By bombarding the natural thorium targets with 14 MeV neutrons, 229 Ra was produced through the reaction 232 Th(n,α) 229 Ra. The radium activities were separated from the irradiated targets by coprecipitation with the BaCl 2 . A total of 18 new weak γ rays with energies of 14.5, 15.6, 18.8, 21.8, 22.5, 44.0, 47.5, 55.0, 63.0, 69.6, 93.6, 94.1, 98.5, 102.2, 104.5, 106.1, 161.1, and 171.5 keV which could be assigned to the decay of 229 Ra were observed in the isolated radium fractions employing high resolution HPGe detectors and γ(X)-γ coincidence methods. A decay scheme of 229 Ra based on these observations is proposed. (orig.). With 2 figs
The CLIC Multi-Drive Beam Scheme
Corsini, R
1998-01-01
The CLIC study of an e+ / e- linear collider in the TeV energy range is based on Two-Beam Acceleration (TBA) in which the RF power needed to accelerate the beam is extracted from high intensity relativistic electron beams, the so-called drive beams. The generation, acceleration and transport of the high-intensity drive beams in an efficient and reliable way constitute a challenging task. An overview of a potentially very effective scheme is presented. It is based on the generation of trains of short bunches, accelerated sequentially in low frequency superconducting cavities in a c.w. mode, stored in an isochronous ring and combined at high energy by funnelling before injection by sectors into the drive linac for RF power production. The various systems of the complex are discussed.
Sellafield Site (including Drigg) emergency scheme manual
International Nuclear Information System (INIS)
1987-02-01
This Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. Several categories of emergencies on the Sellafield Site are mentioned; a building emergency which is confined to one building, a Site emergency standby when the effects of a building emergency go outside that building, a Site emergency alert (District Emergency Standby) when a release of activity affects Site operations and could have serious Site effects and a District Emergency Alert when a radioactivity release may interfere with the normal activity of the General Public. A Drigg Emergency Standby situation would operate similarly at the Drigg Site. The detailed arrangements and responsibilities of appointed personnel are set out in this manual. (UK)
Wilson expansion in the minimal subtraction scheme
International Nuclear Information System (INIS)
Smirnov, V.A.
1989-01-01
The small distance expansion of the product of composite fields is constructed for an arbitrary renormalization procedure of the type of minimal subtraction scheme. Coefficient functions of the expansion are expressed explicitly through the Green functions of composite fields. The expansion has the explicity finite form: the ultraviolet (UV) divergences of the coefficient functions and composite fields are removed by the initial renormalization procedure while the infrared (IR) divergences in massless diagrams with nonvanishing contribution into the coefficient functions are removed by the R-operation which is the IR part of the R-operation. The latter is the generalization of the dimensional renormalization in the case when both UV and IR divergences are present. To derive the expansion, a ''pre-subtracting operator'' is introduced and formulas of the counter-term technique are exploited
An Improved Overloading Scheme for Downlink CDMA
Directory of Open Access Journals (Sweden)
Marc Moeneclaey
2005-04-01
Full Text Available An improved overloading scheme is presented for single-user detection in the downlink of multiple-access systems based on OCDMA/OCDMA (O/O. By displacing in time the orthogonal signatures of the two user sets that make up the overloaded system, the cross-correlation between the users of the two sets is reduced. For random O/O with square-root cosine rolloff chip pulses, the multiuser interference can be decreased by up to 50% (depending on the chip pulse bandwidth as compared to quasiorthogonal sequences (QOS that are presently part of the downlink standard of Cdma2000. This reduction of the multiuser interference gives rise to an increase of the achievable signal-to-interference-plus-noise ratio for a particular channel load.
Scheme for analysis of oily waters
Energy Technology Data Exchange (ETDEWEB)
Lysyj, I.; Rushworth, R.; Melvold, R.; Russell, E.C.
1980-01-01
A scheme is described for gross and detailed chemical characterization of oily waters. Total, suspended, and dissolved organic content and hydrocarbon levels of the sample are determined. Volatile and water-soluble fractions are characterized in greater detail. Lower aliphatic and aromatic hydrocarbons are separated from the water by nitrogen sparging and are collected in an activated carbon absorption column. They are then extracted into carbon disulfide and analyzed gas chromatographically. The water-soluble fraction is extracted into chloroform or adsorbed on Amberlite XAD type of resin. Class characterization of this fraction is performed using the HPLC procedure. GC-MS-C is used for detailed analysis. The methodology was used for studying the effectiveness of bilge and ballast water treatments.
Design of Infusion Schemes for Neuroreceptor Imaging
DEFF Research Database (Denmark)
Feng, Ling; Svarer, Claus; Madsen, Karine
2016-01-01
for bolus infusion (BI) or programmed infusion (PI) experiments. Steady-state quantitative measurements can be made with one short scan and venous blood samples. The GABAA receptor ligand [(11)C]Flumazenil (FMZ) was chosen for this purpose, as it lacks a suitable reference region. Methods. Five bolus [(11)C...... state was attained within 40 min, which was 8 min earlier than the optimal BI (B/I ratio = 55 min). Conclusions. The system can design both BI and PI schemes to attain steady state rapidly. For example, subjects can be [(11)C]FMZ-PET scanned after 40 min of tracer infusion for 40 min with venous...
An efficient training scheme for supermodels
Schevenhoven, Francine J.; Selten, Frank M.
2017-06-01
Weather and climate models have improved steadily over time as witnessed by objective skill scores, although significant model errors remain. Given these imperfect models, predictions might be improved by combining them dynamically into a so-called supermodel. In this paper a new training scheme to construct such a supermodel is explored using a technique called cross pollination in time (CPT). In the CPT approach the models exchange states during the prediction. The number of possible predictions grows quickly with time, and a strategy to retain only a small number of predictions, called pruning, needs to be developed. The method is explored using low-order dynamical systems and applied to a global atmospheric model. The results indicate that the CPT training is efficient and leads to a supermodel with improved forecast quality as compared to the individual models. Due to its computational efficiency, the technique is suited for application to state-of-the art high-dimensional weather and climate models.
New CERN Health Insurance Scheme (CHIS) forms
HR Department
2015-01-01
New versions of the following forms for claims and requests to the CERN Health Insurance Scheme (CHIS) have been released: form for claiming reimbursement of medical expenses, form for requesting advance reimbursement, and dental estimate form (for treatments foreseen to exceed 800 CHF). The new forms are available in French and English. They can either be completed electronically before being printed and signed, or completed in paper form. New detailed instructions can be found at the back of the claim form; CHIS members are invited to read them carefully. The electronic versions (PDF) of all the forms are available on the CHIS website and on the UNIQA Member Portal. CHIS Members are requested to use these new forms forthwith and to discard any previous version. Questions regarding the above should be addressed directly to UNIQA (72730 or 022.718 63 00 or uniqa.assurances@cern.ch).
Auction dynamics: A volume constrained MBO scheme
Jacobs, Matt; Merkurjev, Ekaterina; Esedoǧlu, Selim
2018-02-01
We show how auction algorithms, originally developed for the assignment problem, can be utilized in Merriman, Bence, and Osher's threshold dynamics scheme to simulate multi-phase motion by mean curvature in the presence of equality and inequality volume constraints on the individual phases. The resulting algorithms are highly efficient and robust, and can be used in simulations ranging from minimal partition problems in Euclidean space to semi-supervised machine learning via clustering on graphs. In the case of the latter application, numerous experimental results on benchmark machine learning datasets show that our approach exceeds the performance of current state-of-the-art methods, while requiring a fraction of the computation time.
New Schemes for Positive Real Truncation
Directory of Open Access Journals (Sweden)
Kari Unneland
2007-07-01
Full Text Available Model reduction, based on balanced truncation, of stable and of positive real systems are considered. An overview over some of the already existing techniques are given: Lyapunov balancing and stochastic balancing, which includes Riccati balancing. A novel scheme for positive real balanced truncation is then proposed, which is a combination of the already existing Lyapunov balancing and Riccati balancing. Using Riccati balancing, the solution of two Riccati equations are needed to obtain positive real reduced order systems. For the suggested method, only one Lyapunov equation and one Riccati equation are solved in order to obtain positive real reduced order systems, which is less computationally demanding. Further it is shown, that in order to get positive real reduced order systems, only one Riccati equation needs to be solved. Finally, this is used to obtain positive real frequency weighted balanced truncation.
Variable flavor scheme for final state jets
International Nuclear Information System (INIS)
Pietrulewicz, P.
2014-01-01
In this thesis I describe a setup to treat mass effects from secondary radiation of heavy quark pairs in inclusive hard scattering processes with various dynamical scales. The resulting variable flavor number scheme (VFNS) generalizes a well-known scheme for massive initial state quarks which has been developed for deep inelastic scattering (DIS) in the classical region 1 - x ⁓ O(1) and which will be also discussed here. The setup incorporated in the formalism of Soft-Collinear Effective Theory (SCET) consistently takes into account the effects of massive quark loops and allows to deal with all hierarchies between the mass scale and the involved kinematic scales corresponding to collinear and soft radiation. It resums all large logarithms due to flavor number dependent evolution, achieves both decoupling for very large masses and the correct massless behavior for very small masses, and provides a continuous description in between. In the bulk of this work I will concentrate on DIS in the endpoint region x → 1 serving mainly as a showcase for the concepts and on the thrust distribution for e + e - -collisions in the dijet limit as a phenomenologically relevant example for an event shape. The computations of the corrections to the structures in the factorization theorems are described explicitly for the singular terms at O(α s 2 C F T F ) arising from secondary radiation of massive quarks through gluon splitting. Apart from the soft function for thrust, which requires a dedicated calculation, these results are directly obtained from the corresponding results for the radiation of a massive gauge boson with vector coupling at O(α s ) with the help of dispersion relations, and most of the relevant conceptual and technical issues can be dealt with already at this level. Finally, to estimate the impact of the corrections I carry out a numerical analysis for secondary massive bottom and top quarks on thrust distributions at different center-of-mass energies
Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.
Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian
2016-06-01
As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.
Quantum attack-resistent certificateless multi-receiver signcryption scheme.
Directory of Open Access Journals (Sweden)
Huixian Li
Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.
MIMO transmit scheme based on morphological perceptron with competitive learning.
Valente, Raul Ambrozio; Abrão, Taufik
2016-08-01
This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.
Security analysis and improvements of arbitrated quantum signature schemes
International Nuclear Information System (INIS)
Zou Xiangfu; Qiu Daowen
2010-01-01
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.
Technology Transfer and Technology Transfer Intermediaries
Bauer, Stephen M.; Flagg, Jennifer L.
2010-01-01
A standard and comprehensive model is needed to evaluate and compare technology transfer systems and the stakeholders within these systems. The principle systems considered include federal laboratories, U.S. universities, the rehabilitation engineering research centers (RERCs), and large small business innovation research programs. An earlier…
The one nucleon transfer operator in the microscopic IBM without NOA
International Nuclear Information System (INIS)
Barea, J.; Alonso, C.E.; Arias, J.M.
2014-01-01
The mapping of the single fermion creation operator (c i † ) onto the Interacting Boson–Fermion space (IBFM) is revisited within the Generalized Seniority scheme. In the original work the Number Operator Approximation (NOA) was used. Here the exact evaluation of the relevant terms using exact values for the fermion matrix elements in the Generalized Seniority scheme is worked out. This provides a new, improved, single particle transfer operator to be used in IBFM