WorldWideScience

Sample records for biosphere-atmosphere transfer scheme

  1. TRMM LBA (LARGE SCALE BIOSPHERE-ATMOSPHERE) EXPERIMENT (AMPR) V1

    Data.gov (United States)

    National Aeronautics and Space Administration — The Advanced Microwave Precipitation Radiometer (AMPR) was deployed during the Tropical Rainfall Measuring Mission - Large Scale Biosphere-Atmosphere Experiment...

  2. Using observations to evaluate biosphere-atmosphere interactions in models

    Science.gov (United States)

    Green, Julia; Konings, Alexandra G.; Alemohammad, Seyed H.; Gentine, Pierre

    2017-04-01

    Biosphere-atmosphere interactions influence the hydrologic cycle by altering climate and weather patterns (Charney, 1975; Koster et al., 2006; Seneviratne et al., 2006), contributing up to 30% of precipitation and radiation variability in certain regions (Green et al., 2017). They have been shown to contribute to the persistence of drought in Europe (Seneviratne et al., 2006), as well as to increase rainfall in the Amazon (Spracklen et al., 2012). Thus, a true representation of these feedbacks in Earth System Models (ESMs) is crucial for accurate forecasting and planning. However, it has been difficult to validate the performance of ESMs since often-times surface and atmospheric flux data are scarce and/or difficult to observe. In this study, we use the results of a new global observational study (using remotely sensed solar-induced fluorescence to represent the biosphere flux) (Green et al., 2017) to determine how well a suite of 13 ESMs capture biosphere-atmosphere feedbacks. We perform a Conditional Multivariate Granger Causality analysis in the frequency domain with radiation, precipitation and temperature as atmospheric inputs and GPP as the biospheric input. Performing the analysis in the frequency domain allows for separation of feedbacks at different time-scales (subseasonal, seasonal or interannual). Our findings can be used to determine whether there is agreement between models, as well as, to pinpoint regions or time-scales of model bias or inaccuracy, which will provide insight on potential improvement. We demonstrate that in addition to the well-known problem of convective parameterization over land in models, the main issue in representing feedbacks between the land and the atmosphere is due to the misrepresentation of water stress. These results provide a direct quantitative assessment of feedbacks in models and how to improve them. References: Charney, J.G. Dynamics of deserts and drought in the Sahel. Quarterly Journal of the Royal Meteorological

  3. The Large-Scale Biosphere-Atmosphere Experiment in Amazonia: Analyzing Regional Land Use Change Effects.

    Science.gov (United States)

    Michael Keller; Maria Assunção Silva-Dias; Daniel C. Nepstad; Meinrat O. Andreae

    2004-01-01

    The Large-Scale Biosphere-Atmosphere Experiment in Amazonia (LBA) is a multi-disciplinary, multinational scientific project led by Brazil. LBA researchers seek to understand Amazonia in its global context especially with regard to regional and global climate. Current development activities in Amazonia including deforestation, logging, cattle ranching, and agriculture...

  4. The large scale biosphere-atmosphere experiment in Amazonia (LBA); concise experimental plan

    NARCIS (Netherlands)

    LBAScience Planning Group (Cachoeira Paulista),

    1996-01-01

    The large-scale biosphere-atmosphere experiment in Amazonia (LBA) aims at enhancing knowledge of the climatological, ecological, biogeochemical, and hydrological functioning of Amazonia. It will address the effects of changes in land use and climate on these functions, including also the

  5. Cloud and rain processes in a biosphere-atmosphere interaction context in the Amazon Region

    NARCIS (Netherlands)

    Silva Dias, M.A.F.; Rutledge, S.; Kabat, P.; Silva Dias, P.L.; Nobre, C.; Fisch, G.; Dolman, A.J.; Zipser, E.; Garstang, M.; Manzi, A.O.; Fuentes, J.D.; Rocha, H.R.; Marengo, J.; Plana-Fattori, A.; Sá, L.D.A.; Alvalá, R.C.S.; Andreae, M.O.; Artaxo, P.; Gielow, R.; Gatti, L.

    2002-01-01

    This paper presents an overview of the results from the first major mesoscale atmospheric campaign of the Large-Scale Biosphere-Atmosphere Experiment in Amazonia (LBA) Program. The campaign, collocated with a Tropical Rainfall Measuring Mission (TRMM) satellite validation campaigns, was conducted in

  6. Studying biosphere-atmosphere exchange of CO2 through Carbon-13 stable isotopes

    NARCIS (Netherlands)

    Velde, van der I.R.

    2015-01-01

    Summary Thesis ‘Studying biosphere-atmosphere exchange of CO2 through carbon-13 stable isotopes’ Ivar van der Velde Making predictions of future climate is difficult, mainly due to large uncertainties in the carbon cycle. The rate at which carbon is stored in the oceans and terrestrial

  7. Ecological research in the large-scale biosphere-atmosphere experiment in Amazonia: early results

    NARCIS (Netherlands)

    Keller, M.; Alencar, A.; Asner, G.P.; Braswell, B.; Bustamante, M.; Davidson, E.; Feldpausch, T.; Fernandes, E.; Goulden, M.; Kabat, P.; Kruijt, B.; Luizão, F.; Miller, S.; Markewitz, D.; Nobre, A.D.; Nobre, C.A.; Priante Filho, N.; Rocha, da H.; Silva Dias, P.; Randow, von C.; Vourlitis, G.L.

    2004-01-01

    The Large-scale Biosphere-Atmosphere Experiment in Amazonia (LBA) is a multinational, interdisciplinary research program led by Brazil. Ecological studies in LBA focus on how tropical forest conversion, regrowth, and selective logging influence carbon storage,. nutrient dynamics, trace gas fluxes,

  8. Studying biosphere-atmosphere exchange of CO2 through Carbon-13 stable isotopes

    NARCIS (Netherlands)

    Velde, van der I.R.

    2015-01-01

    Summary Thesis ‘Studying biosphere-atmosphere exchange of CO2 through

    carbon-13 stable isotopes’

    Ivar van der Velde

    Making predictions of future climate is difficult, mainly due to large uncertainties in the carbon cycle. The rate at which carbon is stored in the oceans and

  9. The interactions between soil-biosphere-atmosphere land surface model with a multi-energy balance (ISBA-MEB) option in SURFEXv8 - Part 1: Model description

    Science.gov (United States)

    Boone, Aaron; Samuelsson, Patrick; Gollvik, Stefan; Napoly, Adrien; Jarlan, Lionel; Brun, Eric; Decharme, Bertrand

    2017-02-01

    Land surface models (LSMs) are pushing towards improved realism owing to an increasing number of observations at the local scale, constantly improving satellite data sets and the associated methodologies to best exploit such data, improved computing resources, and in response to the user community. As a part of the trend in LSM development, there have been ongoing efforts to improve the representation of the land surface processes in the interactions between the soil-biosphere-atmosphere (ISBA) LSM within the EXternalized SURFace (SURFEX) model platform. The force-restore approach in ISBA has been replaced in recent years by multi-layer explicit physically based options for sub-surface heat transfer, soil hydrological processes, and the composite snowpack. The representation of vegetation processes in SURFEX has also become much more sophisticated in recent years, including photosynthesis and respiration and biochemical processes. It became clear that the conceptual limits of the composite soil-vegetation scheme within ISBA had been reached and there was a need to explicitly separate the canopy vegetation from the soil surface. In response to this issue, a collaboration began in 2008 between the high-resolution limited area model (HIRLAM) consortium and Météo-France with the intention to develop an explicit representation of the vegetation in ISBA under the SURFEX platform. A new parameterization has been developed called the ISBA multi-energy balance (MEB) in order to address these issues. ISBA-MEB consists in a fully implicit numerical coupling between a multi-layer physically based snowpack model, a variable-layer soil scheme, an explicit litter layer, a bulk vegetation scheme, and the atmosphere. It also includes a feature that permits a coupling transition of the snowpack from the canopy air to the free atmosphere. It shares many of the routines and physics parameterizations with the standard version of ISBA. This paper is the first of two parts; in part one

  10. A new MV bus transfer scheme for nuclear power plants

    Directory of Open Access Journals (Sweden)

    Chang Choong-Koo

    2015-01-01

    Full Text Available Fast bus transfer method is the most popular and residual voltage transfer method that is used as a backup in medium voltage buses in general. The use of the advanced technology like open circuit voltage prediction and digital signal processing algorithms can improve the reliability of fast transfer scheme. However, according to the survey results of the recent operation records in nuclear power plants, there were many instances where the fast transfer scheme has failed. To assure bus transfer in any conditions and circumstances, uninterruptible bus transfer scheme utilizing the state of the art medium voltage UPS is discussed and elaborated.

  11. Two adaptive radiative transfer schemes for numerical weather prediction models

    Directory of Open Access Journals (Sweden)

    V. Venema

    2007-11-01

    Full Text Available Radiative transfer calculations in atmospheric models are computationally expensive, even if based on simplifications such as the δ-two-stream approximation. In most weather prediction models these parameterisation schemes are therefore called infrequently, accepting additional model error due to the persistence assumption between calls. This paper presents two so-called adaptive parameterisation schemes for radiative transfer in a limited area model: A perturbation scheme that exploits temporal correlations and a local-search scheme that mainly takes advantage of spatial correlations. Utilising these correlations and with similar computational resources, the schemes are able to predict the surface net radiative fluxes more accurately than a scheme based on the persistence assumption. An important property of these adaptive schemes is that their accuracy does not decrease much in case of strong reductions in the number of calls to the δ-two-stream scheme. It is hypothesised that the core idea can also be employed in parameterisation schemes for other processes and in other dynamical models.

  12. Evolutionary algorithm based heuristic scheme for nonlinear heat transfer equations.

    Science.gov (United States)

    Ullah, Azmat; Malik, Suheel Abdullah; Alimgeer, Khurram Saleem

    2018-01-01

    In this paper, a hybrid heuristic scheme based on two different basis functions i.e. Log Sigmoid and Bernstein Polynomial with unknown parameters is used for solving the nonlinear heat transfer equations efficiently. The proposed technique transforms the given nonlinear ordinary differential equation into an equivalent global error minimization problem. Trial solution for the given nonlinear differential equation is formulated using a fitness function with unknown parameters. The proposed hybrid scheme of Genetic Algorithm (GA) with Interior Point Algorithm (IPA) is opted to solve the minimization problem and to achieve the optimal values of unknown parameters. The effectiveness of the proposed scheme is validated by solving nonlinear heat transfer equations. The results obtained by the proposed scheme are compared and found in sharp agreement with both the exact solution and solution obtained by Haar Wavelet-Quasilinearization technique which witnesses the effectiveness and viability of the suggested scheme. Moreover, the statistical analysis is also conducted for investigating the stability and reliability of the presented scheme.

  13. Biosphere-atmosphere Exchange of CO2 in a Subtropical Mangrove Wetland in Hong Kong

    Science.gov (United States)

    Liu, J.; Neogi, S.; Lai, D. Y. F.

    2017-12-01

    Mangrove ecosystems play an important role in the global carbon cycle due to their high primary productivity, carbon-rich sediment, and sensitivity to climate change. Yet, there is currently a paucity of studies that quantify the biosphere-atmosphere exchange of GHGs in mangrove wetlands continuously at the ecosystem level. In this study, the temporal variability of net ecosystem CO2 exchange (NEE) between the Kandelia obovata mangrove and the atmosphere was determined in the Mai Po Marshes Nature Reserve of subtropical Hong Kong using an eddy covariance system between February 2016 and January 2017. The daytime half-hourly NEE ranged between -5.0 and +3.3 µmol m-2 s-1, while the maximum nighttime NEE could reach +5.0 µmol m-2 s-1 during the wet, warm season. Temperature, photosynthetic photon flux density (PPFD), vapor pressure deficit (VPD), and surface water salinity were some key physical and hydrological controls of NEE. Tidal activity could also exert profound influence on CO2 fluxes in this mangrove ecosystem by exporting dissolved carbon to adjacent estuary and inhibiting soil respiration during the inundation period. Overall, this coastal mangrove was a net sink of atmospheric CO2. Our results suggest that the ability of subtropical mangrove ecosystems in sequestering CO2 could be highly dependent on future changes in temperature, precipitation, and salinity.

  14. Regulation control and energy management scheme for wireless power transfer

    Science.gov (United States)

    Miller, John M.

    2015-12-29

    Power transfer rate at a charging facility can be maximized by employing a feedback scheme. The state of charge (SOC) and temperature of the regenerative energy storage system (RESS) pack of a vehicle is monitored to determine the load due to the RESS pack. An optimal frequency that cancels the imaginary component of the input impedance for the output signal from a grid converter is calculated from the load of the RESS pack, and a frequency offset f* is made to the nominal frequency f.sub.0 of the grid converter output based on the resonance frequency of a magnetically coupled circuit. The optimal frequency can maximize the efficiency of the power transfer. Further, an optimal grid converter duty ratio d* can be derived from the charge rate of the RESS pack. The grid converter duty ratio d* regulates wireless power transfer (WPT) power level.

  15. The ACCENT-VOCBAS field campaign on biosphere-atmosphere interactions in a Mediterranean ecosystem

    Science.gov (United States)

    Fares, S.; Mereu, S.; Scarascia Mugnozza, G.; Vitale, M.; Manes, F.; Frattoni, M.; Ciccioli, P.; Loreto, F.

    2009-04-01

    Biosphere-atmosphere interactions were investigated on a sandy dune Mediterranean ecosystem in a field campaign held in 2007 within the frame of the European Projects ACCENT and VOCBAS. The campaign was carried out in the Presidential estate of Castelporziano, a peri-urban park close to Rome where several investigations on the emission of biogenic volatile organic compounds (BVOC) in Mediterranean area were performed in the past 15 years. While specific aspects of the campaign will be discussed in companion papers, the general climatic and physiological aspects will be presented here together with information regarding BVOC emission from the most common plants present in this ecosystem. During the campaign regular air movements were observed, dominated by moderate nocturnal land breeze and diurnal sea breeze. A regular daily increase of ozone concentration in the air was also observed, but daily peaks of ozone were much lower than those measured downwind of the Rome conurbation. The site was ideal as a natural photochemical reactor to observe reaction, transport and deposition processes occurring in the Mediterranean basin, where a sea-land breeze circulation system allows a strong mixing between biogenic and anthropogenic emissions and secondary pollutants. The campaign investigated emissions from a poorly studied and largely biodiverse ecosystem, often subjected to a combination of environmental stresses and to anthropogenic pollution. Measurements were run in May, when plant physiological conditions were still optimal, in absence of severe drought and heat stress. Foliar rates of photosynthesis and transpiration were as high as generally recorded in unstressed Mediterranean sclerophyllous plants. Most of the plant species emitted high level of monoterpenes, despite measurements being made in a period in which emissions of volatile isoprenoids could be restrained by developmental and environmental factors, such as leaf age and relatively low air temperature. No

  16. SEURAT: SPH scheme extended with ultraviolet line radiative transfer

    Science.gov (United States)

    Abe, Makito; Suzuki, Hiroyuki; Hasegawa, Kenji; Semelin, Benoit; Yajima, Hidenobu; Umemura, Masayuki

    2018-05-01

    We present a novel Lyman alpha (Ly α) radiative transfer code, SEURAT (SPH scheme Extended with Ultraviolet line RAdiative Transfer), where line scatterings are solved adaptively with the resolution of the smoothed particle hydrodynamics (SPH). The radiative transfer method implemented in SEURAT is based on a Monte Carlo algorithm in which the scattering and absorption by dust are also incorporated. We perform standard test calculations to verify the validity of the code; (i) emergent spectra from a static uniform sphere, (ii) emergent spectra from an expanding uniform sphere, and (iii) escape fraction from a dusty slab. Thereby, we demonstrate that our code solves the {Ly} α radiative transfer with sufficient accuracy. We emphasize that SEURAT can treat the transfer of {Ly} α photons even in highly complex systems that have significantly inhomogeneous density fields. The high adaptivity of SEURAT is desirable to solve the propagation of {Ly} α photons in the interstellar medium of young star-forming galaxies like {Ly} α emitters (LAEs). Thus, SEURAT provides a powerful tool to model the emergent spectra of {Ly} α emission, which can be compared to the observations of LAEs.

  17. Transfer Scheme Evaluation Model for a Transportation Hub based on Vectorial Angle Cosine

    Directory of Open Access Journals (Sweden)

    Li-Ya Yao

    2014-07-01

    Full Text Available As the most important node in public transport network, efficiency of a transport hub determines the entire efficiency of the whole transport network. In order to put forward effective transfer schemes, a comprehensive evaluation index system of urban transport hubs’ transfer efficiency was built, evaluation indexes were quantified, and an evaluation model of a multi-objective decision hub transfer scheme was established based on vectorial angle cosine. Qualitative and quantitative analysis on factors affecting transfer efficiency is conducted, which discusses the passenger satisfaction, transfer coordination, transfer efficiency, smoothness, economy, etc. Thus, a new solution to transfer scheme utilization was proposed.

  18. Discrete ordinates quadrature schemes for multidimensional radiative transfer

    Science.gov (United States)

    Koch, R.; Krebs, W.; Wittig, S.; Viskanta, R.

    1995-04-01

    The fundamental problem of applying the method of discrete ordinates to radiative transfer predictions is the selection of the discrete directions and their associated weights. Both the accuracy of the solution and the computational effort depend on the angular discretization. This paper provides a sound mathematical methodology for the derivation of angular quadratures. By applying the collocation principle, the errors introduced by a quadrature are analyzed and the constituting equations of angular quadratures are identified. Special emphasis is placed on the rotational invariance of the qudrature schemes. Multidimensional radiative transfer in participating media with isotropic and anisotropic scattering is accounted for thoughout the analysis. A major goal of the present study is the construction of a new principle for multidimensional angular quadratures which is essentially a generalization of the principles employed for the well-known S(sub n) quadratures. The new construction principle has two major advantages. First, it enables a very flexible tailoring of quadratures according to the actual requirements. Second, compared to the S(sub n) quadratures, the new types of quadratures provide a higher accuracy while using the same number of nodal points.

  19. Workplan for Catalyzing Collaboration with Amazonian Universities in the Large Scale Biosphere-Atmosphere Experiment in Amazonia (LBA)

    Science.gov (United States)

    Brown, I. Foster; Moreira, Adriana

    1997-01-01

    Success of the Large-Scale Biosphere-Atmospheric Experiment in Amazonia (LBA) program depends on several critical factors, the most important being the effective participation of Amazonian researchers and institutions. Without host-county counterparts, particularly in Amazonia, many important studies cannot he undertaken due either to lack of qualified persons or to legal constraints. No less important, the acceptance of the LBA program in Amazonia is also dependent on what LBA can do for improving the scientific expertise in Amazonia. Gaining the active investment of Amazonian scientists in a comprehensive research program is not a trivial task. Potential collaborators are few, particularly where much of the research was to be originally focused - the southern arc of Brazilian Amazonia. The mid-term goals of the LBA Committee on Training and Education are to increase the number of collaborators and to demonstrate that LBA will be of benefit to the region.

  20. Studies of land-cover, land-use, and biophysical properties of vegetation in the Large Scale Biosphere Atmosphere experiment in Amazonia.

    Science.gov (United States)

    Dar A. Robertsa; Michael Keller; Joao Vianei Soares

    2003-01-01

    We summarize early research on land-cover, land-use, and biophysical properties of vegetation from the Large Scale Biosphere Atmosphere (LBA) experiment in Amazoˆnia. LBA is an international research program developed to evaluate regional function and to determine how land-use and climate modify biological, chemical and physical processes there. Remote sensing has...

  1. Advances in understanding, models and parameterisations of biosphere-atmosphere ammonia exchange

    Science.gov (United States)

    Flechard, C. R.; Massad, R.-S.; Loubet, B.; Personne, E.; Simpson, D.; Bash, J. O.; Cooter, E. J.; Nemitz, E.; Sutton, M. A.

    2013-03-01

    -chemical species schemes. Their level of complexity depends on their purpose, the spatial scale at which they are applied, the current level of parameterisation, and the availability of the input data they require. State-of-the-art solutions for determining the emission/sink Γ potentials through the soil/canopy system include coupled, interactive chemical transport models (CTM) and soil/ecosystem modelling at the regional scale. However, it remains a matter for debate to what extent realistic options for future regional and global models should be based on process-based mechanistic versus empirical and regression-type models. Further discussion is needed on the extent and timescale by which new approaches can be used, such as integration with ecosystem models and satellite observations.

  2. Advances in understanding, models and parameterizations of biosphere-atmosphere ammonia exchange

    Science.gov (United States)

    Flechard, C. R.; Massad, R.-S.; Loubet, B.; Personne, E.; Simpson, D.; Bash, J. O.; Cooter, E. J.; Nemitz, E.; Sutton, M. A.

    2013-07-01

    Atmospheric ammonia (NH3) dominates global emissions of total reactive nitrogen (Nr), while emissions from agricultural production systems contribute about two-thirds of global NH3 emissions; the remaining third emanates from oceans, natural vegetation, humans, wild animals and biomass burning. On land, NH3 emitted from the various sources eventually returns to the biosphere by dry deposition to sink areas, predominantly semi-natural vegetation, and by wet and dry deposition as ammonium (NH4+) to all surfaces. However, the land/atmosphere exchange of gaseous NH3 is in fact bi-directional over unfertilized as well as fertilized ecosystems, with periods and areas of emission and deposition alternating in time (diurnal, seasonal) and space (patchwork landscapes). The exchange is controlled by a range of environmental factors, including meteorology, surface layer turbulence, thermodynamics, air and surface heterogeneous-phase chemistry, canopy geometry, plant development stage, leaf age, organic matter decomposition, soil microbial turnover, and, in agricultural systems, by fertilizer application rate, fertilizer type, soil type, crop type, and agricultural management practices. We review the range of processes controlling NH3 emission and uptake in the different parts of the soil-canopy-atmosphere continuum, with NH3 emission potentials defined at the substrate and leaf levels by different [NH4+] / [H+] ratios (Γ). Surface/atmosphere exchange models for NH3 are necessary to compute the temporal and spatial patterns of emissions and deposition at the soil, plant, field, landscape, regional and global scales, in order to assess the multiple environmental impacts of airborne and deposited NH3 and NH4+. Models of soil/vegetation/atmosphere NH3 exchange are reviewed from the substrate and leaf scales to the global scale. They range from simple steady-state, "big leaf" canopy resistance models, to dynamic, multi-layer, multi-process, multi-chemical species schemes

  3. Advances in understanding, models and parameterizations of biosphere-atmosphere ammonia exchange

    Directory of Open Access Journals (Sweden)

    C. R. Flechard

    2013-07-01

    -chemical species schemes. Their level of complexity depends on their purpose, the spatial scale at which they are applied, the current level of parameterization, and the availability of the input data they require. State-of-the-art solutions for determining the emission/sink Γ potentials through the soil/canopy system include coupled, interactive chemical transport models (CTM and soil/ecosystem modelling at the regional scale. However, it remains a matter for debate to what extent realistic options for future regional and global models should be based on process-based mechanistic versus empirical and regression-type models. Further discussion is needed on the extent and timescale by which new approaches can be used, such as integration with ecosystem models and satellite observations.

  4. Transfer pricing as tax avoidance under different legislative schemes

    OpenAIRE

    Holzmann, Carolin Maria

    2016-01-01

    This paper investigates transfer pricing as tax avoidance before and after reforms of anti-avoidance legislation. The reforms introduced and tightened obligatory documentation requirements for transfer prices to enforce that multinational enterprises (MNEs) set internal transfer prices at an arm’s-length. Linking data from the Microdatabase Statistics on International Trade in Services that comprehends prices of MNEs’ international service transactions to the Microdatabase Direct Investment, ...

  5. Atmospheric Ozone And Its Biosphere - Atmosphere Exchange In A Mangrove Forest Ecosystem A Case Study From Sundarbans NE Coast Of India

    Directory of Open Access Journals (Sweden)

    Manab Kumar Dutta

    2015-01-01

    Full Text Available ABSTRACT Temporal variation of atmospheric O3 and its biosphere atmosphere exchange were monitored in the Sundarbans mangrove forest from January 2011 to December 2011 on bimonthly basis. O3 mixing ratios at 10 m and 20 m heights over the forest atmosphere ranged between 14.66 1.88 to 37.90 0.91 and 19.32 6.27 to 39.80 10.13 ppbv respectively having maximal premonsoon and minimal monsoon periods. Average daytime O3 mixing ratio was 1.69 times higher than nighttime indicates significant photo chemical production of O3 in forest atmosphere. Annual averaged O3 mixing ratio in 10 m height was 13.2 lower than 20 m height induces exchange of O3 across mangrove biosphere atmosphere interface depending upon micrometeorological conditions of the forest ecosystem. Annual average biosphere atmosphere O3 exchange flux in this mangrove forest environment was 0.441 g m-2 s-1. Extrapolating the value for entire forest surface area the mangrove ecosystem acts as a sink of 58.4GgO3 annually indicating significant contribution of Sundarbans mangroves towards regional atmospheric O3 budget as well as climate change.

  6. Assessing filtering of mountaintop CO2 mole fractions for application to inverse models of biosphere-atmosphere carbon exchange

    Directory of Open Access Journals (Sweden)

    S. L. Heck

    2012-02-01

    Full Text Available There is a widely recognized need to improve our understanding of biosphere-atmosphere carbon exchanges in areas of complex terrain including the United States Mountain West. CO2 fluxes over mountainous terrain are often difficult to measure due to unusual and complicated influences associated with atmospheric transport. Consequently, deriving regional fluxes in mountain regions with carbon cycle inversion of atmospheric CO2 mole fraction is sensitive to filtering of observations to those that can be represented at the transport model resolution. Using five years of CO2 mole fraction observations from the Regional Atmospheric Continuous CO2 Network in the Rocky Mountains (Rocky RACCOON, five statistical filters are used to investigate a range of approaches for identifying regionally representative CO2 mole fractions. Test results from three filters indicate that subsets based on short-term variance and local CO2 gradients across tower inlet heights retain nine-tenths of the total observations and are able to define representative diel variability and seasonal cycles even for difficult-to-model sites where the influence of local fluxes is much larger than regional mole fraction variations. Test results from two other filters that consider measurements from previous and following days using spline fitting or sliding windows are overly selective. Case study examples showed that these windowing-filters rejected measurements representing synoptic changes in CO2, which suggests that they are not well suited to filtering continental CO2 measurements. We present a novel CO2 lapse rate filter that uses CO2 differences between levels in the model atmosphere to select subsets of site measurements that are representative on model scales. Our new filtering techniques provide guidance for novel approaches to assimilating mountain-top CO2 mole fractions in carbon cycle inverse models.

  7. SEURAT: SPH scheme extended with ultraviolet line radiative transfer

    Science.gov (United States)

    Abe, Makito; Suzuki, Hiroyuki; Hasegawa, Kenji; Semelin, Benoit; Yajima, Hidenobu; Umemura, Masayuki

    2018-01-01

    We present a novel Lyman alpha (Lyα) radiative transfer code, SEURAT, where line scatterings are solved adaptively with the resolution of the smoothed particle hydrodynamics (SPH). The radiative transfer method implemented in SEURAT is based on a Monte Carlo algorithm in which the scattering and absorption by dust are also incorporated. We perform standard test calculations to verify the validity of the code; (i) emergent spectra from a static uniform sphere, (ii) emergent spectra from an expanding uniform sphere, and (iii) escape fraction from a dusty slab. Thereby we demonstrate that our code solves the {Ly} α radiative transfer with sufficient accuracy. We emphasise that SEURAT can treat the transfer of {Ly} α photons even in highly complex systems that have significantly inhomogeneous density fields. The high adaptivity of SEURAT is desirable to solve the propagation of {Ly} α photons in the interstellar medium of young star-forming galaxies like {Ly} α emitters (LAEs). Thus, SEURAT provides a powerful tool to model the emergent spectra of {Ly} α emission, which can be compared to the observations of LAEs.

  8. Equivalence of internal and external mixture schemes of single scattering properties in vector radiative transfer.

    Science.gov (United States)

    Mukherjee, Lipi; Zhai, Peng-Wang; Hu, Yongxiang; Winker, David M

    2017-05-10

    Polarized radiation fields in a turbid medium are influenced by single-scattering properties of scatterers. It is common that media contain two or more types of scatterers, which makes it essential to properly mix single-scattering properties of different types of scatterers in the vector radiative transfer theory. The vector radiative transfer solvers can be divided into two basic categories: the stochastic and deterministic methods. The stochastic method is basically the Monte Carlo method, which can handle scatterers with different scattering properties explicitly. This mixture scheme is called the external mixture scheme in this paper. The deterministic methods, however, can only deal with a single set of scattering properties in the smallest discretized spatial volume. The single-scattering properties of different types of scatterers have to be averaged before they are input to deterministic solvers. This second scheme is called the internal mixture scheme. The equivalence of these two different mixture schemes of scattering properties has not been demonstrated so far. In this paper, polarized radiation fields for several scattering media are solved using the Monte Carlo and successive order of scattering (SOS) methods and scattering media contain two types of scatterers: Rayleigh scatterers (molecules) and Mie scatterers (aerosols). The Monte Carlo and SOS methods employ external and internal mixture schemes of scatterers, respectively. It is found that the percentage differences between radiances solved by these two methods with different mixture schemes are of the order of 0.1%. The differences of Q/I, U/I, and V/I are of the order of 10 -5 ∼10 -4 , where I, Q, U, and V are the Stokes parameters. Therefore, the equivalence between these two mixture schemes is confirmed to the accuracy level of the radiative transfer numerical benchmarks. This result provides important guidelines for many radiative transfer applications that involve the mixture of

  9. Parameters of the CLIC Transfer Structure for the Multi-Drive Beam Generation Scheme

    CERN Document Server

    Millich, Antonio

    1997-01-01

    Three versions of the CLIC Transfer Structure (CTS) have been studied by means of simulations using the MAFIA set of codes. Of these the high impedance version has been built as a prototype and tested in the CTF (CLIC Test Facility). The other two versions were designed with the aim of suiting the requirements of the two Drive Beam Generation schemes presently being pursued for the CLIC scheme. Here we report the simulation results for th CTS to be used in the multi-drive beam generation scheme.

  10. REMINDER Saved Leave Scheme (SLS) : Simplified procedure for the transfer of leave to saved leave accounts

    CERN Multimedia

    HR Division

    2001-01-01

    As part of the process of streamlining procedures, the HR and AS Divisions have jointly developed a system whereby annual and compensatory leave will henceforth be automatically transferred1) to saved leave accounts. Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'2)Previously, every person taking part in the scheme has been individually issued with a form for the purposes of requesting the transfer of leave to the leave account and the transfer has then had to be done manually by HR Division. To streamline the procedure, unused leave of all those taking part in the saved leave scheme at the closure of the leave-year accounts will henceforth be transferred automatically to the saved leave account on that date. This simplification is in the interest of all parties concerned. This automatic transfer procedure has a number of advantages for participants in the SLS scheme. First, staff members will no longer have to take any administrative steps. Secondly, the new proced...

  11. An Efficient Authenticated Key Transfer Scheme in Client-Server Networks

    Science.gov (United States)

    Shi, Runhua; Zhang, Shun

    2017-10-01

    In this paper, we presented a novel authenticated key transfer scheme in client-server networks, which can achieve two secure goals of remote user authentication and the session key establishment between the remote user and the server. Especially, the proposed scheme can subtly provide two fully different authentications: identity-base authentication and anonymous authentication, while the remote user only holds a private key. Furthermore, our scheme only needs to transmit 1-round messages from the remote user to the server, thus it is very efficient in communication complexity. In addition, the most time-consuming computation in our scheme is elliptic curve scalar point multiplication, so it is also feasible even for mobile devices.

  12. Saved Leave Scheme (SLS) : Simplified procedure for the transfer of leave to saved leave accounts

    CERN Multimedia

    HR Division

    2001-01-01

    As part of the process of streamlining procedures, the HR and AS Divisions have jointly developed a system whereby annual and compensatory leave will henceforth be automatically transferred1) to saved leave accounts. Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'2) annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No. 22 B) can be transferred to the saved leave account at the end of the leave year (30 September). Previously, every person taking part in the scheme has been individually issued with a form for the purposes of requesting the transfer of leave to the leave account and the transfer has then had to be done manually by HR Division. To streamline the procedure, unused leave of all those taking part in the saved leave scheme at the closure of of the leave-year accounts will henceforth be transferred automatically to the saved leave account on that date. This simplification is in the ...

  13. REMINDER Saved Leave Scheme (SLS) : Transfer of leave to saved leave accounts

    CERN Multimedia

    HR Division

    2002-01-01

    Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'*) annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No. 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that, since last year, unused leave of all those taking part in the saved leave scheme at the closure of the leave-year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2002 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they are still participants in the schem...

  14. Intercomparison of shortwave radiative transfer schemes in global aerosol modeling: results from the AeroCom Radiative Transfer Experiment

    Directory of Open Access Journals (Sweden)

    C. A. Randles

    2013-03-01

    Full Text Available In this study we examine the performance of 31 global model radiative transfer schemes in cloud-free conditions with prescribed gaseous absorbers and no aerosols (Rayleigh atmosphere, with prescribed scattering-only aerosols, and with more absorbing aerosols. Results are compared to benchmark results from high-resolution, multi-angular line-by-line radiation models. For purely scattering aerosols, model bias relative to the line-by-line models in the top-of-the atmosphere aerosol radiative forcing ranges from roughly −10 to 20%, with over- and underestimates of radiative cooling at lower and higher solar zenith angle, respectively. Inter-model diversity (relative standard deviation increases from ~10 to 15% as solar zenith angle decreases. Inter-model diversity in atmospheric and surface forcing decreases with increased aerosol absorption, indicating that the treatment of multiple-scattering is more variable than aerosol absorption in the models considered. Aerosol radiative forcing results from multi-stream models are generally in better agreement with the line-by-line results than the simpler two-stream schemes. Considering radiative fluxes, model performance is generally the same or slightly better than results from previous radiation scheme intercomparisons. However, the inter-model diversity in aerosol radiative forcing remains large, primarily as a result of the treatment of multiple-scattering. Results indicate that global models that estimate aerosol radiative forcing with two-stream radiation schemes may be subject to persistent biases introduced by these schemes, particularly for regional aerosol forcing.

  15. Simple scheme for information transfer of a qutrit in circuit QED

    Science.gov (United States)

    Wang, Feng; Yu, Li; Su, Qi-Ping; Yang, Chui-Ping

    2017-07-01

    We propose a simple scheme for quantum state transfer between two qutrits in circuit quantum electrodynamics (QED). Other than the two qutrits, only one coupling cavity is adopted, and there is no requirement for a classical pulse or measurement. In the whole process, the cavity is virtually excited so that the decoherence caused by photon leakage of the cavity can be greatly suppressed. Numerical simulation shows that high fidelities (˜0.984 on average) can be achieved with present circuit QED technology, in which a low quality factor (Q≈4.1×104) for the cavity has been adopted. Due to its simplicity, this scheme is quite general and can be applied to other quantum systems.

  16. A gas dynamics scheme for a two moments model of radiative transfer

    International Nuclear Information System (INIS)

    Buet, Ch.; Despres, B.

    2007-01-01

    We address the discretization of the Levermore's two moments and entropy model of the radiative transfer equation. We present a new approach for the discretization of this model: first we rewrite the moment equations as a Compressible Gas Dynamics equation by introducing an additional quantity that plays the role of a density. After that we discretize using a Lagrange-projection scheme. The Lagrange-projection scheme permits us to incorporate the source terms in the fluxes of an acoustic solver in the Lagrange step, using the well-known piecewise steady approximation and thus to capture correctly the diffusion regime. Moreover we show that the discretization is entropic and preserve the flux-limited property of the moment model. Numerical examples illustrate the feasibility of our approach. (authors)

  17. Cable Insulation Scheme to Improve Heat Transfer to Superfluid Helium in Nb-Ti Accelerator Magnets

    CERN Document Server

    La China, M

    2008-01-01

    In superconducting magnets operating at high heat loads as the ones for interaction region of particle colliders or for fast cycling synchrotrons, the limited heat transfer capability of state-of-the-art electrical insulation may constitute a heavy limitation to performance. In the LHC main magnets, Nb-Ti epoxy-free insulation, composed of polyimide tapes, has proved to be permeable to superfluid helium, however the heat flux is rather limited. After a review of the standard insulation scheme for Nb-Ti and of the associated heat transfer mechanisms, we show the existence of a large margin available to improve insulation permeability.We propose a possible way to profit of such a margin in order to increase significantly the maximum heat flux drainable from an all polyimide insulated Nb-Ti coil, as it is used in modern accelerator magnets.

  18. Examining the effects of parameter regionalization schemes on parameter transferability on large basin sampling

    Science.gov (United States)

    Rakovec, Oldrich; Mizukami, Naoki; Newman, Andrew; Thober, Stephan; Kumar, Rohini; Wood, Andrew; Clark, Martyn P.; Samaniego, Luis

    2017-04-01

    Assessing model complexity and performing "seamless" continental-domain model simulations (e.g., model parameters yielding good performance across entire domain) is a challenging topic in contemporary hydrology. This study presents a large-sample hydrologic modeling effort to examine the effects of parameter regionalization schemes. Two hydrological models (mHM, VIC) are set up for 500 small to medium-sized unimpaired basins over the contiguous United States for two spatial scales: lumped and 12km grid. For parameter regionalization, we use the well-established Multiscale Parameter Regionalization (MPR) technique for both models, with the specific goal of assessing the transferability of model parameters across different spatial scales (lumped basin scale to distributed), time periods (from calibration to validation period), and locations. In terms of the scale transferability, evaluation of global model parameters at finer scale based on calibration at coarse scale improves the KGE performance (mainly due to the variance related term). Loss in model performance in temporal transferability is independent from model complexity (i.e., lumped vs. distributed). Finally, we show that although the parameter regionalization is crucial for parameter transferability to un-gauged locations, there still remains room for improvement especially for the mean and variability in streamflow. We present possible strategies to resolve this issue, including (1) assessing the importance of more detailed information on the soil data (STATSGO vs. SoilGrids), and (2) applying more advanced selection criteria for training MPR global parameters.

  19. Unified implicit kinetic scheme for steady multiscale heat transfer based on the phonon Boltzmann transport equation

    Science.gov (United States)

    Zhang, Chuang; Guo, Zhaoli; Chen, Songze

    2017-12-01

    An implicit kinetic scheme is proposed to solve the stationary phonon Boltzmann transport equation (BTE) for multiscale heat transfer problem. Compared to the conventional discrete ordinate method, the present method employs a macroscopic equation to accelerate the convergence in the diffusive regime. The macroscopic equation can be taken as a moment equation for phonon BTE. The heat flux in the macroscopic equation is evaluated from the nonequilibrium distribution function in the BTE, while the equilibrium state in BTE is determined by the macroscopic equation. These two processes exchange information from different scales, such that the method is applicable to the problems with a wide range of Knudsen numbers. Implicit discretization is implemented to solve both the macroscopic equation and the BTE. In addition, a memory reduction technique, which is originally developed for the stationary kinetic equation, is also extended to phonon BTE. Numerical comparisons show that the present scheme can predict reasonable results both in ballistic and diffusive regimes with high efficiency, while the memory requirement is on the same order as solving the Fourier law of heat conduction. The excellent agreement with benchmark and the rapid converging history prove that the proposed macro-micro coupling is a feasible solution to multiscale heat transfer problems.

  20. The interactions between soil-biosphere-atmosphere (ISBA) land surface model multi-energy balance (MEB) option in SURFEXv8 - Part 2: Introduction of a litter formulation and model evaluation for local-scale forest sites

    Science.gov (United States)

    Napoly, Adrien; Boone, Aaron; Samuelsson, Patrick; Gollvik, Stefan; Martin, Eric; Seferian, Roland; Carrer, Dominique; Decharme, Bertrand; Jarlan, Lionel

    2017-04-01

    Land surface models (LSMs) need to balance a complicated trade-off between computational cost and complexity in order to adequately represent the exchanges of energy, water and matter with the atmosphere and the ocean. Some current generation LSMs use a simplified or composite canopy approach that generates recurrent errors in simulated soil temperature and turbulent fluxes. In response to these issues, a new version of the interactions between soil-biosphere-atmosphere (ISBA) land surface model has recently been developed that explicitly solves the transfer of energy and water from the upper canopy and the forest floor, which is characterized as a litter layer. The multi-energy balance (MEB) version of ISBA is first evaluated for three well-instrumented contrasting local-scale sites, and sensitivity tests are performed to explore the behavior of new model parameters. Second, ISBA-MEB is benchmarked against observations from 42 forested sites from the global micro-meteorological network (FLUXNET) for multiple annual cycles.It is shown that ISBA-MEB outperforms the composite version of ISBA in improving the representation of soil temperature, ground, sensible and, to a lesser extent, latent heat fluxes. Both versions of ISBA give comparable results in terms of simulated latent heat flux because of the similar formulations of the water uptake and the stomatal resistance. However, MEB produces a better agreement with the observations of sensible heat flux than the previous version of ISBA for 87.5 % of the simulated years across the 42 forested FLUXNET sites. Most of this improvement arises owing to the improved simulation of the ground conduction flux, which is greatly improved using MEB, especially owing to the forest litter parameterization. It is also shown that certain processes are also modeled more realistically (such as the partitioning of evapotranspiration into transpiration and ground evaporation), even if certain statistical performances are neutral. The

  1. A numerical scheme to calculate temperature and salinity dependent air-water transfer velocities for any gas

    Science.gov (United States)

    Johnson, M. T.

    2010-10-01

    The ocean-atmosphere flux of a gas can be calculated from its measured or estimated concentration gradient across the air-sea interface and the transfer velocity (a term representing the conductivity of the layers either side of the interface with respect to the gas of interest). Traditionally the transfer velocity has been estimated from empirical relationships with wind speed, and then scaled by the Schmidt number of the gas being transferred. Complex, physically based models of transfer velocity (based on more physical forcings than wind speed alone), such as the NOAA COARE algorithm, have more recently been applied to well-studied gases such as carbon dioxide and DMS (although many studies still use the simpler approach for these gases), but there is a lack of validation of such schemes for other, more poorly studied gases. The aim of this paper is to provide a flexible numerical scheme which will allow the estimation of transfer velocity for any gas as a function of wind speed, temperature and salinity, given data on the solubility and liquid molar volume of the particular gas. New and existing parameterizations (including a novel empirical parameterization of the salinity-dependence of Henry's law solubility) are brought together into a scheme implemented as a modular, extensible program in the R computing environment which is available in the supplementary online material accompanying this paper; along with input files containing solubility and structural data for ~90 gases of general interest, enabling the calculation of their total transfer velocities and component parameters. Comparison of the scheme presented here with alternative schemes and methods for calculating air-sea flux parameters shows good agreement in general. It is intended that the various components of this numerical scheme should be applied only in the absence of experimental data providing robust values for parameters for a particular gas of interest.

  2. A numerical scheme to calculate temperature and salinity dependent air-water transfer velocities for any gas

    Directory of Open Access Journals (Sweden)

    M. T. Johnson

    2010-10-01

    Full Text Available The ocean-atmosphere flux of a gas can be calculated from its measured or estimated concentration gradient across the air-sea interface and the transfer velocity (a term representing the conductivity of the layers either side of the interface with respect to the gas of interest. Traditionally the transfer velocity has been estimated from empirical relationships with wind speed, and then scaled by the Schmidt number of the gas being transferred. Complex, physically based models of transfer velocity (based on more physical forcings than wind speed alone, such as the NOAA COARE algorithm, have more recently been applied to well-studied gases such as carbon dioxide and DMS (although many studies still use the simpler approach for these gases, but there is a lack of validation of such schemes for other, more poorly studied gases. The aim of this paper is to provide a flexible numerical scheme which will allow the estimation of transfer velocity for any gas as a function of wind speed, temperature and salinity, given data on the solubility and liquid molar volume of the particular gas. New and existing parameterizations (including a novel empirical parameterization of the salinity-dependence of Henry's law solubility are brought together into a scheme implemented as a modular, extensible program in the R computing environment which is available in the supplementary online material accompanying this paper; along with input files containing solubility and structural data for ~90 gases of general interest, enabling the calculation of their total transfer velocities and component parameters. Comparison of the scheme presented here with alternative schemes and methods for calculating air-sea flux parameters shows good agreement in general. It is intended that the various components of this numerical scheme should be applied only in the absence of experimental data providing robust values for parameters for a particular gas of interest.

  3. Additional cash incentive within a conditional cash transfer scheme: a 'controlled before and during' design evaluation study from India.

    Science.gov (United States)

    Lahariya, Chandrakant; Mishra, Ashok; Nandan, Deoki; Gautam, Praveen; Gupta, Sanjay

    2011-01-01

    Conditional Cash Transfer (CCT) schemes have shown largely favorable changes in the health seeking behavior. This evaluation study assesses the process and performance of an Additional Cash Incentive (ACI) scheme within an ongoing CCT scheme in India, and document lessons. A controlled before and during design study was conducted in Madhya Pradesh state of India, from August 2007 to March 2008, with increased in institutional deliveries as a primary outcome. In depth interviews, focus group discussions and household surveys were done for data collection. Lack of awareness about ACI scheme amongst general population and beneficiaries, cumbersome cash disbursement procedure, intricate eligibility criteria, extensive paper work, and insufficient focus on community involvement were the major implementation challenges. There were anecdotal reports of political interference and possible scope for corruption. At the end of implementation period, overall rate of institutional deliveries had increased in both target and control populations; however, the differences were not statistically significant. No cause and effect association could be proven by this study. Poor planning and coordination, and lack of public awareness about the scheme resulted in low utilization. Thus, proper IEC and training, detailed implementation plan, orientation training for implementer, sufficient budgetary allocation, and community participation should be an integral part for successful implementation of any such scheme. The lesson learned this evaluation study may be useful in any developing country setting and may be utilized for planning and implementation of any ACI scheme in future.

  4. Local radial basis function meshless scheme for vector radiative transfer in participating media with randomly oriented axisymmetric particles.

    Science.gov (United States)

    Sun, Jie; Yi, Hong-Liang; Tan, He-Ping

    2016-02-20

    A local radial basis function meshless scheme (LRBFM) is developed to solve polarized radiative transfer in participating media containing randomly oriented axisymmetric particles in which radial basis functions augmented with polynomial basis are employed to construct the trial functions, and the vector radiative-transfer equation based on the discrete-ordinates approach is discretized directly by collocation method. The LRBFM belongs to a class of truly meshless methods that do not need any mesh or any numerical integration scheme. Performances of the LRBFM are verified with analytical solutions and other numerical results reported earlier in the literature via five various test cases. The predicted angular distribution of brightness temperature and Stokes vector by the LRBFM agree very well with the benchmark. It is demonstrated that the LRBFM is accurate to solve vector radiative transfer in participating media with randomly oriented axisymmetric particles.

  5. Performance evaluation of land surface models and cumulus convection schemes in the simulation of Indian summer monsoon using a regional climate model

    Science.gov (United States)

    Maity, S.; Satyanarayana, A. N. V.; Mandal, M.; Nayak, S.

    2017-11-01

    In this study, an attempt has been made to investigate the sensitivity of land surface models (LSM) and cumulus convection schemes (CCS) using a regional climate model, RegCM Version-4.1 in simulating the Indian Summer Monsoon (ISM). Numerical experiments were conducted in seasonal scale (May-September) for three consecutive years: 2007, 2008, 2009 with two LSMs (Biosphere Atmosphere Transfer Scheme (BATS), Community Land Model (CLM 3.5) and five CCSs (MIT, KUO, GRELL, GRELL over land and MIT over ocean (GL_MO), GRELL over ocean and MIT over land (GO_ML)). Important synoptic features are validated using various reanalysis datasets and satellite derived products from TRMM and CRU data. Seasonally averaged surface temperature is reasonably well simulated by the model using both the LSMs along with CCSs namely, MIT, GO_ML and GL_MO schemes. Model simulations reveal slight warm bias using these schemes whereas significant cold bias is seen with KUO and GRELL schemes during all three years. It is noticed that the simulated Somali Jet (SJ) is weak in all simulations except MIT scheme in the simulations with (both BATS and CLM) in which the strength of SJ reasonably well captured. Although the model is able to simulate the Tropical Easterly Jet (TEJ) and Sub-Tropical Westerly Jet (STWJ) with all the CCSs in terms of their location and strength, the performance of MIT scheme seems to be better than the rest of the CCSs. Seasonal rainfall is not well simulated by the model. Significant underestimation of Indian Summer Monsoon Rainfall (ISMR) is observed over Central and North West India. Spatial distribution of seasonal ISMR is comparatively better simulated by the model with MIT followed by GO_ML scheme in combination with CLM although it overestimates rainfall over heavy precipitation zones. On overall statistical analysis, it is noticed that RegCM4 shows better skill in simulating ISM with MIT scheme using CLM.

  6. Spectral collocation method with a flexible angular discretization scheme for radiative transfer in multi-layer graded index medium

    Science.gov (United States)

    Wei, Linyang; Qi, Hong; Sun, Jianping; Ren, Yatao; Ruan, Liming

    2017-05-01

    The spectral collocation method (SCM) is employed to solve the radiative transfer in multi-layer semitransparent medium with graded index. A new flexible angular discretization scheme is employed to discretize the solid angle domain freely to overcome the limit of the number of discrete radiative direction when adopting traditional SN discrete ordinate scheme. Three radial basis function interpolation approaches, named as multi-quadric (MQ), inverse multi-quadric (IMQ) and inverse quadratic (IQ) interpolation, are employed to couple the radiative intensity at the interface between two adjacent layers and numerical experiments show that MQ interpolation has the highest accuracy and best stability. Variable radiative transfer problems in double-layer semitransparent media with different thermophysical properties are investigated and the influence of these thermophysical properties on the radiative transfer procedure in double-layer semitransparent media is also analyzed. All the simulated results show that the present SCM with the new angular discretization scheme can predict the radiative transfer in multi-layer semitransparent medium with graded index efficiently and accurately.

  7. Microelectrode voltammetry of multi-electron transfers complicated by coupled chemical equilibria: a general theory for the extended square scheme.

    Science.gov (United States)

    Laborda, Eduardo; Gómez-Gil, José María; Molina, Angela

    2017-06-28

    A very general and simple theoretical solution is presented for the current-potential-time response of reversible multi-electron transfer processes complicated by homogeneous chemical equilibria (the so-called extended square scheme). The expressions presented here are applicable regardless of the number of electrons transferred and coupled chemical processes, and they are particularized for a wide variety of microelectrode geometries. The voltammetric response of very different systems presenting multi-electron transfers is considered for the most widely-used techniques (namely, cyclic voltammetry, square wave voltammetry, differential pulse voltammetry and steady state voltammetry), studying the influence of the microelectrode geometry and the number and thermodynamics of the (electro)chemical steps. Most appropriate techniques and procedures for the determination of the 'interaction' between successive transfers are discussed. Special attention is paid to those situations where homogeneous chemical processes, such as protonation, complexation or ion association, affect the electrochemical behaviour of the system by different stabilization of the oxidation states.

  8. A numerical scheme to calculate temperature and salinity dependent air-water transfer velocities for any gas

    Science.gov (United States)

    Johnson, M. T.

    2010-02-01

    The transfer velocity determines the rate of exchange of a gas across the air-water interface for a given deviation from Henry's law equilibrium between the two phases. In the thin film model of gas exchange, which is commonly used for calculating gas exchange rates from measured concentrations of trace gases in the atmosphere and ocean/freshwaters, the overall transfer is controlled by diffusion-mediated films on either side of the air-water interface. Calculating the total transfer velocity (i.e. including the influence from both molecular layers) requires the Henry's law constant and the Schmidt number of the gas in question, the latter being the ratio of the viscosity of the medium and the molecular diffusivity of the gas in the medium. All of these properties are both temperature and (on the water side) salinity dependent and extensive calculation is required to estimate these properties where not otherwise available. The aim of this work is to standardize the application of the thin film approach to flux calculation from measured and modelled data, to improve comparability, and to provide a numerical framework into which future parameter improvements can be integrated. A detailed numerical scheme is presented for the calculation of the gas and liquid phase transfer velocities (ka and kw respectively) and the total transfer velocity, K. The scheme requires only basic physical chemistry data for any gas of interest and calculates K over the full range of temperatures, salinities and wind-speeds observed in and over the ocean. Improved relationships for the wind-speed dependence of ka and for the salinity-dependence of the gas solubility (Henry's law) are derived. Comparison with alternative schemes and methods for calculating air-sea flux parameters shows good agreement in general but significant improvements under certain conditions. The scheme is provided as a downloadable program in the supplementary material, along with input files containing molecular

  9. Wide Area Protection Scheme Preventing Cascading Events Caused by Load Flow Transferring

    DEFF Research Database (Denmark)

    Liu, Zhou; Chen, Zhe; Sun, Haishun

    2013-01-01

    Load flow transferring after an initial contingency is regarded as one of the main reasons of causing unexpected cascading trips. A multi agent system (MAS) based wide area protection strategy is proposed in this paper to predict the load flow transferring from the point of view of impedance relays...... strategy. The simulation results indicate this strategy can successfully predict and prevent the unexpected relay operation caused by load flow transferring....

  10. Prediction of the 21-cm signal from reionization: comparison between 3D and 1D radiative transfer schemes

    Science.gov (United States)

    Ghara, Raghunath; Mellema, Garrelt; Giri, Sambit K.; Choudhury, T. Roy; Datta, Kanan K.; Majumdar, Suman

    2018-05-01

    Three-dimensional radiative transfer simulations of the epoch of reionization can produce realistic results, but are computationally expensive. On the other hand, simulations relying on one-dimensional radiative transfer solutions are faster but limited in accuracy due to their more approximate nature. Here, we compare the performance of the reionization simulation codes GRIZZLY and C2-RAY which use 1D and 3D radiative transfer schemes, respectively. The comparison is performed using the same cosmological density fields, halo catalogues, and source properties. We find that the ionization maps, as well as the 21-cm signal maps from these two simulations are very similar even for complex scenarios which include thermal feedback on low-mass haloes. The comparison between the schemes in terms of the statistical quantities such as the power spectrum of the brightness temperature fluctuation agrees with each other within 10 per cent error throughout the entire reionization history. GRIZZLY seems to perform slightly better than the seminumerical approaches considered in Majumdar et al. which are based on the excursion set principle. We argue that GRIZZLY can be efficiently used for exploring parameter space, establishing observations strategies, and estimating parameters from 21-cm observations.

  11. Prediction of the 21-cm signal from reionization: comparison between 3D and 1D radiative transfer schemes

    Science.gov (United States)

    Ghara, Raghunath; Mellema, Garrelt; Giri, Sambit K.; Roy Choudhury, T.; Datta, Kanan K.; Majumdar, Suman

    2018-02-01

    Three-dimensional radiative transfer simulations of the epoch of reionization can produce realistic results, but are computationally expensive. On the other hand, simulations relying on one-dimensional radiative transfer solutions are faster but limited in accuracy due to their more approximate nature. Here, we compare the performance of the reionization simulation codes GRIZZLY and C^2-RAY which use 1D and 3D radiative transfer schemes respectively. The comparison is performed using the same cosmological density fields, halo catalogues and source properties. We find that the ionization maps, as well as the 21-cm signal maps from these two simulations are very similar even for complex scenarios which include thermal feedback on low mass halos. The comparison between the schemes in terms of the statistical quantities such as the power spectrum of the brightness temperature fluctuation agree with each other within 10% error throughout the entire reionization history. GRIZZLY seems to perform slightly better than the semi-numerical approaches considered in Majumdar et al. (2014) which are based on the excursion set principle. We argue that GRIZZLY can be efficiently used for exploring parameter space, establishing observations strategies and estimating parameters from 21-cm observations.

  12. A Novel Image Encryption Scheme Based on Clifford Attractor and Noisy Logistic Map for Secure Transferring Images in Navy

    Directory of Open Access Journals (Sweden)

    Mohadeseh Kanafchian

    2017-04-01

    In this paper, we first give a brief introduction into chaotic image encryption and then we investigate some important properties and behaviour of the logistic map. The logistic map, aperiodic trajectory, or random-like fluctuation, could not be obtained with some choice of initial condition. Therefore, a noisy logistic map with an additive system noise is introduced. The proposed scheme is based on the extended map of the Clifford strange attractor, where each dimension has a specific role in the encryption process. Two dimensions are used for pixel permutation and the third dimension is used for pixel diffusion. In order to optimize the Clifford encryption system we increase the space key by using the noisy logistic map and a novel encryption scheme based on the Clifford attractor and the noisy logistic map for secure transfer images is proposed. This algorithm consists of two parts: the noisy logistic map shuffle of the pixel position and the pixel value. We use times for shuffling the pixel position and value then we generate the new pixel position and value by the Clifford system. To illustrate the efficiency of the proposed scheme, various types of security analysis are tested. It can be concluded that the proposed image encryption system is a suitable choice for practical applications.

  13. A class of Galerkin Schemes for Time-Dependent Radiative Transfer

    NARCIS (Netherlands)

    Egger, Herbert; Schlottbom, Matthias

    2016-01-01

    The numerical solution of time-dependent radiative transfer problems is challenging, due to the high dimension and to the anisotropic structure of the underlying integro-partial differential equation. In this paper we propose a general framework for designing numerical methods for time-dependent

  14. How much are people willing to pay for efficient waste management schemes? A benefit transfer application.

    Science.gov (United States)

    Damigos, Dimitris; Kaliampakos, Dimitris; Menegaki, Maria

    2016-04-01

    To socially justify the need for better municipal solid waste management services, especially in the light of the limited availability of public funds, it is important to quantify the monetary value of the potential social and environmental benefits offered by them. This article aims at estimating society's willingness to pay improved municipal solid waste management and establishing suitable reference values using the 'benefit transfer' method. To this direction, relevant studies from the global scientific and grey literature in the field of municipal solid waste management valuation are analysed and two different transfer approaches are implemented. According to the analysis, the mean annual willingness to pay per household is 88.4 USD(2014) (5%-trimmed mean: 78.7 USD(2014); 95% confidence interval lower bound: 64.8 USD(2014) and upper bound: 112.0 USD(2014)). The analysis yields estimates with a high standard deviation and notably broad confidence intervals, owing to design issues of the primary studies, the different socioeconomic profiles of the populations surveyed and the existing level of municipal solid waste management services. Thus, a meta-regression model is estimated to explore the sources of heterogeneity and facilitate more accurate transfer values. Nevertheless, the limited number of observations and some methodological issues in the design and conduct of the original surveys set certain challenges and increase the level of uncertainty of the transfer values. © The Author(s) 2016.

  15. Sensitivity of simulated South America climate to the land surface schemes in RegCM4

    Science.gov (United States)

    Llopart, Marta; da Rocha, Rosmeri P.; Reboita, Michelle; Cuadra, Santiago

    2017-12-01

    This work evaluates the impact of two land surface parameterizations on the simulated climate and its variability over South America (SA). Two numerical experiments using RegCM4 coupled with the Biosphere-Atmosphere Transfer Scheme (RegBATS) and the Community Land Model version 3.5 (RegCLM) land surface schemes are compared. For the period 1979-2008, RegCM4 simulations used 50 km horizontal grid spacing and the ERA-Interim reanalysis as initial and boundary conditions. For the period studied, both simulations represent the main observed spatial patterns of rainfall, air temperature and low level circulation over SA. However, with regard to the precipitation intensity, RegCLM values are closer to the observations than RegBATS (it is wetter in general) over most of SA. RegCLM also produces smaller biases for air temperature. Over the Amazon basin, the amplitudes of the annual cycles of the soil moisture, evapotranspiration and sensible heat flux are higher in RegBATS than in RegCLM. This indicates that RegBATS provides large amounts of water vapor to the atmosphere and has more available energy to increase the boundary layer thickness and cause it to reach the level of free convection (higher sensible heat flux values) resulting in higher precipitation rates and a large wet bias. RegCLM is closer to the observations than RegBATS, presenting smaller wet and warm biases over the Amazon basin. On an interannual scale, the magnitudes of the anomalies of the precipitation and air temperature simulated by RegCLM are closer to the observations. In general, RegBATS simulates higher magnitude for the interannual variability signal.

  16. GPU-BASED MONTE CARLO DUST RADIATIVE TRANSFER SCHEME APPLIED TO ACTIVE GALACTIC NUCLEI

    International Nuclear Information System (INIS)

    Heymann, Frank; Siebenmorgen, Ralf

    2012-01-01

    A three-dimensional parallel Monte Carlo (MC) dust radiative transfer code is presented. To overcome the huge computing-time requirements of MC treatments, the computational power of vectorized hardware is used, utilizing either multi-core computer power or graphics processing units. The approach is a self-consistent way to solve the radiative transfer equation in arbitrary dust configurations. The code calculates the equilibrium temperatures of two populations of large grains and stochastic heated polycyclic aromatic hydrocarbons. Anisotropic scattering is treated applying the Heney-Greenstein phase function. The spectral energy distribution (SED) of the object is derived at low spatial resolution by a photon counting procedure and at high spatial resolution by a vectorized ray tracer. The latter allows computation of high signal-to-noise images of the objects at any frequencies and arbitrary viewing angles. We test the robustness of our approach against other radiative transfer codes. The SED and dust temperatures of one- and two-dimensional benchmarks are reproduced at high precision. The parallelization capability of various MC algorithms is analyzed and included in our treatment. We utilize the Lucy algorithm for the optical thin case where the Poisson noise is high, the iteration-free Bjorkman and Wood method to reduce the calculation time, and the Fleck and Canfield diffusion approximation for extreme optical thick cells. The code is applied to model the appearance of active galactic nuclei (AGNs) at optical and infrared wavelengths. The AGN torus is clumpy and includes fluffy composite grains of various sizes made up of silicates and carbon. The dependence of the SED on the number of clumps in the torus and the viewing angle is studied. The appearance of the 10 μm silicate features in absorption or emission is discussed. The SED of the radio-loud quasar 3C 249.1 is fit by the AGN model and a cirrus component to account for the far-infrared emission.

  17. A Maximum Efficiency Point Tracking Control Scheme Based on Different Cross Coupling of Dual-Receiver Inductive Power Transfer System

    Directory of Open Access Journals (Sweden)

    Ruikun Mai

    2017-02-01

    Full Text Available One of the most promising inductive power transfer applications is the wireless power supply for locomotives which may cancel the need for pantographs. In order to meet the dynamic and high power demands of wireless power supplies for locomotives, a relatively long transmitter track and multiple receivers are usually adopted. However, during the dynamic charging, the mutual inductances between the transmitter and receivers vary and the load of the locomotives also changes randomly, which dramatically affects the system efficiency. A maximum efficiency point tracking control scheme is proposed to improve the system efficiency against the variation of the load and the mutual inductances between the transmitter and receivers while considering the cross coupling between receivers. Firstly, a detailed theoretical analysis on dual receivers is carried out. Then a control scheme with three control loops is proposed to regulate the receiver currents to be the same, to regulate the output voltage and to search for the maximum efficiency point. Finally, a 2 kW prototype is established to validate the performance of the proposed method. The overall system efficiency (DC-DC efficiency reaches 90.6% at rated power and is improved by 5.8% with the proposed method under light load compared with the traditional constant output voltage control method.

  18. Evaluation of Closed Adult Nucleus Multiple Ovulation and Embryo Transfer and Conventional Progeny Testing Breeding Schemes for Milk Production from Crossbred Cattle in the Tropics

    NARCIS (Netherlands)

    Kosgey, I.S.; Kahi, A.K.; Arendonk, van J.A.M.

    2005-01-01

    The potential benefits of closed adult nucleus multiple ovulation and embryo transfer (MOET) and conventional progeny testing (CNS) schemes, and the logistics of their integration into large-scale continuous production of crossbred cattle were studied by deterministic simulation. The latter was

  19. Accompanying coordinate expansion and recurrence relation method using a transfer relation scheme for electron repulsion integrals with high angular momenta and long contractions

    International Nuclear Information System (INIS)

    Hayami, Masao; Seino, Junji; Nakai, Hiromi

    2015-01-01

    An efficient algorithm for the rapid evaluation of electron repulsion integrals is proposed. The present method, denoted by accompanying coordinate expansion and transferred recurrence relation (ACE-TRR), is constructed using a transfer relation scheme based on the accompanying coordinate expansion and recurrence relation method. Furthermore, the ACE-TRR algorithm is extended for the general-contraction basis sets. Numerical assessments clarify the efficiency of the ACE-TRR method for the systems including heavy elements, whose orbitals have long contractions and high angular momenta, such as f- and g-orbitals

  20. Accompanying coordinate expansion and recurrence relation method using a transfer relation scheme for electron repulsion integrals with high angular momenta and long contractions

    Science.gov (United States)

    Hayami, Masao; Seino, Junji; Nakai, Hiromi

    2015-05-01

    An efficient algorithm for the rapid evaluation of electron repulsion integrals is proposed. The present method, denoted by accompanying coordinate expansion and transferred recurrence relation (ACE-TRR), is constructed using a transfer relation scheme based on the accompanying coordinate expansion and recurrence relation method. Furthermore, the ACE-TRR algorithm is extended for the general-contraction basis sets. Numerical assessments clarify the efficiency of the ACE-TRR method for the systems including heavy elements, whose orbitals have long contractions and high angular momenta, such as f- and g-orbitals.

  1. Evaluation of the CPU time for solving the radiative transfer equation with high-order resolution schemes applying the normalized weighting-factor method

    Science.gov (United States)

    Xamán, J.; Zavala-Guillén, I.; Hernández-López, I.; Uriarte-Flores, J.; Hernández-Pérez, I.; Macías-Melo, E. V.; Aguilar-Castro, K. M.

    2018-03-01

    In this paper, we evaluated the convergence rate (CPU time) of a new mathematical formulation for the numerical solution of the radiative transfer equation (RTE) with several High-Order (HO) and High-Resolution (HR) schemes. In computational fluid dynamics, this procedure is known as the Normalized Weighting-Factor (NWF) method and it is adopted here. The NWF method is used to incorporate the high-order resolution schemes in the discretized RTE. The NWF method is compared, in terms of computer time needed to obtain a converged solution, with the widely used deferred-correction (DC) technique for the calculations of a two-dimensional cavity with emitting-absorbing-scattering gray media using the discrete ordinates method. Six parameters, viz. the grid size, the order of quadrature, the absorption coefficient, the emissivity of the boundary surface, the under-relaxation factor, and the scattering albedo are considered to evaluate ten schemes. The results showed that using the DC method, in general, the scheme that had the lowest CPU time is the SOU. In contrast, with the results of theDC procedure the CPU time for DIAMOND and QUICK schemes using the NWF method is shown to be, between the 3.8 and 23.1% faster and 12.6 and 56.1% faster, respectively. However, the other schemes are more time consuming when theNWFis used instead of the DC method. Additionally, a second test case was presented and the results showed that depending on the problem under consideration, the NWF procedure may be computationally faster or slower that the DC method. As an example, the CPU time for QUICK and SMART schemes are 61.8 and 203.7%, respectively, slower when the NWF formulation is used for the second test case. Finally, future researches to explore the computational cost of the NWF method in more complex problems are required.

  2. A gas dynamics scheme for a two moments model of radiative transfer; Un schema de type dynamique des gaz pour un modele a deux moments en transfert radiatif

    Energy Technology Data Exchange (ETDEWEB)

    Buet, Ch.; Despres, B

    2007-07-01

    We address the discretization of the Levermore's two moments and entropy model of the radiative transfer equation. We present a new approach for the discretization of this model: first we rewrite the moment equations as a Compressible Gas Dynamics equation by introducing an additional quantity that plays the role of a density. After that we discretize using a Lagrange-projection scheme. The Lagrange-projection scheme permits us to incorporate the source terms in the fluxes of an acoustic solver in the Lagrange step, using the well-known piecewise steady approximation and thus to capture correctly the diffusion regime. Moreover we show that the discretization is entropic and preserve the flux-limited property of the moment model. Numerical examples illustrate the feasibility of our approach. (authors)

  3. Evaluation of a knowledge transfer scheme to improve policy making and practices in health promotion and disease prevention setting in French regions: a realist study protocol.

    Science.gov (United States)

    Cambon, Linda; Petit, Audrey; Ridde, Valery; Dagenais, Christian; Porcherie, Marion; Pommier, Jeanine; Ferron, Chrisine; Minary, Laetitia; Alla, François

    2017-06-29

    Evidence-based decision-making and practice are pivotal in public health. However, barriers do persist and they relate to evidence properties, organisations and contexts. To address these major knowledge transfer (KT) issues, we need to rethink how knowledge is produced and used, to enhance our understanding of decision-making processes, logics and mechanisms and to examine the ability of public health services to integrate research findings into their decisions and operations. This article presents a realist evaluation protocol to assess a KT scheme in prevention policy and practice at local level in France. This study is a comparative multiple case study, using a realist approach, to assess a KT scheme in regional health agencies (ARS) and regional non-profit organisations for health education and promotion (IREPS), by analysing the configurations contexts/mechanisms/outcomes of it. The KT scheme assessed is designed for the use of six reviews of systematic reviews concerning the following themes: nutrition, alcohol, tobacco smoking, physical activity, emotional and sexual life and psychosocial skills. It combines the following activities: supporting the access to and the adaptation of scientific and usable evidences; strengthening professionals' skills to analyse, adopt and use the evidences in the course of their practices and their decision-making process; facilitating the use of evidence in the organisations and processes. RAMESE II reporting standards for realist evaluations was used. The aims of this study are to experiment and characterise the factors related to the scheme's ability to enable public health stakeholders to address the challenges of KT and to integrate scientific knowledge into policy and practice. We will use the realist approach in order to document the parameters of successful KT strategies in the specific contexts of preventive health services in France, while seeking to determine the transferability of such strategies.

  4. Construction and Nanoscale Detection of Interfacial Charge Transfer of Elegant Z-Scheme WO3/Au/In2S3 Nanowire Arrays.

    Science.gov (United States)

    Li, Haijin; Gao, Yuying; Zhou, Yong; Fan, Fengtao; Han, Qiutong; Xu, Qinfeng; Wang, Xiaoyong; Xiao, Min; Li, Can; Zou, Zhigang

    2016-09-14

    Elegant Z-scheme WO3/Au/In2S3 nanowire arrays were precisely constructed through a facile step-by-step route. Surface potential change on pristine or In2S3-Au coated WO3 single nanowire under dark and illumination detected through a Kelvin probe force microscopy (KPFM) technique indicates that the vectorial holes transfer of In2S3 → Au → WO3 should occur upon the excitation of both WO3 and In2S3. In such charge transfer processes, the embedded Au nanoparticles in the heterojunction systems act as a charge mediator for electrons in the conduction band of WO3 and holes in the valence band of In2S3. The strong charge carrier separation ability of this structure will finally enhance the oxidation ability of WO3 with high concertation of photogenerated holes and, further, leave the free electrons in the In2S3 with long surviving time. Therefore, the unique Z-scheme WO3/Au/In2S3 heterostructure shows great visible-light activity toward photocatalytic reduction of CO2 in the presence of water vapor into renewable hydrocarbon fuel (methane: CH4).

  5. Radiances simulated in the presence of clouds by use of a fast radiative transfer model and a multiple-scattering scheme.

    Science.gov (United States)

    Amorati, Roberta; Rizzi, Rolando

    2002-03-20

    A fast-forward radiative transfer (RTF) model is presented that includes cloud-radiation interaction for any number of cloud layers. Layer cloud fraction and transmittance are treated separately and combined with that of gaseous transmittances. RTF is tested against a reference procedure that uses line-by-line gaseous transmittances and solves the radiative transfer equation by use of the adding-doubling method to handle multiple-scattering conditions properly. The comparison is carried out for channels 8, 12, and 14 of the High Resolution Infrared Radiation Sounder (HIRS/2) and for the geostationary satellite METEOSAT thermal infrared and water vapor channels. Fairly large differences in simulated radiances by the two schemes are found in clear conditions for upper- and mid-tropospheric channels; the cause of the differences is discussed. For cloudy situations an improved layer source function is shown to be required when rapid changes in atmospheric transmission are experienced within the model layers. The roles of scattering processes are discussed; results with and without scattering, both obtained by use of a reference code, are compared. Overall, the presented results show that the fast model is capable of reproducing the cloudy results of the much more complex and time-consuming reference scheme.

  6. Evaluating the impacts of cumulus, land surface and ocean surface schemes on summertime rainfall simulations over East-to-southeast Asia and the western north Pacific by RegCM4

    Science.gov (United States)

    Li, Yu-Bin; Tam, Chi-Yung; Huang, Wan-Ru; Cheung, Kevin K. W.; Gao, Zhiqiu

    2016-04-01

    This study evaluates the sensitivity of summertime rainfall simulations over East-to-southeast Asia and the western north Pacific in the regional climate model version 4 (RegCM4) to cumulus (including Grell with Arakawa-Schubert type closure, Grell with Fritsch-Chappell type closure, and Emanuel), land surface (Biosphere-atmosphere transfer scheme or BATS, and the community land model or CLM) and ocean surface (referred to as Zeng1, Zeng2 and BATS1e in the model) schemes by running the model with different combinations of these parameterization packages. For each of these experiments, ensemble integration of the model was carried out in the extended boreal summer of May-October from 1998 to 2007. The simulated spatial distribution, intensity and inter-annual variation of the precipitation, latent heat flux, position of the subtropical high and tropical cyclone genesis patterns from these numerical experiments were analyzed. Examinations show that the combination of Emanuel, CLM and Zeng2 (E-C-Z2) yields the best overall results, consistent with the fact that physical mechanisms considered in E-C-Z2 tend to be more comprehensive in comparison with the others. Additionally, the rainfall quantity is found very sensitive to sea surface roughness length, and the reduction of the roughness length constant (from 2 × 10-4 to 5 × 10-5 m) in our modified BATS1e mitigates the drastic overestimation of latent heat flux and rainfall, and is therefore preferable to the default value for simulations in the western north Pacific region in RegCM4.

  7. Payment Schemes in Conditional Cash Transfer Programs: The Case of 4Ps in the Davao Region, Philippines

    Directory of Open Access Journals (Sweden)

    Ma Cecilia Catubig

    2015-11-01

    Full Text Available This paper evaluates current payment schemes employed by the Pantawid Pamilyang Pilipino Program (4Ps in the Philippines using six assessment criteria: transaction cost, security/risks, speed and timeliness, acceptability, resilience and flexibility. Employing data collected at the regional level, we establish four main findings: (1 all 4Ps payment conduits present trade-offs; (2 a payment approach that uses mainstream financial infrastructure is beneficial if cost, speed and simplicity of the payment system are critical; (3 competition for 4Ps contracts for Payment Service Providers (PSPs has improved the quality of payment services and minimized costs; and (4 the efficiency of the program is greatly influenced by the commitment of the PSP to deliver the cash benefits to the recipients in a timely manner rather than by maximizing conduit branches.

  8. On the development of OpenFOAM solvers based on explicit and implicit high-order Runge-Kutta schemes for incompressible flows with heat transfer

    Science.gov (United States)

    D'Alessandro, Valerio; Binci, Lorenzo; Montelpare, Sergio; Ricci, Renato

    2018-01-01

    Open-source CFD codes provide suitable environments for implementing and testing low-dissipative algorithms typically used to simulate turbulence. In this research work we developed CFD solvers for incompressible flows based on high-order explicit and diagonally implicit Runge-Kutta (RK) schemes for time integration. In particular, an iterated PISO-like procedure based on Rhie-Chow correction was used to handle pressure-velocity coupling within each implicit RK stage. For the explicit approach, a projected scheme was used to avoid the "checker-board" effect. The above-mentioned approaches were also extended to flow problems involving heat transfer. It is worth noting that the numerical technology available in the OpenFOAM library was used for space discretization. In this work, we additionally explore the reliability and effectiveness of the proposed implementations by computing several unsteady flow benchmarks; we also show that the numerical diffusion due to the time integration approach is completely canceled using the solution techniques proposed here.

  9. Analysis and evaluation of WRF microphysical schemes for deep moist convection over south-eastern South America (SESA using microwave satellite observations and radiative transfer simulations

    Directory of Open Access Journals (Sweden)

    V. S. Galligani

    2017-10-01

    Full Text Available In the present study, three meteorological events of extreme deep moist convection, characteristic of south-eastern South America, are considered to conduct a systematic evaluation of the microphysical parameterizations available in the Weather Research and Forecasting (WRF model by undertaking a direct comparison between satellite-based simulated and observed microwave radiances. A research radiative transfer model, the Atmospheric Radiative Transfer Simulator (ARTS, is coupled with the WRF model under three different microphysical parameterizations (WSM6, WDM6 and Thompson schemes. Microwave radiometry has shown a promising ability in the characterization of frozen hydrometeors. At high microwave frequencies, however, frozen hydrometeors significantly scatter radiation, and the relationship between radiation and hydrometeor populations becomes very complex. The main difficulty in microwave remote sensing of frozen hydrometeor characterization is correctly characterizing this scattering signal due to the complex and variable nature of the size, composition and shape of frozen hydrometeors. The present study further aims at improving the understanding of frozen hydrometeor optical properties characteristic of deep moist convection events in south-eastern South America. In the present study, bulk optical properties are computed by integrating the single-scattering properties of the Liu(2008 discrete dipole approximation (DDA single-scattering database across the particle size distributions parameterized by the different WRF schemes in a consistent manner, introducing the equal mass approach. The equal mass approach consists of describing the optical properties of the WRF snow and graupel hydrometeors with the optical properties of habits in the DDA database whose dimensions might be different (Dmax′ but whose mass is conserved. The performance of the radiative transfer simulations is evaluated by comparing the simulations with the available

  10. Analysis and evaluation of WRF microphysical schemes for deep moist convection over south-eastern South America (SESA) using microwave satellite observations and radiative transfer simulations

    Science.gov (United States)

    Sol Galligani, Victoria; Wang, Die; Alvarez Imaz, Milagros; Salio, Paola; Prigent, Catherine

    2017-10-01

    In the present study, three meteorological events of extreme deep moist convection, characteristic of south-eastern South America, are considered to conduct a systematic evaluation of the microphysical parameterizations available in the Weather Research and Forecasting (WRF) model by undertaking a direct comparison between satellite-based simulated and observed microwave radiances. A research radiative transfer model, the Atmospheric Radiative Transfer Simulator (ARTS), is coupled with the WRF model under three different microphysical parameterizations (WSM6, WDM6 and Thompson schemes). Microwave radiometry has shown a promising ability in the characterization of frozen hydrometeors. At high microwave frequencies, however, frozen hydrometeors significantly scatter radiation, and the relationship between radiation and hydrometeor populations becomes very complex. The main difficulty in microwave remote sensing of frozen hydrometeor characterization is correctly characterizing this scattering signal due to the complex and variable nature of the size, composition and shape of frozen hydrometeors. The present study further aims at improving the understanding of frozen hydrometeor optical properties characteristic of deep moist convection events in south-eastern South America. In the present study, bulk optical properties are computed by integrating the single-scattering properties of the Liu(2008) discrete dipole approximation (DDA) single-scattering database across the particle size distributions parameterized by the different WRF schemes in a consistent manner, introducing the equal mass approach. The equal mass approach consists of describing the optical properties of the WRF snow and graupel hydrometeors with the optical properties of habits in the DDA database whose dimensions might be different (Dmax') but whose mass is conserved. The performance of the radiative transfer simulations is evaluated by comparing the simulations with the available coincident

  11. Incorporation of an evolutionary algorithm to estimate transfer-functions for a parameter regionalization scheme of a rainfall-runoff model

    Science.gov (United States)

    Klotz, Daniel; Herrnegger, Mathew; Schulz, Karsten

    2016-04-01

    This contribution presents a framework, which enables the use of an Evolutionary Algorithm (EA) for the calibration and regionalization of the hydrological model COSEROreg. COSEROreg uses an updated version of the HBV-type model COSERO (Kling et al. 2014) for the modelling of hydrological processes and is embedded in a parameter regionalization scheme based on Samaniego et al. (2010). The latter uses subscale-information to estimate model via a-priori chosen transfer functions (often derived from pedotransfer functions). However, the transferability of the regionalization scheme to different model-concepts and the integration of new forms of subscale information is not straightforward. (i) The usefulness of (new) single sub-scale information layers is unknown beforehand. (ii) Additionally, the establishment of functional relationships between these (possibly meaningless) sub-scale information layers and the distributed model parameters remain a central challenge in the implementation of a regionalization procedure. The proposed method theoretically provides a framework to overcome this challenge. The implementation of the EA encompasses the following procedure: First, a formal grammar is specified (Ryan et al., 1998). The construction of the grammar thereby defines the set of possible transfer functions and also allows to incorporate hydrological domain knowledge into the search itself. The EA iterates over the given space by combining parameterized basic functions (e.g. linear- or exponential functions) and sub-scale information layers into transfer functions, which are then used in COSEROreg. However, a pre-selection model is applied beforehand to sort out unfeasible proposals by the EA and to reduce the necessary model runs. A second optimization routine is used to optimize the parameters of the transfer functions proposed by the EA. This concept, namely using two nested optimization loops, is inspired by the idea of Lamarckian Evolution and Baldwin Effect

  12. “No one says ‘No’ to money” – a mixed methods approach for evaluating conditional cash transfer schemes to improve girl children’s status in Haryana, India

    Science.gov (United States)

    2014-01-01

    Introduction Haryana was the first state in India to launch a conditional cash transfer (CCT) scheme in 1994. Initially it targeted all disadvantaged girls but was revised in 2005 to restrict it to second girl children of all groups. The benefit which accrued at girl attaining 18 years and subject to conditionalities of being fully immunized, studying till class 10 and remaining unmarried, was increased from about US$ 500 to US$ 2000. Using a mixed methods approach, we evaluated the implementation and possible impact of these two schemes. Methods A survey was conducted among 200 randomly selected respondents of Ballabgarh Block in Haryana to assess their perceptions of girl children and related schemes. A cohort of births during this period was assembled from population database of 28 villages in this block and changes in sex ratio at birth and in immunization coverage at one year of age among boys and girls was measured. Education levels and mean age at marriage of daughters were compared with daughters-in-law from outside Haryana. In-depth interviews were conducted among district level implementers of these schemes to assess their perceptions of programs’ implementation and impact. These were analyzed using a thematic approach. Results The perceptions of girls as a liability and poor (9% to 15%) awareness of the schemes was noted. The cohort analysis showed that while there has been an improvement in the indicators studied, these were similar to those seen among the control groups. Qualitative analysis identified a “conspiracy of silence” - an underplaying of the pervasiveness of the problem coupled with a passive implementation of the program and a clash between political culture of giving subsidies and a bureaucratic approach that imposed many conditionalities and documentary needs for availing of benefits. Conclusion The apparent lack of impact on the societal mindset calls for a revision in the current approach of addressing a social issue by a purely

  13. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  14. Challenges in quantifying biosphere-atmosphere exchange of nitrogen species

    DEFF Research Database (Denmark)

    Sutton, M.A.; Nemitz, E.; Erisman, J.W.

    2007-01-01

    Recent research in nitrogen exchange with the atmosphere has separated research communities according to N form. The integrated perspective needed to quantify the net effect of N on greenhouse-gas balance is being addressed by the NitroEurope Integrated Project (NEU). Recent advances have depende...

  15. Challenges in quantifying biosphere-atmosphere exchange of nitrogen species

    Energy Technology Data Exchange (ETDEWEB)

    Sutton, M.A. [Centre for Ecology and Hydrology (CEH), Edinburgh Research Station, Bush Estate, Penicuik, EH26 0QB (United Kingdom)], E-mail: ms@ceh.ac.uk; Nemitz, E. [Centre for Ecology and Hydrology (CEH), Edinburgh Research Station, Bush Estate, Penicuik, EH26 0QB (United Kingdom); Erisman, J.W. [ECN, Clean Fossil Fuels, PO Box 1, 1755 ZG Petten (Netherlands); Beier, C. [Riso National Laboratory, PO Box 49, DK-4000 Roskilde (Denmark); Bahl, K. Butterbach [Institute of Meteorology and Climate Research, Atmos. Environ. Research (IMK-IFU), Research Centre Karlsruhe GmbH, Kreuzeckbahnstr. 19, 82467 Garmisch-Partenkirchen (Germany); Cellier, P. [INRA Unite Mixte de Recherche, 78850 Thiverval-Grignon (France); Vries, W. de [Alterra, Green World Research, PO Box 47, 6700 AA Wageningen (Netherlands); Cotrufo, F. [Dip. Scienze Ambientali, Seconda Universita degli Studi di Napoli, via Vivaldi 43, 81100 Caserta (Italy); Skiba, U.; Di Marco, C.; Jones, S. [Centre for Ecology and Hydrology (CEH), Edinburgh Research Station, Bush Estate, Penicuik, EH26 0QB (United Kingdom); Laville, P.; Soussana, J.F.; Loubet, B. [INRA Unite Mixte de Recherche, 78850 Thiverval-Grignon (France); Twigg, M.; Famulari, D. [Centre for Ecology and Hydrology (CEH), Edinburgh Research Station, Bush Estate, Penicuik, EH26 0QB (United Kingdom); Whitehead, J.; Gallagher, M.W. [School of Earth, Atmospheric and Environmental Sciences, University of Manchester, Williamson Building, Oxford Road, Manchester, M13 9PL (United Kingdom); Neftel, A.; Flechard, C.R. [Agroscope FAL Reckenholz, Federal Research Station for Agroecology and Agriculture, PO Box, CH 8046 Zurich (Switzerland)] (and others)

    2007-11-15

    Recent research in nitrogen exchange with the atmosphere has separated research communities according to N form. The integrated perspective needed to quantify the net effect of N on greenhouse-gas balance is being addressed by the NitroEurope Integrated Project (NEU). Recent advances have depended on improved methodologies, while ongoing challenges include gas-aerosol interactions, organic nitrogen and N{sub 2} fluxes. The NEU strategy applies a 3-tier Flux Network together with a Manipulation Network of global-change experiments, linked by common protocols to facilitate model application. Substantial progress has been made in modelling N fluxes, especially for N{sub 2}O, NO and bi-directional NH{sub 3} exchange. Landscape analysis represents an emerging challenge to address the spatial interactions between farms, fields, ecosystems, catchments and air dispersion/deposition. European up-scaling of N fluxes is highly uncertain and a key priority is for better data on agricultural practices. Finally, attention is needed to develop N flux verification procedures to assess compliance with international protocols. - Current N research is separated by form; the challenge is to link N components, scales and issues.

  16. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  17. Dust-induced episodic phytoplankton blooms in the Arabian Sea during winter monsoon

    Digital Repository Service at National Institute of Oceanography (India)

    Banerjee, P.; PrasannaKumar, S.

    Biosphere-Atmosphere Transfer Scheme (BATS) [Dickinson et al., 1993]. For our present study we compared the simulated τdu with τdu from MODIS/Aqua. Implicit in this comparison is the assumption that a successful simulation of τdu means a proper treatment...

  18. Boosting the Visible-Light Photoactivity of BiOCl/BiVO4/N-GQD Ternary Heterojunctions Based on Internal Z-Scheme Charge Transfer of N-GQDs: Simultaneous Band Gap Narrowing and Carrier Lifetime Prolonging.

    Science.gov (United States)

    Zhu, Mingyue; Liu, Qian; Chen, Wei; Yin, Yuanyuan; Ge, Lan; Li, Henan; Wang, Kun

    2017-11-08

    The efficient separation of photogenerated electron-hole pairs in photoactive materials is highly desired, allowing their transfer to specific sites for undergoing redox reaction in various applications. The construction of ternary heterojunctions is a practical strategy to enhance the migration of photogenerated electron that realizes the synergistic effect of multicomponents rather than the simple overlay of single component. Here, we demonstrate an available way to fabricate new BiOCl/BiVO 4 /nitrogen-doped graphene quantum dot (N-GQD) ternary heterojunctions that exhibit higher efficiency in charge separation than any binary heterojunction or pure material under visible-light irradiation. UV-vis diffuse reflectance spectroscopy demonstrated that the proposed BiOCl/BiVO 4 /N-GQD ternary heterojunctions possess the narrower band gap energy. More importantly, the ternary heterojunctions reveal the prolonged lifetime of photogenerated charges and enhanced the separation efficiency of photogenerated electron-hole pairs, which may be ascribed to sensitization based on an internal Z-scheme charge transfer at the interface of N-GQDs with oxygen functional groups. Furthermore, we examine the photoactive performance of proposed ternary heterojunctions in aqueous solution by using the photodegradation of bisphenol A as a model system and BiOCl/BiVO 4 /N-GQD ternary heterojunctions also display a dramatically enhanced photodegradation rate. The proposed charge separation and transfer process of BiOCl/BiVO 4 /N-GQD ternary heterojunctions for the enhanced photoactivity were deduced by electrochemical measurements, photoluminescence, and electron spin resonance. The results demonstrate that a Z-scheme charge process was formed between BiOCl/BiVO 4 binary heterojunctions and N-GQDs, leading to an efficient charge carrier separation and strong photocatalytic ability. Notably, this work may assist in a better understanding of the role of N-GQDs in kinds of heterojunctions

  19. Acoustically assisted spin-transfer-torque switching of nanomagnets: An energy-efficient hybrid writing scheme for non-volatile memory

    International Nuclear Information System (INIS)

    Biswas, Ayan K.; Bandyopadhyay, Supriyo; Atulasimha, Jayasimha

    2013-01-01

    We show that the energy dissipated to write bits in spin-transfer-torque random access memory can be reduced by an order of magnitude if a surface acoustic wave (SAW) is launched underneath the magneto-tunneling junctions (MTJs) storing the bits. The SAW-generated strain rotates the magnetization of every MTJs' soft magnet from the easy towards the hard axis, whereupon passage of a small spin-polarized current through a target MTJ selectively switches it to the desired state with > 99.99% probability at room temperature, thereby writing the bit. The other MTJs return to their original states at the completion of the SAW cycle

  20. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    This paper describes and discusses two different Scheme documentation tools. The first is SchemeDoc, which is intended for documentation of the interfaces of Scheme libraries (APIs). The second is the Scheme Elucidator, which is for internal documentation of Scheme programs. Although the tools...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  1. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  2. Wavelength Detuning Cross-Beam Energy Transfer Mitigation Scheme for Direct-Drive: Modeling and Evidence from National Ignition Facility Implosions

    Science.gov (United States)

    Marozas, J. A.

    2017-10-01

    Cross-beam energy transfer (CBET) has been shown to significantly reduce the laser absorption and implosion speed in direct-drive implosion experiments on OMEGA and the National Ignition Facility (NIF). Mitigating CBET assists in achieving ignition-relevant hot-spot pressures in deuterium-tritium cryogenic OMEGA implosions. In addition, reducing CBET permits lower, more hydrodynamically stable, in-flight aspect ratio ignition designs with smaller nonuniformity growth during the acceleration phase. Detuning the wavelengths of the crossing beams is one of several techniques under investigation at the University of Rochester to mitigate CBET. This talk will describe these techniques with an emphasis on wavelength detuning. Recent experiments designed and predicted using multidimensional hydrodynamic simulations including CBET on the NIF have exploited the wavelength arrangement of the NIF beam geometry to demonstrate CBET mitigation through wavelength detuning in polar-direct-drive (PDD) implosions. Shapes and trajectories inferred from time-resolved x-ray radiography of the imploding shell, scattered-light spectra, and hard x-ray spectra generated by suprathermal electrons all indicate a reduction in CBET. These results and their implications for direct-drive ignition will be presented and discussed. In addition, hydrodynamically scaled ignition-relevant designs for OMEGA implosions exploiting wavelength detuning will be presented. Changes required to the OMEGA laser to permit wavelength detuning will be discussed. Future plans for PDD on the NIF including more-uniform implosions with CBET mitigation will be explored. This material is based upon work supported by the Department of Energy National Nuclear Security Administration under Award Number DE-NA0001944.

  3. Voluntary agreements, implementation and efficiency. European relevance of case study results. Reflections on transferability to voluntary agreement schemes at the European level

    Energy Technology Data Exchange (ETDEWEB)

    Helby, Peter

    2000-04-01

    As a policy instrument, voluntary agreements often fascinate policy-makers.This is fuelled by a number of assumed advantages, such as the opportunity for co-operation rather than confrontation, speed and flexibility and the cost-effectiveness. Some advantages might even be accentuated at the European level: Co-operation has added advantage at the European level where the culture of consensus decision is strong. Flexibility is extra attractive for policy makers dealing with an economy less homogeneous than the average national economy. Speed is certainly welcomed by policy-makers otherwise faced with the slow-winding European legislative process. Cost-effectiveness is eagerly sought by European policy makers facing tight administrative budgets and staff limits. This report examines lessons from the VAIE case studies that may be useful to policy makers engaged in the development of voluntary approaches at the European level. These case studies are about voluntary agreement schemes for industrial energy efficiency deployed in Denmark, France, Germany, Netherlands, and Sweden. For a summary of these case studies, please refer to the the VAIE final report. More detailed information is available in the VAIE national reports. It needs to be emphasised that the empirical base is very narrow. The 'lessons' presented can only be hypotheses, based on an inductive leap from a very narrow experience. The reader will need to check these hypotheses against her own broader experience and personal judgement. According to the principle of subsidiarity, voluntary agreements should be implemented at the European level only if that would have significant advantage over national action. Action at the European level, rather than the national level, would have these potential advantages: Being more consistent with the development of the single market; Allowing higher demands on energy efficiency without negative effect on competitiveness and employment; Stimulating company

  4. Characterization of dynamic thermal control schemes and heat transfer pathways for incorporating variable emissivity electrochromic materials into a space suit heat rejection system

    Science.gov (United States)

    Massina, Christopher James

    The feasibility of conducting long duration human spaceflight missions is largely dependent on the provision of consumables such as oxygen, water, and food. In addition to meeting crew metabolic needs, water sublimation has long served as the primary heat rejection mechanism in space suits during extravehicular activity (EVA). During a single eight hour EVA, approximately 3.6 kg (8 lbm) of water is lost from the current suit. Reducing the amount of expended water during EVA is a long standing goal of space suit life support systems designers; but to date, no alternate thermal control mechanism has demonstrated the ability to completely eliminate the loss. One proposed concept is to convert the majority of a space suit's surface area into a radiator such that the local environment can be used as a radiative thermal sink for rejecting heat without mass loss. Due to natural variations in both internal (metabolic) loads and external (environmental) sink temperatures, radiative transport must be actively modulated in order to maintain an acceptable thermal balance. Here, variable emissivity electrochromic devices are examined as the primary mechanism for enabling variable heat rejection. This dissertation focuses on theoretical and empirical evaluations performed to determine the feasibility of using a full suit, variable emissivity radiator architecture for space suit thermal control. Operational envelopes are described that show where a given environment and/or metabolic load combination may or may not be supported by the evaluated thermal architecture. Key integration considerations and guidelines include determining allowable thermal environments, defining skin-to-radiator heat transfer properties, and evaluating required electrochromic performance properties. Analysis also considered the impacts of dynamic environmental changes and the architecture's extensibility to EVA on the Martian surface. At the conclusion of this work, the full suit, variable emissivity

  5. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  6. Charge Transfer Scheme for Atmospheric Ice Sensing

    Directory of Open Access Journals (Sweden)

    Umair Najeeb MUGHAL

    2015-01-01

    Full Text Available The atmospheric icing parameters are being measured nowadays with the aid of more customized yet limited commercial equipment. The parameters include atmospheric ice detection, icing load and icing rate. The robustness of such equipment is usually under scrutiny when it comes to cold/harsh environment operations. This phenomenon was experienced consistently by the atmospheric Icing Research Team at Narvik University College during data retrieval exercises from its atmospheric icing stations installed at Fargnesfjellet during 2012-13. In this paper it is aimed to address the potential feasibility to produce a robust hardware addressing the icing measurements signals, which includes instrumentation hardware giving icing indications, icing type and de- icing rate measurements in a single platform (not commercially available till date.

  7. The Mawala irrigation scheme

    OpenAIRE

    de Bont, Chris

    2018-01-01

    This booklet was written to share research results with farmers and practitioners in Tanzania. It gives a summary of the empirical material collected during three months of field work in the Mawala irrigation scheme (Kilimanjaro Region), and includes maps, tables and photos. It describes the history of the irrigation scheme, as well current irrigation and farming practices. It especially focuses on the different kinds of infrastructural improvement in the scheme (by farmers and the government...

  8. Argument schemes, topoi, and laws of logic

    NARCIS (Netherlands)

    Wagemans, J.H.M.; van Eemeren, F.H.; Garssen, B.; Godden, D.; Mitchell, G.

    2011-01-01

    In a pragma-dialectical reconstruction of argumentative discourse, argumentation schemes are used to analyze the way in which the acceptability of the argument is transferred to that of the standpoint. In some contexts, the analytical armamentarium that is needed to reconstruct such an Acceptability

  9. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    to carry out a campaign targeted at this segment. The awareness percentage is already 92 % and 67% of the respondents believe they know the meaning of the scheme. But it stands to reason to study whether the respondents actually know what the labelling scheme stands for or if they just think they do...

  10. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  11. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  12. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  13. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  14. Fast multilevel radiative transfer

    International Nuclear Information System (INIS)

    Paletou, Frederic; Leger, Ludovick

    2007-01-01

    The vast majority of recent advances in the field of numerical radiative transfer relies on approximate operator methods better known in astrophysics as Accelerated Lambda-Iteration (ALI). A superior class of iterative schemes, in term of rates of convergence, such as Gauss-Seidel and successive overrelaxation methods were therefore quite naturally introduced in the field of radiative transfer by Trujillo Bueno and Fabiani Bendicho [A novel iterative scheme for the very fast and accurate solution of non-LTE radiative transfer problems. Astrophys J 1995;455:646]; it was thoroughly described for the non-LTE two-level atom case. We describe hereafter in details how such methods can be generalized when dealing with non-LTE unpolarised radiation transfer with multilevel atomic models, in monodimensional geometry

  15. Guidance trajectories for aeroassisted orbital transfer

    Science.gov (United States)

    Miele, A.

    1990-01-01

    Research on aerobraking guidance schemes is presented. The intent is to produce aerobraking guidance trajectories exhibiting many of the desirable characteristics of optimal aerobraking trajectories. Both one-control schemes and two-control schemes are studied. The research is in the interest of aeroassisted flight experiment vehicles (AFE) and aeroassisted orbital transfer (AOT) vehicles.

  16. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  17. Compact spreader schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J.-Y.; Ratti, A.; Sun, C., E-mail: csun@lbl.gov

    2014-12-21

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  18. A simple groundwater scheme in the TRIP river routing model: global off-line evaluation against GRACE terrestrial water storage estimates and observed river discharges

    Directory of Open Access Journals (Sweden)

    J.-P. Vergnes

    2012-10-01

    Full Text Available Groundwater is a non-negligible component of the global hydrological cycle, and its interaction with overlying unsaturated zones can influence water and energy fluxes between the land surface and the atmosphere. Despite its importance, groundwater is not yet represented in most climate models. In this paper, the simple groundwater scheme implemented in the Total Runoff Integrating Pathways (TRIP river routing model is applied in off-line mode at global scale using a 0.5° model resolution. The simulated river discharges are evaluated against a large dataset of about 3500 gauging stations compiled from the Global Data Runoff Center (GRDC and other sources, while the terrestrial water storage (TWS variations derived from the Gravity Recovery and Climate Experiment (GRACE satellite mission help to evaluate the simulated TWS. The forcing fields (surface runoff and deep drainage come from an independent simulation of the Interactions between Soil-Biosphere-Atmosphere (ISBA land surface model covering the period from 1950 to 2008. Results show that groundwater improves the efficiency scores for about 70% of the gauging stations and deteriorates them for 15%. The simulated TWS are also in better agreement with the GRACE estimates. These results are mainly explained by the lag introduced by the low-frequency variations of groundwater, which tend to shift and smooth the simulated river discharges and TWS. A sensitivity study on the global precipitation forcing used in ISBA to produce the forcing fields is also proposed. It shows that the groundwater scheme is not influenced by the uncertainties in precipitation data.

  19. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  20. Link Monotonic Allocation Schemes

    NARCIS (Netherlands)

    Slikker, M.

    1999-01-01

    A network is a graph where the nodes represent players and the links represent bilateral interaction between the players. A reward game assigns a value to every network on a fixed set of players. An allocation scheme specifies how to distribute the worth of every network among the players. This

  1. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  2. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13 ... Author Affiliations. V Rajaraman1. IBM Professor of Information Technology JNCASR Bangalore 560 064, India.

  3. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit...

  4. Simple monotonic interpolation scheme

    International Nuclear Information System (INIS)

    Greene, N.M.

    1980-01-01

    A procedure for presenting tabular data, such as are contained in the ENDF/B files, that is simpler, more general, and potentially much more compact than the present schemes used with ENDF/B is presented. The method has been successfully used for Bondarenko interpolation in a module of the AMPX system. 1 figure, 1 table

  5. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  6. Beyond Scheme F

    Energy Technology Data Exchange (ETDEWEB)

    Elliott, C.J.; Fisher, H.; Pepin, J. [Los Alamos National Lab., NM (United States); Gillmann, R. [Federal Highway Administration, Washington, DC (United States)

    1996-07-01

    Traffic classification techniques were evaluated using data from a 1993 investigation of the traffic flow patterns on I-20 in Georgia. First we improved the data by sifting through the data base, checking against the original video for questionable events and removing and/or repairing questionable events. We used this data base to critique the performance quantitatively of a classification method known as Scheme F. As a context for improving the approach, we show in this paper that scheme F can be represented as a McCullogh-Pitts neural network, oar as an equivalent decomposition of the plane. We found that Scheme F, among other things, severely misrepresents the number of vehicles in Class 3 by labeling them as Class 2. After discussing the basic classification problem in terms of what is measured, and what is the desired prediction goal, we set forth desirable characteristics of the classification scheme and describe a recurrent neural network system that partitions the high dimensional space up into bins for each axle separation. the collection of bin numbers, one for each of the axle separations, specifies a region in the axle space called a hyper-bin. All the vehicles counted that have the same set of in numbers are in the same hyper-bin. The probability of the occurrence of a particular class in that hyper- bin is the relative frequency with which that class occurs in that set of bin numbers. This type of algorithm produces classification results that are much more balanced and uniform with respect to Classes 2 and 3 and Class 10. In particular, the cancellation of errors of classification that occurs is for many applications the ideal classification scenario. The neural network results are presented in the form of a primary classification network and a reclassification network, the performance matrices for which are presented.

  7. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  8. Quantum identification schemes with entanglements

    International Nuclear Information System (INIS)

    Mihara, Takashi

    2002-01-01

    We need secure identification schemes because many situations exist in which a person must be identified. In this paper, we propose three quantum identification schemes with entanglements. First, we propose a quantum one-time pad password scheme. In this scheme, entanglements play the role of a one-time pad password. Next, we propose a quantum identification scheme that requires a trusted authority. Finally, we propose a quantum message authentication scheme that is constructed by combining a different quantum cryptosystem with an ordinary authentication tag

  9. Biosphere-atmosphere exchange of volatile organic compounds over C4 biofuel crops

    Science.gov (United States)

    Graus, Martin; Eller, Allyson S. D.; Fall, Ray; Yuan, Bin; Qian, Yaling; Westra, Philip; de Gouw, Joost; Warneke, Carsten

    2013-02-01

    Significant amounts of ethanol are produced from biofuel crops such as corn and, in the future, likely switchgrass. The atmospheric effects of growing these plant species on a large scale are investigated here by measuring the plant-atmosphere exchange of volatile organic compounds (VOCs). Field grown corn and switchgrass emit VOCs at flux rates of 4.4 nmolC m-2 s-1 (10-9 mol carbon per square meter leaf area per second) and 2.4 nmolC m-2 s-1, respectively. Methanol contributes ˜60% to the molar flux but small emissions of carbonyls, aromatic compounds and terpenoids are relatively more important for potential air quality impacts. Switchgrass can act as a sink for carbonyls and aromatic compounds with compensation points of a few hundred pptv. In switchgrass moderate drought stress may induce enhanced emissions of monoterpenes, carbonyls and aromatics. Per liter of fuel ethanol produced, the estimated VOC emissions associated with the biomass growth of corn (7.8 g l-1) or switchgrass (6.2 g l-1) are in the same range as the VOC emissions from the use of one liter gasoline in vehicle engines. VOC emissions from the growing of biofuel crops can therefore be a significant contributor to the VOC emissions in the life cycle of biofuels. The VOC emissions from corn and switchgrass are small compared to those of tree species suggested as biofuel crops. Due to their reactivity with respect to OH the emissions from corn and switchgrass are not likely to have a significant impact on regional ozone formation.

  10. Monitoring and modelling of biosphere/atmosphere exchange of gases and aerosols in Europe

    Energy Technology Data Exchange (ETDEWEB)

    Erisman, Jan Willem [Energy Research Centre of the Netherlands (ECN), P.O. Box 1, 1755 ZG Petten (Netherlands)]. E-mail: erisman@ecn.nl; Vermeulen, Alex [Energy Research Centre of the Netherlands (ECN), P.O. Box 1, 1755 ZG Petten (Netherlands); Hensen, Arjan [Energy Research Centre of the Netherlands (ECN), P.O. Box 1, 1755 ZG Petten (Netherlands); Flechard, Chris [Energy Research Centre of the Netherlands (ECN), P.O. Box 1, 1755 ZG Petten (Netherlands); Daemmgen, Ulrich [Federal Agricultural Research Centre, Institute of Agroecology, D-38116 Braunschweig, (Germany); Fowler, David [CEH, Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Sutton, Mark [CEH, Bush Estate, Penicuik, Midlothian EH26 0QB (United Kingdom); Gruenhage, Ludger [Institute for Plant Ecology, Justus-Liebig-University, D-35392 Giessen (Germany); Tuovinen, Juha-Pekka [Finnish Meteorological Institute, FIN-00810 Helsinki (Finland)

    2005-02-01

    Monitoring and modelling of deposition of air pollutants is essential to develop and evaluate policies to abate the effects related to air pollution and to determine the losses of pollutants from the atmosphere. Techniques for monitoring wet deposition fluxes are widely applied. A recent intercomparison experiment, however, showed that the uncertainty in wet deposition is relatively high, up to 40%, apart from the fact that most samplers are biased because of a dry deposition contribution. Wet deposition amounts to about 80% of the total deposition in Europe with a range of 10-90% and uncertainty should therefore be decreased. During recent years the monitoring of dry deposition has become possible. Three sites have been operational for 5 years. The data are useful for model development, but also for model evaluation and monitoring of progress in policy. Data show a decline in SO{sub 2} dry deposition, whereas nitrogen deposition remained constant. Furthermore, surface affinities for pollutants changed leading to changes in deposition. Deposition models have been further developed and tested with dry deposition measurements and total deposition measurements on forests as derived from throughfall data. The comparison is reasonable given the measurement uncertainties. Progress in ozone surface exchange modelling and monitoring shows that stomatal uptake can be quantified with reasonable accuracy, but external surface uptake yields highest uncertainty. - Monitoring and modelling of the deposition of sulphur and nitrogen components and the exposure of ozone has gained much progress through the research within BIATEX.

  11. Biosphere-Atmosphere Exchange of NOx and O3 in Central Amazon

    Science.gov (United States)

    Wiedemann, K. T.; Swofsy, S. C.; Munger, J. W.; Saleska, S. R.; Rizzo, L. V.; Silva Campos, K.

    2017-12-01

    The primary source of atmospheric OH is the photolysis of O3 in the presence of water vapor. NOx gases are the main precursors of O3 and OH. In NOx-rich environments that have both high humidity and high solar radiation, OH concentrations are enhanced, making tropical forests dominant in global oxidation of long lived gases. The Amazon rain forest has a unique combination of vegetation with diverse characteristics, climate, and a dynamic land use, factors that altogether govern the emission and fate of trace gases, particle formation and atmospheric chemistry. Understanding the interactions among the mechanisms that govern local precursor emissions will lead to a better description of the local atmospheric chemistry and its global impacts. As part of the GoAmazon project, an array of complementary measurements was conducted in a research site in central Amazon, near Santarem (PA, Brazil), inside the Tapajos National Forest. The research site is surrounded by intact rain forest in a 6km radius, and a 45m canopy. The 67m tower was assembled in the site in 2001 for flux measurements (CO2 and H2O). In mid 2014 additional instrumentation were added, measuring NOx, O3, CH4, and SO2 fluxes and profiles. The low concentrations of SO2 (up to 0.1ppb during the peak of the dry season), and a small vertical gradient, suggest the predominance of biogenic sources. O3 show no significant seasonality between the daytime and nighttime vertical profiles, but occasional nighttime high concentrations for levels below canopy were observed. Hourly ozone fluxes suggest a production of O3 under canopy. NO soil emissions are indicated by concentrations in the ppb range for lower profile levels, decreasing to a few hundreds ppt above the canopy, and emission rates of NO from Amazonian soils may be higher than expected from earlier measurements. Daytime data indicate that not all of this NOx escapes to the atmosphere, however. Fluxes of NO average 133x109 molec cm-2 s-1, a factor of 4 higher than previously observed in white sand soils in the Amazon[1], and a factor of 3 to 14 higher than fluxes observed for yellow clay soils[2], while Fluxes of NO2 average 0.84x109 molec cm-2 s-1.[1] Kaplan, W.A., Wofsy, S.C., Keller, M., and da Costa, J.M. J of Geophys Res, Vol 93, D2, 1389, 1988. [2] Bakwin, P.S., Wofsy, S.C., and Fan, S.M. J. of Geophys Res, Vol 95, D10, 16765, 1990.

  12. Evidence for chlorine recycling - Hydrosphere, biosphere, atmosphere - In a forested wet zone on the Canadian Shield

    Science.gov (United States)

    Milton, G.M.; Milton, J.C.D.; Schiff, S.; Cook, P.; Kotzer, T.G.; Cecil, L.D.

    2003-01-01

    The ability to measure environmental levels of 36Cl by Accelerator Mass Spectrometry and 3H by 3He-ingrowth Mass Spectrometry has made it possible to use the pulses of these two isotopes released into the atmosphere during nuclear weapons testing as tracers of Cl and water movement in soils and groundwater. The authors have investigated the movement of these tracers below a forested wet zone, and have found that both are retarded to a differing extent in the near surface because of vegetative uptake and recycling. Adsorption by clay particles, followed by slow release to the groundwater, may also be significant. The data accumulated in this region of near vertical recharge have gone a considerable distance towards explaining the anomalously low concentrations of 36Cl measured in the 5 Laurentian Great Lakes, as well as indicating possible mechanisms for large scale Cl- recycling in the atmosphere and biosphere. Identification of the near-term non-conservative behaviour of the Cl- is significant, since such a phenomenon could introduce errors in many watershed calculations, e.g. water residence times, evaporation rates, and mixing calculations. Published by Elsevier Science Ltd.

  13. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  14. Bonus Schemes and Trading Activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; Ter Horst, J.R.; Tobler, P.N.

    2013-01-01

    Abstract: Little is known about how different bonus schemes affect traders’ propensity to trade and which bonus schemes improve traders’ performance. We study the effects of linear versus threshold (convex) bonus schemes on traders’ behavior. Traders purchase and sell shares in an experimental stock

  15. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  16. Comparative evaluation of remote maintenance schemes for fusion DEMO reactor

    International Nuclear Information System (INIS)

    Utoh, Hiroyasu; Tobita, Kenji; Someya, Youji; Asakura, Nobuyuki; Sakamoto, Yoshiteru; Hoshino, Kazuo; Nakamura, Makoto

    2015-01-01

    Highlights: • Various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. • The banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme. • The key engineering issues are in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability. - Abstract: Maintenance schemes are one of the critical issues in DEMO design, significantly affecting the configuration of in-vessel components, the size of toroidal field (TF) coil, the arrangement of poloidal field (PF) coils, reactor building, hot cell and so forth. Therefore, the maintenance schemes should satisfy many design requirements and criteria to assure reliable and safe plant operation and to attain reasonable plant availability. The plant availability depends on reliability of remote maintenance scheme, inspection of pipe connection and plasma operation. In this paper, various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. From the view points of the reliability of inspection on hot cell, TF coil size, stored energy of PF coil and portability of segment, the banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme, and it has key engineering issues such as in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability.

  17. Comparative evaluation of remote maintenance schemes for fusion DEMO reactor

    Energy Technology Data Exchange (ETDEWEB)

    Utoh, Hiroyasu, E-mail: uto.hiroyasu@jaea.go.jp; Tobita, Kenji; Someya, Youji; Asakura, Nobuyuki; Sakamoto, Yoshiteru; Hoshino, Kazuo; Nakamura, Makoto

    2015-10-15

    Highlights: • Various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. • The banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme. • The key engineering issues are in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability. - Abstract: Maintenance schemes are one of the critical issues in DEMO design, significantly affecting the configuration of in-vessel components, the size of toroidal field (TF) coil, the arrangement of poloidal field (PF) coils, reactor building, hot cell and so forth. Therefore, the maintenance schemes should satisfy many design requirements and criteria to assure reliable and safe plant operation and to attain reasonable plant availability. The plant availability depends on reliability of remote maintenance scheme, inspection of pipe connection and plasma operation. In this paper, various remote maintenance schemes for DEMO were comparatively assessed based on requirements for DEMO remote maintenance. From the view points of the reliability of inspection on hot cell, TF coil size, stored energy of PF coil and portability of segment, the banana shape segment transport using all vertical maintenance ports would be more probable DEMO reactor maintenance scheme, and it has key engineering issues such as in-vessel transferring mechanism of segment, pipe connection and conducting shell design for plasma vertical stability.

  18. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  19. Fabrication and efficient visible light photocatalytic properties of novel zinc indium sulfide (ZnIn2S4) - graphitic carbon nitride (g-C3N4)/bismuth vanadate (BiVO4) nanorod-based ternary nanocomposites with enhanced charge separation via Z-scheme transfer.

    Science.gov (United States)

    Jo, Wan-Kuen; Natarajan, Thillai Sivakumar

    2016-11-15

    Novel ZnIn2S4-g-C3N4/BiVO4 nanorod-based ternary nanocomposite photocatalysts with enhanced visible light absorption were synthesized and systematically characterized to confirm the formation of ZnIn2S4 marigold flowers, the layered structure of the g-C3N4, BiVO4 nanorods, and the formation of binary and ternary nanocomposites. The visible light absorption of BiVO4 was significantly improved after coupling with g-C3N4 and ZnIn2S4, which was confirmed by UV-visible diffuse reflectance spectroscopic analysis. Ternary ZnIn2S4-g-C3N4/BiVO4 nanocomposites exhibited excellent visible light photocatalytic decomposition efficiency (VL-PDE) when used for the degradation of congo red (CR) dye and metronidazole (MTZ) pharmaceutical, as well as excellent stability and reusability. The ternary 5%ZnIn2S4-50%-g-C3N4/BiVO4 nanocomposite showed higher VL-PDE for CR (81.5%) and MTZ (59%) degradation than the binary composites, g-C3N4 and BiVO4. Radical quenching experiments showed that h(+), OH, and O2(-) were the reactive radicals, validating that the Z-scheme charge carrier transfer mechanism was responsible for the enhanced VL-PDE of the ternary ZnIn2S4-g-C3N4/BiVO4 nanocomposites, which was further confirmed by photoluminescence analysis. Furthermore, kinetic studies showed that the degradation followed pseudo-first-order kinetics, and that the ternary photocatalysts could be reused up to three times with good stability. The enhanced visible light absorption, high surface area, high adsorption capacity, Z-scheme charge carrier transfer, and increased lifetime of photo-produced electron-hole pairs were responsible for the increased visible light photocatalytic decomposition efficiency. Copyright © 2016 Elsevier Inc. All rights reserved.

  20. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  1. Two notes about Ponzi schemes

    OpenAIRE

    Patrick Honohan

    1987-01-01

    A Ponzi scheme is an arrangement whereby a promoter offers an investment opportunity with attractive dividends, but where the only basis for the dividends is the future receipts from new investors. The first of these two notes explores some of the analytical properties of a Ponzi scheme, addressing in particular the question whether it is possible for a Ponzi scheme to exist if all the participants are rational. The second note briefly examines the collapse of the PMPA insurance company whos...

  2. Entropy conservative finite element schemes

    Science.gov (United States)

    Tadmor, E.

    1986-01-01

    The question of entropy stability for discrete approximations to hyperbolic systems of conservation laws is studied. The amount of numerical viscosity present in such schemes is quantified and related to their entropy stability by means of comparison. To this end, two main ingredients are used: entropy variables and the construction of certain entropy conservative schemes in terms of piecewise-linear finite element approximations. It is then shown that conservative schemes are entropy stable, if and (for three-point schemes) only if, they contain more numerical viscosity than the abovementioned entropy conservation ones.

  3. New Ideas on Labeling Schemes

    DEFF Research Database (Denmark)

    Rotbart, Noy Galil

    in a distributed fashion increases. Second, attempting to answer queries on vertices of a graph stored in a distributed fashion can be significantly more complicated. In order to lay theoretical foundations to the first penalty mentioned a large body of work concentrated on labeling schemes. A labeling scheme...... evaluation of fully dynamic labeling schemes. Due to a connection between adjacency labeling schemes and the graph theoretical study of induced universal graphs, we study these in depth and show novel results for bounded degree graphs and power-law graphs. We also survey and make progress on the related...

  4. An introduction to the UNCLE finite element scheme

    International Nuclear Information System (INIS)

    Enderby, J.A.

    1983-01-01

    UNCLE is a completely general finite element scheme which provides common input, output, equation-solving and other facilities for a family of finite element codes for linear and non-linear stress analysis, heat transfer etc. This report describes the concepts on which UNCLE is based and gives a general account of the facilities provided. (author)

  5. A robust and secure watermarking scheme based on singular ...

    Indian Academy of Sciences (India)

    new technologies enable us to store, transfer and process digital content with less time, lower ... required. Watermarked image is subjected to various forms of manipulations on communication channel. Watermarking schemes can be classified based on the .... Hence watermark embedding will not affect the perceptual.

  6. hybrid modulation scheme fo rid modulation scheme fo dulation ...

    African Journals Online (AJOL)

    eobe

    This work proposes a switching technique for ca proposes a switching technique for ca. (SCSPWM) scheme is employed in the generation circulation schemes are presented for this concepts, it is now possible to generate equal ave pts, it is now possible to generate equal ave semiconductor switches. This results in equal ...

  7. Quantum information and entanglement transfer for qutrits

    International Nuclear Information System (INIS)

    Delgado, A.; Saavedra, C.; Retamal, J.C.

    2007-01-01

    We propose a scheme for the transfer of quantum information among distant qutrits. We apply this scheme to the distribution of entanglement of qutrits states among distant nodes and to the generation of multipartite antisymmetric states. We also discuss applications to quantum secret sharing

  8. Dexter energy transfer pathways.

    Science.gov (United States)

    Skourtis, Spiros S; Liu, Chaoren; Antoniou, Panayiotis; Virshup, Aaron M; Beratan, David N

    2016-07-19

    Energy transfer with an associated spin change of the donor and acceptor, Dexter energy transfer, is critically important in solar energy harvesting assemblies, damage protection schemes of photobiology, and organometallic opto-electronic materials. Dexter transfer between chemically linked donors and acceptors is bridge mediated, presenting an enticing analogy with bridge-mediated electron and hole transfer. However, Dexter coupling pathways must convey both an electron and a hole from donor to acceptor, and this adds considerable richness to the mediation process. We dissect the bridge-mediated Dexter coupling mechanisms and formulate a theory for triplet energy transfer coupling pathways. Virtual donor-acceptor charge-transfer exciton intermediates dominate at shorter distances or higher tunneling energy gaps, whereas virtual intermediates with an electron and a hole both on the bridge (virtual bridge excitons) dominate for longer distances or lower energy gaps. The effects of virtual bridge excitons were neglected in earlier treatments. The two-particle pathway framework developed here shows how Dexter energy-transfer rates depend on donor, bridge, and acceptor energetics, as well as on orbital symmetry and quantum interference among pathways.

  9. Agricultural policy schemes

    DEFF Research Database (Denmark)

    Hansen, Henning Otte

    2016-01-01

    in agricultural policy and they have different functions and impacts. Market price support and deficiency payments are two very important instruments in agricultural policy; however, they belong to two different support regimes or support systems. Market price support operates in the so-called high price system...... and is financed by consumers, while deficiency payments operate in the so-called low price system and are financed by taxpayers. In the high price system, support is given mainly by means of import regulations, etc., which ensure a relatively high domestic price. In the low price system, support is given by means...... of direct support, while market prices are left undistorted at, or close to, world market level. The two different support systems have very different implications for agricultural production, financing, markets, and other aspects; still, there is an income transfer to agriculture in both systems. During...

  10. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give better results than Euler backward method and trapezoidal method near a singular point. KEY WORDS: backward differentiation scheme, collocation, initial value problems.

  11. Symmetry-preserving difference schemes for some heat transfer equations

    Science.gov (United States)

    Bakirova, M. I.; Dorodnitsyn, V. A.; Kozlov, R. V.

    1997-12-01

    Lie group analysis of differential equations is a generally recognized method, which provides invariant solutions, integrability, conservation laws etc. In this paper we present three characteristic examples of the construction of invariant difference equations and meshes, where the original continuous symmetries are preserved in discrete models. Conservation of symmetries in difference modelling helps to retain qualitative properties of the differential equations in their difference counterparts.

  12. Dynamic Transfer Schemes and Stability of International Climate Coalitions

    NARCIS (Netherlands)

    Nagashima, M.N.; Dellink, R.B.; Ierland, van E.C.

    2006-01-01

    This paper examines the formation and stability of coalitions in international climate agreements with a combined game-theoretic and integrated assessment model. The empirical model comprises twelve regions and investigates partial coalition formation in a one-shot cartel game. We argue that a

  13. Spectral scheme for spacetime physics

    International Nuclear Information System (INIS)

    Seriu, Masafumi

    2002-01-01

    Based on the spectral representation of spatial geometry, we construct an analysis scheme for spacetime physics and cosmology, which enables us to compare two or more universes with each other. In this scheme the spectral distance plays a central role, which is the measure of closeness between two geometries defined in terms of the spectra. We apply this scheme for analyzing the averaging problem in cosmology; we explicitly investigate the time evolution of the spectra, distance between two nearby spatial geometries, simulating the relation between the real Universe and its model. We then formulate the criteria for a model to be a suitable one

  14. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., the price of power, conditions for conventional power producers, and changes in import and export of power...... RES-E support schemes already has a common liberalised power market. In this case the introduction of a common support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system...

  15. Relaxation schemes for Chebyshev spectral multigrid methods

    Science.gov (United States)

    Kang, Yimin; Fulton, Scott R.

    1993-01-01

    Two relaxation schemes for Chebyshev spectral multigrid methods are presented for elliptic equations with Dirichlet boundary conditions. The first scheme is a pointwise-preconditioned Richardson relaxation scheme and the second is a line relaxation scheme. The line relaxation scheme provides an efficient and relatively simple approach for solving two-dimensional spectral equations. Numerical examples and comparisons with other methods are given.

  16. Comparison of three ice cloud optical schemes in climate simulations with community atmospheric model version 5

    Science.gov (United States)

    Zhao, Wenjie; Peng, Yiran; Wang, Bin; Yi, Bingqi; Lin, Yanluan; Li, Jiangnan

    2018-05-01

    A newly implemented Baum-Yang scheme for simulating ice cloud optical properties is compared with existing schemes (Mitchell and Fu schemes) in a standalone radiative transfer model and in the global climate model (GCM) Community Atmospheric Model Version 5 (CAM5). This study systematically analyzes the effect of different ice cloud optical schemes on global radiation and climate by a series of simulations with a simplified standalone radiative transfer model, atmospheric GCM CAM5, and a comprehensive coupled climate model. Results from the standalone radiative model show that Baum-Yang scheme yields generally weaker effects of ice cloud on temperature profiles both in shortwave and longwave spectrum. CAM5 simulations indicate that Baum-Yang scheme in place of Mitchell/Fu scheme tends to cool the upper atmosphere and strengthen the thermodynamic instability in low- and mid-latitudes, which could intensify the Hadley circulation and dehydrate the subtropics. When CAM5 is coupled with a slab ocean model to include simplified air-sea interaction, reduced downward longwave flux to surface in Baum-Yang scheme mitigates ice-albedo feedback in the Arctic as well as water vapor and cloud feedbacks in low- and mid-latitudes, resulting in an overall temperature decrease by 3.0/1.4 °C globally compared with Mitchell/Fu schemes. Radiative effect and climate feedback of the three ice cloud optical schemes documented in this study can be referred for future improvements on ice cloud simulation in CAM5.

  17. BOT schemes as financial model of hydro power projects

    International Nuclear Information System (INIS)

    Grausam, A.

    1997-01-01

    Build-operate-transfer (BOT) schemes are the latest methods adopted in the developing infrastructure projects. This paper outlines the project financing through BOT schemes and briefly focuses on the factors particularly relevant to hydro power projects. Hydro power development provides not only the best way to produce electricity, it can also solve problems in different fields, such as navigation problems in case of run-of-the river plants, ground water management systems and flood control etc. This makes HPP projects not cheaper, but hydro energy is a clean and renewable energy and the hydro potential worldwide will play a major role to meet the increased demand in future. 5 figs

  18. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  19. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  20. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so

  1. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  2. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    . While coordination mechanisms focus on how classification schemes enable cooperation among people pursuing a common goal, boundary objects embrace the implicit consequences of classification schemes in situations involving conflicting goals. Moreover, the requirements specification focused on functional...... requirements and provided little information about why these requirements were considered relevant. This stands in contrast to the discussions at the project meetings where the software engineers made frequent use of both abstract goal descriptions and concrete examples to make sense of the requirements...

  3. Energy technology transfer to developing countries

    International Nuclear Information System (INIS)

    Butera, F.; Farinelli, U.

    1992-01-01

    With the use of critical analyses of some examples of technology transfer by industrialized to third world countries, this paper illustrates the importance, in technology transfer, of giving due consideration to the specific social and marketing contexts of the targeted developing country and its physical and financial capability to acquire all the technology necessary to make the total realization of a desired industrial scheme feasible from the economic, technical and social points of view. It also indicates that the most effective transfers are those in which efforts are made to optimize local work force learning levels, process scheme efficiency and cost through the careful integration of innovative with conventional technologies

  4. Methods of Dust Air Flows Reduction at Ore Transfer Facilities of Mining and Processing Plants

    Directory of Open Access Journals (Sweden)

    Gulmira K. Saparova

    2013-01-01

    Full Text Available The article describes the most typical schemes of ore stationary transfers. Aspirate units, depending on dust intensity are divided into three groups. Typical schemes of stationary transfers were presented. On the ground of the research, the classification of ore transfer facilities types at mining and processing plants was offered

  5. Scheme-Independent Predictions in QCD: Commensurate Scale Relations and Physical Renormalization Schemes

    International Nuclear Information System (INIS)

    Brodsky, Stanley J.

    1998-01-01

    Commensurate scale relations are perturbative QCD predictions which relate observable to observable at fixed relative scale, such as the ''generalized Crewther relation'', which connects the Bjorken and Gross-Llewellyn Smith deep inelastic scattering sum rules to measurements of the e + e - annihilation cross section. All non-conformal effects are absorbed by fixing the ratio of the respective momentum transfer and energy scales. In the case of fixed-point theories, commensurate scale relations relate both the ratio of couplings and the ratio of scales as the fixed point is approached. The relations between the observables are independent of the choice of intermediate renormalization scheme or other theoretical conventions. Commensurate scale relations also provide an extension of the standard minimal subtraction scheme, which is analytic in the quark masses, has non-ambiguous scale-setting properties, and inherits the physical properties of the effective charge α V (Q 2 ) defined from the heavy quark potential. The application of the analytic scheme to the calculation of quark-mass-dependent QCD corrections to the Z width is also reviewed

  6. Technology transfer and innovation

    International Nuclear Information System (INIS)

    Ashworth, Graham; Thornton, Anna

    1987-01-01

    The aims of the conference were advice, assistance and action for all those with technology to licence or inventions to patent, and for people seeking financial help and advice. There was a free exchange of ideas and information. Of the forty or so papers collected together, many are concerned with the financial aspects of new ventures, others look at technology transfer from academic institutes and schemes which support technological problems. One paper on fast reactor collaboration in Europe, is indexed separately. (U.K.)

  7. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  8. A Hybrid Data Compression Scheme for Improved VNC

    Directory of Open Access Journals (Sweden)

    Xiaozheng (Jane Zhang

    2007-04-01

    Full Text Available Virtual Network Computing (VNC has emerged as a promising technology in distributed computing environment since its invention in the late nineties. Successful application of VNC requires rapid data transfer from one machine to another over a TCP/IP network connection. However transfer of screen data consumes much network bandwidth and current data encoding schemes for VNC are far from being ideal. This paper seeks to improve screen data compression techniques to enable VNC over slow connections and present a reasonable speed and image quality. In this paper, a hybrid technique is proposed for improving coding efficiency. The algorithm first divides a screen image into pre-defined regions and applies encoding schemes to each area according to the region characteristics. Second, correlation of screen data in consecutive frames is exploited where multiple occurrences of similar image contents are detected. The improved results are demonstrated in a dynamic environment with various screen image types and desktop manipulation.

  9. An intelligent robotics control scheme

    Science.gov (United States)

    Orlando, N. E.

    1984-01-01

    The problem of robot control is viewed at the level of communicating high-level commands produced by intelligent algorithms to the actuator/sensor controllers. Four topics are considered in the design of an integrated control and communications scheme for an intelligent robotic system: the use of abstraction spaces, hierarchical versus heterarchical control, distributed processing, and the interleaving of the steps of plan creation and plan execution. A scheme is presented for an n-level distributed hierarchical/heterarchical control system that effectively interleaves intelligent planning, execution, and sensory feedback. A three-level version of this scheme has been successfully implemented in the Intelligent Systems Research Lab at NASA Langley Research Center. This implementation forms the control structure for DAISIE (Distributed Artificially Intelligent System for Interacting with the Environment), a testbed system integrating AI software with robotics hardware.

  10. One-qubit fingerprinting schemes

    International Nuclear Information System (INIS)

    Beaudrap, J. Niel de

    2004-01-01

    Fingerprinting is a technique in communication complexity in which two parties (Alice and Bob) with large data sets send short messages to a third party (a referee), who attempts to compute some function of the larger data sets. For the equality function, the referee attempts to determine whether Alice's data and Bob's data are the same. In this paper, we consider the extreme scenario of performing fingerprinting where Alice and Bob both send either one bit (classically) or one qubit (in the quantum regime) messages to the referee for the equality problem. Restrictive bounds are demonstrated for the error probability of one-bit fingerprinting schemes, and show that it is easy to construct one-qubit fingerprinting schemes which can outperform any one-bit fingerprinting scheme. The author hopes that this analysis will provide results useful for performing physical experiments, which may help to advance implementations for more general quantum communication protocols

  11. Modulation Schemes for Wireless Access

    Directory of Open Access Journals (Sweden)

    F. Vejrazka

    2000-12-01

    Full Text Available Four modulation schemes, namely minimum shift keying (MSK, Gaussianminimum shift keying (GMSK, multiamplitude minimum shift keying(MAMSK and π/4 differential quadrature phase shift keying (π/4-QPSKare described and their applicability to wireless access is discussedin the paper. Low complexity receiver structures based on differentialdetection are analysed to estimate the performance of the modulationschemes in the additive Gaussian noise and the Rayleigh and Riceenvelope fast fading channel. The bandwidth efficiency is calculated toevaluate the modulation schemes. The results show that the MAMSK schemegives the greatest bandwidth efficiency, but its performance in theRayleigh channel is rather poor. In contrast, the MSK scheme is lessbandwidth efficient, but it is more resistant to Rayleigh fading. Theperformance of π/4-QPSK signal is considerably improved by appropriateprefiltering.

  12. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    injection schemes have been compared: vertical pi- n junction through a current post structure as in1 and lateral p-i-n junction with either uniform material as in2 or with a buried heterostructure (BH) as in3. To allow a direct comparison of the three schemes the same active material composition consisting......The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...

  13. Simple scheme for gauge mediation

    International Nuclear Information System (INIS)

    Murayama, Hitoshi; Nomura, Yasunori

    2007-01-01

    We present a simple scheme for constructing models that achieve successful gauge mediation of supersymmetry breaking. In addition to our previous work [H. Murayama and Y. Nomura, Phys. Rev. Lett. 98, 151803 (2007)] that proposed drastically simplified models using metastable vacua of supersymmetry breaking in vectorlike theories, we show there are many other successful models using various types of supersymmetry-breaking mechanisms that rely on enhanced low-energy U(1) R symmetries. In models where supersymmetry is broken by elementary singlets, one needs to assume U(1) R violating effects are accidentally small, while in models where composite fields break supersymmetry, emergence of approximate low-energy U(1) R symmetries can be understood simply on dimensional grounds. Even though the scheme still requires somewhat small parameters to sufficiently suppress gravity mediation, we discuss their possible origins due to dimensional transmutation. The scheme accommodates a wide range of the gravitino mass to avoid cosmological problems

  14. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  15. Photon transfer in a system of coupled superconducting microwave resonators

    Energy Technology Data Exchange (ETDEWEB)

    Muirhead, C. M., E-mail: c.m.muirhead@bham.ac.uk; Gunupudi, B.; Colclough, M. S. [School of Physics and Astronomy, University of Birmingham, Edgbaston, Birmingham B15 2TT (United Kingdom)

    2016-08-28

    A novel scheme is proposed for the study of energy transfer in a pair of coupled thin film superconducting microwave resonators. We show that the transfer could be achieved by modulating the kinetic inductance and that this has a number of advantages over earlier theoretical and experimental schemes, which use modulation of capacitance by vibrating nanobars or membranes. We show that the proposed scheme lends itself to the study of the classical analogues of Rabi and Landau-Zener-Stueckelberg oscillations and Landau-Zener transitions using experimentally achievable parameters. We consider a number of ways in which energy transfer (photon shuttle) between the two resonators could be achieved experimentally.

  16. Efficient adaptive fuzzy control scheme

    NARCIS (Netherlands)

    Papp, Z.; Driessen, B.J.F.

    1995-01-01

    The paper presents an adaptive nonlinear (state-) feedback control structure, where the nonlinearities are implemented as smooth fuzzy mappings defined as rule sets. The fine tuning and adaption of the controller is realized by an indirect adaptive scheme, which modifies the parameters of the fuzzy

  17. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  18. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  19. Transfer Pricing

    OpenAIRE

    Larsen, Mads Grenaa; Nørgaard, Mads Frid; Hansen, Manjarita

    2013-01-01

    This project seeks to highlight some of the criticisms given towards the OECD Transfer Pricing Guidelines and the challenges Danish companies experience by pricing their goods and the problems this causes for trade. The project is based on a series of interviews that represent the different agents who are operating in Transfer Pricing business. These interviews, combined with the Transfer Pricing Guidelines, gives us the basis to analyse the challenges we want to clarify based on the hypothes...

  20. Transfer Pricing

    DEFF Research Database (Denmark)

    Rohde, Carsten; Rossing, Christian Plesner

    trade internally as the units have to decide what prices should be paid for such inter-unit transfers. One important challenge is to uncover the consequences that different transfer prices have on the willingness in the organizational units to coordinate activities and trade internally. At the same time...... the determination of transfer price will affect the size of the profit or loss in the organizational units and thus have an impact on the evaluation of managers‟ performance. In some instances the determination of transfer prices may lead to a disagreement between coordination of the organizational units...

  1. Transfer Pricing

    DEFF Research Database (Denmark)

    Rohde, Carsten; Rossing, Christian Plesner

    trade internally as the units have to decide what prices should be paid for such inter-unit transfers. One important challenge is to uncover the consequences that different transfer prices have on the willingness in the organizational units to coordinate activities and trade internally. At the same time...

  2. Transfer Pricing

    DEFF Research Database (Denmark)

    Nielsen, Søren Bo

    2014-01-01

    Against a background of rather mixed evidence about transfer pricing practices in multinational enterprises (MNEs) and varying attitudes on the part of tax authorities, this paper explores how multiple aims in transfer pricing can be pursued across four different transfer pricing regimes. A MNE has...... a production subsidiary in one country, from where it sells the produced good locally as well as to a sales subsidiary in a second country. The latter subsidiary is engaged in duopolistic competition with a local competitor. The MNE has two aims in setting the transfer price: strategic delegation and tax...... minimization. We examine the extent to which the four transfer pricing regimes we set up allow the MNE to pursue these aims. While neither strategic delegation nor tax minimization will be eliminated, trade-offs are inevitable, albeit to varying degree....

  3. Transfer Pricing

    DEFF Research Database (Denmark)

    Nielsen, Søren Bo

    2014-01-01

    a production subsidiary in one country, from where it sells the produced good locally as well as to a sales subsidiary in a second country. The latter subsidiary is engaged in duopolistic competition with a local competitor. The MNE has two aims in setting the transfer price: strategic delegation and tax......Against a background of rather mixed evidence about transfer pricing practices in multinational enterprises (MNEs) and varying attitudes on the part of tax authorities, this paper explores how multiple aims in transfer pricing can be pursued across four different transfer pricing regimes. A MNE has...... minimization. We examine the extent to which the four transfer pricing regimes we set up allow the MNE to pursue these aims. While neither strategic delegation nor tax minimization will be eliminated, trade-offs are inevitable, albeit to varying degree....

  4. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  5. Finite volume schemes for Vlasov

    Directory of Open Access Journals (Sweden)

    Crouseilles Nicolas

    2013-01-01

    Full Text Available We present finite volume schemes for the numerical approximation of the one-dimensional Vlasov-Poisson equation (FOV CEMRACS 2011 project. Stability analysis is performed for the linear advection and links with semi-Lagrangian schemes are made. Finally, numerical results enable to compare the different methods using classical plasma test cases. Des schémas de type volumes finis sont étudiés ici pour l’approximation de l’équation de Vlasov-Poisson (projet FOV, CEMRACS 2011. Une analyse de stabilité est effectuée dans le cas de l’advection linéaire et plusieurs liens sont faits entre les méthodes volumes finis et semi-Lagrangiennes. Enfin, les méthodes sont comparées sur des cas tests académiques de la physique des plasmas.

  6. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  7. An intracloud lightning parameterization scheme for a storm electrification model

    Science.gov (United States)

    Helsdon, John H., Jr.; Wu, Gang; Farley, Richard D.

    1992-01-01

    The parameterization of an intracloud lightning discharge has been implemented in the present storm electrification model. The initiation, propagation direction, and termination of the discharge are computed using the magnitude and direction of the electric field vector as the determining criteria. The charge redistribution due to the lightning is approximated assuming the channel to be an isolated conductor with zero net charge over its entire length. Various simulations involving differing amounts of charge transferred and distribution of charges have been done. Values of charge transfer, dipole moment change, and electrical energy dissipation computed in the model are consistent with observations. The effects of the lightning-produced ions on the hydrometeor charges and electric field components depend strongly on the amount of charge transferred. A comparison between the measured electric field change of an actual intracloud flash and the field change due to the simulated discharge shows favorable agreement. Limitations of the parameterization scheme are discussed.

  8. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  9. The Perception of Generic Capabilities and Learning Environment among Undergraduate Nursing Students after the Implementation of a Senior Intake Scheme

    Science.gov (United States)

    Chan, Carmen W. H.; Leung, Doris Y. P.; Lee, Diana T. F.; Chair, Sek Ying; Ip, Wan Yim; Sit, Janet W. H.

    2018-01-01

    Hong Kong has introduced a senior intake admission scheme which is similar to the US model of credit transfer from community college programmes to university bachelor programmes. The study aimed to assess the outcomes, in terms of generic capabilities, of introducing a senior intake articulation scheme to a bachelor of nursing curriculum in Hong…

  10. An Arbitrated Quantum Signature Scheme without Entanglement"*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  11. An Arbitrated Quantum Signature Scheme without Entanglement*

    Science.gov (United States)

    Li, Hui-Ran; Luo, Ming-Xing; Peng, Dai-Yuan; Wang, Xiao-Jun

    2017-09-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.

  12. Analogical Argument Schemes and Complex Argument Structure

    Directory of Open Access Journals (Sweden)

    Andre Juthe

    2015-09-01

    Full Text Available This paper addresses several issues in argumentation theory. The over-arching goal is to discuss how a theory of analogical argument schemes fits the pragma-dialectical theory of argument schemes and argument structures, and how one should properly reconstruct both single and complex argumentation by analogy. I also propose a unified model that explains how formal valid deductive argumentation relates to argument schemes in general and to analogical argument schemes in particular. The model suggests “scheme-specific-validity” i.e. that there are contrasting species of validity for each type of argument scheme that derive from one generic conception of validity.

  13. Money Laundering Detection Framework to Link the Disparate and Evolving Schemes

    OpenAIRE

    Murad Mehmet; Miguel Fuentes Buchholtz

    2013-01-01

    Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of...

  14. Station Transfers

    Data.gov (United States)

    Department of Homeland Security — ixed rail transit external system transfers for systems within the Continental United States, Alaska, Hawaii, the District of Columbia, and Puerto Rico. The modes of...

  15. A literature survey on numerical heat transfer

    Science.gov (United States)

    Shih, T. M.

    1982-12-01

    Technical papers in the area of numerical heat transfer published from 1977 through 1981 are reviewed. The journals surveyed include: (1) ASME Journal of Heat Transfer, (2) International Journal of Heat and Mass Transfer, (3) AIAA Journal, (4) Numerical Heat Transfer, (5) Computers and Fluids, (6) International Journal for Numerical Methods in Engineering, (7) SIAM Journal of Numerical Analysis, and (8) Journal of Computational Physics. This survey excludes experimental work in heat transfer and numerical schemes that are not applied to equations governing heat transfer phenomena. The research work is categorized into the following areas: (A) conduction, (B) boundary-layer flows, (C) momentum and heat transfer in cavities, (D) turbulent flows, (E) convection around cylinders and spheres or within annuli, (F) numerical convective instability, (G) radiation, (H) combustion, (I) plumes, jets, and wakes, (J) heat transfer in porous media, (K) boiling, condensation, and two-phase flows, (L) developing and fully developed channel flows, (M) combined heat and mass transfer, (N) applications, (O) comparison and properties of numerical schemes, and (P) body-fitted coordinates and nonuniform grids.

  16. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  17. Decoupling schemes for the SCC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-01-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  18. TVD schemes for open channel flow

    Science.gov (United States)

    Delis, A. I.; Skeels, C. P.

    1998-04-01

    The Saint Venant equations for modelling flow in open channels are solved in this paper, using a variety of total variation diminishing (TVD) schemes. The performance of second- and third-order-accurate TVD schemes is investigated for the computation of free-surface flows, in predicting dam-breaks and extreme flow conditions created by the river bed topography. Convergence of the schemes is quantified by comparing error norms between subsequent iterations. Automatically calculated time steps and entropy corrections allow high CFL numbers and smooth transition between different conditions. In order to compare different approaches with TVD schemes, the most accurate of each type was chosen. All four schemes chosen proved acceptably accurate. However, there are important differences between the schemes in the occurrence of clipping, overshooting and oscillating behaviour and in the highest CFL numbers allowed by a scheme. These variations in behaviour stem from the different orders and inherent properties of the four schemes.

  19. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry and ge...

  20. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry...

  1. MIRD radionuclide data and decay schemes

    CERN Document Server

    Eckerman, Keith F

    2007-01-01

    For all physicians, scientists, and physicists working in the nuclear medicine field, the MIRD: Radionuclide Data and Decay Schemes updated edition is an essential sourcebook for radiation dosimetry and understanding the properties of radionuclides. Includes CD Table of Contents Decay schemes listed by atomic number Radioactive decay processes Serial decay schemes Decay schemes and decay tables This essential reference for nuclear medicine physicians, scientists and physicists also includes a CD with tabulations of the radionuclide data necessary for dosimetry calculations.

  2. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    Secret Sharing Scheme, they have only been better under certain parameters; there is always a trade -off with some parameter of the scheme. xiv...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS SECRET SHARING SCHEMES AND ADVANCED ENCRYPTION STANDARD by Bing Yong Lim September 2015 Thesis...AND SUBTITLE SECRET SHARING SCHEMES AND ADVANCED ENCRYPTION STANDARD 5. FUNDING NUMBERS 6. AUTHOR(S) Lim, Bin Yong 7. PERFORMING ORGANIZATION NAME(S

  3. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  4. Total variation superiorization schemes in proton computed tomography image reconstruction.

    Science.gov (United States)

    Penfold, S N; Schulte, R W; Censor, Y; Rosenfeld, A B

    2010-11-01

    Iterative projection reconstruction algorithms are currently the preferred reconstruction method in proton computed tomography (pCT). However, due to inconsistencies in the measured data arising from proton energy straggling and multiple Coulomb scattering, the noise in the reconstructed image increases with successive iterations. In the current work, the authors investigated the use of total variation superiorization (TVS) schemes that can be applied as an algorithmic add-on to perturbation-resilient iterative projection algorithms for pCT image reconstruction. The block-iterative diagonally relaxed orthogonal projections (DROP) algorithm was used for reconstructing GEANT4 Monte Carlo simulated pCT data sets. Two TVS schemes added on to DROP were investigated; the first carried out the superiorization steps once per cycle and the second once per block. Simplifications of these schemes, involving the elimination of the computationally expensive feasibility proximity checking step of the TVS framework, were also investigated. The modulation transfer function and contrast discrimination function were used to quantify spatial and density resolution, respectively. With both TVS schemes, superior spatial and density resolution was achieved compared to the standard DROP algorithm. Eliminating the feasibility proximity check improved the image quality, in particular image noise, in the once-per-block superiorization, while also halving image reconstruction time. Overall, the greatest image quality was observed when carrying out the superiorization once per block and eliminating the feasibility proximity check. The low-contrast imaging made possible with TVS holds a promise for its incorporation into future pCT studies.

  5. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    and Wait (SW), Selective Repeat (SR), Stutter. (ST) and Go-Back-N (GBN) (Lin and Costello,. 2003). Combinations of these schemes lead to mixed mode schemes which include the SR-. GBN, SR-ST1 and SR-ST2. In the mixed mode schemes, when a prescribed number of failures occur in the SR mode, the GBN or ST ...

  6. The Original Management Incentive Schemes

    OpenAIRE

    Richard T. Holden

    2005-01-01

    During the 1990s, the structure of pay for top corporate executives shifted markedly as the use of stock options greatly expanded. By the early 2000s, as the dot-com boom ended and the Nasdaq stock index melted down, these modern executive incentive schemes were being sharply questioned on many grounds—for encouraging excessive risk-taking and a short-run orientation, for being an overly costly and inefficient method of providing incentives, and even for tempting managers of firms like Enron,...

  7. The mathematics of Ponzi schemes

    OpenAIRE

    Artzrouni, Marc

    2009-01-01

    A first order linear differential equation is used to describe the dynamics of an investment fund that promises more than it can deliver, also known as a Ponzi scheme. The model is based on a promised, unrealistic interest rate; on the actual, realized nominal interest rate; on the rate at which new deposits are accumulated and on the withdrawal rate. Conditions on these parameters are given for the fund to be solvent or to collapse. The model is fitted to data available on Charles...

  8. Adaptive Optics Metrics & QC Scheme

    Science.gov (United States)

    Girard, Julien H.

    2017-09-01

    "There are many Adaptive Optics (AO) fed instruments on Paranal and more to come. To monitor their performances and assess the quality of the scientific data, we have developed a scheme and a set of tools and metrics adapted to each flavour of AO and each data product. Our decisions to repeat observations or not depends heavily on this immediate quality control "zero" (QC0). Atmospheric parameters monitoring can also help predict performances . At the end of the chain, the user must be able to find the data that correspond to his/her needs. In Particular, we address the special case of SPHERE."

  9. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed-in...... tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators...

  10. A methodology for the transfer of probabilities between accident severity categories

    International Nuclear Information System (INIS)

    Whitlow, J.D.; Neuhauser, K.S.

    1993-01-01

    This paper will describe a methodology which has been developed to allow accident probabilities associated with one severity category scheme to be transferred to another severity category scheme, permitting some comparisons of different studies at the category level. In this methodology, the severity category schemes to be compared are mapped onto a common set of axes. The axes represent critical accident environments (e.g., impact, thermal, crush, puncture) and indicate the range of accident parameters from zero (no accident) to the most sever credible forces. The choice of critical accident environments for the axes depends on the package being transported and the mode of transportation. The accident probabilities associated with one scheme are then transferred to the other scheme. This transfer of category probabilities is based on the relationships of the critical accident parameters to probability of occurrence. The methodology can be employed to transfer any quantity between category schemes if the appropriate supporting information is available. (J.P.N.)

  11. An efficient numerical scheme for the simulation of parallel-plate active magnetic regenerators

    DEFF Research Database (Denmark)

    Torregrosa-Jaime, Bárbara; Corberán, José M.; Payá, Jorge

    2015-01-01

    A one-dimensional model of a parallel-plate active magnetic regenerator (AMR) is presented in this work. The model is based on an efficient numerical scheme which has been developed after analysing the heat transfer mechanisms in the regenerator bed. The new finite difference scheme optimally...... combines explicit and implicit techniques in order to solve the one-dimensional conjugate heat transfer problem in an accurate and fast manner while ensuring energy conservation. The present model has been thoroughly validated against passive regenerator cases with an analytical solution. Compared...

  12. Network coding multiuser scheme for indoor visible light communications

    Science.gov (United States)

    Zhang, Jiankun; Dang, Anhong

    2017-12-01

    Visible light communication (VLC) is a unique alternative for indoor data transfer and developing beyond point-to-point. However, for realizing high-capacity networks, VLC is facing challenges including the constrained bandwidth of the optical access point and random occlusion. A network coding scheme for VLC (NC-VLC) is proposed, with increased throughput and system robustness. Based on the Lambertian illumination model, theoretical decoding failure probability of the multiuser NC-VLC system is derived, and the impact of the system parameters on the performance is analyzed. Experiments demonstrate the proposed scheme successfully in the indoor multiuser scenario. These results indicate that the NC-VLC system shows a good performance under the link loss and random occlusion.

  13. SiB3 Modeled Global 1-degree Hourly Biosphere-Atmosphere Carbon Flux, 1998-2006

    Data.gov (United States)

    National Aeronautics and Space Administration — The Simple Biosphere Model, Version 3 (SiB3) was used to produce a global data set of hourly carbon fluxes between the atmosphere and the terrestrial biosphere for...

  14. SiB3 Modeled Global 1-degree Hourly Biosphere-Atmosphere Carbon Flux, 1998-2006

    Data.gov (United States)

    National Aeronautics and Space Administration — ABSTRACT: The Simple Biosphere Model, Version 3 (SiB3) was used to produce a global data set of hourly carbon fluxes between the atmosphere and the terrestrial...

  15. Arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Li Qin; Chan, W. H.; Long Dongyang

    2009-01-01

    In an arbitrated quantum signature scheme, the signatory signs the message and the receiver verifies the signature's validity with the assistance of the arbitrator. We present an arbitrated quantum signature scheme using two-particle entangled Bell states similar to the previous scheme using three-particle entangled Greenberger-Horne-Zeilinger states [G. H. Zeng and C. H. Keitel, Phys. Rev. A 65, 042312 (2002)]. The proposed scheme can preserve the merits in the original scheme while providing a higher efficiency in transmission and reducing the complexity of implementation.

  16. Technology Transfer

    Science.gov (United States)

    Smith, Nanette R.

    1995-01-01

    The objective of this summer's work was to attempt to enhance Technology Application Group (TAG) ability to measure the outcomes of its efforts to transfer NASA technology. By reviewing existing literature, by explaining the economic principles involved in evaluating the economic impact of technology transfer, and by investigating the LaRC processes our William & Mary team has been able to lead this important discussion. In reviewing the existing literature, we identified many of the metrics that are currently being used in the area of technology transfer. Learning about the LaRC technology transfer processes and the metrics currently used to track the transfer process enabled us to compare other R&D facilities to LaRC. We discuss and diagram impacts of technology transfer in the short run and the long run. Significantly, it serves as the basis for analysis and provides guidance in thinking about what the measurement objectives ought to be. By focusing on the SBIR Program, valuable information regarding the strengths and weaknesses of this LaRC program are to be gained. A survey was developed to ask probing questions regarding SBIR contractors' experience with the program. Specifically we are interested in finding out whether the SBIR Program is accomplishing its mission, if the SBIR companies are providing the needed innovations specified by NASA and to what extent those innovations have led to commercial success. We also developed a survey to ask COTR's, who are NASA employees acting as technical advisors to the SBIR contractors, the same type of questions, evaluating the successes and problems with the SBIR Program as they see it. This survey was developed to be implemented interactively on computer. It is our hope that the statistical and econometric studies that can be done on the data collected from all of these sources will provide insight regarding the direction to take in developing systematic evaluations of programs like the SBIR Program so that they can

  17. A Study Looking the Electronic Funds Transfer

    Directory of Open Access Journals (Sweden)

    Codruta POENAR

    2008-01-01

    Full Text Available The aim of this paper is to present the characteristics of the most important electronic funds transfer in the world, both interperson and interbank. We identified the following informations: location, type, owner, operator, number of transactions, transsactions value, clients, financial scheme and the message format.

  18. Quantum state transfer with untunable couplings

    International Nuclear Information System (INIS)

    Gagnebin, P. K.; Skinner, S. R.; Behrman, E. C.; Steck, J. E.

    2007-01-01

    We present a general scheme for implementing bidirectional quantum state transfer in a quantum swapping channel. Unlike many other schemes for quantum computation and communication, our method does not require qubit couplings to be switched on and off. The only control variable is the bias acting on individual qubits. We show how to derive the parameters of the system (fixed and variable) such that perfect state transfer can be achieved. Since these parameters vary linearly with the pulse width, our scheme allows flexibility in the time scales under which qubits evolve. Unlike quantum spin networks, our scheme allows the transmission of several quantum states at a time, requiring only a two qubit separation between quantum states. By pulsing the biases of several qubits at the same time, we show that only eight bias control lines are required to achieve state transfer along a channel of arbitrary length. Furthermore, when the information to be transferred is purely classical in nature, only three bias control lines are required, greatly simplifying the circuit complexity

  19. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  20. Scheme of thinking quantum systems

    International Nuclear Information System (INIS)

    Yukalov, V I; Sornette, D

    2009-01-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field

  1. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    of the ongoing fuel cell based micro‐combined heat and power (mCHP) demonstration projects by addressing the socio‐economic and systems analyses perspectives of a large‐scale promotion scheme of fuel cells. This document constitutes the deliverable of Work Package 1 of the FC4Home project and provides......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... previous findings and provides a short “preview” of the quantitative analyses in subsequent Work Packages by giving some food for thought on the way....

  2. Technology transfer

    International Nuclear Information System (INIS)

    Boury, C.

    1986-01-01

    This paper emphasizes in the specific areas of design, engineering and component production. This paper presents what Framatome has to offer in these areas and its export oriented philosophy. Then, a typical example of this technology transfer philosophy is the collaboration with the South Korean firm, Korea Heavy Industries Corporation (KHIC) for the supply of KNU 9 and KNU 10 power stations

  3. Difference schemes for numerical solutions of lagging models of heat conduction

    OpenAIRE

    Cabrera Sánchez, Jesús; Castro López, María Ángeles; Rodríguez Mateo, Francisco; Martín Alustiza, José Antonio

    2013-01-01

    Non-Fourier models of heat conduction are increasingly being considered in the modeling of microscale heat transfer in engineering and biomedical heat transfer problems. The dual-phase-lagging model, incorporating time lags in the heat flux and the temperature gradient, and some of its particular cases and approximations, result in heat conduction modeling equations in the form of delayed or hyperbolic partial differential equations. In this work, the application of difference schemes for the...

  4. Electric power distribution and load transfer system

    Science.gov (United States)

    Bradford, Michael P. (Inventor); Parkinson, Gerald W. (Inventor); Grant, Ross M. (Inventor)

    1989-01-01

    A power distribution system includes a plurality of power sources and load transfer units including transistors and diodes connected in series and leading to a common power output, each of the transistors being controller switchable subject to voltage levels of the respective input and output sides of said transistors, and the voltage and current level of said common power output. The system is part of an interconnection scheme in which all but one of the power sources is connected to a single load transfer unit, enabling the survival of at least a single power source with the failure of one of the load transfer units.

  5. Mode-to-mode energy transfers in convective patterns

    Indian Academy of Sciences (India)

    Abstract. We investigate the energy transfer between various Fourier modes in a low- dimensional model for thermal convection. We have used the formalism of mode-to-mode energy transfer rate in our calculation. The evolution equations derived using this scheme is the same as those derived using the hydrodynamical ...

  6. On Optimal Designs of Some Censoring Schemes

    Directory of Open Access Journals (Sweden)

    Dr. Adnan Mohammad Awad

    2016-03-01

    Full Text Available The main objective of this paper  is to explore suitability of some entropy-information measures for introducing a new optimality censoring criterion and to apply it to some censoring schemes from some underlying life-time models.  In addition, the  paper investigates four related issues namely; the  effect of the parameter of parent distribution on optimal scheme, equivalence of schemes based on Shannon and Awad sup-entropy measures, the conjecture that the optimal scheme is one stage scheme, and  a conjecture by Cramer and Bagh (2011 about Shannon minimum and maximum schemes when parent distribution is reflected power. Guidelines for designing an optimal censoring plane are reported together with theoretical and numerical results and illustrations.

  7. Tissue engineering scheming by artificial intelligence.

    Science.gov (United States)

    Xu, J; Ge, H; Zhou, X; Yang, D

    2005-01-01

    Tissue engineers are often confused when seeking the most effective, economical and secure scheme for tissue engineering. The aim of this study is to generate tissue engineering schemes with artificial intelligence instead of human intelligence. The experimental data of tissue engineered cartilage were integrated and standardized with a centralized database, and a scheme engine was developed using artificial intelligent methods (artificial neural networks and decision trees). The scheme engine was trained with existing cases in the database, and then was used to generate tissue engineering schemes for new experimental animals. Following the schemes generated by the artificial intelligent system, we cured 18 of the 20 experimental animals. In conclusion, artificial intelligence is a powerful method for decision making in the tissue engineering realm.

  8. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  9. Resonance ionization scheme development for europium

    CERN Document Server

    Chrysalidis, K; Fedosseev, V N; Marsh, B A; Naubereit, P; Rothe, S; Seiffert, C; Kron, T; Wendt, K

    2017-01-01

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  10. Alternative schemes for the inertial fusion energy

    Energy Technology Data Exchange (ETDEWEB)

    Tikhonchuk, V.T. [Centre Lasers Intenses et Applications, University Bordeaux 1-CNRS-CEA, 33405, Talence (France); Mima, K., E-mail: tikhonchuk@celia.u-bordeaux1.fr [Institute of Laser Engineering, Osaka University, Osaka (Japan)

    2011-10-15

    The advanced target designs are requiring a lower laser energy for ignition and promising higher energy gains. Two approaches are under development within the European inertial fusion energy project HiPER: the fast ignition scheme with energetic electrons and the shock ignition scheme. The fundamental physical issues and major experimental works related to the alternative ignition schemes as well as the reactor designs are discussed.

  11. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  12. Data mining for detecting Bitcoin Ponzi schemes

    OpenAIRE

    Bartoletti, Massimo; Pes, Barbara; Serusi, Sergio

    2018-01-01

    Soon after its introduction in 2009, Bitcoin has been adopted by cyber-criminals, which rely on its pseudonymity to implement virtually untraceable scams. One of the typical scams that operate on Bitcoin are the so-called Ponzi schemes. These are fraudulent investments which repay users with the funds invested by new users that join the scheme, and implode when it is no longer possible to find new investments. Despite being illegal in many countries, Ponzi schemes are now proliferating on Bit...

  13. Technology transfer

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    Illustrated by the example of the FRG's nuclear energy exports, it is shown that the nuclear technology transfer leads to new dimensions of intergovernmental relations, which hold within themselves on account of multiple state-to-state, scientific, industrial and - last but not least - personal contacts the chance of far-reaching friendships between countries and people. If the chance is taken, this can also be seen as an important contribution towards maintaining the peace. (orig.) [de

  14. Anatomy Transfer

    OpenAIRE

    Dicko, Ali Hamadi; Liu, Tiantian; Gilles, Benjamin; Kavan, Ladislav; Faure, François; Palombi, Olivier; Cani, Marie-Paule

    2013-01-01

    International audience; Characters with precise internal anatomy are important in film and visual effects, as well as in medical applications. We propose the first semi-automatic method for creating anatomical structures, such as bones, muscles, viscera and fat tissues. This is done by transferring a reference anatomical model from an input template to an arbitrary target character, only defined by its boundary representation (skin). The fat distribution of the target character needs to be sp...

  15. Comparing Security Notions of Secret Sharing Schemes

    Directory of Open Access Journals (Sweden)

    Songsong Dai

    2015-03-01

    Full Text Available Different security notions of secret sharing schemes have been proposed by different information measures. Entropies, such as Shannon entropy and min entropy, are frequently used in the setting security notions for secret sharing schemes. Different to the entropies, Kolmogorov complexity was also defined and used in study the security of individual instances for secret sharing schemes. This paper is concerned with these security notions for secret sharing schemes defined by the variational measures, including Shannon entropy, guessing probability, min entropy and Kolmogorov complexity.

  16. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  17. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  18. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    . These schemes utilize directional relays, power flow through feeders, wind and PV measurements to optimally select the feeders to be disconnected during load shedding such that DG disconnection is minimized while disconnecting required amount of consumption. These different UFLS schemes are compared in terms......With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...... of frequency response, amount of consumption and DG disconnected during load shedding....

  19. Transfer Zymography.

    Science.gov (United States)

    Pan, Daniel; Wilson, Karl A; Tan-Wilson, Anna

    2017-01-01

    The technique described here, transfer zymography, was developed to overcome two limitations of conventional zymography. When proteolytic enzymes are resolved by nonreducing SDS-PAGE into a polyacrylamide gel with copolymerized protein substrate, the presence of the protein substrate can result in anomalous, often slower, migration of the protease and an estimated mass higher than its actual mass. A further drawback is that the presence of a high background of substrate protein interferes with proteomic analysis of the protease band by excision, tryptic digestion, and LC-MS/MS analysis. In transfer zymography, the proteolytic enzymes are resolved by conventional nonreducing SDS-PAGE, without protein substrate in the gel. The proteins in the resolving gel are then electrophoretically transferred to a receiving gel that contains the protein substrate, by a process similar to western blotting. The receiving gel is then processed in a manner similar to conventional zymography. SDS is removed by Triton X-100 and incubated in conditions suitable for the proteolytic activity. After protein staining, followed by destaining, bands representing regions with active protease are visualized as clear bands in a darkly stained background. For proteomic analysis, electrophoresis is carried out simultaneously on a second resolving gel, and the bands corresponding to the clear regions in the receiving gel after zymogram development are excised for proteomic analysis.

  20. Children's schemes for anticipating the validity of nets for solids

    Science.gov (United States)

    Wright, Vince; Smith, Ken

    2017-09-01

    There is growing acknowledgement of the importance of spatial abilities to student achievement across a broad range of domains and disciplines. Nets are one way to connect three-dimensional shapes and their two-dimensional representations and are a common focus of geometry curricula. Thirty-four students at year 6 (upper primary school) were interviewed on two occasions about their anticipation of whether or not given nets for the cube- and square-based pyramid would fold to form the target solid. Vergnaud's ( Journal of Mathematical Behavior, 17(2), 167-181, 1998, Human Development, 52, 83-94, 2009) four characteristics of schemes were used as a theoretical lens to analyse the data. Successful schemes depended on the interaction of operational invariants, such as strategic choice of the base, rules for action, particularly rotation of shapes, and anticipations of composites of polygons in the net forming arrangements of faces in the solid. Inferences were rare. These data suggest that students need teacher support to make inferences, in order to create transferable schemes.

  1. Quantum state transfer between hybrid qubits in a circuit QED

    Science.gov (United States)

    Feng, Zhi-Bo

    2012-01-01

    In this Brief Report, we propose a theoretical scheme to transfer quantum states between superconducting charge qubits and semiconductor spin qubits in a circuit QED device. Under dispersive conditions, resonator-assisted state transfer between qubits can be performed controllably only by addressing the flux bias applied to the charge qubits. The low infidelity and existing advantages show that the proposal may provide an effective route toward scalable quantum-information transfer with solid-state hybrid qubits.

  2. Money Laundering Detection Framework to Link the Disparate and Evolving Schemes

    Directory of Open Access Journals (Sweden)

    Murad Mehmet

    2013-09-01

    Full Text Available Money launderers hide traces of their transactions with the involvement of entities that participate in sophisticated schemes. Money laundering detection requires unraveling concealed connections among multiple but seemingly unrelated human money laundering networks, ties among actors of those schemes, and amounts of funds transferred among those entities. The link among small networks, either financial or social, is the primary factor that facilitates money laundering. Hence, the analysis of relations among money laundering networks is required to present the full structure of complex schemes. We propose a framework that uses sequence matching, case-based analysis, social network analysis, and complex event processing to detect money laundering. Our framework captures an ongoing single scheme as an event, and associations among such ongoing sequence of events to capture complex relationships among evolving money laundering schemes. The framework can detect associated multiple money laundering networks even in the absence of some evidence. We validated the accuracy of detecting evolving money laundering schemes using a multi-phases test methodology. Our test used data generated from real-life cases, and extrapolated to generate more data from real-life schemes generator that we implemented.

  3. Mobile Machine for E-payment Scheme

    OpenAIRE

    Sattar J Aboud

    2010-01-01

    In this article e-payment scheme by mobile machine is considered. The requirements for a mobile machine in e-payment are presented, particularly when merchant employing accounts for payments and when using advertising. In the proposed scheme we will use the public key infrastructure and certificate for authenticate purchaser and merchant and to secure the communication between them.

  4. Sampling scheme optimization from hyperspectral data

    NARCIS (Netherlands)

    Debba, P.

    2006-01-01

    This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized

  5. A generalized scheme for designing multistable continuous ...

    Indian Academy of Sciences (India)

    In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...

  6. Hybrid scheme for Brownian semistationary processes

    DEFF Research Database (Denmark)

    Bennedsen, Mikkel; Lunde, Asger; Pakkanen, Mikko S.

    We introduce a simulation scheme for Brownian semistationary processes, which is based on discretizing the stochastic integral representation of the process in the time domain. We assume that the kernel function of the process is regularly varying at zero. The novel feature of the scheme is to ap...

  7. Consolidation of the health insurance scheme

    CERN Multimedia

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  8. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  9. Community healthcare financing scheme: findings among residents ...

    African Journals Online (AJOL)

    ... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...

  10. A generalized scheme for designing multistable continuous ...

    Indian Academy of Sciences (India)

    Abstract. In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two m- dimensional dynamical systems ...

  11. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  12. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  13. Development, improvement and application of atmospheric radiative transfer models for prediction of the climatic effects of clouds and aerosols

    Science.gov (United States)

    Bergstrom, Robert W.

    1995-01-01

    The demands of accurate predictions of radiative transfer for climate applications are well-documented. While much effort is being devoted to evaluating the accuracy of the GCM radiative transfer schemes, the problem of developing accurate, computationally efficient schemes for climate models still remains. This paper discusses our efforts in developing accurate and fast computational methods for global and regional climate models.

  14. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  15. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  16. Role of national centers of research and development in nuclear technology transfer

    International Nuclear Information System (INIS)

    Graf, J.-J.; Millies, Pierre.

    1977-01-01

    National Research Centers are shown to play a leading role in nuclear technology transfer, whatever may be the directing scheme of nuclear development in the country envisaged. The first act of the Center consists in training specialists in the various nuclear fields. It must ensure the transfer of technological knowledge towards industry (in metallurgy, mechanics, electronics) and other nuclear auxiliary techniques, together with the transfer towards administration (laws). A simplified scheme of nuclear development strategy based on the French scheme (the French Atomic Energy Commission (CEA) with its subsidiary Companies) is presented that is usable for developing countries [fr

  17. Adaptive Packet Combining Scheme in Three State Channel Model

    Science.gov (United States)

    Saring, Yang; Bulo, Yaka; Bhunia, Chandan Tilak

    2018-01-01

    The two popular techniques of packet combining based error correction schemes are: Packet Combining (PC) scheme and Aggressive Packet Combining (APC) scheme. PC scheme and APC scheme have their own merits and demerits; PC scheme has better throughput than APC scheme, but suffers from higher packet error rate than APC scheme. The wireless channel state changes all the time. Because of this random and time varying nature of wireless channel, individual application of SR ARQ scheme, PC scheme and APC scheme can't give desired levels of throughput. Better throughput can be achieved if appropriate transmission scheme is used based on the condition of channel. Based on this approach, adaptive packet combining scheme has been proposed to achieve better throughput. The proposed scheme adapts to the channel condition to carry out transmission using PC scheme, APC scheme and SR ARQ scheme to achieve better throughput. Experimentally, it was observed that the error correction capability and throughput of the proposed scheme was significantly better than that of SR ARQ scheme, PC scheme and APC scheme.

  18. Deitmar schemes, graphs and zeta functions

    Science.gov (United States)

    Mérida-Angulo, Manuel; Thas, Koen

    2017-07-01

    In Thas (2014) it was explained how one can naturally associate a Deitmar scheme (which is a scheme defined over the field with one element, F1) to a so-called "loose graph" (which is a generalization of a graph). Several properties of the Deitmar scheme can be proven easily from the combinatorics of the (loose) graph, and known realizations of objects over F1 such as combinatorial F1-projective and F1-affine spaces exactly depict the loose graph which corresponds to the associated Deitmar scheme. In this paper, we first modify the construction of loc. cit., and show that Deitmar schemes which are defined by finite trees (with possible end points) are "defined over F1" in Kurokawa's sense; we then derive a precise formula for the Kurokawa zeta function for such schemes (and so also for the counting polynomial of all associated Fq-schemes). As a corollary, we find a zeta function for all such trees which contains information such as the number of inner points and the spectrum of degrees, and which is thus very different than Ihara's zeta function (which is trivial in this case). Using a process called "surgery," we show that one can determine the zeta function of a general loose graph and its associated {Deitmar, Grothendieck}-schemes in a number of steps, eventually reducing the calculation essentially to trees. We study a number of classes of examples of loose graphs, and introduce the Grothendieck ring ofF1-schemes along the way in order to perform the calculations. Finally, we include a computer program for performing more tedious calculations, and compare the new zeta function to Ihara's zeta function for graphs in a number of examples.

  19. Some novel power-conversion schemes employing pulse-width modulated high-frequency links

    Energy Technology Data Exchange (ETDEWEB)

    Manias, S.

    1984-01-01

    Static power conversion schemes employing Pulse-Width Modulated high-frequency (HF) links, are investigated. The employment of HF links in power conversion schemes results in substantial size, weight, and cost reduction of the power converter isolation transfer and reactive components. Therefore, in applications where density is of prime importance the employment of HF links is the natural choice. The following power conversion schemes employing an HF link are investigated: (1) a voltage source DC to AC inverter consisting of an HF link and a DC to AC inverter stage: its main advantage over conventional inverter configurations is the drastic size and weight reduction of the magnetic components; (2) a three-phase Current Source DC to AC inverter consisting of an HF link and a DC to AC inverter stage: the current source is created by the HF link stage which together with a high frequency transformer provides isolation between the source and the load; (3) an AC to DC converter consisting of an HF link stage: the proposed power conversion scheme employs an AC to AC cyclo-converter as an HF link which together with a high frequency isolation transfer provides isolation between the source and the load; and (4) a bilateral HF link power converter: the proposed power conversion scheme incorporates a battery charger into an inverter by using the existing power circuit components.

  20. A Privacy Model for RFID Tag Ownership Transfer

    Directory of Open Access Journals (Sweden)

    Xingchun Yang

    2017-01-01

    Full Text Available The ownership of RFID tag is often transferred from one owner to another in its life cycle. To address the privacy problem caused by tag ownership transfer, we propose a tag privacy model which captures the adversary’s abilities to get secret information inside readers, to corrupt tags, to authenticate tags, and to observe tag ownership transfer processes. This model gives formal definitions for tag forward privacy and backward privacy and can be used to measure the privacy property of tag ownership transfer scheme. We also present a tag ownership transfer scheme, which is privacy-preserving under the proposed model and satisfies the other common security requirements, in addition to achieving better performance.

  1. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  2. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  3. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  4. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  5. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  6. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  7. Research on Matrix-type Packet Loss Compensation Scheme for Wireless Video Transmission on Subway

    Directory of Open Access Journals (Sweden)

    Fan Qing-Wu

    2017-01-01

    Full Text Available As the mainstream wireless LAN technology, Wi-Fi can achieve fast data transfer. With the subway moving in a high speed, video data transmission between the metro and the ground is achieved through Wi-Fi technology. This paper aims at solving the Caton problem caused by switching packet loss in the process of playing real-time video on the train terminal, and proposes matrix-type packet loss compensation scheme. Finally, the feasibility of the scheme is verified by experiments.

  8. A Novel Nondestructive Bit-Line Discharging Scheme for Deep Submicrometer STT-RAM

    DEFF Research Database (Denmark)

    Zeinali, Behzad; Madsen, Jens Kargaard; Raghavan, Praveen

    A combination of semiconductor integrated circuits (IC) and a dense array of scaled magnetic tunnel junctions (MTJ) makes promising Spin-Transfer Torque Random Access Memory (STT-RAM). This emerging memory minimizes the leakage power consumption and provides a high density at scaled technologies......, the sensing scheme is accomplished in one step. In this scheme, the Bit-Line is pre-charged and then discharged during read operation. The MTJ resistance state can be found by comparing the time constant of discharging. The simulation results show the overall sensing time is 4 ns when the Bit-Line capacitance...

  9. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  10. Designing optimal sampling schemes for field visits

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2008-10-01

    Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...

  11. Comparison of refueling schemes for DUPIC core

    International Nuclear Information System (INIS)

    Choi, H.; Rhee, B.W.; Park, H.

    1995-01-01

    A parametric study has been performed for the various refueling schemes of CANDU 6 reactor loaded with reference DUPIC fuel. The optimum discharge burnup was determined such that the peak bundle power is minimized for the equilibrium core. Based on the results of instantaneous core calculation using patterned random age distributions, it was decided to perform the refueling simulations only for 2-bundle and 4-bundle shift refueling schemes. The 600 FPD simulation has shown that the operational margins of the channel and bundle power to the license limits are 7.9% and 17.1%, respectively, for 2-bundle shift refueling scheme. The 4-bundle shift refueling scheme also satisfies the license limits and the operational margins of the channel and bundle power are 7.1% and 9.8%, respectively. The results of refueling simulation indicate the possibility of using reference DUPIC fuel in current CANDU 6 reactor. (author)

  12. Transition amplitudes within the stochastic quantization scheme

    International Nuclear Information System (INIS)

    Hueffel, H.

    1993-01-01

    Quantum mechanical transition amplitudes are calculated within the stochastic quantization scheme for the free nonrelativistic particle, the harmonic oscillator and the nonrelativistic particle in a constant magnetic field; we close with free Grassmann quantum mechanics. (authors)

  13. Boson expansion theory in the seniority scheme

    International Nuclear Information System (INIS)

    Tamura, T.; Li, C.; Pedrocchi, V.G.

    1985-01-01

    A boson expansion formalism in the seniority scheme is presented and its relation with number-conserving quasiparticle calculations is elucidated. Accuracy and convergence are demonstrated numerically. A comparative discussion with other related approaches is given

  14. A new scheme to calculate isotope effects.

    Science.gov (United States)

    Swiderek, Katarzyna; Dybala-Defratyka, Agnieszka; Rohr, Daniel R

    2011-09-01

    We present a new scheme to calculate isotope effects. Only selected frequencies at the target level of theory are calculated. The frequencies are selected by an analysis of the Hessian from a lower level of theory. We obtain accurate isotope effects without calculating the full Hessian at the target level of theory. The calculated frequencies are very accurate. The scheme converges to the correct isotope effect.

  15. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  16. Optical Transmission Schemes for GEO Feeder Links

    OpenAIRE

    Cowley, William; Giggenbach, Dirk; Mata Calvo, Ramon

    2014-01-01

    A novel transmission scheme for the forward link of a broadband satellite system that aims to avoid the need for feeder-link RF spectrum is described1. The hybrid scheme uses one or more optical uplinks from a hub station to geostationary satellite, plus one or more Ka band downlinks. The approach aims to retain the advantages of strong channel coding with high spectral efficiency, as used in recent high-speed digital video broadcast satellites, yet minimise on-boar...

  17. Sellafield site (including Drigg) emergency scheme manual

    International Nuclear Information System (INIS)

    1987-02-01

    This Emergency Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. This manual covers the general principles of the total emergency scheme and those detailed procedures which are not specific to any single department. (U.K.)

  18. Simplified Learning Scheme For Analog Neural Network

    Science.gov (United States)

    Eberhardt, Silvio P.

    1991-01-01

    Synaptic connections adjusted one at a time in small increments. Simplified gradient-descent learning scheme for electronic neural-network processor less efficient than better-known back-propagation scheme, but offers two advantages: easily implemented in circuitry because data-access circuitry separated from learning circuitry; and independence of data-access circuitry makes possible to implement feedforward as well as feedback networks, including those of multiple-attractor type. Important in such applications as recognition of patterns.

  19. Relaxation schemes for the shallow water equations

    Science.gov (United States)

    Delis, A. I.; Katsaounis, Th.

    2003-03-01

    We present a class of first and second order in space and time relaxation schemes for the shallow water (SW) equations. A new approach of incorporating the geometrical source term in the relaxation model is also presented. The schemes are based on classical relaxation models combined with Runge-Kutta time stepping mechanisms. Numerical results are presented for several benchmark test problems with or without the source term present.

  20. Cryptanalysis of Two Fault Countermeasure Schemes

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey

    2015-01-01

    In this paper, we look at two fault countermeasure schemes proposed very recently in literature. The first proposed in ACISP 2015 constructs a transformation function using a cellular automata based linear diffusion, and a non-linear layer using a series of bent functions. This countermeasure...... use the internally generated random bits which make these designs vulnerable. We will outline attacks that cryptanalyze the above schemes using 66 and 512 faults respectively....

  1. Technology Transfer

    Science.gov (United States)

    Bullock, Kimberly R.

    1995-01-01

    The development and application of new technologies in the United States has always been important to the economic well being of the country. The National Aeronautics and Space Administration (NASA) has been an important source of these new technologies for almost four decades. Recently, increasing global competition has emphasized the importance of fully utilizing federally funded technologies. Today NASA must meet its mission goals while at the same time, conduct research and development that contributes to securing US economic growth. NASA technologies must be quickly and effectively transferred into commercial products. In order to accomplish this task, NASA has formulated a new way of doing business with the private sector. Emphasis is placed on forming mutually beneficial partnerships between NASA and US industry. New standards have been set in response to the process that increase effectiveness, efficiency, and timely customer response. This summer I have identified potential markets for two NASA inventions: including the Radially Focused Eddy Current Sensor for Characterization of Flaws in Metallic Tubing and the Radiographic Moire. I have also worked to establish a cooperative program with TAG, private industry, and a university known as the TAG/Industry/Academia Program.

  2. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  3. Canonical, stable, general mapping using context schemes.

    Science.gov (United States)

    Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict

    2015-11-15

    Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  4. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  5. Two-level incremental checkpoint recovery scheme for reducing system total overheads.

    Science.gov (United States)

    Li, Huixian; Pang, Liaojun; Wang, Zhangquan

    2014-01-01

    Long-running applications are often subject to failures. Once failures occur, it will lead to unacceptable system overheads. The checkpoint technology is used to reduce the losses in the event of a failure. For the two-level checkpoint recovery scheme used in the long-running tasks, it is unavoidable for the system to periodically transfer huge memory context to a remote stable storage. Therefore, the overheads of setting checkpoints and the re-computing time become a critical issue which directly impacts the system total overheads. Motivated by these concerns, this paper presents a new model by introducing i-checkpoints into the existing two-level checkpoint recovery scheme to deal with the more probable failures with the smaller cost and the faster speed. The proposed scheme is independent of the specific failure distribution type and can be applied to different failure distribution types. We respectively make analyses between the two-level incremental and two-level checkpoint recovery schemes with the Weibull distribution and exponential distribution, both of which fit with the actual failure distribution best. The comparison results show that the total overheads of setting checkpoints, the total re-computing time and the system total overheads in the two-level incremental checkpoint recovery scheme are all significantly smaller than those in the two-level checkpoint recovery scheme. At last, limitations of our study are discussed, and at the same time, open questions and possible future work are given.

  6. A hybrid convection scheme for use in non-hydrostatic numerical weather prediction models

    Directory of Open Access Journals (Sweden)

    Volker Kuell

    2008-12-01

    Full Text Available The correct representation of convection in numerical weather prediction (NWP models is essential for quantitative precipitation forecasts. Due to its small horizontal scale convection usually has to be parameterized, e.g. by mass flux convection schemes. Classical schemes originally developed for use in coarse grid NWP models assume zero net convective mass flux, because the whole circulation of a convective cell is confined to the local grid column and all convective mass fluxes cancel out. However, in contemporary NWP models with grid sizes of a few kilometers this assumption becomes questionable, because here convection is partially resolved on the grid. To overcome this conceptual problem we propose a hybrid mass flux convection scheme (HYMACS in which only the convective updrafts and downdrafts are parameterized. The generation of the larger scale environmental subsidence, which may cover several grid columns, is transferred to the grid scale equations. This means that the convection scheme now has to generate a net convective mass flux exerting a direct dynamical forcing to the grid scale model via pressure gradient forces. The hybrid convection scheme implemented into the COSMO model of Deutscher Wetterdienst (DWD is tested in an idealized simulation of a sea breeze circulation initiating convection in a realistic manner. The results are compared with analogous simulations with the classical Tiedtke and Kain-Fritsch convection schemes.

  7. SRFID: A hash-based security scheme for low cost RFID systems

    Directory of Open Access Journals (Sweden)

    Walid I. Khedr

    2013-03-01

    Full Text Available Radio Frequency Identification (RFID technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improving the efficiency of their operations. However, this ubiquitous technology has inherited problems in security and privacy, due to the powerful tracking capability of the tags. This paper proposes a new simple, low cost, and scalable security scheme relying on one-way hash functions and synchronized secret information. The proposed scheme provides a two steps mutual authentication between the backend server and the tag which does not require a secure channel between the tag reader and the backend server to complete the authentication process. The proposed scheme meets the requirements for tag delegation and secure tag ownership transfer. The general idea is to change the ID of a tag on every read attempt in a secure and synchronized manner. This means that attempts like eavesdropping, replay attacks, tag cloning, tag tracing, denial of service attack, or man-in-the-middle attacks cannot compromise the scheme. Our analysis results show that the proposed scheme outperforms existing schemes in terms of security and performance.

  8. Quantum state transfer and network engineering

    CERN Document Server

    Nikolopoulos, Georgios M

    2013-01-01

    Faithful communication is a necessary precondition for large-scale quantum information processing and networking, irrespective of the physical platform. Thus, the problems of quantum-state transfer and quantum-network engineering have attracted enormous interest over the last years, and constitute one of the most active areas of research in quantum information processing. The present volume introduces the reader to fundamental concepts and various aspects of this exciting research area, including links to other related areas and problems. The implementation of state-transfer schemes and the en

  9. Core Genome Multilocus Sequence Typing Scheme for High- Resolution Typing of Enterococcus faecium.

    Science.gov (United States)

    de Been, Mark; Pinholt, Mette; Top, Janetta; Bletz, Stefan; Mellmann, Alexander; van Schaik, Willem; Brouwer, Ellen; Rogers, Malbert; Kraat, Yvette; Bonten, Marc; Corander, Jukka; Westh, Henrik; Harmsen, Dag; Willems, Rob J L

    2015-12-01

    Enterococcus faecium, a common inhabitant of the human gut, has emerged in the last 2 decades as an important multidrug-resistant nosocomial pathogen. Since the start of the 21st century, multilocus sequence typing (MLST) has been used to study the molecular epidemiology of E. faecium. However, due to the use of a small number of genes, the resolution of MLST is limited. Whole-genome sequencing (WGS) now allows for high-resolution tracing of outbreaks, but current WGS-based approaches lack standardization, rendering them less suitable for interlaboratory prospective surveillance. To overcome this limitation, we developed a core genome MLST (cgMLST) scheme for E. faecium. cgMLST transfers genome-wide single nucleotide polymorphism(SNP) diversity into a standardized and portable allele numbering system that is far less computationally intensive than SNP-based analysis of WGS data. The E. faecium cgMLST scheme was built using 40 genome sequences that represented the diversity of the species. The scheme consists of 1,423 cgMLST target genes. To test the performance of the scheme, we performed WGS analysis of 103 outbreak isolates from five different hospitals in the Netherlands, Denmark, and Germany. The cgMLST scheme performed well in distinguishing between epidemiologically related and unrelated isolates, even between those that had the same sequence type (ST), which denotes the higher discriminatory power of this cgMLST scheme over that of conventional MLST. We also show that in terms of resolution, the performance of the E. faecium cgMLST scheme is equivalent to that of an SNP-based approach. In conclusion, the cgMLST scheme developed in this study facilitates rapid, standardized, and high-resolution tracing of E. faecium outbreaks.

  10. EFEK DISINSENTIF PROGRAM RASKIN DAN PENGARUHNYA TERHADAP TRANSFER PANGAN ANTARGENERASI

    Directory of Open Access Journals (Sweden)

    Mohtar Rasyid

    2012-06-01

    Full Text Available The objective of this research was to investigate disincentive and crowding-out effect food aid program (public transfer in household level. Beside the humanitarian roles, there are widespread sceptisms of food assistance regarding its possible influence on disincentive to work and on crowding out of private transfer (inter-household or intergeneration transfer. Based on Indonesia Family Life Survey data and using instrumental variables approach, this paper estimates disincentive effect and crowding out effect “Rice Program for Poor Families” (Raskin on intergenerational food transfer (child to parents transfer. This research observe significant negative impact on total household income. The decline in income mostly happened through a reduction in head household worker. The paper also find indication of crowding out relation between private and public transfers. It suggests that the Indonesian government should have designed its public transfer scheme carefully in order to improve the effectiveness and efficiency of its social safety net programs.

  11. Electron transfer in pnicogen bonds.

    Science.gov (United States)

    Guan, Liangyu; Mo, Yirong

    2014-10-02

    As a new type of noncovalent interactions, pnicogen bond between a VA group element (N, P, and As) and an electron donor (Lewis base) has grabbed attention in recent several years. Here we employ the block-localized wave function (BLW) based energy decomposition scheme to probe the bonding nature in a series of substituted phosphines X(n)PH(3-n) complexed with ammonia. As the BLW method can derive the optimal monomer orbitals in a complex with the electron transfer among monomers quenched, we can effectively examine the HOMO-LUMO interaction in these pnicogen bonding systems. Among various energy components, electron transfer energy together with the polarization energy dominates the pnicogen bonding energy. Although usually it is assumed that the electron transfer from ammonia to substituted phosphines occurs in the form of n → σ*(XP) hyperconjugative interaction, we identify a kind of new pathway when X = NO2 and CN, i.e., n → dπ*, which results from the interaction between the π orbital of cyano or nitro substituent and d orbitals on P. But still this picture of electron transfer using a single pair of orbitals is greatly simplified, as the electron density difference (EDD) maps corresponding to the overall electron transfer processes show the accumulation of electron density on the P side opposite to the X-P bond, with insignificant or even negligible gain of electron density on the substituent group side. Thus, the EDD maps tend to support the concept of σ-hole in pnicogen bonds.

  12. Intramolecular Energy Transfer, Charge Transfer & Hydrogen Bond

    Indian Academy of Sciences (India)

    Ultrafast Dynamics of Chemical Reactions in Condensed Phase: Intramolecular Energy Transfer, Charge Transfer & Hydrogen Bond. Dipak K. Palit Radaition & Photochemistry Division Bhabha Atomic Research Centre Mumbai 400 085, India.

  13. The river routing scheme in Organising Carbon and Hydrology in Dynamic Ecosystems (ORCHIDEE) using high resolution data

    Science.gov (United States)

    Nguyen-Quang, Trung; Polcher, Jan; Ducharne, Agnès; Arsouze, Thomas

    2017-04-01

    This study presents an improved version of river routing scheme in the Organising Carbon and Hydrology in Dynamic Ecosystems (ORCHIDEE) land surface model. The routing scheme in ORCHIDEE is designed to be resolution independent. This is achieved by routing water through sub-grid hydrological transfer units. An approach which also allows to use refined residence times in each transfer unit which also depend on the nature of the water to be routed. In the proposed evolution, the Hydrological data and maps based on SHuttle Elevation Derivatives at multiple Scales (HydroSHEDS) is used to enhance both these aspects. As a seamless near-global hydrological data set, HydroSHEDS is a suitable database for improving the water transfer scheme in ORCHIDEE. The approximately 1 km resolution HydroSHEDS data enables the construction of more adequate transfer units in each LSM grid box. In addition, the slope factor of each transfer unit, which is calculated with new averaging algorithm, improves the time constant of the reservoirs. Moreover, the new routing scheme is designed to function on generalized grids to make it applicable in modern regional and global climate models. We will present an analysis of the optimal transfer unit size which ensures that the results of the routing scheme are independent of the grid at which ORCHIDEE operates. It is found that with transfer units of 10km2 the model results are optimal and numerically stable. For the validation of this enhanced version of the routing scheme, 35-year simulations (1979-2013) were carried out forced by three atmospheric datasets on horizontal resolution of 0.5o and 0.25o. These datasets are: the Watch Forcing ERA-Interim dataset with bias-corrected precipitation using the (1) CRU station based product; (2) GPCCv5 satellite based estimates and (3) the higher resolution version E2OFD. Investigating on monthly and daily timescale at 22 stations of 12 rivers which contribute freshwater to Mediterranean sea shows that the

  14. An adaptive scaling and biasing scheme for OFDM-based visible light communication systems.

    Science.gov (United States)

    Wang, Zhaocheng; Wang, Qi; Chen, Sheng; Hanzo, Lajos

    2014-05-19

    Orthogonal frequency-division multiplexing (OFDM) has been widely used in visible light communication systems to achieve high-rate data transmission. Due to the nonlinear transfer characteristics of light emitting diodes (LEDs) and owing the high peak-to-average-power ratio of OFDM signals, the transmitted signal has to be scaled and biased before modulating the LEDs. In this contribution, an adaptive scaling and biasing scheme is proposed for OFDM-based visible light communication systems, which fully exploits the dynamic range of the LEDs and improves the achievable system performance. Specifically, the proposed scheme calculates near-optimal scaling and biasing factors for each specific OFDM symbol according to the distribution of the signals, which strikes an attractive trade-off between the effective signal power and the clipping-distortion power. Our simulation results demonstrate that the proposed scheme significantly improves the performance without changing the LED's emitted power, while maintaining the same receiver structure.

  15. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  16. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  17. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  18. Decentralized & Adaptive Load-Frequency Control Scheme of Variable Speed Wind Turbines

    DEFF Research Database (Denmark)

    Hoseinzadeh, Bakhtyar; Silva, Filipe Miguel Faria da; Bak, Claus Leth

    2014-01-01

    In power systems with high penetration of Wind Power (WP), transferring a part of Load Frequency Control (LFC) burden to variable speed Wind Turbines (WTs) is inevitable. The conventional LFC schemes merely rely on frequency information and since frequency is a common variable throughout the netw......In power systems with high penetration of Wind Power (WP), transferring a part of Load Frequency Control (LFC) burden to variable speed Wind Turbines (WTs) is inevitable. The conventional LFC schemes merely rely on frequency information and since frequency is a common variable throughout...... and therefore determining the contribution factor of each individual WT to gain an adaptive LFC approach. The Electrical Distance (ED) concept confirms that the locally measured voltage decay is a proper criterion of closeness to the disturbance place. Numerical simulations carried out in DigSilent Power...

  19. Causes and Consequences of a Father's Child Leave: Evidence from a Reform of Leave Schemes

    DEFF Research Database (Denmark)

    Nielsen, Helena Skyt

    are the most progressive when it comes to family-friendly policies. An extensive reform of child leave schemes in Denmark affected couples differently depending on whether the parents where employed in the same or in different parts of the public sector. Based on a difference-in-differences strategy, I find...... that economic incentives are very important for intra-household leave-sharing. Increasing the couples' after tax income by $9 per day of leave which is transferred from the mother to the father is found to lead to a one day transfer. This corresponds to a supply elasticity close to unity....

  20. Quantum Watermarking Scheme Based on INEQR

    Science.gov (United States)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  1. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  2. A Traffic Restriction Scheme for Enhancing Carpooling

    Directory of Open Access Journals (Sweden)

    Dong Ding

    2017-01-01

    Full Text Available For the purpose of alleviating traffic congestion, this paper proposes a scheme to encourage travelers to carpool by traffic restriction. By a variational inequity we describe travelers’ mode (solo driving and carpooling and route choice under user equilibrium principle in the context of fixed demand and detect the performance of a simple network with various restriction links, restriction proportions, and carpooling costs. Then the optimal traffic restriction scheme aiming at minimal total travel cost is designed through a bilevel program and applied to a Sioux Fall network example with genetic algorithm. According to various requirements, optimal restriction regions and proportions for restricted automobiles are captured. From the results it is found that traffic restriction scheme is possible to enhance carpooling and alleviate congestion. However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.

  3. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    to consumers, allowing success to breed success. Failure can also breed failure, but this is made less likely by consumers’ desire to influence one another’s behavior. We show that when consumers differ in the weight they place on the network externality, the firm would like to serve consumers with lower......This paper examines the optimal sequencing of sales in the presence of network externalities. A firm sells a good to a group of consumers whose payoff from buying is increasing in total quantity sold. The firm selects the order to serve consumers so as to maximize expected sales. It can serve all...... consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  4. International technology transfer

    International Nuclear Information System (INIS)

    Kwon, Won Gi

    1991-11-01

    This book introduces technology progress and economic growth, theoretical consideration of technology transfer, policy and mechanism on technology transfer of a developed country and a developing country, reality of international technology transfer technology transfer and industrial structure in Asia and the pacific region, technology transfer in Russia, China and Eastern Europe, cooperation of science and technology for development of Northeast Asia and strategy of technology transfer of Korea.

  5. Technology transfer by multinationals

    OpenAIRE

    Kostyantyn Zuzik

    2003-01-01

    The paper analyses the issue of technology transfer by multinational corporations. The following questions are explored: (a) world market of technologies, the role of MNCs (b) Choice of the technology transfer mode, Dunning's OLI-theory as a factor of the choice of the mode of transfer (c) measurement and profitability of technology transfer (d) transfer of technology through partnerships, JVs, alliances and through M&As (e) aspects of technology transfer by services multinationals. Paper uti...

  6. Tradable white certificate schemes : what can we learn from tradable green certificate schemes?

    NARCIS (Netherlands)

    Oikonomou, Vlasis; Mundaca, Luis

    In this paper, we analyze the experiences gained from tradable green certificate (TGC) schemes and extract some policy lessons that can lead to a successful design of a market-based approach for energy efficiency improvement, alias tradable white certificate schemes. We use tradable green

  7. Carbon trading: Current schemes and future developments

    International Nuclear Information System (INIS)

    Perdan, Slobodan; Azapagic, Adisa

    2011-01-01

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: → The paper provides an extensive overview of mandatory emissions trading schemes around the world. → Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. → The expansion requires considerable technical fixes and harmonisation of different trading systems. → Clear policy signals, political support and a stable economic environment are needed for the expansion. → A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  8. Efficient authentication scheme based on near-ring root extraction problem

    Science.gov (United States)

    Muthukumaran, V.; Ezhilmaran, D.

    2017-11-01

    An authentication protocolis the type of computer communication protocol or cryptography protocol specifically designed for transfer of authentication data between two entities. We have planned a two new entity authentication scheme on the basis of root extraction problem near-ring in this article. We suggest that this problem is suitably difficult to serve as a cryptographic assumption over the platform of near-ring N. The security issues also discussed.

  9. Very-high-order WENO schemes

    Science.gov (United States)

    Gerolymos, G. A.; Sénéchal, D.; Vallet, I.

    2009-12-01

    We study WENO(2 r - 1) reconstruction [D.S. Balsara, C.W. Shu, Monotonicity prserving WENO schemes with increasingly high-order of accuracy, J. Comput. Phys. 160 (2000) 405-452], with the mapping ( WENOM) procedure of the nonlinear weights [A.K. Henrick, T.D. Aslam, J.M. Powers, Mapped weighted-essentially-non-oscillatory schemes: achieving optimal order near critical points, J. Comput. Phys. 207 (2005) 542-567], which we extend up to WENO17 (r=9). We find by numerical experiment that these procedures are essentially nonoscillatory without any stringent CFL limitation (CFL∈[0.8,1]), for scalar hyperbolic problems (both linear and scalar conservation laws), provided that the exponent pβ in the definition of the Jiang-Shu [G.S. Jiang, C.W. Shu, Efficient implementation of weighted ENO schemes, J. Comput. Phys. 126 (1996) 202-228] nonlinear weights be taken as pβ=r, as originally proposed by Liu et al. [X.D. Liu, S. Osher, T. Chan, Weighted essentially nonoscillatory schemes, J. Comput. Phys. 115 (1994) 200-212], instead of pβ=2 (this is valid both for WENO and WENOM reconstructions), although the optimal value of the exponent is probably pβ(r)∈[2,r]. Then, we apply the family of very-high-order reconstructions to the Euler equations of gasdynamics, by combining local characteristic decomposition [A. Harten, B. Engquist, S. Osher, S.R. Chakravarthy, Uniformly high-order accurate essentially nonoscillatory schemes III, J. Comput. Phys. 71 (1987) 231-303], with recursive-order-reduction ( ROR) aiming at aleviating the problems induced by the nonlinear interactions of characteristic fields within the stencil. The proposed ROR algorithm, which generalizes the algorithm of Titarev and Toro [V.A. Titarev, E.F. Toro, Finite-volume WENO schemes for 3-D conservation laws, J. Comput. Phys. 201 (2004) 238-260], is free of adjustable parameters, and the corresponding schemes are essentially nonoscillatory, as Δx→0, up to r=9, for all of the test-cases studied. Finally

  10. EPU correction scheme study at the CLS

    Energy Technology Data Exchange (ETDEWEB)

    Bertwistle, Drew, E-mail: drew.bertwistle@lightsource.ca; Baribeau, C.; Dallin, L.; Chen, S.; Vogt, J.; Wurtz, W. [Canadian Light Source Inc. 44 Innovation Boulevard, Saskatoon, SK S7N 2V3 (Canada)

    2016-07-27

    The Canadian Light Source (CLS) Quantum Materials Spectroscopy Center (QMSC) beamline will employ a novel double period (55 mm, 180 mm) elliptically polarizing undulator (EPU) to produce photons of arbitrary polarization in the soft X-ray regime. The long period and high field of the 180 mm period EPU will have a strong dynamic focusing effect on the storage ring electron beam. We have considered two partial correction schemes, a 4 m long planar array of BESSY-II style current strips, and soft iron L-shims. In this paper we briefly consider the implementation of these correction schemes.

  11. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  12. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  13. Verification of an objective analysis scheme

    International Nuclear Information System (INIS)

    Cats, G.J.; Haan, B.J. de; Hafkenscheid, L.M.

    1987-01-01

    An intermittent data assimilation scheme has been used to produce wind and precipitation fields during the 10 days after the explosion at the Chernobyl nuclear power plant on 25 April 1986. The wind fields are analyses, the precipitation fields have been generated by the forecast model part of the scheme. The precipitation fields are of fair quality. The quality of the wind fields has been monitored by the ensuing trajectories. These were found to describe the arrival times of radioactive air in good agreement with most observational data, taken all over Europe. The wind analyses are therefore considered to be reliable. 25 refs.; 13 figs

  14. Low overhead slipless carrier phase estimation scheme.

    Science.gov (United States)

    Cheng, Haiquan; Li, Yan; Kong, Deming; Zang, Jizhao; Wu, Jian; Lin, Jintong

    2014-08-25

    Two slipless schemes are compared with application to single carrier 30 Gbaud quadrature phase shift keying (QPSK) system. An equivalent linewidth model considering the phase noise induced by both the laser linewidth and fiber nonlinearity is applied in the performance analysis. The simulation results show that it is possible to mitigate cycle slip (CS) using only 0.39% pilot overhead for the proposed blind carrier phase recovery (CPR) + pilot-symbols-aided phase unwrapping (PAPU) scheme within 1 dB signal-to-noise ratio (SNR) penalty limit at the bit error ratio (BER) of 10(-3) with 4 MHz equivalent linewidth.

  15. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  16. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...

  17. Cures for the shock instability: Development of a shock-stable Roe scheme

    CERN Document Server

    Kim, S S; Rho, O H; Kyu-Hong, S

    2003-01-01

    This paper deals with the development of an improved Roe scheme that is free from the shock instability and still preserves the accuracy and efficiency of the original Roe's Flux Difference Splitting (FDS). Roe's FDS is known to possess good accuracy but to suffer from the shock instability, such as the carbuncle phenomenon. As the first step towards a shock-stable scheme, Roe's FDS is compared with the HLLE scheme to identify the source of the shock instability. Through a linear perturbation analysis on the odd-even decoupling problem, damping characteristic is examined and Mach number-based functions f and g are introduced to balance damping and feeding rates, which leads to a shock-stable Roe scheme. In order to satisfy the conservation of total enthalpy, which is crucial in predicting surface heat transfer rate in high-speed steady flows, an analysis of dissipation mechanism in the energy equation is carried out to find out the error source and to make the proposed scheme preserve total enthalpy. By modif...

  18. A Hybrid Scheme for Fine-Grained Search and Access Authorization in Fog Computing Environment.

    Science.gov (United States)

    Xiao, Min; Zhou, Jing; Liu, Xuejiao; Jiang, Mingda

    2017-06-17

    In the fog computing environment, the encrypted sensitive data may be transferred to multiple fog nodes on the edge of a network for low latency; thus, fog nodes need to implement a search over encrypted data as a cloud server. Since the fog nodes tend to provide service for IoT applications often running on resource-constrained end devices, it is necessary to design lightweight solutions. At present, there is little research on this issue. In this paper, we propose a fine-grained owner-forced data search and access authorization scheme spanning user-fog-cloud for resource constrained end users. Compared to existing schemes only supporting either index encryption with search ability or data encryption with fine-grained access control ability, the proposed hybrid scheme supports both abilities simultaneously, and index ciphertext and data ciphertext are constructed based on a single ciphertext-policy attribute based encryption (CP-ABE) primitive and share the same key pair, thus the data access efficiency is significantly improved and the cost of key management is greatly reduced. Moreover, in the proposed scheme, the resource constrained end devices are allowed to rapidly assemble ciphertexts online and securely outsource most of decryption task to fog nodes, and mediated encryption mechanism is also adopted to achieve instantaneous user revocation instead of re-encrypting ciphertexts with many copies in many fog nodes. The security and the performance analysis show that our scheme is suitable for a fog computing environment.

  19. Shanghai : Developing a Green Electricity Scheme

    OpenAIRE

    Heijndermans, Enno; Berrah, Noureddine; Crowdis, Mark D.

    2006-01-01

    This report documents the experience of developing a green electricity scheme in Shanghai, China. It is intended to be a resource when replicating this effort in another city or country. The study consists of two parts. In Part 1, the general characteristics of both the framework for green electricity products and the market for green electricity products are presented. It also presents a ...

  20. External quality assessment schemes for toxicology.

    Science.gov (United States)

    Wilson, John

    2002-08-14

    A variety of external quality assurance (EQA) schemes monitor quantitative performance for routine biochemical analysis of agents such as paracetamol, salicylate, ethanol and carboxyhaemoglobin. Their usefulness for toxicologists can be lessened where the concentrations monitored do not extend fully into the toxic range or where the matrix is synthetic, of animal origin or serum as opposed to whole human blood. A scheme for quantitative determinations of a wider range of toxicological analytes such as opioids, benzodiazepines and tricyclics in human blood has been piloted by the United Kingdom National External Quality Assessment Scheme (UKNEQAS). Specialist schemes are available for drugs of abuse testing in urine and for hair analysis. Whilst these programmes provide much useful information on the performance of analytical techniques, they fail to monitor the integrated processes that are needed in investigation of toxicological cases. In practice, both qualitative and quantitative tests are used in combination with case information to guide the evaluation of the samples and to develop an interpretation of the analytical findings that is used to provide clinical or forensic advice. EQA programs that combine the analytical and interpretative aspects of case studies are available from EQA providers such as UKNEQAS and the Dutch KKGT program (Stichting Kwaliteitsbewaking Klinische Geneesmiddelanalyse en Toxicologie).

  1. An HFB scheme in natural orbitals

    International Nuclear Information System (INIS)

    Reinhard, P.G.; Rutz, K.; Maruhn, J.A.

    1997-01-01

    We present a formulation of the Hartree-Fock-Bogoliubov (HFB) equations which solves the problem directly in the basis of natural orbitals. This provides a very efficient scheme which is particularly suited for large scale calculations on coordinate-space grids. (orig.)

  2. The EU Greenhouse Gas Emissions Trading Scheme

    NARCIS (Netherlands)

    Woerdman, Edwin; Woerdman, Edwin; Roggenkamp, Martha; Holwerda, Marijn

    2015-01-01

    This chapter explains how greenhouse gas emissions trading works, provides the essentials of the Directive on the European Union Emissions Trading Scheme (EU ETS) and summarizes the main implementation problems of the EU ETS. In addition, a law and economics approach is used to discuss the dilemmas

  3. A generalized scheme for designing multistable continuous ...

    Indian Academy of Sciences (India)

    ical, ecological, neuronal and social systems. Our scheme may be useful for identifying mechanisms behind many natural multistable systems and helpful to control multistable dynamical systems. Acknowledgement. Authors thank the reviewer for critical comments and valuable suggestions which helped in improving the ...

  4. SYNTHESIS OF VISCOELASTIC MATERIAL MODELS (SCHEMES

    Directory of Open Access Journals (Sweden)

    V. Bogomolov

    2014-10-01

    Full Text Available The principles of structural viscoelastic schemes construction for materials with linear viscoelastic properties in accordance with the given experimental data on creep tests are analyzed. It is shown that there can be only four types of materials with linear visco-elastic properties.

  5. Value constraints in the CLP scheme

    NARCIS (Netherlands)

    M.H. van Emden

    1996-01-01

    textabstractThis paper addresses the question of how to incorporate constraint propagation into logic programming. A likely candidate is the CLP scheme, which allows one to exploit algorithmic opportunities while staying within logic programming semantics. CLP($cal R$) is an example: it combines

  6. The Partners in Flight species prioritization scheme

    Science.gov (United States)

    William C. Hunter; Michael F. Carter; David N. Pashley; Keith Barker

    1993-01-01

    The prioritization scheme identifies those birds at any locality on several geographic scales most in need of conservation action. Further, it suggests some of those actions that ought to be taken. Ranking criteria used to set priorities for Neotropical migratory landbirds measure characteristics of species that make them vulnerable to local and global extinction....

  7. Traffic calming schemes : opportunities and implementation strategies.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. van (ed.)

    2003-01-01

    Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and

  8. THE DEVELOPMENT OF FREE PRIMARY EDUCATION SCHEME ...

    African Journals Online (AJOL)

    user

    introduced a free primary education programme. ... education in Nigeria. This period witnessed the introduction of Free. Education scheme in Western Region and marked a radical departure from the hitherto existing educational patterns not only in Western. Nigeria but ..... The institutions of higher education also benefited.

  9. Study of 228Ac decay scheme

    International Nuclear Information System (INIS)

    Pinto, H.V.

    1976-02-01

    Calibration in energy and efficiency of the system used. Obtainement of singles gamma ray spectra of low and high energy. Reduction of the data obtained in the spectrometer by means of computer: localization and determination of the areas of the peaks, also the analysis of the shape of the peaks for identification of doublets. Checking of the decay scheme [pt

  10. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC...

  11. A classification scheme for LWR fuel assemblies

    Energy Technology Data Exchange (ETDEWEB)

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.

  12. Asynchronous schemes for CFD at extreme scales

    Science.gov (United States)

    Konduri, Aditya; Donzis, Diego

    2013-11-01

    Recent advances in computing hardware and software have made simulations an indispensable research tool in understanding fluid flow phenomena in complex conditions at great detail. Due to the nonlinear nature of the governing NS equations, simulations of high Re turbulent flows are computationally very expensive and demand for extreme levels of parallelism. Current large simulations are being done on hundreds of thousands of processing elements (PEs). Benchmarks from these simulations show that communication between PEs take a substantial amount of time, overwhelming the compute time, resulting in substantial waste in compute cycles as PEs remain idle. We investigate a novel approach based on widely used finite-difference schemes in which computations are carried out asynchronously, i.e. synchronization of data among PEs is not enforced and computations proceed regardless of the status of messages. This drastically reduces PE idle time and results in much larger computation rates. We show that while these schemes remain stable, their accuracy is significantly affected. We present new schemes that maintain accuracy under asynchronous conditions and provide a viable path towards exascale computing. Performance of these schemes will be shown for simple models like Burgers' equation.

  13. Nigeria's first national social protection scheme | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-06-14

    Jun 14, 2017 ... Implemented between 2012 and 2014, the non-contributory pension scheme targets the elderly in poor households in Ekiti state, where the majority of the population live in rural areas and work in the informal sector. A team of researchers led by Dr Damilola Olajide, with the collaboration of the State ...

  14. Generalization of binary tensor product schemes depends upon four parameters

    International Nuclear Information System (INIS)

    Bashir, R.; Bari, M.; Mustafa, G.

    2018-01-01

    This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)

  15. Generalization of Binary Tensor Product Schemes Depends upon Four Parameters

    Directory of Open Access Journals (Sweden)

    Robina Bashir

    2018-01-01

    Full Text Available This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes.

  16. Lifetime impact of cash transfer on fertility

    Directory of Open Access Journals (Sweden)

    Young-Il Albert Kim

    2014-04-01

    Full Text Available In most OECD countries, fertility level is below the natural generation replacement level, and many OECD countries implement pro-natal policies, including direct cash transfer schemes. However, evaluations of the long-run impact of such policies are surprisingly rare. We investigate whether the cash transfer increases completed fertility, exploiting a quasi-experiment from a pro-natal cash transfer called Allowance for Newborn Children (ANC. We first devise a measure of ANC impact for different birth cohorts, because the policy lasted for a decade and affected cohorts with different intensities at different ages. The results show that ANC impact on fertility has little permanent component.

  17. Statistical Hiding Fuzzy Commitment Scheme for Securing Biometric Templates

    OpenAIRE

    Alawi A. Al-Saggaf; Haridas Acharya

    2013-01-01

    By considering the security flaws in cryptographic hash functions, any commitment scheme designed straight through hash function usage in general terms is insecure. In this paper, we develop a general fuzzy commitment scheme called an ordinary fuzzy commitment scheme (OFCS), in which many fuzzy commitment schemes with variety complexity assumptions is constructed. The scheme is provably statistical hiding (the advisory gets almost no statistically advantages about the secret message). The eff...

  18. A novel secret image sharing scheme based on chaotic system

    Science.gov (United States)

    Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu

    2012-04-01

    In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.

  19. Simple Numerical Schemes for the Korteweg-deVries Equation

    International Nuclear Information System (INIS)

    McKinstrie, C. J.; Kozlov, M.V.

    2000-01-01

    Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves

  20. Making benefit transfers work

    DEFF Research Database (Denmark)

    Bateman, I.J.; Brouwer, R.; Ferrini, S.

    We develop and test guidance principles for benefits transfers. These argue that when transferring across relatively similar sites, simple mean value transfers are to be preferred but that when sites are relatively dissimilar then value function transfers will yield lower errors. The paper also p...

  1. A universal encoding scheme for MIMO transmission using a single active element for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama; Papadias, C.B.; Kalis, A.

    2009-01-01

    A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO...... systems. The array can spatially multiplex the input streams by creating all the desired linear combinations (for a given modulation scheme) of the basis functions. The desired combinations are obtained by projecting the ratio of the symbols to be spatially multiplexed on the ratio of the basis functions...

  2. Cryogenic heat transfer

    CERN Document Server

    Barron, Randall F

    2016-01-01

    Cryogenic Heat Transfer, Second Edition continues to address specific heat transfer problems that occur in the cryogenic temperature range where there are distinct differences from conventional heat transfer problems. This updated version examines the use of computer-aided design in cryogenic engineering and emphasizes commonly used computer programs to address modern cryogenic heat transfer problems. It introduces additional topics in cryogenic heat transfer that include latent heat expressions; lumped-capacity transient heat transfer; thermal stresses; Laplace transform solutions; oscillating flow heat transfer, and computer-aided heat exchanger design. It also includes new examples and homework problems throughout the book, and provides ample references for further study.

  3. Effective Bayesian Transfer Learning

    Science.gov (United States)

    2010-03-01

    Classes: cougar, car, butterfly, rooster, bass, buddha •!Transferred knowledge: •!Keypoints (landmarks) that define the shape •!Location of...keypoints TL5 Raw Curves for Buddha Class Cartoons to real images Transfer No Transfer 27 TL5 Raw Curves for all classes Cartoons to real images...bass buddha butterfly car cougar rooster TL5 Average Curve for Butterfly class Cartoons to real images Transfer No Transfer TL5 Average Curves for

  4. New advection schemes for free surface flows

    International Nuclear Information System (INIS)

    Pavan, Sara

    2016-01-01

    The purpose of this thesis is to build higher order and less diffusive schemes for pollutant transport in shallow water flows or 3D free surface flows. We want robust schemes which respect the main mathematical properties of the advection equation with relatively low numerical diffusion and apply them to environmental industrial applications. Two techniques are tested in this work: a classical finite volume method and a residual distribution technique combined with a finite element method. For both methods we propose a decoupled approach since it is the most advantageous in terms of accuracy and CPU time. Concerning the first technique, a vertex-centred finite volume method is used to solve the augmented shallow water system where the numerical flux is computed through an Harten-Lax-Van Leer-Contact Riemann solver. Starting from this solution, a decoupled approach is formulated and is preferred since it allows to compute with a larger time step the advection of a tracer. This idea was inspired by Audusse, E. and Bristeau, M.O. [13]. The Monotonic Upwind Scheme for Conservation Law, combined with the decoupled approach, is then used for the second order extension in space. The wetting and drying problem is also analysed and a possible solution is presented. In the second case, the shallow water system is entirely solved using the finite element technique and the residual distribution method is applied to the solution of the tracer equation, focusing on the case of time-dependent problems. However, for consistency reasons the resolution of the continuity equation must be considered in the numerical discretization of the tracer. In order to get second order schemes for unsteady cases a predictor-corrector scheme is used in this work. A first order but less diffusive version of the predictor-corrector scheme is also introduced. Moreover, we also present a new locally semi-implicit version of the residual distribution method which, in addition to good properties in

  5. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  6. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  7. Elucidation of molecular kinetic schemes from macroscopic traces using system identification.

    Directory of Open Access Journals (Sweden)

    Miguel Fribourg

    2017-02-01

    Full Text Available Overall cellular responses to biologically-relevant stimuli are mediated by networks of simpler lower-level processes. Although information about some of these processes can now be obtained by visualizing and recording events at the molecular level, this is still possible only in especially favorable cases. Therefore the development of methods to extract the dynamics and relationships between the different lower-level (microscopic processes from the overall (macroscopic response remains a crucial challenge in the understanding of many aspects of physiology. Here we have devised a hybrid computational-analytical method to accomplish this task, the SYStems-based MOLecular kinetic scheme Extractor (SYSMOLE. SYSMOLE utilizes system-identification input-output analysis to obtain a transfer function between the stimulus and the overall cellular response in the Laplace-transformed domain. It then derives a Markov-chain state molecular kinetic scheme uniquely associated with the transfer function by means of a classification procedure and an analytical step that imposes general biological constraints. We first tested SYSMOLE with synthetic data and evaluated its performance in terms of its rate of convergence to the correct molecular kinetic scheme and its robustness to noise. We then examined its performance on real experimental traces by analyzing macroscopic calcium-current traces elicited by membrane depolarization. SYSMOLE derived the correct, previously known molecular kinetic scheme describing the activation and inactivation of the underlying calcium channels and correctly identified the accepted mechanism of action of nifedipine, a calcium-channel blocker clinically used in patients with cardiovascular disease. Finally, we applied SYSMOLE to study the pharmacology of a new class of glutamate antipsychotic drugs and their crosstalk mechanism through a heteromeric complex of G protein-coupled receptors. Our results indicate that our methodology

  8. Numerical schemes for solving the Euler equations of gas dynamics

    International Nuclear Information System (INIS)

    Dervieux, A.; Vijayasundaram, G.

    1985-01-01

    The first-order upwind schemes of Godunov-Van Leer, Steger-Warming, Godunov, Roe, Osher and Glimm; Godunov type scheme I; the second-order upwind schemes of Van Leer, Fromm-Van Leer, Hancock-Van Leer, and Moretti; and the second-order centered schemes of Richtmyer, Mac Cormack, Lerat-Peyrat, and Jameson are described. Their performances for the shock-tube problem proposed by Sod are compared. The schemes of Godunov-Van Leer, Glimm, Fromm-Van Leer, and Hancock-Van Leer produced the best results. All the First-order upwind schemes, the Glimm scheme, the Jameson scheme, and the Hancock-Van Leer scheme can be extended to two dimensions in the finite element setting. 30 references

  9. Fixed Wordsize Implementation of Lifting Schemes

    Directory of Open Access Journals (Sweden)

    Tanja Karp

    2007-01-01

    Full Text Available We present a reversible nonlinear discrete wavelet transform with predefined fixed wordsize based on lifting schemes. Restricting the dynamic range of the wavelet domain coefficients due to a fixed wordsize may result in overflow. We show how this overflow has to be handled in order to maintain reversibility of the transform. We also perform an analysis on how large a wordsize of the wavelet coefficients is needed to perform optimal lossless and lossy compressions of images. The scheme is advantageous to well-known integer-to-integer transforms since the wordsize of adders and multipliers can be predefined and does not increase steadily. This also results in significant gains in hardware implementations.

  10. Signal Processing Schemes for Doppler Global Velocimetry

    Science.gov (United States)

    Meyers, James F.; Lee, Joseph W.; Cavone, Angelo A.

    1991-01-01

    Two schemes for processing signals obtained from the Doppler global velocimeter are described. The analog approach is a simple, real time method for obtaining an RS-170 video signal containing the normalized intensity image. Pseudo colors are added using a monochromatic frame grabber producing a standard NTSC video signal that can be monitored and/or recorded. The digital approach is more complicated, but maintains the full resolution of the acquisition cameras with the capabilities to correct the signal image for pixel sensitivity variations and to remove of background light. Prototype circuits for each scheme are described and example results from the investigation of the vortical flow field above a 75-degree delta wing presented.

  11. Exclusion from the Health Insurance Scheme

    CERN Multimedia

    2003-01-01

    A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635

  12. A hybrid Lagrangian Voronoi-SPH scheme

    Science.gov (United States)

    Fernandez-Gutierrez, D.; Souto-Iglesias, A.; Zohdi, T. I.

    2017-11-01

    A hybrid Lagrangian Voronoi-SPH scheme, with an explicit weakly compressible formulation for both the Voronoi and SPH sub-domains, has been developed. The SPH discretization is substituted by Voronoi elements close to solid boundaries, where SPH consistency and boundary conditions implementation become problematic. A buffer zone to couple the dynamics of both sub-domains is used. This zone is formed by a set of particles where fields are interpolated taking into account SPH particles and Voronoi elements. A particle may move in or out of the buffer zone depending on its proximity to a solid boundary. The accuracy of the coupled scheme is discussed by means of a set of well-known verification benchmarks.

  13. Generalized seniority scheme in light Sn isotopes

    International Nuclear Information System (INIS)

    Sandulescu, N.; Sandulescu, N.; Blomqvist, J.; Liotta, R.J.; Engeland, T.; Holt, A.; Osnes, E.; Hjorth-Jensen, M.

    1997-01-01

    In search of a possible truncation scheme for shell model calculations, the yrast generalized seniority states are compared with the corresponding shell model states for the case of the Sn isotopes 104-112 Sn. For most of the cases the energies agree within a few hundred keV. For the 0 + (2 + ) states the overlaps decrease from 97% (93%) in 104 Sn to 91% (78%) in 112 Sn when the coefficients of the pairs in the S and D boson operators are allowed to vary with the number of particles. For constant pairing coefficients throughout the entire isotope range, the overlaps are considerably smaller. It is concluded, with the realistic effective interaction applied here, that a truncation scheme based on seniority zero and two states is inadequate when the number of valence particles gets large and that configurations of higher seniority should be included. copyright 1997 The American Physical Society

  14. A numerical relativity scheme for cosmological simulations

    Science.gov (United States)

    Daverio, David; Dirian, Yves; Mitsou, Ermis

    2017-12-01

    Cosmological simulations involving the fully covariant gravitational dynamics may prove relevant in understanding relativistic/non-linear features and, therefore, in taking better advantage of the upcoming large scale structure survey data. We propose a new 3  +  1 integration scheme for general relativity in the case where the matter sector contains a minimally-coupled perfect fluid field. The original feature is that we completely eliminate the fluid components through the constraint equations, thus remaining with a set of unconstrained evolution equations for the rest of the fields. This procedure does not constrain the lapse function and shift vector, so it holds in arbitrary gauge and also works for arbitrary equation of state. An important advantage of this scheme is that it allows one to define and pass an adaptation of the robustness test to the cosmological context, at least in the case of pressureless perfect fluid matter, which is the relevant one for late-time cosmology.

  15. Lie group analysis of flow and heat transfer of non-Newtonian

    Indian Academy of Sciences (India)

    The transformed equations are solved numerically by using a shooting method with fourth-order Runge–Kutta integration scheme. The results show that the effect of viscosity on the heat transfer rate is remarkable only for relatively strong convective heating. Moreover, the skin friction coefficient and the rate of heat transfer ...

  16. Simple CARS measurement point traversing scheme

    Science.gov (United States)

    Eckbreth, A. C.; Stufflebeam, J. H.

    1985-05-01

    The present simple optical scheme employing fixed field lenses permits large measurement point translations for small changes in the separation of Galilean telescopes. For the case of an intensity-dependent process, such as CARS, these translations are accomplished at a constant focusing solid angle, thereby yielding constant focal zone intensity. This will eliminate any signal variation with position which is implicitly due to measurement location.

  17. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  18. Computer aided design of database relation schemes

    OpenAIRE

    Brehovský, Martin

    2006-01-01

    Project "Computer aided design of database relation schemes" shows the importance and problems with designing nowadays Database schemas and gives ideas on possible solutions to these problems. Its main purpose is to describe a solution on optimizing Database designing that is transforming database schemas into tables. These tables should also fulfill the requirements based on the need for data consistency and database maintenance. Main part of this project is an application, which implements ...

  19. A new chaotic secure communication scheme

    Energy Technology Data Exchange (ETDEWEB)

    Hua Changchun [Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004 (China)]. E-mail: cch@ysu.edu.cn; Yang Bo [Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004 (China); Ouyang Gaoxiang [Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004 (China); Guan Xinping [Institute of Electrical Engineering, Yanshan University, Qinhuangdao 066004 (China)]. E-mail: xpguan@ysu.edu.cn

    2005-07-18

    A new chaotic secure communication scheme is constructed. Unified chaotic system is used to encrypt the emitted signal. Different from the existing chaotic secure communication methods, the useful information is embodied in the parameter of chaotic systems in this Letter. The receiver is designed which can succeed in recovering the former signal. Finally computer simulations are done to verify the proposed methods, and the results show that the obtained theoretic results are feasible and efficient.

  20. Preventing corruption in community mineral beneficiation schemes

    OpenAIRE

    Nest, Michael

    2017-01-01

    Abstract This paper analyses patterns of corruption and corruption risks related to community mineral beneficiation schemes (CMBSs) that distribute benefits funded by mineral revenues to communities. It analyses insights from existing scholarship on CMBSs, evidence from seven cases of corruption, and lessons from guidance documents on reducing corruption in the mining value chain. The aim of the paper is to stimulate debate and further research about the suitability of anti-corruption st...

  1. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    data additions, deletions, and modifications [5]. Recent out- ages for well-known cloud storage providers, including Amazon S3 and Microsoft Azure , also...For example, Microsoft Azure Blob storage, Google Cloud Storage, and Rackspace Cloud Files all have similar storage services and pricing schemes as...limitations. Max object size Max PUT size Max metadata size Amazon S3 5 TB 5 GB 2 KB Microsoft Azure 195 GB 64 MB 8 KB Google Cloud Storage 5 TB 5 TB

  2. Pay schemes, bargaining, and competition for talent

    OpenAIRE

    Lindbeck, Assar; Weibull, Jörgen W.

    2015-01-01

    The paper provides a framework for analysis of remuneration to agents whose task is to make well-informed decisions on behalf of a principal, with managers in large corporations as the most prominent example. The principal and agent initially bargain over the pay scheme to the latter. The bargaining outcome depends both on competition for agents and on the relative bargaining power of the two parties, given their outside options, thus allowing for the possibility that the agent may be the cur...

  3. Droop Scheme With Consideration of Operating Costs

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady...... state will meet the intended objectives, as demonstrated in the experiment with a defined objective of minimizing the total microgrid operating cost....

  4. Parallel S/sub n/ iteration schemes

    International Nuclear Information System (INIS)

    Wienke, B.R.; Hiromoto, R.E.

    1986-01-01

    The iterative, multigroup, discrete ordinates (S/sub n/) technique for solving the linear transport equation enjoys widespread usage and appeal. Serial iteration schemes and numerical algorithms developed over the years provide a timely framework for parallel extension. On the Denelcor HEP, the authors investigate three parallel iteration schemes for solving the one-dimensional S/sub n/ transport equation. The multigroup representation and serial iteration methods are also reviewed. This analysis represents a first attempt to extend serial S/sub n/ algorithms to parallel environments and provides good baseline estimates on ease of parallel implementation, relative algorithm efficiency, comparative speedup, and some future directions. The authors examine ordered and chaotic versions of these strategies, with and without concurrent rebalance and diffusion acceleration. Two strategies efficiently support high degrees of parallelization and appear to be robust parallel iteration techniques. The third strategy is a weaker parallel algorithm. Chaotic iteration, difficult to simulate on serial machines, holds promise and converges faster than ordered versions of the schemes. Actual parallel speedup and efficiency are high and payoff appears substantial

  5. Doppler Shift Compensation Schemes in VANETs

    Directory of Open Access Journals (Sweden)

    F. Nyongesa

    2015-01-01

    Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.

  6. INFORMATION FROM THE CERN HEALTH INSURANCE SCHEME

    CERN Multimedia

    Tel : 7-3635

    2002-01-01

    Please note that, from 1 July 2002, the tariff agreement between CERN and the Hôpital de la Tour will no longer be in force. As a result the members of the CERN Health Insurance Scheme will no longer obtain a 5% discount for quick payment of bills. More information on the termination of the agreement and the implications for our Health Insurance Scheme will be provided in the next issue of the CHIS Bull', due for publication in the first half of July. It will be sent to your home address, so, if you have moved recently, please check that your divisional secretariat has your current address. Tel.: 73635 The Organization's Health Insurance Scheme (CHIS) has launched its own Web pages, located on the Website of the Social & Statutory Conditions Group of HR Division (HR-SOC). The address is short and easy-to-remember www.cern.ch/chis The pages currently available concentrate on providing basic information. Over the coming months it is planned to fill out the details and introduce new topics. Please give us ...

  7. An evaluation scheme for nanotechnology policies

    International Nuclear Information System (INIS)

    Soltani, Ali M.; Tabatabaeian, Seyed H.; Hanafizadeh, Payam; Bamdad Soofi, Jahanyar

    2011-01-01

    Dozens of countries are executing national nanotechnology plans. No rigorous evaluation scheme for these plans exists, although stakeholders—especially policy makers, top-level agencies and councils, as well as the society at large—are eager to learn the outcome of these policies. In this article, we recommend an evaluation scheme for national nanotechnology policies that would be used to review the whole or any component part of a national nanotechnology plan. In this scheme, a component at any level of aggregation is evaluated. The component may be part of the plan’s overarching policy goal, which for most countries is to create wealth and improve the quality of life of their nation with nanotechnology. Alternatively, the component may be a programme or an activity related to a programme. The evaluation could be executed at different times in the policy’s life cycle, i.e., before the policy is formulated, during its execution or after its completion. The three criteria for policy evaluation are appropriateness, efficiency and effectiveness. The evaluator should select the appropriate qualitative or quantitative methods to evaluate the various components of national nanotechnology plans.

  8. A rational function based scheme for solving advection equation

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, Feng [Gunma Univ., Kiryu (Japan). Faculty of Engineering; Yabe, Takashi

    1995-07-01

    A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author).

  9. A weak blind signature scheme based on quantum cryptography

    Science.gov (United States)

    Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan

    2009-02-01

    In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.

  10. Computing with high-resolution upwind schemes for hyperbolic equations

    International Nuclear Information System (INIS)

    Chakravarthy, S.R.; Osher, S.; California Univ., Los Angeles)

    1985-01-01

    Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and glitches, relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes. 21 references

  11. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  12. Fast and Efficient Data Forwarding Scheme for Tracking Mobile Targets in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Mi Zhou

    2017-11-01

    Full Text Available Transferring emergent target tracking data to sinks is a major challenge in the Industrial Internet of Things (IIoT, because inefficient data transmission can cause significant personnel and property loss. For tracking a constantly moving mobile target, sensing data should be delivered to sinks continuously and quickly. Although there is some related research, the end to end tracking delay is still unsatisfying. In this paper, we propose a Fast and Efficient Data Forwarding (FEDF scheme for tracking mobile targets in sensor networks to reduce tracking delay and maintain a long lifetime. Innovations of the FEDF scheme that differ from traditional scheme are as follows: firstly, we propose a scheme to transmit sensing data through a Quickly Reacted Routing (QRR path which can reduce delay efficiently. Duty cycles of most nodes on a QRR path are set to 1, so that sleep delay of most nodes turn 0. In this way, end to end delay can be reduced significantly. Secondly, we propose a perfect method to build QRR path and optimize it, which can make QRR path work more efficiently. Target sensing data routing scheme in this paper belongs to a kind of trail-based routing scheme, so as the target moves, the routing path becomes increasingly long, reducing the working efficiency. We propose a QRR path optimization algorithm, in which the ratio of the routing path length to the optimal path is maintained at a smaller constant in the worst case. Thirdly, it has a long lifetime. In FEDF scheme duty cycles of nodes near sink in a QRR path are the same as that in traditional scheme, but duty cycles of nodes in an energy-rich area are 1. Therefore, not only is the rest energy of network fully made use of, but also the network lifetime stays relatively long. Finally, comprehensive performance analysis shows that the FEDF scheme can realize an optimal end to end delay and energy utilization at the same time, reduce end to end delay by 87.4%, improve network energy

  13. Labour supply with in-work and in-kind transfers

    OpenAIRE

    Bingley, Paul; Walker, Ian

    1997-01-01

    There have been a number of changes to the nature of in-work transfers over the last 20 years. Further expansions have been proposed and in-work transfer schemes have recently been promoted as a device for encouraging labour force participation and reducing the severity of the disincentives associated with out-of-work income support schemes. In-kind transfers have also been promoted as a way of proving poverty relief without inducing servere adverse incentive effects. Here we estimate a discr...

  14. 3n-Point Quaternary Shape Preserving Subdivision Schemes

    Directory of Open Access Journals (Sweden)

    MEHWISH BARI

    2017-07-01

    Full Text Available In this paper, an algorithm is defined to construct 3n-point quaternary approximating subdivision schemes which are useful to design different geometric objects in the field of geometric modeling. We are going to establish a family of approximating schemes because approximating scheme provide maximum smoothness as compare to the interpolating schemes. It is to be observed that the proposed schemes satisfying the basic sum rules with bell-shaped mask go up to the convergent subdivision schemes which preserve monotonicity. We analyze the shape-preserving properties such that convexity and concavity of proposed schemes. We also show that quaternary schemes associated to the certain refinable functions with dilation 4 have higher order shape preserving properties. We also calculated the polynomial reproduction of proposed quaternary approximating subdivision schemes. The proposed schemes have tension parameter, so by choosing different values of the tension parameter we can get different limit curves of initial control polygon. We show in the table form that the proposed schemes are better than the existing schemes by comparing them on the behalf of their support and continuity. The visual quality of proposed schemes is demonstrated by different snapshots.

  15. Convective heat transfer

    CERN Document Server

    Kakac, Sadik; Pramuanjaroenkij, Anchasa

    2014-01-01

    Intended for readers who have taken a basic heat transfer course and have a basic knowledge of thermodynamics, heat transfer, fluid mechanics, and differential equations, Convective Heat Transfer, Third Edition provides an overview of phenomenological convective heat transfer. This book combines applications of engineering with the basic concepts of convection. It offers a clear and balanced presentation of essential topics using both traditional and numerical methods. The text addresses emerging science and technology matters, and highlights biomedical applications and energy technologies. What’s New in the Third Edition: Includes updated chapters and two new chapters on heat transfer in microchannels and heat transfer with nanofluids Expands problem sets and introduces new correlations and solved examples Provides more coverage of numerical/computer methods The third edition details the new research areas of heat transfer in microchannels and the enhancement of convective heat transfer with nanofluids....

  16. Status of the Design tool and scheme for ITER TBM and Fusion Reactor System in Korea

    Energy Technology Data Exchange (ETDEWEB)

    Jin, H. G.; Lee, D. W.; Shin, K. I.; Lee, E. H.; Yoon, J. S.; Kim, S. K. [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of); Cho, S. [National Fusion Research Institute, Daejeon (Korea, Republic of)

    2013-05-15

    The main purpose for developing the TBM is to develop the design technology for the DEMO and fusion reactor and it should be proved by experiment in the ITER. Therefore, we have developed the design scheme and codes including the safety analysis capability for obtaining the license for testing in the ITER. Using the prepared facilities and related experiments, developed codes were validated. In the present study, the overall design, system codes development scheme, and some development results are introduced. For developing the design scheme and system codes of the ITER TBM program in Korea, the developed system codes such as MARS and GAMMA from in Gen. IV projects were modified and verified considering the fusion application; For He coolant, 3D analysis and Megalectil correlation as the heat transfer model were proposed and validated considering the high heat from the plasma side and extreme temperature difference between the wall and fluid. For tritium behavior in He coolant, the TBEC+GAMMA code was developed and oxidation layer growth and its permeation rate change were considered in this development. For a liquid metal breeder such as PbLi and Li, MARS-FR and GAMMA-FR were developed including physical properties of the generation model and basic heat transfer model in them. For MHD simulation, the Miyazaki model was implemented in GAMMA, and it was validated successfully with the experimental data. These separate codes will be modified more considering the unique fusion conditions, and will be integrated.

  17. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.

    Science.gov (United States)

    He, Debiao; Kumar, Neeraj; Chilamkurti, Naveen; Lee, Jong-Hyouk

    2014-10-01

    The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

  18. Introduction to heat transfer

    CERN Document Server

    SUNDÉN, B

    2012-01-01

    Presenting the basic mechanisms for transfer of heat, Introduction to Heat Transfer gives a deeper and more comprehensive view than existing titles on the subject. Derivation and presentation of analytical and empirical methods are provided for calculation of heat transfer rates and temperature fields as well as pressure drop. The book covers thermal conduction, forced and natural laminar and turbulent convective heat transfer, thermal radiation including participating media, condensation, evaporation and heat exchangers.

  19. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  20. Systematic Luby Transform codes as incremental redundancy scheme

    CSIR Research Space (South Africa)

    Grobler, TL

    2011-09-01

    Full Text Available Systematic Luby Transform (fountain) codes are investigated as a possible incremental redundancy scheme for EDGE. The convolutional incremental redundancy scheme currently used by EDGE is replaced by the fountain approach. The results...

  1. Scanning schemes in white light photoelasticity - Part II: Novel fringe resolution guided scanning scheme

    Science.gov (United States)

    Ramakrishnan, Vivek; Ramesh, K.

    2017-05-01

    Varied spatial resolution of isochromatic fringes over the domain influences the accuracy of fringe order estimation using TFP/RGB photoelasticity. This has been brought out in the first part of the work. The existing scanning schemes do not take this into account, which leads to the propagation of noise from the low spatial resolution zones. In this paper, a method is proposed for creating a whole field map which represents the spatial resolution of the isochromatic fringe pattern. A novel scanning scheme is then proposed whose progression is guided by the spatial resolution of the fringes in the isochromatic image. The efficacy of the scanning scheme is demonstrated using three problems - an inclined crack under bi-axial loading, a thick ring subjected to internal pressure and a stress frozen specimen of an aerospace component. The proposed scheme has use in a range of applications. The scanning scheme is effective even if the model has random zones of noise which is demonstrated using a plate subjected to concentrated load. This aspect is well utilised to extract fringe data from thin slices cut from a stereo-lithographic model that has characteristic random noise due to layered manufacturing.

  2. Novel efficient hybrid‐DEM collision integration scheme

    OpenAIRE

    Buist, Kay A.; Seelen, Luuk J.H.; Deen, Niels G.; Padding, Johan T.; Kuipers, Hans J.A.M.

    2017-01-01

    A hybrid collision integration scheme is introduced, benefiting from the efficient handling of binary collisions in the hard sphere scheme and the robust time scaling of the soft sphere scheme. In typical dynamic dense granular flow, simulated with the soft sphere scheme, the amount of collisions involving more than two particles are limited, and necessarily so because of loss of energy decay otherwise. Because most collisions are binary, these collisions can be handled within one time step w...

  3. Quantum Communication Scheme Using Non-symmetric Quantum Channel

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Zhonghua; Song Heshan

    2008-01-01

    A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel

  4. Description and Application of the CE-SE Scheme

    Directory of Open Access Journals (Sweden)

    Martin KOSÍK

    2010-12-01

    Full Text Available The CE-SE scheme is new numerical methodology for conservation laws. It was developed by Dr.Chang of NASA Glenn Research Center and his collaborators. The 1D and 2D variant of CE-SE scheme for scalar convection and for Euler equations for incompressible flows is described. The CESE scheme is compared with classical schemes in 1D. The solution to inviscid incompressible flow in GAMM channel in 2D is presented.

  5. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Ying Zhang

    2016-01-01

    Full Text Available In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  6. A method of LED free-form tilted lens rapid modeling based on scheme language

    Science.gov (United States)

    Dai, Yidan

    2017-10-01

    According to nonimaging optical principle and traditional LED free-form surface lens, a new kind of LED free-form tilted lens was designed. And a method of rapid modeling based on Scheme language was proposed. The mesh division method was applied to obtain the corresponding surface configuration according to the character of the light source and the desired energy distribution on the illumination plane. Then 3D modeling software and the Scheme language programming are used to generate lens model respectively. With the help of optical simulation software, a light source with the size of 1mm*1mm*1mm in volume is used in experiment, and the lateral migration distance of illumination area is 0.5m, in which total one million rays are computed. We could acquire the simulated results of both models. The simulated output result shows that the Scheme language can prevent the model deformation problems caused by the process of the model transfer, and the degree of illumination uniformity is reached to 82%, and the offset angle is 26°. Also, the efficiency of modeling process is greatly increased by using Scheme language.

  7. Key Management Scheme Based on Route Planning of Mobile Sink in Wireless Sensor Networks.

    Science.gov (United States)

    Zhang, Ying; Liang, Jixing; Zheng, Bingxin; Jiang, Shengming; Chen, Wei

    2016-01-29

    In many wireless sensor network application scenarios the key management scheme with a Mobile Sink (MS) should be fully investigated. This paper proposes a key management scheme based on dynamic clustering and optimal-routing choice of MS. The concept of Traveling Salesman Problem with Neighbor areas (TSPN) in dynamic clustering for data exchange is proposed, and the selection probability is used in MS route planning. The proposed scheme extends static key management to dynamic key management by considering the dynamic clustering and mobility of MSs, which can effectively balance the total energy consumption during the activities. Considering the different resources available to the member nodes and sink node, the session key between cluster head and MS is established by modified an ECC encryption with Diffie-Hellman key exchange (ECDH) algorithm and the session key between member node and cluster head is built with a binary symmetric polynomial. By analyzing the security of data storage, data transfer and the mechanism of dynamic key management, the proposed scheme has more advantages to help improve the resilience of the key management system of the network on the premise of satisfying higher connectivity and storage efficiency.

  8. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  9. A Cautionary Note on Individual Transferable Quotas

    Directory of Open Access Journals (Sweden)

    U. Rashid Sumaila

    2010-09-01

    Full Text Available Individual transferable quotas (ITQs are a type of catch share system, which is a tool used by some governments to manage fisheries. Technical reasons for taking a rather cautious approach to the implementation of ITQs have been provided previously. In the current contribution, I first highlight the strengths and weaknesses of ITQs and then provide suggestions on how to design and implement these quotas to mitigate their weaknesses. ITQs need to be designed carefully as part of a broad ecosystem-based management scheme to meet the three generally accepted objectives of modern fisheries management: ecological, economic, and social sustainability.

  10. A combined spectrum sensing and OFDM demodulation scheme

    NARCIS (Netherlands)

    Heskamp, M.; Slump, Cornelis H.

    2009-01-01

    In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation

  11. A practicable γ5-scheme in dimensional regularization

    International Nuclear Information System (INIS)

    Koerner, J.G.; Kreimer, D.; Schilcher, K.

    1991-08-01

    We present a new simple Υ 5 regularization scheme. We discuss its use in the standard radiative correction calculations including the anomaly contributions. The new scheme features an anticommuting Υ 5 which leads to great simplifications in practical calculations. We carefully discuss the underlying mathematics of our Υ 5 -scheme which is formulated in terms of simple projection operations. (orig.)

  12. throughput analysis of arq schemes using state transition diagrams

    African Journals Online (AJOL)

    User

    networks operating in severely fading channels. (Shi et al. ... time. Among the three basic ARQ schemes, the ideal SR scheme gives the highest throughout efficiency. The main limitation of the ideal SR scheme is the requirement for an infinite buffer storage size at the ... the method of using the synchronization effi- ciency is ...

  13. Throughput Analysis of Arq Schemes Using State Transition Diagrams

    African Journals Online (AJOL)

    ST2) scheme having variable selective repeat mode retransmissions and the Selective Repeat-Stutter-Go Back N (SR-ST-GBN) scheme having variable stutter mode retransmissions. Using the SR-ST-GBN scheme, it is also shown that it is ...

  14. Forgery attack to Kang-Tang digital signature scheme

    Science.gov (United States)

    Fang, Jie; Guo, Yongning; Liu, Chenglian

    2014-10-01

    In 2006, Kang and Tang proposed a digital signature scheme without hash functions and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Kang-Tang scheme is insecure.

  15. SCHEME ANALYSIS TREE DIMENSIONS AND TOLERANCES PROCESSING

    Directory of Open Access Journals (Sweden)

    Constanta RADULESCU

    2011-07-01

    Full Text Available This paper presents one of the steps that help us to determine the optimal tolerances depending on thetechnological capability of processing equipment. To determine the tolerances in this way is necessary to takethe study and to represent schematically the operations are used in technological process of making a piece.Also in this phase will make the tree diagram of the dimensions and machining tolerances, dimensions andtolerances shown that the design execution. Determination processes, and operations of the dimensions andtolerances tree scheme will make for a machined piece is both indoor and outdoor.

  16. LHC INTERACTION REGION CORRECTION SCHEME STUDIES

    International Nuclear Information System (INIS)

    FISCHER, W.; PTITSIN, V.; WEI, J.

    1999-01-01

    In a companion paper the authors showed that the performance of the Large Hadron Collider (LHC) at collision energy is limited by the field quality of the interaction region quadrupoles and dipoles. In this situation, the dynamic aperture can be increased through local multipole correctors. Since the betatron phase advance is well defined for magnets that are located in regions of large beta functions, local corrections can be very effective and robust. They compare possible compensation schemes and propose a corrector layout to meet the required dynamic aperture performance

  17. LHC INTERACTION REGION CORRECTION SCHEME STUDIES

    Energy Technology Data Exchange (ETDEWEB)

    FISCHER,W.; PTITSIN,V.; WEI,J.

    1999-09-07

    In a companion paper the authors showed that the performance of the Large Hadron Collider (LHC) at collision energy is limited by the field quality of the interaction region quadrupoles and dipoles. In this situation, the dynamic aperture can be increased through local multipole correctors. Since the betatron phase advance is well defined for magnets that are located in regions of large beta functions, local corrections can be very effective and robust. They compare possible compensation schemes and propose a corrector layout to meet the required dynamic aperture performance.

  18. A Ponzi scheme exposed to volatile markets

    OpenAIRE

    Parodi, Bernhard R.

    2014-01-01

    The PGBM model for a couple of counteracting, exponentially growing capital flows is presented: the available capital stock X(t) evolves according to a variant of inhomogeneous geometric Brownian motion (GBM) with time-dependent drift, in particular, to the stochastic differential equation dX(t)=[pX(t) + rho1*exp(q1*t)+rho2*exp(q2*t)]dt + sigma*X(t)*dW(t), where W(t) is a Wiener process. As a paragon, we study a continuous-time model for a nine-parameter Ponzi scheme with an exponentially gro...

  19. New Financing Schemes of Public Infrastructure

    Directory of Open Access Journals (Sweden)

    Ignacio de la Riva

    2017-01-01

    Full Text Available Public works procurements and concessions are traditional legal techniques used to shape the financing of public infrastructure. Fiscal constraints faced by public administrations at the end of the 20th century, and the subsequent increase of private participation in the provision of public goods and services, encouraged the development of new legal schemes allowing a higher degree of private investment in public infrastructure; such as Public Private Partnerships, project finance, securitizations, the shadow toll, turn-key agreements, public leasing and public trusts.

  20. Investigation of a monochromator scheme for SPEAR

    International Nuclear Information System (INIS)

    Wille, K.; Chao, A.W.

    1984-08-01

    The possibility of mono-chromatizing SPEAR for the purpose of increasing the hadronic event rate at the narrow resonances was investigated. By using two pairs of electostatic skew quads in monochromator scheme it is found that the event rate can be increased by a factor of 2 for the mini beta optics assuming the luminosity is kept unchanged. An attempt to increase this enhancement factor by major rearrangements of the ring magnets has encountered serious optical difficulties; although enhancement factor of 8 seems possible in principle, this alternative is not recommended

  1. Complete activation scheme for IP design protection

    OpenAIRE

    Brice Colombier; Ugo Mureddu; Marek Laban; Oto Petura; Lilian Bossuet; Viktor Fischer

    2017-01-01

    International audience; —Intellectual Property (IP) illegal copying is a major threat in today's integrated circuits industry which is massively based on a design-and-reuse paradigm. In order to fight this threat, a designer must track how many times an IP has been instantiated. Moreover, illegal copies of an IP must be unusable. We propose a hardware/software scheme which allows a designer to remotely activate an IP with minimal area overhead. The software modifies the IP efficiently and can...

  2. A Classification Scheme for Glaciological AVA Responses

    Science.gov (United States)

    Booth, A.; Emir, E.

    2014-12-01

    A classification scheme is proposed for amplitude vs. angle (AVA) responses as an aid to the interpretation of seismic reflectivity in glaciological research campaigns. AVA responses are a powerful tool in characterising the material properties of glacier ice and its substrate. However, before interpreting AVA data, careful true amplitude processing is required to constrain basal reflectivity and compensate amplitude decay mechanisms, including anelastic attenuation and spherical divergence. These fundamental processing steps can be difficult to design in cases of noisy data, e.g. where a target reflection is contaminated by surface wave energy (in the case of shallow glaciers) or by energy reflected from out of the survey plane. AVA methods have equally powerful usage in estimating the fluid fill of potential hydrocarbon reservoirs. However, such applications seldom use true amplitude data and instead consider qualitative AVA responses using a well-defined classification scheme. Such schemes are often defined in terms of the characteristics of best-fit responses to the observed reflectivity, e.g. the intercept (I) and gradient (G) of a linear approximation to the AVA data. The position of the response on a cross-plot of I and G then offers a diagnostic attribute for certain fluid types. We investigate the advantages in glaciology of emulating this practice, and develop a cross-plot based on the 3-term Shuey AVA approximation (using I, G, and a curvature term C). Model AVA curves define a clear lithification trend: AVA responses to stiff (lithified) substrates fall discretely into one quadrant of the cross-plot, with positive I and negative G, whereas those to fluid-rich substrates plot diagonally opposite (in the negative I and positive G quadrant). The remaining quadrants are unoccupied by plausible single-layer responses and may therefore be diagnostic of complex thin-layer reflectivity, and the magnitude and polarity of the C term serves as a further indicator

  3. Handover Based IMS Registration Scheme for Next Generation Mobile Networks

    Directory of Open Access Journals (Sweden)

    Shireen Tahira

    2017-01-01

    Full Text Available Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming and massive data sharing in social and communication networks. In these networks, user equipment has to register with IP Multimedia Subsystem (IMS which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  4. Practical implementation of piezoelectric energy harvesting synchronized switching schemes

    Science.gov (United States)

    Schlichting, Alexander D.; Phadke, Ajay; Garcia, Ephrahim

    2013-04-01

    Many closed-loop control methods for increasing the power output from piezoelectric energy harvesters have been investigated over the past decade. Initial work started with the application of Maximum Power Point Tracking techniques (MPPT) developed for solar power. More recent schemes have focused on taking advantage of the capacitive nature of piezoelectric harvesters to manipulate the transfer of energy from the piezoelectric to the storage element. There have been a couple of main techniques investigated in the literature: Synchronous Charge Extraction (SCE), Synchronized Switching and Discharging to a Capacitor through an Inductor (SSDCI), Synchronized Switch Harvesting on an Inductor (SSHI), and Piezoelectric Pre-Biasing (PPB). While significant increases in harvested power are seen both theoretically and experimentally using powerful external control systems, the applicability of these methods depends highly on the performance and efficiency of the system which implements the synchronized switching. Many piezoelectric energy harvesting systems are used to power devices controlled by a microcontroller (MCU), making them readily available for switching control methods. This work focuses on the practical questions which dictate the applicability of synchronized switching techniques using MCU-based switching control.

  5. Intramolecular Energy Transfer, Charge Transfer & Hydrogen Bond

    Indian Academy of Sciences (India)

    Ultrafast Dynamics of Chemical Reactions in Condensed Phase: Intramolecular Energy Transfer, Charge Transfer & Hydrogen Bond · PowerPoint Presentation · Slide 3 · Slide 4 · Slide 5 · Slide 6 · Slide 7 · Slide 8 · Slide 9 · Slide 10 · Slide 11 · Slide 12 · Slide 13 · Slide 14 · Slide 15 · Slide 16 · Slide 17 · Slide 18 · Slide 19.

  6. Fuel transfer machine

    International Nuclear Information System (INIS)

    Bernstein, I.

    1978-01-01

    A nuclear fuel transfer machine for transferring fuel assemblies through the fuel transfer tube of a nuclear power generating plant containment structure is described. A conventional reversible drive cable is attached to the fuel transfer carriage to drive it horizontally through the tube. A shuttle carrying a sheave at each end is arranged in parallel with the carriage to also travel into the tube. The cable cooperating with the sheaves permit driving a relatively short fuel transfer carriage a large distance without manually installing sheaves or drive apparatus in the tunnel. 8 claims, 3 figures

  7. Electron transfer reactions

    CERN Document Server

    Cannon, R D

    2013-01-01

    Electron Transfer Reactions deals with the mechanisms of electron transfer reactions between metal ions in solution, as well as the electron exchange between atoms or molecules in either the gaseous or solid state. The book is divided into three parts. Part 1 covers the electron transfer between atoms and molecules in the gas state. Part 2 tackles the reaction paths of oxidation states and binuclear intermediates, as well as the mechanisms of electron transfer. Part 3 discusses the theories and models of the electron transfer process; theories and experiments involving bridged electron transfe

  8. Heat transfer enhancement

    International Nuclear Information System (INIS)

    Hasatani, Masanobu; Itaya, Yoshinori

    1985-01-01

    In order to develop energy-saving techniques and new energy techniques, and also most advanced techniques by making industrial equipment with high performance, heat transfer performance frequently becomes an important problem. In addition, the improvement of conventional heat transfer techniques and the device of new heat transfer techniques are often required. It is most proper that chemical engineers engage in the research and development for enhancing heat transfer. The research and development for enhancing heat transfer are important to heighten heat exchange efficiency or to cool equipment for preventing overheat in high temperature heat transfer system. In this paper, the techniques of enhancing radiative heat transfer and the improvement of radiative heat transfer characteristics are reported. Radiative heat transfer is proportional to fourth power of absolute temperature, and it does not require any heat transfer medium, but efficient heat-radiation converters are necessary. As the techniques of enhancing radiative heat transfer, the increase of emission and absorption areas, the installation of emissive structures and the improvement of radiative characteristics are discussed. (Kako, I.)

  9. Transfer function combinations

    KAUST Repository

    Zhou, Liang

    2012-10-01

    Direct volume rendering has been an active area of research for over two decades. Transfer function design remains a difficult task since current methods, such as traditional 1D and 2D transfer functions, are not always effective for all data sets. Various 1D or 2D transfer function spaces have been proposed to improve classification exploiting different aspects, such as using the gradient magnitude for boundary location and statistical, occlusion, or size metrics. In this paper, we present a novel transfer function method which can provide more specificity for data classification by combining different transfer function spaces. In this work, a 2D transfer function can be combined with 1D transfer functions which improve the classification. Specifically, we use the traditional 2D scalar/gradient magnitude, 2D statistical, and 2D occlusion spectrum transfer functions and combine these with occlusion and/or size-based transfer functions to provide better specificity. We demonstrate the usefulness of the new method by comparing to the following previous techniques: 2D gradient magnitude, 2D occlusion spectrum, 2D statistical transfer functions and 2D size based transfer functions. © 2012 Elsevier Ltd.

  10. Numerical Modeling of Ablation Heat Transfer

    Science.gov (United States)

    Ewing, Mark E.; Laker, Travis S.; Walker, David T.

    2013-01-01

    A unique numerical method has been developed for solving one-dimensional ablation heat transfer problems. This paper provides a comprehensive description of the method, along with detailed derivations of the governing equations. This methodology supports solutions for traditional ablation modeling including such effects as heat transfer, material decomposition, pyrolysis gas permeation and heat exchange, and thermochemical surface erosion. The numerical scheme utilizes a control-volume approach with a variable grid to account for surface movement. This method directly supports implementation of nontraditional models such as material swelling and mechanical erosion, extending capabilities for modeling complex ablation phenomena. Verifications of the numerical implementation are provided using analytical solutions, code comparisons, and the method of manufactured solutions. These verifications are used to demonstrate solution accuracy and proper error convergence rates. A simple demonstration of a mechanical erosion (spallation) model is also provided to illustrate the unique capabilities of the method.

  11. Boiling heat transfer in kettle evaporators

    International Nuclear Information System (INIS)

    Hwang, T.H.; Yao, S.C.

    1987-01-01

    The overall boiling process in a typical kettle evaporator is usually characterized as pool boiling. However, a liquid-vapor mixture flows by the gravity-induced natural circulation in the evaporator bundle is usually observed. The existing design or calculation methods, based upon the information of pool boiling in tube bundles, are inadequate to predict accurately the overall boiling heat transfer of a large bundle. Although some calculation schemes, based upon the flow boiling information, have been reported in reference to predict the overall performance of large bundles, the local heat transfer of a tube in a bundle is still not easy to be deducted from the integral results of the whole bundle. The purpose of this study is to investigate the local boiling phenomena in a uniformly heated tube bundle which is common encountered in kettle evaporators

  12. IMPLEMENTATION OF THE NEW CAREER STRUCTURE SCHEME

    CERN Multimedia

    Human Resources Division

    2001-01-01

    CERN's new Merit Advancement and Promotion Scheme, MAPS, comes into force on 1 September, and all members of staff will soon be receiving the official letter of notification of their assimilation into the new scheme. In this announcement, we take a look at where you can learn about the new system. There will also be an article in the Weekly Bulletin at the end of the month, which will summarise the main changes. During the early summer, HR Division presented the new structure to the staff in the Laboratory via Divisional Information Meetings. The transparencies used in these meetings, along with a list of the most relevant questions and answers, a Career Path Guide as well as a general overview document are available on the HR Division web site http://cern.ch/CERN/Divisions/PE/. Hard copies of the latter document are also available from the Divisional secretariats. The first question most staff members will ask is how they will fit into the new career path structure. Via the same web page, they can type in th...

  13. Extended lattice Boltzmann scheme for droplet combustion.

    Science.gov (United States)

    Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas

    2017-05-01

    The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n-butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.

  14. Studying ignition schemes on European laser facilities

    Science.gov (United States)

    Jacquemot, S.; Amiranoff, F.; Baton, S. D.; Chanteloup, J. C.; Labaune, C.; Koenig, M.; Michel, D. T.; Perez, F.; Schlenvoigt, H. P.; Canaud, B.; Cherfils Clérouin, C.; Debras, G.; Depierreux, S.; Ebrardt, J.; Juraszek, D.; Lafitte, S.; Loiseau, P.; Miquel, J. L.; Philippe, F.; Rousseaux, C.; Blanchot, N.; Edwards, C. B.; Norreys, P.; Atzeni, S.; Schiavi, A.; Breil, J.; Feugeas, J. L.; Hallo, L.; Lafon, M.; Ribeyre, X.; Santos, J. J.; Schurtz, G.; Tikhonchuk, V.; Debayle, A.; Honrubia, J. J.; Temporal, M.; Batani, D.; Davies, J. R.; Fiuza, F.; Fonseca, R. A.; Silva, L. O.; Gizzi, L. A.; Koester, P.; Labate, L.; Badziak, J.; Klimo, O.

    2011-09-01

    Demonstrating ignition and net energy gain in the near future on MJ-class laser facilities will be a major step towards determining the feasibility of Inertial Fusion Energy (IFE), in Europe as in the United States. The current status of the French Laser MégaJoule (LMJ) programme, from the laser facility construction to the indirectly driven central ignition target design, is presented, as well as validating experimental campaigns, conducted, as part of this programme, on various laser facilities. However, the viability of the IFE approach strongly depends on our ability to address the salient questions related to efficiency of the target design and laser driver performances. In the overall framework of the European HiPER project, two alternative schemes both relying on decoupling target compression and fuel heating—fast ignition (FI) and shock ignition (SI)—are currently considered. After a brief presentation of the HiPER project's objectives, FI and SI target designs are discussed. Theoretical analysis and 2D simulations will help to understand the unresolved key issues of the two schemes. Finally, the on-going European experimental effort to demonstrate their viability on currently operated laser facilities is described.

  15. Present and future nuclear power financing schemes

    International Nuclear Information System (INIS)

    Diel, R.

    1977-01-01

    The financial requirement for nuclear power plants in the Federal Republic of Germany for the period up until 1985 was estimated to run up to some DM 100 billion already in the Nuclear Energy Study published by the Dresdner Bank in 1974. This figure is not changed in any way by the reduction the nuclear power program has suffered in the meantime, because the lower requirement for investment capital is more than offset by the price increases that have occurred meanwhile. A capital requirement in the order of DM 100 billion raises major problems for the power producing industry and the banks which, however, are not going to hamper the further expansion of nuclear power, because new financing schemes have been specially developed for the nuclear field. They include financing by leasing, the use of funds from real estate credit institutions for long term financing, borrowing of long term funds in the Euro market, and financing through subsidiaries of the utilities. The new financing schemes also apply to the large financial requirement associated with the nuclear fuel cycle, waste management in particular. In this sector the utilities agree to bear the economic risk of the companies implementing the respective projects. Accordingly, financing will not entail any major difficulties. Another area of great importance is export financing. The German-Brazilian nuclear agreement is a model of this instrument. (orig.) [de

  16. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  17. Finite-difference schemes for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: es@cwi.nl [Centrum Wiskunde and Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands)

    2014-09-01

    In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.

  18. Optimum penstocks for low head microhydro schemes

    Energy Technology Data Exchange (ETDEWEB)

    Alexander, K.V. [Department of Mechanical Engineering, University of Canterbury, Christchurch, P.O. Box 4800, Christchurch (New Zealand); Giddens, E.P. [Formally of Department of Civil Engineering, University of Canterbury, 81 Grange Street, Opawa, Christchurch (New Zealand)

    2008-03-15

    This paper presents an analysis for penstock optimization, for low head microhydro schemes. The intent of the optimization is to minimize capital cost per kilowatt rather than maximize the energy from the site. It is shown that site slope is an important consideration that affects the economics. While this work stands alone it has been generated as part of a research program that is in the final stages of developing a modular set of cost-effective low-head microhydro schemes for site heads below those currently serviced by Pelton Wheels. The rationale for the work has been that there is a multitude of viable low-head sites in isolated areas where microhydro is a realistic energy option, and where conventional economics are not appropriate. This is especially the case in third world countries. The goals of this paper have been to illustrate the issues and show how to decide on the most cost-effective penstock solutions that systematically cover the 0.2-20 kW supply. The paper presents the results as a matrix of the most cost-effective penstocks, and in the larger project it matches them to a modular set of turbines. It shows how to find the relative cost-effectiveness of alternative penstocks, and concludes with examples illustrating the results. (author)

  19. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  20. Single particle level scheme for alpha decay

    International Nuclear Information System (INIS)

    Mirea, M.

    1998-01-01

    The fine structure phenomenon in alpha decay was evidenced by Rosenblum. In this process the kinetic energy of the emitted particle has several determined values related to the structure of the parent and the daughter nucleus. The probability to find the daughter in a low lying state was considered strongly dependent on the spectroscopic factor defined as the square of overlap between the wave function of the parent in the ground state and the wave functions of the specific excited states of the daughter. This treatment provides a qualitative agreement with the experimental results if the variations of the penetrability between different excited states are neglected. Based on single particle structure during fission, a new formalism explained quantitatively the fine structure of the cluster decay. It was suggested that this formalism can be applied also to alpha decay. For this purpose, the first step is to construct the level scheme of this type of decay. Such a scheme, obtained with the super-asymmetric two-center potential, is plotted for the alpha decay of 223 Ra. It is interesting to note that, diabatically, the level with spin 3/2 emerging from 1i 11/2 (ground state of the parent) reaches an excited state of the daughter in agreement with the experiment. (author)

  1. Multiplexing schemes for quantum repeater networks

    Science.gov (United States)

    Aparicio, Luciano; Van Meter, Rodney

    2011-08-01

    When built, quantum repeaters will allow the distribution of entangled quantum states across large distances, playing a vital part in many proposed quantum technologies. Enabling multiple users to connect through the same network will be key to their real-world deployment. Previous work on repeater technologies has focussed only on simple entanglment production, without considering the issues of resource scarcity and competition that necessarily arise in a network setting. In this paper we simulated a thirteen-node network with up to five flows sharing different parts of the network, measuring the total throughput and fairness for each case. Our results suggest that the Internet-like approach of statistical multiplexing use of a congested link gives the highest aggregate throughput. Time division multiplexing and buffer space multiplexing were slightly less effective, but all three schemes allow the sum of multiple flows to substantially exceed that of any one flow, improving over circuit switching by taking advantage of resources that are forced to remain idle in circuit switching. All three schemes proved to have excellent fairness. The high performance, fairness and simplicity of implementation support a recommendation of statistical multiplexing for shared quantum repeater networks.

  2. A subgrid parameterization scheme for precipitation

    Directory of Open Access Journals (Sweden)

    S. Turner

    2012-04-01

    Full Text Available With increasing computing power, the horizontal resolution of numerical weather prediction (NWP models is improving and today reaches 1 to 5 km. Nevertheless, clouds and precipitation formation are still subgrid scale processes for most cloud types, such as cumulus and stratocumulus. Subgrid scale parameterizations for water vapor condensation have been in use for many years and are based on a prescribed probability density function (PDF of relative humidity spatial variability within the model grid box, thus providing a diagnosis of the cloud fraction. A similar scheme is developed and tested here. It is based on a prescribed PDF of cloud water variability and a threshold value of liquid water content for droplet collection to derive a rain fraction within the model grid. Precipitation of rainwater raises additional concerns relative to the overlap of cloud and rain fractions, however. The scheme is developed following an analysis of data collected during field campaigns in stratocumulus (DYCOMS-II and fair weather cumulus (RICO and tested in a 1-D framework against large eddy simulations of these observed cases. The new parameterization is then implemented in a 3-D NWP model with a horizontal resolution of 2.5 km to simulate real cases of precipitating cloud systems over France.

  3. A simple data compression scheme for binary images of bacteria compared with commonly used image data compression schemes

    NARCIS (Netherlands)

    Wilkinson, M.H.F.

    A run length code compression scheme of extreme simplicity, used for image storage in an automated bacterial morphometry system, is compared with more common compression schemes, such as are used in the tag image file format. These schemes are Lempel-Ziv and Welch (LZW), Macintosh Packbits, and

  4. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  5. Quantum election scheme based on anonymous quantum key distribution

    International Nuclear Information System (INIS)

    Zhou Rui-Rui; Yang Li

    2012-01-01

    An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)

  6. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  7. Computational evaluation of convection schemes in fluid dynamics problems

    Directory of Open Access Journals (Sweden)

    Paulo Laerte Natti

    2012-11-01

    Full Text Available This article provides a computational evaluation of the popular high resolution upwind WACEB, CUBISTA and ADBQUICKEST schemes for solving non-linear fluid dynamics problems. By using the finite difference methodology, the schemes are analyzed and implemented in the context of normalized variables of Leonard. In order to access the performance of the schemes, Riemann problems for 1D Burgers, Euler and shallow water equations are considered. From the numerical results, the schemes are ranked according to their performance in solving these non-linear equations. The best scheme is then applied in the numerical simulation of tridimensional incompressible moving free surface flows.

  8. A simplified computational scheme for thermal analysis of LWR spent fuel dry storage and transportation casks

    International Nuclear Information System (INIS)

    Kim, Chang Hyun

    1997-02-01

    A simplified computational scheme for thermal analysis of the LWR spent fuel dry storage and transportation casks has been developed using two-step thermal analysis method incorporating effective thermal conductivity model for the homogenized spent fuel assembly. Although a lot of computer codes and analytical models have been developed for application to the fields of thermal analysis of dry storage and/or transportation casks, some difficulties in its analysis arise from the complexity of the geometry including the rod bundles of spent fuel and the heat transfer phenomena in the cavity of cask. Particularly, if the disk-type structures such as fuel baskets and aluminium heat transfer fins are included, the thermal analysis problems in the cavity are very complex. To overcome these difficulties, cylindrical coordinate system is adopted to calculate the temperature profile of a cylindrical cask body using the multiple cylinder model as the step-1 analysis of the present study. In the step-2 analysis, Cartesian coordinate system is adopted to calculate the temperature distributions of the disk-type structures such as fuel basket and aluminium heat transfer fin using three- dimensional conduction analysis model. The effective thermal conductivity for homogenized spent fuel assembly based on Manteufel and Todreas model is incorporated in step-2 analysis to predict the maximum fuel temperature. The presented two-step computational scheme has been performed using an existing HEATING 7.2 code and the effective thermal conductivity for the homogenized spent fuel assembly has been calculated by additional numerical analyses. Sample analyses of five cases are performed for NAC-STC including normal transportation condition to examine the applicability of the presented simplified computational scheme for thermal analysis of the large LWR spent fuel dry storage and transportation casks and heat transfer characteristics in the cavity of the cask with the disk-type structures

  9. A numerical scheme for the generalized Burgers–Huxley equation

    Directory of Open Access Journals (Sweden)

    Brajesh K. Singh

    2016-10-01

    Full Text Available In this article, a numerical solution of generalized Burgers–Huxley (gBH equation is approximated by using a new scheme: modified cubic B-spline differential quadrature method (MCB-DQM. The scheme is based on differential quadrature method in which the weighting coefficients are obtained by using modified cubic B-splines as a set of basis functions. This scheme reduces the equation into a system of first-order ordinary differential equation (ODE which is solved by adopting SSP-RK43 scheme. Further, it is shown that the proposed scheme is stable. The efficiency of the proposed method is illustrated by four numerical experiments, which confirm that obtained results are in good agreement with earlier studies. This scheme is an easy, economical and efficient technique for finding numerical solutions for various kinds of (nonlinear physical models as compared to the earlier schemes.

  10. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  11. New bounded skew central difference scheme. Part 2: Application to natural convection in an eccentric annulus

    Energy Technology Data Exchange (ETDEWEB)

    Moukalled, F.; Darwish, M. [American Univ. of Beirut (Lebanon)

    1997-01-01

    The bounded skew central difference scheme (NVF SCDS) is used to study numerically the combined effect of vertical ({epsilon}{sub y}) and horizontal ({epsilon}{sub x}) eccentricities on natural convection in an annulus between a heated horizontal cylinder and its square enclosure. Four Rayleigh numbers (Ra = 10{sup 3}, 10{sup 4}, 10{sup 5}, and 10{sup 6}), three aspect ratios (R/L = 0.1, 0.2, and 0.3), and eccentricity values ranging from {minus}0.3 to 0.3 are considered. At constant enclosure aspect ratio, the total heat transfer increases with increasing Rayleigh number. For constant Rayleigh-number values, convection contribution to total heat transfer decreases with increasing values of R/L. For conduction-dominated flows, heat transfer increases with increasing {vert_bar}{epsilon}{sub y}{vert_bar} and/or {vert_bar}{epsilon}{sub x}{vert_bar}. For convection-dominated flows, heat transfer increases with decreasing {epsilon}{sub y} for {epsilon}{sub y} < 0, decreases with increasing {epsilon}{sub y} for {epsilon}{sub y} > 0, and decreases with decreasing {epsilon}{sub x} for {epsilon}{sub x} < 0. For the case when conduction and convection are of equal importance, there is a critical {epsilon}{sub x} for which the total heat transfer is minimum.

  12. Ionic character of polar crystals: An extended Mulliken scheme for electronegativities

    International Nuclear Information System (INIS)

    Watson, R.E.; Bennett, L.H.; Davenport, J.W.

    1983-01-01

    The total energy of an atom can be expressed in terms of the charge q on the atom as E(q) = E(0)+αq+βq 2 +γq 3 . It is shown that the expected charge transfer q, which brings the intra-atomic energy of the atoms to a minimum, between otherwise isolated noninteracting atoms, is proportional to the difference in the α's of the constituent elements, i.e., q = c Δα. Thus α provides a well-defined electronegativity scale, and if the third-order term γq 3 may be neglected, then α = Phi/sub m/, which is the original Mulliken scale. The quadratic term βq 2 acts to oppose charge transfer, and therefore the coefficient c, relating q to Δα, depends on what elements are involved and on their relative concentration in a well-defined manner. This implies an asymmetry in charge transfer with concentration. Spectroscopic data indicate that γ, though small, is not negligible and, in such a case Phi/sub m/ is not a proper electronegativity. The extended Mulliken scheme, involving α and β, is relevant to the energetics of charge transfer and hence to the ionic character of insulating and semiconducting compounds. It allows simple baseline estimates to be made of such character. Other factors contribute to charge transfer and some of the complications associated with transition-metal compound formation are explored

  13. A simple language to script and simulate breeding schemes: the breeding scheme language

    Science.gov (United States)

    It is difficult for plant breeders to determine an optimal breeding strategy given that the problem involves many factors, such as target trait genetic architecture and breeding resource availability. There are many possible breeding schemes for each breeding program. Although simulation study may b...

  14. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  15. An efficient compression scheme for bitmap indices

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  16. Fuel transfer system

    Science.gov (United States)

    Townsend, Harold E.; Barbanti, Giancarlo

    1994-01-01

    A nuclear fuel bundle fuel transfer system includes a transfer pool containing water at a level above a reactor core. A fuel transfer machine therein includes a carriage disposed in the transfer pool and under the water for transporting fuel bundles. The carriage is selectively movable through the water in the transfer pool and individual fuel bundles are carried vertically in the carriage. In a preferred embodiment, a first movable bridge is disposed over an upper pool containing the reactor core, and a second movable bridge is disposed over a fuel storage pool, with the transfer pool being disposed therebetween. A fuel bundle may be moved by the first bridge from the reactor core and loaded into the carriage which transports the fuel bundle to the second bridge which picks up the fuel bundle and carries it to the fuel storage pool.

  17. Waste Transfer Stations

    DEFF Research Database (Denmark)

    Christensen, Thomas Højlund

    2011-01-01

    tion and transport is usually the most costly part of any waste management system; and when waste is transported over a considerable distance or for a long time, transferring the waste from the collection vehicles to more efficient transportation may be economically beneficial. This involves...... a transfer station where the transfer takes place. These stations may also be accessible by private people, offering flexibility to the waste system, including facilities for bulky waste, household hazardous waste and recyclables. Waste transfer may also take place on the collection route from small...... satellite collection vehicles to large compacting vehicles that cannot effectively travel small streets and alleys within the inner city or in residential communities with narrow roads. However, mobile transfer is not dealt with in this chapter, which focuses on stationary transfer stations. This chapter...

  18. Robust Transfer Metric Learning for Image Classification.

    Science.gov (United States)

    Ding, Zhengming; Fu, Yun

    2017-02-01

    Metric learning has attracted increasing attention due to its critical role in image analysis and classification. Conventional metric learning always assumes that the training and test data are sampled from the same or similar distribution. However, to build an effective distance metric, we need abundant supervised knowledge (i.e., side/label information), which is generally inaccessible in practice, because of the expensive labeling cost. In this paper, we develop a robust transfer metric learning (RTML) framework to effectively assist the unlabeled target learning by transferring the knowledge from the well-labeled source domain. Specifically, RTML exploits knowledge transfer to mitigate the domain shift in two directions, i.e., sample space and feature space. In the sample space, domain-wise and class-wise adaption schemes are adopted to bridge the gap of marginal and conditional distribution disparities across two domains. In the feature space, our metric is built in a marginalized denoising fashion and low-rank constraint, which make it more robust to tackle noisy data in reality. Furthermore, we design an explicit rank constraint regularizer to replace the rank minimization NP-hard problem to guide the low-rank metric learning. Experimental results on several standard benchmarks demonstrate the effectiveness of our proposed RTML by comparing it with the state-of-the-art transfer learning and metric learning algorithms.

  19. A security scheme of SMS system

    Science.gov (United States)

    Zhang, Fangzhou; Yang, Hong-Wei; Song, Chuck

    2005-02-01

    With the prosperous development and the use of SMS, more and more important information need to be transferred through the wireless and mobile networks by the users. But in the GSM/GPRS network, the SMS messages are transferred in text mode through the signaling channel and there is no integrality for SMS messages. Because of the speciality of the mobile communications, the security of signaling channel is very weak. So we need to improve and enhance the security and integrality of SMS. At present, developed investigation based on SMS security is still incomplete. The key distribution and management is not perfect to meet the usability in a wide area. This paper introduces a high-level security method to solve this problem. We design the Secure SMS of GSM/GPRS in order to improve the security of the important information that need to be transferred by the mobile networks. Using this method, we can improve the usability of E-payment and other mobile electronic commerce.

  20. Labour supply with in-work and in-kind transfers

    DEFF Research Database (Denmark)

    Bingley, Paul; Walker, Ian

    1997-01-01

    There have been a number of changes to the nature of in-work transfers over the last 20 years. Further expansions have been proposed and in-work transfer schemes have recently been promoted as a device for encouraging labour force participation and reducing the severity of the disincentives...... associated with out-of-work income support schemes. In-kind transfers have also been promoted as a way of proving poverty relief without inducing servere adverse incentive effects. Here we estimate a discrete choice labour supply model which allows for endogenous participation in multiple cash and In......-Kind transfer programmes, and for involuntary unemployment. This is applied to the Family Credit, Housing Benefit, Free School Lunch and Milk Token programmes for a sample of 4527 lone mothers drawn from UK Family Expenditure Surveys. We find that Family Credit and In-Kind transfers have larger labour supply...

  1. Finite element or Galerkin type semidiscrete schemes

    Science.gov (United States)

    Durgun, K.

    1983-01-01

    A finite element of Galerkin type semidiscrete method is proposed for numerical solution of a linear hyperbolic partial differential equation. The question of stability is reduced to the stability of a system of ordinary differential equations for which Dahlquist theory applied. Results of separating the part of numerical solution which causes the spurious oscillation near shock-like response of semidiscrete scheme to a step function initial condition are presented. In general all methods produce such oscillatory overshoots on either side of shocks. This overshoot pathology, which displays a behavior similar to Gibb's phenomena of Fourier series, is explained on the basis of dispersion of separated Fourier components which relies on linearized theory to be satisfactory. Expository results represented.

  2. Sellafield Site (including Drigg) emergency scheme manual

    International Nuclear Information System (INIS)

    1987-02-01

    This Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. Several categories of emergencies on the Sellafield Site are mentioned; a building emergency which is confined to one building, a Site emergency standby when the effects of a building emergency go outside that building, a Site emergency alert (District Emergency Standby) when a release of activity affects Site operations and could have serious Site effects and a District Emergency Alert when a radioactivity release may interfere with the normal activity of the General Public. A Drigg Emergency Standby situation would operate similarly at the Drigg Site. The detailed arrangements and responsibilities of appointed personnel are set out in this manual. (UK)

  3. New CERN Health Insurance Scheme (CHIS) forms

    CERN Multimedia

    HR Department

    2015-01-01

    New versions of the following forms for claims and requests to the CERN Health Insurance Scheme (CHIS) have been released:   form for claiming reimbursement of medical expenses,   form for requesting advance reimbursement, and   dental estimate form (for treatments foreseen to exceed 800 CHF).   The new forms are available in French and English. They can either be completed electronically before being printed and signed, or completed in paper form. New detailed instructions can be found at the back of the claim form; CHIS members are invited to read them carefully. The electronic versions (PDF) of all the forms are available on the CHIS website and on the UNIQA Member Portal. CHIS Members are requested to use these new forms forthwith and to discard any previous version. Questions regarding the above should be addressed directly to UNIQA (72730 or 022.718 63 00 or uniqa.assurances@cern.ch).

  4. Design of Infusion Schemes for Neuroreceptor Imaging

    DEFF Research Database (Denmark)

    Feng, Ling; Svarer, Claus; Madsen, Karine

    2016-01-01

    for bolus infusion (BI) or programmed infusion (PI) experiments. Steady-state quantitative measurements can be made with one short scan and venous blood samples. The GABAA receptor ligand [(11)C]Flumazenil (FMZ) was chosen for this purpose, as it lacks a suitable reference region. Methods. Five bolus [(11)C...... state was attained within 40 min, which was 8 min earlier than the optimal BI (B/I ratio = 55 min). Conclusions. The system can design both BI and PI schemes to attain steady state rapidly. For example, subjects can be [(11)C]FMZ-PET scanned after 40 min of tracer infusion for 40 min with venous...

  5. An efficient training scheme for supermodels

    Science.gov (United States)

    Schevenhoven, Francine J.; Selten, Frank M.

    2017-06-01

    Weather and climate models have improved steadily over time as witnessed by objective skill scores, although significant model errors remain. Given these imperfect models, predictions might be improved by combining them dynamically into a so-called supermodel. In this paper a new training scheme to construct such a supermodel is explored using a technique called cross pollination in time (CPT). In the CPT approach the models exchange states during the prediction. The number of possible predictions grows quickly with time, and a strategy to retain only a small number of predictions, called pruning, needs to be developed. The method is explored using low-order dynamical systems and applied to a global atmospheric model. The results indicate that the CPT training is efficient and leads to a supermodel with improved forecast quality as compared to the individual models. Due to its computational efficiency, the technique is suited for application to state-of-the art high-dimensional weather and climate models.

  6. Auction dynamics: A volume constrained MBO scheme

    Science.gov (United States)

    Jacobs, Matt; Merkurjev, Ekaterina; Esedoǧlu, Selim

    2018-02-01

    We show how auction algorithms, originally developed for the assignment problem, can be utilized in Merriman, Bence, and Osher's threshold dynamics scheme to simulate multi-phase motion by mean curvature in the presence of equality and inequality volume constraints on the individual phases. The resulting algorithms are highly efficient and robust, and can be used in simulations ranging from minimal partition problems in Euclidean space to semi-supervised machine learning via clustering on graphs. In the case of the latter application, numerous experimental results on benchmark machine learning datasets show that our approach exceeds the performance of current state-of-the-art methods, while requiring a fraction of the computation time.

  7. An Improved Overloading Scheme for Downlink CDMA

    Directory of Open Access Journals (Sweden)

    Marc Moeneclaey

    2005-04-01

    Full Text Available An improved overloading scheme is presented for single-user detection in the downlink of multiple-access systems based on OCDMA/OCDMA (O/O. By displacing in time the orthogonal signatures of the two user sets that make up the overloaded system, the cross-correlation between the users of the two sets is reduced. For random O/O with square-root cosine rolloff chip pulses, the multiuser interference can be decreased by up to 50% (depending on the chip pulse bandwidth as compared to quasiorthogonal sequences (QOS that are presently part of the downlink standard of Cdma2000. This reduction of the multiuser interference gives rise to an increase of the achievable signal-to-interference-plus-noise ratio for a particular channel load.

  8. Parasitology: United Kingdom National Quality Assessment Scheme.

    Science.gov (United States)

    Hawthorne, M.; Chiodini, P. L.; Snell, J. J.; Moody, A. H.; Ramsay, A.

    1992-01-01

    AIMS: To assess the results from parasitology laboratories taking part in a quality assessment scheme between 1986 and 1991; and to compare performance with repeat specimens. METHODS: Quality assessment of blood parasitology, including tissue parasites (n = 444; 358 UK, 86 overseas), and faecal parasitology, including extra-intestinal parasites (n = 205; 141 UK, 64 overseas), was performed. RESULTS: Overall, the standard of performance was poor. A questionnaire distributed to participants showed that a wide range of methods was used, some of which were considered inadequate to achieve reliable results. Teaching material was distributed to participants from time to time in an attempt to improve standards. CONCLUSIONS: Since the closure of the IMLS fellowship course in 1972, fewer opportunities for specialised training in parasitology are available: more training is needed. Poor performance in the detection of malarial parasites is mainly attributable to incorrect speciation, misidentification, and lack of equipment such as an eyepiece graticule. PMID:1452791

  9. Gas transfer system

    International Nuclear Information System (INIS)

    Oberlin, J.C.; Frick, G.; Kempfer, C.; North, C.

    1988-09-01

    The state of work on the Vivitron gas transfer system and the system functions are summarized. The system has to: evacuate the Vivitron reservoir; transfer gas from storage tanks to the Vivitron; recirculate gas during operation; transfer gas from the Vivitron to storage tanks; and assure air input. The system is now being installed. Leak alarms are given by SF6 detectors, which set off a system of forced ventilation. Another system continuously monitors the amount of SF6 in the tanks [fr

  10. Variable flavor scheme for final state jets

    International Nuclear Information System (INIS)

    Pietrulewicz, P.

    2014-01-01

    In this thesis I describe a setup to treat mass effects from secondary radiation of heavy quark pairs in inclusive hard scattering processes with various dynamical scales. The resulting variable flavor number scheme (VFNS) generalizes a well-known scheme for massive initial state quarks which has been developed for deep inelastic scattering (DIS) in the classical region 1 - x ⁓ O(1) and which will be also discussed here. The setup incorporated in the formalism of Soft-Collinear Effective Theory (SCET) consistently takes into account the effects of massive quark loops and allows to deal with all hierarchies between the mass scale and the involved kinematic scales corresponding to collinear and soft radiation. It resums all large logarithms due to flavor number dependent evolution, achieves both decoupling for very large masses and the correct massless behavior for very small masses, and provides a continuous description in between. In the bulk of this work I will concentrate on DIS in the endpoint region x → 1 serving mainly as a showcase for the concepts and on the thrust distribution for e + e - -collisions in the dijet limit as a phenomenologically relevant example for an event shape. The computations of the corrections to the structures in the factorization theorems are described explicitly for the singular terms at O(α s 2 C F T F ) arising from secondary radiation of massive quarks through gluon splitting. Apart from the soft function for thrust, which requires a dedicated calculation, these results are directly obtained from the corresponding results for the radiation of a massive gauge boson with vector coupling at O(α s ) with the help of dispersion relations, and most of the relevant conceptual and technical issues can be dealt with already at this level. Finally, to estimate the impact of the corrections I carry out a numerical analysis for secondary massive bottom and top quarks on thrust distributions at different center-of-mass energies

  11. Biosphere-atmosphere exchange of reactive nitrogen and greenhouse gases at the NitroEurope core flux measurement sites: Measurement strategy and first data sets

    DEFF Research Database (Denmark)

    Skiba, U.; Drewer, J.; Tang, Y.S.

    2009-01-01

    -agricultural ecosystems. The NO and N2O emission ratio is influenced by soil type and precipitation. First budgets of reactive N entering and leaving the ecosystem and of net greenhouse gas exchange are outlined. Further information on rates of denitrification to N2 and biological N2 fixation is required to complete...... by a network of low-cost flux measurements (Level-2, 9 sites) and a network to infer reactive N fluxes at 58 sites (Level-1), for comparison with carbon (C) flux measurements. Measurements at the Level-3 sites include high resolution N2O, NO (also CH4, CO2) fluxes, wet and dry N deposition, leaching of N and C...... and N transformations in plant, litter and soil. Results for the first 11 months (1.8.2006 to 30.6.2007) suggest that the grasslands are the largest source of N2O, that forests are the largest source of NO and sink of CH4 and that N deposition rates influence NO and N2O fluxes in non...

  12. Basic heat transfer

    CERN Document Server

    Bacon, D H

    2013-01-01

    Basic Heat Transfer aims to help readers use a computer to solve heat transfer problems and to promote greater understanding by changing data values and observing the effects, which are necessary in design and optimization calculations.The book is concerned with applications including insulation and heating in buildings and pipes, temperature distributions in solids for steady state and transient conditions, the determination of surface heat transfer coefficients for convection in various situations, radiation heat transfer in grey body problems, the use of finned surfaces, and simple heat exc

  13. Nonparametric Transfer Function Models

    Science.gov (United States)

    Liu, Jun M.; Chen, Rong; Yao, Qiwei

    2009-01-01

    In this paper a class of nonparametric transfer function models is proposed to model nonlinear relationships between ‘input’ and ‘output’ time series. The transfer function is smooth with unknown functional forms, and the noise is assumed to be a stationary autoregressive-moving average (ARMA) process. The nonparametric transfer function is estimated jointly with the ARMA parameters. By modeling the correlation in the noise, the transfer function can be estimated more efficiently. The parsimonious ARMA structure improves the estimation efficiency in finite samples. The asymptotic properties of the estimators are investigated. The finite-sample properties are illustrated through simulations and one empirical example. PMID:20628584

  14. A Novel Passive Tracking Scheme Exploiting Geometric and Intercept Theorems.

    Science.gov (United States)

    Zhou, Biao; Sun, Chao; Ahn, Deockhyeon; Kim, Youngok

    2018-03-17

    Passive tracking aims to track targets without assistant devices, that is, device-free targets. Passive tracking based on Radio Frequency (RF) Tomography in wireless sensor networks has recently been addressed as an emerging field. The passive tracking scheme using geometric theorems (GTs) is one of the most popular RF Tomography schemes, because the GT-based method can effectively mitigate the demand for a high density of wireless nodes. In the GT-based tracking scheme, the tracking scenario is considered as a two-dimensional geometric topology and then geometric theorems are applied to estimate crossing points (CPs) of the device-free target on line-of-sight links (LOSLs), which reveal the target's trajectory information in a discrete form. In this paper, we review existing GT-based tracking schemes, and then propose a novel passive tracking scheme by exploiting the Intercept Theorem (IT). To create an IT-based CP estimation scheme available in the noisy non-parallel LOSL situation, we develop the equal-ratio traverse (ERT) method. Finally, we analyze properties of three GT-based tracking algorithms and the performance of these schemes is evaluated experimentally under various trajectories, node densities, and noisy topologies. Analysis of experimental results shows that tracking schemes exploiting geometric theorems can achieve remarkable positioning accuracy even under rather a low density of wireless nodes. Moreover, the proposed IT scheme can provide generally finer tracking accuracy under even lower node density and noisier topologies, in comparison to other schemes.

  15. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  16. MIMO transmit scheme based on morphological perceptron with competitive learning.

    Science.gov (United States)

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.

  17. A diode laser stabilization scheme for 40Ca+ single-ion spectroscopy

    Science.gov (United States)

    Rohde, F.; Almendros, M.; Schuck, C.; Huwer, J.; Hennrich, M.; Eschner, J.

    2010-06-01

    We present a scheme for stabilizing multiple lasers at wavelengths between 795 and 866 nm to the same atomic reference line. A reference laser at 852 nm is stabilized to the Cs D2 line using a Doppler-free frequency modulation technique. Through transfer cavities, four lasers are stabilized to the relevant atomic transitions in 40Ca+. The rms linewidth of a transfer-locked laser is measured to be 123 kHz over 200 ms with respect to an independent atomic reference, the Rb D1 line. This stability is confirmed by the comparison of an excitation spectrum of a single 40Ca+ ion to an eight-level Bloch equation model. The long-term stability with respect to the same reference is measured to be 130 kHz over a period of 2 h. The high degree of stability is demonstrated by the measured Allan deviation around 10-11 between 1 and 100 s.

  18. A diode laser stabilization scheme for 40Ca+ single-ion spectroscopy

    International Nuclear Information System (INIS)

    Rohde, F; Almendros, M; Schuck, C; Huwer, J; Hennrich, M; Eschner, J

    2010-01-01

    We present a scheme for stabilizing multiple lasers at wavelengths between 795 and 866 nm to the same atomic reference line. A reference laser at 852 nm is stabilized to the Cs D 2 line using a Doppler-free frequency modulation technique. Through transfer cavities, four lasers are stabilized to the relevant atomic transitions in 40 Ca + . The rms linewidth of a transfer-locked laser is measured to be 123 kHz over 200 ms with respect to an independent atomic reference, the Rb D 1 line. This stability is confirmed by the comparison of an excitation spectrum of a single 40 Ca + ion to an eight-level Bloch equation model. The long-term stability with respect to the same reference is measured to be 130 kHz over a period of 2 h. The high degree of stability is demonstrated by the measured Allan deviation around 10 -11 between 1 and 100 s.

  19. Permanganate Treatment of DNAPLs in Reactive Barriers and Source Zone Flooding Schemes - Final Report

    Energy Technology Data Exchange (ETDEWEB)

    Schwartz, F.W.

    2000-10-01

    This study provides a detailed process-level understanding of the oxidative destruction of the organic contaminant emphasizing on reaction pathways and kinetics. A remarkable rise in the MnO{sup {minus}} consumption rate with TCA and PCE mixtures proves that the phase transfer catalysts have the ability to increase oxidation rate of DNAPLs either in pure phase or mixtures and that there is significant potential for testing the catalyzed scheme under field conditions. Secondly, as an attempt to enhance the oxidation of DNAPL, we are trying to exploit cosolvency effects, utilizing various alcohol-water mixtures to increase DNAPL solubilization. Preliminary results of cosolvency experiments indicate the enhancement in the transfer of nonaqueous phase TCE to TBA-water solution and the rate of TCE degradation in aqueous phase.

  20. Coupled transfers; Transferts couples

    Energy Technology Data Exchange (ETDEWEB)

    Nicolas, X.; Lauriat, G.; Jimenez-Rondan, J. [Universite de Marne-la-Vallee, Lab. d' Etudes des Transferts d' Energie et de Matiere (LETEM), 77 (France); Bouali, H.; Mezrhab, A. [Faculte des Sciences, Dept. de Physique, Lab. de Mecanique et Energetique, Oujda (Morocco); Abid, C. [Ecole Polytechnique Universitaire de Marseille, IUSTI UMR 6595, 13 Marseille (France); Stoian, M.; Rebay, M.; Lachi, M.; Padet, J. [Faculte des Sciences, Lab. de Thermomecanique, UTAP, 51 - Reims (France); Mladin, E.C. [Universitaire Polytechnique Bucarest, Faculte de Genie Mecanique, Bucarest (Romania); Mezrhab, A. [Faculte des Sciences, Lab. de Mecanique et Energetique, Dept. de Physique, Oujda (Morocco); Abid, C.; Papini, F. [Ecole Polytechnique, IUSTI, 13 - Marseille (France); Lorrette, C.; Goyheneche, J.M.; Boechat, C.; Pailler, R. [Laboratoire des Composites ThermoStructuraux, UMR 5801, 33 - Pessac (France); Ben Salah, M.; Askri, F.; Jemni, A.; Ben Nasrallah, S. [Ecole Nationale d' Ingenieurs de Monastir, Lab. d' Etudes des Systemes Thermiques et Energetiques (Tunisia); Grine, A.; Desmons, J.Y.; Harmand, S. [Laboratoire de Mecanique et d' Energetique, 59 - Valenciennes (France); Radenac, E.; Gressier, J.; Millan, P. [ONERA, 31 - Toulouse (France); Giovannini, A. [Institut de Mecanique des Fluides de Toulouse, 31 (France)

    2005-07-01

    This session about coupled transfers gathers 30 articles dealing with: numerical study of coupled heat transfers inside an alveolar wall; natural convection/radiant heat transfer coupling inside a plugged and ventilated chimney; finite-volume modeling of the convection-conduction coupling in non-stationary regime; numerical study of the natural convection/radiant heat transfer coupling inside a partitioned cavity; modeling of the thermal conductivity of textile reinforced composites: finite element homogenization on a full periodical pattern; application of the control volume method based on non-structured finite elements to the problems of axisymmetrical radiant heat transfers in any geometries; modeling of convective transfers in transient regime on a flat plate; a conservative method for the non-stationary coupling of aero-thermal engineering codes; measurement of coupled heat transfers (forced convection/radiant transfer) inside an horizontal duct; numerical simulation of the combustion of a water-oil emulsion droplet; numerical simulation study of heat and mass transfers inside a reactor for nano-powders synthesis; reduction of a combustion and heat transfer model of a direct injection diesel engine; modeling of heat transfers inside a knocking operated spark ignition engine; heat loss inside an internal combustion engine, thermodynamical and flamelet model, composition effects of CH{sub 4}H{sub 2} mixtures; experimental study and modeling of the evolution of a flame on a solid fuel; heat transfer for laminar subsonic jet of oxygen plasma impacting an obstacle; hydrogen transport through a A-Si:H layer submitted to an hydrogen plasma: temperature effects; thermal modeling of the CO{sub 2} laser welding of a magnesium alloy; radiant heat transfer inside a 3-D environment: application of the finite volume method in association with the CK model; optimization of the infrared baking of two types of powder paints; optimization of the emission power of an infrared

  1. Technology Transfer and Technology Transfer Intermediaries

    Science.gov (United States)

    Bauer, Stephen M.; Flagg, Jennifer L.

    2010-01-01

    A standard and comprehensive model is needed to evaluate and compare technology transfer systems and the stakeholders within these systems. The principle systems considered include federal laboratories, U.S. universities, the rehabilitation engineering research centers (RERCs), and large small business innovation research programs. An earlier…

  2. The Labour Supply, Unemployment and Participation of Lone Mothers in In-Work Transfer Programmes.

    OpenAIRE

    Bingley, Paul; Walker, Ian

    1997-01-01

    In-work transfer schemes have recently been suggested as a device for encouraging labor force participation and reducing the severity of the disincentives associated with out-of-work income support schemes. Here the authors estimate a discrete choice labor supply model which allows for endogenous in-work welfare program participation. They also allow for involuntary unemployment so as to distinguish between program nonparticipation and an inability to obtain work and thereby generate an eligi...

  3. Dynamic remedial action scheme using online transient stability analysis

    Science.gov (United States)

    Shrestha, Arun

    Economic pressure and environmental factors have forced the modern power systems to operate closer to their stability limits. However, maintaining transient stability is a fundamental requirement for the operation of interconnected power systems. In North America, power systems are planned and operated to withstand the loss of any single or multiple elements without violating North American Electric Reliability Corporation (NERC) system performance criteria. For a contingency resulting in the loss of multiple elements (Category C), emergency transient stability controls may be necessary to stabilize the power system. Emergency control is designed to sense abnormal conditions and subsequently take pre-determined remedial actions to prevent instability. Commonly known as either Remedial Action Schemes (RAS) or as Special/System Protection Schemes (SPS), these emergency control approaches have been extensively adopted by utilities. RAS are designed to address specific problems, e.g. to increase power transfer, to provide reactive support, to address generator instability, to limit thermal overloads, etc. Possible remedial actions include generator tripping, load shedding, capacitor and reactor switching, static VAR control, etc. Among various RAS types, generation shedding is the most effective and widely used emergency control means for maintaining system stability. In this dissertation, an optimal power flow (OPF)-based generation-shedding RAS is proposed. This scheme uses online transient stability calculation and generator cost function to determine appropriate remedial actions. For transient stability calculation, SIngle Machine Equivalent (SIME) technique is used, which reduces the multimachine power system model to a One-Machine Infinite Bus (OMIB) equivalent and identifies critical machines. Unlike conventional RAS, which are designed using offline simulations, online stability calculations make the proposed RAS dynamic and adapting to any power system

  4. Transfer of a wave packet in double-well potential

    Science.gov (United States)

    Yang, Hai-Feng; Hu, Yao-Hua; Tan, Yong-Gang

    2018-04-01

    Energy potentials with double-well structures are typical in atoms and molecules systems. A manipulation scheme using Half Cycles Pulses (HCPs) is proposed to transfer a Gaussian wave packet between the two wells. On the basis of quantum mechanical simulations, the time evolution and the energy distribution of the wave packet are evaluated. The effect of time parameters, amplitude, and number of HCPs on spatial and energy distribution of the final state and transfer efficiency are investigated. After a carefully tailored HCPs sequence is applied to the initial wave packet localized in one well, the final state is a wave packet localized in the other well and populated at the lower energy levels with narrower distribution. The present scheme could be used to control molecular reactions and to prepare atoms with large dipole moments.

  5. Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme

    Directory of Open Access Journals (Sweden)

    Xingbing Fu

    2015-08-01

    Full Text Available In the existing attribute-based encryption (ABE scheme, the authority (i.e., private key generator (PKG is able to calculate and issue any user’s private key, which makes it completely trusted, which severely influences the applications of the ABE scheme. To mitigate this problem, we propose the black box traceable ciphertext policy attribute-based encryption (T-CP-ABE scheme in which if the PKG re-distributes the users’ private keys for malicious uses, it might be caught and sued. We provide a construction to realize the T-CP-ABE scheme in a black box model. Our scheme is based on the decisional bilinear Diffie-Hellman (DBDH assumption in the standard model. In our scheme, we employ a pair (ID, S to identify a user, where ID denotes the identity of a user and S denotes the attribute set associated with her.

  6. TVD schemes in one and two space dimensions

    International Nuclear Information System (INIS)

    Leveque, R.J.; Goodman, J.B.; New York Univ., NY)

    1985-01-01

    The recent development of schemes which are second order accurate in smooth regions has made it possible to overcome certain difficulties which used to arise in numerical computations of discontinuous solutions of conservation laws. The present investigation is concerned with scalar conservation laws, taking into account the employment of total variation diminishing (TVD) schemes. The concept of a TVD scheme was introduced by Harten et al. (1976). Harten et al. first constructed schemes which are simultaneously TVD and second order accurate on smooth solutions. In the present paper, a summary is provided of recently conducted work in this area. Attention is given to TVD schemes in two space dimensions, a second order accurate TVD scheme in one dimension, and the entropy condition and spreading of rarefaction waves. 19 references

  7. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  8. Schemes of neutrino mixings (oscillations) and their mixing matrices

    International Nuclear Information System (INIS)

    Beshtoev, Kh.M.

    2004-01-01

    Three schemes of neutrino mixings (oscillations) together with their mixing matrices (analogous to Kabibbo-Kobayashi-Maskawa matrices) are considered. In these schemes neutrino transitions are virtual if neutrino masses are different. Two of them belong to the so-called mass mixing schemes (mixing parameters are expressed by elements of mass matrices) and the third scheme belongs to the charge mixing one (mixing parameters are expressed through charges). In the first scheme, six equations for determination of all the elements of the mass matrix (neutrino masses and transition widths) are given using experimental data. In the second and third ones the mixing angles are equal or close to maximal angles (π/4). It is obvious that the experiment must give an answer to the following question: Which of these schemes is realized indeed?

  9. A high-fidelity memory scheme for quantum data buses

    International Nuclear Information System (INIS)

    Liu Bo-Yang; Chen Xi; Zhang Ming; Cui Wei; Dai Hong-Yi

    2017-01-01

    A novel quantum memory scheme is proposed for quantum data buses in scalable quantum computers by using adjustable interaction. Our investigation focuses on a hybrid quantum system including coupled flux qubits and a nitrogen–vacancy center ensemble. In our scheme, the transmission and storage (retrieval) of quantum state are performed in two separated steps, which can be controlled by adjusting the coupling strength between the computing unit and the quantum memory. The scheme can be used not only to reduce the time of quantum state transmission, but also to increase the robustness of the system with respect to detuning caused by magnetic noises. In comparison with the previous memory scheme, about 80% of the transmission time is saved. Moreover, it is exemplified that in our scheme the fidelity could achieve 0.99 even when there exists detuning, while the one in the previous scheme is 0.75. (paper)

  10. A hybrid pi control scheme for airship hovering

    International Nuclear Information System (INIS)

    Ashraf, Z.; Choudhry, M.A.; Hanif, A.

    2012-01-01

    Airship provides us many attractive applications in aerospace industry including transportation of heavy payloads, tourism, emergency management, communication, hover and vision based applications. Hovering control of airship has many utilizations in different engineering fields. However, it is a difficult problem to sustain the hover condition maintaining controllability. So far, different solutions have been proposed in literature but most of them are difficult in analysis and implementation. In this paper, we have presented a simple and efficient scheme to design a multi input multi output hybrid PI control scheme for airship. It can maintain stability of the plant by rejecting disturbance inputs to ensure robustness. A control scheme based on feedback theory is proposed that uses principles of optimality with integral action for hovering applications. Simulations are carried out in MTALAB for examining the proposed control scheme for hovering in different wind conditions. Comparison of the technique with an existing scheme is performed, describing the effectiveness of control scheme. (author)

  11. Modern Schemes for Computation of Transonic Flows in Internal Aerodynamics

    Directory of Open Access Journals (Sweden)

    J. Fürst

    2000-01-01

    Full Text Available The work deals with numerical solution of steady transonic flows with applications in internal aerodynamics. The problems are described by the system of 2D or 3D Euler or Navier-Stokes equations. Our group developed during last years several central or upwind TVD finite volume methods for computation of transonic flows through a cascade or in a channel using grids of quadrilateral cells or triangular cells. We also developed other (non TVD schemes e.g. MacCormack scheme or several multistage Runge-Kutta finite volume schemes with applications of some acceleration techniques (multi-grid solution or hierarchical residual averaging. Our aim is to present some comparison of results of flows in internal aerodynamics using TVD schemes or other schemes. One can also compare the influence or artificial viscosity effects especially using TVD schemes.

  12. IT Department Technology Transfer

    CERN Multimedia

    Birker, D

    2004-01-01

    The objective of Technology Transfer (TT) at CERN is “to make known and available to third parties under agreed conditions, technical developments achieved in fulfi lling the laboratory’s mission in fundamental research”. The IT Department contributes to this objective by the transfer of technology, expertise and know-how to industry, universities, public institutions and the society at large.

  13. Transferability and Linguistic Substrates.

    Science.gov (United States)

    Odlin, Terence

    1992-01-01

    The applicability of transferability principles to language contact in the British Isles, especially Ireland, is shown with a detailed discussion of absolute constructions, structures with interesting relations between syntax and discourse, and with susceptibility to cross-linguistic influence. Evidence for transferability of absolutes in…

  14. Interlevel transfer mechanisms and their application to GRASERS

    International Nuclear Information System (INIS)

    Solem, J.C.

    1985-01-01

    Within the gamma-ray laser (GRASER) research community, much attention is being given to two-step schemes that store energy in a long-lived isomeric state and achieve lasing by transferring population to a short-lived state. Because the electron system exhibits large multipole moments and is in the near field of the nucleus, it can be used as an intermediate mechanism for transferring energy, angular momentum, and parity change. Two distinct electron-nucleus interaction mechanisms are discussed: (1) resonant electronic transitions and (2) collective outer-shell excitations. 9 refs

  15. Cost-Prioritized Droop Schemes for Autonomous AC Microgrids

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2015-01-01

    This paper presents two cost-prioritized droop sche- mes for distributed generators (DGs) in a rural or islanded microgrid. Dispatch prioritization of the schemes allows autonomous identification of the appropriate DGs for generation, in accordance to the overall load conditions of the microgrid....... The result is a lower total generation cost for the microgrid when compared to other droop schemes. An experimental system has been implemented and tested with results showing a higher saving achieved by the proposed schemes....

  16. Symplectic and multisymplectic schemes with the simple finite element method

    International Nuclear Information System (INIS)

    Zhen Liu; Bai Yongqiang; Li Qisheng; Wu Ke

    2003-01-01

    We study the numerical scheme of elliptic equations by the finite element method. With the special finite element domain, we can find that the scheme can keep a preserved symplectic structure in one-dimensional case and a preserved multisymplectic structure in two-dimensional case. Then we consider the discrete variational principle with the finite element method in the corresponding Lagrangian formalism for classical mechanics and field theory and get the symplectic or multisymplectic scheme of the Euler-Lagrangian equation

  17. Optimized variational analysis scheme of single Doppler radar wind data

    Science.gov (United States)

    Sasaki, Yoshi K.; Allen, Steve; Mizuno, Koki; Whitehead, Victor; Wilk, Kenneth E.

    1989-01-01

    A computer scheme for extracting singularities has been developed and applied to single Doppler radar wind data. The scheme is planned for use in real-time wind and singularity analysis and forecasting. The method, known as Doppler Operational Variational Extraction of Singularities is outlined, focusing on the principle of local symmetry. Results are presented from the application of the scheme to a storm-generated gust front in Oklahoma on May 28, 1987.

  18. Two Conservative Difference Schemes for Rosenau-Kawahara Equation

    Directory of Open Access Journals (Sweden)

    Jinsong Hu

    2014-01-01

    Full Text Available Two conservative finite difference schemes for the numerical solution of the initialboundary value problem of Rosenau-Kawahara equation are proposed. The difference schemes simulate two conservative quantities of the problem well. The existence and uniqueness of the difference solution are proved. It is shown that the finite difference schemes are of second-order convergence and unconditionally stable. Numerical experiments verify the theoretical results.

  19. An efficient parallel computing scheme for Monte Carlo criticality calculations

    International Nuclear Information System (INIS)

    Dufek, Jan; Gudowski, Waclaw

    2009-01-01

    The existing parallel computing schemes for Monte Carlo criticality calculations suffer from a low efficiency when applied on many processors. We suggest a new fission matrix based scheme for efficient parallel computing. The results are derived from the fission matrix that is combined from all parallel simulations. The scheme allows for a practically ideal parallel scaling as no communication among the parallel simulations is required, and inactive cycles are not needed.

  20. Sound classification of dwellings - Comparison of schemes in Europe

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2009-01-01

    National sound classification schemes for dwellings exist in nine countries in Europe, and proposals are under preparation in more countries. The schemes specify class criteria concerning several acoustic aspects, the main criteria being about airborne and impact sound insulation between dwelling....... The current variety of descriptors and classes also causes trade barriers. Thus, there is a need to harmonize concepts and other characteristics of the schemes....

  1. Theory analysis and simple calculation of travelling wave burnup scheme

    International Nuclear Information System (INIS)

    Zhang Jian; Yu Hong; Gang Zhi

    2012-01-01

    Travelling wave burnup scheme is a new burnup scheme that breeds fuel locally just before it burns. Based on the preliminary theory analysis, the physical imagine was found. Through the calculation of a R-z cylinder travelling wave reactor core with ERANOS code system, the basic physical characteristics of this new burnup scheme were concluded. The results show that travelling wave reactor is feasible in physics, and there are some good features in the reactor physics. (authors)

  2. Two IP Protection Schemes for Multi-FPGA Systems

    OpenAIRE

    Gaspar, Lubos; Fischer, Viktor; Guneysu, Tim; Cherif, Zouha

    2012-01-01

    International audience; This paper proposes two novel protection schemes for multi-FPGA systems providing high security of IP designs licensed by IP vendors to system integrators and installed remotely in a hostile environment. In the first scheme, these useful properties are achieved by storing two different configuration keys inside an FPGA, while in the second scheme, they are obtained using a hardware white-box cipher for creating a trusted environment. Thanks to the proposed principles, ...

  3. A repeat-until-success quantum computing scheme

    Energy Technology Data Exchange (ETDEWEB)

    Beige, A [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Lim, Y L [DSO National Laboratories, 20 Science Park Drive, Singapore 118230, Singapore (Singapore); Kwek, L C [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542, Singapore (Singapore)

    2007-06-15

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes.

  4. A repeat-until-success quantum computing scheme

    International Nuclear Information System (INIS)

    Beige, A; Lim, Y L; Kwek, L C

    2007-01-01

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes

  5. Type monotonic allocation schemes for multi-glove games

    OpenAIRE

    Brânzei, R.; Solymosi, T.; Tijs, S.H.

    2007-01-01

    Multiglove markets and corresponding games are considered.For this class of games we introduce the notion of type monotonic allocation scheme.Allocation rules for multiglove markets based on weight systems are introduced and characterized.These allocation rules generate type monotonic allocation schemes for multiglove games and are also helpful in proving that each core element of the corresponding game is extendable to a type monotonic allocation scheme.The T-value turns out to generate a ty...

  6. Radiative heat transfer

    CERN Document Server

    Modest, Michael F

    2013-01-01

    The third edition of Radiative Heat Transfer describes the basic physics of radiation heat transfer. The book provides models, methodologies, and calculations essential in solving research problems in a variety of industries, including solar and nuclear energy, nanotechnology, biomedical, and environmental. Every chapter of Radiative Heat Transfer offers uncluttered nomenclature, numerous worked examples, and a large number of problems-many based on real world situations-making it ideal for classroom use as well as for self-study. The book's 24 chapters cover the four major areas in the field: surface properties; surface transport; properties of participating media; and transfer through participating media. Within each chapter, all analytical methods are developed in substantial detail, and a number of examples show how the developed relations may be applied to practical problems. It is an extensive solution manual for adopting instructors. Features: most complete text in the field of radiative heat transfer;...

  7. A New Numerical Scheme for Cosmic-Ray Transport

    Science.gov (United States)

    Jiang, Yan-Fei; Oh, S. Peng

    2018-02-01

    Numerical solutions of the cosmic-ray (CR) magnetohydrodynamic equations are dogged by a powerful numerical instability, which arises from the constraint that CRs can only stream down their gradient. The standard cure is to regularize by adding artificial diffusion. Besides introducing ad hoc smoothing, this has a significant negative impact on either computational cost or complexity and parallel scalings. We describe a new numerical algorithm for CR transport, with close parallels to two-moment methods for radiative transfer under the reduced speed of light approximation. It stably and robustly handles CR streaming without any artificial diffusion. It allows for both isotropic and field-aligned CR streaming and diffusion, with arbitrary streaming and diffusion coefficients. CR transport is handled explicitly, while source terms are handled implicitly. The overall time step scales linearly with resolution (even when computing CR diffusion) and has a perfect parallel scaling. It is given by the standard Courant condition with respect to a constant maximum velocity over the entire simulation domain. The computational cost is comparable to that of solving the ideal MHD equation. We demonstrate the accuracy and stability of this new scheme with a wide variety of tests, including anisotropic streaming and diffusion tests, CR-modified shocks, CR-driven blast waves, and CR transport in multiphase media. The new algorithm opens doors to much more ambitious and hitherto intractable calculations of CR physics in galaxies and galaxy clusters. It can also be applied to other physical processes with similar mathematical structure, such as saturated, anisotropic heat conduction.

  8. Scanning schemes in white light Photoelasticity - Part I: Critical assessment of existing schemes

    Science.gov (United States)

    Ramakrishnan, Vivek; Ramesh, K.

    2017-05-01

    The use of white light based Three Fringe Photoelasticity (TFP)/RGB Photoelasticity has gained importance in the recent years. With recent advances in TFP, it is possible to resolve fringe orders upto twelve. The main advantage of this technique is that it requires only a single image for isochromatic demodulation, which makes it suitable especially for problems where recording multiple images is difficult. The accuracy of isochromatic data obtained using TFP/RGB Photoelasticity is dependent on the scanning scheme used to refine the data, which is necessary to incorporate fringe order continuity. In this paper, the existing scanning schemes are critically evaluated for their ability to scan the entire model domain, influence of seed point selection and noise propagation. The scanning schemes are assessed using four problems of increasing level of geometric complexity - Circular disc under compression (simply connected), bi-axially loaded cruciform specimen with an inclined crack, a thick ring subjected to internal pressure and a finite plate with a hole (multiply connected).

  9. SRIM Scheme: An Impression-Management Scheme for Privacy-Aware Photo-Sharing Users

    Directory of Open Access Journals (Sweden)

    Fenghua Li

    2018-02-01

    Full Text Available With the development of online social networks (OSNs and modern smartphones, sharing photos with friends has become one of the most popular social activities. Since people usually prefer to give others a positive impression, impression management during photo sharing is becoming increasingly important. However, most of the existing privacy-aware solutions have two main drawbacks: ① Users must decide manually whether to share each photo with others or not, in order to build the desired impression; and ② users run a high risk of leaking sensitive relational information in group photos during photo sharing, such as their position as part of a couple, or their sexual identity. In this paper, we propose a social relation impression-management (SRIM scheme to protect relational privacy and to automatically recommend an appropriate photo-sharing policy to users. To be more specific, we have designed a lightweight face-distance measurement that calculates the distances between users’ faces within group photos by relying on photo metadata and face-detection results. These distances are then transformed into relations using proxemics. Furthermore, we propose a relation impression evaluation algorithm to evaluate and manage relational impressions. We developed a prototype and employed 21 volunteers to verify the functionalities of the SRIM scheme. The evaluation results show the effectiveness and efficiency of our proposed scheme. Keywords: Impression management, Relational privacy, Photo sharing, Policy recommendation, Proxemics

  10. Computerized calculation scheme for toric intraocular lenses.

    Science.gov (United States)

    Langenbucher, Achim; Seitz, Berthold

    2004-06-01

    While a number of intraocular lens (IOL) power prediction formulae are well established for determination of spherical lenses, no common strategy has been published for the computation of toric IOLs. The purpose of this study is to describe a paraxial computing scheme for tracing an axial pencil of rays through the 'optical system eye' containing astigmatic refractive surfaces with their axes at random. The capabilities of this computing scheme are demonstrated with clinical examples. Based on a schematic model eye with spherocylindric surfaces, we use two alternative notations for description of vergences or prescriptions: (1) standard notation (refraction in both cardinal meridians and axis), and (2) component notation (spherical equivalent and cylindric component in 0 degrees and 45 degrees. Refractive surfaces are added to the vergence in component notation, whereas the transformation of the vergence through media is performed in the standard notation for both cardinal meridians. For calculation of the toric lens implant, a pencil of rays is traced through the spectacle and the cornea to the estimated lens position as well as backwards from the retina to the estimated lens position. For calculation of residual spectacle refraction, a pencil of rays is traced backwards from the retina through the toric lens implant and the cornea to the spectacle plane. In example 1 we calculate a 'thin toric lens' for compensation of a corneal astigmatism to achieve a spherical target refraction. In example 2 we compute a 'thick toric lens', which has to compensate for an oblique corneal astigmatism and rotate the spectacle cylinder to the against the rule position to enhance near vision. In example 3 we estimate the residual refraction at the corneal plane after implantation of a thick toric lens, when the cylinder of the lens implant is compensating the corneal cylinder in part and the axis of implantation is not fully aligned with the axis of the corneal astigmatism. This

  11. Large Cash Transfers to the Elderly in South Africa

    OpenAIRE

    Anne Case; Angus Deaton

    1996-01-01

    We examine the social pension in South Africa, where large cash sumsþabout twice the median per capita income of African householdsþare paid to people qualified by age but irrespective of previous contributions. We present the history of the scheme and use a 1993 nationally representative survey to investigate the redistributive consequences of the transfers, documenting who receives the pensions, their levels of living, and those of their families. We also look at behavioral effects, particu...

  12. Nested Hilbert schemes on surfaces: Virtual fundamental class

    DEFF Research Database (Denmark)

    Gholampour, Amin; Sheshmani, Artan; Yau, Shing-Tung

    We construct natural virtual fundamental classes for nested Hilbert schemes on a nonsingular projective surface S. This allows us to define new invariants of S that recover some of the known important cases such as Poincare invariants of Durr-Kabanov-Okonek and the stable pair invariants of Kool......-Thomas. In the case of the nested Hilbert scheme of points, we can express these invariants in terms of integrals over the products of Hilbert scheme of points on S, and relate them to the vertex operator formulas found by Carlsson-Okounkov. The virtual fundamental classes of the nested Hilbert schemes play a crucial...

  13. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  14. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  15. Additive Difference Schemes for Filtration Problems in Multilayer Systems

    CERN Document Server

    Ayrjan, E A; Pavlush, M; Fedorov, A V

    2000-01-01

    In the present paper difference schemes for solution of the plane filtration problem in multilayer systems are analyzed within the framework of difference schemes general theory. Attention is paid to splitting the schemes on physical processes of filtration along water-carring layers and vertical motion between layers. Some absolutely stable additive difference schemes are obtained the realization of which needs no software modification. Parallel algorithm connected with the solving of the filtration problem in every water-carring layer on a single processor is constructed. Program realization on the multi-processor system SPP2000 at JINR is discussed.

  16. Scheme for achieving coherent perfect absorption by anisotropic metamaterials

    KAUST Repository

    Zhang, Xiujuan

    2017-02-22

    We propose a unified scheme to achieve coherent perfect absorption of electromagnetic waves by anisotropic metamaterials. The scheme describes the condition on perfect absorption and offers an inverse design route based on effective medium theory in conjunction with retrieval method to determine practical metamaterial absorbers. The scheme is scalable to frequencies and applicable to various incident angles. Numerical simulations show that perfect absorption is achieved in the designed absorbers over a wide range of incident angles, verifying the scheme. By integrating these absorbers, we further propose an absorber to absorb energy from two coherent point sources.

  17. Scheme and scale dependences of leading electroweak corrections

    International Nuclear Information System (INIS)

    Kniehl, B.A.; Sirlin, A.

    1996-01-01

    The scheme and scale dependences of leading M t -dependent contributions to Δρ, Δr, and τ, which arise because of the truncation of the perturbative series, are investigated by comparing expressions in the on-shell and MS schemes of renormalization, and studying their scale variations. Starting from the conventional on-shell formulae, we find rather large scheme and scale dependences. We then propose a simple, physically motivated modification of the conventional expressions and show that it leads to a sharp reduction in the scheme and scale dependences. Implications for electroweak physics are discussed. (orig.)

  18. Technology Transfer Issues and a New Technology Transfer Model

    Science.gov (United States)

    Choi, Hee Jun

    2009-01-01

    The following are major issues that should be considered for efficient and effective technology transfer: conceptions of technology, technological activity and transfer, communication channels, factors affecting transfer, and models of transfer. In particular, a well-developed model of technology transfer could be used as a framework for…

  19. Photoinduced Electron Transfer in the C2H4--Br2 Complex

    Science.gov (United States)

    Kalume, Aimable; George, Lisa; Reid, Scott A.

    2011-06-01

    We have used a new dual-nozzle late-mixing scheme for the trapping and interrogation of pre-reactive donor-acceptor complexes to examine photoinduced electron transfer in the prototypical Mulliken donor-acceptor (halogen bonded) π-complex, C2H4--Br2. The charge transfer transition of this band was measured for the first time, and the position and intensity of this band is in excellent agreement with theoretical expectations. Excitation into the intense charge transfer band of the complex leads exclusively to the anti-conformer of the single reaction product, 1,2-dibromoethane, in agreement with the Mulliken theory of electron transfer.

  20. An Evaluation of the Tax-Transfer Treatment of Married Couples in European Countries

    DEFF Research Database (Denmark)

    Immervoll, Herwig; Kleven, Henrik Jacobsen; Kreiner, Claus Thustrup

    This paper presents an evaluation of the tax-transfer treatment of married couples in 15 EU countries using the EUROMOD microsimulation model. First, we show that many tax-transfer schemes in Europe feature negative jointness defined as a situation where the tax rate on one person depends...... countries. Finally, we consider the tax-transfer implications of marriage and estimate the so-called marriage penalty. For most countries, we find large marriage penalties at the bottom of the distribution driven primarily by features of the transfer system....

  1. An Evaluation of the Tax-Transfer Treatment of Married Couples in European Countries

    DEFF Research Database (Denmark)

    Immervoll, Herwig; Kleven, Henrik Jacobsen; Kreiner, Claus Thustrup

    2009-01-01

    This paper presents an evaluation of the tax-transfer treatment of married couples in 15 EU countries using the EUROMOD microsimulation model. First, we show that many tax-transfer schemes in Europe feature negative jointness defined as a situation where the tax rate on one person depends...... countries. Finally, we consider the tax-transfer implications of marriage and estimate the so-called marriage penalty. For most countries, we find large marriage penalties at the bottom of the distribution driven primarily by features of the transfer system....

  2. Error Consistency Analysis Scheme for Infrared Ultraspectral Sounding Retrieval Error Budget Estimation

    Science.gov (United States)

    Zhou, Daniel K.; Larar, Allen M.; Liu, Xu; Smith, William L.; Strow, Larry, L.

    2013-01-01

    Great effort has been devoted towards validating geophysical parameters retrieved from ultraspectral infrared radiances obtained from satellite remote sensors. An error consistency analysis scheme (ECAS), utilizing fast radiative transfer model (RTM) forward and inverse calculations, has been developed to estimate the error budget in terms of mean difference and standard deviation of error in both spectral radiance and retrieval domains. The retrieval error is assessed through ECAS without relying on other independent measurements such as radiosonde data. ECAS establishes a link between the accuracies of radiances and retrieved geophysical parameters. ECAS can be applied to measurements from any ultraspectral instrument and any retrieval scheme with its associated RTM. In this manuscript, ECAS is described and demonstrated with measurements from the MetOp-A satellite Infrared Atmospheric Sounding Interferometer (IASI). This scheme can be used together with other validation methodologies to give a more definitive characterization of the error and/or uncertainty of geophysical parameters retrieved from ultraspectral radiances observed from current and future satellite remote sensors such as IASI, the Atmospheric Infrared Sounder (AIRS), and the Cross-track Infrared Sounder (CrIS).

  3. Parallel implementation of WRF double moment 5-class cloud microphysics scheme on multiple GPUs

    Science.gov (United States)

    Huang, Melin; Huang, Bormin; Huang, Allen H.-L.

    2015-05-01

    The Weather Research and Forecast (WRF) Double Moment 5-class (WDM5) mixed ice microphysics scheme predicts the mixing ratio of hydrometeors and their number concentrations for warm rain species including clouds and rain. WDM5 can be computed in parallel in the horizontal domain using multi-core GPUs. In order to obtain a better GPU performance, we manually rewrite the original WDM5 Fortran module into a highly parallel CUDA C program. We explore the usage of coalesced memory access and asynchronous data transfer. Our GPU-based WDM5 module is scalable to run on multiple GPUs. By employing one NVIDIA Tesla K40 GPU, our GPU optimization effort on this scheme achieves a speedup of 252x with respect to its CPU counterpart Fortran code running on one CPU core of Intel Xeon E5-2603, whereas the speedup for one CPU socket (4 cores) with respect to one CPU core is only 4.2x. We can even boost the speedup of this scheme to 468x with respect to one CPU core when two NVIDIA Tesla K40 GPUs are applied.

  4. An evaluation of a working memory training scheme in older adults

    Directory of Open Access Journals (Sweden)

    Laura Patricia McAvinue

    2013-05-01

    Full Text Available Working memory is a cognitive process that is particularly vulnerable to decline with age. The current study sought to evaluate the efficacy of a working memory training scheme in improving memory in a group of older adults. A 5-week online training scheme was designed to provide training in the main components of Baddeley’s (2000 working memory model, namely auditory and visuospatial short-term and working memory. A group of older adults aged between 64 and 79 were randomly assigned to a trainee (n = 19 or control (n = 17 group, with trainees engaging in the adaptive training scheme and controls engaging in a non-adaptive version of the programme. Before and after training and at 3- and 6-month follow-up sessions, trainees and controls were asked to complete measures of short-term and working memory, long-term episodic memory, subjective ratings of memory and attention and achievement of goals set at the beginning of training. The results provided evidence of an expansion of auditory short-term memory span, which was maintained 6 months later, and transfer to long-term episodic memory but no evidence of improvement in working memory capacity per se. A serendipitous and intriguing finding of a relationship between time spent training, psychological stress and training gains provided further insight into individual differences in training gains in older adults.

  5. An Efficient Explicit Finite-Difference Scheme for Simulating Coupled Biomass Growth on Nutritive Substrates

    Directory of Open Access Journals (Sweden)

    G. F. Sun

    2015-01-01

    Full Text Available A novel explicit finite-difference (FD method is presented to simulate the positive and bounded development process of a microbial colony subjected to a substrate of nutrients, which is governed by a nonlinear parabolic partial differential equations (PDE system. Our explicit FD scheme is uniquely designed in such a way that it transfers the nonlinear terms in the original PDE into discrete sets of linear ones in the algebraic equation system that can be solved very efficiently, while ensuring the stability and the boundedness of the solution. This is achieved through (1 a proper design of intertwined FD approximations for the diffusion function term in both time and spatial variations and (2 the control of the time-step through establishing theoretical stability criteria. A detailed theoretical stability analysis is conducted to reveal that our FD method is indeed stable. Our examples verified the fact that the numerical solution can be ensured nonnegative and bounded to simulate the actual physics. Numerical examples have also been presented to demonstrate the efficiency of the proposed scheme. The present scheme is applicable for solving similar systems of PDEs in the investigation of the dynamics of biological films.

  6. Date attachable offline electronic cash scheme.

    Science.gov (United States)

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  7. Radiation Protection Officer certification scheme. Malaysian experience

    International Nuclear Information System (INIS)

    Pungut, Noraishah; Razali, Noraini; Mod Ali, Noriah

    2011-01-01

    In Malaysia, the need for maintaining competency in radiation protection is emerging, focusing on the qualification of Radiation Protection Officers (RPO). Regulation 23 of Malaysian Radiation Protection (Basic Safety Standards) Regulations 1988, requires the applicant to employ an RPO, with the necessary knowledge, skill and training, enabling effective protection of individuals and minimizing danger to life, property and the environment for all activities sought to be licensed. An RPO must demonstrate the knowledge required, by attending RPO courses organised by an accredited agency and pass the RPO certification examination. Maintaining a high level of competency is crucial for future development of safe applications of ionising radiation. The major goal of training is to provide essential knowledge and skills and to foster correct attitudes on radiation protection and safe use of radiation sources. Assessment of the competency is through theoretical and practical examination. A standard criterion on the performance of the individuals evaluated has been established and only those who meet this criterion can be accepted as certified RPO. The National Committee for the Certification of Radiation Protection Officer (NCCRPO), comprising experts in various fields, is responsible to review and update requirements on competency of a certified RPO. With increasing number of candidates (i.e. 701 in 2008) and the international requirement for radioactive source security, it is incumbent upon the NCCRPO to improve the syllabus of the certification scheme. The introduction of a Radiation Protection Advisor (RPA) to provide service and advice to the radiation industry in Malaysia is also seriously considered. (author)

  8. Combination of scoring schemes for protein docking

    Directory of Open Access Journals (Sweden)

    Schomburg Dietmar

    2007-08-01

    Full Text Available Abstract Background Docking algorithms are developed to predict in which orientation two proteins are likely to bind under natural conditions. The currently used methods usually consist of a sampling step followed by a scoring step. We developed a weighted geometric correlation based on optimised atom specific weighting factors and combined them with our previously published amino acid specific scoring and with a comprehensive SVM-based scoring function. Results The scoring with the atom specific weighting factors yields better results than the amino acid specific scoring. In combination with SVM-based scoring functions the percentage of complexes for which a near native structure can be predicted within the top 100 ranks increased from 14% with the geometric scoring to 54% with the combination of all scoring functions. Especially for the enzyme-inhibitor complexes the results of the ranking are excellent. For half of these complexes a near-native structure can be predicted within the first 10 proposed structures and for more than 86% of all enzyme-inhibitor complexes within the first 50 predicted structures. Conclusion We were able to develop a combination of different scoring schemes which considers a series of previously described and some new scoring criteria yielding a remarkable improvement of prediction quality.

  9. Innovative ICF scheme-impact fast ignition

    International Nuclear Information System (INIS)

    Murakami, M.; Nagatomo, H.; Sakaiya, T.; Karasik, M.; Gardner, J.; Bates, J.

    2007-01-01

    A totally new ignition scheme for ICF, impact fast ignition (IFI), is proposed [1], in which the compressed DT main fuel is to be ignited by impact collision of another fraction of separately imploded DT fuel, which is accelerated in the hollow conical target. Two-dimensional hydrodynamic simulation results in full geometry are presented, in which some key physical parameters for the impact shell dynamics such as 10 8 cm/s of the implosion velocity, 200- 300 g/cm 3 of the compressed density, and the converted temperature beyond 5 keV are demonstrated. As the first step toward the proof-of-principle of IFI, we have conducted preliminary experiments under the operation of GEKKO XII/HYPER laser system to achieve a hyper-velocity of the order of 108 cm/s. As a result we have observed a highest velocity, 6.5 x 10 7 cm/s, ever achieved. Furthermore, we have also done the first integrated experiments using the target and observed substantial amount of neutron yields. Reference: [1] M. Murakami and Nagatomo, Nucl. Instrum. Meth. Phys. Res. A 544(2005) 67

  10. Adaptive Scheme for the CLIC Orbit Feedback

    CERN Document Server

    Pfingstner, J; Hofbaur, M

    2010-01-01

    One of the major challenges of the CLIC main linac is the preservation of the ultra-low beam emittance. The dynamic effect of ground motion would lead to a rapid emittance increase. have to be counteracted by using orbit feedback (FB) systems. Orbit feedback systems (FB) have to be optimized to optimally attenuate ground motion (disturbance), in spite of drifts of accelerator parameters (imperfect system knowledge). This paper presents a new FB strategy for the main linac of CLIC. It addresses the above mentioned issues, with the help of an adaptive control scheme. The rst part of this system is a system identication unit. It delivers an estimate of the time-varying system behavior. The second part is a control algorithm, which uses the most recent system estimate of the identication unit. It uses H2 control theory to deliver an optimal prediction of the ground motion. This approach takes into account the frequency and spacial properties of the ground motion, as well as their impact on the emittance growth.

  11. Date Attachable Offline Electronic Cash Scheme

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2014-01-01

    Full Text Available Electronic cash (e-cash is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  12. Password Authentication Scheme with Secured Login Interface

    Directory of Open Access Journals (Sweden)

    AKINWALE A. Taofiki

    2009-12-01

    Full Text Available This paper presents a novel solution to the age long problem of password security at input level. In our solution, each of the various characters from which a password could be composed is encoded with a random single digit integer and presented to the user via an input interface form. A legitimate user entering his password only needs to carefully study the sequence of code that describe his password, and then enter these code in place of his actual password characters. This approach does not require the input code to be hidden from anyone or converted to placeholder characters for security reasons. Our solution engine regenerates new code for each character each time the carriage return key is struck, producing a hardened password that is convincingly more secure than conventional password entry system against both online and offline attackers. Using empirical data and a prototype implementation of our scheme, we give evidence that our approach is viable in practice, in terms of ease of use, improved security, and performance.

  13. Appraisal of bio-hydrogen production schemes

    International Nuclear Information System (INIS)

    Bent Sorensen

    2006-01-01

    Work is ongoing on several schemes of biological hydrogen production. At one end is the genetic modification of biological systems (such as algae or cyanobacteria) to produce hydrogen from photosynthesis, instead of the energy-rich compounds (such as NADPH 2 ) normally constituting the endpoint of the transformations through the photo-systems. A second route is to collect and use the biomass produced by normal plant growth processes in a separate step that produces hydrogen. This may be done similar to biogas production by fermentation, where the endpoint is methane (plus CO 2 and minor constituents). Hydrogen could be the outcome of a secondary process starting from methane, involving any of the conventional methods of hydrogen production from natural gas. An alternative to fermentation is gasification of the biomass, followed by a shift-reaction leading to hydrogen. I compare advantages and disadvantages of these three routes, notably factors such as system efficiency, cost and environmental impacts, and also compare them to liquid biofuels. (author)

  14. The impulsive effects of momentum transfer on the dynamics of a novel ocean wave energy converter

    Science.gov (United States)

    Diamond, Christopher A.; O'Reilly, Oliver M.; Savaş, Ömer

    2013-10-01

    In a recent paper by Orazov et al. [On the dynamics of a novel ocean wave energy converter. Journal of Sound and Vibration329 (24) (2010) 5058-5069], a wave energy converter (WEC) was proposed. The converter features a mass modulation scheme and a simple model was used to examine its efficacy. The simple model did not adequately account for the momentum transfer which takes place during the mass modulation. The purpose of the present paper is to account for this transfer and to show that the WEC equipped with a novel and more general mass modulation scheme has the potential to improve its energy harvesting capabilities.

  15. Aspects of a new world development strategy. I. Financial transfers from developed to developing nations

    Energy Technology Data Exchange (ETDEWEB)

    Munduch, G. (Inst. for Advanced Studies, Vienna, Austria); Weinberg, C.B.

    1979-09-01

    A global econometric model is used in this study to evaluate the effect of a grant-in-aid transfer from the developed market economies to the non-oil-exporting developing economies. Two alternative financing schemes, expenditure diversion and direct taxation, are supposed in the paying countries so that the government current amount balance is not disturbed. The results suggest that the developing countries would benefit greatly from the implementation of any transfer scheme. The developed countries, under either of the assumptions of this study, would not realize any substantial benefits from offering such a payment.

  16. Performance investigation of advanced adsorption desalination cycle with condenser-evaporator heat recovery scheme

    KAUST Repository

    Thu, Kyaw

    2013-01-01

    Energy or heat recovery schemes are keys for the performance improvement of any heat-activated cycles such as the absorption and adsorption cycles. We present two innovative heat recovery schemes between the condensing and evaporating units of an adsorption desalination (AD) cycle. By recovering the latent heat of condenser and dumping it into the evaporative process of the evaporator, it elevates the evaporating temperature and hence the adsorption pressure seen by the adsorbent. From isotherms, this has an effect of increasing the vapour uptake. In the proposed configurations, one approach is simply to have a run-about water circuit between the condenser and the evaporator and a pump is used to achieve the water circulation. This run-around circuit is a practical method for retrofitting purposes. The second method is targeted towards a new AD cycle where an encapsulated condenser-evaporator unit is employed. The heat transfer between the condensing and evaporative vapour is almost immediate and the processes occur in a fully integrated vessel, thereby minimizing the heat transfer resistances of heat exchangers. © 2013 Desalination Publications.

  17. Technology transfer 1994

    Energy Technology Data Exchange (ETDEWEB)

    1994-01-01

    This document, Technology Transfer 94, is intended to communicate that there are many opportunities available to US industry and academic institutions to work with DOE and its laboratories and facilities in the vital activity of improving technology transfer to meet national needs. It has seven major sections: Introduction, Technology Transfer Activities, Access to Laboratories and Facilities, Laboratories and Facilities, DOE Office, Technologies, and an Index. Technology Transfer Activities highlights DOE`s recent developments in technology transfer and describes plans for the future. Access to Laboratories and Facilities describes the many avenues for cooperative interaction between DOE laboratories or facilities and industry, academia, and other government agencies. Laboratories and Facilities profiles the DOE laboratories and facilities involved in technology transfer and presents information on their missions, programs, expertise, facilities, and equipment, along with data on whom to contact for additional information on technology transfer. DOE Offices summarizes the major research and development programs within DOE. It also contains information on how to access DOE scientific and technical information. Technologies provides descriptions of some of the new technologies developed at DOE laboratories and facilities.

  18. Large momentum transfer phenomena

    International Nuclear Information System (INIS)

    Imachi, Masahiro; Otsuki, Shoichiro; Matsuoka, Takeo; Sawada, Shoji.

    1978-01-01

    The large momentum transfer phenomena in hadron reaction drastically differ from small momentum transfer phenomena, and are described in this paper. Brief review on the features of the large transverse momentum transfer reactions is described in relation with two-body reactions, single particle productions, particle ratios, two jet structure, two particle correlations, jet production cross section, and the component of momentum perpendicular to the plane defined by the incident protons and the triggered pions and transverse momentum relative to jet axis. In case of two-body process, the exponent N of the power law of the differential cross section is a value between 10 to 11.5 in the large momentum transfer region. The breaks of the exponential behaviors into the power ones are observed at the large momentum transfer region. The break would enable to estimate the order of a critical length. The large momentum transfer phenomena strongly suggest an important role of constituents of hadrons in the hard region. Hard rearrangement of constituents from different initial hadrons induces large momentum transfer reactions. Several rules to count constituents in the hard region have been proposed so far to explain the power behavior. Scale invariant quark interaction and hard reactions are explained, and a summary of the possible types of hard subprocess is presented. (Kato, T.)

  19. Design and comparison of gene-pyramiding schemes in animals.

    Science.gov (United States)

    Zhao, F P; Jiang, L; Gao, H J; Ding, X D; Zhang, Q

    2009-08-01

    Marker-assisted gene pyramiding provides a promising way to develop new animal breeds or lines, in which genes responsible for certain favorable characters identified in different breeds or lines are incorporated. In consideration of features of animal populations, we proposed five schemes for pyramiding three genes, denoted Scheme A-E, and five schemes for pyramiding four genes, denoted Scheme F-J. These schemes are representative of the possible alternatives. We also provided an algorithm to compute the population sizes needed in each generation. We compared these schemes with respect to the total population size and the number of generations required under different situations. The results show that there is no scheme that is optimal in all cases. Among the schemes for pyramiding three genes from three lines (L1, L2 and L3), Scheme D (a three-way cross between the three lines are first performed, followed by a backcross to L1 and a subsequent intercross to obtain the desired genotype) has a significant advantage over the other schemes when the recombination rate between adjacent genes ranges from 0.1 to 0.4, while Scheme A (a two-way cross between L1 and L2 and a subsequent intercross are performed, followed by a cross with L3 and a subsequent intercross to obtain the desired genotype) is optimal when recombination rate is 0.5. Among schemes for pyramiding four genes from four lines (L1, L2, L3 and L4), Scheme I (seperately, a two-way cross between L1 and L2 (L3 and L4) followed by a backcross to L1 (L3) and a subsequent intercross are performed, then the offspring from the two sides are crossed and followed by a backcross to L1 and a subsequent intercross to obtain the desired genotype) is optimal when the recombination rate ranges from 0.1 to 0.4, while Scheme F (cross and subsequent intercross between the four lines are performed successively) is the optimal when the recombination rate is 0.5. We also disscuss how the animals' reproductive capacity, the

  20. Dynamic downscaling over western Himalayas: Impact of cloud microphysics schemes

    Science.gov (United States)

    Tiwari, Sarita; Kar, Sarat C.; Bhatla, R.

    2018-03-01

    Due to lack of observation data in the region of inhomogeneous terrain of the Himalayas, detailed climate of Himalayas is still unknown. Global reanalysis data are too coarse to represent the hydroclimate over the region with sharp orography gradient in the western Himalayas. In the present study, dynamic downscaling of the European Centre for Medium-Range Weather Forecast (ECMWF) Reanalysis-Interim (ERA-I) dataset over the western Himalayas using high-resolution Weather Research and Forecast (WRF) model has been carried out. Sensitivity studies have also been carried out using convection and microphysics parameterization schemes. The WRF model simulations have been compared against ERA-I and available station observations. Analysis of the results suggests that the WRF model has simulated the hydroclimate of the region well. It is found that in the simulations that the impact of convection scheme is more during summer months than in winter. Examination of simulated results using various microphysics schemes reveal that the WRF single-moment class-6 (WSM6) scheme simulates more precipitation on the upwind region of the high mountain than that in the Morrison and Thompson schemes during the winter period. Vertical distribution of various hydrometeors shows that there are large differences in mixing ratios of ice, snow and graupel in the simulations with different microphysics schemes. The ice mixing ratio in Morrison scheme is more than WSM6 above 400 hPa. The Thompson scheme favors formation of more snow than WSM6 or Morrison schemes while the Morrison scheme has more graupel formation than other schemes.