WorldWideScience

Sample records for early separation scheme

  1. An early separation scheme for the LHC luminosity upgrade

    CERN Document Server

    Sterbini, G

    2010-01-01

    The present document is organized in five chapters. In the first chapter the framework of the study is described, developing the motivations, the goals and the requirements for the LHC Luminosity Upgrade. We analyze the need for the crossing angle and its impact on the peak luminosity of the collider. After having introduced the Early Separation Scheme, we explain how it may overcome some limitations of the present machine. We compare the nominal LHC crossing scheme with the proposed one underlining its potential in terms of performance and its issues with respect to the integration in the detectors. An analysis of the integrated magnetic field required is given. In the second chapter we introduce one of the most powerful aspect of the scheme: the luminosity leveling. After the description of the physical model adopted, we compare the results of its analytical and numerical solutions. All the potential improvement due to the Early Separation Scheme are shown on the luminosity plane (peak luminosity versus int...

  2. First Investigations on the Energy Deposited in a D0 early separation scheme Dipole for the LHC upgrade

    CERN Document Server

    Hoa, C

    2007-01-01

    This note gives the first results of energy deposition calculation on a simplified model for an early scheme separation dipole D0, located at 3.5 m from the IP. The Monte Carlo code FLUKA version 2006.3 has been used for modelling the multi-particle interactions and energy transport. After a short introduction to particle interaction with matter and power deposition processes, the FLUKA modelling is described with bench marked power deposition calculation on the TAS, the absorber located in front of the triplet quadrupoles. The power deposition results for the D0 early scheme are then discussed in details, with the averaged and peak power density, and the variations of the total heat load in the dipole with the longitudinal position and with the aperture diameter.

  3. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  4. Fragment separator momentum compression schemes.

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, L.; Erdelyi, B.; Hausmann, M.; Kubo, T.; Nolen, J.; Portillo, M.; Sherrill, B.M. (Physics); (MSU); (Northern Illinois Univ.); (RIKEN)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  5. 33 CFR 83.10 - Traffic separation schemes (Rule 10).

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 1 2010-07-01 2010-07-01 false Traffic separation schemes (Rule... Visibility § 83.10 Traffic separation schemes (Rule 10). (a) Obligations under other Rules unaffected. This Rule applies to traffic separation schemes and does not relieve any vessel of her obligation under any...

  6. Determination of Optimal Energy Efficient Separation Schemes based on Driving Forces

    DEFF Research Database (Denmark)

    Bek-Pedersen, Erik; Gani, Rafiqul; Levaux, O.

    2000-01-01

    A new integrated approach for synthesis, design and operation of separation schemes is presented. This integrated approach is based on driving forces that promote the desired separation for different separation techniques. A set of algorithms needed by the integrated approach for sequencing...... and design of distillation columns and for generating hybrid separation schemes are presented. The main feature of these algorithms is that they provide a 'visual' solution that also appears to be near optimal in terms of energy consumption. Several illustrative examples highlighting the application...

  7. Novel measurement scheme of peak separation of side-hole fiber grating

    Institute of Scientific and Technical Information of China (English)

    LI Zhi-zhong; SUN Chong-feng; CAO Chun-yan; YANG Hua-yong; HU Yong-ming

    2006-01-01

    There are two peaks of different polarizations in the reflection spectrum of the side-hole fiber grating and their separation interval has a linear variation along with the pressure changing while it is insensitive to the temperature.We have proposed a novel measurement scheme based on polarization detection.The detection of peak separation is achieved by measuring the two peaks' center wavelengths separately with all polarization maintaining fiber system.The side-hole fiber grating pressure sensing within the range of 0~3.5 MPa is realized successfully with the new scheme.

  8. Precipitation phase separation schemes in the Naqu River basin, eastern Tibetan plateau

    Science.gov (United States)

    Liu, Shaohua; Yan, Denghua; Qin, Tianling; Weng, Baisha; Lu, Yajing; Dong, Guoqiang; Gong, Boya

    2016-11-01

    Precipitation phase has a profound influence on the hydrological processes in the Naqu River basin, eastern Tibetan plateau. However, there are only six meteorological stations with precipitation phase (rainfall/snowfall/sleet) before 1979 within and around the basin. In order to separate snowfall from precipitation, a new separation scheme with S-shaped curve of snowfall proportion as an exponential function of daily mean temperature was developed. The determinations of critical temperatures in the single/two temperature threshold (STT/TTT2) methods were explored accordingly, and the temperature corresponding to the 50 % snowfall proportion (SP50 temperature) is an efficiently critical temperature for the STT, and two critical temperatures in TTT2 can be determined based on the exponential function and SP50 temperature. Then, different separation schemes were evaluated in separating snowfall from precipitation in the Naqu River basin. The results show that the S-shaped curve methods outperform other separation schemes. Although the STT and TTT2 slightly underestimate and overestimate the snowfall when the temperature is higher and colder than SP50 temperature respectively, the monthly and annual separation snowfalls are generally consistent with the observed snowfalls. On the whole, S-shaped curve methods, STT, and TTT2 perform well in separating snowfall from precipitation with the Pearson correlation coefficient of annual separation snowfall above 0.8 and provide possible approaches to separate the snowfall from precipitation for hydrological modelling.

  9. Evolutionary Ship Track Planning within Traffic Separation Schemes – Evaluation of Individuals

    Directory of Open Access Journals (Sweden)

    Rafal Szlapczynski

    2013-06-01

    Full Text Available The paper presents an extended version of the author’s Evolutionary Sets of Safe Ship Trajectories method. The method plans safe tracks of all ships involved in an encounter including speed reduction maneuvers, if necessary, and taking into account Rule 10 of COLREGS, which specifies ships’ behavior within Traffic Separation Schemes governed by IMO. The paper focuses on the evaluation phase of the evolutionary process and shows how fitness function is designed to compare various possible tracks as well as to assess the quality of a final solution. The impact of the fitness function on the method’s results is illustrated by examples.

  10. Optimization of separation and detection schemes for DNA with pulsed field slab gel and capillary electrophoresis

    Energy Technology Data Exchange (ETDEWEB)

    McGregor, David A. [Iowa State Univ., Ames, IA (United States)

    1993-07-01

    The purpose of the Human Genome Project is outlined followed by a discussion of electrophoresis in slab gels and capillaries and its application to deoxyribonucleic acid (DNA). Techniques used to modify electroosmotic flow in capillaries are addressed. Several separation and detection schemes for DNA via gel and capillary electrophoresis are described. Emphasis is placed on the elucidation of DNA fragment size in real time and shortening separation times to approximate real time monitoring. The migration of DNA fragment bands through a slab gel can be monitored by UV absorption at 254 nm and imaged by a charge coupled device (CCD) camera. Background correction and immediate viewing of band positions to interactively change the field program in pulsed-field gel electrophoresis are possible throughout the separation. The use of absorption removes the need for staining or radioisotope labeling thereby simplifying sample preparation and reducing hazardous waste generation. This leaves the DNA in its native state and further analysis can be performed without de-staining. The optimization of several parameters considerably reduces total analysis time. DNA from 2 kb to 850 kb can be separated in 3 hours on a 7 cm gel with interactive control of the pulse time, which is 10 times faster than the use of a constant field program. The separation of ΦX174RF DNA-HaeIII fragments is studied in a 0.5% methyl cellulose polymer solution as a function of temperature and applied voltage. The migration times decreased with both increasing temperature and increasing field strength, as expected. The relative migration rates of the fragments do not change with temperature but are affected by the applied field. Conditions were established for the separation of the 271/281 bp fragments, even without the addition of intercalating agents. At 700 V/cm and 20°C, all fragments are separated in less than 4 minutes with an average plate number of 2.5 million per meter.

  11. Efficient Z-scheme charge separation in novel vertically aligned ZnO/CdSSe nanotrees

    Science.gov (United States)

    Li, Zhengxin; Nieto-Pescador, Jesus; Carson, Alexander J.; Blake, Jolie C.; Gundlach, Lars

    2016-04-01

    A new tree-like ZnO/CdSSe nanocomposite with CdSSe branches grown on ZnO nanowires prepared via a two-step chemical vapor deposition is presented. The nanotrees (NTs) are vertically aligned on a substrate. The CdSSe branches result in strong visible light absorption and form a type-II heterojunction with the ZnO stem that facilitates efficient electron transfer. A combination of photoluminescence spectroscopy and lifetime measurements indicates that the NTs are promising materials for applications that benefit from a Z-scheme charge transfer mechanism. Vertically aligned branched ZnO nanowires can provide direct electron transport pathways to substrates and allow for efficient charge separation. These advantages of nanoscale hierarchical heterostructures make ZnO/CdSSe NTs a promising semiconductor material for solar cells, and other opto-electronic devices.

  12. Impact of Feedback Channel Delay over Joint User Scheduling Scheme and Separated Random User Scheduling Scheme in LTE-A System with Carrier Aggregation

    Directory of Open Access Journals (Sweden)

    Ahmed A. Ali

    2014-01-01

    Full Text Available In Long Term Evolution-Advanced (LTE-A, the signal quality in a wireless channel is estimated based on the channel quality measurements. The measurement results are used to select suitable modulation and coding scheme for each transmission, feedback, and processing delay, which can cause a mismatch between channel quality information (CQI and current channel state at the base station. However, prospect delays in the reception of such CQI may lead to a system performance degradation. This study analyzes the impact of CQI feedback delay on joint user scheduling (JUS scheme and separated random user scheduling (SRUS scheme in LTE-A system over carrier aggregation. The analysis will be compared with the system having delayed channel and perfect knowledge at different deployment scenario. We will study the throughput performance of both scheduling schemes with different deployment scenario, and then recommend the suitable deployment scenario to keep the desired QoS for a specific number of users. Results show that, in main beam directed at sector boundaries and diverse coverage, JUS scheme performs better than SRUS, which can justify the intensive use of user equipment power and extra control signaling overhead.

  13. RETRENCHMENT STRATEGY IN HUMAN RESOURCE MANAGEMENT: THE CASE OF VOLUNTARY SEPARATION SCHEME (VSS

    Directory of Open Access Journals (Sweden)

    T. Ramayah

    2004-01-01

    Full Text Available One of the major challenges of business leadership in this millennium is to manage continued improvement in a competitive position. In order to stay competitive, companies are trying to become more "mean and lean". To achieve this, many major corporations have adopted the "downsizing and rightsizing" strategy. Voluntary Separation Scheme (VSS has been a global phenomenon since the 1980's and is common particularly in larger companies. In this study, the reaction to the VSS program involving the employees of a government agency embracing privatisation was studied, specifically the influence of the basic needs and referent power on the choice of acceptance and non-acceptance of VSS. The second objective of this study was to evaluate the success or failure of the VSS from the workers perspective in particular, whether their decision met their needs. The results showed that basic needs had an influence on the acceptance and the non-acceptance of VSS, namely health needs, security needs and self-esteem needs. All the referent powers (subjective norms had an influence, but surprisingly close friends had the strongest influence. Differences were also found between the expectations and the perception of the workers who accepted or rejected the VSS. From the workers' perspective, it appeared that the VSS carried out in this organization was not a success.

  14. Speeding up Monte Carlo molecular simulation by a non-conservative early rejection scheme

    KAUST Repository

    Kadoura, Ahmad Salim

    2015-04-23

    Monte Carlo (MC) molecular simulation describes fluid systems with rich information, and it is capable of predicting many fluid properties of engineering interest. In general, it is more accurate and representative than equations of state. On the other hand, it requires much more computational effort and simulation time. For that purpose, several techniques have been developed in order to speed up MC molecular simulations while preserving their precision. In particular, early rejection schemes are capable of reducing computational cost by reaching the rejection decision for the undesired MC trials at an earlier stage in comparison to the conventional scheme. In a recent work, we have introduced a ‘conservative’ early rejection scheme as a method to accelerate MC simulations while producing exactly the same results as the conventional algorithm. In this paper, we introduce a ‘non-conservative’ early rejection scheme, which is much faster than the conservative scheme, yet it preserves the precision of the method. The proposed scheme is tested for systems of structureless Lennard-Jones particles in both canonical and NVT-Gibbs ensembles. Numerical experiments were conducted at several thermodynamic conditions for different number of particles. Results show that at certain thermodynamic conditions, the non-conservative method is capable of doubling the speed of the MC molecular simulations in both canonical and NVT-Gibbs ensembles. © 2015 Taylor & Francis

  15. Maternal separation with early weaning: a novel mouse model of early life neglect

    Directory of Open Access Journals (Sweden)

    Elwafi Hani M

    2010-09-01

    Full Text Available Abstract Background Childhood adversity is associated with increased risk for mood, anxiety, impulse control, and substance disorders. Although genetic and environmental factors contribute to the development of such disorders, the neurobiological mechanisms involved are poorly understood. A reliable mouse model of early life adversity leading to lasting behavioral changes would facilitate progress in elucidating the molecular mechanisms underlying these adverse effects. Maternal separation is a commonly used model of early life neglect, but has led to inconsistent results in the mouse. Results In an effort to develop a mouse model of early life neglect with long-lasting behavioral effects in C57BL/6 mice, we designed a new maternal separation paradigm that we call Maternal Separation with Early Weaning (MSEW. We tested the effects of MSEW on C57BL/6 mice as well as the genetically distinct DBA/2 strain and found significant MSEW effects on several behavioral tasks (i.e., the open field, elevated plus maze, and forced swim test when assessed more than two months following the MSEW procedure. Our findings are consistent with MSEW causing effects within multiple behavioral domains in both strains, and suggest increased anxiety, hyperactivity, and behavioral despair in the MSEW offspring. Analysis of pup weights and metabolic parameters showed no evidence for malnutrition in the MSEW pups. Additionally, strain differences in many of the behavioral tests suggest a role for genetic factors in the response to early life neglect. Conclusions These results suggest that MSEW may serve as a useful model to examine the complex behavioral abnormalities often apparent in individuals with histories of early life neglect, and may lead to greater understanding of these later life outcomes and offer insight into novel therapeutic strategies.

  16. A smartcard conditional access interface scheme for conditional access subsystem separation in digital TV broadcasting

    Institute of Scientific and Technical Information of China (English)

    XIE Qiang; ZHENG Shi-bao; YU Xiao-jing

    2006-01-01

    Conditional access system (CAS) is a key technical component in digital TV broadcasting through which TV operators manage the appropriate rights of different subscribers in order to protect their commercial benefits. The normal digital TV receiver can only receive and decode the pay TV programs scrambled by one specific CAS. In this paper, the authors proposed a smartcard conditional access interface (SCAI) scheme in order to make the digital TV receiver be a common receiving platform independent of any specific CAS employed at the broadcasting head-end. As a result, it only needs to include a common conditional access software package (CCAP) without any requirement of hardware modification in the receiver. Comparison between the two mentioned DVB-CI-based schemes showed that the cost of such kind receiver is greatly reduced. The main design points of the proposed scheme and its reference implementation's architecture are presented in this paper. This scheme is also one of the candidate national standards for Chinese digital TV broadcasting industry.

  17. Enhanced sub-micron colloidal particle separation with interdigitated microelectrode arrays using mixed AC/DC dielectrophoretic scheme.

    Science.gov (United States)

    Swaminathan, Vikhram V; Shannon, Mark A; Bashir, Rashid

    2015-04-01

    Dielectrophoretic separation of particles finds a variety of applications in the capture of species such as cells, viruses, proteins, DNA from biological systems, as well as other organic and inorganic contaminants from water. The ability to capture particles is constrained by poor volumetric scaling of separation force with respect to particle diameter, as well as the weak penetration of electric fields in the media. In order to improve the separation of sub-micron colloids, we present a scheme based on multiple interdigitated electrode arrays under mixed AC/DC bias. The use of high frequency longitudinal AC bias breaks the shielding effects through electroosmotic micromixing to enhance electric fields through the electrolyte, while a transverse DC bias between the electrode arrays enables penetration of the separation force to capture particles from the bulk of the microchannel. We determine the favorable biasing conditions for field enhancement with the help of analytical models, and experimentally demonstrate the improved capture from sub-micron colloidal suspensions with the mixed AC/DC electrostatic excitation scheme over conventional AC-DEP methods.

  18. To Separate or Not to Separate? Parental Decision-Making regarding the Separation of Twins in the Early Years of Schooling

    Science.gov (United States)

    Staton, Sally; Thorpe, Karen; Thompson, Catherine; Danby, Susan

    2012-01-01

    In recent times concerns about possible adverse effects of early separation and advocacy for individual rights have resulted in a movement away from organizational level policies about the separation of twin children as they enter school. Instead, individualized approaches that focus on the twin children's characteristics and family perspectives…

  19. To Separate or Not to Separate? Parental Decision-Making regarding the Separation of Twins in the Early Years of Schooling

    Science.gov (United States)

    Staton, Sally; Thorpe, Karen; Thompson, Catherine; Danby, Susan

    2012-01-01

    In recent times concerns about possible adverse effects of early separation and advocacy for individual rights have resulted in a movement away from organizational level policies about the separation of twin children as they enter school. Instead, individualized approaches that focus on the twin children's characteristics and family perspectives…

  20. Early maternal separation, nightmares, and bad dreams: results from the Hungarostudy Epidemiological Panel.

    Science.gov (United States)

    Csóka, Szilvia; Simor, Péter; Szabó, Gábor; Kopp, Mária S; Bódizs, Róbert

    2011-03-01

    Early maternal separation is a particularly stressful experience. Current models of nightmare production emphasize negative emotionality as having a central role in determining dream affect. Our aim is to test the hypothesis that persons who experienced early maternal separation (before one year of age and lasting at least one month) report more frequent nightmare experiences and bad dreams as adults. In the frame of the Hungarostudy Epidemiological Panel, 5020 subjects were interviewed. Significant associations were found between early maternal separation and both frequent nightmare experience in adulthood and increased frequency of oppressive and bad dreams. Current depression scores fully mediated the association between early separation and nightmares, but not the association between early separation and negative dream affect. We interpret these findings as a trait-like enhancement of negative emotionality in adults who experienced early maternal separation. This enhancement influences the content of dreams and, when it takes the form of depression, also influences the frequency of nightmares.

  1. A Robust Scheme for the Global Earthquake Early Warning Based on Characteristic Frequency

    Science.gov (United States)

    Wu, Yu-Chang; Chiao, Ling-Yun; Wu, Cheng-Ju

    2017-04-01

    Earthquake hazards mitigation have always been an important issue. Prompt and rapid high precision magnitude estimation is essential to achieve the goal of effective early warning. However, the current state of the method including the maximum predominant period (τpmax), the vertical displacement of P-wave (Pd), and the τc × Pdmethod has reached a standstill for nearly a decade. The major shortcoming is that these methods are not quite applicable for large earthquakes (M>7). Therefore, a new magnitude estimation method for earthquake early warning is crucial and is needed for human preventing loss and casualties in the large earthquakes. Here we demonstrate a robust scheme based on the characteristic frequency. Our result shows a linear relation between the momentum magnitude and the characteristic frequency of P-wave which appears within the first few seconds. This method requires fewer calculations and doesn't need to apply any filter to obtain better results, so the data processing time needed for the real-time earthquake early warning system is greatly reduced. This method also indicates strong applicability for estimating earthquakes with magnitude larger than 7. We demonstrate a robust scheme of global earthquake early warning.

  2. Early Beam Injection Scheme for the Fermilab Booster: A Path for Intensity Upgrade

    Energy Technology Data Exchange (ETDEWEB)

    Bhat, C. M. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States)

    2015-10-28

    Over the past decade, Fermilab has focused efforts on the intensity frontier physics and is committed to increase the average beam power delivered to the neutrino and muon programs substantially. Many upgrades to the existing injector accelerators, namely, the current 400 MeV LINAC and the Booster, are in progress under the Proton Improvement Plan (PIP). Proton Improvement Plan-II (PIP-II) proposes to replace the existing 400 MeV LINAC by a new 800 MeV LINAC, as an injector to the Booster which will increase Booster output power by nearly a factor of two from the PIP design value by the end of its completion. In any case, the Fermilab Booster is going to play a very significant role for nearly next two decades. In this context, I have developed and investigated a new beam injection scheme called "early injection scheme" (EIS) for the Booster with the goal to significantly increase the beam intensity output from the Booster thereby increasing the beam power to the HEP experiments even before PIP-II era. The scheme, if implemented, will also help improve the slip-stacking efficiency in the MI/RR. Here I present results from recent simulations, beam studies, current status and future plans for the new scheme.

  3. A conservative and a hybrid early rejection schemes for accelerating Monte Carlo molecular simulation

    KAUST Repository

    Kadoura, Ahmad Salim

    2014-03-17

    Molecular simulation could provide detailed description of fluid systems when compared to experimental techniques. They can also replace equations of state; however, molecular simulation usually costs considerable computational efforts. Several techniques have been developed to overcome such high computational costs. In this paper, two early rejection schemes, a conservative and a hybrid one, are introduced. In these two methods, undesired configurations generated by the Monte Carlo trials are rejected earlier than it would when using conventional algorithms. The methods are tested for structureless single-component Lennard-Jones particles in both canonical and NVT-Gibbs ensembles. The computational time reduction for both ensembles is observed at a wide range of thermodynamic conditions. Results show that computational time savings are directly proportional to the rejection rate of Monte Carlo trials. The proposed conservative scheme has shown to be successful in saving up to 40% of the computational time in the canonical ensemble and up to 30% in the NVT-Gibbs ensemble when compared to standard algorithms. In addition, it preserves the exact Markov chains produced by the Metropolis scheme. Further enhancement for NVT-Gibbs ensemble is achieved by combining this technique with the bond formation early rejection one. The hybrid method achieves more than 50% saving of the central processing unit (CPU) time.

  4. Issues of incompatibility of dipole beam separation schemes with EIC physics

    Energy Technology Data Exchange (ETDEWEB)

    Aschenauer, E. [Brookhaven National Lab. (BNL), Upton, NY (United States); Kiselev, A. [Brookhaven National Lab. (BNL), Upton, NY (United States); Parker, B. [Brookhaven National Lab. (BNL), Upton, NY (United States); Petti, R. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2015-11-17

    This report addresses the question, can the risk of an eRHIC machine be reduced by replacing the crab-cavities through a dipole field in the IR to separate the electron and hadron beams. In the following, several scenarios to integrate a separation dipole in the IR design will be described. For each of the scenarios the challenges and problems to realize this in practice will be detailed. In addition, the impact on the detector design and the EIC physics program will also be discussed. Several physics requirements need to be integrated into the interaction region design, in order to perform the physics program as described in the EIC White Paper and in the RHIC Design Study. These requirements are also described in detail on a dedicated page of the eRHIC-wiki. The main requirements are described here.

  5. Relation Between Early Maladaptive Schemes and Anxiety and Depression Features in University Students

    Directory of Open Access Journals (Sweden)

    Diana Lucía Sánchez-Ortíz***

    2009-12-01

    Full Text Available Anxiety and depression are important health problems, because of the high prevalence rates in normal population and in clinical population. This non-experimental study intends to identify the cognitive profile, through the early maladaptive schemes in students from the Universidad Pontificia Bolivariana Bucaramanga, related with depression and anxiety scores. Thegoal is to contribute to the identification of cognitive characteristics that could help in the prevention of these disorders. 259 psychology students of the first seven semesters were evaluated by means from the following questionnaires: BDI, ST/DEP, STAI and YSQ-L2. The results don’t show the presence of specific schemes as a function of the presence of State/ Trait depression or State/Trait anxiety, which might suggest, through the dimensional paradigm, the presence of a cognitive pattern for an anxiety and depression mix disorder. It is suggested that further research should be carried out with other samples, including clinical population.

  6. Accounting for early action in the European Union Emission Trading Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Arto, Inaki [IEP, Instituto de Economia Publica, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain); Departamento de Fundamentos del Analisis Economico I, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain); Gallastegui, Carmen [IEP, Instituto de Economia Publica, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain); Ansuategi, Alberto [Departamento de Fundamentos del Analisis Economico I, University of the Basque Country, Avd. Lehendakari Agirre, 48015 Bilbao (Spain)

    2009-10-15

    In the context of emission markets, failure to include early action (EA) as a criterion when sharing out the reduction effort may be unfair. This paper presents (1) a method based on index decomposition that seeks to quantify EA and (2) a method for determining effort sharing considering EA. It is shown that, in the case of European industry (EU-15) and for the period 1995-2005, EA accounted for a reduction of 21% in energy-related CO{sub 2} emissions. Considering two alternative schemes for sharing out the reduction effort in European industry, equal shares (all industries in all countries reduce their emissions by the same percentage) and taking EA into account, we find that Spain, Austria, Italy, the United Kingdom and Sweden would be better off under an equal shares scheme as opposed to one that takes EA into account. The efforts of the remaining countries would be greater than if EA was taken into account. An equal shares scheme would also greatly benefit the textile, non-metallic mineral, paper and 'other' industries, and would be particularly detrimental to the chemical, non-ferrous and other metal, and engineering industries. (author)

  7. The Multiple Sclerosis Risk Sharing Scheme Monitoring Study – early results and lessons for the future

    Directory of Open Access Journals (Sweden)

    Chilcott James B

    2009-01-01

    Full Text Available Abstract Background Risk sharing schemes represent an innovative and important approach to the problems of rationing and achieving cost-effectiveness in high cost or controversial health interventions. This study aimed to assess the feasibility of risk sharing schemes, looking at long term clinical outcomes, to determine the price at which high cost treatments would be acceptable to the NHS. Methods This case study of the first NHS risk sharing scheme, a long term prospective cohort study of beta interferon and glatiramer acetate in multiple sclerosis (MS patients in 71 specialist MS centres in UK NHS hospitals, recruited adults with relapsing forms of MS, meeting Association of British Neurologists (ABN criteria for disease modifying therapy. Outcome measures were: success of recruitment and follow up over the first three years, analysis of baseline and initial follow up data and the prospect of estimating the long term cost-effectiveness of these treatments. Results Centres consented 5560 patients. Of the 4240 patients who had been in the study for a least one year, annual review data were available for 3730 (88.0%. Of the patients who had been in the study for at least two years and three years, subsequent annual review data were available for 2055 (78.5% and 265 (71.8% patients respectively. Baseline characteristics and a small but statistically significant progression of disease were similar to those reported in previous pivotal studies. Conclusion Successful recruitment, follow up and early data analysis suggest that risk sharing schemes should be able to deliver their objectives. However, important issues of analysis, and political and commercial conflicts of interest still need to be addressed.

  8. A New Energy Optimal Control Scheme for a Separately Excited DC Motor Based Incremental Motion Drive

    Institute of Scientific and Technical Information of China (English)

    Milan A.Sheta; Vivek Agarwal; Paluri S.V.Nataraj

    2009-01-01

    This paper considers minimization of resistive and frictional power dissipation in a separately excited DC motor based incremental motion drive (IMD). The drive is required to displace a given, fixed load through a definite angle in specified time, with minimum energy dissipation in the motor windings and minimum frictional losses. Accordingly, an energy optimal (EO) control strategy is proposed in which the motor is first accelerated to track a specific speed profile for a pre-determined optimal time period. Thereafter, both armature and field power supplies are disconnected, and the motor decelerates and comes to a halt at the desired displacement point in the desired total displacement time. The optimal time period for the initial acceleration phase is computed so that the motor stores just enough energy to decelerate to the final position at the specified displacement time. The parameters, such as the moment of inertia and coefficient of friction, which depend on the load and other external conditions, have been obtained using system identification method. Comparison with earlier control techniques is included. The results show that the proposed EO control strategy results in significant reduction of energy loases compared to the existing ones.

  9. Early Beam Injection Scheme for the Fermilab Booster: A Path for Intensity Upgrade

    CERN Document Server

    Bhat, C M

    2015-01-01

    Over the past decade, Fermilab has focused efforts on the intensity frontier physics and is committed to increase the average beam power delivered to the neutrino and muon programs substantially. Many upgrades to the existing injector accelerators, namely, the current 400 MeV LINAC and the Booster, are in progress under the Proton Improvement Plan (PIP). Proton Improvement Plan-II (PIP-II) proposes to replace the existing 400 MeV LINAC by a new 800 MeV LINAC, as an injector to the Booster which will increase Booster output power by nearly a factor of two from the PIP design value by the end of its completion. In any case, the Fermilab Booster is going to play a very significant role for nearly next two decades. In this context, I have developed and investigated a new beam injection scheme called "early injection scheme" (EIS) for the Booster with the goal to significantly increase the beam intensity output from the Booster thereby increasing the beam power to the HEP experiments even before PIP-II era. The sc...

  10. Development of an Ionization Scheme for Gold using the Selective Laser Ion Source at the On-Line Isotope Separator ISOLDE

    CERN Document Server

    Fedosseev, V; Marsh, B A; CERN. Geneva. AB Department

    2006-01-01

    At the ISOLDE on-line isotope separation facility, the resonance ionization laser ion source (RILIS) can be used to ionize reaction products as they effuse from the target. The RILIS process of laser step-wise resonance ionization of atoms in a hot metal cavity provides a highly element selective stage in the preparation of the radioactive ion beam. As a result, the ISOLDE mass separators can provide beams of a chosen isotope with greatly reduced isobaric contamination. The number of elements available at RILIS has been extended to 26, with the addition of a new three-step ionization scheme for gold. The optimal ionization scheme was determined during an extensive study of the atomic energy levels and auto-ionizing states of gold, carried out by means of in-source resonance ionization spectroscopy. Details of the ionization scheme and a summary of the spectroscopy study are presented.

  11. A Model of Isotope Separation in Cells at the Early Stages of Evolution.

    Science.gov (United States)

    Melkikh, A V; Bokunyaeva, A O

    2016-03-01

    The separation of the isotopes of certain ions can serve as an important criterion for the presence of life in the early stages of its evolution. A model of the separation of isotopes during their transport through the cell membrane is constructed. The dependence of the selection coefficient on various parameters is found. In particular, it is shown that the maximum efficiency of the transport of ions corresponds to the minimum enrichment coefficient. At the maximum enrichment, the efficiency of the transport system approaches ½. Calculated enrichment coefficients are compared with experimentally obtained values for different types of cells, and the comparison shows a qualitative agreement between these quantities.

  12. A new nonempirical tuning scheme with single self-consistent field calculation: Comparison with global and IP-tuned range-separated functional.

    Science.gov (United States)

    Borpuzari, Manash Protim; Kar, Rahul

    2017-10-05

    System-dependent nonempirical tuning of range-separated functional provides a way to minimize the delocalization error of the system. However, existing nonempirical tuning method requires the computation of several ΔSCF calculations to determine the optimal μ value. In this article, we have defined a scheme to evaluate the optimal μ value with single self-consistent field calculation. Our method is based on the evaluation of the spherically symmetric average Electron localization function (ELF) region. According to this scheme, the radius of the spherically symmetric average ELF region gives is a measure of the distance at which the long-range part of the range-separated functional becomes dominant. Numerical results indicate that our method improves the reproduction of HOMO energies and HOMO-LUMO gap in comparison to global and IP-tuned range-separated functional. Moreover, in case of HOMO energies, maximum error of the ELF-tuned functional is considerably smaller than the global and IP-tuned functional. Furthermore, our method gives considerably smaller deviation of HOMO energies from ΔSCF IP than global range-separated functional. © 2017 Wiley Periodicals, Inc. © 2017 Wiley Periodicals, Inc.

  13. AN ENSEMBLE TEMPLATE MATCHING AND CONTENT-BASED IMAGE RETRIEVAL SCHEME TOWARDS EARLY STAGE DETECTION OF MELANOMA

    Directory of Open Access Journals (Sweden)

    Spiros Kostopoulos

    2016-12-01

    Full Text Available Malignant melanoma represents the most dangerous type of skin cancer. In this study we present an ensemble classification scheme, employing the mutual information, the cross-correlation and the clustering based on proximity of image features methods, for early stage assessment of melanomas on plain photography images. The proposed scheme performs two main operations. First, it retrieves the most similar, to the unknown case, image samples from an available image database with verified benign moles and malignant melanoma cases. Second, it provides an automated estimation regarding the nature of the unknown image sample based on the majority of the most similar images retrieved from the available database. Clinical material comprised 75 melanoma and 75 benign plain photography images collected from publicly available dermatological atlases. Results showed that the ensemble scheme outperformed all other methods tested in terms of accuracy with 94.9±1.5%, following an external cross-validation evaluation methodology. The proposed scheme may benefit patients by providing a second opinion consultation during the self-skin examination process and the physician by providing a second opinion estimation regarding the nature of suspicious moles that may assist towards decision making especially for ambiguous cases, safeguarding, in this way from potential diagnostic misinterpretations.

  14. Production of early monozygotic twin bovineembryos in vitro by the blastomere separation and coculture technique

    Institute of Scientific and Technical Information of China (English)

    ZHAO Shan-jiang; ZHAO Xue-ming; DU Wei-hua; HAO Hai-sheng; LIU Yan; QIN Tong; WANG Dong; ZHU Hua-bin

    2015-01-01

    The objective of this study was to establish an efifcient system of producing early monozygotic twin bovine embryosin vitro using the blastomere separation and coculture technique.In this study, early eight-cel embryos were chosen to op-timize the separation method, and multi-coculture tactics were applied to improve the efifciency of this production system. Bovine embryo blastomeres (groups of at least 30 at the eight-cel stage) were separated into eight segments (to regard an eight-cel embryo as a tangerine, a blastomere as one segment) and one, two and four segments (blastomeres) were cultured respectively in microwels on the bottom of the four-wel dish (Nunc, Denmark) with 400 µL of culture medium under parafifn oil.Four different types of coculture tactics (cocultured with nothing, intact embryos, bovine cumulus cels (bCCs), intact embryos & bCCs) were applied to the group of four segments (blastomeres).Finaly, diameter and inner cel mass (ICM):trophectoderm (TE) cel ratio was measured as a criterion to assess the quality of the twin embryos which were derived from bovine separated blastomeres.Our results showed that rate of blastocyst formation of the four segments group was signiifcantly greater than one or two group (P0.05).Thus, these results suggest that combined with intact embryos & bCCs coculture system, culturing four isolated segments (blastomeres) per microwel is an efifcient system of producing early monozygotic twin bovine embryos.Furthermore, our results also indicate that the quality of blastocysts derived from separated blastomere may be similar to those derived from intact eight-cel embryos.

  15. Separate and simultaneous generation of multioutputs in a polarization-encoded optical shadow-casting scheme: design of half- and full adders and subtractors.

    Science.gov (United States)

    Rizvi, R A; Zaheer, K; Zubairy, M S

    1988-12-15

    A design algorithm for separate and simultaneous generation of multioutputs in a polarization-encoded optical shadow-casting (POSC) scheme is presented. The logic unit truth table is converted into POSC logic equations for true and false logic. These are then solved consistently to obtain source plane, input pixel, and the decoding mask characteristics. The algorithm is used to design binary half-adder and half-subtractor and full adder and full subtractor to carry out all operations with a fixed source plane and a fixed decoding mask. The results have been verified experimentally.

  16. Implementation of suitable flow injection/sequential-sample separation/preconcentration schemes for determination of trace metal concentrations using detection by electrothermal atomic absorption spectrometry and inductively coupled plasma mass spectrometry

    DEFF Research Database (Denmark)

    Hansen, Elo Harald; Wang, Jianhua

    2002-01-01

    Various preconditioning procedures encomprising appropriate separation/preconcentration schemes in order to obtain optimal sensitivity and selectivity characteristics when using electrothermal atomic absorption spectrometry (ETAAS) and inductively coupled plasma mass spectrometry (ICPMS) are pres...

  17. Radioactively contaminated areas: Bioindicator species and biomarkers of effect in an early warning scheme for a preliminary risk assessment

    Energy Technology Data Exchange (ETDEWEB)

    Lourenço, Joana, E-mail: joanalourenco@ua.pt [Department of Biology & CESAM, University of Aveiro, Campus Universitário de Santiago, Aveiro (Portugal); Mendo, Sónia [Department of Biology & CESAM, University of Aveiro, Campus Universitário de Santiago, Aveiro (Portugal); Pereira, Ruth [Department of Biology, Faculty of Sciences of the University of Porto & CIIMAR – Interdisciplinary Centre of Marine and Environmental Research & GreenUP/CITAB-UP, Porto (Portugal)

    2016-11-05

    Highlights: • Knowing the most used biomarkers and bioindicators used in radioactive areas. • Understanding of the response similarities between human and non-human biota. • Identifying the knowledge gaps. • Proposing an early warning scheme, to perform a screening evaluation of radioactive areas. • Permitting routine assessments without disturbing and alarming local populations. - Abstract: Concerns about the impacts on public health and on the natural environment have been raised regarding the full range of operational activities related to uranium mining and the rest of the nuclear fuel cycle (including nuclear accidents), nuclear tests and depleted uranium from military ammunitions. However, the environmental impacts of such activities, as well as their ecotoxicological/toxicological profile, are still poorly studied. Herein, it is discussed if organisms can be used as bioindicators of human health effects, posed by lifetime exposure to radioactively contaminated areas. To do so, information was gathered from several studies performed on vertebrates, invertebrate species and humans, living in these contaminated areas. The retrieved information was compared, to determine which are the most used bioindicators and biomarkers and also the similarities between human and non-human biota responses. The data evaluated are used to support the proposal for an early warning scheme, based on bioindicator species and on the most sensitive and commonly shared biomarkers, to perform a screening evaluation of radioactively contaminated sites. This scheme could be used to support decision-making for a deeper evaluation of risks to human health, making it possible to screen a large number of areas, without disturbing and alarming local populations.

  18. Implementation of suitable flow injection/sequential-sample separation/preconcentration schemes for determination of trace metal concentrations using detection by electrothermal atomic absorption spectrometry and inductively coupled plasma mass spectrometry

    DEFF Research Database (Denmark)

    Hansen, Elo Harald; Wang, Jianhua

    2002-01-01

    Various preconditioning procedures encomprising appropriate separation/preconcentration schemes in order to obtain optimal sensitivity and selectivity characteristics when using electrothermal atomic absorption spectrometry (ETAAS) and inductively coupled plasma mass spectrometry (ICPMS) are pres......Various preconditioning procedures encomprising appropriate separation/preconcentration schemes in order to obtain optimal sensitivity and selectivity characteristics when using electrothermal atomic absorption spectrometry (ETAAS) and inductively coupled plasma mass spectrometry (ICPMS...... prior to detection are effected in a microconduit placed on top of an SI selection valve....

  19. Early repeated maternal separation induces alterations of hippocampus reelin expression in rats

    Indian Academy of Sciences (India)

    Jianlong Zhang; Lina Qin; Hu Zhao

    2013-03-01

    The long-term effects of repeated maternal separation (MS) during early postnatal life on reelin expression in the hippocampus of developing rats were investigated in the present study. MS was carried out by separating Wistar rat pups singly from their mothers for 3 h a day during postnatal days (PND) 2–14. Reelin mRNA and protein levels in the hippocampus were determined using qRT-PCR and Western blotting, at PND 22, PND 60 and PND 90. MS resulted in the loss of body weight in the developing rats, and reelin mRNA and protein levels in the hippocampus generally were down-regulated over the developing period, but the reelin mRNA and protein levels in the hippocampus of 90-day-old male rats were up-regulated. These findings suggest that the long-term effects of MS on the expression levels of hippocampal reelin mRNA and protein depends on the age at which the stressed rats’ brains were collected; reelin had important implications for the maternal-neonate interaction needed for normal brain development. In conclusion, repeated MS occurring during early postnatal life may cause the alterations of hippocampal reelin expression with the increasing age of developing rats.

  20. Thinking in early modernity and the separation process between philosophy and psychology.

    Science.gov (United States)

    Klempe, Sven Hroar

    2015-03-01

    One of the big questions in psychology is when and how psychology disentangled from philosophy. Usually it is referred to the laboratory Wundt established in Leipzig in 1879 as the birth for psychology as an independent science. However this separation process can also be traced in other ways, like by focusing on how the two sciences approach and understand thinking. Although thinking and language were not included in the research in this laboratory, Wundt (1897) regarded thinking as the core of psychology. As a commentary to Papanicolaou (Integr Psychol Behav Sci doi:10.1007/s12124-014-9273-3, 2014), this paper investigates the differences in how psychology and philosophy conceptualized thinking in early Western modernity. Thus one of the findings is that the separation process between the two was more or less initiated by Immanuel Kant. By defining thinking in terms of the pure reason he excluded the psychological understanding of thinking because psychology basically defined thinking in terms of ideas derived from qualia and sensation. Another finding is that psychology itself has not completely realized the differences between the philosophical and the psychological understanding of thinking by having been influenced by Kant's ideal of the pure reason. This may also explain some of the crises psychology went through during the twentieth century.

  1. Does classroom separation affect twins' reading ability in the early years of school?

    Science.gov (United States)

    Coventry, William L; Byrne, Brian; Coleman, Marreta; Olson, Richard K; Corley, Robin; Willcutt, Eric; Samuelsson, Stefan

    2009-10-01

    In this article we report on reading ability of twin children in kindergarten to Grade 2 as a function of whether members of the pairs are assigned to the same or different classrooms. All analyses were run using mixed model regressions to account for the interdependence between twin pairs. The samples, total N = 1505, are from Australia and the United States. We found a close-to-significant difference in favor of same-class children in kindergarten and Grade 1. However, when results were adjusted to take account of pre-existing differences in disruptive behavior and in preliteracy ability, the class assignment effects disappeared. We suggest that these pre-existing differences, particularly disruptive behavior, are influencing decisions about whether to separate twins or not and also affecting early reading performance, a conclusion supported by significant correlations between the behavioral measures, preliteracy, and school-based reading. We conclude that, on average, early literacy in twins is not directly affected by their assignment to the same or different classrooms.

  2. Cancerous Tumour Model Analysis and Constructing schemes of Anti-angiogenesis Therapy at an Early Stage

    Directory of Open Access Journals (Sweden)

    O. Yu. Mukhomorova

    2015-01-01

    Full Text Available Anti-angiogenesis therapy is an alternative and successfully employed method for treatment of cancerous tumour. However, this therapy isn't widely used in medicine because of expensive drugs. It leads naturally to elaboration of such treatment regimens which use minimum amount of drugs.The aim of the paper is to investigate the model of development of illness and elaborate appropriate treatment regimens in the case of early diagnosis of the disease. The given model reflects the therapy at an intermediate stage of the disease treatment. Further treatment is aimed to destroy cancer cells and may be continued by other means, which are not reflected in the model.Analysis of the main properties of the model was carried out with consideration of two types of auxiliary systems. In the first case, the system is considered without control, as a model of tumour development in the absence of medical treatment. The study of the equilibrium point and determination of its type allowed us to describe disease dynamics and to determine tumour size resulting in death. In the second case a model with a constant control was investigated. The study of its equilibrium point showed that continuous control is not sufficient to support satisfactory patient's condition, and it is necessary to elaborate more complex treatment regimens. For this purpose, we used the method of terminal problems consisting in the search for such program control which forces system to a given final state. Selecting the initial and final states is due to medical grounds.As a result, we found two treatment regimens | one-stage treatment regimen and multi-stage one. The properties of each treatment regimen are analyzed and compared. The total amount of used drugs was a criterion for comparing these two treatment regimens. The theoretical conclusions obtained in this work are supported by computer modeling in MATLAB environment.

  3. The Decision-Making Processes of Early Childhood Teachers When Working with Children Experiencing Parental Separation and Divorce

    Science.gov (United States)

    Mahony, L.; Lunn, J.; Petriwskyj, A.; Walsh, K.

    2015-01-01

    In this study, the pedagogical decision-making processes of 21 Australian early childhood teachers working with children experiencing parental separation and divorce were examined. Transcripts from interviews and a focus group with teachers were analysed using grounded theory methodology. The findings showed that as teachers interacted with young…

  4. Sex and strategy use matters for pattern separation, adult neurogenesis, and immediate early gene expression in the hippocampus.

    Science.gov (United States)

    Yagi, Shunya; Chow, Carmen; Lieblich, Stephanie E; Galea, Liisa A M

    2016-01-01

    Adult neurogenesis in the dentate gyrus (DG) plays a crucial role for pattern separation, and there are sex differences in the regulation of neurogenesis. Although sex differences, favoring males, in spatial navigation have been reported, it is not known whether there are sex differences in pattern separation. The current study was designed to determine whether there are sex differences in the ability for separating similar or distinct patterns, learning strategy choice, adult neurogenesis, and immediate early gene (IEG) expression in the DG in response to pattern separation training. Male and female Sprague-Dawley rats received a single injection of the DNA synthesis marker, bromodeoxyuridine (BrdU), and were tested for the ability of separating spatial patterns in a spatial pattern separation version of delayed nonmatching to place task using the eight-arm radial arm maze. Twenty-seven days following BrdU injection, rats received a probe trial to determine whether they were idiothetic or spatial strategy users. We found that male spatial strategy users outperformed female spatial strategy users only when separating similar, but not distinct, patterns. Furthermore, male spatial strategy users had greater neurogenesis in response to pattern separation training than all other groups. Interestingly, neurogenesis was positively correlated with performance on similar pattern trials during pattern separation in female spatial strategy users but negatively correlated with performance in male idiothetic strategy users. These results suggest that the survival of new neurons may play an important positive role for pattern separation of similar patterns in females. Furthermore, we found sex and strategy differences in IEG expression in the CA1 and CA3 regions in response to pattern separation. These findings emphasize the importance of studying biological sex on hippocampal function and neural plasticity.

  5. Temporary separation from parents in early childhood and serious personality disorders in adult life.

    Science.gov (United States)

    Lahti, Marius; Pesonen, Anu-Katriina; Räikkönen, Katri; Heinonen, Kati; Wahlbeck, Kristian; Kajantie, Eero; Osmond, Clive; Barker, David J P; Eriksson, Johan G

    2012-10-01

    We have previously shown that the temporary separation of Finnish children from both parents during World War II predicted any serious mental, substance use, and personality disorders in adulthood. Here we examine if parental separation is a specific vulnerability factor for any- and dramatic personality disorders relative to other mental disorders. We extracted information on separations from the Finnish National Archives and psychiatric diagnoses from the national Hospital Discharge and Causes of Death-Registers. Of the 12,734 Helsinki Birth Cohort Study participants, 1,717 were separated, 1,487 had any mental, 194 any personality, and 77 dramatic personality disorders. In those who were separated, the risk of any serious personality disorders was significantly higher also among individuals with any serious mental disorders. The increased risks of any serious and dramatic personality disorders were particularly characteristic of individuals separated before the age of five, and that of dramatic personality disorder of separated men. Parental separation may thus be a specific vulnerability factor for serious personality disorders.

  6. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    This paper describes and discusses two different Scheme documentation tools. The first is SchemeDoc, which is intended for documentation of the interfaces of Scheme libraries (APIs). The second is the Scheme Elucidator, which is for internal documentation of Scheme programs. Although the tools...... are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...

  7. Effects of early life adverse experiences on brain activity: Implications from maternal separation models in rodents

    Directory of Open Access Journals (Sweden)

    Mayumi eNishi

    2014-06-01

    Full Text Available During postnatal development, adverse early life experiences can affect the formation of neuronal circuits and exert long-lasting influences on neural function. Many studies have shown that daily repeated MS, an animal model of early life stress, can modulate the hypothalamic-pituitary-adrenal axis (HPA axis and can affect subsequent brain function and emotional behavior during adulthood. However, the molecular basis of the long-lasting effects of early life stress on brain function has not been completely elucidated. In this review, we introduce various cases of MS in rodents and illustrate the alterations in HPA axis activity by focusing on corticosterone (CORT, an end product of the HPA axis in rodents. We then present a characterization of the brain regions affected by various patterns of MS, including repeated MS and single time MS at various stages before weaning, by investigating c-Fos expression, a biological marker of neuronal activity. These CORT and c-Fos studies suggest that repeated early life stress may affect neuronal function in region- and temporal-specific manners, indicating a critical period for habituation to early life stress. Next, we discuss how early life stress can impact behavior, namely by inducing depression, anxiety or eating disorders. Furthermore, alterations in gene expression in adult mice exposed to MS, especially epigenetic changes of DNA methylation, are discussed.

  8. An INDEHISCENT-Controlled Auxin Response Specifies the Separation Layer in Early Arabidopsis Fruit

    NARCIS (Netherlands)

    van Gelderen, Kasper; van Rongen, Martin; Liu, An'an; Otten, Anne; Offringa, Remko

    2016-01-01

    Seed dispersal is an important moment in the life cycle of a plant species. In Arabidopsis thaliana, it is dependent on transcription factor INDEHISCENT (IND)-mediated specification of a separation layer in the dehiscence zone found in the margin between the valves (carpel walls) and the central rep

  9. The history of ecosystem services in economic theory and practice: From early notions to markets and payment schemes

    NARCIS (Netherlands)

    Gómez-Baggethun, E.; Groot, de R.S.; Lomas, P.; Sotelo Montes, C.

    2010-01-01

    This paper reviews the historic development of the conceptualization of ecosystem services and examines critical landmarks in economic theory and practice with regard to the incorporation of ecosystem services into markets and payment schemes. The review presented here suggests that the trend toward

  10. CERN Council Meeting : British Under Secretary of State, Robert Jackson, underlines U.K. interest in CERN's future : decisions on CERN Review Committee recommendations : early departure scheme for at least 200 employees - Member States' contributions to be updated

    CERN Multimedia

    CERN Press Office. Geneva

    1988-01-01

    CERN Council Meeting : British Under Secretary of State, Robert Jackson, underlines U.K. interest in CERN's future : decisions on CERN Review Committee recommendations : early departure scheme for at least 200 employees - Member States' contributions to be updated

  11. Separating the influences of prereading skills on early word and nonword reading.

    Science.gov (United States)

    Shapiro, Laura R; Carroll, Julia M; Solity, Jonathan E

    2013-10-01

    The essential first step for a beginning reader is to learn to match printed forms to phonological representations. For a new word, this is an effortful process where each grapheme must be translated individually (serial decoding). The role of phonological awareness in developing a decoding strategy is well known. We examined whether beginning readers recruit different skills depending on the nature of the words being read (familiar words vs. nonwords). Print knowledge, phoneme and rhyme awareness, rapid automatized naming (RAN), phonological short-term memory (STM), nonverbal reasoning, vocabulary, auditory skills, and visual attention were measured in 392 prereaders 4 and 5 years of age. Word and nonword reading were measured 9 months later. We used structural equation modeling to examine the skills-reading relationship and modeled correlations between our two reading outcomes and among all prereading skills. We found that a broad range of skills were associated with reading outcomes: early print knowledge, phonological STM, phoneme awareness and RAN. Whereas all of these skills were directly predictive of nonword reading, early print knowledge was the only direct predictor of word reading. Our findings suggest that beginning readers draw most heavily on their existing print knowledge to read familiar words. Copyright © 2013 Elsevier Inc. All rights reserved.

  12. A novel phosphoprotein analysis scheme for assessing changes in premalignant and malignant breast cell lines using 2D liquid separations, protein microarrays and tandem mass spectrometry

    OpenAIRE

    Patwa, Tasneem H; Wang, Yanfei; Miller, Fred R.; Goodison, Steve; Pennathur, Subramaniam; Timothy J Barder; David M Lubman

    2008-01-01

    An analysis of phosphorylation changes that occur during cancer progression would provide insights into the molecular pathways responsible for a malignant phenotype. In this study we employed a novel coupling of 2D-liquid separations and protein microarray technology to reveal changes in phosphoprotein status between premalignant (AT1) and malignant (CA1a) cell lines derived from the human MCF10A breast cell lines. Intact proteins were first separated according to their isoelectric point and ...

  13. Implementation of suitable FI/SI-sample separation/preconcentration schemes for determinations of trace-metal concentrations when using detection by ETAAS and ICPMS

    DEFF Research Database (Denmark)

    Hansen, Elo Harald; Wang, Jianhua

    and selectivity. Either in order to separate/preconcentrate the analyte material, or because of the presence of potentially interfering matrix constituents. Such pretreatments are advantageously performed in flow injection (FI) or sequential injection (SI) manifolds, where all appropriate unit operations can...

  14. A novel phosphoprotein analysis scheme for assessing changes in premalignant and malignant breast cell lines using 2D liquid separations, protein microarrays and tandem mass spectrometry.

    Science.gov (United States)

    Patwa, Tasneem H; Wang, Yanfei; Miller, Fred R; Goodison, Steve; Pennathur, Subramaniam; Barder, Timothy J; Lubman, David M

    2008-01-01

    An analysis of phosphorylation changes that occur during cancer progression would provide insights into the molecular pathways responsible for a malignant phenotype. In this study we employed a novel coupling of 2D-liquid separations and protein microarray technology to reveal changes in phosphoprotein status between premalignant (AT1) and malignant (CA1a) cell lines derived from the human MCF10A breast cell lines. Intact proteins were first separated according to their isoelectric point and hydrophobicities, then arrayed on SuperAmine glass slides. Phosphoproteins were detected using the universal, inorganic phospho-sensor dye, ProQ Diamond. Using this dye, out of 140 spots that were positive for phosphorylation, a total of 85 differentially expressed spots were detected over a pH range of 7.2 to 4.0. Proteins were identified and their peptides sequenced by mass spectrometry. The strategy enabled the identification of 75 differentially expressed phosphoproteins, from which 51 phosphorylation sites in 27 unique proteins were confirmed. Interestingly, the majority of differentially expressed phosphorylated proteins observed were nuclear proteins. Three regulators of apoptosis, Bad, Bax and Acinus, were also differentially phosphorylated in the two cell lines. Further development of this strategy will facilitate an understanding of the mechanisms involved in malignancy progression and other disease-related phenotypes.

  15. Future perspectives toward the early definition of a multivariate decision-support scheme employed in clinical decision making for senior citizens.

    Science.gov (United States)

    Frantzidis, Christos A; Gilou, Sotiria; Billis, Antonis; Karagianni, Maria; Bratsas, Charalampos D; Bamidis, Panagiotis

    2016-03-01

    Recent neuroscientific studies focused on the identification of pathological neurophysiological patterns (emotions, geriatric depression, memory impairment and sleep disturbances) through computerised clinical decision-support systems. Almost all these research attempts employed either resting-state condition (e.g. eyes-closed) or event-related potentials extracted during a cognitive task known to be affected by the disease under consideration. This Letter reviews existing data mining techniques and aims to enhance their robustness by proposing a holistic decision framework dealing with comorbidities and early symptoms' identification, while it could be applied in realistic occasions. Multivariate features are elicited and fused in order to be compared with average activities characteristic of each neuropathology group. A proposed model of the specific cognitive function which may be based on previous findings (a priori information) and/or validated by current experimental data should be then formed. So, the proposed scheme facilitates the early identification and prevention of neurodegenerative phenomena. Neurophysiological semantic annotation is hypothesised to enhance the importance of the proposed framework in facilitating the personalised healthcare of the information society and medical informatics research community.

  16. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  17. A history of early life parental loss or separation is associated with successful cognitive-behavioral therapy in major depressive disorder

    Science.gov (United States)

    Niciu, Mark J.; Abdallah, Chadi G.; Fenton, Lisa R.; Fasula, Madonna K.; Black, Anne; Anderson, George M.; Sanacora, Gerard

    2016-01-01

    Background There is a clinical need for evidence-based psychotherapy response biomarkers in major depressive disorder (MDD). Based on previous studies, we hypothesized that lower 24-h urinary cortisol levels and a history of early life stress/trauma would predict an improved antidepressant response to cognitive-behavioral therapy (CBT). Methods 50 currently depressed MDD subjects were enrolled. 24-h urine was collected and measured for cortisol levels by radioimmunoassay (RIA). Subjects were also administered early life stress/trauma measures at baseline: Global Perceived Early-Life Stress (GPELS), The Early Life Trauma Inventory (ELTI) and Klein Loss Scale (KLS). The efficacy of a twelve-week course of once-weekly CBT was evaluated by the primary outcome measure, the 24-item Hamilton Depression Rating Scale (HDRS24), at baseline and every four weeks, and the Beck Depression Inventory at baseline and weekly thereafter. 42 subjects had at least one complete follow-up visit (≥4 weeks of CBT), and 30 subjects completed the full 12-week course. Results Baseline 24-h urinary cortisol levels did not correlate with CBT’s antidepressant response. Higher KLS scores, a measure of early life parental loss or separation, correlated with delta HDRS24 (rs=−0.39, padjusted=0.05). Complementary general linear model analysis revealed enhanced CBT efficacy in patients with a history of early life parental loss or separation [F(1,35)=6.65, p=0.01]. Limitations Small sample size, Treatment-naïve population. Conclusions Early life parental separation or loss positively correlated with CBT’s antidepressant efficacy in our sample and may warrant further study in larger clinical samples. PMID:26363143

  18. A history of early life parental loss or separation is associated with successful cognitive-behavioral therapy in major depressive disorder.

    Science.gov (United States)

    Niciu, Mark J; Abdallah, Chadi G; Fenton, Lisa R; Fasula, Madonna K; Black, Anne; Anderson, George M; Sanacora, Gerard

    2015-11-15

    There is a clinical need for evidence-based psychotherapy response biomarkers in major depressive disorder (MDD). Based on previous studies, we hypothesized that lower 24-h urinary cortisol levels and a history of early life stress/trauma would predict an improved antidepressant response to cognitive-behavioral therapy (CBT). 50 currently depressed MDD subjects were enrolled. 24-h urine was collected and measured for cortisol levels by radioimmunoassay (RIA). Subjects were also administered early life stress/trauma measures at baseline: Global Perceived Early-Life Stress (GPELS), The Early Life Trauma Inventory (ELTI) and Klein Loss Scale (KLS). The efficacy of a twelve-week course of once-weekly CBT was evaluated by the primary outcome measure, the 24-item Hamilton Depression Rating Scale (HDRS24), at baseline and every four weeks, and the Beck Depression Inventory at baseline and weekly thereafter. 42 subjects had at least one complete follow-up visit (≥4 weeks of CBT), and 30 subjects completed the full 12-week course. Baseline 24-h urinary cortisol levels did not correlate with CBT's antidepressant response. Higher KLS scores, a measure of early life parental loss or separation, correlated with delta HDRS24 (rs=-0.39, padjusted=0.05). Complementary general linear model analysis revealed enhanced CBT efficacy in patients with a history of early life parental loss or separation [F(1,35)=6.65, p=0.01]. Small sample size, Treatment-naïve population. Early life parental separation or loss positively correlated with CBT's antidepressant efficacy in our sample and may warrant further study in larger clinical samples. Copyright © 2015 Elsevier B.V. All rights reserved.

  19. Distinct Trajectories of Separation Anxiety in the Preschool Years: Persistence at School Entry and Early-Life Associated Factors

    Science.gov (United States)

    Battaglia, Marco; Touchette, Évelyne; Garon-Carrier, Gabrielle; Dionne, Ginette; Côté, Sylvana M.; Vitaro, Frank; Tremblay, Richard E.; Boivin, Michel

    2016-01-01

    Background: Little is known about how children differ in the onset and evolution of separation anxiety (SA) symptoms during the preschool years, and how SA develops into separation anxiety disorder. In a large, representative population-based sample, we investigated the developmental trajectories of SA symptoms from infancy to school entry, their…

  20. Early-life risk factors for panic and separation anxiety disorder: insights and outstanding questions arising from human and animal studies of CO2 sensitivity.

    Science.gov (United States)

    Battaglia, Marco; Ogliari, Anna; D'Amato, Francesca; Kinkead, Richard

    2014-10-01

    Genetically informative studies showed that genetic and environmental risk factors act and interact to influence liability to (a) panic disorder, (b) its childhood precursor separation anxiety disorder, and (c) heightened sensitivity to CO2, an endophenotype common to both disorders. Childhood adversities including parental loss influence both panic disorder and CO2 hypersensitivity. However, childhood parental loss and separation anxiety disorder are weakly correlated in humans, suggesting the presence of alternative pathways of risk. The transferability of tests that assess CO2 sensitivity - an interspecific quantitative trait common to all mammals - to the animal laboratory setting allowed for environmentally controlled studies of early parental separation. Animal findings paralleled those of human studies, in that different forms of early maternal separation in mice and rats evoked heightened CO2 sensitivity; in mice, this could be explained by gene-by-environment interactional mechanisms. While several questions and issues (including obvious divergences between humans and rodents) remain open, parallel investigations by contemporary molecular genetic tools of (1) human longitudinal cohorts and (2) animals in controlled laboratory settings, can help elucidate the mechanisms beyond these phenomena.

  1. Early

    Directory of Open Access Journals (Sweden)

    Kamel Abd Elaziz Mohamed

    2014-04-01

    Conclusion: Early PDT is recommended for patients who require prolonged tracheal intubation in the ICU as outcomes like the duration of mechanical ventilation length of ICU stay and hospital stay were significantly shorter in early tracheostomy.

  2. Casein kinase 1 alpha regulates chromosome congression and separation during mouse oocyte meiotic maturation and early embryo development.

    Science.gov (United States)

    Wang, Lu; Lu, Angeleem; Zhou, Hong-Xia; Sun, Ran; Zhao, Jie; Zhou, Cheng-Jie; Shen, Jiang-Peng; Wu, Sha-Na; Liang, Cheng-Guang

    2013-01-01

    Casein kinase I alpha (CK1α) is a member of serine/threonine protein kinase, generally present in all eukaryotes. In mammals, CK1α regulates the transition from interphase to metaphase in mitosis. However, little is known about its role in meiosis. Here we examined Ck1α mRNA and protein expression, as well as its subcellular localization in mouse oocytes from germinal vesicle to the late 1-cell stage. Our results showed that the expression level of CK1α was increased in metaphase. Immunostaining results showed that CK1α colocalized with condensed chromosomes during oocyte meiotic maturation and early embryo development. We used the loss-of-function approach by employing CK1α specific morpholino injection to block the function of CK1α. This functional blocking leads to failure of polar body 1 (PB1) extrusion, chromosome misalignment and MII plate incrassation. We further found that D4476, a specific and efficient CK1 inhibitor, decreased the rate of PB1 extrusion. Moreover, D4476 resulted in giant polar body extrusion, oocyte pro-MI arrest, chromosome congression failure and impairment of embryo developmental potential. In addition, we employed pyrvinium pamoate (PP), an allosteric activator of CK1α, to enhance CK1α activity in oocytes. Supplementation of PP induced oocyte meiotic maturation failure, severe congression abnormalities and misalignment of chromosomes. Taken together, our study for the first time demonstrates that CK1α is required for chromosome alignment and segregation during oocyte meiotic maturation and early embryo development.

  3. Casein kinase 1 alpha regulates chromosome congression and separation during mouse oocyte meiotic maturation and early embryo development.

    Directory of Open Access Journals (Sweden)

    Lu Wang

    Full Text Available Casein kinase I alpha (CK1α is a member of serine/threonine protein kinase, generally present in all eukaryotes. In mammals, CK1α regulates the transition from interphase to metaphase in mitosis. However, little is known about its role in meiosis. Here we examined Ck1α mRNA and protein expression, as well as its subcellular localization in mouse oocytes from germinal vesicle to the late 1-cell stage. Our results showed that the expression level of CK1α was increased in metaphase. Immunostaining results showed that CK1α colocalized with condensed chromosomes during oocyte meiotic maturation and early embryo development. We used the loss-of-function approach by employing CK1α specific morpholino injection to block the function of CK1α. This functional blocking leads to failure of polar body 1 (PB1 extrusion, chromosome misalignment and MII plate incrassation. We further found that D4476, a specific and efficient CK1 inhibitor, decreased the rate of PB1 extrusion. Moreover, D4476 resulted in giant polar body extrusion, oocyte pro-MI arrest, chromosome congression failure and impairment of embryo developmental potential. In addition, we employed pyrvinium pamoate (PP, an allosteric activator of CK1α, to enhance CK1α activity in oocytes. Supplementation of PP induced oocyte meiotic maturation failure, severe congression abnormalities and misalignment of chromosomes. Taken together, our study for the first time demonstrates that CK1α is required for chromosome alignment and segregation during oocyte meiotic maturation and early embryo development.

  4. Capacity-achieving CPM schemes

    CERN Document Server

    Perotti, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The so obtained schemes are cascaded with an outer serially-concatenated convolutional code to form a pragmatic coded-modulation system. The resulting schemes exhibit performance very close to the CPM capacity without requiring iterations between the outer decoder and the CPM demodulator. As a result, the receiver exhibits reduced complexity and increased flexibility due to the separation of the demodulation and decoding functions.

  5. Early postnatal maternal separation causes alterations in the expression of β3-adrenergic receptor in rat adipose tissue suggesting long-term influence on obesity

    Energy Technology Data Exchange (ETDEWEB)

    Miki, Takanori, E-mail: mikit@med.kagawa-u.ac.jp [Department of Anatomy and Neurobiology, Faculty of Medicine, Kagawa University (Japan); Liu, Jun-Qian; Ohta, Ken-ichi; Suzuki, Shingo [Department of Anatomy and Neurobiology, Faculty of Medicine, Kagawa University (Japan); Kusaka, Takashi [Department of Pediatrics, Faculty of Medicine, Kagawa University (Japan); Warita, Katsuhiko [Department of Anatomy and Neurobiology, Faculty of Medicine, Kagawa University (Japan); Yokoyama, Toshifumi [Department of Bioresource and Agrobiosciences, Graduate School of Science and Technology, Kobe University (Japan); Jamal, Mostofa [Department of Forensic Medicine, Faculty of Medicine, Kagawa University (Japan); Ueki, Masaaki [Department of Anesthesia, Nishiwaki Municipal Hospital (Japan); Yakura, Tomiko; Tamai, Motoki [Department of Anatomy and Neurobiology, Faculty of Medicine, Kagawa University (Japan); Sumitani, Kazunori [Department of Medical Education, Faculty of Medicine, Kagawa University (Japan); Hosomi, Naohisa [Department of Clinical Neuroscience and Therapeutics, Hiroshima University Graduate School of Biomedical Sciences (Japan); Takeuchi, Yoshiki [Department of Anatomy and Neurobiology, Faculty of Medicine, Kagawa University (Japan)

    2013-12-06

    Highlights: •High-fat diet intake following maternal separation did not cause body weight gain. •However, levels of metabolism-related molecules in adipose tissue were altered. •Increased levels of prohibitin mRNA in white fat were observed. •Attenuated levels of β3-adrenergic receptor mRNA were observed in brown fat. •Such alterations in adipose tissue may contribute to obesity later in life. -- Abstract: The effects of early postnatal maternal deprivation on the biological characteristics of the adipose tissue later in life were investigated in the present study. Sprague–Dawley rats were classified as either maternal deprivation (MD) or mother-reared control (MRC) groups. MD was achieved by separating the rat pups from their mothers for 3 h each day during the 10–15 postnatal days. mRNA levels of mitochondrial uncoupling protein 1 (UCP-1), β3-adrenergic receptor (β3-AR), and prohibitin (PHB) in the brown and white adipose tissue were determined using real-time RT-PCR analysis. UCP-1, which is mediated through β3-AR, is closely involved in the energy metabolism and expenditure. PHB is highly expressed in the proliferating tissues/cells. At 10 weeks of age, the body weight of the MRC and MD rats was similar. However, the levels of the key molecules in the adipose tissue were substantially altered. There was a significant increase in the expression of PHB mRNA in the white adipose tissue, while the β3-AR mRNA expression decreased significantly, and the UCP-1 mRNA expression remained unchanged in the brown adipose tissue. Given that these molecules influence the mitochondrial metabolism, our study indicates that early postnatal maternal deprivation can influence the fate of adipose tissue proliferation, presumably leading to obesity later in life.

  6. Treatment of Mental or Physical Health Problems in a Combat Zone: Comparisons of Postdeployment Mental Health and Early Separation From Service.

    Science.gov (United States)

    Conway, Terry L; Schmied, Emily A; Larson, Gerald E; Galarneau, Michael R; Hammer, Paul S; Quinn, Kimberly H; Schmitz, Kimberly J; Webb-Murphy, Jennifer A; Boucher, Wayne C; Edwards, Nathan K; Ly, Hoa L

    2016-04-01

    The primary aim of this study was to evaluate whether being treated for mental health or nonbattle physical injury during military combat deployment was associated with higher risk for postdeployment mental disorders and poorer career outcomes than seen in the general combat-deployed population. Service members treated in theater for mental health (n = 964) or noncombat injury (n = 853) were compared with randomly sampled personnel (n = 7,220) from the general deployed population on diagnosed mental disorders and early separation from service. Deployment, medical, and career information were obtained from Department of Defense archival databases. Over half of the personnel who received mental health treatment while deployed were diagnosed with 1 or more mental disorders postdeployment and/or were separated from service before completing their full-term enlistment. This was significantly higher than expected compared to the general deployed group, adjusting for demographic/military characteristics and mental health history (adjusted odds ratios [ORs] ranging 1.62 to 2.96). Frequencies of problems also were higher in the mental health-treated group than in the group treated for nonbattle physical injuries (significant adjusted ORs ranging 1.65 to 2.58). The documented higher risks for postdeployment adjustment problems suggested that especially those treated in theater by mental health providers might benefit from postdeployment risk-reduction programs.

  7. EFFECT OF MOLECULAR WEIGHT AND FILM THICKNESS ON THE CRYSTALLIZATION AND MICROPHASE SEPARATION IN POLYSTYRENE BLOCK-POLY(L-LACTIC ACID) THIN FILMS AT THE EARLY STAGE

    Institute of Scientific and Technical Information of China (English)

    Yu-han Wei; Cai-yuan Pan; Bin-yao Li; Xin-hong Yu; Yan-chun Han

    2011-01-01

    We investigated the effects of molecular weight and film thickness on the crystallization and microphase separation in semicrystalline block copolymer polystyrene-block-poly(L-lactic acid) (PS-b-PLLA) thin films, at the early stage of film evolution (when Ts < T < TODT) by in situ hot stage atomic force microscopy. For PS-b-PLLA 1 copolymer which had lower molecular weight and higher PLLA fraction, diffusion-controlled break-out crystallization started easily.For PS-b-PLLA 2 with higher molecular weight, crystallization in nanometer scales occurs in local area. After melting of the two copolymer films, islands were observed at the film surface: PS-b-PLLA 1 film was in a disordered phase mixed state while PS-b-PLLA 2 film formed phase-separated lamellar structure paralleling to the substratc. Crystallization-melting and van der Waals forces drove the island formation in PS-b-PLLA 1 film. Film thickness affected the crystallization rate. Crystals grew very slowly in much thinner film ofPS-b-PLLA 1 and remained almost unchanged at long time annealing. The incompatibility between PS and PLLA blocks drove the film fluctuation which subsequently evolved into spinodal-like morphology.

  8. The role of psychosocial and biological variables in separating chronic and non-chronic major depression and early-late-onset dysthymia.

    Science.gov (United States)

    Szádóczky, E; Fazekas, I; Rihmer, Z; Arató, M

    1994-09-01

    Psychosocial (sociodemographic characteristics, loss and separation and family atmosphere in childhood, recent life events) and biological (family history, DST, TRH-test) variables were investigated in 180 patients with Major Depression (MD) and Dysthymic Disorder (DD). The aim of the study was to reveal certain differences between the chronic and non-chronic course of MD and the early- and late-onset subtypes of dysthymia. When comparing the two course patterns of MD, a higher rate of malignant tumours among first-degree relatives, a greater number of long-lasting stress situations before the index depressive episode, longer duration of the previous episodes, less frequent DST nonsuppression, and a blunted TSH response to TRH were found in patients with a chronic course of MD. Several factors seem to influence the course pattern of MD, or else the chronic form represents a subgroup within MD. The late-onset dysthymics were mainly women with a low level of education, a lower suicidal tendency, normal suppression in DST, and a lack of blunted TSH responses to TRH administration during the period of double depression. The early-onset dysthymics showed a higher number of persons who had never married, who presented a more traumatic and frustrating childhood background, and who had a higher rate of DST non-suppressors and blunted TSH responses after TRH administration during the period of their double depression. Our data suggest that late-onset dysthymia might be a biologically distinct subgroup of chronic depression.

  9. Maternal separation in early life modifies anxious behavior and Fos and glucocorticoid receptor expression in limbic neurons after chronic stress in rats: effects of tianeptine.

    Science.gov (United States)

    Trujillo, Verónica; Durando, Patricia E; Suárez, Marta M

    2016-01-01

    Early-life adversity can lead to long-term consequence persisting into adulthood. Here, we assess the implications of an adverse early environment on vulnerability to stress during adulthood. We hypothesized that the interplay between early and late stress would result in a differential phenotype regarding the number of neurons immunoreactive for glucocorticoid receptor (GR-ir) and neuronal activity as assessed by Fos immunoreactivity (Fos-ir) in brain areas related to stress responses and anxiety-like behavior. We also expected that the antidepressant tianeptine could correct some of the alterations induced in our model. Male Wistar rats were subjected to daily maternal separation (MS) for 4.5 h during the first 3 weeks of life. As adults, the rats were exposed to chronic stress for 24 d and they were treated daily with tianeptine (10 mg/kg intraperitoneal) or vehicle (isotonic saline). Fos-ir was increased by MS in all structures analyzed. Chronic stress reduced Fos-ir in the hippocampus, but increased it in the paraventricular nucleus. Furthermore, chronic stress increased GR-ir in hippocampus (CA1) and amygdala in control non-MS rats. By contrast, when MS and chronic stress were combined, GR-ir was decreased in these structures. Additionally, whereas tianeptine did not affect Fos-ir, it regulated GR-ir in a region-dependent manner, in hippocampus and amygdala opposing in some cases the stress or MS effects. Furthermore, tianeptine reversed the MS- or stress-induced anxious behavior. The interplay between MS and chronic stress observed indicates that MS rats have a modified phenotype, which is expressed when they are challenged by stress in later life.

  10. Explicit and implicit finite difference schemes for fractional Cattaneo equation

    Science.gov (United States)

    Ghazizadeh, H. R.; Maerefat, M.; Azimi, A.

    2010-09-01

    In this paper, the numerical solution of fractional (non-integer)-order Cattaneo equation for describing anomalous diffusion has been investigated. Two finite difference schemes namely an explicit predictor-corrector and totally implicit schemes have been developed. In developing each scheme, a separate formulation approach for the governing equations has been considered. The explicit predictor-corrector scheme is the fractional generalization of well-known MacCormack scheme and has been called Generalized MacCormack scheme. This scheme solves two coupled low-order equations and simultaneously computes the flux term with the main variable. Fully implicit scheme however solves a single high-order undecomposed equation. For Generalized MacCormack scheme, stability analysis has been studied through Fourier method. Through a numerical test, the experimental order of convergency of both schemes has been found. Then, the domain of applicability and some numerical properties of each scheme have been discussed.

  11. Optimal probabilistic dense coding schemes

    Science.gov (United States)

    Kögler, Roger A.; Neves, Leonardo

    2017-04-01

    Dense coding with non-maximally entangled states has been investigated in many different scenarios. We revisit this problem for protocols adopting the standard encoding scheme. In this case, the set of possible classical messages cannot be perfectly distinguished due to the non-orthogonality of the quantum states carrying them. So far, the decoding process has been approached in two ways: (i) The message is always inferred, but with an associated (minimum) error; (ii) the message is inferred without error, but only sometimes; in case of failure, nothing else is done. Here, we generalize on these approaches and propose novel optimal probabilistic decoding schemes. The first uses quantum-state separation to increase the distinguishability of the messages with an optimal success probability. This scheme is shown to include (i) and (ii) as special cases and continuously interpolate between them, which enables the decoder to trade-off between the level of confidence desired to identify the received messages and the success probability for doing so. The second scheme, called multistage decoding, applies only for qudits ( d-level quantum systems with d>2) and consists of further attempts in the state identification process in case of failure in the first one. We show that this scheme is advantageous over (ii) as it increases the mutual information between the sender and receiver.

  12. Spiral microfluidic nanoparticle separators

    Science.gov (United States)

    Bhagat, Ali Asgar S.; Kuntaegowdanahalli, Sathyakumar S.; Dionysiou, Dionysios D.; Papautsky, Ian

    2008-02-01

    Nanoparticles have potential applications in many areas such as consumer products, health care, electronics, energy and other industries. As the use of nanoparticles in manufacturing increases, we anticipate a growing need to detect and measure particles of nanometer scale dimensions in fluids to control emissions of possible toxic nanoparticles. At present most particle separation techniques are based on membrane assisted filtering schemes. Unfortunately their efficiency is limited by the membrane pore size, making them inefficient for separating a wide range of sizes. In this paper, we propose a passive spiral microfluidic geometry for momentum-based particle separations. The proposed design is versatile and is capable of separating particulate mixtures over a wide dynamic range and we expect it will enable a variety of environmental, medical, or manufacturing applications that involve rapid separation of nanoparticles in real-world samples with a wide range of particle components.

  13. σK of Clostridium acetobutylicum is the first known sporulation-specific sigma factor with two developmentally separated roles, one early and one late in sporulation.

    Science.gov (United States)

    Al-Hinai, Mohab A; Jones, Shawn W; Papoutsakis, Eleftherios T

    2014-01-01

    Sporulation in the model endospore-forming organism Bacillus subtilis proceeds via the sequential and stage-specific activation of the sporulation-specific sigma factors, σ(H) (early), σ(F), σ(E), σ(G), and σ(K) (late). Here we show that the Clostridium acetobutylicum σ(K) acts both early, prior to Spo0A expression, and late, past σ(G) activation, thus departing from the B. subtilis model. The C. acetobutylicum sigK deletion (ΔsigK) mutant was unable to sporulate, and solventogenesis, the characteristic stationary-phase phenomenon for this organism, was severely diminished. Transmission electron microscopy demonstrated that the ΔsigK mutant does not develop an asymmetric septum and produces no granulose. Complementation of sigK restored sporulation and solventogenesis to wild-type levels. Spo0A and σ(G) proteins were not detectable by Western analysis, while σ(F) protein levels were significantly reduced in the ΔsigK mutant. spo0A, sigF, sigE, sigG, spoIIE, and adhE1 transcript levels were all downregulated in the ΔsigK mutant, while those of the sigH transcript were unaffected during the exponential and transitional phases of culture. These data show that σ(K) is necessary for sporulation prior to spo0A expression. Plasmid-based expression of spo0A in the ΔsigK mutant from a nonnative promoter restored solventogenesis and the production of Spo0A, σ(F), σ(E), and σ(G), but not sporulation, which was blocked past the σ(G) stage of development, thus demonstrating that σ(K) is also necessary in late sporulation. sigK is expressed very early at low levels in exponential phase but is strongly upregulated during the middle to late stationary phase. This is the first sporulation-specific sigma factor shown to have two developmentally separated roles.

  14. The UVJ Selection of Quiescent and Star Forming Galaxies: Separating Early and Late-Type Galaxies and Isolating Edge-on Spirals

    CERN Document Server

    Patel, Shannon G; Kelson, Daniel D; Franx, Marijn; van der Wel, Arjen; Illingworth, Garth D

    2011-01-01

    We utilize for the first time HST ACS imaging to examine the structural properties of galaxies in the rest-frame U-V versus V-J diagram (i.e., the UVJ diagram) using a sample at 0.610.25). The use of the UVJ diagram as a tool to distinguish quiescent galaxies from star forming galaxies (SFGs) is becoming more common due to its ability to separate red quiescent galaxies from reddened SFGs. Quiescent galaxies occupy a small and distinct region of UVJ color space and we find most of them to have concentrated profiles with high Sersic indices (n>2.5) and smooth structure characteristic of early-type systems. SFGs populate a broad, but well-defined sequence of UVJ colors and are comprised of objects with a mix of Sersic indices. Interestingly, most UVJ-selected SFGs with high Sersic indices also display structure due to dust and star formation typical of the n<2.5 SFGs and late-type systems. Finally, we find that the position of a SFG on the sequence of UVJ colors is determined to a large degree by the mass of ...

  15. Implementation of suitable flow injection/sequential injection on-line sample pretreatment schemes. Separation and preconcentration procedures for the determination of trace metal concentrations by ETAAS and/or ICPMS

    DEFF Research Database (Denmark)

    Hansen, Elo Harald; Wang, Jianhua

    Despite their excellent analytical chemical capacities, ETAAS and ICPMS, nevertheless, often require suitable pretreatment of the sample material in order to obtain the necessary sensitivity and selectivity. Either in order to separate/preconcentrate the analyte material, or because of the presen...

  16. Flow injection and sequential injection: The optimal solutions for executing appropriate on-line separation and preconcentration schemes for detection of trace-level concentrations of metals in complex matrices by ICPMS

    DEFF Research Database (Denmark)

    Hansen, Elo Harald

    as these adversely will impair its performance. In the lecture, selected examples of separation/preconcentration FI/SI-procedures for the determination of trace levels of metals will be presented, particular emphasis being placed on the use of the novel “lab-on-valve” (LOV) concept....

  17. Generalized Group Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    The concept of generalized group signature scheme will bepresent. Based on the generalized secret sharing scheme proposed by Lin and Ha rn, a non-interactive approach is designed for realizing such generalized group signature scheme. Using the new scheme, the authorized subsets of the group in w hich the group member can cooperate to produce the valid signature for any messa ge can be randomly specified

  18. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  19. MIDI Programming in Scheme

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2010-01-01

    A Scheme representation of Standard MIDI Files is proposed. The Scheme expressions are defined and constrained by an XML-language, which in the starting point is inspired by a MIDI XML event language made by the MIDI Manufactures Association. The representation of Standard MIDI Files in Scheme ma...

  20. MIDI Programming in Scheme

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2010-01-01

    A Scheme representation of Standard MIDI Files is proposed. The Scheme expressions are defined and constrained by an XML-language, which in the starting point is inspired by a MIDI XML event language made by the MIDI Manufactures Association. The representation of Standard MIDI Files in Scheme ma...

  1. Toric varieties, monoid schemes and $cdh$ descent

    CERN Document Server

    Cortiñas, Guillermo; Walker, Mark E; Weibel, Charles A

    2011-01-01

    We give conditions for the Mayer-Vietoris property to hold for the algebraic K-theory of blow-up squares of toric varieties in any characteristic, using the theory of monoid schemes. These conditions are used to relate algebraic K-theory to topological cyclic homology in characteristic p. To achieve our goals, we develop for monoid schemes many notions from classical algebraic geometry, such as separated and proper maps.

  2. AUTISTIC CHILDREN PROTECTION SCHEME

    Directory of Open Access Journals (Sweden)

    Dragan LUKIC

    1998-09-01

    Full Text Available The present article sets forth the theoretical grounds which make the basis for the organizational scheme of the autistic persons social protection. This protection consists of the below listed forms of work:· Health service with the role of an early detection and participation in the creation of rehabilitation programs;· Social protection with its programs of work from the diagnostics where the defectologist makes a team together with the physician and the psychologists to the systems of rehabilitation institutions where the defectologist’s is the main responsibility.The present article underlines two facts, namely:· that an autistic person requires to be followed and every spare moment used to promote and advance the activities the doer commenced himself instead of having him carry out the programs which are beyond his internal motivations and which he finds emotionally inaccessible;· that and form of work organization with autistic persons must subordinate its administrative part to the basic professional requirements this kind of disorder (handicap sets in front of each professional.

  3. Convertible Proxy Signcryption Scheme

    Institute of Scientific and Technical Information of China (English)

    李继国; 李建中; 曹珍富; 张亦辰

    2004-01-01

    In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed different proxy signcryption schemes respectively, which extended the concept of proxy signature.However, only the specified receiver can decrypt and verify the validity of proxy signcryption in their schemes.To protect the receiver' s benefit in case of a later dispute, Wu and Hsu proposed a convertible authenticated encryption scheme, which carn enable the receiver to convert signature into an ordinary one that can be verified by anyone. Based on Wu and Hsu' s scheme and improved Kim' s scheme, we propose a convertible proxy signcryption scheme. The security of the proposed scheme is based on the intractability of reversing the one-way hash function and solving the discrete logarithm problem. The proposed scheme can satisfy all properties of strong proxy signature and withstand the public key substitution attack and does not use secure channel. In addition, the proposed scheme can be extended to convertible threshold proxy signcryption scheme.

  4. Effects of early maternal separation on physical and psychological health in rural middle school students%早期母婴分离对农村中学生身心健康的影响

    Institute of Scientific and Technical Information of China (English)

    曹杰杰; 陈婷婷; 何璟楠; 张志刚; 曹秀菁

    2011-01-01

    Objective To explore the effects of early maternal separation on physical and psychological health in rural middle school students. Methods All the students from four schools in a town of the city of Suzhou, were asked by the self-administered questionnaire to obtain the family information and the maternal separation condition caused by their mothers' out for work. The selected students except for postpartum complications were divided into three groups: early maternal separation, non-early maternal separation and the normal control group. Then adopting the multidimensional sub-health questionnaire of adolescents ( MSQA) to assess their own physical and psychological health. Results The scores of physical and psychological domains and dimensions in early maternal separation group and non-early maternal separation group was higher than the normal control group. Although the scorns decreased gradually, statistically non-early maternal separation group was also higher than the normal control group.There were significant difference in incidence of physical and total sub-health ( P < 0. 05 ) but no difference in psychological health ( P > 0. 05 ). Conclusion Students of early maternal separation group and non-early maternal separation group are in a high-risk of sub-health and there is a further influence in their development of physical and psychological health. It is a important guarantee for the healthy development of middle school students to have a sound maternal attachment.%目的 探讨早期母婴分离对农村中学生身体和心理健康的影响,为改善早期母婴分离中学生的身心健康提供依据.方法 采用自编式家庭一般情况问卷对宿州市某镇4所中学的学生进行调查,获得其家庭一般情况和因母亲外出打工导致的母婴分离情况,剔除有产后并发症的情况后将筛选出的中学生分成早期母婴分离组、非早期母婴分离组和正常对照组,运用"青少年亚健康多维评定问

  5. Difference Schemes and Applications

    Science.gov (United States)

    2015-02-06

    of the shallow water equations that is well suited for complex geometries and moving boundaries. Another (similar) regularization of...the solid wall extrapolation followed by the interpolation in the phase space (by solving the Riemann problem between the internal cell averages and...scheme. This Godunov-type scheme enjoys all major advantages of Riemann -problem-solver-free, non-oscillatory central schemes and, at the same time, have

  6. Efficient Threshold Signature Scheme

    Directory of Open Access Journals (Sweden)

    Sattar J Aboud

    2012-01-01

    Full Text Available In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of the RSA signature modulus. Also, the signing process of the proposed scheme is more efficient in terms of time complexity and interaction.

  7. Stateless Transitive Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    MA Chun-guang; CAI Man-chun; YANG Yi-xian

    2004-01-01

    A new practical method is introduced to transform the stateful transitive signature scheme to stateless one without the loss of security. According to the approach, two concrete stateless transitive signature schemes based on Factoring and RSA are presented respectively. Under the assumption of the hardness of factoring and one-more- RSA-inversion problem, both two schemes are secure under the adaptive chosen-message attacks in random oracle model.

  8. Early stage phase separation in pharmaceutical solid dispersion thin films under high humidity: improved spatial understanding using probe-based thermal and spectroscopic nanocharacterization methods.

    Science.gov (United States)

    Qi, Sheng; Moffat, Jonathan G; Yang, Ziyi

    2013-03-04

    Phase separation in pharmaceutical solid dispersion thin films under high humidity is still poorly understood on the submicrometer scale. This study investigated the phase separation of a model solid dispersion thin film, felodipine-PVP K29/32, prepared by spin-coating and analyzed using probe-based methods including atomic force microscopy, nanothermal analysis, and photothermal infrared microspectroscopy. The combined use of these techniques revealed that the phase separation process occurring in the thin films under high humidity is different from that in dry conditions reported previously. The initial stage of phase separation is primarily initiated in the bulk of the films as amorphous drug domains. Drug migration toward the surface of the solid dispersion film was then observed to occur under exposure to increased humidity. PVP cannot prevent phase separation of felodipine under high humidity but can minimize the crystallization of amorphous felodipine domains in the solid dispersion thin films. This study demonstrates the unique abilities of these nanocharacterization methods for studying, in three dimensions, the phase separation of thin films for pharmaceutical applications.

  9. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  10. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    Goutsias, J.; Heijmans, H.J.A.M.

    1998-01-01

    [PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis and synthes

  11. Separation Logic

    DEFF Research Database (Denmark)

    Reynolds, John C.

    2002-01-01

    expressions) for accessing and modifying shared structures, and for explicit allocation and deallocation of storage. Assertions are extended by introducing a "separating conjunction" that asserts that its sub-formulas hold for disjoint parts of the heap, and a closely related "separating implication". Coupled......, dynamically allocated arrays, and recursive procedures. We will also discuss promising future directions....

  12. [Separation anxiety. Theoretical considerations].

    Science.gov (United States)

    Blandin, N; Parquet, P J; Bailly, D

    1994-01-01

    The interest in separation anxiety is nowadays increasing: this disorder appearing during childhood may predispose to the occurrence of anxiety disorders (such as panic disorder and agoraphobia) and major depression into adulthood. Psychoanalytic theories differ on the nature of separation anxiety and its place in child development. For some authors, separation anxiety must be understood as resulting from the unconscious internal conflicts inherent in the individuation process and gradual attainment of autonomy. From this point of view, the fear of loss of mother by separation is not regarded as resulting from a real danger. However, Freud considers the primary experience of separation from protecting mother as the prototype situation of anxiety and compares the situations generating fear to separation experiences. For him, anxiety originates from two factors: the physiological fact is initiated at the time of birth but the primary traumatic situation is the separation from mother. This point of view may be compared with behavioral theories. Behavioral theories suggest that separation anxiety may be conditioned or learned from innate fears. In Freud's theory, the primary situation of anxiety resulting from the separation from mother plays a role comparable to innate fears. Grappling with the problem of separation anxiety, Bowlby emphasizes then the importance of the child's attachment to one person (mother or primary caregiver) and the fact that this attachment is instinctive. This point of view, based on the watch of infants, is akin to ethological theories on behaviour of non human primates. Bowlby especially shows that the reactions of infant separated from mother evolve on three stages: the phase of protestation which may constitute the prototype of adulthood anxiety, the phase of desperation which may be the prototype of depression, and the phase of detachment. He emphasizes so the role of early separations in the development of vulnerability to depression

  13. Separation of Isotopes via Dynamical Delocalization

    Institute of Scientific and Technical Information of China (English)

    Farhan Saif

    2008-01-01

    Based on the dynamical de-localization phenomenon we show that different isotopes of a material can be separated.We explain that the suggested scheme can be realized in the laboratory using presently available experimental facilities.

  14. Fast ion extraction in laser isotope separation

    Energy Technology Data Exchange (ETDEWEB)

    Hazak, G.; Gell, Y.; Boneh, Y.; Goshen, S.

    1980-10-01

    An analysis of the E x B scheme for fast ion extraction in laser isotope separation is presented. Using an analytically solvable model and a numerical simulation we have found that the scheme can meet the rather severe time and space restrictions imposed by the large cross section for charge exchange.

  15. CENTRIFUGAL SEPARATORS

    Science.gov (United States)

    Skarstrom, C.

    1959-03-10

    A centrifugal separator is described for separating gaseous mixtures where the temperature gradients both longitudinally and radially of the centrifuge may be controlled effectively to produce a maximum separation of the process gases flowing through. Tbe invention provides for the balancing of increases and decreases in temperature in various zones of the centrifuge chamber as the result of compression and expansions respectively, of process gases and may be employed effectively both to neutralize harmful temperature gradients and to utilize beneficial temperaturc gradients within the centrifuge.

  16. An Analysis of Enlisted Early Separations Under the Air Force’s and Navy’s VSI/SSB Programs: A Comparative Study

    Science.gov (United States)

    1994-03-01

    Involuntary separation is a technical term, says Lt. Gen . Billy J. Boles, USAF deputy chief of staff for Personnel. Many of the people who are...Maintenance 82 Special 41 Missile Systems Maintenance Investigations 45 Manned Aerospace Maintenance 87 Band 46 Munitions and Weapons 88 Paralegal 47 Vehicle

  17. A Fuzzy Commitment Scheme

    CERN Document Server

    Al-saggaf, Alawi A

    2008-01-01

    This paper attempt has been made to explain a fuzzy commitment scheme. In the conventional Commitment schemes, both committed string m and valid opening key are required to enable the sender to prove the commitment. However there could be many instances where the transmission involves noise or minor errors arising purely because of the factors over which neither the sender nor the receiver have any control. The fuzzy commitment scheme presented in this paper is to accept the opening key that is close to the original one in suitable distance metric, but not necessarily identical. The concept itself is illustrated with the help of simple situation.

  18. Near-optimal labeling schemes for nearest common ancestors

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Bistrup Halvorsen, Esben; Larsen, Kasper Green

    2014-01-01

    and Korman (STOC'10) established that labels in ancestor labeling schemes have size log n + Θ(log log n), our new lower bound separates ancestor and NCA labeling schemes. Our upper bound improves the 10 log n upper bound by Alstrup, Gavoille, Kaplan and Rauhe (TOCS'04), and our theoretical result even...

  19. Near-optimal labeling schemes for nearest common ancestors

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Bistrup Halvorsen, Esben; Larsen, Kasper Green

    2014-01-01

    and Korman (STOC'10) established that labels in ancestor labeling schemes have size log n + Θ(log log n), our new lower bound separates ancestor and NCA labeling schemes. Our upper bound improves the 10 log n upper bound by Alstrup, Gavoille, Kaplan and Rauhe (TOCS'04), and our theoretical result even...

  20. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...... of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit...

  1. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  2. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    the normal skin in the second stage. These tools are the Expectation-Maximization Algorithm, the quadratic discrimination function and a classification window of optimal size. Extrapolation of classification parameters of a given image to other images of the set is evaluated by means of Cohen's Kappa......A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  3. Simplification of the unified gas kinetic scheme

    Science.gov (United States)

    Chen, Songze; Guo, Zhaoli; Xu, Kun

    2016-08-01

    The unified gas kinetic scheme (UGKS) is an asymptotic preserving (AP) scheme for kinetic equations. It is superior for transition flow simulation and has been validated in the past years. However, compared to the well-known discrete ordinate method (DOM), which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The equilibrium part of the UGKS flux is calculated by analytical solution instead of the numerical quadrature in velocity space. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-Stokes (NS) equations and the conventional discrete ordinate method. Several simplification strategies are tested, through which we can identify the key ingredient of the Navier-Stokes asymptotic preserving property. Numerical tests show that, as long as the collision effect is built into the macroscopic numerical flux, the numerical scheme is Navier-Stokes asymptotic preserving, regardless the accuracy of the microscopic numerical flux for the velocity distribution function.

  4. 抑郁症与精神分裂症患者早年与父母分离经历的比较%Comparison of depression and schizophrenia patients experienced early separation from parents

    Institute of Scientific and Technical Information of China (English)

    郑东旭; 李晓驷; 耿峰; 季益富; 夏海涛

    2013-01-01

    Objective:This study was undertaken to explore the early parental separation experience of patients with depression and schizophrenia,and discuss the relationship between depression and the early parental separation experience.Method:Random sampling method was used.Totally 80 depression and 80 schizophrenia patients meeting the criteria of the international classification of diseases,tenth revision were included as the case groupes,and 80 age-and gender-and education matched normal people as the control group.Three groups were assessed with the early parental separation experience questionnaire.Results:The percentage of the early parental separation experience (x2 =5.01,11.02 respectively),the percentage of being in different province from parents during separation experiences(x2 =8.17,15.07 respectively),the percentage of negative evaluation to the separation experiences (x2 =12.57,9.99 respectively)in the depression group were significantly higher than those of the schizophrenia and the control group (P < 0.05 or P < 0.01).The raising people among the depression,schizophrenia(x2 =11.91)and control group(x2 =10.90)had all significant differences (all P < 0.05).Conclusion:The early parental separation experience may be one of the social psychological factors inducing depression in adult.%目的:调查和比较抑郁症与精神分裂症患者早年与父母分离经历,初步探讨早年与父母分离经历与抑郁症之间的关系. 方法:采用随机抽样方法,选取符合国际疾病和相关健康问题统计分类第10版抑郁症和精神分裂症诊断标准的患者各80例,选取80名年龄、性别、受教育年限匹配的正常人为对照组.采用自编早年分离经历调查问卷对3组进行调查. 结果:抑郁症组有早年与父母分离经历的比率(x2分别=5.01,11.02)、在分离期间与父母相距省外的比率(x2分别=8.17,15.07)及对分离经历的负面评价(x2分别=12.57,9.99)均高于精

  5. XTR-Kurosawa-Desmedt Scheme

    Institute of Scientific and Technical Information of China (English)

    DING XIU-HUAN; FU ZHI-GUO; ZHANG SHU-GONG

    2009-01-01

    This paper proposes an XTR version of the Kurosawa-Desmedt scheme. Our scheme is secure against adaptive choeen-ciphertext attack under the XTR version of the Decisional Diffie-Hellman assumption in the standard model. Comparing efficiency between the Kurosawa-Desmedt scheme and the proposed XTR-Kurosawa-Desmedt scheme, we find that the proposed scheme is more efficient than the Kurosawa-Desmedt scheme both in communication and computation without compromising security.

  6. On Choosing Multicomponent Multiphase System Separation Progress Optimization Criteria

    Science.gov (United States)

    Kulikov, A. M.

    2016-10-01

    The article describes the existing criteria of separation processes optimization. The possibility of application of the general theory of separation for calculation of technological schemes is being justified. The technological, thermodynamical, statistical and economic criteria of separation processes, methods of their analysis and comparison are briefly described. The method of selection of optimization process criteria with technology research, installation engineering schemes and under automatic control of separation processes, as well as statistical planning of extreme experiments was offered.

  7. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    It is usual practice to evaluate the success of a labelling scheme by looking at the awareness percentage, but in many cases this is not sufficient. The awareness percentage gives no indication of which of the consumer segments that are aware of and use labelling schemes and which do not. In the ......It is usual practice to evaluate the success of a labelling scheme by looking at the awareness percentage, but in many cases this is not sufficient. The awareness percentage gives no indication of which of the consumer segments that are aware of and use labelling schemes and which do not....... In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  8. Feasible Teleportation Schemes with Five-Atom Entangled State

    Institute of Scientific and Technical Information of China (English)

    XUE Zheng-Yuan; YI You-Min; CAO Zhuo-Liang

    2006-01-01

    Teleportation schemes with a five-atom entangled state are investigated. In the teleportation scheme Bell state measurements (BSMs) are difficult for physical realization, so we investigate another strategy using separate measurements instead of BSM based on cavity quantum electrodynamics techniques. The scheme of two-atom entangled state teleportation is a controlled and probabilistic one. For the teleportation of the three-atom entangled state, the scheme is a probabilistic one. The fidelity and the probability of the successful teleportation are also obtained.

  9. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  10. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......, namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  11. Energy-efficient FastICA implementation for biomedical signal separation.

    Science.gov (United States)

    Van, Lan-Da; Wu, Di-You; Chen, Chien-Shiun

    2011-11-01

    This paper presents an energy-efficient fast independent component analysis (FastICA) implementation with an early determination scheme for eight-channel electroencephalogram (EEG) signal separation. The main contributions are as follows: (1) energy-efficient FastICA using the proposed early determination scheme and the corresponding architecture; (2) cost-effective FastICA using the proposed preprocessing unit architecture with one coordinate rotation digital computer-based eigenvalue decomposition processor and the proposed one-unit architecture with the hardware reuse scheme; and (3) low-computation-time FastICA using the four parallel one-units architecture. The resulting power dissipation of the FastICA implementation for eight-channel EEG signal separation is 16.35 mW at 100 MHz at 1.0 V. Compared with the design without early determination, the proposed FastICA architecture implemented in united microelectronics corporation 90 nm 1P9M complementary metal-oxide-semiconductor process with a core area of 1.221 × 1.218 mm2 can achieve average energy reduction by 47.63%. From the post-layout simulation results, the maximum computation time is 0.29 s.

  12. Labeling Schemes with Queries

    OpenAIRE

    2006-01-01

    We study the question of ``how robust are the known lower bounds of labeling schemes when one increases the number of consulted labels''. Let $f$ be a function on pairs of vertices. An $f$-labeling scheme for a family of graphs $\\cF$ labels the vertices of all graphs in $\\cF$ such that for every graph $G\\in\\cF$ and every two vertices $u,v\\in G$, the value $f(u,v)$ can be inferred by merely inspecting the labels of $u$ and $v$. This paper introduces a natural generalization: the notion of $f$-...

  13. GPS Separator

    CERN Multimedia

    2016-01-01

    Footage of the 70 degree ISOLDE GPS separator magnet MAG70 as well as the switchyard for the Central Mass and GLM (GPS Low Mass) and GHM (GPS High Mass) beamlines in the GPS separator zone. In the GPS20 vacuum sector equipment such as the long GPS scanner 482 / 483 unit, faraday cup FC 490, vacuum valves and wiregrid piston WG210 and WG475 and radiation monitors can also be seen. Also the RILIS laser guidance and trajectory can be seen, the GPS main beamgate switch box and the actual GLM, GHM and Central Beamline beamgates in the beamlines as well as the first electrostatic quadrupoles for the GPS lines. Close up of the GHM deflector plates motor and connections and the inspection glass at the GHM side of the switchyard.

  14. HRS Separator

    CERN Multimedia

    2016-01-01

    Footage of the 90 and 60 degree ISOLDE HRS separator magnets in the HRS separator zone. In the two vacuum sectors HRS20 and HRS30 equipment such as the HRS slits SL240, the HRS faraday cup FC300 and wiregrid WG210 can be spotted. Vacuum valves, turbo pumps, beamlines, quadrupoles, water and compressed air connections, DC and signal cabling can be seen throughout the video. The HRS main and user beamgate in the beamline between MAG90 and MAG60 and its switchboxes as well as all vacuum bellows and flanges are shown. Instrumentation such as the HRS scanner unit 482 / 483, the HRS WG470 wiregrid and slits piston can be seen. The different quadrupoles and supports are shown as well as the RILIS guidance tubes and installation at the magnets and the different radiation monitors.

  15. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  16. Physical Angular Momentum Separation for QED

    CERN Document Server

    Sun, Weimin

    2016-01-01

    We study the non-uniqueness problem of the gauge-invariant angular momentum separation for the case of QED, which stems from the recent controversy concerning the proper definitions of the orbital angular momentum and spin operator of the individual parts of a gauge field system. For the free quantum electrodynamics without matter, we show that the basic requirement of Euclidean symmetry selects a unique physical angular momentum separation scheme from the multitude of the possible angular momentum separation schemes constructed using the various Gauge Invariant Extentions. Based on these results, we propose a set of natural angular momentum separation schemes for the case of interacting QED by invoking the formalism of asymptotic fields. Some perspectives on such a problem for the case of QCD are briefly discussed.

  17. Market performance and environmental policy. Four tradeable permits schemes

    Energy Technology Data Exchange (ETDEWEB)

    Boom, J.T.; Duizendstraal, A.; De Jong, R.; Koster, J.M.M.; Nentjes, A.; Zhang, Z.X. [Department of Economics and Public Finance of the University of Groningen ECOF, Groningen (Netherlands); Van Buiren, K.; Van Es, G.A.; De Groot, A.W.M.; Velthuijsen, J.W. [Foundation for Economic Research of the University of Amsterdam SEO, Amsterdam (Netherlands); Van Duyse, P.; Heijnes, H. [Applied Environmental Economics TME, The Hague (Netherlands); Dijkgraaf, E.; Varkevisser, M. [Research Centre for Economic Policy OCfEB, Erasmus Universiteit, Rotterdam (Netherlands); Wiersma, D.

    1998-08-01

    Six feasible schemes of tradeable permits are presented and the cost savings arising from the application of such schemes instead of conventional policies have been calculated. In this background study four other schemes are discussed. The major reason for their separate presentation is twofold: there was insufficient statistical information available to calculate potential cost savings that are sufficiently reliable and further study is needed to determine the most appropriate design of the schemes. Only after the questions about cost savings and design have been answered it can be established whether indeed introduction of the schemes will improve environmental effectiveness and cost effectiveness of environmental policy. The schemes to be presented in the next sections are tradeable permits for winning sand, for mortar and cement, for noise control on industrial sites, for packaging materials and for heavy metals in waste water and sludge. 13 refs.

  18. The separation of adult separation anxiety disorder.

    Science.gov (United States)

    Baldwin, David S; Gordon, Robert; Abelli, Marianna; Pini, Stefano

    2016-08-01

    The Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition (DSM-5) categorization of mental disorders places "separation anxiety disorder" within the broad group of anxiety disorders, and its diagnosis no longer rests on establishing an onset during childhood or adolescence. In previous editions of DSM, it was included within the disorders usually first diagnosed in infancy, childhood, or adolescence, with the requirement for an onset of symptoms before the age of 18 years: symptomatic adults could only receive a retrospective diagnosis, based on establishing this early onset. The new position of separation anxiety disorder is based upon the findings of epidemiological studies that revealed the unexpectedly high prevalence of the condition in adults, often in individuals with an onset of symptoms after the teenage years; its prominent place within the DSM-5 group of anxiety disorders should encourage further research into its epidemiology, etiology, and treatment. This review examines the clinical features and boundaries of the condition, and offers guidance on how it can be distinguished from other anxiety disorders and other mental disorders in which "separation anxiety" may be apparent.

  19. Effect of letter separation on computerised visual acuity measurements: comparison with the gold standard Early Treatment Diabetic Retinopathy Study (ETDRS) chart.

    Science.gov (United States)

    Shah, Nilpa; Laidlaw, D Alistair H; Brown, Graham; Robson, Chloe

    2010-03-01

    Contour interaction plays an important role in letter recognition and has long been known to influence clinical visual acuity measurements. LogMAR charts originally employed between-letter and line spacing of one letter width/height; however, in more recent designs, half letter width spacing has become accepted without validation. COMPlog is a computerised visual acuity measurement device being developed and validated for routine and research clinical use and is available commercially. This study was performed to investigate the effect of letter separation on computerised visual acuity measurements. An iterative series of experiments was performed in which test and retest fully interpolated five letters-per-line logMAR visual acuity measurements were taken in three groups of a total 100 adult subjects. Each group had visual acuity measured using ETDRS charts 1 and 2 and on COMPlog using various combinations of letter and line spacing. The first group consisted of 31 subjects tested using 3.75 and 2.50 stroke width spacing, the second 45 subjects using 2.50 and 1.25 stroke width spacing and the last group, 24 subjects tested using 1.90 stroke width spacing. The methods of Bland and Altman were used to analyse the data. No significant bias was noted between the gold standard ETDRS measurements and those taken using COMPlog with 3.75 stroke width spacing. Significant bias of half a logMAR line was found with crowding of 1.90 and 1.25 stroke widths. A small systematic bias with a reduction of 1 ETDRS letter was found with spacing of 2.50 stroke widths which has not been demonstrated in previous validation studies. Crowding of 2.50 stroke widths is the smallest spacing which can be used in the design of COMPlog.

  20. Robust Scheme for Long-Distance Teleportation of an Unknown Atomic State

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    A scheme is presented for the long-distance teleportation of an unknown atomic state between two separated cavities. The scheme is based on the Raman coupling and cavity decay. In the scheme, the effective atom-cavity coupling strength is much smaller than the cavity decay rate and thus cavities of high quality factor are unnecesssary.

  1. 神经症性障碍患者早年与父母分离经历的相关研究%Correlation of neurotic disorders and schizophrenia patients experienced early separation from parents

    Institute of Scientific and Technical Information of China (English)

    谢美玲; 李晓驷; 夏海涛; 王安珍; 蔡春岚

    2014-01-01

    Objective To explore the early parental separation experience of patients with neurotic disorders and schizophrenia, and discuss the relationship between neurotic disorders and the early parental separation experience. Methods Totally 100 neurotic disorders and 100 schizophrenia patients meeting the criteria of the international sta-tistical classification of diseases and related health problems 10 th revision ( ICD-10 ) were chosen as the case groups, and 100 age-and tender-Q and education matched normal people were chosen as the control group using random sampling method. Three groups were surveyed with the early parental separation experience questionnaire. Results The percentage of the early parental separation experience (χ2 =7.113 ,15.092 respectively ) , the per-centage of being in different province from parents during separation experiences (χ2 =8.213 ,10.425 respective-ly), the percentage of negative evaluation to the separation experiences (χ2 =11.051,9. 273 respectively) in the neurotic disorders group was significantly higher than those of the schizophrenia and the normal group ( P<0.05 or P<0.01). In the type of raising people among the neurotic disorders, schizophrenia (χ2 =10.433) and control group (χ2 =12.273 ) had all significant differences ( all P<0.05 ) . Both the schizophrenia group (χ2 =12.159 , P<0.05 ) and the normal group (χ2 =12.221 , P <0 . 05 ) had significant difference with the neurotic disorders group in the frequency of contacting parents after separating(subjective feelings), etc. Conclusion Compared with normal people, neurotic disorders patient have more early separation experiences with parents, and most of their subjective feelings of separation experience are negative.%目的调查和比较神经症性障碍与精神分裂症患者以及正常者之间早年与父母分离经历,初步探讨早年与父母分离经历与神经症性障碍之间的关系。方法采用随机抽样方法,选取符合国际疾病及有关

  2. Magnetic separation in microfluidic systems

    DEFF Research Database (Denmark)

    Smistrup, Kristian

    2007-01-01

    This Ph.D. thesis presents theory, modeling, design, fabrication, experiments and results for microfluidic magnetic separators. A model for magnetic bead movement in a microfluidic channel is presented, and the limits of the model are discussed. The effective magnetic field gradient is defined...... for fabrication of silicon based systems. This fabrication scheme is explained, and it is shown how, it is applied with variations for several designs of magnetic separators. An experimental setup for magnetic separation experiments has been developed. It has been coupled with an image analysis program....... It is shown conceptually how such a system can be applied for parallel biochemical processing in a microfluidic system. ’Passive’ magnetic separators are presented, where on-chip soft magnetic elements are magnetized by an external magnetic field and create strong magnetic fields and gradients inside...

  3. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  4. 生命早期孤养对小鼠应激易感性的影响%Effect of early maternal separation on susceptibility to stress of adult mice

    Institute of Scientific and Technical Information of China (English)

    周利飞; 何静静; 胡意员; 邢晓玲; 何金彩

    2013-01-01

    Objective: To assess the effects of the early maternal separation (MS) paradigm on susceptibility to stress and the cognitive abilities of adult mice. Methods: Mice were randomly divided into 3 groups: normal feeding group (N: n=9), long maternal separation (LMS: 3 hour, n=9) and brief maternal separations(BMS: 15 min, n=8 ) from postnatal 2-21 days. During adulthood, 3 groups mice received acute unpredictable mild stress of 3 days. The learning and memory abilities were measured by Morris water maze and behavior was measured by open-field test and Elevated Plus Maze after stress. Results: Compared with the control group, LMS increased number of crossing and distance in peripheral area (P<0.05), and in the total area of open field (P<0.05). LMS enhanced exploration of closed arms in the elevated plus maze (P<0.05). But, there is no unified conclusion about the effects of susceptibility to stress of adult mice in BMS. However in the Morris water maze, there is no significant difference in three groups in the learning and memory abilities. It indicated that early maternal separation increased susceptibility of anxiety-like behavior. Conclusion: Early maternal separation can increase susceptibility to stress of adult mice, there is no significant difference in three groups in the learning and memory abilities.%目的:观察生命早期母婴分离对小鼠应激易感性及认知能力的影响.方法:新生的小鼠于出生后第2天随机分为正常饲养组(N组:正常饲养,n=9)、长时间母婴分离组(LMS组:分离3h,n=9)及短时间母婴分离组(BMS组:分离15 min,n=8).3组小鼠出生后21 d断乳,断乳后常规饲养.小鼠成年后,用幽闭+电击的方法对3组小鼠给予急性应激,应激之后借助旷场实验、高架十字迷宫、水迷宫实验评价小鼠的情绪及学习记忆能力.结果:在旷场实验中,与N组比较,LMS及BMS组小鼠的外周路程明显增加,差异具有统计学意义(P< 0.05);在高架十字迷宫

  5. Modulation scheme for electron-electron double resonance spectroscopy

    Science.gov (United States)

    Mehlkopf, A. F.; Kuiper, F. G.; Smidt, J.; Tiggelman, T. A.

    1983-06-01

    A modulation scheme for electron-electron double resonance (ELDOR) spectrometers is presented. With this scheme an optimum stabilization signal for locking the pump microwave generator to the pumped electron paramagnetic resonance (EPR) line is generated. A separate pump power level and a separate magnetic field modulation amplitude are used for the purpose of locking. In general, such a modulation scheme introduces false ELDOR lines. These false lines disturb the real ELDOR signals, or introduce an ELDOR signal in the absence of any communication between the observed EPR line and the pumped EPR line. With the described modulation scheme the frequencies of the false ELDOR signals are limited to even multiples of the frequency of the wanted ELDOR signals. This makes a suppression of the false ELDOR lines easy.

  6. A New Deferred Sentencing Scheme

    Directory of Open Access Journals (Sweden)

    N. K. Chakravarti

    1968-10-01

    Full Text Available A new deferred sentencing scheme resembling double sampling scheme has been suggested from viewpoint of operational and administrative. It is recommended particularly when the inspection is destructive. The O.C. curves of the scheme for two sample sizes of 5 and 10 have been given.

  7. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  8. Bonus Schemes and Trading Activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; Ter Horst, J.R.; Tobler, P.N.

    2013-01-01

    Abstract: Little is known about how different bonus schemes affect traders’ propensity to trade and which bonus schemes improve traders’ performance. We study the effects of linear versus threshold (convex) bonus schemes on traders’ behavior. Traders purchase and sell shares in an experimental stock

  9. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  10. Two Improved Digital Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    In this paper, two improved digital signature schemes are presented based on the design of directed signaturescheme [3]. The peculiarity of the system is that only if the scheme is specific recipient, the signature is authenticated.Since the scheme adds the screen of some information parameters, the difficulty of deciphered keys and the security ofdigital signature system are increased.

  11. CONSIDERATIONS CONCERNING GUARANTEE SCHEMES

    Directory of Open Access Journals (Sweden)

    EMILIA CLIPICI

    2013-05-01

    Full Text Available When a large withdrawal from banks occurs, customers withdraw their deposits, so banks are likely to go bankrupt because of liquidity problems. There are several mechanisms that allow the banking system to avoid the phenomenon of massive withdrawals from banks. The most effective one is the deposit insurance. The deposit insurance is seen primarily as a means of protecting depositors of credit institutions, and secondly as a means of ensuring the stability of the banking system. This article described deposit guarantee scheme in Romania and other country.

  12. Comparing document classification schemes using k-means clustering

    OpenAIRE

    Šivić, Artur; Žmak, Lovro; Dalbelo Bašić, Bojana; Moens, Marie-Francine

    2008-01-01

    In this work, we jointly apply several text mining methods to a corpus of legal documents in order to compare the separation quality of two inherently different document classification schemes. The classification schemes are compared with the clusters produced by the k-means algorithm. In the future, we believe that our comparison method will be coupled with semi-supervised and active learning techniques. Also, this paper presents the idea of combining k-means and Principal Component Analysis...

  13. Joint Scheme for Physical Layer Error Correction and Security

    OpenAIRE

    Oluwayomi Adamo; Varanasi, M. R.

    2011-01-01

    We present a joint scheme that combines both error correction and security at the physical layer. In conventional communication systems, error correction is carried out at the physical layer while data security is performed at an upper layer. As a result, these steps are done as separate steps. However there has been a lot of interest in providing security at the physical layer. As a result, as opposed to the conventional system, we present a scheme that combines error correction and data sec...

  14. A simplification of the unified gas kinetic scheme

    CERN Document Server

    Chen, Songze; Xu, Kun

    2016-01-01

    Unified gas kinetic scheme (UGKS) is an asymptotic preserving scheme for the kinetic equations. It is superior for transition flow simulations, and has been validated in the past years. However, compared to the well known discrete ordinate method (DOM) which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. Based on the observation that the equilibrium part of the UGKS fluxes can be evaluated analytically, the equilibrium part in the UGKS flux is not necessary to be discretized in velocity space. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-S...

  15. Secure mediated certificateless signature scheme

    Institute of Scientific and Technical Information of China (English)

    YANG Chen; MA Wen-ping; WANG Xin-mei

    2007-01-01

    Ju et al proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in their proposed scheme, once a valid signature has been produced, the signer can recover his private key information and the instantaneous revocation property will be damaged. Furthermore, an improved mediated signature scheme, which can eliminate these disadvantages, is proposed, and security proof of the improved scheme under elliptic curve factorization problem (ECFP) assumption and bilinear computational diffie-hellman problem (BCDH) assumption is also proposed.

  16. EFECTOS DE LA SEPARACIÓN MATERNA TEMPRANA SOBRE EL DESEMPEÑO EN EL LABERINTO EN CRUZ ELEVADO EN RATAS ADULTAS Effects of Early Maternal Separation on The Performance in the Elevated Plus Maze in Adult Rats

    Directory of Open Access Journals (Sweden)

    DIEGO ARMANDO LEÓN RODRÍGUEZ

    2012-04-01

    Full Text Available Se ha demostrado que alteraciones en la interacción madre-cría produce efectos duraderos sobre el desarrollo cerebral y comportamental; de esta forma sujetos expuestos a estrés por separación materna temprana (SMT presentan variaciones en los comportamientos indicadores de ansiedad. El objetivo del presente estudio fue investigar los efectos específicos del estrés por SMT sobre los comportamientos indicadores de ansiedad en ratas Wistar adultas machos y hembras. Las ratas fueron anidadas con ciclo luz/oscuridad invertido (7 p.m./7 a.m., agua y comida ad libitum. El procedimiento de separación se realizó dos veces diarias durante los días postnatales 1 al 21 (7:00 a 10:00 y 13:00 a 16:00 p.m.. Los comportamientos indicadores de ansiedad fueron evaluados por medio del laberinto en cruz elevado (LCE cuando las crías alcanzaron un peso de 230 g. Se encontró que el estrés por SMT tiene efectos específicos para cada sexo sobre los comportamientos relacionados con la ansiedad, las hembras separadas maternalmente presentaron un perfil ansioso menor que las no separadas y los machos separados mostraron mayor conflicto exploración/evitación. Estos resultados corroboran hallazgos preliminares de nuestro laboratorio, en los que se evidencia interacción entre la vulnerabilidad ante desafíos ambientales tempranos y los mecanismos compensatorios del cuidado materno.It has been demonstrated that disruption of mother-pup interaction during early life exerts long-lasting effects on the brain and behavioral development. Therefore subjects exposed to early maternal separation stress (MS show variations in anxiety-like behaviors. The aim of this study was to investigate the specific effects of SMT stress on anxiety-like behaviors in adult male and female Wistar rats. Rats were housed with reversed light dark cycle (light on at 7 p.m., off at 7 a.m., water and food ad libitum. Separation was carried out in postnatal days 1 to 21, twice daily in dark

  17. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...

  18. Separation science and technology: an ORNL perspective

    Energy Technology Data Exchange (ETDEWEB)

    Pruett, D.J.

    1986-05-01

    This report was prepared as a summary of a fourfold effort: (1) to examine schemes for defining and categorizing the field of separation science and technology; (2) to review several of the major categories of separation techniques in order to determine the most recent developments and future research needs; (3) to consider selected problems and programs that require advances in separation science and technology as a part of their solution; and (4) to propose suggestions for new directions in separation research at Oak Ridge National Laboratory (ORNL).

  19. Separation science and technology: an ORNL perspective

    Energy Technology Data Exchange (ETDEWEB)

    Pruett, D.J.

    1986-05-01

    This report was prepared as a summary of a fourfold effort: (1) to examine schemes for defining and categorizing the field of separation science and technology; (2) to review several of the major categories of separation techniques in order to determine the most recent developments and future research needs; (3) to consider selected problems and programs that require advances in separation science and technology as a part of their solution; and (4) to propose suggestions for new directions in separation research at Oak Ridge National Laboratory (ORNL).

  20. Pretzel scheme for CEPC

    Science.gov (United States)

    Geng, Huiping

    2016-11-01

    CEPC was proposed as an electron and positron collider ring with a circumference of 50-100 km to study the Higgs boson. Since the proposal was made, the lattice design for CEPC has been carried out and a preliminary conceptual design report has been written at the end of 2014. In this paper, we will describe the principles of pretzel scheme design, which is one of most important issues in CEPC lattice design. Then, we will show the modification of the lattice based on the lattice design shown in the Pre-CDR. The latest pretzel orbit design result will also be shown. The issues remained to be solved in the present design will be discussed and a brief summary will be given at the end.

  1. Vocal Motor Schemes.

    Science.gov (United States)

    McCune, Lorraine; Vihman, Marilyn May

    A study examined the consistency of consonant use in the infant's transition period from babbling to early words. Phonetic data were collected from the speech of 10 infants aged 9 to 15 months. Analysis of consonant distribution patterns indicate striking segmental preferences in all 10 children, with some segments more prominent for the sample as…

  2. Dynamic p-enrichment schemes for multicomponent reactive flows

    CERN Document Server

    Michoski, C; Dawson, C; Kubatko, E J; Wirasaet, D; Westerink, J J

    2011-01-01

    We present a family of p-enrichment schemes. These schemes may be separated into two basic classes: the first, called \\emph{fixed tolerance schemes}, rely on setting global scalar tolerances on the local regularity of the solution, and the second, called \\emph{dioristic schemes}, rely on time-evolving bounds on the local variation in the solution. Each class of $p$-enrichment scheme is further divided into two basic types. The first type (the Type I schemes) enrich along lines of maximal variation, striving to enhance stable solutions in "areas of highest interest." The second type (the Type II schemes) enrich along lines of maximal regularity in order to maximize the stability of the enrichment process. Each of these schemes are tested over a pair of model problems arising in coastal hydrology. The first is a contaminant transport model, which addresses a declinature problem for a contaminant plume with respect to a bay inlet setting. The second is a multicomponent chemically reactive flow model of estuary e...

  3. Performance Analysis of Two Ethernet over E1 Schemes

    Institute of Scientific and Technical Information of China (English)

    CHEN Wentao; JIN Depeng; ZENG Lieguang

    2007-01-01

    The Ethernet over E1 approach,which takes advantage of widely deployed telecom networks,is an efficient and economical way to interconnect two Ethernets in different regions.Two Ethernet over E1 schemes, namely a byte granularity scheme and a frame granularity scheme are discussed. The byte granularity scheme partitions Ethernet frames into several pieces for transmission and has a strict requirement on the maximum delay difference of multiple E1 links. To solve this problem, the newly proposed frame granularity scheme transmits separately each frame through E1 links without any partitioning. The architecture designs of both schemes are presented. This paper evaluates the throughput and delay performances of both schemes, both analytically from results calculated from delay models and using test results from field programmable gate array (FPGA) implementation. Although the frame granularity scheme has a slightly worse delay performance, it has a higher throughput, and is the only choice able to overcome large delay differences of the E1 links.

  4. Unconditional two-mode squeezing of separated atomic ensembles

    CERN Document Server

    Parkins, A S; Solano, E

    2005-01-01

    We propose schemes for the unconditional preparation of a two-mode squeezed state of effective bosonic modes realized in a pair of atomic ensembles interacting collectively with optical cavity and laser fields. The scheme uses Raman transitions between stable atomic ground states and under ideal conditions produces pure entangled states in the steady state. The scheme works both for ensembles confined within a single cavity and for ensembles confined in separate, cascaded cavities.

  5. Improved Ternary Subdivision Interpolation Scheme

    Institute of Scientific and Technical Information of China (English)

    WANG Huawei; QIN Kaihuai

    2005-01-01

    An improved ternary subdivision interpolation scheme was developed for computer graphics applications that can manipulate open control polygons unlike the previous ternary scheme, with the resulting curve proved to be still C2-continuous. Parameterizations of the limit curve near the two endpoints are given with expressions for the boundary derivatives. The split joint problem is handled with the interpolating ternary subdivision scheme. The improved scheme can be used for modeling interpolation curves in computer aided geometric design systems, and provides a method for joining two limit curves of interpolating ternary subdivisions.

  6. Formal Verification of NTRUEncrypt Scheme

    Directory of Open Access Journals (Sweden)

    Gholam Reza Moghissi

    2016-04-01

    Full Text Available In this paper we explore a mechanized verification of the NTRUEncrypt scheme, with the formal proof system Isabelle/HOL. More precisely, the functional correctness of this algorithm, in its reduced form, is formally verified with computer support. We show that this scheme is correct what is a necessary condition for the usefulness of any cryptographic encryption scheme. Besides, we present a convenient and application specific formalization of the NTRUEncrypt scheme in the Isabelle/HOL system that can be used in further study around the functional and security analysis of NTRUEncrypt family.

  7. Chaotic communication scheme with multiplication

    Science.gov (United States)

    Bobreshov, A. M.; Karavaev, A. A.

    2007-05-01

    A new scheme of data transmission with nonlinear admixing is described, in which the two mutually inverse operations (multiplication and division) ensure multiplicative mixing of the informative and chaotic signals that provides a potentially higher degree of security. A special feature of the proposed scheme is the absence of limitations (related to the division by zero) imposed on the types of informative signals.

  8. Homographic scheme for Riccati equation

    CERN Document Server

    Dubois, François

    2011-01-01

    In this paper we present a numerical scheme for the resolution of matrix Riccati equation, usualy used in control problems. The scheme is unconditionnaly stable and the solution is definite positive at each time step of the resolution. We prove the convergence in the scalar case and present several numerical experiments for classical test cases.

  9. Differential operators and automorphism schemes

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    The ring of global differential operators of a variety is in closed and deep relation with its automorphism scheme.This relation can be applied to the study of homogeneous schemes,giving some criteria of homogeneity,a generalization of Serre-Lang theorem,and some consequences about abelian varieties.

  10. An advanced leakage scheme for neutrino treatment in astrophysical simulations

    CERN Document Server

    Perego, Albino; Käppeli, Roger

    2015-01-01

    We present an Advanced Spectral Leakage (ASL) scheme to model neutrinos in the context of core-collapse supernovae and compact binary mergers. Based on previous gray leakage schemes, the ASL scheme computes the neutrino cooling rates by interpolating local production and diffusion rates (relevant in optically thin and thick regimes, respectively), separately for discretized values of the neutrino energy. Neutrino trapped components are also modeled, based on equilibrium and timescale arguments. The better accuracy achieved by the spectral treatment allows a more reliable computation of neutrino heating rates in optically thin conditions. The scheme has been calibrated and tested against Boltzmann transport in the context of Newtonian spherically symmetric models of core-collapse supernovae. ASL shows a very good qualitative and a partial quantitative agreement, for key quantities from collapse to a few hundreds of milliseconds after core bounce. We have proved the adaptability and flexibility of our ASL schem...

  11. MULTIPLE TRELLIS CODED ORTHOGONAL TRANSMIT SCHEME FOR MULTIPLE ANTENNA SYSTEMS

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    In this paper, a novel multiple trellis coded orthogonal transmit scheme is proposed to exploit transmit diversity in fading channels. In this scheme, a unique vector from a set of orthogonal vectors is assigned to each transmit antenna. Each of the output symbols from the multiple trellis encoder is multiplied with one of these orthogonal vectors and transmitted from corresponding transmit antennas. By correlating with corresponding orthogonal vectors, the receiver separates symbols transmitted from different transmit antennas.This scheme can be adopted in coherent/differential systems with any number of transmit antennas. It is shown that the proposed scheme encompasses the conventional trellis coded unitary space-time modulation based on the optimal cyclic group codes as a special case. We also propose two better designs over the conventional trellis coded unitary space-time modulation. The first design uses 8 Phase Shift Keying (8-PSK) constellations instead of 16 Phase Shift Keying (16-PSK) constellations in the conventional trellis coded unitary space-time modulation. As a result, the product distance of this new design is much larger than that of the conventional trellis coded unitary space-time modulation. The second design introduces constellations with multiple levels of amplitudes into the design of the multiple trellis coded orthogonal transmit scheme. For both designs, simulations show that multiple trellis coded orthogonal transmit schemes can achieve better performance than the conventional trellis coded unitary space-time schemes.

  12. The Occupational Pension Schemes Survey 2006

    OpenAIRE

    Sarah Levy; David Miller

    2008-01-01

    Presents findings on the number of schemes, their membership and contributions to schemes by employers and employeesThis article presents findings on the number of occupational pension schemes in 2006, their membership and contributions to schemes by employers and employees. It is based on the Occupational Pension Schemes Annual Report (2006 edition). The findings distinguish between public and private sector schemes and include breakdowns by scheme status (open, closed, frozen or winding up)...

  13. Schemes for Deterministic Polynomial Factoring

    CERN Document Server

    Ivanyos, Gábor; Saxena, Nitin

    2008-01-01

    In this work we relate the deterministic complexity of factoring polynomials (over finite fields) to certain combinatorial objects we call m-schemes. We extend the known conditional deterministic subexponential time polynomial factoring algorithm for finite fields to get an underlying m-scheme. We demonstrate how the properties of m-schemes relate to improvements in the deterministic complexity of factoring polynomials over finite fields assuming the generalized Riemann Hypothesis (GRH). In particular, we give the first deterministic polynomial time algorithm (assuming GRH) to find a nontrivial factor of a polynomial of prime degree n where (n-1) is a smooth number.

  14. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., the price of power, conditions for conventional power producers, and changes in import and export of power...... RES-E support schemes already has a common liberalised power market. In this case the introduction of a common support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system...

  15. A new semiclassical decoupling scheme for electronic transitions in molecular collisions - Application to vibrational-to-electronic energy transfer

    Science.gov (United States)

    Lee, H.-W.; Lam, K. S.; Devries, P. L.; George, T. F.

    1980-01-01

    A new semiclassical decoupling scheme (the trajectory-based decoupling scheme) is introduced in a computational study of vibrational-to-electronic energy transfer for a simple model system that simulates collinear atom-diatom collisions. The probability of energy transfer (P) is calculated quasiclassically using the new scheme as well as quantum mechanically as a function of the atomic electronic-energy separation (lambda), with overall good agreement between the two sets of results. Classical mechanics with the new decoupling scheme is found to be capable of predicting resonance behavior whereas an earlier decoupling scheme (the coordinate-based decoupling scheme) failed. Interference effects are not exhibited in P vs lambda results.

  16. Provable Secure Identity Based Generalized Signcryption Scheme

    CERN Document Server

    Yu, Gang; Shen, Yong; Han, Wenbao

    2010-01-01

    According to actual needs, generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of the new scheme in this complete model. Comparing with existing identity based generalized signcryption, the new scheme has less implementation complexity. Moreover, the new scheme has comparable computation complexity with the existing normal signcryption schemes.

  17. Fictional Separation Logic

    DEFF Research Database (Denmark)

    Jensen, Jonas Buhrkal; Birkedal, Lars

    2012-01-01

    , separation means physical separation. In this paper, we introduce \\emph{fictional separation logic}, which includes more general forms of fictional separating conjunctions P * Q, where "*" does not require physical separation, but may also be used in situations where the memory resources described by P and Q...

  18. Training-Based Schemes are Suboptimal for High Rate Asynchronous Communication

    CERN Document Server

    Chandar, Venkat; Wornell, Gregory W

    2009-01-01

    We consider asynchronous point-to-point communication. Building on a recently developed model, we show that training based schemes, i.e., communication strategies that separate synchronization from information transmission, perform suboptimally at high rate.

  19. Underground hydro scheme for Ullapool

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    Scoltish and Southern Energy has awarded a contract for a new hydropower plant Scotland, the company's first hydro project since the 1960s. The S6 million scheme will be built by Miller Civil Engineering Services Ltd.

  20. New Ideas on Labeling Schemes

    DEFF Research Database (Denmark)

    Rotbart, Noy Galil

    evaluation of fully dynamic labeling schemes. Due to a connection between adjacency labeling schemes and the graph theoretical study of induced universal graphs, we study these in depth and show novel results for bounded degree graphs and power-law graphs. We also survey and make progress on the related......With ever increasing size of graphs, many distributed graph systems emerged to store, preprocess and analyze them. While such systems ease up congestion on servers, they incur certain penalties compared to centralized data structure. First, the total storage required to store a graph...... in a distributed fashion increases. Second, attempting to answer queries on vertices of a graph stored in a distributed fashion can be significantly more complicated. In order to lay theoretical foundations to the first penalty mentioned a large body of work concentrated on labeling schemes. A labeling scheme...

  1. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  2. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  3. An arbitrated quantum signature scheme

    CERN Document Server

    Zeng, G; Zeng, Guihua; Keitel, Christoph H.

    2002-01-01

    The general principle for a quantum signature scheme is proposed and investigated based on ideas from classical signature schemes and quantum cryptography. The suggested algorithm is implemented by a symmetrical quantum key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and relies on the availability of an arbitrator. We can guarantee the unconditional security of the algorithm, mostly due to the correlation of the GHZ triplet states and the use of quantum one-time pads.

  4. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  5. Separation Anxiety (For Parents)

    Science.gov (United States)

    ... Kids to Be Smart About Social Media Separation Anxiety KidsHealth > For Parents > Separation Anxiety Print A A ... both of you get through it. About Separation Anxiety Babies adapt pretty well to other caregivers. Parents ...

  6. Separation Anxiety (For Parents)

    Science.gov (United States)

    ... Feeding Your 1- to 2-Year-Old Separation Anxiety KidsHealth > For Parents > Separation Anxiety A A A ... both of you get through it. About Separation Anxiety Babies adapt pretty well to other caregivers. Parents ...

  7. Application of a Uniform Price Quality Adjusted Discount Auction for Assigning Voluntary Separation Pay

    Science.gov (United States)

    2011-03-01

    7 4. Temporary Early Retirement Authority (TERA) ............................7 C. PROBLEMS...Special Separation Benefit TERA Temporary Early Retirement Allowance USMCMP United States Marine Corps Manpower Planners VSI Voluntary Separation...system, the voluntary separation incentive, the special 2 separation benefit, and the Temporary Early Retirement Authority (TERA) to accomplish

  8. Should Science and Arts Education Be Separated?

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    China’s practice of separating science and arts education has a long and complicated history. Back in the early 1950s, China decided to adopt the Soviet Union’s practice of separating science and arts education into two systems, the upshot of which was many universities finding themselves divided into

  9. A New Batch Verifying Scheme for Identifying Illegal Signatures

    Institute of Scientific and Technical Information of China (English)

    Adrian Atanasiu

    2013-01-01

    The concept of batch verifying multiple digital signatures is to find a method by which multiple digital signatures can be verified simultaneously in a lower time complexity than separately verifying all the signatures.In this article,we analyze the complexity of the batch verifying schemes defined by Li,Hwang and Chen in 2010,and propose a new batch verifying multiple digital signature scheme,in two variants:one for RSA-by completing the Harn's schema with an identifying illegal signatures algorithm,and the other adapted for a modified Elliptic Curve Digital Signature Algorithm protocol.

  10. Provable Secure Identity Based Generalized Signcryption Scheme

    OpenAIRE

    Yu, Gang; Ma, Xiaoxiao; Shen, Yong; Han, Wenbao

    2010-01-01

    According to actual needs, generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of the new scheme in this complete model. Comparing with existing identity based generalized signcryption...

  11. 分离性焦虑障碍史与成年期精神疾病的关系(综述)%Relationship between medical history of separation anxiety disorder in early life and mental diseases in adulthood (Review)

    Institute of Scientific and Technical Information of China (English)

    申自力; 王传升; 刘海燕; 刘丽琼

    2012-01-01

    This paper reviewed the literatures from the bibliographic database PubMed on the relation between separation anxiety disorder (SAD) in early life and mental diseases in adulthood. The data indicated that SAD was related to several different mental diseases in adulthood. The longitudinal designed studies supported that SAD served as a risk for adult anxiety disorders spectrum or depression. However, whether SAD is a risk for dysthymic, bipolar, personality and eating disorder in adulthood was uncertainty, so further studies based on longitudinal design are needed. It was also found that SAD usually comorbid with gender identity disorder in childhood, and such co-morbidity might influence individual psychosexual development The limitation among these literatures was, when the relation between SAD and mental disease in adulthood was examined, the effect caused by genetic and environmental variables or comorbidity variables was uncontrolled, and such control was crucial for the study to determine whether SAD served as a risk or how high of the risk rate contributed by SAD.%本文对早期分离性焦虑障碍史与成年期精神疾病两者关系的国外研究文献进行了综述.分析表明:分离性焦虑障碍史与成年期多种精神疾病之间存在关联,纵向研究结果支持分离性焦虑障碍史作为成年期焦虑障碍谱系及抑郁的风险因素,但其是否作为成年期心境恶劣、双相情感障碍、人格障碍、进食障碍的风险因素还需纵向研究的确认.此外,在儿童期,分离性焦虑障碍与性别认同障碍存在共患关系,可能对个体性心理发展产生影响.现有研究中存在的不足是,在检验分离性焦虑障碍史与成年期精神疾病两者关系时,未见有对遗传和环境变量的控制,也少见有对共病进行控制,而这类控制对确认其是否作为风险及风险大小是十分必要的.

  12. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  13. Energy partitioning schemes: a dilemma.

    Science.gov (United States)

    Mayer, I

    2007-01-01

    Two closely related energy partitioning schemes, in which the total energy is presented as a sum of atomic and diatomic contributions by using the "atomic decomposition of identity", are compared on the example of N,N-dimethylformamide, a simple but chemically rich molecule. Both schemes account for different intramolecular interactions, for instance they identify the weak C-H...O intramolecular interactions, but give completely different numbers. (The energy decomposition scheme based on the virial theorem is also considered.) The comparison of the two schemes resulted in a dilemma which is especially striking when these schemes are applied for molecules distorted from their equilibrium structures: one either gets numbers which are "on the chemical scale" and have quite appealing values at the equilibrium molecular geometries, but exhibiting a counter-intuitive distance dependence (the two-center energy components increase in absolute value with the increase of the interatomic distances)--or numbers with too large absolute values but "correct" distance behaviour. The problem is connected with the quick decay of the diatomic kinetic energy components.

  14. Interference Phenomenon for Different Chiral Bosonization Schemes

    CERN Document Server

    Abreu, Everton M C; Abreu, Everton M C; Wotzasek, Clovis

    1998-01-01

    We study the relationship between different chiral bosonization schemes (CBS) in the context of the soldering formalism\\cite{MS}, that considers the phenomenon of interference in the quantum field theory\\cite{ABW}. This analysis is done in the framework put forward by Siegel\\cite{WS} and by Floreanini and Jackiw\\cite{FJ} (FJ). We propose a field redefinition that discloses the presence of a noton, a non dynamical field, in Siegel's formulation for chiral bosons. The presence of a noton in the Siegel CBS is a new and surprising result, that separates dynamics from symmetry by diagonalising the Siegel action into the FJ and the noton action. While the first describes the chiral dynamics, the noton carries the symmetry contents, acquiring dynamics upon quantization and is fully responsible for the Siegel anomaly. The diagonal representation proposed here is used to study the effect of quantum interference between gauged rightons and leftons.

  15. Combined Control Scheme for Monitoring Quality Characteristics

    Directory of Open Access Journals (Sweden)

    Adekeye K.S.

    2014-07-01

    Full Text Available In the literature, the Exponentially Weighted Moving Average (EWMA and Exponentially Weighted Moving Variance (EMWV control schemes have been used separately to monitor the process average and process variability respectively. Here the two are combined and applied on simulated process with different level of variation. The control limit interval (CLI and the average run length (ARL were evaluated for the combined chart. The combined chart performed better than the two independently. Furthermore, an algorithm was developed for the two control charts and implemented on visual basic VB6.0. The obtained results show that the combined EWMA and EWMV control chart is very sensitive in detecting shift in production process and every shift in the process mean is always preceded by shift in the process variability.

  16. Controlling Separation in Turbomachines

    Science.gov (United States)

    Evans, Simon; Himmel, Christoph; Power, Bronwyn; Wakelam, Christian; Xu, Liping; Hynes, Tom; Hodson, Howard

    2010-01-01

    Four examples of flow control: 1) Passive control of LP turbine blades (Laminar separation control). 2) Aspiration of a conventional axial compressor blade (Turbulent separation control). 3) Compressor blade designed for aspiration (Turbulent separation control). 4.Control of intakes in crosswinds (Turbulent separation control).

  17. Simulating deep convection with a shallow convection scheme

    Directory of Open Access Journals (Sweden)

    C. Hohenegger

    2011-10-01

    Full Text Available Convective processes profoundly affect the global water and energy balance of our planet but remain a challenge for global climate modeling. Here we develop and investigate the suitability of a unified convection scheme, capable of handling both shallow and deep convection, to simulate cases of tropical oceanic convection, mid-latitude continental convection, and maritime shallow convection. To that aim, we employ large-eddy simulations (LES as a benchmark to test and refine a unified convection scheme implemented in the Single-column Community Atmosphere Model (SCAM. Our approach is motivated by previous cloud-resolving modeling studies, which have documented the gradual transition between shallow and deep convection and its possible importance for the simulated precipitation diurnal cycle.

    Analysis of the LES reveals that differences between shallow and deep convection, regarding cloud-base properties as well as entrainment/detrainment rates, can be related to the evaporation of precipitation. Parameterizing such effects and accordingly modifying the University of Washington shallow convection scheme, it is found that the new unified scheme can represent both shallow and deep convection as well as tropical and mid-latitude continental convection. Compared to the default SCAM version, the new scheme especially improves relative humidity, cloud cover and mass flux profiles. The new unified scheme also removes the well-known too early onset and peak of convective precipitation over mid-latitude continental areas.

  18. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta......(log(n)) bits for constant ε> 0. (1 + ε)-stretch labeling schemes with polylogarithmic label size have previously been established for doubling dimension graphs by Talwar [Talwar, STOC, 2004]. In addition, we present matching upper and lower bounds for distance labeling for caterpillars, showing that labels...

  19. Sustainable process design & analysis of hybrid separations

    DEFF Research Database (Denmark)

    Kumar Tula, Anjan; Befort, Bridgette; Garg, Nipun

    2016-01-01

    Distillation is an energy intensive operation in chemical process industries. There are around 40,000 distillation columns in operation in the US, requiring approximately 40% of the total energy consumption in US chemical process industries. However, analysis of separations by distillation has...... shown that more than 50% of energy is spent in purifying the last 5-10% of the distillate product. Membrane modules on the other hand can achieve high purity separations at lower energy costs, but if the flux is high, it requires large membrane area. A hybrid scheme where distillation and membrane...... modules are combined such that each operates at its highest efficiency, has the potential for significant energy reduction without significant increase of capital costs. This paper presents a method for sustainable design of hybrid distillation-membrane schemes with guaranteed reduction of energy...

  20. CONSTRUCTION OF THIRD-ORDER WNND SCHEME AND ITS APPLICATION IN COMPLEX FLOW

    Institute of Scientific and Technical Information of China (English)

    刘伟; 赵海洋; 谢昱飞

    2005-01-01

    According to the Liu' s weighted idea, a space third-order WNND ( weighted non-oscillatory, containing no free parameters, and dissipative scheme ) scheme was constructed based on the stencils of second-order NND (non-oscillatory, containing no free parameters, and dissipative scheme ) scheme. It was applied in solving linear-wave equation, 1D Euler equations and 3D Navier-Stokes equations. The numerical results indicate that the WNND scheme which does not increase interpolated point ( compared to NND scheme) has more advantages in simulating discontinues and convergence than NND scheme. Appling WNND scheme to simulating the hypersonic flow around lift-body shows:With the AoA ( angle of attack ) increasing from 0° to 50°, the structure of limiting streamline of leeward surface changes from unseparating, open-separating to separating,which occurs from the combined-point (which consists of saddle and node points ). The separating area of upper wing surface is increasing with the AoA's increasing. The topological structures of hypersonic fiowfield based on the sectional flow patterns perpendicular to the body axis agree well with Zhang Hanxin' s theory. Additionally, the unstable-structure phenomenon which is showed by two saddles connection along leeward symmetry line occurs at some sections when the AoA is bigger than 20°.

  1. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  2. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    . While coordination mechanisms focus on how classification schemes enable cooperation among people pursuing a common goal, boundary objects embrace the implicit consequences of classification schemes in situations involving conflicting goals. Moreover, the requirements specification focused on functional...... requirements and provided little information about why these requirements were considered relevant. This stands in contrast to the discussions at the project meetings where the software engineers made frequent use of both abstract goal descriptions and concrete examples to make sense of the requirements....... This difference between the written requirements specification and the oral discussions at the meetings may help explain software engineers’ general preference for people, rather than documents, as their information sources....

  3. History of early atomic clocks

    Energy Technology Data Exchange (ETDEWEB)

    Ramsey, N.F. [Harvard Univ., Cambridge, MA (United States). Lyman Lab. of Physics

    2005-06-01

    This review of the history of early atomic clocks includes early atomic beam magnetic resonance, methods of separated and successive oscillatory fields, microwave absorption, optical pumping and atomic masers. (author)

  4. IMPLEMENTATION OF THE NEW CAREER STRUCTURE SCHEME

    CERN Multimedia

    Human Resources Division

    2001-01-01

    CERN's new Merit Advancement and Promotion Scheme, MAPS, comes into force on 1 September, and all members of staff will soon be receiving the official letter of notification of their assimilation into the new scheme. In this announcement, we take a look at where you can learn about the new system. There will also be an article in the Weekly Bulletin at the end of the month, which will summarise the main changes. During the early summer, HR Division presented the new structure to the staff in the Laboratory via Divisional Information Meetings. The transparencies used in these meetings, along with a list of the most relevant questions and answers, a Career Path Guide as well as a general overview document are available on the HR Division web site http://cern.ch/CERN/Divisions/PE/. Hard copies of the latter document are also available from the Divisional secretariats. The first question most staff members will ask is how they will fit into the new career path structure. Via the same web page, they can type in th...

  5. Efficient adaptive fuzzy control scheme

    NARCIS (Netherlands)

    Papp, Z.; Driessen, B.J.F.

    1995-01-01

    The paper presents an adaptive nonlinear (state-) feedback control structure, where the nonlinearities are implemented as smooth fuzzy mappings defined as rule sets. The fine tuning and adaption of the controller is realized by an indirect adaptive scheme, which modifies the parameters of the fuzzy

  6. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  7. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben;

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoill...

  8. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  9. Fabrication and efficient visible light photocatalytic properties of novel zinc indium sulfide (ZnIn2S4) - graphitic carbon nitride (g-C3N4)/bismuth vanadate (BiVO4) nanorod-based ternary nanocomposites with enhanced charge separation via Z-scheme transfer.

    Science.gov (United States)

    Jo, Wan-Kuen; Natarajan, Thillai Sivakumar

    2016-11-15

    Novel ZnIn2S4-g-C3N4/BiVO4 nanorod-based ternary nanocomposite photocatalysts with enhanced visible light absorption were synthesized and systematically characterized to confirm the formation of ZnIn2S4 marigold flowers, the layered structure of the g-C3N4, BiVO4 nanorods, and the formation of binary and ternary nanocomposites. The visible light absorption of BiVO4 was significantly improved after coupling with g-C3N4 and ZnIn2S4, which was confirmed by UV-visible diffuse reflectance spectroscopic analysis. Ternary ZnIn2S4-g-C3N4/BiVO4 nanocomposites exhibited excellent visible light photocatalytic decomposition efficiency (VL-PDE) when used for the degradation of congo red (CR) dye and metronidazole (MTZ) pharmaceutical, as well as excellent stability and reusability. The ternary 5%ZnIn2S4-50%-g-C3N4/BiVO4 nanocomposite showed higher VL-PDE for CR (81.5%) and MTZ (59%) degradation than the binary composites, g-C3N4 and BiVO4. Radical quenching experiments showed that h(+), OH, and O2(-) were the reactive radicals, validating that the Z-scheme charge carrier transfer mechanism was responsible for the enhanced VL-PDE of the ternary ZnIn2S4-g-C3N4/BiVO4 nanocomposites, which was further confirmed by photoluminescence analysis. Furthermore, kinetic studies showed that the degradation followed pseudo-first-order kinetics, and that the ternary photocatalysts could be reused up to three times with good stability. The enhanced visible light absorption, high surface area, high adsorption capacity, Z-scheme charge carrier transfer, and increased lifetime of photo-produced electron-hole pairs were responsible for the increased visible light photocatalytic decomposition efficiency.

  10. The Generalized Quantization Schemes for Games and its Application to Quantum Information

    CERN Document Server

    Nawaz, Ahmad

    2010-01-01

    Theory of quantum games is relatively new to the literature and its applications to various areas of research are being explored. It is a novel interpretation of strategies and decisions in quantum domain. In the earlier work on quantum games considerable attention was given to the resolution of dilemmas present in corresponding classical games. Two separate quantum schemes were presented by Eisert et al. and Marinatto and Weber to resolve dilemmas in Prisoners' Dilemma and Battle of Sexes games respectively. However for the latter scheme it was argued that dilemma was not resolved. We have modified the quantization scheme of Marinatto and Weber to resolve the dilemma. We have developed a generalized quantization scheme for two person non-zero sum games which reduces to the existing schemes under certain conditions. Applications of this generalized quantization scheme to quantum information theory are studied. Measurement being ubiquitous in quantum mechanics can not be ignored in quantum games. With the help...

  11. Quantum group blind signature scheme without entanglement

    Science.gov (United States)

    Xu, Rui; Huang, Liusheng; Yang, Wei; He, Libao

    2011-07-01

    In this paper we propose a quantum group blind signature scheme designed for distributed e-voting system. Our scheme combines the properties of group signature and blind signature to provide anonymity of voters in an e-voting system. The unconditional security of our scheme is ensured by quantum mechanics. Without employing entanglement, the proposed scheme is easier to be realized comparing with other quantum signature schemes.

  12. Fair Electronic Payment Scheme Based on DSA

    Institute of Scientific and Technical Information of China (English)

    WANG Shao-bin; HONG Fan; ZHU Xian

    2005-01-01

    We present a multi-signature scheme based on DSA and describes a fair electronic payment scheme based on improved DSA signatures. The scheme makes both sides in equal positions during the course of electronic transaction. A Trusted Third Party (TTP) is involved in the scheme to guarantee the fairness of the scheme for both sides. However, only during the course of registration and dispute resolution will TTP be needed. TTP is not needed during the normal payment stage.

  13. A Physical Classification Scheme for Blazars

    CERN Document Server

    Landt, H; Perlman, E S; Giommi, P

    2004-01-01

    Blazars are currently separated into BL Lacertae objects (BL Lacs) and flat spectrum radio quasars (FSRQ) based on the strength of their emission lines. This is done rather arbitrarily by defining a diagonal line in the Ca H&K break value -- equivalent width plane, following Marcha et al. We readdress this problem and put the classification scheme for blazars on firm physical grounds. We study ~100 blazars and radio galaxies from the Deep X-ray Radio Blazar Survey (DXRBS) and 2 Jy radio survey and find a significant bimodality for the narrow emission line [OIII] 5007. This suggests the presence of two physically distinct classes of radio-loud AGN. We show that all radio-loud AGN, blazars and radio galaxies, can be effectively separated into weak- and strong-lined sources using the [OIII] 5007 -- [OII] 3727 equivalent width plane. This plane allows one to disentangle orientation effects from intrinsic variations in radio-loud AGN. Based on DXRBS, the strongly beamed sources of the new class of weak-lined r...

  14. Efficient lossless compression scheme for multispectral images

    Science.gov (United States)

    Benazza-Benyahia, Amel; Hamdi, Mohamed; Pesquet, Jean-Christophe

    2001-12-01

    Huge amounts of data are generated thanks to the continuous improvement of remote sensing systems. Archiving this tremendous volume of data is a real challenge which requires lossless compression techniques. Furthermore, progressive coding constitutes a desirable feature for telebrowsing. To this purpose, a compact and pyramidal representation of the input image has to be generated. Separable multiresolution decompositions have already been proposed for multicomponent images allowing each band to be decomposed separately. It seems however more appropriate to exploit also the spectral correlations. For hyperspectral images, the solution is to apply a 3D decomposition according to the spatial and to the spectral dimensions. This approach is not appropriate for multispectral images because of the reduced number of spectral bands. In recent works, we have proposed a nonlinear subband decomposition scheme with perfect reconstruction which exploits efficiently both the spatial and the spectral redundancies contained in multispectral images. In this paper, the problem of coding the coefficients of the resulting subband decomposition is addressed. More precisely, we propose an extension to the vector case of Shapiro's embedded zerotrees of wavelet coefficients (V-EZW) with achieves further saving in the bit stream. Simulations carried out on SPOT images indicate the outperformance of the global compression package we performed.

  15. AN ADVANCED LEAKAGE SCHEME FOR NEUTRINO TREATMENT IN ASTROPHYSICAL SIMULATIONS

    Energy Technology Data Exchange (ETDEWEB)

    Perego, A. [Institut für Kernphysik, Technische Universität Darmstadt, Schlossgartenstraße 2, D-64289 Darmstadt (Germany); Cabezón, R. M. [Physics Department, University of Basel, Klingelbergstrasse 82, CH-4056 Basel (Switzerland); Käppeli, R., E-mail: albino.perego@physik.tu-darmstadt.de [Seminar for Applied Mathematics, ETH Zürich, Rämistrasse 101, 8092 Zürich (Switzerland)

    2016-04-15

    We present an Advanced Spectral Leakage (ASL) scheme to model neutrinos in the context of core-collapse supernovae (CCSNe) and compact binary mergers. Based on previous gray leakage schemes, the ASL scheme computes the neutrino cooling rates by interpolating local production and diffusion rates (relevant in optically thin and thick regimes, respectively) separately for discretized values of the neutrino energy. Neutrino trapped components are also modeled, based on equilibrium and timescale arguments. The better accuracy achieved by the spectral treatment allows a more reliable computation of neutrino heating rates in optically thin conditions. The scheme has been calibrated and tested against Boltzmann transport in the context of Newtonian spherically symmetric models of CCSNe. ASL shows a very good qualitative and a partial quantitative agreement for key quantities from collapse to a few hundreds of milliseconds after core bounce. We have proved the adaptability and flexibility of our ASL scheme, coupling it to an axisymmetric Eulerian and to a three-dimensional smoothed particle hydrodynamics code to simulate core collapse. Therefore, the neutrino treatment presented here is ideal for large parameter-space explorations, parametric studies, high-resolution tests, code developments, and long-term modeling of asymmetric configurations, where more detailed neutrino treatments are not available or are currently computationally too expensive.

  16. A New time Integration Scheme for Cahn-hilliard Equations

    KAUST Repository

    Schaefer, R.

    2015-06-01

    In this paper we present a new integration scheme that can be applied to solving difficult non-stationary non-linear problems. It is obtained by a successive linearization of the Crank- Nicolson scheme, that is unconditionally stable, but requires solving non-linear equation at each time step. We applied our linearized scheme for the time integration of the challenging Cahn-Hilliard equation, modeling the phase separation in fluids. At each time step the resulting variational equation is solved using higher-order isogeometric finite element method, with B- spline basis functions. The method was implemented in the PETIGA framework interfaced via the PETSc toolkit. The GMRES iterative solver was utilized for the solution of a resulting linear system at every time step. We also apply a simple adaptivity rule, which increases the time step size when the number of GMRES iterations is lower than 30. We compared our method with a non-linear, two stage predictor-multicorrector scheme, utilizing a sophisticated step length adaptivity. We controlled the stability of our simulations by monitoring the Ginzburg-Landau free energy functional. The proposed integration scheme outperforms the two-stage competitor in terms of the execution time, at the same time having a similar evolution of the free energy functional.

  17. An Advanced Leakage Scheme for Neutrino Treatment in Astrophysical Simulations

    Science.gov (United States)

    Perego, A.; Cabezón, R. M.; Käppeli, R.

    2016-04-01

    We present an Advanced Spectral Leakage (ASL) scheme to model neutrinos in the context of core-collapse supernovae (CCSNe) and compact binary mergers. Based on previous gray leakage schemes, the ASL scheme computes the neutrino cooling rates by interpolating local production and diffusion rates (relevant in optically thin and thick regimes, respectively) separately for discretized values of the neutrino energy. Neutrino trapped components are also modeled, based on equilibrium and timescale arguments. The better accuracy achieved by the spectral treatment allows a more reliable computation of neutrino heating rates in optically thin conditions. The scheme has been calibrated and tested against Boltzmann transport in the context of Newtonian spherically symmetric models of CCSNe. ASL shows a very good qualitative and a partial quantitative agreement for key quantities from collapse to a few hundreds of milliseconds after core bounce. We have proved the adaptability and flexibility of our ASL scheme, coupling it to an axisymmetric Eulerian and to a three-dimensional smoothed particle hydrodynamics code to simulate core collapse. Therefore, the neutrino treatment presented here is ideal for large parameter-space explorations, parametric studies, high-resolution tests, code developments, and long-term modeling of asymmetric configurations, where more detailed neutrino treatments are not available or are currently computationally too expensive.

  18. Separation anxiety in children

    Science.gov (United States)

    ... page: //medlineplus.gov/ency/article/001542.htm Separation anxiety in children To use the sharing features on this page, please enable JavaScript. Separation anxiety in children is a developmental stage in which ...

  19. Ionene membrane battery separator

    Science.gov (United States)

    Moacanin, J.; Tom, H. Y.

    1969-01-01

    Ionic transport characteristics of ionenes, insoluble membranes from soluble polyelectrolyte compositions, are studied for possible application in a battery separator. Effectiveness of the thin film of separator membrane essentially determines battery lifetime.

  20. Magnetic separation of algae

    Energy Technology Data Exchange (ETDEWEB)

    Nath, Pulak; Twary, Scott N.

    2016-04-26

    Described herein are methods and systems for harvesting, collecting, separating and/or dewatering algae using iron based salts combined with a magnetic field gradient to separate algae from an aqueous solution.

  1. Robust creation of entanglement between ions in spatially separate cavities.

    Science.gov (United States)

    Browne, Daniel E; Plenio, Martin B; Huelga, Susana F

    2003-08-08

    We present a protocol that allows the generation of a maximally entangled state between individual atoms held in spatially separate cavities. Assuming perfect detectors and neglecting spontaneous emission from the atoms, the resulting idealized scheme is deterministic. Under more realistic conditions, when the atom-cavity interaction departs from the strong coupling regime, and considering imperfect detectors, we show that the scheme is robust against experimental inefficiencies and yields probabilistic entanglement of very high fidelity.

  2. Robust creation of entanglement between ions in spatially separate cavities

    CERN Document Server

    Plenio, M B; Huelga, S F

    2003-01-01

    We present a protocol that allows the generation of a maximally entangled state between individual atoms held in spatially separate cavities. Assuming perfect detectors and neglecting spontaneous emission from the atoms, the resulting idealized scheme is deterministic. Under more realistic conditions, when the the atom-cavity interaction departs from the strong coupling regime, and considering imperfect detectors, we show that the scheme is robust against experimental inefficiencies and yields probabilistic entanglement of very high fidelity.

  3. Kinetic Gravity Separation

    NARCIS (Netherlands)

    Van Kooy, L.; Mooij, M.; Rem, P.

    2004-01-01

    Separations by density, such as the separation of non-ferrous scrap into light and heavy alloys, are often realized by means of heavy media. In principle, kinetic gravity separations in water can be faster and cheaper, because they do not rely on suspensions or salt solutions of which the density

  4. Methods of separation of variables in turbulence theory

    Science.gov (United States)

    Tsuge, S.

    1978-01-01

    Two schemes of closing turbulent moment equations are proposed both of which make double correlation equations separated into single-point equations. The first is based on neglected triple correlation, leading to an equation differing from small perturbed gasdynamic equations where the separation constant appears as the frequency. Grid-produced turbulence is described in this light as time-independent, cylindrically-isotropic turbulence. Application to wall turbulence guided by a new asymptotic method for the Orr-Sommerfeld equation reveals a neutrally stable mode of essentially three dimensional nature. The second closure scheme is based on an assumption of identity of the separated variables through which triple and quadruple correlations are formed. The resulting equation adds, to its equivalent of the first scheme, an integral of nonlinear convolution in the frequency describing a role due to triple correlation of direct energy-cascading.

  5. A sixth order hybrid finite difference scheme based on the minimized dispersion and controllable dissipation technique

    Science.gov (United States)

    Sun, Zhen-sheng; Luo, Lei; Ren, Yu-xin; Zhang, Shi-ying

    2014-08-01

    The dispersion and dissipation properties of a scheme are of great importance for the simulation of flow fields which involve a broad range of length scales. In order to improve the spectral properties of the finite difference scheme, the authors have previously proposed the idea of optimizing the dispersion and dissipation properties separately and a fourth order scheme based on the minimized dispersion and controllable dissipation (MDCD) technique is thus constructed [29]. In the present paper, we further investigate this technique and extend it to a sixth order finite difference scheme to solve the Euler and Navier-Stokes equations. The dispersion properties of the scheme is firstly optimized by minimizing an elaborately designed integrated error function. Then the dispersion-dissipation condition which is newly derived by Hu and Adams [30] is introduced to supply sufficient dissipation to damp the unresolved wavenumbers. Furthermore, the optimized scheme is blended with an optimized Weighted Essentially Non-Oscillation (WENO) scheme to make it possible for the discontinuity-capturing. In this process, the approximation-dispersion-relation (ADR) approach is employed to optimize the spectral properties of the nonlinear scheme to yield the true wave propagation behavior of the finite difference scheme. Several benchmark test problems, which include broadband fluctuations and strong shock waves, are solved to validate the high-resolution, the good discontinuity-capturing capability and the high-efficiency of the proposed scheme.

  6. WEIGHTED COMPACT SCHEME FOR SHOCK CAPTURING

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new class of finite difference schemes--the weighted compact schemes are proposed. According to the idea of the WENO schemes, the weighted compact scheme is constructed by a combination of the approximations of derivatives on candidate stencils with properly assigned weights so that the non-oscillatory property is achieved when discontinuities appear. The primitive function reconstruction method of ENO schemes is applied to obtain the conservative form of the weighted compact scheme. This new scheme not only preserves the characteristic of standard compact schemes and achieves high order accuracy and high resolution using a compact stencil,but also can accurately capture shock waves and discontinuities without oscillation, Numerical examples show that the new scheme is very promising and successful.``

  7. Single-trial ERP analysis reveals facial expression category in a three-stage scheme.

    Science.gov (United States)

    Zhang, Dandan; Luo, Wenbo; Luo, Yuejia

    2013-05-28

    Emotional faces are salient stimuli that play a critical role in social interactions. Following up on previous research suggesting that the event-related potentials (ERPs) show differential amplitudes in response to various facial expressions, the current study used trial-to-trial variability assembled from six discriminating ERP components to predict the facial expression categories in individual trials. In an experiment involved 17 participants, fearful trials were differentiated from non-fearful trials as early as the intervals of N1 and P1, with a mean predictive accuracy of 87%. Single-trial features in the occurrence of N170 and vertex positive potential could distinguish between emotional and neutral expressions (accuracy=90%). Finally, the trials associated with fearful, happy, and neutral faces were completely separated during the window of N3 and P3 (accuracy=83%). These categorization findings elucidated the temporal evolution of facial expression extraction, and demonstrated that the spatio-temporal characteristics of single-trial ERPs can distinguish facial expressions according to a three-stage scheme, with "fear popup," "emotional/unemotional discrimination," and "complete separation" as processing stages. This work constitutes the first examination of neural processing dynamics beyond multitrial ERP averaging, and directly relates the prediction performance of single-trial classifiers to the progressive brain functions of emotional face discrimination.

  8. Dual Watermarking Scheme with Encryption

    CERN Document Server

    Dhanalakshmi, R

    2010-01-01

    Digital Watermarking is used for copyright protection and authentication. In the proposed system, a Dual Watermarking Scheme based on DWT SVD with chaos encryption algorithm, will be developed to improve the robustness and protection along with security. DWT and SVD have been used as a mathematical tool to embed watermark in the image. Two watermarks are embedded in the host image. The secondary is embedded into primary watermark and the resultant watermarked image is encrypted using chaos based logistic map. This provides an efficient and secure way for image encryption and transmission. The watermarked image is decrypted and a reliable watermark extraction scheme is developed for the extraction of the primary as well as secondary watermark from the distorted image.

  9. Ion Polarization Scheme for MEIC

    CERN Document Server

    Kondratenko, A M; Filatov, Yu N; Derbenev, Ya S; Lin, F; Morozov, V S; Zhang, Y

    2016-01-01

    The choice of a figure 8 shape for the booster and collider rings of MEIC opens wide possibilities for preservation of the ion polarization during beam acceleration as well as for control of the polarization at the collider's interaction points. As in the case of accelerators with Siberian snakes, the spin tune is energy independent but is equal to zero instead of one half. The figure-8 topology eliminates the effect of arcs on the spin motion. There appears a unique opportunity to control the polarization of any particle species including deuterons, using longitudinal fields of small integrated strength (weak solenoids). Contrary to existing schemes, using weak solenoids in figure-8 colliders, one can control the polarization at the interaction points without essentially any effect on the beam's orbital characteristics. A universal scheme for control of the polarization using weak solenoids provides an elegant solution to the problem of ion acceleration completely eliminating resonant beam depolarization. It...

  10. Rapid chemical separations

    CERN Document Server

    Trautmann, N

    1976-01-01

    A survey is given on the progress of fast chemical separation procedures during the last few years. Fast, discontinuous separation techniques are illustrated by a procedure for niobium. The use of such techniques for the chemical characterization of the heaviest known elements is described. Other rapid separation methods from aqueous solutions are summarized. The application of the high speed liquid chromatography to the separation of chemically similar elements is outlined. The use of the gas jet recoil transport method for nuclear reaction products and its combination with a continuous solvent extraction technique and with a thermochromatographic separation is presented. Different separation methods in the gas phase are briefly discussed and the attachment of a thermochromatographic technique to an on-line mass separator is shown. (45 refs).

  11. Acoustofluidic bacteria separation

    Science.gov (United States)

    Li, Sixing; Ma, Fen; Bachman, Hunter; Cameron, Craig E.; Zeng, Xiangqun; Huang, Tony Jun

    2017-01-01

    Bacterial separation from human blood samples can help with the identification of pathogenic bacteria for sepsis diagnosis. In this work, we report an acoustofluidic device for label-free bacterial separation from human blood samples. In particular, we exploit the acoustic radiation force generated from a tilted-angle standing surface acoustic wave (taSSAW) field to separate Escherichia coli from human blood cells based on their size difference. Flow cytometry analysis of the E. coli separated from red blood cells shows a purity of more than 96%. Moreover, the label-free electrochemical detection of the separated E. coli displays reduced non-specific signals due to the removal of blood cells. Our acoustofluidic bacterial separation platform has advantages such as label-free separation, high biocompatibility, flexibility, low cost, miniaturization, automation, and ease of in-line integration. The platform can be incorporated with an on-chip sensor to realize a point-of-care sepsis diagnostic device.

  12. Wrong way recollement for schemes

    OpenAIRE

    Jorgensen, Peter

    2005-01-01

    A recollement of triangulated categories makes it possible to view one such category as being glued together from two others. The prototypical example is that D(X), a suitable derived category of sheaves on the topological space X, has a recollement in terms of D(Z) and D(U) when Z is a closed subset of X and U is the open complement. This note gives a different, "wrong way" recollement in the scheme case.

  13. Parabolic sheaves on logarithmic schemes

    OpenAIRE

    Borne, Niels; Vistoli, Angelo

    2010-01-01

    We show how the natural context for the definition of parabolic sheaves on a scheme is that of logarithmic geometry. The key point is a reformulation of the concept of logarithmic structure in the language of symmetric monoidal categories, which might be of independent interest. Our main result states that parabolic sheaves can be interpreted as quasi-coherent sheaves on certain stacks of roots.

  14. Practical E-Payment Scheme

    Directory of Open Access Journals (Sweden)

    Mohammad Al-Fayoumi

    2010-05-01

    Full Text Available E-payment is now one of the most central research areas in e-commerce, mainly regarding online and offline payment scenarios. Customers are generally passive in e-commerce transaction. Relied on a blind signature, this paper introduces an e-payment protocol, in which customers have more initiative, and can terminate the transaction before possible cheats, its security is enhanced. Moreover, the cost of workers and communications falls down considerably while the cost of trusted authority and protecting information is increased. As there is no trusted authority in the proposed scheme, network overcrowding and conspiracy problems can be avoided. Furthermore, the protocol satisfies fairness and non-repudiation. This helps merchant and bank to speed up the financial transaction process and to give user instant services at any time. Also, in this paper, we will discuss an important e-payment protocol namely pay-word scheme and examine its advantages and limitations, which encourages the authors to improve the scheme that keeps all characteristics intact without compromise of the security robustness. The suggested protocol employs the idea of blind signature with the thought of hash chain. We will compare the proposed protocol with pay-word protocol and demonstrate that the proposed protocol offers more security and efficiency, which makes the protocol workable for real world services.

  15. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  16. A biometric signcryption scheme without bilinear pairing

    Science.gov (United States)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  17. Percutaneous coronary intervention using a combination of robotics and telecommunications by an operator in a separate physical location from the patient: an early exploration into the feasibility of telestenting (the REMOTE-PCI study).

    Science.gov (United States)

    Madder, Ryan D; VanOosterhout, Stacie M; Jacoby, Mark E; Collins, J Stewart; Borgman, Andrew S; Mulder, Abbey N; Elmore, Matthew A; Campbell, Jessica L; McNamara, Richard F; Wohns, David H

    2017-01-20

    The present study explores the feasibility of telestenting, wherein a physician operator performs stenting on a patient in a separate physical location using a combination of robotics and telecommunications. Patients undergoing robotic stenting were eligible for inclusion. All manipulations of guidewires, balloons, and stents were performed robotically by a physician operator located in an isolated separate room outside the procedure room housing the patient. Communication between the operating physician and laboratory personnel was via telecommunication devices providing real-time audio and video connectivity. Among 20 patients who consented to participate, technical success, defined as successful advancement and retraction of guidewires, balloons, and stents by the robotic system without conversion to manual operation, was achieved in 19 of 22 lesions (86.4%). Procedural success, defined as robotics will facilitate telestenting over greater geographic distances.

  18. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry...

  19. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  20. Elliptic Curve Blind Digital Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    YOULin; YANGYixian; WENQiaoyan

    2003-01-01

    Blind signature schemes are important cryptographic protocols in guaranteeing the privacy or anonymity of the users.Three new blind signature schemes and their corresponding generalizations are pro-posed. Moreover, their securities are simply analyzed.

  1. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry...

  2. Secret sharing scheme with inherited characteristic

    Institute of Scientific and Technical Information of China (English)

    Ye Zhenjun; Meng Fanzhen

    2006-01-01

    To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security.

  3. [Separation anxiety in children].

    Science.gov (United States)

    Purper-Ouakil, Diane; Franc, Nathalie

    2010-06-20

    Separation anxiety disorder can be differentiated from developmental anxiety because of its intensity, persistence and negative impact on adaptive functioning. This disorder is closely linked to other anxiety and mood disorders and can also be associated with externalizing psychopathology in children and adolescents. Severe separation anxiety can result in school refusal and intra-familial violence. Cognitive behavioral therapies have the best evidence-based support for the treatment of separation anxiety disorder in children and adolescents. In addition, it is important to detect factors associated with persistence of anxiety such as systematic avoidance of separation and parental overprotection. The role of pediatricians and general practitioners in recognizing clinical separation anxiety and encouraging appropriate care and positive parental attitudes is essential, as separation anxiety is often associated with a variety of somatic symptoms.

  4. Linear multi-secret sharing schemes

    Institute of Scientific and Technical Information of China (English)

    XIAO Liangliang; LIU Mulan

    2005-01-01

    In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access structures by using linear multisecret sharing schemes is shown. Furthermore, the concept of optimal linear multi-secret sharing scheme is presented and the several schemes are proved to be optimal.

  5. Improvement of publicly verifiable authenticated encryption scheme

    Institute of Scientific and Technical Information of China (English)

    LEI Fei-yu; CHEN Wen; MA Chang-she; CHEN Ke-fei

    2007-01-01

    A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness and susceptive linear design, an improvement by means of two mechanisms including quadratic residue and composite discrete logarithm is proposed, which can defeat the forgery attacks in Ma and Chen scheme. The new scheme remains good confidentiality, public verifiability and efficiency.

  6. A massive momentum-subtraction scheme

    CERN Document Server

    Boyle, Peter; Khamseh, Ava

    2016-01-01

    A new renormalization scheme is defined for fermion bilinears in QCD at non vanishing quark masses. This new scheme, denoted RI/mSMOM, preserves the benefits of the nonexceptional momenta introduced in the RI/SMOM scheme, and allows a definition of renormalized composite fields away from the chiral limit. Some properties of the scheme are investigated by performing explicit one-loop computation in dimensional regularization.

  7. MIRD radionuclide data and decay schemes

    CERN Document Server

    Eckerman, Keith F

    2007-01-01

    For all physicians, scientists, and physicists working in the nuclear medicine field, the MIRD: Radionuclide Data and Decay Schemes updated edition is an essential sourcebook for radiation dosimetry and understanding the properties of radionuclides. Includes CD Table of Contents Decay schemes listed by atomic number Radioactive decay processes Serial decay schemes Decay schemes and decay tables This essential reference for nuclear medicine physicians, scientists and physicists also includes a CD with tabulations of the radionuclide data necessary for dosimetry calculations.

  8. Separation of flow

    CERN Document Server

    Chang, Paul K

    2014-01-01

    Interdisciplinary and Advanced Topics in Science and Engineering, Volume 3: Separation of Flow presents the problem of the separation of fluid flow. This book provides information covering the fields of basic physical processes, analyses, and experiments concerning flow separation.Organized into 12 chapters, this volume begins with an overview of the flow separation on the body surface as discusses in various classical examples. This text then examines the analytical and experimental results of the laminar boundary layer of steady, two-dimensional flows in the subsonic speed range. Other chapt

  9. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  10. Population Monotonic Path Schemes for Simple Games

    NARCIS (Netherlands)

    Ciftci, B.B.; Borm, P.E.M.; Hamers, H.J.M.

    2006-01-01

    A path scheme for a simple game is composed of a path, i.e., a sequence of coalitions that is formed during the coalition formation process and a scheme, i.e., a payoff vector for each coalition in the path.A path scheme is called population monotonic if a player's payoff does not decrease as the pa

  11. A new semi-Lagrangian difference scheme

    Institute of Scientific and Technical Information of China (English)

    季仲贞; 陈嘉滨

    2001-01-01

    A new completely energy-conserving semi-Lagrangian scheme is constructed. The numerical solution of shallow water equation shows that this conservative scheme preserves the total energy in twelve significant digits, while the traditional scheme does only in five significant digits.

  12. Arbitrated quantum signature scheme with message recovery

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-02-16

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission.

  13. Quantum Signature Scheme with Weak Arbitrator

    Science.gov (United States)

    Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian

    2012-07-01

    In this paper, we propose one quantum signature scheme with a weak arbitrator to sign classical messages. This scheme can preserve the merits in the original arbitrated scheme with some entanglement resources, and provide a higher efficiency in transmission and reduction the complexity of implementation. The arbitrator is costless and only involved in the disagreement case.

  14. Current terminology and diagnostic classification schemes.

    Science.gov (United States)

    Okeson, J P

    1997-01-01

    This article reviews the current terminology and classification schemes available for temporomandibular disorders. The origin of each term is presented, and the classification schemes that have been offered for temporomandibular disorders are briefly reviewed. Several important classifications are presented in more detail, with mention of advantages and disadvantages. Final recommendations are provided for future direction in the area of classification schemes.

  15. A Model of Hierarchical Key Assignment Scheme

    Institute of Scientific and Technical Information of China (English)

    ZHANG Zhigang; ZHAO Jing; XU Maozhi

    2006-01-01

    A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property.

  16. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... for promoting combined heat and power and energy from renewable sources. These Directives are to be implemented at the national level by the Member States. Section 3 conceptually presents the spectrum of national support schemes, ranging from investment support to market‐based operational support. The choice...

  17. Update on the Pyramid Scheme

    Science.gov (United States)

    Banks, Tom; Torres, T. J.

    2012-10-01

    We summarize recent work in which we attempt to make consistent models of LHC physics, from the Pyramid Scheme. The models share much with the NMSSM, in particular, enhanced tree level contributions to the Higgs mass and a preference for small tan β. There are three different singlet fields, and a new strongly coupled gauge theory, so the constraints of perturbative unification are quite different. We outline our general approach to the model, which contains a Kähler potential for three of the low energy fields, which is hard to calculate. Detailed calculations, based on approximations to the Kähler potential, will be presented in a future publication.

  18. Gas-filled separators - An overview

    CERN Document Server

    Leino, M

    2003-01-01

    Gas-filled recoil separators have been used in nuclear physics studies since the early fifties. Most notably, they have found use in the separation of evaporation residues of heavy and very heavy elements from unwanted background. Gas-filled separators, alone or coupled to a detector array, offer an efficient, fast, compact and relatively inexpensive solution for nuclear structure studies. A new application is the use of a gas-filled device as a pre-separator in the study of chemical properties of the heaviest elements. Other uses include systematic study of fusion evaporation cross sections and accelerator mass spectrometry. In this contribution, an overview on gas-filled recoil separators, their characteristics, fields of application and possible future developments is given.

  19. Discovery and early development of non-suppressed ion chromatography.

    Science.gov (United States)

    Fritz, James S; Gjerde, Douglas T

    2010-08-01

    This year marks the 30th anniversary of the publication of Non-Suppressed Ion Chromatography, which is a method for the rapid separation of anions with on-line conductimetric detection. In this method, the separation column is connected directly to the conductimetric detector. This single-column method is a simpler technique than the original suppressed ion chromatography method, which requires a large suppressor column to reduce the background conductance. In the new method, the background signal is reduced to a manageable level simply by using an ion-exchange separation column of low exchange capacity that lowers the eluent concentration needed for separation. The eluent ion used for separation is chosen based on having large, bulky structure, which lowers the equivalent conductance and facilitates detection of the sample anions. This is a personal account of the initial discovery and early development of non-suppressed ion chromatography. The circumstances for the discovery are recounted by the two authors. Methods are described for determination of anions, cations with indirect detection, and techniques for increasing detection sensitivity. A fundamental equation for the prediction of ion chromatography detector response is given, and the development of several types of detection schemes for ion chromatography is discussed. Finally, the impact of non-suppressed ion chromatography is discussed together with comments on the discovery process.

  20. Range Separated Brueckner Coupled Cluster Doubles Theory

    CERN Document Server

    Shepherd, James J; Scuseria, Gustavo E

    2013-01-01

    We introduce a range-separation approximation to coupled cluster doubles (CCD) theory that successfully overcomes limitations of regular CCD when applied to the uniform electron gas. We combine the short-range ladder channel with the long-range ring channel in the presence of a Bruckner renormalized one-body interaction and obtain ground-state energies with an accuracy of 0.001 a.u./electron across a wide range of density regimes. Our scheme is particularly useful in the low-density and strongly-correlated regimes, where regular CCD has serious drawbacks. Moreover, we cure the infamous overcorrelation of approaches based on ring diagrams (i.e. the particle-hole random phase approximation). Our energies are further shown to have appropriate basis set and thermodynamic limit convergence, and overall this scheme promises energetic properties for realistic periodic and extended systems which existing methods do not possess.

  1. Schemes for Probabilistic Teleportation of a Three-Atom GHZ Class State via Cavity QED

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Using a quantum channel composed of a two-atom and a three-atom nonmaximally entangled states,we present two schemes to teleport a three-atom GHZ class state via entanglement swapping in cavity QED with different success probabilities. The schemes can be respectively realized with the large-detuned vacuum cavities and with the large-detuned thermal cavities by separate atomic measurements after we choose appropriate atom-cavity-field interaction time.

  2. Stability analysis of implicit multi-fluid schemes

    Energy Technology Data Exchange (ETDEWEB)

    Kunz, R.F.; Cope, W.K. [Lockheed Martin, Schenectady, NY (United States); Venkateswaran, S. [Pennsylvania State Univ., University Park, PA (United States)

    1997-06-01

    A new implicit method has been developed for solving the viscous full multi-fluid equations, which incorporate transport and generation of mass and momentum for each component present in a system. This work presents stability analysis and application of the important full multi-fluid system in a fully implicit algorithm. The stability analyses presented demonstrate the performance of several iterative schemes applied to the solution of the linearized systems which arise in the formulation. These include block Jacobi and symmetric block Gauss-Siedel schemes with various preconditioners applied. A hierarchy of increasing physical complexity is pursued, starting with one-dimensional, two-fluid systems with minimum inter-field dynamic coupling and no mass transfer. These analyses are extended to systems employing physically important inter-field forces (drag, turbulence dispersion, virtual mass). The effects of mass transfer, multiple fields (i.e., n{phi} > 2) and multiple dimensions are also considered. A two-fluid Navier-Stokes code has been developed based on this new scheme. Results are presented which verify the validity of the stability analyses presented for the coupled scheme. Multi-phase flows which require full multi-fluid modeling arise in a wide class of engineering problems, where non-equilibrium dynamics and thermodynamics of the interfaces between constituents play important roles in the evolution of the ensemble averaged mean flow. Examples include cyclone separators, two-phase flow in jets and curved ducts and boiling flow in heat exchangers.

  3. Entropy Stable Numerical Schemes for Two-Fluid Plasma Equations

    CERN Document Server

    Kumar, Harish

    2011-01-01

    Two-fluid ideal plasma equations are a generalized form of the ideal MHD equations in which electrons and ions are considered as separate species. The design of efficient numerical schemes for the these equations is complicated on account of their non-linear nature and the presence of stiff source terms, especially for high charge to mass ratios and for low Larmor radii. In this article, we design entropy stable finite difference schemes for the two-fluid equations by combining entropy conservative fluxes and suitable numerical diffusion operators. Furthermore, to overcome the time step restrictions imposed by the stiff source terms, we devise time-stepping routines based on implicit-explicit (IMEX)-Runge Kutta (RK) schemes. The special structure of the two-fluid plasma equations is exploited by us to design IMEX schemes in which only local (in each cell) linear equations need to be solved at each time step. Benchmark numerical experiments are presented to illustrate the robustness and accuracy of these schem...

  4. Comparison of Direct Eulerian Godunov and Lagrange Plus Remap, Artificial Viscosity Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Pember, R B; Anderson, R W

    2001-03-30

    The authors compare two algorithms for solving the equations of unsteady inviscid compressible flow in an Eulerian frame: a staggered grid, Lagrange plus remap artificial viscosity scheme and a cell-centered, direct Eulerian higher-order Godunov scheme. They use the two methods to compute solutions to a number of one- and two-dimensional problems. The results show the accuracy of the two schemes to be generally equivalent. In a 1984 survey paper by Woodward and Colella, the Lagrange plus remap approach did not compare favorably with the higher-order Godunov methodology. They examine, therefore, how certain features of the staggered grid scheme considered here contribute to its improved accuracy. The critical features are shown to be the use of a monotonic artificial viscosity in the Lagrange step and, in the remap step, the use of a corner transport upwind scheme with van Leer limiters in conjunction with separate advection of internal and kinetic energies.

  5. Breaking and Fixing of an Identity Based Multi-Signcryption Scheme

    Science.gov (United States)

    Selvi, S. Sharmila Deva; Vivek, S. Sree; Rangan, C. Pandu

    Signcryption is a cryptographic primitive that provides authentication and confidentiality simultaneously in a single logical step. It is often required that multiple senders have to signcrypt a single message to a certain receiver. Obviously, it is inefficient to signcrypt the messages separately. An efficient alternative is to go for multi-signcryption. The concept of multi-signcryption is similar to that of multi-signatures with the added property - confidentiality. Recently, Jianhong et al. proposed an identity based multi-signcryption scheme. They claimed that their scheme is secure against adaptive chosen ciphertext attack and it is existentially unforgeable. In this paper, we show that their scheme is not secure against chosen plaintext attack and is existentially forgeable, we also provide a fix for the scheme and prove formally that the improved scheme is secure against both adaptive chosen ciphertext attack and existential forgery.

  6. A scheme of pulse compression lidar with enhanced modulated bandwidth for detection through scattering media

    Science.gov (United States)

    Yang, Cheng-hua; Zhang, Yong; Jin, Chen-fei; Xu, Lu; Yang, Xu; Wang, Qiang; Liu, Yue-hao; Zhao, Yuan

    2016-12-01

    This paper presents a scheme of pulse compression lidar with enhanced electrical modulated bandwidth. An ultra-wideband linear frequency modulated signal with a bandwidth of 50 GHz is generated using femtosecond laser and superimposed linear chirp fiber Bragg gratings in the transmitter, which separates the echo of the target from the backward scattered noise with low modulated frequency. An optical pulse compression system based on a negative dispersion fiber Bragg grating is used to compress the ultra-wideband linear frequency modulated signal in the receiver. SNR and range resolution of the proposed scheme are numerically simulated to prove its feasibility. The simulation results indicate that an enhancement of SNR by 15.8 dB can be achieved using the scheme, and the range resolution of the scheme increases from 0.68 m to 0.0027 m. It is therefore concluded that the proposed scheme is suitable for detection through scattering media.

  7. Working with Separation

    Science.gov (United States)

    Krugman, Dorothy C.

    1971-01-01

    Discusses the role of the caseworker in providing support to children experiencing separation from their families and emphasizes the need to recognize that there are differences between those separation experiences dictated by the needs of children and those dictated by arbitrary or noncasework factors. (AJ)

  8. Separation anxiety disorder

    NARCIS (Netherlands)

    Nauta, M.H.; Emmelkamp, P.M.G.; Sturmey, P.; Hersen, M.

    2012-01-01

    Separation anxiety disorder (SAD) is the only anxiety disorder that is specific to childhood; however, SAD has hardly ever been addressed as a separate disorder in clinical trials investigating treatment outcome. So far, only parent training has been developed specifically for SAD. This particular t

  9. Social Separation in Monkeys.

    Science.gov (United States)

    Mineka, Susan; Suomi, Stephen J.

    1978-01-01

    Reviews phenomena associated with social separation from attachment objects in nonhuman primates. Evaluates four theoretical treatments of separation in light of existing data: Bowlby's attachment-object-loss theory, Kaufman's conservation-withdrawal theory, Seligman's learned helplessness theory, and Solomon and Corbit's opponent-process theory.…

  10. Nonterminal Separating Macro Grammars

    NARCIS (Netherlands)

    Hogendorp, Jan Anne; Asveld, P.R.J.; Nijholt, A.; Verbeek, Leo A.M.

    1987-01-01

    We extend the concept of nonterminal separating (or NTS) context-free grammar to nonterminal separating $m$-macro grammar where the mode of derivation $m$ is equal to "unrestricted". "outside-in' or "inside-out". Then we show some (partial) characterization results for these NTS $m$-macro grammars.

  11. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  12. Pseudorandomness of Camellia-Like Scheme

    Institute of Scientific and Technical Information of China (English)

    Wen-Ling Wu

    2006-01-01

    Luby and Rackoff idealized DES by replacing each round function with one large random function. In this paper, the author idealizes Camellia by replacing each S-box with one small random function, which is named Camellialike scheme. It is then proved that five-round Camellia-like scheme is pseudorandom and eight-round Camellia-like scheme is super-pseudorandom for adaptive adversaries. Further the paper considers more efficient construction of Camellia-like scheme, and discusses how to construct pseudorandom Camellia-like scheme from less random functions.

  13. Modification of QUICK scheme by skew points

    Energy Technology Data Exchange (ETDEWEB)

    Mirzaei, M.; Mohammadi, R.; Malekzadeh, M. [K.N. Toosi Univ. of Technology, Aerospace Engineering Dept., Tehran (Iran, Islamic Republic of)]. E-mail: Mirzaei@kntu.ac.ir

    2005-07-01

    This paper presents a new method for convective flux approximation based on inclusions of skew points. The scheme uses the truncated terms of QUICK scheme and with the aid of an equation extracted from momentum equations, the skew points will appear in the convective flux formula. The results show that the presented scheme has better accuracy than the other schemes. Diffusion fluxes are approximated using power law scheme and for evaluation of the performance of the presented method several test cases were carried out and the results are compared with the results of other numerical works and experimental data. (author)

  14. A Provably Secure Asynchronous Proactive RSA Scheme

    Institute of Scientific and Technical Information of China (English)

    ZHANG Rui-shan; LI Qiang; CHEN Ke-fei

    2005-01-01

    The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the se curity definition and security proof do not follow the approach of provable security. This paper presented a provably secure asynchronous proactive RSA scheme, which includes three protocols: initial key distribution protocol,signature generation protocol and share refreshing protocol. Taken these protocols together, a complete provably secure proactive RSA scheme was obtained. And the efficiency of the scheme is approximate to that of the scheme of Zhou.

  15. Hash function based secret sharing scheme designs

    CERN Document Server

    Chum, Chi Sing

    2011-01-01

    Secret sharing schemes create an effective method to safeguard a secret by dividing it among several participants. By using hash functions and the herding hashes technique, we first set up a (t+1, n) threshold scheme which is perfect and ideal, and then extend it to schemes for any general access structure. The schemes can be further set up as proactive or verifiable if necessary. The setup and recovery of the secret is efficient due to the fast calculation of the hash function. The proposed scheme is flexible because of the use of existing hash functions.

  16. A New Signature Scheme with Shared Verification

    Institute of Scientific and Technical Information of China (English)

    JIA Xiao-yun; LUO Shou-shan; YUAN Chao-wei

    2006-01-01

    With expanding user demands, digital signature techniques are also being expanded greatly, from single signature and single verification techniques to techniques supporting multi-users. This paper presents a new digital signature scheme vith shared verification based on the fiat-shamir signature scheme. This scheme is suitable not only for digital signatures of one public key, but also for situations where multiple public keys are required. In addition, the scheme can resist all kinds of collusion, making it more practicable and safer. Additionally it is more efficient than other schemes.

  17. Colluding attacks on a group signature scheme

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.

  18. Nonrepudiable Proxy Multi-Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    LI JiGuo(李继国); CAO ZhenFu(曹珍富); ZHANG YiChen(张亦辰)

    2003-01-01

    The concept of proxy signature introduced by Mambo, Usuda, and Okamotoallows a designated person, called a proxy signer, to sign on behalf of an original signer. However,most existing proxy signature schemes do not support nonrepudiation. In this paper, two securenonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of theexisting schemes. The proposed schemes can withstand public key substitution attack. In addition,the new schemes have some other advantages such as proxy signature key generation and updatingusing insecure channels. This approach can also be applied to other ElGamal-like proxy signatureschemes.

  19. Different options for noble gas categorization schemes

    Science.gov (United States)

    Kalinowski, Martin

    2010-05-01

    For noble gas monitoring it is crucial to support the decision makers who need to decide whether a decection may indicate a potential nuclear test. Several parameters are available that may help to distinguish a legitimate civilian source from a nuclear explosion. The most promising parameters are: (a) Anomaly observations with respect to the history of concentrations found at that site. (b) Isotopic activity ratios can be used to separate a nuclear reactor domain from the parameter space that is specific for nuclear explosions. (c) Correlation with source-receptor-sensitivities related to known civilian sources as determined by atmospheric transport simulations. A combination of these can be used to categorize an observation. So far, several initial ideas have been presented but the issue of noble gas categorisation has been postponed with the argument that further scientific studies and additional experience have to be awaited. This paper presents the principles of different options for noble gas categorisation and considers how they would meet the interests of different classes of member states. It discusses under different points of view what might be the best approach for the noble gas categorisation scheme.

  20. Hybrid Transmission Scheme for MIMO Relay Channels

    Directory of Open Access Journals (Sweden)

    Guangming Xu

    2009-11-01

    Full Text Available To improve the achievable rate for the MIMO channels, we propose a hybrid transmission (HT scheme that mixes half-duplex decode-and-forward cooperative relaying transmission (DFRH)with direct transmission (DT. In the HT scheme, the source message is divided into two parts: one is transmitted by DFRH scheme and another is transmitted by DT scheme. Precoding and decoding are considered to convert the original MIMO relay channel into several parallel subchannels so that resource allocation can be easily performed. We focus on the spatial subchannel and power allocation problem. The objective of this problem is to maximize the total achievable rate under the constraints of joint total transmission power. Simulation results show that significant capacity gain can be achieved by the HT scheme compared to the DT scheme and the pure DFRH scheme.

  1. High-Order Energy Stable WENO Schemes

    Science.gov (United States)

    Yamaleev, Nail K.; Carpenter, Mark H.

    2008-01-01

    A new third-order Energy Stable Weighted Essentially NonOscillatory (ESWENO) finite difference scheme for scalar and vector linear hyperbolic equations with piecewise continuous initial conditions is developed. The new scheme is proven to be stable in the energy norm for both continuous and discontinuous solutions. In contrast to the existing high-resolution shock-capturing schemes, no assumption that the reconstruction should be total variation bounded (TVB) is explicitly required to prove stability of the new scheme. A rigorous truncation error analysis is presented showing that the accuracy of the 3rd-order ESWENO scheme is drastically improved if the tuning parameters of the weight functions satisfy certain criteria. Numerical results show that the new ESWENO scheme is stable and significantly outperforms the conventional third-order WENO finite difference scheme of Jiang and Shu in terms of accuracy, while providing essentially nonoscillatory solutions near strong discontinuities.

  2. A Distributed Generation-Based Local Self-Recovery Scheme for Distribution Network at Post-Blackout Early Stage of Power Grid Restoration%大停电后初期基于分布式电源的配电网局部自我恢复方案

    Institute of Scientific and Technical Information of China (English)

    谢夏慧; 汪沨; 卢鸣凯; 陈春; 陈奇朋; 曹一家; 董旭柱

    2013-01-01

      分布式电源(distributed generation,DG)具有启动速度快、结构简单、反应灵活等特点,在配电网黑启动中发挥着重要作用。分析了在电网大面积停电情况下基于DG的配电网局部自我恢复方案。因DG的发电功率不能满足配电网中所有负荷的供电,首先在主网分区恢复方案下,根据DG的性能和重要负荷的分布对配电网进行划分;然后讨论了分区后DG启动顺序及恢复路径的优化,以保证能够在尽可能短的时间内恢复尽可能多的重要负荷。该方法以最小路径权值和最大重要负荷恢复量为目标,满足负荷的恢复量不超过DG发电量等约束条件,采用改进粒子群算法进行求解。算例结果验证了该方法的有效性。%  In view of its advantages in fast start-up, simple structure and flexible response, distributed generation (DG) plays an important role in the black start of distribution network. A DG-based local self-recovery scheme for distribution network at post-blackout early stage of power grid restoration is analyzed. Since the DG cannot meet the demand of supplying all loads in distribution network, firstly under the partition recovery scheme of main grid the distribution network is partitioned according to the performance of DG and the distribution of essential loads; secondly the starting sequence of DG after the partitioning and the optimization of the restoration path are discussed to ensure that the power supply for as many as possible loads can be recovered within as short time period as possible. In the proposed model, in which the weight of minimum path and restoration of power supply for maximum essential loads are taken as objectives and the recovered power supply for loads not exceeding the generating capacity of DG is taken as one of constraints, is solved by the modified particle swarm optimization (MPSO). Simulation results of IEEE 33-bus system show that the proposed method is

  3. Vector lifting scheme for phase-shifting holographic data compression

    Science.gov (United States)

    Xing, Yafei; Kaaniche, Mounir; Pesquet-Popescu, Béatrice; Dufaux, Frédéric

    2014-11-01

    With the increasing interest in holography in three-dimensional imaging applications, the use of hologram compression techniques is mandatory for storage and transmission purposes. The state-of-the-art approach aims at encoding separately each interference pattern by resorting to common still-image compression techniques. Contrary to such an independent scheme, a joint hologram coding scheme is investigated in this paper. More precisely, instead of encoding all the interference patterns, it is proposed that only two sets of data be compressed by taking into account the redundancies existing among them. The resulting data are encoded by applying a joint multiscale decomposition based on the vector lifting concept. Experimental results show the benefits that can be drawn from the proposed hologram compression approach.

  4. A generalized Ramsey excitation scheme with suppressed light shift

    CERN Document Server

    Huntemann, N; Okhapkin, M; Tamm, Chr; Peik, E; Taichenachev, A V; Yudin, V I

    2012-01-01

    We experimentally investigate a recently proposed optical excitation scheme [V.I. Yudin et al., Phys. Rev. A 82, 011804(R)(2010)] that is a generalization of Ramsey's method of separated oscillatory fields and consists of a sequence of three excitation pulses. The pulse sequence is tailored to produce a resonance signal which is immune to the light shift and other shifts of the transition frequency that are correlated with the interaction with the probe field. We investigate the scheme using a single trapped 171Yb+ ion and excite the highly forbidden 2S1/2-2F7/2 electric-octupole transition under conditions where the light shift is much larger than the excitation linewidth, which is in the Hertz range. The experiments demonstrate a suppression of the light shift by four orders of magnitude and an immunity against its fluctuations.

  5. Generalized Ramsey excitation scheme with suppressed light shift.

    Science.gov (United States)

    Huntemann, N; Lipphardt, B; Okhapkin, M; Tamm, Chr; Peik, E; Taichenachev, A V; Yudin, V I

    2012-11-21

    We experimentally investigate a recently proposed optical excitation scheme V. I. Yudin et al. [Phys. Rev. A 82, 011804(R) (2010)] that is a generalization of Ramsey's method of separated oscillatory fields and consists of a sequence of three excitation pulses. The pulse sequence is tailored to produce a resonance signal that is immune to the light shift and other shifts of the transition frequency that are correlated with the interaction with the probe field. We investigate the scheme using a single trapped ^{171}Yb^{+} ion and excite the highly forbidden (2)S(1/2) - (2)F(7/2) electric-octupole transition under conditions where the light shift is much larger than the excitation linewidth, which is in the hertz range. The experiments demonstrate a suppression of the light shift by four orders of magnitude and an immunity against its fluctuations.

  6. A Novel Distributed Detection Scheme against DDoS Attack

    Directory of Open Access Journals (Sweden)

    Zaihong Zhou

    2009-11-01

    Full Text Available A novel detection scheme against DDoS attack is proposed from a distributed perspective. The distributed end-hosts in the Internet are organized into a P2P network by Chord protocol for detection. The detection algorithm based on CUSUM and space similarity is deployed at each node in the P2P detection network. The P2P-based detection network is adopted, which makes the scheme be able to scale to the situation with a large number of detection nodes. CUSUM-based detection at the end-host can detect the slight change at the host. Thus it implements the early detection against DDoS attack, and relieves the detection burden at the victim end. It also can prevent the DDoS attack from forging and randomly changing the IP address, so it can locate the real attack hosts. Node trust is introduced for abnormal information broadcast, which can prevent network from congestion caused by malicious broadcast from malicious nodes. Abnormality detection among nodes based on space similarity can improve the detection accuracy. The experimental results indicate that the proposed scheme has better performance than CUSUM and time similarity algorithm individually deployed. It can reach as high as 96.1% detection rate and only 6.9% false positive rate. This P2P-based scheme can be applied to resolve the communication problem in other distributed application system.

  7. Rural health prepayment schemes in China: towards a more active role for government.

    Science.gov (United States)

    Bloom, G; Shenglan, T

    1999-04-01

    A large majority of China's rural population were members of health prepayment schemes in the 1970's. Most of these schemes collapsed during the transition to a market economy. Some localities subsequently reestablished schemes. In early 1997 a new government policy identified health prepayment as a major potential source of rural health finance. This paper draws on the experience of existing schemes to explore how government can support implementation of this policy. The decision to support the establishment of health prepayment schemes is part of the government's effort to establish new sources of finance for social services. It believes that individuals are more likely to accept voluntary contributions to a prepayment scheme than tax increases. The voluntary nature of the contributions limits the possibilities for risk-sharing and redistribution between rich and poor. This underlines the need for the government to fund a substantial share of health expenditure out of general revenues, particularly in poor localities. The paper notes that many successful prepayment schemes depend on close supervision by local political leaders. It argues that the national programme will have to translate these measures into a regulatory system which defines the responsibilities of scheme management bodies and local governments. A number of prepayment schemes have collapsed because members did not feel they got value for money. Local health bureaux will have to cooperate with prepayment schemes to ensure that health facilities provide good quality services at a reasonable cost. Users' representatives can also monitor performance. The paper concludes that government needs to clarify the relationship between health prepayment schemes and other actors in rural localities in order to increase the chance that schemes will become a major source rural health finance.

  8. Scheme of thinking quantum systems

    CERN Document Server

    Yukalov, V I

    2009-01-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  9. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...

  10. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular......, it will be shown that there frequently exists a trade-off between the creation of incentives for distributed generators and for distribution system operators to facilitate the integration of distributed generation. Secondly, the interaction of these policy dimensions is analyzed, including case studies based...

  11. Scheme of thinking quantum systems

    Science.gov (United States)

    Yukalov, V. I.; Sornette, D.

    2009-11-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  12. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular......, it will be shown that there frequently exists a trade-off between the creation of incentives for distributed generators and for distribution system operators to facilitate the integration of distributed generation. Secondly, the interaction of these policy dimensions is analyzed, including case studies based...

  13. Sound classification of dwellings – A diversity of national schemes in Europe

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2011-01-01

    constructions fulfilling different classes. The current variety of descriptors and classes also causes trade barriers. Thus, there is a need to harmonize characteristics of the schemes, and a European COST Action TU0901 "Integrating and Harmonizing Sound Insulation Aspects in Sustainable Urban Housing......Sound classification schemes for dwellings exist in ten countries in Europe, typically prepared and published as national standards. The schemes define quality classes intended to reflect different levels of acoustical comfort. The main criteria concern airborne and impact sound insulation between...... dwellings, facade sound insulation and installation noise. This paper presents the sound classification schemes in Europe and compares the class criteria for sound insulation between dwellings. The schemes have been implemented and revised gradually since the early 1990s. However, due to lack...

  14. Marital separation and health: stress and intervention.

    Science.gov (United States)

    Wertlieb, D; Budman, S; Demby, A; Randall, M

    1984-01-01

    Marital separation is a stressful life event implicated in much current thinking and practice in mental health, health psychology and psychosomatic medicine. This study examines marital separation in a controlled, prospective design. The participants were 314 Health Maintenance Organization (HMO) subscribers followed over a two year period. Marital separation was experienced by 127 of these participants early in the two-year study period. A stratified random half of these separated individuals participated in a short-term psychoeducational group intervention, "Seminars for the Separated." Measures of psychosocial adjustment and medical utilization were analyzed to describe correlates of marital separation and to evaluate the intervention. Statistically significant increases in medical utilization by people experiencing marital separation were observed in comparisons with married control subjects. Much of this increased utilization occurred in the year surrounding the actual separation and may be accounted for by mental health visits as well as nonmental health contacts with the health plan. The effects of the intervention were not evident until controls for baseline levels of medical utilization were introduced into the multivariate analysis. Even then, intervention effects were slight. Methodological problems and implications for further study are presented.

  15. Improvement of Some Proxy Signature Schemes

    Institute of Scientific and Technical Information of China (English)

    LIJiguo; LIANGZhenghe; ZHUYuelong; HANGYichen

    2005-01-01

    In 1996, Mambo et al. introduced the concept of proxy signature. Proxy signature can be applied to mobile agent, e-vote etc. Recently, Sun and Hsieh showed that Lee et al's strong proxy signature scheme and its application to multi-proxy signature scheme, Shum and Wei's privacy-protected strong proxy signature scheme, and Park and Lee's nominative proxy signature scheme were all insecure against the original signer's forgery attack. In this paper, we show those proxy signature schemes don't withstand public key substitution attack and give some slight but important modifications for those proxy signature schemes such that the resulting schemes are secure against the original signer's forgery attack and public key substitution attack. In addition, we show that Park and Lee's nominative proxy signature scheme don't satisfy strong nonrepudiation and strong identifiability. Improved schemes satisfy all properties of strong proxy signature scheme, and doesn't use secure channel between the original signer and the proxy signer.

  16. Radiochemical separation of Cobalt

    NARCIS (Netherlands)

    Erkelens, P.C. van

    1961-01-01

    A method is described for the radiochemical separation of cobalt based on the extraordinary stability of cobalt diethyldithiocarbamate. Interferences are few; only very small amounts of zinc and iron accompany cobalt, which is important in neutron-activation analysis.

  17. On Separate Universes

    CERN Document Server

    Dai, Liang; Schmidt, Fabian

    2015-01-01

    The separate universe conjecture states that in General Relativity a density perturbation behaves locally (i.e. on scales much smaller than the wavelength of the mode) as a separate universe with different background density and curvature. We prove this conjecture for a spherical compensated tophat density perturbation of arbitrary amplitude and radius in $\\Lambda$CDM. We then use Conformal Fermi Coordinates to generalize this result to scalar perturbations of arbitrary configuration and scale in a general cosmology with a mixture of fluids, but to linear order in perturbations. In this case, the separate universe conjecture holds for the isotropic part of the perturbations. The anisotropic part on the other hand is exactly captured by a tidal field in the Newtonian form. We show that the separate universe picture is restricted to scales larger than the sound horizons of all fluid components. We then derive an expression for the locally measured matter bispectrum induced by a long-wavelength mode of arbitrary...

  18. Electroextraction separation of dyestuffs

    Energy Technology Data Exchange (ETDEWEB)

    Luo, G.S.; Yu, M.J.; Jiang, W.B.; Zhu, S.L.; Dai, Y.Y. [Tsinghua Univ., Beijing (China). Dept. of Chemical Engineering

    1999-03-01

    Electroseparation technologies have prospects for significant growth well into the next century. Electroextraction, a coupled separation technique of solvent extraction with electrophoresis, was used to remove dyestuffs from their aqueous stream. A study on the characteristics of the separation technique was carried out with n-butanol/acid-chrom blue K/water and n-butanol/methyl blue/water as working systems. A continuous separation equipment was designed and sued in this work. The influences of two-phase flow, field strength, and concentration of the feed on the recovery of solute were studied. The results showed that much higher recovery of solute with less solvent consumption could be achieved by using this technique to remove dyes from their aqueous streams, especially for the separation of the dilute solution. When the field strength is increased, the recovery and mass flux increase. When the feed flow rate and the initial solute concentration are increased, the recovery decreases and the mass flux increases.

  19. Shoulder separation - aftercare

    Science.gov (United States)

    ... and top of your shoulder blade A severe shoulder separation You may need surgery right away if you have: Numbness in your fingers Cold fingers Muscle weakness in your arm Severe deformity of the joint

  20. Radiochemical separation of Cobalt

    NARCIS (Netherlands)

    Erkelens, P.C. van

    1961-01-01

    A method is described for the radiochemical separation of cobalt based on the extraordinary stability of cobalt diethyldithiocarbamate. Interferences are few; only very small amounts of zinc and iron accompany cobalt, which is important in neutron-activation analysis.

  1. Safe Separators for Treewidth

    NARCIS (Netherlands)

    Bodlaender, H.L.; Koster, A.M.C.A.

    2003-01-01

    A set of vertices S Í V is called a safe separator for treewidth, if S is a separator of G, and the treewidth of G equals the maximum of the treewidth over all connected components W of G - S of the graph, obtained by making S a clique in the subgraph of G, induced by W È S. We show that such safe s

  2. Hydrogen separation process

    Science.gov (United States)

    Mundschau, Michael [Longmont, CO; Xie, Xiaobing [Foster City, CA; Evenson, IV, Carl; Grimmer, Paul [Longmont, CO; Wright, Harold [Longmont, CO

    2011-05-24

    A method for separating a hydrogen-rich product stream from a feed stream comprising hydrogen and at least one carbon-containing gas, comprising feeding the feed stream, at an inlet pressure greater than atmospheric pressure and a temperature greater than 200.degree. C., to a hydrogen separation membrane system comprising a membrane that is selectively permeable to hydrogen, and producing a hydrogen-rich permeate product stream on the permeate side of the membrane and a carbon dioxide-rich product raffinate stream on the raffinate side of the membrane. A method for separating a hydrogen-rich product stream from a feed stream comprising hydrogen and at least one carbon-containing gas, comprising feeding the feed stream, at an inlet pressure greater than atmospheric pressure and a temperature greater than 200.degree. C., to an integrated water gas shift/hydrogen separation membrane system wherein the hydrogen separation membrane system comprises a membrane that is selectively permeable to hydrogen, and producing a hydrogen-rich permeate product stream on the permeate side of the membrane and a carbon dioxide-rich product raffinate stream on the raffinate side of the membrane. A method for pretreating a membrane, comprising: heating the membrane to a desired operating temperature and desired feed pressure in a flow of inert gas for a sufficient time to cause the membrane to mechanically deform; decreasing the feed pressure to approximately ambient pressure; and optionally, flowing an oxidizing agent across the membrane before, during, or after deformation of the membrane. A method of supporting a hydrogen separation membrane system comprising selecting a hydrogen separation membrane system comprising one or more catalyst outer layers deposited on a hydrogen transport membrane layer and sealing the hydrogen separation membrane system to a porous support.

  3. Separation techniques: Chromatography

    OpenAIRE

    Coskun, Ozlem

    2016-01-01

    Chromatography is an important biophysical technique that enables the separation, identification, and purification of the components of a mixture for qualitative and quantitative analysis. Proteins can be purified based on characteristics such as size and shape, total charge, hydrophobic groups present on the surface, and binding capacity with the stationary phase. Four separation techniques based on molecular characteristics and interaction type use mechanisms of ion exchange, surface adsorp...

  4. Distal humeral epiphyseal separation.

    Science.gov (United States)

    Moucha, Calin S; Mason, Dan E

    2003-10-01

    Distal humeral epiphyseal separation is an uncommon injury that is often misdiagnosed upon initial presentation. To make a timely, correct diagnosis, the treating physician must have a thorough understanding of basic anatomical relationships and an awareness of the existence of this injury. This is a case of a child who sustained a separation of the distal humeral epiphysis, as well as multiple other bony injuries, secondary to child abuse.

  5. An implicit evolution scheme for active contours and surfaces based on IIR filtering.

    Science.gov (United States)

    Delibasis, Konstantinos K; Asvestas, Pantelis A; Kechriniotis, Aristides I; Matsopoulos, George K

    2014-05-01

    In this work, we present an approach for implementing an implicit scheme for the numerical solution of the partial differential equation of the evolution of an active contour/surface. The proposed scheme is applicable to any variant of the traditional active contour (AC), irrespectively of the calculation of the image-based force field and it is readily applicable to explicitly parameterized active surfaces (AS). The proposed approach is formulated as an infinite impulse response (IIR) filtering of the coordinates of the contour/surface points. The poles of the filter are determined by the parameters controlling the shape of the active contour/surface. We show that the proposed IIR-based implicit evolution scheme has very low complexity. Furthermore, the proposed scheme is numerically stable, thus it allows the convergence of the AC/AS with significantly fewer iterations than the explicit evolution scheme. It also possesses the separability property along the two parameters of the AS, thus it may be applied to deformable surfaces, without the need to store and invert large sparse matrices. We implemented the proposed IIR-based implicit evolution scheme in the Vector Field Convolution (VFC) AC/AS using synthetic and clinical volumetric data. We compared the segmentation results with those of the explicit AC/AS evolution, in terms of accuracy and efficiency. Results show that the VFC AC/AS with the proposed IIR-based implicit evolution scheme achieves the same segmentation results with the explicit scheme, with considerably less computation time.

  6. A Linearized Prognostic Cloud Scheme in NASAs Goddard Earth Observing System Data Assimilation Tools

    Science.gov (United States)

    Holdaway, Daniel; Errico, Ronald M.; Gelaro, Ronald; Kim, Jong G.; Mahajan, Rahul

    2015-01-01

    A linearized prognostic cloud scheme has been developed to accompany the linearized convection scheme recently implemented in NASA's Goddard Earth Observing System data assimilation tools. The linearization, developed from the nonlinear cloud scheme, treats cloud variables prognostically so they are subject to linearized advection, diffusion, generation, and evaporation. Four linearized cloud variables are modeled, the ice and water phases of clouds generated by large-scale condensation and, separately, by detraining convection. For each species the scheme models their sources, sublimation, evaporation, and autoconversion. Large-scale, anvil and convective species of precipitation are modeled and evaporated. The cloud scheme exhibits linearity and realistic perturbation growth, except around the generation of clouds through large-scale condensation. Discontinuities and steep gradients are widely used here and severe problems occur in the calculation of cloud fraction. For data assimilation applications this poor behavior is controlled by replacing this part of the scheme with a perturbation model. For observation impacts, where efficiency is less of a concern, a filtering is developed that examines the Jacobian. The replacement scheme is only invoked if Jacobian elements or eigenvalues violate a series of tuned constants. The linearized prognostic cloud scheme is tested by comparing the linear and nonlinear perturbation trajectories for 6-, 12-, and 24-h forecast times. The tangent linear model performs well and perturbations of clouds are well captured for the lead times of interest.

  7. Time Reversal UWB Communication System: A Novel Modulation Scheme with Experimental Validation

    Directory of Open Access Journals (Sweden)

    I. H. Naqvi

    2010-01-01

    Full Text Available A new modulation scheme is proposed for a time reversal (TR ultra wide-band (UWB communication system. The new modulation scheme uses the binary pulse amplitude modulation (BPAM and adds a new level of modulation to increase the data rate of a TR UWB communication system. Multiple data bits can be transmitted simultaneously with a cost of little added interference. Bit error rate (BER performance and the maximum achievable data rate of the new modulation scheme are theoretically analyzed. Two separate measurement campaigns are carried out to analyze the proposed modulation scheme. In the first campaign, the frequency responses of a typical indoor channel are measured and the performance is studied by the simulations using the measured frequency responses. Theoretical and the simulative performances are in strong agreement with each other. Furthermore, the BER performance of the proposed modulation scheme is compared with the performance of existing modulation schemes. It is shown that the proposed modulation scheme outperforms QAM and PAM for M≥4 in an AWGN channel. In the second campaign, an experimental validation of the proposed modulation scheme is done. It is shown that the performances with the two measurement campaigns are in good agreement.

  8. Time Reversal UWB Communication System: A Novel Modulation Scheme with Experimental Validation

    Directory of Open Access Journals (Sweden)

    Khaleghi A

    2010-01-01

    Full Text Available A new modulation scheme is proposed for a time reversal (TR ultra wide-band (UWB communication system. The new modulation scheme uses the binary pulse amplitude modulation (BPAM and adds a new level of modulation to increase the data rate of a TR UWB communication system. Multiple data bits can be transmitted simultaneously with a cost of little added interference. Bit error rate (BER performance and the maximum achievable data rate of the new modulation scheme are theoretically analyzed. Two separate measurement campaigns are carried out to analyze the proposed modulation scheme. In the first campaign, the frequency responses of a typical indoor channel are measured and the performance is studied by the simulations using the measured frequency responses. Theoretical and the simulative performances are in strong agreement with each other. Furthermore, the BER performance of the proposed modulation scheme is compared with the performance of existing modulation schemes. It is shown that the proposed modulation scheme outperforms QAM and PAM for in an AWGN channel. In the second campaign, an experimental validation of the proposed modulation scheme is done. It is shown that the performances with the two measurement campaigns are in good agreement.

  9. Electrostatic separation of mineral and vegetal powders with a custom built corona separator: application to biorefinery of rice husk

    Directory of Open Access Journals (Sweden)

    Rajaonarivony Rova Karine

    2017-01-01

    Full Text Available In a dry biorefinery scheme, the separation of plant materials into powders rich in the constituents of interest is a crucial step. In recent years, electrostatic separation of agri-resources has sparked a growing interest for its potentialities, but optimization efforts remain to be done especially in case of fine powders. In this study a custom-designed corona-electrostatic separator has been built and its usage for the separation of mineral (ash from rice husk and vegetal powders (cellulose fibers with different particle size distributions has been studied. First, the powders have been characterized by their electric charge decay curves and their behaviour on the separator was studied. At a second time, separation tests have been carried out with blends of these two powders, and with native, finely ground, rice husk powder (constituted of both mineral and vegetal particles. In each case, the efficiency of the process was evaluated.

  10. Electrostatic separation of mineral and vegetal powders with a custom built corona separator: application to biorefinery of rice husk

    Science.gov (United States)

    Rajaonarivony, Rova Karine; Rouau, Xavier; Dascalescu, Lucien; Mayer-Laigle, Claire

    2017-06-01

    In a dry biorefinery scheme, the separation of plant materials into powders rich in the constituents of interest is a crucial step. In recent years, electrostatic separation of agri-resources has sparked a growing interest for its potentialities, but optimization efforts remain to be done especially in case of fine powders. In this study a custom-designed corona-electrostatic separator has been built and its usage for the separation of mineral (ash from rice husk) and vegetal powders (cellulose fibers) with different particle size distributions has been studied. First, the powders have been characterized by their electric charge decay curves and their behaviour on the separator was studied. At a second time, separation tests have been carried out with blends of these two powders, and with native, finely ground, rice husk powder (constituted of both mineral and vegetal particles). In each case, the efficiency of the process was evaluated.

  11. Analyses of models for promotion schemes and ownership arrangements

    DEFF Research Database (Denmark)

    Hansen, Lise-Lotte Pade; Schröder, Sascha Thorsten; Münster, Marie

    2011-01-01

    based microCHP will be able to contribute to an innovative system where the customer produces his own heat and partly his own electricity. Furthermore, stationary fuel cells as a part of a distributed generation system are also regarded as a potential to improve the national security of supply as well...... as increase the national competitiveness. The stationary fuel cell technology is still in a rather early stage of development and faces a long list of challenges and barriers of which some are linked directly to the technology through the need of cost decrease and reliability improvements. Others are linked...... countries should opt to support stationary fuel cells, we find that in Denmark it would be promising to apply the net metering based support scheme for households with an electricity consumption exceeding the electricity production from the fuel cell. In France and Portugal the most promising support scheme...

  12. Scheme for Generation of Entanglement among Bimodal Cavities

    Institute of Scientific and Technical Information of China (English)

    SONG Xin-Guo; FENG Xun-Li

    2004-01-01

    @@ We present a scheme for generation of an entangled state in many spatially separated bimodal cavity modes via cavity quantum electrodynamics. A V-type three-level atom, initially prepared in a coherent superposition of its excited states, successively passes through both the bimodal cavities. If the atom is measured in its ground state after leaving the last cavity, an entangled state of many cavity modes can be generated. The conditions to generate the maximally entangled state with unity probability are worked out.

  13. Rapid Parameterization Schemes for Aircraft Shape Optimization

    Science.gov (United States)

    Li, Wu

    2012-01-01

    A rapid shape parameterization tool called PROTEUS is developed for aircraft shape optimization. This tool can be applied directly to any aircraft geometry that has been defined in PLOT3D format, with the restriction that each aircraft component must be defined by only one data block. PROTEUS has eight types of parameterization schemes: planform, wing surface, twist, body surface, body scaling, body camber line, shifting/scaling, and linear morphing. These parametric schemes can be applied to two types of components: wing-type surfaces (e.g., wing, canard, horizontal tail, vertical tail, and pylon) and body-type surfaces (e.g., fuselage, pod, and nacelle). These schemes permit the easy setup of commonly used shape modification methods, and each customized parametric scheme can be applied to the same type of component for any configuration. This paper explains the mathematics for these parametric schemes and uses two supersonic configurations to demonstrate the application of these schemes.

  14. On Optimal Designs of Some Censoring Schemes

    Directory of Open Access Journals (Sweden)

    Dr. Adnan Mohammad Awad

    2016-03-01

    Full Text Available The main objective of this paper  is to explore suitability of some entropy-information measures for introducing a new optimality censoring criterion and to apply it to some censoring schemes from some underlying life-time models.  In addition, the  paper investigates four related issues namely; the  effect of the parameter of parent distribution on optimal scheme, equivalence of schemes based on Shannon and Awad sup-entropy measures, the conjecture that the optimal scheme is one stage scheme, and  a conjecture by Cramer and Bagh (2011 about Shannon minimum and maximum schemes when parent distribution is reflected power. Guidelines for designing an optimal censoring plane are reported together with theoretical and numerical results and illustrations.

  15. A Signature Scheme with Non-Repudiation

    Institute of Scientific and Technical Information of China (English)

    XIN Xiangjun; GUO Xiaoli; XIAO Guozhen

    2006-01-01

    Based on the Schnorr signature scheme, a new signature scheme with non-repudiation is proposed. In this scheme, only the signer and the designated receiver can verify the signature signed by the signer, and if necessary, both the signer and the designated receiver can prove and show the validity of the signature signed by the signer. The proof of the validity of the signature is noninteractive and transferable. To verify and prove the validity of the signature, the signer and the nominated receiver needn't store extra information besides the signature. At the same time, neither the signer nor the designated receiver can deny a valid signature signed. Then, there is no repudiation in this new signature scheme. According to the security analysis of this scheme, it is found the proposed scheme is secure against existential forgery on adaptive chosen message attack.

  16. A Note on Separable Nonlinear Least Squares Problem

    CERN Document Server

    Gharibi, Wajeb

    2011-01-01

    Separable nonlinear least squares (SNLS)problem is a special class of nonlinear least squares (NLS)problems, whose objective function is a mixture of linear and nonlinear functions. It has many applications in many different areas, especially in Operations Research and Computer Sciences. They are difficult to solve with the infinite-norm metric. In this paper, we give a short note on the separable nonlinear least squares problem, unseparated scheme for NLS, and propose an algorithm for solving mixed linear-nonlinear minimization problem, method of which results in solving a series of least squares separable problems.

  17. Multi-object quantum traveling ballot scheme

    Institute of Scientific and Technical Information of China (English)

    Yuan Li; Guihua Zeng

    2009-01-01

    Based on quantum mechanics, a traveling ballot scheme with anonymity and secrecy is introduced to realize voting. By searching the objects in large amount of data bases, every voter may cast votes to his desired candidates. Therefore, the proposed scheme may be applied to voting with a great deal of candidates, such as network voting and so on. The security analysis of the present scheme is also performed.

  18. SYNCHRONIZATION RECOVERY SCHEME IN WATERMARKING DETECTION

    Institute of Scientific and Technical Information of China (English)

    Xiao Weiwei; Zhang Li; Ji Zhen; Zhang Jihong

    2003-01-01

    Most proposed digital watermarking algorithms are sensitive to geometric attacksbecause the synchronization information of watermark embedding and detection is destroyed. Inthis letter a novel synchronization recovery scheme based on image normalization is proposed. Thepresented scheme does not require the original image and can be applied to various watermarksystems. A wavelet-based watermarking scheme is proposed as an example and experimentalresults show that it is robust to geometric attacks.

  19. Blind Signature Scheme Based on Chebyshev Polynomials

    Directory of Open Access Journals (Sweden)

    Maheswara Rao Valluri

    2011-12-01

    Full Text Available A blind signature scheme is a cryptographic protocol to obtain a valid signature for a message from a signer such that signer’s view of the protocol can’t be linked to the resulting message signature pair. This paper presents blind signature scheme using Chebyshev polynomials. The security of the given scheme depends upon the intractability of the integer factorization problem and discrete logarithms ofChebyshev polynomials.

  20. Blind Signature Scheme Based on Chebyshev Polynomials

    OpenAIRE

    Maheswara Rao Valluri

    2011-01-01

    A blind signature scheme is a cryptographic protocol to obtain a valid signature for a message from a signer such that signer’s view of the protocol can’t be linked to the resulting message signature pair. This paper presents blind signature scheme using Chebyshev polynomials. The security of the given scheme depends upon the intractability of the integer factorization problem and discrete logarithms ofChebyshev polynomials.

  1. Pyramid Schemes on the Tibetan Plateau

    OpenAIRE

    Devin Gonier; Rgyal yum sgrol ma

    2012-01-01

    The unique features of pyramid schemes and certain underlying causes for their development on the Tibetan Plateau are analyzed. Research was conducted by analyzing 521 surveys, allowing estimation of pyramid scheme activity on the Plateau and an identification of related cultural and social specificities. Firsthand accounts were collected revealing details of personal involvement. Survey data and similarities in the accounts were studied to suggest how involvement in pyramid schemes might be ...

  2. Resonance ionization scheme development for europium

    CERN Document Server

    Chrysalidis, K; Fedosseev, V N; Marsh, B A; Naubereit, P; Rothe, S; Seiffert, C; Kron, T; Wendt, K

    2017-01-01

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  3. Signcryption scheme based on schnorr digital signature

    CERN Document Server

    Savu, Laura

    2012-01-01

    This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.

  4. SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES

    OpenAIRE

    Adrian Atanasiu; Laura Savu

    2012-01-01

    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.

  5. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  6. General Compact Labeling Schemes for Dynamic Trees

    OpenAIRE

    2006-01-01

    Let $F$ be a function on pairs of vertices. An {\\em $F$- labeling scheme} is composed of a {\\em marker} algorithm for labeling the vertices of a graph with short labels, coupled with a {\\em decoder} algorithm allowing one to compute $F(u,v)$ of any two vertices $u$ and $v$ directly from their labels. As applications for labeling schemes concern mainly large and dynamically changing networks, it is of interest to study {\\em distributed dynamic} labeling schemes. This paper investigates labelin...

  7. Optimizing Decision Tree Attack on CAS Scheme

    Directory of Open Access Journals (Sweden)

    PERKOVIC, T.

    2016-05-01

    Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.

  8. Key Predistribution Schemes for Distributed Sensor Networks

    CERN Document Server

    Bose, Mausumi; Mukerjee, Rahul

    2011-01-01

    Key predistribution schemes for distributed sensor networks have received significant attention in the recent literature. In this paper we propose a new construction method for these schemes based on combinations of duals of standard block designs. Our method is a broad spectrum one which works for any intersection threshold. By varying the initial designs, we can generate various schemes and this makes the method quite flexible. We also obtain explicit algebraic expressions for the metrics for local connectivity and resiliency. These schemes are quite efficient with regard to connectivity and resiliency and at the same time they allow a straightforward shared-key discovery.

  9. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  10. Efficient Certificateless Signcryption Scheme from Weil Pairing

    Directory of Open Access Journals (Sweden)

    Gang Yu

    2011-08-01

    Full Text Available Certificateless signcryption has both the advantage of certificateless public key cryptography, which overcome the escrow problem inherited from identity based cryptography without the use of certificates as in traditional public key cryptography, and signcryption which can fulfill both the functions of signature and encryption in a logical signal step. In this paper, we explicit the security model for certificateless signcryption and propose an efficient certificateless signcryption scheme from Weil pairings. The new scheme not only can be proved to be secure in our model but also can simultaneously provide public verifiability and forward security. Furthermore, compared with existing schemes, the new scheme is more efficient.

  11. Hybrid scheme for Brownian semistationary processes

    DEFF Research Database (Denmark)

    Bennedsen, Mikkel; Lunde, Asger; Pakkanen, Mikko S.

    the asymptotics of the mean square error of the hybrid scheme and we observe that the scheme leads to a substantial improvement of accuracy compared to the ordinary forward Riemann-sum scheme, while having the same computational complexity. We exemplify the use of the hybrid scheme by two numerical experiments......, where we examine the finite-sample properties of an estimator of the roughness parameter of a Brownian semistationary process and study Monte Carlo option pricing in the rough Bergomi model of Bayer et al. (2015), respectively....

  12. An Improved Proxy Multi-Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    GU Li-ze; ZHANG Sheng; YANG Yi-xian

    2005-01-01

    Based on the Kim-like's proxy multi-signature scheme[1],an improved proxy multi-signature scheme is proposed.The new scheme overcomes the two problems in the Kim-like's proxy multi-signature scheme:(1)Security issue(every original signer can forge a valid proxy multi-signature for any message);(2)Efficiency issue(both the size of the proxy multi-signature and the efficiency of signature checking are dependent on the number of the original signers).

  13. Organic Separation Test Results

    Energy Technology Data Exchange (ETDEWEB)

    Russell, Renee L.; Rinehart, Donald E.; Peterson, Reid A.

    2014-09-22

    Separable organics have been defined as “those organic compounds of very limited solubility in the bulk waste and that can form a separate liquid phase or layer” (Smalley and Nguyen 2013), and result from three main solvent extraction processes: U Plant Uranium Recovery Process, B Plant Waste Fractionation Process, and Plutonium Uranium Extraction (PUREX) Process. The primary organic solvents associated with tank solids are TBP, D2EHPA, and NPH. There is concern that, while this organic material is bound to the sludge particles as it is stored in the tanks, waste feed delivery activities, specifically transfer pump and mixer pump operations, could cause the organics to form a separated layer in the tank farms feed tank. Therefore, Washington River Protection Solutions (WRPS) is experimentally evaluating the potential of organic solvents separating from the tank solids (sludge) during waste feed delivery activities, specifically the waste mixing and transfer processes. Given the Hanford Tank Waste Treatment and Immobilization Plant (WTP) waste acceptance criteria per the Waste Feed Acceptance Criteria document (24590-WTP-RPT-MGT-11-014) that there is to be “no visible layer” of separable organics in the waste feed, this would result in the batch being unacceptable to transfer to WTP. This study is of particular importance to WRPS because of these WTP requirements.

  14. Gulf stream separation dynamics

    Science.gov (United States)

    Schoonover, Joseph

    Climate models currently struggle with the more traditional, coarse ( O(100 km) ) representation of the ocean. In these coarse ocean simulations, western boundary currents are notoriously difficult to model accurately. The modeled Gulf Stream is typically seen exhibiting a mean pathway that is north of observations, and is linked to a warm sea-surface temperature bias in the Mid-Atlantic Bight. Although increased resolution ( O(10 km) ) improves the modeled Gulf Stream position, there is no clean recipe for obtaining the proper pathway. The 70 year history of literature on the Gulf Stream separation suggests that we have not reached a resolution on the dynamics that control the current's pathway just south of the Mid-Atlantic Bight. Without a concrete knowledge on the separation dynamics, we cannot provide a clean recipe for accurately modeling the Gulf Stream at increased resolutions. Further, any reliable parameterization that yields a realistic Gulf Stream path must express the proper physics of separation. The goal of this dissertation is to determine what controls the Gulf Stream separation. To do so, we examine the results of a model intercomparison study and a set of numerical regional terraforming experiments. It is argued that the separation is governed by local dynamics that are most sensitive to the steepening of the continental shelf, consistent with the topographic wave arrest hypothesis of Stern (1998). A linear extension of Stern's theory is provided, which illustrates that wave arrest is possible for a continuously stratified fluid.

  15. Separably injective Banach spaces

    CERN Document Server

    Avilés, Antonio; Castillo, Jesús M F; González, Manuel; Moreno, Yolanda

    2016-01-01

    This monograph contains a detailed exposition of the up-to-date theory of separably injective spaces: new and old results are put into perspective with concrete examples (such as l∞/c0 and C(K) spaces, where K is a finite height compact space or an F-space, ultrapowers of L∞ spaces and spaces of universal disposition). It is no exaggeration to say that the theory of separably injective Banach spaces is strikingly different from that of injective spaces. For instance, separably injective Banach spaces are not necessarily isometric to, or complemented subspaces of, spaces of continuous functions on a compact space. Moreover, in contrast to the scarcity of examples and general results concerning injective spaces, we know of many different types of separably injective spaces and there is a rich theory around them. The monograph is completed with a preparatory chapter on injective spaces, a chapter on higher cardinal versions of separable injectivity and a lively discussion of open problems and further lines o...

  16. Mass Separation by Metamaterials.

    Science.gov (United States)

    Restrepo-Flórez, Juan Manuel; Maldovan, Martin

    2016-02-25

    Being able to manipulate mass flow is critically important in a variety of physical processes in chemical and biomolecular science. For example, separation and catalytic systems, which requires precise control of mass diffusion, are crucial in the manufacturing of chemicals, crystal growth of semiconductors, waste recovery of biological solutes or chemicals, and production of artificial kidneys. Coordinate transformations and metamaterials are powerful methods to achieve precise manipulation of molecular diffusion. Here, we introduce a novel approach to obtain mass separation based on metamaterials that can sort chemical and biomolecular species by cloaking one compound while concentrating the other. A design strategy to realize such metamaterial using homogeneous isotropic materials is proposed. We present a practical case where a mixture of oxygen and nitrogen is manipulated using a metamaterial that cloaks nitrogen and concentrates oxygen. This work lays the foundation for molecular mass separation in biophysical and chemical systems through metamaterial devices.

  17. Phaco slice and separate.

    Science.gov (United States)

    Arshinoff, S A

    1999-04-01

    Phaco slice and separate retains the advantages of the chopping techniques of Nagahara, Koch, and Fukasaku but replaces chopping or snapping with slicing across the center of the phaco-tip-stabilized nucleus using a Nagahara chopper and then repositioning the chopper to optimally separate the divided lens halves. As the lens is rotated in the capsular bag, small pieces of the nuclear pie are sliced off, separated, emulsified, and aspirated. Emulsification and aspiration can alternatively be left until most or all the slices have been made. This technique works with a broader range of lens densities than other chopping techniques and uses no sculpting and very little phaco time. The phaco time required for this technique is relatively independent of nuclear density compared with a sculpting technique.

  18. Membrane separation of hydrocarbons

    Science.gov (United States)

    Chang, Y. Alice; Kulkarni, Sudhir S.; Funk, Edward W.

    1986-01-01

    Mixtures of heavy oils and light hydrocarbons may be separated by passing the mixture through a polymeric membrane. The membrane which is utilized to effect the separation comprises a polymer which is capable of maintaining its integrity in the presence of hydrocarbon compounds and which has been modified by being subjected to the action of a sulfonating agent. Sulfonating agents which may be employed will include fuming sulfuric acid, chlorosulfonic acid, sulfur trioxide, etc., the surface or bulk modified polymer will contain a degree of sulfonation ranging from about 15 to about 50%. The separation process is effected at temperatures ranging from about ambient to about 100.degree. C. and pressures ranging from about 50 to about 1000 psig.

  19. Optimal separable bases and molecular collisions

    Energy Technology Data Exchange (ETDEWEB)

    Poirier, L W [Univ. of California, Berkeley, CA (United States)

    1997-12-01

    A new methodology is proposed for the efficient determination of Green`s functions and eigenstates for quantum systems of two or more dimensions. For a given Hamiltonian, the best possible separable approximation is obtained from the set of all Hilbert space operators. It is shown that this determination itself, as well as the solution of the resultant approximation, are problems of reduced dimensionality for most systems of physical interest. Moreover, the approximate eigenstates constitute the optimal separable basis, in the sense of self-consistent field theory. These distorted waves give rise to a Born series with optimized convergence properties. Analytical results are presented for an application of the method to the two-dimensional shifted harmonic oscillator system. The primary interest however, is quantum reactive scattering in molecular systems. For numerical calculations, the use of distorted waves corresponds to numerical preconditioning. The new methodology therefore gives rise to an optimized preconditioning scheme for the efficient calculation of reactive and inelastic scattering amplitudes, especially at intermediate energies. This scheme is particularly suited to discrete variable representations (DVR`s) and iterative sparse matrix methods commonly employed in such calculations. State to state and cumulative reactive scattering results obtained via the optimized preconditioner are presented for the two-dimensional collinear H + H{sub 2} {yields} H{sub 2} + H system. Computational time and memory requirements for this system are drastically reduced in comparison with other methods, and results are obtained for previously prohibitive energy regimes.

  20. Optimal separable bases and molecular collisions

    Energy Technology Data Exchange (ETDEWEB)

    Poirier, Lionel W. [Univ. of California, Berkeley, CA (United States)

    1997-12-01

    A new methodology is proposed for the efficient determination of Green`s functions and eigenstates for quantum systems of two or more dimensions. For a given Hamiltonian, the best possible separable approximation is obtained from the set of all Hilbert space operators. It is shown that this determination itself, as well as the solution of the resultant approximation, are problems of reduced dimensionality for most systems of physical interest. Moreover, the approximate eigenstates constitute the optimal separable basis, in the sense of self-consistent field theory. These distorted waves give rise to a Born series with optimized convergence properties. Analytical results are presented for an application of the method to the two-dimensional shifted harmonic oscillator system. The primary interest however, is quantum reactive scattering in molecular systems. For numerical calculations, the use of distorted waves corresponds to numerical preconditioning. The new methodology therefore gives rise to an optimized preconditioning scheme for the efficient calculation of reactive and inelastic scattering amplitudes, especially at intermediate energies. This scheme is particularly suited to discrete variable representations (DVR`s) and iterative sparse matrix methods commonly employed in such calculations. State to state and cumulative reactive scattering results obtained via the optimized preconditioner are presented for the two-dimensional collinear H + H2 → H2 + H system. Computational time and memory requirements for this system are drastically reduced in comparison with other methods, and results are obtained for previously prohibitive energy regimes.

  1. Efficient Quantum Key Distribution Scheme And Proof of Its Unconditional Security

    CERN Document Server

    Lo, H K; Ardehali, M; Lo, Hoi-Kwong

    2000-01-01

    We devise a simple modification that essentially doubles the efficiency of the BB84 quantum key distribution scheme proposed by Bennett and Brassard. We also prove the security of our modified scheme against the most general eavesdropping attack that is allowed by the laws of physics. The first major ingredient of our scheme is the assignment of significantly different probabilities to the different polarization bases during both transmission and reception, thus reducing the fraction of discarded data. A second major ingredient of our scheme is a refined analysis of accepted data: We separate the accepted data into various subsets according to the basis employed and estimate an error rate for each subset {\\em separately}. We then show that such a refined data analysis guarantees the security of our scheme against the most general eavesdropping strategy, thus generalizing Shor and Preskill's proof of security of BB84 to our new scheme. Up till now, most proposed proofs of security of single-particle type quant...

  2. Gas separation membranes

    Science.gov (United States)

    Schell, William J.

    1979-01-01

    A dry, fabric supported, polymeric gas separation membrane, such as cellulose acetate, is prepared by casting a solution of the polymer onto a shrinkable fabric preferably formed of synthetic polymers such as polyester or polyamide filaments before washing, stretching or calendering (so called griege goods). The supported membrane is then subjected to gelling, annealing, and drying by solvent exchange. During the processing steps, both the fabric support and the membrane shrink a preselected, controlled amount which prevents curling, wrinkling or cracking of the membrane in flat form or when spirally wound into a gas separation element.

  3. Separation membrane development

    Energy Technology Data Exchange (ETDEWEB)

    Lee, M.W. [Savannah River Technology Center, Aiken, SC (United States)

    1998-08-01

    A ceramic membrane has been developed to separate hydrogen from other gases. The method used is a sol-gel process. A thin layer of dense ceramic material is coated on a coarse ceramic filter substrate. The pore size distribution in the thin layer is controlled by a densification of the coating materials by heat treatment. The membrane has been tested by permeation measurement of the hydrogen and other gases. Selectivity of the membrane has been achieved to separate hydrogen from carbon monoxide. The permeation rate of hydrogen through the ceramic membrane was about 20 times larger than Pd-Ag membrane.

  4. Separation techniques: Chromatography

    Science.gov (United States)

    Coskun, Ozlem

    2016-01-01

    Chromatography is an important biophysical technique that enables the separation, identification, and purification of the components of a mixture for qualitative and quantitative analysis. Proteins can be purified based on characteristics such as size and shape, total charge, hydrophobic groups present on the surface, and binding capacity with the stationary phase. Four separation techniques based on molecular characteristics and interaction type use mechanisms of ion exchange, surface adsorption, partition, and size exclusion. Other chromatography techniques are based on the stationary bed, including column, thin layer, and paper chromatography. Column chromatography is one of the most common methods of protein purification. PMID:28058406

  5. Learning Isometric Separation Maps

    CERN Document Server

    Vasiloglou, Nikolaos; Anderson, David V

    2008-01-01

    Maximum Variance Unfolding (MVU) and its variants have been very successful in embedding data-manifolds in lower dimensionality spaces, often revealing the true intrinsic dimensions. In this paper we show how to also incorporate supervised class information into an MVU-like method without breaking its convexity. We call this method the Isometric Separation Map and we show that the resulting kernel matrix can be used for a binary/multiclass Support Vector Machine in a semi-supervised (transductive) framework. We also show that the method always finds a kernel matrix that linearly separates the training data exactly without projecting them in infinite dimensional spaces.

  6. Separators for electrochemical cells

    Science.gov (United States)

    Carlson, Steven Allen; Anakor, Ifenna Kingsley

    2014-11-11

    Provided are separators for use in an electrochemical cell comprising (a) an inorganic oxide and (b) an organic polymer, wherein the inorganic oxide comprises organic substituents. Preferably, the inorganic oxide comprises an hydrated aluminum oxide of the formula Al.sub.2O.sub.3.xH.sub.2O, wherein x is less than 1.0, and wherein the hydrated aluminum oxide comprises organic substituents, preferably comprising a reaction product of a multifunctional monomer and/or organic carbonate with an aluminum oxide, such as pseudo-boehmite and an aluminum oxide. Also provided are electrochemical cells comprising such separators.

  7. Chorionic Villus Sampling and Marked Membrane Separation

    Directory of Open Access Journals (Sweden)

    Sh. Akhlaghpoor

    2010-12-01

    Full Text Available Background/Objective: The major concern about the invasive prenatal diagnostic tests is the"nfrequency of procedure induced pregnancy loss. Chorionic Villus Sampling (CVS is the invasive"ntest of choice in the first trimester after the 10th gestational week. Our experience suggests"nmarked chorioamniotic separation is an uncommon finding after the 10th gestational week. This"nstudy assesses the rate of marked membrane separation in a 10 to 14-week gestational period"nand its effect on post CVS fetal loss."nPatients and Methods: Forty-one patients (5.2% were selected among 782 patients as cases"nwith marked membrane separation (mean maternal age, 26.9 years. CVS procedures were"nperformed with a 20-gauge Chiba needle attached to a 20-ml syringe under ultrasound guidance."nFollow-up was performed by phone call and clinical visits until 24 weeks of gestation. For the"ncontrol group, the follow-up was performed for only 2 weeks. Early fetal loss in the first two"nweeks of post procedural period, and late fetal loss from 2 weeks after procedure till the 24th"ngestational week were considered as CVS complications."nResults: We detected 2.4% early fetal losses after the procedure. Fourteen cases voluntarily"nunderwent therapeutic abortion due to beta-thalassemia or hemophilia. One fetus with"nmicrocephaly was spontaneously aborted in the 21st gestational week. Twenty-five neonates"nwere delivered alive at term and one prematurely at the 32nd week. Marked membrane separation"nhad no significant effect on early post CVS fetal loss rate."nConclusion: The procedure does not have a major impact on the early post CVS fetal loss in"npatients with marked membrane separation.

  8. Separable Multichannel Momentum Space Potentials for Nuclear Reactions

    Science.gov (United States)

    Hlophe, Linda; Elster, Charlotte

    2016-09-01

    Many nuclei are deformed and their properties can be described using a rotational model. This involves defining a deformed surface of the nucleus and constructing the nucleon-nucleus interaction as a function of distance to the surface. Such a potential has non-zero matrix elements between different nuclear rotational states which are characterized by the spin-parity Iπ, leading to channel couplings. For specific reaction calculations, it is advantageous to have separable representations of the interaction matrix elements available. We develop separable representations following a scheme suggested by Ernst, Shakin, and Thaler (EST). Since optical potentials are complex and energy-dependent, the multichannel EST scheme is generalized to complex, energy-dependent separable potentials. In the case of proton-nucleus interactions the EST scheme is further extended to include charged particles. The multichannel EST scheme is applied to nucleon scattering off 12C, where the first two excited states (Iπ =2+ ,4+) are taken into account. Research for this project was supported in part by the US Department of Energy, Office of Science of Nuclear Physics under Contract No. DE-FG02-93ER40756.

  9. All-solid-state Z-scheme photocatalytic systems.

    Science.gov (United States)

    Zhou, Peng; Yu, Jiaguo; Jaroniec, Mietek

    2014-08-06

    The current rapid industrial development causes the serious energy and environmental crises. Photocatalyts provide a potential strategy to solve these problems because these materials not only can directly convert solar energy into usable or storable energy resources but also can decompose organic pollutants under solar-light irradiation. However, the aforementioned applications require photocatalysts with a wide absorption range, long-term stability, high charge-separation efficiency and strong redox ability. Unfortunately, it is often difficult for a single-component photocatalyst to simultaneously fulfill all these requirements. The artificial heterogeneous Z-scheme photocatalytic systems, mimicking the natural photosynthesis process, overcome the drawbacks of single-component photocatalysts and satisfy those aforementioned requirements. Such multi-task systems have been extensively investigated in the past decade. Especially, the all-solid-state Z-scheme photocatalytic systems without redox pair have been widely used in the water splitting, solar cells, degradation of pollutants and CO2 conversion, which have a huge potential to solve the current energy and environmental crises facing the modern industrial development. Thus, this review gives a concise overview of the all-solid-state Z-scheme photocatalytic systems, including their composition, construction, optimization and applications.

  10. A QUANTUM MULTIPLE ACCESS COMMUNICATIONS SCHEME USING ORBITAL ANGULAR MOMENTUM

    Institute of Scientific and Technical Information of China (English)

    Dong Xiaoliang; Zhao Shengmei; Zheng Baoyu

    2013-01-01

    We propose a quantum multiple access communications scheme using Orbital Angular Momentum (OAM) sector states in the paper.In the scheme,each user has an individual modified Poincare Bloch sphere and encodes his information with his own corresponding sector OAM states.A prepared entangled photon pairs are separated at transmitter and receiver.At the transmitter,each user encodes his information with the sector OAM states on the photons and the superposition of the different sector OAM states is carried by the photons.Then the photons are transmitted through quantum noiseless channel to the receiver.At the receiver,each user could retrieve his information by coincidently measuring the transmitted photons with the receiver side photons which are modulated by a special prepared measurement basis.The theoretical analysis and the numerical simulations show that each user could get his information from the superposition state without error.It seems that this scheme provides a novel method for quantum multiple users communications.

  11. Authentication Scheme Based on Principal Component Analysis for Satellite Images

    Directory of Open Access Journals (Sweden)

    Ashraf. K. Helmy

    2009-09-01

    Full Text Available This paper presents a multi-band wavelet image content authentication scheme for satellite images by incorporating the principal component analysis (PCA. The proposed schemeachieves higher perceptual transparency and stronger robustness. Specifically, the developed watermarking scheme can successfully resist common signal processing such as JPEG compression and geometric distortions such as cropping. In addition, the proposed scheme can be parameterized, thus resulting in more security. That is, an attacker may not be able to extract the embedded watermark if the attacker does not know the parameter.In an order to meet these requirements, the host image is transformed to YIQ to decrease the correlation between different bands, Then Multi-band Wavelet transform (M-WT is applied to each channel separately obtaining one approximate sub band and fifteen detail sub bands. PCA is then applied to the coefficients corresponding to the same spatial location in all detail sub bands. The last principle component band represents an excellent domain forinserting the water mark since it represents lowest correlated features in high frequency area of host image.One of the most important aspects of satellite images is spectral signature, the behavior of different features in different spectral bands, the results of proposed algorithm shows that the spectral stamp for different features doesn't tainted after inserting the watermark.

  12. A Novel User Authentication Scheme Based on QR-Code

    Directory of Open Access Journals (Sweden)

    Kuan-Chieh Liao

    2010-08-01

    Full Text Available User authentication is one of the fundamental procedures to ensure secure communications and share system resources over an insecure public network channel.  Thus, a simple and efficient authentication mechanism is required for securing the network system in the real environment. In general, the password-based authentication mechanism provides the basic capability to prevent unauthorized access. Especially, the purpose of the one-time password is to make it more difficult to gain unauthorized access to restricted resources. Instead of using the password file as conventional authentication systems, many researchers have devoted to implement various one-time password schemes using smart cards, time-synchronized token or short message service in order to reduce the risk of tampering and maintenance cost.  However, these schemes are impractical because of the far from ubiquitous hardware devices or the infrastructure requirements. To remedy these weaknesses, the attraction of the QR-code technique can be introduced into our one-time password authentication protocol. Not the same as before, the proposed scheme based on QR code not only eliminates the usage of the password verification table, but also is a cost effective solution since most internet users already have mobile phones. For this reason, instead of carrying around a separate hardware token for each security domain, the superiority of handiness benefit from the mobile phone makes our approach more practical and convenient.

  13. Realization of a novel meaningful digital image watermarking scheme

    Science.gov (United States)

    Liu, Hong; Liu, Quan

    2007-12-01

    In this paper, we propose a novel digital image scheme based on discrete cosine transformation (DCT). The most major difference between the traditional method and the proposed scheme is that it need not embed the watermark image into the original public image. Instead, separating the original image into many 8*8 pixels blocks and making DCT to every block, then extracting the DC(direct current) coefficient of each different block as the feature of the original image, thus we can gain a ownership map according to the feature of the original image and the watermark image. When piracy happens, the copyright owner can reveal his right via the ownership mapping and the feature of the suspected image to extracting the watermarking. In this process, we need not to be in virtue of the original public image. Moreover, the size of the watermark image is not restricted to be smaller than that of the original image. The experiment results are performed to demonstrate the robustness of the proposed scheme against several common attacks.

  14. Image integrity authentication scheme based on fixed point theory.

    Science.gov (United States)

    Li, Xu; Sun, Xingming; Liu, Quansheng

    2015-02-01

    Based on the fixed point theory, this paper proposes a new scheme for image integrity authentication, which is very different from digital signature and fragile watermarking. By the new scheme, the sender transforms an original image into a fixed point image (very close to the original one) of a well-chosen transform and sends the fixed point image (instead of the original one) to the receiver; using the same transform, the receiver checks the integrity of the received image by testing whether it is a fixed point image and locates the tampered areas if the image has been modified during the transmission. A realization of the new scheme is based on Gaussian convolution and deconvolution (GCD) transform, for which an existence theorem of fixed points is proved. The semifragility is analyzed via commutativity of transforms, and three commutativity theorems are found for the GCD transform. Three iterative algorithms are presented for finding a fixed point image with a few numbers of iterations, and for the whole procedure of image integrity authentication; a fragile authentication system and a semifragile one are separately built. Experiments show that both the systems have good performance in transparence, fragility, security, and tampering localization. In particular, the semifragile system can perfectly resist the rotation by a multiple of 90° flipping and brightness attacks.

  15. Sampling scheme optimization from hyperspectral data

    NARCIS (Netherlands)

    Debba, P.

    2006-01-01

    This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized

  16. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attribu

  17. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  18. Finite volume renormalization scheme for fermionic operators

    Energy Technology Data Exchange (ETDEWEB)

    Monahan, Christopher; Orginos, Kostas [JLAB

    2013-11-01

    We propose a new finite volume renormalization scheme. Our scheme is based on the Gradient Flow applied to both fermion and gauge fields and, much like the Schr\\"odinger functional method, allows for a nonperturbative determination of the scale dependence of operators using a step-scaling approach. We give some preliminary results for the pseudo-scalar density in the quenched approximation.

  19. Nonstandard finite difference schemes for differential equations

    Directory of Open Access Journals (Sweden)

    Mohammad Mehdizadeh Khalsaraei

    2014-12-01

    Full Text Available In this paper, the reorganization of the denominator of the discrete derivative and nonlocal approximation of nonlinear terms are used in the design of nonstandard finite difference schemes (NSFDs. Numerical examples confirming then efficiency of schemes, for some differential equations are provided. In order to illustrate the accuracy of the new NSFDs, the numerical results are compared with standard methods.

  20. Consolidation of the health insurance scheme

    CERN Multimedia

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  1. Unconditionnally stable scheme for Riccati equation

    CERN Document Server

    Dubois, François; 10.1051/proc:2000003

    2011-01-01

    We present a numerical scheme for the resolution of matrix Riccati equation used in control problems. The scheme is unconditionnally stable and the solution is definite positive at each time step of the resolution. We prove the convergence in the scalar case and present several numerical experiments for classical test cases.

  2. Modified Mean-Pyramid Coding Scheme

    Science.gov (United States)

    Cheung, Kar-Ming; Romer, Richard

    1996-01-01

    Modified mean-pyramid coding scheme requires transmission of slightly fewer data. Data-expansion factor reduced from 1/3 to 1/12. Schemes for progressive transmission of image data transmitted in sequence of frames in such way coarse version of image reconstructed after receipt of first frame and increasingly refined version of image reconstructed after receipt of each subsequent frame.

  3. A New Public-Key Encryption Scheme

    Institute of Scientific and Technical Information of China (English)

    Hai-Bo Tian; Xi Sun; Yu-Min Wang

    2007-01-01

    This paper proposes a new public-key encryption scheme which removes one element from the public-key tuple of the original Cramer-Shoup scheme.As a result, a ciphertext is not a quadruple but a triple at the cost of a strong assumption,the third version of knowledge of exponent assumption (KEA3).Under assumptions of KEA3, a decision Diffie-Hellman (DDH) and a variant of target collision resistance (TCRv), the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack (IND-CCA2).This scheme is as efficient as Damgard ElGamal (DEG) scheme when it makes use of a well-known algorithm for product of exponentiations.The DEG scheme is recently proved IND-CCA1 secure by Bellare and Palacio in ASIACRYPT 2004 under another strong assumption.In addition to our IND-CCA2 secured scheme, we also believe that the security proof procedure itself provides a well insight for ElGamal-based encryption schemes which are secure in real world.

  4. Novel Link Adaptation Schemes for OFDM System

    Institute of Scientific and Technical Information of China (English)

    LEI Ming; CAI Peng; XU Yue-shan; ZHANG Ping

    2003-01-01

    Orthogonal Frequency Division Multiplexing (OFDM) is the most promising technique supporting the high data rate transmission. The combination of the link adaptation and OFDM can further increase the spectral efficiency. In this paper, we put forward two link adaptation schemes for OFDM system which have the advantages of both flexibility and practicability. Both of the two novel link adaptation schemes are based on the iterative mechanism to allocate the bit and power to subcarriers according to their channel gains and noisy levels which are assumed to be already known at the transmitter. The candidate modulation modes are determined freely before the link adaptation schemes are performed. The distinction between the two novel link adaptation schemes is that in the novel scheme A, the modulation mode is upgraded to the neighboring higher-order mode, while in the novel scheme B the modulation is upgraded to the genuine optimal mode. Therefore, the novel scheme A has the advantage of lower complexity and the novel scheme B has the advantage of higher spectral efficiency.

  5. Sampling scheme optimization from hyperspectral data

    NARCIS (Netherlands)

    Debba, P.

    2006-01-01

    This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized

  6. Modified Mean-Pyramid Coding Scheme

    Science.gov (United States)

    Cheung, Kar-Ming; Romer, Richard

    1996-01-01

    Modified mean-pyramid coding scheme requires transmission of slightly fewer data. Data-expansion factor reduced from 1/3 to 1/12. Schemes for progressive transmission of image data transmitted in sequence of frames in such way coarse version of image reconstructed after receipt of first frame and increasingly refined version of image reconstructed after receipt of each subsequent frame.

  7. Phase calibration scheme for a ``T'' array

    Science.gov (United States)

    Ramesh, R.; Subramanian, K. R.; Sastry, Ch. V.

    1999-10-01

    A calibration scheme based on closure and redundancy techniques is described for correcting the phase errors in the complex visibilities observed with a T-shaped radio interferometer array. Practical details of the scheme are illustrated with reference to the Gauribidanur radioheliograph (GRH).

  8. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the $<, =, >$ re

  9. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  10. Modeling Students' Mathematics Using Steffe's Fraction Schemes

    Science.gov (United States)

    Norton, Anderson H.; McCloskey, Andrea V.

    2008-01-01

    Each year, more teachers learn about the successful intervention program known as Math Recovery (USMRC 2008; Wright 2003). The program uses Steffe's whole-number schemes to model, understand, and support children's development of whole-number reasoning. Readers are probably less familiar with Steffe's fraction schemes, which have proven similarly…

  11. A Secure Threshold Group Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    Wang Xiaoming; Fu Fangwei

    2003-01-01

    The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack

  12. Cornering (3+1) sterile neutrino schemes

    CERN Document Server

    Maltoni, M; Valle, José W F

    2001-01-01

    Using the most recent atmospheric neutrino data, as well as short-baseline and tritium $\\beta$-decay data we show that (3+1) sterile neutrino schemes are severely disfavored, in contrast to the theoretically favored (2+2) schemes.

  13. Recent Applications of Ionic Liquids in Separation Technology

    Directory of Open Access Journals (Sweden)

    Dandan Han

    2010-04-01

    Full Text Available Ionic liquids (ILs have been applied in different areas of separation, such as ionic liquid supported membranes, as mobile phase additives and surface-bonded stationary phases in chromatography separations and as the extraction solvent in sample preparations, because they can be composed from various cations and anions that change the properties and phase behavior of liquids. Although the applications of ILs in separations are still in their early stages, the academic interest in ILs is increasing. An overview of the principle applications of ILs in separation technology is present in this work. Furthermore, the prospects of the ILs in separation techniques are discussed.

  14. diffusive phase separation

    Directory of Open Access Journals (Sweden)

    Nobuyuki Kenmochi

    1996-01-01

    w is constrained to have double obstacles σ*≤w≤σ* (i.e., σ* and σ* are the threshold values of w. The objective of this paper is to discuss the semigroup {S(t} associated with the phase separation model, and construct its global attractor.

  15. Phase separation micro molding

    NARCIS (Netherlands)

    Vogelaar, Laura

    2005-01-01

    The research described in this thesis concerns the development of a new microfabrication method, Phase Separation Micro Molding (PSμM). While microfabrication is still best known from semiconductor industry, where it is used to integrate electrical components on a chip, the scope has immensely expan

  16. Fathering After Marital Separation

    Science.gov (United States)

    Keshet, Harry Finkelstein; Rosenthal, Kristine M.

    1978-01-01

    Deals with experiences of a group of separated or divorced fathers who chose to remain fully involved in the upbringing of their children. As they underwent transition from married parenthood to single fatherhood, these men learned that meeting demands of child care contributed to personal stability and growth. (Author)

  17. Isotope hydrograph separation

    Energy Technology Data Exchange (ETDEWEB)

    Fritz, P. [UFZ-Umweltforschungszentrum, Centre of Environmental Research Leipzig-Halle, Leipzig (Germany)

    2000-07-01

    Storm-runoff thus reflects the complex hydraulic behaviour of drainage basins and water-links of such systems. Water of different origin may participate in the events and in this lecture, the application of isotope techniques to separate storm hydrographs into different components will be presented.

  18. Unity Through Separation

    DEFF Research Database (Denmark)

    Dabelsteen, Hans B.

    This PhD thesis asks how we can conceptualize the current separation doctrine of religion and politics in a country like Denmark, where the structure of the established church and peoplehood overlap. In order to answer this question, Hans Bruun Dabelsteen maps the current discussion of secularism...

  19. Acromioclavicular Joint Separations

    Science.gov (United States)

    2013-01-01

    Published online: 16 December 2012 # Springer Science+Business Media New York 2012 Abstract Acromioclavicular (AC) joint separations are common...injuries. The sports most likely to cause AC joint dislocations are football, soccer , hockey, rugby, and skiing, among others [9, 28, 29]. The major cause

  20. Pre-Separation Guide

    Science.gov (United States)

    1992-03-04

    SEPARATEES Defense Outplacement Referral System (DORS) Since most of us are not independently wealthy, we will need a job after separation. DORS is...Job Assistance SPOUSES OF ALL SEPARATEES As a spouse you may take advantage of preparing Standard Form 17 1’s and resu- the outplacement services

  1. Separation of Powers.

    Science.gov (United States)

    Bill of Rights in Action, 1987

    1987-01-01

    The dimensions of the separation of powers principle are explored through three lessons in the subject areas of U.S. history, U.S. government, and world history. In 1748, a French nobleman, Baron de Montesquieu, wrote a book called "The Spirit of the Laws," in which he argued that there could be no liberty when all government power was…

  2. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  3. Two level scheme solvers for nuclear spectroscopy

    Science.gov (United States)

    Jansson, Kaj; DiJulio, Douglas; Cederkäll, Joakim

    2011-10-01

    A program for building level schemes from γ-spectroscopy coincidence data has been developed. The scheme builder was equipped with two different algorithms: a statistical one based on the Metropolis method and a more logical one, called REMP (REcurse, Merge and Permute), developed from scratch. These two methods are compared both on ideal cases and on experimental γ-ray data sets. The REMP algorithm is based on coincidences and transition energies. Using correct and complete coincidence data, it has solved approximately half a million schemes without failures. Also, for incomplete data and data with minor errors, the algorithm produces consistent sub-schemes when it is not possible to obtain a complete scheme from the provided data.

  4. An Efficient Forward Secure Signature Scheme

    Institute of Scientific and Technical Information of China (English)

    YU Jia; KONG Fan-yu; LI Da-xing

    2006-01-01

    A new efficient forward secure signature scheme based on bilinear pairings is presented in this paper.Each complexity of key generation, key update, signing and verifying algorithms in this scheme is O(1) in terms of the total number of time periods T. Because a new structure in node secret key storage and a unique strategy in key update are employed, the signing and verifying costs don't grow when T increases. At the same time, the key generation and key update algorithms are efficiently constructed thanks to using the pre-order traversal technique of binary trees. Compared with other schemes based on bilinear pairings, the signature size in this scheme is very short, which doesn't change with T increasing. The scheme is forward secure in random oracle model assuming CDH problem is hard.

  5. A DRM Scheme Using File Physical Information

    Directory of Open Access Journals (Sweden)

    Cheng Qu

    2015-05-01

    Full Text Available A digital file has both the content and physical information, however the latter was not fully made use of in previous digital rights management (DRM systems. This paper introduces the idea of making use of file physical information to improve the system security and provides a scheme based on this idea to resist the replay attack in DRM systems. In our scheme, compared to commonly used schemes, we remove the dependency on continuous online connection from the client-side to the server-side or the usage of tamper-proof hardware, such as Trusted Platform Module (TPM. The scheme is appropriate for offline digital content usage. Primary experiments demonstrate that our scheme is secure enough to be put into practice use.

  6. Comparison among sea surface roughness schemes

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Based on the measurements from the US National Data Buoy Center 3-m discus buoy site No.44004 (38.5°N, 70.47°W) from January 1 to March 31 of 2003, with the COARE algorithm (Version 3.0), the results from four parameterization schemes developed recently for sea surface aerodynamic roughness length were compared with each other. Calculations of frictional speed u*, drag coefficient Cd and wind stress τ indicate that the calculated frictional velocities from the four schemes (8.50%-16.20%, the normalized standard error estimate, or NSEE), the computed drag coefficients and wind stress (respectively 15.08%-28.67% and 17.26%-50.59% NSEE) are reasonable. Schemes YT96 and GW03 are consistent. The O02 scheme gives overestimated values for u* and Cd. Schemes TY01 and GW03 display discontinuous characteristics in handling young wave data.

  7. A novel key management scheme using biometrics

    Science.gov (United States)

    Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai

    2010-04-01

    Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.

  8. Exploiting flow Injection and sequential injection schemes for trace metal determinations by electrothermal atomic absorption spectrometry

    DEFF Research Database (Denmark)

    Hansen, Elo Harald

    Determination of low or trace-level amounts of metals by electrothermal atomic absorption spectrometry (ETAAS) often requires the use of suitable preconcentration and/or separation procedures in order to attain the necessary sensitivity and selectivity. Such schemes are advantageously executed...

  9. A scheme to realize time-bin entanglement between two photons that never interacted

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    We propose a scheme of entangling two photons from two separated sources.Our proposal which is inspired by the time-bin entanglement developed recently,provides a novel alternative for revealing contradiction between quantum nonlocality and local realism based on two independent single photon sources.

  10. Underwater Acoustic Communication Based on Pattern Time Delay Shift Coding Scheme

    Institute of Scientific and Technical Information of China (English)

    YIN Jing-wei; HUI Jun-ying; HUI Juan; YAO Zhi-xiang; WANG Yi-lin

    2006-01-01

    Underwater acoustic communication based on Pattern Time Delay Shift Coding (PDS) communication scheme is studied. The time delay shift values of the pattern are used to encode the digital information in the PDS scheme, which belongs to the Pulse Position Modulation (PPM). The duty cycle of the PDS scheme is small, so it can economize the power for communication. By use of different patterns for code division and different frequencies for channel division, the communication system is capable of mitigating the inter-symbol interference (ISI) caused by the multipath channel. The data rate of communication is 1000 bits/s at 8 kHz bandwidth. The receiver separates the channels by means of band-pass filters, and performs decoding by 4 copy-correlators to estimate the time delay shift value. Based on the theoretical analysis and numerical simulations, the PDS scheme is shown to be a robust and effective approach for underwater acoustic communication.

  11. Novel UEP LT Coding Scheme with Feedback Based on Different Degree Distributions

    Directory of Open Access Journals (Sweden)

    Li Ya-Fang

    2016-01-01

    Full Text Available Traditional unequal error protection (UEP schemes have some limitations and problems, such as the poor UEP performance of high priority data and the seriously sacrifice of low priority data in decoding property. Based on the reasonable applications of different degree distributions in LT codes, this paper puts forward a novel UEP LT coding scheme with a simple feedback to compile these data packets separately. Simulation results show that the proposed scheme can effectively protect high priority data, and improve the transmission efficiency of low priority data from 2.9% to 22.3%. Furthermore, it is fairly suitable to apply this novel scheme to multicast and broadcast environments since only a simple feedback introduced.

  12. Runoff prediction using an integrated hybrid modelling scheme

    Science.gov (United States)

    Remesan, Renji; Shamim, Muhammad Ali; Han, Dawei; Mathew, Jimson

    2009-06-01

    SummaryRainfall runoff is a very complicated process due to its nonlinear and multidimensional dynamics, and hence difficult to model. There are several options for a modeller to consider, for example: the type of input data to be used, the length of model calibration (training) data and whether or not the input data be treated as signals with different frequency bands so that they can be modelled separately. This paper describes a new hybrid modelling scheme to answer the above mentioned questions. The proposed methodology is based on a hybrid model integrating wavelet transformation, a modelling engine (Artificial Neural Network) and the Gamma Test. First, the Gamma Test is used to decide the required input data dimensions and its length. Second, the wavelet transformation decomposes the input signals into different frequency bands. Finally, a modelling engine (ANN in this study) is used to model the decomposed signals separately. The proposed scheme was tested using the Brue catchment, Southwest England, as a case study and has produced very positive results. The hybrid model outperforms all other models tested. This study has a wider implication in the hydrological modelling field since its general framework could be applied to other model combinations (e.g., model engine could be Support Vector Machines, neuro-fuzzy systems, or even a conceptual model. The signal decomposition could be carried out by Fourier transformation).

  13. Modified sequential fully implicit scheme for compositional flow simulation

    Science.gov (United States)

    Moncorgé, A.; Tchelepi, H. A.; Jenny, P.

    2017-05-01

    The fully implicit (FI) method is widely used for numerical modeling of multiphase flow and transport in porous media. The FI method is unconditionally stable, but that comes at the cost of a low-order approximation and high computational cost. The FI method entails iterative linearization and solution of fully-coupled linear systems with mixed elliptic/hyperbolic character. However, in methods that treat the near-elliptic (flow) and hyperbolic (transport) separately, such as multiscale formulations, sequential solution strategies are used to couple the flow (pressures and velocities) and the transport (saturations/compositions). The most common sequential schemes are: the implicit pressure explicit saturation (IMPES), and the sequential fully implicit (SFI) schemes. Problems of practical interest often involve tightly coupled nonlinear interactions between the multiphase flow and the multi-component transport. For such problems, the IMPES approach usually suffers from prohibitively small timesteps in order to obtain stable numerical solutions. The SFI method, on the other hand, does not suffer from a temporal stability limit, but the convergence rate can be extremely slow. This slow convergence rate of SFI can offset the gains obtained from separate and specialized treatments of the flow and transport problems. In this paper, we analyze the nonlinear coupling between flow and transport for compressible, compositional systems with complex interphase mass transfer. We isolate the nonlinear effects related to transmissibility and compressibility from those due to interphase mass transfer, and we propose a modified SFI (m-SFI) method. The new scheme involves enriching the 'standard' pressure equation with coupling between the pressure and the saturations/compositions. The modification resolves the convergence problems associated with SFI and provides a strong basis for using sequential formulations for general-purpose simulation. For a wide parameter range, we show

  14. GAME ANALYSIS OF KYOTO AND POST-KYOTO SCHEMES

    Energy Technology Data Exchange (ETDEWEB)

    Haruo Imai [Kyoto Institute of Economic Research, Kyoto University, Sakyo, Kyoto (Japan)

    2008-09-30

    Kyoto protocol, put in force in Feb. 2005, is criticized from both sides, those demanding a stricter target for GHG (green house gas) emission reduction on the one side, and those claiming for more flexible and comprehensive controls of the emission on the other side, for its modest target and narrow coverage. Even though its value could be that of a mere precedent and experimentation, Kyoto protocol includes very special experimentation to assist the world wide cooperation for a mitigation of climate change, i.e. the introduction of three mechanisms, emissions trading, joint implementation, and clean development mechanism (CDM). Together, they are called Kyoto mechanisms. Evaluation of mechanisms is one important role of microeconomics and the game theory is a major tool for it. We shall scrutinize these mechanisms from such viewpoint. A special attention is placed on CDM, as it is the novel mechanism introduced by Kyoto protocol, and gives a unique link between Annex I nations (mostly developed countries) and non-Annex I nations (mostly developing countries). Next, we examine some of the currently proposed schemes after 2013, the post Kyoto schemes. One of the chief issues is the possibility of making a comprehensive agreement including both the USA and large developing countries with rapidly increasing emission levels of GHG like China and India. Adding to these, not only the proposed schemes themselves, but the process of negotiation itself inspired several researches in cooperative game theory and in particular, coalition formation theory. We shall touch upon this issue separately, and examine how successfully they predicted the outcome leading to Kyoto, retrospectively. Finally, we end our discussion with a brief consideration over the underlining normative argument concerning these schemes.

  15. Microgravity Passive Phase Separator

    Science.gov (United States)

    Paragano, Matthew; Indoe, William; Darmetko, Jeffrey

    2012-01-01

    A new invention disclosure discusses a structure and process for separating gas from liquids in microgravity. The Microgravity Passive Phase Separator consists of two concentric, pleated, woven stainless- steel screens (25-micrometer nominal pore) with an axial inlet, and an annular outlet between both screens (see figure). Water enters at one end of the center screen at high velocity, eventually passing through the inner screen and out through the annular exit. As gas is introduced into the flow stream, the drag force exerted on the bubble pushes it downstream until flow stagnation or until it reaches an equilibrium point between the surface tension holding bubble to the screen and the drag force. Gas bubbles of a given size will form a front that is moved further down the length of the inner screen with increasing velocity. As more bubbles are added, the front location will remain fixed, but additional bubbles will move to the end of the unit, eventually coming to rest in the large cavity between the unit housing and the outer screen (storage area). Owing to the small size of the pores and the hydrophilic nature of the screen material, gas does not pass through the screen and is retained within the unit for emptying during ground processing. If debris is picked up on the screen, the area closest to the inlet will become clogged, so high-velocity flow will persist farther down the length of the center screen, pushing the bubble front further from the inlet of the inner screen. It is desired to keep the velocity high enough so that, for any bubble size, an area of clean screen exists between the bubbles and the debris. The primary benefits of this innovation are the lack of any need for additional power, strip gas, or location for venting the separated gas. As the unit contains no membrane, the transport fluid will not be lost due to evaporation in the process of gas separation. Separation is performed with relatively low pressure drop based on the large surface

  16. Music in Early Childhood.

    Science.gov (United States)

    Feierabend, John

    1990-01-01

    Argues that music activities in early childhood education foster a variety of developmental skills. Analyzes Howard Gardner's theory of multiple intelligences, contending that music intelligence is a separate intelligence. Provides ways to identify and promote musical intelligence. Suggests methods for encouraging musical development. Using songs…

  17. GPS Separator HD

    CERN Multimedia

    2016-01-01

    Footage of the 70 degree ISOLDE GPS separator magnet MAG70 as well as the switchyard for the Central Mass and GLM (GPS Low Mass) and GHM (GPS High Mass) beamlines in the GPS separator zone. In the GPS20 vacuum sector equipment such as the long GPS scanner 482 / 483 unit, faraday cup FC 490, vacuum valves and wiregrid piston WG210 and WG475 and radiation monitors can also be seen. Also the RILIS laser guidance and trajectory can be seen, the GPS main beamgate switch box and the actual GLM, GHM and Central Beamline beamgates in the beamlines as well as the first electrostatic quadrupoles for the GPS lines. Close up of the GHM deflector plates motor and connections and the inspection glass at the GHM side of the switchyard.

  18. HRS Separator HD

    CERN Multimedia

    2016-01-01

    Footage of the 90 and 60 degree ISOLDE HRS separator magnets in the HRS separator zone. In the two vacuum sectors HRS20 and HRS30 equipment such as the HRS slits SL240, the HRS faraday cup FC300 and wiregrid WG210 can be spotted. Vacuum valves, turbo pumps, beamlines, quadrupoles, water and compressed air connections, DC and signal cabling can be seen throughout the video. The HRS main and user beamgate in the beamline between MAG90 and MAG60 and its switchboxes as well as all vacuum bellows and flanges are shown. Instrumentation such as the HRS scanner unit 482 / 483, the HRS WG470 wiregrid and slits piston can be seen. The different quadrupoles and supports are shown as well as the RILIS guidance tubes and installation at the magnets and the different radiation monitors.

  19. Nylon separators. [thermal degradation

    Science.gov (United States)

    Lim, H. S.

    1977-01-01

    A nylon separator was placed in a flooded condition in K0H solution and heated at various high temperatures ranging from 60 C to 110 C. The weight decrease was measured and the molecular weight and decomposition product were analyzed to determine: (1) the effect of K0H concentration on the hydrolysis rate; (2) the effect of K0H concentration on nylon degradation; (3) the activation energy at different K0H concentrations; and (4) the effect of oxygen on nylon degradation. The nylon hydrolysis rate is shown to increase as K0H concentration is decreased 34%, giving a maximum rate at about 16%. Separator hydrolysis is confirmed by molecular weight decrease in age of the batteries, and the reaction of nylon with molecular oxygen is probably negligible, compared to hydrolysis. The extrapolated rate value from the high temperature experiment correlates well with experimental values at 35 degrees.

  20. Battery separator manufacturing process

    Energy Technology Data Exchange (ETDEWEB)

    Palmer, N.I.; Sugarman, N.

    1974-12-27

    A battery with a positive plate, a negative plate, and a separator of polymeric resin having a degree of undesirable hydrophobia, solid below 180/sup 0/F, extrudable as a hot melt, and resistant to degradation by at least either acids or alkalies positioned between the plates is described. The separator comprises a nonwoven mat of fibers, the fibers being comprised of the polymeric resin and a wetting agent in an amount of 0.5 to 20 percent by weight based on the weight of the resin with the amount being incompatible with the resin below the melting point of the resin such that the wetting agent will bloom over a period of time at ambient temperatures in a battery, yet being compatible with the resin at the extrusion temperature and bringing about blooming to the surface of the fibers when the fibers are subjected to heat and pressure.

  1. Unity Through Separation

    DEFF Research Database (Denmark)

    Dabelsteen, Hans B.

    analysis, Dabelsteen study Danish secularism as an ideological concept. He finds that the conceptual structure of Danish secularism holds separation-as-principled distance at its core. Institutionally this particularly pertains to the establishment arrangement, and in practice it translates...... and proposes two conceptual expansions. The first is to include modest establishment in a framework of secularism defensible by political liberalism, and the second is to consider secularism in close connection to a theory of peoplehood. Methodologically positioned between interpretive realism and policy...... into the principle of treating everybody equally (with religious freedom, equality and Danish peoplehood as the most important principles adjacent to secularism). In a study of the historical roots of the separation doctrine and two current policy cases (same-sex marriage and reforms of church governance...

  2. Acoustophoresis separation method

    Science.gov (United States)

    Heyman, Joseph S. (Inventor)

    1993-01-01

    A method and apparatus are provided for acoustophoresis, i.e., the separation of species via acoustic waves. An ultrasonic transducer applies an acoustic wave to one end of a sample container containing at least two species having different acoustic absorptions. The wave has a frequency tuned to or harmonized with the point of resonance of the species to be separated. This wave causes the species to be driven to an opposite end of the sample container for removal. A second ultrasonic transducer may be provided to apply a second, oppositely directed acoustic wave to prevent undesired streaming. In addition, a radio frequency tuned to the mechanical resonance and coupled with a magnetic field can serve to identify a species in a medium comprising species with similar absorption coefficients, whereby an acoustic wave having a frequency corresponding to this gyrational rate can then be applied to sweep the identified species to one end of the container for removal.

  3. Separation of enantiomers

    CERN Document Server

    Todd , Matthew H

    2014-01-01

    In one handy volume this handbook summarizes the most common synthetic methods for the separation of racemic mixtures, allowing an easy comparison of the different strategies described in the literature.Alongside classical methods, the authors also consider kinetic resolutions, dynamic kinetic resolutions, divergent reactions of a racemic mixture, and a number of ""neglected"" cases not covered elsewhere, such as the use of circularly polarized light, polymerizations, ""ripening"" processes, dynamic combinatorial chemistry, and several thermodynamic processes. The result is a thorough introdu

  4. Separation Logic and Concurrency

    Science.gov (United States)

    Bornat, Richard

    Concurrent separation logic is a development of Hoare logic adapted to deal with pointers and concurrency. Since its inception, it has been enhanced with a treatment of permissions to enable sharing of data between threads, and a treatment of variables as resource alongside heap cells as resource. An introduction to the logic is given with several examples of proofs, culminating in a treatment of Simpson's 4-slot algorithm, an instance of racy non-blocking concurrency.

  5. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  6. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  7. Innovative Separations Technologies

    Energy Technology Data Exchange (ETDEWEB)

    J. Tripp; N. Soelberg; R. Wigeland

    2011-05-01

    Reprocessing used nuclear fuel (UNF) is a multi-faceted problem involving chemistry, material properties, and engineering. Technology options are available to meet a variety of processing goals. A decision about which reprocessing method is best depends significantly on the process attributes considered to be a priority. New methods of reprocessing that could provide advantages over the aqueous Plutonium Uranium Reduction Extraction (PUREX) and Uranium Extraction + (UREX+) processes, electrochemical, and other approaches are under investigation in the Fuel Cycle Research and Development (FCR&D) Separations Campaign. In an attempt to develop a revolutionary approach to UNF recycle that may have more favorable characteristics than existing technologies, five innovative separations projects have been initiated. These include: (1) Nitrogen Trifluoride for UNF Processing; (2) Reactive Fluoride Gas (SF6) for UNF Processing; (3) Dry Head-end Nitration Processing; (4) Chlorination Processing of UNF; and (5) Enhanced Oxidation/Chlorination Processing of UNF. This report provides a description of the proposed processes, explores how they fit into the Modified Open Cycle (MOC) and Full Recycle (FR) fuel cycles, and identifies performance differences when compared to 'reference' advanced aqueous and fluoride volatility separations cases. To be able to highlight the key changes to the reference case, general background on advanced aqueous solvent extraction, advanced oxidative processes (e.g., volumetric oxidation, or 'voloxidation,' which is high temperature reaction of oxide UNF with oxygen, or modified using other oxidizing and reducing gases), and fluorination and chlorination processes is provided.

  8. Colour Separation and Aversion

    Directory of Open Access Journals (Sweden)

    Sarah M Haigh

    2012-05-01

    Full Text Available Aversion to achromatic patterns is well documented but relatively little is known about discomfort from chromatic patterns. Large colour differences are uncommon in the natural environment and deviation from natural statistics makes images uncomfortable (Fernandez and Wilkins 2008, Perception, 37(7, 1098–113; Juricevic et al 2010, Perception, 39(7, 884–899. We report twelve studies documenting a linear increase in aversion to chromatic square-wave gratings as a function of the separation in UCS chromaticity between the component bars, independent of their luminance contrast. Two possible explanations for the aversion were investigated: (1 accommodative response, or (2 cortical metabolic demand. We found no correlation between chromaticity separation and accommodative lag or variance in lag, measured using an open-field autorefractor. However, near infrared spectroscopy of the occipital cortex revealed a larger oxyhaemoglobin response to patterns with large chromaticity separation. The aversion may be cortical in origin and does not appear to be due to accommodation.

  9. A Spatial Domain Quantum Watermarking Scheme

    Science.gov (United States)

    Wei, Zhan-Hong; Chen, Xiu-Bo; Xu, Shu-Jiang; Niu, Xin-Xin; Yang, Yi-Xian

    2016-07-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. Supported by the National Natural Science Foundation of China under Grant Nos. 61272514, 61170272, 61373131, 61121061, 61411146001, the program for New Century Excellent Talents under Grant No. NCET-13-0681, the National Development Foundation for Cryptological Research (Grant No. MMJJ201401012) and the Fok Ying Tung Education Foundation under Grant No. 131067, and the Shandong Provincial Natural Science Foundation of China under Grant No. ZR2013FM025

  10. Exploiting Same Scale Similarity in Fisher's Scheme

    Institute of Scientific and Technical Information of China (English)

    ZHAO Yao

    2001-01-01

    The method proposed by Y. Fisher is the most popular fractal image coding scheme. In his scheme, domain blocks are constrained to be twice as large as range blocks in order to ensure the convergence of the iterative decoding stage. However,this constraint has limited the fractal encoder to exploit the self-similarity of the original image. In order to overcome the shortcoming, a novel scheme using same-sized range and domain blocks is proposed in the paper. Experimental results show the improvements in compression performance.

  11. Mission Mangalam scheme: Ex ploring the opportunities.

    Directory of Open Access Journals (Sweden)

    Dr. Pallavi A. Upadhyay*,

    2015-01-01

    Full Text Available Background Mission Mangalam has been launched by the Gujarat Government in 2010.It is an integrated poverty alleviation approach and an initiative to empower women. Mission Mangalam is helping women to earn their livelihood and to become independent. These Sakhimandals are linked to banks to fulfill the requirement of fund. Sakhimandals get financial assistance from banks. Some of the core benefits of the scheme can be linked with the health sector as well; Objectives (1 To review the scheme of Mission Mangalam (2 To explore the possibility of health linkage with the scheme (3 To study the perception of beneficiaries and their socio- demographic profile; Methodology: A cross sectional study. Samplesize-152 women members of Sakhimandals in Saraspur ward. Health of all the members of Mandals of Saraspur was checked by the Ahmedabad Municipal Corporation. Women of Sakhimandals were interviewed to understand their perception about the scheme as well as about any other health benefit they have experienced for themselves or their family members. 3 Additionally, Community based survey of 50 BPL families was carried out to assess the proportion of families covered under the scheme of Mission Mangalam. Results: Mean age of these women (n=152 was 31.81 years with SD=6.74. Education of maximum number 71(47% of women was up to secondary. Mean income was 5460 Rs/month with SD=1840 .Mean of number of family members is 5.4. 109 (72% women are residing in chali area. 98(64% women were told about this scheme by social worker, others were told about the scheme by her friend or UCD official. Paired t test was carried out to find increase in Hb levels of the beneficiary women. It was found to be significant (p=0.007, t=15.64. Age of women is associated with habit to save money. (p=0.003. There are only 22 (44% out of 50 families visited, who have at least one member enrolled under the scheme. More stringent efforts for universal coverage have to be made by

  12. A SUBDIVISION SCHEME FOR VOLUMETRIC MODELS

    Institute of Scientific and Technical Information of China (English)

    GhulamMustafa; LiuXuefeng

    2005-01-01

    In this paper, a subdivision scheme which generalizes a surface scheme in previous papers to volume meshes is designed. The scheme exhibits significant control over shrink-age/size of volumetric models. It also has the ability to conveniently incorporate boundaries and creases into a smooth limit shape of models. The method presented here is much simpler and easier as compared to MacCracken and Joy's. This method makes no restrictions on the local topology of meshes. Particularly, it can be applied without any change to meshes of nonmanifold topology.

  13. Consistency of non-minimal renormalisation schemes

    CERN Document Server

    Jack, I

    2016-01-01

    Non-minimal renormalisation schemes such as the momentum subtraction scheme (MOM) have frequently been used for physical computations. The consistency of such a scheme relies on the existence of a coupling redefinition linking it to MSbar. We discuss the implementation of this procedure in detail for a general theory and show how to construct the relevant redefinition up to three-loop order, for the case of a general theory of fermions and scalars in four dimensions and a general scalar theory in six dimensions.

  14. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    This paper examines the optimal sequencing of sales in the presence of network externalities. A firm sells a good to a group of consumers whose payoff from buying is increasing in total quantity sold. The firm selects the order to serve consumers so as to maximize expected sales. It can serve all...... consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  15. Chaotic cryptographic scheme and its randomness evaluation

    Science.gov (United States)

    Stoyanov, B. P.

    2012-10-01

    We propose a new cryptographic scheme based on the Lorenz chaos attractor and 32 bit bent Boolean function. We evaluated the keystream generated by the scheme with batteries of the NIST statistical tests. We also applied a number of statistical analysis techniques, such as calculating histograms, correlations between two adjacent pixels, information entropy, and differential resistance, all refer to images encrypted by the proposed system. The results of the analysis show that the new cryptographic scheme ensures a secure way for sending digital data with potential applications in real-time image encryption.

  16. EFFICIENT IMAGE TRANSMISSION SCHEME IN FMT SYSTEM

    Institute of Scientific and Technical Information of China (English)

    Qi Zhongrui; Gao Zhenming

    2005-01-01

    An efficient image transmission scheme is proposed based on byte partition and adaptive sub-channel distribution technique in Filtered MultiTone (FMT) system over frequency selective slow fading channel. According to the simulation results and analysis of a typical image with matlab, improvement in Peak Signal to Noise Ratio (PSNR) of the received image and low complexity for equalization is demonstrated remarkably. Comparing with no adaptive and no actual channel equalization scheme, the proposed scheme saves over 6 dB when PSNR=40 dB.

  17. Improved Quantum Signature Scheme with Weak Arbitrator

    Science.gov (United States)

    Su, Qi; Li, Wen-Min

    2013-09-01

    In this paper, we find a man-in-the-middle attack on the quantum signature scheme with a weak arbitrator (Luo et al., Int. J. Theor. Phys., 51:2135, 2012). In that scheme, the authors proposed a quantum signature based on quantum one way function which contains both verifying the signer phase and verifying the signed message phase. However, after our analysis we will show that Eve can adopt different strategies in respective phases to forge the signature without being detected. Then we present an improved scheme to increase the security.

  18. Practical Coding Schemes for Cognitive Overlay Radios

    CERN Document Server

    Kurniawan, Ernest; Rini, Stefano

    2012-01-01

    We develop practical coding schemes for the cognitive overlay radios as modeled by the cognitive interference channel, a variation of the classical two user interference channel where one of the transmitters has knowledge of both messages. Inspired by information theoretical results, we develop a coding strategy for each of the three parameter regimes where capacity is known. A key feature of the capacity achieving schemes in these regimes is the joint decoding of both users' codewords, which we accomplish by performing a posteriori probability calculation over a combined trellis. The schemes are shown to perform close to the capacity limit with low error rate.

  19. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  20. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  1. An Optimal Labeling Scheme for Ancestry Queries

    OpenAIRE

    2009-01-01

    An ancestry labeling scheme assigns labels (bit strings) to the nodes of rooted trees such that ancestry queries between any two nodes in a tree can be answered merely by looking at their corresponding labels. The quality of an ancestry labeling scheme is measured by its label size, that is the maximal number of bits in a label of a tree node. In addition to its theoretical appeal, the design of efficient ancestry labeling schemes is motivated by applications in web search engines. For this p...

  2. Sound classification of dwellings – A diversity of national schemes in Europe

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2011-01-01

    dwellings, facade sound insulation and installation noise. This paper presents the sound classification schemes in Europe and compares the class criteria for sound insulation between dwellings. The schemes have been implemented and revised gradually since the early 1990s. However, due to lack...... constructions fulfilling different classes. The current variety of descriptors and classes also causes trade barriers. Thus, there is a need to harmonize characteristics of the schemes, and a European COST Action TU0901 "Integrating and Harmonizing Sound Insulation Aspects in Sustainable Urban Housing...... Constructions", has been established and runs 2009-2013. The main objectives of TU0901 are to prepare proposals for harmonized sound insulation descriptors and for a European sound classification scheme with a number of quality classes for dwellings....

  3. R & D on Beam Injection and Bunching Schemes in the Fermilab Booster

    Energy Technology Data Exchange (ETDEWEB)

    Bhat, C. M. [Fermilab

    2016-01-01

    Fermilab is committed to upgrade its accelerator complex to support HEP experiments at the intensity frontier. The ongoing Proton Improvement Plan (PIP) enables us to reach 700 kW beam power on the NuMI neutrino targets. By the end of the next decade, the current 400 MeV normal conducting LINAC will be replaced by an 800 MeV superconducting LINAC (PIP-II) with an increased beam power >50% of the PIP design goal. Both in PIP and PIP-II era, the existing Booster is going to play a very significant role, at least for next two decades. In the meanwhile, we have recently developed an innovative beam injection and bunching scheme for the Booster called "early injection scheme" that continues to use the existing 400 MeV LINAC and implemented into operation. This scheme has the potential to increase the Booster beam intensity by >40% from the PIP design goal. Some benefits from the scheme have already been seen. In this paper, I will describe the basic principle of the scheme, results from recent beam experiments, our experience with the new scheme in operation, current status, issues and future plans. This scheme fits well with the current and future intensity upgrade programs at Fermilab.

  4. SPI Based Meteorological Drought Assessment over a Humid Basin: Effects of Processing Schemes

    Directory of Open Access Journals (Sweden)

    Han Zhou

    2016-08-01

    Full Text Available Meteorological drought monitoring is important for drought early warning and disaster prevention. Regional meteorological drought can be evaluated and analyzed with standardized precipitation index (SPI. Two main processing schemes are frequently adopted: (1 mean of all SPI calculated from precipitation at individual stations (SPI-mean; and (2 SPI calculated from all-station averaged precipitation (precipitation-mean. It yet remains unclear if two processing schemes could make difference in drought assessment, which is of significance to reliable drought monitoring. Taking the Poyang Lake Basin with monthly precipitation recorded by 13 national stations for 1957–2014, this study examined two processing schemes. The precipitation mean and SPI mean were respectively calculated with the Thiessen Polygon weighting approach. Our results showed that the two SPI series individually constructed from two schemes had similar features and monitoring trends of regional meteorological droughts. Both SPI series had a significantly positive correlation (p < 0.005 with the number of precipitation stations. The precipitation-mean scheme reduced the extent of precipitation extremes and made the precipitation data more clustered in some certain, it made less precipitation deviate from the precipitation-mean series farther when less precipitation occurred universally, which would probably change the drought levels. Alternatively, the SPI-mean scheme accurately highlighted the extremes especially for those with wide spatial distribution over the region. Therefore, for regional meteorological drought monitoring, the SPI-mean scheme is recommended for its more suitable assessment of historical droughts.

  5. A Time Marching Scheme for Solving Volume Integral Equations on Nonlinear Scatterers

    KAUST Repository

    Bagci, Hakan

    2015-01-07

    Transient electromagnetic field interactions on inhomogeneous penetrable scatterers can be analyzed by solving time domain volume integral equations (TDVIEs). TDVIEs are oftentimes solved using marchingon-in-time (MOT) schemes. Unlike finite difference and finite element schemes, MOT-TDVIE solvers require discretization of only the scatterers, do not call for artificial absorbing boundary conditions, and are more robust to numerical phase dispersion. On the other hand, their computational cost is high, they suffer from late-time instabilities, and their implicit nature makes incorporation of nonlinear constitutive relations more difficult. Development of plane-wave time-domain (PWTD) and FFT-based schemes has significantly reduced the computational cost of the MOT-TDVIE solvers. Additionally, latetime instability problem has been alleviated for all practical purposes with the development of accurate integration schemes and specially designed temporal basis functions. Addressing the third challenge is the topic of this presentation. I will talk about an explicit MOT scheme developed for solving the TDVIE on scatterers with nonlinear material properties. The proposed scheme separately discretizes the TDVIE and the nonlinear constitutive relation between electric field intensity and flux density. The unknown field intensity and flux density are expanded using half and full Schaubert-Wilton-Glisson (SWG) basis functions in space and polynomial temporal interpolators in time. The resulting coupled system of the discretized TDVIE and constitutive relation is integrated in time using an explicit P E(CE) m scheme to yield the unknown expansion coefficients. Explicitness of time marching allows for straightforward incorporation of the nonlinearity as a function evaluation on the right hand side of the coupled system of equations. Consequently, the resulting MOT scheme does not call for a Newton-like nonlinear solver. Numerical examples, which demonstrate the applicability

  6. DEVELOPMENT AND APPLICATIONS OF WENO SCHEMES IN CONTINUUM PHYSICS

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    This paper briefly presents the general ideas of high order accurate weighted essentially non-oscillatory (WENO) schemes, and describes the similarities and differences of the two classes of WENO schemes: finite volume schemes and finite difference schemes. We also briefly mention a recent development of WENO schemes,namely an adaptive approach within the finite difference framework using smooth time dependent curvilinear coordinates.``

  7. SUPPLEMENT AND IMPROVEMENT OF HOLLY-PREISSMANN SCHEME

    Institute of Scientific and Technical Information of China (English)

    XIE Zuo-tao; ZHANG Xiao-feng; TAN Guang-ming

    2004-01-01

    Using the undetermined coefficient method, Holly-Preissmann scheme is improved effectively. The scheme with the minus velocity is added, and a new conservative scheme is also presented on the basis of original scheme. The simulations of the new scheme accord with the exact result, which enhances its applicability in the engineering.

  8. Eddy current separation apparatus, separation module, separation method and method for adjusting an eddy current separation apparatus

    NARCIS (Netherlands)

    Rem, P.C.; Bakker, M.C.M.; Berkhout, S.P.M.; Rahman, M.A.

    2012-01-01

    Eddy current separation apparatus (1) for separating particles (20) from a particle stream (w), wherein the apparatus (1) comprises a separator drum (4) adapted to create a first particle fraction (21) and a second particle fraction (23), a feeding device (2) upstream of the separator drum (4) for s

  9. Torsion-free Sheaves and ACM Schemes

    CERN Document Server

    Greco, S; Spreafico, M L

    2012-01-01

    In this paper we study short exact sequences $ 0 \\to \\mathcal P \\to \\mathcal N \\to \\ii_D(k) \\to 0 $ with $ \\mathcal P, \\mathcal N $ torsion--free sheaves and $ D $ closed projective scheme. This is a classical way to construct and study projective schemes (e.g. see \\cite{hart-1974}, \\cite{hart-2}, \\cite{mdp}, \\cite{serre-1960}). In particular, we give homological conditions on $ \\mathcal P $ and $ \\mathcal N $ that force $ D $ to be ACM, without constrains on its codimension. As last result, we prove that if $ \\mathcal N $ is a higher syzygy sheaf of an ACM scheme $ X,$ the scheme $ D $ we get contains $ X.$

  10. High order compact schemes for gradient approximation

    Institute of Scientific and Technical Information of China (English)

    2010-01-01

    In this paper, we propose three gradient recovery schemes of higher order for the linear interpolation. The first one is a weighted averaging method based on the gradients of the linear interpolation on the uniform mesh, the second is a geometric averaging method constructed from the gradients of two cubic interpolation on macro element, and the last one is a local least square method on the nodal patch with cubic polynomials. We prove that these schemes can approximate the gradient of the exact solution on the symmetry points with fourth order. In particular, for the uniform mesh, we show that these three schemes are the same on the considered points. The last scheme is more robust in general meshes. Consequently, we obtain the superconvergence results of the recovered gradient by using the aforementioned results and the supercloseness between the finite element solution and the linear interpolation of the exact solution. Finally, we provide several numerical experiments to illustrate the theoretical results.

  11. The Effective Key Length of Watermarking Schemes

    CERN Document Server

    Bas, Patrick

    2012-01-01

    Whereas the embedding distortion, the payload and the robustness of digital watermarking schemes are well understood, the notion of security is still not completely well defined. The approach proposed in the last five years is too theoretical and solely considers the embedding process, which is half of the watermarking scheme. This paper proposes a new measurement of watermarking security, called the effective key length, which captures the difficulty for the adversary to get access to the watermarking channel. This new methodology is applied to additive spread spectrum schemes where theoretical and practical computations of the effective key length are proposed. It shows that these schemes are not secure as soon as the adversary gets observations in the Known Message Attack context.

  12. Designing optimal sampling schemes for field visits

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2008-10-01

    Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...

  13. Efficient Identity Based Public Verifiable Signcryption Scheme

    CERN Document Server

    Kushwah, Prashant

    2011-01-01

    Signcryption is a cryptographic primitive which performs encryption and signature in a single logical step. In conventional signcryption only receiver of the signcrypted text can verify the authenticity of the origin i.e. signature of the sender on the message after decrypting the cipher text. In public verifiable signcryption scheme anyone can verify the authenticity of the origin who can access the signcrypted text i.e. signature of the sender on the cipher text. Public verifiable signcryption scheme in which the receiver can convince a third party, by providing additional information other than his private key along with the signcryption is called third party verifiable signcryption schemes. In this paper we proposed an efficient identity based public verifiable signcryption scheme with third party verification and proved its security in the random oracle model.

  14. Lifting scheme of symmetric tight wavelets frames

    Institute of Scientific and Technical Information of China (English)

    ZHUANG BoJin; YUAN WeiTao; PENG LiZhong

    2008-01-01

    This paper proposes a method to realize the lifting scheme of tight frame wavelet filters. As for 4-channel tight frame wavelet filter, the tight frame transforms' ma-trix is 2×4, but the lifting scheme transforms' matrix must be 4×4. And in the case of 3-channel tight frame wavelet filter, the transforms' matrix is 2×3, but the lifting scheme transforms' matrix must be 3×3. In order to solve this problem, we intro-duce two concepts: transferred polyphase matrix for 4-channel filters and trans-ferred unitary matrix for 3-channel filters. The transferred polyphase matrix is sym-metric/antisymmetric. Thus, we use this advantage to realize the lifting scheme.

  15. Asymmetric Watermarking Scheme Based on Correlation Testing

    Directory of Open Access Journals (Sweden)

    Rinaldi Munir

    2007-06-01

    Full Text Available Abstract Asymmetric watermarking is the second generation of watermarking scheme which uses different keys for embedding and detecting watermark. Key for embedding is private or secret, but key for detecting can be available publicly and everyone who has the key can detect watermark Watermark detection does not need to be original multimedia data. Detection of watermark is realized using correlation test between public key and multimedia data received. In most of schemes, private key is the watermark itself; public key is public watermark which correlates to the private watermark This paper presents concept of asymmetric watermarking scheme that based on correlation test and reviews some schemes of asymmetric watermarking that have been proposed by researchers. Keywords: asymmetric watermarking, private key, public key, watermark., multimeelia,:correlation.

  16. A lightweight authentication scheme with user untraceability

    Institute of Scientific and Technical Information of China (English)

    Kuo-Hui YEH

    2015-01-01

    With the rapid growth of electronic commerce and associated demands on variants of Internet based applications, application systems providing network resources and business services are in high demand around the world. To guarantee ro-bust security and computational efficiency for service retrieval, a variety of authentication schemes have been proposed. How-ever, most of these schemes have been found to be lacking when subject to a formal security analysis. Recently, Changet al. (2014) introduced a formally provable secure authentication protocol with the property of user-untraceability. Unfortunately, based on our analysis, the proposed scheme fails to provide the property of user-untraceability as claimed, and is insecure against user impersonation attack, server counterfeit attack, and man-in-the-middle attack. In this paper, we demonstrate the details of these malicious attacks. A security enhanced authentication scheme is proposed to eliminate all identified weaknesses.

  17. An efficient medical image compression scheme.

    Science.gov (United States)

    Li, Xiaofeng; Shen, Yi; Ma, Jiachen

    2005-01-01

    In this paper, a fast lossless compression scheme is presented for the medical image. This scheme consists of two stages. In the first stage, a Differential Pulse Code Modulation (DPCM) is used to decorrelate the raw image data, therefore increasing the compressibility of the medical image. In the second stage, an effective scheme based on the Huffman coding method is developed to encode the residual image. This newly proposed scheme could reduce the cost for the Huffman coding table while achieving high compression ratio. With this algorithm, a compression ratio higher than that of the lossless JPEG method for image can be obtained. At the same time, this method is quicker than the lossless JPEG2000. In other words, the newly proposed algorithm provides a good means for lossless medical image compression.

  18. The Dewey Decimal Scheme and Mathematics

    Science.gov (United States)

    Donovan, Peter W.; And Others

    1973-01-01

    This essay criticizes the mathematical schedules of the 18th edition of the Dewey Decimal Classification Scheme and offers two alternatives suitable for college libraries that use this system. (Authors)

  19. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  20. Certificateless universal designated verifier signature schemes

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact.The previous constructions of universal designated verifier signature rely on the underlying public key infrastructure, that needs both signers and verifiers to verify the authenticity of the public keys, and hence, the certificates are required.This article presents the first model and construction of the certificateless universal designated verifier signature scheme, in which the certificates are not needed.The proposed scheme satisfies all the requirements of the universal designated verifier signature in the certificateless system.Security proofs are provided for the scheme based on the random oracle model, assuming that the Bilinear diffie-hellman (BDH) problem is hard to solve.

  1. Broadcast encryption schemes based on RSA

    Institute of Scientific and Technical Information of China (English)

    MU Ning-bo; HU Yu-pu; OU Hai-wen

    2009-01-01

    Three broadcast schemes for small receiver set using the property of RSA modulus are presented. They can solve the problem of data redundancy when the size of receiver set is small. In the proposed schemes, the center uses one key to encrypt the message and can revoke authorization conveniently. Every authorized user only needs to store one decryption key of a constant size. Among these three schemes, the first one has indistinguishability against adaptive chosen ciphertext attack (IND-CCA2) secure, and any collusion of authorized users cannot produce a new decryption key but the sizes of encryption modulus and ciphertext are linear in the number of receivers. In the second scheme, the size of ciphertext is half of the first one and any two authorized users can produce a new decryption key, but the center can identify them using the traitor tracing algorithm. The third one is the most efficient but the center cannot identify the traitors exactly.

  2. A New Efficient Mobile Micropayment Scheme

    Institute of Scientific and Technical Information of China (English)

    FU Xiong; YANG Zong-kai; LANG Wei-min; TAN Yun-meng

    2004-01-01

    This paper proposes a micropayment scheme designed for GSM mobile scenario, where the overload of computation, storage and communication for mobile phone is reduced by directing operations normally performed by the mobile user to the static portion of the network in view of its limited capability. Messages which received and sent during the payment are very simple and public key infrastructure is not needed, which reduces delay and removes the possibility of incomplete payment due to communications failures. Furthermore, all the information related to payment is encrypted by a shared symmetric key in our scheme, so the privacy of the mobile user is protected and the security of information is guaranteed. Compared with other mobile micropayment schemes in existence, no public-key operation is required, which minimizes the computation and storage overhead dramatically. In addition, restricted anonymous is also provided in our scheme.

  3. SEPARATION OF PLUTONIUM

    Science.gov (United States)

    Maddock, A.G.; Smith, F.

    1959-08-25

    A method is described for separating plutonium from uranium and fission products by treating a nitrate solution of fission products, uranium, and hexavalent plutonium with a relatively water-insoluble fluoride to adsorb fission products on the fluoride, treating the residual solution with a reducing agent for plutonium to reduce its valence to four and less, treating the reduced plutonium solution with a relatively insoluble fluoride to adsorb the plutonium on the fluoride, removing the solution, and subsequently treating the fluoride with its adsorbed plutonium with a concentrated aqueous solution of at least one of a group consisting of aluminum nitrate, ferric nitrate, and manganous nitrate to remove the plutonium from the fluoride.

  4. POLONIUM SEPARATION PROCESS

    Science.gov (United States)

    Karraker, D.G.

    1959-07-14

    A liquid-liquid extraction process is presented for the recovery of polonium from lead and bismuth. According to the invention an acidic aqueous chloride phase containing the polonium, lead, and bismuth values is contacted with a tributyl phosphate ether phase. The polonium preferentially enters the organic phase which is then separated and washed with an aqueous hydrochloric solution to remove any lead or bismuth which may also have been extracted. The now highly purified polonium in the organic phase may be transferred to an aqueous solution by extraction with aqueous nitric acid.

  5. PLUTONIUM SEPARATION METHOD

    Science.gov (United States)

    Beaufait, L.J. Jr.; Stevenson, F.R.; Rollefson, G.K.

    1958-11-18

    The recovery of plutonium ions from neutron irradiated uranium can be accomplished by bufferlng an aqueous solutlon of the irradiated materials containing tetravalent plutonium to a pH of 4 to 7, adding sufficient acetate to the solution to complex the uranyl present, adding ferric nitrate to form a colloid of ferric hydroxide, plutonlum, and associated fission products, removing and dissolving the colloid in aqueous nitric acid, oxldizlng the plutonium to the hexavalent state by adding permanganate or dichromate, treating the resultant solution with ferric nitrate to form a colloid of ferric hydroxide and associated fission products, and separating the colloid from the plutonlum left in solution.

  6. The effects of Ghana's national health insurance scheme on maternal and infant health care utilization

    NARCIS (Netherlands)

    I.E.J. Bonfrer (Igna); Breebaart, L. (Lyn); De Poel, E.V. (Ellen Van)

    2016-01-01

    textabstractIncreasing equitable access to health care is a main challenge African policy makers are facing. The Ghanaian government implemented the National Health Insurance Scheme in 2004 and the aim of this study is to evaluate its early effects on maternal and infant healthcare use. We exploit d

  7. Role of the Convective Scheme in Modeling Initiation and Intensification of Tropical Depressions over the North Atlantic

    Science.gov (United States)

    Duvel, Jean Philippe; Camargo, Suzana; Sobel, Adam

    2016-04-01

    Modifications of the large-scale environment related to intraseasonal (MJO) and interannual (ENSO) time-scale variability or to global climate warming may have important impacts on the tropical cyclonic activity. This sensitivity of tropical cyclones (TC) on environmental changes can now be studied using General Circulation Models (GCM). Before doing sensitivity studies with a GCM, it is interesting to assess the representation of the TC activity for different configurations (resolution, parameterization) of the GCM in present climate conditions and to trace possible causes of bias in TC number, location or strength. A possible approach to do this assessment is to separate initiation and intensification processes. By using either GCM output, or meteorological analysis combined to TC observation databases, it is possible to study the condition of formation of tropical depressions vortices (TDV) at an early stage and their possible intensification into a TC (say the Tropical Storm stage). We use the LMDZ GCM to study the sensitivity of TDV characteristics to different entrainment and closure formulations of the convective scheme. The study focuses on the Tropical North Atlantic using the "zoom" capability of the LMDZ GCM. The horizontal resolution of the model is set to 0.75° over a large region of the North Atlantic and West Africa. The GCM is free to run in this region and is tied to ERA-Interim reanalysis outside that region, with intermediate relaxation times in-between. We use the Tiedtke convective scheme with entrainment and closure based on the moisture convergence, or with an entrainment based on the relative humidity of the environment, and additionally a closure based on CAPE. Each configuration is run for 10 years between 2000 and 2009 with prescribed SST. In summary, the convective entrainment based on the relative humidity in the environment deepens the TDV in LMDZ, resulting in more TDV and TC. The convective closure mitigates this tendency and

  8. Integration of current identity-based district-varied health insurance schemes in China: implications and challenges.

    Science.gov (United States)

    Wang, Hai-Qiang; Liu, Zhi-Heng; Zhang, Yong-Zhao; Luo, Zhuo-Jing

    2012-03-01

    With China's great efforts to improve public health insurance, clear progress has been achieved toward the ambitious full health insurance coverage strategy for all. The current health insurance schemes in China fall into three categories: urban employee basic health insurance scheme, urban resident scheme, and new rural cooperative medical system. Despite their phasic success, these substantially identity-based, district-varied health insurance schemes have separate operation mechanisms, various administrative institutions, and consequently poor connections. On the other hand, the establishment and implementation of various health insurance schemes provide the preconditioning of more sophisticated social health insurance schemes, the increase in the income of urban and rural people, and the great importance attached by the government. Moreover, the reform of the "Hukou" (household register) system provides economical, official, and institutional bases. Therefore, the establishment of an urban-rural integrated, citizen-based, and nationwide-universal health insurance scheme by the government is critically important to attain equality and national connection. Accordingly, the differences between urban and rural areas should be minimized. In addition, the current schemes, administrative institutions, and networks should be integrated and interconnected. Moreover, more expenditure on health insurance might be essential for the integration despite the settings of global financial crisis. Regardless of the possible challenges in implementation, the proposed new scheme is promising and may be applied in the near future for the benefit of the Chinese people and global health.

  9. Cascade self-seeding scheme with wake monochromator for narrow-bandwidth X-ray FELs

    CERN Document Server

    Geloni, Gianluca; Saldin, Evgeni

    2010-01-01

    Three different approaches have been proposed so far for production of highly monochromatic X-rays from a baseline XFEL undulator: (i) single-bunch self-seeding scheme with a four crystal monochromator in Bragg reflection geometry; (ii) double-bunch self-seeding scheme with a four-crystal monochromator in Bragg reflection geometry; (iii) single-bunch self-seeding scheme with a wake monochromator. A unique element of the X-ray optical design of the last scheme is the monochromatization of X-rays using a single crystal in Bragg-transmission geometry. A great advantage of this method is that the monochromator introduces no path delay of X-rays. This fact eliminates the need for a long electron beam bypass, or for the creation of two precisely separated, identical electron bunches, as required in the other two self-seeding schemes. In its simplest configuration, the self-seeded XFEL consists of an input undulator and an output undulator separated by a monochromator. In some experimental situations this simplest t...

  10. Readout scheme of the upgraded ALICE TPC

    CERN Document Server

    Appelshaeuser, Harald; Ivanov, Marian; Lippmann, Christian; Wiechula, Jens

    2016-01-01

    In this document, we present the updated readout scheme for the ALICE TPC Upgrade. Two major design changes are implemented with respect to the concept that was presented in the TPC Upgrade Technical Design Report: – The SAMPA front-end ASIC will be used in direct readout mode. – The ADC sampling frequency will be reduced from 10 to 5 MHz. The main results from simulations and a description of the new readout scheme is outlined.

  11. Problems of robustness for universal coding schemes

    OpenAIRE

    V'yugin, V. V.

    2008-01-01

    The Lempel-Ziv universal coding scheme is asymptotically optimal for the class of all stationary ergodic sources. A problem of robustness of this property under small violations of ergodicity is studied. A notion of deficiency of algorithmic randomness is used as a measure of disagreement between data sequence and probability measure. We prove that universal compressing schemes from a large class are non-robust in the following sense: if the randomness deficiency grows arbitrarily slowly on i...

  12. Binary Schemes of Vapor Bubble Growth

    Science.gov (United States)

    Zudin, Yu. B.

    2015-05-01

    A problem on spherically symmetric growth of a vapor bubble in an infi nite volume of a uniformly superheated liquid is considered. A description of the limiting schemes of bubble growth is presented. A binary inertial-thermal bubble growth scheme characterized by such specifi c features as the "three quarters" growth law and the effect of "pressure blocking" in a vapor phase is considered.

  13. Advanced switching schemes in a Stark decelerator

    CERN Document Server

    Zhang, Dongdong; Meijer, Gerard

    2015-01-01

    We revisit the operation of the Stark decelerator and present a new, optimized operation scheme, which substantially improves the efficiency of the decelerator at both low and high final velocities, relevant for trapping experiments and collision experiments, respectively. Both experimental and simulation results show that this new mode of operation outperforms the schemes which have hitherto been in use. This new mode of operation could potentially be extended to other deceleration techniques.

  14. Field sampling scheme optimization using simulated annealing

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2010-10-01

    Full Text Available to derive optimal sampling schemes. 2. Hyperspectral remote sensing In the study of electro-magnetic physics, when energy in the form of light interacts with a material, part of the energy at certain wavelength is absorbed, transmitted, emitted... in order to derive optimal sampling schemes. 2. Hyperspectral remote sensing In the study of electro-magnetic physics, when energy in the form of light interacts with a material, part of the energy at certain wavelength is absorbed, transmitted, emitted...

  15. Composite centered schemes for multidimensional conservation laws

    Energy Technology Data Exchange (ETDEWEB)

    Liska, R. [Czech Technical Univ., Prague (Czech Republic). Faculty of Nuclear Sciences and Physical Engineering; Wendroff, B. [Los Alamos National Lab., NM (United States)

    1998-05-08

    The oscillations of a centered second order finite difference scheme and the excessive diffusion of a first order centered scheme can be overcome by global composition of the two, that is by performing cycles consisting of several time steps of the second order method followed by one step of the diffusive method. The authors show the effectiveness of this approach on some test problems in two and three dimensions.

  16. Renormalization Scheme Dependence and Renormalization Group Summation

    CERN Document Server

    McKeon, D G C

    2016-01-01

    We consider logarithmic contributions to the free energy, instanton effective action and Laplace sum rules in QCD that are a consequence of radiative corrections. Upon summing these contributions by using the renormalization group, all dependence on the renormalization scale parameter mu cancels. The renormalization scheme dependence in these processes is examined, and a renormalization scheme is found in which the effect of higher order radiative corrections is absorbed by the behaviour of the running coupling.

  17. Accuracy property of certain hyperbolic difference schemes

    Energy Technology Data Exchange (ETDEWEB)

    Hicks, D.L.; Madsen, M.M.

    1976-12-01

    An accuracy property called the CFL1 property is shared by several successful difference schemes. It appears to be a property at least as important as the property of higher-order accuracy for hyperbolic difference schemes when weak solutions (e.g., shocks) are sought. Investigation of this property leads to suggestions of ways to improve the accuracy in such wavecodes as WONDY, CHARTD, and THREEDY. 10 figures.

  18. GROUP VELOCITY CONTROL SCHEME WITH LOW DISSIPATION

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    In order to prevent smearing the discontinuity, a modified term is added to the third order Upwind Compact Difference scheme to lower the dissipation error. Moreover, the dispersion error is controled to hold back the non-physical oscillation by means of the group velocity control. The scheme is used to simulate the interactions of shock-density stratified interface and the disturbed interface developing to vortex rollers. Numerical results are satisfactory.

  19. Electronic Payment Scheme to Prevent the Treachery

    Institute of Scientific and Technical Information of China (English)

    FAN Kai; ZHANG Jun; KOU Weidong; XIAO Guozhen

    2006-01-01

    Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and its security is analyzed. This scheme can prevent the treachery only with the aid of an un-trusted third party. It is very simple and it also improves the security and provides the non-repudiation, accountability, fairness and privacy.

  20. Printed Spacecraft Separation System

    Energy Technology Data Exchange (ETDEWEB)

    Holmans, Walter [Planetary Systems Corporation, Silver Springs, MD (United States); Dehoff, Ryan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2016-10-01

    In this project Planetary Systems Corporation proposed utilizing additive manufacturing (3D printing) to manufacture a titanium spacecraft separation system for commercial and US government customers to realize a 90% reduction in the cost and energy. These savings were demonstrated via “printing-in” many of the parts and sub-assemblies into one part, thus greatly reducing the labor associated with design, procurement, assembly and calibration of mechanisms. Planetary Systems Corporation redesigned several of the components of the separation system based on additive manufacturing principles including geometric flexibility and the ability to fabricate complex designs, ability to combine multiple parts of an assembly into a single component, and the ability to optimize design for specific mechanical property targets. Shock absorption was specifically targeted and requirements were established to attenuate damage to the Lightband system from shock of initiation. Planetary Systems Corporation redesigned components based on these requirements and sent the designs to Oak Ridge National Laboratory to be printed. ORNL printed the parts using the Arcam electron beam melting technology based on the desire for the parts to be fabricated from Ti-6Al-4V based on the weight and mechanical performance of the material. A second set of components was fabricated from stainless steel material on the Renishaw laser powder bed technology due to the improved geometric accuracy, surface finish, and wear resistance of the material. Planetary Systems Corporation evaluated these components and determined that 3D printing is potentially a viable method for achieving significant cost and savings metrics.

  1. Virus separation using membranes.

    Science.gov (United States)

    Grein, Tanja A; Michalsky, Ronald; Czermak, Peter

    2014-01-01

    Industrial manufacturing of cell culture-derived viruses or virus-like particles for gene therapy or vaccine production are complex multistep processes. In addition to the bioreactor, such processes require a multitude of downstream unit operations for product separation, concentration, or purification. Similarly, before a biopharmaceutical product can enter the market, removal or inactivation of potential viral contamination has to be demonstrated. Given the complexity of biological solutions and the high standards on composition and purity of biopharmaceuticals, downstream processing is the bottleneck in many biotechnological production trains. Membrane-based filtration can be an economically attractive and efficient technology for virus separation. Viral clearance, for instance, of up to seven orders of magnitude has been reported for state of the art polymeric membranes under best conditions.This chapter summarizes the fundamentals of virus ultrafiltration, diafiltration, or purification with adsorptive membranes. In lieu of an impractical universally applicable protocol for virus filtration, application of these principles is demonstrated with two examples. The chapter provides detailed methods for production, concentration, purification, and removal of a rod-shaped baculovirus (Autographa californica M nucleopolyhedrovirus, about 40 × 300 nm in size, a potential vector for gene therapy, and an industrially important protein expression system) or a spherical parvovirus (minute virus of mice, 22-26 nm in size, a model virus for virus clearance validation studies).

  2. Separation of ions in acidic solution by capillary electrophoresis

    Energy Technology Data Exchange (ETDEWEB)

    Thornton, M.

    1997-10-08

    Capillary electrophoresis (CE) is an effective method for separating ionic species according to differences in their electrophoretic mobilities. CE separations of amino acids by direct detection are difficult due to their similar electrophoretic mobilities and low absorbances. However, native amino acids can be separated by CE as cations at a low pH by adding an alkanesulfonic acid to the electrolyte carrier which imparts selectivity to the system. Derivatization is unnecessary when direct UV detection is used at 185 nm. Simultaneous speciation of metal cations such as vanadium (IV) and vanadium (V) can easily be performed without complexation prior to analysis. An indirect UV detection scheme for acidic conditions was also developed using guanidine as the background carrier electrolyte (BCE) for the indirect detection of metal cations. Three chapters have been removed for separate processing. This report contains introductory material, references, and general conclusions. 80 refs.

  3. Sound field separation with sound pressure and particle velocity measurements

    DEFF Research Database (Denmark)

    Fernandez Grande, Efren; Jacobsen, Finn; Leclère, Quentin

    2012-01-01

    separation techniques make it possible to distinguish between outgoing and incoming waves from the two sides, and thus NAH can be applied. In this paper, a separation method based on the measurement of the particle velocity in two layers and another method based on the measurement of the pressure...... and the velocity in a single layer are proposed. The two methods use an equivalent source formulation with separate transfer matrices for the outgoing and incoming waves, so that the sound from the two sides of the array can be modeled independently. A weighting scheme is proposed to account for the distance...... pressure-velocity method, although it requires an additional measurement surface. On the whole, the separation methods can be useful when the disturbance of the incoming field is significant. Otherwise the direct reconstruction is more accurate and straightforward. © 2012 Acoustical Society of America....

  4. X-Y separable pyramid steerable scalable kernels

    OpenAIRE

    Shy, Douglas; Perona, Pietro

    1994-01-01

    A new method for generating X-Y separable, steerable, scalable approximations of filter kernels is proposed which is based on a generalization of the singular value decomposition (SVD) to three dimensions. This “pseudo-SVD” improves upon a previous scheme due to Perona (1992) in that it reduces convolution time and storage requirements. An adaptation of the pseudo-SVD is proposed to generate steerable and scalable kernels which are suitable for use with a Laplacian pyramid. The properties of ...

  5. Separation of plasmid DNA topoisomers by multimodal chromatography.

    Science.gov (United States)

    Silva-Santos, A Rita; Alves, Cláudia P A; Prazeres, Duarte Miguel F; Azevedo, Ana M

    2016-06-15

    The ability to analyze the distribution of topoisomers in a plasmid DNA sample is important when evaluating the quality of preparations intended for gene therapy and DNA vaccination or when performing biochemical studies on the action of topoisomerases and gyrases. Here, we describe the separation of supercoiled (sc) and open circular (oc) topoisomers by multimodal chromatography. A medium modified with the ligand N-benzyl-N-methyl ethanolamine and an elution scheme with increasing NaCl concentration are used to accomplish the baseline separation of sc and oc plasmid. The utility of the method is demonstrated by quantitating topoisomers in a purified plasmid sample. Copyright © 2016 Elsevier Inc. All rights reserved.

  6. A NEW SCHEME BASED ON THE MI SCHEME AND ITS ANALYSIS

    Institute of Scientific and Technical Information of China (English)

    Jiao Luyao; Li Yifa; Qiao Shuaiting

    2013-01-01

    This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme.Based on the original scheme,our new scheme,named the Multi-layer MI (MMI) scheme,has a structure of multi-layer central map.Firstly,this article introduces the MI scheme and describes linearization attack and differential attack; then prescribes the designation of MMI in detail,and proves that MMI can resist both linearization attack and differential attack.Besides,this article also proves that MMI can resist recent eXtended Linearization (XL)-like methods.In the end,this article concludes that MMI also maintains the efficiency of MI.

  7. LLRF System for the CEBAF Separator Upgrade

    Energy Technology Data Exchange (ETDEWEB)

    Plawski, Tomasz E. [JLAB; Bachimanchi, Ramakrishna [JLAB; Hovater, J. Curt [JLAB; Seidman, David J. [JLAB; Wissmann, Mark J. [JLAB

    2014-12-01

    The Continuous Electron Beam Accelerator Facility (CEBAF) energy upgrade from 6 GeV to 12 GeV includes the installation of four new 748.5 MHz normal conducting deflecting cavities in the 5th pass extraction region. This system will work together with the existing 499 MHz RF Separator in order to allow simultaneous delivery of the beam to four CEBAF experimental halls. The RF system employs two digital LLRF systems controlling four cavities in a vector sum. Cavity tune information of the individual cavities is also obtained using a multiplexing scheme of the forward and reflected RF signals. In this paper we will present detailed LLRF design and the current status of the CEBAF 748.5/499 MHz beam extraction system.

  8. Restoring broken entanglement by injecting separable correlations

    CERN Document Server

    Pirandola, Stefano

    2012-01-01

    The distribution of entanglement is central in many protocols of quantum information and computation. However it is also known to be a very fragile process when loss and noise come into play. The inevitable interaction of the quantum systems with the external environment induces effects of decoherence which may be so strong to destroy any input entanglement, a phenomenon known as "entanglement breaking". Here we study this catastrophic process in a correlated-noise environment showing how the presence of classical-type correlations can restore the distribution of entanglement. In particular, we consider a Gaussian environment whose thermal noise is strong enough to break the entanglement of two bosonic modes of the electromagnetic field. In this scenario, we show that the injection of separable correlations from the same environment is able to reactivate the broken entanglement. This paradoxical effect happens both in schemes of direct distribution, where a third party (Charlie) broadcasts entangled states to...

  9. Plasma separation: physical separation at the molecular level

    Science.gov (United States)

    Gueroult, Renaud; Rax, Jean-Marcel; Fisch, Nathaniel J.

    2016-09-01

    Separation techniques are usually divided in two categories depending on the nature of the discriminating property: chemical or physical. Further to this difference, physical and chemical techniques differ in that chemical separation typically occurs at the molecular level, while physical separation techniques commonly operate at the macroscopic scale. Separation based on physical properties can in principle be realized at the molecular or even atomic scale by ionizing the mixture. This is in essence plasma based separation. Due to this fundamental difference, plasma based separation stands out from other separation techniques, and features unique properties. In particular, plasma separation allows separating different elements or chemical compounds based on physical properties. This could prove extremely valuable to separate macroscopically homogeneous mixtures made of substances of similar chemical formulation. Yet, the realization of plasma separation techniques' full potential requires identifying and controlling basic mechanisms in complex plasmas which exhibit suitable separation properties. In this paper, we uncover the potential of plasma separation for various applications, and identify the key physics mechanisms upon which hinges the development of these techniques.

  10. Subsea separation systems

    Energy Technology Data Exchange (ETDEWEB)

    Pagot, P.R.; Werneck, M.; Assayag, S.; Cerqueira, M.B.; Herdeiro, M.A.N. [Petrobras, Rio de Janeiro (Brazil)

    1996-12-31

    Petrobras will install the first Petroboost subsea prototype in the world in early 1997, in the Marimba oil field in Campos Basin, Brazil. This paper presents a general description of Petroboost, the main features of the production system in Marimba, the current situation of the project, and future steps Petrobras intends to carry out to declare this technology available and ready to be used in deepwater fields in 1997. The success of the prototype in Marimba and the satisfactory completion of the test programs of some critical items are enough to declare the Petroboost technology available for deepwater.

  11. Very low bit streaming image compression coder based on lift scheme

    Science.gov (United States)

    Tao, Hongjiu; Tian, Jinwen; Liu, Jianguo; Yu, Qiuzhe; Xu, Hongbo

    2001-09-01

    This paper presents a novel compression encoding/decoding method based on lift scheme for I-VOP. In traditional coding I-VOP algorithm, the textures and shapes are separately coded, and the macro-block DCT coding method is adopted in the coding texture and 16x16 BAB(Binary Alpha Block) coding method is employed in shape coding. The texture and shape coding method is not of embed feature. The algorithm based on lift scheme for I-VOP, the texture and shape at same time is coded and the bit streaming is of embed feature.

  12. Scheme to Implement Optimal Symmetric 1 → 2 Universal Quantum Telecloning Through Cavity-Assisted Interaction

    Institute of Scientific and Technical Information of China (English)

    YANG Zhen; ZHANG Wen-Hai; HE Juan; YE Liu

    2008-01-01

    We propose a scheme to implement the optimal symmetric 1 → 2 universal quantum telecloning through cavity-assisted interaction. In our scheme, an arbitrary single atomic state can be telecloned to two single atomic states. And three atoms are trapped in three spatially separated cavities respectively. With a particular multiparticle entangled state acting as a quantum information channel and the trapped single atom acting as a quantum network node for its long-lived internal state, quantum information can be telecloned among nodes and can stored in the nodes.

  13. A Path Select Algorithm with Error Control Schemes and Energy Efficient Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sandeep Dahiya

    2012-04-01

    Full Text Available A wireless sensor network consists of a large number of sensor nodes that are spread densely to observe the phenomenon. The whole network lifetime relies on the lifetime of the each sensor node. If one node dies, it could lead to a separation of the sensor network. Also a multi hop structure and broadcast channel of wireless sensornecessitate error control scheme to achieve reliable data transmission. Automatic repeat request (ARQ and forward error correction (FEC are the key error control strategies in wire sensor network. In this paper we propose a path selection algorithm with error control schemes using energy efficient analysis.

  14. A New Framework to Compare Mass-Flux Schemes Within the AROME Numerical Weather Prediction Model

    Science.gov (United States)

    Riette, Sébastien; Lac, Christine

    2016-08-01

    In the Application of Research to Operations at Mesoscale (AROME) numerical weather forecast model used in operations at Météo-France, five mass-flux schemes are available to parametrize shallow convection at kilometre resolution. All but one are based on the eddy-diffusivity-mass-flux approach, and differ in entrainment/detrainment, the updraft vertical velocity equation and the closure assumption. The fifth is based on a more classical mass-flux approach. Screen-level scores obtained with these schemes show few discrepancies and are not sufficient to highlight behaviour differences. Here, we describe and use a new experimental framework, able to compare and discriminate among different schemes. For a year, daily forecast experiments were conducted over small domains centred on the five French metropolitan radio-sounding locations. Cloud base, planetary boundary-layer height and normalized vertical profiles of specific humidity, potential temperature, wind speed and cloud condensate were compared with observations, and with each other. The framework allowed the behaviour of the different schemes in and above the boundary layer to be characterized. In particular, the impact of the entrainment/detrainment formulation, closure assumption and cloud scheme were clearly visible. Differences mainly concerned the transport intensity thus allowing schemes to be separated into two groups, with stronger or weaker updrafts. In the AROME model (with all interactions and the possible existence of compensating errors), evaluation diagnostics gave the advantage to the first group.

  15. The Cannabis Infringement Notice scheme in Western Australia: a review of policy, police and judicial perspectives.

    Science.gov (United States)

    Sutton, Adam; Hawks, David

    2005-07-01

    Western Australia (WA) became the fourth Australian jurisdiction to adopt a 'prohibition with civil penalties scheme' for minor cannabis offences when its Cannabis Infringement Notice (CIN) scheme became law on 22 March 2004. This study examined the attitudes and practices of policy makers, members of the law enforcement and magistracy and other judicial sectors involved in enforcing the new scheme, and their views as to its likely impact on the drug market. As part of the pre--post evaluation of the legislative reforms a sample of 30 police, other criminal justice personnel and policy makers have been qualitatively interviewed. Data were collected both at the pre-implementation stage (March and June 2003) and shortly after the Act became operational (mid-June 2004). The Western Australia Police Service's implementation of the CIN scheme has been extremely professional. However, these early results suggest that while the CIN scheme has been designed to take into account problems with similar schemes elsewhere in Australia, possible problems include: some operational police being unsure about the operation of the scheme; expected savings in police resources will probably be reduced by procedures which require offenders to be taken back to the station rather than issue notices on the spot as intended by the scheme's architects; probable net widening; problems with exercise of police discretion to issue a CIN; and public misunderstanding of the scheme. In the early months of the scheme understanding of the new laws among both police and members of the public was far from perfect. For the system to achieve the outcomes intended by legislators, it is essential that levels of understanding improve. Media and other campaigns to inform the public that cannabis cultivation and use remain illegal, and to warn about risks associated with cannabis use, should be extended. As it will be at least 18 months before the scheme is operationally settled in, the media and others

  16. Cryptanalysis and Improvement of Piveteau Signature Scheme with Message Recovery

    Institute of Scientific and Technical Information of China (English)

    李子臣; 成军祥; 戴一奇

    2003-01-01

    Piveteau signature scheme allows message recovery but the methodology differs from that of the Nyberg-Rueppel schemes. This paper analyzes the security of the Piveteau scheme by designing some attacks. Two improved methods to Piveteau signature scheme and Nyberg-Rueppel schemes were developed to avoid these weaknesses. Analyses of the security of the improved schemes prove that the improved methods can effectively handle the attacks proposed in this paper.

  17. Analysis and Improvement of Authenticatable Ring Signcryption Scheme

    Institute of Scientific and Technical Information of China (English)

    LI Fa-gen; Shirase Masaaki; Takagi Tsuyoshi

    2008-01-01

    We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore,we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme.The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme.We then prove that the improved scheme satisfies confidentiality,unforgeability,anonymity and authenticatability.

  18. Efficient solution of two-dimensional steady separated flows

    Science.gov (United States)

    Napolitano, M.

    This work is concerned with the numerical solution of 2D incompressible steady laminar separated flows at moderate-to-high values of Re. The vorticity-stream function Navier-Stokes equations, as well as approximate models based upon the boundary-layer theory, will be considered. The main objective of the paper is to present the development of an efficient approach for solving a class of problems usually referred to as high Re weakly separated flows. A description is given of a block-alternating-direction-implicit method, which applies the approximate factorization scheme of Beam and Warming to the vorticity-stream function equations, using the delta form of the deferred correction procedure of Khosla and Rubin to combine the stability of upwind schemes with the accuracy of central differences. The logical steps which led to the development of a more efficient incremental block-line Gauss-Seidel method and to a simple multigrid strategy particularly suited for this kind of numerical scheme are then outlined. Finally, benchmark-quality solutions for separated flows inside diffusers and channels with smooth as well as sudden expansions are presented.

  19. Multifraction separation in countercurrent chromatography (MCSGP).

    Science.gov (United States)

    Krättli, Martin; Müller-Späth, Thomas; Morbidelli, Massimo

    2013-09-01

    The multicolumn countercurrent solvent gradient purification (MCSGP) process is a continuous countercurrent multicolumn chromatography process capable of performing three fraction separations while applying a linear gradient of some modifier. This process can then be used either for the purification of a single species from a multicomponent mixture or to separate a three component mixture in one single operation. In this work, this process is extended to the separation of multifractions, in principle with no limitation. To achieve this goal the MCSGP standard process is extended by introducing one extra separation section per extra fraction to be isolated. Such an extra separation section is realized in this work through a single additional column, so that a n fraction MCSGP process can be realized using a minimum of n columns. Two separation processes were considered to experimentally demonstrate the possibility of realizing a four-fraction MCSGP unit able to purify two intermediate products in a given multicomponent mixture. The first one was a model mixture containing four different proteins. The two proteins eluting in the center of the chromatogram were purified with yields equal to 95% for the early eluting and 92% for the later eluting one. The corresponding purities were 94% and 97%, respectively. Such performance was well superior to that of the batch operation with the same modifier gradient which for the same purity values could not achieve yields larger than 67% and 81%, respectively. Similar performance improvements were found for the second separation where two out of seven charge variants which constitute the mAb Cetuximab currently available on the market have been purified in one single operation using a four-fraction MCSGP unit. In this case, yields of 81% and 65% were obtained with purities of 90% and 89%, respectively. These data compare well with the corresponding data from batch chromatography where with the same gradient and for the same

  20. Particle separator scroll vanes

    Energy Technology Data Exchange (ETDEWEB)

    Lastrina, F. A.; Mayer, J. C.; Pommer, L. M.

    1985-07-09

    An inlet particle separator for a gas turbine engine is provided with unique vanes distributed around an entrance to a particle collection chamber. The vanes are uniquely constructed to direct extraneous particles that enter the engine into the collection chamber and prevent the particles from rebounding back into the engine's air flow stream. The vanes are provided with several features to accomplish this function, including upstream faces that are sharply angled towards air flow stream direction to cause particles to bounce towards the collection chamber. In addition, throat regions between the vanes cause a localized air flow acceleration and a focusing of the particles that aid in directing the particles in a proper direction.

  1. Nebulized therapy. SEPAR year.

    Science.gov (United States)

    Olveira, Casilda; Muñoz, Ana; Domenech, Adolfo

    2014-12-01

    Inhaled drugs are deposited directly in the respiratory tract. They therefore achieve higher concentrations with faster onset of action and fewer side effects than when used systemically. Nebulized drugs are mainly recommended for patients that require high doses of bronchodilators, when they need to inhale drugs that only exist in this form (antibiotics or dornase alfa) or when they are unable to use other inhalation devices. Technological development in recent years has led to new devices that optimize pulmonary deposits and reduce the time needed for treatment. In this review we focus solely on drugs currently used, or under investigation, for nebulization in adult patients; basically bronchodilators, inhaled steroids, antibiotics, antifungals, mucolytics and others such as anticoagulants, prostanoids and lidocaine. Copyright © 2014 SEPAR. Published by Elsevier Espana. All rights reserved.

  2. Block copolymer battery separator

    Energy Technology Data Exchange (ETDEWEB)

    Wong, David; Balsara, Nitash Pervez

    2016-04-26

    The invention herein described is the use of a block copolymer/homopolymer blend for creating nanoporous materials for transport applications. Specifically, this is demonstrated by using the block copolymer poly(styrene-block-ethylene-block-styrene) (SES) and blending it with homopolymer polystyrene (PS). After blending the polymers, a film is cast, and the film is submerged in tetrahydrofuran, which removes the PS. This creates a nanoporous polymer film, whereby the holes are lined with PS. Control of morphology of the system is achieved by manipulating the amount of PS added and the relative size of the PS added. The porous nature of these films was demonstrated by measuring the ionic conductivity in a traditional battery electrolyte, 1M LiPF.sub.6 in EC/DEC (1:1 v/v) using AC impedance spectroscopy and comparing these results to commercially available battery separators.

  3. Block copolymer battery separator

    Science.gov (United States)

    Wong, David; Balsara, Nitash Pervez

    2016-04-26

    The invention herein described is the use of a block copolymer/homopolymer blend for creating nanoporous materials for transport applications. Specifically, this is demonstrated by using the block copolymer poly(styrene-block-ethylene-block-styrene) (SES) and blending it with homopolymer polystyrene (PS). After blending the polymers, a film is cast, and the film is submerged in tetrahydrofuran, which removes the PS. This creates a nanoporous polymer film, whereby the holes are lined with PS. Control of morphology of the system is achieved by manipulating the amount of PS added and the relative size of the PS added. The porous nature of these films was demonstrated by measuring the ionic conductivity in a traditional battery electrolyte, 1M LiPF.sub.6 in EC/DEC (1:1 v/v) using AC impedance spectroscopy and comparing these results to commercially available battery separators.

  4. Gravity separation for oil wastewater treatment

    OpenAIRE

    Golomeova, Mirjana; Zendelska, Afrodita; Krstev, Boris; Krstev, Aleksandar

    2010-01-01

    In this paper, the applications of gravity separation for oil wastewater treatment are presented. Described is operation on conventional gravity separation and parallel plate separation. Key words: gravity separation, oil, conventional gravity separation, parallel plate separation.

  5. Gravity separation for oil wastewater treatment

    OpenAIRE

    Golomeova, Mirjana; Zendelska, Afrodita; Krstev, Boris; Krstev, Aleksandar

    2010-01-01

    In this paper, the applications of gravity separation for oil wastewater treatment are presented. Described is operation on conventional gravity separation and parallel plate separation. Key words: gravity separation, oil, conventional gravity separation, parallel plate separation.

  6. Combining image-processing and image compression schemes

    Science.gov (United States)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  7. Feasibility analysis of two identity- based proxy ring signature schemes

    Institute of Scientific and Technical Information of China (English)

    Wang Huaqun; Zhang Lijun; Zhao Junxi

    2007-01-01

    Recently , proxy ring signature schemes have been shown to be useful in various applications , such as electronic polling, electronic payment, etc. Although many proxy ring signature schemes have been proposed, there are only two identity- based proxy ring signature schemes have been proposed until now, I.e., Cheng's scheme and Lang's scheme. It's unlucky that the two identity- based proxy ring signature schemes are unfeasible . This paper points out the reasons why the two identity- based proxy ring signature schemes are unfeasible. In order to design feasible and efficient identity-based proxy ring signature schemes from bilinear pairings , we have to search for other methods .

  8. Application of ADER Scheme in MHD Simulation

    Institute of Scientific and Technical Information of China (English)

    ZHANG Yanyan; FENG Xueshang; JIANG Chaowei; ZHOU Yufen

    2012-01-01

    The Arbitrary accuracy Derivatives Riemann problem method(ADER) scheme is a new high order numerical scheme based on the concept of finite volume integration,and it is very easy to be extended up to any order of space and time accuracy by using a Taylor time expansion at the cell interface position.So far the approach has been applied successfully to flow mechanics problems.Our objective here is to carry out the extension of multidimensional ADER schemes to multidimensional MHD systems of conservation laws by calculating several MHD problems in one and two dimensions: (ⅰ) Brio-Wu shock tube problem,(ⅱ) Dai-Woodward shock tube problem,(ⅲ) Orszag-Tang MHD vortex problem.The numerical results prove that the ADER scheme possesses the ability to solve MHD problem,remains high order accuracy both in space and time,keeps precise in capturing the shock.Meanwhile,the compared tests show that the ADER scheme can restrain the oscillation and obtain the high order non-oscillatory result.

  9. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  10. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  11. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  12. Dynamic Localization Schemes in Malicious Sensor Networks

    Directory of Open Access Journals (Sweden)

    Kaiqi Xiong

    2009-10-01

    Full Text Available Wireless sensor networks (WSN have recently shown many potential military and civilian applications, especially those used in hostile environments where malicious adversaries can be present. The accuracy of location information is critical for such applications. It is impractical to have a GPS device on each sensor in WSN due to costs. Most of the existing location discovery schemes can only be used in the trusted environment. Recent research has addressed security issues in sensor network localization, but to the best of our knowledge, none have completely solved the secure localization problem. In this paper, we propose novel schemes for secure dynamic localization in sensor networks. These proposed schemes can tolerate up to 50% of beacon nodes being malicious, and they have linear computation time with respect to the number of reference nodes. Our security analysis has showed that our schemes are applicable and resilient to attacks from adversaries. We have further conducted simulations to analyze and compare the performance of these schemes, and to indicate when each should be used. The efficiencies of each method shows why we needed to propose multiple methods.

  13. RF Tuning Schemes for J-PARC DTL and SDTL

    CERN Document Server

    Ikegami, M

    2004-01-01

    J-PARC linac consists of a 3 MeV RFQ linac, a 50 MeV DTL (Drift Tube Linac), a 190 MeV SDTL (Separate-type DTL), and a 400 MeV ACS (Annular-Coupled Structure) linac. In high-current proton linacs, precise tuning of RF amplitude and phase is indispensable to reduce uncontrolled beam loss and beam-quality deterioration. Especially, accurate RF tuning is essential for J-PARC linac, because requirement for the momentum spread is extremely severe to enable effective injection to the succeeding RCS (Rapid Cycling Synchrotron). In this paper, planned tuning schemes for the DTL and SDTL are presented together with the beam diagnostic layout for the tuning.

  14. Experimental investigation to demonstrate Impact Fast Ignition scheme

    Energy Technology Data Exchange (ETDEWEB)

    Watari, T; Azechi, H; Nakai, M; Hironaka, Y; Sakaiya, T; Nakamura, H; Shiraga, H; Shigemori, K; Hosoda, H; Arikawa, Y; Homma, H; Norimatsu, T; Murakami, M; Jhozaki, T [Institute of Laser Engineering, Osaka univ. (Japan); M, Karasik; J, Gardner; J, Bates; D, Colombant, E-mail: twatari@ile.osaka-u.ac.j [Naval Research Laboratory, Washington DC (United States)

    2010-08-01

    We have proposed a new ignition scheme of Fast Ignition, called 'Impact Fast Ignition (IFI)', in which a compressed fuel is ignited by impact collision of a fragment of separately imploded fuel. We performed integrated experiments on impact ignition, in which a portion of a deuterated polystyrene (CD) shell was accelerated to about 600 km/s and was collided with precompressed CD fuel. The shell was imploded using 9 beams and the impactor was accelerated using 3 beams of the GEKKO XII laser system. The laser energy was 350 J per beam. The kinetic energy of the impactor was efficiently converted into thermal energy generating a temperature of about 1.8 keV., Observed maximum neutron yield was 2x10{sup 6}. This yield was 80 times as large as that without impactor. We will present the experimental details and results, demonstrating the high potential of impact ignition for fusion energy production.

  15. Girder Support Scheme for the LCLS Undulator System

    Energy Technology Data Exchange (ETDEWEB)

    Welch, J.

    2005-01-31

    Differential settlement of the foundation of the LCLS Undulator Hall will cause quadrupoles to move and the electron beam trajectory to distort. The resulting phase errors will decrease the FEL power and require time consuming beam-based alignment sessions to correct. By supporting quadrupoles on girders, with three quadrupoles to a girder, the foundation motion induced phase error between the beam and the X Ray radiation can be reduced by a factor of 5 compared with supporting each quadrupole with a separate column. This comes about because the motions of three quadrupoles on a girder are linearly correlated so their effect on the beam is largely canceled out. Thus a girder support scheme can significantly help to extend the time between required beam based alignments and contribute to a more stable operation of the LCLS FEL beam.

  16. An Intrinsically Digital Amplification Scheme for Hearing Aids

    Directory of Open Access Journals (Sweden)

    Brenton R. Steele

    2005-11-01

    Full Text Available Results for linear and wide-dynamic range compression were compared with a new 64-channel digital amplification strategy in three separate studies. The new strategy addresses the requirements of the hearing aid user with efficient computations on an open-platform digital signal processor (DSP. The new amplification strategy is not modeled on prior analog strategies like compression and linear amplification, but uses statistical analysis of the signal to optimize the output dynamic range in each frequency band independently. Using the open-platform DSP processor also provided the opportunity for blind trial comparisons of the different processing schemes in BTE and ITE devices of a high commercial standard. The speech perception scores and questionnaire results show that it is possible to provide improved audibility for sound in many narrow frequency bands while simultaneously improving comfort, speech intelligibility in noise, and sound quality.

  17. Linewidth-tolerant adaptive equalization scheme for OQAM

    Science.gov (United States)

    Mao, Deng; Tang, Haoyuan; Lu, Jianing; Deng, Lei; Fu, Songnian; Feng, Yonghua; Liu, Deming

    2017-06-01

    A linewidth-tolerant adaptive equalization scheme is proposed for M-ary offset quadrature amplitude modulation (OQAM) signal at the presence of wide laser linewidth. Initially, we present a close-form mathematical expression of OQAM signal at the presence of phase noise and derive the condition to obtain the optimal tap value of adaptive equalizer. Our theoretical investigations proves that phase noise in OQAM signal may result in variation of optimal tap value of adaptive equalizer. Consequently, conventional digital signal processing (DSP) flow that separates adaptive equalization and carrier phase recovery (CPR) into two independent modules cannot apply to OQAM signal anymore. Then, we propose a linewidth-tolerant adaptive equalization scheme that incorporate both adaptive equalizer and CPR for m-ary OQAM signal. Taking the 16-OQAM into account, we comprehensively evaluate its performance to compensate residual chromatic dispersion (CD) and polarization mode dispersion (PMD) at the presence of wide laser linewidth. Simulation shows that our proposed adaptive equalization can effectively compensate residual CD that is below 400 ps/nm without performance penalty at the presence of wide laser linewidth. In particular, a tolerance of linewidth and symbol duration products of 1 ×10-4 is secured under conditions of CD=400 ps/nm and DGD=10 ps, given 1-dB required-OSNR penalty at BER=10-3.

  18. Carbon footprint assessment of Western Australian Groundwater Recycling Scheme

    Science.gov (United States)

    Simms, Andrew; Hamilton, Stacey; Biswas, Wahidul K.

    2017-04-01

    This research has determined the carbon footprint or the carbon dioxide equivalent (CO2 eq) of potable water production from a groundwater recycling scheme, consisting of the Beenyup wastewater treatment plant, the Beenyup groundwater replenishment trial plant and the Wanneroo groundwater treatment plant in Western Australia, using a life cycle assessment approach. It was found that the scheme produces 1300 tonnes of CO2 eq per gigalitre (GL) of water produced, which is 933 tonnes of CO2 eq higher than the desalination plant at Binningup in Western Australia powered by 100% renewable energy generated electricity. A Monte Carlo Simulation uncertainty analysis calculated a Coefficient of Variation value of 5.4%, thus confirming the accuracy of the simulation. Electricity input accounts for 83% of the carbon dioxide equivalent produced during the production of potable water. The chosen mitigation strategy was to consider the use of renewable energy to generate electricity for carbon intensive groundwater replenishment trial plant. Depending on the local situation, a maximum of 93% and a minimum of 21% greenhouse gas saving from electricity use can be attained at groundwater replenishment trial plant by replacing grid electricity with renewable electricity. In addition, the consideration of vibrational separation (V-Sep) that helps reduce wastes generation and chemical use resulted in a 4.03 tonne of CO2 eq saving per GL of water produced by the plant.

  19. Carbon footprint assessment of Western Australian Groundwater Recycling Scheme.

    Science.gov (United States)

    Simms, Andrew; Hamilton, Stacey; Biswas, Wahidul K

    2017-04-01

    This research has determined the carbon footprint or the carbon dioxide equivalent (CO2 eq) of potable water production from a groundwater recycling scheme, consisting of the Beenyup wastewater treatment plant, the Beenyup groundwater replenishment trial plant and the Wanneroo groundwater treatment plant in Western Australia, using a life cycle assessment approach. It was found that the scheme produces 1300 tonnes of CO2 eq per gigalitre (GL) of water produced, which is 933 tonnes of CO2 eq higher than the desalination plant at Binningup in Western Australia powered by 100% renewable energy generated electricity. A Monte Carlo Simulation uncertainty analysis calculated a Coefficient of Variation value of 5.4%, thus confirming the accuracy of the simulation. Electricity input accounts for 83% of the carbon dioxide equivalent produced during the production of potable water. The chosen mitigation strategy was to consider the use of renewable energy to generate electricity for carbon intensive groundwater replenishment trial plant. Depending on the local situation, a maximum of 93% and a minimum of 21% greenhouse gas saving from electricity use can be attained at groundwater replenishment trial plant by replacing grid electricity with renewable electricity. In addition, the consideration of vibrational separation (V-Sep) that helps reduce wastes generation and chemical use resulted in a 4.03 tonne of CO2 eq saving per GL of water produced by the plant.

  20. Numerical Evaluation of CPV Boundary Integrals with Symmetrical Quadrature Schemes

    Institute of Scientific and Technical Information of China (English)

    马杭; 徐凯宇

    2003-01-01

    Stemming from the definition of the Cauchy principal values (CPV) integrals, a newly developed symmetrical quadrature scheme was proposed in the paper for the accurate numerical evaluation of the singular boundary integrals in the sense of CPV encountered in the boundary element method. In the case of inner-element singularities, the CPV integrals could be evaluated in a straightforward way by dividing the element into the symmetrical part and the remainder(s). And in the case of end-singularities, the CPV integrals could be evaluated simply by taking a tangential distance transformation of the integrand after cutting out a symmetrical tiny zone around the singular point. In both cases, the operations are no longer necessary before the numerical implementation, which involves the dull routine work to separate out singularities from the integral kernels. Numerical examples were presented for both the two-and the three-dimensional boundary integrals in elasticity. Comparing the numerical results with those by other approaches demonstrates the feasibility and the effectiveness of the proposed scheme.

  1. Selectivity in capillary electrokinetic separations

    NARCIS (Netherlands)

    de Zeeuw, R.A; de Jong, G.J.; Ensing, K

    1999-01-01

    This review gives a survey of selectivity modes in capillary electrophoresis separations in pharmaceutical analysis and bioanalysis. Despite the high efficiencies of these separation techniques, good selectivity is required to allow quantitation or identification of a Chemistry and Toxicology, parti

  2. Physical Separation in the Workplace

    DEFF Research Database (Denmark)

    Stea, Diego; Foss, Nicolai Juul; Holdt Christensen, Peter

    2015-01-01

    Physical separation is pervasive in organizations, and has powerful effects on employee motivation and organizational behaviors. However, research shows that workplace separation is characterized by a variety of tradeoffs, tensions, and challenges that lead to both positive and negative outcomes...

  3. Computer aided design, analysis and experimental investigation of membrane assisted batch reaction-separation systems

    DEFF Research Database (Denmark)

    Mitkowski, Piotr Tomasz; Buchaly, Carsten; Kreis, Peter;

    2009-01-01

    Membrane assisted batch reaction operation offers an interesting option for equilibrium limited reaction systems in chemical and biochemical manufacturing by selective removal of one of the products and thereby increasing the product yield. The design of such hybrid systems need to take into acco...... and separation functionalities and to design/analyse the hybrid scheme. The generated hybrid scheme has been validated through experiments involving an esterification reaction....

  4. Arbitrated quantum signature schemes without using entangled states

    CERN Document Server

    Zou, Xiangfu

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature schemes have being proposed. However, in the existing literature, arbitrated quantum signature schemes depend on entanglement. In this paper, we present two arbitrated quantum signature schemes without utilizing entangled states in the signing phase and the verifying phase. The first proposed scheme can preserve the merits in the existing schemes. Then, we point out, in this scheme and the prior schemes, there exists a problem that Bob can repudiate the integrality of the signatures. To conquer this problem, we construct another arbitrated quantum signature scheme without using quantum entangled states but using a public board. The new scheme has three advantages: it does not utilize entangled states while it can preserve all merits in the existing schemes; the integrality of the signature can avoid being disavowed by the receiver; an...

  5. Analysis of pinching in deterministic particle separation

    Science.gov (United States)

    Risbud, Sumedh; Luo, Mingxiang; Frechette, Joelle; Drazer, German

    2011-11-01

    We investigate the problem of spherical particles vertically settling parallel to Y-axis (under gravity), through a pinching gap created by an obstacle (spherical or cylindrical, center at the origin) and a wall (normal to X axis), to uncover the physics governing microfluidic separation techniques such as deterministic lateral displacement and pinched flow fractionation: (1) theoretically, by linearly superimposing the resistances offered by the wall and the obstacle separately, (2) computationally, using the lattice Boltzmann method for particulate systems and (3) experimentally, by conducting macroscopic experiments. Both, theory and simulations, show that for a given initial separation between the particle centre and the Y-axis, presence of a wall pushes the particles closer to the obstacle, than its absence. Experimentally, this is expected to result in an early onset of the short-range repulsive forces caused by solid-solid contact. We indeed observe such an early onset, which we quantify by measuring the asymmetry in the trajectories of the spherical particles around the obstacle. This work is partially supported by the National Science Foundation Grant Nos. CBET- 0731032, CMMI-0748094, and CBET-0954840.

  6. Determine separations process strategy decision

    Energy Technology Data Exchange (ETDEWEB)

    Slaathaug, E.J.

    1996-01-01

    This study provides a summary level comparative analysis of selected, top-level, waste treatment strategies. These strategies include No Separations, Separations (high-level/low-level separations), and Deferred Separations of the tank waste. These three strategies encompass the full range of viable processing alternatives based upon full retrieval of the tank wastes. The assumption of full retrieval of the tank wastes is a predecessor decision and will not be revisited in this study.

  7. Composite separators and redox flow batteries based on porous separators

    Science.gov (United States)

    Li, Bin; Wei, Xiaoliang; Luo, Qingtao; Nie, Zimin; Wang, Wei; Sprenkle, Vincent L.

    2016-01-12

    Composite separators having a porous structure and including acid-stable, hydrophilic, inorganic particles enmeshed in a substantially fully fluorinated polyolefin matrix can be utilized in a number of applications. The inorganic particles can provide hydrophilic characteristics. The pores of the separator result in good selectivity and electrical conductivity. The fluorinated polymeric backbone can result in high chemical stability. Accordingly, one application of the composite separators is in redox flow batteries as low cost membranes. In such applications, the composite separator can also enable additional property-enhancing features compared to ion-exchange membranes. For example, simple capacity control can be achieved through hydraulic pressure by balancing the volumes of electrolyte on each side of the separator. While a porous separator can also allow for volume and pressure regulation, in RFBs that utilize corrosive and/or oxidizing compounds, the composite separators described herein are preferable for their robustness in the presence of such compounds.

  8. COPROX fixed bed reactor - temperature control schemes

    Energy Technology Data Exchange (ETDEWEB)

    Giunta, P.; Moreno, M.; Marino, F.; Amadeo, N.; Lobarde, M. [Laboratorio de Procesos Cataliticos, Facultad de Ingenieria, Universidad de Buenos Aires, Buenos Aires (Argentina)

    2012-06-15

    Different temperature control schemes for the COPROX stage of a 5-kW fuel cell system were analyzed. It was found that, among the schemes proposed, i.e., co- and countercurrent heat exchange, single adiabatic reactor and series of adiabatic reactors with interstage heat exchange, the best choice for temperature control was the series of adiabatic reactors with interstage heat exchange. This scheme represented the best way to keep the average temperature around 443 K, which was found to be the most suitable temperature for selectivity towards CO oxidation. If hydrogen is produced from ethanol steam reforming, the heat withdrawal can be carried out by the water/ethanol reformer feed mixture, thus contributing to the energy integration of the overall system. (Copyright copyright 2012 WILEY-VCH Verlag GmbH and Co. KGaA, Weinheim)

  9. Energy-saving PPM schemes for WSNs

    Institute of Scientific and Technical Information of China (English)

    TANG QiuLing; YANG LiuQing; QIN TuanFa; ZHANG ShuYi

    2008-01-01

    Energy conservation is a critical problem in recenlly-emerging wireless sensor networks (WSNs). Pulse position modulation (PPM), as an exploring-worthy modulation format for energy efficiency, is tailored for WSNs into two schemes, mono-mode PPM and multi-mode PPM, in this paper. Resorting to an idealized system model and a practical system model, which combine the power consump-tions in transmission and reception modules of nodes with the idealized and real-istic battery characteristics, the battery energy efficiencies of mono-mode PPM and multi-mode PPM are evaluated and compared. To minimize the battery energy consumption (BEC), these schemes are further optimized in terms of constellation size M for a link in path-loss channels. Our analytical and numerical results show that considerable energy can be saved by multi-mode PPM; and the optimization performances of these schemes are noticeable at various communication dis-tances though their optimization properties are different.

  10. Charge preserving high order PIC schemes

    Energy Technology Data Exchange (ETDEWEB)

    Londrillo, P., E-mail: pasquale.londrillo@oabo.inaf.i [INAF Bologna Osservatorio Astronomico (Italy); INFN Sezione Bologna (Italy); Benedetti, C.; Sgattoni, A.; Turchetti, G. [INFN Sezione Bologna (Italy); Dipartimento di Fisica dell' Universita di Bologna (Italy)

    2010-08-01

    In this paper we present some new results on our investigation aimed at extending to higher order (HOPIC) the classical PIC framework. After reviewing the basic resolution properties of the Runge-Kutta time integrator, coupled to fourth (sixth) order compact schemes for space derivatives in the Maxwell equations, we focus on the problem of extending charge conservation schemes to a general HOPIC framework. This issue represents the main contribution of the present work. We consider then a few numerical examples of 1D laser-plasma interaction in the under-dense and over-dense regimes relevant for ions acceleration, to test grid convergence and to compare HOPIC results with standard PIC schemes (LOPIC).

  11. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  12. Integrated Protection Scheme for Power Line

    Institute of Scientific and Technical Information of China (English)

    BO Zhiqian; SHI Shenxing; DONG Xinzhou

    2008-01-01

    This paper presents an integrated relay and its associated protection scheme for power transmission lines. The concept of integrated protection is firstly introduced, in which a centralized protection system or relay provides the protection for multiple power plants or a substation. A novel integrated protection relay based on the combination of a number of protection principles is de- scribed. In the proposed scheme, the specially designed protection relays are installed at each substation of a network and are responsible for the protection of every line section connected to the substation busbar.The combined algorithms with multiple settings are implemented into the relay to cover all the protected line sections.Simulation studies show that the proposed protection scheme is able to produce desirable performance and may offer many advantages over the exist- ing one and great potential for future applications.

  13. Loading Schemes for Downlink OFDMA Systems

    Institute of Scientific and Technical Information of China (English)

    KONG Jian; LIU Fang; WANG Wen-bo; LIU Yuan-an

    2004-01-01

    In this paper we study the subcarrier and bit allocation strategies for downlink OFDMA system. Our optimization objective is to find optimum subcarrier and bit assignment minimizing the total transmitted power with the constraints on BER and data rate for all users. We divide this problem into three steps: resource allocation, subcarrier assignment and single-user power and bit allocation. For the first two steps we propose new algorithms. Various loading schemes constitute by combining these algorithms as well as algorithms proposed in Ref . [ 6 ]. Simulation results demonstrate that our proposed suboptimal loading scheme can achieve performance closer to the near optimal algorithm in Ref . [ 8 ] with much lower complexity than schemes in Ref .[6].

  14. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    This paper examines the optimal sequencing of sales in the presence of network externalities. A firm sells a good to a group of consumers whose payoff from buying is increasing in total quantity sold. The firm selects the order to serve consumers so as to maximize expected sales. It can serve all...... consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...... to consumers, allowing success to breed success. Failure can also breed failure, but this is made less likely by consumers’ desire to influence one another’s behavior. We show that when consumers differ in the weight they place on the network externality, the firm would like to serve consumers with lower...

  15. Asynchronous discrete event schemes for PDEs

    Science.gov (United States)

    Stone, D.; Geiger, S.; Lord, G. J.

    2017-08-01

    A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.

  16. An ECC-Based Blind Signature Scheme

    Directory of Open Access Journals (Sweden)

    Fuh-Gwo Jeng

    2010-08-01

    Full Text Available Cryptography is increasingly applied to the E-commerce world, especially to the untraceable payment system and the electronic voting system. Protocols for these systems strongly require the anonymous digital signature property, and thus a blind signature strategy is the answer to it. Chaum stated that every blind signature protocol should hold two fundamental properties, blindness and intractableness. All blind signature schemes proposed previously almost are based on the integer factorization problems, discrete logarithm problems, or the quadratic residues, which are shown by Lee et al. that none of the schemes is able to meet the two fundamental properties above. Therefore, an ECC-based blind signature scheme that possesses both the above properties is proposed in this paper.

  17. Dropout--Mertonian or reproduction scheme?

    Science.gov (United States)

    Horowitz, T R

    1992-01-01

    This article reports on dropouts in four schools in Israel. Two main research questions were addressed: (1) Is it possible to identify a potential dropout through examination of his/her attitudes and competence before the actual act of leaving school? (2) Is there a difference between dropouts and persistent students in different educational settings (academic, vocational, agricultural, and comprehensive high schools)? Significant differences were found in the attitudes of persistent students and dropouts even before the act of dropping out occurred. In the vocational, comprehensive, and agricultural schools, the dropouts scored more positively on the self-estrangement, meaninglessness, and misfeasance scales. In the academic school, the dropouts scored positively on the anxiety scale. Results were interpreted in light of the Mertonian scheme of ends and means as well as the reproduction scheme. The Mertonian scheme was deemed more applicable.

  18. A Traffic Restriction Scheme for Enhancing Carpooling

    Directory of Open Access Journals (Sweden)

    Dong Ding

    2017-01-01

    Full Text Available For the purpose of alleviating traffic congestion, this paper proposes a scheme to encourage travelers to carpool by traffic restriction. By a variational inequity we describe travelers’ mode (solo driving and carpooling and route choice under user equilibrium principle in the context of fixed demand and detect the performance of a simple network with various restriction links, restriction proportions, and carpooling costs. Then the optimal traffic restriction scheme aiming at minimal total travel cost is designed through a bilevel program and applied to a Sioux Fall network example with genetic algorithm. According to various requirements, optimal restriction regions and proportions for restricted automobiles are captured. From the results it is found that traffic restriction scheme is possible to enhance carpooling and alleviate congestion. However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.

  19. System Protection Schemes in Eastern Denmark

    DEFF Research Database (Denmark)

    Rasmussen, Joana

    The Ph.D. project investigates different aspects of voltage stability in the power system of Eastern Denmark taking into account the large amount of wind power. In the project, a simple System Protection Scheme (SPS) against voltage instability in Eastern Denmark is developed. The SPS design...... outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... for the Eastern Danish power system, such as wind farm rejection, cascading line outages and power oscillations. E.g. Nordic inter-area oscillation modes and damping were easily detected from phasor data during the outage of the 400 kV tie-line between Eastern Denmark and Sweden. It is concluded that recording...

  20. Vector lifting schemes for stereo image coding.

    Science.gov (United States)

    Kaaniche, Mounir; Benazza-Benyahia, Amel; Pesquet-Popescu, Béatrice; Pesquet, Jean-Christophe

    2009-11-01

    Many research efforts have been devoted to the improvement of stereo image coding techniques for storage or transmission. In this paper, we are mainly interested in lossy-to-lossless coding schemes for stereo images allowing progressive reconstruction. The most commonly used approaches for stereo compression are based on disparity compensation techniques. The basic principle involved in this technique first consists of estimating the disparity map. Then, one image is considered as a reference and the other is predicted in order to generate a residual image. In this paper, we propose a novel approach, based on vector lifting schemes (VLS), which offers the advantage of generating two compact multiresolution representations of the left and the right views. We present two versions of this new scheme. A theoretical analysis of the performance of the considered VLS is also conducted. Experimental results indicate a significant improvement using the proposed structures compared with conventional methods.