WorldWideScience

Sample records for electron outcoupling scheme

  1. Electron outcoupling scheme for the Novosibirsk FEL

    Science.gov (United States)

    Matveenko, A. N.; Shevchenko, O. A.; Tcheskidov, V. G.; Vinokurov, N. A.

    2009-05-01

    One of the main problems of contemporary high power FELs is the mirror heating. One of the possible solutions of this problem is the use of electron outcoupling [N.G. Gavrilov, et al., Nucl. Instr. and Meth. A 304 (1991) 63; G.N. Kulipanov, A.S. Sokolov, N.A. Vinokurov, Nucl. Instr. and Meth. A 375 (1996) 576]. In this case the mirrors of optical resonator are not transparent and the coherent radiation from an additional undulator in the FEL magnetic system is used. To provide the output of this radiation the electron beam in the auxiliary undulator is deflected from the optical resonator axis. To save bunching it is preferable to use the achromatic deflecting bend. The project of electron outcoupling for the Novosibirsk FEL is described. Simulation results are presented.

  2. X-ray FEL based on harmonics generation and electron beam outcoupling

    Energy Technology Data Exchange (ETDEWEB)

    Litvinenko, V.N.; Burnham, B. [Duke Univ., Durham, NC (United States)

    1995-12-31

    Electron beam outcoupling was suggested by N. A. Vinokurov as a method of optics independent outcoupling for high power FELs. The bunching of the electron beam is provided in a master oscillator. The prebunched electron beam then radiates coherently into an additional wiggler called the radiator. The electron beam is turned by an achromatic bend into this wiggler and its radiation propagates with a small angle with respect to the OK-4 optical axis. Thus, the radiation will pass around the mirror of the master oscillator optical cavity and can then be utilized. This scheme is perfectly suited for harmonic generation if the radiator wiggler is tuned on one of the master oscillator wavelength harmonics. This system is reminiscent of a klystron operating on a harmonic of the reference frequency. In this paper we present the theory of this device, its spectral and spatial characteristics of radiation, the optimization of the master oscillator, the achromatic bend and bunching for harmonic generation, and influence of beam parameters (energy spread, emittance, etc.) on generated power. Examples of possible storage ring and linac driven systems are discussed.

  3. High Average Power Operation of a Scraper-Outcoupled Free-Electron Laser

    Energy Technology Data Exchange (ETDEWEB)

    Michelle D. Shinn; Chris Behre; Stephen Vincent Benson; Michael Bevins; Don Bullard; James Coleman; L. Dillon-Townes; Tom Elliott; Joe Gubeli; David Hardy; Kevin Jordan; Ronald Lassiter; George Neil; Shukui Zhang

    2004-08-01

    We describe the design, construction, and operation of a high average power free-electron laser using scraper outcoupling. Using the FEL in this all-reflective configuration, we achieved approximately 2 kW of stable output at 10 um. Measurements of gain, loss, and output mode will be compared with our models.

  4. High Average Power Operation of a Scraper-Outcoupled Free-Electron Laser

    CERN Document Server

    Shinn, Michelle D; Benson, S V; Bevins, Michael; Bullard, Don; Coleman, James; Dillon-Townes, L; Elliott, Tom; Gubeli, Joe; Hardy, David; Jordan, Kevin; Lassiter, Ronald; Neil, George; Zhang, Shukui

    2004-01-01

    We describe the design, construction, and operation of a high average power free electron laser using scraper outcoupling. Using the FEL in this all-reflective configuration, we achieved approximately 2 kW of stable output at 10 um. Measurements of gain, loss, and output mode will be compared with our models.

  5. OLED devices with internal outcoupling

    Energy Technology Data Exchange (ETDEWEB)

    Chichak, Kelly Scott; Liu, Jie Jerry; Shiang, Joseph John; Natarajan, Arunkumar; Heller, Christian Maria Anton

    2017-07-18

    Optoelectronic devices with enhanced internal outcoupling include a substrate, an anode, a cathode, an electroluminescent layer, and electron transporting layer comprising a fluoro compound of formula I (Ar.sup.2).sub.n--Ar.sup.1--(Ar.sup.2).sub.n I wherein Ar.sup.1 is C.sub.5-C.sub.40 aryl, C.sub.5-C.sub.40 substituted aryl, C.sub.5-C.sub.40 heteroaryl, or C.sub.5-C.sub.40 substituted heteroaryl; Ar.sup.2 is, independently at each occurrence, fluoro- or fluoroalkyl-substituted C.sub.5-40 heteroaryl; and n is 1, 2, or 3.

  6. Secure Electronic Cash Scheme with Anonymity Revocation

    Directory of Open Access Journals (Sweden)

    Baoyuan Kang

    2016-01-01

    Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.

  7. OLED with improved light outcoupling

    Science.gov (United States)

    Forrest, Stephen; Sun, Yiru

    2016-11-29

    An OLED may include regions of a material having a refractive index less than that of the substrate, or of the organic region, allowing for emitted light in a waveguide mode to be extracted into air. These regions can be placed adjacent to the emissive regions of an OLED in a direction parallel to the electrodes. The substrate may also be given a nonstandard shape to further improve the conversion of waveguide mode and/or glass mode light to air mode. The outcoupling efficiency of such a device may be up to two to three times the efficiency of a standard OLED. Methods for fabricating such a transparent or top-emitting OLED is also provided.

  8. Polarization-selective out-coupling of whispering gallery modes

    CERN Document Server

    Sedlmeir, Florian; Vogl, Ulrich; Zeltner, Richard; Schunk, Gerhard; Strekalov, Dmitry V; Marquardt, Christoph; Leuchs, Gerd; Schwefel, Harald G L

    2016-01-01

    Whispering gallery mode (WGM) resonators are an important building block for linear, nonlinear and quantum optical experiments. In such experiments, independent control of coupling rates to different modes can lead to improved conversion efficiencies and greater flexibility in generation of non-classical states based on parametric down conversion. In this work, we introduce a scheme which enables selective out-coupling of WGMs belonging to a specific polarization family, while the orthogonally polarized modes remain largely unperturbed. Our technique utilizes material birefringence in both the resonator and coupler such that a negative (positive) birefringence allows selective coupling to TE (TM) polarized WGMs. We formulate a new coupling condition suitable for describing the case where the refractive indices of the resonator and the coupler are almost the same, from which we derive the criterion for polarization-selective coupling. We experimentally demonstrate our proposed method using a lithium niobate di...

  9. Date Attachable Offline Electronic Cash Scheme

    Directory of Open Access Journals (Sweden)

    Chun-I Fan

    2014-01-01

    Full Text Available Electronic cash (e-cash is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  10. Date Attachable Offline Electronic Cash Scheme

    Science.gov (United States)

    Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931

  11. Date attachable offline electronic cash scheme.

    Science.gov (United States)

    Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung

    2014-01-01

    Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.

  12. Engineering light outcoupling in 2D materials

    KAUST Repository

    Lien, Derhsien

    2015-02-11

    When light is incident on 2D transition metal dichalcogenides (TMDCs), it engages in multiple reflections within underlying substrates, producing interferences that lead to enhancement or attenuation of the incoming and outgoing strength of light. Here, we report a simple method to engineer the light outcoupling in semiconducting TMDCs by modulating their dielectric surroundings. We show that by modulating the thicknesses of underlying substrates and capping layers, the interference caused by substrate can significantly enhance the light absorption and emission of WSe2, resulting in a ∼11 times increase in Raman signal and a ∼30 times increase in the photoluminescence (PL) intensity of WSe2. On the basis of the interference model, we also propose a strategy to control the photonic and optoelectronic properties of thin-layer WSe2. This work demonstrates the utilization of outcoupling engineering in 2D materials and offers a new route toward the realization of novel optoelectronic devices, such as 2D LEDs and solar cells.

  13. Polarization-Selective Out-Coupling of Whispering-Gallery Modes

    Science.gov (United States)

    Sedlmeir, Florian; Foreman, Matthew R.; Vogl, Ulrich; Zeltner, Richard; Schunk, Gerhard; Strekalov, Dmitry V.; Marquardt, Christoph; Leuchs, Gerd; Schwefel, Harald G. L.

    2017-02-01

    Whispering-gallery mode (WGM) resonators are an important platform for linear, nonlinear, and quantum optical experiments. In such experiments, independent control of in-coupling and out-coupling rates to different modes can lead to higher conversion efficiencies and greater flexibility in the generation of nonclassical states based on parametric down-conversion. In this work, we introduce a scheme that enables selective out-coupling of WGMs belonging to a specific polarization family, while the orthogonally polarized modes remain largely unperturbed. Our technique utilizes material birefringence in both the resonator and the coupler such that a negative (positive) birefringence allows for polarization-selective coupling to TE (TM) WGMs. We formulate a refined coupling condition suitable for describing the case where the refractive indices of the resonator and the coupler are almost the same, from which we derive a criterion for polarization-selective coupling. Finally, we experimentally demonstrate our proposed method using a lithium niobate disk resonator coupled to a lithium niobate prism, where we show a 22-dB suppression of coupling to TM modes relative to TE modes.

  14. Closed-Loop Autofocus Scheme for Scanning Electron Microscope

    Directory of Open Access Journals (Sweden)

    Cui Le

    2015-01-01

    Full Text Available In this paper, we present a full scale autofocus approach for scanning electron microscope (SEM. The optimal focus (in-focus position of the microscope is achieved by maximizing the image sharpness using a vision-based closed-loop control scheme. An iterative optimization algorithm has been designed using the sharpness score derived from image gradient information. The proposed method has been implemented and validated using a tungsten gun SEM at various experimental conditions like varying raster scan speed, magnification at real-time. We demonstrate that the proposed autofocus technique is accurate, robust and fast.

  15. Light outcoupling enhanced flexible organic light-emitting diodes.

    Science.gov (United States)

    Ou, Qing-Dong; Xu, Lu-Hai; Zhang, Wen-Yue; Li, Yan-Qing; Zhang, Yi-Bo; Zhao, Xin-Dong; Chen, Jing-De; Tang, Jian-Xin

    2016-03-21

    Flexible organic light-emitting diodes (OLEDs) are emerging as a leading technology for rollable and foldable display applications. For the development of high-performance flexible OLEDs on plastic substrate, we report a transparent nanocomposite electrode with superior mechanical, electrical, and optical properties, which is realized by integrating the nanoimprinted quasi-random photonic structures into the ultrathin metal/dielectric stack to collectively optimize the electrical conduction and light outcoupling capabilities. The resulting flexible OLEDs with green emission yield the enhanced device efficiency, reaching the maximum external quantum efficiency of 43.7% and luminous efficiency of 154.9 cd/A, respectively.

  16. A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States

    Science.gov (United States)

    Cao, Hai-Jing; Ding, Li-Yuan; Jiang, Xiu-Li; Li, Peng-Fei

    2017-12-01

    In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.

  17. Extremely short relativistic-electron-bunch generation in the laser wakefield via novel bunch injection scheme

    NARCIS (Netherlands)

    Khachatryan, A.G.; van Goor, F.A.; Boller, Klaus J.; Reitsma, A.J.W.; Jaroszynski, D.A.

    2004-01-01

    Recently a new electron-bunch injection scheme for the laser wakefield accelerator has been proposed [JETP Lett. 74, 371 (2001); Phys. Rev. E 65, 046504 (2002)]. In this scheme, a low energy electron bunch, sent in a plasma channel just before a high-intensity laser pulse, is trapped in the laser

  18. Directional outcoupling of photoluminescence from Eu(III-complex thin films by plasmonic array

    Directory of Open Access Journals (Sweden)

    S. Murai

    2017-02-01

    Full Text Available A plasmonic array, consisting of metallic nanocylinders periodically arranged with a pitch comparable to the optical wavelength, is a system in which both the localized surface plasmon polaritons (SPPs and diffraction in the plane of the array are simultaneously excitable. When combined with a phosphor film, the array acts as a photoluminescence (PL director and enhancer. Since the array can modify both excitation and emission processes, the overall modification mechanism is generally complex and difficult to understand. Here, we examined the mechanism by simplifying the discussion using an emitter with a high quantum yield, large Stokes shift, and long PL lifetime. Directional PL enhancement as large as five-fold occurred, which is mainly caused by outcoupling, i.e., the PL trapped in the emitter film by total internal reflection is extracted into free space through the SPPs and diffraction. The present scheme is robust and applicable to arbitrary emitters, and it is useful for designing compact and efficient directional illumination devices.

  19. Schemes of Superradiant Emission from Electron Beams and "Spin-Flip Emission of Radiation"

    CERN Document Server

    Gover, A

    2005-01-01

    A unified analysis for Superradiant emission from bunched electron beams in various kinds of radiation scheme is presented. Radiation schemes that can be described by the formulation include Pre-bunched FEL (PB-FEL), Coherent Synchrotron Radiation (CSR), Smith-Purcell Radiation, Cerenkov-Radiation, Transition-Radiation and more. The theory is based on mode excitation formulation - either discrete or continuous (the latter - in open structures). The discrete mode formulation permits simple evaluation of the spatially coherent power and spectral power of the source. These figures of merit of the radiation source are useful for characterizing and comparing the performance of different radiation schemes. When the bunched electron beam emits superradiantly, these parameters scale like the square of the number of electrons, orders of magnitude more than spontaneous emission. The formulation applies to emission from single electron bunches, periodically bunched beams, or emission from a finite number of bunches in a...

  20. Averaging scheme for atomic resolution off-axis electron holograms.

    Science.gov (United States)

    Niermann, T; Lehmann, M

    2014-08-01

    All micrographs are limited by shot-noise, which is intrinsic to the detection process of electrons. For beam insensitive specimen this limitation can in principle easily be circumvented by prolonged exposure times. However, in the high-resolution regime several instrumental instabilities limit the applicable exposure time. Particularly in the case of off-axis holography the holograms are highly sensitive to the position and voltage of the electron-optical biprism. We present a novel reconstruction algorithm to average series of off-axis holograms while compensating for specimen drift, biprism drift, drift of biprism voltage, and drift of defocus, which all might cause problematic changes from exposure to exposure. We show an application of the algorithm utilizing also the possibilities of double biprism holography, which results in a high quality exit-wave reconstruction with 75 pm resolution at a very high signal-to-noise ratio. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Scanning probe microscopy and field emission schemes for studying electron emission from polycrystalline diamond

    OpenAIRE

    Chubenko, Oksana; Baturin, Stanislav S.; Baryshev, Sergey V.

    2016-01-01

    The letter introduces a diagram that rationalizes tunneling atomic force microscopy (TUNA) observations of electron emission from polycrystalline diamonds as described in recent publications. The direct observations of electron emission from grain boundary sites by TUNA could indeed be evidence of electrons originating from grain boundaries under external electric fields. At the same time, from the diagram it follows that TUNA and field emission schemes are complimentary rather than equivalen...

  2. Conceptual MEIC electron ring injection scheme using CEBAF as a full energy injector

    Energy Technology Data Exchange (ETDEWEB)

    Guo, Jiquan [Jefferson Lab., Newport News, VA (United States); Lin, Fanglei [Jefferson Lab., Newport News, VA (United States); Rimmer, Robert A. [Jefferson Lab., Newport News, VA (United States); Wang, Haipeng [Jefferson Lab., Newport News, VA (United States); Wang, Shaoheng [Jefferson Lab., Newport News, VA (United States); Zhang, Yuhong [Jefferson Lab., Newport News, VA (United States)

    2015-09-01

    The Medium-energy Electron-Ion Collider (MEIC) proposed by Jefferson Lab is planning to use the newly upgraded 12 GeV CEBAF 1497 MHz SRF CW recirculating linac as a full-energy injector for the electron collider ring. The electron collider ring is proposed to reuse the 476 MHz PEP-II RF system to achieve high installed voltage and high beam power. The MEIC electron injection requires 3-10 (or 12) GeV beam in 3-4µs long bunch trains with low duty factor and high peak current, resulting in strong transient beam loading for the CEBAF. In this paper, we propose an injection scheme that can match the two systems' frequencies with acceptable injection time, and also address the transient beam loading issue in CEBAF. The scheme is compatible with future upgrade to 952.6 MHz SRF system in the electron ring.

  3. An Electron Bunch Compression Scheme for a Superconducting Radio Frequency Linear Accelerator Driven Light Source

    Energy Technology Data Exchange (ETDEWEB)

    C. Tennant, S.V. Benson, D. Douglas, P. Evtushenko, R.A. Legg

    2011-09-01

    We describe an electron bunch compression scheme suitable for use in a light source driven by a superconducting radio frequency (SRF) linac. The key feature is the use of a recirculating linac to perform the initial bunch compression. Phasing of the second pass beam through the linac is chosen to de-chirp the electron bunch prior to acceleration to the final energy in an SRF linac ('afterburner'). The final bunch compression is then done at maximum energy. This scheme has the potential to circumvent some of the most technically challenging aspects of current longitudinal matches; namely transporting a fully compressed, high peak current electron bunch through an extended SRF environment, the need for a RF harmonic linearizer and the need for a laser heater. Additional benefits include a substantial savings in capital and operational costs by efficiently using the available SRF gradient.

  4. Longitudinal profile diagnostic scheme with subfemtosecond resolution for high-brightness electron beams

    Directory of Open Access Journals (Sweden)

    G. Andonian

    2011-07-01

    Full Text Available High-resolution measurement of the longitudinal profile of a relativistic electron beam is of utmost importance for linac based free-electron lasers and other advanced accelerator facilities that employ ultrashort bunches. In this paper, we investigate a novel scheme to measure ultrashort bunches (subpicosecond with exceptional temporal resolution (hundreds of attoseconds and dynamic range. The scheme employs two orthogonally oriented deflecting sections. The first imparts a short-wavelength (fast temporal resolution horizontal angular modulation on the beam, while the second imparts a long-wavelength (slow angular kick in the vertical dimension. Both modulations are observable on a standard downstream screen in the form of a streaked sinusoidal beam structure. We demonstrate, using scaled variables in a quasi-1D approximation, an expression for the temporal resolution of the scheme and apply it to a proof-of-concept experiment at the UCLA Neptune high-brightness injector facility. The scheme is also investigated for application at the SLAC NLCTA facility, where we show that the subfemtosecond resolution is sufficient to resolve the temporal structure of the beam used in the echo-enabled free-electron laser. We employ beam simulations to verify the effect for typical Neptune and NLCTA parameter sets and demonstrate the feasibility of the concept.

  5. Visualised predictions of gap anisotropy to test new electron pairing scheme

    Science.gov (United States)

    Zheng, X. H.; Walmsley, D. G.

    2017-03-01

    The rich and fertile but not yet adequately exploited ground of superconductor anisotropy is proposed as a test bed for a new empirical scheme of electron pairing. The scheme is directed to resolving a numerical and conceptual difficulty in the BCS theory. The original theoretical formulation of the anisotropy problem by Bennett is adopted and its outcomes extensively explored. Here the Bennett conclusion that in metallic superconductors phonon anisotropy is the principal source of gap anisotropy is accepted. Values of the energy gap are visualised globally in k-space with unprecedented detail and accuracy. Comparison is made between the anisotropy pattern from the new and the usual BCS pairing schemes. Differences are revealed for future experimental resolution.

  6. Extremely short relativistic-electron-bunch generation in the laser wakefield via novel bunch injection scheme

    Directory of Open Access Journals (Sweden)

    A. G. Khachatryan

    2004-12-01

    Full Text Available Recently a new electron-bunch injection scheme for the laser wakefield accelerator has been proposed [JETP Lett. 74, 371 (2001JTPLA20021-364010.1134/1.1427124; Phys. Rev. E 65, 046504 (2002PLEEE81063-651X10.1103/PhysRevE.65.046504]. In this scheme, a low energy electron bunch, sent in a plasma channel just before a high-intensity laser pulse, is trapped in the laser wakefield, considerably compressed and accelerated to an ultrarelativistic energy. In this paper we show the possibility of the generation of an extremely short (on the order of 1   μm long or a few femtoseconds in duration relativistic-electron-bunch by this mechanism. The initial electron bunch, which can be generated, for example, by a laser-driven photocathode rf gun, should have an energy of a few hundred keVs to a few MeVs, a duration in the picosecond range or less and a relatively low concentration. The trapping conditions and parameters of an accelerated bunch are investigated. The laser pulse dynamics as well as a possible experimental setup for the demonstration of the injection scheme are also considered.

  7. In-silico bonding schemes to encode chemical bonds involving sharing of electrons in molecular structures.

    Science.gov (United States)

    Punnaivanam, Sankar; Sathiadhas, Jerome Pastal Raj; Panneerselvam, Vinoth

    2016-05-01

    Encoding of covalent and coordinate covalent bonds in molecular structures using ground state valence electronic configuration is achieved. The bonding due to electron sharing in the molecular structures is described with five fundamental bonding categories viz. uPair-uPair, lPair-uPair, uPair-lPair, vPair-lPair, and lPair-lPair. The involvement of lone pair electrons and the vacant electron orbitals in chemical bonding are explained with bonding schemes namely "target vacant promotion", "source vacant promotion", "target pairing promotion", "source pairing promotion", "source cation promotion", "source pairing double bond", "target vacant occupation", and "double pairing promotion" schemes. The bonding schemes are verified with a chemical structure editor. The bonding in the structures like ylides, PCl5, SF6, IF7, N-Oxides, BF4(-), AlCl4(-) etc. are explained and encoded unambiguously. The encoding of bonding in the structures of various organic compounds, transition metals compounds, coordination complexes and metal carbonyls is accomplished. Copyright © 2016 Elsevier Inc. All rights reserved.

  8. Implementation of a cryo-electron tomography tilt-scheme optimized for high resolution subtomogram averaging.

    Science.gov (United States)

    Hagen, Wim J H; Wan, William; Briggs, John A G

    2017-02-01

    Cryo-electron tomography (cryoET) allows 3D structural information to be obtained from cells and other biological samples in their close-to-native state. In combination with subtomogram averaging, detailed structures of repeating features can be resolved. CryoET data is collected as a series of images of the sample from different tilt angles; this is performed by physically rotating the sample in the microscope between each image. The angles at which the images are collected, and the order in which they are collected, together are called the tilt-scheme. Here we describe a "dose-symmetric tilt-scheme" that begins at low tilt and then alternates between increasingly positive and negative tilts. This tilt-scheme maximizes the amount of high-resolution information maintained in the tomogram for subsequent subtomogram averaging, and may also be advantageous for other applications. We describe implementation of the tilt-scheme in combination with further data-collection refinements including setting thresholds on acceptable drift and improving focus accuracy. Requirements for microscope set-up are introduced, and a macro is provided which automates the application of the tilt-scheme within SerialEM. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.

  9. Visualised predictions of gap anisotropy to test new electron pairing scheme

    Energy Technology Data Exchange (ETDEWEB)

    Zheng, X.H.; Walmsley, D.G., E-mail: dg.walmsley@qub.ac.uk

    2017-03-15

    Highlights: • Proposed test of new electron pairing scheme. • Energy gap anisotropy maps. • Reinterpretation of experimental data on gap anisotropy. • Critical comparison of theoretical results with sparse experimental data in lead, aluminium, niobium and tantalum. • Identification of absence of significant (>1%) gap anisotropy in single crystal tunnelling data. - Abstract: The rich and fertile but not yet adequately exploited ground of superconductor anisotropy is proposed as a test bed for a new empirical scheme of electron pairing. The scheme is directed to resolving a numerical and conceptual difficulty in the BCS theory. The original theoretical formulation of the anisotropy problem by Bennett is adopted and its outcomes extensively explored. Here the Bennett conclusion that in metallic superconductors phonon anisotropy is the principal source of gap anisotropy is accepted. Values of the energy gap are visualised globally in k-space with unprecedented detail and accuracy. Comparison is made between the anisotropy pattern from the new and the usual BCS pairing schemes. Differences are revealed for future experimental resolution.

  10. Power pulsing scheme for analog and digital electronics of the vertex detectors at CLIC

    CERN Document Server

    Blanchot, Georges

    2015-01-01

    The precision requirements of the vertex detector at CLIC impose strong limitations on the mass of such a detector (< 0.2% of a radiation length, Xo, per layer). To achieve such a low material budget, ultra-thin hybrid pixel detectors are foreseen, while the mass for cooling and services will be reduced by implementing a power pulsing scheme that takes advantage of the low duty cycle of the accelerator. The principal aim is to achieve significant power reduction without compromising the power integrity supplied to the front-end electronics. This report summarises the study of a power pulsing scheme to power the vertex barrel electronics of the future CLIC experiment. Its main goal is to describe in more detail what has been already presented in TWEPP conferences and other presentations. The report can therefore serve as an operator manual for future use and development of the system

  11. Key-Insulated Undetachable Digital Signature Scheme and Solution for Secure Mobile Agents in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Yang Shi

    2016-01-01

    Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.

  12. New injection scheme using a pulsed quadrupole magnet in electron storage rings

    Directory of Open Access Journals (Sweden)

    Kentaro Harada

    2007-12-01

    Full Text Available We demonstrated a new injection scheme using a single pulsed quadrupole magnet (PQM with no pulsed local bump at the Photon Factory Advanced Ring (PF-AR in High Energy Accelerator Research Organization (KEK. The scheme employs the basic property of a quadrupole magnet, that the field at the center is zero, and nonzero elsewhere. The amplitude of coherent betatron oscillation of the injected beam is effectively reduced by the PQM; then, the injected beam is captured into the ring without largely affecting the already stored beam. In order to investigate the performance of the scheme with a real beam, we built the PQM providing a higher field gradient over 3  T/m and a shorter pulse width of 2.4  μs, which is twice the revolution period of the PF-AR. After the field measurements confirmed the PQM specifications, we installed it into the ring. Then, we conducted the experiment using a real beam and consequently succeeded in storing the beam current of more than 60 mA at the PF-AR. This is the first successful beam injection using a single PQM in electron storage rings.

  13. A study on agent-based secure scheme for electronic medical record system.

    Science.gov (United States)

    Chen, Tzer-Long; Chung, Yu-Fang; Lin, Frank Y S

    2012-06-01

    Patient records, including doctors' diagnoses of diseases, trace of treatments and patients' conditions, nursing actions, and examination results from allied health profession departments, are the most important medical records of patients in medical systems. With patient records, medical staff can instantly understand the entire medical information of a patient so that, according to the patient's conditions, more accurate diagnoses and more appropriate in-depth treatments can be provided. Nevertheless, in such a modern society with booming information technologies, traditional paper-based patient records have faced a lot of problems, such as lack of uniform formats, low data mobility, slow data transfer, illegible handwritings, enormous and insufficient storage space, difficulty of conservation, being easily damaged, and low transferability. To improve such drawbacks, reduce medical costs, and advance medical quality, paper-based patient records are modified into electronic medical records and reformed into electronic patient records. However, since electronic patient records used in various hospitals are diverse and different, in consideration of cost, it is rather difficult to establish a compatible and complete integrated electronic patient records system to unify patient records from heterogeneous systems in hospitals. Moreover, as the booming of the Internet, it is no longer necessary to build an integrated system. Instead, doctors can instantly look up patients' complete information through the Internet access to electronic patient records as well as avoid the above difficulties. Nonetheless, the major problem of accessing to electronic patient records cross-hospital systems exists in the security of transmitting and accessing to the records in case of unauthorized medical personnels intercepting or stealing the information. This study applies the Mobile Agent scheme to cope with the problem. Since a Mobile Agent is a program, which can move among hosts and

  14. Longitudinal injection scheme using short pulse kicker for small aperture electron storage rings

    Directory of Open Access Journals (Sweden)

    M. Aiba

    2015-02-01

    Full Text Available Future light sources aim at achieving a diffraction limited photon beam both in the horizontal and vertical planes. High gradient quadrupoles and strong chromaticity correction sextupoles in a corresponding ultra-low emittance ring may restrict the physical and dynamic aperture of the storage ring such that off-axis injection and accumulation may become impossible. We propose a longitudinal injection scheme, i.e., injecting an electron bunch onto the closed orbit with a time offset with respect to the circulating bunches. The temporal separation enables a pulsed dipole kicker to situate the injected bunch transversely on-axis without disturbing the circulating bunches if the pulse length is shorter than the bunch spacing. The injected bunch is finally merged to a circulating bunch through synchrotron radiation damping. We present the scheme in detail and its application to the lattice of the MAX IV 3 GeV storage ring. The requirements and feasibility of the pulsed dipole kicker are also discussed.

  15. Dynamics of a Rydberg hydrogen atom near a metal surface in the electron-extraction scheme

    Energy Technology Data Exchange (ETDEWEB)

    Iñarrea, Manuel [Área de Física Aplicada, Universidad de La Rioja, Logroño (Spain); Lanchares, Víctor [Departamento de Matemáticas y Computación, Universidad de La Rioja, Logroño, La Rioja (Spain); Palacián, Jesús [Departamento de Ingeniería Matemática e Informática, Universidad Pública de Navarra, Pamplona (Spain); Pascual, Ana I. [Departamento de Matemáticas y Computación, Universidad de La Rioja, Logroño, La Rioja (Spain); Salas, J. Pablo, E-mail: josepablo.salas@unirioja.es [Área de Física Aplicada, Universidad de La Rioja, Logroño (Spain); Yanguas, Patricia [Departamento de Ingeniería Matemática e Informática, Universidad Pública de Navarra, Pamplona (Spain)

    2015-01-23

    We study the classical dynamics of a Rydberg hydrogen atom near a metal surface in the presence of a constant electric field in the electron-extraction situation [1], e.g., when the field attracts the electron to the vacuum. From a dynamical point of view, this field configuration provides a dynamics richer than in the usual ion-extraction scheme, because, depending on the values of field and the atom–surface distance, the atom can be ionized only towards the metal surface, only to the vacuum or to the both sides. The evolution of the phase space structure as a function of the atom–surface distance is explored in the bound regime of the atom. In the high energy regime, the ionization mechanism is also investigated. We find that the classical results of this work are in good agreement with the results obtained in the wave-packet propagation study carried out by So et al. [1]. - Highlights: • We study a classical hydrogen atom near a metal surface plus a electric field. • We explore the phase space structure as a function of the field strength. • We find most of the electronic orbits are oriented along the field direction. • We study the ionization of the atom for several atom–surface distances. • This classical study is in good agreement with the quantum results.

  16. Performance Analysis of Savonius Rotor Based Hydropower Generation Scheme with Electronic Load Controller

    Directory of Open Access Journals (Sweden)

    Rajen Pudur

    2016-01-01

    Full Text Available This paper describes the performance of electronic load controller (ELC of asynchronous generator (AG coupled to an uncontrolled Savonius turbine and variable water velocity. An AC-DC-AC converter with a dc link capacitor is employed to maintain the required frequency. The ELC which is feeding a resistive dump load is connected in parallel with the generating system and the power consumption is varied through the duty cycle of the chopper. Gate triggering of ELC is accomplished through sinusoidal pulse width modulation (SPWM by sensing the load current. A MATLAB/Simulink model of Savonius rotor, asynchronous generator, ELC, and three-phase load is presented. The proposed scheme is tested under various load conditions under varying water velocities and the performances are observed to be satisfactory.

  17. Solution-processed photonic crystals to enhance the light outcoupling efficiency of organic light-emitting diodes.

    Science.gov (United States)

    Cho, Hwan-Hee; Park, Boik; Kim, Hyong-Jun; Jeon, Sohee; Jeong, Jun-Ho; Kim, Jang-Joo

    2010-07-20

    We report an effective solution process to fabricate planarized photonic crystal substrates to enhance the outcoupling efficiency of organic light-emitting diodes (OLEDs). The photonic crystal structure was fabricated using nanoimprint lithography using a UV-curable acrylate and was planarized by using a ZnO layer formed by the solgel process. The solgel process resulted in a smooth surface, and OLEDs have been successfully integrated on the planarized photonic crystal layer with a low leakage current. The resulting light outcoupling efficiency was enhanced by 38% compared with that of conventional OLEDs, which is well matched with a theoretical prediction.

  18. Variable height slot-outcoupling for the compact UH THz-FEL

    Science.gov (United States)

    Tecimer, M.; Jiang, H.; Hallman, S.; Elias, L.

    2004-08-01

    The quest for tunable, compact coherent radiation sources in the THz region of the electro-magnetic spectrum is growing and stimulating further developments and research activities in this area. The THz-FEL Group of the University of Hawaii (UH) pursues the concept of minimizing size and cost of a recirculating-beam electrostatic accelerator THz-FEL. The system employs a low voltage (1.7 MeV) pelletron accelerator in conjunction with a short period ( λu=8 mm) hybrid undulator and miniature beam line components. The continuous tunability offered by the system over a spectral range between 230 and 640 μm necessitates a broad-band outcoupling mechanism. Holes on the axis in resonator mirrors have been previously employed in long wavelength FELs as a means to couple out optical radiation from the cavity. The UH THz-FEL adopted a parallel plate waveguide resonator design introducing a height adjustable slot-aperture on one of the cylindrical metal mirrors. Based on the mode-matching method employed in treating waveguide discontinuities, we examine the characteristics of the chosen outcoupling mechanism and its influence on the intracavity optical fields.

  19. Improving Light Outcoupling Efficiency for OLEDs with Microlens Array Fabricated on Transparent Substrate

    Directory of Open Access Journals (Sweden)

    Jun Wang

    2014-01-01

    Full Text Available Low light outcoupling efficiency restricts the wide application of organic light-emitting diodes in solid state light market although the internal quantum efficiency of the device could reach near to 100%. In order to improve the output efficiency, different kinds of microlens array on the substrate emission surface were designed and simulated using light tracing method. Simulation results indicate that the microlens array on the substrate could efficiently improve the light output efficiency and an enhancement of 1.8 could be obtained with optimized microlens structure design. The microlens array with semicircle shape using polymer material was fabricated on glass substrate by a facile approach. Finally, the organic device with microlens array substrate was manufactured and the light output of the device with surface microlens structure could increase to 1.64 times comparing with the device without microlens.

  20. A conservative scheme of drift kinetic electrons for gyrokinetic simulation of kinetic-MHD processes in toroidal plasmas

    Science.gov (United States)

    Bao, J.; Liu, D.; Lin, Z.

    2017-10-01

    A conservative scheme of drift kinetic electrons for gyrokinetic simulations of kinetic-magnetohydrodynamic processes in toroidal plasmas has been formulated and verified. Both vector potential and electron perturbed distribution function are decomposed into adiabatic part with analytic solution and non-adiabatic part solved numerically. The adiabatic parallel electric field is solved directly from the electron adiabatic response, resulting in a high degree of accuracy. The consistency between electrostatic potential and parallel vector potential is enforced by using the electron continuity equation. Since particles are only used to calculate the non-adiabatic response, which is used to calculate the non-adiabatic vector potential through Ohm's law, the conservative scheme minimizes the electron particle noise and mitigates the cancellation problem. Linear dispersion relations of the kinetic Alfvén wave and the collisionless tearing mode in cylindrical geometry have been verified in gyrokinetic toroidal code simulations, which show that the perpendicular grid size can be larger than the electron collisionless skin depth when the mode wavelength is longer than the electron skin depth.

  1. Microelectrode voltammetry of multi-electron transfers complicated by coupled chemical equilibria: a general theory for the extended square scheme.

    Science.gov (United States)

    Laborda, Eduardo; Gómez-Gil, José María; Molina, Angela

    2017-06-28

    A very general and simple theoretical solution is presented for the current-potential-time response of reversible multi-electron transfer processes complicated by homogeneous chemical equilibria (the so-called extended square scheme). The expressions presented here are applicable regardless of the number of electrons transferred and coupled chemical processes, and they are particularized for a wide variety of microelectrode geometries. The voltammetric response of very different systems presenting multi-electron transfers is considered for the most widely-used techniques (namely, cyclic voltammetry, square wave voltammetry, differential pulse voltammetry and steady state voltammetry), studying the influence of the microelectrode geometry and the number and thermodynamics of the (electro)chemical steps. Most appropriate techniques and procedures for the determination of the 'interaction' between successive transfers are discussed. Special attention is paid to those situations where homogeneous chemical processes, such as protonation, complexation or ion association, affect the electrochemical behaviour of the system by different stabilization of the oxidation states.

  2. Discrete Energies of a Weakly Outcoupled Atom Laser Beam Outside the Bose–Einstein Condensate Region

    Directory of Open Access Journals (Sweden)

    Teguh Budi Prayitno

    2014-12-01

    Full Text Available We consider the possibility of a discrete set of energies of a weakly outcoupled atom laser beam to the homogeneous Schrödinger equation with anisotropic harmonic trap in Cartesian coordinates outside the Bose–Einstein condensate region. This treatment is used because working in the cylindrical coordinates is not really possible, even though we implement the cigar-shaped trap case. The Schrödinger equation appears to replace a set of two-coupled Gross– Pitaevskii equations by enabling the weak-coupling assumption. This atom laser can be produced in a simple way that only involves extracting the atoms in a condensate from by using the radio frequency field. We initially present the relation between condensates as sources and atom laser as an output by exploring the previous work of Riou et al. in the case of theoretical work for the propagation of atom laser beams. We also show that even though the discrete energies are obtained by means of an approaching harmonic oscillator, degeneracy is only available in two states because of the anisotropic external potential

  3. Electronic voting systems for defending free will and resisting bribery and coercion based on ring anonymous signcryption scheme

    Directory of Open Access Journals (Sweden)

    Tsung-Chih Hsiao

    2017-01-01

    Full Text Available Vote by ballot is the feature in a democratic society and the process of decision-making, tending to achieve the philosophy of democratic politics by having the public who are eligible to vote for competent candidates or leaders. With the rapid development of technologies and network applications, electronization has been actively promoted globally during the social transformation period that the concept of electronic voting is further derived. The major advantages of electronic voting, comparing with traditional voting, lie in the mobility strength of electronic voting, reducing a large amount of election costs and enhancing the convenience for the public. Electronic voting allows voters completing voting on the Internet that not only are climate and location restrictions overcome, but the voter turnout is also increased and the voting time is reduced for the public. With the development in the past three decades, electronic voting presents outstanding performance theoretically and practically. Nevertheless, it is regrettable that electronic voting schemes still cannot be completely open because of lures by money and threats. People to lure by money and threats would confirm the voters following their instructions through various methods that more factors would appear on election results, affecting the quality and fairness of the election. In this study, this project aims to design an electronic voting scheme which could actually defend voters’ free will so that lure of money and threats would fail. Furthermore, an electronic voting system based on Elliptic Curve Cryptography is proposed to ensure the efficiency and security, and Ring Signature and Signcryption are applied to reducing the computing costs. Moreover, this project also focuses on applying voting system to mobile devices. As the system efficiency and security are emphasized, voters do not need to participate in the election, but simply complete voting with smart phones, i

  4. Bunch decompression for laser-plasma driven free-electron laser demonstration schemes

    Directory of Open Access Journals (Sweden)

    T. Seggebrock

    2013-07-01

    Full Text Available X-ray free-electron lasers (FELs require a very high electron beam quality in terms of emittance and energy spread. Since 2004 high quality electrons produced by laser-wakefield accelerators have been demonstrated, but the electron quality up to now did not allow the operation of a compact x-ray FEL using these electrons. Maier et al. [Phys. Rev. X 2, 031019 (2012PRXHAE2160-330810.1103/PhysRevX.2.031019] suggested a concept for a proof-of-principle experiment allowing FEL operation in the vacuum ultraviolet range based on an optimized undulator and bunch decompression using electron bunches from a laser-plasma accelerator as currently available. In this paper we discuss in more detail how a chicane can be used as a bunch stretcher instead of a bunch compressor to allow the operation of a laser-wakefield accelerator driven FEL using currently available electrons. A scaling characterizing the impact of bunch decompression on the gain length is derived and the feasibility of the concept is tested numerically in a demanding scenario.

  5. Energy calibration procedure for γ-radiation and conversion electron spectra using level scheme a priori information

    Science.gov (United States)

    Kabina, L. P.; Kondurov, I. A.; Sushkov, P. A.

    1996-02-01

    A procedure for energy calibration of gamma- and electron-line spectra using a priori information about the relationships between gamma-ray and conversion electron energies and their corresponding peak positions in the spectrum has been developed in the GTLM computer program. The transition energy estimations and the excited states' energies of the nucleus under investigation are calculated using all the experimental data available from different experiments and the relationships deduced from the level scheme. The minimised function consists of five terms having as parameters the coefficients of the energy calibration curves (polynomials) and the level energies of the nucleus under investigation. The procedure was tested with two γ-spectra, in the energy range 1.5-8 MeV, measured with the pair spectrometer at the High Flux Reactor of the Institute Laue Langevin (ILL), Grenoble and allowed us to estimate transition energies with uncertainties of 10 eV.

  6. Enhancing surface plasmon leakage at the metal/semiconductor interface: towards increased light outcoupling efficiency in organic optoelectronics.

    Science.gov (United States)

    Kohl, Jesse; Pantina, Joseph A; O'Carroll, Deirdre M

    2014-04-07

    The light outcoupling efficiency of organic light-emitting optoelectronic devices is severely limited by excitation of tightly bound surface plasmon polaritons at the metal electrodes. We present a theoretical study of an organic semiconductor-silver-SiO(2) waveguide and demonstrate that by simple tuning of metal film thickness and the emission regime of the organic semiconductor, a significant fraction of surface plasmon polariton mode amplitude is leaked into the active semiconductor layer, thereby decreasing the amount of optical energy trapped by the metal. At visible wavelengths, mode leakage increases by factors of up to 3.8 and 88 by tuning metal film thickness and by addition of gain, respectively.

  7. Improved out-coupling efficiency of organic light emitting diodes fabricated on a TiO2 planarization layer with embedded Si oxide nanostructures

    Science.gov (United States)

    Sung, Young Hoon; Jung, Pil-Hoon; Han, Kyung-Hoon; Kim, Yang Doo; Kim, Jang-Joo; Lee, Heon

    2017-10-01

    In order to increase the out-coupling efficiency of organic light emitting diodes, conical Si oxide nanostructures were formed on a glass substrate using nanoimprint lithography with hydrogen silsesquioxane. Then, the substrate was planarized with TiO2 nanoparticles. Since TiO2 nanoparticles have a higher refractive index than Si oxide, the surface of substrate is physically flat, but optically undulated in a manner that enables optical scattering and suppression of total internal reflection. Subsequently, OLEDs formed on a substrate with nanostructured Si oxide and a TiO2 planarization layer exhibit a 25% increase in out-coupling efficiency by suppressing total internal reflection.

  8. Design of Servo Scheme and Drive Electronics for the Integrated Electrohydraulic Actuation System of RLV-TD

    Science.gov (United States)

    Kurian, Priya C.; Gopinath, Anish; Shinoy, K. S.; Santhi, P.; Sundaramoorthy, K.; Sebastian, Baby; Jaya, B.; Namboodiripad, M. N.; Mookiah, T.

    2017-12-01

    Reusable Launch Vehicle-Technology Demonstrator (RLV-TD) is a system which has the ability to carry a payload from the earth's surface to the outer space more than once. The control actuation forms the major component of the control system and it actuates the control surfaces of the RLV-TD based on the control commands. Eight electro hydraulic actuators were used in RLV-TD for vectoring the control surfaces about their axes. A centralised Hydraulic Power Generating Unit (HPU) was used for powering the eight actuators located in two stages. The actuation system had to work for the longest ever duration of about 850 s for an Indian launch vehicle. High bandwidth requirement from autopilot was met by the servo design using the nonlinear mathematical model. Single Control Electronics which drive four electrohydraulic actuators was developed for each stage. High power electronics with soft start scheme was realized for driving the BLDC motor which is the prime mover for hydraulic pump. Many challenges arose due to single HPU for two stages, uncertainty of aero load, higher bandwidth requirements etc. and provisions were incorporated in the design to successfully overcome them. This paper describes the servo design and control electronics architecture of control actuation system.

  9. Design of Servo Scheme and Drive Electronics for the Integrated Electrohydraulic Actuation System of RLV-TD

    Science.gov (United States)

    Kurian, Priya C.; Gopinath, Anish; Shinoy, K. S.; Santhi, P.; Sundaramoorthy, K.; Sebastian, Baby; Jaya, B.; Namboodiripad, M. N.; Mookiah, T.

    2017-11-01

    Reusable Launch Vehicle-Technology Demonstrator (RLV-TD) is a system which has the ability to carry a payload from the earth's surface to the outer space more than once. The control actuation forms the major component of the control system and it actuates the control surfaces of the RLV-TD based on the control commands. Eight electro hydraulic actuators were used in RLV-TD for vectoring the control surfaces about their axes. A centralised Hydraulic Power Generating Unit (HPU) was used for powering the eight actuators located in two stages. The actuation system had to work for the longest ever duration of about 850 s for an Indian launch vehicle. High bandwidth requirement from autopilot was met by the servo design using the nonlinear mathematical model. Single Control Electronics which drive four electrohydraulic actuators was developed for each stage. High power electronics with soft start scheme was realized for driving the BLDC motor which is the prime mover for hydraulic pump. Many challenges arose due to single HPU for two stages, uncertainty of aero load, higher bandwidth requirements etc. and provisions were incorporated in the design to successfully overcome them. This paper describes the servo design and control electronics architecture of control actuation system.

  10. Electronic Structure Calculations and Adaptation Scheme in Multi-core Computing Environments

    Energy Technology Data Exchange (ETDEWEB)

    Seshagiri, Lakshminarasimhan; Sosonkina, Masha; Zhang, Zhao

    2009-05-20

    Multi-core processing environments have become the norm in the generic computing environment and are being considered for adding an extra dimension to the execution of any application. The T2 Niagara processor is a very unique environment where it consists of eight cores having a capability of running eight threads simultaneously in each of the cores. Applications like General Atomic and Molecular Electronic Structure (GAMESS), used for ab-initio molecular quantum chemistry calculations, can be good indicators of the performance of such machines and would be a guideline for both hardware designers and application programmers. In this paper we try to benchmark the GAMESS performance on a T2 Niagara processor for a couple of molecules. We also show the suitability of using a middleware based adaptation algorithm on GAMESS on such a multi-core environment.

  11. Enhanced photocatalytic activity of graphitic carbon nitride/carbon nanotube/Bi2WO6 ternary Z-scheme heterojunction with carbon nanotube as efficient electron mediator.

    Science.gov (United States)

    Jiang, Deli; Ma, Wanxia; Xiao, Peng; Shao, Leqiang; Li, Di; Chen, Min

    2017-10-20

    All-solid-state Z-scheme heterojunction has attracted much attention in photocatalytic field because of its strong ability in charge separation and transfer. In the present study, all-solid-state ternary Z-scheme heterojunction constructed by graphitic carbon nitride (CN) nanosheet, carbon nanotube (CNT), and Bi2WO6 (BWO) nanosheet, in which CNT was employed as the electron mediator. The CN/CNT/BWO ternary Z-scheme heterojunction shows the enhanced photocatalytic activity towards the degradation of tetracycline hydrochloride (TC) as compared to the pristine g-C3N4, Bi2WO6, CNT/BWO, CNT/CN, and CN/BWO. The significantly improved photocatalytic activity can be mainly ascribed to the formed CNT-mediated Z-scheme heterojunction, which facilitates the separation and transfer of photogenerated electron-hole pairs. Our work provides a rational design of all-solid-state Z-scheme heterojunction with CNT as the electron mediator for highly efficient photocatalysis. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Design and implementation of an optimal laser pulse front tilting scheme for ultrafast electron diffraction in reflection geometry with high temporal resolution

    Directory of Open Access Journals (Sweden)

    Francesco Pennacchio

    2017-07-01

    Full Text Available Ultrafast electron diffraction is a powerful technique to investigate out-of-equilibrium atomic dynamics in solids with high temporal resolution. When diffraction is performed in reflection geometry, the main limitation is the mismatch in group velocity between the overlapping pump light and the electron probe pulses, which affects the overall temporal resolution of the experiment. A solution already available in the literature involved pulse front tilt of the pump beam at the sample, providing a sub-picosecond time resolution. However, in the reported optical scheme, the tilted pulse is characterized by a temporal chirp of about 1 ps at 1 mm away from the centre of the beam, which limits the investigation of surface dynamics in large crystals. In this paper, we propose an optimal tilting scheme designed for a radio-frequency-compressed ultrafast electron diffraction setup working in reflection geometry with 30 keV electron pulses containing up to 105 electrons/pulse. To characterize our scheme, we performed optical cross-correlation measurements, obtaining an average temporal width of the tilted pulse lower than 250 fs. The calibration of the electron-laser temporal overlap was obtained by monitoring the spatial profile of the electron beam when interacting with the plasma optically induced at the apex of a copper needle (plasma lensing effect. Finally, we report the first time-resolved results obtained on graphite, where the electron-phonon coupling dynamics is observed, showing an overall temporal resolution in the sub-500 fs regime. The successful implementation of this configuration opens the way to directly probe structural dynamics of low-dimensional systems in the sub-picosecond regime, with pulsed electrons.

  13. Microcavity-Free Broadband Light Outcoupling Enhancement in Flexible Organic Light-Emitting Diodes with Nanostructured Transparent Metal-Dielectric Composite Electrodes.

    Science.gov (United States)

    Xu, Lu-Hai; Ou, Qing-Dong; Li, Yan-Qing; Zhang, Yi-Bo; Zhao, Xin-Dong; Xiang, Heng-Yang; Chen, Jing-De; Zhou, Lei; Lee, Shuit-Tong; Tang, Jian-Xin

    2016-01-26

    Flexible organic light-emitting diodes (OLEDs) hold great promise for future bendable display and curved lighting applications. One key challenge of high-performance flexible OLEDs is to develop new flexible transparent conductive electrodes with superior mechanical, electrical, and optical properties. Herein, an effective nanostructured metal/dielectric composite electrode on a plastic substrate is reported by combining a quasi-random outcoupling structure for broadband and angle-independent light outcoupling of white emission with an ultrathin metal alloy film for optimum optical transparency, electrical conduction, and mechanical flexibility. The microcavity effect and surface plasmonic loss can be remarkably reduced in white flexible OLEDs, resulting in a substantial increase in the external quantum efficiency and power efficiency to 47.2% and 112.4 lm W(-1).

  14. Reducing medical claims cost to Ghana's National Health Insurance scheme: a cross-sectional comparative assessment of the paper- and electronic-based claims reviews.

    Science.gov (United States)

    Nsiah-Boateng, Eric; Asenso-Boadi, Francis; Dsane-Selby, Lydia; Andoh-Adjei, Francis-Xavier; Otoo, Nathaniel; Akweongo, Patricia; Aikins, Moses

    2017-02-06

    A robust medical claims review system is crucial for addressing fraud and abuse and ensuring financial viability of health insurance organisations. This paper assesses claims adjustment rate of the paper- and electronic-based claims reviews of the National Health Insurance Scheme (NHIS) in Ghana. The study was a cross-sectional comparative assessment of paper- and electronic-based claims reviews of the NHIS. Medical claims of subscribers for the year, 2014 were requested from the claims directorate and analysed. Proportions of claims adjusted by the paper- and electronic-based claims reviews were determined for each type of healthcare facility. Bivariate analyses were also conducted to test for differences in claims adjustments between healthcare facility types, and between the two claims reviews. The electronic-based review made overall adjustment of 17.0% from GHS10.09 million (USD2.64 m) claims cost whilst the paper-based review adjusted 4.9% from a total of GHS57.50 million (USD15.09 m) claims cost received, and the difference was significant (p paper-based reviews (p = 0.6484). The electronic-based review adjusted significantly higher claims cost than the paper-based claims review. Scaling up the electronic-based review to cover claims from all accredited care providers could reduce spurious claims cost to the scheme and ensure long term financial sustainability.

  15. Outcoupling-Enhanced Flexible Organic Light-Emitting Diodes on Ameliorated Plastic Substrate with Built-in Indium-Tin-Oxide-Free Transparent Electrode.

    Science.gov (United States)

    Xiang, Heng-Yang; Li, Yan-Qing; Zhou, Lei; Xie, Hao-Jun; Li, Chi; Ou, Qing-Dong; Chen, Lin-Sen; Lee, Chun-Sing; Lee, Shuit-Tong; Tang, Jian-Xin

    2015-07-28

    Enhancing light outcoupling in flexible organic light-emitting diodes (FOLEDs) is an important task for increasing their efficiencies for display and lighting applications. Here, a strategy for an angularly and spectrally independent boost in light outcoupling of FOLEDs is demonstrated by using plastic substrates with a low refractive index, consisting of a bioinspired optical coupling layer and a transparent conductive electrode composed of a silver network. The good transmittance to full-color emission (>94% over the whole visible wavelength range), ultralow sheet resistance to carrier injection (<5 Ω sq(-1)), and high tolerance to mechanical bending of the ameliorated plastic substrates synergistically optimize the device performance of FOLEDs. The maximum power efficiencies reach 47, 93, 56, and 52 lm W(-1) for red, green, blue, and white emissions, which are competitive with similarly structured OLEDs fabricated on traditional indium-tin-oxide (ITO) glass. This paradigm for light outcoupling enhancement in ITO-free FOLEDs offers additional features and design freedoms for highly efficient flexible optoelectronics in large-scale and low-cost manufacturing without the need for a high-refractive-index plastic substrate.

  16. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  17. Optimization of light out-coupling in optoelectronic devices using nanostructured surface

    DEFF Research Database (Denmark)

    Ou, Haiyan; Ou, Yiyu; Argyraki, Aikaterini

    C and GaN, these developed methods could be applied to other semicon ductors such as Si, etc. Furthermore, all optoelectronic devices having an optical interface such as solar cells, photo - detectors, could benefit from these developed methods for opto - electronic performance improvement....

  18. Electronic voting systems for defending free will and resisting bribery and coercion based on ring anonymous signcryption scheme

    OpenAIRE

    Tsung-Chih Hsiao; Zhen-Yu Wu; Chia-Hui Liu; Yu-Fang Chung

    2017-01-01

    Vote by ballot is the feature in a democratic society and the process of decision-making, tending to achieve the philosophy of democratic politics by having the public who are eligible to vote for competent candidates or leaders. With the rapid development of technologies and network applications, electronization has been actively promoted globally during the social transformation period that the concept of electronic voting is further derived. The major advantages of electronic voting, compa...

  19. Scheme for secure swapping two unknown states of a photonic qubit and an electron-spin qubit using simultaneous quantum transmission and teleportation via quantum dots inside single-sided optical cavities

    Energy Technology Data Exchange (ETDEWEB)

    Heo, Jino [College of Electrical and Computer Engineering, Chungbuk National University, Chungdae-ro 1, Seowon-Gu, Cheongju (Korea, Republic of); Kang, Min-Sung [Center for Quantum Information, Korea Institute of Science and Technology (KIST), Seoul, 136-791 (Korea, Republic of); Hong, Chang-Ho [National Security Research Institute, P.O.Box 1, Yuseong, Daejeon, 34188 (Korea, Republic of); Choi, Seong-Gon [College of Electrical and Computer Engineering, Chungbuk National University, Chungdae-ro 1, Seowon-Gu, Cheongju (Korea, Republic of); Hong, Jong-Phil, E-mail: jongph@cbnu.ac.kr [College of Electrical and Computer Engineering, Chungbuk National University, Chungdae-ro 1, Seowon-Gu, Cheongju (Korea, Republic of)

    2017-06-15

    We propose a scheme for swapping two unknown states of a photon and electron spin confined to a charged quantum dot (QD) between two users by transferring a single photon. This scheme simultaneously transfers and teleports an unknown state (electron spin) between two users. For this bidirectional quantum communication, we utilize the interactions between a photonic and an electron-spin qubits of a QD located inside a single-sided optical cavity. Thus, our proposal using QD-cavity systems can obtain a certain success probability with high fidelity. Furthermore, compared to a previous scheme using cross-Kerr nonlinearities and homodyne detections, our scheme (using QD-cavity systems) can improve the feasibility under the decoherence effect in practice. - Highlights: • Design of Simultaneous quantum transmission and teleportation scheme via quantum dots and cavities. • We have developed the experimental feasibility of this scheme compared with the existing scheme. • Analysis of some benefits when our scheme is experimentally implemented using quantum dots and single-sided cavities.

  20. Differences between intra- and extra-cavity pulse time structure in a hole-coupled free-electron laser

    NARCIS (Netherlands)

    Weits, H. H.; Knippels, G.M.H.; van Werkhoven, G. H. C.; Oepts, D.; van Amersfoort, P. W.

    1997-01-01

    In the strong-slippage regime of a free-electron laser, the optical pulse inside the resonator is composed of a series of subsequently growing and decaying subpulses due to a limit-cycle oscillation. The picosecond time structure of the outcoupled pulses can be quite different from that of the

  1. The grid-based fast multipole method--a massively parallel numerical scheme for calculating two-electron interaction energies.

    Science.gov (United States)

    Toivanen, Elias A; Losilla, Sergio A; Sundholm, Dage

    2015-12-21

    Algorithms and working expressions for a grid-based fast multipole method (GB-FMM) have been developed and implemented. The computational domain is divided into cubic subdomains, organized in a hierarchical tree. The contribution to the electrostatic interaction energies from pairs of neighboring subdomains is computed using numerical integration, whereas the contributions from further apart subdomains are obtained using multipole expansions. The multipole moments of the subdomains are obtained by numerical integration. Linear scaling is achieved by translating and summing the multipoles according to the tree structure, such that each subdomain interacts with a number of subdomains that are almost independent of the size of the system. To compute electrostatic interaction energies of neighboring subdomains, we employ an algorithm which performs efficiently on general purpose graphics processing units (GPGPU). Calculations using one CPU for the FMM part and 20 GPGPUs consisting of tens of thousands of execution threads for the numerical integration algorithm show the scalability and parallel performance of the scheme. For calculations on systems consisting of Gaussian functions (α = 1) distributed as fullerenes from C20 to C720, the total computation time and relative accuracy (ppb) are independent of the system size.

  2. Electron correlation in tunneling ionization of diatomic molecules: An application of the many-electron weak-field asymptotic theory with a generalized-active-space partition scheme

    Science.gov (United States)

    Yue, Lun; Bauch, Sebastian; Madsen, Lars Bojer

    2017-10-01

    The many-electron weak-field asymptotic theory (ME-WFAT) for static tunneling ionization [O. I. Tolstikhin et al., Phys. Rev. A 89, 013421 (2014), 10.1103/PhysRevA.89.013421] is applied to diatomic molecules. In the ME-WFAT, the dependence of the ionization rate on the molecular orientation with respect to the static field direction is determined by the structure factor, which in turn depends on the asymptotic tail of the Dyson orbital. We extract the latter by the time-dependent generalized-active-space configuration-interaction method [S. Bauch et al., Phys. Rev. A 90, 062508 (2014), 10.1103/PhysRevA.90.062508], which takes into account electron correlation effects systematically. Results for the orientation-dependent structure factor are presented for H2 and LiH. Compared to mean-field Hartree-Fock results, the inclusion of electron-electron correlation affects the structure factor, and hence the rate, even for these simple systems.

  3. Clinical results of the total skin electron irradiation of the mycosis fungoides in adults. Conventional fractionation and low dose schemes.

    Science.gov (United States)

    Kaźmierska, Joanna

    2014-03-01

    Mycosis fungoides (MF) is a rare skin condition, effectively treated by irradiation. Since 1951, different methods of total skin irradiation have been developed. Although dose-response effect has been demonstrated in many publications, controversies about low dose treatment still exist. The analysis of results of the total skin electron irradiation (TSEI), especially low dose TSEI in comparison with standard dose treatment is the subject of this review. Also, acute and late side effects of radiotherapy in MF are discussed. Medline search and analysis of studies published between 1995 and 2012, containing key words: mycosis fungoides, standard dose TSEI, low dose TSEI, total skin electron beam therapy (TSEBT). Detailed analysis of relevant studies demonstrated that standard dose radiotherapy 30-36 Gy is the most effective treatment used in clinical practice. Objective response rate (ORR) is high, especially for less advanced stages of disease. Complete response rate (CR), although slightly lower, is still relatively high. For more advanced MF, TSEI serves as a very good method of palliative treatment and relief of symptoms, like pruritus, pain or desquamation. There is no consensus regarding low dose TSEI; the method is widely accepted as a palliative treatment or in case of reirradiation. Standard dose TSEI is an effective method of MF treatment for radical and palliative treatment, producing high rate of ORR and reasonably long time to progression (TTP). Acute and late side effect of treatment are mostly mild and easy to manage. Low dose TSEI is still in the phase of clinical studies.

  4. Demonstration of two-laser Polarimeter-Interferometer (PIer) scheme for simultaneous measurements of Faraday rotation angle and electron density on HL-2A

    Science.gov (United States)

    Li, Y. G.; Zhou, Y.; Deng, Z. C.; Li, Y.; Wang, H. X.; Yuan, B. S.; Yi, J.; Yin, Z. J.; Ji, X. Q.; Wu, T. Y.; Chen, W. J.; Chen, W.; Yu, L. M.; Zhang, Y. P.; Li, L. C.; Shi, Z. B.; Liu, Yi.; Yan, L. W.; Yang, Q. W.; Ding, X. T.; Xu, M.; Duan, X. R.

    2017-11-01

    A novel two-laser Polarimeter-Interferometer (PIer) diagnostic scheme, in which Faraday rotation angle (αF) and electron density (ne) can be simultaneously measured by taking advantage of two lasers and two detectors for each channel, has been successfully demonstrated on HL-2A tokamak through upgrading one channel of existing monofunctional Faraday-effect polarimeter. In comparison with the conventional three-laser PIer diagnostic, two-laser PIer generates only one intermediate frequency (IF), avoiding the overlap of IF frequency bands, so as to increase the time resolution and decrease the phase noise of system. The single channel two-laser PIer was firstly put into operation in 2016 HL-2A experimental campaign, and both Faraday rotation angle and electron density phase have been measured with a fast time resolution of 1.0 μs and a phase resolution of 0.1o and 1.0o, respectively. This work is valuable for next step far-infrared (FIR) laser PIer construction on HL-2M tokamak, as well as the future International Thermonuclear Experimental Reactor (ITER).

  5. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  6. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: http://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  7. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    formation transmitted in digital communication systems. Such schemes ... Department of Electronics and Telecommunications Engineering,. University of Dar es ...... (2): 165-176. Kundaeli, H. N. (2013). Throughput-Delay. Analysis of the SR-ST-GBN ARQ Scheme. Mediterranean Journal of Electronics and. Communication.

  8. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  9. Photocatalytic CO2 reduction using water as an electron donor by a powdered Z-scheme system consisting of metal sulfide and an RGO-TiO2 composite.

    Science.gov (United States)

    Takayama, Tomoaki; Sato, Ko; Fujimura, Takehiro; Kojima, Yuki; Iwase, Akihide; Kudo, Akihiko

    2017-06-02

    CuGaS2, (AgInS2)x-(ZnS)2-2x, Ag2ZnGeS4, Ni- or Pb-doped ZnS, (ZnS)0.9-(CuCl)0.1, and ZnGa0.5In1.5S4 showed activities for CO2 reduction to form CO and/or HCOOH in an aqueous solution containing K2SO3 and Na2S as electron donors under visible light irradiation. Among them, CuGaS2 and Ni-doped ZnS photocatalysts showed relatively high activities for CO and HCOOH formation, respectively. CuGaS2 was applied in a powdered Z-scheme system combining with reduced graphene oxide (RGO)-incorporated TiO2 as an O2-evolving photocatalyst. The powdered Z-scheme system produced CO from CO2 in addition to H2 and O2 due to water splitting. Oxygen evolution with an almost stoichiometric amount indicates that water was consumed as an electron donor in the Z-schematic CO2 reduction. Thus, we successfully demonstrated CO2 reduction of artificial photosynthesis using a simple Z-scheme system in which two kinds of photocatalyst powders (CuGaS2 and an RGO-TiO2 composite) were only dispersed in water under 1 atm of CO2.

  10. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    This paper describes and discusses two different Scheme documentation tools. The first is SchemeDoc, which is intended for documentation of the interfaces of Scheme libraries (APIs). The second is the Scheme Elucidator, which is for internal documentation of Scheme programs. Although the tools...

  11. Optics design for CEPC double ring scheme

    Science.gov (United States)

    Wang, Yiwei; Su, Feng; Bai, Sha; Yu, Chenghui; Gao, Jie

    2017-12-01

    The CEPC is a future Circular Electron and Positron Collider proposed by China to mainly study the Higgs boson. Its baseline design is a double ring scheme and an alternative design is a partial double ring scheme. This paper will present the optics design for the main ring of the double ring scheme. The CEPC will also work as a W and Z factory. Compatible optics designs for a W and a Z modes will be presented as well.

  12. Perry's Intellectual Scheme.

    Science.gov (United States)

    Love, Patrick G.; Guthrie, Victoria L.

    1999-01-01

    Summarizes William Perry's intellectual scheme and places it in the context of the 1990's. Perry's scheme of cognitive development, though more than thirty years old, is still being used by practitioners today to enhance practice in and out of the classroom. It laid a foundation for new research to extend, challenge, and build onto the scheme.…

  13. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  14. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  15. The Mawala irrigation scheme

    OpenAIRE

    de Bont, Chris

    2018-01-01

    This booklet was written to share research results with farmers and practitioners in Tanzania. It gives a summary of the empirical material collected during three months of field work in the Mawala irrigation scheme (Kilimanjaro Region), and includes maps, tables and photos. It describes the history of the irrigation scheme, as well current irrigation and farming practices. It especially focuses on the different kinds of infrastructural improvement in the scheme (by farmers and the government...

  16. Dynamic Restarting Schemes for Eigenvalue Problems

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Simon, Horst D.

    1999-03-10

    In studies of restarted Davidson method, a dynamic thick-restart scheme was found to be excellent in improving the overall effectiveness of the eigen value method. This paper extends the study of the dynamic thick-restart scheme to the Lanczos method for symmetric eigen value problems and systematically explore a range of heuristics and strategies. We conduct a series of numerical tests to determine their relative strength and weakness on a class of electronic structure calculation problems.

  17. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well...

  18. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  19. Enhancing Optical Out-Coupling of Organic Light-Emitting Devices with Nanostructured Composite Electrodes Consisting of Indium Tin Oxide Nanomesh and Conducting Polymer.

    Science.gov (United States)

    Chen, Chien-Yu; Lee, Wei-Kai; Chen, Yi-Jiun; Lu, Chun-Yang; Lin, Hoang Yan; Wu, Chung-Chih

    2015-09-02

    A nanostructured composite electrode consisting of a high-index indium-tin-oxide nanomesh and low-index high-conductivity conducting polymer effectively enhances coupling of internal radiation of organic light-emitting devices into their substrates. When combining this internal extraction structure and the external extraction scheme, a very high external quantum efficiency of nearly 62% is achieved with a green phosphorescent device. © 2015 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  20. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    It is usual practice to evaluate the success of a labelling scheme by looking at the awareness percentage, but in many cases this is not sufficient. The awareness percentage gives no indication of which of the consumer segments that are aware of and use labelling schemes and which do not....... In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire....... 664 households returned a completed questionnaire. There were five answering categories for each label in the questionnaire: * have not seen the label before. * I have seen the label before but I do not know the precise contents of the labelling scheme. * I have seen the label before, I do not know...

  1. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  2. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  3. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  4. MIT Scheme Reference Manual

    Science.gov (United States)

    1991-01-01

    their Butterfly Scheme Reference, and to Margaret O’Connell for translating it from BBN’s text-formatting language to ours. Special thanks to Richard ... Stallman , Bob Chassell, and Brian Fox, all of the Free Software Foundation, for creating and maintaining the Texinfo formatting language in which this

  5. Security Improvement of Two Dynamic ID-based Authentication Schemes by Sood-Sarje-Singh

    Directory of Open Access Journals (Sweden)

    R. Martínez-Peláez

    2013-10-01

    Full Text Available In 2010, Sood-Sarje-Singh proposed two dynamic ID-based remote user authentication schemes. The first scheme is a security improvement of Liao et al.'s scheme and the second scheme is a security improvement of Wang et al.'s scheme. In both cases, the authors claimed that their schemes can resist many attacks. However, we find that both schemes have security flaws. In addition, their schemes require a verification table and time-synchronization, making the schemes unfeasible and unsecured for electronic services. In order to remedy the security flaws of Sood et al.'s schemes, we propose a robust scheme which resists the well-known attacks and achieves all the desirable security goals.

  6. Introduction to powering schemes for the CLIC detectors

    CERN Document Server

    Blanchot, G

    2011-01-01

    The CLIC detector designs together with the CLIC beam properties impose strong constraints in terms of power distribution for the front-end electronics. The definition of periodic active and idle times in the detector operation allows implementing a pulsed powering scheme that will result in a significant reduction of dissipated power. This note provides an introduction to the different power pulsing schemes applicable to the CLIC detectors electronics.

  7. A licence to vape: Is it time to trial of a nicotine licensing scheme to allow Australian adults controlled access to electronic cigarettes devices and refill solutions containing nicotine?

    Science.gov (United States)

    Gartner, Coral; Hall, Wayne

    2015-06-01

    Australia has some of the most restrictive laws concerning use of nicotine in e-cigarettes. The only current legal option for Australians to legally possess and use nicotine for vaping is with a medical prescription and domestic supply is limited to compounding pharmacies that prepare medicines for specific patients. An alternative regulatory option that could be implemented under current drugs and poisons regulations is a 'nicotine licensing' scheme utilising current provisions for 'dangerous poisons'. This commentary discusses how such a scheme could be used to trial access to nicotine solutions for vaping outside of a 'medicines framework' in Australia. Copyright © 2015 Elsevier B.V. All rights reserved.

  8. A chaos secure communication scheme based on multiplication modulation

    Science.gov (United States)

    Fallahi, Kia; Leung, Henry

    2010-02-01

    A secure spread spectrum communication scheme using multiplication modulation is proposed. The proposed system multiplies the message by chaotic signal. The scheme does not need to know the initial condition of the chaotic signals and the receiver is based on an extended Kalman filter (EKF). This signal encryption scheme lends itself to cheap implementation and can therefore be used effectively for ensuring security and privacy in commercial consumer electronics products. To illustrate the effectiveness of the proposed scheme, a numerical example based on Genesio-Tesi system and also Chen dynamical system is presented and the results are compared.

  9. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  10. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR SOLUTION OF NONLINEAR INITIAL VALUE PROBLEMS OF FIRST ORDER ORDINARY DIFFERENTIAL EQUATIONS. ... Global Journal of Mathematical Sciences ... KEY WORDS: backward differentiation scheme, collocation, initial value problems. Global Jnl ...

  11. Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism

    Directory of Open Access Journals (Sweden)

    Jiachen Yang

    2014-01-01

    Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.

  12. Bonus Schemes and Trading Activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; Ter Horst, J.R.; Tobler, P.N.

    2013-01-01

    Abstract: Little is known about how different bonus schemes affect traders’ propensity to trade and which bonus schemes improve traders’ performance. We study the effects of linear versus threshold (convex) bonus schemes on traders’ behavior. Traders purchase and sell shares in an experimental stock

  13. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  14. Gain of a Smith-Purcell free-electron laser

    Directory of Open Access Journals (Sweden)

    H. L. Andrews

    2004-07-01

    Full Text Available A formula is derived for the small-signal gain of a Smith-Purcell free-electron laser. The theory describes the electron beam as a moving plasma dielectric, and assumes that the electron beam interacts with an evanescent mode traveling along the surface of a periodic waveguide with a rectangular profile. The phase velocity of the evanescent wave is synchronous with the electron velocity, but the group velocity is actually negative. The electron beam amplifies the evanescent wave, which does not itself radiate. According to this picture, the radiation observed emanating from the grating is Smith-Purcell radiation enhanced by the bunching of the electrons due to the interaction with the evanescent mode. There will also be radiation from the part of the evanescent mode that is outcoupled from the ends of the grating. This radiation appears at a lower frequency than the Smith-Purcell radiation. The new results explain both the gain and the radiation observed in the experiments of Urata and Walsh, and the cube-root current dependence of the gain inferred by Bakhtyari, Walsh, and Brownell.

  15. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements classificat....... This difference between the written requirements specification and the oral discussions at the meetings may help explain software engineers’ general preference for people, rather than documents, as their information sources.......Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements....... While coordination mechanisms focus on how classification schemes enable cooperation among people pursuing a common goal, boundary objects embrace the implicit consequences of classification schemes in situations involving conflicting goals. Moreover, the requirements specification focused on functional...

  16. Optimization of power output and study of electron beam energy spread in a Free Electron Laser oscillator

    CERN Document Server

    Abramovich, A; Efimov, S; Gover, A; Pinhasi, Y; Yahalom, A

    2001-01-01

    Design of a multi-stage depressed collector for efficient operation of a Free Electron Laser (FEL) oscillator requires knowledge of the electron beam energy distribution. This knowledge is necessary to determine the voltages of the depressed collector electrodes that optimize the collection efficiency and overall energy conversion efficiency of the FEL. The energy spread in the electron beam is due to interaction in the wiggler region, as electrons enter the interaction region at different phases relative to the EM wave. This interaction can be simulated well by a three-dimensional simulation code such as FEL3D. The main adjustable parameters that determine the electron beam energy spread after interaction are the e-beam current, the initial beam energy, and the quality factor of the resonator out-coupling coefficient. Using FEL3D, we study the influence of these parameters on the available radiation power and on the electron beam energy distribution at the undulator exit. Simulations performed for I=1.5 A, E...

  17. Two notes about Ponzi schemes

    OpenAIRE

    Honohan, Patrick

    1987-01-01

    A Ponzi scheme is an arrangement whereby a promoter offers an investment opportunity with attractive dividends, but where the only basis for the dividends is the future receipts from new investors. The first of these two notes explores some of the analytical properties of a Ponzi scheme, addressing in particular the question whether it is possible for a Ponzi scheme to exist if all the participants are rational. The second note briefly examines the collapse of the PMPA insurance company whos...

  18. A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation

    Science.gov (United States)

    Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang

    2015-04-01

    Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.

  19. Remarks on quantum duopoly schemes

    Science.gov (United States)

    Fraçkiewicz, Piotr

    2016-01-01

    The aim of this paper is to discuss in some detail the two different quantum schemes for duopoly problems. We investigate under what conditions one of the schemes is more reasonable than the other one. Using the Cournot's duopoly example, we show that the current quantum schemes require a slight refinement so that they output the classical game in a particular case. Then, we show how the amendment changes the way of studying the quantum games with respect to Nash equilibria. Finally, we define another scheme for the Cournot's duopoly in terms of quantum computation.

  20. New Ideas on Labeling Schemes

    DEFF Research Database (Denmark)

    Rotbart, Noy Galil

    times, effectively eliminating the second penalty mentioned. We continue this theoretical study in several ways. First, we dedicate a large part of the thesis to the graph family of trees, for which we provide an overview of labeling schemes supporting several important functions such as ancestry......, routing and especially adjacency. The survey is complemented by novel contributions to this study, among which are the first asymptotically optimal adjacency labeling scheme for bounded degree trees, improved bounds on ancestry labeling schemes, dynamic multifunctional labeling schemes and an experimental...

  1. Lattice design for the CEPC double ring scheme

    Science.gov (United States)

    Wang, Yiwei; Su, Feng; Bai, Sha; Zhang, Yuan; Bian, Tianjian; Wang, Dou; Yu, Chenghui; Gao, Jie

    2018-01-01

    A future Circular Electron Positron Collider (CEPC) has been proposed by China with the main goal of studying the Higgs boson. Its baseline design, chosen on the basis of its performance, is a double ring scheme; an alternative design is a partial double ring scheme which reduces the budget while maintaining an adequate performance. This paper will present the collider ring lattice design for the double ring scheme. The CEPC will also work as a W and a Z factory. For the W and Z modes, except in the RF region, compatible lattices were obtained by scaling down the magnet strength with energy.

  2. Scheme for Quantum Computing Immune to Decoherence

    Science.gov (United States)

    Williams, Colin; Vatan, Farrokh

    2008-01-01

    A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report

  3. A real helper data scheme

    NARCIS (Netherlands)

    Shao, X.; Veldhuis, Raymond N.J.

    2013-01-01

    The helper data scheme utilizes a secret key to protect biometric templates. The current helper data scheme requires binary feature representations that introduce quantization error and thus reduce the capacity of biometric channels. For spectral-minutiae based fingerprint recognition systems,

  4. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  5. Multiuser Switched Diversity Scheduling Schemes

    CERN Document Server

    Shaqfeh, Mohammad; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback sys...

  6. Color variation in periodic Ag line arrays patterned by using electron-beam lithography.

    Science.gov (United States)

    Wei, D H; Cheng, K W; Yao, Y D; Hsu, S Y; Wei, P K; Huang, J H

    2010-07-01

    Periodic Ag line arrays with different line pitches from 500 nm to 950 nm on ITO coated glass substrates have been fabricated by using electron-beam lithography (EBL) technique for studying the color light guide in a display system. The patterned Ag line array is used as a light outcoupling and color-selection component due to the emission wavelength changed by the Ag line arrays with different periodic distances that could achieve color variation. We have demonstrated that the ITO coated glass substrates containing periodic Ag line arrays with varied line pitches can be used as a color filter in a display device. This means that with a proper metallic nanostructure layer, the red, green, and blue colors in a display system can be obtained without a traditional color filter for modern multi-applications of optoelectronic display devices.

  7. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., the price of power, conditions for conventional power producers, and changes in import and export of power...... RES-E support schemes already has a common liberalised power market. In this case the introduction of a common support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system...

  8. New CERN Health Insurance Scheme (CHIS) forms

    CERN Multimedia

    HR Department

    2015-01-01

    New versions of the following forms for claims and requests to the CERN Health Insurance Scheme (CHIS) have been released:   form for claiming reimbursement of medical expenses,   form for requesting advance reimbursement, and   dental estimate form (for treatments foreseen to exceed 800 CHF).   The new forms are available in French and English. They can either be completed electronically before being printed and signed, or completed in paper form. New detailed instructions can be found at the back of the claim form; CHIS members are invited to read them carefully. The electronic versions (PDF) of all the forms are available on the CHIS website and on the UNIQA Member Portal. CHIS Members are requested to use these new forms forthwith and to discard any previous version. Questions regarding the above should be addressed directly to UNIQA (72730 or 022.718 63 00 or uniqa.assurances@cern.ch).

  9. Design of an extensive information representation scheme for clinical narratives.

    Science.gov (United States)

    Deléger, Louise; Campillos, Leonardo; Ligozat, Anne-Laure; Névéol, Aurélie

    2017-09-11

    Knowledge representation frameworks are essential to the understanding of complex biomedical processes, and to the analysis of biomedical texts that describe them. Combined with natural language processing (NLP), they have the potential to contribute to retrospective studies by unlocking important phenotyping information contained in the narrative content of electronic health records (EHRs). This work aims to develop an extensive information representation scheme for clinical information contained in EHR narratives, and to support secondary use of EHR narrative data to answer clinical questions. We review recent work that proposed information representation schemes and applied them to the analysis of clinical narratives. We then propose a unifying scheme that supports the extraction of information to address a large variety of clinical questions. We devised a new information representation scheme for clinical narratives that comprises 13 entities, 11 attributes and 37 relations. The associated annotation guidelines can be used to consistently apply the scheme to clinical narratives and are https://cabernet.limsi.fr/annotation_guide_for_the_merlot_french_clinical_corpus-Sept2016.pdf . The information scheme includes many elements of the major schemes described in the clinical natural language processing literature, as well as a uniquely detailed set of relations.

  10. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  11. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  12. CERN apprenticeship scheme honoured

    CERN Multimedia

    2008-01-01

    Prestigious awards for two apprentices who did their practical training at CERN. Sylvain Heinzen, apprentice physics lab technician at CERN, receiving his award from Pierre-François UNGER, State Councillor responsible for the Federal Department of the Economy and Health. The other award-winner, Cédric Gerber, is on the right of the photo.Among Geneva’s top apprentices who were honoured by the Fondation sociale de l’Union industrielle genevoise (UIG) on 28 October this year, were two CERN apprentices. Electronics technician Cédric Gerber and physics lab technician Sylvain Heinzen both did their four-year sandwich course at CERN, obtaining their professional qualification, the Certificat fédéral de capacité (CFC), in June. On top of that, Cédric Gerber, who had been a particularly outstanding apprentice, received two further distinctions at the CFC awards ceremony - the State Council prize for achieving one of the top-ten o...

  13. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  14. Enhancing privacy of users in eID schemes

    NARCIS (Netherlands)

    Shrishak, Kris; Erkin, Z.; Schaar, Remco

    2016-01-01

    In todays world transactions are increasingly being performed over the internet
    but require identication of users as in face-to-face transactions. In order to facilitate eGovernance as well as other eCommerce services Electronic Identiation
    (eID) schemes, which intend to provide unique and

  15. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  16. Modulation Schemes for Wireless Access

    Directory of Open Access Journals (Sweden)

    F. Vejrazka

    2000-12-01

    Full Text Available Four modulation schemes, namely minimum shift keying (MSK, Gaussianminimum shift keying (GMSK, multiamplitude minimum shift keying(MAMSK and π/4 differential quadrature phase shift keying (π/4-QPSKare described and their applicability to wireless access is discussedin the paper. Low complexity receiver structures based on differentialdetection are analysed to estimate the performance of the modulationschemes in the additive Gaussian noise and the Rayleigh and Riceenvelope fast fading channel. The bandwidth efficiency is calculated toevaluate the modulation schemes. The results show that the MAMSK schemegives the greatest bandwidth efficiency, but its performance in theRayleigh channel is rather poor. In contrast, the MSK scheme is lessbandwidth efficient, but it is more resistant to Rayleigh fading. Theperformance of π/4-QPSK signal is considerably improved by appropriateprefiltering.

  17. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  18. Importance biasing scheme implemented in the PRIZMA code

    Energy Technology Data Exchange (ETDEWEB)

    Kandiev, I.Z.; Malyshkin, G.N. [Russian Federal Nuclear Center-All-Russia Scientific-Technical Inst. of Technical Physics, Snezhinsk (Russian Federation)

    1997-12-31

    PRIZMA code is intended for Monte Carlo calculations of linear radiation transport problems. The code has wide capabilities to describe geometry, sources, material composition, and to obtain parameters specified by user. There is a capability to calculate path of particle cascade (including neutrons, photons, electrons, positrons and heavy charged particles) taking into account possible transmutations. Importance biasing scheme was implemented to solve the problems which require calculation of functionals related to small probabilities (for example, problems of protection against radiation, problems of detection, etc.). The scheme enables to adapt trajectory building algorithm to problem peculiarities.

  19. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoill...

  20. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    (log(n)) bits for constant ε> 0. (1 + ε)-stretch labeling schemes with polylogarithmic label size have previously been established for doubling dimension graphs by Talwar [Talwar, STOC, 2004]. In addition, we present matching upper and lower bounds for distance labeling for caterpillars, showing that labels...

  1. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  2. Experimental Validation of a Novel Compact Focusing Scheme for Future Energy-Frontier Linear Lepton Colliders

    Science.gov (United States)

    White, G. R.; Ainsworth, R.; Akagi, T.; Alabau-Gonzalvo, J.; Angal-Kalinin, D.; Araki, S.; Aryshev, A.; Bai, S.; Bambade, P.; Bett, D. R.; Blair, G.; Blanch, C.; Blanco, O.; Blaskovic-Kraljevic, N.; Bolzon, B.; Boogert, S.; Burrows, P. N.; Christian, G.; Corner, L.; Davis, M. R.; Faus-Golfe, A.; Fukuda, M.; Gao, J.; García-Morales, H.; Geffroy, N.; Hayano, H.; Heo, A. Y.; Hildreth, M.; Honda, Y.; Huang, J. Y.; Hwang, W. H.; Iwashita, Y.; Jang, S.; Jeremie, A.; Kamiya, Y.; Karataev, P.; Kim, E. S.; Kim, H. S.; Kim, S. H.; Kim, Y. I.; Komamiya, S.; Kubo, K.; Kume, T.; Kuroda, S.; Lam, B.; Lekomtsev, K.; Liu, S.; Lyapin, A.; Marin, E.; Masuzawa, M.; McCormick, D.; Naito, T.; Nelson, J.; Nevay, L. J.; Okugi, T.; Omori, T.; Oroku, M.; Park, H.; Park, Y. J.; Perry, C.; Pfingstner, J.; Phinney, N.; Rawankar, A.; Renier, Y.; Resta-López, J.; Ross, M.; Sanuki, T.; Schulte, D.; Seryi, A.; Shevelev, M.; Shimizu, H.; Snuverink, J.; Spencer, C.; Suehara, T.; Sugahara, R.; Takahashi, T.; Tanaka, R.; Tauchi, T.; Terunuma, N.; Tomás, R.; Urakawa, J.; Wang, D.; Warden, M.; Wendt, M.; Wolski, A.; Woodley, M.; Yamaguchi, Y.; Yamanaka, T.; Yan, J.; Yokoya, K.; Zimmermann, F.; ATF2 Collaboration

    2014-01-01

    A novel scheme for the focusing of high-energy leptons in future linear colliders was proposed in 2001 [P. Raimondi and A. Seryi, Phys. Rev. Lett. 86, 3779 (2001)]. This scheme has many advantageous properties over previously studied focusing schemes, including being significantly shorter for a given energy and having a significantly better energy bandwidth. Experimental results from the ATF2 accelerator at KEK are presented that validate the operating principle of such a scheme by demonstrating the demagnification of a 1.3 GeV electron beam down to below 65 nm in height using an energy-scaled version of the compact focusing optics designed for the ILC collider.

  3. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    for promoting combined heat and power and energy from renewable sources. These Directives are to be implemented at the national level by the Member States. Section 3 conceptually presents the spectrum of national support schemes, ranging from investment support to market‐based operational support. The choice...... an introduction to the policy context for mCHP. Section 1 describes the rationale for the promotion of mCHP by explaining its potential contribution to European energy policy goals. Section 2 addresses the policy context at the supranational European level by outlining relevant EU Directives on support schemes......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...

  4. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed...

  5. Subranging scheme for SQUID sensors

    Science.gov (United States)

    Penanen, Konstantin I. (Inventor)

    2008-01-01

    A readout scheme for measuring the output from a SQUID-based sensor-array using an improved subranging architecture that includes multiple resolution channels (such as a coarse resolution channel and a fine resolution channel). The scheme employs a flux sensing circuit with a sensing coil connected in series to multiple input coils, each input coil being coupled to a corresponding SQUID detection circuit having a high-resolution SQUID device with independent linearizing feedback. A two-resolution configuration (course and fine) is illustrated with a primary SQUID detection circuit for generating a fine readout, and a secondary SQUID detection circuit for generating a course readout, both having feedback current coupled to the respective SQUID devices via feedback/modulation coils. The primary and secondary SQUID detection circuits function and derive independent feedback. Thus, the SQUID devices may be monitored independently of each other (and read simultaneously) to dramatically increase slew rates and dynamic range.

  6. A mm-Wave, Table Top Cerenkov Free-Electron Laser

    CERN Document Server

    De la Fuente, Isabel; Van der Slot, Peter

    2004-01-01

    We have designed and constructed a compact (0.5 x 1.5 m), 100 kV Cerenkov FEL operating at a frequency of 50 GHz. The electron beam is produced by a gridded thermionic electron gun with a beam current of 800 mA. Simulations shows that 800 mA is sufficient to produce an output power of ~ 1 kW peak at 50 GHz using a total cavity reflectivity of about 10 to 20 %. The average power approaches 1 kW when the electron pulse length is extended to CW. A depressed collector will be used to increase the overall efficiency of this device. Special attention has been given to the outcoupler that has to combine multiple functions. First it has to separate the radiation field from the electron beam. Second it has to be transparent for the electron beam and acts as a partial reflector for radiation. Finally it has to convert the generated TM01 mode in the interaction region into the fundamental TE01 mode of the standard rectangular output port. We will present the overall design and experimental set-up, first experimental res...

  7. Supporting Argumentation Schemes in Argumentative Dialogue Games

    Directory of Open Access Journals (Sweden)

    Wells Simon

    2014-03-01

    Full Text Available This paper reports preliminary work into the exploitation of argumentation schemes within dialogue games. We identify a property of dialogue games that we call “scheme awareness” that captures the relationship between dialogue game systems and argumentation schemes. Scheme awareness is used to examine the ways in which existing dialogue games utilise argumentation schemes and consequently the degree with which a dialogue game can be used to construct argument structures. The aim is to develop a set of guidelines for dialogue game design, which feed into a set of Dialogue Game Description Language (DGDL extensions in turn enabling dialogue games to better exploit argumentation schemes.

  8. An Arbitrated Quantum Signature Scheme without Entanglement*

    Science.gov (United States)

    Li, Hui-Ran; Luo, Ming-Xing; Peng, Dai-Yuan; Wang, Xiao-Jun

    2017-09-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks.

  9. A biometric signcryption scheme without bilinear pairing

    Science.gov (United States)

    Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao

    2013-03-01

    How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.

  10. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  11. On the security of two remote user authentication schemes for telecare medical information systems.

    Science.gov (United States)

    Kim, Kee-Won; Lee, Jae-Dong

    2014-05-01

    The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.

  12. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  13. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    National Research Council Canada - National Science Library

    Pankratova, S.A

    2017-01-01

    .... In the summary the author underscores that both ways of image scheme development are of importance to cognitive science, both heuristic epiphora and image-based diaphora play a significant role in the explication of image scheme development.

  14. Non-diffracting multi-electron vortex beams balancing their electron-electron interactions.

    Science.gov (United States)

    Mutzafi, Maor; Kaminer, Ido; Harari, Gal; Segev, Mordechai

    2017-09-21

    The wave-like nature of electrons has been known for almost a century, but only in recent years has the ability to shape the wavefunction of EBeams (Electron-Beams) become experimentally accessible. Various EBeam wavefunctions have been demonstrated, such as vortex, self-accelerating, Bessel EBeams etc. However, none has attempted to manipulate multi-electron beams, because the repulsion between electrons rapidly alters the beam shape. Here, we show how interference effects of the quantum wavefunction describing multiple electrons can be used to exactly balance both the repulsion and diffraction-broadening. We propose non-diffracting wavepackets of multiple electrons, which can also carry orbital angular momentum. Such wavefunction shaping facilitates the use of multi-electron beams in electron microscopy with higher current without compromising on spatial resolution. Simulating the quantum evolution in three-dimensions and time, we show that imprinting such wavefunctions on electron pulses leads to shape-preserving multi-electrons ultrashort pulses. Our scheme applies to any beams of charged particles, such as protons and ion beams.Vortex electron beams are generated using single electrons but their low beam-density is a limitation in electron microscopy. Here the authors propose a scheme for the realization of non-diffracting electron beams by shaping wavepackets of multiple electrons and including electron-electron interactions.

  15. Plasma Injection Schemes for Laser-Plasma Accelerators

    OpenAIRE

    J. Faure

    2017-01-01

    Plasma injection schemes are crucial for producing high-quality electron beams in laser-plasma accelerators. This article introduces the general concepts of plasma injection. First, a Hamiltonian model for particle trapping and acceleration in plasma waves is introduced; ionization injection and colliding-pulse injection are described in the framework of this Hamiltonian model. We then proceed to consider injection in plasma density gradients.

  16. Plasma Injection Schemes for Laser-Plasma Accelerators

    OpenAIRE

    Faure, J.

    2017-01-01

    Plasma injection schemes are crucial for producing high-quality electron beams in laser–plasma accelerators. This article introduces the general concepts of plasma injection. First, a Hamiltonian model for particle trapping and acceleration in plasma waves is introduced; ionization injection and colliding-pulse injection are described in the framework of this Hamiltonian model. We then proceed to consider injection in plasma density gradients.

  17. The Ubiquity of Smooth Hilbert Schemes

    OpenAIRE

    Staal, Andrew P.

    2017-01-01

    We investigate the geography of Hilbert schemes that parametrize closed subschemes of projective space with a specified Hilbert polynomial. We classify Hilbert schemes with unique Borel-fixed points via combinatorial expressions for their Hilbert polynomials. We realize the set of all nonempty Hilbert schemes as a probability space and prove that Hilbert schemes are irreducible and nonsingular with probability greater than $0.5$.

  18. MIRD radionuclide data and decay schemes

    CERN Document Server

    Eckerman, Keith F

    2007-01-01

    For all physicians, scientists, and physicists working in the nuclear medicine field, the MIRD: Radionuclide Data and Decay Schemes updated edition is an essential sourcebook for radiation dosimetry and understanding the properties of radionuclides. Includes CD Table of Contents Decay schemes listed by atomic number Radioactive decay processes Serial decay schemes Decay schemes and decay tables This essential reference for nuclear medicine physicians, scientists and physicists also includes a CD with tabulations of the radionuclide data necessary for dosimetry calculations.

  19. Electron Cyclotron Resonance Heating of a High-Density Plasma

    DEFF Research Database (Denmark)

    Hansen, F. Ramskov

    1986-01-01

    Various schemes for electron cyclotron resonance heating of tokamak plasmas with the ratio of electron plasma frequency to electron cyclotron frequency, "»pe/^ce* larger than 1 on axis, are investigated. In particular, a mode conversion scheme is investigated using ordinary waves at the fundamental...

  20. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    and Wait (SW), Selective Repeat (SR), Stutter. (ST) and Go-Back-N (GBN) (Lin and Costello,. 2003). Combinations of these schemes lead to mixed mode schemes which include the SR-. GBN, SR-ST1 and SR-ST2. In the mixed mode schemes, when a prescribed number of failures occur in the SR mode, the GBN or ST ...

  1. The Original Management Incentive Schemes

    OpenAIRE

    Richard T. Holden

    2005-01-01

    During the 1990s, the structure of pay for top corporate executives shifted markedly as the use of stock options greatly expanded. By the early 2000s, as the dot-com boom ended and the Nasdaq stock index melted down, these modern executive incentive schemes were being sharply questioned on many grounds—for encouraging excessive risk-taking and a short-run orientation, for being an overly costly and inefficient method of providing incentives, and even for tempting managers of firms like Enron,...

  2. Adaptive Optics Metrics & QC Scheme

    Science.gov (United States)

    Girard, Julien H.

    2017-09-01

    "There are many Adaptive Optics (AO) fed instruments on Paranal and more to come. To monitor their performances and assess the quality of the scientific data, we have developed a scheme and a set of tools and metrics adapted to each flavour of AO and each data product. Our decisions to repeat observations or not depends heavily on this immediate quality control "zero" (QC0). Atmospheric parameters monitoring can also help predict performances . At the end of the chain, the user must be able to find the data that correspond to his/her needs. In Particular, we address the special case of SPHERE."

  3. The mathematics of Ponzi schemes

    OpenAIRE

    Artzrouni, Marc

    2009-01-01

    A first order linear differential equation is used to describe the dynamics of an investment fund that promises more than it can deliver, also known as a Ponzi scheme. The model is based on a promised, unrealistic interest rate; on the actual, realized nominal interest rate; on the rate at which new deposits are accumulated and on the withdrawal rate. Conditions on these parameters are given for the fund to be solvent or to collapse. The model is fitted to data available on Charles...

  4. Observation of a variable sub-THz radiation driven by a low energy electron beam from a thermionic rf electron gun

    Directory of Open Access Journals (Sweden)

    A. V. Smirnov

    2015-09-01

    Full Text Available We report observations of an intense sub-THz radiation extracted from a ∼3  MeV electron beam with a flat transverse profile propagating between two parallel oversized copper gratings with side openings. Low-loss radiation outcoupling is accomplished using a horn antenna and a miniature permanent magnet separating sub-THz and electron beams. A tabletop experiment utilizes a radio frequency thermionic electron gun delivering a thousand momentum-chirped microbunches per macropulse and an alpha-magnet with a movable beam scraper producing sub-mm microbunches. The radiated energy of tens of micro-Joules per radio frequency macropulse is demonstrated. The frequency of the radiation peak was generated and tuned across two frequency ranges: (476–584 GHz with 7% instantaneous spectrum bandwidth, and (311–334 GHz with 38% instantaneous bandwidth. This prototype setup features a robust compact source of variable frequency, narrow bandwidth sub-THz pulses.

  5. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  6. Manipulation and electron-oscillation-measurement of laser accelerated electron beams

    Energy Technology Data Exchange (ETDEWEB)

    Kotaki, H; Hayashi, Y; Kawase, K; Mori, M; Kando, M; Homma, T; Koga, J K; Daido, H; Bulanov, S V, E-mail: kotaki.hideyuki@jaea.go.jp [Advanced Photon Research Center, Japan Atomic Energy Agency, 8-1-7, Umemidai, Kizugawa, Kyoto (Japan)

    2011-01-15

    Monoenergetic electron beams have been generated in the self-injection scheme of laser acceleration. In applications of these laser accelerated electron beams, stable and controllable electron beams are necessary. A stable electron beam is generated in the self-injection scheme by using a nitrogen gas jet target. We found the profile of the electron beam was manipulated by rotating the laser polarization. The electron beam is in the first bucket of the wake wave. In the energy space, transverse oscillation is observed when the laser pulse has S-polarization. The direction of the electron beam is controlled by the gas jet position.

  7. BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications

    Directory of Open Access Journals (Sweden)

    Rohit Kumar Das

    2016-12-01

    Full Text Available Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the b i d value are under threat from the attackers. Any auction protocol must not leak the anonymity and the privacy of the b i d value of an honest Bidder. Keeping these requirements in mind, we have firstly proposed a controlled traceable blind signature scheme (CTBSS because e-auction schemes should be able to trace the Bidders. Using CTBSS, a blind sealed-bid electronic auction scheme is proposed (BSEA. We have incorporated the notion of blind signature to e-auction schemes. Moreover, both the schemes are based upon elliptic curve cryptography (ECC, which provides a similar level of security with a comparatively smaller key size than the discrete logarithm problem (DLP based e-auction protocols. The analysis shows that BSEA fulfills all the requirements of e-auction protocol, and the total computation overhead is lower than the existing schemes.

  8. Delivery of a national home safety equipment scheme in England: a survey of local scheme leaders.

    Science.gov (United States)

    Mulvaney, C A; Watson, M C; Hamilton, T; Errington, G

    2013-11-01

    Unintentional home injuries sustained by preschool children are a major cause of morbidity in the UK. Home safety equipment schemes may reduce home injury rates. In 2009, the Royal Society for the Prevention of Accidents was appointed as central coordinator of a two-year, £18m national home safety equipment scheme in England. This paper reports the findings from a national survey of all scheme leaders responsible for local scheme delivery. A questionnaire mailed to all local scheme leaders sought details of how the schemes were operated locally; barriers and facilitators to scheme implementation; evaluation of the local scheme and its sustainability. A response rate of 73% was achieved. Health visitors and family support workers played a key role in both the identification of eligible families and performing home safety checks. The majority of local scheme leaders (94.6%) reported that they thought their local scheme had been successful in including those families considered 'harder to engage'. Many scheme leaders (72.4%) reported that they had evaluated the provision of safety equipment in their scheme and over half (56.6%) stated that they would not be able to continue the scheme once funding ceased. Local schemes need support to effectively evaluate their scheme and to seek sustainability funding to ensure the future of the scheme. There remains a lack of evidence of whether the provision of home safety equipment reduces injuries in preschool children.

  9. Channel Aggregation Schemes for Cognitive Radio Networks

    Science.gov (United States)

    Lee, Jongheon; So, Jaewoo

    This paper proposed three channel aggregation schemes for cognitive radio networks, a constant channel aggregation scheme, a probability distribution-based variable channel aggregation scheme, and a residual channel-based variable channel aggregation scheme. A cognitive radio network can have a wide bandwidth if unused channels in the primary networks are aggregated. Channel aggregation schemes involve either constant channel aggregation or variable channel aggregation. In this paper, a Markov chain is used to develop an analytical model of channel aggregation schemes; and the performance of the model is evaluated in terms of the average sojourn time, the average throughput, the forced termination probability, and the blocking probability. Simulation results show that channel aggregation schemes can reduce the average sojourn time of cognitive users by increasing the channel occupation rate of unused channels in a primary network.

  10. Hybrid scheme for Brownian semistationary processes

    DEFF Research Database (Denmark)

    Bennedsen, Mikkel; Lunde, Asger; Pakkanen, Mikko S.

    is to approximate the kernel function by a power function near zero and by a step function elsewhere. The resulting approximation of the process is a combination of Wiener integrals of the power function and a Riemann sum, which is why we call this method a hybrid scheme. Our main theoretical result describes...... the asymptotics of the mean square error of the hybrid scheme and we observe that the scheme leads to a substantial improvement of accuracy compared to the ordinary forward Riemann-sum scheme, while having the same computational complexity. We exemplify the use of the hybrid scheme by two numerical experiments......We introduce a simulation scheme for Brownian semistationary processes, which is based on discretizing the stochastic integral representation of the process in the time domain. We assume that the kernel function of the process is regularly varying at zero. The novel feature of the scheme...

  11. Electron Cooling Study for MEIC

    Energy Technology Data Exchange (ETDEWEB)

    He, Zhang [Jefferson Lab., Newport News, VA (United States); Douglas, David R. [Jefferson Lab., Newport News, VA (United States); Derbenev, Yaroslav S. [Jefferson Lab., Newport News, VA (United States); Zhang, Yuhong [Jefferson Lab., Newport News, VA (United States)

    2015-09-01

    Electron cooling of the ion beams is one critical R&D to achieve high luminosities in JLab's MEIC proposal. In the present MEIC design, a multi-staged cooling scheme is adapted, which includes DC electron cooling in the booster ring and bunched beam electron cooling in the collider ring at both the injection energy and the collision energy. We explored the feasibility of using both magnetized and non-magnetized electron beam for cooling, and concluded that a magnetized electron beam is necessary. Electron cooling simulation results for the newly updated MEIC design is also presented.

  12. Electronics and electronic systems

    CERN Document Server

    Olsen, George H

    1987-01-01

    Electronics and Electronic Systems explores the significant developments in the field of electronics and electronic devices. This book is organized into three parts encompassing 11 chapters that discuss the fundamental circuit theory and the principles of analog and digital electronics. This book deals first with the passive components of electronic systems, such as resistors, capacitors, and inductors. These topics are followed by a discussion on the analysis of electronic circuits, which involves three ways, namely, the actual circuit, graphical techniques, and rule of thumb. The remaining p

  13. Scheme of thinking quantum systems

    Science.gov (United States)

    Yukalov, V. I.; Sornette, D.

    2009-11-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.

  14. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  15. Fragment separator momentum compression schemes.

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, L.; Erdelyi, B.; Hausmann, M.; Kubo, T.; Nolen, J.; Portillo, M.; Sherrill, B.M. (Physics); (MSU); (Northern Illinois Univ.); (RIKEN)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  16. Fragment separator momentum compression schemes

    Science.gov (United States)

    Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.

    2011-07-01

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  17. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations......The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...

  18. Staggered Schemes for Fluctuating Hydrodynamics

    CERN Document Server

    Balboa, F; Delgado-Buscalioni, R; Donev, A; Fai, T; Griffith, B; Peskin, C S

    2011-01-01

    We develop numerical schemes for solving the isothermal compressible and incompressible equations of fluctuating hydrodynamics on a grid with staggered momenta. We develop a second-order accurate spatial discretization of the diffusive, advective and stochastic fluxes that satisfies a discrete fluctuation-dissipation balance, and construct temporal discretizations that are at least second-order accurate in time deterministically and in a weak sense. Specifically, the methods reproduce the correct equilibrium covariances of the fluctuating fields to third (compressible) and second (incompressible) order in the time step, as we verify numerically. We apply our techniques to model recent experimental measurements of giant fluctuations in diffusively mixing fluids in a micro-gravity environment [A. Vailati et. al., Nature Communications 2:290, 2011]. Numerical results for the static spectrum of non-equilibrium concentration fluctuations are in excellent agreement between the compressible and incompressible simula...

  19. A secure and efficient password-based user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng

    2013-06-01

    The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.

  20. A secure and robust password-based remote user authentication scheme using smart cards for the integrated EPR information system.

    Science.gov (United States)

    Das, Ashok Kumar

    2015-03-01

    An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.

  1. A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping

    Science.gov (United States)

    Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei

    2017-02-01

    In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.

  2. On Optimal Designs of Some Censoring Schemes

    Directory of Open Access Journals (Sweden)

    Dr. Adnan Mohammad Awad

    2016-03-01

    Full Text Available The main objective of this paper  is to explore suitability of some entropy-information measures for introducing a new optimality censoring criterion and to apply it to some censoring schemes from some underlying life-time models.  In addition, the  paper investigates four related issues namely; the  effect of the parameter of parent distribution on optimal scheme, equivalence of schemes based on Shannon and Awad sup-entropy measures, the conjecture that the optimal scheme is one stage scheme, and  a conjecture by Cramer and Bagh (2011 about Shannon minimum and maximum schemes when parent distribution is reflected power. Guidelines for designing an optimal censoring plane are reported together with theoretical and numerical results and illustrations.

  3. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme. These sche......With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme....... These schemes utilize directional relays, power flow through feeders, wind and PV measurements to optimally select the feeders to be disconnected during load shedding such that DG disconnection is minimized while disconnecting required amount of consumption. These different UFLS schemes are compared in terms...

  4. Resonance ionization scheme development for europium

    CERN Document Server

    Chrysalidis, K; Fedosseev, V N; Marsh, B A; Naubereit, P; Rothe, S; Seiffert, C; Kron, T; Wendt, K

    2017-01-01

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  5. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  6. SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES

    OpenAIRE

    Adrian Atanasiu; Laura Savu

    2012-01-01

    This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.

  7. Wavelet Denoising within the Lifting Scheme Framework

    Directory of Open Access Journals (Sweden)

    M. P. Paskaš

    2012-11-01

    Full Text Available In this paper, we consider an example of the lifting scheme and present the results of the simple lifting scheme implementation using lazy transform. The paper is tutorial-oriented. The results are obtained by testing several common test signals for the signal denoising problem and using different threshold values. The lifting scheme represents an effective and flexible tool that can be used for introducing signal dependence into the problem by improving the wavelet properties.

  8. AN ENHANCED REMOTE AUTHENTICATION SCHEME USING SECURE KEY EXCHANGE PROTOCOL WITH PLATFORM INTEGRITY ATTESTATION

    OpenAIRE

    Fazli Bin Mat Nor; Kamarularifin Abd Jalil; Jamalul-lail Ab Manan

    2011-01-01

    Most remote authentication schemes use key exchange protocol to provide secure communication over an untrusted network. The protocol enables remote client and host to authenticate each other and communicate securely with prearranged shared secret key or server secret key. Many remote services environment such as online banking and electronic commerce are dependent on remote authentication schemes to validate user legitimacy in order to fulfill the authentication process. Unfortunately, these ...

  9. Electronic repository and standardization of processes and electronic documents in transport

    Directory of Open Access Journals (Sweden)

    Tomasz DĘBICKI

    2007-01-01

    Full Text Available The article refers to the idea of the use of electronic repository to store standardised scheme of processes between a Logistics Service Provider and its business partners. Application of repository for automatic or semi-automatic configuration of interoperability in electronic data interchange between information systems of differentcompanies based on transport (road, rail, sea and combined related processes. Standardisation includes processes, scheme of cooperation and related to them, electronic messages.

  10. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (i......) Ghost states are easily avoided without including semicore shells. (ii) The ultrasoft pseudo-charge-augmentation functions can be made softer. (iii) The number of nonlocal operators is reduced. The scheme will be most useful for transition metals, and the feasibility and accuracy of the scheme...

  11. Central schemes for open-channel flow

    Science.gov (United States)

    Gottardi, Guido; Venutelli, Maurizio

    2003-03-01

    The resolution of the Saint-Venant equations for modelling shock phenomena in open-channel flow by using the second-order central schemes of Nessyahu and Tadmor (NT) and Kurganov and Tadmor (KT) is presented. The performances of the two schemes that we have extended to the non-homogeneous case and that of the classical first-order Lax-Friedrichs (LF) scheme in predicting dam-break and hydraulic jumps in rectangular open channels are investigated on the basis of different numerical and physical conditions. The efficiency and robustness of the schemes are tested by comparing model results with analytical or experimental solutions.

  12. Secure Dynamic access control scheme of PHR in cloud computing.

    Science.gov (United States)

    Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching

    2012-12-01

    With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access

  13. Cryptanalysis and improvement of a user authentication scheme preserving uniqueness and anonymity for connected health care.

    Science.gov (United States)

    Xu, Lili; Wu, Fan

    2015-02-01

    Nowadays, connected health care applications are used more and more in the world. Service through the applications can save the patients' time and expense, such as telecare medical information system (TMIS) and integrated electronic patient record (EPR) information system. In the applications, preserving patients' privacy, transmitting messages securely and keeping mutual authentication should all be paid attention. Many authentication schemes have been proposed to make a secure communicating environment. Recently Xie et al. showed that Wen's scheme was insecure because it was under the off-line password guessing attack and without user anonymity and forward security. They gave a new three-factor authentication scheme and claimed that it was secure. However, we find that Xie et al's scheme is vulnerable to the De-synchronization attack and the server has too much storage burden in the scheme. Then we present an improved scheme which overcomes the usual weaknesses and keeps ordinary security characters. Compared with recent schemes of the same kind, our scheme is secure and practical.

  14. Nonstandard finite difference schemes for differential equations

    Directory of Open Access Journals (Sweden)

    Mohammad Mehdizadeh Khalsaraei

    2014-12-01

    Full Text Available In this paper, the reorganization of the denominator of the discrete derivative and nonlocal approximation of nonlinear terms are used in the design of nonstandard finite difference schemes (NSFDs. Numerical examples confirming then efficiency of schemes, for some differential equations are provided. In order to illustrate the accuracy of the new NSFDs, the numerical results are compared with standard methods.

  15. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  16. Sampling scheme optimization from hyperspectral data

    NARCIS (Netherlands)

    Debba, P.

    2006-01-01

    This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized

  17. Consolidation of the health insurance scheme

    CERN Multimedia

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  18. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  19. Mobile Machine for E-payment Scheme

    OpenAIRE

    Sattar J Aboud

    2010-01-01

    In this article e-payment scheme by mobile machine is considered. The requirements for a mobile machine in e-payment are presented, particularly when merchant employing accounts for payments and when using advertising. In the proposed scheme we will use the public key infrastructure and certificate for authenticate purchaser and merchant and to secure the communication between them.

  20. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  1. Towards an "All Speed" Unstructured Upwind Scheme

    Science.gov (United States)

    Loh, Ching Y.; Jorgenson, Philip C.E.

    2009-01-01

    In the authors previous studies [1], a time-accurate, upwind finite volume method (ETAU scheme) for computing compressible flows on unstructured grids was proposed. The scheme is second order accurate in space and time and yields high resolution in the presence of discontinuities. The scheme features a multidimensional limiter and multidimensional numerical dissipation. These help to stabilize the numerical process and to overcome the annoying pathological behaviors of upwind schemes. In the present paper, it will be further shown that such multidimensional treatments also lead to a nearly all-speed or Mach number insensitive upwind scheme. For flows at very high Mach number, e.g., 10, local numerical instabilities or the pathological behaviors are suppressed, while for flows at very low Mach number, e.g., 0.02, computation can be directly carried out without invoking preconditioning. For flows in different Mach number regimes, i.e., low, medium, and high Mach numbers, one only needs to adjust one or two parameters in the scheme. Several examples with low and high Mach numbers are demonstrated in this paper. Thus, the ETAU scheme is applicable to a broad spectrum of flow regimes ranging from high supersonic to low subsonic, appropriate for both CFD (computational fluid dynamics) and CAA (computational aeroacoustics).

  2. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  3. Deitmar schemes, graphs and zeta functions

    Science.gov (United States)

    Mérida-Angulo, Manuel; Thas, Koen

    2017-07-01

    In Thas (2014) it was explained how one can naturally associate a Deitmar scheme (which is a scheme defined over the field with one element, F1) to a so-called ;loose graph; (which is a generalization of a graph). Several properties of the Deitmar scheme can be proven easily from the combinatorics of the (loose) graph, and known realizations of objects over F1 such as combinatorial F1-projective and F1-affine spaces exactly depict the loose graph which corresponds to the associated Deitmar scheme. In this paper, we first modify the construction of loc. cit., and show that Deitmar schemes which are defined by finite trees (with possible end points) are ;defined over F1; in Kurokawa's sense; we then derive a precise formula for the Kurokawa zeta function for such schemes (and so also for the counting polynomial of all associated Fq-schemes). As a corollary, we find a zeta function for all such trees which contains information such as the number of inner points and the spectrum of degrees, and which is thus very different than Ihara's zeta function (which is trivial in this case). Using a process called ;surgery,; we show that one can determine the zeta function of a general loose graph and its associated {Deitmar, Grothendieck}-schemes in a number of steps, eventually reducing the calculation essentially to trees. We study a number of classes of examples of loose graphs, and introduce the Grothendieck ring ofF1-schemes along the way in order to perform the calculations. Finally, we include a computer program for performing more tedious calculations, and compare the new zeta function to Ihara's zeta function for graphs in a number of examples.

  4. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  5. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  6. Galilean invariant resummation schemes of cosmological perturbations

    Science.gov (United States)

    Peloso, Marco; Pietroni, Massimo

    2017-01-01

    Many of the methods proposed so far to go beyond Standard Perturbation Theory break invariance under time-dependent boosts (denoted here as extended Galilean Invariance, or GI). This gives rise to spurious large scale effects which spoil the small scale predictions of these approximation schemes. By using consistency relations we derive fully non-perturbative constraints that GI imposes on correlation functions. We then introduce a method to quantify the amount of GI breaking of a given scheme, and to correct it by properly tailored counterterms. Finally, we formulate resummation schemes which are manifestly GI, discuss their general features, and implement them in the so called Time-Flow, or TRG, equations.

  7. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  8. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  9. Graph state-based quantum authentication scheme

    Science.gov (United States)

    Liao, Longxia; Peng, Xiaoqi; Shi, Jinjing; Guo, Ying

    2017-04-01

    Inspired by the special properties of the graph state, a quantum authentication scheme is proposed in this paper, which is implemented with the utilization of the graph state. Two entities, a reliable party, Trent, as a verifier and Alice as prover are included. Trent is responsible for registering Alice in the beginning and confirming Alice in the end. The proposed scheme is simple in structure and convenient to realize in the realistic physical system due to the use of the graph state in a one-way quantum channel. In addition, the security of the scheme is extensively analyzed and accordingly can resist the general individual attack strategies.

  10. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    . This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC......) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more...

  11. Analysis of reaction schemes using maximum rates of constituent steps.

    Science.gov (United States)

    Motagamwala, Ali Hussain; Dumesic, James A

    2016-05-24

    We show that the steady-state kinetics of a chemical reaction can be analyzed analytically in terms of proposed reaction schemes composed of series of steps with stoichiometric numbers equal to unity by calculating the maximum rates of the constituent steps, rmax,i, assuming that all of the remaining steps are quasi-equilibrated. Analytical expressions can be derived in terms of rmax,i to calculate degrees of rate control for each step to determine the extent to which each step controls the rate of the overall stoichiometric reaction. The values of rmax,i can be used to predict the rate of the overall stoichiometric reaction, making it possible to estimate the observed reaction kinetics. This approach can be used for catalytic reactions to identify transition states and adsorbed species that are important in controlling catalyst performance, such that detailed calculations using electronic structure calculations (e.g., density functional theory) can be carried out for these species, whereas more approximate methods (e.g., scaling relations) are used for the remaining species. This approach to assess the feasibility of proposed reaction schemes is exact for reaction schemes where the stoichiometric coefficients of the constituent steps are equal to unity and the most abundant adsorbed species are in quasi-equilibrium with the gas phase and can be used in an approximate manner to probe the performance of more general reaction schemes, followed by more detailed analyses using full microkinetic models to determine the surface coverages by adsorbed species and the degrees of rate control of the elementary steps.

  12. Password authentication scheme based on the quadratic residue problem

    Science.gov (United States)

    Ali, Muhammad Helmi; Ismail, Eddie Shahril

    2017-04-01

    In this paper, we propose a new password-authentication scheme based on quadratic residue problem with the following advantages: the scheme does not require a verification file, and the scheme can withstand replay attacks and resist from the guessing and impersonation attacks. We next discuss the advantages of our designated scheme over other schemes in terms of security and efficiency.

  13. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  14. On the security of a dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Lin, Han-Yu

    2013-04-01

    Telecare medical information systems (TMISs) are increasingly popular technologies for healthcare applications. Using TMISs, physicians and caregivers can monitor the vital signs of patients remotely. Since the database of TMISs stores patients' electronic medical records (EMRs), only authorized users should be granted the access to this information for the privacy concern. To keep the user anonymity, recently, Chen et al. proposed a dynamic ID-based authentication scheme for telecare medical information system. They claimed that their scheme is more secure and robust for use in a TMIS. However, we will demonstrate that their scheme fails to satisfy the user anonymity due to the dictionary attacks. It is also possible to derive a user password in case of smart card loss attacks. Additionally, an improved scheme eliminating these weaknesses is also presented.

  15. Designing optimal sampling schemes for field visits

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2008-10-01

    Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...

  16. A Climate Classification Scheme for Habitable Worlds

    Science.gov (United States)

    Byrne, J. F.

    2017-11-01

    This presentation will include an exploration of the internal/external forcings and variability associated with climate using Earth as a reference model in addition to a classification scheme consisting of five categories.

  17. Secure Wake-Up Scheme for WBANs

    Science.gov (United States)

    Liu, Jing-Wei; Ameen, Moshaddique Al; Kwak, Kyung-Sup

    Network life time and hence device life time is one of the fundamental metrics in wireless body area networks (WBAN). To prolong it, especially those of implanted sensors, each node must conserve its energy as much as possible. While a variety of wake-up/sleep mechanisms have been proposed, the wake-up radio potentially serves as a vehicle to introduce vulnerabilities and attacks to WBAN, eventually resulting in its malfunctions. In this paper, we propose a novel secure wake-up scheme, in which a wake-up authentication code (WAC) is employed to ensure that a BAN Node (BN) is woken up by the correct BAN Network Controller (BNC) rather than unintended users or malicious attackers. The scheme is thus particularly implemented by a two-radio architecture. We show that our scheme provides higher security while consuming less energy than the existing schemes.

  18. Renormalization scheme dependence with renormalization group summation

    Science.gov (United States)

    McKeon, D. G. C.

    2015-08-01

    We consider all perturbative radiative corrections to the total e+e- annihilation cross section Re+e- showing how the renormalization group (RG) equation associated with the radiatively induced mass scale μ can be used to sum the logarithmic contributions in two ways. First of all, one can sum leading-log, next-to-leading-log, etc., contributions to Re+e- using in turn the one-loop, two-loop, etc., contributions to the RG function β . A second summation shows how all logarithmic corrections to Re+e- can be expressed entirely in terms of the log-independent contributions when one employs the full β -function. Next, using Stevenson's characterization of any choice of renormalization scheme by the use of the contributions to the β -function arising beyond two-loop order, we examine the RG scheme dependence in Re+e- when using the second way of summing logarithms. The renormalization scheme invariants that arise are then related to the renormalization scheme invariants found by Stevenson. We next consider two choices of the renormalization scheme, one which can be used to express Re+e- solely in terms of two powers of a running coupling, and the second which can be used to express Re+e- as an infinite series in the two-loop running coupling (i.e., a Lambert W -function). In both cases, Re+e- is expressed solely in terms of renormalization scheme invariant parameters that are to be computed by a perturbative evaluation of Re+e-. We then establish how in general the coupling constant arising in one renormalization scheme can be expressed as a power series of the coupling arising in any other scheme. We then establish how, by using a different renormalization mass scale at each order of perturbation theory, all renormalization scheme dependence can be absorbed into these mass scales when one uses the second way of summing logarithmic corrections to Re+e-. We then employ the approach to renormalization scheme dependency that we have applied to Re+e- to a RG summed

  19. Asynchronous Communication Scheme For Hypercube Computer

    Science.gov (United States)

    Madan, Herb S.

    1988-01-01

    Scheme devised for asynchronous-message communication system for Mark III hypercube concurrent-processor network. Network consists of up to 1,024 processing elements connected electrically as though were at corners of 10-dimensional cube. Each node contains two Motorola 68020 processors along with Motorola 68881 floating-point processor utilizing up to 4 megabytes of shared dynamic random-access memory. Scheme intended to support applications requiring passage of both polled or solicited and unsolicited messages.

  20. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  1. Readout scheme of the upgraded ALICE TPC

    CERN Document Server

    Appelshaeuser, Harald; Ivanov, Marian; Lippmann, Christian; Wiechula, Jens

    2016-01-01

    In this document, we present the updated readout scheme for the ALICE TPC Upgrade. Two major design changes are implemented with respect to the concept that was presented in the TPC Upgrade Technical Design Report: – The SAMPA front-end ASIC will be used in direct readout mode. – The ADC sampling frequency will be reduced from 10 to 5 MHz. The main results from simulations and a description of the new readout scheme is outlined.

  2. Novel Directional Protection Scheme for the FREEDM Smart Grid System

    Science.gov (United States)

    Sharma, Nitish

    This research primarily deals with the design and validation of the protection system for a large scale meshed distribution system. The large scale system simulation (LSSS) is a system level PSCAD model which is used to validate component models for different time-scale platforms, to provide a virtual testing platform for the Future Renewable Electric Energy Delivery and Management (FREEDM) system. It is also used to validate the cases of power system protection, renewable energy integration and storage, and load profiles. The protection of the FREEDM system against any abnormal condition is one of the important tasks. The addition of distributed generation and power electronic based solid state transformer adds to the complexity of the protection. The FREEDM loop system has a fault current limiter and in addition, the Solid State Transformer (SST) limits the fault current at 2.0 per unit. Former students at ASU have developed the protection scheme using fiber-optic cable. However, during the NSF-FREEDM site visit, the National Science Foundation (NSF) team regarded the system incompatible for the long distances. Hence, a new protection scheme with a wireless scheme is presented in this thesis. The use of wireless communication is extended to protect the large scale meshed distributed generation from any fault. The trip signal generated by the pilot protection system is used to trigger the FID (fault isolation device) which is an electronic circuit breaker operation (switched off/opening the FIDs). The trip signal must be received and accepted by the SST, and it must block the SST operation immediately. A comprehensive protection system for the large scale meshed distribution system has been developed in PSCAD with the ability to quickly detect the faults. The validation of the protection system is performed by building a hardware model using commercial relays at the ASU power laboratory.

  3. Economic scheme for remote preparation of an arbitrary five-qubit ...

    Indian Academy of Sciences (India)

    pp. 783–788. Economic scheme for remote preparation of an arbitrary five-qubit Brown-type state. HUA-BAO CHEN. ∗. , HAO FU, XIAO-WEI LI, PENG-CHENG MA and. YOU-BANG ZHAN. School of Physics and Electronic Electrical Engineering, Huaiyin Normal University,. Huaian 223300, People's Republic of China. ∗.

  4. Combining image-processing and image compression schemes

    Science.gov (United States)

    Greenspan, H.; Lee, M.-C.

    1995-01-01

    An investigation into the combining of image-processing schemes, specifically an image enhancement scheme, with existing compression schemes is discussed. Results are presented on the pyramid coding scheme, the subband coding scheme, and progressive transmission. Encouraging results are demonstrated for the combination of image enhancement and pyramid image coding schemes, especially at low bit rates. Adding the enhancement scheme to progressive image transmission allows enhanced visual perception at low resolutions. In addition, further progressing of the transmitted images, such as edge detection schemes, can gain from the added image resolution via the enhancement.

  5. Two-pulse laser control of nuclear and electronic motion

    DEFF Research Database (Denmark)

    Grønager, Michael; Henriksen, Niels Engholm

    1997-01-01

    We discuss an explicitly time-dependent two-pulse laser scheme for controlling where nuclei and electrons are going in unimolecular reactions. We focus on electronic motion and show, with HD+ as an example, that one can find non-stationary states where the electron (with some probability) oscilla......We discuss an explicitly time-dependent two-pulse laser scheme for controlling where nuclei and electrons are going in unimolecular reactions. We focus on electronic motion and show, with HD+ as an example, that one can find non-stationary states where the electron (with some probability...

  6. The Electron

    Energy Technology Data Exchange (ETDEWEB)

    Thomson, George

    1972-01-01

    Electrons are elementary particles of atoms that revolve around and outside the nucleus and have a negative charge. This booklet discusses how electrons relate to electricity, some applications of electrons, electrons as waves, electrons in atoms and solids, the electron microscope, among other things.

  7. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  8. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  9. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  10. Automated electronic filter design

    CERN Document Server

    Banerjee, Amal

    2017-01-01

    This book describes a novel, efficient and powerful scheme for designing and evaluating the performance characteristics of any electronic filter designed with predefined specifications. The author explains techniques that enable readers to eliminate complicated manual, and thus error-prone and time-consuming, steps of traditional design techniques. The presentation includes demonstration of efficient automation, using an ANSI C language program, which accepts any filter design specification (e.g. Chebyschev low-pass filter, cut-off frequency, pass-band ripple etc.) as input and generates as output a SPICE(Simulation Program with Integrated Circuit Emphasis) format netlist. Readers then can use this netlist to run simulations with any version of the popular SPICE simulator, increasing accuracy of the final results, without violating any of the key principles of the traditional design scheme.

  11. Luminosity optimization schemes in Compton experiments based on Fabry-Perot optical resonators

    Directory of Open Access Journals (Sweden)

    Alessandro Variola

    2011-03-01

    Full Text Available The luminosity of Compton x-ray and γ sources depends on the average current in electron bunches, the energy of the laser pulses, and the geometry of the particle bunch to laser pulse collisions. To obtain high power photon pulses, these can be stacked in a passive optical resonator (Fabry-Perot cavity especially when a high average flux is required. But, in this case, owing to the presence of the optical cavity mirrors, the electron bunches have to collide at an angle with the laser pulses with a consequent luminosity decrease. In this article a crab-crossing scheme is proposed for Compton sources, based on a laser amplified in a Fabry-Perot resonator, to eliminate the luminosity losses given by the crossing angle, taking into account that in laser-electron collisions only the electron bunches can be tilted at the collision point. We report the analytical study on the crab-crossing scheme for Compton gamma sources. The analytical expression for the total yield of photons generated in Compton sources with the crab-crossing scheme of collision is derived. The optimal collision angle of the bunch was found to be equal to half of the collision angle. At this crabbing angle, the maximal yield of scattered off laser photons is attained thanks to the maximization, in the collision process, of the time spent by the laser pulse in the electron bunch. Estimations for some Compton source projects are presented. Furthermore, some schemes of the optical cavities configuration are analyzed and the luminosity calculated. As illustrated, the four-mirror two- or three-dimensional scheme is the most appropriate for Compton sources.

  12. Phonon limited electronic transport in Pb

    DEFF Research Database (Denmark)

    Rittweger, Florian; Hinsche, Nicki Frank; Mertig, Ingrid

    2017-01-01

    We present a fully ab initio based scheme to compute electronic transport properties, i.e. the electrical conductivity σ and thermopower S, in the presence of electron-phonon interaction. We explicitly investigate the k-dependent structure of the Éliashberg spectral function, the coupling strengt...

  13. NFC Secure Payment and Verification Scheme with CS E-Ticket

    Directory of Open Access Journals (Sweden)

    Kai Fan

    2017-01-01

    Full Text Available As one of the most important techniques in IoT, NFC (Near Field Communication is more interesting than ever. NFC is a short-range, high-frequency communication technology well suited for electronic tickets, micropayment, and access control function, which is widely used in the financial industry, traffic transport, road ban control, and other fields. However, NFC is becoming increasingly popular in the relevant field, but its secure problems, such as man-in-the-middle-attack and brute force attack, have hindered its further development. To address the security problems and specific application scenarios, we propose a NFC mobile electronic ticket secure payment and verification scheme in the paper. The proposed scheme uses a CS E-Ticket and offline session key generation and distribution technology to prevent major attacks and increase the security of NFC. As a result, the proposed scheme can not only be a good alternative to mobile e-ticket system but also be used in many NFC fields. Furthermore, compared with other existing schemes, the proposed scheme provides a higher security.

  14. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    Pankratova, S.A.

    2017-06-01

    Full Text Available Problems of knowledge representation by means of images are still cognitively significant and invariably modern. The article deals with the image heuristic potential of a bookish sphere as a donor of meanings, aiding metaphoric scheme development of another modern sphere of cinematography. The key factor here is the differentiation between two basically different metaphor types – heuristic epiphora and image diaphora. The author had offered a unique methodology of counting of quantitative parameters of heuristic potential which opens the possibility of modeling the mechanisms of metaphoric meaning development. In the summary the author underscores that both ways of image scheme development are of importance to cognitive science, both heuristic epiphora and image-based diaphora play a significant role in the explication of image scheme development.

  15. IPCT: A scheme for mobile authentication

    Directory of Open Access Journals (Sweden)

    Vishnu Shankar

    2016-09-01

    Full Text Available Mobile is becoming a part of everyone's life and as their power of computation and storage is rising and cost is coming down. Most of mobile phone users have a lot of private data which they want to protect from others (La Polla et al., 2013. It means user must be authenticated properly for accessing the mobile resources. Normally user is authenticated using text passwords, PIN, face recognition or patterns etc. All these methods are used but they have some shortcomings. In this paper we have seen various existing methods of mobile authentications and proposed our improved mobile authentication IPCT scheme. We have compared our Image Pass Code with tapping scheme with existing techniques and shown that our scheme is better than existing techniques.

  16. Tradable white certificate schemes : what can we learn from tradable green certificate schemes?

    NARCIS (Netherlands)

    Oikonomou, Vlasis; Mundaca, Luis

    In this paper, we analyze the experiences gained from tradable green certificate (TGC) schemes and extract some policy lessons that can lead to a successful design of a market-based approach for energy efficiency improvement, alias tradable white certificate schemes. We use tradable green

  17. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  18. Carbon trading: Current schemes and future developments

    Energy Technology Data Exchange (ETDEWEB)

    Perdan, Slobodan, E-mail: slobodan.perdan@manchester.ac.uk [School of Chemical Engineering and Analytical Science, Room F30, The Mill, University of Manchester, Sackville Street, Manchester M13 9PL (United Kingdom); Azapagic, Adisa [School of Chemical Engineering and Analytical Science, Room F30, The Mill, University of Manchester, Sackville Street, Manchester M13 9PL (United Kingdom)

    2011-10-15

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: > The paper provides an extensive overview of mandatory emissions trading schemes around the world. > Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. > The expansion requires considerable technical fixes and harmonisation of different trading systems. > Clear policy signals, political support and a stable economic environment are needed for the expansion. > A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  19. Cryptanalysis and improvement of a password-based user authentication scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2015-04-01

    Full Text Available Recently, Wu et al. proposed a password-based remote user authentication scheme for the integrated Electronic Patient Record (EPR information system to achieve mutual authentication and session key agreement over the Internet. They claimed that the scheme resists various attacks and offers lower computation cost, data integrity, confidentiality and authenticity. However, we observed that the scheme cannot withstand lost smartcard/off-line password guessing, privileged-insider and known session-specific temporary information attacks, and lacks the requirements of lost smartcard revocation and users’ anonymity. Besides, the password change phase is inconvenient to use because a user cannot change his password independently. Thus, we proposed a new password-based user authentication scheme for the integrated EPR information system that would be able to resist detected security flaws of Wu et al.’s scheme.

  20. Electron radiography

    Science.gov (United States)

    Merrill, Frank E.; Morris, Christopher

    2005-05-17

    A system capable of performing radiography using a beam of electrons. Diffuser means receive a beam of electrons and diffuse the electrons before they enter first matching quadrupoles where the diffused electrons are focused prior to the diffused electrons entering an object. First imaging quadrupoles receive the focused diffused electrons after the focused diffused electrons have been scattered by the object for focusing the scattered electrons. Collimator means receive the scattered electrons and remove scattered electrons that have scattered to large angles. Second imaging quadrupoles receive the collimated scattered electrons and refocus the collimated scattered electrons and map the focused collimated scattered electrons to transverse locations on an image plane representative of the electrons' positions in the object.

  1. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  2. An Elaborate Secure Quantum Voting Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Xie, Shu-Cui; Zhang, Jian-Zhong

    2017-10-01

    An elaborate secure quantum voting scheme is presented in this paper. It is based on quantum proxy blind signature. The eligible voter's voting information can be transmitted to the tallyman Bob with the help of the scrutineer Charlie. Charlie's supervision in the whole voting process can make the protocol satisfy fairness and un-repeatability so as to avoid Bob's dishonest behaviour. Our scheme uses the physical characteristics of quantum mechanics to achieve voting, counting and immediate supervision. In addition, the program also uses quantum key distribution protocol and quantum one-time pad to guarantee its unconditional security.

  3. A COMPLETE SCHEME FOR A MUON COLLIDER.

    Energy Technology Data Exchange (ETDEWEB)

    PALMER,R.B.; BERG, J.S.; FERNOW, R.C.; GALLARDO, J.C.; KIRK, H.G.; ALEXAHIN, Y.; NEUFFER, D.; KAHN, S.A.; SUMMERS, D.

    2007-09-01

    A complete scheme for production, cooling, acceleration, and ring for a 1.5 TeV center of mass muon collider is presented, together with parameters for two higher energy machines. The schemes starts with the front end of a proposed neutrino factory that yields bunch trains of both muon signs. Six dimensional cooling in long-period helical lattices reduces the longitudinal emittance until it becomes possible to merge the trains into single bunches, one of each sign. Further cooling in all dimensions is applied to the single bunches in further helical lattices. Final transverse cooling to the required parameters is achieved in 50 T solenoids.

  4. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC...

  5. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  6. Droop Scheme With Consideration of Operating Costs

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede

    2014-01-01

    considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady......Although many droop schemes have been proposed for distributed generator (DG) control in a microgrid, they mainly focus on achieving proportional power sharing based on the DG kVA ratings. Other factors like generation costs, efficiencies, and emission penalties at different loads have not been...

  7. A Unified Gas Kinetic Scheme for Multi-scale Plasma Transport

    CERN Document Server

    Liu, Chang

    2016-01-01

    A unified gas kinetic scheme (UGKS) for multi-scale and multi-component plasma transport is constructed. The current scheme is a direct modeling method, where the time evolution solutions from the Vlasov-BGK equations for both electron and ion, and the Maxwell equations are used to construct the scale-dependent plasma simulation. As a result, based on the modeling scales of mesh size and time step, the discretized governing equations for the whole plasma regimes are obtained. The UGKS takes into account the electron inertia, full electromagnetic field equations, and separate electron and ion evolution. The physics recovered in UGKS ranges from the kinetic Vlasov equation to the hydrodynamic magnetohydrodynamic (MHD) equations, with a unified treatment in all scales from the collisionless particle transport to the hydrodynamic wave interactions. The UGKS presents a plasma description which is more general than the Vlasov equation in the kinetic scale and all kinds of MHD equations in the hydrodynamic scale, su...

  8. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2014-12-01

    Dec 1, 2014 ... Abstract. We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit ...

  9. Coded-subcarrier-aided chromatic dispersion monitoring scheme for flexible optical OFDM networks.

    Science.gov (United States)

    Tse, Kam-Hon; Chan, Chun-Kit

    2014-08-11

    A simple coded-subcarrier aided scheme is proposed to perform chromatic dispersion monitoring in flexible optical OFDM networks. A pair of coded label subcarriers is added to both edges of the optical OFDM signal spectrum at the edge transmitter node. Upon reception at any intermediate or the receiver node, chromatic dispersion estimation is performed, via simple direct detection, followed by electronic correlation procedures with the designated code sequences. The feasibility and the performance of the proposed scheme have been experimentally characterized. It provides a cost-effective monitoring solution for the optical OFDM signals across intermediate nodes in flexible OFDM networks.

  10. Hyperpolarizabilities of hetero-cycle based chromophores: A semi-quantitative SOS scheme

    Science.gov (United States)

    Nandi, P. K.; Panja, N.; Kar, T.

    2007-08-01

    The static first- and second-hyperpolarizabilities of isomeric hetero-cycle based chromophores have been calculated by using the CPHF and MP2 methods. A semi-quantitative scheme in the framework of sum-over-state (SOS) has been proposed to explain the variation of hyperpolarizabilities in terms of ground state electric properties. The hyperpolarizabilities calculated using this scheme correlate fairly with the corresponding MP2 values. Electron correlation effect, in general, appreciably enhances the hyperpolarizabilities. The rather larger enhancement of NLO responses of twisted intramolecular charge transfer (TICT) molecule arises from its sudden polarized ground state. Among the chosen hetero-cycles borrole leads to exceptionally large non-linearity.

  11. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  12. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  13. Creating Culturally Sustainable Agri-Environmental Schemes

    Science.gov (United States)

    Burton, Rob J. F.; Paragahawewa, Upananda Herath

    2011-01-01

    Evidence is emerging from across Europe that contemporary agri-environmental schemes are having only limited, if any, influence on farmers' long-term attitudes towards the environment. In this theoretical paper we argue that these approaches are not "culturally sustainable," i.e. the actions are not becoming embedded within farming…

  14. Pay-what-you-want pricing schemes

    DEFF Research Database (Denmark)

    Kahsay, Goytom Abraha; Samahita, Margaret

    Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular in a wide range of industries. We develop a model incorporating self-image into the buyer's utility function and introduce heterogeneity in consumption utility and image-sensitivity, which generates different purchase...

  15. Enhancing Cooperative Loan Scheme Through Automated Loan ...

    African Journals Online (AJOL)

    Enhancing Cooperative Loan Scheme Through Automated Loan Management System. ... Financial transactions through manual system of operation are prone to errors and unimagined complexities, making it so difficult a task maintaining all entries of users account, search records of activities, handle loan deduction errors ...

  16. Geometrical and frequential watermarking scheme using similarities

    Science.gov (United States)

    Bas, Patrick; Chassery, Jean-Marc; Davoine, Franck

    1999-04-01

    Watermarking schemes are more and more robust to classical degradations. The NEC system developed by Cox, using both original and marked images, can detect the mark with a JPEG compression ratio of 30. Nevertheless a very simple geometric attack done by the program Stirmark can remove the watermark. Most of the present watermarking schemes only map a mark on the image without geometric reference and therefore are not robust to geometric transformation. We present a scheme based on the modification of a collage map (issued from a fractal code used in fractal compression). We add a mark introducing similarities in the image. The embedding of the mark is done by selection of points of interest supporting blocks on which similarities are hided. This selection is done by the Stephens-Harris detector. The similarity is embedded locally to be robust to cropping. Contrary to many schemes, the reference mark used for the detection comes from the marked image and thus undergoes geometrical distortions. The detection of the mark is done by searching interest blocks and their similarities. It does not use the original image and the robustness is guaranteed by a key. Our first results show that the similarities-based watermarking is quite robust to geometric transformation such as translations, rotations and cropping.

  17. The Partners in Flight species prioritization scheme

    Science.gov (United States)

    William C. Hunter; Michael F. Carter; David N. Pashley; Keith Barker

    1993-01-01

    The prioritization scheme identifies those birds at any locality on several geographic scales most in need of conservation action. Further, it suggests some of those actions that ought to be taken. Ranking criteria used to set priorities for Neotropical migratory landbirds measure characteristics of species that make them vulnerable to local and global extinction....

  18. Shanghai : Developing a Green Electricity Scheme

    OpenAIRE

    Heijndermans, Enno; Berrah, Noureddine; Crowdis, Mark D.

    2006-01-01

    This report documents the experience of developing a green electricity scheme in Shanghai, China. It is intended to be a resource when replicating this effort in another city or country. The study consists of two parts. In Part 1, the general characteristics of both the framework for green electricity products and the market for green electricity products are presented. It also presents a ...

  19. EXPERIMENTAL EVALUATION OF LIDAR DATA VISUALIZATION SCHEMES

    Directory of Open Access Journals (Sweden)

    S. Ghosh

    2012-07-01

    Full Text Available LiDAR (Light Detection and Ranging has attained the status of an industry standard method of data collection for gathering three dimensional topographic information. Datasets captured through LiDAR are dense, redundant and are perceivable from multiple directions, which is unlike other geospatial datasets collected through conventional methods. This three dimensional information has triggered an interest in the scientific community to develop methods for visualizing LiDAR datasets and value added products. Elementary schemes of visualization use point clouds with intensity or colour, triangulation and tetrahedralization based terrain models draped with texture. Newer methods use feature extraction either through the process of classification or segmentation. In this paper, the authors have conducted a visualization experience survey where 60 participants respond to a questionnaire. The questionnaire poses six different questions on the qualities of feature perception and depth for 12 visualization schemes. The answers to these questions are obtained on a scale of 1 to 10. Results are thus presented using the non-parametric Friedman's test, using post-hoc analysis for hypothetically ranking the visualization schemes based on the rating received and finally confirming the rankings through the Page's trend test. Results show that a heuristic based visualization scheme, which has been developed by Ghosh and Lohani (2011 performs the best in terms of feature and depth perception.

  20. The data cyclotron query processing scheme

    NARCIS (Netherlands)

    R.A. Goncalves (Romulo); M.L. Kersten (Martin)

    2010-01-01

    htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot

  1. Value constraints in the CLP scheme

    NARCIS (Netherlands)

    M.H. van Emden

    1996-01-01

    textabstractThis paper addresses the question of how to incorporate constraint propagation into logic programming. A likely candidate is the CLP scheme, which allows one to exploit algorithmic opportunities while staying within logic programming semantics. CLP($cal R$) is an example: it combines

  2. Benefit Reentitlement Conditions in Unemployment Insurance Schemes

    DEFF Research Database (Denmark)

    Andersen, Torben M.; Christoffersen, Mark Strøm; Svarer, Michael

    Unemployment insurance schemes include conditions on past employment history as part of the eligibility conditions. This aspect is often neglected in the literature which primarily focuses on benefit levels and benefit duration. In a search-matching framework we show that benefit duration and emp...

  3. External quality assessment schemes for toxicology.

    Science.gov (United States)

    Wilson, John

    2002-08-14

    A variety of external quality assurance (EQA) schemes monitor quantitative performance for routine biochemical analysis of agents such as paracetamol, salicylate, ethanol and carboxyhaemoglobin. Their usefulness for toxicologists can be lessened where the concentrations monitored do not extend fully into the toxic range or where the matrix is synthetic, of animal origin or serum as opposed to whole human blood. A scheme for quantitative determinations of a wider range of toxicological analytes such as opioids, benzodiazepines and tricyclics in human blood has been piloted by the United Kingdom National External Quality Assessment Scheme (UKNEQAS). Specialist schemes are available for drugs of abuse testing in urine and for hair analysis. Whilst these programmes provide much useful information on the performance of analytical techniques, they fail to monitor the integrated processes that are needed in investigation of toxicological cases. In practice, both qualitative and quantitative tests are used in combination with case information to guide the evaluation of the samples and to develop an interpretation of the analytical findings that is used to provide clinical or forensic advice. EQA programs that combine the analytical and interpretative aspects of case studies are available from EQA providers such as UKNEQAS and the Dutch KKGT program (Stichting Kwaliteitsbewaking Klinische Geneesmiddelanalyse en Toxicologie).

  4. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  5. Voluntary Certification Schemes and Legal Minimum Standards

    NARCIS (Netherlands)

    Herzfeld, T.; Jongeneel, R.A.

    2012-01-01

    EU farmers face increasing requests to comply with legal as well as private agribusiness and retail standards. Both requests potentially raise farmer’s administrative burden. This paper discusses the potential synergies between cross-compliance and third-party certification schemes. In selected

  6. Traffic calming schemes : opportunities and implementation strategies.

    NARCIS (Netherlands)

    Schagen, I.N.L.G. van (ed.)

    2003-01-01

    Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and

  7. A Presuppositional Approach to Conceptual Schemes | Wang ...

    African Journals Online (AJOL)

    ; for they have been focused too much on the truth-conditional notions of meaning/concepts and translation/interpretation in Tarski's style. It is exactly due to such a Quinean interpretation of the notion of conceptual schemes that the very notion ...

  8. Observations and comments on the classification schemes ...

    African Journals Online (AJOL)

    Reviews of the classification schemes proposed by various geologists are basically similar. However, general discrepancies, inconsistencies and contradictions in the stratigraphic positions of some of the rock units have been observed, as well as terminologies to describe rock units which are inconsistent with stratigraphic ...

  9. Energy decomposition scheme based on the generalized Kohn-Sham scheme.

    Science.gov (United States)

    Su, Peifeng; Jiang, Zhen; Chen, Zuochang; Wu, Wei

    2014-04-03

    In this paper, a new energy decomposition analysis scheme based on the generalized Kohn-Sham (GKS) and the localized molecular orbital energy decomposition analysis (LMO-EDA) scheme, named GKS-EDA, is proposed. The GKS-EDA scheme has a wide range of DFT functional adaptability compared to LMO-EDA. In the GKS-EDA scheme, the exchange, repulsion, and polarization terms are determined by DFT orbitals; the correlation term is defined as the difference of the GKS correlation energy from monomers to supermolecule. Using the new definition, the GKS-EDA scheme avoids the error of LMO-EDA which comes from the separated treatment of EX and EC functionals. The scheme can perform analysis both in the gas and in the condensed phases with most of the popular DFT functionals, including LDA, GGA, meta-GGA, hybrid GGA/meta-GGA, double hybrid, range-separated (long-range correction), and dispersion correction. By the GKS-EDA scheme, the DFT functionals assessment for hydrogen bonding, vdW interaction, symmetric radical cation, charge-transfer, and metal-ligand interaction is performed.

  10. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  11. Electricity storage using a thermal storage scheme

    Science.gov (United States)

    White, Alexander

    2015-01-01

    The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on "sensible heat" storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.

  12. One-dimensional Z-scheme TiO2/WO3/Pt heterostructures for enhanced hydrogen generation

    Science.gov (United States)

    Gao, Hongqing; Zhang, Peng; Hu, Junhua; Pan, Jimin; Fan, Jiajie; Shao, Guosheng

    2017-01-01

    One-dimensional Z-scheme TiO2/WO3/Pt heterostructures were fabricated by integrating a facile electrospinning technique and subsequent annealing in air. X-ray diffraction, scanning electron microscopy, transmission electron microscopy, X-ray photoelectron spectroscopy and UV-vis diffuse reflectance spectroscopy, were used to characterize the as-fabricated samples. The results showed that the H2-generation of the as-fabricated one-dimensional Z-scheme TiO2/WO3/Pt heterostructures (S2) was greatly enhanced compared with pure TiO2 nanofibers (S0) and TiO2/WO3 nanofibers (S1). The enhanced photocatalyst activities were mainly attributed to the solid-state Z-scheme photosynthetic heterojunction system with Pt nanoparticle as an electron collector and WO3 as a hole collector, leading to effective charge separation on these semiconductors, which were evidenced by electrochemical impedance spectroscopy (EIS) and photocurrent analysis.

  13. A classification scheme for risk assessment methods.

    Energy Technology Data Exchange (ETDEWEB)

    Stamp, Jason Edwin; Campbell, Philip LaRoche

    2004-08-01

    This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In

  14. A Computational Scheme To Evaluate Hamaker Constants of Molecules with Practical Size and Anisotropy.

    Science.gov (United States)

    Hongo, Kenta; Maezono, Ryo

    2017-11-14

    We propose a computational scheme to evaluate Hamaker constants, A, of molecules with practical sizes and anisotropies. Upon the increasing feasibility of diffusion Monte Carlo (DMC) methods to evaluate binding curves for such molecules to extract the constants, we discussed how to treat the averaging over anisotropy and how to correct the bias due to the nonadditivity. We have developed a computational procedure for dealing with the anisotropy and reducing statistical errors and biases in DMC evaluations, based on possible validations on predicted A. We applied the scheme to cyclohexasilane molecule, Si 6 H 12 , used in "printed electronics" fabrications, getting A ≈ 105 ± 2 zJ, being in plausible range supported even by other possible extrapolations. The scheme provided here would open a way to use handy ab initio evaluations to predict wettabilities as in the form of materials informatics over broader molecules.

  15. An efficient forward-secure group certificate digital signature scheme to enhance EMR authentication process.

    Science.gov (United States)

    Yu, Yao-Chang; Hou, Ting-Wei

    2014-05-01

    The frequently used digital signature algorithms, such as RSA and the Digital Signature Algorithm (DSA), lack forward-secure function. The result is that, when private keys are renewed, trustworthiness is lost. In other words, electronic medical records (EMRs) signed by revoked private keys are no longer trusted. This significant security threat stands in the way of EMR adoption. This paper proposes an efficient forward-secure group certificate digital signature scheme that is based on Shamir's (t,n) threshold scheme and Schnorr's digital signature scheme to ensure trustworthiness is maintained when private keys are renewed and to increase the efficiency of EMRs' authentication processes in terms of number of certificates, number of keys, forward-secure ability and searching time.

  16. Wavelet Based Protection Scheme for Multi Terminal Transmission System with PV and Wind Generation

    Science.gov (United States)

    Manju Sree, Y.; Goli, Ravi kumar; Ramaiah, V.

    2017-08-01

    A hybrid generation is a part of large power system in which number of sources usually attached to a power electronic converter and loads are clustered can operate independent of the main power system. The protection scheme is crucial against faults based on traditional over current protection since there are adequate problems due to fault currents in the mode of operation. This paper adopts a new approach for detection, discrimination of the faults for multi terminal transmission line protection in presence of hybrid generation. Transient current based protection scheme is developed with discrete wavelet transform. Fault indices of all phase currents at all terminals are obtained by analyzing the detail coefficients of current signals using bior 1.5 mother wavelet. This scheme is tested for different types of faults and is found effective for detection and discrimination of fault with various fault inception angle and fault impedance.

  17. Collisionless stopping of electron current in an inhomogeneous ...

    Indian Academy of Sciences (India)

    Abstract. A brief review of a recent work on a novel collisionless scheme for stopping electron cur- rent pulse in plasma is presented. This scheme relies on the inhomogeneity of the plasma medium. This mechanism can be used for heating an overdense regime of plasma where lasers cannot pene- trate. The method can ...

  18. Simple and High-Accurate Schemes for Hyperbolic Conservation Laws

    Directory of Open Access Journals (Sweden)

    Renzhong Feng

    2014-01-01

    Full Text Available The paper constructs a class of simple high-accurate schemes (SHA schemes with third order approximation accuracy in both space and time to solve linear hyperbolic equations, using linear data reconstruction and Lax-Wendroff scheme. The schemes can be made even fourth order accurate with special choice of parameter. In order to avoid spurious oscillations in the vicinity of strong gradients, we make the SHA schemes total variation diminishing ones (TVD schemes for short by setting flux limiter in their numerical fluxes and then extend these schemes to solve nonlinear Burgers’ equation and Euler equations. The numerical examples show that these schemes give high order of accuracy and high resolution results. The advantages of these schemes are their simplicity and high order of accuracy.

  19. Reversibly Bistable Flexible Electronics

    KAUST Repository

    Alfaraj, Nasir

    2015-05-01

    Introducing the notion of transformational silicon electronics has paved the way for integrating various applications with silicon-based, modern, high-performance electronic circuits that are mechanically flexible and optically semitransparent. While maintaining large-scale production and prototyping rapidity, this flexible and translucent scheme demonstrates the potential to transform conventionally stiff electronic devices into thin and foldable ones without compromising long-term performance and reliability. In this work, we report on the fabrication and characterization of reversibly bistable flexible electronic switches that utilize flexible n-channel metal-oxide-semiconductor field-effect transistors. The transistors are fabricated initially on rigid (100) silicon substrates before they are peeled off. They can be used to control flexible batches of light-emitting diodes, demonstrating both the relative ease of scaling at minimum cost and maximum reliability and the feasibility of integration. The peeled-off silicon fabric is about 25 µm thick. The fabricated devices are transferred to a reversibly bistable flexible platform through which, for example, a flexible smartphone can be wrapped around a user’s wrist and can also be set back to its original mechanical position. Buckling and cyclic bending of such host platforms brings a completely new dimension to the development of flexible electronics, especially rollable displays.

  20. Transverse Hilbert schemes and completely integrable systems

    Directory of Open Access Journals (Sweden)

    Donin Niccolò Lora Lamia

    2017-12-01

    Full Text Available In this paper we consider a special class of completely integrable systems that arise as transverse Hilbert schemes of d points of a complex symplectic surface S projecting onto ℂ via a surjective map p which is a submersion outside a discrete subset of S. We explicitly endow the transverse Hilbert scheme Sp[d] with a symplectic form and an endomorphism A of its tangent space with 2-dimensional eigenspaces and such that its characteristic polynomial is the square of its minimum polynomial and show it has the maximal number of commuting Hamiltonians.We then provide the inverse construction, starting from a 2ddimensional holomorphic integrable system W which has an endomorphism A: TW → TW satisfying the above properties and recover our initial surface S with W ≌ Sp[d].

  1. A hybrid Lagrangian Voronoi-SPH scheme

    Science.gov (United States)

    Fernandez-Gutierrez, D.; Souto-Iglesias, A.; Zohdi, T. I.

    2017-11-01

    A hybrid Lagrangian Voronoi-SPH scheme, with an explicit weakly compressible formulation for both the Voronoi and SPH sub-domains, has been developed. The SPH discretization is substituted by Voronoi elements close to solid boundaries, where SPH consistency and boundary conditions implementation become problematic. A buffer zone to couple the dynamics of both sub-domains is used. This zone is formed by a set of particles where fields are interpolated taking into account SPH particles and Voronoi elements. A particle may move in or out of the buffer zone depending on its proximity to a solid boundary. The accuracy of the coupled scheme is discussed by means of a set of well-known verification benchmarks.

  2. Cryptanalysis of Two Fault Countermeasure Schemes

    DEFF Research Database (Denmark)

    Banik, Subhadeep; Bogdanov, Andrey

    2015-01-01

    is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...... use the internally generated random bits which make these designs vulnerable. We will outline attacks that cryptanalyze the above schemes using 66 and 512 faults respectively....... function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...

  3. Fixed Wordsize Implementation of Lifting Schemes

    Directory of Open Access Journals (Sweden)

    Tanja Karp

    2007-01-01

    Full Text Available We present a reversible nonlinear discrete wavelet transform with predefined fixed wordsize based on lifting schemes. Restricting the dynamic range of the wavelet domain coefficients due to a fixed wordsize may result in overflow. We show how this overflow has to be handled in order to maintain reversibility of the transform. We also perform an analysis on how large a wordsize of the wavelet coefficients is needed to perform optimal lossless and lossy compressions of images. The scheme is advantageous to well-known integer-to-integer transforms since the wordsize of adders and multipliers can be predefined and does not increase steadily. This also results in significant gains in hardware implementations.

  4. New communication schemes based on adaptive synchronization.

    Science.gov (United States)

    Yu, Wenwu; Cao, Jinde; Wong, Kwok-Wo; Lü, Jinhu

    2007-09-01

    In this paper, adaptive synchronization with unknown parameters is discussed for a unified chaotic system by using the Lyapunov method and the adaptive control approach. Some communication schemes, including chaotic masking, chaotic modulation, and chaotic shift key strategies, are then proposed based on the modified adaptive method. The transmitted signal is masked by chaotic signal or modulated into the system, which effectively blurs the constructed return map and can resist this return map attack. The driving system with unknown parameters and functions is almost completely unknown to the attackers, so it is more secure to apply this method into the communication. Finally, some simulation examples based on the proposed communication schemes and some cryptanalysis works are also given to verify the theoretical analysis in this paper.

  5. Optimization of Train Trip Package Operation Scheme

    Directory of Open Access Journals (Sweden)

    Lu Tong

    2015-01-01

    Full Text Available Train trip package transportation is an advanced form of railway freight transportation, realized by a specialized train which has fixed stations, fixed time, and fixed path. Train trip package transportation has lots of advantages, such as large volume, long distance, high speed, simple forms of organization, and high margin, so it has become the main way of railway freight transportation. This paper firstly analyzes the related factors of train trip package transportation from its organizational forms and characteristics. Then an optimization model for train trip package transportation is established to provide optimum operation schemes. The proposed model is solved by the genetic algorithm. At last, the paper tests the model on the basis of the data of 8 regions. The results show that the proposed method is feasible for solving operation scheme issues of train trip package.

  6. A numerical relativity scheme for cosmological simulations

    Science.gov (United States)

    Daverio, David; Dirian, Yves; Mitsou, Ermis

    2017-12-01

    Cosmological simulations involving the fully covariant gravitational dynamics may prove relevant in understanding relativistic/non-linear features and, therefore, in taking better advantage of the upcoming large scale structure survey data. We propose a new 3  +  1 integration scheme for general relativity in the case where the matter sector contains a minimally-coupled perfect fluid field. The original feature is that we completely eliminate the fluid components through the constraint equations, thus remaining with a set of unconstrained evolution equations for the rest of the fields. This procedure does not constrain the lapse function and shift vector, so it holds in arbitrary gauge and also works for arbitrary equation of state. An important advantage of this scheme is that it allows one to define and pass an adaptation of the robustness test to the cosmological context, at least in the case of pressureless perfect fluid matter, which is the relevant one for late-time cosmology.

  7. Optimizing multiplexing scheme in interferometric microscopy

    Science.gov (United States)

    Tayebi, Behnam; Jaferzadeh, Keyvan; Sharif, Farnaz; Han, Jae-Ho

    2016-08-01

    In single exposure off-axis interferometry, multiple information can be recorded by spatial frequency multiplexing. We investigate optimum conditions for designing 2D sampling schemes to record larger field of view in off-axis interferometry multiplexing. The spatial resolution of the recorded image is related to the numerical aperture of the system and sensor pixel size. The spatial resolution should preserve by avoiding crosstalk in the frequency domain. Furthermore, the field of view depends on the sensor size and magnification of the imaging system. In order to preserve resolution and have a larger field of view, the frequency domain should be designed correctly. The experimental results demonstrate that selecting the wrong geometrical scheme in frequency domain decrease the recorded image area.

  8. Exclusion from the Health Insurance Scheme

    CERN Multimedia

    2003-01-01

    A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635

  9. Toward a unified single-parameter extrapolation scheme for the correlation energy: Systems formed by atoms of hydrogen through neon

    Science.gov (United States)

    Pansini, F. N. N.; Varandas, A. J. C.

    2015-07-01

    A simple scheme is suggested to extrapolate the valence electron correlation to the one-electron complete-basis-set limit in species formed by atoms of hydrogen through neon. The performance of the novel scheme is benchmarked for the correlation energy with a data set of 106 systems and, for the polarizability, with 8 molecules. For the former, the results are excellent, most often better than when extrapolated with the best available two-parameter protocols. For the polarizability, they show an enhancement relative to the raw ab initio values, and good agreement with the experimental ones.

  10. METAPHORIC MECHANISMS IN IMAGE SCHEME DEVELOPMENT

    OpenAIRE

    Pankratova, S.A.

    2017-01-01

    Problems of knowledge representation by means of images are still cognitively significant and invariably modern. The article deals with the image heuristic potential of a bookish sphere as a donor of meanings, aiding metaphoric scheme development of another modern sphere of cinematography. The key factor here is the differentiation between two basically different metaphor types – heuristic epiphora and image diaphora. The author had offered a unique methodology of counting of quantitative par...

  11. [A scheme to support teenagers in care].

    Science.gov (United States)

    Maldera, David

    In some family situations, the placement of a teenager, even in the case of a court decision, proves ineffective. The accumulation of all kinds of difficulties requires a different type of support, based on responsiveness, attention and above all time to come together. A dedicated scheme helps to prevent situations of waywardness or marginalisation among these teenagers and to support the families. Copyright © 2017 Elsevier Masson SAS. All rights reserved.

  12. The Emergent Universe scheme and tunneling

    Energy Technology Data Exchange (ETDEWEB)

    Labraña, Pedro [Departamento de Física, Universidad del Bío-Bío, Avenida Collao 1202, Casilla 5-C, Concepción, Chile and Departament d' Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat (Spain)

    2014-07-23

    We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.

  13. Failure of a proposed superluminal scheme

    Science.gov (United States)

    Furuya, K.; Milonni, P. W.; Steinberg, A. M.; Wolinsky, M.

    1999-02-01

    We consider a “superluminal quantum Morse telegraph”, recently proposed by Garuccio, involving a polarization-correlated photon pair and a Michelson interferometer in which one of the mirrors is replaced by a phase-conjugating mirror (PCM). Superluminal information transfer in this scheme is precluded by the impossibility of distinguishing between unpolarized photons prepared by mixing linear polarization states or by mixing circular polarization states.

  14. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  15. A Scatter Storage Scheme for Dictionary Lookups

    Directory of Open Access Journals (Sweden)

    D. M. Murray

    1970-09-01

    Full Text Available Scatter storage schemes are examined with respect to their applicability to dictionary lookup procedures. Of particular interest are virtual scatter methods which combine the advantages of rapid search speed and reasonable storage requirements. The theoretical aspects of computing hash addresses are developed, and several algorithms are evaluated. Finally, experiments with an actual text lookup process are described, and a possible library application is discussed.

  16. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    one more than the total number of blocks or one more than `, whichever is less. min ( f s/bs, `) + 1 (4.10) 4.3.1 MAC-PDP For local data experiments, we...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS COST COMPARISON AMONG PROVABLE DATA POSSESSION SCHEMES by Stephen J. Bremer March 2016 Thesis...response, including the time for reviewing instruction, searching existing data sources, gathering and maintaining the data needed, and completing and

  17. A rational function based scheme for solving advection equation

    Energy Technology Data Exchange (ETDEWEB)

    Xiao, Feng [Gunma Univ., Kiryu (Japan). Faculty of Engineering; Yabe, Takashi

    1995-07-01

    A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author).

  18. Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme

    Directory of Open Access Journals (Sweden)

    Raman Kumar

    2014-01-01

    Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.

  19. A weak blind signature scheme based on quantum cryptography

    Science.gov (United States)

    Wen, Xiaojun; Niu, Xiamu; Ji, Liping; Tian, Yuan

    2009-02-01

    In this paper, we present a weak blind signature scheme based on the correlation of EPR (Einstein-Padolsky-Rosen) pairs. Different from classical blind signature schemes and current quantum signature schemes, our quantum blind signature scheme could guarantee not only the unconditionally security but also the anonymity of the message owner. To achieve that, quantum key distribution and one-time pad are adopted in our scheme. Experimental analysis proved that our scheme have the characteristics of non-counterfeit, non-disavowal, blindness and traceability. It has a wide application to E-payment system, E-government, E-business, and etc.

  20. Fractal-based image sequence compression scheme

    Science.gov (United States)

    Li, Haibo; Novak, Mirek; Forchheimer, Robert

    1993-07-01

    The dominant image transformation used in the existing fractal coding schemes is the affine function. Although an affine transformation is easy to compute and understand, its linear approximation ability limits the employment of larger range blocks, that is, it limits further improvement in compression efficiency. We generalize the image transformation from the usual affine form to the more general quadratic form, and provide theoretical requirements for the generalized transformation to be contractive. Based on the self-transformation system (STS) model, an image sequence coding scheme--fractal-based image sequence coding--is proposed. In this coding scheme, our generalized transformation is used to model the self- transformation is used to model the self-transformation from the domain block to its range blocks. Experimental results on a real image sequence show that for the same size of blocks, the SNR can be improved by 10 dB, or, for the same SNR of the decoded image sequence, the compression ratio is raised twofold when the new generalized transformation is used to replace the usual affine transformation. In addition, due to the utilization of the STS model, the computational complexity is only linearly related to the size of the 3-D blocks. This provides for fast encoding and decoding.

  1. Doppler Shift Compensation Schemes in VANETs

    Directory of Open Access Journals (Sweden)

    F. Nyongesa

    2015-01-01

    Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.

  2. Progress on Implementing Additional Physics Schemes into ...

    Science.gov (United States)

    The U.S. Environmental Protection Agency (USEPA) has a team of scientists developing a next generation air quality modeling system employing the Model for Prediction Across Scales – Atmosphere (MPAS-A) as its meteorological foundation. Several preferred physics schemes and options available in the Weather Research and Forecasting (WRF) model are regularly used by the USEPA with the Community Multiscale Air Quality (CMAQ) model to conduct retrospective air quality simulations. These include the Pleim surface layer, the Pleim-Xiu (PX) land surface model with fractional land use for a 40-class National Land Cover Database (NLCD40), the Asymmetric Convective Model 2 (ACM2) planetary boundary layer scheme, the Kain-Fritsch (KF) convective parameterization with subgrid-scale cloud feedback to the radiation schemes and a scale-aware convective time scale, and analysis nudging four-dimensional data assimilation (FDDA). All of these physics modules and options have already been implemented by the USEPA into MPAS-A v4.0, tested, and evaluated (please see the presentations of R. Gilliam and R. Bullock at this workshop). Since the release of MPAS v5.1 in May 2017, work has been under way to implement these preferred physics options into the MPAS-A v5.1 code. Test simulations of a summer month are being conducted on a global variable resolution mesh with the higher resolution cells centered over the contiguous United States. Driving fields for the FDDA and soil nudging are

  3. INFORMATION FROM THE CERN HEALTH INSURANCE SCHEME

    CERN Multimedia

    Tel : 7-3635

    2002-01-01

    Please note that, from 1 July 2002, the tariff agreement between CERN and the Hôpital de la Tour will no longer be in force. As a result the members of the CERN Health Insurance Scheme will no longer obtain a 5% discount for quick payment of bills. More information on the termination of the agreement and the implications for our Health Insurance Scheme will be provided in the next issue of the CHIS Bull', due for publication in the first half of July. It will be sent to your home address, so, if you have moved recently, please check that your divisional secretariat has your current address. Tel.: 73635 The Organization's Health Insurance Scheme (CHIS) has launched its own Web pages, located on the Website of the Social & Statutory Conditions Group of HR Division (HR-SOC). The address is short and easy-to-remember www.cern.ch/chis The pages currently available concentrate on providing basic information. Over the coming months it is planned to fill out the details and introduce new topics. Please give us ...

  4. Dynamical decoupling schemes derived from Hamilton cycles

    Science.gov (United States)

    Rötteler, Martin

    2008-04-01

    We address the problem of decoupling the interactions in a spin network governed by a pair-interaction Hamiltonian. Combinatorial schemes for decoupling and for manipulating the couplings of Hamiltonians have been developed, which use selective pulses. In this paper, we consider an additional requirement on these pulse sequences: as few different control operations as possible should be used. This requirement is motivated by the fact that to find an optimal implementation of each individual selective pulse will be expensive since it requires to solve a pulse shaping problem. Hence, it is desirable to use as few different selective pulses as possible. As a first result, we show that for d-dimensional systems, where d ⩾2, the ability to implement only two control operations is sufficient to turn off the time evolution. Next, we address the case of a bipartite system with local control and show that four different control operations are sufficient. Finally, turning to networks consisting of several d-dimensional nodes, we show that decoupling can be achieved if one is able to control a number of different control operations, which is logarithmic in the number of nodes. We give an explicit family of efficient decoupling schemes with logarithmic number of different pulses based on the classic Hamming codes. We also provide a table of the best known decoupling schemes for small networks of qubits.

  5. Entanglement distribution schemes employing coherent photon-to-spin conversion in semiconductor quantum dot circuits

    Science.gov (United States)

    Gaudreau, Louis; Bogan, Alex; Korkusinski, Marek; Studenikin, Sergei; Austing, D. Guy; Sachrajda, Andrew S.

    2017-09-01

    Long distance entanglement distribution is an important problem for quantum information technologies to solve. Current optical schemes are known to have fundamental limitations. A coherent photon-to-spin interface built with quantum dots (QDs) in a direct bandgap semiconductor can provide a solution for efficient entanglement distribution. QD circuits offer integrated spin processing for full Bell state measurement (BSM) analysis and spin quantum memory. Crucially the photo-generated spins can be heralded by non-destructive charge detection techniques. We review current schemes to transfer a polarization-encoded state or a time-bin-encoded state of a photon to the state of a spin in a QD. The spin may be that of an electron or that of a hole. We describe adaptations of the original schemes to employ heavy holes which have a number of attractive properties including a g-factor that is tunable to zero for QDs in an appropriately oriented external magnetic field. We also introduce simple throughput scaling models to demonstrate the potential performance advantage of full BSM capability in a QD scheme, even when the quantum memory is imperfect, over optical schemes relying on linear optical elements and ensemble quantum memories.

  6. A time driven readout scheme for PET and CT using APDs and SiPMs

    CERN Document Server

    Powolny, F; Brunner, S; Condorelli, G; Despeisse, M; Fallica, G; Hillemanns, H; Jarron, P; Kluge, A; Lecoq, P; Mazzillo, M; Meyer, T C; Morel, M; Sanfillipo, D; Valvo, G

    2010-01-01

    In this paper we present the time-driven readout scheme for photodetectors in the domain of PET/CT applications. In our first test period as partner of the BioCare Consortium supported by the European Commission's FP6 framework program, we put emphasis on a scheme to be used with a LSO-APD detector suitable for both CT and PET, using exclusively electronics circuits developed for the LHC program at CERN. Compared to standard PMT-based systems, the proposed time-based readout method together with CERN ASICs produced comparable performance in terms of energy resolution, i.e. 15% FWHM, but had a markedly inferior timing response of 1.6 ns FWHM in a dual APD system. This is not attributed to the readout scheme itself but to crystal-inherent photon statistics and insufficient photodetector gain of the APDs. However, in our new follow-up test program employing the same electronics and readout scheme, silicon photomultipliers (SiPMs) replacing the previously used APDs showed excellent timing behavior of 420 and 235 ...

  7. Uncertainty of Microphysics Schemes in CRMs

    Science.gov (United States)

    Tao, W. K.; van den Heever, S. C.; Wu, D.; Saleeby, S. M.; Lang, S. E.

    2015-12-01

    Microphysics is the framework through which to understand the links between interactive aerosol, cloud and precipitation processes. These processes play a critical role in the water and energy cycle. CRMs with advanced microphysics schemes have been used to study the interaction between aerosol, cloud and precipitation processes at high resolution. But, there are still many uncertainties associated with these microphysics schemes. This has arisen, in part, from the fact microphysical processes cannot be measured directly; instead, cloud properties, which can be measured, are and have been used to validate model results. The utilization of current and future global high-resolution models is rapidly increasing and are at what has been traditional CRM resolutions and are using microphysics schemes that were developed in traditional CRMs. A potential NASA satellite mission called the Cloud and Precipitation Processes Mission (CaPPM) is currently being planned for submission to the NASA Earth Science Decadal Survey. This mission could provide the necessary global estimates of cloud and precipitation properties with which to evaluate and improve dynamical and microphysical parameterizations and the feedbacks. In order to facilitate the development of this mission, CRM simulations have been conducted to identify microphysical processes responsible for the greatest uncertainties in CRMs. In this talk, we will present results from numerical simulations conducted using two CRMs (NU-WRF and RAMS) with different dynamics, radiation, land surface and microphysics schemes. Specifically, we will conduct sensitivity tests to examine the uncertainty of the some of the key ice processes (i.e. riming, melting, freezing and shedding) in these two-microphysics schemes. The idea is to quantify how these two different models' respond (surface rainfall and its intensity, strength of cloud drafts, LWP/IWP, convective-stratiform-anvil area distribution) to changes of these key ice

  8. Ultrafast free electron quantum optics

    Science.gov (United States)

    Becker, Maria Gabriel

    Free electron quantum optics is an emerging sub-field of physics that uses laser light, often in combination with nano-structures, to manipulate electrons in free space. Integration of femtosecond lasers into this technology is facilitating the move of free electron quantum optics into the ultrafast regime. A vision for this technology is ultrahigh temporal resolution in free electron time-of-flight experiments. Such a system would make fundamental physics studies involving small forces accessible that are not feasible with current technology. Realization of this vision will require an ultrafast source and an ultrafast detection scheme. Tungsten nano-tip sources capable of generating sub-100 fs electron pulses are already in use in our lab. Elsewhere, this type of source has been reported to emit on a sub-cycle timescale. Following up on a proposed scheme for observing sub-cycle emission, a two-color interferometer has been built and pump-probe electron emission measurements have been performed. Other efforts to develop ultrafast sources have involved implementing additional control parameters. GaAs has been investigated as a possible ultrafast source of spin-polarized electrons, and tungsten nano-tips have been modified with an ion beam to create a double tip source. Spin control and transverse separation control are expected to make studies of Pauli degeneracy pressure possible. The temporal resolution of current electronic particle detectors is ~1 ns. Schemes involving the interaction of laser pulses with nanostructures could improve this resolution by several orders of magnitude. As a first step towards a femtosecond electron switch, the temporal resolution of a nano-fabricated plasmonic antenna has been measured in a femtosecond pump-probe experiment. The possibility of an ultrafast diffraction switch has also been analyzed for nonrelativistic and relativistic electrons. In an application of a free electron time-of-flight system, the prediction of

  9. Collective accelerator for electron colliders

    Energy Technology Data Exchange (ETDEWEB)

    Briggs, R.J.

    1985-05-13

    A recent concept for collective acceleration and focusing of a high energy electron bunch is discussed, in the context of its possible applicability to large linear colliders in the TeV range. The scheme can be considered to be a member of the general class of two-beam accelerators, where a high current, low voltage beam produces the acceleration fields for a trailing high energy bunch.

  10. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  11. A New Adaptive Hungarian Mating Scheme in Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chanju Jung

    2016-01-01

    Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.

  12. 7 CFR 400.458 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... AGRICULTURE GENERAL ADMINISTRATIVE REGULATIONS Administrative Remedies for Non-Compliance § 400.458 Scheme or... material scheme or device to obtain catastrophic risk protection, other plans of insurance coverage, or...

  13. EDITORIAL: Synaptic electronics Synaptic electronics

    Science.gov (United States)

    Demming, Anna; Gimzewski, James K.; Vuillaume, Dominique

    2013-09-01

    neuromorphic circuit composed of a nanoscale 1-kbit resistive random-access memory (RRAM) cross-point array of synapses and complementary metal-oxide-semiconductor (CMOS) neuron circuits [13]; a WO3-x-based nanoionics device from Masakazu Aono's group with a wide scale of reprogrammable memorization functions [14]; a new spike-timing dependent plasticity scheme based on a MOS transistor as a selector and a RRAM as a variable resistance device [15]; a new hybrid memristor-CMOS neuromorphic circuit [16]; and a photo-assisted atomic switch [17]. Synaptic electronics evidently has many emerging facets, and Duygu Kuzum, Shimeng Yu, and H-S Philip Wong in the US provide a review of the field, including the materials, devices and applications [18]. In embracing the expertise acquired over thousands of years of evolution, biomimetics and bio-inspired design is a common, smart approach to technological innovation. Yet in successfully mimicking the physiological mechanisms of the human mind synaptic electronics research has a potential impact that is arguably unprecedented. That the quirks and eccentricities recently unearthed in the behaviour of nanomaterials should lend themselves so accommodatingly to emulating synaptic functions promises some very exciting developments in the field, as the articles in this special issue emphasize. References [1] von Neumann J (ed) 2012 The Computer and the Brain 3rd edn (Yale: Yale University Press) [2] Strukov D B, Snider G S, Stewart D R and Williams R S 2008 The missing memristor found Nature 453 80-3 [3] Chua L O 1971 Memristor—the missing circuit element IEEE Trans. Circuit Theory 18 507-19 [4] Chua L O 2013 Memristor, Hodgkin-Huxley, and Edge of Chaos Nanotechnology 24 383001 [5] Pickett M D and Williams R S 2013 Phase transitions enable computational universality in neuristor-based cellular automata Nanotechnology 24 384002 [6] Cruz-Albrecht J M, Derosier T and Srinivasa N 2013 Scalable neural chip with synaptic electronics using CMOS

  14. Scanning schemes in white light photoelasticity - Part II: Novel fringe resolution guided scanning scheme

    Science.gov (United States)

    Ramakrishnan, Vivek; Ramesh, K.

    2017-05-01

    Varied spatial resolution of isochromatic fringes over the domain influences the accuracy of fringe order estimation using TFP/RGB photoelasticity. This has been brought out in the first part of the work. The existing scanning schemes do not take this into account, which leads to the propagation of noise from the low spatial resolution zones. In this paper, a method is proposed for creating a whole field map which represents the spatial resolution of the isochromatic fringe pattern. A novel scanning scheme is then proposed whose progression is guided by the spatial resolution of the fringes in the isochromatic image. The efficacy of the scanning scheme is demonstrated using three problems - an inclined crack under bi-axial loading, a thick ring subjected to internal pressure and a stress frozen specimen of an aerospace component. The proposed scheme has use in a range of applications. The scanning scheme is effective even if the model has random zones of noise which is demonstrated using a plate subjected to concentrated load. This aspect is well utilised to extract fringe data from thin slices cut from a stereo-lithographic model that has characteristic random noise due to layered manufacturing.

  15. A Fuzzy Commitment Scheme with McEliece's Cipher

    Directory of Open Access Journals (Sweden)

    Deo Brat Ojha

    2010-04-01

    Full Text Available In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one of the interesting candidates for post quantum cryptography. Hence our interest to deal with this system with fuzzy commitment scheme. The concept itself is illustrated with the help of a simple situation and the validation of mathematical experimental verification is provided.

  16. Fullerene Derived Molecular Electronic Devices

    Science.gov (United States)

    Menon, Madhu; Srivastava, Deepak; Saini, Subbash

    1998-01-01

    The carbon Nanotube junctions have recently emerged as excellent candidates for use as the building blocks in the formation of nanoscale electronic devices. While the simple joint of two dissimilar tubes can be generated by the introduction of a pair of heptagon-pentagon defects in an otherwise perfect hexagonal grapheme sheet, more complex joints require other mechanisms. In this work we explore structural and electronic properties of complex 3-point junctions of carbon nanotubes using a generalized tight-binding molecular-dynamics scheme.

  17. Blue and white phosphorescent organic light emitting diode performance improvement by confining electrons and holes inside double emitting layers

    Energy Technology Data Exchange (ETDEWEB)

    Tsai, Yu-Sheng; Hong, Lin-Ann; Juang, Fuh-Shyang; Chen, Cheng-Yin

    2014-09-15

    In this research, complex emitting layers (EML) were fabricated using TCTA doping hole-transport material in the front half of a bipolar 26DCzPPy as well as PPT doping electron-transport material in the back half of 26DCzPPy. Blue dopant FIrpic was also mixed inside the complex emitting layer to produce a highly efficient blue phosphorescent organic light emitting diode (OLED). The hole and electron injection and carrier recombination rate were effectively increased. The fabricated complex emitting layers exhibited current efficiency of 42 cd/A and power efficiency of 30 lm/W when the luminance was 1000 cd/m{sup 2}, driving voltage was 4.4 V, and current density was 2.4 mA/cm{sup 2}. A white OLED component was then manufactured by doping red dopant [Os(bpftz){sub 2}(PPh{sub 2}Me){sub 2}] (Os) in proper locations. When the Os dopant was doped in between the complex emitting layers, excitons were effectively confined within, increasing the recombination rate and therefore reducing the color shift. The resulting Commission Internationale de L’Eclairage (CIE) coordinates shifted from 4 to 10 V is (Δx=−0.04, Δy=+0.01). The component had a current efficiency of 35.7 cd/A, a power efficiency of 24 lm/W, driving voltage of 4.6 V and a CIE{sub x,y} of (0.31,0.35) at a luminance of 1000 cd/m{sup 2}, with a maximum luminance of 15,600 cd/m{sup 2} at 10 V. Attaching an outcoupling enhancement film was applied to increase the luminance efficiency to 30 lm/W. - Highlights: • Used the complex double emitting layers. • Respectively doped hole and electron transport material in the bipolar host. • Electrons and holes are effectively confined within EMLs to produce excitons.

  18. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    The point of contention in this case was whether the illegality of the business of the scheme was a relevant consideration in determining whether the pay-outs were made in the ordinary course of business of the scheme. This paper discusses pyramid schemes in the context of impeachable dispositions in terms of the ...

  19. a comparative study of prioritized handoff schemes with guard

    African Journals Online (AJOL)

    eobe

    A COMPARATIVE STUDY OF PRIORITIZED HANDOFF SCHEMES WITH GUARD CHANNELS IN WIRELESS NETWORKS. D. U. Onyishi. D. U. Onyishi, et al. Nigerian Journal of Technology. Vol. 34, No. 3, July 2015 600 application of resource allocation schemes.This gives precedence to handoff calls. Such schemes ...

  20. Matters of Coercion-Resistance in Cryptographic Voting Schemes

    OpenAIRE

    Kempka, Carmen

    2014-01-01

    This work addresses coercion-resistance in cryptographic voting schemes. It focuses on three particularly challenging cases: write-in candidates, internet elections and delegated voting. Furthermore, this work presents a taxonomy for analyzing and comparing a huge variety of voting schemes, and presents practical experiences with the voting scheme Bingo Voting.

  1. Efficient rate control scheme using modified inter-layer dependency ...

    Indian Academy of Sciences (India)

    In this paper, a spatial-resolutionratio-based MB mode decision scheme is proposed for spatially enhanced layers. The scheme uses the motion estimated at the base layer, to encode the respective MBs in the enhancement layers. The spatial–temporalsearch schemes at the enhancement layers are used to derive motion ...

  2. 7 CFR 623.21 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 623.21 Section 623.21 Agriculture... AGRICULTURE WATER RESOURCES EMERGENCY WETLANDS RESERVE PROGRAM § 623.21 Scheme and device. (a) If it is determined by NRCS that a landowner has employed a scheme or device to defeat the purposes of this part, any...

  3. 7 CFR 1421.305 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1421.305... scheme or device. (a) A producer shall be ineligible to receive payments under this subpart if it is determined by DAFP, the State committee, or the county committee to have: (1) Adopted any scheme or device...

  4. 7 CFR 1430.310 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.310... Disaster Assistance Payment Program § 1430.310 Misrepresentation and scheme or device. (a) In addition to... assistance under this program if the producer is determined by FSA or CCC to have: (1) Adopted any scheme or...

  5. 7 CFR 795.17 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Scheme or device. 795.17 Section 795.17 Agriculture... PROVISIONS COMMON TO MORE THAN ONE PROGRAM PAYMENT LIMITATION General § 795.17 Scheme or device. All or any... person adopts or participates in adopting any scheme or device designed to evade or which has the effect...

  6. 7 CFR 760.819 - Misrepresentation, scheme, or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 760.819 Section....819 Misrepresentation, scheme, or device. (a) A person is ineligible to receive assistance under this part if it is determined that such person has: (1) Adopted any scheme or device that tends to defeat...

  7. 7 CFR 784.9 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 784.9 Section... Misrepresentation and scheme or device. (a) A sheep and lamb operation shall be ineligible to receive assistance...) Adopted any scheme or device that tends to defeat the purpose of this program; (2) Made any fraudulent...

  8. 7 CFR 636.14 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 636.14 Section....14 Misrepresentation and scheme or device. (a) A participant who is determined to have erroneously... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  9. Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme

    Science.gov (United States)

    Ingvarson, Lawrence

    2009-01-01

    The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…

  10. 7 CFR 1470.36 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1470.36... General Administration § 1470.36 Misrepresentation and scheme or device. (a) If NRCS determines that an... to have: (1) Adopted any scheme or device that tends to defeat the purpose of the program; (2) Made...

  11. 7 CFR 1430.610 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.610... Disaster Assistance Payment Program II (DDAP-II) § 1430.610 Misrepresentation and scheme or device. (a) In... receive assistance under this program if the producer is determined by CCC to have: (1) Adopted any scheme...

  12. 7 CFR 786.110 - Misrepresentation, scheme, or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation, scheme, or device. 786.110 Section... Misrepresentation, scheme, or device. (a) In addition to other penalties, sanctions, or remedies that may apply, a... FSA to have: (1) Adopted any scheme or device that tends to defeat the purpose of this program, (2...

  13. 7 CFR 1430.220 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.220... Contract Program § 1430.220 Misrepresentation and scheme or device. (a) A dairy operation shall be ineligible for the MILC program if FSA determines that it knowingly: (1) Adopted a scheme or device that...

  14. 7 CFR 1415.20 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1415.20 Section 1415.20 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS GRASSLANDS RESERVE PROGRAM § 1415.20 Scheme or device. (a) If it is determined by USDA that a participant has employed a scheme or device to defeat the purposes...

  15. 7 CFR 760.109 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 760.109... Agricultural Disaster Assistance Programs § 760.109 Misrepresentation and scheme or device. (a) A participant... in accordance with this part, or otherwise used a scheme or device with the intent to receive...

  16. 7 CFR 1463.110 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1463.110... PROGRAM Tobacco Transition Payment Program § 1463.110 Misrepresentation and scheme or device. A person... program determination made in accordance with this subpart; (b) Adopted any scheme or device that tends to...

  17. 7 CFR 633.18 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 633.18 Section 633.18 Agriculture... AGRICULTURE LONG TERM CONTRACTING WATER BANK PROGRAM § 633.18 Scheme and device. (a) If it is determined by the NRCS that a person has employed a scheme or device to defeat the purposes of this part, any part...

  18. 7 CFR 1430.507 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1430.507... Assistance Program § 1430.507 Misrepresentation and scheme or device. (a) A dairy operation shall be... committee to have: (1) Adopted any scheme or device which tends to defeat the purpose of this program; (2...

  19. 7 CFR 1469.36 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1469.36... General Administration § 1469.36 Misrepresentation and scheme or device. (a) If the Department determines... who is determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the purpose...

  20. 7 CFR 760.1310 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 7 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 760.1310... Program § 760.1310 Misrepresentation and scheme or device. (a) In addition to other penalties, sanctions... this subpart if the producer or operation is determined by FSA to have: (1) Adopted any scheme or...

  1. 7 CFR 625.19 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 6 2010-01-01 2010-01-01 false Scheme and device. 625.19 Section 625.19 Agriculture... AGRICULTURE WATER RESOURCES HEALTHY FORESTS RESERVE PROGRAM § 625.19 Scheme and device. (a) If it is determined by NRCS that a person has employed a scheme or device to defeat the purposes of this part, any...

  2. 7 CFR 1465.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1465.35... ASSISTANCE General Administration § 1465.35 Misrepresentation and scheme or device. (a) A participant who is... they are determined to have knowingly: (1) Adopted any scheme or device that tends to defeat the...

  3. 7 CFR 1467.19 - Scheme and device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme and device. 1467.19 Section 1467.19... OF AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS WETLANDS RESERVE PROGRAM § 1467.19 Scheme and device. (a) If it is determined by the NRCS that a participant has employed a scheme or device to defeat...

  4. 7 CFR 1468.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1468.35... Administration § 1468.35 Misrepresentation and scheme or device. (a) A participant who is determined to have... knowingly adopted any scheme or device that tends to defeat the purpose of the program; made any fraudulent...

  5. 7 CFR 1410.60 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1410.60 Section 1410.60 Agriculture... AGRICULTURE LOANS, PURCHASES, AND OTHER OPERATIONS CONSERVATION RESERVE PROGRAM § 1410.60 Scheme or device. (a) If CCC determines that a person has employed a scheme or device to defeat the purposes of this part...

  6. 7 CFR 1424.13 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1424.13... Misrepresentation and scheme or device. (a) A producer shall be ineligible to receive payments under this program if CCC determines the producer: (1) Adopted any scheme or device that tends to defeat the purpose of the...

  7. 7 CFR 1466.35 - Misrepresentation and scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Misrepresentation and scheme or device. 1466.35... PROGRAM General Administration § 1466.35 Misrepresentation and scheme or device. (a) A person, joint.... (b) A producer who is determined to have knowingly: (1) Adopted any scheme or device that tends to...

  8. 7 CFR 1491.32 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 10 2010-01-01 2010-01-01 false Scheme or device. 1491.32 Section 1491.32 Agriculture... Administration § 1491.32 Scheme or device. (a) If it is determined by the NRCS that a cooperating entity has employed a scheme or device to defeat the purposes of this part, any part of any program payment otherwise...

  9. Nigeria's National Health Insurance Scheme: a critical reappraisal ...

    African Journals Online (AJOL)

    For well over four decades, the National Health Insurance Scheme (NHIS) remained on the drawing board. It is now a little over half a decade since the actual commencement of the implementation of the scheme. This review, therefore, chronicles the historical background to the introduction of the scheme, highlighting the ...

  10. On the strong monotonicity of the CABARET scheme

    Science.gov (United States)

    Ostapenko, V. V.

    2012-03-01

    The strong monotonicity of the CABARET scheme with single flux correction is analyzed as applied to the linear advection equation. It is shown that the scheme is strongly monotone (has the NED property) at Courant numbers r ∈ (0,0,5), for which it is monotone. Test computations illustrating this property of the CABARET scheme are presented.

  11. A dynamic digital signature scheme without third parties

    NARCIS (Netherlands)

    Van Elsas, M.; Van der Lubbe, J.C.A.; Weber, J.H.

    2015-01-01

    We propose a digital signature scheme for dynamic coalitions. Particularly, we enable members to join and leave. Our scheme does not need trusted or oblivious third parties (TTPs or OTPs). In this distributed scheme there is a changing secret group key dependent on the members in the group. Each

  12. An Annotation Scheme for Social Interaction in Digital Playgrounds

    NARCIS (Netherlands)

    Moreno Celleri, Alejandro Manuel; van Delden, Robertus Wilhelmus; Reidsma, Dennis; Poppe, Ronald Walter; Heylen, Dirk K.J.; Herrlich, Marc; Malaka, Rainer; Masuch, Maic

    This paper introduces a new annotation scheme, designed specifically to study children's social interactions during play in digital playgrounds. The scheme is motivated by analyzing relevant literature, combined with observations from recordings of play sessions. The scheme allows us to analyze how

  13. Fissioned Triangular Schemes Via the Cross-Ratio

    NARCIS (Netherlands)

    van Dam, E.R.; de Caen, D.

    1999-01-01

    A construction of association schemes is presented; these are fission schemes of the triangular schemes T(n) where n=q + 1with q any prime power. The key observation is quite elementary, being that the natural action of PGL(2,q) on the 2-element subsets of the projective line PG(1,q) is generously

  14. A combined spectrum sensing and OFDM demodulation scheme

    NARCIS (Netherlands)

    Heskamp, M.; Slump, Cornelis H.

    2009-01-01

    In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation

  15. throughput analysis of arq schemes using state transition diagrams

    African Journals Online (AJOL)

    User

    ST2) scheme having variable selective repeat mode retransmissions and the Selective Repeat-Stutter-Go Back N (SR-ST-GBN) scheme having variable stutter mode retransmissions. Using the SR-ST-GBN scheme, it is also shown that it is pos-.

  16. Throughput Analysis of Arq Schemes Using State Transition Diagrams

    African Journals Online (AJOL)

    ST2) scheme having variable selective repeat mode retransmissions and the Selective Repeat-Stutter-Go Back N (SR-ST-GBN) scheme having variable stutter mode retransmissions. Using the SR-ST-GBN scheme, it is also shown that it is ...

  17. Forgery attack to Kang-Tang digital signature scheme

    Science.gov (United States)

    Fang, Jie; Guo, Yongning; Liu, Chenglian

    2014-10-01

    In 2006, Kang and Tang proposed a digital signature scheme without hash functions and message redundancy. They claimed their scheme are more efficient in computation and communication for small device. In this paper, we will point out an new attack to certain the Kang-Tang scheme is insecure.

  18. Universal programmable quantum circuit schemes to emulate an operator.

    Science.gov (United States)

    Daskin, Anmer; Grama, Ananth; Kollias, Giorgos; Kais, Sabre

    2012-12-21

    Unlike fixed designs, programmable circuit designs support an infinite number of operators. The functionality of a programmable circuit can be altered by simply changing the angle values of the rotation gates in the circuit. Here, we present a new quantum circuit design technique resulting in two general programmable circuit schemes. The circuit schemes can be used to simulate any given operator by setting the angle values in the circuit. This provides a fixed circuit design whose angles are determined from the elements of the given matrix-which can be non-unitary-in an efficient way. We also give both the classical and quantum complexity analysis for these circuits and show that the circuits require a few classical computations. For the electronic structure simulation on a quantum computer, one has to perform the following steps: prepare the initial wave function of the system; present the evolution operator U = e(-iHt) for a given atomic and molecular Hamiltonian H in terms of quantum gates array and apply the phase estimation algorithm to find the energy eigenvalues. Thus, in the circuit model of quantum computing for quantum chemistry, a crucial step is presenting the evolution operator for the atomic and molecular Hamiltonians in terms of quantum gate arrays. Since the presented circuit designs are independent from the matrix decomposition techniques and the global optimization processes used to find quantum circuits for a given operator, high accuracy simulations can be done for the unitary propagators of molecular Hamiltonians on quantum computers. As an example, we show how to build the circuit design for the hydrogen molecule.

  19. Dynamics of iterative schemes for quadratic polynomial

    Science.gov (United States)

    Goyal, Komal; Prasad, Bhagwati

    2017-10-01

    Most of the fractals are generated by applying a map recursively to an initial point or a set of the space such as complex plane. An orbit of a point is a sequence of iteratively obtained points from it and the orbit is said to be diverging when its points grow unbounded. A set of all the points whose orbits are not diverging may be termed as a fractal. The fractal dynamics of the orbits depends on the rule of iteration also. In this paper, we study the dynamics of iterations for a number of iterative schemes. The results regarding the escape criteria for quadratic complex polynomials under various iteration procedures are established.

  20. Rural poverty reduction through centrally sponsored schemes.

    Science.gov (United States)

    Saxena, N C

    2007-10-01

    This paper discusses the evolving profile of poverty in India and reviews the national performance of selected anti-poverty programmes between 1997-1998 and 2005. For each programme, it outlines the budgetary allocation principle used for the States and districts and analyzes budgetary performance over the period. The main objective is to explore the extent to which the anti-poverty programmes are reaching their target groups effectively. Finally, it identifies the specific factors responsible for under-performance and provides a set of recommendations for policy makers and programme implementers which could help improve the outcomes of the schemes.

  1. New Financing Schemes of Public Infrastructure

    Directory of Open Access Journals (Sweden)

    Ignacio de la Riva

    2017-01-01

    Full Text Available Public works procurements and concessions are traditional legal techniques used to shape the financing of public infrastructure. Fiscal constraints faced by public administrations at the end of the 20th century, and the subsequent increase of private participation in the provision of public goods and services, encouraged the development of new legal schemes allowing a higher degree of private investment in public infrastructure; such as Public Private Partnerships, project finance, securitizations, the shadow toll, turn-key agreements, public leasing and public trusts.

  2. A Ponzi scheme exposed to volatile markets

    OpenAIRE

    Parodi, Bernhard R.

    2014-01-01

    The PGBM model for a couple of counteracting, exponentially growing capital flows is presented: the available capital stock X(t) evolves according to a variant of inhomogeneous geometric Brownian motion (GBM) with time-dependent drift, in particular, to the stochastic differential equation dX(t)=[pX(t) + rho1*exp(q1*t)+rho2*exp(q2*t)]dt + sigma*X(t)*dW(t), where W(t) is a Wiener process. As a paragon, we study a continuous-time model for a nine-parameter Ponzi scheme with an exponentially gro...

  3. Pay-what-you-want pricing schemes

    DEFF Research Database (Denmark)

    Kahsay, Goytom Abraha; Samahita, Margaret

    2015-01-01

    Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular. We develop a model incorporating self-image into the buyer’s utility function and introduce heterogeneity in consumption utility and image-sensitivity, generating different purchase decisions and optimal prices across...... individuals. When a good’s fixed price is lower than a threshold fair value, PWYW can lead to a lower utility. This may result in a lower purchase rate and higher average price, accounting for previously unexplained field experimental evidence. An increase in the threshold value decreases the buyer’s utility...... and may further lower the purchase rate, resulting in a further increase in purchase price....

  4. A Distributed Quaternary Turbo Coded Cooperative Scheme

    Directory of Open Access Journals (Sweden)

    BALDINI FILHO, R.

    2014-12-01

    Full Text Available Cooperative communications achieve MIMO-like diversity gains by introducing a relay that creates an independent faded path between the source and the destination. Coded cooperation integrates cooperation with channel coding in order to increase the bit error rate (BER performance of cooperative communications. Turbo codewords can be built efficiently at the destination using encoded portions of the information sent by the source and the relay. This paper presents a distributed turbo cooperative coding scheme that utilizes convolutional codes defined over the finite ring of integers Z4 that performs better than its equivalent binary counterparts.

  5. ATLAS PhD Grant Scheme

    CERN Multimedia

    2016-01-01

    In this #CERNandSociety video, the 3 PhD students, awarded the ATLAS PhD Grant in 2015, talk about their research work within the ATLAS Collaboration and how this experience has shaped their future. Find out more about the ATLAS PhD Grant Scheme: cern.ch/ATLASPhDGrant This programme is just one of the many #CERNandSociety projects at CERN. Find out more and how you can be involved: http://cern.ch/go/pBt7

  6. Electron Microscopy.

    Science.gov (United States)

    Beer, Michael

    1980-01-01

    Reviews technical aspects of structure determination in biological electron microscopy (EM). Discusses low dose EM, low temperature microscopy, electron energy loss spectra, determination of mass or molecular weight, and EM of labeled systems. Cites 34 references. (CS)

  7. Energy Saving in Three-Phase Diode Rectifiers Using EI Technique with Adjustable Switching Frequency Scheme

    DEFF Research Database (Denmark)

    Davari, Pooya; Zare, Firuz; Yang, Yongheng

    2016-01-01

    A front-end rectifier can significantly impact a power electronics system performance and efficiency for applications such as motor drive where the system commonly operates under partial loading conditions. This paper proposes an adjustable switching frequency scheme using an electronic inductor...... technique to improve the energy saving of the system operating at partial loading. In the proposed solution, the switching frequency is adjusted based on the loading conditions, and thus maintains the system performance both in terms of switching losses and harmonic distortion. The obtained simulation...

  8. Electronic Commerce

    OpenAIRE

    Slavko Đerić

    2016-01-01

    Electronic commerce can be defined in different ways. Any definition helps to understand and explain that concept as better as possible.. Electronic commerce is a set of procedures and technologies that automate the tasks of financial transactions using electronic means. Also, according to some authors, electronic commerce is defined as a new concept, which is being developed and which includes process of buying and selling or exchanging products, services or information via computer networks...

  9. Understand electronics

    CERN Document Server

    Bishop, Owen

    2013-01-01

    Understand Electronics provides a readable introduction to the exciting world of electronics for the student or enthusiast with little previous knowledge. The subject is treated with the minimum of mathematics and the book is extensively illustrated.This is an essential guide for the newcomer to electronics, and replaces the author's best-selling Beginner's Guide to Electronics.The step-by-step approach makes this book ideal for introductory courses such as the Intermediate GNVQ.

  10. Vacuum electronics

    CERN Document Server

    Eichmeier, Joseph A

    2008-01-01

    Nineteen experts from the electronics industry, research institutes and universities have joined forces to prepare this book. ""Vacuum Electronics"" covers the electrophysical fundamentals, the present state of the art and applications, as well as the future prospects of microwave tubes and systems, optoelectronics vacuum devices, electron and ion beam devices, light and X-ray emitters, particle accelerators and vacuum interrupters. These topics are supplemented by useful information about the materials and technologies of vacuum electronics and vacuum technology.

  11. Electronic components

    CERN Document Server

    Colwell, Morris A

    1976-01-01

    Electronic Components provides a basic grounding in the practical aspects of using and selecting electronics components. The book describes the basic requirements needed to start practical work on electronic equipment, resistors and potentiometers, capacitance, and inductors and transformers. The text discusses semiconductor devices such as diodes, thyristors and triacs, transistors and heat sinks, logic and linear integrated circuits (I.C.s) and electromechanical devices. Common abbreviations applied to components are provided. Constructors and electronics engineers will find the book useful

  12. Subsampling and inpainting approaches for electron tomography.

    Science.gov (United States)

    Sanders, Toby; Dwyer, Christian

    2017-11-01

    With the aim of addressing the issue of sample damage during electron tomography data acquisition, we propose a number of new reconstruction strategies based on subsampling (which uses only a subset of a full image) and inpainting (recovery of a full image from subsampled one). We point out that the total-variation (TV) inpainting model commonly used to inpaint subsampled images may be inappropriate for 2D projection images of typical TEM specimens. Thus, we propose higher-order TV (HOTV) inpainting, which accommodates the fact that projection images may be inherently smooth, as a more suitable image inpainting scheme. We also describe how the HOTV method can be extended to 3D, a scheme which makes use of both image data and sinogram data. Additionally, we propose gradient subsampling as a more efficient scheme than random subsampling. We make a rigorous comparison of our proposed new reconstruction schemes with existing ones. The new schemes are demonstrated to perform better than or as well as existing schemes, and we show that they outperform existing schemes at low subsampling rates. Copyright © 2017 Elsevier B.V. All rights reserved.

  13. ELECTRONIC SIGNATURES

    African Journals Online (AJOL)

    10332324

    'electronic signature' means data attached to, incorporated in, or logically associated with other data and which is intended by the user to serve as a signature;. The suggested new definition for an electronic signature reads as follows: 'electronic signature' means a sound, symbol or process that is (i) uniquely linked to the ...

  14. ELECTRONIC SIGNATURES

    African Journals Online (AJOL)

    10332324

    (a) facilitate ecommerce;2. (b) remove and prevent barriers to electronic communications in South Africa;3. (c) ensure that electronic transactions in the Republic conform to the highest international standards;4. (d) promote the development of electronic transactions services which are responsive to the needs of users and ...

  15. A simple data compression scheme for binary images of bacteria compared with commonly used image data compression schemes

    NARCIS (Netherlands)

    Wilkinson, M.H.F.

    A run length code compression scheme of extreme simplicity, used for image storage in an automated bacterial morphometry system, is compared with more common compression schemes, such as are used in the tag image file format. These schemes are Lempel-Ziv and Welch (LZW), Macintosh Packbits, and

  16. Computational evaluation of convection schemes in fluid dynamics problems

    Directory of Open Access Journals (Sweden)

    Paulo Laerte Natti

    2012-11-01

    Full Text Available This article provides a computational evaluation of the popular high resolution upwind WACEB, CUBISTA and ADBQUICKEST schemes for solving non-linear fluid dynamics problems. By using the finite difference methodology, the schemes are analyzed and implemented in the context of normalized variables of Leonard. In order to access the performance of the schemes, Riemann problems for 1D Burgers, Euler and shallow water equations are considered. From the numerical results, the schemes are ranked according to their performance in solving these non-linear equations. The best scheme is then applied in the numerical simulation of tridimensional incompressible moving free surface flows.

  17. On the monotonicity of multidimensional finite difference schemes

    Science.gov (United States)

    Kovyrkina, O.; Ostapenko, V.

    2016-10-01

    The classical concept of monotonicity, introduced by Godunov for linear one-dimensional difference schemes, is extended to multidimensional case. Necessary and sufficient conditions of monotonicity are obtained for linear multidimensional difference schemes of first order. The constraints on the numerical viscosity are given that ensure the monotonicity of a difference scheme in the multidimensional case. It is proposed a modification of the second order multidimensional CABARET scheme that preserves the monotonicity of one-dimensional discrete solutions and, as a result, ensures higher smoothness in the computation of multidimensional discontinuous solutions. The results of two-dimensional test computations illustrating the advantages of the modified CABARET scheme are presented.

  18. Scheme Transformations in the Vicinity of an Infrared Fixed Point

    DEFF Research Database (Denmark)

    Ryttov, Thomas; Shrock, Robert

    2012-01-01

    We analyze the effect of scheme transformations in the vicinity of an exact or approximate infrared fixed point in an asymptotically free gauge theory with fermions. We show that there is far less freedom in carrying out such scheme transformations in this case than at an ultraviolet fixed point....... We construct a transformation from the $\\bar{MS}$ scheme to a scheme with a vanishing three-loop term in the $\\beta$ function and use this to assess the scheme dependence of an infrared fixed point in SU($N$) theories with fermions. Implications for the anomalous dimension of the fermion bilinear...

  19. A group signature scheme based on quantum teleportation

    Science.gov (United States)

    Wen, Xiaojun; Tian, Yuan; Ji, Liping; Niu, Xiamu

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  20. A subgrid parameterization scheme for precipitation

    Directory of Open Access Journals (Sweden)

    S. Turner

    2012-04-01

    Full Text Available With increasing computing power, the horizontal resolution of numerical weather prediction (NWP models is improving and today reaches 1 to 5 km. Nevertheless, clouds and precipitation formation are still subgrid scale processes for most cloud types, such as cumulus and stratocumulus. Subgrid scale parameterizations for water vapor condensation have been in use for many years and are based on a prescribed probability density function (PDF of relative humidity spatial variability within the model grid box, thus providing a diagnosis of the cloud fraction. A similar scheme is developed and tested here. It is based on a prescribed PDF of cloud water variability and a threshold value of liquid water content for droplet collection to derive a rain fraction within the model grid. Precipitation of rainwater raises additional concerns relative to the overlap of cloud and rain fractions, however. The scheme is developed following an analysis of data collected during field campaigns in stratocumulus (DYCOMS-II and fair weather cumulus (RICO and tested in a 1-D framework against large eddy simulations of these observed cases. The new parameterization is then implemented in a 3-D NWP model with a horizontal resolution of 2.5 km to simulate real cases of precipitating cloud systems over France.

  1. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  2. IMPLEMENTATION OF THE NEW CAREER STRUCTURE SCHEME

    CERN Multimedia

    Human Resources Division

    2001-01-01

    CERN's new Merit Advancement and Promotion Scheme, MAPS, comes into force on 1 September, and all members of staff will soon be receiving the official letter of notification of their assimilation into the new scheme. In this announcement, we take a look at where you can learn about the new system. There will also be an article in the Weekly Bulletin at the end of the month, which will summarise the main changes. During the early summer, HR Division presented the new structure to the staff in the Laboratory via Divisional Information Meetings. The transparencies used in these meetings, along with a list of the most relevant questions and answers, a Career Path Guide as well as a general overview document are available on the HR Division web site http://cern.ch/CERN/Divisions/PE/. Hard copies of the latter document are also available from the Divisional secretariats. The first question most staff members will ask is how they will fit into the new career path structure. Via the same web page, they can type in th...

  3. Extended lattice Boltzmann scheme for droplet combustion.

    Science.gov (United States)

    Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas

    2017-05-01

    The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n-butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.

  4. Dynamic balancing scheme for motor armatures

    Science.gov (United States)

    Tseng, Chyuan-Yow; Shih, Ting-Wei; Lin, Jun-Tsun

    2007-07-01

    This paper presents a novel approach based on an adaptive parameter estimation technique for the dynamic balancing of the armature in an automobile starting motor. The proposed scheme is implemented on an experimental system comprising an unbalance measurement machine and a milling machine. Applying the influence coefficient method, two matrices, namely the unbalance calculation matrix and the milling vector calculation matrix, are constructed. The unbalance calculation matrix computes the armature unbalance based on vibration measurements, while the milling vector calculation matrix establishes the position and magnitude of the required unbalance correction. To compensate for the wear of the milling cutter following repeated machining operations, an algorithm is formulated to generate on-line estimates of the parameter settings required in the milling vector calculation matrix. A series of balancing experiments are performed to evaluate the feasibility and performance of the proposed scheme. The results show that the balancing system achieves a better balancing performance than a system based on the conventional influence coefficient method.

  5. Multiplexing schemes for quantum repeater networks

    Science.gov (United States)

    Aparicio, Luciano; Van Meter, Rodney

    2011-08-01

    When built, quantum repeaters will allow the distribution of entangled quantum states across large distances, playing a vital part in many proposed quantum technologies. Enabling multiple users to connect through the same network will be key to their real-world deployment. Previous work on repeater technologies has focussed only on simple entanglment production, without considering the issues of resource scarcity and competition that necessarily arise in a network setting. In this paper we simulated a thirteen-node network with up to five flows sharing different parts of the network, measuring the total throughput and fairness for each case. Our results suggest that the Internet-like approach of statistical multiplexing use of a congested link gives the highest aggregate throughput. Time division multiplexing and buffer space multiplexing were slightly less effective, but all three schemes allow the sum of multiple flows to substantially exceed that of any one flow, improving over circuit switching by taking advantage of resources that are forced to remain idle in circuit switching. All three schemes proved to have excellent fairness. The high performance, fairness and simplicity of implementation support a recommendation of statistical multiplexing for shared quantum repeater networks.

  6. Finite-difference schemes for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: es@cwi.nl [Centrum Wiskunde and Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands)

    2014-09-01

    In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.

  7. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  8. Sticker electronics

    KAUST Repository

    Hussain, Muhammad Mustafa

    2017-09-08

    Electronic stickers may be manufactured on flexible substrates (110, 120, 130) as layers and packaged together. The package may then have an adhesive applied to one side to provide capability for sticking the electronic devices to surfaces. The stickers can be wrappable, placed on surfaces, glued on walls or mirrors or wood or stone, and have electronics (112, 122, 132) which may or may not be ultrathin. Packaging for the electronic sticker can use polymer on cellulose manufacturing and/or three dimensional (3-D) printing. The electronic stickers may provide lighting capability, sensing capability, and/or recharging capabilities.

  9. Basic electronics

    CERN Document Server

    Holbrook, Harold D

    1971-01-01

    Basic Electronics is an elementary text designed for basic instruction in electricity and electronics. It gives emphasis on electronic emission and the vacuum tube and shows transistor circuits in parallel with electron tube circuits. This book also demonstrates how the transistor merely replaces the tube, with proper change of circuit constants as required. Many problems are presented at the end of each chapter. This book is comprised of 17 chapters and opens with an overview of electron theory, followed by a discussion on resistance, inductance, and capacitance, along with their effects on t

  10. Attosecond electron-electron collision dynamics of the four-electron escape in Be close to threshold

    CERN Document Server

    Emmanouilidou, A

    2012-01-01

    We explore the escape geometry of four electrons a few eV above threshold following single-photon absorption from the ground state of Be. We find that the four electrons leave the atom on the vertices of a pyramid instead of a previously-predicted tetrahedron. To illustrate the physical mechanisms of quadruple ionization we use a momentum transferring attosecond collision scheme which we show to be in accord with the pyramid break-up pattern.

  11. Electronic Government and Electronic Participation

    NARCIS (Netherlands)

    Tambouris, E.; Scholl, H.J.; Janssen, M.F.W.H.A.; Wimmer, M.A.; Tarabanis, K.; Gascó, M.; Klievink, A.J.; Lindgren, I.; Milano, M.; Panagiotopoulos, P.; Pardo, T.A.; Parycek, P.; Sæbø, O.

    2015-01-01

    Electronic government and electronic participation continue to transform the public sector and society worldwide and are constantly being transformed themselves by emerging information and communication technologies. This book presents papers from the 14th International Federation for Information

  12. Electronic Government and Electronic Participation

    NARCIS (Netherlands)

    Tambouris, E; Scholl, H.J.; Janssen, M.F.W.H.A.; Wimmer, M.A.; Tarabanis, K; Gascó, M; Klievink, A.J.; Lindgren, I; Milano, M; Panagiotopoulos, P; Pardo, T.A.; Parycek, P; Sæbø, Ø

    2016-01-01

    Electronic government and electronic participation continue to transform the public sector and society worldwide and are constantly being transformed themselves by emerging information and communication technologies.This book presents papers from the 14th International Federation for Information

  13. Electron Tree

    DEFF Research Database (Denmark)

    Appelt, Ane L; Rønde, Heidi S

    2013-01-01

    The photo shows a close-up of a Lichtenberg figure – popularly called an “electron tree” – produced in a cylinder of polymethyl methacrylate (PMMA). Electron trees are created by irradiating a suitable insulating material, in this case PMMA, with an intense high energy electron beam. Upon discharge......, during dielectric breakdown in the material, the electrons generate branching chains of fractures on leaving the PMMA, producing the tree pattern seen. To be able to create electron trees with a clinical linear accelerator, one needs to access the primary electron beam used for photon treatments. We...... appropriated a linac that was being decommissioned in our department and dismantled the head to circumvent the target and ion chambers. This is one of 24 electron trees produced before we had to stop the fun and allow the rest of the accelerator to be disassembled....

  14. Spatial dimming scheme for optical OFDM based visible light communication.

    Science.gov (United States)

    Yang, Yang; Zeng, Zhimin; Cheng, Julian; Guo, Caili

    2016-12-26

    A new dimming control scheme termed spatial dimming orthogonal frequency division multiplexing (SD-OFDM) is proposed for multiple-input and multiple output OFDM based visible light communication. The basic idea of SD-OFDM is that the illumination can be represented by the number of glared light emitting diodes (LEDs) in an LED lamp. As the biasing level of LEDs does not adjust to represent the required illumination level, the proposed scheme can significantly mitigate the clipping noise compared to analogue dimming schemes. Furthermore, unlike digital dimming schemes that control illumination levels by setting different duty cycles of pulse width modulation, the proposed scheme is always in the "on-state" for varied illumination levels. Both analytical and simulation results indicate that the proposed scheme is an efficient and feasible dimmable scheme.

  15. A numerical scheme for the generalized Burgers–Huxley equation

    Directory of Open Access Journals (Sweden)

    Brajesh K. Singh

    2016-10-01

    Full Text Available In this article, a numerical solution of generalized Burgers–Huxley (gBH equation is approximated by using a new scheme: modified cubic B-spline differential quadrature method (MCB-DQM. The scheme is based on differential quadrature method in which the weighting coefficients are obtained by using modified cubic B-splines as a set of basis functions. This scheme reduces the equation into a system of first-order ordinary differential equation (ODE which is solved by adopting SSP-RK43 scheme. Further, it is shown that the proposed scheme is stable. The efficiency of the proposed method is illustrated by four numerical experiments, which confirm that obtained results are in good agreement with earlier studies. This scheme is an easy, economical and efficient technique for finding numerical solutions for various kinds of (nonlinear physical models as compared to the earlier schemes.

  16. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  17. Why sampling scheme matters: the effect of sampling scheme on landscape genetic results

    Science.gov (United States)

    Michael K. Schwartz; Kevin S. McKelvey

    2008-01-01

    There has been a recent trend in genetic studies of wild populations where researchers have changed their sampling schemes from sampling pre-defined populations to sampling individuals uniformly across landscapes. This reflects the fact that many species under study are continuously distributed rather than clumped into obvious "populations". Once individual...

  18. Collective agri-environment schemes: How can regionalenvironmental cooperatives enhance farmers’ intentions foragri-environment schemes?

    NARCIS (Netherlands)

    Dijk, van W.F.A.; Lokhorst, A.M.; Berendse, F.; Snoo, de G.R.

    2015-01-01

    The effectiveness of agri-environment schemes (AES) in enhancing biodiversity on farmland and creating a long-lasting change in farmers’ motivation towards a more environmental-friendly practice is still strongly debated. Applying a regional approach has been advocated widely to make AES more

  19. A simple language to script and simulate breeding schemes: the breeding scheme language

    Science.gov (United States)

    It is difficult for plant breeders to determine an optimal breeding strategy given that the problem involves many factors, such as target trait genetic architecture and breeding resource availability. There are many possible breeding schemes for each breeding program. Although simulation study may b...

  20. Mixed quantum-classical dynamics using collective electronic variables: A better alternative to electronic friction theories

    CERN Document Server

    Ryabinkin, Ilya G

    2016-01-01

    An accurate description of nonadiabatic dynamics of molecular species on metallic surfaces poses a serious computational challenge associated with a multitude of closely-spaced electronic states. We propose a mixed quantum-classical scheme that addresses this challenge by introducing collective electronic variables. These variables are defined through analytic block-diagonalization applied to the time-dependent Hamiltonian matrix governing the electronic dynamics. We compare our scheme with the Ehrenfest approach and with a full-memory electronic friction model on a one-dimensional "adatom + atomic chain" model. Our simulations demonstrate that collective-mode dynamics with only few (2-3) electronic variables is robust and can describe a variety of situations: from a chemisorbed atom on an insulator to an atom on a metallic surface. Our molecular model also reveals that the friction approach is prone to unpredictable and catastrophic failures.

  1. An efficient compression scheme for bitmap indices

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie

    2004-04-13

    When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time

  2. A Study Looking the Electronic Funds Transfer

    Directory of Open Access Journals (Sweden)

    Codruta POENAR

    2008-01-01

    Full Text Available The aim of this paper is to present the characteristics of the most important electronic funds transfer in the world, both interperson and interbank. We identified the following informations: location, type, owner, operator, number of transactions, transsactions value, clients, financial scheme and the message format.

  3. Design of Infusion Schemes for Neuroreceptor Imaging

    DEFF Research Database (Denmark)

    Feng, Ling; Svarer, Claus; Madsen, Karine

    2016-01-01

    for bolus infusion (BI) or programmed infusion (PI) experiments. Steady-state quantitative measurements can be made with one short scan and venous blood samples. The GABAA receptor ligand [(11)C]Flumazenil (FMZ) was chosen for this purpose, as it lacks a suitable reference region. Methods. Five bolus [(11)C...... state was attained within 40 min, which was 8 min earlier than the optimal BI (B/I ratio = 55 min). Conclusions. The system can design both BI and PI schemes to attain steady state rapidly. For example, subjects can be [(11)C]FMZ-PET scanned after 40 min of tracer infusion for 40 min with venous...

  4. Combined Control Scheme for Monitoring Quality Characteristics

    Directory of Open Access Journals (Sweden)

    Adekeye K.S.

    2014-07-01

    Full Text Available In the literature, the Exponentially Weighted Moving Average (EWMA and Exponentially Weighted Moving Variance (EMWV control schemes have been used separately to monitor the process average and process variability respectively. Here the two are combined and applied on simulated process with different level of variation. The control limit interval (CLI and the average run length (ARL were evaluated for the combined chart. The combined chart performed better than the two independently. Furthermore, an algorithm was developed for the two control charts and implemented on visual basic VB6.0. The obtained results show that the combined EWMA and EWMV control chart is very sensitive in detecting shift in production process and every shift in the process mean is always preceded by shift in the process variability.

  5. Parasitology: United Kingdom National Quality Assessment Scheme.

    Science.gov (United States)

    Hawthorne, M.; Chiodini, P. L.; Snell, J. J.; Moody, A. H.; Ramsay, A.

    1992-01-01

    AIMS: To assess the results from parasitology laboratories taking part in a quality assessment scheme between 1986 and 1991; and to compare performance with repeat specimens. METHODS: Quality assessment of blood parasitology, including tissue parasites (n = 444; 358 UK, 86 overseas), and faecal parasitology, including extra-intestinal parasites (n = 205; 141 UK, 64 overseas), was performed. RESULTS: Overall, the standard of performance was poor. A questionnaire distributed to participants showed that a wide range of methods was used, some of which were considered inadequate to achieve reliable results. Teaching material was distributed to participants from time to time in an attempt to improve standards. CONCLUSIONS: Since the closure of the IMLS fellowship course in 1972, fewer opportunities for specialised training in parasitology are available: more training is needed. Poor performance in the detection of malarial parasites is mainly attributable to incorrect speciation, misidentification, and lack of equipment such as an eyepiece graticule. PMID:1452791

  6. Auction dynamics: A volume constrained MBO scheme

    Science.gov (United States)

    Jacobs, Matt; Merkurjev, Ekaterina; Esedoǧlu, Selim

    2018-02-01

    We show how auction algorithms, originally developed for the assignment problem, can be utilized in Merriman, Bence, and Osher's threshold dynamics scheme to simulate multi-phase motion by mean curvature in the presence of equality and inequality volume constraints on the individual phases. The resulting algorithms are highly efficient and robust, and can be used in simulations ranging from minimal partition problems in Euclidean space to semi-supervised machine learning via clustering on graphs. In the case of the latter application, numerous experimental results on benchmark machine learning datasets show that our approach exceeds the performance of current state-of-the-art methods, while requiring a fraction of the computation time.

  7. Efficient Conservative Reformulation Schemes for Lithium Intercalation

    Energy Technology Data Exchange (ETDEWEB)

    Urisanga, PC; Rife, D; De, S; Subramanian, VR

    2015-02-18

    Porous electrode theory coupled with transport and reaction mechanisms is a widely used technique to model Li-ion batteries employing an appropriate discretization or approximation for solid phase diffusion with electrode particles. One of the major difficulties in simulating Li-ion battery models is the need to account for solid phase diffusion in a second radial dimension r, which increases the computation time/cost to a great extent. Various methods that reduce the computational cost have been introduced to treat this phenomenon, but most of them do not guarantee mass conservation. The aim of this paper is to introduce an inherently mass conserving yet computationally efficient method for solid phase diffusion based on Lobatto III A quadrature. This paper also presents coupling of the new solid phase reformulation scheme with a macro-homogeneous porous electrode theory based pseudo 20 model for Li-ion battery. (C) The Author(s) 2015. Published by ECS. All rights reserved.

  8. Foil Bearing Stiffness Estimation with Pseudospectral Scheme

    Directory of Open Access Journals (Sweden)

    Sankar Balaji

    2016-01-01

    Full Text Available Compliant foil gas lubricated bearings are used for the support of light loads in the order of few kilograms at high speeds, in the order of 50,000 RPM. The stiffness of the foil bearings depends both on the stiffness of the compliant foil and on the lubricating gas film. The stiffness of the bearings plays a crucial role in the stable operation of the supported rotor over a range of speeds. This paper describes a numerical approach to estimate the stiffness of the bearings using pseudo spectral scheme. Methodology to obtain the stiffness of the foil bearing as a function of weight of the shaft is given and the results are presented.

  9. State Of Art in Homomorphic Encryption Schemes

    Directory of Open Access Journals (Sweden)

    S. Sobitha Ahila

    2014-02-01

    Full Text Available The demand for privacy of digital data and of algorithms for handling more complex structures have increased exponentially over the last decade. However, the critical problem arises when there is a requirement for publicly computing with private data or to modify functions or algorithms in such a way that they are still executable while their privacy is ensured. This is where homomorphic cryptosystems can be used since these systems enable computations with encrypted data. A fully homomorphic encryption scheme enables computation of arbitrary functions on encrypted data.. This enables a customer to generate a program that can be executed by a third party, without revealing the underlying algorithm or the processed data. We will take the reader through a journey of these developments and provide a glimpse of the exciting research directions that lie ahead. In this paper, we propose a selection of the most important available solutions, discussing their properties and limitations.

  10. New scheme for braiding Majorana fermions

    Science.gov (United States)

    Wu, Long-Hua; Liang, Qi-Feng; Hu, Xiao

    2014-01-01

    Non-Abelian statistics can be achieved by exchanging two vortices in topological superconductors with each grabbing a Majorana fermion (MF) as zero-energy quasi-particle at the cores. However, in experiments it is difficult to manipulate vortices. In the present work, we propose a way to braid MFs without moving vortices. The only operation required in the present scheme is to turn on and off local gate voltages, which liberates a MF from its original host vortex and transports it along the prepared track. We solve the time-dependent Bogoliubov–de Gennes equation numerically, and confirm that the MFs are protected provided the switching of gate voltages for exchanging MFs are adiabatic, which takes only several nano seconds given reasonable material parameters. By monitoring the time evolution of MF wave-functions, we show that non-Abelian statistics is achieved. PMID:27877725

  11. An efficient training scheme for supermodels

    Science.gov (United States)

    Schevenhoven, Francine J.; Selten, Frank M.

    2017-06-01

    Weather and climate models have improved steadily over time as witnessed by objective skill scores, although significant model errors remain. Given these imperfect models, predictions might be improved by combining them dynamically into a so-called supermodel. In this paper a new training scheme to construct such a supermodel is explored using a technique called cross pollination in time (CPT). In the CPT approach the models exchange states during the prediction. The number of possible predictions grows quickly with time, and a strategy to retain only a small number of predictions, called pruning, needs to be developed. The method is explored using low-order dynamical systems and applied to a global atmospheric model. The results indicate that the CPT training is efficient and leads to a supermodel with improved forecast quality as compared to the individual models. Due to its computational efficiency, the technique is suited for application to state-of-the art high-dimensional weather and climate models.

  12. European Influenza Surveillance Scheme on the Internet.

    Science.gov (United States)

    Snacken, R; Manuguerra, J C; Taylor, P

    1998-09-01

    In 1995, The European Influenza Surveillance Scheme was created with the participation of eight networks from seven countries. The main objectives were to continue the previous CARE Telematics Network and to adapt the project to the Internet environment as well as to improve substantially the quality of the surveillance according to new epidemiological requirements. Clinical and virological data from the general population and hospitals are collected in an interactive real-time database which can then be used for data entry, queries and consultations. Research programmes have been undertaken in various fields such as standardisation of clinical data and comparability between countries. Validation and security processes guarantee the quality assurance as well as regular assessment by the steering committee. Two additional countries will participate during the next influenza season (1997-98). This will represent an early warning system in a region of approximately 264 million inhabitants.

  13. Modified Monte Carlo method for study of electron transport in degenerate electron gas in the presence of electron-electron interactions, application to graphene

    Science.gov (United States)

    Borowik, Piotr; Thobel, Jean-Luc; Adamowicz, Leszek

    2017-07-01

    Standard computational methods used to take account of the Pauli Exclusion Principle into Monte Carlo (MC) simulations of electron transport in semiconductors may give unphysical results in low field regime, where obtained electron distribution function takes values exceeding unity. Modified algorithms were already proposed and allow to correctly account for electron scattering on phonons or impurities. Present paper extends this approach and proposes improved simulation scheme allowing including Pauli exclusion principle for electron-electron (e-e) scattering into MC simulations. Simulations with significantly reduced computational cost recreate correct values of the electron distribution function. Proposed algorithm is applied to study transport properties of degenerate electrons in graphene with e-e interactions. This required adapting the treatment of e-e scattering in the case of linear band dispersion relation. Hence, this part of the simulation algorithm is described in details.

  14. An Experiment and Detection Scheme for Cavity-Based Light Cold Dark Matter Particle Searches

    Directory of Open Access Journals (Sweden)

    Masroor H. S. Bukhari

    2017-01-01

    Full Text Available A resonance detection scheme and some useful ideas for cavity-based searches of light cold dark matter particles (such as axions are presented, as an effort to aid in the on-going endeavors in this direction as well as for future experiments, especially in possibly developing a table-top experiment. The scheme is based on our idea of a resonant detector, incorporating an integrated tunnel diode (TD and GaAs HEMT/HFET (High-Electron Mobility Transistor/Heterogeneous FET transistor amplifier, weakly coupled to a cavity in a strong transverse magnetic field. The TD-amplifier combination is suggested as a sensitive and simple technique to facilitate resonance detection within the cavity while maintaining excellent noise performance, whereas our proposed Halbach magnet array could serve as a low-noise and permanent solution replacing the conventional electromagnets scheme. We present some preliminary test results which demonstrate resonance detection from simulated test signals in a small optimal axion mass range with superior signal-to-noise ratios (SNR. Our suggested design also contains an overview of a simpler on-resonance dc signal read-out scheme replacing the complicated heterodyne read-out. We believe that all these factors and our propositions could possibly improve or at least simplify the resonance detection and read-out in cavity-based DM particle detection searches (and other spectroscopy applications and reduce the complications (and associated costs, in addition to reducing the electromagnetic interference and background.

  15. An ECC-Based Blind Signcryption Scheme for Multiple Digital Documents

    Directory of Open Access Journals (Sweden)

    Chien-Hua Tsai

    2017-01-01

    Full Text Available The popularity of the Internet has comprehensively altered the traditional way of communication and interaction patterns, such as e-contract negotiations, e-payment services, or digital credential processes. In the field of e-form systems, a number of studies investigate the ability of the blind signature to fulfill the basic properties of blindness and untraceability. However, most literatures exploring the blind signature mechanisms only address research and technology pertaining to single blind signature issues. Further, most of the topics only deal with signing rather than encryption. Thus, we propose a new blind signature scheme for multiple digital documents based on elliptic curve cryptography (ECC. Our scheme incorporates the design of signcryption paradigm into the blind signature scheme to strengthen high levels of security. This innovative method also enhances computational efficiency during processing multiple electronic documents since the ECC provides a shorter key length and higher processing speed than other public-key cryptosystems on equivalent secrecy. The analysis results show that the present scheme achieves better performance at low communication overheads as well as with higher level of security. By helping the design of the intrinsic properties, the proposed cryptosystem can be applied to many areas to protect sensitive data in ubiquitous computing environments.

  16. Comparison of velocity distribution function errors introduced by particle reweighting schemes in PIC-DSMC simulations

    Science.gov (United States)

    Moore, Christopher; Boerner, Jeremy; Moore, Stan; Cartwright, Keith; Pointon, Timothy

    2014-10-01

    Many PIC simulations span many orders of magnitude in the plasma density and therefore a constant particle weight results in too few particles in regions (or time periods) of low density or too many particles when the density is high. The standard solution is to employ a reweighting scheme in which low-weight particles are merged in order to keep the number of particles per cell roughly constant while conserving mass and momentum. Unfortunately merger schemes distort a general velocity distribution function (VDF) of particles (one can conserve arbitrarily higher moments such as energy flux by merging N to M particles for N > M > 1) and often merge routines act like artificial collisions that thermalize the distribution and lead to simulation error. We will compare the accuracy of the unique reweighting scheme used in our PIC-DSMC code and common reweighting schemes (e.g. redrawing from a constructed VDF or rouletting) through two benchmarks. The first compares the time varying VDF from various merge routines to an analytic solution for relaxation of a bimodal VDF to a Maxwellian through elastic collisions. The second benchmark compares error introduced in the VDF due to merging electrons during a breakdown simulation. Sandia National Laboratories is a multiprogram laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's NNSA under Contract DE-AC04-94AL85000.

  17. Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Slavko Đerić

    2016-12-01

    Full Text Available Electronic commerce can be defined in different ways. Any definition helps to understand and explain that concept as better as possible.. Electronic commerce is a set of procedures and technologies that automate the tasks of financial transactions using electronic means. Also, according to some authors, electronic commerce is defined as a new concept, which is being developed and which includes process of buying and selling or exchanging products, services or information via computer networks, including the Internet. Electronic commerce is not limited just to buying and selling, but it also includes all pre-sales and after-sales ongoing activities along the supply chain. Introducing electronic commerce, using the Internet and Web services in business, realizes the way to a completely new type of economy - internet economy.

  18. Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.

    Science.gov (United States)

    Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian

    2016-06-01

    As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.

  19. MIMO transmit scheme based on morphological perceptron with competitive learning.

    Science.gov (United States)

    Valente, Raul Ambrozio; Abrão, Taufik

    2016-08-01

    This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.

  20. Security analysis and improvements of arbitrated quantum signature schemes

    Science.gov (United States)

    Zou, Xiangfu; Qiu, Daowen

    2010-10-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  1. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  2. Micropower electronics

    CERN Document Server

    Keonjian, Edward

    1964-01-01

    Micropower Electronics deals with the operation of modern electronic equipment at micropower levels and the problems associated with micropower electronics. Topics covered include the relations between minimum required power density and frequency response for semiconductor triode amplifiers; physical realization of digital logic circuits; micropower microelectronic subsystems; and metal-oxide-semiconductor field-effect devices for micropower logic circuitry. This book is comprised of 10 chapters and begins with an analysis of fundamental relationships and basic requirements pertinent to the ph

  3. Verifier-based three-party authentication schemes using extended chaotic maps for data exchange in telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu

    2014-12-01

    Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.

  4. Microfluidic electronics.

    Science.gov (United States)

    Cheng, Shi; Wu, Zhigang

    2012-08-21

    Microfluidics, a field that has been well-established for several decades, has seen extensive applications in the areas of biology, chemistry, and medicine. However, it might be very hard to imagine how such soft microfluidic devices would be used in other areas, such as electronics, in which stiff, solid metals, insulators, and semiconductors have previously dominated. Very recently, things have radically changed. Taking advantage of native properties of microfluidics, advances in microfluidics-based electronics have shown great potential in numerous new appealing applications, e.g. bio-inspired devices, body-worn healthcare and medical sensing systems, and ergonomic units, in which conventional rigid, bulky electronics are facing insurmountable obstacles to fulfil the demand on comfortable user experience. Not only would the birth of microfluidic electronics contribute to both the microfluidics and electronics fields, but it may also shape the future of our daily life. Nevertheless, microfluidic electronics are still at a very early stage, and significant efforts in research and development are needed to advance this emerging field. The intention of this article is to review recent research outcomes in the field of microfluidic electronics, and address current technical challenges and issues. The outlook of future development in microfluidic electronic devices and systems, as well as new fabrication techniques, is also discussed. Moreover, the authors would like to inspire both the microfluidics and electronics communities to further exploit this newly-established field.

  5. Electron Bifurcation

    Energy Technology Data Exchange (ETDEWEB)

    Peters, John W.; Miller, Anne-Frances; Jones, Anne K.; King, Paul W.; Adams, Michael W. W.

    2016-04-01

    Electron bifurcation is the recently recognized third mechanism of biological energy conservation. It simultaneously couples exergonic and endergonic oxidation-reduction reactions to circumvent thermodynamic barriers and minimize free energy loss. Little is known about the details of how electron bifurcating enzymes function, but specifics are beginning to emerge for several bifurcating enzymes. To date, those characterized contain a collection of redox cofactors including flavins and iron-sulfur clusters. Here we discuss the current understanding of bifurcating enzymes and the mechanistic features required to reversibly partition multiple electrons from a single redox site into exergonic and endergonic electron transfer paths.

  6. Polymer electronics

    CERN Document Server

    Hsin-Fei, Meng

    2013-01-01

    Polymer semiconductor is the only semiconductor that can be processed in solution. Electronics made by these flexible materials have many advantages such as large-area solution process, low cost, and high performance. Researchers and companies are increasingly dedicating time and money in polymer electronics. This book focuses on the fundamental materials and device physics of polymer electronics. It describes polymer light-emitting diodes, polymer field-effect transistors, organic vertical transistors, polymer solar cells, and many applications based on polymer electronics. The book also disc

  7. Electron holography

    CERN Document Server

    Tonomura, Akira

    1993-01-01

    Holography was devised for breaking through the resolution limit of electron microscopes The advent of a "coherent" field emission electron beam has enabled the use of Electron Holography in various areas of magnetic domain structures observation, fluxon observation in superconductors, and fundamental experiments in physics which have been inaccessible using other techniques After examining the fundamentals of electron holography and its applications to the afore mentioned fields, a detailed discussion of the Aharonov-Bohm effect and the related experiments is presented Many photographs and illustrations are included to elucidate the text

  8. ZnO-Au-SnO2 Z-scheme photoanodes for remarkable photoelectrochemical water splitting.

    Science.gov (United States)

    Li, Jing-Mei; Cheng, Hao-Yun; Chiu, Yi-Hsuan; Hsu, Yung-Jung

    2016-08-25

    For the first time a ZnO nanorod-based Z-scheme heterostructure system was proposed and realized for efficient photoelectrochemical water splitting. The samples were prepared by depositing a thin layer of SnO2 on the Au surface of Au particle-decorated ZnO nanorods. For ZnO-Au-SnO2 nanorods, the embedded Au can mediate interfacial charge transfer by promoting electron transfer from the conduction band of SnO2 to the valence band of ZnO. This vectorial charge transfer resulted in the situation that the photoexcited electrons accumulated at ZnO while the photogenerated holes concentrated at SnO2, giving ZnO-Au-SnO2 substantially high redox powers. Time-resolved photoluminescence spectra suggested that the interfacial charge transfer across the ZnO/Au/SnO2 interface was significantly improved as a result of the Z-scheme charge transfer mechanism. With the substantially high redox powers and significantly improved interfacial charge transfer, ZnO-Au-SnO2 nanorods performed much better as a photoanode in photoelectrochemical water splitting than pristine ZnO, plasmonic Au-decorated ZnO and type-II SnO2-coated ZnO nanorods did. The present study has provided a viable approach to exploit Z-scheme photoanodes in the design of efficient artificial photosynthesis systems for solar energy conversion.

  9. A novel quantum group signature scheme without using entangled states

    Science.gov (United States)

    Xu, Guang-Bao; Zhang, Ke-Jia

    2015-07-01

    In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.

  10. An Efficient Remote Authentication Scheme for Wireless Body Area Network.

    Science.gov (United States)

    Omala, Anyembe Andrew; Kibiwott, Kittur P; Li, Fagen

    2017-02-01

    Wireless body area network (WBAN) provide a mechanism of transmitting a persons physiological data to application providers e.g. hospital. Given the limited range of connectivity associated with WBAN, an intermediate portable device e.g. smartphone, placed within WBAN's connectivity, forwards the data to a remote server. This data, if not protected from an unauthorized access and modification may be lead to poor diagnosis. In order to ensure security and privacy between WBAN and a server at the application provider, several authentication schemes have been proposed. Recently, Wang and Zhang proposed an authentication scheme for WBAN using bilinear pairing. However, in their scheme, an application provider could easily impersonate a client. In order to overcome this weakness, we propose an efficient remote authentication scheme for WBAN. In terms of performance, our scheme can not only provide a malicious insider security, but also reduce running time of WBAN (client) by 51 % as compared to Wang and Zhang scheme.

  11. International proposal for an acoustic classification scheme for dwellings

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2014-01-01

    Acoustic classification schemes specify different quality levels for acoustic conditions. Regulations and classification schemes for dwellings typically include criteria for airborne and impact sound insulation, façade sound insulation and service equipment noise. However, although important...... European countries have introduced classification schemes. The schemes typically include four classes. Comparative studies have shown significant discrepancies between countries due to national development of schemes. The diversity is an obstacle for exchange of construction experience for different...... classes, implying also trade barriers. Thus, a harmonized classification scheme would be useful, and the European COST Action TU0901 "Integrating and Harmonizing Sound Insulation Aspects in Sustainable Urban Housing Constructions", running 2009-2013 with members from 32 countries, including three overseas...

  12. Printed Electronics

    Science.gov (United States)

    Crain, John M. (Inventor); Lettow, John S. (Inventor); Aksay, Ilhan A. (Inventor); Korkut, Sibel (Inventor); Chiang, Katherine S. (Inventor); Chen, Chuan-Hua (Inventor); Prud'Homme, Robert K. (Inventor)

    2016-01-01

    Printed electronic device comprising a substrate onto at least one surface of which has been applied a layer of an electrically conductive ink comprising functionalized graphene sheets and at least one binder. A method of preparing printed electronic devices is further disclosed.

  13. Electronic Cereal.

    Science.gov (United States)

    Frentrup, Julie R.; Phillips, Donald B.

    1996-01-01

    Describes activities that use Froot Loops breakfast cereal to help students master the concepts of valence electrons and chemical bonding and the implications of the duet and octet rules. Involves students working in groups to create electron dot structures for various compounds. (JRH)

  14. Security analysis of electronic voting and online banking systems

    OpenAIRE

    Tjøstheim, Thomas

    2007-01-01

    The main focus of this dissertation is on security analysis of electronic voting and online banking systems. Six papers form the basis of the thesis and include the following topics: a model for analysis of voting systems, a case study where we apply the proposed model, a new scheme for remote electronic voting, and three case studies of commercial online banking solutions in Norway.

  15. Decentralized Economic Dispatch Scheme With Online Power Reserve for Microgrids

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Wang, P.

    2017-01-01

    Decentralized economic operation schemes have several advantages when compared with the traditional centralized management system for microgrids. Specifically, decentralized schemes are more flexible, less computationally intensive, and easier to implement without relying on communication...... costs, their power ratings, and other necessary constraints, before deciding the DG dispatch priorities and droop characteristics. The proposed scheme also allows online power reserve to be set and regulated within the microgrid. This, together with the generation cost saved, has been verified...

  16. A stable fast marching scheme for computational fluid mechanics

    Science.gov (United States)

    Behnia, M.; de Vahl Davis, G.; Wolfshtein, M.

    1990-04-01

    A stable fast marching scheme has been developed for the solution of coupled parabolic partial differential equations such as the Navier-Stokes equations. The scheme was developed with the aid of a stability analysis. The implementation of the method in standard alternating direction implicit algorithms is straightforward. The scheme was tested on the problem of natural convection in a square cavity. The number of iterations required for convergence was significantly reduced compared to conventional methods.

  17. 7 CFR 12.10 - Scheme or device.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 1 2010-01-01 2010-01-01 false Scheme or device. 12.10 Section 12.10 Agriculture... § 12.10 Scheme or device. All or any part of the benefits listed in § 12.4 otherwise due a person from... scheme or device designed to evade, or which has the effect of evading, the provisions of this part. Such...

  18. A repeat-until-success quantum computing scheme

    Energy Technology Data Exchange (ETDEWEB)

    Beige, A [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Lim, Y L [DSO National Laboratories, 20 Science Park Drive, Singapore 118230, Singapore (Singapore); Kwek, L C [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542, Singapore (Singapore)

    2007-06-15

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes.

  19. A Comparative Analysis of Schemes for Correlated Branch Prediction

    OpenAIRE

    Young, Cliff; Gloy, Nicolas; Smith, Michael D.

    1995-01-01

    Modern high-performance architectures require extremely accurate branch prediction to overcome the performance limitations of conditional branches. We present a framework that categorizes branch prediction schemes by the way in which they partition dynamic branches and by the kind of predictor that they use. The framework allows us to compare and contrast branch prediction schemes, and to analyze why they work. We use the framework to show how a static correlated branch prediction scheme incr...

  20. An ASI Suppression Scheme Based on Array Synthesis

    Science.gov (United States)

    Zhu, Jinhua; Liu, Peixi; Luo, Wu

    2017-10-01

    An adjacent satellite interference (ASI) suppression scheme based on transmitting antennas array synthesis is proposed in this paper. The scheme ensures the ASI under the upper bound specified by international regulations, and simultaneously maximize the main-axis radiated power. Specifically, the interference suppression problem is converted into a uniform linear array (ULA) synthesis problem, and then solved by two algorithms. Numerical results are presented to illustrate the performance of the scheme.

  1. Two Conservative Difference Schemes for Rosenau-Kawahara Equation

    Directory of Open Access Journals (Sweden)

    Jinsong Hu

    2014-01-01

    Full Text Available Two conservative finite difference schemes for the numerical solution of the initialboundary value problem of Rosenau-Kawahara equation are proposed. The difference schemes simulate two conservative quantities of the problem well. The existence and uniqueness of the difference solution are proved. It is shown that the finite difference schemes are of second-order convergence and unconditionally stable. Numerical experiments verify the theoretical results.

  2. Electronically Tunable Multi-Terminal Floating Nullor and Its Applications

    Directory of Open Access Journals (Sweden)

    W. Tangsrirat

    2008-12-01

    Full Text Available A realization scheme of an electronically tun- able multi-terminal floating nullor (ET-MTFN is de- scribed in this paper. The proposed circuit mainly employs a transconductance amplifier, an improved translinear cell, two complementary current mirrors with variable current gain and improved Wilson current mirrors, which provide an electronic tuning of the current gain. The va- lidity of the performance of the scheme is verified through PSPICE simulation results. Example applications employing the proposed ET-MTFN as an active element demonstrate that the circuit properties can be varied by electronic means.

  3. A secure effective dynamic group password-based authenticated key agreement scheme for the integrated EPR information system

    Directory of Open Access Journals (Sweden)

    Vanga Odelu

    2016-01-01

    Full Text Available With the rapid growth of the Internet, a lot of electronic patient records (EPRs have been developed for e-medicine systems. The security and privacy issues of EPRs are important for the patients in order to understand how the hospitals control the use of their personal information, such as name, address, e-mail, medical records, etc. of a particular patient. Recently, Lee et al. proposed a simple group password-based authenticated key agreement protocol for the integrated EPR information system (SGPAKE. However, in this paper, we show that Lee et al.’s protocol is vulnerable to the off-line weak password guessing attack and as a result, their scheme does not provide users’ privacy. To withstand this security weakness found in Lee et al.’s scheme, we aim to propose an effective dynamic group password-based authenticated key exchange scheme for the integrated EPR information system, which retains the original merits of Lee et al.’s scheme. Through the informal and formal security analysis, we show that our scheme provides users’ privacy, perfect forward security and known-key security, and also protects online and offline password guessing attacks. Furthermore, our scheme efficiently supports the dynamic group password-based authenticated key agreement for the integrated EPR information system. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool and show that our scheme is secure against passive and active attacks.

  4. Scheme for achieving coherent perfect absorption by anisotropic metamaterials

    KAUST Repository

    Zhang, Xiujuan

    2017-02-22

    We propose a unified scheme to achieve coherent perfect absorption of electromagnetic waves by anisotropic metamaterials. The scheme describes the condition on perfect absorption and offers an inverse design route based on effective medium theory in conjunction with retrieval method to determine practical metamaterial absorbers. The scheme is scalable to frequencies and applicable to various incident angles. Numerical simulations show that perfect absorption is achieved in the designed absorbers over a wide range of incident angles, verifying the scheme. By integrating these absorbers, we further propose an absorber to absorb energy from two coherent point sources.

  5. Nested Hilbert schemes on surfaces: Virtual fundamental class

    DEFF Research Database (Denmark)

    Gholampour, Amin; Sheshmani, Artan; Yau, Shing-Tung

    We construct natural virtual fundamental classes for nested Hilbert schemes on a nonsingular projective surface S. This allows us to define new invariants of S that recover some of the known important cases such as Poincare invariants of Durr-Kabanov-Okonek and the stable pair invariants of Kool......-Thomas. In the case of the nested Hilbert scheme of points, we can express these invariants in terms of integrals over the products of Hilbert scheme of points on S, and relate them to the vertex operator formulas found by Carlsson-Okounkov. The virtual fundamental classes of the nested Hilbert schemes play a crucial...

  6. A Digital Signature Scheme Based on MST3 Cryptosystems

    Directory of Open Access Journals (Sweden)

    Haibo Hong

    2014-01-01

    Full Text Available As special types of factorization of finite groups, logarithmic signature and cover have been used as the main components of cryptographic keys for secret key cryptosystems such as PGM and public key cryptosystems like MST1, MST2, and MST3. Recently, Svaba et. al proposed a revised MST3 encryption scheme with greater security. Meanwhile, they put forward an idea of constructing signature schemes on the basis of logarithmic signatures and random covers. In this paper, we firstly design a secure digital signature scheme based on logarithmic signatures and random covers. In order to complete the task, we devise a new encryption scheme based on MST3 cryptosystems.

  7. Comparison of two SVD-based color image compression schemes.

    Science.gov (United States)

    Li, Ying; Wei, Musheng; Zhang, Fengxia; Zhao, Jianli

    2017-01-01

    Color image compression is a commonly used process to represent image data as few bits as possible, which removes redundancy in the data while maintaining an appropriate level of quality for the user. Color image compression algorithms based on quaternion are very common in recent years. In this paper, we propose a color image compression scheme, based on the real SVD, named real compression scheme. First, we form a new real rectangular matrix C according to the red, green and blue components of the original color image and perform the real SVD for C. Then we select several largest singular values and the corresponding vectors in the left and right unitary matrices to compress the color image. We compare the real compression scheme with quaternion compression scheme by performing quaternion SVD using the real structure-preserving algorithm. We compare the two schemes in terms of operation amount, assignment number, operation speed, PSNR and CR. The experimental results show that with the same numbers of selected singular values, the real compression scheme offers higher CR, much less operation time, but a little bit smaller PSNR than the quaternion compression scheme. When these two schemes have the same CR, the real compression scheme shows more prominent advantages both on the operation time and PSNR.

  8. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  9. Error function attack of chaos synchronization based encryption schemes.

    Science.gov (United States)

    Wang, Xingang; Zhan, Meng; Lai, C-H; Gang, Hu

    2004-03-01

    Different chaos synchronization based encryption schemes are reviewed and compared from the practical point of view. As an efficient cryptanalysis tool for chaos encryption, a proposal based on the error function attack is presented systematically and used to evaluate system security. We define a quantitative measure (quality factor) of the effective applicability of a chaos encryption scheme, which takes into account the security, the encryption speed, and the robustness against channel noise. A comparison is made of several encryption schemes and it is found that a scheme based on one-way coupled chaotic map lattices performs outstandingly well, as judged from quality factor. Copyright 2004 American Institute of Physics.

  10. Protection Scheme for Modular Multilevel Converters under Diode Open-Circuit Faults

    DEFF Research Database (Denmark)

    Deng, Fujin; Zhu, Rongwu; Liu, Dong

    2018-01-01

    The modular multilevel converter (MMC) is attractive for medium- or high-power applications because of the advantages of its high modularity, availability, and high power quality. Reliability is one of the most important challenges for the MMC consisting of a large number of power electronic...... devices. The diode open-circuit fault in the submodule (SM) is an important issue for the MMC, which would affect the performance of the MMC and disrupt the operation of the MMC. This paper analyzes the impact of diode open-circuit failures in the SMs on the performance of the MMC and proposes...... a protection scheme for the MMC under diode open-circuit faults. The proposed protection scheme not only can effectively eliminate the possible caused high voltage due to the diode open-circuit fault but also can quickly detect the faulty SMs, which effectively avoids the destruction and protects the MMC...

  11. Baseline scheme for polarization preservation and control in the MEIC ion complex

    Energy Technology Data Exchange (ETDEWEB)

    Derbenev, Yaroslav S. [Jefferson Lab, Newport News, VA (United States); Lin, Fanglei [Jefferson Lab, Newport News, VA (United States); Morozov, Vasiliy [Jefferson Lab, Newport News, VA (United States); Zhang, Yuhong [Jefferson Lab, Newport News, VA (United States); Kondratenko, Anatoliy [Science and Technique Laboratory Zaryad, Novosibirsk (Russian Federation); Kondratenko, M. A. [Science and Technique Laboratory Zaryad, Novosibirsk (Russian Federation); Filatov, Yury [MIPT, Dolgoprudny, Moscow (Russian Federation)

    2015-09-01

    The scheme for preservation and control of the ion polarization in the Medium-energy Electron-Ion Collider (MEIC) has been under active development in recent years. The figure-8 configuration of the ion rings provides a unique capability to control the polarization of any ion species including deuterons by means of "weak" solenoids rotating the particle spins by small angles. Insertion of "weak" solenoids into the magnetic lattices of the booster and collider rings solves the problem of polarization preservation during acceleration of the ion beam. Universal 3D spin rotators designed on the basis of "weak" solenoids allow one to obtain any polarization orientation at an interaction point of MEIC. This paper presents the baseline scheme for polarization preservation and control in the MEIC ion complex.

  12. Efficient scheme for hybrid teleportation via entangled coherent states in circuit quantum electrodynamics.

    Science.gov (United States)

    Joo, Jaewoo; Ginossar, Eran

    2016-06-01

    We propose a deterministic scheme for teleporting an unknown qubit state through continuous-variable entangled states in superconducting circuits. The qubit is a superconducting two-level system and the bipartite quantum channel is a microwave photonic entangled coherent state between two cavities. A Bell-type measurement performed on the hybrid state of solid and photonic states transfers a discrete-variable unknown electronic state to a continuous-variable photonic cat state in a cavity mode. In order to facilitate the implementation of such complex protocols we propose a design for reducing the self-Kerr nonlinearity in the cavity. The teleporation scheme enables quantum information processing operations with circuit-QED based on entangled coherent states. These include state verification and single-qubit operations with entangled coherent states. These are shown to be experimentally feasible with the state of the art superconducting circuits.

  13. Ab initio electron propagators in molecules with strong electron-phonon interaction: II. Electron Green's function.

    Science.gov (United States)

    Dahnovsky, Yuri

    2007-07-07

    approximation where scattering events occur only for sequential transitions. A self-consistent Hartree-Fock equation for a four-index Green's function matrix is derived. In conclusion, the proposed schemes can be considered for future method developments for quantum chemical calculations for large molecules with strong nonadiabatic effects, e-e correlated electron transfer reactions, and electron transport in molecular transport junctions.

  14. Predicting FLDs Using a Multiscale Modeling Scheme

    Science.gov (United States)

    Wu, Z.; Loy, C.; Wang, E.; Hegadekatte, V.

    2017-09-01

    The measurement of a single forming limit diagram (FLD) requires significant resources and is time consuming. We have developed a multiscale modeling scheme to predict FLDs using a combination of limited laboratory testing, crystal plasticity (VPSC) modeling, and dual sequential-stage finite element (ABAQUS/Explicit) modeling with the Marciniak-Kuczynski (M-K) criterion to determine the limit strain. We have established a means to work around existing limitations in ABAQUS/Explicit by using an anisotropic yield locus (e.g., BBC2008) in combination with the M-K criterion. We further apply a VPSC model to reduce the number of laboratory tests required to characterize the anisotropic yield locus. In the present work, we show that the predicted FLD is in excellent agreement with the measured FLD for AA5182 in the O temper. Instead of 13 different tests as for a traditional FLD determination within Novelis, our technique uses just four measurements: tensile properties in three orientations; plane strain tension; biaxial bulge; and the sheet crystallographic texture. The turnaround time is consequently far less than for the traditional laboratory measurement of the FLD.

  15. Nonlinear inversion schemes for fluorescence optical tomography.

    Science.gov (United States)

    Freiberger, Manuel; Egger, Herbert; Scharfetter, Hermann

    2010-11-01

    Fluorescence optical tomography is a non-invasive imaging modality that employs the absorption and re-emission of light by fluorescent dyes. The aim is to reconstruct the fluorophore distribution in a body from measurements of light intensities at the boundary. Due to the diffusive nature of light propagation in tissue, fluorescence tomography is a nonlinear and severely ill-posed problem, and some sort of regularization is required for a stable solution. In this paper we investigate reconstruction methods based on Tikhonov regularization with nonlinear penalty terms, namely total-variation regularization and a levelset-type method using a nonlinear parameterization of the unknown function. Moreover, we use the full threedimensional nonlinear forward model, which arises from the governing system of partial differential equations. We discuss the numerical realization of the regularization schemes by Newtontype iterations, present some details of the discretization by finite element methods, and outline the efficient implementation of sensitivity systems via adjoint methods. As we will demonstrate in numerical tests, the proposed nonlinear methods provide better reconstructions than standard methods based on linearized forward models and linear penalty terms. We will additionally illustrate, that the careful discretization of the methods derived on the continuous level allows to obtain reliable, mesh independent reconstruction algorithms.

  16. Renewable Energy Operation and Conversion Schemes

    DEFF Research Database (Denmark)

    Spagnuolo, Giovanni; Petrone, Giovanni; Araujo, Samuel Vasconcelos

    2010-01-01

    A short summary of some speeches given during Seminar on Renewable Energy system (SERENE) is presented. The contributions have been mainly focused on power electronics for photovoltaic (PV) and sea wave energies, pointing out some aspects related to efficiency, reliability, and grid integration....... Finally, main issues concerning fuel cell (FC) systems as generators based on hydrogen as a low environmental impact energy vector are presented....

  17. Digital electronics

    CERN Document Server

    Morris, John

    2013-01-01

    An essential companion to John C Morris's 'Analogue Electronics', this clear and accessible text is designed for electronics students, teachers and enthusiasts who already have a basic understanding of electronics, and who wish to develop their knowledge of digital techniques and applications. Employing a discovery-based approach, the author covers fundamental theory before going on to develop an appreciation of logic networks, integrated circuit applications and analogue-digital conversion. A section on digital fault finding and useful ic data sheets completes th

  18. Electronic diagrams

    CERN Document Server

    Colwell, Morris A

    1976-01-01

    Electronic Diagrams is a ready reference and general guide to systems and circuit planning and in the preparation of diagrams for both newcomers and the more experienced. This book presents guidelines and logical procedures that the reader can follow and then be equipped to tackle large complex diagrams by recognition of characteristic 'building blocks' or 'black boxes'. The goal is to break down many of the barriers that often seem to deter students and laymen in learning the art of electronics, especially when they take up electronics as a spare time occupation. This text is comprised of nin

  19. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  20. Polymer electronics

    CERN Document Server

    Geoghegan, Mark

    2013-01-01

    Polymer electronics is the science behind many important new developments in technology, such as the flexible electronic display (e-ink) and many new developments in transistor technology. Solar cells, light-emitting diodes, and transistors are all areas where plastic electronics is likely to, or is already having, a serious impact on our daily lives. With polymer transistors and light-emitting diodes now being commercialised, there is a clear need for a pedagogic text thatdiscusses the subject in a clear and concise fashion suitable for senior undergraduate and graduate students. The content

  1. Stretchable electronics

    CERN Document Server

    Someya, Takao

    2012-01-01

    With its comprehensive coverage this handbook and ready reference brings together some of the most outstanding scientists in the field to lay down the undisputed knowledge on how to make electronics stretchable.As such, it focuses on gathering and evaluating the materials, designs, models and technologies that enable the fabrication of fully elastic electronic devices which can sustain high strain. Furthermore, it provides a review of those specific applications that directly benefit from highly compliant electronics, including transistors, photonic devices and sensors. In addition to stre

  2. Electron optics

    CERN Document Server

    Grivet, Pierre; Bertein, F; Castaing, R; Gauzit, M; Septier, Albert L

    1972-01-01

    Electron Optics, Second English Edition, Part I: Optics is a 10-chapter book that begins by elucidating the fundamental features and basic techniques of electron optics, as well as the distribution of potential and field in electrostatic lenses. This book then explains the field distribution in magnetic lenses; the optical properties of electrostatic and magnetic lenses; and the similarities and differences between glass optics and electron optics. Subsequent chapters focus on lens defects; some electrostatic lenses and triode guns; and magnetic lens models. The strong focusing lenses and pris

  3. Starting electronics

    CERN Document Server

    Brindley, Keith

    2005-01-01

    Starting Electronics is unrivalled as a highly practical introduction for hobbyists, students and technicians. Keith Brindley introduces readers to the functions of the main component types, their uses, and the basic principles of building and designing electronic circuits. Breadboard layouts make this very much a ready-to-run book for the experimenter; and the use of multimeter, but not oscilloscopes, puts this practical exploration of electronics within reach of every home enthusiast's pocket. The third edition has kept the simplicity and clarity of the original. New material

  4. Design and comparison of gene-pyramiding schemes in animals.

    Science.gov (United States)

    Zhao, F P; Jiang, L; Gao, H J; Ding, X D; Zhang, Q

    2009-08-01

    Marker-assisted gene pyramiding provides a promising way to develop new animal breeds or lines, in which genes responsible for certain favorable characters identified in different breeds or lines are incorporated. In consideration of features of animal populations, we proposed five schemes for pyramiding three genes, denoted Scheme A-E, and five schemes for pyramiding four genes, denoted Scheme F-J. These schemes are representative of the possible alternatives. We also provided an algorithm to compute the population sizes needed in each generation. We compared these schemes with respect to the total population size and the number of generations required under different situations. The results show that there is no scheme that is optimal in all cases. Among the schemes for pyramiding three genes from three lines (L1, L2 and L3), Scheme D (a three-way cross between the three lines are first performed, followed by a backcross to L1 and a subsequent intercross to obtain the desired genotype) has a significant advantage over the other schemes when the recombination rate between adjacent genes ranges from 0.1 to 0.4, while Scheme A (a two-way cross between L1 and L2 and a subsequent intercross are performed, followed by a cross with L3 and a subsequent intercross to obtain the desired genotype) is optimal when recombination rate is 0.5. Among schemes for pyramiding four genes from four lines (L1, L2, L3 and L4), Scheme I (seperately, a two-way cross between L1 and L2 (L3 and L4) followed by a backcross to L1 (L3) and a subsequent intercross are performed, then the offspring from the two sides are crossed and followed by a backcross to L1 and a subsequent intercross to obtain the desired genotype) is optimal when the recombination rate ranges from 0.1 to 0.4, while Scheme F (cross and subsequent intercross between the four lines are performed successively) is the optimal when the recombination rate is 0.5. We also disscuss how the animals' reproductive capacity, the

  5. Dynamic downscaling over western Himalayas: Impact of cloud microphysics schemes

    Science.gov (United States)

    Tiwari, Sarita; Kar, Sarat C.; Bhatla, R.

    2018-03-01

    Due to lack of observation data in the region of inhomogeneous terrain of the Himalayas, detailed climate of Himalayas is still unknown. Global reanalysis data are too coarse to represent the hydroclimate over the region with sharp orography gradient in the western Himalayas. In the present study, dynamic downscaling of the European Centre for Medium-Range Weather Forecast (ECMWF) Reanalysis-Interim (ERA-I) dataset over the western Himalayas using high-resolution Weather Research and Forecast (WRF) model has been carried out. Sensitivity studies have also been carried out using convection and microphysics parameterization schemes. The WRF model simulations have been compared against ERA-I and available station observations. Analysis of the results suggests that the WRF model has simulated the hydroclimate of the region well. It is found that in the simulations that the impact of convection scheme is more during summer months than in winter. Examination of simulated results using various microphysics schemes reveal that the WRF single-moment class-6 (WSM6) scheme simulates more precipitation on the upwind region of the high mountain than that in the Morrison and Thompson schemes during the winter period. Vertical distribution of various hydrometeors shows that there are large differences in mixing ratios of ice, snow and graupel in the simulations with different microphysics schemes. The ice mixing ratio in Morrison scheme is more than WSM6 above 400 hPa. The Thompson scheme favors formation of more snow than WSM6 or Morrison schemes while the Morrison scheme has more graupel formation than other schemes.

  6. Electron acceleration during streamer collisions in air

    DEFF Research Database (Denmark)

    Köhn, Christoph; Chanrion, Olivier; Neubert, Torsten

    2017-01-01

    during collisions of negative and a positive streamers. To explore this process, we have conducted the first self-consistent particle simulations of streamer encounters. Our simulation model is a 2-D, cylindrically symmetric, particle-in-cell code tracing the electron dynamics and solving the space...... charge fields, with a Monte Carlo scheme accounting for collisions and ionization. We present the electron density, the electric field, and the velocity distribution as functions of space and time. Assuming a background electric field 1.5 times the breakdown field, we find that the electron density...

  7. Paper electronics.

    Science.gov (United States)

    Tobjörk, Daniel; Österbacka, Ronald

    2011-05-03

    Paper is ubiquitous in everyday life and a truly low-cost substrate. The use of paper substrates could be extended even further, if electronic applications would be applied next to or below the printed graphics. However, applying electronics on paper is challenging. The paper surface is not only very rough compared to plastics, but is also porous. While this is detrimental for most electronic devices manufactured directly onto paper substrates, there are also approaches that are compatible with the rough and absorptive paper surface. In this review, recent advances and possibilities of these approaches are evaluated and the limitations of paper electronics are discussed. Copyright © 2011 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  8. Electronic Cigarettes

    Science.gov (United States)

    ... Campaigns Infogallery Be Tobacco Free Search betobaccofree.gov Menu Search ABOUT TOBACCO Tobacco Facts and Figures Tobacco and Nicotine Smoked Tobacco Products Smokeless Tobacco Products Electronic Cigarettes New FDA Regulations HEALTH EFFECTS Nicotine Addiction ...

  9. Electronic Elections

    DEFF Research Database (Denmark)

    Schürmann, Carsten

    2009-01-01

    Electronic voting technology is a two edged sword. It comes with many risks but brings also many benefits. Instead of flat out rejecting the technology as uncontrollably dangerous, we advocate in this paper a different technological angle that renders electronic elections trustworthy beyond...... the usual levels of doubt. We exploit the trust that voters currently have into the democratic process and model our techniques around that observation accordingly. In particular, we propose a technique of trace emitting computations to record the individual steps of an electronic voting machine...... for a posteriori validation on an acceptably small trusted computing base. Our technology enables us to prove that an electronic elections preserves the voter’s intent, assuming that the voting machine and the trace verifier are independent....

  10. Electronic plants.

    Science.gov (United States)

    Stavrinidou, Eleni; Gabrielsson, Roger; Gomez, Eliot; Crispin, Xavier; Nilsson, Ove; Simon, Daniel T; Berggren, Magnus

    2015-11-01

    The roots, stems, leaves, and vascular circuitry of higher plants are responsible for conveying the chemical signals that regulate growth and functions. From a certain perspective, these features are analogous to the contacts, interconnections, devices, and wires of discrete and integrated electronic circuits. Although many attempts have been made to augment plant function with electroactive materials, plants' "circuitry" has never been directly merged with electronics. We report analog and digital organic electronic circuits and devices manufactured in living plants. The four key components of a circuit have been achieved using the xylem, leaves, veins, and signals of the plant as the template and integral part of the circuit elements and functions. With integrated and distributed electronics in plants, one can envisage a range of applications including precision recording and regulation of physiology, energy harvesting from photosynthesis, and alternatives to genetic modification for plant optimization.

  11. Electron Microprobe

    Data.gov (United States)

    Federal Laboratory Consortium — The JEOL JXA-8600 is a conventional hairpin filament thermal emission electron microprobe that is more than 20 years old. It is capable of performing qualitative and...

  12. Stability of the discretization of the electron avalanche phenomenon

    Energy Technology Data Exchange (ETDEWEB)

    Villa, Andrea, E-mail: andrea.villa@rse-web.it [Ricerca Sul Sistema Energetico (RSE), Via Rubattino 50, 20134, Milano (Italy); Barbieri, Luca, E-mail: luca.barbieri@rse-web.it [Ricerca Sul Sistema Energetico (RSE), Via Rubattino 50, 20134, Milano (Italy); Gondola, Marco, E-mail: marco.gondola@rse-web.it [Ricerca Sul Sistema Energetico (RSE), Via Rubattino 50, 20134, Milano (Italy); Leon-Garzon, Andres R., E-mail: andresricardo.leon@polimi.it [CMIC Department “Giulio Natta”, Politecnico di Milano, Piazza Leonardo da Vinci 32, 20133, Milano (Italy); Malgesini, Roberto, E-mail: roberto.malgesini@rse-web.it [Ricerca Sul Sistema Energetico (RSE), Via Rubattino 50, 20134, Milano (Italy)

    2015-09-01

    The numerical simulation of the discharge inception is an active field of applied physics with many industrial applications. In this work we focus on the drift-reaction equation that describes the electron avalanche. This phenomenon is one of the basic building blocks of the streamer model. The main difficulty of the electron avalanche equation lies in the fact that the reaction term is positive when a high electric field is applied. It leads to exponentially growing solutions and this has a major impact on the behavior of numerical schemes. We analyze the stability of a reference finite volume scheme applied to this latter problem. The stability of the method may impose a strict mesh spacing, therefore a proper stabilized scheme, which is stable whatever spacing is used, has been developed. The convergence of the scheme is treated as well as some numerical experiments.

  13. Effect of national open apprenticeship scheme on youth employment ...

    African Journals Online (AJOL)

    % response and welding and fabrication with 10.0% response. Socio-economic effect of the scheme was more on employment generation with 87.5% response. Major problems of respondents in the scheme were, exclusion of some participants ...

  14. Evaluating an Earlybird Scheme: Encouraging Early Assignment Writing and Revising

    Science.gov (United States)

    Unsworth, Kerrie; Kauter, Katherine

    2008-01-01

    It is widely suggested that feedback on assignments is useful to students' learning, however, little research has examined how this feedback may be provided in large classes or the actual effects of such a scheme. We designed and implemented a voluntary "earlybird scheme" that provided detailed feedback to undergraduate Business students on a…

  15. A Scale of Cognitive Development: Validating Perry's Scheme.

    Science.gov (United States)

    Fago, George C.

    When William G. Perry (1968) developed his scheme of nine stages of cognitive development, most of which are experienced during the college years, he did not attempt to quantify it. Subsequently, T. D. Erwin (1983) constructed a scale that attempted to quantify the Perry scheme. His findings supported the overall conception of student development…

  16. Awareness and Coverage of the National Health Insurance Scheme ...

    African Journals Online (AJOL)

    A prepayment scheme for health through the National Health Insurance Scheme (NHIS) was commenced in Nigeria about ten years ago. Nigeria operates a federal system of government. Sub- national levels possess a high degree of autonomy in a number of sectors including health. It is important to assess the level of ...

  17. Review of pension schemes of Ukraine and Argentina in ...

    African Journals Online (AJOL)

    The effectiveness of a pension plan or scheme is a function of its contents, structure and management. Over the years, the non-contributory pension scheme in Nigeria was confronted with daunting challenges. As alternative to these challenges, the 2004 Pension Reform Act came into force. The 2004 Pension Reform Act ...

  18. REVIEW OF PENSION SCHEMES OF UKRAINE AND ARGENTINA ...

    African Journals Online (AJOL)

    GRACE

    Abstract. The effectiveness of a pension plan or scheme is a function of its contents, structure and management. Over the years, the non-contributory pension scheme in Nigeria was confronted with daunting challenges. As alternative to these challenges, the 2004 Pension Reform Act came into force. The 2004. Pension ...

  19. Efficient schemes for deterministic joint remote preparation of an ...

    Indian Academy of Sciences (India)

    We present three schemes for the joint remote state preparation (JRSP) of an arbitrary four-qubit W-type entangled state with complex coefficients via four and two three-qubit GHZ states as the quantum channel. In these schemes, two senders (or N senders) share the original state which they wish to help the receiver to ...

  20. Pseudorandomness analysis of the (extended) Lai–Massey scheme

    NARCIS (Netherlands)

    Luo, Yiyuan; Desmedt, Y.; Lai, Xuejia; Gong, Zheng

    2010-01-01

    In this paper we find that the two-round (extended) Lai–Massey scheme is not pseudorandom and three-round (extended) Lai–Massey scheme is not strong pseudorandom. Combined with previous work, we prove that three rounds are necessary and sufficient for the pseudorandomness and four rounds are

  1. Hybrid Modulation Scheme for Cascaded H-Bridge Inverter Cells ...

    African Journals Online (AJOL)

    This work proposes a switching technique for cascaded H-Bridge (CHB) cells. Single carrier Sinusoidal PWM (SCSPWM) scheme is employed in the generation of the gating signals. A sequential switching and base PWM circulation schemes are presented for this fundamental cascaded multilevel inverter topology.

  2. Lattice Boltzmann scheme for diffusion on triangular grids

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2003-01-01

    In this paper we present a Lattice Boltzmann scheme for diffusion on it unstructured triangular grids. In this formulation of a LB for irregular grids there is no need for interpolation, which is required in other LB schemes on irregular grids. At the end of the propagation step the lattice gas

  3. Convection-diffusion lattice Boltzmann scheme for irregular lattices

    NARCIS (Netherlands)

    Sman, van der R.G.M.; Ernst, M.H.

    2000-01-01

    In this paper, a lattice Boltzmann (LB) scheme for convection diffusion on irregular lattices is presented, which is free of any interpolation or coarse graining step. The scheme is derived using the axioma that the velocity moments of the equilibrium distribution equal those of the

  4. An Adaptive Coding Scheme For Effective Bandwidth And Power ...

    African Journals Online (AJOL)

    An adaptive coding scheme that utilizes the different merits of more than one fixed rate codes and the noise level variations on a communication channel to achieve an increased throughput has been implemented in this work. An adaptive coding scheme using three fixed-rate BCH codes was developed and implemented ...

  5. State of the Art in the Cramer Classification Scheme and ...

    Science.gov (United States)

    Slide presentation at the SOT FDA Colloquium on State of the Art in the Cramer Classification Scheme and Threshold of Toxicological Concern in College Park, MD. Slide presentation at the SOT FDA Colloquium on State of the Art in the Cramer Classification Scheme and Threshold of Toxicological Concern in College Park, MD.

  6. Sensor scheme design for active structural acoustic control

    NARCIS (Netherlands)

    Berkhoff, Arthur P.

    Efficient sensing schemes for the active reduction of sound radiation from plates are presented based on error signals derived from spatially weighted plate velocity or near-field pressure. The schemes result in near-optimal reductions as compared to weighting procedures derived from eigenvector or

  7. A robust and secure watermarking scheme based on singular ...

    Indian Academy of Sciences (India)

    In this work, we propose a blind watermarking scheme based on the discrete wavelet transform (DWT) and singular value decomposition (SVD). Singular values (SV's) of high frequency (HH) band are used to optimize perceptual transparency and robustness constraints. Although most of the SVD-based schemes prove to ...

  8. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    ... to avoid the possibility of anomalous solutions encountered while using the conventional schemes is also proposed and evaluated. Results from extensive simulation studies are provided to highlight the strengths and weaknesses of these existing and proposed schemes, especially from the point of view of reliability.

  9. Design Scheme of Remote Monitoring System Based on Qt

    Directory of Open Access Journals (Sweden)

    Xu Dawei

    2015-01-01

    Full Text Available This paper introduces a design scheme of remote monitoring system based on Qt, the scheme of remote monitoring system based on S3C2410 and Qt, with the aid of cross platform development tools Qt and powerful ARM platform design and implementation. The development of remote video surveillance system based on embedded terminal has practical significance and value.

  10. LDPC-PPM Coding Scheme for Optical Communication

    Science.gov (United States)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  11. Scheme on the Web and in the Classroom

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2012-01-01

    LAML is a software system that brings XML languages into Scheme as a collection of Scheme functions. The XML languages are defined by XML document type definitions (DTDs). We review the development of LAML during more than a decade, and we collect the experiences from these efforts. The paper des...

  12. Adaptive guard channel allocation scheme with buffer for mobile ...

    African Journals Online (AJOL)

    A simulation program written in Java programming language evaluates the performance of the scheme based on blocking/dropping probabilities of both calls. Results of the evaluation is described using descriptive statistics such as bar charts. The proposed scheme would reduce congestion and improve quality of service ...

  13. Gaps in the implementation of Uganda's students' loan scheme ...

    African Journals Online (AJOL)

    This study was conducted to examine the performance of the student loan scheme in Uganda. Making reference to related literature, views of selected stakeholders, and the performance of government's earlier lending programmes, the study identifies gaps in the performance of the scheme. These are in the areas of ...

  14. An accurate scheme by block method for third order ordinary ...

    African Journals Online (AJOL)

    A block linear multistep method for solving special third order initial value problems of ordinary differential equations is presented in this paper. The approach of collocation approximation is adopted in the derivation of the scheme and then the scheme is applied as simultaneous integrator to special third order initial value ...

  15. A Heuristic Hierarchical Scheme for Academic Search and Retrieval

    DEFF Research Database (Denmark)

    Amolochitis, Emmanouil; Christou, Ioannis T.; Tan, Zheng-Hua

    2013-01-01

    We present PubSearch, a hybrid heuristic scheme for re-ranking academic papers retrieved from standard digital libraries such as the ACM Portal. The scheme is based on the hierarchical combination of a custom implementation of the term frequency heuristic, a time-depreciated citation score...

  16. A FRACTAL-BASED STOCHASTIC INTERPOLATION SCHEME IN SUBSURFACE HYDROLOGY

    Science.gov (United States)

    The need for a realistic and rational method for interpolating sparse data sets is widespread. Real porosity and hydraulic conductivity data do not vary smoothly over space, so an interpolation scheme that preserves irregularity is desirable. Such a scheme based on the properties...

  17. Valuation and Hedging of Variable Annuities in Pension Schemes

    NARCIS (Netherlands)

    Bovenberg, A.L.; van Bilsen, S.; Laeven, R.J.A.

    2016-01-01

    This paper explores defined ambition pension schemes that provide (deferred) variable annuities. These pension schemes allocate various risks (i.e., real interest rate, expected inflation and stock market risk) to the policyholders on the basis of complete contracts. We show how these variable

  18. Practical schemes for privacy and security enhanced RFID

    NARCIS (Netherlands)

    Hoepman, J.H.; Joosten, R.

    2010-01-01

    Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather costly key

  19. A toolbox for the lifting scheme on quincunx grids (LISQ)

    NARCIS (Netherlands)

    P.M. de Zeeuw (Paul)

    2002-01-01

    textabstractA collection of functions written in MATLAB is presented. The functions include second generation wavelet decomposition and reconstruction tools for images as well as functions for the computation of moments. The wavelet schemes rely on the lifting scheme of Sweldens and use the

  20. Comparing interpolation schemes in dynamic receive ultrasound beamforming

    DEFF Research Database (Denmark)

    Kortbek, Jacob; Andresen, Henrik; Nikolov, Svetoslav

    2005-01-01

    In medical ultrasound interpolation schemes are of- ten applied in receive focusing for reconstruction of image points. This paper investigates the performance of various interpolation scheme by means of ultrasound simulations of point scatterers in Field II. The investigation includes conventional...

  1. An efficient entire chaos-based scheme for deniable authentication

    Energy Technology Data Exchange (ETDEWEB)

    Xiao Di [College of Computer Science and Engineering, Chongqing University, Chongqing, 400044 (China) and College of Mechanical Engineering, Chongqing University, Chongqing, 400044 (China)]. E-mail: xiaodi_cqu@hotmail.com; Liao Xiaofeng [College of Computer Science and Engineering, Chongqing University, Chongqing, 400044 (China); Wong, K.W. [Department of Computer Engineering and Information Technology, City University of Hong Kong, Hong Kong (China)

    2005-02-01

    By using a chaotic encryption-hash parallel algorithm and the semi-group property of Chebyshev chaotic map, we propose a secure and efficient scheme for the deniable authentication. The scheme is efficient, practicable and reliable, with high potential to be adopted for e-commerce.

  2. Convexity-preserving Bernstein–Bézier quartic scheme

    Directory of Open Access Journals (Sweden)

    Maria Hussain

    2014-07-01

    Full Text Available A C1 convex surface data interpolation scheme is presented to preserve the shape of scattered data arranged over a triangular grid. Bernstein–Bézier quartic function is used for interpolation. Lower bound of the boundary and inner Bézier ordinates is determined to guarantee convexity of surface. The developed scheme is flexible and involves more relaxed constraints.

  3. Group schemes with additional structures and Weyl group cosets

    NARCIS (Netherlands)

    Moonen, B.

    2000-01-01

    Let Y be an abelian variety of dimension g over an algebraically closed eld k of characteristic p To Y we can associate its pkernel Y p which is a nite commutative kgroup scheme of rank pg In the unpublished manuscript Kraft showed that xing g there are only nitely many such group schemes

  4. Smallholder irrigation schemes in South Africa: A review of ...

    African Journals Online (AJOL)

    The status and characteristics of the 302 smallholder irrigation schemes found in South Africa are discussed and knowledge on South African smallholder irrigation schemes generated by the Water Research Commission (WRC) over a period of nearly 20 years is reviewed. Themes covered include planning, design and ...

  5. Review of the Assistance for Isolated Children Scheme.

    Science.gov (United States)

    Tomlinson, D. G.; Tannock, P. D.

    A total of 3,732 recipients of Assistance for Isolated Children (AIC) allowances during 1979 and 1980 received questionnaires and parents of 313 families were interviewed to determine who benefitted from the AIC Scheme, what use was made of the AIC allowance, what effect did the AIC Scheme appear to have had, and what anomalies existed in relation…

  6. Some Comments on the Scheme of Arrangement as an "Affected ...

    African Journals Online (AJOL)

    Some Comments on the Scheme of Arrangement as an "Affected Transaction" as Defined in the Companies Act 71 of 2008. ... revisited by the legislature for clarification. KEYWORDS: Scheme of arrangement; affected transaction; Companies Act; company takeover; re-acquisition of companies; south african company law ...

  7. The Defunct Rivers State 'School to Land' Scheme: A Dream ...

    African Journals Online (AJOL)

    Ensuring food security and self-reliance through farming made many countries to embark on farming schemes such as the Gezira in Sudan, Alto Beni in Bolivia, Nyakashaka of Uganda, farming settlements of Eastern and Western Nigeria and the ―School to Land‖ scheme. The initial euphoria that welcomed these ...

  8. AN EFFECTIVE SCHEDULING SCHEME FOR LIFT CLUBS

    Directory of Open Access Journals (Sweden)

    W. Van Wijck

    2012-01-01

    Full Text Available

    ENGLISH ABSTRACT: This paper describes a formula for scheduling the day-to-day operation of a lift club. The formula is remarkably simple, and can easily be implemented on a spreadsheet. It is also extremely flexible and can cater for almost any peculiarity that may arise. Much like a business, the lift club is viewed as an entity in its own right, rather than as a collection of individuals. The scheme can be used to generate interesting statistics such as percentage utilization of each member, average percentage utilization of all members, effective size of the lift club, etc. In addition, a graph, depicting each member's liability towards the club against time, can be generated. Finally, every member can obtain a record of his/her trip data over any specific period, which may be handy for income tax purposes.

    AFRIKAANSE OPSOMMING: Hierdie artikel beskryf 'n fonnule vir die dag-tot-dag skedulering van 'n saamryklub. Die fonnule is merkwaardig eenvoudig en kan maklik op 'n sigblad geimplementeer word. Dit is ook besonder buigsaam deurdat dit vir bykans enige gebeurlikheid voorsienning maak. Die voorgestelde skeduleringsmetode beskou die saamryklub as 'n entiteit in eie reg, en skeduleing word vanuit die saamryklub se oogpunt gedoen. Die skema kan gebruik word om interesante statistieke soos byvoorbeeld die persentasie benutting deur enige lid, die gemiddelde persentasie benutting deur aIle lede, die effektiewe grootte van die klub, ens., te genereer. Voorts kan 'n grafiek gegenereer word wat elke lid se aanspreeklikheid teenoor die klub as 'n funksie van tyd grafies vertoon. Laastens kan enige lid op enige stadium 'n rekord trek van die aantal saamrygeleenthede wat hy oor 'n bepaalde periode voorsien en ontvang het. Dit mag handig wees vir belasting doeleindes.

  9. Externally Controlled Injection of Electrons by a Laser Pulse in a Laser Wakefield Electron Accelerator

    CERN Document Server

    Chen Szu Yuan; Chen Wei Ting; Chien, Ting-Yei; Lee, Chau-Hwang; Lin, Jiunn-Yuan; Wang, Jyhpyng

    2005-01-01

    Spatially and temporally localized injection of electrons is a key element for development of plasma-wave electron accelerator. Here we report the demonstration of two different schemes for electron injection in a self-modulated laser wakefield accelerator (SM-LWFA) by using a laser pulse. In the first scheme, by implementing a copropagating laser prepulse with proper timing, we are able to control the growth of Raman forward scattering and the production of accelerated electrons. We found that the stimulated Raman backward scattering of the prepulse plays the essential role of injecting hot electrons into the fast plasma wave driven by the pump pulse. In the second scheme, by using a transient density ramp we achieve self-injection of electrons in a SM-LWFA with spatial localization. The transient density ramp is produced by a prepulse propagating transversely to drill a density depression channel via ionization and expansion. The same mechanism of injection with comparable efficiency is also demonstrated wi...

  10. Evaluation of the Norwegian R&D Tax Credit Scheme

    Directory of Open Access Journals (Sweden)

    Ådne Cappelen

    2010-11-01

    Full Text Available We find that the Norwegian R&D tax credit scheme introduced in 2002 mainly works as intended. The scheme is cost-effective and it is used by a large number of firms. It stimulates these firms to invest more in R&D, and, in particular, the effect is positive for small firms with little R&D experience. The returns on the R&D investments supported by the scheme are positive and generally not different from the returns to other R&D investments. We have found examples of what can be interpreted as tax motivated adjustments to the scheme, but to some extent this must be accepted as a cost to subsidy and support schemes intended for use by a large number of economic agents. This is particularly so when attempts are made to keep administrative expenditures and control routines at a low level.

  11. Robust Model Predictive Control Schemes for Tracking Setpoints

    Directory of Open Access Journals (Sweden)

    Vu Trieu Minh

    2010-01-01

    Full Text Available This paper briefly reviews the development of nontracking robust model predictive control (RMPC schemes for uncertain systems using linear matrix inequalities (LMIs subject to input saturated and softened state constraints. Then we develop two new tracking setpoint RMPC schemes with common Lyapunov function and with zero terminal equality subject to input saturated and softened state constraints. The novel tracking setpoint RMPC schemes are able to stabilize uncertain systems once the output setpoints lead to the violation of the state constraints. The state violation can be regulated by changing the value of the weighting factor. A brief comparative simulation study of the two tracking setpoint RMPC schemes is done via simple examples to demonstrate the ability of the softened state constraint schemes. Finally, some features of future research from this study are discussed.

  12. Signature Schemes Secure against Hard-to-Invert Leakage

    DEFF Research Database (Denmark)

    Faust, Sebastian; Hazay, Carmit; Nielsen, Jesper Buus

    2012-01-01

    -theoretically reveal the entire secret key. In this work, we propose the first constructions of digital signature schemes that are secure in the auxiliary input model. Our main contribution is a digital signature scheme that is secure against chosen message attacks when given an exponentially hard-to-invert function...... of the secret key. As a second contribution, we construct a signature scheme that achieves security for random messages assuming that the adversary is given a polynomial-time hard to invert function. Here, polynomial-hardness is required even when given the entire public-key – so called weak auxiliary input...... security. We show that such signature schemes readily give us auxiliary input secure identification schemes...

  13. A simplification of the unified gas kinetic scheme

    CERN Document Server

    Chen, Songze; Xu, Kun

    2016-01-01

    Unified gas kinetic scheme (UGKS) is an asymptotic preserving scheme for the kinetic equations. It is superior for transition flow simulations, and has been validated in the past years. However, compared to the well known discrete ordinate method (DOM) which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. Based on the observation that the equilibrium part of the UGKS fluxes can be evaluated analytically, the equilibrium part in the UGKS flux is not necessary to be discretized in velocity space. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-S...

  14. Near-optimal labeling schemes for nearest common ancestors

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Bistrup Halvorsen, Esben; Larsen, Kasper Green

    2014-01-01

    and Korman (STOC'10) established that labels in ancestor labeling schemes have size log n + Θ(log log n), our new lower bound separates ancestor and NCA labeling schemes. Our upper bound improves the 10 log n upper bound by Alstrup, Gavoille, Kaplan and Rauhe (TOCS'04), and our theoretical result even......We consider NCA labeling schemes: given a rooted tree T, label the nodes of T with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the label of their nearest common ancestor. For trees with n nodes we present upper and lower bounds...... establishing that labels of size (2 ± ε)log n, ε schemes have labels of size log n + Ω(log log n). Our lower bound increases this to log n + Ω(log n) for NCA labeling schemes. Since Fraigniaud...

  15. Sound classification of dwellings - Comparison of schemes in Europe

    DEFF Research Database (Denmark)

    Rasmussen, Birgit

    2009-01-01

    , facade sound insulation and installation noise. The quality classes reflect dierent levels of acoustical comfort. The paper presents and compares the sound classification schemes in Europe. The schemes have been implemented and revised gradually since the 1990es. However, due to lack of coordination......, there are significant discrepancies. Descriptors, number of quality classes, class intervals, class levels and status of the classification schemes in relation to legal requirements vary. In some countries the building code and the classification standard are incoherent. In other countries, they are strongly......National sound classification schemes for dwellings exist in nine countries in Europe, and proposals are under preparation in more countries. The schemes specify class criteria concerning several acoustic aspects, the main criteria being about airborne and impact sound insulation between dwellings...

  16. Hybrid update / invalidate schemes for cache coherence protocols

    Directory of Open Access Journals (Sweden)

    R. V. Dovgopol

    2015-01-01

    Full Text Available In general when considering cache coherence, write back schemes are the default. These schemes invalidate all other copies of a data block during a write. In this paper we propose several hybrid schemes that will switch between updating and invalidating on processor writes at runtime, depending on program conditions. This kind of approaches tend to improve the overall performance of systems in numerous fields ranging from the Information Security to the Civil Aviation. We created our own cache simulator on which we could implement our schemes, and generated data sets from both commercial benchmarks and through artificial methods to run on the simulator. We analyze the results of running the benchmarks with various schemes, and suggest further research that can be done in this area.

  17. Electron transfer in pnicogen bonds.

    Science.gov (United States)

    Guan, Liangyu; Mo, Yirong

    2014-10-02

    As a new type of noncovalent interactions, pnicogen bond between a VA group element (N, P, and As) and an electron donor (Lewis base) has grabbed attention in recent several years. Here we employ the block-localized wave function (BLW) based energy decomposition scheme to probe the bonding nature in a series of substituted phosphines X(n)PH(3-n) complexed with ammonia. As the BLW method can derive the optimal monomer orbitals in a complex with the electron transfer among monomers quenched, we can effectively examine the HOMO-LUMO interaction in these pnicogen bonding systems. Among various energy components, electron transfer energy together with the polarization energy dominates the pnicogen bonding energy. Although usually it is assumed that the electron transfer from ammonia to substituted phosphines occurs in the form of n → σ*(XP) hyperconjugative interaction, we identify a kind of new pathway when X = NO2 and CN, i.e., n → dπ*, which results from the interaction between the π orbital of cyano or nitro substituent and d orbitals on P. But still this picture of electron transfer using a single pair of orbitals is greatly simplified, as the electron density difference (EDD) maps corresponding to the overall electron transfer processes show the accumulation of electron density on the P side opposite to the X-P bond, with insignificant or even negligible gain of electron density on the substituent group side. Thus, the EDD maps tend to support the concept of σ-hole in pnicogen bonds.

  18. Study of Electron Polarization Dynamics in the JLEIC at Jlab

    Energy Technology Data Exchange (ETDEWEB)

    Lin, Fanglei [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Derbenev, Yaroslav [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Morozov, Vasiliy [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Zhang, Yuhong [Thomas Jefferson National Accelerator Facility (TJNAF), Newport News, VA (United States); Barber, Desmond P. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)

    2017-05-01

    The design of an electron polarization scheme in the Jefferson Lab Electron-Ion Collider (JLEIC) aims to attain a high longitudinal electron polarization (over 70%) at collision points as required by the nuclear physics program. Comprehensive strategies for achieving this goal have been considered and developed including injection of highly polarized electrons from CEBAF, mechanisms for manipulation and preservation of the polarization in the JLEIC collider ring and measurement of the electron polarization. In particular, maintaining a sufficiently long polarization lifetime is crucial for accumulation of adequate experimental statistics. The chosen electron polarization configuration, based on the unique figure-8 geometry of the ring, removes the electron spin-tune energy dependence. This significantly simplifies the control of the electron polarization and suppresses the synchrotron sideband resonances. This paper reports recent studies and simulations of the electron polarization dynamics in the JLEIC electron collider ring.

  19. Electrons and Disorder in Solids

    CERN Document Server

    Gantmakher, VF

    2005-01-01

    This book has been written for those who study or professionally deal with solid state physics. It contains modern concepts about the physics of electrons in solids. It is written using a minimum of mathematics. The emphasis is laid on various physical models aimed at stimulating creative thinking. The book helps the reader choose the most efficient scheme of an experiment or the optimal algorithm of a calculation. Boltzmann and hopping types of conductivity are compared. Thequalitative theory of weak localization is presented and its links with the true localization and metal-insulator transi

  20. Electron momentum distribution and electronic response of ceramic borides

    Energy Technology Data Exchange (ETDEWEB)

    Heda, N.L. [Department of Pure and Applied Physics, University of Kota, Kota 324005 (India); Meena, B.S.; Mund, H.S. [Department of Physics, Mohanlal Sukhadia University, Udaipur 313001 (India); Sahariya, Jagrati [Department of Physics, Manipal University, Jaipur 303007 (India); Kumar, Kishor [Department of Physics, Mohanlal Sukhadia University, Udaipur 313001 (India); Ahuja, B.L., E-mail: blahuja@yahoo.com [Department of Physics, Mohanlal Sukhadia University, Udaipur 313001 (India)

    2017-03-15

    Isotropic Compton profiles of transition metal based ceramics TaB and VB have been measured using {sup 137}Cs (661.65 keV) γ-ray Compton spectrometer. The experimental momentum densities are compared with those deduced using linear combination of atomic orbitals (LCAO) with Hartree-Fock (HF), density functional theory (DFT) with Wu-Cohen generalized gradient approximation (WCGGA) and also the hybridization of HF and DFT (namely B3PW and PBE0) schemes. It is found that LCAO-DFT-WCGGA scheme based profiles give an overall better agreement with the experimental data, for both the borides. In addition, we have computed the Mulliken's population (MP) charge transfer data, energy bands, density of states and Fermi surface topology of both the borides using full potential-linearized augmented plane wave (FP-LAPW) and LCAO methods with DFT-WCGGA scheme. Cross-overs of Fermi level by the energy bands corresponding to B-2p and valence d-states of transition metals lead to metallic character in both the compounds. Equal-valence-electron-density profiles and MP analysis suggest more ionic character of VB than that of TaB.