Free-electron laser system with Raman amplifier outcoupling
Energy Technology Data Exchange (ETDEWEB)
Linford, G.J.
1988-05-03
A free-electron laser system is described comprising: a free-electron laser pump beam generator producing a high-power optical output beam in a vacuum environement; a Raman amplifier cell located in the path of the output beam from the pump beam generator; means for generating and introducing a Stokes seed beam into the Raman amplifier cell, a pair of gaseous windows through which the output beam enters and leaves the Raman amplifier cell, each window having a stream of gas moving continuously in a direction generally perpendicular to the beam; and a mirror positioned in the path of the output beam from the Raman amplifier, the mirror functioning to reflect and further direct the output beam, but not the unwanted spectral components.
Engineering light outcoupling in 2D materials
Lien, Derhsien
2015-02-11
When light is incident on 2D transition metal dichalcogenides (TMDCs), it engages in multiple reflections within underlying substrates, producing interferences that lead to enhancement or attenuation of the incoming and outgoing strength of light. Here, we report a simple method to engineer the light outcoupling in semiconducting TMDCs by modulating their dielectric surroundings. We show that by modulating the thicknesses of underlying substrates and capping layers, the interference caused by substrate can significantly enhance the light absorption and emission of WSe2, resulting in a ∼11 times increase in Raman signal and a ∼30 times increase in the photoluminescence (PL) intensity of WSe2. On the basis of the interference model, we also propose a strategy to control the photonic and optoelectronic properties of thin-layer WSe2. This work demonstrates the utilization of outcoupling engineering in 2D materials and offers a new route toward the realization of novel optoelectronic devices, such as 2D LEDs and solar cells.
Engineering light outcoupling in 2D materials
Lien, Derhsien; Kang, Jeongseuk; Amani, Matin; Chen, Kevin; Tosun, Mahmut; Wang, Hsinping; Roy, Tania; Eggleston, Michael S.; Wu, Ming C.; Dubey, Madan; Lee, Sichen; He, Jr-Hau; Javey, Ali
2015-01-01
When light is incident on 2D transition metal dichalcogenides (TMDCs), it engages in multiple reflections within underlying substrates, producing interferences that lead to enhancement or attenuation of the incoming and outgoing strength of light. Here, we report a simple method to engineer the light outcoupling in semiconducting TMDCs by modulating their dielectric surroundings. We show that by modulating the thicknesses of underlying substrates and capping layers, the interference caused by substrate can significantly enhance the light absorption and emission of WSe2, resulting in a ∼11 times increase in Raman signal and a ∼30 times increase in the photoluminescence (PL) intensity of WSe2. On the basis of the interference model, we also propose a strategy to control the photonic and optoelectronic properties of thin-layer WSe2. This work demonstrates the utilization of outcoupling engineering in 2D materials and offers a new route toward the realization of novel optoelectronic devices, such as 2D LEDs and solar cells.
More efficient second harmonic generation of whispering gallery modes by selective out-coupling
Trainor, Luke S.; Sedlmeir, Florian; Peuntinger, Christian; Schwefel, Harald G. L.
2017-01-01
We demonstrate second harmonic generation (SHG) in an $x$-cut congruent lithium niobate (LN) whispering gallery mode resonator. We first show theoretically that independent control of the coupling of the pump and signal modes is optimal for high conversion rates. A scheme based on our earlier work in Ref. [1] is then implemented experimentally to verify this. Thereby we are able to improve on the efficiency of SHG by more than an order of magnitude by selectively out-coupling using a LN prism...
Date Attachable Offline Electronic Cash Scheme
Directory of Open Access Journals (Sweden)
Chun-I Fan
2014-01-01
Full Text Available Electronic cash (e-cash is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.
Date attachable offline electronic cash scheme.
Fan, Chun-I; Sun, Wei-Zhe; Hau, Hoi-Tung
2014-01-01
Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling.
Date Attachable Offline Electronic Cash Scheme
Sun, Wei-Zhe; Hau, Hoi-Tung
2014-01-01
Electronic cash (e-cash) is definitely one of the most popular research topics in the e-commerce field. It is very important that e-cash be able to hold the anonymity and accuracy in order to preserve the privacy and rights of customers. There are two types of e-cash in general, which are online e-cash and offline e-cash. Both systems have their own pros and cons and they can be used to construct various applications. In this paper, we pioneer to propose a provably secure and efficient offline e-cash scheme with date attachability based on the blind signature technique, where expiration date and deposit date can be embedded in an e-cash simultaneously. With the help of expiration date, the bank can manage the huge database much more easily against unlimited growth, and the deposit date cannot be forged so that users are able to calculate the amount of interests they can receive in the future correctly. Furthermore, we offer security analysis and formal proofs for all essential properties of offline e-cash, which are anonymity control, unforgeability, conditional-traceability, and no-swindling. PMID:24982931
A simple photoionization scheme for characterizing electron and ion spectrometers
Energy Technology Data Exchange (ETDEWEB)
Wituschek, A.; Vangerow, J. von; Grzesiak, J.; Stienkemeier, F.; Mudrich, M., E-mail: mudrich@physik.uni-freiburg.de [Physikalisches Institut, Universität Freiburg, 79104 Freiburg (Germany)
2016-08-15
We present a simple diode laser-based photoionization scheme for generating electrons and ions with well-defined spatial and energetic (≲2 eV) structures. This scheme can easily be implemented in ion or electron imaging spectrometers for the purpose of off-line characterization and calibration. The low laser power ∼1 mW needed from a passively stabilized diode laser and the low flux of potassium atoms in an effusive beam make our scheme a versatile source of ions and electrons for applications in research and education.
Zhao, Xin-Dong; Li, Yan-Qing; Xiang, Heng-Yang; Zhang, Yi-Bo; Chen, Jing-De; Xu, Lu-Hai; Tang, Jian-Xin
2017-01-25
Inverted organic light-emitting diode (OLED) has attracted extensive attention due to the demand in active-matrix OLED display panels as its geometry enables the direct connection with n-channel transistor backplane on the substrate. One key challenge of high-performance inverted OLED is an efficient electron-injection layer with superior electrical and optical properties to match the indium tin oxide cathode on substrate. We here propose a synergistic electron-injection architecture using surface modification of ZnO layer to simultaneously promote electron injection into organic emitter and enhance out-coupling of waveguided light. An efficient inverted white OLED is realized by introducing the nanoimprinted aperiodic nanostructure of ZnO for broadband and angle-independent light out-coupling and inserting an n-type doped interlayer for energy level tuning and injection barrier lowering. As a result, the optimized inverted white OLEDs have an external quantum efficiency of 42.4% and a power efficiency of 85.4 lm W 1- , which are accompanied by the superiority of angular color stability over the visible wavelength range. Our results may inspire a promising approach to fabricate high-efficiency inverted OLEDs for large-scale display panels.
Closed-Loop Autofocus Scheme for Scanning Electron Microscope
Directory of Open Access Journals (Sweden)
Cui Le
2015-01-01
Full Text Available In this paper, we present a full scale autofocus approach for scanning electron microscope (SEM. The optimal focus (in-focus position of the microscope is achieved by maximizing the image sharpness using a vision-based closed-loop control scheme. An iterative optimization algorithm has been designed using the sharpness score derived from image gradient information. The proposed method has been implemented and validated using a tungsten gun SEM at various experimental conditions like varying raster scan speed, magnification at real-time. We demonstrate that the proposed autofocus technique is accurate, robust and fast.
A New Proxy Electronic Voting Scheme Achieved by Six-Particle Entangled States
Cao, Hai-Jing; Ding, Li-Yuan; Jiang, Xiu-Li; Li, Peng-Fei
2018-03-01
In this paper, we use quantum proxy signature to construct a new secret electronic voting scheme. In our scheme, six particles entangled states function as quantum channels. The voter Alice, the Vote Management Center Bob, the scrutineer Charlie only perform two particles measurements on the Bell bases to realize the electronic voting process. So the scheme reduces the technical difficulty and increases operation efficiency. We use quantum key distribution and one-time pad to guarantee its unconditional security. The significant advantage of our scheme is that transmitted information capacity is twice as much as the capacity of other schemes.
Pixel detector readout electronics with two-level discriminator scheme
International Nuclear Information System (INIS)
Pengg, F.
1998-01-01
In preparation for a silicon pixel detector with more than 3,000 readout channels per chip for operation at the future large hadron collider (LHC) at CERN the analog front end of the readout electronics has been designed and measured on several test-arrays with 16 by 4 cells. They are implemented in the HP 0.8 microm process but compatible with the design rules of the radiation hard Honeywell 0.8 microm bulk process. Each cell contains bump bonding pad, preamplifier, discriminator and control logic for masking and testing within a layout area of only 50 microm by 140 microm. A new two-level discriminator scheme has been implemented to cope with the problems of time-walk and interpixel cross-coupling. The measured gain of the preamplifier is 900 mV for a minimum ionizing particle (MIP, about 24,000 e - for a 300 microm thick Si-detector) with a return to baseline within 750 ns for a 1 MIP input signal. The full readout chain (without detector) shows an equivalent noise charge to 60e - r.m.s. The time-walk, a function of the separation between the two threshold levels, is measured to be 22 ns at a separation of 1,500 e - , which is adequate for the 40 MHz beam-crossing frequency at the LHC. The interpixel cross-coupling, measured with a 40fF coupling capacitance, is less than 3%. A single cell consumes 35 microW at 3.5 V supply voltage
Khachatryan, A.G.; van Goor, F.A.; Boller, Klaus J.; Reitsma, A.J.W.; Jaroszynski, D.A.
2004-01-01
Recently a new electron-bunch injection scheme for the laser wakefield accelerator has been proposed [JETP Lett. 74, 371 (2001); Phys. Rev. E 65, 046504 (2002)]. In this scheme, a low energy electron bunch, sent in a plasma channel just before a high-intensity laser pulse, is trapped in the laser
Complete snake and rotator schemes for spin polarization in proton rings and large electron rings
International Nuclear Information System (INIS)
Steffen, K.
1983-11-01
In order to maintain spin polarization in proton rings and large electron rings, some generalized Siberian Snake scheme may be required to make the spin tune almost independent of energy and thus avoid depolarizing resonances. The practical problem of finding such schemes that, at reasonable technical effort, can be made to work over large energy ranges has been addressed before and is here revisited in a broadened view and with added new suggestions. As a result, possibly optimum schemes for electron rings (LEP) and proton rings are described. In the proposed LEP scheme, spin rotation is devised such that, at the interaction points, the spin direction is longitudinal as required for experiments. (orig.)
Iterative scheme for electronic systems: using one-electron Green's functions
International Nuclear Information System (INIS)
Hyslop, J.; Rees, D.
1976-01-01
An iterative generalization of the minimum principle proposed for electronic systems by Hall, Hyslop, and Rees is investigated. It is shown that this generalization still retains the advantage of using members of a larger class of trial wave functions, for example those with discontinuities, as initial approximations to the wave functions. This scheme has the advantage that, at each stage of iteration, an upper bound is obtained which is at least as good as that obtained previously. The theory is first applied to the hydrogen atom. It is then adapted to estimate the Hartree--Fock energy of the helium atom, the Hartree--Fock limit being obtained after a relatively small number of iterations
Averaging scheme for atomic resolution off-axis electron holograms.
Niermann, T; Lehmann, M
2014-08-01
All micrographs are limited by shot-noise, which is intrinsic to the detection process of electrons. For beam insensitive specimen this limitation can in principle easily be circumvented by prolonged exposure times. However, in the high-resolution regime several instrumental instabilities limit the applicable exposure time. Particularly in the case of off-axis holography the holograms are highly sensitive to the position and voltage of the electron-optical biprism. We present a novel reconstruction algorithm to average series of off-axis holograms while compensating for specimen drift, biprism drift, drift of biprism voltage, and drift of defocus, which all might cause problematic changes from exposure to exposure. We show an application of the algorithm utilizing also the possibilities of double biprism holography, which results in a high quality exit-wave reconstruction with 75 pm resolution at a very high signal-to-noise ratio. Copyright © 2014 Elsevier Ltd. All rights reserved.
Schemes of Superradiant Emission from Electron Beams and "Spin-Flip Emission of Radiation"
Gover, A
2005-01-01
A unified analysis for Superradiant emission from bunched electron beams in various kinds of radiation scheme is presented. Radiation schemes that can be described by the formulation include Pre-bunched FEL (PB-FEL), Coherent Synchrotron Radiation (CSR), Smith-Purcell Radiation, Cerenkov-Radiation, Transition-Radiation and more. The theory is based on mode excitation formulation - either discrete or continuous (the latter - in open structures). The discrete mode formulation permits simple evaluation of the spatially coherent power and spectral power of the source. These figures of merit of the radiation source are useful for characterizing and comparing the performance of different radiation schemes. When the bunched electron beam emits superradiantly, these parameters scale like the square of the number of electrons, orders of magnitude more than spontaneous emission. The formulation applies to emission from single electron bunches, periodically bunched beams, or emission from a finite number of bunches in a...
Recent advances in light outcoupling from white organic light-emitting diodes
Gather, Malte C.; Reineke, Sebastian
2015-01-01
Organic light-emitting diodes (OLEDs) have been successfully introduced to the smartphone display market and have geared up to become contenders for applications in general illumination where they promise to combine efficient generation of white light with excellent color quality, glare-free illumination, and highly attractive designs. Device efficiency is the key requirement for such white OLEDs, not only from a sustainability perspective, but also because at the high brightness required for general illumination, losses lead to heating and may, thus, cause rapid device degradation. The efficiency of white OLEDs increased tremendously over the past two decades, and internal charge-to-photon conversion can now be achieved at ˜100% yield. However, the extraction of photons remains rather inefficient (typically physics of outcoupling in white OLEDs and review recent progress toward making light extraction more efficient. We describe how structures that scatter, refract, or diffract light can be attached to the outside of white OLEDs (external outcoupling) or can be integrated close to the active layers of the device (internal outcoupling). Moreover, the prospects of using top-emitting metal-metal microcavity designs for white OLEDs and of tuning the average orientation of the emissive molecules within the OLED are discussed.
Z-Slicer: A Scheme for Shaping the Electron Beam Profile in a Linac
Energy Technology Data Exchange (ETDEWEB)
Thangaraj, J. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Crawford, D. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Broemmelsiek, D. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Thurman-Keup, R. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Baffes, C. [Fermi National Accelerator Lab. (FNAL), Batavia, IL (United States); Wortley, W. [Univ. of Rochester, NY (United States)
2014-01-01
A train of short bunches ( 100 fs) are at a premium at accelerator facilities and their applications include terahertz (THz) generation, short bunch diagnostics, advanced accelerator R&D, etc. In this work we report on the design and simulation of an experiment involving a 20 MeV electron beam, that will be intercepted by a set of metallic slits inside a bunch compressor. After the mask, some electrons are scattered while other pass through unaffected. After exiting the bunch compressor, those electrons that were not affected by the slits will appear as short electron bunches. The key advantage of our scheme is its simplicity, tunability and low cost. The scheme does not require any additional hardware such as lasers, undulator, or transverse deflecting cavity. The tuning variable is only the RF-chirp. The detection of the bunching requires just a skew quad in the chicane and a transverse screen downstream.
Varfolomeev, A A
2000-01-01
New non-collinear schemes are suggested for transverse velocity modulation of electron beams and for the generation of coherent spontaneous radiation by these transversely modulated beams. It is shown that due to the non-collinearity some orders of magnitude enhancement can be achieved for the coherent spontaneous radiation (CSR) power at both the fundamental and harmonic frequencies.
Energy Technology Data Exchange (ETDEWEB)
C. Tennant, S.V. Benson, D. Douglas, P. Evtushenko, R.A. Legg
2011-09-01
We describe an electron bunch compression scheme suitable for use in a light source driven by a superconducting radio frequency (SRF) linac. The key feature is the use of a recirculating linac to perform the initial bunch compression. Phasing of the second pass beam through the linac is chosen to de-chirp the electron bunch prior to acceleration to the final energy in an SRF linac ('afterburner'). The final bunch compression is then done at maximum energy. This scheme has the potential to circumvent some of the most technically challenging aspects of current longitudinal matches; namely transporting a fully compressed, high peak current electron bunch through an extended SRF environment, the need for a RF harmonic linearizer and the need for a laser heater. Additional benefits include a substantial savings in capital and operational costs by efficiently using the available SRF gradient.
Directory of Open Access Journals (Sweden)
G. Andonian
2011-07-01
Full Text Available High-resolution measurement of the longitudinal profile of a relativistic electron beam is of utmost importance for linac based free-electron lasers and other advanced accelerator facilities that employ ultrashort bunches. In this paper, we investigate a novel scheme to measure ultrashort bunches (subpicosecond with exceptional temporal resolution (hundreds of attoseconds and dynamic range. The scheme employs two orthogonally oriented deflecting sections. The first imparts a short-wavelength (fast temporal resolution horizontal angular modulation on the beam, while the second imparts a long-wavelength (slow angular kick in the vertical dimension. Both modulations are observable on a standard downstream screen in the form of a streaked sinusoidal beam structure. We demonstrate, using scaled variables in a quasi-1D approximation, an expression for the temporal resolution of the scheme and apply it to a proof-of-concept experiment at the UCLA Neptune high-brightness injector facility. The scheme is also investigated for application at the SLAC NLCTA facility, where we show that the subfemtosecond resolution is sufficient to resolve the temporal structure of the beam used in the echo-enabled free-electron laser. We employ beam simulations to verify the effect for typical Neptune and NLCTA parameter sets and demonstrate the feasibility of the concept.
Generation of relativistic electron beam and its anomalous stopping in the fast ignition scheme
International Nuclear Information System (INIS)
Sengupta, S.; Sandhu, A.S.; Dharmadhikari, A.K.; Kumar, G.R.; Das, A.; Kaw, P.K.
2005-01-01
We present experimental/theoretical results concerning two main physics issues related to the fast ignition scheme viz. the nonlinear mechanism of conversion of incident laser energy into a relativistic electron beam at the critical layer and its subsequent transport through an overdense plasma. Theoretical/numerical modelling of the experimental data, firstly shows that the conversion of the laser energy into an inward propagating electron beam occurs through the nonlinear mechanism of wave breaking of plasma waves excited at the critical layer and, secondly the transport of the electron beam through the overdense plasma is influenced by electrostatically induced and/or turbulence induced anomalous resistivity. (author)
International Nuclear Information System (INIS)
Prinja, A.K.
1997-01-01
A nonlinear discretization scheme in space and energy, based on the recently developed exponential discontinuous method, is applied to continuous slowing down dominated electron transport (i.e., in the absence of scattering.) Numerical results for dose and charge deposition are obtained and compared against results from the ONELD and ONEBFP codes, and against exact results from an adjoint Monte Carlo code. It is found that although the exponential discontinuous scheme yields strictly positive and monotonic solutions, the dose profile is considerably straggled when compared to results from the linear codes. On the other hand, the linear schemes produce negative results which, furthermore, do not damp effectively in some cases. A general conclusion is that while yielding strictly positive solutions, the exponential discontinuous method does not show the crude cell accuracy for charged particle transport as was apparent for neutral particle transport problems
Directory of Open Access Journals (Sweden)
A. G. Khachatryan
2004-12-01
Full Text Available Recently a new electron-bunch injection scheme for the laser wakefield accelerator has been proposed [JETP Lett. 74, 371 (2001JTPLA20021-364010.1134/1.1427124; Phys. Rev. E 65, 046504 (2002PLEEE81063-651X10.1103/PhysRevE.65.046504]. In this scheme, a low energy electron bunch, sent in a plasma channel just before a high-intensity laser pulse, is trapped in the laser wakefield, considerably compressed and accelerated to an ultrarelativistic energy. In this paper we show the possibility of the generation of an extremely short (on the order of 1 μm long or a few femtoseconds in duration relativistic-electron-bunch by this mechanism. The initial electron bunch, which can be generated, for example, by a laser-driven photocathode rf gun, should have an energy of a few hundred keVs to a few MeVs, a duration in the picosecond range or less and a relatively low concentration. The trapping conditions and parameters of an accelerated bunch are investigated. The laser pulse dynamics as well as a possible experimental setup for the demonstration of the injection scheme are also considered.
Feedback scheme for kink instability in ERL based electron ion collider
International Nuclear Information System (INIS)
Hao, Y.; Litvinenko, V.N.; Ptitsyn, V.
2011-01-01
Kink instability presents one of the limiting factors from achieving higher luminosity in ERL based electron ion collider (EIC). However, we can take advantage of the flexibility of the linac and design a feedback system to cure the instability. This scheme raises the threshold of kink instability dramatically and provides opportunity for higher luminosity. We studied the effectiveness of this system and its dependence on the amplitude and phase of the feedback. In this paper we present results of theses studies of this scheme and describe its theoretical and practical limitations. The main advantage of an energy recovery linac (ERL) based electron ion collider (EIC) over a ring-ring type counterpart is the higher achievable luminosity. In ERL-based version, one electron beam collides with the opposing ion beam only once so that the beam-beam parameter can largely exceed the usual limitation in an electron collider ring, while the beam-beam parameter for the ion beam remains small values. The resulting luminosity may be enhanced by one order of magnitude. The beam dynamics related challenges also arise as the luminosity boost in ERL based EIC due to the significant beam-beam effect on the electron beam. The effects on the electron beam include the additional large beam-beam tune shift and nonlinear emittance growth, which are discussed. The ion beam may develop a head-tail type instability, referred as 'kink instability', through the interaction with the electron beam. In this paper, we discuss the feasibility of an active feedback system to mitigate the kink instability, by taking advantage of the flexibility of ERL. Throughout the paper, we will discuss the collision between proton and electron beam. Any other ion species can be scaled by its charge Z and ion mass A.
Directory of Open Access Journals (Sweden)
Qingyang Yue
2012-01-01
Full Text Available The out-coupling efficiency of planar organic light emitting diodes (OLEDs is only about 20% due to factors, such as, the total internal reflection, surface plasmon coupling, and metal absorption. Two-dimensional periodic nanostructures, such as, photonic crystals (PhCs and microlenses arrays offer a potential method to improve the out-coupling efficiency of OLEDs. In this work, we employed the finite-difference time-domain (FDTD method to explore different mechanisms that embedded PhCs and surface PhCs to improve the out-coupling efficiency. The effects of several parameters, including the filling factor, the depth, and the lattice constant were investigated. The result showed that embedded PhCs play a key role in improving the out-coupling efficiency, and an enhancement factor of 240% was obtained in OLEDs with embedded PhCs, while the enhancement factor of OLEDs with surface PhCs was only 120%. Furthermore, the phenomena was analyzed using the mode theory and it demonstrated that the overlap between the mode and PhCs was related to the distribution of vertical mode profiles. The enhancement of the extraction efficiency in excess of 290% was observed for the optimized OLEDs structure with double PhCs. This proposed structure could be a very promising candidate for high extraction efficiency OLEDs.
Directory of Open Access Journals (Sweden)
Yang Shi
2016-01-01
Full Text Available Considering the security of both the customers’ hosts and the eShops’ servers, we introduce the idea of a key-insulated undetachable digital signature, enabling mobile agents to generate undetachable digital signatures on remote hosts with the key-insulated property of the original signer’s signing key. From the theoretical perspective, we provide the formal definition and security notion of a key-insulated undetachable digital signature. From the practical perspective, we propose a concrete scheme to secure mobile agents in electronic commerce. The scheme is mainly focused on protecting the signing key from leakage and preventing the misuse of the signature algorithm on malicious servers. Agents do not carry the signing key when they generate digital signatures on behalf of the original signer, so the key is protected on remote servers. Furthermore, if a hacker gains the signing key of the original signer, the hacker is still unable to forge a signature for any time period other than the key being accessed. In addition, the encrypted function is combined with the original signer’s requirement to prevent the misuse of signing algorithm. The scheme is constructed on gap Diffie–Hellman groups with provable security, and the performance testing indicates that the scheme is efficient.
Directory of Open Access Journals (Sweden)
Jun Wang
2014-01-01
Full Text Available Low light outcoupling efficiency restricts the wide application of organic light-emitting diodes in solid state light market although the internal quantum efficiency of the device could reach near to 100%. In order to improve the output efficiency, different kinds of microlens array on the substrate emission surface were designed and simulated using light tracing method. Simulation results indicate that the microlens array on the substrate could efficiently improve the light output efficiency and an enhancement of 1.8 could be obtained with optimized microlens structure design. The microlens array with semicircle shape using polymer material was fabricated on glass substrate by a facile approach. Finally, the organic device with microlens array substrate was manufactured and the light output of the device with surface microlens structure could increase to 1.64 times comparing with the device without microlens.
New injection scheme using a pulsed quadrupole magnet in electron storage rings
Directory of Open Access Journals (Sweden)
Kentaro Harada
2007-12-01
Full Text Available We demonstrated a new injection scheme using a single pulsed quadrupole magnet (PQM with no pulsed local bump at the Photon Factory Advanced Ring (PF-AR in High Energy Accelerator Research Organization (KEK. The scheme employs the basic property of a quadrupole magnet, that the field at the center is zero, and nonzero elsewhere. The amplitude of coherent betatron oscillation of the injected beam is effectively reduced by the PQM; then, the injected beam is captured into the ring without largely affecting the already stored beam. In order to investigate the performance of the scheme with a real beam, we built the PQM providing a higher field gradient over 3 T/m and a shorter pulse width of 2.4 μs, which is twice the revolution period of the PF-AR. After the field measurements confirmed the PQM specifications, we installed it into the ring. Then, we conducted the experiment using a real beam and consequently succeeded in storing the beam current of more than 60 mA at the PF-AR. This is the first successful beam injection using a single PQM in electron storage rings.
Teaching the Z-Scheme of electron transport in photosynthesis: a perspective.
Mohapatra, Pradipta Kumar; Singh, Nihar Ranjan
2015-01-01
This paper deals with how Govindjee taught the Z-Scheme of electron transport in oxygenic photosynthesis at Ravenshaw University, Cuttack, Odisha, India, in 2014, in a unique and highly effective fashion-using students to act as molecules, representing the entire electron transport chain from water to nicotinamide adenine dinucleotide phosphate (NADP(+)). It culminated in a show by B.Sc. students in the garden of the Department of Botany, Ravenshaw University. The first author (PKM) personally acted as Ferredoxin NADP Reductase (FNR) catalyzing the reduction of NADP(+) to NADPH, taking electrons from reduced ferredoxin at the end of Photosystem I. On the other hand, the Q-cycle was played by M.Sc. students, who acted as molecules running this ingenious cycle that produces extra protons. An interesting event was when a student, acting as a herbicide, who was dressed like a devil (fierce looking, in black clothes with a sword; "Yamaraj: The God of Death", as he called himself), stopped all reactions by throwing out QB, the second plastoquinone molecule of Photosystem II, and that too aggressively, taking its position instead. The second author was the major organizer of the Z-scheme show. We provide here a basic background on the process, a bit on Govindjee's teaching, and some selected pictures from the drama played in March, 2014 at Ravenshaw University. Here, we also recognize the teacher Govindjee for his ingenious and fun-filled teaching methods that touched the hearts and the souls of the students as well as the teachers of Ravenshaw University. He was rated as one of the most-admired teachers of plant biology at our university.
Energy Technology Data Exchange (ETDEWEB)
Ding, Lei, E-mail: dinglei@sust.edu.cn [College of Electrical and Information Engineering, Shaanxi University of Science and Technology, Xi’an, Shaanxi 710021 (China); Wang, Lu-Wei [College of Electrical and Information Engineering, Shaanxi University of Science and Technology, Xi’an, Shaanxi 710021 (China); Zhou, Lei, E-mail: zhzhlei@gmail.com [Faculty of Mathematics and Physics, Huaiyin Institute of Technology, Huai' an 223003 (China); Zhang, Fang-hui [College of Electrical and Information Engineering, Shaanxi University of Science and Technology, Xi’an, Shaanxi 710021 (China)
2016-12-15
Highlights: • An out-coupling membrane embedded with a scattering film of SiO{sub 2} spheres and polyethylene terephthalate (PET) plastic was successfully developed for 150 × 150 mm{sup 2} OLEDs. • Remarkable enhancement in efficiency was achieved from the OLEDs with out- coupling membrane. • The uniformity of large-size GOLED lighting panel is remarkably improved. - Abstract: An out-coupling membrane embedded with a scattering film of SiO{sub 2} spheres and polyethylene terephthalate (PET) plastic was successfully developed for 150 × 150 mm{sup 2} green OLEDs. Comparing with a reference OLED panel, an approximately 1-fold enhancement in the forward emission was obtained with an out-coupling membrane adhered to the surface of the external glass substrate of the panel. Moreover, it was verified that the emission color at different viewing angles can be stabilized without apparent spectral distortion. Particularly, the uniformity of the large-area OLEDs was greatly improved. Theoretical calculation clarified that the improved performance of the lighting panels is primarily attributed to the effect of particle scattering.
Dynamics of a Rydberg hydrogen atom near a metal surface in the electron-extraction scheme
Energy Technology Data Exchange (ETDEWEB)
Iñarrea, Manuel [Área de Física Aplicada, Universidad de La Rioja, Logroño (Spain); Lanchares, Víctor [Departamento de Matemáticas y Computación, Universidad de La Rioja, Logroño, La Rioja (Spain); Palacián, Jesús [Departamento de Ingeniería Matemática e Informática, Universidad Pública de Navarra, Pamplona (Spain); Pascual, Ana I. [Departamento de Matemáticas y Computación, Universidad de La Rioja, Logroño, La Rioja (Spain); Salas, J. Pablo, E-mail: josepablo.salas@unirioja.es [Área de Física Aplicada, Universidad de La Rioja, Logroño (Spain); Yanguas, Patricia [Departamento de Ingeniería Matemática e Informática, Universidad Pública de Navarra, Pamplona (Spain)
2015-01-23
We study the classical dynamics of a Rydberg hydrogen atom near a metal surface in the presence of a constant electric field in the electron-extraction situation [1], e.g., when the field attracts the electron to the vacuum. From a dynamical point of view, this field configuration provides a dynamics richer than in the usual ion-extraction scheme, because, depending on the values of field and the atom–surface distance, the atom can be ionized only towards the metal surface, only to the vacuum or to the both sides. The evolution of the phase space structure as a function of the atom–surface distance is explored in the bound regime of the atom. In the high energy regime, the ionization mechanism is also investigated. We find that the classical results of this work are in good agreement with the results obtained in the wave-packet propagation study carried out by So et al. [1]. - Highlights: • We study a classical hydrogen atom near a metal surface plus a electric field. • We explore the phase space structure as a function of the field strength. • We find most of the electronic orbits are oriented along the field direction. • We study the ionization of the atom for several atom–surface distances. • This classical study is in good agreement with the quantum results.
Directory of Open Access Journals (Sweden)
Rajen Pudur
2016-01-01
Full Text Available This paper describes the performance of electronic load controller (ELC of asynchronous generator (AG coupled to an uncontrolled Savonius turbine and variable water velocity. An AC-DC-AC converter with a dc link capacitor is employed to maintain the required frequency. The ELC which is feeding a resistive dump load is connected in parallel with the generating system and the power consumption is varied through the duty cycle of the chopper. Gate triggering of ELC is accomplished through sinusoidal pulse width modulation (SPWM by sensing the load current. A MATLAB/Simulink model of Savonius rotor, asynchronous generator, ELC, and three-phase load is presented. The proposed scheme is tested under various load conditions under varying water velocities and the performances are observed to be satisfactory.
Discrete Energies of a Weakly Outcoupled Atom Laser Beam Outside the Bose–Einstein Condensate Region
Directory of Open Access Journals (Sweden)
Teguh Budi Prayitno
2014-12-01
Full Text Available We consider the possibility of a discrete set of energies of a weakly outcoupled atom laser beam to the homogeneous Schrödinger equation with anisotropic harmonic trap in Cartesian coordinates outside the Bose–Einstein condensate region. This treatment is used because working in the cylindrical coordinates is not really possible, even though we implement the cigar-shaped trap case. The Schrödinger equation appears to replace a set of two-coupled Gross– Pitaevskii equations by enabling the weak-coupling assumption. This atom laser can be produced in a simple way that only involves extracting the atoms in a condensate from by using the radio frequency field. We initially present the relation between condensates as sources and atom laser as an output by exploring the previous work of Riou et al. in the case of theoretical work for the propagation of atom laser beams. We also show that even though the discrete energies are obtained by means of an approaching harmonic oscillator, degeneracy is only available in two states because of the anisotropic external potential
A new scheme for solving inhomogeneous Boltzmann equation for electrons in weakly ionised gases
International Nuclear Information System (INIS)
Mahmoud, M.O.M.; Yousfi, M.
1995-01-01
In the case of weakly ionized gases, the numerical treatment of non-hydrodynamic regime involving spatial variation of distribution function due to boundaries (walls, electrodes, electron source, etc hor-ellipsis) by using direct Boltzmann equation always constitute a challenge if the main collisional processes occurring in non thermal plasmas are to be considered (elastic, inelastic and super-elastic collisions, Penning ionisation, Coulomb interactions, etc hor-ellipsis). In the non-thermal discharge modelling, the inhomogeneous electron Boltzmann equation is needed in order to be coupled for example to a fluid model to take into account the electron non-hydrodynamic effects. This is for example the case of filamentary discharge, in which the space charge electric field due to streamer propagation has a very sharp spatial profile thus leading to important space non-hydrodynamic effects. It is also the case of the cathodic zone of glow discharge where electric field has a rapid spatial decrease until the negative glow. In the present work, a new numerical scheme is proposed to solve the inhomogeneous Boltzmann equation for electrons in the framework of two-term approximation (TTA) taking into account elastic and inelastic processes. Such a method has the usual drawbacks associated with the TTA i.e. not an accurate enough at high E/N values or in presence of high inelastic processes. But the accuracy of this method is considered sufficient because in a next step it is destinated to be coupled to fluid model for charged particles and a chemical kinetic model where the accuracy is of the same order of magnitude or worse. However there are numerous advantages of this method concerning time computing, treatment of non-linear collision processes (Coulomb, Penning, etc hor-ellipsis)
International Nuclear Information System (INIS)
Wakasugi, Masanori
2005-01-01
We proposed a new experimental scheme of an electron scattering off unstable nuclei using a Self-Confining Radioactive Ion Target (SCRIT). The SCRIT is an unstable ion target formed in the electron storage ring, and is based on completely new idea. We constructed prototype of the SCRIT device and installed it in the electron storage ring KSR in Kyoto University. In the test experiment, 10 7 -Cs ions are confined in the SCRIT with the lifetime of about 2 s and the feasibility of the SCRIT as the target has been confirmed. (author)
Bao, J.; Liu, D.; Lin, Z.
2017-10-01
A conservative scheme of drift kinetic electrons for gyrokinetic simulations of kinetic-magnetohydrodynamic processes in toroidal plasmas has been formulated and verified. Both vector potential and electron perturbed distribution function are decomposed into adiabatic part with analytic solution and non-adiabatic part solved numerically. The adiabatic parallel electric field is solved directly from the electron adiabatic response, resulting in a high degree of accuracy. The consistency between electrostatic potential and parallel vector potential is enforced by using the electron continuity equation. Since particles are only used to calculate the non-adiabatic response, which is used to calculate the non-adiabatic vector potential through Ohm's law, the conservative scheme minimizes the electron particle noise and mitigates the cancellation problem. Linear dispersion relations of the kinetic Alfvén wave and the collisionless tearing mode in cylindrical geometry have been verified in gyrokinetic toroidal code simulations, which show that the perpendicular grid size can be larger than the electron collisionless skin depth when the mode wavelength is longer than the electron skin depth.
Laborda, Eduardo; Gómez-Gil, José María; Molina, Angela
2017-06-28
A very general and simple theoretical solution is presented for the current-potential-time response of reversible multi-electron transfer processes complicated by homogeneous chemical equilibria (the so-called extended square scheme). The expressions presented here are applicable regardless of the number of electrons transferred and coupled chemical processes, and they are particularized for a wide variety of microelectrode geometries. The voltammetric response of very different systems presenting multi-electron transfers is considered for the most widely-used techniques (namely, cyclic voltammetry, square wave voltammetry, differential pulse voltammetry and steady state voltammetry), studying the influence of the microelectrode geometry and the number and thermodynamics of the (electro)chemical steps. Most appropriate techniques and procedures for the determination of the 'interaction' between successive transfers are discussed. Special attention is paid to those situations where homogeneous chemical processes, such as protonation, complexation or ion association, affect the electrochemical behaviour of the system by different stabilization of the oxidation states.
Energy Technology Data Exchange (ETDEWEB)
Nissen, Edward W.; Hutton, Andrew M.; Kimber, Andrew J.
2013-06-01
The current electron cooler design for the proposed Medium Energy Electron-Ion collider (MEIC) at Jefferson Lab utilizes a circulator ring for reuse of the cooling electron bunch up to 100 times to cool the ion beams. This cooler requires a fast kicker system for injecting and extracting individual bunches in the circulator ring. Such a kicker must work at a high repetition rate, up to 7.5 to 75 MHz depending on the number of turns in the recirculator ring. It also must have a very short rise and fall time (of order of 1 ns) such that it will kick an individual bunch without disturbing the others in the ring. Both requirements are orders of magnitude beyond the present state-of-the-art as well as the goals of other on-going kicker R&D programs such as that for the ILC damping rings. In this paper we report a scheme of creating this fast, high repetition rate kicker by combining RF waveforms at multiple frequencies to create a kicker waveform that will, for example, kick every eleventh bunch while leaving the other ten unperturbed. We also present a possible implementation of this scheme as well as discuss its limitations.
Theory of neutron scattering by atomic electrons: jj-coupling scheme
International Nuclear Information System (INIS)
Balcar, E.; Lovesey, S.W.; Uppsala Univ.
1991-02-01
Expressions are reported for the matrix element of the neutron-electron interaction for atomic electrons in a j n configuration, appropriate for palladium and platinum group compounds and rare earth and actinide materials. For the latter, f-electron systems, an isolated ion is a realistic approximation. Compact expressions are provided, together with tables of reduced matrix elements, for elastic and inelastic structure factors, and compared with the corresponding Russell-Saunders expressions. Inelastic scattering by two f-electrons, including non-equivalent states, is presented in detail. (author)
Development of a new electron-RI colliding scheme for study of unstable nuclear structure
International Nuclear Information System (INIS)
Wakasugi, M.; Emoto, T.; Ishihara, M.; Koseki, T.; Ohnishi, T.; Suda, T.; Takeda, H.; Yano, Y.; Kurita, K.
2004-01-01
A new method of electron scattering experiment for unstable nuclei is proposed. In this method, the low energy ion beam is injected into the electron storage ring where the transverse potential well made by electron beam exists. The ion beam is three-dimensionally confined by applying longitudinal static mirror potential externally. The ion beam confined on the electron beam axis is regarded as the Self-Confining Radioactive Ion Target (SCRIPT). This idea originally comes from the ion trap phenomenon of the electron storage ring. For the electron scattering experiment, luminosity higher than 10 26 s -1 cm -2 is required for heavy nuclei. In order to test this idea, computer simulation is performed. Limit of the storage of positive charges, change of the ion valences caused by the collisions with the electrons, nuclear decays and capture of residual gas, other interactions and the luminosity are investigated. Demonstration of this idea is under way at the KSR storage ring of Kyoto University with the SCRIPT instrument equipped with forty built-in electrodes. It is expected that the number of ions accumulated and the luminosity of the collisions are about 10 6 and 2x10 25 s -1 cm -2 , respectively, at the electron beam energy of 100 MeV and current of 100 mA(max). (S. Funahashi)
Directory of Open Access Journals (Sweden)
Tsung-Chih Hsiao
2017-01-01
Full Text Available Vote by ballot is the feature in a democratic society and the process of decision-making, tending to achieve the philosophy of democratic politics by having the public who are eligible to vote for competent candidates or leaders. With the rapid development of technologies and network applications, electronization has been actively promoted globally during the social transformation period that the concept of electronic voting is further derived. The major advantages of electronic voting, comparing with traditional voting, lie in the mobility strength of electronic voting, reducing a large amount of election costs and enhancing the convenience for the public. Electronic voting allows voters completing voting on the Internet that not only are climate and location restrictions overcome, but the voter turnout is also increased and the voting time is reduced for the public. With the development in the past three decades, electronic voting presents outstanding performance theoretically and practically. Nevertheless, it is regrettable that electronic voting schemes still cannot be completely open because of lures by money and threats. People to lure by money and threats would confirm the voters following their instructions through various methods that more factors would appear on election results, affecting the quality and fairness of the election. In this study, this project aims to design an electronic voting scheme which could actually defend voters’ free will so that lure of money and threats would fail. Furthermore, an electronic voting system based on Elliptic Curve Cryptography is proposed to ensure the efficiency and security, and Ring Signature and Signcryption are applied to reducing the computing costs. Moreover, this project also focuses on applying voting system to mobile devices. As the system efficiency and security are emphasized, voters do not need to participate in the election, but simply complete voting with smart phones, i
Bunch decompression for laser-plasma driven free-electron laser demonstration schemes
Directory of Open Access Journals (Sweden)
T. Seggebrock
2013-07-01
Full Text Available X-ray free-electron lasers (FELs require a very high electron beam quality in terms of emittance and energy spread. Since 2004 high quality electrons produced by laser-wakefield accelerators have been demonstrated, but the electron quality up to now did not allow the operation of a compact x-ray FEL using these electrons. Maier et al. [Phys. Rev. X 2, 031019 (2012PRXHAE2160-330810.1103/PhysRevX.2.031019] suggested a concept for a proof-of-principle experiment allowing FEL operation in the vacuum ultraviolet range based on an optimized undulator and bunch decompression using electron bunches from a laser-plasma accelerator as currently available. In this paper we discuss in more detail how a chicane can be used as a bunch stretcher instead of a bunch compressor to allow the operation of a laser-wakefield accelerator driven FEL using currently available electrons. A scaling characterizing the impact of bunch decompression on the gain length is derived and the feasibility of the concept is tested numerically in a demanding scenario.
Exploiting Multimodal Biometrics in E-Privacy Scheme for Electronic Health Records
Omotosho, Adebayo; Adegbola, Omotanwa; Adelakin, Barakat; Adelakun, Adeyemi; Emuoyibofarhe, Justice
2015-01-01
Existing approaches to protect the privacy of Electronic Health Records are either insufficient for existing medical laws or they are too restrictive in their usage. For example, smart card-based encryption systems require the patient to be always present to authorize access to medical records. Questionnaires were administered by 50 medical practitioners to identify and categorize different Electronic Health Records attributes. The system was implemented using multi biometrics of patients to ...
Interaction region for crab waist scheme of the Future Electron-Positron Collider (CERN)
Bogomyagkov, A
2015-01-01
Design study in CERN of the accelerator that would fit 80-100 km tunnel called Future Circular Colliders (FCC) includes high-luminosity $e^+ e^−$ collider (FCC-ee) with center-of-mass energy from 90 to 350 GeV to study Higgs boson properties and perform precise measurements at the electroweak scale [1–3]. Crab waist interaction region provides collisions with luminosity higher than 2 × 10$^{36}$ cm$^{−2}$ sec$^{−1}$ at beam energy of 45 GeV. The small values of the beta functions at the interaction point and distant final focus lenses are the reasons for high nonlinear chromaticity limiting energy acceptance of the whole ring. The paper describes interaction region for crab waist collision scheme in the FCC-ee, principles of tuning the chromaticity correction section in order to provide large energy acceptance.
Xu, Lu-Hai; Ou, Qing-Dong; Li, Yan-Qing; Zhang, Yi-Bo; Zhao, Xin-Dong; Xiang, Heng-Yang; Chen, Jing-De; Zhou, Lei; Lee, Shuit-Tong; Tang, Jian-Xin
2016-01-26
Flexible organic light-emitting diodes (OLEDs) hold great promise for future bendable display and curved lighting applications. One key challenge of high-performance flexible OLEDs is to develop new flexible transparent conductive electrodes with superior mechanical, electrical, and optical properties. Herein, an effective nanostructured metal/dielectric composite electrode on a plastic substrate is reported by combining a quasi-random outcoupling structure for broadband and angle-independent light outcoupling of white emission with an ultrathin metal alloy film for optimum optical transparency, electrical conduction, and mechanical flexibility. The microcavity effect and surface plasmonic loss can be remarkably reduced in white flexible OLEDs, resulting in a substantial increase in the external quantum efficiency and power efficiency to 47.2% and 112.4 lm W(-1).
Energy Technology Data Exchange (ETDEWEB)
Chang, Yung-Ting [Institute of Chemistry, Academia Sinica, Taipei, Taiwan 11529, Taiwan (China); Department of Electrical Engineering, Graduate Institute of Photonics and Optoelectronics, National Taiwan University, Taipei, Taiwan 10617, Taiwan (China); Liu, Shun-Wei [Department of Electronic Engineering, Mingchi University of Technology, New Taipei, Taiwan 24301, Taiwan (China); Yuan, Chih-Hsien; Lee, Chih-Chien [Department of Electronic Engineering, National Taiwan University of Science and Technology, Taipei, Taiwan 10607, Taiwan (China); Ho, Yu-Hsuan; Wei, Pei-Kuen [Research Center for Applied Science Academia Sinica, Taipei, Taiwan 11527, Taiwan (China); Chen, Kuan-Yu [Chilin Technology Co., LTD, Tainan City, Taiwan 71758, Taiwan (China); Lee, Yi-Ting; Wu, Min-Fei; Chen, Chin-Ti, E-mail: cchen@chem.sinica.edu.tw, E-mail: chihiwu@cc.ee.ntu.edu.tw [Institute of Chemistry, Academia Sinica, Taipei, Taiwan 11529, Taiwan (China); Wu, Chih-I, E-mail: cchen@chem.sinica.edu.tw, E-mail: chihiwu@cc.ee.ntu.edu.tw [Department of Electrical Engineering, Graduate Institute of Photonics and Optoelectronics, National Taiwan University, Taipei, Taiwan 10617, Taiwan (China)
2013-11-07
Single-layer blue phosphorescence organic light emitting diodes (OLEDs) with either small-molecule or polymer hosts are fabricated using solution process and the performances of devices with different hosts are investigated. The small-molecule device exhibits luminous efficiency of 14.7 cd/A and maximum power efficiency of 8.39 lm/W, which is the highest among blue phosphorescence OLEDs with single-layer solution process and small molecular hosts. Using the same solution process for all devices, comparison of light out-coupling enhancement, with brightness enhancement film (BEF), between small-molecule and polymer based OLEDs is realized. Due to different dipole orientation and anisotropic refractive index, polymer-based OLEDs would trap less light than small molecule-based OLEDs internally, about 37% better based simulation results. In spite of better electrical and spectroscopic characteristics, including ambipolar characteristics, higher carrier mobility, higher photoluminescence quantum yield, and larger triplet state energy, the overall light out-coupling efficiency of small molecule-based devices is worse than that of polymer-based devices without BEF. However, with BEF for light out-coupling enhancement, the improved ratio in luminous flux and luminous efficiency for small molecule based device is 1.64 and 1.57, respectively, which are significantly better than those of PVK (poly-9-vinylcarbazole) devices. In addition to the theoretical optical simulation, the experimental data also confirm the origins of differential light-outcoupling enhancement. The maximum luminous efficiency and power efficiency are enhanced from 14.7 cd/A and 8.39 lm/W to 23 cd/A and 13.2 lm/W, respectively, with laminated BEF, which are both the highest so far for single-layer solution-process blue phosphorescence OLEDs with small molecule hosts.
International Nuclear Information System (INIS)
Chang, Yung-Ting; Liu, Shun-Wei; Yuan, Chih-Hsien; Lee, Chih-Chien; Ho, Yu-Hsuan; Wei, Pei-Kuen; Chen, Kuan-Yu; Lee, Yi-Ting; Wu, Min-Fei; Chen, Chin-Ti; Wu, Chih-I
2013-01-01
Single-layer blue phosphorescence organic light emitting diodes (OLEDs) with either small-molecule or polymer hosts are fabricated using solution process and the performances of devices with different hosts are investigated. The small-molecule device exhibits luminous efficiency of 14.7 cd/A and maximum power efficiency of 8.39 lm/W, which is the highest among blue phosphorescence OLEDs with single-layer solution process and small molecular hosts. Using the same solution process for all devices, comparison of light out-coupling enhancement, with brightness enhancement film (BEF), between small-molecule and polymer based OLEDs is realized. Due to different dipole orientation and anisotropic refractive index, polymer-based OLEDs would trap less light than small molecule-based OLEDs internally, about 37% better based simulation results. In spite of better electrical and spectroscopic characteristics, including ambipolar characteristics, higher carrier mobility, higher photoluminescence quantum yield, and larger triplet state energy, the overall light out-coupling efficiency of small molecule-based devices is worse than that of polymer-based devices without BEF. However, with BEF for light out-coupling enhancement, the improved ratio in luminous flux and luminous efficiency for small molecule based device is 1.64 and 1.57, respectively, which are significantly better than those of PVK (poly-9-vinylcarbazole) devices. In addition to the theoretical optical simulation, the experimental data also confirm the origins of differential light-outcoupling enhancement. The maximum luminous efficiency and power efficiency are enhanced from 14.7 cd/A and 8.39 lm/W to 23 cd/A and 13.2 lm/W, respectively, with laminated BEF, which are both the highest so far for single-layer solution-process blue phosphorescence OLEDs with small molecule hosts
Proposed non-interferometric FIR electron density measuring scheme for Tokamaks
Energy Technology Data Exchange (ETDEWEB)
Dodel, G; Kunz, W [Stuttgart Univ. (TH) (Germany, F.R.). Inst. fuer Plasmaforschung
1979-08-01
Extension of FIR polarimetry to electron density measurements in Tokamaks is suggested as a possible alternative for devices in which FIR interferometry is not applicable or difficult to handle due to reduced accessibility or strong mechanical vibrations. The method is numerically simulated. The relative experimental simplicity compared with interferometry has to be paid for with symmetry assumptions which enter into the evaluation process.
Rossen, E.T.R.; Flipse, C.F.J.; Cerda, J.I.
2013-01-01
We have developed an efficient and accurate formalism which allows the simulation at the ab initio level of inelastic electron tunneling spectroscopy data under a scanning tunneling microscope setup. It exploits fully the tunneling regime by carrying out the structural optimization and vibrational
Study of suprathermal electron transport in solid or compressed matter for the fast-ignitor scheme
International Nuclear Information System (INIS)
Perez, F.
2010-01-01
The inertial confinement fusion (ICF) concept is widely studied nowadays. It consists in quickly compressing and heating a small spherical capsule filled with fuel, using extremely energetic lasers. Since approximately 15 years, the fast-ignition (FI) technique has been proposed to facilitate the fuel heating by adding a particle beam - electrons generated by an ultra-intense laser - at the exact moment when the capsule compression is at its maximum. This thesis constitutes an experimental study of these electron beams generated by picosecond-scale lasers. We present new results on the characteristics of these electrons after they are accelerated by the laser (energy, divergence, etc.) as well as their interaction with the matter they pass through. The experimental results are explained and reveal different aspects of these laser-accelerated fast electrons. Their analysis allowed for significant progress in understanding several mechanisms: how they are injected into solid matter, how to measure their divergence, and how they can be automatically collimated inside compressed matter. (author) [fr
International Nuclear Information System (INIS)
Abdul Hafid; Pinitoyo, A.; Demon H; Kussigit S; Paidjo; Riswan Dj; Natsir, M.; Dedy H; Edy Karyanta; Edy S
2003-01-01
To increase the capability of the PCB immersion machine developed previous a computerized drawing machine on PCB surface is proposed for drawing the schematic electronic, PROTEL software is used Used is Roland DXY 1100 type which had been modified to accommodate the PCB characteristic, because it is used originally for paper. Concerning, the plotter ink, the waterproof type must be used. (author)
High energy extraction of electron beam pumped KrF lasers at multi atmospheres
Kleikamp, B.M.H.H.; Witteman, W.J.
1984-01-01
The construction is described of a simple and compact KrF laser with electron beam excitation. The electron beam is generated in a coaxial vacuum diode, driven directly by a ten-stage coaxial Marx generator. A flat MgF2 outcoupler and a suprasil roof prism, protected by an MgF2 window, proved to be
Kurian, Priya C.; Gopinath, Anish; Shinoy, K. S.; Santhi, P.; Sundaramoorthy, K.; Sebastian, Baby; Jaya, B.; Namboodiripad, M. N.; Mookiah, T.
2017-12-01
Reusable Launch Vehicle-Technology Demonstrator (RLV-TD) is a system which has the ability to carry a payload from the earth's surface to the outer space more than once. The control actuation forms the major component of the control system and it actuates the control surfaces of the RLV-TD based on the control commands. Eight electro hydraulic actuators were used in RLV-TD for vectoring the control surfaces about their axes. A centralised Hydraulic Power Generating Unit (HPU) was used for powering the eight actuators located in two stages. The actuation system had to work for the longest ever duration of about 850 s for an Indian launch vehicle. High bandwidth requirement from autopilot was met by the servo design using the nonlinear mathematical model. Single Control Electronics which drive four electrohydraulic actuators was developed for each stage. High power electronics with soft start scheme was realized for driving the BLDC motor which is the prime mover for hydraulic pump. Many challenges arose due to single HPU for two stages, uncertainty of aero load, higher bandwidth requirements etc. and provisions were incorporated in the design to successfully overcome them. This paper describes the servo design and control electronics architecture of control actuation system.
Efficient mixing scheme for self-consistent all-electron charge density
Shishidou, Tatsuya; Weinert, Michael
2015-03-01
In standard ab initio density-functional theory calculations, the charge density ρ is gradually updated using the ``input'' and ``output'' densities of the current and previous iteration steps. To accelerate the convergence, Pulay mixing has been widely used with great success. It expresses an ``optimal'' input density ρopt and its ``residual'' Ropt by a linear combination of the densities of the iteration sequences. In large-scale metallic systems, however, the long range nature of Coulomb interaction often causes the ``charge sloshing'' phenomenon and significantly impacts the convergence. Two treatments, represented in reciprocal space, are known to suppress the sloshing: (i) the inverse Kerker metric for Pulay optimization and (ii) Kerker-type preconditioning in mixing Ropt. In all-electron methods, where the charge density does not have a converging Fourier representation, treatments equivalent or similar to (i) and (ii) have not been described so far. In this work, we show that, by going through the calculation of Hartree potential, one can accomplish the procedures (i) and (ii) without entering the reciprocal space. Test calculations are done with a FLAPW method.
Optimization of light out-coupling in optoelectronic devices using nanostructured surface
DEFF Research Database (Denmark)
Ou, Haiyan; Ou, Yiyu; Argyraki, Aikaterini
C and GaN, these developed methods could be applied to other semicon ductors such as Si, etc. Furthermore, all optoelectronic devices having an optical interface such as solar cells, photo - detectors, could benefit from these developed methods for opto - electronic performance improvement....... the overall efficiency of the LEDs. In this paper we have developed various methods for two important semiconductors: silicon carbide (SiC) and gallium nitride (GaN), and demonstrated enormous extraction efficiency enhancement. SiC is an important su bstrate for LED devices. It has refractive index of 2.......6, and only a few percent of light could escape from it. We have developed periodic nanocone structures by using electron - beam lithography, periodic nanodome structures by using nanosphere lithography, random nanostructures by using self - assembled metal nanoparticles, and random nanostructures by directly...
Nsiah-Boateng, Eric; Asenso-Boadi, Francis; Dsane-Selby, Lydia; Andoh-Adjei, Francis-Xavier; Otoo, Nathaniel; Akweongo, Patricia; Aikins, Moses
2017-01-01
Background A robust medical claims review system is crucial for addressing fraud and abuse and ensuring financial viability of health insurance organisations. This paper assesses claims adjustment rate of the paper- and electronic-based claims reviews of the National Health Insurance Scheme (NHIS) in Ghana. Methods The study was a cross-sectional comparative assessment of paper- and electronic-based claims reviews of the NHIS. Medical claims of subscribers for the year, 2014 were requested fr...
Energy Technology Data Exchange (ETDEWEB)
Reinke, Nils [Organische Funktionsmaterialien, University of Duisburg-Essen (Germany)]. E-mail: nils.reinke@physik.uni-augsburg.de; Fuhrmann, Thomas [Macromolecular Chemistry and Molecular Materials, University of Kassel (Germany); Perschke, Alexandra [Organische Funktionsmaterialien, University of Duisburg-Essen (Germany); Franke, Hilmar [Organische Funktionsmaterialien, University of Duisburg-Essen (Germany)
2004-12-10
In this work organic light emitting devices (OLEDs) were fabricated implementing gratings, in order to extract waveguided electroluminescence (EL). The gratings were recorded by exposing thin films of the molecular azo glass N, N'-bis (4-phenyl)-N, N'-bis [(4-phenylazo)-phenyl] benzidine (AZOPD) to holographic light patterns. The photopatterned AZOPD serves as hole transport material for devices with aluminum-tris(8-hydroxyquinoline) doped with 1% of 4-(dicyanomethylene)-2-methyl-6-(4-dimethylaminostyryl)-4H-pyran (Alq{sub 3}:DCM) as emissive/electron transport layer. The corrugated devices showed enhanced emission in the forward direction. The emitted light is polarized preferably parallel to the grating lines. In addition, we have found a doubling in the total luminance with respect to the unstructured device.
Directory of Open Access Journals (Sweden)
Francesco Pennacchio
2017-07-01
Full Text Available Ultrafast electron diffraction is a powerful technique to investigate out-of-equilibrium atomic dynamics in solids with high temporal resolution. When diffraction is performed in reflection geometry, the main limitation is the mismatch in group velocity between the overlapping pump light and the electron probe pulses, which affects the overall temporal resolution of the experiment. A solution already available in the literature involved pulse front tilt of the pump beam at the sample, providing a sub-picosecond time resolution. However, in the reported optical scheme, the tilted pulse is characterized by a temporal chirp of about 1 ps at 1 mm away from the centre of the beam, which limits the investigation of surface dynamics in large crystals. In this paper, we propose an optimal tilting scheme designed for a radio-frequency-compressed ultrafast electron diffraction setup working in reflection geometry with 30 keV electron pulses containing up to 105 electrons/pulse. To characterize our scheme, we performed optical cross-correlation measurements, obtaining an average temporal width of the tilted pulse lower than 250 fs. The calibration of the electron-laser temporal overlap was obtained by monitoring the spatial profile of the electron beam when interacting with the plasma optically induced at the apex of a copper needle (plasma lensing effect. Finally, we report the first time-resolved results obtained on graphite, where the electron-phonon coupling dynamics is observed, showing an overall temporal resolution in the sub-500 fs regime. The successful implementation of this configuration opens the way to directly probe structural dynamics of low-dimensional systems in the sub-picosecond regime, with pulsed electrons.
Michels, François; Mazzoni, Federico; Becucci, Maurizio; Müller-Dethlefs, Klaus
2017-10-01
An improved detection scheme is presented for threshold ionization spectroscopy with simultaneous recording of the Zero Electron Kinetic Energy (ZEKE) and Mass Analysed Threshold Ionisation (MATI) signals. The objective is to obtain accurate dissociation energies for larger molecular clusters by simultaneously detecting the fragment and parent ion MATI signals with identical transmission. The scheme preserves an optimal ZEKE spectral resolution together with excellent separation of the spontaneous ion and MATI signals in the time-of-flight mass spectrum. The resulting improvement in sensitivity will allow for the determination of dissociation energies in clusters with substantial mass difference between parent and daughter ions.
Energy Technology Data Exchange (ETDEWEB)
Huang, Yi-Hsiang; Lu, Chun-Yang; Tsai, Shang-Ta; Tsai, Yu-Tang; Chen, Chien-Yu; Tsai, Wei-Lung; Lin, Chun-Yu; Chang, Hong-Wei; Lee, Wei-Kai; Jiao, Min; Wu, Chung-Chih, E-mail: wucc@ntu.edu.tw [Department of Electrical Engineering, Graduate Institute of Photonics and Optoelectronics, Graduate Institute of Electronics Engineering, and Innovative Photonics Advanced Research Center (i-PARC), National Taiwan University, Taipei 10617, Taiwan (China)
2014-05-05
With its increasing and sufficient conductivity, the conducting polymer poly(3,4-ethylenedioxythiophene):poly(styrenesulfonate) (PEDOT:PSS) has been capable of replacing the widely used but less cost-effective indium tin oxides (ITOs) as alternative transparent electrodes for organic light-emitting devices (OLEDs). Intriguingly, PEDOT:PSS also possesses an optical refractive index significantly lower than those of ITO and typical organic layers in OLEDs and well matching those of typical OLED substrates. Optical simulation reveals that by replacing ITO with such a low-index transparent electrode, the guided modes trapped within the organic/ITO layers in conventional OLEDs can be substantially suppressed, leading to more light coupled into the substrate than the conventional ITO device. By applying light out-coupling structures onto outer surfaces of substrates to effectively extract radiation into substrates, OLEDs using such low-index transparent electrodes achieve enhanced optical out-coupling and external quantum efficiencies in comparison with conventional OLEDs using ITO.
Directory of Open Access Journals (Sweden)
R. Sitharthan
2016-09-01
Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.
Self-consistent average-atom scheme for electronic structure of hot and dense plasmas of mixture
International Nuclear Information System (INIS)
Yuan Jianmin
2002-01-01
An average-atom model is proposed to treat the electronic structures of hot and dense plasmas of mixture. It is assumed that the electron density consists of two parts. The first one is a uniform distribution with a constant value, which is equal to the electron density at the boundaries between the atoms. The second one is the total electron density minus the first constant distribution. The volume of each kind of atom is proportional to the sum of the charges of the second electron part and of the nucleus within each atomic sphere. By this way, one can make sure that electrical neutrality is satisfied within each atomic sphere. Because the integration of the electron charge within each atom needs the size of that atom in advance, the calculation is carried out in a usual self-consistent way. The occupation numbers of electron on the orbitals of each kind of atom are determined by the Fermi-Dirac distribution with the same chemical potential for all kinds of atoms. The wave functions and the orbital energies are calculated with the Dirac-Slater equations. As examples, the electronic structures of the mixture of Au and Cd, water (H 2 O), and CO 2 at a few temperatures and densities are presented
Self-consistent average-atom scheme for electronic structure of hot and dense plasmas of mixture.
Yuan, Jianmin
2002-10-01
An average-atom model is proposed to treat the electronic structures of hot and dense plasmas of mixture. It is assumed that the electron density consists of two parts. The first one is a uniform distribution with a constant value, which is equal to the electron density at the boundaries between the atoms. The second one is the total electron density minus the first constant distribution. The volume of each kind of atom is proportional to the sum of the charges of the second electron part and of the nucleus within each atomic sphere. By this way, one can make sure that electrical neutrality is satisfied within each atomic sphere. Because the integration of the electron charge within each atom needs the size of that atom in advance, the calculation is carried out in a usual self-consistent way. The occupation numbers of electron on the orbitals of each kind of atom are determined by the Fermi-Dirac distribution with the same chemical potential for all kinds of atoms. The wave functions and the orbital energies are calculated with the Dirac-Slater equations. As examples, the electronic structures of the mixture of Au and Cd, water (H2O), and CO2 at a few temperatures and densities are presented.
Energy Technology Data Exchange (ETDEWEB)
Heo, Jino [College of Electrical and Computer Engineering, Chungbuk National University, Chungdae-ro 1, Seowon-Gu, Cheongju (Korea, Republic of); Kang, Min-Sung [Center for Quantum Information, Korea Institute of Science and Technology (KIST), Seoul, 136-791 (Korea, Republic of); Hong, Chang-Ho [National Security Research Institute, P.O.Box 1, Yuseong, Daejeon, 34188 (Korea, Republic of); Choi, Seong-Gon [College of Electrical and Computer Engineering, Chungbuk National University, Chungdae-ro 1, Seowon-Gu, Cheongju (Korea, Republic of); Hong, Jong-Phil, E-mail: jongph@cbnu.ac.kr [College of Electrical and Computer Engineering, Chungbuk National University, Chungdae-ro 1, Seowon-Gu, Cheongju (Korea, Republic of)
2017-06-15
We propose a scheme for swapping two unknown states of a photon and electron spin confined to a charged quantum dot (QD) between two users by transferring a single photon. This scheme simultaneously transfers and teleports an unknown state (electron spin) between two users. For this bidirectional quantum communication, we utilize the interactions between a photonic and an electron-spin qubits of a QD located inside a single-sided optical cavity. Thus, our proposal using QD-cavity systems can obtain a certain success probability with high fidelity. Furthermore, compared to a previous scheme using cross-Kerr nonlinearities and homodyne detections, our scheme (using QD-cavity systems) can improve the feasibility under the decoherence effect in practice. - Highlights: • Design of Simultaneous quantum transmission and teleportation scheme via quantum dots and cavities. • We have developed the experimental feasibility of this scheme compared with the existing scheme. • Analysis of some benefits when our scheme is experimentally implemented using quantum dots and single-sided cavities.
International Nuclear Information System (INIS)
Chan, C.T.; Vanderbilt, D.; Louie, S.G.; Materials and Molecular Research Division, Lawrence Berkeley Laboratory, University of California, Berkeley, California 94720)
1986-01-01
We present a general self-consistency procedure formulated in momentum space for electronic structure and total-energy calculations of crystalline solids. It is shown that both the charge density and the change in the Hamiltonian matrix elements in each iteration can be calculated in a straight-forward fashion once a set of overlap matrices is computed. The present formulation has the merit of bringing the self-consistency problem for different basis sets to the same footing. The scheme is used to extend a first-principles pseudopotential linear combination of Gaussian orbitals method to full point-by-point self-consistency, without refitting of potentials. It is shown that the set of overlap matrices can be calculated very efficiently if we exploit the translational and space-group symmetries of the system under consideration. This scheme has been applied to study the structural and electronic properties of Si and W, prototypical systems of very different bonding properties. The results agree well with experiment and other calculations. The fully self-consistent results are compared with those obtained by a variational procedure [J. R. Chelikowsky and S. G. Louie, Phys. Rev. B 29, 3470 (1984)]. We find that the structural properties for bulk Si and W (both systems have no interatomic charge transfer) can be treated accurately by the variational procedure. However, full self-consistency is needed for an accurate description of the band energies
Threshold Signature Schemes Application
Directory of Open Access Journals (Sweden)
Anastasiya Victorovna Beresneva
2015-10-01
Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.
International Nuclear Information System (INIS)
Markandeya, S.G.
2013-01-01
BARC has been responsible to establish indigenously designed state-of-the-art electron accelerator facilities at its Electron Beam Centre at Kharghar, Navi Mumbai. The centre offers two versatile machines namely, (i) 3 MeV, 30 kW Parallel Coupled Self Capacitance type Multiplier (Dynamitron) DC accelerator and (ii) 10 MeV, 10 kW RF Electron Linac. While these machines are being used by scientists and engineers from within DAE, there is tremendous scope for exploiting their use by researchers in the country for basic research as well as by technologists and entrepreneurs for exploiting its potential for industrial applications. However, due to lack of adequate information about the facilities and due to paucity of research funds for the academia in the country, there is always a gap which researchers seldom look forward to be filled up appropriately. The present talk will give a glimpse of some opportunities to exploit the facilities at EBC, Kharghar for variety of applications followed by a brief presentation on provisions under BRNS to carry out sponsored research activities for basic research as well as for technology development for the industrial applications. (author)
International Nuclear Information System (INIS)
Holz, P.P.
1980-06-01
The purpose of the document is to present schemes for flaw preparations in heavy section steel. The ability of investigators to grow representative sharp cracks of known size, location, and orientation is basic to representative field testing to determine data for potential flaw propagation, fracture behavior, and margin against fracture for high-pressure-, high-temperature-service steel vessels subjected to increasing pressurization and/or thermal shock. Gaging for analytical stress and strain procedures and ultrasonic and acoustic emission instrumentation can then be applied to monitor the vessel during testing and to study crack growth. This report presents flaw preparations for HSST fracture mechanics testing. Cracks were grown by two techniques: (1) a mechanical method wherein a premachined notch was sharpened by pressurization and (2) a method combining electron-beam welds and hydrogen charging to crack the chill zone of a rapidly placed autogenous weld. The mechanical method produces a naturally occurring growth shape controlled primarily by the shape of the machined notch; the welding-electrochemical method produces flaws of uniform depth from the surface of a wall or machined notch. Theories, details, discussions, and procedures are covered for both of the flaw-growing schemes
Energy Technology Data Exchange (ETDEWEB)
Ma, C.-G. [College of Sciences, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Brik, M.G., E-mail: mikhail.brik@ut.ee [College of Sciences, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Institute of Physics, University of Tartu, Ravila 14C, Tartu 50411 (Estonia); Institute of Physics, Jan Dlugosz University, Armii Krajowej 13/15, PL-42200 Czestochowa (Poland); Institute of Physics, Polish Academy of Sciences, Al. Lotników 32/46, 02-668 Warsaw (Poland); Liu, D.-X.; Feng, B.; Tian, Ya [College of Sciences, Chongqing University of Posts and Telecommunications, Chongqing 400065 (China); Suchocki, A. [Institute of Physics, Polish Academy of Sciences, Al. Lotników 32/46, 02-668 Warsaw (Poland)
2016-02-15
The energy level diagrams are theoretically constructed for the di-, tri-, tetravalent lanthanide and actinide ions, using the Hartree–Fock calculated parameters of the Coulomb and spin–orbit interactions within f{sup N} (N=1…13) electron configurations. These diagrams are analogous to Dieke's diagram, which was obtained experimentally. They can be used for an analysis of the optical spectra of all considered groups of ions in various environments. Systematic variation of some prominent energy levels (especially those ones with a potential for emission transitions) along the isoelectronic 4f/5f ions is considered. - Highlights: • Energy level schemes for di-, tri, tetravalent lanthanides/actinides are calculated. • Systematic variation of the characteristic energy levels across the series is considered. • Potentially interesting emission transitions are identified.
Yin, Ge; Sako, Hiroshi; Gubbala, Ramesh V; Ueda, Shigenori; Yamaguchi, Akira; Abe, Hideki; Miyauchi, Masahiro
2018-04-17
Selective carbon dioxide photoreduction to produce formic acid was achieved under visible light irradiation using water molecules as electron donors, similar to natural plants, based on the construction of a Z-scheme light harvesting system modified with a Cu-Zn alloy nanoparticle co-catalyst. The faradaic efficiency of our Z-scheme system for HCOOH generation was over 50% under visible light irradiation.
International Nuclear Information System (INIS)
Wada, Takayuki; Konno, Shota; Nakamoto, Satoshi; Takeno, Hiromasa; Furuyama, Yuichi; Taniike, Akira
2016-01-01
As an energy recovery device for fast protons produced in D- 3 He nuclear fusion, secondary electron (SE) direct energy converter (SEDEC) was proposed in addition to traveling wave direct energy converter (TWDEC). Some protons passing through a TWDEC come into an SEDEC, where protons penetrate to a number of foil electrodes and emitted SEs are recovered. Following to a development of SE orbit control by magnetic field, dependence on incident angle of protons was examined to optimize structure of SEDEC. Based on a theoretical expectation, experiments were performed by changing incident angle of protons and variation in emission and energy recovery were measured. Both emission and energy recovery increased as the angle increased, and differences with theoretical expectation are discussed. (author)
DEFF Research Database (Denmark)
van Leeuwen, Theo
2013-01-01
This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....
Indian Academy of Sciences (India)
Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...
J.K. Hoogland (Jiri); C.D.D. Neumann
2000-01-01
textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing
International Nuclear Information System (INIS)
Guan, Huaiqun; Zhu, Yunping
1998-01-01
Although electronic portal imaging devices (EPIDs) are efficient tools for radiation therapy verification, they only provide images of overlapped anatomic structures. We investigated using a fluorescent screen/CCD-based EPID, coupled with a novel multi-level scheme algebraic reconstruction technique (MLS-ART), for a feasibility study of portal computed tomography (CT) reconstructions. The CT images might be useful for radiation treatment planning and verification. We used an EPID, set it to work at the linear dynamic range and collimated 6 MV photons from a linear accelerator to a slit beam of 1 cm wide and 25 cm long. We performed scans under a total of ∼200 monitor units (MUs) for several phantoms in which we varied the number of projections and MUs per projection. The reconstructed images demonstrated that using the new MLS-ART technique megavoltage portal CT with a total of 200 MUs can achieve a contrast detectibility of ∼2.5% (object size 5mmx5mm) and a spatial resolution of 2.5 mm. (author)
International Nuclear Information System (INIS)
Grashilin, V.A.; Karyshev, Yu.Ya.
1982-01-01
A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given
Andreeva, N E; Barashkov, B I; Zakharova, G V; Shubin, V V; Chibisov, A K
1978-01-01
A scheme of primary reactions in photooxidation of pigments was considered assuming that electron transfer processes can occur via singlet excited as well as triplet states. The results of analysis are compared with the experimental data on relative yield values of chlorophylls a, b, and pheophytin a cation-radicals, as well as with the data on fluorescence quenching. A conclusion has been drawn that photooxidation of pigments proceeds exclusively via the triplet state. The dependence of rate constant quenching values of chlorophyll a triplet state by certain electron acceptors on values of half cell potentials was given.
Deep saturated Free Electron Laser oscillators and frozen spikes
Energy Technology Data Exchange (ETDEWEB)
Ottaviani, P.L. [ENEA - Centro Ricerche Bologna, via Martiri di Monte Sole, 4, IT 40129, Bologna (Italy); Pagnutti, S., E-mail: simonetta.pagnutti@enea.it [ENEA - Centro Ricerche Bologna, via Martiri di Monte Sole, 4, IT 40129, Bologna (Italy); Dattoli, G., E-mail: giuseppe.dattoli@enea.it [ENEA - Centro Ricerche Frascati, via E. Fermi, 45, IT 00044, Frascati, Roma (Italy); Sabia, E., E-mail: elio.sabia@enea.it [ENEA - Centro Ricerche Frascati, via E. Fermi, 45, IT 00044, Frascati, Roma (Italy); Petrillo, V., E-mail: vittoria.petrillo@mi.infn.it [Universita' degli Studi di Milano, via Celoria 16, IT 20133, Milano (Italy); INFN - Mi, via Celoria 16, IT 20133, Milano (Italy); Slot, P.J.M. van der, E-mail: p.j.m.vanderslot@utwente.nl [Mesa+ Institute for Nanotechnology, University of Twente, P.O.Box 217, 7500 AE, Enschede (Netherlands); Biedron, S., E-mail: sandra.biedron@colostate.edu [Department of Electrical and Computer Engineering Colorado State University (United States); Milton, S., E-mail: milton@engr.colostate.edu [Department of Electrical and Computer Engineering Colorado State University (United States)
2016-10-21
We analyze the behavior of Free Electron Laser (FEL) oscillators operating in the deep saturated regime and point out the formation of sub-peaks of the optical pulse. These are very stable configurations and the sub-peaks are found to have a duration corresponding to the coherence length. We speculate on the physical mechanisms underlying their growth and attempt an identification with natural mode-locked structures in FEL oscillators. Their impact on the intra-cavity nonlinear harmonic generation is also discussed along with the possibility of exploiting them as cavity out-coupler.
Additive operator-difference schemes splitting schemes
Vabishchevich, Petr N
2013-01-01
Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy
Sman, van der R.G.M.
2006-01-01
In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the
2001-01-01
International Acer Incorporated, Hsin Chu, Taiwan Aerospace Industrial Development Corporation, Taichung, Taiwan American Institute of Taiwan, Taipei, Taiwan...Singapore and Malaysia .5 - 4 - The largest market for semiconductor products is the high technology consumer electronics industry that consumes up...Singapore, and Malaysia . A new semiconductor facility costs around $3 billion to build and takes about two years to become operational
Cambridge community Optometry Glaucoma Scheme.
Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R
2015-04-01
With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.
New schemes for particle accelerators
International Nuclear Information System (INIS)
Nishida, Y.
1985-01-01
In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here
Scheme Program Documentation Tools
DEFF Research Database (Denmark)
Nørmark, Kurt
2004-01-01
are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....
Rice, R. F.; Lee, J. J.
1986-01-01
Scheme for coding facsimile messages promises to reduce data transmission requirements to one-tenth current level. Coding scheme paves way for true electronic mail in which handwritten, typed, or printed messages or diagrams sent virtually instantaneously - between buildings or between continents. Scheme, called Universal System for Efficient Electronic Mail (USEEM), uses unsupervised character recognition and adaptive noiseless coding of text. Image quality of resulting delivered messages improved over messages transmitted by conventional coding. Coding scheme compatible with direct-entry electronic mail as well as facsimile reproduction. Text transmitted in this scheme automatically translated to word-processor form.
Multiresolution signal decomposition schemes
J. Goutsias (John); H.J.A.M. Heijmans (Henk)
1998-01-01
textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis
International Nuclear Information System (INIS)
Liu, Rui; Xiao, Teng; Cui, Weipan; Shinar, Joseph; Shinar, Ruth
2013-01-01
Graphical abstract: -- Highlights: •Novel simply-fabricated all-organic electronics pH and oxygen optical monitor. •Excitation sources: directionally emitting, narrowed multicolor microcavity OLEDs. •Photodetectors: small molecule- or polymer-based with selective spectral responses. •Sensor film: structured high molecular weight polystyrene:polyethylene glycol blend. •×1.9 sensitivity enhancement and ×2.7 increase in the photoluminescence for oxygen. -- Abstract: Key issues in using organic light emitting diodes (OLEDs) as excitation sources in structurally integrated photoluminescence (PL)-based sensors are the low forward light outcoupling, the OLEDs’ broad electroluminescence (EL) bands, and the long-lived remnant EL that follows an EL pulse. The outcoupling issue limits the detection sensitivity (S) as only ∼20% of the light generated within standard OLEDs can be forward outcoupled and used for sensor probe excitation. The EL broad band interferes with the analyte-sensitive PL, leading to a background that reduces S and dynamic range. In particular, these issues hinder designing compact sensors, potentially miniaturizable, that are devoid of optical filters and couplers. We address these shortcomings by introducing easy-to-employ multiple approaches for outcoupling improvement, PL enhancement, and background EL reduction leading to novel, compact all-organic device architectures demonstrated for simultaneous monitoring of oxygen and pH. The sensor comprises simply-fabricated, directionally-emitting, narrower-band, multicolor microcavity OLED excitation and small molecule- and polymer-based organic photodetectors (OPDs) with a more selective spectral response. Additionally, S and PL intensity for oxygen are enhanced by using polystyrene (PS):polyethylene glycol (PEG) blends as the sensing film matrix. By utilizing higher molecular weight PS, the ratio τ 0 /τ 100 (PL decay time τ at 0% O 2 /τ at 100% O 2 ) that is often used to express S
DEFF Research Database (Denmark)
Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela
2013-01-01
of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...
Energy Technology Data Exchange (ETDEWEB)
Willcock, J J; Lumsdaine, A; Quinlan, D J
2008-08-19
Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.
ONU Power Saving Scheme for EPON System
Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki
PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.
Evaluating statistical cloud schemes
Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix
2015-01-01
Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...
Gamma spectrometry; level schemes
International Nuclear Information System (INIS)
Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.
1977-01-01
The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr
International Nuclear Information System (INIS)
2002-04-01
This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)
Harmonic generation with multiple wiggler schemes
Energy Technology Data Exchange (ETDEWEB)
Bonifacio, R.; De Salvo, L.; Pierini, P. [Universita degli Studi, Milano (Italy)
1995-02-01
In this paper the authors give a simple theoretical description of the basic physics of the single pass high gain free electron laser (FEL), describing in some detail the FEL bunching properties and the harmonic generation technique with a multiple-wiggler scheme or a high gain optical klystron configuration.
Towards Symbolic Encryption Schemes
DEFF Research Database (Denmark)
Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik
2012-01-01
, namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....
Energy Technology Data Exchange (ETDEWEB)
Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.
2014-07-25
This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.
New analytic unitarization schemes
International Nuclear Information System (INIS)
Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.
2009-01-01
We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.
EPU correction scheme study at the CLS
Energy Technology Data Exchange (ETDEWEB)
Bertwistle, Drew, E-mail: drew.bertwistle@lightsource.ca; Baribeau, C.; Dallin, L.; Chen, S.; Vogt, J.; Wurtz, W. [Canadian Light Source Inc. 44 Innovation Boulevard, Saskatoon, SK S7N 2V3 (Canada)
2016-07-27
The Canadian Light Source (CLS) Quantum Materials Spectroscopy Center (QMSC) beamline will employ a novel double period (55 mm, 180 mm) elliptically polarizing undulator (EPU) to produce photons of arbitrary polarization in the soft X-ray regime. The long period and high field of the 180 mm period EPU will have a strong dynamic focusing effect on the storage ring electron beam. We have considered two partial correction schemes, a 4 m long planar array of BESSY-II style current strips, and soft iron L-shims. In this paper we briefly consider the implementation of these correction schemes.
Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.
2012-01-01
Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free
Alternative reprocessing schemes evaluation
International Nuclear Information System (INIS)
1979-02-01
This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented
Introduction to association schemes
Seidel, J.J.
1991-01-01
The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs
Reaction schemes of immunoanalysis
International Nuclear Information System (INIS)
Delaage, M.; Barbet, J.
1991-01-01
The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr
Alternative health insurance schemes
DEFF Research Database (Denmark)
Keiding, Hans; Hansen, Bodil O.
2002-01-01
In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...
Nanolayer surface passivation schemes for silicon solar cells
Dingemans, G.
2011-01-01
This thesis is concerned with nanolayer surface passivation schemes and corresponding deposition processes, for envisaged applications in crystalline silicon solar cells. Surface passivation, i.e. the reduction of electronic recombination processes at semiconductor surfaces, is essential for
On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
Directory of Open Access Journals (Sweden)
Wang Daoshun
2010-01-01
Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.
Selectively strippable paint schemes
Stein, R.; Thumm, D.; Blackford, Roger W.
1993-03-01
In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.
Scalable Nonlinear Compact Schemes
Energy Technology Data Exchange (ETDEWEB)
Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)
2014-04-01
In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.
Robust anonymous authentication scheme for telecare medical information systems.
Xie, Qi; Zhang, Jun; Dong, Na
2013-04-01
Patient can obtain sorts of health-care delivery services via Telecare Medical Information Systems (TMIS). Authentication, security, patient's privacy protection and data confidentiality are important for patient or doctor accessing to Electronic Medical Records (EMR). In 2012, Chen et al. showed that Khan et al.'s dynamic ID-based authentication scheme has some weaknesses and proposed an improved scheme, and they claimed that their scheme is more suitable for TMIS. However, we show that Chen et al.'s scheme also has some weaknesses. In particular, Chen et al.'s scheme does not provide user's privacy protection and perfect forward secrecy, is vulnerable to off-line password guessing attack and impersonation attack once user's smart card is compromised. Further, we propose a secure anonymity authentication scheme to overcome their weaknesses even an adversary can know all information stored in smart card.
Gain of a Smith-Purcell free-electron laser
Directory of Open Access Journals (Sweden)
H. L. Andrews
2004-07-01
Full Text Available A formula is derived for the small-signal gain of a Smith-Purcell free-electron laser. The theory describes the electron beam as a moving plasma dielectric, and assumes that the electron beam interacts with an evanescent mode traveling along the surface of a periodic waveguide with a rectangular profile. The phase velocity of the evanescent wave is synchronous with the electron velocity, but the group velocity is actually negative. The electron beam amplifies the evanescent wave, which does not itself radiate. According to this picture, the radiation observed emanating from the grating is Smith-Purcell radiation enhanced by the bunching of the electrons due to the interaction with the evanescent mode. There will also be radiation from the part of the evanescent mode that is outcoupled from the ends of the grating. This radiation appears at a lower frequency than the Smith-Purcell radiation. The new results explain both the gain and the radiation observed in the experiments of Urata and Walsh, and the cube-root current dependence of the gain inferred by Bakhtyari, Walsh, and Brownell.
International Nuclear Information System (INIS)
Abramovich, A.; Pinhasi, Y.; Yahalom, A.; Bar-Lev, D.; Efimov, S.; Gover, A.
2001-01-01
Design of a multi-stage depressed collector for efficient operation of a Free Electron Laser (FEL) oscillator requires knowledge of the electron beam energy distribution. This knowledge is necessary to determine the voltages of the depressed collector electrodes that optimize the collection efficiency and overall energy conversion efficiency of the FEL. The energy spread in the electron beam is due to interaction in the wiggler region, as electrons enter the interaction region at different phases relative to the EM wave. This interaction can be simulated well by a three-dimensional simulation code such as FEL3D. The main adjustable parameters that determine the electron beam energy spread after interaction are the e-beam current, the initial beam energy, and the quality factor of the resonator out-coupling coefficient. Using FEL3D, we study the influence of these parameters on the available radiation power and on the electron beam energy distribution at the undulator exit. Simulations performed for I=1.5 A, E=1.4 MeV, L=20% (Internal loss factor) showed that the highest radiated output power and smallest energy spread are attained for an output coupler transmission coefficient T m congruent with 30%
Abramovich, A; Efimov, S; Gover, A; Pinhasi, Y; Yahalom, A
2001-01-01
Design of a multi-stage depressed collector for efficient operation of a Free Electron Laser (FEL) oscillator requires knowledge of the electron beam energy distribution. This knowledge is necessary to determine the voltages of the depressed collector electrodes that optimize the collection efficiency and overall energy conversion efficiency of the FEL. The energy spread in the electron beam is due to interaction in the wiggler region, as electrons enter the interaction region at different phases relative to the EM wave. This interaction can be simulated well by a three-dimensional simulation code such as FEL3D. The main adjustable parameters that determine the electron beam energy spread after interaction are the e-beam current, the initial beam energy, and the quality factor of the resonator out-coupling coefficient. Using FEL3D, we study the influence of these parameters on the available radiation power and on the electron beam energy distribution at the undulator exit. Simulations performed for I=1.5 A, E...
Yasas, F M
1977-01-01
In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.
Bonus schemes and trading activity
Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.
2014-01-01
Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of
DEFF Research Database (Denmark)
Juhl, Hans Jørn; Stacey, Julia
2001-01-01
. In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...
Dynamic Symmetric Key Mobile Commerce Scheme Based on Self-Verified Mechanism
Directory of Open Access Journals (Sweden)
Jiachen Yang
2014-01-01
Full Text Available In terms of the security and efficiency of mobile e-commerce, the authors summarized the advantages and disadvantages of several related schemes, especially the self-verified mobile payment scheme based on the elliptic curve cryptosystem (ECC and then proposed a new type of dynamic symmetric key mobile commerce scheme based on self-verified mechanism. The authors analyzed the basic algorithm based on self-verified mechanisms and detailed the complete transaction process of the proposed scheme. The authors analyzed the payment scheme based on the security and high efficiency index. The analysis shows that the proposed scheme not only meets the high efficiency of mobile electronic payment premise, but also takes the security into account. The user confirmation mechanism at the end of the proposed scheme further strengthens the security of the proposed scheme. In brief, the proposed scheme is more efficient and practical than most of the existing schemes.
Energy Technology Data Exchange (ETDEWEB)
Liu, Rui; Xiao, Teng; Cui, Weipan [Ames Laboratory-USDOE and Department of Physics and Astronomy, Iowa State University, Ames, IA 50011 (United States); Shinar, Joseph, E-mail: jshinar@iastate.edu [Ames Laboratory-USDOE and Department of Physics and Astronomy, Iowa State University, Ames, IA 50011 (United States); Shinar, Ruth, E-mail: rshinar@iastate.edu [Microelectronics Research Center and Department of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 (United States)
2013-05-17
Graphical abstract: -- Highlights: •Novel simply-fabricated all-organic electronics pH and oxygen optical monitor. •Excitation sources: directionally emitting, narrowed multicolor microcavity OLEDs. •Photodetectors: small molecule- or polymer-based with selective spectral responses. •Sensor film: structured high molecular weight polystyrene:polyethylene glycol blend. •×1.9 sensitivity enhancement and ×2.7 increase in the photoluminescence for oxygen. -- Abstract: Key issues in using organic light emitting diodes (OLEDs) as excitation sources in structurally integrated photoluminescence (PL)-based sensors are the low forward light outcoupling, the OLEDs’ broad electroluminescence (EL) bands, and the long-lived remnant EL that follows an EL pulse. The outcoupling issue limits the detection sensitivity (S) as only ∼20% of the light generated within standard OLEDs can be forward outcoupled and used for sensor probe excitation. The EL broad band interferes with the analyte-sensitive PL, leading to a background that reduces S and dynamic range. In particular, these issues hinder designing compact sensors, potentially miniaturizable, that are devoid of optical filters and couplers. We address these shortcomings by introducing easy-to-employ multiple approaches for outcoupling improvement, PL enhancement, and background EL reduction leading to novel, compact all-organic device architectures demonstrated for simultaneous monitoring of oxygen and pH. The sensor comprises simply-fabricated, directionally-emitting, narrower-band, multicolor microcavity OLED excitation and small molecule- and polymer-based organic photodetectors (OPDs) with a more selective spectral response. Additionally, S and PL intensity for oxygen are enhanced by using polystyrene (PS):polyethylene glycol (PEG) blends as the sensing film matrix. By utilizing higher molecular weight PS, the ratio τ{sub 0}/τ{sub 100} (PL decay time τ at 0% O{sub 2}/τ at 100% O{sub 2}) that is often used
Packet reversed packet combining scheme
International Nuclear Information System (INIS)
Bhunia, C.T.
2006-07-01
The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)
International Nuclear Information System (INIS)
Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu
2014-01-01
We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)
Modified Aggressive Packet Combining Scheme
International Nuclear Information System (INIS)
Bhunia, C.T.
2010-06-01
In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)
Transmission usage cost allocation schemes
International Nuclear Information System (INIS)
Abou El Ela, A.A.; El-Sehiemy, R.A.
2009-01-01
This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)
Lattice design for the CEPC double ring scheme
Wang, Yiwei; Su, Feng; Bai, Sha; Zhang, Yuan; Bian, Tianjian; Wang, Dou; Yu, Chenghui; Gao, Jie
2018-01-01
A future Circular Electron Positron Collider (CEPC) has been proposed by China with the main goal of studying the Higgs boson. Its baseline design, chosen on the basis of its performance, is a double ring scheme; an alternative design is a partial double ring scheme which reduces the budget while maintaining an adequate performance. This paper will present the collider ring lattice design for the double ring scheme. The CEPC will also work as a W and a Z factory. For the W and Z modes, except in the RF region, compatible lattices were obtained by scaling down the magnet strength with energy.
A Quantum Proxy Weak Blind Signature Scheme Based on Controlled Quantum Teleportation
Cao, Hai-Jing; Yu, Yao-Feng; Song, Qin; Gao, Lan-Xiang
2015-04-01
Proxy blind signature is applied to the electronic paying system, electronic voting system, mobile agent system, security of internet, etc. A quantum proxy weak blind signature scheme is proposed in this paper. It is based on controlled quantum teleportation. Five-qubit entangled state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, so it could guarantee not only the unconditional security of the scheme but also the anonymity of the messages owner.
Scheme for Quantum Computing Immune to Decoherence
Williams, Colin; Vatan, Farrokh
2008-01-01
A constructive scheme has been devised to enable mapping of any quantum computation into a spintronic circuit in which the computation is encoded in a basis that is, in principle, immune to quantum decoherence. The scheme is implemented by an algorithm that utilizes multiple physical spins to encode each logical bit in such a way that collective errors affecting all the physical spins do not disturb the logical bit. The scheme is expected to be of use to experimenters working on spintronic implementations of quantum logic. Spintronic computing devices use quantum-mechanical spins (typically, electron spins) to encode logical bits. Bits thus encoded (denoted qubits) are potentially susceptible to errors caused by noise and decoherence. The traditional model of quantum computation is based partly on the assumption that each qubit is implemented by use of a single two-state quantum system, such as an electron or other spin-1.2 particle. It can be surprisingly difficult to achieve certain gate operations . most notably, those of arbitrary 1-qubit gates . in spintronic hardware according to this model. However, ironically, certain 2-qubit interactions (in particular, spin-spin exchange interactions) can be achieved relatively easily in spintronic hardware. Therefore, it would be fortunate if it were possible to implement any 1-qubit gate by use of a spin-spin exchange interaction. While such a direct representation is not possible, it is possible to achieve an arbitrary 1-qubit gate indirectly by means of a sequence of four spin-spin exchange interactions, which could be implemented by use of four exchange gates. Accordingly, the present scheme provides for mapping any 1-qubit gate in the logical basis into an equivalent sequence of at most four spin-spin exchange interactions in the physical (encoded) basis. The complexity of the mathematical derivation of the scheme from basic quantum principles precludes a description within this article; it must suffice to report
Coordinated renewable energy support schemes
DEFF Research Database (Denmark)
Morthorst, P.E.; Jensen, S.G.
2006-01-01
. The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...
CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...
African Journals Online (AJOL)
This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...
Numerical Schemes for Rough Parabolic Equations
Energy Technology Data Exchange (ETDEWEB)
Deya, Aurelien, E-mail: deya@iecn.u-nancy.fr [Universite de Nancy 1, Institut Elie Cartan Nancy (France)
2012-04-15
This paper is devoted to the study of numerical approximation schemes for a class of parabolic equations on (0,1) perturbed by a non-linear rough signal. It is the continuation of Deya (Electron. J. Probab. 16:1489-1518, 2011) and Deya et al. (Probab. Theory Relat. Fields, to appear), where the existence and uniqueness of a solution has been established. The approach combines rough paths methods with standard considerations on discretizing stochastic PDEs. The results apply to a geometric 2-rough path, which covers the case of the multidimensional fractional Brownian motion with Hurst index H>1/3.
hybrid modulation scheme fo rid modulation scheme fo dulation
African Journals Online (AJOL)
eobe
control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.
New CERN Health Insurance Scheme (CHIS) forms
HR Department
2015-01-01
New versions of the following forms for claims and requests to the CERN Health Insurance Scheme (CHIS) have been released: form for claiming reimbursement of medical expenses, form for requesting advance reimbursement, and dental estimate form (for treatments foreseen to exceed 800 CHF). The new forms are available in French and English. They can either be completed electronically before being printed and signed, or completed in paper form. New detailed instructions can be found at the back of the claim form; CHIS members are invited to read them carefully. The electronic versions (PDF) of all the forms are available on the CHIS website and on the UNIQA Member Portal. CHIS Members are requested to use these new forms forthwith and to discard any previous version. Questions regarding the above should be addressed directly to UNIQA (72730 or 022.718 63 00 or uniqa.assurances@cern.ch).
CERN apprenticeship scheme honoured
2008-01-01
Prestigious awards for two apprentices who did their practical training at CERN. Sylvain Heinzen, apprentice physics lab technician at CERN, receiving his award from Pierre-François UNGER, State Councillor responsible for the Federal Department of the Economy and Health. The other award-winner, Cédric Gerber, is on the right of the photo.Among Geneva’s top apprentices who were honoured by the Fondation sociale de l’Union industrielle genevoise (UIG) on 28 October this year, were two CERN apprentices. Electronics technician Cédric Gerber and physics lab technician Sylvain Heinzen both did their four-year sandwich course at CERN, obtaining their professional qualification, the Certificat fédéral de capacité (CFC), in June. On top of that, Cédric Gerber, who had been a particularly outstanding apprentice, received two further distinctions at the CFC awards ceremony - the State Council prize for achieving one of the top-ten o...
Good governance for pension schemes
Thornton, Paul
2011-01-01
Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.
Optimum RA reactor fuelling scheme
International Nuclear Information System (INIS)
Strugar, P.; Nikolic, V.
1965-10-01
Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr
A Novel Iris Segmentation Scheme
Directory of Open Access Journals (Sweden)
Chen-Chung Liu
2014-01-01
Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.
Numerical schemes for explosion hazards
International Nuclear Information System (INIS)
Therme, Nicolas
2015-01-01
In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called
Breeding schemes in reindeer husbandry
Directory of Open Access Journals (Sweden)
Lars Rönnegård
2003-04-01
Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.
Studies of the plasma droplet accelerator scheme
International Nuclear Information System (INIS)
Mori, W.B.; Joshi, C.; Dawson, J.M.; Lee, K.; Forslund, D.W.; Kindel, J.M.
1985-01-01
In the plasma droplet accelerator scheme, proposed by R. Palmer, a sequence of liquid micro-spheres generated by a jet printer are ionized by an incoming intense laser. The hope is that the micro-spheres now acting as conducting balls will allow efficient coupling of the incoming laser radiation into an accelerating mode. Motivated by this the authors have carried out 2D, particle simulations in order to answer some of the plasma physics questions hitherto unaddressed. In particular they find that at least for laser intensities exceeding v 0 /c=0.03 (/sup ∼/10 13 w/cm 2 for a CO 2 laser), the incident laser light is rather efficiently absorbed in a hot electron distribution. Up to 70% of the incident energy can be absorbed by these electrons which rapidly expand and fill the vacuum space between the microspheres with a low density plasma. These results indicate that it is advisable to stay clear of plasma formation and thus put on an upper limit on the maximum surface fields that can be tolerated in the droplet-accelerator scheme
Studies of the plasma droplet accelerator scheme
International Nuclear Information System (INIS)
Mori, W.B.; Dawson, J.M.; Forslund, D.W.; Joshi, C.; Kindel, J.M.; Lee, K.
1985-01-01
In the plasma droplet accelerator scheme, proposed by R. Palmer, a sequence of liquid micro-spheres generated by a jet printer are ionized by an incoming intense laser. The hope is that the micro-spheres now acting as conducting balls will allow efficient coupling of the incoming laser radiation into an accelerating mode. Motivated by this we have carried out 2D, particle simulations in order to answer some of the plasma physics questions hitherto unaddressed. In particular we find that at least for laser intensities exceeding v /SUB o/ /c=0.03 ( about10 13 w/cm 2 for a CO 2 laser), the incident laser light is rather efficiently absorbed in a hot electron distribution. Up to 70% of the incident energy can be absorbed by these electrons which rapidly expand and fill the vacuum space between the microspheres with a low density plasma. These results indicate that it is advisable to stay clear of plasma formation and thus put on an upper limit on the maximum surface fields that can be tolerated in the droplet-accelerator scheme
Enhancing privacy of users in eID schemes
Shrishak, Kris; Erkin, Z.; Schaar, Remco
2016-01-01
In todays world transactions are increasingly being performed over the internetbut require identication of users as in face-to-face transactions. In order to facilitate eGovernance as well as other eCommerce services Electronic Identiation(eID) schemes, which intend to provide unique and reliable
Multiuser switched diversity scheduling schemes
Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim
2012-01-01
Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.
Nonlinear secret image sharing scheme.
Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young
2014-01-01
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.
Multiuser switched diversity scheduling schemes
Shaqfeh, Mohammad
2012-09-01
Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.
A mm-Wave, Table Top Cerenkov Free-Electron Laser
De la Fuente, Isabel; Van der Slot, Peter
2004-01-01
We have designed and constructed a compact (0.5 x 1.5 m), 100 kV Cerenkov FEL operating at a frequency of 50 GHz. The electron beam is produced by a gridded thermionic electron gun with a beam current of 800 mA. Simulations shows that 800 mA is sufficient to produce an output power of ~ 1 kW peak at 50 GHz using a total cavity reflectivity of about 10 to 20 %. The average power approaches 1 kW when the electron pulse length is extended to CW. A depressed collector will be used to increase the overall efficiency of this device. Special attention has been given to the outcoupler that has to combine multiple functions. First it has to separate the radiation field from the electron beam. Second it has to be transparent for the electron beam and acts as a partial reflector for radiation. Finally it has to convert the generated TM01 mode in the interaction region into the fundamental TE01 mode of the standard rectangular output port. We will present the overall design and experimental set-up, first experimental res...
Arbitrated quantum signature scheme based on χ-type entangled states
International Nuclear Information System (INIS)
Zuo, Huijuan; Huang, Wei; Qin, Sujuan
2013-01-01
An arbitrated quantum signature scheme, which is mainly applied in electronic-payment systems, is proposed and investigated. The χ-type entangled states are used for quantum key distribution and quantum signature in this protocol. Compared with previous quantum signature schemes which also utilize χ-type entangled states, the proposed scheme provides higher efficiency. Finally, we also analyze its security under various kinds of attacks. (paper)
Electrical Injection Schemes for Nanolasers
DEFF Research Database (Denmark)
Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten
2014-01-01
Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....
Signal multiplexing scheme for LINAC
International Nuclear Information System (INIS)
Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra
2004-01-01
For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)
Capacity-achieving CPM schemes
Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido
2008-01-01
The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...
Review and Analysis of Cryptographic Schemes Implementing Threshold Signature
Directory of Open Access Journals (Sweden)
Anastasiya Victorovna Beresneva
2015-03-01
Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.
Importance biasing scheme implemented in the PRIZMA code
International Nuclear Information System (INIS)
Kandiev, I.Z.; Malyshkin, G.N.
1997-01-01
PRIZMA code is intended for Monte Carlo calculations of linear radiation transport problems. The code has wide capabilities to describe geometry, sources, material composition, and to obtain parameters specified by user. There is a capability to calculate path of particle cascade (including neutrons, photons, electrons, positrons and heavy charged particles) taking into account possible transmutations. Importance biasing scheme was implemented to solve the problems which require calculation of functionals related to small probabilities (for example, problems of protection against radiation, problems of detection, etc.). The scheme enables to adapt trajectory building algorithm to problem peculiarities
International Nuclear Information System (INIS)
Ardisson, Claire; Ardisson, Gerard.
1976-01-01
A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr
Homogenization scheme for acoustic metamaterials
Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping
2014-01-01
the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost
Homogenization scheme for acoustic metamaterials
Yang, Min
2014-02-26
We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.
New practicable Siberian Snake schemes
International Nuclear Information System (INIS)
Steffen, K.
1983-07-01
Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)
Nonlinear Secret Image Sharing Scheme
Directory of Open Access Journals (Sweden)
Sang-Ho Shin
2014-01-01
efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2m bit-per-pixel (bpp, respectively.
The CLIC Multi-Drive Beam Scheme
Corsini, R
1998-01-01
The CLIC study of an e+ / e- linear collider in the TeV energy range is based on Two-Beam Acceleration (TBA) in which the RF power needed to accelerate the beam is extracted from high intensity relativistic electron beams, the so-called drive beams. The generation, acceleration and transport of the high-intensity drive beams in an efficient and reliable way constitute a challenging task. An overview of a potentially very effective scheme is presented. It is based on the generation of trains of short bunches, accelerated sequentially in low frequency superconducting cavities in a c.w. mode, stored in an isochronous ring and combined at high energy by funnelling before injection by sectors into the drive linac for RF power production. The various systems of the complex are discussed.
Phonon limited electronic transport in Pb
Rittweger, F.; Hinsche, N. F.; Mertig, I.
2017-09-01
We present a fully ab initio based scheme to compute electronic transport properties, i.e. the electrical conductivity σ and thermopower S, in the presence of electron-phonon interaction. We explicitly investigate the \
A privacy authentication scheme based on cloud for medical environment.
Chen, Chin-Ling; Yang, Tsai-Tung; Chiang, Mao-Lun; Shih, Tzay-Farn
2014-11-01
With the rapid development of the information technology, the health care technologies already became matured. Such as electronic medical records that can be easily stored. However, how to get medical resources more convenient is currently concerning issue. In spite of many literatures discussed about medical systems, these literatures should face many security challenges. The most important issue is patients' privacy. Therefore, we propose a privacy authentication scheme based on cloud environment. In our scheme, we use mobile device's characteristics, allowing peoples to use medical resources on the cloud environment to find medical advice conveniently. The digital signature is used to ensure the security of the medical information that is certified by the medical department in our proposed scheme.
Automation of the control scheme for IUAC Linac
International Nuclear Information System (INIS)
Sahu, B.K.; Dutt, R.N.; Antony, J.; Mathuria, D.S.; Pandey, A.; Singh, K.; Ahuja, R.; Chowdhury, G.K.; Rai, A.; Patra, P.; Ghosh, S.; Ajithkumar, B.P.; Kanjilal, D.; Roy, A.
2011-01-01
Improvement of the Linac control scheme is undertaken for automation with minimum human intervention during beam acceleration. Python language interface with the present control scheme is used in writing automation routines to monitor the status of the phase/amplitude lock during operation and shut-down the locking mechanism to reduce the RF power, if required. Simultaneous pulse conditioning of the resonators is made possible by using dedicated hardware interfaced and Python based client interface. Movement of the drive coupler is enabled from operation console with position read back. The manual control of the slow-tuner electronics module to bring the frequency close to reference during phase locking is interfaced with the present control scheme for remote operation. Monitoring of amplitude and absolute phase of each cavity is made possible from operation console. An alternate tuning mechanism using piezoelectric actuator and stepper motor combination has been successfully tested in the test cryostat. (author)
Support Schemes and Ownership Structures
DEFF Research Database (Denmark)
Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana
, Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...
[PICS: pharmaceutical inspection cooperation scheme].
Morénas, J
2009-01-01
The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.
Project financing renewable energy schemes
International Nuclear Information System (INIS)
Brandler, A.
1993-01-01
The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)
Network Regulation and Support Schemes
DEFF Research Database (Denmark)
Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik
2009-01-01
-in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...
Distance labeling schemes for trees
DEFF Research Database (Denmark)
Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben
2016-01-01
We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...
Small-scale classification schemes
DEFF Research Database (Denmark)
Hertzum, Morten
2004-01-01
Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...
Kohler, Lars; Hadt, Ryan G.; Zhang, Xiaoyi; Liu, Cunming
2017-01-01
The kinetics of photoinduced electron and energy transfer in a family of tetrapyridophenazine-bridged heteroleptic homo- and heterodinuclear copper(i) bis(phenanthroline)/ruthenium(ii) polypyridyl complexes were studied using ultrafast optical and multi-edge X-ray transient absorption spectroscopies. This work combines the synthesis of heterodinuclear Cu(i)–Ru(ii) analogs of the homodinuclear Cu(i)–Cu(i) targets with spectroscopic analysis and electronic structure calculations to first disentangle the dynamics at individual metal sites by taking advantage of the element and site specificity of X-ray absorption and theoretical methods. The excited state dynamical models developed for the heterodinuclear complexes are then applied to model the more challenging homodinuclear complexes. These results suggest that both intermetallic charge and energy transfer can be observed in an asymmetric dinuclear copper complex in which the ground state redox potentials of the copper sites are offset by only 310 meV. We also demonstrate the ability of several of these complexes to effectively and unidirectionally shuttle energy between different metal centers, a property that could be of great use in the design of broadly absorbing and multifunctional multimetallic photocatalysts. This work provides an important step toward developing both a fundamental conceptual picture and a practical experimental handle with which synthetic chemists, spectroscopists, and theoreticians may collaborate to engineer cheap and efficient photocatalytic materials capable of performing coulombically demanding chemical transformations. PMID:29629153
A Memory Efficient Network Encryption Scheme
El-Fotouh, Mohamed Abo; Diepold, Klaus
In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.
An Arbitrated Quantum Signature Scheme without Entanglement*
International Nuclear Information System (INIS)
Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun
2017-01-01
Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)
Decoupling schemes for the SSC Collider
International Nuclear Information System (INIS)
Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.
1993-05-01
A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper
Renormalization scheme-invariant perturbation theory
International Nuclear Information System (INIS)
Dhar, A.
1983-01-01
A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)
Wireless Broadband Access and Accounting Schemes
Institute of Scientific and Technical Information of China (English)
无
2003-01-01
In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.
Security enhanced multi-factor biometric authentication scheme using bio-hash function.
Directory of Open Access Journals (Sweden)
Younsung Choi
Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
On the security of two remote user authentication schemes for telecare medical information systems.
Kim, Kee-Won; Lee, Jae-Dong
2014-05-01
The telecare medical information systems (TMISs) support convenient and rapid health-care services. A secure and efficient authentication scheme for TMIS provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Kumari et al. proposed a password based user authentication scheme using smart cards for TMIS, and claimed that the proposed scheme could resist various malicious attacks. However, we point out that their scheme is still vulnerable to lost smart card and cannot provide forward secrecy. Subsequently, Das and Goswami proposed a secure and efficient uniqueness-and-anonymity-preserving remote user authentication scheme for connected health care. They simulated their scheme for the formal security verification using the widely-accepted automated validation of Internet security protocols and applications (AVISPA) tool to ensure that their scheme is secure against passive and active attacks. However, we show that their scheme is still vulnerable to smart card loss attacks and cannot provide forward secrecy property. The proposed cryptanalysis discourages any use of the two schemes under investigation in practice and reveals some subtleties and challenges in designing this type of schemes.
Security enhanced multi-factor biometric authentication scheme using bio-hash function
Lee, Youngsook; Moon, Jongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867
Security enhanced multi-factor biometric authentication scheme using bio-hash function.
Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho
2017-01-01
With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.
Tightly Secure Signatures From Lossy Identification Schemes
Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi
2015-01-01
International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...
Systematic Luby Transform codes as incremental redundancy scheme
CSIR Research Space (South Africa)
Grobler, TL
2011-09-01
Full Text Available Transform Codes as Incremental Redundancy Scheme T. L. Grobler y, E. R. Ackermann y, J. C. Olivier y and A. J. van Zylz Department of Electrical, Electronic and Computer Engineering University of Pretoria, Pretoria 0002, South Africa Email: trienkog...@gmail.com, etienne.ackermann@ieee.org yDefence, Peace, Safety and Security (DPSS) Council for Scientific and Industrial Research (CSIR), Pretoria 0001, South Africa zDepartment of Mathematics and Applied Mathematics University of Pretoria, Pretoria 0002, South...
Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme
Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook
1995-01-01
Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.
Optimal Sales Schemes for Network Goods
DEFF Research Database (Denmark)
Parakhonyak, Alexei; Vikander, Nick
consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...
THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES
African Journals Online (AJOL)
PUBLICATIONS1
ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.
Arbitrated quantum signature scheme with message recovery
International Nuclear Information System (INIS)
Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin
2004-01-01
Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission
REMINDER: Saved Leave Scheme (SLS)
2003-01-01
Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...
Quantum Secure Communication Scheme with W State
International Nuclear Information System (INIS)
Wang Jian; Zhang Quan; Tang Chaojng
2007-01-01
We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.
Labeling schemes for bounded degree graphs
DEFF Research Database (Denmark)
Adjiashvili, David; Rotbart, Noy Galil
2014-01-01
We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...
BSEA: A Blind Sealed-Bid E-Auction Scheme for E-Commerce Applications
Directory of Open Access Journals (Sweden)
Rohit Kumar Das
2016-12-01
Full Text Available Due to an increase in the number of internet users, electronic commerce has grown significantly during the last decade. Electronic auction (e-auction is one of the famous e-commerce applications. Even so, security and robustness of e-auction schemes still remain a challenge. Requirements like anonymity and privacy of the b i d value are under threat from the attackers. Any auction protocol must not leak the anonymity and the privacy of the b i d value of an honest Bidder. Keeping these requirements in mind, we have firstly proposed a controlled traceable blind signature scheme (CTBSS because e-auction schemes should be able to trace the Bidders. Using CTBSS, a blind sealed-bid electronic auction scheme is proposed (BSEA. We have incorporated the notion of blind signature to e-auction schemes. Moreover, both the schemes are based upon elliptic curve cryptography (ECC, which provides a similar level of security with a comparatively smaller key size than the discrete logarithm problem (DLP based e-auction protocols. The analysis shows that BSEA fulfills all the requirements of e-auction protocol, and the total computation overhead is lower than the existing schemes.
DEFF Research Database (Denmark)
Davari, Pooya; Zare, Firuz; Yang, Yongheng
2016-01-01
A front-end rectifier can significantly impact a power electronics system performance and efficiency for applications such as motor drive where the system commonly operates under partial loading conditions. This paper proposes an adjustable switching frequency scheme using an electronic inductor...
Fragment separator momentum compression schemes
Energy Technology Data Exchange (ETDEWEB)
Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)
2011-07-21
We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.
Fragment separator momentum compression schemes
International Nuclear Information System (INIS)
Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.
2011-01-01
We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.
Electrical injection schemes for nanolasers
DEFF Research Database (Denmark)
Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten
2013-01-01
The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...
Scheme of thinking quantum systems
International Nuclear Information System (INIS)
Yukalov, V I; Sornette, D
2009-01-01
A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field
International Nuclear Information System (INIS)
Morch, Stein
2004-01-01
The article asserts that there could be an investment boom for wind, hydro and bio power in a common Norwegian-Swedish market scheme for green certificates. The Swedish authorities are ready, and the Norwegian government is preparing a report to the Norwegian Parliament. What are the ambitions of Norway, and will hydro power be included? A green certificate market common to more countries have never before been established and requires the solution of many challenging problems. In Sweden, certificate support is expected to promote primarily bioenergy, wind power and small-scale hydro power. In Norway there is an evident potential for wind power, and more hydro power can be developed if desired
Pomeranchuk conjecture and symmetry schemes
Energy Technology Data Exchange (ETDEWEB)
Galindo, A.; Morales, A.; Ruegg, H. [Junta de Energia Nuclear, Madrid (Spain); European Organization for Nuclear Research, Geneva (Switzerland); University of Geneva, Geneva (Switzerland)
1963-01-15
Pomeranchuk has conjectured that the cross-sections for charge-exchange processes vanish asymptotically as the energy tends to infinity. (By ''charge'' it is meant any internal quantum number, like electric charge, hypercharge, .. . ). It has been stated by several people that this conjecture implies equalities among the total cross-sections whenever any symmetry scheme is invoked for the strong interactions. But to our knowledge no explicit general proof of this statement has been given so far. We want to give this proof for any compact Lie group. We also prove, under certain assumptions, that the equality of the total cross-sections implies that s{sup -l} times the charge-exchange forward scattering absorptive amplitudes tend to zero as s -> ∞.
Matroids and quantum-secret-sharing schemes
International Nuclear Information System (INIS)
Sarvepalli, Pradeep; Raussendorf, Robert
2010-01-01
A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.
Lee, Tian-Fu; Chang, I-Pin; Lin, Tsung-Hung; Wang, Ching-Cheng
2013-06-01
The integrated EPR information system supports convenient and rapid e-medicine services. A secure and efficient authentication scheme for the integrated EPR information system provides safeguarding patients' electronic patient records (EPRs) and helps health care workers and medical personnel to rapidly making correct clinical decisions. Recently, Wu et al. proposed an efficient password-based user authentication scheme using smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various malicious attacks. However, their scheme is still vulnerable to lost smart card and stolen verifier attacks. This investigation discusses these weaknesses and proposes a secure and efficient authentication scheme for the integrated EPR information system as alternative. Compared with related approaches, the proposed scheme not only retains a lower computational cost and does not require verifier tables for storing users' secrets, but also solves the security problems in previous schemes and withstands possible attacks.
Das, Ashok Kumar
2015-03-01
An integrated EPR (Electronic Patient Record) information system of all the patients provides the medical institutions and the academia with most of the patients' information in details for them to make corrective decisions and clinical decisions in order to maintain and analyze patients' health. In such system, the illegal access must be restricted and the information from theft during transmission over the insecure Internet must be prevented. Lee et al. proposed an efficient password-based remote user authentication scheme using smart card for the integrated EPR information system. Their scheme is very efficient due to usage of one-way hash function and bitwise exclusive-or (XOR) operations. However, in this paper, we show that though their scheme is very efficient, their scheme has three security weaknesses such as (1) it has design flaws in password change phase, (2) it fails to protect privileged insider attack and (3) it lacks the formal security verification. We also find that another recently proposed Wen's scheme has the same security drawbacks as in Lee at al.'s scheme. In order to remedy these security weaknesses found in Lee et al.'s scheme and Wen's scheme, we propose a secure and efficient password-based remote user authentication scheme using smart cards for the integrated EPR information system. We show that our scheme is also efficient as compared to Lee et al.'s scheme and Wen's scheme as our scheme only uses one-way hash function and bitwise exclusive-or (XOR) operations. Through the security analysis, we show that our scheme is secure against possible known attacks. Furthermore, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks.
Electronics and electronic systems
Olsen, George H
1987-01-01
Electronics and Electronic Systems explores the significant developments in the field of electronics and electronic devices. This book is organized into three parts encompassing 11 chapters that discuss the fundamental circuit theory and the principles of analog and digital electronics. This book deals first with the passive components of electronic systems, such as resistors, capacitors, and inductors. These topics are followed by a discussion on the analysis of electronic circuits, which involves three ways, namely, the actual circuit, graphical techniques, and rule of thumb. The remaining p
How can conceptual schemes change teaching?
Wickman, Per-Olof
2012-03-01
Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.
A Quantum Multi-Proxy Weak Blind Signature Scheme Based on Entanglement Swapping
Yan, LiLi; Chang, Yan; Zhang, ShiBin; Han, GuiHua; Sheng, ZhiWei
2017-02-01
In this paper, we present a multi-proxy weak blind signature scheme based on quantum entanglement swapping of Bell states. In the scheme, proxy signers can finish the signature instead of original singer with his/her authority. It can be applied to the electronic voting system, electronic paying system, etc. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. It could guarantee not only the unconditionally security but also the anonymity of the message owner. The security analysis shows the scheme satisfies the security features of multi-proxy weak signature, singers cannot disavowal his/her signature while the signature cannot be forged by others, and the message owner can be traced.
Resonance ionization scheme development for europium
Energy Technology Data Exchange (ETDEWEB)
Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)
2017-11-15
Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.
Secure RAID Schemes for Distributed Storage
Huang, Wentao; Bruck, Jehoshua
2016-01-01
We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...
A new access scheme in OFDMA systems
Institute of Scientific and Technical Information of China (English)
GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping
2006-01-01
This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.
A Spatial Domain Quantum Watermarking Scheme
International Nuclear Information System (INIS)
Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang
2016-01-01
This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)
Quantum signature scheme for known quantum messages
International Nuclear Information System (INIS)
Kim, Taewan; Lee, Hyang-Sook
2015-01-01
When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)
Analog implementation of an integral resonant control scheme
International Nuclear Information System (INIS)
Pereira, E; Moheimani, S O R; Aphale, S S
2008-01-01
Integral resonant control (IRC) has been introduced as a high performance controller design methodology for flexible structures with collocated actuator–sensor pairs. IRC has a simple structure and is capable of achieving significant damping, over several modes, while guaranteeing closed-loop stability of the system in the presence of unmodeled out-of-bandwidth dynamics. IRC can be an ideal controller for various industrial damping applications, if packaged in a simple easy-to-implement electronic module. This work proposes an analog implementation of the IRC scheme using a single Op-Amp circuit. The objective is to show that with simple analog realization of the modified IRC scheme, it is possible to damp a large number of vibration modes. A brief discussion about the modeling, circuit considerations, implementation and experimental results is presented in order to validate the usefulness and practicality of the proposed analog IRC implementation. (technical note)
Novel powering schemes for pixel and tracking detectors
Feld, Lutz Werner
2013-01-01
Future pixel and tracking systems like the ones foreseen in the upgrade programs of the LHC experiments are very demanding on the power supply systems. An increased amount of power has to be supplied to the front-end electronics at a reduced voltage, through existing cable plants. Novel powering schemes are needed to avoid excessive cable losses. The two schemes under consideration, serial powering and DC-DC conversion, are reviewed. Particular emphasis is put on system integration aspects. As an example, the new CMS pixel system, which will be powered via DC-DC conversion, is presented in more detail. This allows to discuss challenges and solutions for a concrete application while the conclusions should be relevant for other applications as well.
Cascade self-seeding scheme with wake monochromator for narrow-bandwidth X-ray FELs
Energy Technology Data Exchange (ETDEWEB)
Geloni, Gianluca [European XFEL GmbH, Hamburg (Germany); Kocharyan, Vitali; Saldin, Evgeni [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)
2010-06-15
Three different approaches have been proposed so far for production of highly monochromatic X-rays from a baseline XFEL undulator: (i) single-bunch selfseeding scheme with a four crystal monochromator in Bragg reflection geometry; (ii) double-bunch self-seeding scheme with a four-crystal monochromator in Bragg reflection geometry; (iii) single-bunch self-seeding scheme with a wake monochromator. A unique element of the X-ray optical design of the last scheme is the monochromatization of X-rays using a single crystal in Bragg-transmission geometry. A great advantage of this method is that the monochromator introduces no path delay of X-rays. This fact eliminates the need for a long electron beam bypass, or for the creation of two precisely separated, identical electron bunches, as required in the other two self-seeding schemes. In its simplest configuration, the self-seeded XFEL consists of an input undulator and an output undulator separated by a monochromator. In some experimental situations this simplest two-undulator configuration is not optimal. The obvious and technically possible extension is to use a setup with three or more undulators separated by monochromators. This amplification-monochromatization cascade scheme is distinguished, in performance, by a small heat-loading of crystals and a high spectral purity of the output radiation. This paper describes such cascade self-seeding scheme with wake monochromators.We present feasibility study and exemplifications for the SASE2 line of the European XFEL. (orig.)
Energy Technology Data Exchange (ETDEWEB)
Litvinenko,V.
2009-05-04
Cooling intense high-energy hadron beams remains a major challenge in modern accelerator physics. Synchrotron radiation is still too feeble, while the efficiency of two other cooling methods, stochastic and electron, falls rapidly either at high bunch intensities (i.e. stochastic of protons) or at high energies (e-cooling). In this talk a specific scheme of a unique cooling technique, Coherent Electron Cooling, will be discussed. The idea of coherent electron cooling using electron beam instabilities was suggested by Derbenev in the early 1980s, but the scheme presented in this talk, with cooling times under an hour for 7 TeV protons in the LHC, would be possible only with present-day accelerator technology. This talk will discuss the principles and the main limitations of the Coherent Electron Cooling process. The talk will describe the main system components, based on a high-gain free electron laser driven by an energy recovery linac, and will present some numerical examples for ions and protons in RHIC and the LHC and for electron-hadron options for these colliders. BNL plans a demonstration of the idea in the near future.
Secure Dynamic access control scheme of PHR in cloud computing.
Chen, Tzer-Shyong; Liu, Chia-Hui; Chen, Tzer-Long; Chen, Chin-Sheng; Bau, Jian-Guo; Lin, Tzu-Ching
2012-12-01
With the development of information technology and medical technology, medical information has been developed from traditional paper records into electronic medical records, which have now been widely applied. The new-style medical information exchange system "personal health records (PHR)" is gradually developed. PHR is a kind of health records maintained and recorded by individuals. An ideal personal health record could integrate personal medical information from different sources and provide complete and correct personal health and medical summary through the Internet or portable media under the requirements of security and privacy. A lot of personal health records are being utilized. The patient-centered PHR information exchange system allows the public autonomously maintain and manage personal health records. Such management is convenient for storing, accessing, and sharing personal medical records. With the emergence of Cloud computing, PHR service has been transferred to storing data into Cloud servers that the resources could be flexibly utilized and the operation cost can be reduced. Nevertheless, patients would face privacy problem when storing PHR data into Cloud. Besides, it requires a secure protection scheme to encrypt the medical records of each patient for storing PHR into Cloud server. In the encryption process, it would be a challenge to achieve accurately accessing to medical records and corresponding to flexibility and efficiency. A new PHR access control scheme under Cloud computing environments is proposed in this study. With Lagrange interpolation polynomial to establish a secure and effective PHR information access scheme, it allows to accurately access to PHR with security and is suitable for enormous multi-users. Moreover, this scheme also dynamically supports multi-users in Cloud computing environments with personal privacy and offers legal authorities to access to PHR. From security and effectiveness analyses, the proposed PHR access
Electronic repository and standardization of processes and electronic documents in transport
Directory of Open Access Journals (Sweden)
Tomasz DĘBICKI
2007-01-01
Full Text Available The article refers to the idea of the use of electronic repository to store standardised scheme of processes between a Logistics Service Provider and its business partners. Application of repository for automatic or semi-automatic configuration of interoperability in electronic data interchange between information systems of differentcompanies based on transport (road, rail, sea and combined related processes. Standardisation includes processes, scheme of cooperation and related to them, electronic messages.
Anonymous Credential Schemes with Encrypted Attributes
Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.
2011-01-01
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted
Community healthcare financing scheme: findings among residents ...
African Journals Online (AJOL)
... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...
Improved Load Shedding Scheme considering Distributed Generation
DEFF Research Database (Denmark)
Das, Kaushik; Nitsas, Antonios; Altin, Müfit
2017-01-01
With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...
A generalized scheme for designing multistable continuous ...
Indian Academy of Sciences (India)
In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...
Consolidation of the health insurance scheme
Association du personnel
2009-01-01
In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).
A hierarchical classification scheme of psoriasis images
DEFF Research Database (Denmark)
Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær
2003-01-01
A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...
Privacy Preserving Mapping Schemes Supporting Comparison
Tang, Qiang
2010-01-01
To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >
Mixed ultrasoft/norm-conserved pseudopotential scheme
DEFF Research Database (Denmark)
Stokbro, Kurt
1996-01-01
A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...
New mitigation schemes of the ablative Rayleigh-Taylor instability
International Nuclear Information System (INIS)
Azechi, H.; Shiraga, H.; Nakai, M.; Shigemori, K.; Fujioka, S.; Sakaiya, T.; Tamari, Y.; Ohtani, K.; Watari, T.; Murakami, M.; Sunahara, A.; Nagatomo, H.; Nishihara, K.; Miyanaga, N.; Izawa, Y.; Ohnishi, N.
2005-01-01
The Rayleigh-Taylor (RT) instability with material ablation through the unstable interface is the key physics that determines success or failure of inertial fusion energy (IFE) generation, as the RT instability potentially quenches ignition and burn by disintegrating the IFE target. We present two suppression schemes of the RT growth without significant degradation of the target density. The first scheme is to generate double ablation structure in high-Z doped plastic targets. In addition to the electron ablation surface, a new ablation surface is created by x-ray radiation from the high-Z ions. Contrary to the previous thought, the electron ablation surface is almost completely stabilized by extremely high flow velocity. On the other hand, the RT instability on the radiative ablation surface is significantly moderated. The second is to enhance the nonlocal nature of the electron heat transport by illuminating the target with long wavelength laser light, whereas the high ablation pressure is generated by irradiating short wavelength laser light. The significant suppression of the RT instability may increase the possibility of impact ignition which uses a high velocity fuel colliding with a preformed main fuel. (author)
Labelling schemes: From a consumer perspective
DEFF Research Database (Denmark)
Juhl, Hans Jørn; Stacey, Julia
2000-01-01
Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...
Birkhoffian Symplectic Scheme for a Quantum System
International Nuclear Information System (INIS)
Su Hongling
2010-01-01
In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)
Autonomous droop scheme with reduced generation cost
DEFF Research Database (Denmark)
Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede
2013-01-01
Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....
International Nuclear Information System (INIS)
Bhunia, C.T.
2007-07-01
Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)
Analysis of central and upwind compact schemes
International Nuclear Information System (INIS)
Sengupta, T.K.; Ganeriwal, G.; De, S.
2003-01-01
Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property
Multipartite electronic entanglement purification with charge detection
Energy Technology Data Exchange (ETDEWEB)
Sheng Yubo [Department of Physics, Tsinghua University, Beijing 100084 (China); Deng, Fu-Guo [Department of Physics, Beijing Normal University, Beijing 100875 (China); Long Guilu, E-mail: gllong@tsinghua.edu.c [Department of Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory for Atomic and Molecular NanoSciences, Tsinghua University, Beijing 100084 (China); Tsinghua National Laboratory for Information Science and Technology, Beijing 100084 (China)
2011-01-17
We present a multipartite entanglement purification scheme in a Greenberger-Horne-Zeilinger state for electrons based on their spins and their charges. This scheme works for purification with two steps, i.e., bit-flip error correction and phase-flip error correction. By repeating these two steps, the parties in quantum communication can get some high-fidelity multipartite entangled electronic systems.
Experimental studies of VpxB electron linear accelerator
International Nuclear Information System (INIS)
Taura, T.; Onihashi, H.; Otsuka, K.; Nishida, Y.; Yugami, N.
1989-01-01
In order to demonstrate a new electron linear accelerator an electron beam is accelerated either in the conventional linear accelerator scheme or in the V p xB scheme in a same machine and higher energy gain of about 18 % is observed in the V p xB scheme as is expected from the designed values. The experimental results are compared with the numerical simulation to show reasonable agreement. (author)
Symmetric weak ternary quantum homomorphic encryption schemes
Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao
2016-03-01
Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.
Ponzi scheme diffusion in complex networks
Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue
2017-08-01
Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.
Optimal Face-Iris Multimodal Fusion Scheme
Directory of Open Access Journals (Sweden)
Omid Sharifi
2016-06-01
Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.
Li, Chun-Ta; Weng, Chi-Yao; Lee, Cheng-Chi; Wang, Chun-Cheng
2015-11-01
To protect patient privacy and ensure authorized access to remote medical services, many remote user authentication schemes for the integrated electronic patient record (EPR) information system have been proposed in the literature. In a recent paper, Das proposed a hash based remote user authentication scheme using passwords and smart cards for the integrated EPR information system, and claimed that the proposed scheme could resist various passive and active attacks. However, in this paper, we found that Das's authentication scheme is still vulnerable to modification and user duplication attacks. Thereafter we propose a secure and efficient authentication scheme for the integrated EPR information system based on lightweight hash function and bitwise exclusive-or (XOR) operations. The security proof and performance analysis show our new scheme is well-suited to adoption in remote medical healthcare services.
A missing-bending-magnet scheme for PEP
International Nuclear Information System (INIS)
Liu, R.Z.; Winick, H.
1988-01-01
This article presents a missing-bending-magnet scheme for PEP as a modification that could be considered if PEP were available as a fully dedicated synchrotron radiation source. The scheme can be applied to one or more PEP sextants without changing the rest. By removing some bending magnets, rearranging the remaining magnets, and adding two quadrupoles, ten additional straight sections per sextant can be created, each 5 m or more in length, for insertion devices. Beam lines therefrom, plus possible beam lines from bending magnets would enter a continuous experimental hall instead of individual tunnels and halls for each beam line. This should result in construction cost savings and increased operations efficiency. The ideal beam orbit is unchanged at the two ends and the middle of the sextant. At the end of the curved part of the sextant the lattice functions match those of the long interaction region straight section in the low emittance configuration of PEP. The electron beam characteristics in the newly created straight sections are described, including the enlargement of the horizontal beam size due to the nonzero dispersion. Some disadvantages of the scheme are increased operations complexity due to the need for nine new quadrupole families, increased beam emittance (by 14.5% is one sextant is modified), and reduced dynamic aperture. However, the dynamic aperture is still about as large as the physical aperture and should be adequate for good beam lifetime and injection. (orig.)
Multidimensional flux-limited advection schemes
International Nuclear Information System (INIS)
Thuburn, J.
1996-01-01
A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion
Finite-volume scheme for anisotropic diffusion
Energy Technology Data Exchange (ETDEWEB)
Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)
2016-02-01
In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.
Vector domain decomposition schemes for parabolic equations
Vabishchevich, P. N.
2017-09-01
A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.
The new WAGR data acquisition scheme
International Nuclear Information System (INIS)
Ellis, W.E.; Leng, J.H.; Smith, I.C.; Smith, M.R.
1976-06-01
The existing WAGR data acquisition equipment was inadequate to meet the requirements introduced by the installation of two additional experimental loops and was in any case due for replacement. A completely new scheme was planned and implemented based on mini-computers, which while preserving all the useful features of the old scheme provided additional flexibility and improved data display. Both the initial objectives of the design and the final implementation are discussed without introducing detailed descriptions of hardware or the programming techniques employed. Although the scheme solves a specific problem the general principles are more widely applicable and could readily be adapted to other data checking and display problems. (author)
Kinematic reversal schemes for the geomagnetic dipole.
Levy, E. H.
1972-01-01
Fluctuations in the distribution of cyclonic convective cells, in the earth's core, can reverse the sign of the geomagnetic field. Two kinematic reversal schemes are discussed. In the first scheme, a field maintained by cyclones concentrated at low latitude is reversed by a burst of cyclones at high latitude. Conversely, in the second scheme, a field maintained predominantly by cyclones in high latitudes is reversed by a fluctuation consisting of a burst of cyclonic convection at low latitude. The precise fluid motions which produce the geomagnetic field are not known. However, it appears that, whatever the details are, a fluctuation in the distribution of cyclonic cells over latitude can cause a geomagnetic reversal.
Autonomous Droop Scheme With Reduced Generation Cost
DEFF Research Database (Denmark)
Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng
2014-01-01
) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...
Cognitive radio networks dynamic resource allocation schemes
Wang, Shaowei
2014-01-01
This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off
Algebraic K-theory of generalized schemes
DEFF Research Database (Denmark)
Anevski, Stella Victoria Desiree
and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....
Analysis of reaction schemes using maximum rates of constituent steps
Motagamwala, Ali Hussain; Dumesic, James A.
2016-01-01
We show that the steady-state kinetics of a chemical reaction can be analyzed analytically in terms of proposed reaction schemes composed of series of steps with stoichiometric numbers equal to unity by calculating the maximum rates of the constituent steps, rmax,i, assuming that all of the remaining steps are quasi-equilibrated. Analytical expressions can be derived in terms of rmax,i to calculate degrees of rate control for each step to determine the extent to which each step controls the rate of the overall stoichiometric reaction. The values of rmax,i can be used to predict the rate of the overall stoichiometric reaction, making it possible to estimate the observed reaction kinetics. This approach can be used for catalytic reactions to identify transition states and adsorbed species that are important in controlling catalyst performance, such that detailed calculations using electronic structure calculations (e.g., density functional theory) can be carried out for these species, whereas more approximate methods (e.g., scaling relations) are used for the remaining species. This approach to assess the feasibility of proposed reaction schemes is exact for reaction schemes where the stoichiometric coefficients of the constituent steps are equal to unity and the most abundant adsorbed species are in quasi-equilibrium with the gas phase and can be used in an approximate manner to probe the performance of more general reaction schemes, followed by more detailed analyses using full microkinetic models to determine the surface coverages by adsorbed species and the degrees of rate control of the elementary steps. PMID:27162366
A kilohertz picosecond x-ray pulse generation scheme
International Nuclear Information System (INIS)
Guo, W.; Borland, M.; Harkay, K. C.; Wang, C.-X.; Yang, B.
2007-01-01
The duration of the x-ray pulse generated at a synchrotron light source is typically tens of picoseconds. Shorter pulses are highly desired by the users. In electron storage rings, the vertical beam size is usually orders of magnitude less than the bunch length due to radiation damping; therefore, a shorter pulse can be obtained by slitting the vertically tilted bunch. Zholents proposed tilting the bunch using rf deflection. We found that tilted bunches can also be generated by a dipole magnet kick. A vertical tilt is developed after the kick in the presence of nonzero chromaticity. The tilt was successfully observed and a 4.2-ps pulse was obtained from a 27-ps electron bunch at the Advanced Photon Source. Based on this principle we propose a short-pulse generation scheme that produces picosecond x-ray pulses at a repetition rate of 1 utilde2 kHz, which can be used for pump-probe experiments
A survey of Strong Convergent Schemes for the Simulation of ...
African Journals Online (AJOL)
We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...
Setting aside transactions from pyramid schemes as impeachable ...
African Journals Online (AJOL)
These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...
PIC simulation of the electron-ion collision effects on suprathermal electrons
International Nuclear Information System (INIS)
Wu Yanqing; Han Shensheng
2000-01-01
The generation and transportation of suprathermal electrons are important to both traditional ICF scheme and 'Fast Ignition' scheme. The author discusses the effects of electron-ion collision on the generation and transportation of the suprathermal electrons by parametric instability. It indicates that the weak electron-ion term in the PIC simulation results in the enhancement of the collisional absorption and increase of the hot electron temperature and reduction in the maximum electrostatic field amplitude while wave breaking. Therefore the energy and distribution of the suprathermal electrons are changed. They are distributed more close to the phase velocity of the electrostatic wave than the case without electron-ion collision term. The electron-ion collision enhances the self-consistent field and impedes the suprathermal electron transportation. These factors also reduce the suprathermal electron energy. In addition, the authors discuss the effect of initial condition on PIC simulation to ensure that the results are correct
Betatron tune correction schemes in nuclotron
International Nuclear Information System (INIS)
Shchepunov, V.A.
1992-01-01
Algorithms of the betatron tune corrections in Nuclotron with sextupolar and octupolar magnets are considered. Second order effects caused by chromaticity correctors are taken into account and sextupolar compensation schemes are proposed to suppress them. 6 refs.; 1 tab
A Directed Signature Scheme and its Applications
Lal, Sunder; Kumar, Manoj
2004-01-01
This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.
Nigeria's first national social protection scheme | IDRC ...
International Development Research Centre (IDRC) Digital Library (Canada)
2017-06-14
Jun 14, 2017 ... Women and children at an IDP Camp in DRC ... The cash transfer was provided through the Nigerian Ekiti State Social Security Scheme, ... national policy conference to discuss the findings with media and policy stakeholders.
Verifiable Secret Redistribution for Threshold Sharing Schemes
National Research Council Canada - National Science Library
Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M
2002-01-01
.... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...
Boson expansion theory in the seniority scheme
International Nuclear Information System (INIS)
Tamura, T.; Li, C.; Pedrocchi, V.G.
1985-01-01
A boson expansion formalism in the seniority scheme is presented and its relation with number-conserving quasiparticle calculations is elucidated. Accuracy and convergence are demonstrated numerically. A comparative discussion with other related approaches is given
Designing optimal sampling schemes for field visits
CSIR Research Space (South Africa)
Debba, Pravesh
2008-10-01
Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...
Secret Sharing Schemes and Advanced Encryption Standard
2015-09-01
25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption
Cost Comparison Among Provable Data Possession Schemes
2016-03-01
of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk
A Classification Scheme for Production System Processes
DEFF Research Database (Denmark)
Sørensen, Daniel Grud Hellerup; Brunø, Thomas Ditlev; Nielsen, Kjeld
2018-01-01
Manufacturing companies often have difficulties developing production platforms, partly due to the complexity of many production systems and difficulty determining which processes constitute a platform. Understanding production processes is an important step to identifying candidate processes...... for a production platform based on existing production systems. Reviewing a number of existing classifications and taxonomies, a consolidated classification scheme for processes in production of discrete products has been outlined. The classification scheme helps ensure consistency during mapping of existing...
A scheme for the hadron spectrum
International Nuclear Information System (INIS)
Hoyer, P.
1978-03-01
A theoretically self-consistent dual scheme is proposed for the hadron spectrum, which follows naturally from basic requirements and phenomenology. All resonance properties and couplings are calculable in terms of a limited number of input parameters. A first application to ππ→ππ explains the linear trajectory and small daughter couplings. The Zweig rule and the decoupling of baryonium from mesons are expected to be consequences of the scheme. (Auth.)
A Practical Voter-Verifiable Election Scheme.
Chaum, D; Ryan, PYA; Schneider, SA
2005-01-01
We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the vot...
Sellafield site (including Drigg) emergency scheme manual
International Nuclear Information System (INIS)
1987-02-01
This Emergency Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. This manual covers the general principles of the total emergency scheme and those detailed procedures which are not specific to any single department. (U.K.)
Signature scheme based on bilinear pairs
Tong, Rui Y.; Geng, Yong J.
2013-03-01
An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.
An Optimization Scheme for ProdMod
International Nuclear Information System (INIS)
Gregory, M.V.
1999-01-01
A general purpose dynamic optimization scheme has been devised in conjunction with the ProdMod simulator. The optimization scheme is suitable for the Savannah River Site (SRS) High Level Waste (HLW) complex operations, and able to handle different types of optimizations such as linear, nonlinear, etc. The optimization is performed in the stand-alone FORTRAN based optimization deliver, while the optimizer is interfaced with the ProdMod simulator for flow of information between the two
Employee-referral schemes and discrimination law
Connolly, M.
2015-01-01
Employee-referral schemes (‘introduce a friend’) are in common usage in recruitment. They carry a potential to discriminate by perpetuating an already unbalanced workforce (say, by gender and ethnicity). With this, or course, comes the risk of litigation and bad publicity as well as any inherent inefficiencies associated with discrimination. This article is threefold. First, it examines the present state of the law. Second, it is based on a survey of employers who use these schemes. Third, it...
Basis scheme of personnel training system
International Nuclear Information System (INIS)
Rerucha, F.; Odehnal, J.
1998-01-01
Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel
Navigators’ Behavior in Traffic Separation Schemes
Directory of Open Access Journals (Sweden)
Zbigniew Pietrzykowski
2015-03-01
Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.
Novel Directional Protection Scheme for the FREEDM Smart Grid System
Sharma, Nitish
This research primarily deals with the design and validation of the protection system for a large scale meshed distribution system. The large scale system simulation (LSSS) is a system level PSCAD model which is used to validate component models for different time-scale platforms, to provide a virtual testing platform for the Future Renewable Electric Energy Delivery and Management (FREEDM) system. It is also used to validate the cases of power system protection, renewable energy integration and storage, and load profiles. The protection of the FREEDM system against any abnormal condition is one of the important tasks. The addition of distributed generation and power electronic based solid state transformer adds to the complexity of the protection. The FREEDM loop system has a fault current limiter and in addition, the Solid State Transformer (SST) limits the fault current at 2.0 per unit. Former students at ASU have developed the protection scheme using fiber-optic cable. However, during the NSF-FREEDM site visit, the National Science Foundation (NSF) team regarded the system incompatible for the long distances. Hence, a new protection scheme with a wireless scheme is presented in this thesis. The use of wireless communication is extended to protect the large scale meshed distributed generation from any fault. The trip signal generated by the pilot protection system is used to trigger the FID (fault isolation device) which is an electronic circuit breaker operation (switched off/opening the FIDs). The trip signal must be received and accepted by the SST, and it must block the SST operation immediately. A comprehensive protection system for the large scale meshed distribution system has been developed in PSCAD with the ability to quickly detect the faults. The validation of the protection system is performed by building a hardware model using commercial relays at the ASU power laboratory.
A Classification Scheme for Literary Characters
Directory of Open Access Journals (Sweden)
Matthew Berry
2017-10-01
Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.
Canonical, stable, general mapping using context schemes.
Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict
2015-11-15
Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.
Cancelable remote quantum fingerprint templates protection scheme
International Nuclear Information System (INIS)
Liao Qin; Guo Ying; Huang Duan
2017-01-01
With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)
Efficient multiparty quantum-secret-sharing schemes
International Nuclear Information System (INIS)
Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei
2004-01-01
In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information
Payment Procedures for Electronic Government Services
Pousttchi, Key; Wiedemann, Dietmar Georg
2005-01-01
In this paper, we analyse payment procedures for their suitability for electronic government. We provide an overview of the payment procedures currently available on the market, compare the situation in electronic government with the situation in electronic commerce and analyze what we can transfer. Based on functional requirements we propose a scheme that allows public agencies to examine the appropriateness of any given payment procedure for electronic government.
Nisar, Ubaid Ahmed; Ashraf, Waqas; Qamar, Shamsul
In this article, one and two-dimensional hydrodynamical models of semiconductor devices are numerically investigated. The models treat the propagation of electrons in a semiconductor device as the flow of a charged compressible fluid. It plays an important role in predicting the behavior of electron flow in semiconductor devices. Mathematically, the governing equations form a convection-diffusion type system with a right hand side describing the relaxation effects and interaction with a self consistent electric field. The proposed numerical scheme is a splitting scheme based on the kinetic flux-vector splitting (KFVS) method for the hyperbolic step, and a semi-implicit Runge-Kutta method for the relaxation step. The KFVS method is based on the direct splitting of macroscopic flux functions of the system on the cell interfaces. The second order accuracy of the scheme is achieved by using MUSCL-type initial reconstruction and Runge-Kutta time stepping method. Several case studies are considered. For validation, the results of current scheme are compared with those obtained from the splitting scheme based on the NT central scheme. The effects of various parameters such as low field mobility, device length, lattice temperature and voltage are analyzed. The accuracy, efficiency and simplicity of the proposed KFVS scheme validates its generic applicability to the given model equations. A two dimensional simulation is also performed by KFVS method for a MESFET device, producing results in good agreement with those obtained by NT-central scheme.
Oxygen- and nitrogen-chemisorbed carbon nanostructures for Z-scheme photocatalysis applications
International Nuclear Information System (INIS)
Qian Zhao; Pathak, Biswarup; Nisar, Jawad; Ahuja, Rajeev
2012-01-01
Here focusing on the very new experimental finding on carbon nanomaterials for solid-state electron mediator applications in Z-scheme photocatalysis, we have investigated different graphene-based nanostructures chemisorbed by various types and amounts of species such as oxygen (O), nitrogen (N) and hydroxyl (OH) and their electronic structures using density functional theory. The work functions of different nanostructures have also been investigated by us to evaluate their potential applications in Z-scheme photocatalysis for water splitting. The N-, O–N-, and N–N-chemisorbed graphene-based nanostructures (32 carbon atoms supercell, corresponding to lattice parameter of about 1 nm) are found promising to be utilized as electron mediators between reduction level and oxidation level of water splitting. The O- or OH-chemisorbed nanostructures have potential to be used as electron conductors between H 2 -evolving photocatalysts and the reduction level (H + /H 2 ). This systematic study is proposed to understand the properties of graphene-based carbon nanostructures in Z-scheme photocatalysis and guide experimentalists to develop better carbon-based nanomaterials for more efficient Z-scheme photocatalysis applications in the future.
Assembly and offset assignment scheme for self-similar traffic in optical burst switched networks
CSIR Research Space (South Africa)
Muwonge, KB
2007-10-01
Full Text Available at the Label Edge Router (LER) to buffer traffic in the electronic domain. Burst assembly and offset assignment schemes are implemented in a complementary manner to improve QoS of an OBS network. The authors show that OBS network performance is directly related...
Financial incentive schemes in primary care
Directory of Open Access Journals (Sweden)
Gillam S
2015-09-01
Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care
2007-01-01
As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...
HR Department
2007-01-01
As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...
The generalized scheme-independent Crewther relation in QCD
Shen, Jian-Ming; Wu, Xing-Gang; Ma, Yang; Brodsky, Stanley J.
2017-07-01
The Principle of Maximal Conformality (PMC) provides a systematic way to set the renormalization scales order-by-order for any perturbative QCD calculable processes. The resulting predictions are independent of the choice of renormalization scheme, a requirement of renormalization group invariance. The Crewther relation, which was originally derived as a consequence of conformally invariant field theory, provides a remarkable connection between two observables when the β function vanishes: one can show that the product of the Bjorken sum rule for spin-dependent deep inelastic lepton-nucleon scattering times the Adler function, defined from the cross section for electron-positron annihilation into hadrons, has no pQCD radiative corrections. The ;Generalized Crewther Relation; relates these two observables for physical QCD with nonzero β function; specifically, it connects the non-singlet Adler function (Dns) to the Bjorken sum rule coefficient for polarized deep-inelastic electron scattering (CBjp) at leading twist. A scheme-dependent ΔCSB-term appears in the analysis in order to compensate for the conformal symmetry breaking (CSB) terms from perturbative QCD. In conventional analyses, this normally leads to unphysical dependence in both the choice of the renormalization scheme and the choice of the initial scale at any finite order. However, by applying PMC scale-setting, we can fix the scales of the QCD coupling unambiguously at every order of pQCD. The result is that both Dns and the inverse coefficient CBjp-1 have identical pQCD coefficients, which also exactly match the coefficients of the corresponding conformal theory. Thus one obtains a new generalized Crewther relation for QCD which connects two effective charges, αˆd (Q) =∑i≥1 αˆg1 i (Qi), at their respective physical scales. This identity is independent of the choice of the renormalization scheme at any finite order, and the dependence on the choice of the initial scale is negligible. Similar
A fast resonance interference treatment scheme with subgroup method
International Nuclear Information System (INIS)
Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.
2015-01-01
A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)
Luminosity optimization schemes in Compton experiments based on Fabry-Perot optical resonators
Directory of Open Access Journals (Sweden)
Alessandro Variola
2011-03-01
Full Text Available The luminosity of Compton x-ray and γ sources depends on the average current in electron bunches, the energy of the laser pulses, and the geometry of the particle bunch to laser pulse collisions. To obtain high power photon pulses, these can be stacked in a passive optical resonator (Fabry-Perot cavity especially when a high average flux is required. But, in this case, owing to the presence of the optical cavity mirrors, the electron bunches have to collide at an angle with the laser pulses with a consequent luminosity decrease. In this article a crab-crossing scheme is proposed for Compton sources, based on a laser amplified in a Fabry-Perot resonator, to eliminate the luminosity losses given by the crossing angle, taking into account that in laser-electron collisions only the electron bunches can be tilted at the collision point. We report the analytical study on the crab-crossing scheme for Compton gamma sources. The analytical expression for the total yield of photons generated in Compton sources with the crab-crossing scheme of collision is derived. The optimal collision angle of the bunch was found to be equal to half of the collision angle. At this crabbing angle, the maximal yield of scattered off laser photons is attained thanks to the maximization, in the collision process, of the time spent by the laser pulse in the electron bunch. Estimations for some Compton source projects are presented. Furthermore, some schemes of the optical cavities configuration are analyzed and the luminosity calculated. As illustrated, the four-mirror two- or three-dimensional scheme is the most appropriate for Compton sources.
Lim, Jong Tae; Kim, Kyung Nam; Yeom, Geun Young
2009-12-01
Organic light-emitting diodes (OLEDs) with a Ba-doped tris(8-quinolinolato)aluminum(III) (Alq3) layer were fabricated to reduce the barrier height for electron injection and to improve the electron conductivity. In the OLED consisting of glass/ITO/4,4',4"-tris[2-naphthylphenyl-1-phenylamino]triphenylamine (2-TNATA, 30 nm)/4,4'-bis[N-(1-napthyl)-N-phenyl-amino]-biphenyl (NPB, 18 nm)/Alq3 (42 nm)/Ba-doped Alq3 (20 nm, x%: x = 0, 10, 25, and 50)/Al (100 nm), the device with the Alq3 layer doped with 10% Ba showed the highest light out-coupling characteristic. However, as the Ba dopant concentration was increased from 25% to 50%, this device characteristic was largely reduced. The characteristics of these devices were interpreted on the basis of the chemical reaction between Ba and Alq3 and the electron injection property by analyzing the electronic structure of the Ba-doped Alq3 layer. At a low Ba doping of 10%, mainly the Alq3 radical anion species was formed. In addition, the barrier height for electron injection in this layer was decreased to 0.6 eV, when compared to the pristine Alq3 layer. At a high Ba doping of 50%, the Alq3 molecules were severely decomposed. When the Ba dopant concentration was changed, the light-emitting characteristics of the devices were well coincided with the formation mechanism of Alq3 radical anion and Alq3 decomposition species.
How update schemes influence crowd simulations
International Nuclear Information System (INIS)
Seitz, Michael J; Köster, Gerta
2014-01-01
Time discretization is a key modeling aspect of dynamic computer simulations. In current pedestrian motion models based on discrete events, e.g. cellular automata and the Optimal Steps Model, fixed-order sequential updates and shuffle updates are prevalent. We propose to use event-driven updates that process events in the order they occur, and thus better match natural movement. In addition, we present a parallel update with collision detection and resolution for situations where computational speed is crucial. Two simulation studies serve to demonstrate the practical impact of the choice of update scheme. Not only do density-speed relations differ, but there is a statistically significant effect on evacuation times. Fixed-order sequential and random shuffle updates with a short update period come close to event-driven updates. The parallel update scheme overestimates evacuation times. All schemes can be employed for arbitrary simulation models with discrete events, such as car traffic or animal behavior. (paper)
Asynchronous discrete event schemes for PDEs
Stone, D.; Geiger, S.; Lord, G. J.
2017-08-01
A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.
An adaptive Cartesian control scheme for manipulators
Seraji, H.
1987-01-01
A adaptive control scheme for direct control of manipulator end-effectors to achieve trajectory tracking in Cartesian space is developed. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for online implementation with high sampling rates.
A Traffic Restriction Scheme for Enhancing Carpooling
Directory of Open Access Journals (Sweden)
Dong Ding
2017-01-01
Full Text Available For the purpose of alleviating traffic congestion, this paper proposes a scheme to encourage travelers to carpool by traffic restriction. By a variational inequity we describe travelers’ mode (solo driving and carpooling and route choice under user equilibrium principle in the context of fixed demand and detect the performance of a simple network with various restriction links, restriction proportions, and carpooling costs. Then the optimal traffic restriction scheme aiming at minimal total travel cost is designed through a bilevel program and applied to a Sioux Fall network example with genetic algorithm. According to various requirements, optimal restriction regions and proportions for restricted automobiles are captured. From the results it is found that traffic restriction scheme is possible to enhance carpooling and alleviate congestion. However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.
Quantum Watermarking Scheme Based on INEQR
Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou
2018-04-01
Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.
Improvement of One Quantum Encryption Scheme
Cao, Zhengjun; Liu, Lihua
2012-01-01
Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.
International Nuclear Information System (INIS)
Kim, Jin Su
2010-07-01
This book is composed of five chapters, which introduces electronic technology about understanding of electronic, electronic component, radio, electronic application, communication technology, semiconductor on its basic, free electron and hole, intrinsic semiconductor and semiconductor element, Diode such as PN junction diode, characteristic of junction diode, rectifier circuit and smoothing circuit, transistor on structure of transistor, characteristic of transistor and common emitter circuit, electronic application about electronic equipment, communication technology and education, robot technology and high electronic technology.
DEFF Research Database (Denmark)
Alrabadi, Osama; Papadias, C.B.; Kalis, A.
2009-01-01
A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO sys...
A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes
DEFF Research Database (Denmark)
Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis
2009-01-01
array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...
Carbon trading: Current schemes and future developments
International Nuclear Information System (INIS)
Perdan, Slobodan; Azapagic, Adisa
2011-01-01
This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: → The paper provides an extensive overview of mandatory emissions trading schemes around the world. → Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. → The expansion requires considerable technical fixes and harmonisation of different trading systems. → Clear policy signals, political support and a stable economic environment are needed for the expansion. → A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.
Pressure correction schemes for compressible flows
International Nuclear Information System (INIS)
Kheriji, W.
2011-01-01
This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)
NFC Secure Payment and Verification Scheme with CS E-Ticket
Directory of Open Access Journals (Sweden)
Kai Fan
2017-01-01
Full Text Available As one of the most important techniques in IoT, NFC (Near Field Communication is more interesting than ever. NFC is a short-range, high-frequency communication technology well suited for electronic tickets, micropayment, and access control function, which is widely used in the financial industry, traffic transport, road ban control, and other fields. However, NFC is becoming increasingly popular in the relevant field, but its secure problems, such as man-in-the-middle-attack and brute force attack, have hindered its further development. To address the security problems and specific application scenarios, we propose a NFC mobile electronic ticket secure payment and verification scheme in the paper. The proposed scheme uses a CS E-Ticket and offline session key generation and distribution technology to prevent major attacks and increase the security of NFC. As a result, the proposed scheme can not only be a good alternative to mobile e-ticket system but also be used in many NFC fields. Furthermore, compared with other existing schemes, the proposed scheme provides a higher security.
Energy Technology Data Exchange (ETDEWEB)
Thomson, George
1972-01-01
Electrons are elementary particles of atoms that revolve around and outside the nucleus and have a negative charge. This booklet discusses how electrons relate to electricity, some applications of electrons, electrons as waves, electrons in atoms and solids, the electron microscope, among other things.
Verification of an objective analysis scheme
International Nuclear Information System (INIS)
Cats, G.J.; Haan, B.J. de; Hafkenscheid, L.M.
1987-01-01
An intermittent data assimilation scheme has been used to produce wind and precipitation fields during the 10 days after the explosion at the Chernobyl nuclear power plant on 25 April 1986. The wind fields are analyses, the precipitation fields have been generated by the forecast model part of the scheme. The precipitation fields are of fair quality. The quality of the wind fields has been monitored by the ensuing trajectories. These were found to describe the arrival times of radioactive air in good agreement with most observational data, taken all over Europe. The wind analyses are therefore considered to be reliable. 25 refs.; 13 figs
Optimal powering schemes for legged robotics
Muench, Paul; Bednarz, David; Czerniak, Gregory P.; Cheok, Ka C.
2010-04-01
Legged Robots have tremendous mobility, but they can also be very inefficient. These inefficiencies can be due to suboptimal control schemes, among other things. If your goal is to get from point A to point B in the least amount of time, your control scheme will be different from if your goal is to get there using the least amount of energy. In this paper, we seek a balance between these extremes by looking at both efficiency and speed. We model a walking robot as a rimless wheel, and, using Pontryagin's Maximum Principle (PMP), we find an "on-off" control for the model, and describe the switching curve between these control extremes.
System Protection Schemes in Eastern Denmark
DEFF Research Database (Denmark)
Rasmussen, Joana
outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... effective measures, because they are associated with large reactive power losses in the transmission system. Ordered reduction of wind generation is considered an effective measure to maintain voltage stability in the system. Reactive power in the system is released due to tripping of a significant amount...... system. In that way, the power system capability could be extended beyond normal limits....
Group Buying Schemes : A Sustainable Business Model?
Köpp, Sebastian; Mukhachou, Aliaksei; Schwaninger, Markus
2013-01-01
Die Autoren gehen der Frage nach, ob "Group Buying Schemes" wie beispielsweise von den Unternehmen Groupon und Dein Deal angeboten, ein nachhaltiges Geschäftsmodell sind. Anhand der Fallstudie Groupon wird mit einem System Dynamics Modell festgestellt, dass das Geschäftsmodell geändert werden muss, wenn die Unternehmung auf Dauer lebensfähig sein soll. The authors examine if group buying schemes are a sustainable business model. By means of the Groupon case study and using a System Dynami...
New Imaging Operation Scheme at VLTI
Haubois, Xavier
2018-04-01
After PIONIER and GRAVITY, MATISSE will soon complete the set of 4 telescope beam combiners at VLTI. Together with recent developments in the image reconstruction algorithms, the VLTI aims to develop its operation scheme to allow optimized and adaptive UV plane coverage. The combination of spectro-imaging instruments, optimized operation framework and image reconstruction algorithms should lead to an increase of the reliability and quantity of the interferometric images. In this contribution, I will present the status of this new scheme as well as possible synergies with other instruments.
Hilbert schemes of points and Heisenberg algebras
International Nuclear Information System (INIS)
Ellingsrud, G.; Goettsche, L.
2000-01-01
Let X [n] be the Hilbert scheme of n points on a smooth projective surface X over the complex numbers. In these lectures we describe the action of the Heisenberg algebra on the direct sum of the cohomologies of all the X [n] , which has been constructed by Nakajima. In the second half of the lectures we study the relation of the Heisenberg algebra action and the ring structures of the cohomologies of the X [n] , following recent work of Lehn. In particular we study the Chern and Segre classes of tautological vector bundles on the Hilbert schemes X [n] . (author)
Security problem on arbitrated quantum signature schemes
International Nuclear Information System (INIS)
Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon
2011-01-01
Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.
Optimal sampling schemes applied in geology
CSIR Research Space (South Africa)
Debba, Pravesh
2010-05-01
Full Text Available Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology UP 2010 2 / 47 Outline 1 Introduction to hyperspectral remote... sensing 2 Objective of Study 1 3 Study Area 4 Data used 5 Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology...
Quadratically convergent MCSCF scheme using Fock operators
International Nuclear Information System (INIS)
Das, G.
1981-01-01
A quadratically convergent formulation of the MCSCF method using Fock operators is presented. Among its advantages the present formulation is quadratically convergent unlike the earlier ones based on Fock operators. In contrast to other quadratically convergent schemes as well as the one based on generalized Brillouin's theorem, this method leads easily to a hybrid scheme where the weakly coupled orbitals (such as the core) are handled purely by Fock equations, while the rest of the orbitals are treated by a quadratically convergent approach with a truncated virtual space obtained by the use of the corresponding Fock equations
Security problem on arbitrated quantum signature schemes
Energy Technology Data Exchange (ETDEWEB)
Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)
2011-12-15
Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.
Clocking Scheme for Switched-Capacitor Circuits
DEFF Research Database (Denmark)
Steensgaard-Madsen, Jesper
1998-01-01
A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....
Hard electronics; Hard electronics
Energy Technology Data Exchange (ETDEWEB)
NONE
1997-03-01
Hard material technologies were surveyed to establish the hard electronic technology which offers superior characteristics under hard operational or environmental conditions as compared with conventional Si devices. The following technologies were separately surveyed: (1) The device and integration technologies of wide gap hard semiconductors such as SiC, diamond and nitride, (2) The technology of hard semiconductor devices for vacuum micro- electronics technology, and (3) The technology of hard new material devices for oxides. The formation technology of oxide thin films made remarkable progress after discovery of oxide superconductor materials, resulting in development of an atomic layer growth method and mist deposition method. This leading research is expected to solve such issues difficult to be easily realized by current Si technology as high-power, high-frequency and low-loss devices in power electronics, high temperature-proof and radiation-proof devices in ultimate electronics, and high-speed and dense- integrated devices in information electronics. 432 refs., 136 figs., 15 tabs.
Phonon limited electronic transport in Pb
DEFF Research Database (Denmark)
Rittweger, Florian; Hinsche, Nicki Frank; Mertig, Ingrid
2017-01-01
We present a fully ab initio based scheme to compute electronic transport properties, i.e. the electrical conductivity σ and thermopower S, in the presence of electron-phonon interaction. We explicitly investigate the k-dependent structure of the Éliashberg spectral function, the coupling strength...
Automated electronic filter design
Banerjee, Amal
2017-01-01
This book describes a novel, efficient and powerful scheme for designing and evaluating the performance characteristics of any electronic filter designed with predefined specifications. The author explains techniques that enable readers to eliminate complicated manual, and thus error-prone and time-consuming, steps of traditional design techniques. The presentation includes demonstration of efficient automation, using an ANSI C language program, which accepts any filter design specification (e.g. Chebyschev low-pass filter, cut-off frequency, pass-band ripple etc.) as input and generates as output a SPICE(Simulation Program with Integrated Circuit Emphasis) format netlist. Readers then can use this netlist to run simulations with any version of the popular SPICE simulator, increasing accuracy of the final results, without violating any of the key principles of the traditional design scheme.
Study of the scheme of two-beam accelerator driver with accompanying electromagnetic wave
International Nuclear Information System (INIS)
Elzhov, A.V.; Kaminskij, A.K.; Kazacha, V.I.; Perel'shtejn, E.A.; Sedykh, S.N.; Sergeev, A.P.
2000-01-01
A novel scheme of two-beam accelerator (TBA) driver based on a linear induction accelerator is considered. In this scheme the bunched beam propagates in the accompanying enhanced microwave that provides the steady longitudinal beam bunching along the whole driver. A travelling wave tube (TWT) is used as the wave-slowing periodic structure. Major merits of the driver scheme in hand are the possibilities of providing the microwave phase and amplitude stability and the preliminary beam bunching at a rather low initial energy (∼ 1 MeV). The numerical simulation has shown that a steady state could be found when electron bunches accompanied by an amplified microwave are simultaneously accelerated in the external electric field. The total power, which is inserted into the beam by the accelerating field, transforms into the microwave power in the steady state. The first set of experiments was fulfilled with the buncher on the base of the JINR LIU-3000 linac (electron beam energy ∼ 600 keV, electron current ∼ 150 A). The considerable level of the amplified microwave power (∼ 5 MW) and high enough bunching parameter (∼ 0.4) were obtained. The electron beam bunching at the frequency of 36.4 GHz was registered by means of the Cherenkov radiation of the electron bunches that occurred at their passing through the special target. The beam keeps a high bunching level at the distance ∼ 10 cm from the TWT exit being accompanied by the amplified microwave
Analysis of Program Obfuscation Schemes with Variable Encoding Technique
Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi
Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.
Investigation of schemes for incorporating generator Q limits in the ...
Indian Academy of Sciences (India)
Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...
Somogyi, Gábor
2013-04-01
We finish the definition of a subtraction scheme for computing NNLO corrections to QCD jet cross sections. In particular, we perform the integration of the soft-type contributions to the doubly unresolved counterterms via the method of Mellin-Barnes representations. With these final ingredients in place, the definition of the scheme is complete and the computation of fully differential rates for electron-positron annihilation into two and three jets at NNLO accuracy becomes feasible.
Somogyi, Gabor
2013-01-01
We finish the definition of a subtraction scheme for computing NNLO corrections to QCD jet cross sections. In particular, we perform the integration of the soft-type contributions to the doubly unresolved counterterms via the method of Mellin-Barnes representations. With these final ingredients in place, the definition of the scheme is complete and the computation of fully differential rates for electron-positron annihilation into two and three jets at NNLO accuracy becomes feasible.
Merrill, Frank E.; Morris, Christopher
2005-05-17
A system capable of performing radiography using a beam of electrons. Diffuser means receive a beam of electrons and diffuse the electrons before they enter first matching quadrupoles where the diffused electrons are focused prior to the diffused electrons entering an object. First imaging quadrupoles receive the focused diffused electrons after the focused diffused electrons have been scattered by the object for focusing the scattered electrons. Collimator means receive the scattered electrons and remove scattered electrons that have scattered to large angles. Second imaging quadrupoles receive the collimated scattered electrons and refocus the collimated scattered electrons and map the focused collimated scattered electrons to transverse locations on an image plane representative of the electrons' positions in the object.
Coded-subcarrier-aided chromatic dispersion monitoring scheme for flexible optical OFDM networks.
Tse, Kam-Hon; Chan, Chun-Kit
2014-08-11
A simple coded-subcarrier aided scheme is proposed to perform chromatic dispersion monitoring in flexible optical OFDM networks. A pair of coded label subcarriers is added to both edges of the optical OFDM signal spectrum at the edge transmitter node. Upon reception at any intermediate or the receiver node, chromatic dispersion estimation is performed, via simple direct detection, followed by electronic correlation procedures with the designated code sequences. The feasibility and the performance of the proposed scheme have been experimentally characterized. It provides a cost-effective monitoring solution for the optical OFDM signals across intermediate nodes in flexible OFDM networks.
Sources of funding for community schemes
Energy Technology Data Exchange (ETDEWEB)
NONE
1999-11-01
There is an increasing level of interest amongst community groups in the UK to become involved in the development of renewable energy schemes. Often however these community groups have only limited funds of their own, so any additional funds that can be identified to help fund their renewable energy scheme can be very useful. There are a range of funding sources available that provide grants or loans for which community groups are eligible to apply. Few of these funding sources are targeted towards renewable energy specifically, nevertheless the funds may be applicable to renewable energy schemes under appropriate circumstances. To date, however, few of these funds have been accessed by community groups for renewable energy initiatives. One of the reasons for this low take-up of funds on offer could be that the funding sources may be difficult and time-consuming to identify, especially where the energy component of the fund is not readily apparent. This directory draws together details about many of the principal funding sources available in the UK that may consider providing funds to community groups wanting to develop a renewable energy scheme. (author)
The QKD network: model and routing scheme
Yang, Chao; Zhang, Hongqi; Su, Jinhai
2017-11-01
Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.
SYNTHESIS OF VISCOELASTIC MATERIAL MODELS (SCHEMES
Directory of Open Access Journals (Sweden)
V. Bogomolov
2014-10-01
Full Text Available The principles of structural viscoelastic schemes construction for materials with linear viscoelastic properties in accordance with the given experimental data on creep tests are analyzed. It is shown that there can be only four types of materials with linear visco-elastic properties.
BPHZL-subtraction scheme and axial gauges
Energy Technology Data Exchange (ETDEWEB)
Kreuzer, M.; Rebhan, A.; Schweda, M.; Piguet, O.
1986-03-27
The application of the BPHZL subtraction scheme to Yang-Mills theories in axial gauges is presented. In the auxillary mass formulation we show the validity of the convergence theorems for subtracted momentum space integrals, and we give the integral formulae necessary for one-loop calculations. (orig.).
The data cyclotron query processing scheme
R.A. Goncalves (Romulo); M.L. Kersten (Martin)
2010-01-01
htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot
THE DEVELOPMENT OF FREE PRIMARY EDUCATION SCHEME ...
African Journals Online (AJOL)
user
Education scheme in Western Region and marked a radical departure from the hitherto ... academic symposia, lectures, debates, reputable journals and standard .... Enrolment in Primary Schools in the Western Region by Sex, 1953 – 1960. Year Boys .... “Possibly no single decision of the decade prior to independence had.
High Order Semi-Lagrangian Advection Scheme
Malaga, Carlos; Mandujano, Francisco; Becerra, Julian
2014-11-01
In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).
An HFB scheme in natural orbitals
International Nuclear Information System (INIS)
Reinhard, P.G.; Rutz, K.; Maruhn, J.A.
1997-01-01
We present a formulation of the Hartree-Fock-Bogoliubov (HFB) equations which solves the problem directly in the basis of natural orbitals. This provides a very efficient scheme which is particularly suited for large scale calculations on coordinate-space grids. (orig.)
A classification scheme for LWR fuel assemblies
Energy Technology Data Exchange (ETDEWEB)
Moore, R.S.; Williamson, D.A.; Notz, K.J.
1988-11-01
With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.
The EU Greenhouse Gas Emissions Trading Scheme
Woerdman, Edwin; Woerdman, Edwin; Roggenkamp, Martha; Holwerda, Marijn
2015-01-01
This chapter explains how greenhouse gas emissions trading works, provides the essentials of the Directive on the European Union Emissions Trading Scheme (EU ETS) and summarizes the main implementation problems of the EU ETS. In addition, a law and economics approach is used to discuss the dilemmas
International Nuclear Information System (INIS)
Pinto, H.V.
1976-02-01
Calibration in energy and efficiency of the system used. Obtainement of singles gamma ray spectra of low and high energy. Reduction of the data obtained in the spectrometer by means of computer: localization and determination of the areas of the peaks, also the analysis of the shape of the peaks for identification of doublets. Checking of the decay scheme [pt
Parallel knock-out schemes in networks
Broersma, H.J.; Fomin, F.V.; Woeginger, G.J.
2004-01-01
We consider parallel knock-out schemes, a procedure on graphs introduced by Lampert and Slater in 1997 in which each vertex eliminates exactly one of its neighbors in each round. We are considering cases in which after a finite number of rounds, where the minimimum number is called the parallel
Nonclassical lightstates in optical communication schemes
International Nuclear Information System (INIS)
Mattle, K. U.
1997-11-01
The present thesis is a result in theoretical and experimental work on quant information and quant communication. The first part describes a new high intense source for polarization entangled photon pairs. The high quality of the source is clearly demonstrated by violating a Bell-inequality in less than 5 minutes with 100 standard deviations. This new source is a genius tool for new experiments in the field of fundamental physics as well as applied physics. The next chapter shows an experimental implementation of an optical dense quantum coding scheme. The combination of Bell-state generation and analysis of this entangled states leads to a new nonclassical communication scheme, where the channel capacity is enhanced. A single two state photon can be used for coding and decoding 1.58 bit instead of 1 bit for classical two state systems. The following chapter discusses two photon interference effects for two independent light sources. In an experiment two independent fluorescence pulses show this kind of interference effects. The fifth chapter describes 3-photon interference effects. This nonclassical interference effect is the elementary process for the quantum teleportation scheme. In this scheme an unknown particle state is transmitted from A to B without sending the particle itself. (author)
The complete flux scheme in cylindrical coordinates
Anthonissen, M.J.H.; Thije Boonkkamp, ten J.H.M.
2014-01-01
We consider the complete ¿ux (CF) scheme, a ¿nite volume method (FVM) presented in [1]. CF is based on an integral representation for the ¿uxes, found by solving a local boundary value problem that includes the source term. It performs well (second order accuracy) for both diffusion and advection
Traffic calming schemes : opportunities and implementation strategies.
Schagen, I.N.L.G. van (ed.)
2003-01-01
Commissioned by the Swedish National Road Authority, this report aims to provide a concise overview of knowledge of and experiences with traffic calming schemes in urban areas, both on a technical level and on a policy level. Traffic calming refers to a combination of network planning and
Zero leakage quantization scheme for biometric verification
Groot, de J.A.; Linnartz, J.P.M.G.
2011-01-01
Biometrics gain increasing interest as a solution for many security issues, but privacy risks exist in case we do not protect the stored templates well. This paper presents a new verification scheme, which protects the secrets of the enrolled users. We will show that zero leakage is achieved if
A classification scheme for LWR fuel assemblies
International Nuclear Information System (INIS)
Moore, R.S.; Williamson, D.A.; Notz, K.J.
1988-11-01
With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs
Asynchronous schemes for CFD at extreme scales
Konduri, Aditya; Donzis, Diego
2013-11-01
Recent advances in computing hardware and software have made simulations an indispensable research tool in understanding fluid flow phenomena in complex conditions at great detail. Due to the nonlinear nature of the governing NS equations, simulations of high Re turbulent flows are computationally very expensive and demand for extreme levels of parallelism. Current large simulations are being done on hundreds of thousands of processing elements (PEs). Benchmarks from these simulations show that communication between PEs take a substantial amount of time, overwhelming the compute time, resulting in substantial waste in compute cycles as PEs remain idle. We investigate a novel approach based on widely used finite-difference schemes in which computations are carried out asynchronously, i.e. synchronization of data among PEs is not enforced and computations proceed regardless of the status of messages. This drastically reduces PE idle time and results in much larger computation rates. We show that while these schemes remain stable, their accuracy is significantly affected. We present new schemes that maintain accuracy under asynchronous conditions and provide a viable path towards exascale computing. Performance of these schemes will be shown for simple models like Burgers' equation.
Generalization of binary tensor product schemes depends upon four parameters
International Nuclear Information System (INIS)
Bashir, R.; Bari, M.; Mustafa, G.
2018-01-01
This article deals with general formulae of parametric and non parametric bivariate subdivision scheme with four parameters. By assigning specific values to those parameters we get some special cases of existing tensor product schemes as well as a new proposed scheme. The behavior of schemes produced by the general formulae is interpolating, approximating and relaxed. Approximating bivariate subdivision schemes produce some other surfaces as compared to interpolating bivariate subdivision schemes. Polynomial reproduction and polynomial generation are desirable properties of subdivision schemes. Capability of polynomial reproduction and polynomial generation is strongly connected with smoothness, sum rules, convergence and approximation order. We also calculate the polynomial generation and polynomial reproduction of 9-point bivariate approximating subdivision scheme. Comparison of polynomial reproduction, polynomial generation and continuity of existing and proposed schemes has also been established. Some numerical examples are also presented to show the behavior of bivariate schemes. (author)
Schemes of radioactive decay, its interpretations in the scope of the radiological protection
International Nuclear Information System (INIS)
Mohamad, N.; Caro, R.A.; Bergoc, R.M.
1998-01-01
Full text: In our teaching experience we have verified that the interpretation of the symbols of radioactive decay schemes is one of the most difficult subject in the study of radioisotope methodologies for almost all professionals, and specially for those who have no solid background in mathematics or physics. The correct interpretation of decay schemes has fundamental importance for the proper election of measurement conditions and for performing the dosimetric and shielding calculations. Nuclides employed in Nuclear Medicine and Biomedicine are beta, gamma or beta/gamma emitters. Interpretation of decay schemes of beta emitters, by β + , β - or electronic capture are not difficult. In gamma emitting nuclides it is frequent that a particular level of energy is de-excited through more than one gamma transition of a given percentage and energy. On the other hand, it is also frequent that conversion electrons are emitted together with gamma photons, the proportion of which is usually given as the conversion factor, e/γ. The fraction of emitted photons is calculated as: 1 / [1+ (e/γ)], whereas the fraction of emitted conversion electrons is equal to: (e/γ) / [1+ (e/γ)]. Special attention should be given to the post-accommodation mechanism after disintegration in which orbital vacancies are produced: electron conversion or electron capture, in which the emission of X-rays and Auger electrons occur. All this information should be taken into account for the correct choice of measurement conditions, as well as internal and external dose calculations. In the present work we describe the analysis and interpretation of disintegration schemes in general and that of the most employed nuclides in Nuclear Medicine and Biomedicine. (author) [es
Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.
Directory of Open Access Journals (Sweden)
Jaewook Jung
Full Text Available Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.
Kang, Dongwoo; Lee, Donghoon; Won, Dongho
2017-01-01
Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075
LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica
Caprio, M. A.
2005-09-01
LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.
A novel secret image sharing scheme based on chaotic system
Li, Li; Abd El-Latif, Ahmed A.; Wang, Chuanjun; Li, Qiong; Niu, Xiamu
2012-04-01
In this paper, we propose a new secret image sharing scheme based on chaotic system and Shamir's method. The new scheme protects the shadow images with confidentiality and loss-tolerance simultaneously. In the new scheme, we generate the key sequence based on chaotic system and then encrypt the original image during the sharing phase. Experimental results and analysis of the proposed scheme demonstrate a better performance than other schemes and confirm a high probability to resist brute force attack.
Simple Numerical Schemes for the Korteweg-deVries Equation
International Nuclear Information System (INIS)
McKinstrie, C. J.; Kozlov, M.V.
2000-01-01
Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves
Simple Numerical Schemes for the Korteweg-deVries Equation
Energy Technology Data Exchange (ETDEWEB)
C. J. McKinstrie; M. V. Kozlov
2000-12-01
Two numerical schemes, which simulate the propagation of dispersive non-linear waves, are described. The first is a split-step Fourier scheme for the Korteweg-de Vries (KdV) equation. The second is a finite-difference scheme for the modified KdV equation. The stability and accuracy of both schemes are discussed. These simple schemes can be used to study a wide variety of physical processes that involve dispersive nonlinear waves.
Electricity storage using a thermal storage scheme
Energy Technology Data Exchange (ETDEWEB)
White, Alexander, E-mail: ajw36@cam.ac.uk [Hopkinson Laboratory, Cambridge University Engineering Department, Trumpington Street, Cambridge. CB2 1PZ (United Kingdom)
2015-01-22
The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on “sensible heat” storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.
Energy Technology Data Exchange (ETDEWEB)
Tsai, Yu-Sheng; Hong, Lin-Ann; Juang, Fuh-Shyang; Chen, Cheng-Yin
2014-09-15
In this research, complex emitting layers (EML) were fabricated using TCTA doping hole-transport material in the front half of a bipolar 26DCzPPy as well as PPT doping electron-transport material in the back half of 26DCzPPy. Blue dopant FIrpic was also mixed inside the complex emitting layer to produce a highly efficient blue phosphorescent organic light emitting diode (OLED). The hole and electron injection and carrier recombination rate were effectively increased. The fabricated complex emitting layers exhibited current efficiency of 42 cd/A and power efficiency of 30 lm/W when the luminance was 1000 cd/m{sup 2}, driving voltage was 4.4 V, and current density was 2.4 mA/cm{sup 2}. A white OLED component was then manufactured by doping red dopant [Os(bpftz){sub 2}(PPh{sub 2}Me){sub 2}] (Os) in proper locations. When the Os dopant was doped in between the complex emitting layers, excitons were effectively confined within, increasing the recombination rate and therefore reducing the color shift. The resulting Commission Internationale de L’Eclairage (CIE) coordinates shifted from 4 to 10 V is (Δx=−0.04, Δy=+0.01). The component had a current efficiency of 35.7 cd/A, a power efficiency of 24 lm/W, driving voltage of 4.6 V and a CIE{sub x,y} of (0.31,0.35) at a luminance of 1000 cd/m{sup 2}, with a maximum luminance of 15,600 cd/m{sup 2} at 10 V. Attaching an outcoupling enhancement film was applied to increase the luminance efficiency to 30 lm/W. - Highlights: • Used the complex double emitting layers. • Respectively doped hole and electron transport material in the bipolar host. • Electrons and holes are effectively confined within EMLs to produce excitons.
International Nuclear Information System (INIS)
Tsai, Yu-Sheng; Hong, Lin-Ann; Juang, Fuh-Shyang; Chen, Cheng-Yin
2014-01-01
In this research, complex emitting layers (EML) were fabricated using TCTA doping hole-transport material in the front half of a bipolar 26DCzPPy as well as PPT doping electron-transport material in the back half of 26DCzPPy. Blue dopant FIrpic was also mixed inside the complex emitting layer to produce a highly efficient blue phosphorescent organic light emitting diode (OLED). The hole and electron injection and carrier recombination rate were effectively increased. The fabricated complex emitting layers exhibited current efficiency of 42 cd/A and power efficiency of 30 lm/W when the luminance was 1000 cd/m 2 , driving voltage was 4.4 V, and current density was 2.4 mA/cm 2 . A white OLED component was then manufactured by doping red dopant [Os(bpftz) 2 (PPh 2 Me) 2 ] (Os) in proper locations. When the Os dopant was doped in between the complex emitting layers, excitons were effectively confined within, increasing the recombination rate and therefore reducing the color shift. The resulting Commission Internationale de L’Eclairage (CIE) coordinates shifted from 4 to 10 V is (Δx=−0.04, Δy=+0.01). The component had a current efficiency of 35.7 cd/A, a power efficiency of 24 lm/W, driving voltage of 4.6 V and a CIE x,y of (0.31,0.35) at a luminance of 1000 cd/m 2 , with a maximum luminance of 15,600 cd/m 2 at 10 V. Attaching an outcoupling enhancement film was applied to increase the luminance efficiency to 30 lm/W. - Highlights: • Used the complex double emitting layers. • Respectively doped hole and electron transport material in the bipolar host. • Electrons and holes are effectively confined within EMLs to produce excitons
Preliminary Study on Two Possible Bunch Compression Schemes at NLCTA
International Nuclear Information System (INIS)
Sun, Yipeng
2011-01-01
lasing coherently in an undulator, one needs a very bright beam in all three dimensions. In other words, one needs an electron beam with very short bunch length (high intensity), very small transverse emittance and very small energy spread. Most FELs currently being operated, commissioned, constructed or proposed are based on RF acceleration in a frequency range from L-band ( 1 GHz) to C-band ( 6 GHz). As RF frequency goes higher, wake fields effects tend to be much stronger and jitter tolerances are tighter. To demonstrate that X-band acceleration structures can be applied in constructing an FEL, one could perform bunch compression experiments at NLCTA as a first step, and investigate tolerances on timing jitter, misalignments etc.. Another important point is to evaluate the transverse emittance growth in this bunch compression process. In the following sections, two possible bunch compression schemes are proposed to be tested at NLCTA. Elegant (4) 3-D simulation is performed to evaluate these two schemes, with wake fields, space charge and coherent synchrotron radiation (CSR) effects included. One million macro particles are adopted in the numerical simulations. The simulation starts with an electron beam of 20 pC at a beam energy of 5 MeV. The initial RMS bunch length is taken as 0.5 ps at such a low bunch charge, and the RMS energy spread is 5 x 10 -3 . The normalized transverse emittance is 1 mm.mrad.
A classification scheme for risk assessment methods.
Energy Technology Data Exchange (ETDEWEB)
Stamp, Jason Edwin; Campbell, Philip LaRoche
2004-08-01
This report presents a classification scheme for risk assessment methods. This scheme, like all classification schemes, provides meaning by imposing a structure that identifies relationships. Our scheme is based on two orthogonal aspects--level of detail, and approach. The resulting structure is shown in Table 1 and is explained in the body of the report. Each cell in the Table represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. This report imposes structure on the set of risk assessment methods in order to reveal their relationships and thus optimize their usage.We present a two-dimensional structure in the form of a matrix, using three abstraction levels for the rows and three approaches for the columns. For each of the nine cells in the matrix we identify the method type by name and example. The matrix helps the user understand: (1) what to expect from a given method, (2) how it relates to other methods, and (3) how best to use it. Each cell in the matrix represent a different arrangement of strengths and weaknesses. Those arrangements shift gradually as one moves through the table, each cell optimal for a particular situation. The intention of this report is to enable informed use of the methods so that a method chosen is optimal for a situation given. The matrix, with type names in the cells, is introduced in Table 2 on page 13 below. Unless otherwise stated we use the word 'method' in this report to refer to a 'risk assessment method', though often times we use the full phrase. The use of the terms 'risk assessment' and 'risk management' are close enough that we do not attempt to distinguish them in this report. The remainder of this report is organized as follows. In
New advection schemes for free surface flows
International Nuclear Information System (INIS)
Pavan, Sara
2016-01-01
The purpose of this thesis is to build higher order and less diffusive schemes for pollutant transport in shallow water flows or 3D free surface flows. We want robust schemes which respect the main mathematical properties of the advection equation with relatively low numerical diffusion and apply them to environmental industrial applications. Two techniques are tested in this work: a classical finite volume method and a residual distribution technique combined with a finite element method. For both methods we propose a decoupled approach since it is the most advantageous in terms of accuracy and CPU time. Concerning the first technique, a vertex-centred finite volume method is used to solve the augmented shallow water system where the numerical flux is computed through an Harten-Lax-Van Leer-Contact Riemann solver. Starting from this solution, a decoupled approach is formulated and is preferred since it allows to compute with a larger time step the advection of a tracer. This idea was inspired by Audusse, E. and Bristeau, M.O. [13]. The Monotonic Upwind Scheme for Conservation Law, combined with the decoupled approach, is then used for the second order extension in space. The wetting and drying problem is also analysed and a possible solution is presented. In the second case, the shallow water system is entirely solved using the finite element technique and the residual distribution method is applied to the solution of the tracer equation, focusing on the case of time-dependent problems. However, for consistency reasons the resolution of the continuity equation must be considered in the numerical discretization of the tracer. In order to get second order schemes for unsteady cases a predictor-corrector scheme is used in this work. A first order but less diffusive version of the predictor-corrector scheme is also introduced. Moreover, we also present a new locally semi-implicit version of the residual distribution method which, in addition to good properties in
The Adoption and Diffusion of Electronic Wallets
Jean-Michel Sahut
2008-01-01
Despite the strong and consistent increase in the use of electronic payment methods worldwide, the diffusion of electronic wallets is still far from widespread. Analysis of the failure of electronic wallet uptake has either focused on technical issues or chosen to analyse a specific scheme. This article proposes a joint approach to analysing key factors affecting the adoption of e-wallets by using the 'Technology Acceptance Model" [1] which we have expanded to take into a...
Wavelet Based Protection Scheme for Multi Terminal Transmission System with PV and Wind Generation
Manju Sree, Y.; Goli, Ravi kumar; Ramaiah, V.
2017-08-01
A hybrid generation is a part of large power system in which number of sources usually attached to a power electronic converter and loads are clustered can operate independent of the main power system. The protection scheme is crucial against faults based on traditional over current protection since there are adequate problems due to fault currents in the mode of operation. This paper adopts a new approach for detection, discrimination of the faults for multi terminal transmission line protection in presence of hybrid generation. Transient current based protection scheme is developed with discrete wavelet transform. Fault indices of all phase currents at all terminals are obtained by analyzing the detail coefficients of current signals using bior 1.5 mother wavelet. This scheme is tested for different types of faults and is found effective for detection and discrimination of fault with various fault inception angle and fault impedance.
All-optical conversion scheme: Binary to quaternary and quaternary to binary number
Chattopadhyay, Tanay; Roy, Jitendra Nath
2009-04-01
To achieve the inherent parallelism in optics a suitable number system and efficient encoding/decoding scheme for handling the data are very much essential. Binary number is accepted as the best representing number system in almost all types of existing electronic computers. But, binary number (0 and 1) is insufficient in respect to the demand of the coming generation. Multi-valued logic (with radix >2) can be viewed as an alternative approach to solve many problems in transmission, storage and processing of large amount of information in digital signal processing. Here, in this paper all-optical scheme for the conversion of binary to quaternary number and vice versa have been proposed and described. Simulation has also been done. In this all-optical scheme the numbers are represented by different discrete polarized state of light.
An authentication scheme for secure access to healthcare services.
Khan, Muhammad Khurram; Kumari, Saru
2013-08-01
Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.
A hybrid Lagrangian Voronoi-SPH scheme
Fernandez-Gutierrez, D.; Souto-Iglesias, A.; Zohdi, T. I.
2017-11-01
A hybrid Lagrangian Voronoi-SPH scheme, with an explicit weakly compressible formulation for both the Voronoi and SPH sub-domains, has been developed. The SPH discretization is substituted by Voronoi elements close to solid boundaries, where SPH consistency and boundary conditions implementation become problematic. A buffer zone to couple the dynamics of both sub-domains is used. This zone is formed by a set of particles where fields are interpolated taking into account SPH particles and Voronoi elements. A particle may move in or out of the buffer zone depending on its proximity to a solid boundary. The accuracy of the coupled scheme is discussed by means of a set of well-known verification benchmarks.
Exclusion from the Health Insurance Scheme
2003-01-01
A CERN pensioner, member of the Organization's Health Insurance Scheme (CHIS), recently provided fake documents in support of claims for medical expenses, in order to receive unjustified reimbursement from the CHIS. The Administrator of the CHIS, UNIQA, suspected a case of fraud: Accordingly, an investigation and interview of the person concerned was carried out and brought the Organization to the conclusion that fraud had actually taken place. Consequently and in accordance with Article VIII 3.12 of the CHIS Rules, it was decided to exclude this member permanently from the CHIS. The Organization takes the opportunity to remind Scheme members that any fraud or attempt to fraud established within the framework of the CHIS exposes them to: - disciplinary action, according to the Staff Rules and Regulations, for CERN members of the personnel; - definitive exclusion from the CHIS for members affiliated on a voluntary basis. Human Resources Division Tel. 73635
A numerical relativity scheme for cosmological simulations
Daverio, David; Dirian, Yves; Mitsou, Ermis
2017-12-01
Cosmological simulations involving the fully covariant gravitational dynamics may prove relevant in understanding relativistic/non-linear features and, therefore, in taking better advantage of the upcoming large scale structure survey data. We propose a new 3 + 1 integration scheme for general relativity in the case where the matter sector contains a minimally-coupled perfect fluid field. The original feature is that we completely eliminate the fluid components through the constraint equations, thus remaining with a set of unconstrained evolution equations for the rest of the fields. This procedure does not constrain the lapse function and shift vector, so it holds in arbitrary gauge and also works for arbitrary equation of state. An important advantage of this scheme is that it allows one to define and pass an adaptation of the robustness test to the cosmological context, at least in the case of pressureless perfect fluid matter, which is the relevant one for late-time cosmology.
Electrons, Electronic Publishing, and Electronic Display.
Brownrigg, Edwin B.; Lynch, Clifford A.
1985-01-01
Provides a perspective on electronic publishing by distinguishing between "Newtonian" publishing and "quantum-mechanical" publishing. Highlights include media and publishing, works delivered through electronic media, electronic publishing and the printed word, management of intellectual property, and recent copyright-law issues…
International Nuclear Information System (INIS)
Wang, RuLin; Zheng, Xiao; Kwok, YanHo; Xie, Hang; Chen, GuanHua; Yam, ChiYung
2015-01-01
Understanding electronic dynamics on material surfaces is fundamentally important for applications including nanoelectronics, inhomogeneous catalysis, and photovoltaics. Practical approaches based on time-dependent density functional theory for open systems have been developed to characterize the dissipative dynamics of electrons in bulk materials. The accuracy and reliability of such approaches depend critically on how the electronic structure and memory effects of surrounding material environment are accounted for. In this work, we develop a novel squared-Lorentzian decomposition scheme, which preserves the positive semi-definiteness of the environment spectral matrix. The resulting electronic dynamics is guaranteed to be both accurate and convergent even in the long-time limit. The long-time stability of electronic dynamics simulation is thus greatly improved within the current decomposition scheme. The validity and usefulness of our new approach are exemplified via two prototypical model systems: quasi-one-dimensional atomic chains and two-dimensional bilayer graphene
Wang, RuLin; Zheng, Xiao; Kwok, YanHo; Xie, Hang; Chen, GuanHua; Yam, ChiYung
2015-04-14
Understanding electronic dynamics on material surfaces is fundamentally important for applications including nanoelectronics, inhomogeneous catalysis, and photovoltaics. Practical approaches based on time-dependent density functional theory for open systems have been developed to characterize the dissipative dynamics of electrons in bulk materials. The accuracy and reliability of such approaches depend critically on how the electronic structure and memory effects of surrounding material environment are accounted for. In this work, we develop a novel squared-Lorentzian decomposition scheme, which preserves the positive semi-definiteness of the environment spectral matrix. The resulting electronic dynamics is guaranteed to be both accurate and convergent even in the long-time limit. The long-time stability of electronic dynamics simulation is thus greatly improved within the current decomposition scheme. The validity and usefulness of our new approach are exemplified via two prototypical model systems: quasi-one-dimensional atomic chains and two-dimensional bilayer graphene.
A new chaotic secure communication scheme
International Nuclear Information System (INIS)
Hua Changchun; Yang Bo; Ouyang Gaoxiang; Guan Xinping
2005-01-01
A new chaotic secure communication scheme is constructed. Unified chaotic system is used to encrypt the emitted signal. Different from the existing chaotic secure communication methods, the useful information is embodied in the parameter of chaotic systems in this Letter. The receiver is designed which can succeed in recovering the former signal. Finally computer simulations are done to verify the proposed methods, and the results show that the obtained theoretic results are feasible and efficient
On Some Incompatible Properties of Voting Schemes
Chevallier-Mames , Benoît; Fouque , Pierre-Alain; Pointcheval , David; Stern , Julien; Traoré , Jacques
2010-01-01
In this paper, we study the problem of simultaneously achieving several security properties, for voting schemes, without non-standard assumptions. More specifically, we focus on the universal veriability of the computation of the tally, on the unconditional privacy/anonymity of the votes, and on the receipt-freeness properties, for the most classical election processes. Under usual assumptions and efficiency requirements, we show that a voting system that wants to publish the final list of th...
Conservative Semidiscrete Difference Schemes for Timoshenko Systems
Júnior, D. S. Almeida
2014-01-01
We present a parameterized family of finite-difference schemes to analyze the energy properties for linearly elastic constant-coefficient Timoshenko systems considering shear deformation and rotatory inertia. We derive numerical energies showing the positivity, and the energy conservation property and we show how to avoid a numerical anomaly known as locking phenomenon on shear force. Our method of proof relies on discrete multiplier techniques.
Droop Scheme With Consideration of Operating Costs
DEFF Research Database (Denmark)
Nutkani, I. U.; Loh, Poh Chiang; Blaabjerg, Frede
2014-01-01
considered even though they are different for different types of DGs. This letter thus proposes an alternative droop scheme, which can better distinguish the different operating characteristics and objectives of the DGs grouped together in a weighted droop expression. The power sharing arrived in the steady...... state will meet the intended objectives, as demonstrated in the experiment with a defined objective of minimizing the total microgrid operating cost....
A Scheme of Controlled Quantum State Swapping
International Nuclear Information System (INIS)
Zha Xinwei; Zou Zhichun; Qi Jianxia; Song Haiyang
2012-01-01
A scheme for controlled quantum state swapping is presented using maximally entangled five-qubit state, i.e., Alice wants to transmit an entangled state of particle a to Bob and at the same time Bob wants to transmit an entangled state of particle b to Alice via the control of the supervisor Charlie. The operations used in this swapping process including C-not operation and a series of single-qubit measurements performed by Alice, Bob, and Charlie.
Efficient Scheme for Chemical Flooding Simulation
Directory of Open Access Journals (Sweden)
Braconnier Benjamin
2014-07-01
Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].
The Emergent Universe scheme and tunneling
Energy Technology Data Exchange (ETDEWEB)
Labraña, Pedro [Departamento de Física, Universidad del Bío-Bío, Avenida Collao 1202, Casilla 5-C, Concepción, Chile and Departament d' Estructura i Constituents de la Matèria and Institut de Ciències del Cosmos, Universitat (Spain)
2014-07-23
We present an alternative scheme for an Emergent Universe scenario, developed previously in Phys. Rev. D 86, 083524 (2012), where the universe is initially in a static state supported by a scalar field located in a false vacuum. The universe begins to evolve when, by quantum tunneling, the scalar field decays into a state of true vacuum. The Emergent Universe models are interesting since they provide specific examples of non-singular inflationary universes.
Evolutionary Algorithm for Optimal Vaccination Scheme
International Nuclear Information System (INIS)
Parousis-Orthodoxou, K J; Vlachos, D S
2014-01-01
The following work uses the dynamic capabilities of an evolutionary algorithm in order to obtain an optimal immunization strategy in a user specified network. The produced algorithm uses a basic genetic algorithm with crossover and mutation techniques, in order to locate certain nodes in the inputted network. These nodes will be immunized in an SIR epidemic spreading process, and the performance of each immunization scheme, will be evaluated by the level of containment that provides for the spreading of the disease
INFORMATION FROM THE CERN HEALTH INSURANCE SCHEME
Tel : 7-3635
2002-01-01
Please note that, from 1 July 2002, the tariff agreement between CERN and the Hôpital de la Tour will no longer be in force. As a result the members of the CERN Health Insurance Scheme will no longer obtain a 5% discount for quick payment of bills. More information on the termination of the agreement and the implications for our Health Insurance Scheme will be provided in the next issue of the CHIS Bull', due for publication in the first half of July. It will be sent to your home address, so, if you have moved recently, please check that your divisional secretariat has your current address. Tel.: 73635 The Organization's Health Insurance Scheme (CHIS) has launched its own Web pages, located on the Website of the Social & Statutory Conditions Group of HR Division (HR-SOC). The address is short and easy-to-remember www.cern.ch/chis The pages currently available concentrate on providing basic information. Over the coming months it is planned to fill out the details and introduce new topics. Please give us ...
Doppler Shift Compensation Schemes in VANETs
Directory of Open Access Journals (Sweden)
F. Nyongesa
2015-01-01
Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.
Boudot's Range-Bounded Commitment Scheme Revisited
Cao, Zhengjun; Liu, Lihua
Checking whether a committed integer lies in a specific interval has many cryptographic applications. In Eurocrypt'98, Chan et al. proposed an instantiation (CFT Proof). Based on CFT, Boudot presented a popular range-bounded commitment scheme in Eurocrypt'2000. Both CFT Proof and Boudot Proof are based on the encryption E(x, r)=g^xh^r mod n, where n is an RSA modulus whose factorization is unknown by the prover. They did not use a single base as usual. Thus an increase in cost occurs. In this paper, we show that it suffices to adopt a single base. The cost of the modified Boudot Proof is about half of that of the original scheme. Moreover, the key restriction in the original scheme, i.e., both the discrete logarithm of g in base h and the discrete logarithm of h in base g are unknown by the prover, which is a potential menace to the Boudot Proof, is definitely removed.
An evaluation scheme for nanotechnology policies
International Nuclear Information System (INIS)
Soltani, Ali M.; Tabatabaeian, Seyed H.; Hanafizadeh, Payam; Bamdad Soofi, Jahanyar
2011-01-01
Dozens of countries are executing national nanotechnology plans. No rigorous evaluation scheme for these plans exists, although stakeholders—especially policy makers, top-level agencies and councils, as well as the society at large—are eager to learn the outcome of these policies. In this article, we recommend an evaluation scheme for national nanotechnology policies that would be used to review the whole or any component part of a national nanotechnology plan. In this scheme, a component at any level of aggregation is evaluated. The component may be part of the plan’s overarching policy goal, which for most countries is to create wealth and improve the quality of life of their nation with nanotechnology. Alternatively, the component may be a programme or an activity related to a programme. The evaluation could be executed at different times in the policy’s life cycle, i.e., before the policy is formulated, during its execution or after its completion. The three criteria for policy evaluation are appropriateness, efficiency and effectiveness. The evaluator should select the appropriate qualitative or quantitative methods to evaluate the various components of national nanotechnology plans.
Parallel S/sub n/ iteration schemes
International Nuclear Information System (INIS)
Wienke, B.R.; Hiromoto, R.E.
1986-01-01
The iterative, multigroup, discrete ordinates (S/sub n/) technique for solving the linear transport equation enjoys widespread usage and appeal. Serial iteration schemes and numerical algorithms developed over the years provide a timely framework for parallel extension. On the Denelcor HEP, the authors investigate three parallel iteration schemes for solving the one-dimensional S/sub n/ transport equation. The multigroup representation and serial iteration methods are also reviewed. This analysis represents a first attempt to extend serial S/sub n/ algorithms to parallel environments and provides good baseline estimates on ease of parallel implementation, relative algorithm efficiency, comparative speedup, and some future directions. The authors examine ordered and chaotic versions of these strategies, with and without concurrent rebalance and diffusion acceleration. Two strategies efficiently support high degrees of parallelization and appear to be robust parallel iteration techniques. The third strategy is a weaker parallel algorithm. Chaotic iteration, difficult to simulate on serial machines, holds promise and converges faster than ordered versions of the schemes. Actual parallel speedup and efficiency are high and payoff appears substantial
Optimization of a middle atmosphere diagnostic scheme
Akmaev, Rashid A.
1997-06-01
A new assimilative diagnostic scheme based on the use of a spectral model was recently tested on the CIRA-86 empirical model. It reproduced the observed climatology with an annual global rms temperature deviation of 3.2 K in the 15-110 km layer. The most important new component of the scheme is that the zonal forcing necessary to maintain the observed climatology is diagnosed from empirical data and subsequently substituted into the simulation model at the prognostic stage of the calculation in an annual cycle mode. The simulation results are then quantitatively compared with the empirical model, and the above mentioned rms temperature deviation provides an objective measure of the `distance' between the two climatologies. This quantitative criterion makes it possible to apply standard optimization procedures to the whole diagnostic scheme and/or the model itself. The estimates of the zonal drag have been improved in this study by introducing a nudging (Newtonian-cooling) term into the thermodynamic equation at the diagnostic stage. A proper optimal adjustment of the strength of this term makes it possible to further reduce the rms temperature deviation of simulations down to approximately 2.7 K. These results suggest that direct optimization can successfully be applied to atmospheric model parameter identification problems of moderate dimensionality.
Computing with high-resolution upwind schemes for hyperbolic equations
International Nuclear Information System (INIS)
Chakravarthy, S.R.; Osher, S.; California Univ., Los Angeles)
1985-01-01
Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and glitches, relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes. 21 references
Error forecasting schemes of error correction at receiver
International Nuclear Information System (INIS)
Bhunia, C.T.
2007-08-01
To combat error in computer communication networks, ARQ (Automatic Repeat Request) techniques are used. Recently Chakraborty has proposed a simple technique called the packet combining scheme in which error is corrected at the receiver from the erroneous copies. Packet Combining (PC) scheme fails: (i) when bit error locations in erroneous copies are the same and (ii) when multiple bit errors occur. Both these have been addressed recently by two schemes known as Packet Reversed Packet Combining (PRPC) Scheme, and Modified Packet Combining (MPC) Scheme respectively. In the letter, two error forecasting correction schemes are reported, which in combination with PRPC offer higher throughput. (author)
Cryptanalytic Performance Appraisal of Improved CCH2 Proxy Multisignature Scheme
Directory of Open Access Journals (Sweden)
Raman Kumar
2014-01-01
Full Text Available Many of the signature schemes are proposed in which the t out of n threshold schemes are deployed, but they still lack the property of security. In this paper, we have discussed implementation of improved CCH1 and improved CCH2 proxy multisignature scheme based on elliptic curve cryptosystem. We have represented time complexity, space complexity, and computational overhead of improved CCH1 and CCH2 proxy multisignature schemes. We have presented cryptanalysis of improved CCH2 proxy multisignature scheme and showed that improved CCH2 scheme suffered from various attacks, that is, forgery attack and framing attack.
A rational function based scheme for solving advection equation
International Nuclear Information System (INIS)
Xiao, Feng; Yabe, Takashi.
1995-07-01
A numerical scheme for solving advection equations is presented. The scheme is derived from a rational interpolation function. Some properties of the scheme with respect to convex-concave preserving and monotone preserving are discussed. We find that the scheme is attractive in surpressinging overshoots and undershoots even in the vicinities of discontinuity. The scheme can also be easily swicthed as the CIP (Cubic interpolated Pseudo-Particle) method to get a third-order accuracy in smooth region. Numbers of numerical tests are carried out to show the non-oscillatory and less diffusive nature of the scheme. (author)
Two-pulse laser control of nuclear and electronic motion
DEFF Research Database (Denmark)
Grønager, Michael; Henriksen, Niels Engholm
1997-01-01
We discuss an explicitly time-dependent two-pulse laser scheme for controlling where nuclei and electrons are going in unimolecular reactions. We focus on electronic motion and show, with HD+ as an example, that one can find non-stationary states where the electron (with some probability...
EIC Electron Beam Polarimetry Workshop Summary
International Nuclear Information System (INIS)
Lorenzon, W.
2008-01-01
A summary of the Precision Electron Beam Polarimetry Workshop for a future Electron Ion Collider (EIC) is presented. The workshop was hosted by the University of Michigan Physics Department in Ann Arbor on August 23-24, 2007 with the goal to explore and study the electron beam polarimetry issues associated with the EIC to achieve sub-1% precision in polarization determination. Ideas are being presented that were exchanged among experts in electron polarimetry and source and accelerator design to examine existing and novel electron beam polarization measurement schemes
Gaudreau, Louis; Bogan, Alex; Korkusinski, Marek; Studenikin, Sergei; Austing, D. Guy; Sachrajda, Andrew S.
2017-09-01
Long distance entanglement distribution is an important problem for quantum information technologies to solve. Current optical schemes are known to have fundamental limitations. A coherent photon-to-spin interface built with quantum dots (QDs) in a direct bandgap semiconductor can provide a solution for efficient entanglement distribution. QD circuits offer integrated spin processing for full Bell state measurement (BSM) analysis and spin quantum memory. Crucially the photo-generated spins can be heralded by non-destructive charge detection techniques. We review current schemes to transfer a polarization-encoded state or a time-bin-encoded state of a photon to the state of a spin in a QD. The spin may be that of an electron or that of a hole. We describe adaptations of the original schemes to employ heavy holes which have a number of attractive properties including a g-factor that is tunable to zero for QDs in an appropriately oriented external magnetic field. We also introduce simple throughput scaling models to demonstrate the potential performance advantage of full BSM capability in a QD scheme, even when the quantum memory is imperfect, over optical schemes relying on linear optical elements and ensemble quantum memories.
Reversibly Bistable Flexible Electronics
Alfaraj, Nasir
2015-05-01
Introducing the notion of transformational silicon electronics has paved the way for integrating various applications with silicon-based, modern, high-performance electronic circuits that are mechanically flexible and optically semitransparent. While maintaining large-scale production and prototyping rapidity, this flexible and translucent scheme demonstrates the potential to transform conventionally stiff electronic devices into thin and foldable ones without compromising long-term performance and reliability. In this work, we report on the fabrication and characterization of reversibly bistable flexible electronic switches that utilize flexible n-channel metal-oxide-semiconductor field-effect transistors. The transistors are fabricated initially on rigid (100) silicon substrates before they are peeled off. They can be used to control flexible batches of light-emitting diodes, demonstrating both the relative ease of scaling at minimum cost and maximum reliability and the feasibility of integration. The peeled-off silicon fabric is about 25 µm thick. The fabricated devices are transferred to a reversibly bistable flexible platform through which, for example, a flexible smartphone can be wrapped around a user’s wrist and can also be set back to its original mechanical position. Buckling and cyclic bending of such host platforms brings a completely new dimension to the development of flexible electronics, especially rollable displays.
International Nuclear Information System (INIS)
Hashimoto, H.; Mogami, A.
1975-01-01
A device for measuring electron densities at a given energy level in an electron beam or the like having strong background noise, for example, in the detection of Auger electric energy spectrums is described. An electron analyzer passes electrons at the given energy level and at the same time electrons of at least one adjacent energy level. Detecting means associated therewith produce signals indicative of the densities of the electrons at each energy level and combine these signals to produce a signal indicative of the density of the electrons of the given energy level absent background noise
Lasher, Mark E.; Henderson, Thomas B.; Drake, Barry L.; Bocker, Richard P.
1986-09-01
The modified signed-digit (MSD) number representation offers full parallel, carry-free addition. A MSD adder has been described by the authors. This paper describes how the adder can be used in a tree structure to implement an optical multiply algorithm. Three different optical schemes, involving position, polarization, and intensity encoding, are proposed for realizing the trinary logic system. When configured in the generic multiplier architecture, these schemes yield the combinatorial logic necessary to carry out the multiplication algorithm. The optical systems are essentially three dimensional arrangements composed of modular units. Of course, this modularity is important for design considerations, while the parallelism and noninterfering communication channels of optical systems are important from the standpoint of reduced complexity. The authors have also designed electronic hardware to demonstrate and model the combinatorial logic required to carry out the algorithm. The electronic and proposed optical systems will be compared in terms of complexity and speed.
A New Adaptive Hungarian Mating Scheme in Genetic Algorithms
Directory of Open Access Journals (Sweden)
Chanju Jung
2016-01-01
Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.
Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings
Directory of Open Access Journals (Sweden)
Caixue Zhou
2017-01-01
Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.
A Fuzzy Commitment Scheme with McEliece's Cipher
Directory of Open Access Journals (Sweden)
Deo Brat Ojha
2010-04-01
Full Text Available In this paper an attempt has been made to explain a fuzzy commitment scheme with McEliece scheme. The efficiency and security of this cryptosystem is comparatively better than any other cryptosystem. This scheme is one of the interesting candidates for post quantum cryptography. Hence our interest to deal with this system with fuzzy commitment scheme. The concept itself is illustrated with the help of a simple situation and the validation of mathematical experimental verification is provided.
Color encryption scheme based on adapted quantum logistic map
Zaghloul, Alaa; Zhang, Tiejun; Amin, Mohamed; Abd El-Latif, Ahmed A.
2014-04-01
This paper presents a new color image encryption scheme based on quantum chaotic system. In this scheme, a new encryption scheme is accomplished by generating an intermediate chaotic key stream with the help of quantum chaotic logistic map. Then, each pixel is encrypted by the cipher value of the previous pixel and the adapted quantum logistic map. The results show that the proposed scheme has adequate security for the confidentiality of color images.
Quantum Communication Scheme Using Non-symmetric Quantum Channel
International Nuclear Information System (INIS)
Cao Haijing; Chen Zhonghua; Song Heshan
2008-01-01
A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel
Somogyi, Gábor; Trócsányi, Zoltán
2008-08-01
In previous articles we outlined a subtraction scheme for regularizing doubly-real emission and real-virtual emission in next-to-next-to-leading order (NNLO) calculations of jet cross sections in electron-positron annihilation. In order to find the NNLO correction these subtraction terms have to be integrated over the factorized unresolved phase space and combined with the two-loop corrections. In this paper we perform the integration of all one-parton unresolved subtraction terms.
Collective accelerator for electron colliders
Energy Technology Data Exchange (ETDEWEB)
Briggs, R.J.
1985-05-13
A recent concept for collective acceleration and focusing of a high energy electron bunch is discussed, in the context of its possible applicability to large linear colliders in the TeV range. The scheme can be considered to be a member of the general class of two-beam accelerators, where a high current, low voltage beam produces the acceleration fields for a trailing high energy bunch.
Collective accelerator for electron colliders
International Nuclear Information System (INIS)
Briggs, R.J.
1985-01-01
A recent concept for collective acceleration and focusing of a high energy electron bunch is discussed, in the context of its possible applicability to large linear colliders in the TeV range. The scheme can be considered to be a member of the general class of two-beam accelerators, where a high current, low voltage beam produces the acceleration fields for a trailing high energy bunch
A practicable γ5-scheme in dimensional regularization
International Nuclear Information System (INIS)
Koerner, J.G.; Kreimer, D.; Schilcher, K.
1991-08-01
We present a new simple Υ 5 regularization scheme. We discuss its use in the standard radiative correction calculations including the anomaly contributions. The new scheme features an anticommuting Υ 5 which leads to great simplifications in practical calculations. We carefully discuss the underlying mathematics of our Υ 5 -scheme which is formulated in terms of simple projection operations. (orig.)
Digital Signature Schemes with Complementary Functionality and Applications
S. N. Kyazhin
2012-01-01
Digital signature schemes with additional functionality (an undeniable signature, a signature of the designated confirmee, a signature blind, a group signature, a signature of the additional protection) and examples of their application are considered. These schemes are more practical, effective and useful than schemes of ordinary digital signature.
A combined spectrum sensing and OFDM demodulation scheme
Heskamp, M.; Slump, Cornelis H.
2009-01-01
In this paper we propose a combined signaling and spectrum sensing scheme for cognitive radio that can detect in-band primary users while the networks own signal is active. The signaling scheme uses OFDM with phase shift keying modulated sub-carriers, and the detection scheme measures the deviation
Developing and Rewarding Excellent Teachers: The Scottish Chartered Teacher Scheme
Ingvarson, Lawrence
2009-01-01
The Scottish Chartered Teacher Scheme was designed to recognise and reward teachers who attained high standards of practice. The scheme emerged in 2001 as part of an agreement between government, local employing authorities and teacher organisations. Policies such as the chartered teacher scheme aim to benefit students in two main ways: by…
On doublet composite schemes of leptons and quarks
International Nuclear Information System (INIS)
Pirogov, Yu.F.
1981-01-01
All simplest doublet composite schemes are classified. Four different doublet schemes are shown to be available. A new scheme with charge doublet Q=(2/3, -1/3) rather advantageous as compared with the previous ones is being considered. Some difficulties in interpreting the colour as an effective symmetry are pointed out [ru
Finite Difference Schemes as Algebraic Correspondences between Layers
Malykh, Mikhail; Sevastianov, Leonid
2018-02-01
For some differential equations, especially for Riccati equation, new finite difference schemes are suggested. These schemes define protective correspondences between the layers. Calculation using these schemes can be extended to the area beyond movable singularities of exact solution without any error accumulation.
Lattice-Boltzmann scheme for natural convection in porous media
Sman, van der R.G.M.
1997-01-01
A lattice-Boltzmann scheme for natural convection in porous media is developed and applied to the heat transfer problem of a 1000 kg potato packaging. The scheme has features new to the field of LB schemes. It is mapped on a orthorhombic lattice instead of the traditional cubic lattice. Furthermore
Schemes for Greenberger-Horne-Zeilinger and cluster state preparation
International Nuclear Information System (INIS)
Song Jie; Xia Yan; Song Heshan
2008-01-01
Schemes to generate Greenberger-Horne-Zeilinger (GHZ) and cluster states of three atoms are proposed in a two-mode cavity. The advantages of the schemes are their robustness against decoherence due to spontaneous emission of the excited states and decay of the cavity modes. Moreover, the schemes can be generalized to generate N-atom entangled states
Cryptanalysis of Two Fault Countermeasure Schemes
DEFF Research Database (Denmark)
Banik, Subhadeep; Bogdanov, Andrey
2015-01-01
function with some additional randomness and computes the value of the function. The second called the unmasking function, is computed securely using a different register and undoes the effect of the masking with random bits. We will show that there exists a weakness in the way in which both these schemes...... is meant for the protection of block ciphers like AES. The second countermeasure was proposed in IEEE-HOST 2015 and protects the Grain-128 stream cipher. The design divides the output function used in Grain-128 into two components. The first called the masking function, masks the input bits to the output...
A general scheme for obtaining graviton spectrums
International Nuclear Information System (INIS)
GarcIa-Cuadrado, G
2006-01-01
The aim of this contribution is to present a general scheme for obtaining graviton spectra from modified gravity theories, based on a theory developed by Grishchuk in the mid 1970s. We try to be pedagogical, putting in order some basic ideas in a compact procedure and also giving a review of the current trends in this arena. With the aim to fill a gap for the interface between quantum field theorists and observational cosmologist in this matter, we highlight two interesting applications to cosmology: clues as to the nature of dark energy; and the possibility of reconstruction of the scalar potential in scalar-tensor gravity theories
Pay-what-you-want pricing schemes
DEFF Research Database (Denmark)
Kahsay, Goytom Abraha; Samahita, Margaret
2015-01-01
Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular. We develop a model incorporating self-image into the buyer’s utility function and introduce heterogeneity in consumption utility and image-sensitivity, generating different purchase decisions and optimal prices across...... individuals. When a good’s fixed price is lower than a threshold fair value, PWYW can lead to a lower utility. This may result in a lower purchase rate and higher average price, accounting for previously unexplained field experimental evidence. An increase in the threshold value decreases the buyer’s utility...... and may further lower the purchase rate, resulting in a further increase in purchase price....
Investigation of a monochromator scheme for SPEAR
International Nuclear Information System (INIS)
Wille, K.; Chao, A.W.
1984-08-01
The possibility of mono-chromatizing SPEAR for the purpose of increasing the hadronic event rate at the narrow resonances was investigated. By using two pairs of electostatic skew quads in monochromator scheme it is found that the event rate can be increased by a factor of 2 for the mini beta optics assuming the luminosity is kept unchanged. An attempt to increase this enhancement factor by major rearrangements of the ring magnets has encountered serious optical difficulties; although enhancement factor of 8 seems possible in principle, this alternative is not recommended
SCHEME ANALYSIS TREE DIMENSIONS AND TOLERANCES PROCESSING
Directory of Open Access Journals (Sweden)
Constanta RADULESCU
2011-07-01
Full Text Available This paper presents one of the steps that help us to determine the optimal tolerances depending on thetechnological capability of processing equipment. To determine the tolerances in this way is necessary to takethe study and to represent schematically the operations are used in technological process of making a piece.Also in this phase will make the tree diagram of the dimensions and machining tolerances, dimensions andtolerances shown that the design execution. Determination processes, and operations of the dimensions andtolerances tree scheme will make for a machined piece is both indoor and outdoor.
Small hydro schemes in Turtmanntal, Switzerland
International Nuclear Information System (INIS)
2008-01-01
This two-part report for the Swiss Federal Office of Energy (SFOE) presents several variants and two preliminary projects with respect to schemes for the use of hydropower in the Turtmanntal valley in the Swiss Alps. The various possible sites for the power stations both on the left and right-hand sides of the main valley are described. Technical details and prognoses for costs and energy production are discussed for all these variants. In the second part of the report, preliminary projects for hydropower installations on the Braendji and Piji streams are presented. Costs and economic viability are discussed and time-scales for the realisation are examined.
A Classification Scheme for Glaciological AVA Responses
Booth, A.; Emir, E.
2014-12-01
A classification scheme is proposed for amplitude vs. angle (AVA) responses as an aid to the interpretation of seismic reflectivity in glaciological research campaigns. AVA responses are a powerful tool in characterising the material properties of glacier ice and its substrate. However, before interpreting AVA data, careful true amplitude processing is required to constrain basal reflectivity and compensate amplitude decay mechanisms, including anelastic attenuation and spherical divergence. These fundamental processing steps can be difficult to design in cases of noisy data, e.g. where a target reflection is contaminated by surface wave energy (in the case of shallow glaciers) or by energy reflected from out of the survey plane. AVA methods have equally powerful usage in estimating the fluid fill of potential hydrocarbon reservoirs. However, such applications seldom use true amplitude data and instead consider qualitative AVA responses using a well-defined classification scheme. Such schemes are often defined in terms of the characteristics of best-fit responses to the observed reflectivity, e.g. the intercept (I) and gradient (G) of a linear approximation to the AVA data. The position of the response on a cross-plot of I and G then offers a diagnostic attribute for certain fluid types. We investigate the advantages in glaciology of emulating this practice, and develop a cross-plot based on the 3-term Shuey AVA approximation (using I, G, and a curvature term C). Model AVA curves define a clear lithification trend: AVA responses to stiff (lithified) substrates fall discretely into one quadrant of the cross-plot, with positive I and negative G, whereas those to fluid-rich substrates plot diagonally opposite (in the negative I and positive G quadrant). The remaining quadrants are unoccupied by plausible single-layer responses and may therefore be diagnostic of complex thin-layer reflectivity, and the magnitude and polarity of the C term serves as a further indicator
Simplified scheme or radioactive plume calculations
International Nuclear Information System (INIS)
Gibson, T.A.; Montan, D.N.
1976-01-01
A simplified mathematical scheme to estimate external whole-body γ radiation exposure rates from gaseous radioactive plumes was developed for the Rio Blanco Gas Field Nuclear Stimulation Experiment. The method enables one to calculate swiftly, in the field, downwind exposure rates knowing the meteorological conditions and γ radiation exposure rates measured by detectors positioned near the plume source. The method is straightforward and easy to use under field conditions without the help of mini-computers. It is applicable to a wide range of radioactive plume situations. It should be noted that the Rio Blanco experiment was detonated on May 17, 1973, and no seep or release of radioactive material occurred
Secure Biometric E-Voting Scheme
Ahmed, Taha Kh.; Aborizka, Mohamed
The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.
Addressing Longevity’ Heterogeneity in Pension Scheme Design
Ayuso, Mercedes; Bravo, Jorge Miguel; Holzmann, Robert
2017-01-01
Ayuso, M., Bravo, J. M., & Holzmann, R. (2017). Addressing Longevity’ Heterogeneity in Pension Scheme Design. Journal of Finance and Economics, 6(1), 1-21. DOI: 10.12735/jfe.v6n1p1 This paper demonstrates that the link between heterogeneity in longevity and lifetime income across countries is mostly high and often increasing; that it translates into an implicit tax/subsidy, with rates reaching 20 percent and higher in some countries; that such rates risk perverting redistributive objective...
New Financing Schemes of Public Infrastructure
Directory of Open Access Journals (Sweden)
Ignacio de la Riva
2017-01-01
Full Text Available Public works procurements and concessions are traditional legal techniques used to shape the financing of public infrastructure. Fiscal constraints faced by public administrations at the end of the 20th century, and the subsequent increase of private participation in the provision of public goods and services, encouraged the development of new legal schemes allowing a higher degree of private investment in public infrastructure; such as Public Private Partnerships, project finance, securitizations, the shadow toll, turn-key agreements, public leasing and public trusts.
Universal programmable quantum circuit schemes to emulate an operator
Energy Technology Data Exchange (ETDEWEB)
Daskin, Anmer; Grama, Ananth; Kollias, Giorgos [Department of Computer Science, Purdue University, West Lafayette, Indiana 47907 (United States); Kais, Sabre [Department of Chemistry, Department of Physics and Birck Nanotechnology Center, Purdue University, West Lafayette, Indiana 47907 (United States); Qatar Environment and Energy Research Institute, Doha (Qatar)
2012-12-21
Unlike fixed designs, programmable circuit designs support an infinite number of operators. The functionality of a programmable circuit can be altered by simply changing the angle values of the rotation gates in the circuit. Here, we present a new quantum circuit design technique resulting in two general programmable circuit schemes. The circuit schemes can be used to simulate any given operator by setting the angle values in the circuit. This provides a fixed circuit design whose angles are determined from the elements of the given matrix-which can be non-unitary-in an efficient way. We also give both the classical and quantum complexity analysis for these circuits and show that the circuits require a few classical computations. For the electronic structure simulation on a quantum computer, one has to perform the following steps: prepare the initial wave function of the system; present the evolution operator U=e{sup -iHt} for a given atomic and molecular Hamiltonian H in terms of quantum gates array and apply the phase estimation algorithm to find the energy eigenvalues. Thus, in the circuit model of quantum computing for quantum chemistry, a crucial step is presenting the evolution operator for the atomic and molecular Hamiltonians in terms of quantum gate arrays. Since the presented circuit designs are independent from the matrix decomposition techniques and the global optimization processes used to find quantum circuits for a given operator, high accuracy simulations can be done for the unitary propagators of molecular Hamiltonians on quantum computers. As an example, we show how to build the circuit design for the hydrogen molecule.
Universal programmable quantum circuit schemes to emulate an operator
International Nuclear Information System (INIS)
Daskin, Anmer; Grama, Ananth; Kollias, Giorgos; Kais, Sabre
2012-01-01
Unlike fixed designs, programmable circuit designs support an infinite number of operators. The functionality of a programmable circuit can be altered by simply changing the angle values of the rotation gates in the circuit. Here, we present a new quantum circuit design technique resulting in two general programmable circuit schemes. The circuit schemes can be used to simulate any given operator by setting the angle values in the circuit. This provides a fixed circuit design whose angles are determined from the elements of the given matrix–which can be non-unitary–in an efficient way. We also give both the classical and quantum complexity analysis for these circuits and show that the circuits require a few classical computations. For the electronic structure simulation on a quantum computer, one has to perform the following steps: prepare the initial wave function of the system; present the evolution operator U=e −iHt for a given atomic and molecular Hamiltonian H in terms of quantum gates array and apply the phase estimation algorithm to find the energy eigenvalues. Thus, in the circuit model of quantum computing for quantum chemistry, a crucial step is presenting the evolution operator for the atomic and molecular Hamiltonians in terms of quantum gate arrays. Since the presented circuit designs are independent from the matrix decomposition techniques and the global optimization processes used to find quantum circuits for a given operator, high accuracy simulations can be done for the unitary propagators of molecular Hamiltonians on quantum computers. As an example, we show how to build the circuit design for the hydrogen molecule.
Electron/electron acoustic instability
International Nuclear Information System (INIS)
Gary, S.P.
1987-01-01
The electron acoustic wave becomes a normal mode of an unmagnetized collisionless plasma in the presence of two electron components with similar densities, but strongly disparate temperatures. The characteristic frequency of this mode is the plasma frequency of the cooler electron component. If these two electron components have a relative drift speed several times the thermal speed of the cooler component, the electron/electron acoustic instability may arise. This paper describes the parametric dependences of the threshold drift speed and maximum growth rate of this instability, and compares these with the same properties of the electron/ion acoustic instability. Under the condition of zero current, the electron/ion acoustic instability typically has the lower threshold drift speed, so that observation of the electron/electron acoustic instability is a strong indication of the presence of an electrical current in the plasma
EDITORIAL: Synaptic electronics Synaptic electronics
Demming, Anna; Gimzewski, James K.; Vuillaume, Dominique
2013-09-01
neuromorphic circuit composed of a nanoscale 1-kbit resistive random-access memory (RRAM) cross-point array of synapses and complementary metal-oxide-semiconductor (CMOS) neuron circuits [13]; a WO3-x-based nanoionics device from Masakazu Aono's group with a wide scale of reprogrammable memorization functions [14]; a new spike-timing dependent plasticity scheme based on a MOS transistor as a selector and a RRAM as a variable resistance device [15]; a new hybrid memristor-CMOS neuromorphic circuit [16]; and a photo-assisted atomic switch [17]. Synaptic electronics evidently has many emerging facets, and Duygu Kuzum, Shimeng Yu, and H-S Philip Wong in the US provide a review of the field, including the materials, devices and applications [18]. In embracing the expertise acquired over thousands of years of evolution, biomimetics and bio-inspired design is a common, smart approach to technological innovation. Yet in successfully mimicking the physiological mechanisms of the human mind synaptic electronics research has a potential impact that is arguably unprecedented. That the quirks and eccentricities recently unearthed in the behaviour of nanomaterials should lend themselves so accommodatingly to emulating synaptic functions promises some very exciting developments in the field, as the articles in this special issue emphasize. References [1] von Neumann J (ed) 2012 The Computer and the Brain 3rd edn (Yale: Yale University Press) [2] Strukov D B, Snider G S, Stewart D R and Williams R S 2008 The missing memristor found Nature 453 80-3 [3] Chua L O 1971 Memristor—the missing circuit element IEEE Trans. Circuit Theory 18 507-19 [4] Chua L O 2013 Memristor, Hodgkin-Huxley, and Edge of Chaos Nanotechnology 24 383001 [5] Pickett M D and Williams R S 2013 Phase transitions enable computational universality in neuristor-based cellular automata Nanotechnology 24 384002 [6] Cruz-Albrecht J M, Derosier T and Srinivasa N 2013 Scalable neural chip with synaptic electronics using CMOS
Fullerene Derived Molecular Electronic Devices
Menon, Madhu; Srivastava, Deepak; Saini, Subbash
1998-01-01
The carbon Nanotube junctions have recently emerged as excellent candidates for use as the building blocks in the formation of nanoscale electronic devices. While the simple joint of two dissimilar tubes can be generated by the introduction of a pair of heptagon-pentagon defects in an otherwise perfect hexagonal grapheme sheet, more complex joints require other mechanisms. In this work we explore structural and electronic properties of complex 3-point junctions of carbon nanotubes using a generalized tight-binding molecular-dynamics scheme.
Password Authentication Based on Fractal Coding Scheme
Directory of Open Access Journals (Sweden)
Nadia M. G. Al-Saidi
2012-01-01
Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.
Finite-difference schemes for anisotropic diffusion
Energy Technology Data Exchange (ETDEWEB)
Es, Bram van, E-mail: es@cwi.nl [Centrum Wiskunde and Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, Association EURATOM-FOM (Netherlands)
2014-09-01
In fusion plasmas diffusion tensors are extremely anisotropic due to the high temperature and large magnetic field strength. This causes diffusion, heat conduction, and viscous momentum loss, to effectively be aligned with the magnetic field lines. This alignment leads to different values for the respective diffusive coefficients in the magnetic field direction and in the perpendicular direction, to the extent that heat diffusion coefficients can be up to 10{sup 12} times larger in the parallel direction than in the perpendicular direction. This anisotropy puts stringent requirements on the numerical methods used to approximate the MHD-equations since any misalignment of the grid may cause the perpendicular diffusion to be polluted by the numerical error in approximating the parallel diffusion. Currently the common approach is to apply magnetic field-aligned coordinates, an approach that automatically takes care of the directionality of the diffusive coefficients. This approach runs into problems at x-points and at points where there is magnetic re-connection, since this causes local non-alignment. It is therefore useful to consider numerical schemes that are tolerant to the misalignment of the grid with the magnetic field lines, both to improve existing methods and to help open the possibility of applying regular non-aligned grids. To investigate this, in this paper several discretization schemes are developed and applied to the anisotropic heat diffusion equation on a non-aligned grid.
Privacy protection schemes for fingerprint recognition systems
Marasco, Emanuela; Cukic, Bojan
2015-05-01
The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.
Lightweight SIP/SDP compression scheme (LSSCS)
Wu, Jian J.; Demetrescu, Cristian
2001-10-01
In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.
Special Semaphore Scheme for UHF Spacecraft Communications
Butman, Stanley; Satorius, Edgar; Ilott, Peter
2006-01-01
A semaphore scheme has been devised to satisfy a requirement to enable ultrahigh- frequency (UHF) radio communication between a spacecraft descending from orbit to a landing on Mars and a spacecraft, in orbit about Mars, that relays communications between Earth and the lander spacecraft. There are also two subsidiary requirements: (1) to use UHF transceivers, built and qualified for operation aboard the spacecraft that operate with residual-carrier binary phase-shift-keying (BPSK) modulation at a selectable data rate of 8, 32, 128, or 256 kb/s; and (2) to enable low-rate signaling even when received signals become so weak as to prevent communication at the minimum BPSK rate of 8 kHz. The scheme involves exploitation of Manchester encoding, which is used in conjunction with residual-carrier modulation to aid the carrier-tracking loop. By choosing various sequences of 1s, 0s, or 1s alternating with 0s to be fed to the residual-carrier modulator, one would cause the modulator to generate sidebands at a fundamental frequency of 4 or 8 kHz and harmonics thereof. These sidebands would constitute the desired semaphores. In reception, the semaphores would be detected by a software demodulator.
A subgrid parameterization scheme for precipitation
Directory of Open Access Journals (Sweden)
S. Turner
2012-04-01
Full Text Available With increasing computing power, the horizontal resolution of numerical weather prediction (NWP models is improving and today reaches 1 to 5 km. Nevertheless, clouds and precipitation formation are still subgrid scale processes for most cloud types, such as cumulus and stratocumulus. Subgrid scale parameterizations for water vapor condensation have been in use for many years and are based on a prescribed probability density function (PDF of relative humidity spatial variability within the model grid box, thus providing a diagnosis of the cloud fraction. A similar scheme is developed and tested here. It is based on a prescribed PDF of cloud water variability and a threshold value of liquid water content for droplet collection to derive a rain fraction within the model grid. Precipitation of rainwater raises additional concerns relative to the overlap of cloud and rain fractions, however. The scheme is developed following an analysis of data collected during field campaigns in stratocumulus (DYCOMS-II and fair weather cumulus (RICO and tested in a 1-D framework against large eddy simulations of these observed cases. The new parameterization is then implemented in a 3-D NWP model with a horizontal resolution of 2.5 km to simulate real cases of precipitating cloud systems over France.
Extended lattice Boltzmann scheme for droplet combustion.
Ashna, Mostafa; Rahimian, Mohammad Hassan; Fakhari, Abbas
2017-05-01
The available lattice Boltzmann (LB) models for combustion or phase change are focused on either single-phase flow combustion or two-phase flow with evaporation assuming a constant density for both liquid and gas phases. To pave the way towards simulation of spray combustion, we propose a two-phase LB method for modeling combustion of liquid fuel droplets. We develop an LB scheme to model phase change and combustion by taking into account the density variation in the gas phase and accounting for the chemical reaction based on the Cahn-Hilliard free-energy approach. Evaporation of liquid fuel is modeled by adding a source term, which is due to the divergence of the velocity field being nontrivial, in the continuity equation. The low-Mach-number approximation in the governing Navier-Stokes and energy equations is used to incorporate source terms due to heat release from chemical reactions, density variation, and nonluminous radiative heat loss. Additionally, the conservation equation for chemical species is formulated by including a source term due to chemical reaction. To validate the model, we consider the combustion of n-heptane and n-butanol droplets in stagnant air using overall single-step reactions. The diameter history and flame standoff ratio obtained from the proposed LB method are found to be in good agreement with available numerical and experimental data. The present LB scheme is believed to be a promising approach for modeling spray combustion.
Single particle level scheme for alpha decay
International Nuclear Information System (INIS)
Mirea, M.
1998-01-01
The fine structure phenomenon in alpha decay was evidenced by Rosenblum. In this process the kinetic energy of the emitted particle has several determined values related to the structure of the parent and the daughter nucleus. The probability to find the daughter in a low lying state was considered strongly dependent on the spectroscopic factor defined as the square of overlap between the wave function of the parent in the ground state and the wave functions of the specific excited states of the daughter. This treatment provides a qualitative agreement with the experimental results if the variations of the penetrability between different excited states are neglected. Based on single particle structure during fission, a new formalism explained quantitatively the fine structure of the cluster decay. It was suggested that this formalism can be applied also to alpha decay. For this purpose, the first step is to construct the level scheme of this type of decay. Such a scheme, obtained with the super-asymmetric two-center potential, is plotted for the alpha decay of 223 Ra. It is interesting to note that, diabatically, the level with spin 3/2 emerging from 1i 11/2 (ground state of the parent) reaches an excited state of the daughter in agreement with the experiment. (author)
Present and future nuclear power financing schemes
International Nuclear Information System (INIS)
Diel, R.
1977-01-01
The financial requirement for nuclear power plants in the Federal Republic of Germany for the period up until 1985 was estimated to run up to some DM 100 billion already in the Nuclear Energy Study published by the Dresdner Bank in 1974. This figure is not changed in any way by the reduction the nuclear power program has suffered in the meantime, because the lower requirement for investment capital is more than offset by the price increases that have occurred meanwhile. A capital requirement in the order of DM 100 billion raises major problems for the power producing industry and the banks which, however, are not going to hamper the further expansion of nuclear power, because new financing schemes have been specially developed for the nuclear field. They include financing by leasing, the use of funds from real estate credit institutions for long term financing, borrowing of long term funds in the Euro market, and financing through subsidiaries of the utilities. The new financing schemes also apply to the large financial requirement associated with the nuclear fuel cycle, waste management in particular. In this sector the utilities agree to bear the economic risk of the companies implementing the respective projects. Accordingly, financing will not entail any major difficulties. Another area of great importance is export financing. The German-Brazilian nuclear agreement is a model of this instrument. (orig.) [de
International Nuclear Information System (INIS)
Beloshitsky, P.
1992-06-01
A versatile magnet lattice for a tau-charm factory is considered in this report. The main feature of this lattice is the possibility to use it for both standard flat beam scheme and beam monochromatization scheme. The detailed description of the lattice is given. The restrictions following the compatibility of both schemes are discussed
Enhanced arbitrated quantum signature scheme using Bell states
International Nuclear Information System (INIS)
Wang Chao; Liu Jian-Wei; Shang Tao
2014-01-01
We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme
Improvement of a Quantum Proxy Blind Signature Scheme
Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui
2018-06-01
Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.
A group signature scheme based on quantum teleportation
International Nuclear Information System (INIS)
Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu
2010-01-01
In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.
Quantum election scheme based on anonymous quantum key distribution
International Nuclear Information System (INIS)
Zhou Rui-Rui; Yang Li
2012-01-01
An unconditionally secure authority-certified anonymous quantum key distribution scheme using conjugate coding is presented, based on which we construct a quantum election scheme without the help of an entanglement state. We show that this election scheme ensures the completeness, soundness, privacy, eligibility, unreusability, fairness, and verifiability of a large-scale election in which the administrator and counter are semi-honest. This election scheme can work even if there exist loss and errors in quantum channels. In addition, any irregularity in this scheme is sensible. (general)
A group signature scheme based on quantum teleportation
Energy Technology Data Exchange (ETDEWEB)
Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)
2010-05-01
In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.
Indian Academy of Sciences (India)
Such real time models are extremely important, as they can be included in real time simulation of sys- tems to evolve control schemes for the converters as well as to study the effect on the power system. In view of the control possibilities offered by the use of power converters and the newly emerging applications, there has ...
An alternative longitudinal polarization scheme for tristan
International Nuclear Information System (INIS)
Chao, A.W.; Yokoya, Kaoru.
1981-07-01
For electron storage rings general conditions are derived to get a high level longitudinal polarization and a possible design of the experimental insertion for TRISTAN e-p collider is presented. (author)
Electronic emission and electron guns
International Nuclear Information System (INIS)
Roy, Amitava
2010-01-01
This paper reviews the process of electron emission from metal surface. Although electrons move freely in conductors like metals, they normally do not leave the metal without some manipulation. In fact, heating and bombardment are the two primary ways in which electrons are emitted through the use of a heating element behind the cathode (termed thermionic emission) or as a result of bombardment with a beam of electrons, ions, or metastable atoms (termed secondary emission). Another important emission mechanism called Explosive Electron Emission (EEE) is also often used in various High Voltage Pulse Power Systems to generate very high current (few hundreds of kA) pulsed electron beams. The electron gun is the device in that it shoots off a continuous (or pulsed) stream of electrons. A brief idea about the evolution of the electron gun components and their basis of functioning are also discussed. (author)
Hussain, Muhammad Mustafa; Torres Sevilla, Galo Andres; Diaz Cordero, Marlon Steven
2017-01-01
Electronic stickers may be manufactured on flexible substrates (110, 120, 130) as layers and packaged together. The package may then have an adhesive applied to one side to provide capability for sticking the electronic devices to surfaces
African Journals Online (AJOL)
10332324
"[to] promote the understanding and, acceptance of and growth in the number of electronic transactions .... Chapter III of the ECT Act is based on the UNCITRAL Model Law on Electronic. Commerce ... Communications Technology Law 146. 22.
Estimating plume dispersion: a comparison of several sigma schemes
International Nuclear Information System (INIS)
Irwin, J.S.
1983-01-01
The lateral and vertical Gaussian plume dispersion parameters are estimated and compared with field tracer data collected at 11 sites. The dispersion parameter schemes used in this analysis include Cramer's scheme, suggested for tall stack dispersion estimates, Draxler's scheme, suggested for elevated and surface releases, Pasquill's scheme, suggested for interim use in dispersion estimates, and the Pasquill--Gifford scheme using Turner's technique for assigning stability categories. The schemes suggested by Cramer, Draxler and Pasquill estimate the dispersion parameters using onsite measurements of the vertical and lateral wind-velocity variances at the effective release height. The performances of these schemes in estimating the dispersion parameters are compared with that of the Pasquill--Gifford scheme, using the Prairie Grass and Karlsruhe data. For these two experiments, the estimates of the dispersion parameters using Draxler's scheme correlate better with the measurements than did estimates using the Pasquill--Gifford scheme. Comparison of the dispersion parameter estimates with the measurement suggests that Draxler's scheme for characterizing the dispersion results in the smallest mean fractional error in the estimated dispersion parameters and the smallest variance of the fractional errors
A numerical scheme for the generalized Burgers–Huxley equation
Directory of Open Access Journals (Sweden)
Brajesh K. Singh
2016-10-01
Full Text Available In this article, a numerical solution of generalized Burgers–Huxley (gBH equation is approximated by using a new scheme: modified cubic B-spline differential quadrature method (MCB-DQM. The scheme is based on differential quadrature method in which the weighting coefficients are obtained by using modified cubic B-splines as a set of basis functions. This scheme reduces the equation into a system of first-order ordinary differential equation (ODE which is solved by adopting SSP-RK43 scheme. Further, it is shown that the proposed scheme is stable. The efficiency of the proposed method is illustrated by four numerical experiments, which confirm that obtained results are in good agreement with earlier studies. This scheme is an easy, economical and efficient technique for finding numerical solutions for various kinds of (nonlinear physical models as compared to the earlier schemes.
Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks
Directory of Open Access Journals (Sweden)
Jun-Sub Kim
2013-01-01
Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.
Hilbert schemes of points and infinite dimensional Lie algebras
Qin, Zhenbo
2018-01-01
Hilbert schemes, which parametrize subschemes in algebraic varieties, have been extensively studied in algebraic geometry for the last 50 years. The most interesting class of Hilbert schemes are schemes X^{[n]} of collections of n points (zero-dimensional subschemes) in a smooth algebraic surface X. Schemes X^{[n]} turn out to be closely related to many areas of mathematics, such as algebraic combinatorics, integrable systems, representation theory, and mathematical physics, among others. This book surveys recent developments of the theory of Hilbert schemes of points on complex surfaces and its interplay with infinite dimensional Lie algebras. It starts with the basics of Hilbert schemes of points and presents in detail an example of Hilbert schemes of points on the projective plane. Then the author turns to the study of cohomology of X^{[n]}, including the construction of the action of infinite dimensional Lie algebras on this cohomology, the ring structure of cohomology, equivariant cohomology of X^{[n]} a...
Colwell, Morris A
1976-01-01
Electronic Components provides a basic grounding in the practical aspects of using and selecting electronics components. The book describes the basic requirements needed to start practical work on electronic equipment, resistors and potentiometers, capacitance, and inductors and transformers. The text discusses semiconductor devices such as diodes, thyristors and triacs, transistors and heat sinks, logic and linear integrated circuits (I.C.s) and electromechanical devices. Common abbreviations applied to components are provided. Constructors and electronics engineers will find the book useful
Bishop, Owen
2013-01-01
Understand Electronics provides a readable introduction to the exciting world of electronics for the student or enthusiast with little previous knowledge. The subject is treated with the minimum of mathematics and the book is extensively illustrated.This is an essential guide for the newcomer to electronics, and replaces the author's best-selling Beginner's Guide to Electronics.The step-by-step approach makes this book ideal for introductory courses such as the Intermediate GNVQ.
Slavko Đerić
2016-01-01
Electronic commerce can be defined in different ways. Any definition helps to understand and explain that concept as better as possible.. Electronic commerce is a set of procedures and technologies that automate the tasks of financial transactions using electronic means. Also, according to some authors, electronic commerce is defined as a new concept, which is being developed and which includes process of buying and selling or exchanging products, services or information via computer networks...
High Energy Density Physics and Exotic Acceleration Schemes
International Nuclear Information System (INIS)
Cowan, T.; Colby, E.
2005-01-01
The High Energy Density and Exotic Acceleration working group took as our goal to reach beyond the community of plasma accelerator research with its applications to high energy physics, to promote exchange with other disciplines which are challenged by related and demanding beam physics issues. The scope of the group was to cover particle acceleration and beam transport that, unlike other groups at AAC, are not mediated by plasmas or by electromagnetic structures. At this Workshop, we saw an impressive advancement from years past in the area of Vacuum Acceleration, for example with the LEAP experiment at Stanford. And we saw an influx of exciting new beam physics topics involving particle propagation inside of solid-density plasmas or at extremely high charge density, particularly in the areas of laser acceleration of ions, and extreme beams for fusion energy research, including Heavy-ion Inertial Fusion beam physics. One example of the importance and extreme nature of beam physics in HED research is the requirement in the Fast Ignitor scheme of inertial fusion to heat a compressed DT fusion pellet to keV temperatures by injection of laser-driven electron or ion beams of giga-Amp current. Even in modest experiments presently being performed on the laser-acceleration of ions from solids, mega-amp currents of MeV electrons must be transported through solid foils, requiring almost complete return current neutralization, and giving rise to a wide variety of beam-plasma instabilities. As keynote talks our group promoted Ion Acceleration (plenary talk by A. MacKinnon), which historically has grown out of inertial fusion research, and HIF Accelerator Research (invited talk by A. Friedman), which will require impressive advancements in space-charge-limited ion beam physics and in understanding the generation and transport of neutralized ion beams. A unifying aspect of High Energy Density applications was the physics of particle beams inside of solids, which is proving to
International Nuclear Information System (INIS)
Somogyi, Gabor; Trocsanyi, Zoltan; Del Duca, Vittorio
2007-01-01
We present a generalization of the dipole subtraction scheme for computing jet cross sections in electron-positron annihilation at next-to-next-to-leading order accuracy in perturbative QCD. In this first part we deal with the regularization of the doubly-real contribution to the NNLO correction
Energy Technology Data Exchange (ETDEWEB)
Somogyi, Gabor [University of Debrecen and Institute of Nuclear Research of the Hungarian Academy of Sciences, H-4001 Debrecen, PO Box 51 (Hungary); Trocsanyi, Zoltan [University of Debrecen and Institute of Nuclear Research of the Hungarian Academy of Sciences, H-4001 Debrecen, PO Box 51 (Hungary); Del Duca, Vittorio [Istituto Nazionale di Fisica Nucleare, Sez. di Torino, via P. Giuria, 1 - 10125 Turin (Italy)
2007-01-15
We present a generalization of the dipole subtraction scheme for computing jet cross sections in electron-positron annihilation at next-to-next-to-leading order accuracy in perturbative QCD. In this first part we deal with the regularization of the doubly-real contribution to the NNLO correction.
Energy Technology Data Exchange (ETDEWEB)
Somogyi, Gabor; Trocsanyi, Zoltan [University of Debrecen and Institute of Nuclear Research of the Hungarian Academy of Sciences, H-4001 Debrecen, PO Box 51 (Hungary)
2007-01-15
We present a generalization of the dipole subtraction scheme for computing jet cross sections in electron-positron annihilation at next-to-next-to-leading order accuracy in perturbative QCD. In this second part we deal with the regularization of the real-virtual contribution to the NNLO correction.
Lancaster, F. W.
1989-01-01
Describes various stages involved in the applications of electronic media to the publishing industry. Highlights include computer typesetting, or photocomposition; machine-readable databases; the distribution of publications in electronic form; computer conferencing and electronic mail; collaborative authorship; hypertext; hypermedia publications;…
A simple language to script and simulate breeding schemes: the breeding scheme language
It is difficult for plant breeders to determine an optimal breeding strategy given that the problem involves many factors, such as target trait genetic architecture and breeding resource availability. There are many possible breeding schemes for each breeding program. Although simulation study may b...
Furniture and Timber Training Board, Fourth Year's Scheme; Training Grants Scheme, 1969-70.
British Furniture and Timber Training Board, Wembly (England).
This booklet explains what training grants are offered by the Furniture and Timber Training Board of Great Britain, indicates how to claim them, and outlines the Board's training philosophy. Foldouts present conditions which apply in whole or in part to the Training Grants Scheme, followed by guidelines for completing forms. The main section…
The Performance-based Funding Scheme of Universities
Directory of Open Access Journals (Sweden)
Juha KETTUNEN
2016-05-01
Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally
An efficient compression scheme for bitmap indices
Energy Technology Data Exchange (ETDEWEB)
Wu, Kesheng; Otoo, Ekow J.; Shoshani, Arie
2004-04-13
When using an out-of-core indexing method to answer a query, it is generally assumed that the I/O cost dominates the overall query response time. Because of this, most research on indexing methods concentrate on reducing the sizes of indices. For bitmap indices, compression has been used for this purpose. However, in most cases, operations on these compressed bitmaps, mostly bitwise logical operations such as AND, OR, and NOT, spend more time in CPU than in I/O. To speedup these operations, a number of specialized bitmap compression schemes have been developed; the best known of which is the byte-aligned bitmap code (BBC). They are usually faster in performing logical operations than the general purpose compression schemes, but, the time spent in CPU still dominates the total query response time. To reduce the query response time, we designed a CPU-friendly scheme named the word-aligned hybrid (WAH) code. In this paper, we prove that the sizes of WAH compressed bitmap indices are about two words per row for large range of attributes. This size is smaller than typical sizes of commonly used indices, such as a B-tree. Therefore, WAH compressed indices are not only appropriate for low cardinality attributes but also for high cardinality attributes.In the worst case, the time to operate on compressed bitmaps is proportional to the total size of the bitmaps involved. The total size of the bitmaps required to answer a query on one attribute is proportional to the number of hits. These indicate that WAH compressed bitmap indices are optimal. To verify their effectiveness, we generated bitmap indices for four different datasets and measured the response time of many range queries. Tests confirm that sizes of compressed bitmap indices are indeed smaller than B-tree indices, and query processing with WAH compressed indices is much faster than with BBC compressed indices, projection indices and B-tree indices. In addition, we also verified that the average query response time
Hussain, Muhammad Mustafa
2017-09-08
Electronic stickers may be manufactured on flexible substrates (110, 120, 130) as layers and packaged together. The package may then have an adhesive applied to one side to provide capability for sticking the electronic devices to surfaces. The stickers can be wrappable, placed on surfaces, glued on walls or mirrors or wood or stone, and have electronics (112, 122, 132) which may or may not be ultrathin. Packaging for the electronic sticker can use polymer on cellulose manufacturing and/or three dimensional (3-D) printing. The electronic stickers may provide lighting capability, sensing capability, and/or recharging capabilities.
Holbrook, Harold D
1971-01-01
Basic Electronics is an elementary text designed for basic instruction in electricity and electronics. It gives emphasis on electronic emission and the vacuum tube and shows transistor circuits in parallel with electron tube circuits. This book also demonstrates how the transistor merely replaces the tube, with proper change of circuit constants as required. Many problems are presented at the end of each chapter. This book is comprised of 17 chapters and opens with an overview of electron theory, followed by a discussion on resistance, inductance, and capacitance, along with their effects on t
Electronic Commerce and Electronic Business
Indian Academy of Sciences (India)
R. Narasimhan (Krishtel eMaging) 1461 1996 Oct 15 13:05:22
This special issue is motivated by the recent upsurge of research activity in the areas of electronic commerce and electronic business both in India and all over the world. The current ... Monte Carlo methods for pricing financial options are then.
Electronic Government and Electronic Participation
Tambouris, E; Scholl, H.J.; Janssen, M.F.W.H.A.; Wimmer, M.A.; Tarabanis, K; Gascó, M; Klievink, A.J.; Lindgren, I; Milano, M; Panagiotopoulos, P; Pardo, T.A.; Parycek, P; Sæbø, Ø
2016-01-01
Electronic government and electronic participation continue to transform the public sector and society worldwide and are constantly being transformed themselves by emerging information and communication technologies.This book presents papers from the 14th International Federation for Information
Electronic Government and Electronic Participation
Tambouris, E.; Scholl, H.J.; Janssen, M.F.W.H.A.; Wimmer, M.A.; Tarabanis, K.; Gascó, M.; Klievink, A.J.; Lindgren, I.; Milano, M.; Panagiotopoulos, P.; Pardo, T.A.; Parycek, P.; Sæbø, O.
2015-01-01
Electronic government and electronic participation continue to transform the public sector and society worldwide and are constantly being transformed themselves by emerging information and communication technologies. This book presents papers from the 14th International Federation for Information
Introduction to the theory of schemes
Manin, Yuri I
2018-01-01
This English edition of Yuri I. Manin's well-received lecture notes provides a concise but extremely lucid exposition of the basics of algebraic geometry and sheaf theory. The lectures were originally held in Moscow in the late 1960s, and the corresponding preprints were widely circulated among Russian mathematicians. This book will be of interest to students majoring in algebraic geometry and theoretical physics (high energy physics, solid body, astrophysics) as well as to researchers and scholars in these areas. "This is an excellent introduction to the basics of Grothendieck's theory of schemes; the very best first reading about the subject that I am aware of. I would heartily recommend every grad student who wants to study algebraic geometry to read it prior to reading more advanced textbooks." - Prof. Alexander Beilinson.
Pay-what-you-want pricing schemes
DEFF Research Database (Denmark)
Kahsay, Goytom Abraha; Samahita, Margaret
this threshold, however, PWYW can lead to a lower utility. This may result in a lower purchase rate and higher average price, in line with previously unexplained evidence from field experiments. Moreover, an increase in the threshold value decreases the buyer's utility and may further lower the purchase rate......Pay-What-You-Want (PWYW) pricing schemes are becoming increasingly popular in a wide range of industries. We develop a model incorporating self-image into the buyer's utility function and introduce heterogeneity in consumption utility and image-sensitivity, which generates different purchase...... decisions and optimal prices across individuals. When a good is sold at a fixed price higher than a threshold value, a price that the individual thinks is fair, the adoption of PWYW increases his utility and hence results in a weakly higher purchase rate. When a good is sold at a fixed price lower than...
International Nuclear Information System (INIS)
Yang, W.F.; Yuan, S.G.; Fang, K.M.; Shen, S.F.; Mou, W.T.; Zhang, X.Q.; Li, Z.Q.
1997-01-01
By bombarding the natural thorium targets with 14 MeV neutrons, 229 Ra was produced through the reaction 232 Th(n,α) 229 Ra. The radium activities were separated from the irradiated targets by coprecipitation with the BaCl 2 . A total of 18 new weak γ rays with energies of 14.5, 15.6, 18.8, 21.8, 22.5, 44.0, 47.5, 55.0, 63.0, 69.6, 93.6, 94.1, 98.5, 102.2, 104.5, 106.1, 161.1, and 171.5 keV which could be assigned to the decay of 229 Ra were observed in the isolated radium fractions employing high resolution HPGe detectors and γ(X)-γ coincidence methods. A decay scheme of 229 Ra based on these observations is proposed. (orig.). With 2 figs
Sellafield Site (including Drigg) emergency scheme manual
International Nuclear Information System (INIS)
1987-02-01
This Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. Several categories of emergencies on the Sellafield Site are mentioned; a building emergency which is confined to one building, a Site emergency standby when the effects of a building emergency go outside that building, a Site emergency alert (District Emergency Standby) when a release of activity affects Site operations and could have serious Site effects and a District Emergency Alert when a radioactivity release may interfere with the normal activity of the General Public. A Drigg Emergency Standby situation would operate similarly at the Drigg Site. The detailed arrangements and responsibilities of appointed personnel are set out in this manual. (UK)
Wilson expansion in the minimal subtraction scheme
International Nuclear Information System (INIS)
Smirnov, V.A.
1989-01-01
The small distance expansion of the product of composite fields is constructed for an arbitrary renormalization procedure of the type of minimal subtraction scheme. Coefficient functions of the expansion are expressed explicitly through the Green functions of composite fields. The expansion has the explicity finite form: the ultraviolet (UV) divergences of the coefficient functions and composite fields are removed by the initial renormalization procedure while the infrared (IR) divergences in massless diagrams with nonvanishing contribution into the coefficient functions are removed by the R-operation which is the IR part of the R-operation. The latter is the generalization of the dimensional renormalization in the case when both UV and IR divergences are present. To derive the expansion, a ''pre-subtracting operator'' is introduced and formulas of the counter-term technique are exploited
An Improved Overloading Scheme for Downlink CDMA
Directory of Open Access Journals (Sweden)
Marc Moeneclaey
2005-04-01
Full Text Available An improved overloading scheme is presented for single-user detection in the downlink of multiple-access systems based on OCDMA/OCDMA (O/O. By displacing in time the orthogonal signatures of the two user sets that make up the overloaded system, the cross-correlation between the users of the two sets is reduced. For random O/O with square-root cosine rolloff chip pulses, the multiuser interference can be decreased by up to 50% (depending on the chip pulse bandwidth as compared to quasiorthogonal sequences (QOS that are presently part of the downlink standard of Cdma2000. This reduction of the multiuser interference gives rise to an increase of the achievable signal-to-interference-plus-noise ratio for a particular channel load.
Scheme for analysis of oily waters
Energy Technology Data Exchange (ETDEWEB)
Lysyj, I.; Rushworth, R.; Melvold, R.; Russell, E.C.
1980-01-01
A scheme is described for gross and detailed chemical characterization of oily waters. Total, suspended, and dissolved organic content and hydrocarbon levels of the sample are determined. Volatile and water-soluble fractions are characterized in greater detail. Lower aliphatic and aromatic hydrocarbons are separated from the water by nitrogen sparging and are collected in an activated carbon absorption column. They are then extracted into carbon disulfide and analyzed gas chromatographically. The water-soluble fraction is extracted into chloroform or adsorbed on Amberlite XAD type of resin. Class characterization of this fraction is performed using the HPLC procedure. GC-MS-C is used for detailed analysis. The methodology was used for studying the effectiveness of bilge and ballast water treatments.
Design of Infusion Schemes for Neuroreceptor Imaging
DEFF Research Database (Denmark)
Feng, Ling; Svarer, Claus; Madsen, Karine
2016-01-01
for bolus infusion (BI) or programmed infusion (PI) experiments. Steady-state quantitative measurements can be made with one short scan and venous blood samples. The GABAA receptor ligand [(11)C]Flumazenil (FMZ) was chosen for this purpose, as it lacks a suitable reference region. Methods. Five bolus [(11)C...... state was attained within 40 min, which was 8 min earlier than the optimal BI (B/I ratio = 55 min). Conclusions. The system can design both BI and PI schemes to attain steady state rapidly. For example, subjects can be [(11)C]FMZ-PET scanned after 40 min of tracer infusion for 40 min with venous...
An efficient training scheme for supermodels
Schevenhoven, Francine J.; Selten, Frank M.
2017-06-01
Weather and climate models have improved steadily over time as witnessed by objective skill scores, although significant model errors remain. Given these imperfect models, predictions might be improved by combining them dynamically into a so-called supermodel. In this paper a new training scheme to construct such a supermodel is explored using a technique called cross pollination in time (CPT). In the CPT approach the models exchange states during the prediction. The number of possible predictions grows quickly with time, and a strategy to retain only a small number of predictions, called pruning, needs to be developed. The method is explored using low-order dynamical systems and applied to a global atmospheric model. The results indicate that the CPT training is efficient and leads to a supermodel with improved forecast quality as compared to the individual models. Due to its computational efficiency, the technique is suited for application to state-of-the art high-dimensional weather and climate models.
Auction dynamics: A volume constrained MBO scheme
Jacobs, Matt; Merkurjev, Ekaterina; Esedoǧlu, Selim
2018-02-01
We show how auction algorithms, originally developed for the assignment problem, can be utilized in Merriman, Bence, and Osher's threshold dynamics scheme to simulate multi-phase motion by mean curvature in the presence of equality and inequality volume constraints on the individual phases. The resulting algorithms are highly efficient and robust, and can be used in simulations ranging from minimal partition problems in Euclidean space to semi-supervised machine learning via clustering on graphs. In the case of the latter application, numerous experimental results on benchmark machine learning datasets show that our approach exceeds the performance of current state-of-the-art methods, while requiring a fraction of the computation time.
New Schemes for Positive Real Truncation
Directory of Open Access Journals (Sweden)
Kari Unneland
2007-07-01
Full Text Available Model reduction, based on balanced truncation, of stable and of positive real systems are considered. An overview over some of the already existing techniques are given: Lyapunov balancing and stochastic balancing, which includes Riccati balancing. A novel scheme for positive real balanced truncation is then proposed, which is a combination of the already existing Lyapunov balancing and Riccati balancing. Using Riccati balancing, the solution of two Riccati equations are needed to obtain positive real reduced order systems. For the suggested method, only one Lyapunov equation and one Riccati equation are solved in order to obtain positive real reduced order systems, which is less computationally demanding. Further it is shown, that in order to get positive real reduced order systems, only one Riccati equation needs to be solved. Finally, this is used to obtain positive real frequency weighted balanced truncation.
DEFF Research Database (Denmark)
Appelt, Ane L; Rønde, Heidi S
2013-01-01
The photo shows a close-up of a Lichtenberg figure – popularly called an “electron tree” – produced in a cylinder of polymethyl methacrylate (PMMA). Electron trees are created by irradiating a suitable insulating material, in this case PMMA, with an intense high energy electron beam. Upon discharge......, during dielectric breakdown in the material, the electrons generate branching chains of fractures on leaving the PMMA, producing the tree pattern seen. To be able to create electron trees with a clinical linear accelerator, one needs to access the primary electron beam used for photon treatments. We...... appropriated a linac that was being decommissioned in our department and dismantled the head to circumvent the target and ion chambers. This is one of 24 electron trees produced before we had to stop the fun and allow the rest of the accelerator to be disassembled....
Larocque, Hugo; Kaminer, Ido; Grillo, Vincenzo; Leuchs, Gerd; Padgett, Miles J.; Boyd, Robert W.; Segev, Mordechai; Karimi, Ebrahim
2018-04-01
Electrons have played a significant role in the development of many fields of physics during the last century. The interest surrounding them mostly involved their wave-like features prescribed by the quantum theory. In particular, these features correctly predict the behaviour of electrons in various physical systems including atoms, molecules, solid-state materials, and even in free space. Ten years ago, new breakthroughs were made, arising from the new ability to bestow orbital angular momentum (OAM) to the wave function of electrons. This quantity, in conjunction with the electron's charge, results in an additional magnetic property. Owing to these features, OAM-carrying, or twisted, electrons can effectively interact with magnetic fields in unprecedented ways and have motivated materials scientists to find new methods for generating twisted electrons and measuring their OAM content. Here, we provide an overview of such techniques along with an introduction to the exciting dynamics of twisted electrons.
Single-electron quantum tomography in quantum Hall edge channels
International Nuclear Information System (INIS)
Grenier, Ch; Degiovanni, P; Herve, R; Bocquillon, E; Parmentier, F D; Placais, B; Berroir, J M; Feve, G
2011-01-01
We propose a quantum tomography protocol to measure single-electron coherence in quantum Hall edge channels, and therefore access for the first time the wavefunction of single-electron excitations propagating in ballistic quantum conductors. Its implementation would open the way to quantitative studies of single-electron decoherence and would provide a quantitative tool for analyzing single- to few-electron sources. We show how this protocol could be implemented using ultrahigh-sensitivity noise measurement schemes.
Variable flavor scheme for final state jets
International Nuclear Information System (INIS)
Pietrulewicz, P.
2014-01-01
In this thesis I describe a setup to treat mass effects from secondary radiation of heavy quark pairs in inclusive hard scattering processes with various dynamical scales. The resulting variable flavor number scheme (VFNS) generalizes a well-known scheme for massive initial state quarks which has been developed for deep inelastic scattering (DIS) in the classical region 1 - x ⁓ O(1) and which will be also discussed here. The setup incorporated in the formalism of Soft-Collinear Effective Theory (SCET) consistently takes into account the effects of massive quark loops and allows to deal with all hierarchies between the mass scale and the involved kinematic scales corresponding to collinear and soft radiation. It resums all large logarithms due to flavor number dependent evolution, achieves both decoupling for very large masses and the correct massless behavior for very small masses, and provides a continuous description in between. In the bulk of this work I will concentrate on DIS in the endpoint region x → 1 serving mainly as a showcase for the concepts and on the thrust distribution for e + e - -collisions in the dijet limit as a phenomenologically relevant example for an event shape. The computations of the corrections to the structures in the factorization theorems are described explicitly for the singular terms at O(α s 2 C F T F ) arising from secondary radiation of massive quarks through gluon splitting. Apart from the soft function for thrust, which requires a dedicated calculation, these results are directly obtained from the corresponding results for the radiation of a massive gauge boson with vector coupling at O(α s ) with the help of dispersion relations, and most of the relevant conceptual and technical issues can be dealt with already at this level. Finally, to estimate the impact of the corrections I carry out a numerical analysis for secondary massive bottom and top quarks on thrust distributions at different center-of-mass energies
Electronic Rydberg wavepacket effects on molecular vibration
International Nuclear Information System (INIS)
Hughes, I.G.; Meacher, D.R.
1994-01-01
Electronic wavepacket states of molecular hydrogen are considered which represent the situation of a spectator electron orbiting a molecular core. A quantum defect theory approach is used to determine the energy level structure, wavefunctions and molecular potentials, which is valid in regions where the quantum defects approach zero. In such a region the orbital motion of the wavepacket leads to a periodic variation in the molecular vibration frequency of the order of 100 cm -1 . Possible detection schemes are discussed. (author)
Efficient and Anonymous Authentication Scheme for Wireless Body Area Networks.
Wu, Libing; Zhang, Yubo; Li, Li; Shen, Jian
2016-06-01
As a significant part of the Internet of Things (IoT), Wireless Body Area Network (WBAN) has attract much attention in this years. In WBANs, sensors placed in or around the human body collect the sensitive data of the body and transmit it through an open wireless channel in which the messages may be intercepted, modified, etc. Recently, Wang et al. presented a new anonymous authentication scheme for WBANs and claimed that their scheme can solve the security problems in the previous schemes. Unfortunately, we demonstrate that their scheme cannot withstand impersonation attack. Either an adversary or a malicious legal client could impersonate another legal client to the application provider. In this paper, we give the detailed weakness analysis of Wang et al.'s scheme at first. Then we present a novel anonymous authentication scheme for WBANs and prove that it's secure under a random oracle model. At last, we demonstrate that our presented anonymous authentication scheme for WBANs is more suitable for practical application than Wang et al.'s scheme due to better security and performance. Compared with Wang et al.'s scheme, the computation cost of our scheme in WBANs has reduced by about 31.58%.
Quantum attack-resistent certificateless multi-receiver signcryption scheme.
Directory of Open Access Journals (Sweden)
Huixian Li
Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.
MIMO transmit scheme based on morphological perceptron with competitive learning.
Valente, Raul Ambrozio; Abrão, Taufik
2016-08-01
This paper proposes a new multi-input multi-output (MIMO) transmit scheme aided by artificial neural network (ANN). The morphological perceptron with competitive learning (MP/CL) concept is deployed as a decision rule in the MIMO detection stage. The proposed MIMO transmission scheme is able to achieve double spectral efficiency; hence, in each time-slot the receiver decodes two symbols at a time instead one as Alamouti scheme. Other advantage of the proposed transmit scheme with MP/CL-aided detector is its polynomial complexity according to modulation order, while it becomes linear when the data stream length is greater than modulation order. The performance of the proposed scheme is compared to the traditional MIMO schemes, namely Alamouti scheme and maximum-likelihood MIMO (ML-MIMO) detector. Also, the proposed scheme is evaluated in a scenario with variable channel information along the frame. Numerical results have shown that the diversity gain under space-time coding Alamouti scheme is partially lost, which slightly reduces the bit-error rate (BER) performance of the proposed MP/CL-NN MIMO scheme. Copyright © 2016 Elsevier Ltd. All rights reserved.
Security analysis and improvements of arbitrated quantum signature schemes
International Nuclear Information System (INIS)
Zou Xiangfu; Qiu Daowen
2010-01-01
A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.
Numerical study of a hybrid jet impingement/micro-channel cooling scheme
International Nuclear Information System (INIS)
Barrau, Jérôme; Omri, Mohammed; Chemisana, Daniel; Rosell, Joan; Ibañez, Manel; Tadrist, Lounes
2012-01-01
A new hybrid jet impingement/micro-channel cooling scheme is studied numerically for use in high-heat-flux thermal management of electronic and power devices. The device is developed with the objective of improving the temperature uniformity of the cooled object. A numerical model based on the k–ω SST turbulent model is developed and validated experimentally. This model is used to carry out a parametrical characterization of the heat sink. The study shows that variations in key parameters of jet impingement and micro-channel technologies allow for the cooling scheme to obtain a wide range of temperature profiles for the cooled object. - Highlights: ► A new hybrid cooling scheme is numerically studied. ► The cooling scheme combines the benefits of jet impingement and micro-channel flows. ► The numerical model is validated by comparison with experimental results. ► The temperature distribution can be adapted to the needs of the cooled system.
An Experiment and Detection Scheme for Cavity-Based Light Cold Dark Matter Particle Searches
Directory of Open Access Journals (Sweden)
Masroor H. S. Bukhari
2017-01-01
Full Text Available A resonance detection scheme and some useful ideas for cavity-based searches of light cold dark matter particles (such as axions are presented, as an effort to aid in the on-going endeavors in this direction as well as for future experiments, especially in possibly developing a table-top experiment. The scheme is based on our idea of a resonant detector, incorporating an integrated tunnel diode (TD and GaAs HEMT/HFET (High-Electron Mobility Transistor/Heterogeneous FET transistor amplifier, weakly coupled to a cavity in a strong transverse magnetic field. The TD-amplifier combination is suggested as a sensitive and simple technique to facilitate resonance detection within the cavity while maintaining excellent noise performance, whereas our proposed Halbach magnet array could serve as a low-noise and permanent solution replacing the conventional electromagnets scheme. We present some preliminary test results which demonstrate resonance detection from simulated test signals in a small optimal axion mass range with superior signal-to-noise ratios (SNR. Our suggested design also contains an overview of a simpler on-resonance dc signal read-out scheme replacing the complicated heterodyne read-out. We believe that all these factors and our propositions could possibly improve or at least simplify the resonance detection and read-out in cavity-based DM particle detection searches (and other spectroscopy applications and reduce the complications (and associated costs, in addition to reducing the electromagnetic interference and background.
EUROPEAN NUCLEAR PHYSICS: Electron machine quest
International Nuclear Information System (INIS)
Anon.
1991-01-01
In 1989, initial thinking on the construction of an electron accelerator for nuclear physics in France resulted in an initial plan for a 4 GeV machine with continuous output at 100 microamps. Subsequently a further study recommended a more ambitious European scheme going beyond 10 GeV
Lee, Tian-Fu
2014-12-01
Telecare medicine information systems provide a communicating platform for accessing remote medical resources through public networks, and help health care workers and medical personnel to rapidly making correct clinical decisions and treatments. An authentication scheme for data exchange in telecare medicine information systems enables legal users in hospitals and medical institutes to establish a secure channel and exchange electronic medical records or electronic health records securely and efficiently. This investigation develops an efficient and secure verified-based three-party authentication scheme by using extended chaotic maps for data exchange in telecare medicine information systems. The proposed scheme does not require server's public keys and avoids time-consuming modular exponential computations and scalar multiplications on elliptic curve used in previous related approaches. Additionally, the proposed scheme is proven secure in the random oracle model, and realizes the lower bounds of messages and rounds in communications. Compared to related verified-based approaches, the proposed scheme not only possesses higher security, but also has lower computational cost and fewer transmissions. Copyright © 2014 Elsevier Ireland Ltd. All rights reserved.
Borowik, Piotr; Thobel, Jean-Luc; Adamowicz, Leszek
2017-07-01
Standard computational methods used to take account of the Pauli Exclusion Principle into Monte Carlo (MC) simulations of electron transport in semiconductors may give unphysical results in low field regime, where obtained electron distribution function takes values exceeding unity. Modified algorithms were already proposed and allow to correctly account for electron scattering on phonons or impurities. Present paper extends this approach and proposes improved simulation scheme allowing including Pauli exclusion principle for electron-electron (e-e) scattering into MC simulations. Simulations with significantly reduced computational cost recreate correct values of the electron distribution function. Proposed algorithm is applied to study transport properties of degenerate electrons in graphene with e-e interactions. This required adapting the treatment of e-e scattering in the case of linear band dispersion relation. Hence, this part of the simulation algorithm is described in details.
Development of highly accurate approximate scheme for computing the charge transfer integral
Energy Technology Data Exchange (ETDEWEB)
Pershin, Anton; Szalay, Péter G. [Laboratory for Theoretical Chemistry, Institute of Chemistry, Eötvös Loránd University, P.O. Box 32, H-1518 Budapest (Hungary)
2015-08-21
The charge transfer integral is a key parameter required by various theoretical models to describe charge transport properties, e.g., in organic semiconductors. The accuracy of this important property depends on several factors, which include the level of electronic structure theory and internal simplifications of the applied formalism. The goal of this paper is to identify the performance of various approximate approaches of the latter category, while using the high level equation-of-motion coupled cluster theory for the electronic structure. The calculations have been performed on the ethylene dimer as one of the simplest model systems. By studying different spatial perturbations, it was shown that while both energy split in dimer and fragment charge difference methods are equivalent with the exact formulation for symmetrical displacements, they are less efficient when describing transfer integral along the asymmetric alteration coordinate. Since the “exact” scheme was found computationally expensive, we examine the possibility to obtain the asymmetric fluctuation of the transfer integral by a Taylor expansion along the coordinate space. By exploring the efficiency of this novel approach, we show that the Taylor expansion scheme represents an attractive alternative to the “exact” calculations due to a substantial reduction of computational costs, when a considerably large region of the potential energy surface is of interest. Moreover, we show that the Taylor expansion scheme, irrespective of the dimer symmetry, is very accurate for the entire range of geometry fluctuations that cover the space the molecule accesses at room temperature.
An entropy-variables-based formulation of residual distribution schemes for non-equilibrium flows
Garicano-Mena, Jesús; Lani, Andrea; Degrez, Gérard
2018-06-01
In this paper we present an extension of Residual Distribution techniques for the simulation of compressible flows in non-equilibrium conditions. The latter are modeled by means of a state-of-the-art multi-species and two-temperature model. An entropy-based variable transformation that symmetrizes the projected advective Jacobian for such a thermophysical model is introduced. Moreover, the transformed advection Jacobian matrix presents a block diagonal structure, with mass-species and electronic-vibrational energy being completely decoupled from the momentum and total energy sub-system. The advantageous structure of the transformed advective Jacobian can be exploited by contour-integration-based Residual Distribution techniques: established schemes that operate on dense matrices can be substituted by the same scheme operating on the momentum-energy subsystem matrix and repeated application of scalar scheme to the mass-species and electronic-vibrational energy terms. Finally, the performance gain of the symmetrizing-variables formulation is quantified on a selection of representative testcases, ranging from subsonic to hypersonic, in inviscid or viscous conditions.
Effect of heating scheme on SOL width in DIII-D and EAST
Directory of Open Access Journals (Sweden)
L. Wang
2017-08-01
Full Text Available Joint DIII-D/EAST experiments in the radio-frequency (RF heated H-mode scheme with comparison to that of neutral beam (NB heated H-mode scheme were carried out on DIII-D and EAST under similar conditions to examine the effect of heating scheme on scrape-off layer (SOL width in H-mode plasmas for application to ITER. A dimensionally similar plasma equilibrium was used to match the EAST shape parameters. The divertor heat flux and SOL widths were measured with infra-red camera in DIII-D, while with divertor Langmuir probe array in EAST. It has been demonstrated on both DIII-D and EAST that RF-heated plasma has a broader SOL than NB-heated plasma when the edge electrons are effectively heated in low plasma current and low density regime with low edge collisionality. Detailed edge and pedestal profile analysis on DIII-D suggests that the low edge collisionality and ion orbit loss effect may account for the observed broadening. The joint experiment in DIII-D has also demonstrated the strong inverse dependence of SOL width on the plasma current in electron cyclotron heated (ECH H-mode plasmas.
A new hybrid scheme for simulations of highly collisional RF-driven plasmas
International Nuclear Information System (INIS)
Eremin, Denis; Hemke, Torben; Mussenbrock, Thomas
2016-01-01
This work describes a new 1D hybrid approach for modeling atmospheric pressure discharges featuring complex chemistry. In this approach electrons are described fully kinetically using particle-in-cell/Monte-Carlo (PIC/MCC) scheme, whereas the heavy species are modeled within a fluid description. Validity of the popular drift-diffusion approximation is verified against a ‘full’ fluid model accounting for the ion inertia and a fully kinetic PIC/MCC code for ions as well as electrons. The fluid models require knowledge of the momentum exchange frequency and dependence of the ion mobilities on the electric field when the ions are in equilibrium with the latter. To this end an auxiliary Monte-Carlo scheme is constructed. It is demonstrated that the drift-diffusion approximation can overestimate ion transport in simulations of RF-driven discharges with heavy ion species operated in the γ mode at the atmospheric pressure or in all discharge simulations for lower pressures. This can lead to exaggerated plasma densities and incorrect profiles provided by the drift-diffusion models. Therefore, the hybrid code version featuring the full ion fluid model should be favored against the more popular drift-diffusion model, noting that the suggested numerical scheme for the former model implies only a small additional computational cost. (paper)
Further test of new pairing scheme used in overhaul of BCS theory
International Nuclear Information System (INIS)
Zheng, X.H.; Walmsley, D.G.
2014-01-01
Highlights: • Explanation of a new pairing scheme to overhaul BCS theory. • Prediction of superconductor properties from normal state resistivity. • Applications to Nb, Pb, Al, Ta, Mo, Ir and W, T c between 9.5 and 0.012 K. • High accuracy compared with measured energy gap of Nb, Pb, Al and Ta. • Prediction of energy gap for Mo, Ir and W (so far not measured). - Abstract: A new electron pairing scheme, rectifying a fundamental flaw of the BCS theory, is tested extensively. It postulates that superconductivity arises solely from residual umklapp scattering when it is not in competition for the same destination electron states with normal scattering. It reconciles a long standing theoretical discrepancy in the strength of the electron–phonon interaction between the normal and superconductive states. The new scheme is exploited to calculate the superconductive electron–phonon spectral density, α 2 F(ν), entirely on the basis of normal state electrical resistivity. This leads to first principles superconductive properties (zero temperature energy gap and tunnelling conductance) in seven metals which turn out to be highly accurate when compared with known data; in other cases experimental verification is invited. The transition temperatures involved vary over almost three orders of magnitude: from 9.5 K for niobium to 0.012 K for tungsten
Renewable Energy Operation and Conversion Schemes
DEFF Research Database (Denmark)
Spagnuolo, Giovanni; Petrone, Giovanni; Araujo, Samuel Vasconcelos
2010-01-01
A short summary of some speeches given during Seminar on Renewable Energy system (SERENE) is presented. The contributions have been mainly focused on power electronics for photovoltaic (PV) and sea wave energies, pointing out some aspects related to efficiency, reliability, and grid integration. ...
Directory of Open Access Journals (Sweden)
Slavko Đerić
2016-12-01
Full Text Available Electronic commerce can be defined in different ways. Any definition helps to understand and explain that concept as better as possible.. Electronic commerce is a set of procedures and technologies that automate the tasks of financial transactions using electronic means. Also, according to some authors, electronic commerce is defined as a new concept, which is being developed and which includes process of buying and selling or exchanging products, services or information via computer networks, including the Internet. Electronic commerce is not limited just to buying and selling, but it also includes all pre-sales and after-sales ongoing activities along the supply chain. Introducing electronic commerce, using the Internet and Web services in business, realizes the way to a completely new type of economy - internet economy.
TVD schemes in one and two space dimensions
International Nuclear Information System (INIS)
Leveque, R.J.; Goodman, J.B.; New York Univ., NY)
1985-01-01
The recent development of schemes which are second order accurate in smooth regions has made it possible to overcome certain difficulties which used to arise in numerical computations of discontinuous solutions of conservation laws. The present investigation is concerned with scalar conservation laws, taking into account the employment of total variation diminishing (TVD) schemes. The concept of a TVD scheme was introduced by Harten et al. (1976). Harten et al. first constructed schemes which are simultaneously TVD and second order accurate on smooth solutions. In the present paper, a summary is provided of recently conducted work in this area. Attention is given to TVD schemes in two space dimensions, a second order accurate TVD scheme in one dimension, and the entropy condition and spreading of rarefaction waves. 19 references
Adaptive Image Transmission Scheme over Wavelet-Based OFDM System
Institute of Scientific and Technical Information of China (English)
GAOXinying; YUANDongfeng; ZHANGHaixia
2005-01-01
In this paper an adaptive image transmission scheme is proposed over Wavelet-based OFDM (WOFDM) system with Unequal error protection (UEP) by the design of non-uniform signal constellation in MLC. Two different data division schemes: byte-based and bitbased, are analyzed and compared. Different bits are protected unequally according to their different contribution to the image quality in bit-based data division scheme, which causes UEP combined with this scheme more powerful than that with byte-based scheme. Simulation results demonstrate that image transmission by UEP with bit-based data division scheme presents much higher PSNR values and surprisingly better image quality. Furthermore, by considering the tradeoff of complexity and BER performance, Haar wavelet with the shortest compactly supported filter length is the most suitable one among orthogonal Daubechies wavelet series in our proposed system.
An Efficient Homomorphic Aggregate Signature Scheme Based on Lattice
Directory of Open Access Journals (Sweden)
Zhengjun Jing
2014-01-01
Full Text Available Homomorphic aggregate signature (HAS is a linearly homomorphic signature (LHS for multiple users, which can be applied for a variety of purposes, such as multi-source network coding and sensor data aggregation. In order to design an efficient postquantum secure HAS scheme, we borrow the idea of the lattice-based LHS scheme over binary field in the single-user case, and develop it into a new lattice-based HAS scheme in this paper. The security of the proposed scheme is proved by showing a reduction to the single-user case and the signature length remains invariant. Compared with the existing lattice-based homomorphic aggregate signature scheme, our new scheme enjoys shorter signature length and high efficiency.
Security and efficiency data sharing scheme for cloud storage
International Nuclear Information System (INIS)
Han, Ke; Li, Qingbo; Deng, Zhongliang
2016-01-01
With the adoption and diffusion of data sharing paradigm in cloud storage, there have been increasing demands and concerns for shared data security. Ciphertext Policy Attribute-Based Encryption (CP-ABE) is becoming a promising cryptographic solution to the security problem of shared data in cloud storage. However due to key escrow, backward security and inefficiency problems, existing CP-ABE schemes cannot be directly applied to cloud storage system. In this paper, an effective and secure access control scheme for shared data is proposed to solve those problems. The proposed scheme refines the security of existing CP-ABE based schemes. Specifically, key escrow and conclusion problem are addressed by dividing key generation center into several distributed semi-trusted parts. Moreover, secrecy revocation algorithm is proposed to address not only back secrecy but efficient problem in existing CP-ABE based scheme. Furthermore, security and performance analyses indicate that the proposed scheme is both secure and efficient for cloud storage.
A hybrid pi control scheme for airship hovering
International Nuclear Information System (INIS)
Ashraf, Z.; Choudhry, M.A.; Hanif, A.
2012-01-01
Airship provides us many attractive applications in aerospace industry including transportation of heavy payloads, tourism, emergency management, communication, hover and vision based applications. Hovering control of airship has many utilizations in different engineering fields. However, it is a difficult problem to sustain the hover condition maintaining controllability. So far, different solutions have been proposed in literature but most of them are difficult in analysis and implementation. In this paper, we have presented a simple and efficient scheme to design a multi input multi output hybrid PI control scheme for airship. It can maintain stability of the plant by rejecting disturbance inputs to ensure robustness. A control scheme based on feedback theory is proposed that uses principles of optimality with integral action for hovering applications. Simulations are carried out in MTALAB for examining the proposed control scheme for hovering in different wind conditions. Comparison of the technique with an existing scheme is performed, describing the effectiveness of control scheme. (author)
A novel quantum group signature scheme without using entangled states
Xu, Guang-Bao; Zhang, Ke-Jia
2015-07-01
In this paper, we propose a novel quantum group signature scheme. It can make the signer sign a message on behalf of the group without the help of group manager (the arbitrator), which is different from the previous schemes. In addition, a signature can be verified again when its signer disavows she has ever generated it. We analyze the validity and the security of the proposed signature scheme. Moreover, we discuss the advantages and the disadvantages of the new scheme and the existing ones. The results show that our scheme satisfies all the characteristics of a group signature and has more advantages than the previous ones. Like its classic counterpart, our scheme can be used in many application scenarios, such as e-government and e-business.
2017-07-21
AFRL-RV-PS- AFRL-RV-PS- TR-2017-0114 TR-2017-0114 ADVANCED ELECTRONICS Ashwani Sharma 21 Jul 2017 Interim Report APPROVED FOR PUBLIC RELEASE...NUMBER Advanced Electronics 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 62601F 6. AUTHOR(S) 5d. PROJECT NUMBER 4846 Ashwani Sharma 5e. TASK NUMBER...Approved for public release; distribution is unlimited. (RDMX-17-14919 dtd 20 Mar 2018) 13. SUPPLEMENTARY NOTES 14. ABSTRACT The Space Electronics
International Nuclear Information System (INIS)
Hegde, M.S.
1979-01-01
An introduction to the various techniques in electron spectroscopy is presented. These techniques include: (1) UV Photoelectron spectroscopy, (2) X-ray Photoelectron spectroscopy, (3) Auger electron spectroscopy, (4) Electron energy loss spectroscopy, (5) Penning ionization spectroscopy and (6) Ion neutralization spectroscopy. The radiations used in each technique, the basis of the technique and the special information obtained in structure determination in atoms and molecules by each technique are summarised. (A.K.)
Energy efficient power electronic controller for a capacitor-run single-phase induction motor
International Nuclear Information System (INIS)
Saravana Ilango, G.; Samidurai, K.; Roykumar, M.; Thanushkodi, K.
2009-01-01
At present the speed control of a capacitor-run single-phase induction motor is being achieved by using triac based voltage regulators. This paper proposes a new scheme; an electronic transformer acts as a voltage regulator. Performance comparison is made between these two schemes in this paper. It is found that the proposed scheme has superior operating and performance characteristics. Experimental results show that apart from improvement in performance with respect to power factor and total harmonic distortion an appreciable amount of energy saving is also obtained in the electronic transformer based scheme.
Fierz transformations and renormalization schemes for fourquark operators
Directory of Open Access Journals (Sweden)
Garron Nicolas
2018-01-01
Full Text Available It has been shown that the choice of renormalization scheme is crucial for four-quark operators, in particular for neutral kaon mixing beyond the Standard Model. In the context of SMOM schemes, the choice of projector is not unique and is part of the definition of the renormalisation scheme. I present the non-diagonal Fierz relations which relate some of these projectors.
Mitarbeiteranreizsysteme und Innovationserfolg (Employee suggestion schemes and innovation success)
Czarnitzki, Dirk; Kraft, Kornelius
2008-01-01
"We discuss the determinants of a successful implementation of an employee suggestion scheme and other measures to stimulate innovation success. Subsequently the effects of the employee suggestion schemes are investigated empirically. We analyse the realisation of cost reductions and alternatively sales expansion due to quality improvements. It turns out that employee suggestion schemes have a positive effect on cost efficiency and sales growth. Delegation of decision authority reduces produc...
Theory analysis and simple calculation of travelling wave burnup scheme
International Nuclear Information System (INIS)
Zhang Jian; Yu Hong; Gang Zhi
2012-01-01
Travelling wave burnup scheme is a new burnup scheme that breeds fuel locally just before it burns. Based on the preliminary theory analysis, the physical imagine was found. Through the calculation of a R-z cylinder travelling wave reactor core with ERANOS code system, the basic physical characteristics of this new burnup scheme were concluded. The results show that travelling wave reactor is feasible in physics, and there are some good features in the reactor physics. (authors)
Optimized variational analysis scheme of single Doppler radar wind data
Sasaki, Yoshi K.; Allen, Steve; Mizuno, Koki; Whitehead, Victor; Wilk, Kenneth E.
1989-01-01
A computer scheme for extracting singularities has been developed and applied to single Doppler radar wind data. The scheme is planned for use in real-time wind and singularity analysis and forecasting. The method, known as Doppler Operational Variational Extraction of Singularities is outlined, focusing on the principle of local symmetry. Results are presented from the application of the scheme to a storm-generated gust front in Oklahoma on May 28, 1987.
Market behavior and performance of different strategy evaluation schemes
Yongjoo Baek; Sang Hoon Lee; Hawoong Jeong
2010-01-01
Strategy evaluation schemes are a crucial factor in any agent-based market model, as they determine the agents' strategy preferences and consequently their behavioral pattern. This study investigates how the strategy evaluation schemes adopted by agents affect their performance in conjunction with the market circumstances. We observe the performance of three strategy evaluation schemes, the history-dependent wealth game, the trend-opposing minority game, and the trend-following majority game,...
Quantum signature scheme based on a quantum search algorithm
International Nuclear Information System (INIS)
Yoon, Chun Seok; Kang, Min Sung; Lim, Jong In; Yang, Hyung Jin
2015-01-01
We present a quantum signature scheme based on a two-qubit quantum search algorithm. For secure transmission of signatures, we use a quantum search algorithm that has not been used in previous quantum signature schemes. A two-step protocol secures the quantum channel, and a trusted center guarantees non-repudiation that is similar to other quantum signature schemes. We discuss the security of our protocol. (paper)
Type monotonic allocation schemes for multi-glove games
Brânzei, R.; Solymosi, T.; Tijs, S.H.
2007-01-01
Multiglove markets and corresponding games are considered.For this class of games we introduce the notion of type monotonic allocation scheme.Allocation rules for multiglove markets based on weight systems are introduced and characterized.These allocation rules generate type monotonic allocation schemes for multiglove games and are also helpful in proving that each core element of the corresponding game is extendable to a type monotonic allocation scheme.The T-value turns out to generate a ty...
A repeat-until-success quantum computing scheme
Energy Technology Data Exchange (ETDEWEB)
Beige, A [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Lim, Y L [DSO National Laboratories, 20 Science Park Drive, Singapore 118230, Singapore (Singapore); Kwek, L C [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542, Singapore (Singapore)
2007-06-15
Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes.
A repeat-until-success quantum computing scheme
International Nuclear Information System (INIS)
Beige, A; Lim, Y L; Kwek, L C
2007-01-01
Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes
Analysis and improvement for the performance of Baptista's cryptographic scheme
International Nuclear Information System (INIS)
Wei Jun; Liao Xiaofeng; Wong, K.W.; Zhou Tsing; Deng Yigui
2006-01-01
Based on Baptista's chaotic cryptosystem, we propose a secure and robust chaotic cryptographic scheme after investigating the problems found in this cryptosystem as well as its variants. In this proposed scheme, a subkey array generated from the key and the plaintext is adopted to enhance the security. Some methods are introduced to increase the efficiency. Theoretical analyses and numerical simulations indicate that the proposed scheme is secure and efficient for practical use