WorldWideScience

Sample records for enhanced pomeron scheme

  1. Rapidity gap survival in enhanced Pomeron scheme

    Energy Technology Data Exchange (ETDEWEB)

    Ostapchenko, Sergey [Frankfurt Institute for Advanced Studies, Frankfurt am Main (Germany); Moscow State University, D.V. Skobeltsyn Institute of Nuclear Physics, Moscow (Russian Federation); Bleicher, Marcus [Frankfurt Institute for Advanced Studies, Frankfurt am Main (Germany); Goethe-Universitat, Institute for Theoretical Physics, Frankfurt am Main (Germany)

    2018-01-15

    We apply the phenomenological Reggeon field theory framework to investigate rapidity gap survival (RGS) probability for diffractive dijet production in proton-proton collisions. In particular, we study in some detail rapidity gap suppression due to elastic rescatterings of intermediate partons in the underlying parton cascades, described by enhanced (Pomeron-Pomeron interaction) diagrams. We demonstrate that such contributions play a subdominant role, compared to the usual, so-called ''eikonal'', rapidity gap suppression due to elastic rescatterings of constituent partons of the colliding protons. On the other hand, the overall RGS factor proves to be sensitive to color fluctuations in the proton. Hence, experimental data on diffractive dijet production can be used to constrain the respective model approaches. (orig.)

  2. Reggeon, Pomeron and annihilation processes in the dual unitarization scheme

    International Nuclear Information System (INIS)

    Dias de Deus, J.

    1976-07-01

    In the framework of the dual unitarization scheme the connection between particle production in processes dominated by Reggeon, Pomeron and Annihilation diagrams is discussed and critical tests of the scheme are suggested. The simple relation for average multiplicities anti nsup(R) = 1/2 anti nsup(P) = 1/3 anti nsup(A) and other relations for inclusive cross-sections and higher moments of the particle distribution are shown to be in reasonable agreement with data. (author)

  3. Pomeron physics

    International Nuclear Information System (INIS)

    Fujisaki, H.

    1986-01-01

    Our discussion is primarily confined to the asymptopia. From the phenomenological point of view, diffraction at presently available high energies can be reasonably well described in terms of the bare simplepole pomeron with the intercept at t=O slightly above unity. From the theoretical point of view, however, the self-consistent explanation of diffraction at the asymptopia inevitably necessitates the clothed physical pomeron with the unit intercept at t=O. The bare pomeron is built up from the normal reggeon through dual topological unitarization. Comparitively, the clothed physical pomeron is generated by multidiffractive unitarization of the bare pomeron. The clothed pomeron is often referred to as the geometrical pomeron (GP). The GP is universal in the sense that the asymptotic behaviour of the clothed pomeron is independent of the fine details of dynamics building up and unitarizing the bare pomeron. All unusual features of the physical pomeron are commonly inherent in universality of the GP which plays the role of the most typical guiding principle in pomeron physics. If the GP parmeterization is continued in t to beyond the lowest threshold, however, t-channel unitarity is seriously violated because of the hard branching nature. It is then of importance to investigate whether or not the GP universality is self-consistently guaranteed not only from the s-channel point of view but also from the t-channel point of view, and how the universal GP dynamically affects normal reggeons through the repeated pomeron exchange. Solutions to these key questions are summarized after geometrodynamical parts of a series of our works on pomeron physics is discussed

  4. The flavoring of the pomeron

    International Nuclear Information System (INIS)

    Dash, J.W.; Manesis, E.K.

    1977-03-01

    A theoretical review and a detailed phenomenological description of the 'flavoring' of the bare Pomeron pole at t=0 (i.e. the non-diffractive renormalization of its multiperipheral unitarity sum by strange quarks, charmed quarks, diquarks,...) are presented. From an 'unflavored' intercept α=0.85 to a 'flavored' intercept α approximately 1.08, probably close to the bare intercept of the Reggeon Field Theory. NN, πN, and KN total cross sections and real to imaginary amplitude ratios are treated. No oscillations are observed. Particular attention is paid to 2 sigmasub(KN) - sigmasub(πN) which rises monotonically. A closely related combination of inelastic diffraction cross sections is presented which decreases monotonically, indicating that vacuum amplitudes are not simply the sum of a Pomeron pole and an ideally mixed f. In fact it is argued that a Pomeron +f structure is neither compatible with flavoring nor with schemes in which flavoring is somehow absorbed away. In contrast, flavoring is required for consistency with experiment by the Chew-Rosenzweig hypothesis of the Pomeron-f identity. A description of flavoring threshold effects on the Reggeon Field Theory at current energies is presented

  5. Hadronic total cross sections: which pomeron do they prefer

    International Nuclear Information System (INIS)

    Kobylinsky, N.A.; Kosenko, A.I.; Martynov, E.S.; Timokhin, V.V.

    1985-01-01

    All data on nucleon-nucleon and meson-nucleon total cross sections are analyzed in a scheme with varying pomeron shape and standard form of secondary reggeons. Two solutions are found which result in essentially different asymptotic behaviour, but describe equally well the data at energies attained. Two theoretical possibilities for the pomeron are discussed: the dipole and the froissaron

  6. Introduction to the pomerons

    International Nuclear Information System (INIS)

    Kwiecinski, J.

    1996-11-01

    Elements of the pomerons phenomenology within the Regge pole exchange picture are recalled. This includes discussion of the high energy behaviour of total cross-sections, the triple pomerons limit of the diffractive dissociation and the single particle distribution in the central region. The BFKL pomerons and QCD expectation for the small x behaviour of the deep inelastic scattering structure functions are discussed. The detailed measurements of the the hadronic final state in deep inelastic scattering at small x probing the QCD pomerons are described. The deep inelastic diffraction is also discussed. (author). 69 refs

  7. Soft and hard pomerons

    International Nuclear Information System (INIS)

    Maor, Uri; Tel Aviv Univ.

    1995-09-01

    The role of s-channel unitarity screening corrections, calculated in the eikonal approximation, is investigated for soft Pomeron exchange responsible for elastic and diffractive hadron scattering in the high energy limit. We examine the differences between our results and those obtained from the supercritical Pomeron-Regge model with no such corrections. It is shown that screening saturation is attained at different scales for different channels. We then proceed to discuss the new HERA data on hard (PQCD) Pomeron diffractive channels and discuss the relationship between the soft and hard Pomerons and the relevance of our analysis to this problem. (author). 18 refs, 9 figs, 1 tab

  8. Pomeron-Quark Coupling from Charge Conjugation Invariance

    International Nuclear Information System (INIS)

    Zhou Lijuan; Wu Qing; Ma Weixing; Gu Yunting

    2006-01-01

    Based on the charge conjugation invariance and the vacuum property of the Pomeron, we point out that the commonly used vector vertex of the Pomeron coupling to quark is incorrect since it contradicts with the Pomeron property. We also claim that the soft Pomeron could be a tensor glueball ξ(2230) with quantum numbers I G J PC = 0 + 2 ++ and total decay width Γ tot ≅100 MeV, which lies on the soft Pomeron trajectory α p = 1.08+0.20t. Therefore, the coupling vertex of the soft Pomeron to quark should be tensorial which is invariant under the charge conjugation and can explain why the inadequate vector coupling, γ μ , of the soft Pomeron to quark is successful in dealing with Pomeron physics.

  9. Pomeron calculus in zero transverse dimensions: Summation of pomeron loops and generating functional for multiparticle production processes

    International Nuclear Information System (INIS)

    Levin, E.; Prygarin, A.

    2008-01-01

    In this paper we address two problems in pomeron calculus in zero transverse dimensions: the summation of the pomeron loops and the calculation of the processes of multiparticle generation. We introduce a new generating functional for these processes and obtain the evolution equation for it. We argue that in the kinematic range given by 1 2 ) S Y S ), we can reduce the pomeron calculus to the exchange of non-interacting pomerons with the renormalized amplitude of their interaction with the target. Therefore, the summation of the pomeron loops can be performed using the Mueller-Patel-Salam-Iancu approximation. (orig.)

  10. The Phenomenological Pomeron. What is it?

    International Nuclear Information System (INIS)

    Donnachie, A.

    1994-01-01

    The standard phenomenology of the soft pomeron is recalled. The evidence for the soft pomeron having a well-defined Parton content is outlined. The role of the pomeron in deep inelastic scattering at small x is discussed, and it is suggested that the standard phenomenology is incompatible with the HERA data. It is shown how minijets can be included naturally as part of the soft pomeron, and that they do not contribute separately to total cross sections

  11. The relation between the pomeron intercept and the triple-pomeron coupling

    International Nuclear Information System (INIS)

    Kopeliovich, B.Z.; Lapidus, L.I.

    1978-01-01

    It is shown in the parton model (PM) that the pomeron intercept αsub(P)(0)=1 + Δ and the triple-pomeron coupling lambda are strongly correlated: Δ = lambda. For this reason the critical behaviour in the reggeon field theory is impossible. In the supercritical case PM allows one to distinguish between the conditions of validity of the Amati and Cardy approaches

  12. Flavor and baryon quantum numbers and their nondiffractive renormalizations of the Pomeron

    International Nuclear Information System (INIS)

    Dash, J.W.; Jones, S.T.; Manesis, E.K.

    1978-01-01

    We present a theoretical review and a detailed phonomenological description of the ''flavoring'' of the bare Pomeron pole at t = 0 (i.e., the nondiffractive renormalization of its multiperipheral unitarity sum by strange quarks, charmed quarks, diquarks,...) from an ''unflavored'' intercept alpha-circumflex = 0.85 to a ''flavored'' intercept α approx. = 1.08. Experimentally, flavoring effects seem to converge rapidly; hence this number is probably close to the bare intercept of the Reggeon field theory. We treat NN, πN, and KN total cross sections and real to imaginary amplitude ratios. We do not observe oscillations. We pay particular attention to 2sigma/sub K/N - sigma/sub piN/ which rises monotonically. We present a closely related combination of inelastic diffraction cross sections which decreases monotonically, indicating that vacuum amplitudes are not simply the sum of a Pomeron pole and an ideally mixed f. In fact we argue that a Pomeron + f structure is neither compatible with flavoring nor with schemes in which flavoring is somehow absorbed away. In contrast, flavoring is required for consistency with experiment by the Chew-Rosenzweig hypothesis of the Pomeron-f identity. We close with a description of flavoring threshold effects on the Reggeon field theory at current energies

  13. Soft pomeron and lower-trajectory intercepts

    International Nuclear Information System (INIS)

    Cudell, J.R.; Kang, K.

    1999-01-01

    We present a preliminary report on the determination of the intercepts and couplings of the soft pomeron and of the p/ω and f/a trajectories from the largest data set available for all total cross sections and real parts of the hadronic amplitudes. Factorization is reasonably satisfied by the pomeron couplings, which allows us to make predictions on γγ and γp total cross sections. In addition we show that these data cannot discriminate between fits based on a simple Regge pomeron-pole and on an asymptotic log 2 s-type behaviour, implying that the effect of unitarization is negligible. Also we examine the range of validity in energy of the fit, and the bounds that these data lace on the odderon and on the hard pomeron. (author)

  14. Confinement and the Pomeron

    International Nuclear Information System (INIS)

    White, A.R.

    1989-01-01

    The importance of confinement for obtaining a unitary high-energy limit for QCD is discussed. ''Minijets'' are argued to build up non-unitary behavior endash when k T > Λ is imposed. For minijets to mix with low k T Pomeron Field Theory describing confinement, and give consistent asymptotic behavior, new ''quarks'' must enter the theory above the minijet transverse momentum scale. The Critical Pomeron is the resulting high-energy limit. 22 refs

  15. The hard gluon component of the QCD Pomeron

    International Nuclear Information System (INIS)

    White, A.R.

    1996-01-01

    The authors argue that deep-inelastic diffractive scaling provides fundamental insight into the QCD Pomeron. The logarithmic scaling violations seen experimentally are in conflict with the scale-invariance of the BFKL Pomeron and with phenomenological two-gluon models. Instead the Pomeron appears as a single gluon at short-distances, indicating the appearance of a Super-Critical phase of Reggeon Field Theory. That the color compensation takes place at a longer distance is consistent with the Pomeron carrying odd color charge parity

  16. Preasymptotical corrections to the pomeron exchange

    International Nuclear Information System (INIS)

    Volkovitskij, P.E.

    1985-01-01

    IN the frame of quark-gluon model for strong interactions, based on the topological expansion and string model, the planar diagrams are connected with Regge poles and the cylinder diagrams correspond to the pomeron. In earlier works it was shown that in this approach strong exchange degeneracy has to take place. This fact in the case of the pomeron with intercept αsub(D)(O)>1 is in disagreement with experiment. In the present paper the preasymptotical corrections to the pomeron exchange are calculated. It is shown that these corrections remove the dissagreement

  17. Four-pomeron couplings in cut reggeon field theory

    International Nuclear Information System (INIS)

    Grassberger, P.

    1980-01-01

    Four-pomeron cutting rules are studied in cut reggeon field theory (CRFT). Without any microscopic model, CRFT allows for three different 4-pomeron couplings. Demanding that CRFT is interpretable as a Markov process, only one of these couplings remains. The cutting rules for the 4-pomeron vertex thus become unique, disagreeing with those found in weak coupling diameter 3 theory. (orig.)

  18. Color, flavor, duality, and the Pomeron

    International Nuclear Information System (INIS)

    Dash, J.W.

    1980-01-01

    At Nsub(c)/Nsub(f) = infinitely such that quark loops are absent the Harari-Freund (HF) P+f model of diffraction can be motivated through the identification Pomeron approx. glueball, f approx. leading planar trajectory. At Nsub(c) = 3, the presence of confinement-related mass scales introduced by quark loops is a basic complication that can easily change this situation to, e.g. a dominant P - f identity structure. Aurenche and Gonzales Mestres (AGM) have argued that diffraction is essentially identical at Nsub(c)/Nsub(f) = infinitely and at Nsub(c) = 3. They further claim to have generated the HF scheme directly at Nsub(c) = 3 through the novel mechanism of a multiperipheral iteration of daughters that becomes the P. We respond to these arguments. We give a general qualitative discussion of changes expected in the Nsub(c)/Nsub(f) = infinitely to Nsub(c) = 3 transition. Important hadron scattering quantities like particle multiplicities are very different in dynamics dominated by glue and at Nsub(c) = 3, unlike other quantities like resonance width to mass ratio. We argue that the weak coupling disal model is not a reliable guide to Nsub(c) = 3 dynamics. We criticize AGM's 'daughter generated Pomeron' and we close with a brief summary of other attempts to generate the P + f model. (orig./HSI)

  19. Soft Pomeron in Holographic QCD

    CERN Document Server

    Ballon-Bayona, Alfonso; Costa, Miguel S; Djurić, Marko

    2016-01-01

    We study the graviton Regge trajectory in Holographic QCD as a model for high energy scattering processes dominated by soft pomeron exchange. This is done by considering spin J fields from the closed string sector that are dual to glueball states of even spin and parity. In particular, we construct a model that governs the analytic continuation of the spin J field equation to the region of real J < 2, which includes the scattering domain of negative Maldelstam variable t. The model leads to approximately linear Regge trajectories and is compatible with the measured values of 1.08 for the intercept and 0.25 GeV$^{-2}$ for the slope of the soft pomeron. The intercept of the secondary pomeron trajectory is in the same region of the subleading trajectories, made of mesons, proposed by Donnachie and Landshoff, and should therefore be taken into account.

  20. On a possible test of the hard-Pomeron theory

    International Nuclear Information System (INIS)

    Ioffe, B.L.

    1992-01-01

    In the last few years there have been discussions of the fact that the Pomeron-the Regge pole responsible for high-energy scattering-has in reality a double role: a soft Pomeron built of multiperipheral hadron exchange and a hard Pomeron described by gluon exchanges in QCD. Recently, Bjorken emphasized the need to distinguish these two forms of the Pomeron. The question arises of whether it is possible to distinguish the hard and soft Pomeron experimentally. According to the hard-Pomeron concept, the hadron-hadron total cross section is determined by the imaginary part of the forward scattering amplitude corresponding to two-gluon exchange with ladder corrections. This mechanism dominates in the case of scattering of particles built from heavy quarks (a good example is γγ scattering) and also in the case of virtual-particle scattering (for example, virtual photons, where quark pairs must also be included in the ladder). These processes are hard (γ virt γ virt scattering) or impossible (γγ scattering) to observe experimentally. Bjorken suggested another process whose cross section is determined by hard-Pomeron exchange - double diffractional hadron-hadron (e.g., pp) scattering at high energies with jet production in the projectile and target fragmentation regions. If the momentum transfer from the projectile to the target is in the intermediate region, |t|∼1 GeV, and events are selected with a rapidity gap in the rapidity distribution of produced particles between the two fragmentation regions, then, according to Bjorken, a process determined by the hard Pomeron will be observed. The author addresses this proposal

  1. Summing pomeron loops in the dipole approach

    International Nuclear Information System (INIS)

    Levin, E.; Miller, J.; Prygarin, A.

    2008-01-01

    In this paper, we argue that in the kinematic range given by 1 S 2 ) S Y S ) , we can reduce the pomeron calculus to the exchange of non-interacting pomerons, with the renormalised amplitude of their interaction with the target. Therefore, the summation of the pomeron loops can be performed using the improved Mueller, Patel, Salam and Iancu approximation, and this leads to the geometrical scaling solution. This solution, is found for the simplified BFKL kernel. We reproduce the findings of Hatta and Mueller, that there are overlapping singularities. We suggest a way of dealing with these singularities

  2. Pomeron fusion and central η and η' meson production

    International Nuclear Information System (INIS)

    Kochelev, N.I.; Morii, T.; Vinnikov, A.V.

    1999-01-01

    The contribution of pomeron fusion to the cross section of η and η ' productions in double-diffractive scattering has been calculated within the Donnachie-Landshoff model of pomeron. It is shown that the double pomeron exchange mechanism does not explain the full set of the recent data of WA102 Collaboration, though it might not be inconsistent with η ' productions

  3. The triple-pomeron regime and structure function of the pomeron in diffractive deep inelastic scattering at very small x

    International Nuclear Information System (INIS)

    Nikolaev, N.N.; Zakharov, B.G.

    1994-01-01

    We develop the novel description of diffractive deep inelastic scattering based on the technique of lightcone wave functions of multiparton Fock states of the photon. The technique takes advantage of the exact diagonalization of the diffractive S-matrix in the dipole-cross section representation. In this paper we derive properties of the diffractive dissociation of virtual photons in the triple-pomeron regime. We demonstrate that the photon-pomeron interactions can be described by the partonic structure function, which satisfies the conventional GLDAP evolution equations. We identify the valence and sea (anti) quark and the valence gluon structure functions of the pomeron. We show how the gluon structure of the pomeron can be described by the constituent gluon wave function. We derive the leading unitarization correction to the rising structure functions at small x and conclude that the unitarized structure function satisfies the linear GLDAP evolution equations. This result holds even when the multipomeron exchanges are included. (orig.)

  4. The supercritical pomeron in QCD

    International Nuclear Information System (INIS)

    White, A. R.

    1998-01-01

    Deep-inelastic diffractive scaling violations have provided fundamental insight into the QCD pomeron, suggesting a single gluon inner structure rather than that of a perturbative two-gluon bound state. This talk outlines a derivation of a high-energy, transverse momentum cut-off, confining solution of QCD. The pomeron, in first approximation, is a single reggeized gluon plus a ''wee parton'' component that compensates for the color and particle properties of the gluon. This solution corresponds to a super-critical phase of Reggeon Field Theory

  5. J/Ψ and φ Electro-production in Pomeron Exchange Model

    International Nuclear Information System (INIS)

    Liu Baorong; Tan Zhenqiang; Gu Yunting; He Xiaorong; Zhou Lijuan; Ma Weixing

    2007-01-01

    Based on Pomeron exchange model, J/Ψ and φ production in electro-proton interaction are investigated with both linear and non-linear Pomeron trajectory. The experimental differential cross sections measured as a function of the kinematic variable Q 2 ,W and t are reproduced successfully in the model. Our conclusions are that the Pomeron exchange model is a successful description of J/Ψ and φ electro-productions on the proton, and that the linear trajectory is a good approximation to non-linearity of the Pomeron trajectory.

  6. Analytic multi-Regge theory and the pomeron in QCD. 1

    International Nuclear Information System (INIS)

    White, A.R.

    1991-01-01

    This paper reports on the formalism of analytic multi-Regge theory developed as a basis for the study of abstract critical and super-critical pomeron high-energy behavior and for related studies of the Regge behavior of spontaneously broken gauge theories and the pomeron in QCD. Asymptotic domains of analyticity for multiparticle amplitudes are shown to follow from properties of field theory and S-matrix theory. General asymptotic dispersion relations are then derived for such amplitudes in which the spectral components are described by the graphical formalism of hexagraphs. Further consequences are distinct Sommerfeld-Watson representations for each hexagraph spectral component, together with a complete set of angular momentum plane unitarity equations which control the form of all multi-Regge amplitudes. Because of this constraint of reggeon unitarity the critical pomeron solution of the reggeon field theory gives the only known non-trivial unitary high-energy S-matrix. By exploiting the full structure of multi-Regge amplitudes as the pomeron becomes super-critical, one can study the simultaneous modification of hadrons and the pomeron. The result is a completely consistent description of the super-critical pomeron appearing in hadron scattering. Reggeon unitarity is satisfied in the super-critical phase by the appearance of a massive gluon (Reggeized vector particle) coupling pair-wise to the pomeron

  7. The Pomeron and hadrons through infra-red analysis of QCD

    International Nuclear Information System (INIS)

    White, A.R.

    1981-01-01

    Infra-red analysis of QCD in the Regge limit is argued to lead to confinement with chiral symmetry breaking. The resulting Pomeron depends strongly on the centre of the gauge group with SU(3) colour producing uniquely the experimentally observed even signature, factorizing, Pomeron. The critical Pomeron (asymptotic rising cross-sections) occurs when QCD is saturated with quarks. New calculations are reviewed showing strong evidence for the emergence of the critical Pomeron diffraction peak at present accelerator energies. This leads to exciting predictions for diffraction scattering at p antip collider energies which could become the most precise experimental confirmation of QCD

  8. The soft pomeron and HERA

    International Nuclear Information System (INIS)

    Donnachie, A.; Landshoff, P.V.

    1996-01-01

    The standard phenomenology of the soft pomeron in hadron-hadron interactions is recalled briefly. The model is confronted with the HERA data for the total photoproduction cross section, deep inelastic scattering, diffractive vector meson photoproduction and diffractive electroproduction of vector mesons. Although much of the data can be explained by the model, there are some aspects of the HERA data which require a more rapid variation with energy than can be incorporated. It is argued that the perturbative (BFKL) pomeron cannot give a sufficiently large contribution to explain these observations. Possible non-perturbative solutions to this problem are indicated. (author)

  9. The soft pomeron and HERA

    International Nuclear Information System (INIS)

    Donnachie, A.; Landshoff, P.V.

    1996-01-01

    The standard phenomenology of the soft pomeron in hadron-hadron interactions is recalled briefly. The model is confronted with the HERA data for the total photoproduction cross section, deep inelastic scattering, diffractive vector meson photoproduction and diffractive electroproduction of vector mesons. Although much of the data can be explained by the model, there are some aspects of the HERA data which require a more rapid variation with energy than can be incorporated. It is argued that the perturbative (BFKL) pomeron cannot give a sufficiently large contribution to explain these observations. Possible nonperturbative solutions to this problem are indicated. (author)

  10. Experimental evidence for a vector-like behaviour of Pomeron exchange

    CERN Document Server

    Barberis, D.; Close, F.E.; Danielsen, K.M.; Donskov, S.V.; Earl, B.C.; Evans, D.; French, B.R.; Hino, T.; Inaba, S.; Jacholkowski, A.; Jacobsen, T.; Khaustov, G.V.; Kinson, J.B.; Kirk, A.; Kondashov, A.A.; Lednev, A.A.; Lenti, V.; Minashvili, I.; Peigneux, J.P.; Romanovsky, V.; Russakovich, N.; Semenov, A.; Shagin, P.M.; Shimizu, H.; Singovsky, A.V.; Sobol, A.; Stassinaki, M.; Stroot, J.P.; Takamatsu, K.; Tsuru, T.; Villalobos Baillie, O.; Votruba, M.F.; Yasu, Y.

    1999-01-01

    Evidence is presented that the Pomeron act as a non-conserved vector current. A study has been made of the azimuthal angle phi, which is defined as the angle between the pT vectors of the two outgoing protons, in the reaction pp -> pp(X0) for those resonances (X0) which are compatible with being produced by double Pomeron exchange. These distributions have been compared with a model which describes the Pomeron as a non-conserved vector current and a qualitative agreement is found. In addition, when one of the particles exchanged is known to have spin 0, namely pi-Pomeron exchange, the phi distribution is flat.

  11. QCD-motivated Pomeron and diffractive hadronic cross sections at high energies

    International Nuclear Information System (INIS)

    Anisovich, V.V.; Dakhno, L.G.; Nikonov, V.A.

    1996-01-01

    The cross sections for soft diffractive processes in pp (or p-barp) and πp collisions are calculated by using the QCD-motivated Pomeron. Unitarization of the s-channel amplitude is performed in the eikonal approximation. Color screening is taken into account in the quark structure of hadrons. The resulting description of diffractive processes leads to the parameters of the bare Pomeron P that are close to the corresponding parameters of the Lipatov Pomeron. The parameters of the bare Pomeron and three-reggeon block PGG (G is a reggeized gluon) are fixed by fitting data at moderately high energies. Predictions for ultrahigh energies are made. The intercept for the bare Pomeron is obtained. It is consistent with data on deep-inelastic scattering at small x

  12. Diffusion corrections to the hard pomeron

    CERN Document Server

    Ciafaloni, Marcello; Müller, A H; Ciafaloni, Marcello; Taiuti, Martina

    2001-01-01

    The high-energy behaviour of two-scale hard processes is investigated in the framework of small-x models with running coupling, having the Airy diffusion model as prototype. We show that, in some intermediate high-energy regime, the perturbative hard Pomeron exponent determines the energy dependence, and we prove that diffusion corrections have the form hinted at before in particular cases. We also discuss the breakdown of such regime at very large energies, and the onset of the non-perturbative Pomeron behaviour.

  13. Geometrical scaling and the real part of the Pomeron

    International Nuclear Information System (INIS)

    Dias de Deus, J.

    1975-07-01

    Consequences of the hypothesis of geometrical scaling of the inelastic overlap function applied to the Pomeron amplitude are discussed. From analiticity and crossing symmetry some predictions are given for the asymptotic real part of the Pomeron. (author)

  14. One-Particle Inclusive Distribution in the Unitarized Pomeron Models

    CERN Document Server

    Alkin, A; Romanets, E; Pauk, V

    2010-01-01

    It is shown that starting from the pomeron contribution with intercept P (0) > 1 one can obtain in a quasi-eikonal approach inclusive cross section which is similar to contribution of triple pole (at t = 0) pomeron. Generalizing this analogy we consider tripole and dipole pomeron contributions to inclusive cross section. They lead to hni / ln3 s (tripole) or hni / ln2 s (dipole) and describe well the data on charged hadron distributions in ¯pp. Predictions of one particle pt and rapidity distributions for LHC energies are given.

  15. Double Pomeron Exchange from the ISR to the SSC

    International Nuclear Information System (INIS)

    Albrow, M.G.

    1989-01-01

    After a general introduction to Double Pomeron Exchange I show how the existence of the process was demonstrated at the CERN Intersecting Storage Rings and discuss its value there as a spectroscopic tool in meson/glueball studies. At higher collision energies as now available at the Super Proton Synchrotron and Fermilab pp-bar Colliders it would be very interesting to study hard processes in Double Pomeron Exchange and investigate Pomeron structure. The still higher Large Hadron Collider and Superconducting Super Collider energies extend the range of this physics dramatically, possibly into the electroweak sector. (author)

  16. The BFKL pomeron calculus in the dipole approach

    International Nuclear Information System (INIS)

    Kozlov, M.; Levin, E.; Prygarin, A.

    2007-01-01

    In this paper we continue to pursue a goal of finding an effective theory for high energy interaction in QCD based on the colour dipole approach, for which the BFKL pomeron calculus gives a low energy limit. The key problem, that we try to solve in this paper is the probabilistic interpretation of the BFKL pomeron calculus in terms of the colourless dipoles and their interactions. We demonstrate that the BFKL pomeron calculus has two equivalent descriptions: (i) one is the generating functional which gives a clear probabilistic interpretation of the processes of high energy scattering and also provides a Hamiltonian-like description of the system of interacting dipoles; (ii) the second is the Langevin equation with a specific noise term which is rather complicated. We found that at high energies this Langevin equation can be reduced to the Langevin equation for directed percolation in the momentum space if the impact parameter is large, namely, b1/k, where k is the transverse momentum of a dipole. Unfortunately, this simplified form of Langevin equation is not applicable for summation of pomeron loops, where one integrates over all possible values of impact parameter. We show that the BFKL pomeron calculus with two vertices (splitting P->P+P and merging P+P->P of pomerons) can be interpreted as a system of colourless dipoles with two processes: the decay of one dipole into two and the merging of two dipoles into one dipole. However, a number of assumptions we have to make on the way to simplify the noise term in the Langevin equation and/or to apply the probabilistic interpretation, therefore, we can consider both of these approaches in the present form only as the QCD motivated models

  17. Probing the Pomeron

    International Nuclear Information System (INIS)

    Albrow, M.; Donnachie, A.; Geist, W.; Landshoff, P.; Schlein, P.

    1986-01-01

    The authors present the results from experiments on elastic pp scattering at s=52.8 GeV and panti p scattering at s=52.6 GeV and s=546 GeV. All results show a dip in the differential cross section which is interpreted as resulting from Pomerons. (HSI).

  18. Intermediate mass distribution of the dual resonance pomeron

    International Nuclear Information System (INIS)

    Chiu, C.B.; Matsuda, S.

    1978-01-01

    The intermediate mass distribution of the dual resonance pomeron is determined at the one-loop level and it is shown that the mass distribution obtained is remarkably similar to a suitably defined mass distribution in the dual multiperipheral model. Thus it is suggestive to identify the intermediate states of the dual resonance pomeron with multiperipheral processes. (Auth.)

  19. Pomeron models and exchange degeneracy of the Regge trajectories

    International Nuclear Information System (INIS)

    Kontros, J.; Kontros, K.; Lengyel, A.

    2000-01-01

    Two models for the Pomeron, supplemented by exchange-degenerate sub-leading Regge trajectories, are fitted to the forward scattering data for a number of reactions. By considering new Pomeron models, we extend the recent results of the COMPAS group, being consistent with our predecessors

  20. Soft and hard pomerons: Is there a distinction?

    International Nuclear Information System (INIS)

    Bjorken, J.D.

    1991-07-01

    One of the big unsolved problems of QCD remains the problem of the Pomeron: what is the relation of high energy elastic and diffractive phenomena to the underlying theory? This is not a subject in which I have actively worked. But my interest in it has in this year increased greatly. The reason has to do with ideas for experimentation at SSC/LHC which either directly address the problem or which require the understanding of strong-interaction diffractive phenomena as backgrounds for discovery-physics processes involving electroweak boson exchanges. I will in this talk omit these motivations, which can be found elsewhere, and instead concentrate on some personal veiwpoints regarding the Pomeron which may or may not be conventional. The main question has to do with the distinction between the original, old-fashioned ''soft'' Pomeron of the 1960s, built out of multiperipheral hadron-exchanges, and the more modern perturbative-QCD ''hard'' Pomeron, built out of multiperipheral gluon exchanges. The perspective I offer comes mainly from two sources: one is heavy-flavor physics, and the other is the Manohar-Georgi view of constituent quark physics. 27 refs., 5 figs

  1. Pomeron in perturbative QCD - its elementary theory and possible phenomenology at HERA

    International Nuclear Information System (INIS)

    Kwiecinski, J.

    1992-04-01

    Theoretical ideas concerning the Pomeron in perturbative QCD are reviewed. The Lipatov equation with asymptotic freedom effects taken into account is recalled and the corresponding spectrum of eigenvalues controlling the bare Pomeron intercept analysed. Possible phenomenological implications of the perturbative QCD Pomeron for deep inelastic scattering at the HERA ep collider are briefly discussed. 9 figs., 49 refs. (author)

  2. A model for soft high-energy scattering: Tensor pomeron and vector odderon

    Energy Technology Data Exchange (ETDEWEB)

    Ewerz, Carlo, E-mail: C.Ewerz@thphys.uni-heidelberg.de [Institut für Theoretische Physik, Universität Heidelberg, Philosophenweg 16, D-69120 Heidelberg (Germany); ExtreMe Matter Institute EMMI, GSI Helmholtzzentrum für Schwerionenforschung, Planckstraße 1, D-64291 Darmstadt (Germany); Maniatis, Markos, E-mail: mmaniatis@ubiobio.cl [Departamento de Ciencias Básicas, Universidad del Bío-Bío, Avda. Andrés Bello s/n, Casilla 447, Chillán 3780000 (Chile); Nachtmann, Otto, E-mail: O.Nachtmann@thphys.uni-heidelberg.de [Institut für Theoretische Physik, Universität Heidelberg, Philosophenweg 16, D-69120 Heidelberg (Germany)

    2014-03-15

    A model for soft high-energy scattering is developed. The model is formulated in terms of effective propagators and vertices for the exchange objects: the pomeron, the odderon, and the reggeons. The vertices are required to respect standard rules of QFT. The propagators are constructed taking into account the crossing properties of amplitudes in QFT and the power-law ansätze from the Regge model. We propose to describe the pomeron as an effective spin 2 exchange. This tensor pomeron gives, at high energies, the same results for the pp and pp{sup -bar} elastic amplitudes as the standard Donnachie–Landshoff pomeron. But with our tensor pomeron it is much more natural to write down effective vertices of all kinds which respect the rules of QFT. This is particularly clear for the coupling of the pomeron to particles carrying spin, for instance vector mesons. We describe the odderon as an effective vector exchange. We emphasise that with a tensor pomeron and a vector odderon the corresponding charge-conjugation relations are automatically fulfilled. We compare the model to some experimental data, in particular to data for the total cross sections, in order to determine the model parameters. The model should provide a starting point for a general framework for describing soft high-energy reactions. It should give to experimentalists an easily manageable tool for calculating amplitudes for such reactions and for obtaining predictions which can be compared in detail with data. -- Highlights: •A general model for soft high-energy hadron scattering is developed. •The pomeron is described as effective tensor exchange. •Explicit expressions for effective reggeon–particle vertices are given. •Reggeon–particle and particle–particle vertices are related. •All vertices respect the standard C parity and crossing rules of QFT.

  3. Helicity in proton–proton elastic scattering and the spin structure of the pomeron

    Directory of Open Access Journals (Sweden)

    Carlo Ewerz

    2016-12-01

    Full Text Available We discuss different models for the spin structure of the nonperturbative pomeron: scalar, vector, and rank-2 symmetric tensor. The ratio of single-helicity-flip to helicity-conserving amplitudes in polarised high-energy proton–proton elastic scattering, known as the complex r5 parameter, is calculated for these models. We compare our results to experimental data from the STAR experiment. We show that the spin-0 (scalar pomeron model is clearly excluded by the data, while the vector pomeron is inconsistent with the rules of quantum field theory. The tensor pomeron is found to be perfectly consistent with the STAR data.

  4. Prompt photon production in double-Pomeron-exchange events at the LHC

    Energy Technology Data Exchange (ETDEWEB)

    Kohara, A.K., E-mail: kendi@if.ufrj.br [Centre de Physique Théorique, École Polytechnique, CNRS, Université Paris-Saclay, F-91128 Palaiseau (France); Instituto de Física – Universidade Federal do Rio de Janeiro, C.P. 68528, Rio de Janeiro 21945-970, RJ (Brazil); Marquet, C., E-mail: cyrille.marquet@polytechnique.edu [Centre de Physique Théorique, École Polytechnique, CNRS, Université Paris-Saclay, F-91128 Palaiseau (France)

    2016-06-10

    Within the resolved Pomeron model of hard diffractive scattering, we compute prompt photon production in double-Pomeron-exchange events in proton–proton collisions. Using specific kinematical constraints chosen according to the acceptances of the forward proton detectors of experiments at the Large Hadron Collider, we provide estimates for inclusive and isolated photon production. This is done using the JetPhox program. We find that next-to-leading order corrections to the hard process are important and must be included in order to correctly constrain the quark and gluon content of the Pomeron from such processes at the LHC.

  5. Prompt photon production in double-Pomeron-exchange events at the LHC

    International Nuclear Information System (INIS)

    Kohara, A.K.; Marquet, C.

    2016-01-01

    Within the resolved Pomeron model of hard diffractive scattering, we compute prompt photon production in double-Pomeron-exchange events in proton–proton collisions. Using specific kinematical constraints chosen according to the acceptances of the forward proton detectors of experiments at the Large Hadron Collider, we provide estimates for inclusive and isolated photon production. This is done using the JetPhox program. We find that next-to-leading order corrections to the hard process are important and must be included in order to correctly constrain the quark and gluon content of the Pomeron from such processes at the LHC.

  6. Soft pomerons and the forward LHC data

    Science.gov (United States)

    Broilo, M.; Luna, E. G. S.; Menon, M. J.

    2018-06-01

    Recent data from LHC13 by the TOTEM Collaboration on σtot and ρ have indicated disagreement with all the Pomeron model predictions by the COMPETE Collaboration (2002). On the other hand, as recently demonstrated by Martynov and Nicolescu (MN), the new σtot datum and the unexpected decrease in the ρ value are well described by the maximal Odderon dominance at the highest energies. Here, we discuss the applicability of Pomeron dominance through fits to the most complete set of forward data from pp and p bar p scattering. We consider an analytic parameterization for σtot (s) consisting of non-degenerated Regge trajectories for even and odd amplitudes (as in the MN analysis) and two Pomeron components associated with double and triple poles in the complex angular momentum plane. The ρ parameter is analytically determined by means of dispersion relations. We carry out fits to pp and p bar p data on σtot and ρ in the interval 5 GeV-13 TeV (as in the MN analysis). Two novel aspects of our analysis are: (1) the dataset comprises all the accelerator data below 7 TeV and we consider three independent ensembles by adding: either only the TOTEM data (as in the MN analysis), or only the ATLAS data, or both sets; (2) in the data reductions to each ensemble, uncertainty regions are evaluated through error propagation from the fit parameters, with 90% CL. We argument that, within the uncertainties, this analytic model corresponding to soft Pomeron dominance, does not seem to be excluded by the complete set of experimental data presently available.

  7. Hadron Spectroscopy in Double Pomeron Exchange Experiments

    Energy Technology Data Exchange (ETDEWEB)

    Albrow, Michael [Fermilab

    2016-11-15

    Central exclusive production in hadron-hadron collisions at high energies, for example p + p -> p + X + p, where the "+" represents a large rapidity gap, is a valuable process for spectroscopy of mesonic states X. At collider energies the gaps can be large enough to be dominated by pomeron exchange, and then the quantum numbers of the state X are restricted. Isoscalar JPC = 0++ and 2++ mesons are selected, and our understanding of these spectra is incomplete. In particular, soft pomeron exchanges favor gluon-dominated states such as glueballs, which are expected in QCD but not yet well established. I will review some published data.

  8. Diffractive hard photoproduction at HERA and evidence for the gluon content of the pomeron

    International Nuclear Information System (INIS)

    Derrick, M.; Krakauer, D.; Magill, S.

    1995-01-01

    Inclusive jet cross sections for events with a large rapidity gap with respect to the proton direction from the reaction ep→jet+X with quasi-real photons have been measured with the ZEUS detector. The cross sections refer to jets with transverse energies E T jet >8 GeV. The data show the characteristics of a diffractive process mediated by pomeron exchange. Assuming that the events are due to the exchange of a pomeron with partonic structure, the quark and gluon content of the pomeron is probed at a scale ∼(E T jet ) 2 . A comparison of the measurements with model predictions based on QCD plus Regge phenomenology requires a contribution of partons with a hard momentum density in the pomeron. A combined analysis of the jet cross sections and recent ZEUS measurements of the diffractive structure function in deep inelastic scattering gives the first experimental evidence for the gluon content of the pomeron in diffractive hard scattering processes. The data indicate that between 30% and 80% of the momentum of the pomeron carried by partons is due to hard gluons. (orig.)

  9. Heavy quark production in photon-Pomeron interactions at high energies

    Energy Technology Data Exchange (ETDEWEB)

    Machado, M. M. [Instituto Federal de Ciencia, Educacao e Tecnologia Farroupilha, Campus Sao Borja, Rua Otaviano Castilho Mendes, 355, CEP 97670-000, Sao Borja, RS (Brazil); Goncalves, V. P. [Instituto de Fisica e Matematica - IFM, Universidade Federal de Pelotas, Caixa Postal 354, CEP 96010-900, RS (Brazil)

    2013-03-25

    The diffractive heavy quark cross sections are estimated considering photon-Pomeron interactions in hadron - hadron at RHIC, Tevatron, and CERN LHC energies. We assume the validity of the hard diffractive factorization and calculate the charm and bottom total cross sections and rapidity distributions using the diffractive parton distribution functions of the Pomeron obtained by the H1 Collaboration at DESY-HERA. Such processes are sensitive to the gluon content of the Pomeron at high energies and are a good place to constrain the behavior of this distribution. We also compare our predictions with those obtained using the dipole model, and verify that these processes are a good test of the different mechanisms for heavy quarks diffractive production at hadron colliders.

  10. The meson and the baryon in the one-loop dual model of the pomeron

    International Nuclear Information System (INIS)

    Pennington, M.R.; Gula, A.

    1975-01-01

    In the lowest order dual loop perturbation theory the crossing and factorisation properties of the pomeron are considered. It is shown that the baryon loop is the necessary complement of the single crossed meson loop in building the low-energy pomeron. Recent experimental indications that in this energy region the pomeron is different in MM, MB and BB processes are naturally explained. (Auth.)

  11. Building up reggeons and the pomeron from duality and unitarity

    International Nuclear Information System (INIS)

    Sakai, N.

    1975-07-01

    The subject is treated under the following headings: duality; unitarity; duality and unitarity; 1/N expansion; Reggeon bootstrap; Pomeron equation; triple Pomeron. The results are summarized: (1) combining duality with unitarity, powerful constraints are obtained; (2) many phenomenological successes have been obtained since some practical methods of calculation were devised; and (3) even the complete unitarization is hopeful; 1/N expansion may be useful for this purpose. (author)

  12. Diffusion into infrared and unitarization of the Balitskii-Fadin-Kuraev-Lipatov Pomeron

    International Nuclear Information System (INIS)

    Golec-Biernat, K.; Motyka, L.; Stasto, A.M.

    2002-01-01

    The Balitskii-Fadin-Kuraev-Lipatov (BFKL) Pomeron in perturbative QCD is plagued by the lack of unitarity and diffusion into the infrared region of gluon virtualities. These two problems are intimately related. We perform numerical studies of the evolution equation proposed by Balitskii and Kovchegov which unitarizes the BFKL Pomeron. We show how diffusion into the infrared region is suppressed due to the emergence of a saturation scale and scaling behavior. We study the universality of this phenomenon as well as its dependence on subleading corrections to the BFKL Pomeron such as the running coupling and kinematic constraint. These corrections are very important for phenomenological applications

  13. Studies of the Triple Pomeron Vertex in perturbative QCD and its applications in phenomenology

    International Nuclear Information System (INIS)

    Kutak, K.

    2006-12-01

    We study the properties of the Triple Pomeron Vertex in the perturbative QCD using the twist expansion method. Such analysis allows us to find the momenta configurations preferred by the vertex. When the momentum transfer is zero, the dominant contribution in the limit when N c →∞ comes from anticollinear pole. This is in agreement with result obtained without expanding, but by direct averaging of the Triple Pomeron Vertex over angles. Resulting theta functions show that the anticollinear configuration is optimal for the vertex. In the finite N c case the collinear term also contributes. Using the Triple Pomeron Vertex we construct a pomeron loop and we also consider four gluon propagation between two Triple Pomeron Vertices. We apply the Triple Pomeron Vertex to construct the Hamiltonian from which we derive the Balitsky-Kovchegov equation for an unintegrated gluon density. In order to apply this equation to phenomenology, we apply the Kwiecinski-Martin-Stasto model for higher order corrections to a linear part of the Balitsky-Kovchegov equation. We introduce the definition of the saturation scale which reflects properties of this equation. Finally, we use it for computation of observables, such as the F 2 structure function and diffractive Higgs boson production cross section. The impact of screening corrections on F 2 is negligible, but those effects turn out to be significant for diffractive Higgs boson production at LHC

  14. The gauge properties of the dual model pomeron-reggeon vertex their derivation and their consequences

    CERN Document Server

    Brink, L; Scherk, J

    1973-01-01

    Study of the non-planar orientable single dual loop diagrams in 26 space-time dimensions has revealed an infinite positive-definite spectrum of 'pomeron' intermediate states which couple to reggeons via a bilinear pomeron-reggeon vertex operator. General algebraic techniques are developed to derive the behaviour of this vertex with respect to the Visasoro gauge operators. A reflection and transmission behaviour is found, reminiscent of the behaviour of a wave incident at the interface between two different media (in this case reggeonic and pomeronic). These gauge properties are such as to guarantee the desired 'good properties', namely completeness of the transverse reggeon states when coupled between physical reggeon states on one side, and on the other side, either physical pomeron states or else physical reggeon states created via an intermediate pomeron. This is yet another example of the amazing and gratifying self-consistency of the dual model with respect to duality, transversality and unitarity. (13 r...

  15. Photon and pomeron-induced production of dijets in pp, pA and AA collisions

    Energy Technology Data Exchange (ETDEWEB)

    Basso, E. [Universidade Federal da Grande Dourados (UFGD), Faculdade de Ciencias Exatas e Tecnologias, Dourados, MS (Brazil); Goncalves, V.P. [Universidade Federal de Pelotas (UFPel), Instituto de Fisica e Matematica, Pelotas, RS (Brazil); Kohara, A.K. [Universidade Federal do Rio de Janeiro (UFRJ), Instituto de Fisica, Rio de Janeiro, RJ (Brazil); Centro Brasileiro de Pesquisas Fisicas (CBPF), Rio de Janeiro, RJ (Brazil); Rangel, M.S. [Universidade Federal do Rio de Janeiro (UFRJ), Instituto de Fisica, Rio de Janeiro, RJ (Brazil)

    2017-09-15

    In this paper we present a detailed comparison of the dijet production by photon-photon, photon-pomeron and pomeron-pomeron interactions in pp, pA and AA collisions at the LHC energy. The transverse momentum, pseudo-rapidity and angular dependencies of the cross sections are calculated at LHC energy using the Forward Physics Monte Carlo (FPMC), which allows one to obtain realistic predictions for the dijet production with two leading intact hadrons. We see that the γIP channel is dominant at forward rapidities in pp collisions and in the full kinematical range in the nuclear collisions of heavy nuclei. Our results indicate that the analysis of dijet production at the LHC can be useful to test the resolved pomeron model as well as to constrain the magnitude of the absorption effects. (orig.)

  16. Studies of the Triple PomeronVertex in perturbative QCD and its applications in phenomenology

    Energy Technology Data Exchange (ETDEWEB)

    Kutak, K.

    2006-12-15

    We study the properties of the Triple Pomeron Vertex in the perturbative QCD using the twist expansion method. Such analysis allows us to find the momenta configurations preferred by the vertex. When the momentum transfer is zero, the dominant contribution in the limit when N{sub c}{yields}{infinity} comes from anticollinear pole. This is in agreement with result obtained without expanding, but by direct averaging of the Triple Pomeron Vertex over angles. Resulting theta functions show that the anticollinear configuration is optimal for the vertex. In the finite N{sub c} case the collinear term also contributes. Using the Triple Pomeron Vertex we construct a pomeron loop and we also consider four gluon propagation between two Triple Pomeron Vertices. We apply the Triple Pomeron Vertex to construct the Hamiltonian from which we derive the Balitsky-Kovchegov equation for an unintegrated gluon density. In order to apply this equation to phenomenology, we apply the Kwiecinski-Martin-Stasto model for higher order corrections to a linear part of the Balitsky-Kovchegov equation. We introduce the definition of the saturation scale which reflects properties of this equation. Finally, we use it for computation of observables, such as the F{sub 2} structure function and diffractive Higgs boson production cross section. The impact of screening corrections on F{sub 2} is negligible, but those effects turn out to be significant for diffractive Higgs boson production at LHC.

  17. Hadronic total cross-sections: separation of pomeron and proper reggeon components

    International Nuclear Information System (INIS)

    Kobylinskij, N.A.; Kosenko, A.I.; Martynov, E.S.; Timokhin, V.V.

    1985-01-01

    All the data on nucleon-nucleon and meson-nucleon total cross sections are analyzed to distinguish the contributions of rho, A 2 and ω reggeons and to separate the two vacuum components - the pomeron and the f-reggeon ones. The ranges of the f-reggeon parameters when the pomeron shape varies over a wide region are determined. It is established that the f-reggeon intercept is much higher than was previously thought

  18. A critical Pomeron-s view of the total and triple-Regge inclusive cross-sections

    International Nuclear Information System (INIS)

    Della Selva, A.; Masperi, L.; Ungkitchanukit, A.; Roberto, V.

    1977-04-01

    An investigation of the total and triple Regge inclusive cross-sections is carried out using a critical pomeron in the framework of reggeon field theory with thresholds. For a model with P and the conventional P' and ω poles, the rise of the total cross-section cannot be accounted for. However, in a model with a single dual-unitarization type vacuum singularity and the ω pole, the data can be adequately described

  19. The soft pomeron and QCD

    International Nuclear Information System (INIS)

    Donnachie, A.

    1996-01-01

    The standard phenomenology of the soft pomeron in hadron-hadron interactions is recalled briefly. The model is confronted with the HERA data for the total photoproduction cross section, deep inelastic scattering, diffractive vector meson photoproduction and diffractive electroproduction of vector mesons. The standard phenomenology is incompatible with some aspects of the HERA data which require a more rapid variation with energy than can be incorporated. Possible solutions to this problem are indicated. (author)

  20. A note on the BFKL Pomeron and the 'Hot Spot' cross section

    International Nuclear Information System (INIS)

    Bartels, J.; Lotter, H.

    1993-03-01

    We comment on the numerical calculation of the Lipatov Pomeron in the measurement of 'Hot Spots' in deep inelastic scattering. We illustrate that previous analytic estimates based upon the leading term in the Lipatov equation are accurate within 20%. We present evidence that numerical calculations should be done with a fixed α s . The use of a running α s appears as an unnecessary complication. We argue that at low Q 2 the BFKL Pomeron requires higher order corrections. (orig.)

  1. Reggeon calculus as a low-order perturbation theory for the Pomeron

    International Nuclear Information System (INIS)

    DeTar, C.

    1975-01-01

    We review the foundations of the Gribov Reggeon calculus with an emphasis on the relationship between the energy-plane and J-plane descriptions of the diagrams of the calculus. The question of the ''large-rapidity-gap cutoff'' for the Pomeron and the problem of signature are treated in more detail than in the traditional approach to the calculus. Except for some slight differences, the main results agree with Gribov's original formulation. We advocate the use of the Reggeon calculus as a refinement on the contemporary ''two-component'' model for the Pomeron and collect some formulas useful for phenomenological applications

  2. The two-component non-perturbative pomeron and the G-Universality

    Energy Technology Data Exchange (ETDEWEB)

    Nicolescu, Basarab E-mail: nicolesc@in2p3.fr

    2001-04-01

    In this communication we present a generalization of the Donnachie-Landshoff model inspired by the recent discovery of a 2-component Pomeron in LLA-QCD by Bartels, Lipatov and Vacca. In particular, we explore a new property, not present in the usual Regge theory - the G-Universality - which signifies the independence of one of the Pomeron components on the nature of the initial and final hadrons. The best description of the p-barp, pp, {pi}{sup {+-}}p, K{sup {+-}}p, {gamma}{gamma} and {gamma}p forward data is obtained when G-universality is imposed. Moreover, the ln{sup 2}s behaviour of the hadron amplitude, first established by Heisenberg, is clearly favoured by the data.

  3. Probing the pomeron structure with quasi-real photons

    International Nuclear Information System (INIS)

    Arteaga-Romero, N.; Kessler, P.

    1986-03-01

    Following a recent suggestion of Ingelman and Schlein, we here consider the possibility of probing the gluonic structure of the pomeron with quasi-real photons, i.e. in reactions e p → e p + 2 jets + X taking place at an ep collider such as HERA

  4. Heterotic Pomeron: high energy hadronic collisions in QCD

    International Nuclear Information System (INIS)

    Chung-I Tan

    1993-01-01

    A unified treatment of high energy collisions in QCD is presented. Using a probabilistic approach, both perturbative (hard) and non-perturbative (soft) components are incorporated in a consistent fashion, leading to a ''Heterotic Pomeron''. As a Regge trajectory, it is non linear, approaching 1 in the limit t → -∞. 2 tabs., 9 refs

  5. Double Pomeron Exchange: from the ISR to the LHC

    CERN Document Server

    Albrow, Michael

    2011-01-01

    I discuss Double Pomeron Exchange processes from their first observation at the CERN Intersecting Storage Rings, focusing on glueball searches, through the observations of exclusive chi_c, photon-photon, and di-jets at the Tevatron, to prospects at the LHC for exclusive Higgs boson production.

  6. Langevin equation in effective theory of interacting QCD pomerons in the limit of large Nc

    International Nuclear Information System (INIS)

    Bondarenko, S.

    2007-01-01

    Effective field theory of interacting BFKL pomerons is investigated and Langevin equation for the theory, which arises after the introduction of additional auxiliary field, is obtained. The Langevin equations are considered for the case of interacting BFKL pomerons with both splitting and merging vertexes and for the interaction which includes additional 'toy' four pomeron interaction vertex. In the latest case an analogy with the Regge field theory in zero dimensions (RFT-0) was used in order to obtain this 'toy' vertex, which coincided with the four point function of two-dimensional conformal field theory obtained in [G.P. Korchemsky, Nucl. Phys. B 550 (1999) 397]. The comparison between the Langevin equations obtained in the frameworks of dipole and RFT approaches is performed, the interpretation of results is given and possible application of obtained equations is discussed

  7. QCD Pomeron in γγ and γ*γ* collisions

    International Nuclear Information System (INIS)

    Kwiecinski, J.; Motyka, L.

    1999-01-01

    Full text: The reaction γγ → J/ΨJ/Ψ is discussed assuming dominance of the QCD BFKL pomeron exchange. We give prediction for the cross-section of this process for LEP2 and TESLA energies. We solve the BFKL equation in the non-forward configuration taking into account dominant non-leading effects which come from the requirement that the virtuality of the exchanged gluons along the gluon ladder is controlled by their transverse momentum squared. We compare our results with those corresponding to the simple two gluon exchange mechanism and with the BFKL pomeron exchange in the leading logarithmic approximation. The BFKL effects are found to generate a steeper t-dependence than the two gluon exchange. The cross-section is found to increase with increasing CM energy W as (W 2 ) 2λ . The parameter λ is slowly varying with W and takes the values λ ∼ 0.23 - 0.28. The magnitude of the total cross-section for the process γγ → J/ΨJ/Ψ is found to increase from 4 to 26 pb within the energy range accessible at LEP2. The magnitude of the total cross-section for the process e + e - → e + e - J/ΨJ/Ψ with antitagged e + and e - is estimated to be around 0.1 pb at LEP2. We analysed the BFKL pomeron contribution to the γ * γ * collision at high energy incorporating the dominant non-leading effects. We confronted our results with the recent preliminary data from LEP for two tagged leptons and gave predictions for the future linear colliders. (authors)

  8. The γ*γ* total cross section and the BFKL pomeron at e+e-colliders

    International Nuclear Information System (INIS)

    Bartels, J.

    1996-08-01

    We present a numerical estimate of the γ*γ* total cross section at LEP and at the designed e + e - next linear collider (NLC), based upon the BFKL Pomeron. We find for the linear collider that the event rate is substantial provided electrons scattered under small angles can be detected, and a measurement of this cross section provides an excellent test of the BFKL Pomeron. For LEP, although the number of events is substantially smaller, and initial study of this process is feasible. (orig.)

  9. The BFKL Pomeron with running coupling constant: how much of its hard nature survives?

    International Nuclear Information System (INIS)

    Haakman, L.P.A.; Kancheli, O.V.; Koch, J.H.

    1998-01-01

    We discuss the BFKL equation with a running gauge coupling and identify in its solutions the contributions originating from different transverse momentum scales. We show that for a running coupling constant the distribution of the gluons making up the BFKL pomeron shifts to smaller transverse momenta so that the dominant part of pomeron can have a non-perturbative origin. It is demonstrated how this soft physics enters into the BFKL solution through the boundary condition. We consider twokinematical regimes leading to different behaviour of the rapidity andtransverse momentum dependence of the gluon distribution. In the diffusion approximation to the BFKL kernel with running α s , we find a sequence of poles which replaces the cut for fixed α s . The second regime corresponds to the singular part of the kernel, which gives the dominant contribution in the limit of very large transverse momenta. Finally, a simple more general picture is obtained for the QCD pomeron in hard processes: it is of soft, non-perturbative nature, but has hard ends of DGLAP type. (orig.)

  10. The gold flashlight: Coherent photons (and Pomerons) at RHIC

    International Nuclear Information System (INIS)

    Klein, S.; Scannapieco, E.

    1997-06-01

    The Relativistic Heavy Ion Collider (RHIC) will be the first heavy ion accelerator energetic enough to produce hadronic final states via coherent γγ, γP, and PP interactions. Because the photon flux scales as Z 2 , up to an energy of about γℎc/R ∼ 3 GeV/c, the γγ interaction rates are large. RHIC γP interactions test how Pomerons couple to nuclei and measure how different vector mesons, including the J/ψ, interact with nuclear matter. PP collisions can probe Pomeron couplings. Because these collisions can involve identical initial states, for identical final states, the γγ, γP, and PP channels may interfere, producing new effects. The authors review the physics of these interactions and discuss how these signals can be detected experimentally, in the context of the STAR detector. Signals can be separated from backgrounds by using isolation cuts (rapidity gaps) and p perpendicular. The authors present Monte Carlo studies of different backgrounds, showing that representative signals can be extracted with good rates and signal to noise ratios

  11. Forward gluon production in hadron-hadron scattering with Pomeron loops

    International Nuclear Information System (INIS)

    Iancu, E.

    2006-01-01

    We discuss new physical phenomena expected in particle production in hadron-hadron collisions at high energy, as a consequence of Pomerons loop effects in the evolution equations for the Color Glass Condensate. We focus on gluon production in asymmetric, 'dilute-dense', collisions: a dilute projectile scatters off a dense hadronic target, whose gluon distribution is highly evolved. This situation is representative for particle production in proton-proton collisions at forward rapidities (say, at LHC) and admits a dipole factorization similar to that of deep inelastic scattering (DIS). We show that at sufficiently large forward rapidities, where the Pomerons loop effects become important in the evolution of the target wavefunction, gluon production is dominated by 'black spots' (saturated gluon configurations) up to very large values of the transverse momentum, well above the average saturation momentum in the target. In this regime, the produced gluon spectrum exhibits diffusive scaling, so like DIS at sufficiently high energy. (authors)

  12. Forward gluon production in hadron-hadron scattering with Pomeron loops

    Energy Technology Data Exchange (ETDEWEB)

    Iancu, E. [CEA Saclay, Service de Physique Th orique (DSM/SPhT), Unite de recherche associ e au CNRS (URA D2306), 91 - Gif-sur-Yvette (France). Direction des Sciences de la Matiere; Marquet, C.; Soyez, G. [CEA Saclay, Service de Physique Th orique (DSM/SPhT), Unite de recherche associ e au CNRS (URA D2306), 91 - Gif-sur-Yvette (France). Direction des Sciences de la Matiere; Liege Univ., Fundamental Theoretical Physics Group (Belgium)

    2006-07-01

    We discuss new physical phenomena expected in particle production in hadron-hadron collisions at high energy, as a consequence of Pomerons loop effects in the evolution equations for the Color Glass Condensate. We focus on gluon production in asymmetric, 'dilute-dense', collisions: a dilute projectile scatters off a dense hadronic target, whose gluon distribution is highly evolved. This situation is representative for particle production in proton-proton collisions at forward rapidities (say, at LHC) and admits a dipole factorization similar to that of deep inelastic scattering (DIS). We show that at sufficiently large forward rapidities, where the Pomerons loop effects become important in the evolution of the target wavefunction, gluon production is dominated by 'black spots' (saturated gluon configurations) up to very large values of the transverse momentum, well above the average saturation momentum in the target. In this regime, the produced gluon spectrum exhibits diffusive scaling, so like DIS at sufficiently high energy. (authors)

  13. Reggeon, Pomeron and Glueball, Odderon-Hadron-Hadron Interaction at High Energies--From Regge Theory to Quantum Chromodynamics

    Institute of Scientific and Technical Information of China (English)

    XIONG Wen-Yuan; HU Zhao-Hui; WANG Xin-Wen; ZHOU Li-Juan; XIA Li-Xin; MA Wei-Xing

    2008-01-01

    Based on analysis of scattering matrix S, and its properties such as analyticity, unitarity, Lorentz invariance, and crossing symmetry relation, the Regge theory was proposed to describe hadron-hadron scattering at high energies before the advent of QCD, and correspondingly a Reggeon concept was born as a mediator of strongly interaction. This theory serves as a successful approach and has explained a great number of experimental data successfully, which proves that the Regge theory can be regarded as a basic theory of hadron interaction at high energies and its validity in many applications. However, as new experimental data come out, we have some difficulties in explaining the data. The new experimental total cross section violates the predictions of Regge theory, which shows that Regge formalism is limited in its applications to high energy data. To understand new experimental measurements, a new exchange theory was consequently born and its mediator is called Pomeron, which has vacuum quantum numbers. The new theory named as Pomeron exchange theory which reproduces the new experimental data of diffractive processes successfully. There are two exchange mediators: Reggeon and Pomeron. Reggeon exchange theory can only produce data at the relatively lower energy region, while Pomeron exchange theory fits the data only at higher-energy region, separately. In order to explain the data in the whole energy region, we propose a Reggeon-Pomeron model to describe high-energy hadron-hadron scattering and other diffractive processes. Although the Reggeon-Pomeron model is successful in describing high-energy hadron-hadron interaction in the whole energy region, it is a phenomenological model After the advent of QCD, people try to reveal the mystery of the phenomenological theory from QCD since hadron-hadron processes is a strong interaction, which is believed to be described by QCD. According to this point of view, we study the QCD nature of Reggeon and Pomeron. We claim

  14. Di-jet production by double pomeron exchange in CDF

    International Nuclear Information System (INIS)

    Albrow, M.G.

    1998-05-01

    We have studied events with a high-x F antiproton and two central jets with E T > 7 GeV in CDF, in p anti p collisions at √s = 1800 GeV. We find an excess of events with a rapidity gap at least 3.5 units wide in the proton direction, which we interpret as di-jet production in double pomeron exchange events

  15. Unitarization of pomeron and Regge phenomenology of deep inelastic scattering.

    Energy Technology Data Exchange (ETDEWEB)

    Martynov, E S

    1994-12-31

    Using conventional Regge approach we consider unitarization of supercritical pomeron in DIS and then describe the total photon-proton cross-section and the proton structure functions in the region W{sup 2} = Q{sup 2}(1/x-1) + m{sup 2} {>=} 9 GeV{sup 2}, including the small-x data from HERA. (author). 15 refs., 1 tab., 15 figs.

  16. Bounds on the pomeron intercept from accelerator data

    International Nuclear Information System (INIS)

    Luna, E.G.S.; Menon, M.J.

    2002-01-01

    Taking into account the discrepancies in the pp and p-bar p total cross section data at √8 = 1.8 TeV, we estimate upper and lower bounds for the soft pomeron intercept. We make use of the Donnachie-Landshoff parameterization for the total cross section and derivative analyticity relations in order to calculate the ρ parameter. Individual and global fits to these quantities and tests with the subtraction constant allow to infer α IP (0) = 1.092 as upper bound and α IP (0) = 1.077 as lower bound. (author)

  17. The Pomeron: yesterday, today and tomorrow

    Energy Technology Data Exchange (ETDEWEB)

    Levin, E [Centro Brasileiro de Pesquisas Fisicas (CBPF), Rio de Janeiro, RJ (Brazil); [Petersburg Nuclear Physics Institute, St Petersburg (Russian Federation). Theory Dept.

    1995-03-01

    These lectures are a review of the main ideas and approaches to the Pomeron structure. They intend to give a brief review of the Reggeon Calculus, which was the first attempt to build the effective theory of the strong interaction at high energy. In spite of the fact that this approach turns out to be inconsistent and in lectures we show why, the Reggeon approach was and is the main source of the terminology and phenomenology for high energy soft interactions. The detail description of the QCD approach to high energy interaction. They try to combine the rigorous approach in perturbative QCD with more simple, intuitive guess based on general properties of QCD to clarify our expectations and predictions. (author). 52 refs, 36 figs, 1 tab.

  18. The Pomeron: yesterday, today and tomorrow

    International Nuclear Information System (INIS)

    Levin, E.; Petersburg Nuclear Physics Institute, St Petersburg

    1995-03-01

    These lectures are a review of the main ideas and approaches to the Pomeron structure. They intend to give a brief review of the Reggeon Calculus, which was the first attempt to build the effective theory of the strong interaction at high energy. In spite of the fact that this approach turns out to be inconsistent and in lectures we show why, the Reggeon approach was and is the main source of the terminology and phenomenology for high energy soft interactions. The detail description of the QCD approach to high energy interaction. They try to combine the rigorous approach in perturbative QCD with more simple, intuitive guess based on general properties of QCD to clarify our expectations and predictions. (author). 52 refs, 36 figs, 1 tab

  19. A momentum space analysis of the Triple Pomeron Vertex in pQCD

    International Nuclear Information System (INIS)

    Bartels, J.

    2007-10-01

    We study properties of the momentum space Triple Pomeron Vertex in perturbative QCD. Particular attention is given to the collinear limit where transverse momenta on one side of the vertex are much larger than on the other side. We also comment on the kernels in nonlinear evolution equations. (orig.)

  20. A momentum space analysis of the Triple Pomeron Vertex in pQCD

    Energy Technology Data Exchange (ETDEWEB)

    Bartels, J. [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Kutak, K. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)]|[Instytut Fizyki Jadrowej Polskiej Akademii Nauk, Krakow (Poland)

    2007-10-15

    We study properties of the momentum space Triple Pomeron Vertex in perturbative QCD. Particular attention is given to the collinear limit where transverse momenta on one side of the vertex are much larger than on the other side. We also comment on the kernels in nonlinear evolution equations. (orig.)

  1. Dipole pomeron and. pi. /sup -/p elastic scattering at high energies

    Energy Technology Data Exchange (ETDEWEB)

    Fazal-E-Aleem (Panjab Univ., Lahore (Pakistan). Physics Dept.)

    1982-10-16

    The differential cross-sections for high-energy ..pi../sup -/p elastic scattering showing structure near -t=4 (GeV/c)/sup 2/ for psub(L)=50 and 200 GeV/c together with total cross-sections for 50<=psub(L)<=370 GeV/c, and with -t extending up to 11 (GeV/c)/sup 2/ have been fitted by using a dipole pomeron model.

  2. Heavy quark-antiquark pair production by double pomeron exchange in pp and AA collisions on the CMS

    International Nuclear Information System (INIS)

    Agababyan, N.M.; Ajrapetyan, M.G.; Galoyan, A.S.; Zarubin, P.I.; Malakhov, A.I.; Melkumov, G.L.; Chatrchyan, S.A.; Enkovskij, L.L.

    1998-01-01

    Events in hadronic and nuclear collisions, which contain a central dijet system together with the two quasi-elastically scattered beam particles are usually described by double pomeron scattering. We investigate these processes for central production of heavy quark-antiquark pairs on the LHC by using the CMS detector. The total and differential cross sections with the formation of cc bar and bb bar pairs for various interactions assumed to a realization on the LHC are evaluated. It is especially marked that this process can be used for investigations of various aspects of low-x physics, for instance, for a research of the gluon and quark distributions in the pomerons, the factorization hypothesis, coherent interaction of nuclei, nuclei shadowing and so on

  3. The perturbative (QCD) Pomeron and Odderon in the photon initiated reactions

    International Nuclear Information System (INIS)

    Ginzburg, I.F.

    1992-07-01

    The cross sections of neutral meson M production in the exclusive γγ → MM', γq → Mq or semiexclusive γγ → MX processes (two or three gluon exchange) in the semihard region s≥|t|>1 GeV 2 , μ 2 ≤M X 2 <|t| are calculated. The relation of investigated processes to the problem of the perturbative Pomeron and Odderon is discussed. The possibility of measurements is also discussed. (author) 23 refs.; 3 figs

  4. An application of the Dipole Pomeron model to the pion-proton elastic scattering

    International Nuclear Information System (INIS)

    Covolan, R.J.M.; Leite, E.E.; Montanha, J.; Soares, M.S.

    1994-01-01

    The Pomeron model is applied to the pion-proton elastic scattering aiming to describe the total and differential cross sections and the ρ ratio between the scattering amplitude real and imaginary parts. It is also discussed how far the present available experimental results lead to the necessity of adopting a (α 0 > 1) supercritical trajectory. (author). 3 refs., 4 figs

  5. Dual unitarization scheme with several trajectories

    International Nuclear Information System (INIS)

    Chaichiam, M.; Hayashi, M.

    1977-12-01

    Consequences of bootstrap with several input Regge trajectories are investigated. We find that in a formal treatment of bootstrap the consistency requires the intercept of output Pomeron pole in the one-dimensional case to be larger than one: αsub(B)(0) > 1, a situation reminiscent of the one in the Reggeon field theory. Symmetry breakings of the Pomeron couplings are derived. These couplings coincide with those of the f-dominated Pomeron model of Carlitz-Green-Zee in the approximation, when in the unitarity loops only highest Regge trajectories are included. The case when all possible trajectories are exchanged is also discussed. Predictions of dual unitary model for the slopes of differential cross section for diffractive scattering are made which differ from the ones of the CGZ model. Comparison with the experimentally available data is done. (author)

  6. Real and imaginary parts of hadronic amplitudes, diffractive contributions and the Chew-Rosenzweig pomeron

    International Nuclear Information System (INIS)

    Chiu, C.B.; Tow, D.M.

    1978-01-01

    It is shown that when the f' and the diffractive elastic (and quasi-elastic) contributions are included within the Chew-Rosenzweig type solution for the pomeron, one can explain reasonably well the π and 2K - π total cross sections as well as the ratios of the real over imaginary parts of the forward π and K amplitudes. (Auth.)

  7. Reggeon field theory for large Pomeron loops

    Energy Technology Data Exchange (ETDEWEB)

    Altinoluk, Tolga [Departamento de Física de Partículas and IGFAE, Universidade de Santiago de Compostela,E-15782 Santiago de Compostela, Galicia (Spain); Kovner, Alex [Physics Department, University of Connecticut,2152 Hillside road, Storrs, CT 06269 (United States); Levin, Eugene [Departamento de Física, Universidad Técnica Federico Santa María, and Centro Científico-Tecnolgico de Valparaíso,Avda. España 1680, Casilla 110-V, Valparaíso (Chile); Department of Particle Physics, Tel Aviv University,Tel Aviv 69978 (Israel); Lublinsky, Michael [Physics Department, Ben-Gurion University of the Negev,Beer Sheva 84105 (Israel)

    2014-04-10

    We analyze the range of applicability of the high energy Reggeon Field Theory H{sub RFT} derived in http://dx.doi.org/10.1088/1126-6708/2009/03/109. We show that this theory is valid as long as at any intermediate value of rapidity η throughout the evolution at least one of the colliding objects is dilute. Importantly, at some values of η the dilute object could be the projectile, while at others it could be the target, so that H{sub RFT} does not reduce to either H{sub JIMWLK} or H{sub KLWMIJ}. When both objects are dense, corrections to the evolution not accounted for in http://dx.doi.org/10.1088/1126-6708/2009/03/109 become important. The same limitation applies to other approaches to high energy evolution available today, such as for example (http://dx.doi.org/10.1103/PhysRevD.78.054019; http://dx.doi.org/10.1103/PhysRevD.78.054020 and http://dx.doi.org/10.1016/S0370-2693(00)00571-2; http://dx.doi.org/10.1140/epjc/s2003-01565-9; http://dx.doi.org/10.1016/j.physletb.2005.10.054). We also show that, in its regime of applicability H{sub RFT} can be simplified. We derive the simpler version of H{sub RFT} and in the large N{sub c} limit rewrite it in terms of the Reggeon creation and annihilation operators. The resulting H{sub RFT} is explicitly self dual and provides the generalization of the Pomeron calculus developed in (http://dx.doi.org/10.1016/S0370-2693(00)00571-2; http://dx.doi.org/10.1140/epjc/s2003-01565-9; http://dx.doi.org/10.1016/j.physletb.2005.10.054) by including higher Reggeons in the evolution. It is applicable for description of ‘large’ Pomeron loops, namely Reggeon graphs where all the splittings occur close in rapidity to one dilute object (projectile), while all the merging close to the other one (target). Additionally we derive, in the same regime expressions for single and double inclusive gluon production (where the gluons are not separated by a large rapidity interval) in terms of the Reggeon degrees of freedom.

  8. Reggeon field theory for large Pomeron loops

    International Nuclear Information System (INIS)

    Altinoluk, Tolga; Kovner, Alex; Levin, Eugene; Lublinsky, Michael

    2014-01-01

    We analyze the range of applicability of the high energy Reggeon Field Theory H RFT derived in http://dx.doi.org/10.1088/1126-6708/2009/03/109. We show that this theory is valid as long as at any intermediate value of rapidity η throughout the evolution at least one of the colliding objects is dilute. Importantly, at some values of η the dilute object could be the projectile, while at others it could be the target, so that H RFT does not reduce to either H JIMWLK or H KLWMIJ . When both objects are dense, corrections to the evolution not accounted for in http://dx.doi.org/10.1088/1126-6708/2009/03/109 become important. The same limitation applies to other approaches to high energy evolution available today, such as for example (http://dx.doi.org/10.1103/PhysRevD.78.054019; http://dx.doi.org/10.1103/PhysRevD.78.054020 and http://dx.doi.org/10.1016/S0370-2693(00)00571-2; http://dx.doi.org/10.1140/epjc/s2003-01565-9; http://dx.doi.org/10.1016/j.physletb.2005.10.054). We also show that, in its regime of applicability H RFT can be simplified. We derive the simpler version of H RFT and in the large N c limit rewrite it in terms of the Reggeon creation and annihilation operators. The resulting H RFT is explicitly self dual and provides the generalization of the Pomeron calculus developed in (http://dx.doi.org/10.1016/S0370-2693(00)00571-2; http://dx.doi.org/10.1140/epjc/s2003-01565-9; http://dx.doi.org/10.1016/j.physletb.2005.10.054) by including higher Reggeons in the evolution. It is applicable for description of ‘large’ Pomeron loops, namely Reggeon graphs where all the splittings occur close in rapidity to one dilute object (projectile), while all the merging close to the other one (target). Additionally we derive, in the same regime expressions for single and double inclusive gluon production (where the gluons are not separated by a large rapidity interval) in terms of the Reggeon degrees of freedom

  9. Quark loops and spin-flip effects in pomeron exchange

    International Nuclear Information System (INIS)

    Goloskokov, S.V.

    1991-01-01

    On the basis of QCD at large distances with taking account of some nonperturbative properties of the theory, the possibility of spin-flip effects in high energy hadron processes at fixed momenta transfer is investigated. It is shown that the diagrams with the quark loops in QCD at large distances may lead to the spin-flip amplitude growing as s for s→∞, t-fixed. The confirmation of this result is obtained by calculations of the nonleading contributions from quark loops in t-channel exchange in QED up to the end. Physical mechanisms leading to that behaviour of the spin-flip amplitude is discussed. So we conclude that the pomeron has a complicated spin structure. (orig.)

  10. Gaps between jets in double-Pomeron-exchange processes at the LHC

    CERN Document Server

    Marquet, C; Trzebinski, M; Zlebcik, R

    2013-01-01

    The possibility to measure jet-gap-jet final states in double-Pomeron-exchange events at the LHC is presented. In the context of the ATLAS experiment with additional forward physics detectors, cross sections for different experimental settings and gap definitions are estimated. This is done in the framework of the Forward Physics Monte Carlo interfaced with a perturbative QCD model that successfully reproduces standard jet-gap-jet cross sections at the Tevatron. The extrapolation to LHC energies follows from the Balitsky-Fadin-Kuraev-Lipatov dynamics, implemented in the model at next-to-leading logarithmic accuracy.

  11. Pomeron Odderon interference in production of pi-pi pairs at LHC

    International Nuclear Information System (INIS)

    Wallon, S.; Pire, B.; Schwennsen, F.; Szymanowski, L.

    2009-01-01

    The experimental evidence for Odderon exchange processes is still weak. In this talk, we will show that the Odderon could be observed by interference effects with the Pomeron in charge asymmetries in the production of two pion pairs. After discussing the theoretical framework for our calculation based on high energy factorization and the necessary phenomenological input, the calculation of the charge asymmetry and its result will be presented. We will conclude with a discussion of experimental rates to be expected in ultra-peripheral collisions at the LHC. (author)

  12. A Traffic Restriction Scheme for Enhancing Carpooling

    Directory of Open Access Journals (Sweden)

    Dong Ding

    2017-01-01

    Full Text Available For the purpose of alleviating traffic congestion, this paper proposes a scheme to encourage travelers to carpool by traffic restriction. By a variational inequity we describe travelers’ mode (solo driving and carpooling and route choice under user equilibrium principle in the context of fixed demand and detect the performance of a simple network with various restriction links, restriction proportions, and carpooling costs. Then the optimal traffic restriction scheme aiming at minimal total travel cost is designed through a bilevel program and applied to a Sioux Fall network example with genetic algorithm. According to various requirements, optimal restriction regions and proportions for restricted automobiles are captured. From the results it is found that traffic restriction scheme is possible to enhance carpooling and alleviate congestion. However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.

  13. Pomeron-Odderon interference effects in electroproduction of two pions

    CERN Document Server

    Hägler, P; Szymanowski, L; Teryaev, O V

    2002-01-01

    We study Pomeron-Odderon interference effects giving rise to charge and single-spin asymmetries in diffractive electroproduction of a pi sup + pi sup - pair. We calculate these asymmetries, originating from both longitudinal and transverse polarizations of the virtual photon, in the framework of QCD and in the Born approximation, in a kinematical domain accessible to HERA experiments. We predict a sizable charge asymmetry with a characteristic dependence on the invariant mass of the pi sup + pi sup - pair, which makes this observable very important for establishing the magnitude of the Odderon exchange in hard processes. The single-spin asymmetry turns out to be rather small. We briefly discuss future improvements of our calculations and their possible effects on the results. (orig.)

  14. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  15. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  16. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2015-03-01

    The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.

  17. Around the laboratories: CERN Peering into the Pomeron; New CP-violation experiment

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1992-03-15

    Pomeron Jets - narrow clusters of particles produced in violent collisions - provide a very effective window on the elusive interactions of the quarks and gluons hidden deep inside strongly interacting particles. Predictions of jet production in proton-antiproton collisions depend on knowing the detailed inner structure of the proton, obtained from deep-inelastic lepton-proton interactions. Such predictions agree well with measurements by the big experiments at the CERN and Fermilab proton-antiproton colliders. However there is very little sensitivity to that 'soft' part of the proton structure carrying only a small fraction of the total momentum (called small x in the trade)

  18. Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment

    Directory of Open Access Journals (Sweden)

    Sang-Soo Yeo

    2014-01-01

    Full Text Available This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.

  19. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  20. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  1. Around the laboratories: CERN Peering into the Pomeron; New CP-violation experiment

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    Pomeron Jets - narrow clusters of particles produced in violent collisions - provide a very effective window on the elusive interactions of the quarks and gluons hidden deep inside strongly interacting particles. Predictions of jet production in proton-antiproton collisions depend on knowing the detailed inner structure of the proton, obtained from deep-inelastic lepton-proton interactions. Such predictions agree well with measurements by the big experiments at the CERN and Fermilab proton-antiproton colliders. However there is very little sensitivity to that 'soft' part of the proton structure carrying only a small fraction of the total momentum (called small x in the trade)

  2. The bare parameters of Gribov's Langrangian are understood and determined

    International Nuclear Information System (INIS)

    Bishari, M.

    1977-01-01

    In the context of the ''1/N Dual Unitarization'' scheme, an explicit dynamical study of the triple bare pomeron mechanism which governs the interaction term in Gribov's Lagrangian is presented. Together with the previously established bare pomeron slope and intercept, controlling respectively, the kinetic and mass terms in Gribov's Lagrangian, this work demonstrates the viability of the ''1/N Dual Unitarization'' approach for a field theory of interaction bare pomerons. (author)

  3. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    Science.gov (United States)

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  4. Interference mitigation enhancement of switched-based scheme in over-loaded femtocells

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-01

    This paper proposes adequate methods to improve the interference mitigation capability of a recently investigated switched-based interference reduction scheme in short-range open-access and over-loaded femtocells. It is assumed that the available orthogonal channels for the femtocell network are distributed among operating access points in close vicinity, where each of which knows its allocated channels a priori. For the case when the feedback links are capacity-limited and the available channels can be universally shared and simultaneously used, the paper presents enhanced schemes to identify a channel to serve the desired scheduled user by maintaining the interference power level within a tolerable range. They attempt to either complement the switched-based scheme by minimum interference channel selection or adopt different interference thresholds on available channels, while aiming to reduce the channels examination load. The performance of the proposed schemes is quantified and then compared with those of the single-threshold switched-based scheme via numerical and simulation results. © 2012 IEEE.

  5. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  6. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  7. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  8. QCD Reggeon field theory for every day: Pomeron loops included

    International Nuclear Information System (INIS)

    Altinoluk, Tolga; Kovner, Alex; Peressutti, Javier; Lublinsky, Michael

    2009-01-01

    We derive the evolution equation for hadronic scattering amplitude at high energy. Our derivation includes the nonlinear effects of finite partonic density in the hadronic wave function as well as the effect of multiple scatterings for scattering on dense hadronic target. It thus includes Pomeron loops. It is based on the evolution of the hadronic wave function derived in /cite{foam}. The kernel of the evolution equation defines the second quantized Hamiltonian of the QCD Reggeon Field Theory, H RFT beyond the limits considered so far. The two previously known limits of the evolution: dilute target (JIMWLK limit) and dilute projectile (KLWMIJ limit) are recovered directly from our final result. The Hamiltonian H RFT is applicable for the evolution of scattering amplitude for arbitrarily dense hadronic projectiles/targets - from 'dipole-dipole' to 'nucleus-nucleus' scattering processes.

  9. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Younghwa An

    2012-01-01

    Full Text Available Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das’s authentication scheme, and we have shown that Das’s authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das’s authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  10. Running coupling and pomeron loop effects on inclusive and diffractive DIS cross sections

    Energy Technology Data Exchange (ETDEWEB)

    Ducati, M.B. Gay [Universidade Federal do Rio Grande do Sul, Instituto de Fisica, Porto Alegre (Brazil); CERN, PH-TH, Geneva (Switzerland); Oliveira, E.G. de [Universidade de Sao Paulo, Instituto de Fisica, Sao Paulo (Brazil); Santana Amaral, J.T. de [Universidade Federal de Pelotas, Instituto de Fisica e Matematica, Pelotas (Brazil)

    2012-11-15

    Within the framework of a (1+1)-dimensional model which mimics high-energy QCD, we study the behavior of the cross sections for inclusive and diffractive deep inelastic {gamma} {sup *} h scattering cross sections. We analyze the cases of both fixed and running coupling within the mean-field approximation, in which the evolution of the scattering amplitude is described by the Balitsky-Kovchegov equation, and also through the pomeron loop equations, which include in the evolution the gluon number fluctuations. In the diffractive case, similarly to the inclusive one, suppression of the diffusive scaling, as a consequence of the inclusion of the running of the coupling, is observed. (orig.)

  11. Running coupling and pomeron loop effects on inclusive and diffractive DIS cross sections

    International Nuclear Information System (INIS)

    Ducati, M.B. Gay; Oliveira, E.G. de; Santana Amaral, J.T. de

    2012-01-01

    Within the framework of a (1+1)-dimensional model which mimics high-energy QCD, we study the behavior of the cross sections for inclusive and diffractive deep inelastic γ * h scattering cross sections. We analyze the cases of both fixed and running coupling within the mean-field approximation, in which the evolution of the scattering amplitude is described by the Balitsky-Kovchegov equation, and also through the pomeron loop equations, which include in the evolution the gluon number fluctuations. In the diffractive case, similarly to the inclusive one, suppression of the diffusive scaling, as a consequence of the inclusion of the running of the coupling, is observed. (orig.)

  12. Running coupling and pomeron loop effects on inclusive and diffractive DIS cross sections

    CERN Document Server

    Gay Ducati, M.B.; de Santana Amaral, J.T.

    2012-01-01

    Within the framework of a (1+1)--dimensional model which mimics high energy QCD, we study the behavior of the cross sections for inclusive and diffractive deep inelastic $\\gamma^*h$ scattering cross sections. We analyze the cases of both fixed and running coupling within the mean field approximation, in which the evolution of the scattering amplitude is described by the Balitsky-Kovchegov equation, and also through the pomeron loop equations, which include in the evolution the gluon number fluctuations. In the diffractive case, similarly to the inclusive one, the suppression of the diffusive scaling, as a consequence of the inclusion of the running of the coupling, is observed.

  13. Dispersion tolerance enhancement using an improved offset-QAM OFDM scheme.

    Science.gov (United States)

    Zhao, Jian; Townsend, Paul D

    2015-06-29

    Discrete-Fourier transform (DFT) based offset quadrature amplitude modulation (offset-QAM) orthogonal frequency division multiplexing (OFDM) without cyclic prefix (CP) was shown to offer a dispersion tolerance the same as that of conventional OFDM with ~20% CP overhead. In this paper, we analytically study the fundamental mechanism limiting the dispersion tolerance of this conventional scheme. It is found that the signal and the crosstalk from adjacent subcarriers, which are orthogonal with π/2 phase difference at back to back, can be in-phase when the dispersion increases to a certain value. We propose a novel scheme to overcome this limitation and significantly improve the dispersion tolerance to that of one subcarrier. Simulations show that the proposed scheme can support a 224-Gb/s polarization-division-multiplexed offset-4QAM OFDM signal over 160,000 ps/nm without any CP under 128 subcarriers, and this tolerance scales with the square of the number of subcarriers. It is also shown that this scheme exhibits advantages of greatly enhanced spectral efficiency, larger dispersion tolerance, and/or reduced complexity compared to the conventional CP-OFDM and reduced-guard-interval OFDM using frequency domain equalization.

  14. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-12-08

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.

  15. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-01-01

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792

  16. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2017-12-01

    Full Text Available Vehicle sensor networks (VSNs are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem.

  17. The practical Pomeron for high energy proton collimation

    Energy Technology Data Exchange (ETDEWEB)

    Appleby, R.B. [University of Manchester, The Cockcroft Institute, Manchester (United Kingdom); Barlow, R.J.; Toader, A. [The University of Huddersfield, Huddersfield (United Kingdom); Molson, J.G. [Univ. Paris-Sud, CNRS/IN2P3, Universite Paris-Saclay, LAL, Orsay (France); Serluca, M. [CERN, Geneva (Switzerland)

    2016-10-15

    We present a model which describes proton scattering data from ISR to Tevatron energies, and which can be applied to collimation in high energy accelerators, such as the LHC and FCC. Collimators remove beam halo particles, so that they do not impinge on vulnerable regions of the machine, such as the superconducting magnets and the experimental areas. In simulating the effect of the collimator jaws it is crucial to model the scattering of protons at small momentum transfer t, as these protons can subsequently survive several turns of the ring before being lost. At high energies these soft processes are well described by Pomeron exchange models. We study the behaviour of elastic and single-diffractive dissociation cross sections over a wide range of energy, and show that the model can be used as a global description of the wide variety of high energy elastic and diffractive data presently available. In particular it models low mass diffraction dissociation, where a rich resonance structure is present, and thus predicts the differential and integrated cross sections in the kinematical range appropriate to the LHC. We incorporate the physics of this model into the beam tracking code MERLIN and use it to simulate the resulting loss maps of the beam halo lost in the collimators in the LHC. (orig.)

  18. The practical Pomeron for high energy proton collimation

    Science.gov (United States)

    Appleby, R. B.; Barlow, R. J.; Molson, J. G.; Serluca, M.; Toader, A.

    2016-10-01

    We present a model which describes proton scattering data from ISR to Tevatron energies, and which can be applied to collimation in high energy accelerators, such as the LHC and FCC. Collimators remove beam halo particles, so that they do not impinge on vulnerable regions of the machine, such as the superconducting magnets and the experimental areas. In simulating the effect of the collimator jaws it is crucial to model the scattering of protons at small momentum transfer t, as these protons can subsequently survive several turns of the ring before being lost. At high energies these soft processes are well described by Pomeron exchange models. We study the behaviour of elastic and single-diffractive dissociation cross sections over a wide range of energy, and show that the model can be used as a global description of the wide variety of high energy elastic and diffractive data presently available. In particular it models low mass diffraction dissociation, where a rich resonance structure is present, and thus predicts the differential and integrated cross sections in the kinematical range appropriate to the LHC. We incorporate the physics of this model into the beam tracking code MERLIN and use it to simulate the resulting loss maps of the beam halo lost in the collimators in the LHC.

  19. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  20. Harvested Energy Prediction Schemes for Wireless Sensor Networks: Performance Evaluation and Enhancements

    Directory of Open Access Journals (Sweden)

    Muhammad

    2017-01-01

    Full Text Available We review harvested energy prediction schemes to be used in wireless sensor networks and explore the relative merits of landmark solutions. We propose enhancements to the well-known Profile-Energy (Pro-Energy model, the so-called Improved Profile-Energy (IPro-Energy, and compare its performance with Accurate Solar Irradiance Prediction Model (ASIM, Pro-Energy, and Weather Conditioned Moving Average (WCMA. The performance metrics considered are the prediction accuracy and the execution time which measure the implementation complexity. In addition, the effectiveness of the considered models, when integrated in an energy management scheme, is also investigated in terms of the achieved throughput and the energy consumption. Both solar irradiance and wind power datasets are used for the evaluation study. Our results indicate that the proposed IPro-Energy scheme outperforms the other candidate models in terms of the prediction accuracy achieved by up to 78% for short term predictions and 50% for medium term prediction horizons. For long term predictions, its prediction accuracy is comparable to the Pro-Energy model but outperforms the other models by up to 64%. In addition, the IPro scheme is able to achieve the highest throughput when integrated in the developed energy management scheme. Finally, the ASIM scheme reports the smallest implementation complexity.

  1. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs.

    Science.gov (United States)

    Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang

    2017-06-17

    Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.

  2. One-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures for enhanced hydrogen generation

    Energy Technology Data Exchange (ETDEWEB)

    Gao, Hongqing [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Zhang, Peng, E-mail: Zhangp@zzu.edu.cn [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Hu, Junhua, E-mail: Hujh@zzu.edu.cn [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Pan, Jimin [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); Fan, Jiajie [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Shao, Guosheng [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Institute for Renewable Energy and Environmental Technologies, University of Bolton, Bolton BL35AB (United Kingdom)

    2017-01-01

    Graphical abstract: We reported one-dimensional solid-state Z-scheme photosynthetic heterojunction system with Pt nanoparticle as an electron collector and WO{sub 3} as a hole collector, leading to effective charge separation. - Highlights: • The composite nanofibers were fabricated by facile electrospinning technique. • The composite nanofibers exhibited enhanced activity for H{sub 2} evolution. • Enhanced activity is due to the formation of Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterojunction. - Abstract: One-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures were fabricated by integrating a facile electrospinning technique and subsequent annealing in air. X-ray diffraction, scanning electron microscopy, transmission electron microscopy, X-ray photoelectron spectroscopy and UV–vis diffuse reflectance spectroscopy, were used to characterize the as-fabricated samples. The results showed that the H{sub 2}-generation of the as-fabricated one-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures (S2) was greatly enhanced compared with pure TiO{sub 2} nanofibers (S0) and TiO{sub 2}/WO{sub 3} nanofibers (S1). The enhanced photocatalyst activities were mainly attributed to the solid-state Z-scheme photosynthetic heterojunction system with Pt nanoparticle as an electron collector and WO{sub 3} as a hole collector, leading to effective charge separation on these semiconductors, which were evidenced by electrochemical impedance spectroscopy (EIS) and photocurrent analysis.

  3. A Novel Magnetic Actuation Scheme to Disaggregate Nanoparticles and Enhance Passage across the Blood–Brain Barrier

    Directory of Open Access Journals (Sweden)

    Ali Kafash Hoshiar

    2017-12-01

    Full Text Available The blood–brain barrier (BBB hinders drug delivery to the brain. Despite various efforts to develop preprogramed actuation schemes for magnetic drug delivery, the unmodeled aggregation phenomenon limits drug delivery performance. This paper proposes a novel scheme with an aggregation model for a feed-forward magnetic actuation design. A simulation platform for aggregated particle delivery is developed and an actuation scheme is proposed to deliver aggregated magnetic nanoparticles (MNPs using a discontinuous asymmetrical magnetic actuation. The experimental results with a Y-shaped channel indicated the success of the proposed scheme in steering and disaggregation. The delivery performance of the developed scheme was examined using a realistic, three-dimensional (3D vessel simulation. Furthermore, the proposed scheme enhanced the transport and uptake of MNPs across the BBB in mice. The scheme presented here facilitates the passage of particles across the BBB to the brain using an electromagnetic actuation scheme.

  4. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    Science.gov (United States)

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  5. Baryon exchange effects in dual unitarisation

    International Nuclear Information System (INIS)

    Hong-Mo, C.; Tsun, T.S.

    1976-05-01

    The effects of baryon exchanges in the renormalisation of Regge trajectories are studied in the dual unitarisation scheme. The main results are that: (i) the Pomeron is boosted above α = 1, giving rising total cross sections beyond baryon-antibaryon thresholds, and (ii) the ω-trajectory remains approximately at α = .5 but acquires a sizeable admixture of the exotic antiq antiq qq state, which enhances its coupling to baryons. There are in addition a number of other interesting predictions. (author)

  6. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2017-12-01

    Full Text Available As an essential part of Internet of Things (IoT, wireless sensor networks (WSNs have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  7. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  8. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  9. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  10. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  11. An Enhanced Three-Level Voltage Switching State Scheme for Direct Torque Controlled Open End Winding Induction Motor

    Science.gov (United States)

    Kunisetti, V. Praveen Kumar; Thippiripati, Vinay Kumar

    2018-01-01

    Open End Winding Induction Motors (OEWIM) are popular for electric vehicles, ship propulsion applications due to less DC link voltage. Electric vehicles, ship propulsions require ripple free torque. In this article, an enhanced three-level voltage switching state scheme for direct torque controlled OEWIM drive is implemented to reduce torque and flux ripples. The limitations of conventional Direct Torque Control (DTC) are: possible problems during low speeds and starting, it operates with variable switching frequency due to hysteresis controllers and produces higher torque and flux ripple. The proposed DTC scheme can abate the problems of conventional DTC with an enhanced voltage switching state scheme. The three-level inversion was obtained by operating inverters with equal DC-link voltages and it produces 18 voltage space vectors. These 18 vectors are divided into low and high frequencies of operation based on rotor speed. The hardware results prove the validity of proposed DTC scheme during steady-state and transients. From simulation and experimental results, proposed DTC scheme gives less torque and flux ripples on comparison to two-level DTC. The proposed DTC is implemented using dSPACE DS-1104 control board interface with MATLAB/SIMULINK-RTI model.

  12. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  13. A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service.

    Science.gov (United States)

    Yang, Xue; Yin, Fan; Tang, Xiaohu

    2017-07-11

    Location-based services (LBS), as one of the most popular location-awareness applications, has been further developed to achieve low-latency with the assistance of fog computing. However, privacy issues remain a research challenge in the context of fog computing. Therefore, in this paper, we present a fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based services, hereafter referred to as FGPQ. In particular, mobile users can obtain the fine-grained searching result satisfying not only the given spatial range but also the searching content. Detailed privacy analysis shows that our proposed scheme indeed achieves the privacy preservation for the LBS provider and mobile users. In addition, extensive performance analyses and experiments demonstrate that the FGPQ scheme can significantly reduce computational and communication overheads and ensure the low-latency, which outperforms existing state-of-the art schemes. Hence, our proposed scheme is more suitable for real-time LBS searching.

  14. Information-Aided Smart Schemes for Vehicle Flow Detection Enhancements of Traffic Microwave Radar Detectors

    Directory of Open Access Journals (Sweden)

    Tan-Jan Ho

    2016-07-01

    Full Text Available For satisfactory traffic management of an intelligent transport system, it is vital that traffic microwave radar detectors (TMRDs can provide real-time traffic information with high accuracy. In this study, we develop several information-aided smart schemes for traffic detection improvements of TMRDs in multiple-lane environments. Specifically, we select appropriate thresholds not only for removing noise from fast Fourier transforms (FFTs of regional lane contexts but also for reducing FFT side lobes within each lane. The resulting FFTs of reflected vehicle signals and those of clutter are distinguishable. We exploit FFT and lane-/or time stamp-related information for developing smart schemes, which mitigate adverse effects of lane-crossing FFT side lobes of a vehicle signal. As such, the proposed schemes can enhance the detection accuracy of both lane vehicle flow and directional traffic volume. On-site experimental results demonstrate the advantages and feasibility of the proposed methods, and suggest the best smart scheme.

  15. Novel scheme for enhancement of fault ride-through capability of doubly fed induction generator based wind farms

    International Nuclear Information System (INIS)

    Vinothkumar, K.; Selvan, M.P.

    2011-01-01

    Research highlights: → Proposed Fault ride-through (FRT) scheme for DFIG is aimed at energy conservation. → The input mechanical energy is stored during fault and utilized at fault clearance. → Enhanced Rotor speed stability of DFIG. → Reduced Reactive power requirement and rapid voltage recovery at fault clearance. → Improved post fault performance of DFIG at fault clearance. -- Abstract: Enhancement of fault ride-through (FRT) capability and subsequent improvement of rotor speed stability of wind farms equipped with doubly fed induction generator (DFIG) is the objective of this paper. The objective is achieved by employing a novel FRT scheme with suitable control strategy. The proposed FRT scheme, which is connected between the rotor circuit and dc link capacitor in parallel with Rotor Side Converter, consists of an uncontrolled rectifier, two sets of IGBT switches, a diode and an inductor. In this scheme, the input mechanical energy of the wind turbine during grid fault is stored and utilized at the moment of fault clearance, instead of being dissipated in the resistors of the crowbar circuit as in the existing FRT schemes. Consequently, torque balance between the electrical and mechanical quantities is achieved and hence the rotor speed deviation and electromagnetic torque fluctuations are reduced. This results in reduced reactive power requirement and rapid reestablishment of terminal voltage on fault clearance. Furthermore, the stored electromagnetic energy in the inductor is transferred into the dc link capacitor on fault clearance and hence the grid side converter is relieved from charging the dc link capacitor, which is very crucial at this moment, and this converter can be utilized to its full capacity for rapid restoration of terminal voltage and normal operation of DFIG. Extensive simulation study carried out employing PSCAD/EMTDC software vividly demonstrates the potential capabilities of the proposed scheme in enhancing the performance of

  16. Novel scheme for enhancement of fault ride-through capability of doubly fed induction generator based wind farms

    Energy Technology Data Exchange (ETDEWEB)

    Vinothkumar, K. [Department of Electrical and Electronics Engineering, National Institute of Technology, Tiruchirappalli, Tamilnadu 620015 (India); Selvan, M.P., E-mail: selvanmp@nitt.ed [Department of Electrical and Electronics Engineering, National Institute of Technology, Tiruchirappalli, Tamilnadu 620015 (India)

    2011-07-15

    Research highlights: {yields} Proposed Fault ride-through (FRT) scheme for DFIG is aimed at energy conservation. {yields} The input mechanical energy is stored during fault and utilized at fault clearance. {yields} Enhanced Rotor speed stability of DFIG. {yields} Reduced Reactive power requirement and rapid voltage recovery at fault clearance. {yields} Improved post fault performance of DFIG at fault clearance. -- Abstract: Enhancement of fault ride-through (FRT) capability and subsequent improvement of rotor speed stability of wind farms equipped with doubly fed induction generator (DFIG) is the objective of this paper. The objective is achieved by employing a novel FRT scheme with suitable control strategy. The proposed FRT scheme, which is connected between the rotor circuit and dc link capacitor in parallel with Rotor Side Converter, consists of an uncontrolled rectifier, two sets of IGBT switches, a diode and an inductor. In this scheme, the input mechanical energy of the wind turbine during grid fault is stored and utilized at the moment of fault clearance, instead of being dissipated in the resistors of the crowbar circuit as in the existing FRT schemes. Consequently, torque balance between the electrical and mechanical quantities is achieved and hence the rotor speed deviation and electromagnetic torque fluctuations are reduced. This results in reduced reactive power requirement and rapid reestablishment of terminal voltage on fault clearance. Furthermore, the stored electromagnetic energy in the inductor is transferred into the dc link capacitor on fault clearance and hence the grid side converter is relieved from charging the dc link capacitor, which is very crucial at this moment, and this converter can be utilized to its full capacity for rapid restoration of terminal voltage and normal operation of DFIG. Extensive simulation study carried out employing PSCAD/EMTDC software vividly demonstrates the potential capabilities of the proposed scheme in

  17. An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

    Directory of Open Access Journals (Sweden)

    Kim Yong-Seok

    2008-01-01

    Full Text Available An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-termination gain of dynamic scheduler. Through system-level simulations, the performance of the proposed algorithm is evaluated in terms of the capacity enhancement of VoIP services. Comparisons with the original persistent scheduling and the HSUPA scheduler reveal that the proposed scheme increases the capacity of VoIP services up to 20%.

  18. Double dissociation in the reaction K-p→K-π+π-Nπ+ at 14.3GeV/c and pomeron factorisation

    International Nuclear Information System (INIS)

    Denegri, D.; Pons, Y.; Borg, A.; Spiro, M.; Paler, K.; Tovey, S.; Combes, C.; Shah, T.P.

    1975-01-01

    Evidence for the double dissociation process K - p→QN*1/2→(antikaon neutral* π - ) (nπ + ) at 14.3GeV/c is presented. The cross section for this process is of the order of 10μb. The production differential cross section is steep, as typical of diffractive processes, and exhibits a strong correlation between the production slope and the dissociation system mass. The mass variation of the differential cross section slope and the total cross section of the double dissociation component are consistent with the factorisable Pomeron exchange model predictions [fr

  19. Magnitude of regge cut contributions in the triple-regge region

    International Nuclear Information System (INIS)

    Bartels, J.; Kramer, G.

    1976-09-01

    Starting from the reggeon calculus, the various possibilities of absorptive Pomeron cut corrections in the triple-Regge region are considered. For the case of pp→pX, we estimate their importance at present day energies. We conclude that at highest ISR energies Pomeron cuts of the eikonal type are not enough, and enhanced diagrams with at least one additional triple Pomeron coupling need to be included. (orig.) [de

  20. Conformal Symmetry as a Template:Commensurate Scale Relations and Physical Renormalization Schemes

    International Nuclear Information System (INIS)

    Brodsky, Stanley J.

    1999-01-01

    Commensurate scale relations are perturbative QCD predictions which relate observable to observable at fixed relative scale, such as the ''generalized Crewther relation'', which connects the Bjorken and Gross-Llewellyn Smith deep inelastic scattering sum rules to measurements of the e + e - annihilation cross section. We show how conformal symmetry provides a template for such QCD predictions, providing relations between observables which are present even in theories which are not scale invariant. All non-conformal effects are absorbed by fixing the ratio of the respective momentum transfer and energy scales. In the case of fixed-point theories, commensurate scale relations relate both the ratio of couplings and the ratio of scales as the fixed point is approached. In the case of the α V scheme defined from heavy quark interactions, virtual corrections due to fermion pairs are analytically incorporated into the Gell-Mann Low function, thus avoiding the problem of explicitly computing and resuming quark mass corrections related to the running of the coupling. Applications to the decay width of the Z boson, the BFKL pomeron, and virtual photon scattering are discussed

  1. arXiv Leading Pomeron Contributions and the TOTEM Data at 13 TeV

    CERN Document Server

    Broilo, M.; Menon, M.J.

    The recent data by the TOTEM Collaboration on $\\sigma_{tot}$ and $\\rho$ at 13 TeV, have shown agreement with a leading Odderon contribution at the highest energies, as demonstrated in the very recent analysis by Martynov and Nicolescu (MN). In order to investigate the same dataset by means of Pomeron dominance, we introduce a general class of forward scattering amplitude, with leading contributions even under crossing, associated with simple, double and triple poles in the complex angular momentum plane. For the lower energy region, we consider the usual non-degenerated Regge trajectories, with even and odd symmetry. The analytic connection between $\\sigma_{tot}$ and $\\rho$ is obtained by means of dispersion relations and we carry out fits to $pp$ and $\\bar{p}p$ data in the interval $\\sqrt{s}=5$ GeV - 13 TeV; following MN we consider only the TOTEM data at the LHC energy region. From the fits, we conclude that the general analytic model, as well as some particular cases representing standard parameterizations...

  2. A Hierarchical Z-Scheme α-Fe2 O3 /g-C3 N4 Hybrid for Enhanced Photocatalytic CO2 Reduction.

    Science.gov (United States)

    Jiang, Zhifeng; Wan, Weiming; Li, Huaming; Yuan, Shouqi; Zhao, Huijun; Wong, Po Keung

    2018-03-01

    The challenge in the artificial photosynthesis of fossil resources from CO 2 by utilizing solar energy is to achieve stable photocatalysts with effective CO 2 adsorption capacity and high charge-separation efficiency. A hierarchical direct Z-scheme system consisting of urchin-like hematite and carbon nitride provides an enhanced photocatalytic activity of reduction of CO 2 to CO, yielding a CO evolution rate of 27.2 µmol g -1 h -1 without cocatalyst and sacrifice reagent, which is >2.2 times higher than that produced by g-C 3 N 4 alone (10.3 µmol g -1 h -1 ). The enhanced photocatalytic activity of the Z-scheme hybrid material can be ascribed to its unique characteristics to accelerate the reduction process, including: (i) 3D hierarchical structure of urchin-like hematite and preferable basic sites which promotes the CO 2 adsorption, and (ii) the unique Z-scheme feature efficiently promotes the separation of the electron-hole pairs and enhances the reducibility of electrons in the conduction band of the g-C 3 N 4 . The origin of such an obvious advantage of the hierarchical Z-scheme is not only explained based on the experimental data but also investigated by modeling CO 2 adsorption and CO adsorption on the three different atomic-scale surfaces via density functional theory calculation. The study creates new opportunities for hierarchical hematite and other metal-oxide-based Z-scheme system for solar fuel generation. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  3. An Enhanced Power Sharing Scheme for Voltage unbalance and harmonics compensation in an islanded AC microgrid

    DEFF Research Database (Denmark)

    Han, Yang; Shen, Pan; Zhao, Xin

    2016-01-01

    In this paper, an enhanced hierarchical control structure with multiple current loop damping schemes for voltage unbalance and harmonics compensation in ac islanded microgrid is proposed to address unequal power sharing problems. The distributed generation (DG) is properly controlled to autonomou......In this paper, an enhanced hierarchical control structure with multiple current loop damping schemes for voltage unbalance and harmonics compensation in ac islanded microgrid is proposed to address unequal power sharing problems. The distributed generation (DG) is properly controlled...... to autonomously compensate voltage unbalance and harmonics while sharing the compensation effort for the real power, reactive power, unbalance and harmonic powers. The proposed control system of the microgrid mainly consists of the positive sequence real and reactive power droop controllers, voltage and current......) technique is adopted to send the compensation command of the secondary control and auxiliary control from the microgrid control center (MGCC) to the local controllers of DG unit. Finally, the hardware-in-the-loop (HIL) results using dSPACE 1006 platform are presented to demonstrate the effectiveness...

  4. Enhanced finite difference scheme for the neutron diffusion equation using the importance function

    International Nuclear Information System (INIS)

    Vagheian, Mehran; Vosoughi, Naser; Gharib, Morteza

    2016-01-01

    Highlights: • An enhanced finite difference scheme for the neutron diffusion equation is proposed. • A seven-step algorithm is considered based on the importance function. • Mesh points are distributed through entire reactor core with respect to the importance function. • The results all proved that the proposed algorithm is highly efficient. - Abstract: Mesh point positions in Finite Difference Method (FDM) of discretization for the neutron diffusion equation can remarkably affect the averaged neutron fluxes as well as the effective multiplication factor. In this study, by aid of improving the mesh point positions, an enhanced finite difference scheme for the neutron diffusion equation is proposed based on the neutron importance function. In order to determine the neutron importance function, the adjoint (backward) neutron diffusion calculations are performed in the same procedure as for the forward calculations. Considering the neutron importance function, the mesh points can be improved through the entire reactor core. Accordingly, in regions with greater neutron importance, density of mesh elements is higher than that in regions with less importance. The forward calculations are then performed for both of the uniform and improved non-uniform mesh point distributions and the results (the neutron fluxes along with the corresponding eigenvalues) for the two cases are compared with each other. The results are benchmarked against the reference values (with fine meshes) for Kang and Rod Bundle BWR benchmark problems. These benchmark cases revealed that the improved non-uniform mesh point distribution is highly efficient.

  5. Direct Z-scheme TiO2/CdS hierarchical photocatalyst for enhanced photocatalytic H2-production activity

    Science.gov (United States)

    Meng, Aiyun; Zhu, Bicheng; Zhong, Bo; Zhang, Liuyang; Cheng, Bei

    2017-11-01

    Photocatalytic H2 evolution, which utilizes solar energy via water splitting, is a promising route to deal with concerns about energy and environment. Herein, a direct Z-scheme TiO2/CdS binary hierarchical photocatalyst was fabricated via a successive ionic layer adsorption and reaction (SILAR) technique, and photocatalytic H2 production was measured afterwards. The as-prepared TiO2/CdS hybrid photocatalyst exhibited noticeably promoted photocatalytic H2-production activity of 51.4 μmol h-1. The enhancement of photocatalytic activity was ascribed to the hierarchical structure, as well as the efficient charge separation and migration from TiO2 nanosheets to CdS nanoparticles (NPs) at their tight contact interfaces. Moreover, the direct Z-scheme photocatalytic reaction mechanism was demonstrated to elucidate the improved photocatalytic performance of TiO2/CdS composite photocatalyst. The photoluminescence (PL) analysis of hydroxyl radicals were conducted to provide clues for the direct Z-scheme mechanism. This work provides a facile route for the construction of redox mediator-free Z-scheme photocatalytic system for photocatalytic water splitting.

  6. Enhanced efficiency of plasma acceleration in the laser-induced cavity pressure acceleration scheme

    International Nuclear Information System (INIS)

    Badziak, J; Rosiński, M; Jabłoński, S; Pisarczyk, T; Chodukowski, T; Parys, P; Rączka, P; Krousky, E; Ullschmied, J; Liska, R; Kucharik, M

    2015-01-01

    Among various methods for the acceleration of dense plasmas the mechanism called laser-induced cavity pressure acceleration (LICPA) is capable of achieving the highest energetic efficiency. In the LICPA scheme, a projectile placed in a cavity is accelerated along a guiding channel by the laser-induced thermal plasma pressure or by the radiation pressure of an intense laser radiation trapped in the cavity. This arrangement leads to a significant enhancement of the hydrodynamic or electromagnetic forces driving the projectile, relative to standard laser acceleration schemes. The aim of this paper is to review recent experimental and numerical works on LICPA with the emphasis on the acceleration of heavy plasma macroparticles and dense ion beams. The main experimental part concerns the research carried out at the kilojoule sub-nanosecond PALS laser facility in Prague. Our measurements performed at this facility, supported by advanced two-dimensional hydrodynamic simulations, have demonstrated that the LICPA accelerator working in the long-pulse hydrodynamic regime can be a highly efficient tool for the acceleration of heavy plasma macroparticles to hyper-velocities and the generation of ultra-high-pressure (>100 Mbar) shocks through the collision of the macroparticle with a solid target. The energetic efficiency of the macroparticle acceleration and the shock generation has been found to be significantly higher than that for other laser-based methods used so far. Using particle-in-cell simulations it is shown that the LICPA scheme is highly efficient also in the short-pulse high-intensity regime and, in particular, may be used for production of intense ion beams of multi-MeV to GeV ion energies with the energetic efficiency of tens of per cent, much higher than for conventional laser acceleration schemes. (paper)

  7. Enhanced signaling scheme with admission control in the hybrid optical wireless (HOW) networks

    DEFF Research Database (Denmark)

    Yan, Ying; Yu, Hao; Wessing, Henrik

    2009-01-01

    that it can support stringent Quality of Service (QoS) requirements. In this paper, we describe and evaluate a resource management framework designed for the HOW networks. There are two parts in the resource management framework The first part is the Enhanced MPCP (E-MPCP) scheme aiming at improving signaling...... dropping probability depend on several factors. These factors include the frame duration, the traffic load and the total number of shared users. The results also highlight that our proposed system achieves significant improvements over the traditional approach in terms of user QoS guarantee and network...

  8. Global mechanisms for sustaining and enhancing PES schemes

    International Nuclear Information System (INIS)

    Farley, Josh; Moulaert, Azur; Lee, Dan; Krause, Abby; Aquino, Andre; Daniels, Amy

    2010-01-01

    An international payment for ecosystem service (IPES) schemes may be one of the only mechanisms available to stimulate the provision of vital non-marketed ecosystem services at the global level, as those nations that benefit from global ecosystem services (GES) cannot readily force other sovereign nations to provide them. Currently, international trade offers trillions of dollars in incentives for countries to convert natural capital into marketable goods and services, and few payments to entice countries to conserve natural capital in order to sustain critical non-marketed ecosystem services. We examine the biophysical characteristics of climate change and biodiversity to understand the obstacles to developing effective IPES schemes. We find that none of the existing schemes for providing GES are adequate, given the scale of the problem. A cap and auction scheme for CO 2 emissions among wealthy nations could fund IPES and simultaneously deter carbon emissions. To disburse funds, we should adapt Brazil's ICMS ecologico, and apportion available funds to targeted countries in proportion to how well they meet specific criteria designed to measure the provision of GES. Individual countries can then develop their own policies for increasing provision of these services, ensured of compensation if they do so. Indirect IPES should include funding for freely available technologies that protect or provide GES, such as the low carbon energy alternatives that will be essential for curbing climate change. Markets rely on the price mechanism to generate profits, which rations technology to those who can afford it, reducing adoption rates, innovation and total value. (author)

  9. Optimized spectroscopic scheme for enhanced precision CO measurements with applications to urban source attribution

    Science.gov (United States)

    Nottrott, A.; Hoffnagle, J.; Farinas, A.; Rella, C.

    2014-12-01

    Carbon monoxide (CO) is an urban pollutant generated by internal combustion engines which contributes to the formation of ground level ozone (smog). CO is also an excellent tracer for emissions from mobile combustion sources. In this work we present an optimized spectroscopic sampling scheme that enables enhanced precision CO measurements. The scheme was implemented on the Picarro G2401 Cavity Ring-Down Spectroscopy (CRDS) analyzer which measures CO2, CO, CH4 and H2O at 0.2 Hz. The optimized scheme improved the raw precision of CO measurements by 40% from 5 ppb to 3 ppb. Correlations of measured CO2, CO, CH4 and H2O from an urban tower were partitioned by wind direction and combined with a concentration footprint model for source attribution. The application of a concentration footprint for source attribution has several advantages. The upwind extent of the concentration footprint for a given sensor is much larger than the flux footprint. Measurements of mean concentration at the sensor location can be used to estimate source strength from a concentration footprint, while measurements of the vertical concentration flux are necessary to determine source strength from the flux footprint. Direct measurement of vertical concentration flux requires high frequency temporal sampling and increases the cost and complexity of the measurement system.

  10. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  11. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  12. Novel security enhancement technique against eavesdropper for OCDMA system using 2-D modulation format with code switching scheme

    Science.gov (United States)

    Singh, Simranjit; Kaur, Ramandeep; Singh, Amanvir; Kaler, R. S.

    2015-03-01

    In this paper, security of the spectrally encoded-optical code division multiplexed access (OCDMA) system is enhanced by using 2-D (orthogonal) modulation technique. This is an effective approach for simultaneous improvement of the system capacity and security. Also, the results show that the hybrid modulation technique proved to be a better option to enhance the data confidentiality at higher data rates using minimum utilization of bandwidth in a multiuser environment. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  13. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  14. New PDE-based methods for image enhancement using SOM and Bayesian inference in various discretization schemes

    International Nuclear Information System (INIS)

    Karras, D A; Mertzios, G B

    2009-01-01

    A novel approach is presented in this paper for improving anisotropic diffusion PDE models, based on the Perona–Malik equation. A solution is proposed from an engineering perspective to adaptively estimate the parameters of the regularizing function in this equation. The goal of such a new adaptive diffusion scheme is to better preserve edges when the anisotropic diffusion PDE models are applied to image enhancement tasks. The proposed adaptive parameter estimation in the anisotropic diffusion PDE model involves self-organizing maps and Bayesian inference to define edge probabilities accurately. The proposed modifications attempt to capture not only simple edges but also difficult textural edges and incorporate their probability in the anisotropic diffusion model. In the context of the application of PDE models to image processing such adaptive schemes are closely related to the discrete image representation problem and the investigation of more suitable discretization algorithms using constraints derived from image processing theory. The proposed adaptive anisotropic diffusion model illustrates these concepts when it is numerically approximated by various discretization schemes in a database of magnetic resonance images (MRI), where it is shown to be efficient in image filtering and restoration applications

  15. An Enhanced Dual Droop Control Scheme for Resilient Active Power Sharing among Paralleled Two-Stage Converters

    DEFF Research Database (Denmark)

    Liu, Hongpeng; Yang, Yongheng; Wang, Xiongfei

    2017-01-01

    Traditional droop-controlled system has assumed that generators can always generate the powers demanded from them. This is true with conventional sources, where fuel supplies are usually planned in advance. For renewable sources, it may also be possible if energy storage is available. Energy...... storage, usually as batteries, may however be expensive, depending on its planned capacity. Renewable sources are therefore sometimes installed as non-dispatch-able sources without storage. This may not be viable for remote grids, where renewable sources may be the only or major type of sources. In those...... cases, traditional droop scheme may not work well when its demanded power cannot be met by some renewable sources due to intermittency. When that happens, the system may become unstable with some sources progressively brought out of generation. To avoid such occurrence, an enhanced dual droop scheme...

  16. Highly enhanced photocatalytic degradation of methylene blue over the indirect all-solid-state Z-scheme g-C{sub 3}N{sub 4}-RGO-TiO{sub 2} nanoheterojunctions

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Fangjun [College of Materials and Energy, South China Agricultural University, Guangzhou 510642 (China); Li, Xin [College of Materials and Energy, South China Agricultural University, Guangzhou 510642 (China); Institute of New Energy and New Materials, Key Laboratory of Energy Plants Resource and Utilization, Ministry of Agriculture, South China Agricultural University, Guangzhou 510642 (China); College of Forestry and Landscape Architecture, South China Agricultural University, Guangzhou 510642 (China); Liu, Wei, E-mail: wlscau@163.com [College of Materials and Energy, South China Agricultural University, Guangzhou 510642 (China); Zhang, Shuting [College of Materials and Energy, South China Agricultural University, Guangzhou 510642 (China)

    2017-05-31

    Highlights: • The indirect Z-scheme g-C{sub 3}N{sub 4}-RGO-TiO{sub 2} photocatalysts were successfully fabricated. • A 3.2-fold activity enhancement was achieved by inserting RGO into g-C{sub 3}N{sub 4}- TiO{sub 2}. • The indirect Z-scheme mechanism was verified by PL spectra and radical trapping. • The multi-functional roles of RGO in enhancing photodegradation were revealed. - Abstract: In the present research work, the ternary indirect all-solid-state Z-scheme nanoheterojunctions, graphitic-C{sub 3}N{sub 4}/reduced graphene oxide/anatase TiO{sub 2} (g-C{sub 3}N{sub 4}-RGO-TiO{sub 2}) with highly enhanced photocatalytic performance were successfully prepared via a simple liquid-precipitation strategy. The photocatalytic activities of indirect all-solid-state Z-scheme g-C{sub 3}N{sub 4}-RGO-TiO{sub 2} nanoheterojunctions were evaluated by the degradation of methylene blue (MB). The results showed that the introduction of RGO as an interfacial mediator into direct Z-scheme g-C{sub 3}N{sub 4}-TiO{sub 2} nanocomposites can remarkably enhance their photocatalytic activities. The as-obtained indirect all-solid-state Z-scheme g-C{sub 3}N{sub 4}-RGO-TiO{sub 2} nanoheterojunctions, with the optimal loading amount of 10 wt% RGO, exhibited the highest rate towards the photocatalytic degradation of MB under simulated solar light irradiation. The degradation kinetics of MB can be described by the apparent first-order kinetics model. The highest degradation rate constant of 0.0137 min{sup −1} is about 4.7 and 3.2 times greater than those of the pure g-C{sub 3}N{sub 4} (0.0029 min{sup −1}) and direct Z-scheme g-C{sub 3}N{sub 4}-TiO{sub 2} (0.0043 min{sup −1}), respectively. An indirect all-solid-state Z-scheme charge-separation mechanism was proposed based on the photoluminescence spectra and the trapping experiment procedure of the photo-generated active species. It was believed that the indirect all-solid-state Z-scheme charge separation mechanism in g-C{sub 3}N

  17. Cooperation schemes for rate enhancement in detect-and-forward relay channels

    KAUST Repository

    Benjillali, Mustapha

    2010-05-01

    To improve the spectral efficiency of "Detect-and-Forward" (DetF) half-duplex relaying in fading channels, we propose a cooperation scheme where the relay uses a modulation whose order is higher than the one at the source. In a new common framework, we show that the proposed scheme offers considerable gains - in terms of achievable information rates - compared to the conventional DetF relaying schemes for both orthogonal and non-orthogonal source/relay cooperation. This allows us to propose an adaptive cooperation scheme based on the maximization of the information rate at the destination which needs to observe only the average signal-to-noise ratios of direct and relaying links. ©2010 IEEE.

  18. Improving Rydberg Excitations within Time-Dependent Density Functional Theory with Generalized Gradient Approximations: The Exchange-Enhancement-for-Large-Gradient Scheme.

    Science.gov (United States)

    Li, Shaohong L; Truhlar, Donald G

    2015-07-14

    Time-dependent density functional theory (TDDFT) with conventional local and hybrid functionals such as the local and hybrid generalized gradient approximations (GGA) seriously underestimates the excitation energies of Rydberg states, which limits its usefulness for applications such as spectroscopy and photochemistry. We present here a scheme that modifies the exchange-enhancement factor to improve GGA functionals for Rydberg excitations within the TDDFT framework while retaining their accuracy for valence excitations and for the thermochemical energetics calculated by ground-state density functional theory. The scheme is applied to a popular hybrid GGA functional and tested on data sets of valence and Rydberg excitations and atomization energies, and the results are encouraging. The scheme is simple and flexible. It can be used to correct existing functionals, and it can also be used as a strategy for the development of new functionals.

  19. Interference mitigation enhancement of switched-based scheme in over-loaded femtocells

    KAUST Repository

    Gaaloul, Fakhreddine; Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    -based scheme by minimum interference channel selection or adopt different interference thresholds on available channels, while aiming to reduce the channels examination load. The performance of the proposed schemes is quantified and then compared with those

  20. Efficient Hybrid Watermarking Scheme for Security and Transmission Bit Rate Enhancement of 3D Color-Plus-Depth Video Communication

    Science.gov (United States)

    El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.; Abd El-Samie, F. E.

    2018-03-01

    Three-Dimensional Video-plus-Depth (3DV + D) comprises diverse video streams captured by different cameras around an object. Therefore, there is a great need to fulfill efficient compression to transmit and store the 3DV + D content in compressed form to attain future resource bounds whilst preserving a decisive reception quality. Also, the security of the transmitted 3DV + D is a critical issue for protecting its copyright content. This paper proposes an efficient hybrid watermarking scheme for securing the 3DV + D transmission, which is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. The objective of the proposed watermarking scheme is to increase the immunity of the watermarked 3DV + D to attacks and achieve adequate perceptual quality. Moreover, the proposed watermarking scheme reduces the transmission-bandwidth requirements for transmitting the color-plus-depth 3DV over limited-bandwidth wireless networks through embedding the depth frames into the color frames of the transmitted 3DV + D. Thus, it saves the transmission bit rate and subsequently it enhances the channel bandwidth-efficiency. The performance of the proposed watermarking scheme is compared with those of the state-of-the-art hybrid watermarking schemes. The comparisons depend on both the subjective visual results and the objective results; the Peak Signal-to-Noise Ratio (PSNR) of the watermarked frames and the Normalized Correlation (NC) of the extracted watermark frames. Extensive simulation results on standard 3DV + D sequences have been conducted in the presence of attacks. The obtained results confirm that the proposed hybrid watermarking scheme is robust in the presence of attacks. It achieves not only very good perceptual quality with appreciated PSNR values and saving in the transmission bit rate, but also high correlation coefficient values in the presence of attacks compared to the existing hybrid watermarking schemes.

  1. Assessment of Growth Enhancement Support Scheme among Rice ...

    African Journals Online (AJOL)

    USER

    result of the findings showed that the scheme had very low performance indices in ... direct fertilizer purchase and distribution, and introduce an alternative system of distribution ... effective delivery of yield-increasing farm input (FRN, 2013). ..... telecommunications service providers, making it difficult to get their packages.

  2. Enhancing privacy of users in eID schemes

    NARCIS (Netherlands)

    Shrishak, Kris; Erkin, Z.; Schaar, Remco

    2016-01-01

    In todays world transactions are increasingly being performed over the internetbut require identication of users as in face-to-face transactions. In order to facilitate eGovernance as well as other eCommerce services Electronic Identiation(eID) schemes, which intend to provide unique and reliable

  3. Rational construction of Z-scheme Ag_2CrO_4/g-C_3N_4 composites with enhanced visible-light photocatalytic activity

    International Nuclear Information System (INIS)

    Luo, Jin; Zhou, Xiaosong; Ma, Lin; Xu, Xuyao

    2016-01-01

    Highlights: • Novel visible-light driven Ag_2CrO_4/g-C_3N_4 composites were synthesized. • Ag_2CrO_4/g-C_3N_4 exhibited enhanced visible-light photocatalytic activity. • The reasons for the enhanced photocatalytic activity were revealed. - Abstract: Novel visible-light driven Z-scheme Ag_2CrO_4/g-C_3N_4 composites with different contents of Ag_2CrO_4 were fabricated by a facile chemical precipitation method and characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), X-ray photoelectron spectroscopy (XPS), UV–vis diffuse reflectance spectroscopy (UV-vis DRS), photoluminescence (PL) spectroscopy and photoelectrochemical measurements. Compared with individual g-C_3N_4 and Ag_2CrO_4, the Ag_2CrO_4/g-C_3N_4 composites displayed much larger photocatalytic activities for the photocatalytic degradation of methyl orange (MO) solution at room temperature under visible light irradiation (λ > 420 nm). Importantly, the optimum photodegradation rate constant of the Ag_2CrO_4/g-C_3N_4 composite at a theoretical weight content of 8.0% Ag_2CrO_4 for the photodegradation of MO was 0.0068 min"−"1, which was 5.7 and 4.3 times higher than that of pure g-C_3N_4 and Ag_2CrO_4, respectively. Such enormous enhancement in photocatalytic performance was predominantly ascribed to the efficient separation and transfer of photogenerated electrons and holes at the Ag_2CrO_4/g-C_3N_4 interface imparted through the Z-scheme electron transfer. Furthermore, radical trap experiments depicted that both the holes and superoxide radical anions were thought to dominate oxidative species of the Ag_2CrO_4/g-C_3N_4 composite for MO degradation under visible light irradiation. Ultimately, a tentative Z-scheme photodegradation mechanism was proposed. This work may be useful for the rational design of new types of Z-scheme photocatalysts and provide some illuminate insights into the Z-scheme transfer mechanism for application in energy

  4. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  5. Double diffractive dissociation in the reaction K-p→K-π+π-nπ+ at 14.3 GeV/c and pomeron factorisation

    International Nuclear Information System (INIS)

    Denegri, D.; Pons, Y.; Borg, A.; Spiro, M.; Paler, K.; Tovey, S.; Comber, C.; Shah, T.P.

    1975-01-01

    Evidence is presented for the double dissociation process K - p→QN*sub(1/2)→(anti K* 0 π - ) (nπ + ) at 14.3GeV/c. The cross section for the process is of the order of 10 μb. The production differential cross section is steep (for near-threshold excitation masses), as typical of diffractive processes, and exhibits a strong correlation between the production slope and the masses of the dissociated systems. The spin-parity composition and states of the two dissociation systems closely resemble those found in single dissociation, indicating that a common diffraction-like mechanism is responsible for both processes. The mass variations of the differential cross-section slope, the decay angular correlations and the total cross section of the double dissociation component are consistent with the predictions of a factorisable pomeron exchange model. (Auth.)

  6. Enhancing Community Detection By Affinity-based Edge Weighting Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Andy [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Sanders, Geoffrey [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Henson, Van [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Vassilevski, Panayot [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-10-05

    Community detection refers to an important graph analytics problem of finding a set of densely-connected subgraphs in a graph and has gained a great deal of interest recently. The performance of current community detection algorithms is limited by an inherent constraint of unweighted graphs that offer very little information on their internal community structures. In this paper, we propose a new scheme to address this issue that weights the edges in a given graph based on recently proposed vertex affinity. The vertex affinity quantifies the proximity between two vertices in terms of their clustering strength, and therefore, it is ideal for graph analytics applications such as community detection. We also demonstrate that the affinity-based edge weighting scheme can improve the performance of community detection algorithms significantly.

  7. Low mass diffractive dissociation in a simple t-dependent dual bootstrap model

    International Nuclear Information System (INIS)

    Bishari, M.

    1978-08-01

    The smallness of inelastic diffractive dissociation is explicitly demonstrated, in the framework of the '1/N dual unitarization' scheme, by incorporating a Deck type mechanism with the crucial planar bootstrap equation. Although both inelastic and elastic pomeron couplings are of the same order in 1/N, the origin for their smallness, however, is not identical. (author)

  8. Restored symmetries, quark puzzle, and the Pomeron as a Josephson current. [Clustering effects, quantum supercurrents, cross sections, phase transitions, narrowing gap mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Mendes, R V [Instituto de Fisica e Matematica, Lisbon (Portugal)

    1976-07-01

    A special type of symmetry is studied, wherein manifest invariance is restored by direct integration over a set of spontaneously broken ground states. In addition to invariant states and multiplets these symmetry realizations are shown to lead, in general, to clustering effects and quantum supercurrents. A systematic exploration of these symmetry realizations is proposed, mostly in physical situations where it has so far been believed that the only consequences of the symmetry are invariant states and multiplets. An application of these ideas to the quark system yields a possible explanation for the unobservability of free quarks and an interpretation of the Pomeron as a generalized Josephson current. Furthermore, the 'narrowing gap mechanism' suggests an explanation for the behavior of the e/sup +/ e/sup -/ ..-->.. hadrons cross section and a speculation on an approaching phase transition in hadronic production and the observation of free quarks.

  9. Asynchronous Channel-Hopping Scheme under Jamming Attacks

    Directory of Open Access Journals (Sweden)

    Yongchul Kim

    2018-01-01

    Full Text Available Cognitive radio networks (CRNs are considered an attractive technology to mitigate inefficiency in the usage of licensed spectrum. CRNs allow the secondary users (SUs to access the unused licensed spectrum and use a blind rendezvous process to establish communication links between SUs. In particular, quorum-based channel-hopping (CH schemes have been studied recently to provide guaranteed blind rendezvous in decentralized CRNs without using global time synchronization. However, these schemes remain vulnerable to jamming attacks. In this paper, we first analyze the limitations of quorum-based rendezvous schemes called asynchronous channel hopping (ACH. Then, we introduce a novel sequence sensing jamming attack (SSJA model in which a sophisticated jammer can dramatically reduce the rendezvous success rates of ACH schemes. In addition, we propose a fast and robust asynchronous rendezvous scheme (FRARS that can significantly enhance robustness under jamming attacks. Our numerical results demonstrate that the performance of the proposed scheme vastly outperforms the ACH scheme when there are security concerns about a sequence sensing jammer.

  10. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  11. A plate-on-plate sandwiched Z-scheme heterojunction photocatalyst: BiOBr-Bi{sub 2}MoO{sub 6} with enhanced photocatalytic performance

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Shengyao [College of Science, Huazhong Agricultural University, Wuhan 430070 (China); Key Laboratory of Environment Correlative Dietology, Ministry of Education, Wuhan 430070 (China); Yang, Xianglong; Zhang, Xuehao; Ding, Xing; Yang, Zixin [College of Science, Huazhong Agricultural University, Wuhan 430070 (China); Dai, Ke [College of Resources and Environment, Huazhong Agricultural University, Wuhan 430070 (China); Chen, Hao, E-mail: hchenhao@mail.hzau.edu.cn [College of Science, Huazhong Agricultural University, Wuhan 430070 (China); Key Laboratory of Environment Correlative Dietology, Ministry of Education, Wuhan 430070 (China)

    2017-01-01

    Highlights: • A visible light heterojunction photocatalyst of BiOBr-Bi{sub 2}MoO{sub 6} was simply synthesized. • Carriers transferred efficiently in sandwiched layers causing an enhance activity. • A possible direct Z-scheme charge transfer mechanism of BiOBr-Bi2MoO6 is proposed. - Abstract: In this study, a direct Z-scheme heterojunction BiOBr-Bi{sub 2}MoO{sub 6} with greatly enhanced visible light photocatalytic performance was fabricated via a two-step coprecipitation method. It was indicated that a plate-on-plate heterojunctions be present between BiOBr and Bi{sub 2}MoO{sub 6} through different characterization techniques including X-ray powder diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), UV–vis diffuse reflectance spectroscopy (DRS) and photoelectrochemical measurements. The crystal structure and morphology analysis revealed that the heterointerface in BiOBr-Bi{sub 2}MoO{sub 6} occurred mainly on the (001) facets of BiOBr and (001) facets of Bi{sub 2}MoO{sub 6}. The photocatalytic activity of the BiOBr-Bi{sub 2}MoO{sub 6} was investigated by degradation of RhB and about 66.7% total organic carbon (TOC) could be removed. Ciprofloxacin (CIP) was employed to rule out the photosensitization. It was implied that the higher activity of BiOBr-Bi{sub 2}MoO{sub 6} could be attribute to the strong redox ability in the Z-scheme system, which was subsequently confirmed by photoluminescence spectroscopy (PL) and active spices trapping experiments. This study provides a promising platform for Z-scheme heterojunction constructing and also sheds light on highly efficient visible-light-driven photocatalysts designing.

  12. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  13. Diffractive beauty production at the LHC

    International Nuclear Information System (INIS)

    Eggert, K.; Morsch, A.

    1994-01-01

    Using the framework of Pomeron exchange to describe diffractive pp collisions at the LHC we discuss beauty production in those events. The cross sections for beauty production at different diffractive masses and the topology for the beauty particles and the underlying event are given. When triggering on large diffractive masses, the beauty system is boosted into the Pomeron hemisphere opposite the underlying event, which tends to follow the excited proton direction. This may offer some advantages for the acceptance of beauty and its reconstruction in forward spectrometers. For the identification of diffractive events at the LHC collider, we present a scheme to measure the momentum loss of forward protons in the range 2x10 -3 < Δp/p <0.1. This momentum loss can be determined with a precision of about 10%. ((orig.))

  14. Enhanced machine learning scheme for energy efficient resource allocation in 5G heterogeneous cloud radio access networks

    KAUST Repository

    Alqerm, Ismail

    2018-02-15

    Heterogeneous cloud radio access networks (H-CRAN) is a new trend of 5G that aims to leverage the heterogeneous and cloud radio access networks advantages. Low power remote radio heads (RRHs) are exploited to provide high data rates for users with high quality of service requirements (QoS), while high power macro base stations (BSs) are deployed for coverage maintenance and low QoS users support. However, the inter-tier interference between the macro BS and RRHs and energy efficiency are critical challenges that accompany resource allocation in H-CRAN. Therefore, we propose a centralized resource allocation scheme using online learning, which guarantees interference mitigation and maximizes energy efficiency while maintaining QoS requirements for all users. To foster the performance of such scheme with a model-free learning, we consider users\\' priority in resource blocks (RBs) allocation and compact state representation based learning methodology to enhance the learning process. Simulation results confirm that the proposed resource allocation solution can mitigate interference, increase energy and spectral efficiencies significantly, and maintain users\\' QoS requirements.

  15. Global Mechanisms for Sustaining and Enhancing PES Schemes

    OpenAIRE

    Farley, Josh; Aquino, Andre; Daniels, Amy; Moulaert, Azur; Lee, Dan; Krause, Abby

    2010-01-01

    An international payment for ecosystem service (IPES) schemes may be one of the only mechanisms available to stimulate the provision of vital non-marketed ecosystem services at the global level, as those nations that benefit from global ecosystem services (GES) cannot readily force other sovereign nations to provide them. Currently, international trade offers trillions of dollars in incentives for countries to convert natural capital into marketable goods and services, and few payments to ent...

  16. Fabrication of Z-scheme Ag3PO4/MoS2 composites with enhanced photocatalytic activity and stability for organic pollutant degradation

    International Nuclear Information System (INIS)

    Zhu, Chaosheng; Zhang, Lu; Jiang, Bo; Zheng, Jingtang; Hu, Ping; Li, Sujuan; Wu, Mingbo; Wu, Wenting

    2016-01-01

    Highlights: • Ag 3 PO 4 /MoS 2 composite photocatalysts were prepared by precipitation method. • The composites showed enhanced visible-light photocatalytic activity. • The photocorrosion of Ag 3 PO 4 was inhibited due to the introduction of MoS 2 . • Z-scheme mechanism was proposed to explain the enhanced photoactivity. - Abstract: In this study, highly efficient visible-light-driven Ag 3 PO 4 /MoS 2 composite photocatalysts with different weight ratios of MoS 2 were prepared via the ethanol-water mixed solvents precipitation method and characterized by ICP, XRD, HRTEM, FE-SEM, BET, XPS, UV–vis DRS and PL analysis. Under visible-light irradiation, Ag 3 PO 4 /MoS 2 composites exhibit excellent photocatalytic activity towards the degradation of organic pollutants in aqueous solution. The optimal composite with 0.648 wt% MoS 2 content exhibits the highest photocatalytic activity, which can degrade almost all MB under visible-light irradiation within 60 min. Recycling experiments confirmed that the Ag 3 PO 4 /MoS 2 catalysts had superior cycle performance and stability. The photocatalytic activity enhancement of Ag 3 PO 4 /MoS 2 photocatalysts can be mainly ascribed to the efficient separation of photogenerated charge carriers and the stronger oxidation and reduction ability through a Z-scheme system composed of Ag 3 PO 4 , Ag and MoS 2 , in which Ag particles act as the charge separation center. The high photocatalytic stability is due to the successful inhibition of the photocorrosion of Ag 3 PO 4 by transferring the photogenerated electrons of Ag 3 PO 4 to MoS 2 . The evidence of the Z-scheme photocatalytic mechanism of the composite photocatalysts could be obtained from the active species trapping experiments and the photoluminescence technique.

  17. The use of the MacCormack scheme in computational hydraulics

    International Nuclear Information System (INIS)

    Garcia, R.; Zhang, H.; Kahawita, R.

    1985-01-01

    This manuscript describes the development of a numerical model that solves shallow water problems based upon an enhanced version of the MacCormack explicit scheme (MS). The MS has been successfully applied to solve numerous problems in gas dynamics. However, the standard application of the MS to solve the shallow water equations can cause in certain test cases non-linear instabilities and non-symmetrical results that eventually destroy the solution. By examining the calculation 'cell' one can show that the MS is not symmetric in space, which explains why it cannot be used directly in the treatment of hydraulic problems most of which possess irregular boundaries thereby resulting in a flow with no 'preferred direction'. This is contrary to what is usually encountered in aerodynamics. The enhanced MacCormack scheme is obtained by a simple modification to the original formulation resulting in a symmetric scheme. The scheme has been applied to the computation of the flowfield in a real life situation with satisfactory results. (author)

  18. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  19. Distributed multi-agent scheme for reactive power management with renewable energy

    International Nuclear Information System (INIS)

    Rahman, M.S.; Mahmud, M.A.; Pota, H.R.; Hossain, M.J.

    2014-01-01

    Highlights: • A distributed multi-agent scheme is proposed to enhance the dynamic voltage stability. • A control agent is designed where control actions are performed through PI controller. • Proposed scheme is compared with the conventional approach with DSTATCOM. • Proposed scheme adapts the capability of estimation and control under various operating conditions. - Abstract: This paper presents a new distributed multi-agent scheme for reactive power management in smart coordinated distribution networks with renewable energy sources (RESs) to enhance the dynamic voltage stability, which is mainly based on controlling distributed static synchronous compensators (DSTATCOMs). The proposed control scheme is incorporated in a multi-agent framework where the intelligent agents simultaneously coordinate with each other and represent various physical models to provide information and energy flow among different physical processes. The reactive power is estimated from the topology of distribution networks and with this information, necessary control actions are performed through the proposed proportional integral (PI) controller. The performance of the proposed scheme is evaluated on a 8-bus distribution network under various operating conditions. The performance of the proposed scheme is validated through simulation results and these results are compared to that of conventional PI-based DSTATCOM control scheme. From simulation results, it is found that the distributed MAS provides excellence performance for improving voltage profiles by managing reactive power in a smarter way

  20. Analysis and improvement for the performance of Baptista's cryptographic scheme

    International Nuclear Information System (INIS)

    Wei Jun; Liao Xiaofeng; Wong, K.W.; Zhou Tsing; Deng Yigui

    2006-01-01

    Based on Baptista's chaotic cryptosystem, we propose a secure and robust chaotic cryptographic scheme after investigating the problems found in this cryptosystem as well as its variants. In this proposed scheme, a subkey array generated from the key and the plaintext is adopted to enhance the security. Some methods are introduced to increase the efficiency. Theoretical analyses and numerical simulations indicate that the proposed scheme is secure and efficient for practical use

  1. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  2. Advanced Reactive Power Reserve Management Scheme to Enhance LVRT Capability

    Directory of Open Access Journals (Sweden)

    Hwanik Lee

    2017-10-01

    Full Text Available Abstract: To increase the utilization of wind power in the power system, grid integration standards have been proposed for the stable integration of large-scale wind power plants. In particular, fault-ride-through capability, especially Low-Voltage-Ride-Through (LVRT, has been emphasized, as it is related to tripping in wind farms. Therefore, this paper proposes the Wind power plant applicable-Effective Reactive power Reserve (Wa-ERPR, which combines both wind power plants and conventional generators at the Point of Interconnection (POI. The reactive power capability of the doubly-fed induction generator wind farm was considered to compute the total Wa-ERPR at the POI with reactive power capability of existing generators. By using the Wa-ERPR management algorithm, in case of a violation of the LVRT standards, the amount of reactive power compensation is computed using the Wa-ERPR management scheme. The proposed scheme calculates the Wa-ERPR and computes the required reactive power, reflecting the change of the system topology pre- and post-contingency, to satisfy the LVRT criterion when LVRT regulation is not satisfied at the POI. The static synchronous compensator (STATCOM with the capacity corresponding to calculated amount of reactive power through the Wa-ERPR management scheme is applied to the POI. Therefore, it is confirmed that the wind power plant satisfies the LVRT criteria by securing the appropriate reactive power at the POI, by applying of the proposed algorithm.

  3. Construction of Z-scheme Ag{sub 2}CO{sub 3}/N-doped graphene photocatalysts with enhanced visible-light photocatalytic activity by tuning the nitrogen species

    Energy Technology Data Exchange (ETDEWEB)

    Song, Shaoqing [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Key Laboratory of Radioactive Geology and Exploration Technology Fundamental Science for National Defense, East China Institute of Technology, Nanchang, Jiangxi Province 330013 (China); Meng, Aiyun [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Jiang, Shujuan [Key Laboratory of Radioactive Geology and Exploration Technology Fundamental Science for National Defense, East China Institute of Technology, Nanchang, Jiangxi Province 330013 (China); Cheng, Bei [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Jiang, Chuanjia, E-mail: jiangcj2016@yahoo.com [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China)

    2017-02-28

    Highlights: • Z-scheme photocatalyst composed of Ag{sub 2}CO{sub 3} and N-doped graphene (NG). • Pyridinic nitrogen species of NG spontaneously promoted plasmonic Ag formation. • Graphitic N of NG facilitated the Z-scheme transfer option and O{sub 2} adsorption. • Z-scheme Ag{sub 2}CO{sub 3}-NG showed high photocatalytic performance. - Abstract: Semiconductor-based photocatalysis has great potential in various environmental and energy applications, and Z-scheme photocatalysts have many advantages over single-component photocatalysts. The construction of a highly efficient Z-scheme photocatalytic system depends on the geometric structure arrangement, microscopic and crystalline form of the stoichiometric species, and it has not been elucidated whether the Z-scheme photocatalysts can be designed by tuning the electronic structures of cocatalysts alone. Here, using N-doped graphene (NG) as cocatalyst, we successfully constructed Z-scheme Ag{sub 2}CO{sub 3}-NG photocatalysts with enhanced activity for the photooxidative degradation of phenol pollutant. It was found that the pyridinic nitrogen species (N{sub p}) of NG could spontaneously reduce Ag{sup +} to produce plasmonic Ag nanoparticles on Ag{sub 2}CO{sub 3}-NG, while the efficiency of the photogenerated charge separation, Z-scheme transfer option, and O{sub 2} adsorption were promoted by the graphitic nitrogen species (N{sub g}). Therefore, the as-designed Z-scheme Ag{sub 2}CO{sub 3}-NG photocatalysts showed much higher activity than Ag{sub 2}CO{sub 3} and its composites with graphene oxide (GO) or reduced GO as cocatalysts in the photocatalytic degradation of phenol. Hence, our results provide a new strategy for exploring advanced Z-scheme photocatalysts with NG as cocatalyst by rationally tuning the N{sub p} and N{sub g} species.

  4. Dynamical and topological considerations in low and high mass diffractive dissociation

    International Nuclear Information System (INIS)

    Bishari, M.

    1978-01-01

    The topological structure of a given process completely specifies the 1/N dependence. However dynamics seems to be crucial in characterizing strongly interacting reactions, as illustrated in the study of elastic scattering, low mass diffraction and the triple pomeron mechanism. The ''1/N dual unitarization'' scheme is a viable framework for Gribov's Reggeon field theory, since it clarifies and determines the bare parameters of Gribov's Lagrangian. (author)

  5. Control Strategies for Islanded Microgrid using Enhanced Hierarchical Control Structure with Multiple Current-Loop Damping Schemes

    DEFF Research Database (Denmark)

    Han, Yang; Shen, Pan; Zhao, Xin

    2017-01-01

    In this paper, the modeling, controller design, and stability analysis of the islanded microgrid (MG) using enhanced hierarchical control structure with multiple current loop damping schemes is proposed. The islanded MG is consisted of the parallel-connected voltage source inverters using LCL...... output filters, and the proposed control structure includes: the primary control with additional phase-shift loop, the secondary control for voltage amplitude and frequency restoration, the virtual impedance loops which contains virtual positive- and negative-sequence impedance loops at fundamental...... frequency, and virtual variable harmonic impedance loop at harmonic frequencies, and the inner voltage and current loop controllers. A small-signal model for the primary and secondary controls with additional phase-shift loop is presented, which shows an over-damped feature from eigenvalue analysis...

  6. The use of the MacCormack scheme in computational hydraulics

    Energy Technology Data Exchange (ETDEWEB)

    Garcia, R. [Universidad Central de Venezuela, Inst. de Mecanica de Fluidos, Caracas (Venezuela); Zhang, H.; Kahawita, R. [Ecole Polytechnique, Dept. of Civil Engineering, Montreal, Quebec (Canada)

    1985-07-01

    This manuscript describes the development of a numerical model that solves shallow water problems based upon an enhanced version of the MacCormack explicit scheme (MS). The MS has been successfully applied to solve numerous problems in gas dynamics. However, the standard application of the MS to solve the shallow water equations can cause in certain test cases non-linear instabilities and non-symmetrical results that eventually destroy the solution. By examining the calculation 'cell' one can show that the MS is not symmetric in space, which explains why it cannot be used directly in the treatment of hydraulic problems most of which possess irregular boundaries thereby resulting in a flow with no 'preferred direction'. This is contrary to what is usually encountered in aerodynamics. The enhanced MacCormack scheme is obtained by a simple modification to the original formulation resulting in a symmetric scheme. The scheme has been applied to the computation of the flowfield in a real life situation with satisfactory results. (author)

  7. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  8. Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything

    Directory of Open Access Journals (Sweden)

    Qian Meng

    2017-01-01

    Full Text Available User authentication has been widely deployed to prevent unauthorized access in the new era of Internet of Everything (IOE. When user passes the legal authentication, he/she can do series of operations in database. We mainly concern issues of data security and comparable queries over ciphertexts in IOE. In traditional database, a Short Comparable Encryption (SCE scheme has been widely used by authorized users to conduct comparable queries over ciphertexts, but existing SCE schemes still incur high storage and computational overhead as well as economic burden. In this paper, we first propose a basic Short Comparable Encryption scheme based on sliding window method (SCESW, which can significantly reduce computational and storage burden as well as enhance work efficiency. Unfortunately, as the cloud service provider is a semitrusted third party, public auditing mechanism needs to be furnished to protect data integrity. To further protect data integrity and reduce management overhead, we present an enhanced SCESW scheme based on position-aware Merkle tree, namely, PT-SCESW. Security analysis proves that PT-SCESW and SCESW schemes can guarantee completeness and weak indistinguishability in standard model. Performance evaluation indicates that PT-SCESW scheme is efficient and feasible in practical applications, especially for smarter and smaller computing devices in IOE.

  9. TE/TM scheme for computation of electromagnetic fields in accelerators

    International Nuclear Information System (INIS)

    Zagorodnov, Igor; Weiland, Thomas

    2005-01-01

    We propose a new two-level economical conservative scheme for short-range wake field calculation in three dimensions. The scheme does not have dispersion in the longitudinal direction and is staircase free (second order convergent). Unlike the finite-difference time domain method (FDTD), it is based on a TE/TM like splitting of the field components in time. Additionally, it uses an enhanced alternating direction splitting of the transverse space operator that makes the scheme computationally as effective as the conventional FDTD method. Unlike the FDTD ADI and low-order Strang methods, the splitting error in our scheme is only of fourth order. As numerical examples show, the new scheme is much more accurate on the long-time scale than the conventional FDTD approach

  10. Evaluation of frame aggregation schemes for the p-persistent based next generation WLANS

    Science.gov (United States)

    Ahmad, Ashar; Anna, Kiran; Bassiouni, Mostafa A.

    2010-04-01

    The next Generation IEEE 802.11n is designed to improve the throughput of the existing standard 802.11. It aims to achieve this by increasing the data rate from 54 Mbps to 600 Mbps with the help of physical layer enhancements. Therefore, the Medium Access Layer (MAC) requires improvements to fully utilize the capabilities of the enhanced 802.11n physical layer. In this paper, we present the performance evaluation results of two frame aggregation schemes viz., MAC Protocol Data Unit Aggregation (A-MPDU) and MAC Service Data Unit Aggregation (A-MSDU) and study their performance impact when the two schemes are incorporated in a p-persistent based 802.11n. The simulation results have shown that the two schemes achieve consistent performance improvement over the standard non-aggregation scheme.

  11. Fabrication of a direct Z-scheme type WO{sub 3}/Ag{sub 3}PO{sub 4} composite photocatalyst with enhanced visible-light photocatalytic performances

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Jinsuo, E-mail: lujinsuo@xauat.edu.cn [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an 710055 (China); Wang, Yujing [School of Materials and Chemical Engineering, Xi’an Technological University, Xi’an, Shaanxi 710032 (China); Liu, Fei [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an 710055 (China); Zhang, Liang [College of Sciences, Xi’an University of Architecture and Technology, Xi’an 710055 (China); Chai, Shouning, E-mail: s.n.chai@xauat.edu.cn [College of Sciences, Xi’an University of Architecture and Technology, Xi’an 710055 (China)

    2017-01-30

    Highlights: • A solid direct Z-scheme type photocatalyst WO{sub 3}/Ag{sub 3}PO{sub 4} was synthesized. • The WO{sub 3}/Ag{sub 3}PO{sub 4} composite showed enhanced photocatalytic activity and stability. • Nearly complete removal of organic dyes was achieved in a short time. • The reasonable Z-scheme mechanism of WO{sub 3}/Ag{sub 3}PO{sub 4} composite was proposed. - Abstract: A direct Z-scheme type photocatalyst WO{sub 3}/Ag{sub 3}PO{sub 4} composite (molar ration 1:1, 1W/1Ag) was prepared by hydrothermal method. The 1W/1Ag was characterized by scanning electron microscopy (SEM), X-ray powder diffraction (XRD), UV–vis diffuse reflection spectroscopy (DRS), X-ray photoelectron spectroscopy (XPS), and photoluminescence emission spectroscopy (PL) etc. technologies. The photocatalytic performances were evaluated by degradation of methylene blue (MB) and methyl orange (MO), and their removal rates were up to 95% after 60 min and 90% after 180 min, respectively. The prepared 1W/1Ag exhibits a much higher photocatalytic activity than pure Ag{sub 3}PO{sub 4} and pure WO{sub 3} under visible light irradiation. The apparent rate constants of MB and MO degradation on 1W/1Ag are about 2.4 and 2.5 times that of pure Ag{sub 3}PO{sub 4}, respectively. The enhanced performance of the 1W/1Ag is attributed to a synergistic effect including relatively high surface area, strong light absorption, matched energy band structure, and the improved separation of photogenerated charge carriers between the two components. A reasonable Z-scheme mechanism referring to directed migration of photoinduced carriers was proposed. Thus, it can be suggested that the 1W/1Ag can serve as a promising photocatalyst for environmental purification and clean energy utilization.

  12. Enhancing the Statistical Filtering Scheme to Detect False Negative Attacks in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Akram

    2017-06-01

    Full Text Available In this paper, we present a technique that detects both false positive and false negative attacks in statistical filtering-based wireless sensor networks. In statistical filtering scheme, legitimate reports are repeatedly verified en route before they reach the base station, which causes heavy energy consumption. While the original statistical filtering scheme detects only false reports, our proposed method promises to detect both attacks.

  13. Room-temperature in situ fabrication of Bi2O3/g-C3N4 direct Z-scheme photocatalyst with enhanced photocatalytic activity

    Science.gov (United States)

    He, Rongan; Zhou, Jiaqian; Fu, Huiqing; Zhang, Shiying; Jiang, Chuanjia

    2018-02-01

    Constructing direct Z-scheme heterojunction is an effective approach to separating photogenerated charge carriers and improving the activity of semiconductor photocatalysts. Herein, a composite of bismuth(III) oxide (Bi2O3) and graphitic carbon nitride (g-C3N4) was in situ fabricated at room temperature by photoreductive deposition of Bi3+ and subsequent air-oxidation of the resultant metallic Bi. Quantum-sized ω-Bi2O3 nanoparticles approximately 6 nm in diameter were uniformly distributed on the surface of mesoporous g-C3N4. The as-prepared Bi2O3/g-C3N4 composite exhibited higher photocatalytic activity than pure Bi2O3 and g-C3N4 for photocatalytic degradation of phenol under visible light. Reactive species trapping experiments revealed that superoxide radicals and photogenerated holes played important roles in the photocatalytic degradation of phenol. The enhanced photocatalytic activity, identification of reactive species and higher rate of charge carrier recombination (as indicated by stronger photoluminescence intensity) collectively suggest that the charge migration within the Bi2O3/g-C3N4 composite followed a Z-scheme mechanism. Photogenerated electrons on the conduction band of Bi2O3 migrate to the valence band of g-C3N4 and combine with photogenerated holes therein. At the cost of these less reactive charge carriers, the Z-scheme heterojunction enables efficient charge separation, while preserving the photogenerated electrons and holes with stronger redox abilities, which is beneficial for enhanced photocatalytic activity.

  14. Fused man-machine classification schemes to enhance diagnosis of breast microcalcifications

    International Nuclear Information System (INIS)

    Andreadis, Ioannis; Sevastianos, Chatzistergos; Konstantina, Nikita; George, Spyrou

    2017-01-01

    Computer aided diagnosis (CAD x ) approaches are developed towards the effective discrimination between benign and malignant clusters of microcalcifications. Different sources of information are exploited, such as features extracted from the image analysis of the region of interest, features related to the location of the cluster inside the breast, age of the patient and descriptors provided by the radiologists while performing their diagnostic task. A series of different CAD x schemes are implemented, each of which uses a different category of features and adopts a variety of machine learning algorithms and alternative image processing techniques. A novel framework is introduced where these independent diagnostic components are properly combined according to features critical to a radiologist in an attempt to identify the most appropriate CAD x schemes for the case under consideration. An open access database (Digital Database of Screening Mammography (DDSM)) has been elaborated to construct a large dataset with cases of varying subtlety, in order to ensure the development of schemes with high generalization ability, as well as extensive evaluation of their performance. The obtained results indicate that the proposed framework succeeds in improving the diagnostic procedure, as the achieved overall classification performance outperforms all the independent single diagnostic components, as well as the radiologists that assessed the same cases, in terms of accuracy, sensitivity, specificity and area under the curve following receiver operating characteristic analysis. (paper)

  15. Fused man-machine classification schemes to enhance diagnosis of breast microcalcifications

    Science.gov (United States)

    Andreadis, Ioannis; Sevastianos, Chatzistergos; George, Spyrou; Konstantina, Nikita

    2017-11-01

    Computer aided diagnosis (CAD x ) approaches are developed towards the effective discrimination between benign and malignant clusters of microcalcifications. Different sources of information are exploited, such as features extracted from the image analysis of the region of interest, features related to the location of the cluster inside the breast, age of the patient and descriptors provided by the radiologists while performing their diagnostic task. A series of different CAD x schemes are implemented, each of which uses a different category of features and adopts a variety of machine learning algorithms and alternative image processing techniques. A novel framework is introduced where these independent diagnostic components are properly combined according to features critical to a radiologist in an attempt to identify the most appropriate CAD x schemes for the case under consideration. An open access database (Digital Database of Screening Mammography (DDSM)) has been elaborated to construct a large dataset with cases of varying subtlety, in order to ensure the development of schemes with high generalization ability, as well as extensive evaluation of their performance. The obtained results indicate that the proposed framework succeeds in improving the diagnostic procedure, as the achieved overall classification performance outperforms all the independent single diagnostic components, as well as the radiologists that assessed the same cases, in terms of accuracy, sensitivity, specificity and area under the curve following receiver operating characteristic analysis.

  16. Cooperation schemes for rate enhancement in detect-and-forward relay channels

    KAUST Repository

    Benjillali, Mustapha; Szczeciński, Leszek L.; Alouini, Mohamed-Slim

    2010-01-01

    an adaptive cooperation scheme based on the maximization of the information rate at the destination which needs to observe only the average signal-to-noise ratios of direct and relaying links. ©2010 IEEE.

  17. Chaos-based CAZAC scheme for secure transmission in OFDM-PON

    Science.gov (United States)

    Fu, Xiaosong; Bi, Meihua; Zhou, Xuefang; Yang, Guowei; Lu, Yang; Hu, Miao

    2018-01-01

    To effectively resist malicious eavesdropping and performance deterioration, a novel chaos-based secure transmission scheme is proposed to enhance the physical layer security and reduce peak-to-average power ratio (PAPR) in orthogonal frequency division multiplexing passive optical network (OFDM-PON). By the randomly extracting operation of common CAZAC values, the specially-designed constant amplitude zero autocorrelation (CAZAC) is created for system encryption and PAPR reduction enhancing the transmission security. This method is verified in {10-Gb/s encrypted OFDM-PON with 20-km fiber transmission. Results show that, compared to common OFDM-PON, our scheme achieves {3-dB PAPR reduction and {1-dB receiver sensitivity improvement.

  18. Fabrication of Z-scheme plasmonic photocatalyst Ag@AgBr/g-C3N4 with enhanced visible-light photocatalytic activity

    International Nuclear Information System (INIS)

    Yang, Yuxin; Guo, Wan; Guo, Yingna; Zhao, Yahui; Yuan, Xing; Guo, Yihang

    2014-01-01

    Graphical abstract: - Highlights: • Z-scheme plasmonic photocatalyst of Ag@AgBr/g-C 3 N 4 is prepared for the first time. • Ag@AgBr/g-C 3 N 4 shows enhanced visible-light photocatalytic activity. • Photocatalytic mechanism based on the experimental results is revealed. • Photocatalytic degradation pathway of MO is put forward. - Abstract: A series of Ag@AgBr grafted graphitic carbon nitride (Ag@AgBr/g-C 3 N 4 ) plasmonic photocatalysts are fabricated through photoreducing AgBr/g-C 3 N 4 hybrids prepared by deposition–precipitation method. The phase and chemical structures, electronic and optical properties as well as morphologies of Ag@AgBr/g-C 3 N 4 heterostructures are well-characterized. Subsequently, the photocatalytic activity of Ag@AgBr/g-C 3 N 4 is evaluated by the degradation of methyl orange (MO) and rhodamin B (RB) under visible-light irradiation. The enhanced photocatalytic activity of Ag@AgBr/g-C 3 N 4 compared with g-C 3 N 4 and Ag@AgBr is obtained and explained in terms of the efficient visible-light utilization efficiency as well as the construction of Z-scheme, which keeps photogenerated electrons and holes with high reduction and oxidation capability, evidenced by photoelectrochemical tests and free radical and hole scavenging experiments. Based on the intermediates identified in the reaction system, the photocatalytic degradation pathway of MO is put forward

  19. A Dynamic Reallocation Based Window Access Scheme for Enhancing QoS of Vehicular Ad-hoc Networks (VANETs

    Directory of Open Access Journals (Sweden)

    Md. Amirul Islam

    2018-01-01

    Full Text Available This article proposes a new MAC scheme for Vehicle-to-Infrastructure (V2I communications that dynamically reallocates unused TDMA slots. By maintaining a balanced waiting time, the proposed TDMA based scheduling scheme allocates TDMA slots in a rational way to minimize merging and one-hop neighboring collision. The proposed scheme ensures dynamic reallocation of unused slots by using “time slot reassignment” mechanism. The scheme has been simulated in VEINS framework of OMNET++ network simulator and its performance has been compared with other conventional protocols. Experimental results show that our scheme performs better than existing schemes in terms of successfully transmitted data packets.

  20. Rational construction of Z-scheme Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composites with enhanced visible-light photocatalytic activity

    Energy Technology Data Exchange (ETDEWEB)

    Luo, Jin, E-mail: lj328520504@126.com; Zhou, Xiaosong; Ma, Lin; Xu, Xuyao

    2016-12-30

    Highlights: • Novel visible-light driven Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composites were synthesized. • Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} exhibited enhanced visible-light photocatalytic activity. • The reasons for the enhanced photocatalytic activity were revealed. - Abstract: Novel visible-light driven Z-scheme Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composites with different contents of Ag{sub 2}CrO{sub 4} were fabricated by a facile chemical precipitation method and characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), X-ray photoelectron spectroscopy (XPS), UV–vis diffuse reflectance spectroscopy (UV-vis DRS), photoluminescence (PL) spectroscopy and photoelectrochemical measurements. Compared with individual g-C{sub 3}N{sub 4} and Ag{sub 2}CrO{sub 4}, the Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composites displayed much larger photocatalytic activities for the photocatalytic degradation of methyl orange (MO) solution at room temperature under visible light irradiation (λ > 420 nm). Importantly, the optimum photodegradation rate constant of the Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composite at a theoretical weight content of 8.0% Ag{sub 2}CrO{sub 4} for the photodegradation of MO was 0.0068 min{sup −1}, which was 5.7 and 4.3 times higher than that of pure g-C{sub 3}N{sub 4} and Ag{sub 2}CrO{sub 4}, respectively. Such enormous enhancement in photocatalytic performance was predominantly ascribed to the efficient separation and transfer of photogenerated electrons and holes at the Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} interface imparted through the Z-scheme electron transfer. Furthermore, radical trap experiments depicted that both the holes and superoxide radical anions were thought to dominate oxidative species of the Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composite for MO degradation under visible light irradiation. Ultimately, a tentative Z-scheme photodegradation mechanism

  1. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  2. A secure communication scheme using projective chaos synchronization

    International Nuclear Information System (INIS)

    Li Zhigang; Xu Daolin

    2004-01-01

    Most secure communication schemes using chaotic dynamics are based on identical synchronization. In this paper, we show the possibility of secure communication using projective synchronization (PS). The unpredictability of the scaling factor in projective synchronization can additionally enhance the security of communication. It is also showed that the scaling factor can be employed to improve the robustness against noise contamination. The feasibility of the communication scheme in high-dimensional chaotic systems, such as the hyperchaotic Roessler system, is demonstrated. Numerical results show the success in transmitting a sound signal through chaotic systems

  3. Insight into synergistically enhanced adsorption and visible light photocatalytic performance of Z-scheme heterojunction of SrTiO{sub 3}(La,Cr)-decorated WO{sub 3} nanosheets

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Xin; Jiang, Junzhe; Jia, Yushuai, E-mail: ysjia@jxnu.edu.cn; Qiu, Jinmin; Xia, Tonglin; Zhang, Yuhong; Li, Yuqin; Chen, Xiangshu, E-mail: cxs66cn@jxnu.edu.cn

    2017-08-01

    Highlights: • Fabrication of SrTiO{sub 3}(La,Cr)/WO{sub 3} heterojunction with well-defined morphology. • Synergistic effect of adsorption and photocatalytic elimination for methylene blue. • Adsorption kinetics and isotherm were investigated in detail. • Negative zeta potential and large surface area result in high adsorption capacity. • A novel Z-scheme mechanism for the enhanced photocatalytic activity is proposed. - Abstract: The efficient treatment of dye wastewater has been a hot topic of environment field. The integration of adsorption and photocatalytic degradation via fabrication of bi-component heterojunction photocatalyst is considered as a facile and effective strategy to enhance the dye elimination efficiency. In this report, a Z-scheme heterojunction material, SrTiO{sub 3}(La,Cr)/WO{sub 3} with bifunction of adsorption and photocatalysis was successfully synthesized for efficient removal of methylene blue (MB) under visible light irradiation. The morphology and microstructure characterization demonstrates that the SrTiO{sub 3}(La,Cr) nanoparticles are uniformly decorated on the WO{sub 3} nanosheets, forming an intimate heterojunction interface. MB degradation results indicate that the removal efficiency by the synergistic adsorption-photocatalysis process is greatly improved compared to pure WO{sub 3} and SrTiO{sub 3}(La,Cr) with the adsorption and photocatalytic activity closely related to the composition of the material. The possible mechanism for the enhanced photocatalytic activity could be ascribed to the formation of a Z-scheme heterojunction system based on active species trapping experiments. Furthermore, the investigations of adsorption kinetics and isotherm show that the adsorption process follows pseudo-second-order kinetic model and Langmuir isotherm, respectively. Due to the synergistic advantages of negative zeta potential, large surface area and accelerated separation of photogenerated carriers driven by Z-scheme

  4. Structure of Z-scheme CdS/CQDs/BiOCl heterojunction with enhanced photocatalytic activity for environmental pollutant elimination

    Science.gov (United States)

    Pan, Jinbo; Liu, Jianjun; Zuo, Shengli; Khan, Usman Ali; Yu, Yingchun; Li, Baoshan

    2018-06-01

    Z-scheme CdS/CQDs/BiOCl heterojunction was synthesized by a facile region-selective deposition process. Owing to the electronegativity of the groups on the surface of Carbon Quantum Dots (CQDs), they can be sandwiched between CdS and BiOCl, based on the stepwise region-selective deposition process. The samples were systematically characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), high resolution TEM (HRTEM), X-ray photoelectron spectroscopy (XPS), UV-vis diffuse reflectance spectroscopy (UV-vis DRS), photoelectrochemical measurements and photoluminescence (PL). The results indicate that CQDs with size of 2-5 nm and CdS nanoparticles with size of 5-10 nm dispersed uniformly on the surface of cuboid BiOCl nanosheets. The photocatalytic performance tests reveal that the CdS/CQDs/BiOCl heterojunction exhibits much higher photocatalytic activity than that of BiOCl, CdS/BiOCl and CQDs/BiOCl for Rhodamine B (RhB) and phenol photodegradation under visible and UV light illumination, respectively. The enhanced photocatalytic performance should be attributed to the Z-scheme structure of CdS/CQDs/BiOCl, which not only improves visible light absorption and the migration efficiency of the photogenerated electron-holes but also keeps high redox ability of CdS/CQDs/BiOCl composite.

  5. EFFECTIVENESS OF E-WALLET PRACTICE IN GRASSROOTS AGRICULTURAL SERVICES DELIVERY IN NIGERIA - A CASE STUDY OF KWARA STATE GROWTH ENHANCEMENT SUPPORT SCHEME

    OpenAIRE

    Grace Modupe ADEBO

    2014-01-01

    This study assesses the effectiveness of the usages of mobile phone-based innovations to reaching small scale farmers in Nigeria using Kwara State growth enhancement support scheme as a case study. Two hundred farmers were randomly selected from four local government areas in the state. A structured interview schedule was used for eliciting information from them. The study revealed that 53.5, 51.0 & 87.2 percents of the respondents’ respectively benefited from improved seeds o...

  6. Modeling and Simulation of Handover Scheme in Integrated EPON-WiMAX Networks

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    In this paper, we tackle the seamless handover problem in integrated optical wireless networks. Our model applies for the convergence network of EPON and WiMAX and a mobilityaware signaling protocol is proposed. The proposed handover scheme, Integrated Mobility Management Scheme (IMMS), is assisted...... by enhancing the traditional MPCP signaling protocol, which cooperatively collects mobility information from the front-end wireless network and makes centralized bandwidth allocation decisions in the backhaul optical network. The integrated network architecture and the joint handover scheme are simulated using...... OPNET modeler. Results show validation of the protocol, i.e., integrated handover scheme gains better network performances....

  7. Diffraction dissociation and elastic scattering

    International Nuclear Information System (INIS)

    Verebryusov, V.S.; Ponomarev, L.A.; Smorodinskaya, N.Ya.

    1987-01-01

    In the framework of Regge scheme with supercritical pomeron a model is suggested for the NN-scattering amplitude which takes into account the contribution introduced to the intermediate state by diffraction dissociation (DD) processes. The DD amplitude is written in terms of the Deck model which has been previously applied to describing the main DD features. The calculated NN cross sections are compared with those obtained experimentally. Theoretical predictions for higher energy are presented

  8. Nonclassical lightstates in optical communication schemes

    International Nuclear Information System (INIS)

    Mattle, K. U.

    1997-11-01

    The present thesis is a result in theoretical and experimental work on quant information and quant communication. The first part describes a new high intense source for polarization entangled photon pairs. The high quality of the source is clearly demonstrated by violating a Bell-inequality in less than 5 minutes with 100 standard deviations. This new source is a genius tool for new experiments in the field of fundamental physics as well as applied physics. The next chapter shows an experimental implementation of an optical dense quantum coding scheme. The combination of Bell-state generation and analysis of this entangled states leads to a new nonclassical communication scheme, where the channel capacity is enhanced. A single two state photon can be used for coding and decoding 1.58 bit instead of 1 bit for classical two state systems. The following chapter discusses two photon interference effects for two independent light sources. In an experiment two independent fluorescence pulses show this kind of interference effects. The fifth chapter describes 3-photon interference effects. This nonclassical interference effect is the elementary process for the quantum teleportation scheme. In this scheme an unknown particle state is transmitted from A to B without sending the particle itself. (author)

  9. An inter-lighting interference cancellation scheme for MISO-VLC systems

    Science.gov (United States)

    Kim, Kyuntak; Lee, Kyujin; Lee, Kyesan

    2017-08-01

    In this paper, we propose an inter-lighting interference cancellation (ILIC) scheme to reduce the interference between adjacent light-emitting diodes (LEDs) and enhance the transmission capacity of multiple-input-single-output (MISO)-visible light communication (VLC) systems. In indoor environments, multiple LEDs have normally been used as lighting sources, allowing the design of MISO-VLC systems. To enhance the transmission capacity, different data should be simultaneously transmitted from each LED; however, that can lead to interference between adjacent LEDs. In that case, relatively low-received power signals are subjected to large interference because wireless optical systems generally use intensity modulation and direct detection. Thus, only the signal with the highest received power can be detected, while the other received signals cannot be detected. To solve this problem, we propose the ILIC scheme for MISO-VLC systems. The proposed scheme preferentially detects the highest received power signal, and this signal is referred as interference signal by an interference component generator. Then, relatively low-received power signal can be detected by cancelling the interference signal from the total received signals. Therefore, the performance of the proposed scheme can improve the total average bit error rate and throughput of a MISO-VLC system.

  10. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  11. CGC/saturation approach for high energy soft interactions: 'soft' Pomeron structure and v{sub n} in hadron and nucleus collisions from Bose-Einstein correlations

    Energy Technology Data Exchange (ETDEWEB)

    Gotsman, E.; Maor, U. [Tel Aviv University, Department of Particle Physics School of Physics and Astronomy, Raymond and Beverly Sackler Faculty of Exact Science, Tel Aviv (Israel); Levin, E. [Tel Aviv University, Department of Particle Physics School of Physics and Astronomy, Raymond and Beverly Sackler Faculty of Exact Science, Tel Aviv (Israel); Universidad Tecnica Federico Santa Maria and Centro Cientifico-Tecnologico de Valparaiso, Departemento de Fisica, Valparaiso (Chile)

    2016-11-15

    In the framework of our model of soft interactions at high energy based on the CGC/saturation approach, we show that Bose-Einstein correlations of identical gluons lead to large values of v{sub n}. We demonstrate how three dimensional scales of high energy interactions, hadron radius, typical size of the wave function in diffractive production of small masses (size of the constituent quark), and the saturation momentum, influence the values of BE correlations, and in particular, the values of v{sub n}. Our calculation shows that the structure of the 'dressed' Pomeron leads to values of v{sub n} which are close to experimental values for proton-proton scattering, 20 % smaller than the observed values for proton-lead collisions and close to lead-lead collisions for 0-10 % centrality. Bearing this result in mind, we conclude that it is premature to consider that the appearance of long range rapidity azimuthal correlations are due only to the hydrodynamical behaviour of the quark-gluon plasma. (orig.)

  12. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  13. Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation

    Directory of Open Access Journals (Sweden)

    Xia Chen

    2008-05-01

    Full Text Available Relay-based transmission can over the benefits in terms of coverage extension as well as throughput improvement if compared to conventional direct transmission. In a relay enhanced cellular (REC network, where multiple mobile terminals act as relaying nodes (RNs, multiuser diversity gain can be exploited. We propose an efficient relaying scheme, referred to as Broadcast Reserved Opportunity Assisted Diversity (BROAD for the REC networks. Unlike the conventional Induced Multiuser Diversity Relaying (IMDR scheme, our scheme acquires channel quality information (CQI in which the destined node (DN sends pilots on a reserved radio resource. The BROAD scheme can significantly decrease the signaling overhead among the mobile RNs while achieving the same multiuser diversity as the conventional IMDR scheme. In addition, an alternative version of the BROAD scheme, named as A-BROAD scheme, is proposed also, in which the candidate RN(s feed back partial or full CQI to the base station (BS for further scheduling purpose. The A-BROAD scheme achieves a higher throughput than the BROAD scheme at the cost of extra signalling overhead. The theoretical analysis given in this paper demonstrates the feasibility of the schemes in terms of their multiuser diversity gains in a REC network.

  14. A Novel Two-Stage Dynamic Spectrum Sharing Scheme in Cognitive Radio Networks

    Institute of Scientific and Technical Information of China (English)

    Guodong Zhang; Wei Heng; Tian Liang; Chao Meng; Jinming Hu

    2016-01-01

    In order to enhance the efficiency of spectrum utilization and reduce communication overhead in spectrum sharing process,we propose a two-stage dynamic spectrum sharing scheme in which cooperative and noncooperative modes are analyzed in both stages.In particular,the existence and the uniqueness of Nash Equilibrium (NE) strategies for noncooperative mode are proved.In addition,a distributed iterative algorithm is proposed to obtain the optimal solutions of the scheme.Simulation studies are carried out to show the performance comparison between two modes as well as the system revenue improvement of the proposed scheme compared with a conventional scheme without a virtual price control factor.

  15. Numerical investigation of complex flooding schemes for surfactant polymer based enhanced oil recovery

    Science.gov (United States)

    Dutta, Sourav; Daripa, Prabir

    2015-11-01

    Surfactant-polymer flooding is a widely used method of chemical enhanced oil recovery (EOR) in which an array of complex fluids containing suitable and varying amounts of surfactant or polymer or both mixed with water is injected into the reservoir. This is an example of multiphase, multicomponent and multiphysics porous media flow which is characterized by the spontaneous formation of complex viscous fingering patterns and is modeled by a system of strongly coupled nonlinear partial differential equations with appropriate initial and boundary conditions. Here we propose and discuss a modern, hybrid method based on a combination of a discontinuous, multiscale finite element formulation and the method of characteristics to accurately solve the system. Several types of flooding schemes and rheological properties of the injected fluids are used to numerically study the effectiveness of various injection policies in minimizing the viscous fingering and maximizing oil recovery. Numerical simulations are also performed to investigate the effect of various other physical and model parameters such as heterogeneity, relative permeability and residual saturation on the quantities of interest like cumulative oil recovery, sweep efficiency, fingering intensity to name a few. Supported by the grant NPRP 08-777-1-141 from the Qatar National Research Fund (a member of The Qatar Foundation).

  16. Longitudinal impedance and wake from XFEL undulators. Impact on current-enhanced SASE schemes

    Energy Technology Data Exchange (ETDEWEB)

    Geloni, G.; Saldin, E.; Schneidmiller, E.; Yurkov, M.

    2007-06-15

    In this article we derive longitudinal impedance and wake function for an undulator setup with arbitrary undulator parameter, taking into account a finite transverse size of the electron bunch. Earlier studies considered a line density-distribution of electrons instead. We focus our attention on the long-wavelength asymptote (compared with resonance wavelength), at large distance of the electron bunch from the undulator entrance compared to the overtaking length, and for large vacuumchamber size compared to the typical transverse size of the field. These restrictions define a parameter region of interest for practical applications. We calculate a closed expression for impedance and wake function that may be evaluated numerically in the most general case. Such expression allows us to derive an analytical solution for a Gaussian transverse and longitudinal bunch shape. Finally, we study the feasibility of current-enhanced SASE schemes (ESASE) recently proposed for LCLS, that fall well-within our approximations. Numerical estimations presented in this paper indicate that impedance-induced energy spread is sufficient to seriously degrade the FEL performance. Our conclusion is in contrast with results in literature, where wake calculations for the LCLS case are given in free-space, as if the presence of the undulator were negligible. (orig.)

  17. The high energy behavior of QCD. The effective action and the triple-Pomeron-vertex

    Energy Technology Data Exchange (ETDEWEB)

    Hentschinski, Martin

    2009-07-15

    We study integrations over light-cone momenta in the high energy effective action of QCD. After a brief review of the effective action, we arrive on a regularization mechanism from matching of effective action diagrams with QCD diagrams, which we apply to a re-derivation of the reggeized gluon and of the BFKL-equation. We study consequences of the proposed regularization on the analytic structure of 2{yields}3 and 2{yields}4 production amplitudes in the Multi-Regge-Kinematics. We derive a certain part of the 1-loop corrections to the production vertex and demonstrate that they yield the on-set of corrections demanded by the Steinmann-relations. The Reggeon-Particle-2-Reggeon vertex is determined and applied to the construction of various signature configurations of the production amplitudes. We extend the proposed regularization method to states of three and four reggeized gluons and propose a supplement to the effective Lagrangian. We derive vertices for the 1-3 and 2-4 reggeized-gluon-transition inside the elastic amplitude and verify that signature conservation is obeyed. Integral equations for the state of three and four reggeized gluons are formulated and shown to be in accordance with a result by Bartels and Wuesthoff. In a second part we investigate the high-energy behavior of QCD for different surface topologies of color graphs. After a brief review of the planar limit (bootstrap and gluon reggeization) and of the cylinder topology (BFKL) we investigate the 3{yields}3 scattering in the triple Regge limit which belongs to the pair-of-pants topology. We re-derive the triple Pomeron vertex function and show that it belongs to a specific set of graphs in color space which we identify as the analog of the Mandelstam diagram. We then extend the study to the high-energy behavior of N=4 SYM where we find a new class of color graphs not present in QCD. (orig.)

  18. The high energy behavior of QCD. The effective action and the triple-Pomeron-vertex

    International Nuclear Information System (INIS)

    Hentschinski, Martin

    2009-07-01

    We study integrations over light-cone momenta in the high energy effective action of QCD. After a brief review of the effective action, we arrive on a regularization mechanism from matching of effective action diagrams with QCD diagrams, which we apply to a re-derivation of the reggeized gluon and of the BFKL-equation. We study consequences of the proposed regularization on the analytic structure of 2→3 and 2→4 production amplitudes in the Multi-Regge-Kinematics. We derive a certain part of the 1-loop corrections to the production vertex and demonstrate that they yield the on-set of corrections demanded by the Steinmann-relations. The Reggeon-Particle-2-Reggeon vertex is determined and applied to the construction of various signature configurations of the production amplitudes. We extend the proposed regularization method to states of three and four reggeized gluons and propose a supplement to the effective Lagrangian. We derive vertices for the 1-3 and 2-4 reggeized-gluon-transition inside the elastic amplitude and verify that signature conservation is obeyed. Integral equations for the state of three and four reggeized gluons are formulated and shown to be in accordance with a result by Bartels and Wuesthoff. In a second part we investigate the high-energy behavior of QCD for different surface topologies of color graphs. After a brief review of the planar limit (bootstrap and gluon reggeization) and of the cylinder topology (BFKL) we investigate the 3→3 scattering in the triple Regge limit which belongs to the pair-of-pants topology. We re-derive the triple Pomeron vertex function and show that it belongs to a specific set of graphs in color space which we identify as the analog of the Mandelstam diagram. We then extend the study to the high-energy behavior of N=4 SYM where we find a new class of color graphs not present in QCD. (orig.)

  19. Infrared image enhancement with learned features

    Science.gov (United States)

    Fan, Zunlin; Bi, Duyan; Ding, Wenshan

    2017-11-01

    Due to the variation of imaging environment and limitations of infrared imaging sensors, infrared images usually have some drawbacks: low contrast, few details and indistinct edges. Hence, to promote the applications of infrared imaging technology, it is essential to improve the qualities of infrared images. To enhance image details and edges adaptively, we propose an infrared image enhancement method under the proposed image enhancement scheme. On the one hand, on the assumption of high-quality image taking more evident structure singularities than low-quality images, we propose an image enhancement scheme that depends on the extractions of structure features. On the other hand, different from the current image enhancement algorithms based on deep learning networks that try to train and build the end-to-end mappings on improving image quality, we analyze the significance of first layer in Stacked Sparse Denoising Auto-encoder and propose a novel feature extraction for the proposed image enhancement scheme. Experiment results prove that the novel feature extraction is free from some artifacts on the edges such as blocking artifacts, ;gradient reversal;, and pseudo contours. Compared with other enhancement methods, the proposed method achieves the best performance in infrared image enhancement.

  20. Investigation of a monochromator scheme for SPEAR

    International Nuclear Information System (INIS)

    Wille, K.; Chao, A.W.

    1984-08-01

    The possibility of mono-chromatizing SPEAR for the purpose of increasing the hadronic event rate at the narrow resonances was investigated. By using two pairs of electostatic skew quads in monochromator scheme it is found that the event rate can be increased by a factor of 2 for the mini beta optics assuming the luminosity is kept unchanged. An attempt to increase this enhancement factor by major rearrangements of the ring magnets has encountered serious optical difficulties; although enhancement factor of 8 seems possible in principle, this alternative is not recommended

  1. Knowledge-Based Trajectory Error Pattern Method Applied to an Active Force Control Scheme

    Directory of Open Access Journals (Sweden)

    Endra Pitowarno, Musa Mailah, Hishamuddin Jamaluddin

    2012-08-01

    Full Text Available The active force control (AFC method is known as a robust control scheme that dramatically enhances the performance of a robot arm particularly in compensating the disturbance effects. The main task of the AFC method is to estimate the inertia matrix in the feedback loop to provide the correct (motor torque required to cancel out these disturbances. Several intelligent control schemes have already been introduced to enhance the estimation methods of acquiring the inertia matrix such as those using neural network, iterative learning and fuzzy logic. In this paper, we propose an alternative scheme called Knowledge-Based Trajectory Error Pattern Method (KBTEPM to suppress the trajectory track error of the AFC scheme. The knowledge is developed from the trajectory track error characteristic based on the previous experimental results of the crude approximation method. It produces a unique, new and desirable error pattern when a trajectory command is forced. An experimental study was performed using simulation work on the AFC scheme with KBTEPM applied to a two-planar manipulator in which a set of rule-based algorithm is derived. A number of previous AFC schemes are also reviewed as benchmark. The simulation results show that the AFC-KBTEPM scheme successfully reduces the trajectory track error significantly even in the presence of the introduced disturbances.Key Words:  Active force control, estimated inertia matrix, robot arm, trajectory error pattern, knowledge-based.

  2. Update schemes of multi-velocity floor field cellular automaton for pedestrian dynamics

    Science.gov (United States)

    Luo, Lin; Fu, Zhijian; Cheng, Han; Yang, Lizhong

    2018-02-01

    Modeling pedestrian movement is an interesting problem both in statistical physics and in computational physics. Update schemes of cellular automaton (CA) models for pedestrian dynamics govern the schedule of pedestrian movement. Usually, different update schemes make the models behave in different ways, which should be carefully recalibrated. Thus, in this paper, we investigated the influence of four different update schemes, namely parallel/synchronous scheme, random scheme, order-sequential scheme and shuffled scheme, on pedestrian dynamics. The multi-velocity floor field cellular automaton (FFCA) considering the changes of pedestrians' moving properties along walking paths and heterogeneity of pedestrians' walking abilities was used. As for parallel scheme only, the collisions detection and resolution should be considered, resulting in a great difference from any other update schemes. For pedestrian evacuation, the evacuation time is enlarged, and the difference in pedestrians' walking abilities is better reflected, under parallel scheme. In face of a bottleneck, for example a exit, using a parallel scheme leads to a longer congestion period and a more dispersive density distribution. The exit flow and the space-time distribution of density and velocity have significant discrepancies under four different update schemes when we simulate pedestrian flow with high desired velocity. Update schemes may have no influence on pedestrians in simulation to create tendency to follow others, but sequential and shuffled update scheme may enhance the effect of pedestrians' familiarity with environments.

  3. An image encryption scheme based on the MLNCML system using DNA sequences

    Science.gov (United States)

    Zhang, Ying-Qian; Wang, Xing-Yuan; Liu, Jia; Chi, Ze-Lin

    2016-07-01

    We propose a new image scheme based on the spatiotemporal chaos of the Mixed Linear-Nonlinear Coupled Map Lattices (MLNCML). This spatiotemporal chaotic system has more cryptographic features in dynamics than the system of Coupled Map Lattices (CML). In the proposed scheme, we employ the strategy of DNA computing and one time pad encryption policy, which can enhance the sensitivity to the plaintext and resist differential attack, brute-force attack, statistical attack and plaintext attack. Simulation results and theoretical analysis indicate that the proposed scheme has superior high security.

  4. Investigation of optimal photoionization schemes for Sm by multi-step resonance ionization

    International Nuclear Information System (INIS)

    Cha, H.; Song, K.; Lee, J.

    1997-01-01

    Excited states of Sm atoms are investigated by using multi-color resonance enhanced multiphoton ionization spectroscopy. Among the ionization signals one observed at 577.86 nm is regarded as the most efficient excited state if an 1-color 3-photon scheme is applied. Meanwhile an observed level located at 587.42 nm is regarded as the most efficient state if one uses a 2-color scheme. For 2-color scheme a level located at 573.50 nm from this first excited state is one of the best second excited state for the optimal photoionization scheme. Based on this ionization scheme various concentrations of standard solutions for samarium are determined. The minimum amount of sample which can be detected by a 2-color scheme is determined as 200 fg. The detection sensitivity is limited mainly due to the pollution of the graphite atomizer. copyright 1997 American Institute of Physics

  5. An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungyoung Lee

    2011-12-01

    Full Text Available In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO clustering scheme and traditional multihop Single-Input-Single-Output (SISO routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.

  6. Exclusive central diffractive production of scalar, pseudoscalar and vector mesons

    Directory of Open Access Journals (Sweden)

    Lebiedowicz P.

    2014-01-01

    Full Text Available We discuss exclusive central diffractive production of scalar (ƒ0(980, ƒ0(1370, ƒ0(1500, pseudoscalar (η, η′(958, and vector (ρ0 mesons in proton-proton collisions. The amplitudes are formulated in terms of effective vertices required to respect standard rules of Quantum Field Theory and propagators for the exchanged pomeron and reggeons. Different pomeron-pomeron-meson tensorial (vectorial coupling structures are possible in general. In most cases two lowest orbital angular momentum - spin couplings are necessary to describe experimental differential distributions. For the ƒ0(980 and η production the reggeon-pomeron, pomeron-reggeon, and reggeon-reggeon exchanges are included in addition, which seems to be necessary at relatively low energies. The theoretical results are compared with the WA102 experimental data, in order to determine the model parameters. For the ρ0 production the photon-pomeron and pomeron-photon exchanges are considered. The coupling parameters of tensor pomeron and/or reggeon are fixed from the H1 and ZEUS experimental data of the γp → ρ0 p reaction. We present first predictions of this mechanism for pp → ppπ+π− reaction being studied at COMPASS, RHIC, Tevatron, and LHC. Correlation in azimuthal angle between outgoing protons and distribution in pion rapidities at √s = 7 TeV are presented. We show that high-energy central production of mesons could provide crucial information on the spin structure of the soft pomeron.

  7. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  8. Fabrication and photocatalytic activity enhanced mechanism of direct Z-scheme g-C{sub 3}N{sub 4}/Ag{sub 2}WO{sub 4} photocatalyst

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Bicheng [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Department of Science and Environmental Studies The Hong Kong Institute of Education, Tai Po, N.T., Hong Kong (China); Xia, Pengfei; Li, Yao [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Ho, Wingkei, E-mail: keithho@ied.edu.hk [Department of Science and Environmental Studies The Hong Kong Institute of Education, Tai Po, N.T., Hong Kong (China); Yu, Jiaguo, E-mail: jiaguoyu@yahoo.com [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Department of Physics, Faculty of Science, King Abdulaziz University, Jeddah 21589 (Saudi Arabia)

    2017-01-01

    Highlights: • g-C{sub 3}N{sub 4} acted as a support for the in situ growth of β-Ag{sub 2}WO{sub 4}. • g-C{sub 3}N{sub 4} nanosheets inhibited the phase transformation of β-Ag{sub 2}WO{sub 4} to α-Ag{sub 2}WO{sub 4}. • g-C{sub 3}N{sub 4}/Ag{sub 2}WO{sub 4} exhibited a superior photocatalytic activity. • A direct Z-scheme photocatalytic mechanism could explain activity enhancement. - Abstract: Herein, a direct Z-scheme graphitic carbon nitride (g-C{sub 3}N{sub 4})/silver tungstate (Ag{sub 2}WO{sub 4}) photocatalyst was prepared by a facile in situ precipitation method using g-C{sub 3}N{sub 4} as a support and silver nitrate as a precursor. X-ray diffraction, Fourier transform infrared spectroscopy, X-ray photoelectron spectroscopy, transmission electron microscopy, and elemental mapping demonstrated that β-Ag{sub 2}WO{sub 4} nanoparticles were evenly distributed on the surface of g-C{sub 3}N{sub 4} nanosheets, which acted as a support for the nucleation and growth of β-Ag{sub 2}WO{sub 4} and inhibited the phase transformation of metastable β-Ag{sub 2}WO{sub 4} to stable α-Ag{sub 2}WO{sub 4}. Photocatalytic experiments indicated that the g-C{sub 3}N{sub 4}/Ag{sub 2}WO{sub 4} nanocomposite photocatalyst displayed a better photocatalytic activity than pure g-C{sub 3}N{sub 4} and Ag{sub 2}WO{sub 4} toward the degradation of methyl orange. The enhanced photocatalytic performance of g-C{sub 3}N{sub 4}/Ag{sub 2}WO{sub 4} could be well explained by a direct Z-scheme photocatalytic mechanism. This mechanism was related to the efficient space separation of photogenerated electron–hole pairs and the great oxidation and reduction capabilities of the g-C{sub 3}N{sub 4}/Ag{sub 2}WO{sub 4} system. This work provided new insights into the design and fabrication of g-C{sub 3}N{sub 4}-based direct Z-scheme photocatalysts.

  9. Interference-aware random beam selection schemes for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed; Qaraqe, Khalid; Alouini, Mohamed-Slim

    2012-01-01

    users. In this work, we develop interference-aware random beam selection schemes that provide enhanced performance for the secondary network under the condition that the interference observed by the receivers of the primary network is below a

  10. Enhancing the water management schemes of H08 global hydrological model to attribute human water use to six major water sources

    Science.gov (United States)

    Hanasaki, N.; Yoshikawa, S.; Pokhrel, Y. N.; Kanae, S.

    2017-12-01

    Humans abstract water from various sources to sustain their livelihood and society. Some global hydrological models (GHMs) include explicit schemes of human water management, but the representation and performance of these schemes remain limited. We substantially enhanced the human water management schemes of the H08 GHM by incorporating the latest data and techniques. The model enables us to estimate water abstraction from six major water sources, namely, river flow regulated by global reservoirs (i.e., reservoirs regulating the flow of the world's major rivers), aqueduct water transfer, local reservoirs, seawater desalination, renewable groundwater, and nonrenewable groundwater. All the interactions were simulated in a single computer program and the water balance was always strictly closed at any place and time during the simulation period. Using this model, we first conducted a historical global hydrological simulation at a spatial resolution of 0.5 x 0.5 degree to specify the sources of water for humanity. The results indicated that, in 2000, of the 3628 km3yr-1 global freshwater requirement, 2839 km3yr-1 was taken from surface water and 789 km3yr-1 from groundwater. Streamflow, aqueduct water transfer, local reservoirs, and seawater desalination accounted for 1786, 199, 106, and 1.8 km3yr-1 of the surface water, respectively. The remaining 747 km3yr-1 freshwater requirement was unmet, or surface water was not available when and where it was needed in our simulation. Renewable and nonrenewable groundwater accounted for 607 and 182 km3yr-1 of the groundwater total, respectively. Second, we evaluated the water stress using our simulations and contrasted it with earlier global assessments based on empirical water scarcity indicators, namely, the Withdrawal to Availability ratio and the Falkenmark index (annual renewable water resources per capita). We found that inclusion of water infrastructures in our model diminished water stress in some parts of the world, on

  11. Optimal Scheme Selection of Agricultural Production Structure Adjustment - Based on DEA Model; Punjab (Pakistan)

    Institute of Scientific and Technical Information of China (English)

    Zeeshan Ahmad; Meng Jun; Muhammad Abdullah; Mazhar Nadeem Ishaq; Majid Lateef; Imran Khan

    2015-01-01

    This paper used the modern evaluation method of DEA (Data Envelopment Analysis) to assess the comparative efficiency and then on the basis of this among multiple schemes chose the optimal scheme of agricultural production structure adjustment. Based on the results of DEA model, we dissected scale advantages of each discretionary scheme or plan. We examined scale advantages of each discretionary scheme, tested profoundly a definitive purpose behind not-DEA efficient, which elucidated the system and methodology to enhance these discretionary plans. At the end, another method had been proposed to rank and select the optimal scheme. The research was important to guide the practice if the modification of agricultural production industrial structure was carried on.

  12. An enhanced forest classification scheme for modeling vegetation-climate interactions based on national forest inventory data

    Science.gov (United States)

    Majasalmi, Titta; Eisner, Stephanie; Astrup, Rasmus; Fridman, Jonas; Bright, Ryan M.

    2018-01-01

    Forest management affects the distribution of tree species and the age class of a forest, shaping its overall structure and functioning and in turn the surface-atmosphere exchanges of mass, energy, and momentum. In order to attribute climate effects to anthropogenic activities like forest management, good accounts of forest structure are necessary. Here, using Fennoscandia as a case study, we make use of Fennoscandic National Forest Inventory (NFI) data to systematically classify forest cover into groups of similar aboveground forest structure. An enhanced forest classification scheme and related lookup table (LUT) of key forest structural attributes (i.e., maximum growing season leaf area index (LAImax), basal-area-weighted mean tree height, tree crown length, and total stem volume) was developed, and the classification was applied for multisource NFI (MS-NFI) maps from Norway, Sweden, and Finland. To provide a complete surface representation, our product was integrated with the European Space Agency Climate Change Initiative Land Cover (ESA CCI LC) map of present day land cover (v.2.0.7). Comparison of the ESA LC and our enhanced LC products (https://doi.org/10.21350/7zZEy5w3) showed that forest extent notably (κ = 0.55, accuracy 0.64) differed between the two products. To demonstrate the potential of our enhanced LC product to improve the description of the maximum growing season LAI (LAImax) of managed forests in Fennoscandia, we compared our LAImax map with reference LAImax maps created using the ESA LC product (and related cross-walking table) and PFT-dependent LAImax values used in three leading land models. Comparison of the LAImax maps showed that our product provides a spatially more realistic description of LAImax in managed Fennoscandian forests compared to reference maps. This study presents an approach to account for the transient nature of forest structural attributes due to human intervention in different land models.

  13. A Key Pre-Distribution Scheme Based on µ-PBIBD for Enhancing Resilience in Wireless Sensor Networks.

    Science.gov (United States)

    Yuan, Qi; Ma, Chunguang; Yu, Haitao; Bian, Xuefen

    2018-05-12

    Many key pre-distribution (KPD) schemes based on combinatorial design were proposed for secure communication of wireless sensor networks (WSNs). Due to complexity of constructing the combinatorial design, it is infeasible to generate key rings using the corresponding combinatorial design in large scale deployment of WSNs. In this paper, we present a definition of new combinatorial design, termed “µ-partially balanced incomplete block design (µ-PBIBD)”, which is a refinement of partially balanced incomplete block design (PBIBD), and then describe a 2-D construction of µ-PBIBD which is mapped to KPD in WSNs. Our approach is of simple construction which provides a strong key connectivity and a poor network resilience. To improve the network resilience of KPD based on 2-D µ-PBIBD, we propose a KPD scheme based on 3-D Ex-µ-PBIBD which is a construction of µ-PBIBD from 2-D space to 3-D space. Ex-µ-PBIBD KPD scheme improves network scalability and resilience while has better key connectivity. Theoretical analysis and comparison with the related schemes show that key pre-distribution scheme based on Ex-µ-PBIBD provides high network resilience and better key scalability, while it achieves a trade-off between network resilience and network connectivity.

  14. Regge cuts in γγ scattering

    International Nuclear Information System (INIS)

    Jackson, C.P.

    1976-01-01

    It is shown that the Pomeron-Pomeron cut in γγ scattering has natural C parity and conspires, in contrast to the Pomeron pole which is evasive, and has natural parity and C parity. The constraints this places upon the invariant amplitudes are analyzed

  15. Non-planar corrections to the Pomeron and reggeons in the dual unitarity scheme

    International Nuclear Information System (INIS)

    Uschersohn, J.

    1976-03-01

    A special class of non-planar diagrams is studied, those in which the produced clusters are crossed. Insertion of these diagrams in the reggeon propagators accounts for exchange degeneracy breaking. The even signature reggeons get their intercept promoted to a larger value, while the odd signature ones are left unchanged. (author)

  16. Z-Scheme NiTiO 3 /g-C 3 N 4 Heterojunctions with Enhanced Photoelectrochemical and Photocatalytic Performances under Visible LED Light Irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Zhenyu [School; Zeng, Xiaoqiao [Chemical; Li, Kai [School; Gao, Shanmin [School; Wang, Qingyao [School; Lu, Jun [Chemical

    2017-11-14

    Direct Z-scheme NiTiO3/g-C3N4 heterojunctions were successfully assembled by using simple calcination method and the photoelectrochemical and photocatalytic performance were investigated by light emitting diode (LED). The photoanode composed by the heterojunction with about 50 wt% NiTiO3 content exhibits the best photoelectrochemical activity with photoconversion efficiency up to 0.066%, which is 4.4 and 3.13 times larger than NiTiO3 or g-C3N4. The remarkably enhanced photoelectrochemical and photocatalytic activity of the heterojunction can be due to the efficiently photogenerated electron-hole separation by a Z-scheme mechanism.

  17. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2014-01-01

    Full Text Available Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior.

  18. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  19. A new two-code keying scheme for SAC-OCDMA systems enabling bipolar encoding

    Science.gov (United States)

    Al-Khafaji, Hamza M. R.; Ngah, Razali; Aljunid, S. A.; Rahman, T. A.

    2015-03-01

    In this paper, we propose a new two-code keying scheme for enabling bipolar encoding in a high-rate spectral-amplitude coding optical code-division multiple-access (SAC-OCDMA) system. The mathematical formulations are derived for the signal-to-noise ratio and bit-error rate (BER) of SAC-OCDMA system based on the suggested scheme using multi-diagonal (MD) code. Performance analyses are assessed considering the effects of phase-induced intensity noise, as well as shot and thermal noises in photodetectors. The numerical results demonstrated that the proposed scheme exhibits an enhanced BER performance compared to the existing unipolar encoding with direct detection technique. Furthermore, the performance improvement afforded by this scheme is verified using simulation experiments.

  20. Discretisation Schemes for Level Sets of Planar Gaussian Fields

    Science.gov (United States)

    Beliaev, D.; Muirhead, S.

    2018-01-01

    Smooth random Gaussian functions play an important role in mathematical physics, a main example being the random plane wave model conjectured by Berry to give a universal description of high-energy eigenfunctions of the Laplacian on generic compact manifolds. Our work is motivated by questions about the geometry of such random functions, in particular relating to the structure of their nodal and level sets. We study four discretisation schemes that extract information about level sets of planar Gaussian fields. Each scheme recovers information up to a different level of precision, and each requires a maximum mesh-size in order to be valid with high probability. The first two schemes are generalisations and enhancements of similar schemes that have appeared in the literature (Beffara and Gayet in Publ Math IHES, 2017. https://doi.org/10.1007/s10240-017-0093-0; Mischaikow and Wanner in Ann Appl Probab 17:980-1018, 2007); these give complete topological information about the level sets on either a local or global scale. As an application, we improve the results in Beffara and Gayet (2017) on Russo-Seymour-Welsh estimates for the nodal set of positively-correlated planar Gaussian fields. The third and fourth schemes are, to the best of our knowledge, completely new. The third scheme is specific to the nodal set of the random plane wave, and provides global topological information about the nodal set up to `visible ambiguities'. The fourth scheme gives a way to approximate the mean number of excursion domains of planar Gaussian fields.

  1. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  2. PPM-based relay communication schemes for wireless body area networks

    NARCIS (Netherlands)

    Zhang, P.; Willems, F.M.J.; Huang, Li

    2012-01-01

    This paper investigates cooperative communication schemes based on a single relay with pulse-position modulation (PPM) signaling, for enhancing energy efficiency of wireless body area networks (WBANs) in noncoherent channel settings. We explore cooperation between the source and the relay such that

  3. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuhua Wang

    2017-02-01

    Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  4. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  5. A novel image encryption scheme based on the ergodicity of baker map

    Science.gov (United States)

    Ye, Ruisong; Chen, Yonghong

    2012-01-01

    Thanks to the exceptionally good properties in chaotic systems, such as sensitivity to initial conditions and control parameters, pseudo-randomness and ergodicity, chaos-based image encryption algorithms have been widely studied and developed in recent years. A novel digital image encryption scheme based on the chaotic ergodicity of Baker map is proposed in this paper. Different from traditional encryption schemes based on Baker map, we permute the pixel positions by their corresponding order numbers deriving from the approximating points in one chaotic orbit. To enhance the resistance to statistical and differential attacks, a diffusion process is suggested as well in the proposed scheme. The proposed scheme enlarges the key space significantly to resist brute-force attack. Additionally, the distribution of gray values in the cipher-image has a random-like behavior to resist statistical analysis. The proposed scheme is robust against cropping, tampering and noising attacks as well. It therefore suggests a high secure and efficient way for real-time image encryption and transmission in practice.

  6. A security-awareness virtual machine management scheme based on Chinese wall policy in cloud computing.

    Science.gov (United States)

    Yu, Si; Gui, Xiaolin; Lin, Jiancai; Tian, Feng; Zhao, Jianqiang; Dai, Min

    2014-01-01

    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much.

  7. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  8. A Low-Power WLAN Communication Scheme for IoT WLAN Devices Using Wake-Up Receivers

    Directory of Open Access Journals (Sweden)

    Hanseul Hong

    2018-01-01

    Full Text Available In this paper, we propose a delay- and power-efficient, multi-user, low-power wireless local area network (WLAN communication scheme for Internet of Things (IoT WLAN devices. Extremely low-power operation is one of the key requirements of emerging IoT devices. However, the current duty-cycle-based power saving approach may incur large access delay times owing to the trade-offs between the power consumption and the access delay. In order to reduce this delay and enhance the power-saving performance, wake-up receiver-based schemes have been proposed. However, because wake-up receiver-based schemes do not consider multiuser operation in dense communication environments, large delays are inevitable in the case of multiuser operation. In order to provide extremely low-power operation and under 1-mW standby power with reduced delay, we employed the optimized multiuser transmission scheduling of IEEE 802.11ax in the proposed scheme and proper enhanced distributed channel access (EDCA parameter settings. This is with the aim to reduce the delay caused by long wake-up times, and to avoid collisions caused by simultaneous transmission in uplink multiuser scenario. By using the proposed scheme, simultaneous IoT communication with multiple mobile IoT devices is possible while providing low-power operation. Simulation results verified the outstanding delay performance of the proposed scheme.

  9. A Scheme for Initial Exploratory Data Analysis of Multivariate Image Data

    DEFF Research Database (Denmark)

    Hilger, Klaus Baggesen; Nielsen, Allan Aasbjerg; Larsen, Rasmus

    2001-01-01

    A new scheme is proposed for handling initial exploratory analyses of multivariate image data. The method is invariant to linear transformations of the original data and is useful for data fusion of multisource measurements. The scheme includes dimensionality reduction followed by unsupervised...... clustering of the data. A transformation is proposed which maximizes autocorrelation by projection onto subspaces with signal-to-noise ratio dependent variance. We apply the traditional fuzzy c-means algorithm and introduce two additional memberships enhancing the textural awareness of the algorithm. Cluster...

  10. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  11. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Directory of Open Access Journals (Sweden)

    Hakjun Lee

    Full Text Available With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  12. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  13. Development and evaluation of a computer-aided diagnostic scheme for lung nodule detection in chest radiographs by means of two-stage nodule enhancement with support vector classification

    International Nuclear Information System (INIS)

    Chen Sheng; Suzuki, Kenji; MacMahon, Heber

    2011-01-01

    Purpose: To develop a computer-aided detection (CADe) scheme for nodules in chest radiographs (CXRs) with a high sensitivity and a low false-positive (FP) rate. Methods: The authors developed a CADe scheme consisting of five major steps, which were developed for improving the overall performance of CADe schemes. First, to segment the lung fields accurately, the authors developed a multisegment active shape model. Then, a two-stage nodule-enhancement technique was developed for improving the conspicuity of nodules. Initial nodule candidates were detected and segmented by using the clustering watershed algorithm. Thirty-one shape-, gray-level-, surface-, and gradient-based features were extracted from each segmented candidate for determining the feature space, including one of the new features based on the Canny edge detector to eliminate a major FP source caused by rib crossings. Finally, a nonlinear support vector machine (SVM) with a Gaussian kernel was employed for classification of the nodule candidates. Results: To evaluate and compare the scheme to other published CADe schemes, the authors used a publicly available database containing 140 nodules in 140 CXRs and 93 normal CXRs. The CADe scheme based on the SVM classifier achieved sensitivities of 78.6% (110/140) and 71.4% (100/140) with averages of 5.0 (1165/233) FPs/image and 2.0 (466/233) FPs/image, respectively, in a leave-one-out cross-validation test, whereas the CADe scheme based on a linear discriminant analysis classifier had a sensitivity of 60.7% (85/140) at an FP rate of 5.0 FPs/image. For nodules classified as ''very subtle'' and ''extremely subtle,'' a sensitivity of 57.1% (24/42) was achieved at an FP rate of 5.0 FPs/image. When the authors used a database developed at the University of Chicago, the sensitivities was 83.3% (40/48) and 77.1% (37/48) at an FP rate of 5.0 (240/48) FPs/image and 2.0 (96/48) FPs /image, respectively. Conclusions: These results compare favorably to those described for

  14. East Asian winter monsoon forecasting schemes based on the NCEP's climate forecast system

    Science.gov (United States)

    Tian, Baoqiang; Fan, Ke; Yang, Hongqing

    2017-12-01

    The East Asian winter monsoon (EAWM) is the major climate system in the Northern Hemisphere during boreal winter. In this study, we developed two schemes to improve the forecasting skill of the interannual variability of the EAWM index (EAWMI) using the interannual increment prediction method, also known as the DY method. First, we found that version 2 of the NCEP's Climate Forecast System (CFSv2) showed higher skill in predicting the EAWMI in DY form than not. So, based on the advantage of the DY method, Scheme-I was obtained by adding the EAWMI DY predicted by CFSv2 to the observed EAWMI in the previous year. This scheme showed higher forecasting skill than CFSv2. Specifically, during 1983-2016, the temporal correlation coefficient between the Scheme-I-predicted and observed EAWMI was 0.47, exceeding the 99% significance level, with the root-mean-square error (RMSE) decreased by 12%. The autumn Arctic sea ice and North Pacific sea surface temperature (SST) are two important external forcing factors for the interannual variability of the EAWM. Therefore, a second (hybrid) prediction scheme, Scheme-II, was also developed. This scheme not only involved the EAWMI DY of CFSv2, but also the sea-ice concentration (SIC) observed the previous autumn in the Laptev and East Siberian seas and the temporal coefficients of the third mode of the North Pacific SST in DY form. We found that a negative SIC anomaly in the preceding autumn over the Laptev and the East Siberian seas could lead to a significant enhancement of the Aleutian low and East Asian westerly jet in the following winter. However, the intensity of the winter Siberian high was mainly affected by the third mode of the North Pacific autumn SST. Scheme-I and Scheme-II also showed higher predictive ability for the EAWMI in negative anomaly years compared to CFSv2. More importantly, the improvement in the prediction skill of the EAWMI by the new schemes, especially for Scheme-II, could enhance the forecasting skill of

  15. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  16. Assessment of remedial control schemes for damping transient oscillations in the Mexican system

    Energy Technology Data Exchange (ETDEWEB)

    Castellanos, R.B.; Sarmiento, H.U.; Pampin, G. [Inst.de Investigaciones Electricas, Morelos (Mexico); Messina, A.R. [Cinvestav, San Pedro Zacatenco (Mexico)

    2008-07-01

    In order to enhance voltage control and power system dynamic performance, special protection systems (SPS) are increasingly being used in the Mexican Interconnected System (MIS). These include extensive use of direct load shedding schemes, generator tripping schemes, controlled disconnection of lines, and automatic generation rejection and single phase reclosing schemes. Generator tripping based on local detection of severe disturbance is of particular importance and has been used to enhance transient stability. In addition, the onset of system instability has become more complex, often involving interactions between major system modes. Post-fault transient oscillations have become more common following the loss of major system elements and may result in uncontrolled system separation. This has motivated the need to develop system-wide special protection systems. This paper explored the possible benefits and feasibility of employing SPSs to mitigate wide-area inter-area oscillations in the MIS. The paper described the exploratory studies such as the coordinated application of automatic generation tripping schemes and automatic load shedding to enhance system dynamic performance. The paper also explained sensitivity studies that were conducted to determine the amount and location of generation (load) to be shed and suggested extensions to the basic security criteria to maintain network stability. The proposed techniques were developed and tested on a large-scale representation of the Mexican system that included the operation of several FACTS controllers. It was concluded that automatic generation shedding and automatic loading shedding were efficient alternatives to improve generation and transmission use, reliability and flexibility. 7 refs., 1 tab., 3 figs.

  17. Impact of improved operation and maintenance on cohesive sediment transport in Gezira Scheme, Sudan

    NARCIS (Netherlands)

    Osman, I.S.E.

    2015-01-01

    Summary

    Efficient operation and maintenance of irrigation schemes are needed for improving the hydraulic performance of the canals, enhancing the crop yields and insuring sustainable production. There is a great need to enhance the researches and for a variety of tools such as

  18. Developing benefit schemes and financial compensation measures for fishermen impacted by marine renewable energy projects

    International Nuclear Information System (INIS)

    Reilly, Kieran; O’Hagan, Anne Marie; Dalton, Gordon

    2016-01-01

    Commercial fishermen are arguably the stakeholder group most likely to be directly impacted by the expansion of the marine renewable energy (MRE) sector. The potential opposition of fishermen may hinder the development of MRE projects and the provision of benefit schemes could to enhance acceptance. Benefit schemes refer to additional voluntary measures that are provided by a developer to local stakeholders. The aim of this study is to explore the issue of the provision of benefit packages to local fishing communities and financial compensation measures for fishermen who may be impacted by MRE projects. Semi-structured interviews were conducted with fourteen fishermen from three separate case study sites around the island of Ireland where MRE projects were being developed. In addition, ten company fisheries liaison officers (CFLOs) who have worked on MRE projects in the UK and Ireland were also interviewed. The interviews were analysed under the headings of local employment, benefits in kind, compensation and community funds and ownership of projects. Analysis shows that there is uncertainty among fishermen over whether they would benefit or gain employment from MRE. Provision of re-training schemes and preferential hiring practices could be used by MRE developers to reduce this uncertainty. There was also agreement between fishermen and CFLOs on the need for the provision of an evidence-base and a standard approach for the calculation of disruption payments. A formal structure for the provision of benefit schemes for fishermen would be useful. Furthermore, schemes that provide a range of benefits to fishermen and other stakeholders over the lifetime of a MRE project are more likely to be successful at enhancing acceptance. - Highlights: • There is uncertainty among fishermen over benefits from MRE projects. • Re-training is required for fishermen to avail of employment opportunities. • Evidence-base is required for calculation of disruption payments.

  19. Multiple image encryption scheme based on pixel exchange operation and vector decomposition

    Science.gov (United States)

    Xiong, Y.; Quan, C.; Tay, C. J.

    2018-02-01

    We propose a new multiple image encryption scheme based on a pixel exchange operation and a basic vector decomposition in Fourier domain. In this algorithm, original images are imported via a pixel exchange operator, from which scrambled images and pixel position matrices are obtained. Scrambled images encrypted into phase information are imported using the proposed algorithm and phase keys are obtained from the difference between scrambled images and synthesized vectors in a charge-coupled device (CCD) plane. The final synthesized vector is used as an input in a random phase encoding (DRPE) scheme. In the proposed encryption scheme, pixel position matrices and phase keys serve as additional private keys to enhance the security of the cryptosystem which is based on a 4-f system. Numerical simulations are presented to demonstrate the feasibility and robustness of the proposed encryption scheme.

  20. Evolution of the Z-scheme of photosynthesis: a perspective.

    Science.gov (United States)

    Govindjee; Shevela, Dmitriy; Björn, Lars Olof

    2017-09-01

    The concept of the Z-scheme of oxygenic photosynthesis is in all the textbooks. However, its evolution is not. We focus here mainly on some of the history of its biophysical aspects. We have arbitrarily divided here the 1941-2016 period into three sub-periods: (a) Origin of the concept of two light reactions: first hinted at, in 1941, by James Franck and Karl Herzfeld; described and explained, in 1945, by Eugene Rabinowitch; and a clear hypothesis, given in 1956 by Rabinowitch, of the then available cytochrome experiments: one light oxidizing it and another reducing it; (b) Experimental discovery of the two light reactions and two pigment systems and the Z-scheme of photosynthesis: Robert Emerson's discovery, in 1957, of enhancement in photosynthesis when two light beams (one in the far-red region, and the other of shorter wavelengths) are given together than when given separately; and the 1960 scheme of Robin Hill & Fay Bendall; and (c) Evolution of the many versions of the Z-Scheme: Louis Duysens and Jan Amesz's 1961 experiments on oxidation and reduction of cytochrome f by two different wavelengths of light, followed by the work of many others for more than 50 years.

  1. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  2. Efficient Anonymous Authenticated Key Agreement Scheme for Wireless Body Area Networks

    Directory of Open Access Journals (Sweden)

    Tong Li

    2017-01-01

    Full Text Available Wireless body area networks (WBANs are widely used in telemedicine, which can be utilized for real-time patients monitoring and home health-care. The sensor nodes in WBANs collect the client’s physiological data and transmit it to the medical center. However, the clients’ personal information is sensitive and there are many security threats in the extra-body communication. Therefore, the security and privacy of client’s physiological data need to be ensured. Many authentication protocols for WBANs have been proposed in recent years. However, the existing protocols fail to consider the key update phase. In this paper, we propose an efficient authenticated key agreement scheme for WBANs and add the key update phase to enhance the security of the proposed scheme. In addition, session keys are generated during the registration phase and kept secretly, thus reducing computation cost in the authentication phase. The performance analysis demonstrates that our scheme is more efficient than the currently popular related schemes.

  3. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  4. Enhancing deep convolutional neural network scheme for breast cancer diagnosis with unlabeled data.

    Science.gov (United States)

    Sun, Wenqing; Tseng, Tzu-Liang Bill; Zhang, Jianying; Qian, Wei

    2017-04-01

    In this study we developed a graph based semi-supervised learning (SSL) scheme using deep convolutional neural network (CNN) for breast cancer diagnosis. CNN usually needs a large amount of labeled data for training and fine tuning the parameters, and our proposed scheme only requires a small portion of labeled data in training set. Four modules were included in the diagnosis system: data weighing, feature selection, dividing co-training data labeling, and CNN. 3158 region of interests (ROIs) with each containing a mass extracted from 1874 pairs of mammogram images were used for this study. Among them 100 ROIs were treated as labeled data while the rest were treated as unlabeled. The area under the curve (AUC) observed in our study was 0.8818, and the accuracy of CNN is 0.8243 using the mixed labeled and unlabeled data. Copyright © 2016. Published by Elsevier Ltd.

  5. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong

    2015-11-01

    The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.

  6. Security scheme in IMDD-OFDM-PON system with the chaotic pilot interval and scrambling

    Science.gov (United States)

    Chen, Qianghua; Bi, Meihua; Fu, Xiaosong; Lu, Yang; Zeng, Ran; Yang, Guowei; Yang, Xuelin; Xiao, Shilin

    2018-01-01

    In this paper, a random chaotic pilot interval and permutations scheme without any requirement of redundant sideband information is firstly proposed for the physical layer security-enhanced intensity modulation direct detection orthogonal frequency division multiplexing passive optical network (IMDD-OFDM-PON) system. With the help of the position feature of inserting the pilot, a simple logistic chaos map is used to generate the random pilot interval and scramble the chaotic subcarrier allocation of each column pilot data for improving the physical layer confidentiality. Due to the dynamic chaotic permutations of pilot data, the enhanced key space of ∼103303 is achieved in OFDM-PON. Moreover, the transmission experiment of 10-Gb/s 16-QAM encrypted OFDM data is successfully demonstrated over 20-km single-mode fiber, which indicates that the proposed scheme not only improves the system security, but also can achieve the same performance as in the common IMDD-OFDM-PON system without encryption scheme.

  7. Improved Seasonal Prediction of European Summer Temperatures With New Five-Layer Soil-Hydrology Scheme

    Science.gov (United States)

    Bunzel, Felix; Müller, Wolfgang A.; Dobrynin, Mikhail; Fröhlich, Kristina; Hagemann, Stefan; Pohlmann, Holger; Stacke, Tobias; Baehr, Johanna

    2018-01-01

    We evaluate the impact of a new five-layer soil-hydrology scheme on seasonal hindcast skill of 2 m temperatures over Europe obtained with the Max Planck Institute Earth System Model (MPI-ESM). Assimilation experiments from 1981 to 2010 and 10-member seasonal hindcasts initialized on 1 May each year are performed with MPI-ESM in two soil configurations, one using a bucket scheme and one a new five-layer soil-hydrology scheme. We find the seasonal hindcast skill for European summer temperatures to improve with the five-layer scheme compared to the bucket scheme and investigate possible causes for these improvements. First, improved indirect soil moisture assimilation allows for enhanced soil moisture-temperature feedbacks in the hindcasts. Additionally, this leads to improved prediction of anomalies in the 500 hPa geopotential height surface, reflecting more realistic atmospheric circulation patterns over Europe.

  8. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  9. Institutional analysis of incentive schemes for ecosystem service provision - a comparative study across four European countries

    DEFF Research Database (Denmark)

    Prokofieva, Irina; Górriz, Elena; Boon, Tove Enggrob

    2014-01-01

    Incentive schemes and payments for ecosystem services attract increasing attention as a means for aligning the interests of landowners and society by remunerating forest owners for the goods and services their forests produce. As incentive schemes expand around the world, questions related...... and Italy. The analysed schemes are predominantly aimed at enhancing biodiversity and improving recreation. One of the schemes is also related to preserving a variety of forest ecosystem services from forest fires. The incentive schemes are studied following a framework for the institutional analysis of PES...... developed by Prokofieva and Gorriz (Prokofieva, I. and Gorriz, E. 2013: Institutional analysis of incentives for the provision of forest goods and services: an assessment of incentive schemes in Catalonia (North-East Spain), Forest Policy and Economics, 37, 104-114.). We focus on actor and institutional...

  10. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  11. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  12. An Efficient Offloading Scheme For MEC System Considering Delay and Energy Consumption

    Science.gov (United States)

    Sun, Yanhua; Hao, Zhe; Zhang, Yanhua

    2018-01-01

    With the increasing numbers of mobile devices, mobile edge computing (MEC) which provides cloud computing capabilities proximate to mobile devices in 5G networks has been envisioned as a promising paradigm to enhance users experience. In this paper, we investigate a joint consideration of delay and energy consumption offloading scheme (JCDE) for MEC system in 5G heterogeneous networks. An optimization is formulated to minimize the delay as well as energy consumption of the offloading system, which the delay and energy consumption of transmitting and calculating tasks are taken into account. We adopt an iterative greedy algorithm to solve the optimization problem. Furthermore, simulations were carried out to validate the utility and effectiveness of our proposed scheme. The effect of parameter variations on the system is analysed as well. Numerical results demonstrate delay and energy efficiency promotion of our proposed scheme compared with another paper’s scheme.

  13. Segmentation Scheme for Safety Enhancement of Engineered Safety Features Component Control System

    International Nuclear Information System (INIS)

    Lee, Sangseok; Sohn, Kwangyoung; Lee, Junku; Park, Geunok

    2013-01-01

    Common Caused Failure (CCF) or undetectable failure would adversely impact safety functions of ESF-CCS in the existing nuclear power plants. We propose the segmentation scheme to solve these problems. Main function assignment to segments in the proposed segmentation scheme is based on functional dependency and critical function success path by using the dependency depth matrix. The segment has functional independence and physical isolation. The segmentation structure is that prohibit failure propagation to others from undetectable failures. Therefore, the segmentation system structure has robustness to undetectable failures. The segmentation system structure has functional diversity. The specific function in the segment defected by CCF, the specific function could be maintained by diverse control function that assigned to other segments. Device level control signals and system level control signals are separated and also control signal and status signals are separated due to signal transmission paths are allocated independently based on signal type. In this kind of design, single device failure or failures on signal path in the channel couldn't result in the loss of all segmented functions simultaneously. Thus the proposed segmentation function is the design scheme that improves availability of safety functions. In conventional ESF-CCS, the single controller generates the signal to control the multiple safety functions, and the reliability is achieved by multiplication within the channel. This design has a drawback causing the loss of multiple functions due to the CCF (Common Cause Failure) and single failure Heterogeneous controller guarantees the diversity ensuring the execution of safety functions against the CCF and single failure, but requiring a lot of resources like manpower and cost. The segmentation technology based on the compartmentalization and functional diversification decreases the CCF and single failure nonetheless the identical types of controllers

  14. Segmentation Scheme for Safety Enhancement of Engineered Safety Features Component Control System

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sangseok; Sohn, Kwangyoung [Korea Reliability Technology and System, Daejeon (Korea, Republic of); Lee, Junku; Park, Geunok [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2013-05-15

    Common Caused Failure (CCF) or undetectable failure would adversely impact safety functions of ESF-CCS in the existing nuclear power plants. We propose the segmentation scheme to solve these problems. Main function assignment to segments in the proposed segmentation scheme is based on functional dependency and critical function success path by using the dependency depth matrix. The segment has functional independence and physical isolation. The segmentation structure is that prohibit failure propagation to others from undetectable failures. Therefore, the segmentation system structure has robustness to undetectable failures. The segmentation system structure has functional diversity. The specific function in the segment defected by CCF, the specific function could be maintained by diverse control function that assigned to other segments. Device level control signals and system level control signals are separated and also control signal and status signals are separated due to signal transmission paths are allocated independently based on signal type. In this kind of design, single device failure or failures on signal path in the channel couldn't result in the loss of all segmented functions simultaneously. Thus the proposed segmentation function is the design scheme that improves availability of safety functions. In conventional ESF-CCS, the single controller generates the signal to control the multiple safety functions, and the reliability is achieved by multiplication within the channel. This design has a drawback causing the loss of multiple functions due to the CCF (Common Cause Failure) and single failure Heterogeneous controller guarantees the diversity ensuring the execution of safety functions against the CCF and single failure, but requiring a lot of resources like manpower and cost. The segmentation technology based on the compartmentalization and functional diversification decreases the CCF and single failure nonetheless the identical types of

  15. Cryptanalysis and Improvement of the Robust and Blind Watermarking Scheme for Dual Color Image

    Directory of Open Access Journals (Sweden)

    Hai Nan

    2015-01-01

    Full Text Available With more color images being widely used on the Internet, the research on embedding color watermark image into color host image has been receiving more attention. Recently, Su et al. have proposed a robust and blind watermarking scheme for dual color image, in which the main innovation is the using of two-level DCT. However, it has been demonstrated in this paper that the original scheme in Su’s study is not secure and can be attacked by our proposed method. In addition, some errors in the original scheme have been pointed out. Also, an improvement measure is presented to enhance the security of the original watermarking scheme. The proposed method has been confirmed by both theoretical analysis and experimental results.

  16. Enhanced Near-cloak by FSH Lining

    OpenAIRE

    Liu, Hongyu; Sun, Hongpeng

    2011-01-01

    We consider regularized approximate cloaking for the Helmholtz equation. Various cloaking schemes have been recently proposed and extensively investigated. The existing cloaking schemes in literature are (optimally) within $|\\ln\\rho|^{-1}$ in 2D and $\\rho$ in 3D of the perfect cloaking, where $\\rho$ denotes the regularization parameter. In this work, we develop a cloaking scheme with a well-designed lossy layer right outside the cloaked region that can produce significantly enhanced near-cloa...

  17. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  18. Performance enhancement of successive interference cancellation scheme based on spectral amplitude coding for optical code-division multiple-access systems using Hadamard codes

    Science.gov (United States)

    Eltaif, Tawfig; Shalaby, Hossam M. H.; Shaari, Sahbudin; Hamarsheh, Mohammad M. N.

    2009-04-01

    A successive interference cancellation scheme is applied to optical code-division multiple-access (OCDMA) systems with spectral amplitude coding (SAC). A detailed analysis of this system, with Hadamard codes used as signature sequences, is presented. The system can easily remove the effect of the strongest signal at each stage of the cancellation process. In addition, simulation of the prose system is performed in order to validate the theoretical results. The system shows a small bit error rate at a large number of active users compared to the SAC OCDMA system. Our results reveal that the proposed system is efficient in eliminating the effect of the multiple-user interference and in the enhancement of the overall performance.

  19. Giant Kerr nonlinearities using refractive-index enhancement

    International Nuclear Information System (INIS)

    Yavuz, D. D.; Sikes, D. E.

    2010-01-01

    By utilizing refractive-index enhancement with vanishing absorption, a scheme is suggested that achieves giant Kerr nonlinearities between two weak laser beams. One application of this scheme is discussed and an all-optical distributed Bragg reflector is proposed that works at very low light levels.

  20. Adaptive Duty-Cycling to Enhance Topology Control Schemes in Wireless Sensor Networks

    OpenAIRE

    Cha, Myungsu; Kim, Mihui; Kim, Dongsoo S.; Choo, Hyunseung

    2014-01-01

    To prolong the network lifetime, various scheduling approaches that schedule wireless devices of nodes to switch between active and sleep states have been studied. Topology control schemes are one of the scheduling approaches that can extend the network lifetime and reduce the additional communication delays at the same time. However, they do not guarantee that all nodes have the same lifetime. They reduce the network coverage and prevent seamless communications. This paper proposes an adapti...

  1. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  2. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  3. A Reliable Image Watermarking Scheme Based on Redistributed Image Normalization and SVD

    Directory of Open Access Journals (Sweden)

    Musrrat Ali

    2016-01-01

    Full Text Available Digital image watermarking is the process of concealing secret information in a digital image for protecting its rightful ownership. Most of the existing block based singular value decomposition (SVD digital watermarking schemes are not robust to geometric distortions, such as rotation in an integer multiple of ninety degree and image flipping, which change the locations of the pixels but don’t make any changes to the pixel’s intensity of the image. Also, the schemes have used a constant scaling factor to give the same weightage to the coefficients of different magnitudes that results in visible distortion in some regions of the watermarked image. Therefore, to overcome the problems mentioned here, this paper proposes a novel image watermarking scheme by incorporating the concepts of redistributed image normalization and variable scaling factor depending on the coefficient’s magnitude to be embedded. Furthermore, to enhance the security and robustness the watermark is shuffled by using the piecewise linear chaotic map before the embedding. To investigate the robustness of the scheme several attacks are applied to seriously distort the watermarked image. Empirical analysis of the results has demonstrated the efficiency of the proposed scheme.

  4. Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

    Directory of Open Access Journals (Sweden)

    Yuanyuan Zhang

    2015-01-01

    Full Text Available Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers from the password guessing attack and the denial of service attack. Moreover, they also demonstrated that Yang et al.’s scheme is not efficient enough when the user inputs an incorrect password. In this paper, we analyze Yang et al.’s scheme again, and find that their scheme is vulnerable to the session key attack. And, there are some mistakes in their scheme. To surmount the weakness of Yang et al.’s scheme, we propose a more efficient and provable secure digital rights management authentication scheme using smart card based on elliptic curve cryptography.

  5. Power adaptive multi-filter carrierless amplitude and phase access scheme for visible light communication network

    Science.gov (United States)

    Li, Wei; Huang, Zhitong; Li, Haoyue; Ji, Yuefeng

    2018-04-01

    Visible light communication (VLC) is a promising candidate for short-range broadband access due to its integration of advantages for both optical communication and wireless communication, whereas multi-user access is a key problem because of the intra-cell and inter-cell interferences. In addition, the non-flat channel effect results in higher losses for users in high frequency bands, which leads to unfair qualities. To solve those issues, we propose a power adaptive multi-filter carrierless amplitude and phase access (PA-MF-CAPA) scheme, and in the first step of this scheme, the MF-CAPA scheme utilizing multiple filters as different CAP dimensions is used to realize multi-user access. The character of orthogonality among the filters in different dimensions can mitigate the effect of intra-cell and inter-cell interferences. Moreover, the MF-CAPA scheme provides different channels modulated on the same frequency bands, which further increases the transmission rate. Then, the power adaptive procedure based on MF-CAPA scheme is presented to realize quality fairness. As demonstrated in our experiments, the MF-CAPA scheme yields an improved throughput compared with multi-band CAP access scheme, and the PA-MF-CAPA scheme enhances the quality fairness and further improves the throughput compared with the MF-CAPA scheme.

  6. Sliding Mode Extremum Seeking Control Scheme Based on PSO for Maximum Power Point Tracking in Photovoltaic Systems

    Directory of Open Access Journals (Sweden)

    Her-Terng Yau

    2013-01-01

    Full Text Available An extremum seeking control (ESC scheme is proposed for maximum power point tracking (MPPT in photovoltaic power generation systems. The robustness of the proposed scheme toward irradiance changes is enhanced by implementing the ESC scheme using a sliding mode control (SMC law. In the proposed approach, the chattering phenomenon caused by high frequency switching is suppressed by means of a sliding layer concept. Moreover, in implementing the proposed controller, the optimal value of the gain constant is determined using a particle swarm optimization (PSO algorithm. The experimental and simulation results show that the proposed PSO-based sliding mode ESC (SMESC control scheme yields a better transient response, steady-state stability, and robustness than traditional MPPT schemes based on gradient detection methods.

  7. An improved weighted essentially non-oscillatory scheme for hyperbolic conservation laws

    Science.gov (United States)

    Borges, Rafael; Carmona, Monique; Costa, Bruno; Don, Wai Sun

    2008-03-01

    In this article we develop an improved version of the classical fifth-order weighted essentially non-oscillatory finite difference scheme of [G.S. Jiang, C.W. Shu, Efficient implementation of weighted ENO schemes, J. Comput. Phys. 126 (1996) 202-228] (WENO-JS) for hyperbolic conservation laws. Through the novel use of a linear combination of the low order smoothness indicators already present in the framework of WENO-JS, a new smoothness indicator of higher order is devised and new non-oscillatory weights are built, providing a new WENO scheme (WENO-Z) with less dissipation and higher resolution than the classical WENO. This new scheme generates solutions that are sharp as the ones of the mapped WENO scheme (WENO-M) of Henrick et al. [A.K. Henrick, T.D. Aslam, J.M. Powers, Mapped weighted essentially non-oscillatory schemes: achieving optimal order near critical points, J. Comput. Phys. 207 (2005) 542-567], however with a 25% reduction in CPU costs, since no mapping is necessary. We also provide a detailed analysis of the convergence of the WENO-Z scheme at critical points of smooth solutions and show that the solution enhancements of WENO-Z and WENO-M at problems with shocks comes from their ability to assign substantially larger weights to discontinuous stencils than the WENO-JS scheme, not from their superior order of convergence at critical points. Numerical solutions of the linear advection of discontinuous functions and nonlinear hyperbolic conservation laws as the one dimensional Euler equations with Riemann initial value problems, the Mach 3 shock-density wave interaction and the blastwave problems are compared with the ones generated by the WENO-JS and WENO-M schemes. The good performance of the WENO-Z scheme is also demonstrated in the simulation of two dimensional problems as the shock-vortex interaction and a Mach 4.46 Richtmyer-Meshkov Instability (RMI) modeled via the two dimensional Euler equations.

  8. Facile preparation of Z-scheme WO{sub 3}/g-C{sub 3}N{sub 4} composite photocatalyst with enhanced photocatalytic performance under visible light

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Lifeng, E-mail: lifeng.cui@gmail.com [School of Chemistry and Environmental Engineering, Dongguan University of Technology, Guangdong 523808 (China); Ding, Xiang; Wang, Yangang; Shi, Huancong; Huang, Lihua; Zuo, Yuanhui [Department of Environmental Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093 (China); Kang, Shifei, E-mail: sfkang@usst.edu.cn [Department of Environmental Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093 (China)

    2017-01-01

    Highlights: • WO{sub 3}/g-C{sub 3}N{sub 4} composites were synthesized through a facile mixing-and-heating method. • The composite showed improved visible light response. • The composite showed high activity for MB degradation. • Z-scheme charge carrier transfer pathways in the composite are proposed. - Abstract: Visible-light-driven WO{sub 3}/g-C{sub 3}N{sub 4} composites photocatalysts were synthesized via a facile one-step simultaneously heating procedure with urea as the main precursor. These prepared catalyst samples were characterized by X-ray diffraction (XRD), thermogravimetric analysis (TG), transmission electron microscopy (TEM), N{sub 2} adsorption, ultraviolet-visible diffuse reflection spectroscopy (UV–vis), X-ray photoelectron spectroscopy (XPS), photoluminescence (PL) and electrochemical impedance spectroscopy (EIS). The photocatalytic activity of the WO{sub 3}/g-C{sub 3}N{sub 4} composites was evaluated by the photo-degradation of Rhodamine B (RhB) under visible light irradiation. The results indicated that the composites with 25 wt.% WO{sub 3} content exhibited highest photocatalytic activity compared to pure WO{sub 3}, bare g-C{sub 3}N{sub 4} and other WO{sub 3}/g-C{sub 3}N{sub 4} composites. The favorable photocatalytic activity of WO{sub 3}/g-C{sub 3}N{sub 4} composites was mainly attributed to the excellent surface properties, enhanced visible-light absorption and the desirable band positions. A possible Z-scheme photocatalytic mechanism was proposed based on structure and electrochemical characterizations results, which can well explain the enhanced migration rate of photogenerated electrons and holes in WO{sub 3}/g-C{sub 3}N{sub 4} heterojunctions.

  9. Automated image enhancement using power law transformations

    Indian Academy of Sciences (India)

    We propose a scheme for automating power law transformations which are used for image enhancement. The scheme we propose does not require the user to choose the exponent in the power law transformation. This method works well for images having poor contrast, especially to those images in which the peaks ...

  10. Secondary Control for Voltage Quality Enhancement in Microgrids

    DEFF Research Database (Denmark)

    Savaghebi, Mehdi; Jalilian, Alireza; Vasquez, Juan Carlos

    2012-01-01

    In this paper, a hierarchical control scheme is proposed for enhancement of sensitive load bus (SLB) voltage quality in microgrids. The control structure consists of primary and secondary levels. The primary control level comprises distributed generators (DGs) local controllers. Each of these con......In this paper, a hierarchical control scheme is proposed for enhancement of sensitive load bus (SLB) voltage quality in microgrids. The control structure consists of primary and secondary levels. The primary control level comprises distributed generators (DGs) local controllers. Each...

  11. Green frame aggregation scheme for Wi-Fi networks

    KAUST Repository

    Alaslani, Maha S.

    2015-07-01

    Frame aggregation is a major enhancement in the IEEE 802.11 family to boost the network performance. The increasing awareness about energy efficiency motivates the re-think of frame aggregation design. In this paper, we propose a novel Green Frame Aggregation (GFA) scheduling scheme that optimizes the aggregate size based on channel quality in order to minimize the consumed energy. GFA selects an optimal sub-frame size that satisfies the loss constraint for real-time applications as well as the energy budget of the ideal channel. This scheme is implemented and evaluated using a testbed deployment. The experimental analysis shows that GFA outperforms the conventional frame aggregation methodology in terms of energy efficiency by about 6x in the presence of severe interference conditions. Moreover, GFA outperforms the static frame sizing method in terms of network goodput while maintaining the same end-to-end latency.

  12. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  13. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  14. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  15. Enhancing of chemical compound and drug name recognition using representative tag scheme and fine-grained tokenization.

    Science.gov (United States)

    Dai, Hong-Jie; Lai, Po-Ting; Chang, Yung-Chun; Tsai, Richard Tzong-Han

    2015-01-01

    The functions of chemical compounds and drugs that affect biological processes and their particular effect on the onset and treatment of diseases have attracted increasing interest with the advancement of research in the life sciences. To extract knowledge from the extensive literatures on such compounds and drugs, the organizers of BioCreative IV administered the CHEMical Compound and Drug Named Entity Recognition (CHEMDNER) task to establish a standard dataset for evaluating state-of-the-art chemical entity recognition methods. This study introduces the approach of our CHEMDNER system. Instead of emphasizing the development of novel feature sets for machine learning, this study investigates the effect of various tag schemes on the recognition of the names of chemicals and drugs by using conditional random fields. Experiments were conducted using combinations of different tokenization strategies and tag schemes to investigate the effects of tag set selection and tokenization method on the CHEMDNER task. This study presents the performance of CHEMDNER of three more representative tag schemes-IOBE, IOBES, and IOB12E-when applied to a widely utilized IOB tag set and combined with the coarse-/fine-grained tokenization methods. The experimental results thus reveal that the fine-grained tokenization strategy performance best in terms of precision, recall and F-scores when the IOBES tag set was utilized. The IOBES model with fine-grained tokenization yielded the best-F-scores in the six chemical entity categories other than the "Multiple" entity category. Nonetheless, no significant improvement was observed when a more representative tag schemes was used with the coarse or fine-grained tokenization rules. The best F-scores that were achieved using the developed system on the test dataset of the CHEMDNER task were 0.833 and 0.815 for the chemical documents indexing and the chemical entity mention recognition tasks, respectively. The results herein highlight the importance

  16. An efficient shock-capturing scheme for simulating compressible homogeneous mixture flow

    Energy Technology Data Exchange (ETDEWEB)

    Dang, Son Tung; Ha, Cong Tu; Park, Warn Gyu [School of Mechanical Engineering, Pusan National University, Busan (Korea, Republic of); Jung, Chul Min [Advanced Naval Technology CenterNSRDI, ADD, Changwon (Korea, Republic of)

    2016-09-15

    This work is devoted to the development of a procedure for the numerical solution of Navier-Stokes equations for cavitating flows with and without ventilation based on a compressible, multiphase, homogeneous mixture model. The governing equations are discretized on a general structured grid using a high-resolution shock-capturing scheme in conjunction with appropriate limiters to prevent the generation of spurious solutions near shock waves or discontinuities. Two well-known limiters are examined, and a new limiter is proposed to enhance the accuracy and stability of the numerical scheme. A sensitivity analysis is first conducted to determine the relative influences of various model parameters on the solution. These parameters are adopted for the computation of water flows over a hemispherical body, conical body and a divergent/convergent nozzle. Finally, numerical calculations of ventilated supercavitating flows over a hemispherical cylinder body with a hot propulsive jet are conducted to verify the capabilities of the numerical scheme.

  17. An efficient shock-capturing scheme for simulating compressible homogeneous mixture flow

    International Nuclear Information System (INIS)

    Dang, Son Tung; Ha, Cong Tu; Park, Warn Gyu; Jung, Chul Min

    2016-01-01

    This work is devoted to the development of a procedure for the numerical solution of Navier-Stokes equations for cavitating flows with and without ventilation based on a compressible, multiphase, homogeneous mixture model. The governing equations are discretized on a general structured grid using a high-resolution shock-capturing scheme in conjunction with appropriate limiters to prevent the generation of spurious solutions near shock waves or discontinuities. Two well-known limiters are examined, and a new limiter is proposed to enhance the accuracy and stability of the numerical scheme. A sensitivity analysis is first conducted to determine the relative influences of various model parameters on the solution. These parameters are adopted for the computation of water flows over a hemispherical body, conical body and a divergent/convergent nozzle. Finally, numerical calculations of ventilated supercavitating flows over a hemispherical cylinder body with a hot propulsive jet are conducted to verify the capabilities of the numerical scheme

  18. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  19. Experimental investigation on enhanced heat transfer of vertical condensers with trisection helical baffles

    International Nuclear Information System (INIS)

    Wu, Jiafeng; Zhou, Jiahao; Chen, Yaping; Wang, Mingchao; Dong, Cong; Guo, Ya

    2016-01-01

    Highlights: • Trisection helical baffles are introduced for vertical condenser enhancement. • Condensation in short-section and intermediate drainage is applied in new schemes. • Helical baffles with liquid dam and drainage gaps can promote condenser performance. • Dual-thread baffle scheme is superior to that of single-thread one by about 19%. • Condensation enhancement ratio of helical schemes is 1.5–2.5 over segment one. - Abstract: The vertical condensers have advantages of small occupation area, convenient in assemble or dismantle tube bundle and simple structure etc. However, the low heat transfer performance limits their applications. To enhance the heat transfer, a novel type of vertical condensers was designed by introducing trisection helical baffles with liquid dams and gaps for facilitating condensate drainage. Four configurations of vertical condensers with trisection helical baffle are experimentally studied and compared to a traditional segment baffle condenser. The enhancement ratio of trisection helical baffle schemes is about 1.5–2.5 and the heat transfer coefficient of the dual-thread trisection helical baffle scheme is superior to that of the single-thread one by about 19%. Assistant by the theoretical study, the experimental data is simulated and the condensation enhancement mechanisms by applying trisection helical baffle in vertical condenser are summarized as condensate drainage, short tube construct and reduce steam dead zone functions of the helical baffles.

  20. Gearbox Fault Features Extraction Using Vibration Measurements and Novel Adaptive Filtering Scheme

    Directory of Open Access Journals (Sweden)

    Ghalib R. Ibrahim

    2012-01-01

    Full Text Available Vibration signals measured from a gearbox are complex multicomponent signals, generated by tooth meshing, gear shaft rotation, gearbox resonance vibration signatures, and a substantial amount of noise. This paper presents a novel scheme for extracting gearbox fault features using adaptive filtering techniques for enhancing condition features, meshing frequency sidebands. A modified least mean square (LMS algorithm is examined and validated using only one accelerometer, instead of using two accelerometers in traditional arrangement, as the main signal and a desired signal is artificially generated from the measured shaft speed and gear meshing frequencies. The proposed scheme is applied to a signal simulated from gearbox frequencies with a numerous values of step size. Findings confirm that 10−5 step size invariably produces more accurate results and there has been a substantial improvement in signal clarity (better signal-to-noise ratio, which makes meshing frequency sidebands more discernible. The developed scheme is validated via a number of experiments carried out using two-stage helical gearbox for a healthy pair of gears and a pair suffering from a tooth breakage with severity fault 1 (25% tooth removal and fault 2 (50% tooth removal under loads (0%, and 80% of the total load. The experimental results show remarkable improvements and enhance gear condition features. This paper illustrates that the new approach offers a more effective way to detect early faults.

  1. Resonance production in central pp collisions at the CERN Omega Spectrometer

    CERN Document Server

    Kirk, A.

    2000-01-01

    A study of resonance production in central pp collisions is presented as a function of several kinematical variables. In particular the difference in the transverse momentum (dPT) of the exchanged particles shows that undisputed qqbar mesons are suppressed at small dPT whereas glueball candidates are enhanced and in addition, the azimuthal angle phi gives information on the nature of the Pomeron.

  2. Simulation analysis of security performance of DPSKOCDMA network via virtual user scheme

    Directory of Open Access Journals (Sweden)

    Vishav Jyoti

    2012-07-01

    Full Text Available A novel technique to enhance the security of an optical code division multipleaccess (OCDMA system against eavesdropping is proposed. It has been observed that whena single user is active in the network, an eavesdropper can easily sift the data beingtransmitted without decoding. To increase the security, a virtual user scheme is proposed andsimulated on a differential phase shift keying (DPSK OCDMA system. By using the virtualuser scheme, the security of the DPSK-OCDMA system can be effectively improved and themultiple access interference, which is generally considered to be a limitation of the OCDMAsystem, is used to increase the confidentiality of the system.

  3. Design of a Secure Authentication and Key Agreement Scheme Preserving User Privacy Usable in Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Rasoolzadegan, Abbas

    2016-11-01

    Authentication and key agreement schemes play a very important role in enhancing the level of security of telecare medicine information systems (TMISs). Recently, Amin and Biswas demonstrated that the authentication scheme proposed by Giri et al. is vulnerable to off-line password guessing attacks and privileged insider attacks and also does not provide user anonymity. They also proposed an improved authentication scheme, claiming that it resists various security attacks. However, this paper demonstrates that Amin and Biswas's scheme is defenseless against off-line password guessing attacks and replay attacks and also does not provide perfect forward secrecy. This paper also shows that Giri et al.'s scheme not only suffers from the weaknesses pointed out by Amin and Biswas, but it also is vulnerable to replay attacks and does not provide perfect forward secrecy. Moreover, this paper proposes a novel authentication and key agreement scheme to overcome the mentioned weaknesses. Security and performance analyses show that the proposed scheme not only overcomes the mentioned security weaknesses, but also is more efficient than the previous schemes.

  4. LevelScheme: A level scheme drawing and scientific figure preparation system for Mathematica

    Science.gov (United States)

    Caprio, M. A.

    2005-09-01

    LevelScheme is a scientific figure preparation system for Mathematica. The main emphasis is upon the construction of level schemes, or level energy diagrams, as used in nuclear, atomic, molecular, and hadronic physics. LevelScheme also provides a general infrastructure for the preparation of publication-quality figures, including support for multipanel and inset plotting, customizable tick mark generation, and various drawing and labeling tasks. Coupled with Mathematica's plotting functions and powerful programming language, LevelScheme provides a flexible system for the creation of figures combining diagrams, mathematical plots, and data plots. Program summaryTitle of program:LevelScheme Catalogue identifier:ADVZ Program obtainable from: CPC Program Library, Queen's University of Belfast, N. Ireland Program summary URL:http://cpc.cs.qub.ac.uk/summaries/ADVZ Operating systems:Any which supports Mathematica; tested under Microsoft Windows XP, Macintosh OS X, and Linux Programming language used:Mathematica 4 Number of bytes in distributed program, including test and documentation:3 051 807 Distribution format:tar.gz Nature of problem:Creation of level scheme diagrams. Creation of publication-quality multipart figures incorporating diagrams and plots. Method of solution:A set of Mathematica packages has been developed, providing a library of level scheme drawing objects, tools for figure construction and labeling, and control code for producing the graphics.

  5. Report of the Working Group on Diffractive Phenomena

    International Nuclear Information System (INIS)

    Bartel, W.; Bartels, J.W.

    1994-01-01

    The discussions in the working group on diffractive processes were structured according to a scheme, in which first the experimental basis was specified followed by a presentation of theoretical papers and a general exchange of views on diffractive phenomena. Since diffraction is observed in many different channels, a common session was organised with participants from other working groups, in particular from the photoproduction and DIS community. A total of about 20 individual contributions were presented including those of the common discussion. Not all of them will be included in the proceedings. Some speakers had contributions to different sessions and submitted only one summary paper, others presented ideas for future analysis and are still working and others were too busy to finish the write up before the deadline. Diffractive phenomena observed at HERA were presented by T. Greenshaw of H1 and T. Docker from the ZEUS collaboration. The DO results on diffraction may be looked up in G. Forden's contribution to the proceedings. Further experimental results relevant to the topic ran be found in papers by M. Costa and S. Levonian issued in the photoproduction subsection. Experimentally it is not always easy to identify diffractive processes because pion and ordinary Regge exchange contributions are also present. This question is addressed in G. Levman's paper. New ideas to exploit a similarity between gluon - and Pomeron exchange were discussed by H. Kowalski, and G. Knies proposed a thrust analysis for diffractive events. In both cases work is going on which is not yet ready for a publication. (i. Ingelman reviewed existing Mt. Carlo programs on diffractive processes like POMPYT, RAPGAP and a program based on the Nikolaev - Zakharov approach to diffraction. These programs are well documented and need no further description in these proceedings. The same argument applies to V. Fadins talk, who reviewed published results on higher order corrections to the BFKL

  6. Effect of synthetic jet modulation schemes on the reduction of a laminar separation bubble

    Science.gov (United States)

    Seo, J. H.; Cadieux, F.; Mittal, R.; Deem, E.; Cattafesta, L.

    2018-03-01

    The response of a laminar separation bubble to synthetic jet forcing with various modulation schemes is investigated via direct numerical simulations. A simple sinusoidal waveform is considered as a reference case, and various amplitude modulation schemes, including the square-wave "burst" modulation, are employed in the simulations. The results indicate that burst modulation is less effective at reducing the length of the flow separation than the sinusoidal forcing primarily because burst modulation is associated with a broad spectrum of input frequencies that are higher than the target frequency for the flow control. It is found that such high-frequency forcing delays vortex roll-up and promotes vortex pairing and merging, which have an adverse effect on reducing the separation bubble length. A commonly used amplitude modulation scheme is also found to have reduced effectiveness due to its spectral content. A new amplitude modulation scheme which is tailored to impart more energy at the target frequency is proposed and shown to be more effective than the other modulation schemes. Experimental measurements confirm that modulation schemes can be preserved through the actuator and used to enhance the energy content at the target modulation frequency. The present study therefore suggests that the effectiveness of synthetic jet-based flow control could be improved by carefully designing the spectral content of the modulation scheme.

  7. Symanzik Improvement with Dynamical Charm: A 3+1 Scheme for Wilson Quarks arXiv

    CERN Document Server

    Fritzsch, Patrick; Stollenwerk, Felix; Wolff, Ulli

    We discuss the problem of lattice artefacts in QCD simulations enhanced by the introduction of dynamical charmed quarks. In particular, we advocate the use of a massive renormalization scheme with a close to realistic charm mass. To maintain O(a) improvement for Wilson type fermions in this case we define a finite size scheme and carry out a nonperturbative estimation of the clover coefficient $c_\\mathrm{sw}$. It is summarized in a fit formula $c_\\mathrm{sw}(g_0^2)$ that defines an improved action suitable for future dynamical charm simulations.

  8. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  9. Caregiver person-centeredness and behavioral symptoms during mealtime interactions: development and feasibility of a coding scheme.

    Science.gov (United States)

    Gilmore-Bykovskyi, Andrea L

    2015-01-01

    Mealtime behavioral symptoms are distressing and frequently interrupt eating for the individual experiencing them and others in the environment. A computer-assisted coding scheme was developed to measure caregiver person-centeredness and behavioral symptoms for nursing home residents with dementia during mealtime interactions. The purpose of this pilot study was to determine the feasibility, ease of use, and inter-observer reliability of the coding scheme, and to explore the clinical utility of the coding scheme. Trained observers coded 22 observations. Data collection procedures were acceptable to participants. Overall, the coding scheme proved to be feasible, easy to execute and yielded good to very good inter-observer agreement following observer re-training. The coding scheme captured clinically relevant, modifiable antecedents to mealtime behavioral symptoms, but would be enhanced by the inclusion of measures for resident engagement and consolidation of items for measuring caregiver person-centeredness that co-occurred and were difficult for observers to distinguish. Published by Elsevier Inc.

  10. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  11. An oxygen-vacancy-rich Z-scheme g-C3N4/Pd/TiO2 heterostructure for enhanced visible light photocatalytic performance

    Science.gov (United States)

    Guo, Yanru; Xiao, Limin; Zhang, Min; Li, Qiuye; Yang, Jianjun

    2018-05-01

    An oxygen-vacancy-rich Z-scheme g-C3N4/Pd/TiO2 ternary nanocomposite was fabricated using nanotubular titanic acid as precursors via a simple photo-deposition of Pd nanoparticles and calcination process. The prepared nanocomposites were investigated by X-ray diffraction, transmission electron microscopy, X-ray photoelectron spectroscopy, and UV-visible diffuse reflectance spectroscopy, respectively. For g-C3N4/TiO2 binary nanocomposites, at the optimal content of g-C3N4 (2%), the apparent photocatalytic activity of 2%g-C3N4/TiO2 was 9 times higher than that of pure TiO2 under visible-light illumination. After deposition of Pd (1 wt%) at the contact interface between g-C3N4 and TiO2, the 2%g-C3N4/Pd/TiO2 ternary nanocomposites demonstrated the highest visible-light-driven photocatalytic activity for the degradation of gaseous propylene, which was 16- and 2-fold higher activities than pure TiO2 and 2%g-C3N4/TiO2, respectively. The mechanism for the enhanced photocatalytic performance of the g-C3N4/Pd/TiO2 photo-catalyst is proposed to be based on the efficient separation of photo-generated electron-hole pairs through Z-scheme system, in which uniform dispersity of Pd nanoparticles at contact interface between g-C3N4 and TiO2 and oxygen vacancies promote charge separation.

  12. PN Sequence Preestimator Scheme for DS-SS Signal Acquisition Using Block Sequence Estimation

    Directory of Open Access Journals (Sweden)

    Sang Kyu Park

    2005-03-01

    Full Text Available An m-sequence (PN sequence preestimator scheme for direct-sequence spread spectrum (DS-SS signal acquisition by using block sequence estimation (BSE is proposed and analyzed. The proposed scheme consists of an estimator and a verifier which work according to the PN sequence chip clock, and provides not only the enhanced chip estimates with a threshold decision logic and one-chip error correction among the first m received chips, but also the reliability check of the estimates with additional decision logic. The probabilities of the estimator and verifier operations are calculated. With these results, the detection, the false alarm, and the missing probabilities of the proposed scheme are derived. In addition, using a signal flow graph, the average acquisition time is calculated. The proposed scheme can be used as a preestimator and easily implemented by changing the internal signal path of a generally used digital matched filter (DMF correlator or any other correlator that has a lot of sampling data memories for sampled PN sequence. The numerical results show rapid acquisition performance in a relatively good CNR.

  13. Turbulence mitigation scheme based on spatial diversity in orbital-angular-momentum multiplexed system

    Science.gov (United States)

    Zou, Li; Wang, Le; Zhao, Shengmei

    2017-10-01

    Atmospheric turbulence (AT) induced crosstalk can significantly impair the performance of free-space optical (FSO) communication link using orbital angular momentum (OAM) multiplexing. In this paper, we propose a spatial diversity (SD) turbulence mitigation scheme in an OAM-multiplexed FSO communication link. First, we present a SD mitigation model for the OAM-multiplexed FSO communication link under AT. Then we present a SD combining technique based on equal gain to enhance AT tolerance of the OAM-multiplexed FSO communication link. The numerical results show that performance of the OAM-multiplexed communication link has greatly improved by the proposed scheme. When the turbulence strength Cn2 is 5 × 10-15m - 2 / 3, the transmission distance is 1000 m and the channel signal-to-noise ratio (SNR) is 20 dB, the bit-error-rate (BER) performance of four spatial multiplexed OAM modes lm = + 1 , + 2 , + 3 , + 4 are 3 fold increase in comparison with those results without the proposed scheme. The proposed scheme is a promising direction for compensating the interference caused by AT in the OAM-multiplexed FSO communication link.

  14. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    Science.gov (United States)

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  15. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  16. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  17. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  18. Interference-aware random beam selection schemes for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed

    2012-10-19

    Spectrum sharing systems have been recently introduced to alleviate the problem of spectrum scarcity by allowing secondary unlicensed networks to share the spectrum with primary licensed networks under acceptable interference levels to the primary users. In this work, we develop interference-aware random beam selection schemes that provide enhanced performance for the secondary network under the condition that the interference observed by the receivers of the primary network is below a predetermined/acceptable value. We consider a secondary link composed of a transmitter equipped with multiple antennas and a single-antenna receiver sharing the same spectrum with a primary link composed of a single-antenna transmitter and a single-antenna receiver. The proposed schemes select a beam, among a set of power-optimized random beams, that maximizes the signal-to-interference-plus-noise ratio (SINR) of the secondary link while satisfying the primary interference constraint for different levels of feedback information describing the interference level at the primary receiver. For the proposed schemes, we develop a statistical analysis for the SINR statistics as well as the capacity and bit error rate (BER) of the secondary link.

  19. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  20. Scattering, diffraction and multiparticle production on hadron and nuclei at high energy

    International Nuclear Information System (INIS)

    Ter-Martirosyan, K.A.; Zoller, V.R.

    1988-01-01

    The cross sections for different types of interactions of hadronic with hadrons and nuclei at high energy are obtained in the simple form in the supercritical pomeron theory. Diffraction desintegration (DD) of hadrons both in the intermediate states, between rescatterings on pomerons, and in the final states is taken into account. With the same accuracy the cross sections δ n for production of n pomeron jets on hadrons and nuclei are also obtained. They determine the whole dynamics of the multiple particle productions, i.e. the spectra and multiplicities of produced particles, the cross sections for DD of colliding hadrons and nucleons inside the target nuclei. The numerical results for δ tot , δ el and for dδ el /dp tr 2 with the set of the pomeron and f, ω-reggeons pole parameters obtained early are presented. 19 refs.; 6 figs

  1. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  2. Outage Performance of Flexible OFDM Schemes in Packet-Switched Transmissions

    Directory of Open Access Journals (Sweden)

    Romain Couillet

    2009-01-01

    Full Text Available α-OFDM, a generalization of the OFDM modulation, is proposed. This new modulation enhances the outage capacity performance of bursty communications. The α-OFDM scheme is easily implementable as it only requires an additional time symbol rotation after the IDFT stage and a subsequent phase rotation of the cyclic prefix. The physical effect of the induced rotation is to slide the DFT window over the frequency spectrum. When successively used with different angles α at the symbol rate, α-OFDM provides frequency diversity in block fading channels. Interestingly, simulation results show a substantial gain in terms of outage capacity and outage BER in comparison with classical OFDM modulation schemes. The framework is extended to multiantenna and multicellular OFDM-based standards. Practical simulations, in the context of 3GPP-LTE, called hereafter α-LTE, sustain our theoretical claims.

  3. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  4. pp and ̄pp elastic scattering

    Directory of Open Access Journals (Sweden)

    A. Donnachie

    1984-01-01

    Full Text Available We present an analysis of pp and ̄pp elastic scattering in terms of various exchanges. Three-gluon exchange dominates at large t, and single-pomeron exchange at small t. The dip seen in high-energy pp scattering is provided by the interference of both of these with double-pomeron exchange. We predict that this dip will not be found in high-energy ̄pp scattering. The dip that is seen in low-energy ̄pp scattering is the result of the additional presence of reggeon-pomeron exchange.

  5. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  6. Optimal emission enhancement in orthogonal double-pulse laser-induced breakdown spectroscopy

    International Nuclear Information System (INIS)

    Sanginés, R.; Contreras, V.; Sobral, H.; Robledo-Martinez, A.

    2015-01-01

    Orthogonal double-pulse (DP) laser-induced breakdown spectroscopy (LIBS) was performed using reheating and pre-ablative configurations. The ablation pulse power density was varied by two orders of magnitude and the DP experiments were carried out for a wide range of interpulse delays. For both DP-LIBS schemes, the signal enhancement was evaluated with respect to the corresponding single-pulse (SP) LIBS as a function of the interpulse delay. The reheating scheme shows a sharp maximum signal enhancement of up to 200-fold for low ablative power densities (0.4 GW cm −2 ); however, for power densities larger than 10 GW cm −2 this configuration did not improve the SP outcome. On the other hand, a more uniform signal enhancement of about 4–6 was obtained for the pre-ablative scheme nearly independently of the used ablative power density. In terms of the signal-to-noise ratio (SNR) the pre-ablative scheme shows a monotonic increment with the ablative power density. Whereas the reheating configuration reaches a maximum at 2.2 GW cm −2 , its enhancement effect collapses markedly for fluencies above 10 GW cm −2 . - Highlights: • Comparison of reheating and pre-ablative double-pulse LIBS was done using a wide range of ablation power densities. • Experimental parameters that could achieve optimal signal-to-noise ratio were investigated. • A reheating scheme is better for low-ablation power densities. • A pre-ablative configuration is better for high-ablation power densities

  7. HYBRID SYSTEM BASED FUZZY-PID CONTROL SCHEMES FOR UNPREDICTABLE PROCESS

    Directory of Open Access Journals (Sweden)

    M.K. Tan

    2011-07-01

    Full Text Available In general, the primary aim of polymerization industry is to enhance the process operation in order to obtain high quality and purity product. However, a sudden and large amount of heat will be released rapidly during the mixing process of two reactants, i.e. phenol and formalin due to its exothermic behavior. The unpredictable heat will cause deviation of process temperature and hence affect the quality of the product. Therefore, it is vital to control the process temperature during the polymerization. In the modern industry, fuzzy logic is commonly used to auto-tune PID controller to control the process temperature. However, this method needs an experienced operator to fine tune the fuzzy membership function and universe of discourse via trial and error approach. Hence, the setting of fuzzy inference system might not be accurate due to the human errors. Besides that, control of the process can be challenging due to the rapid changes in the plant parameters which will increase the process complexity. This paper proposes an optimization scheme using hybrid of Q-learning (QL and genetic algorithm (GA to optimize the fuzzy membership function in order to allow the conventional fuzzy-PID controller to control the process temperature more effectively. The performances of the proposed optimization scheme are compared with the existing fuzzy-PID scheme. The results show that the proposed optimization scheme is able to control the process temperature more effectively even if disturbance is introduced.

  8. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  9. Fabrication of flower-like direct Z-scheme β-Bi2O3/g-C3N4 photocatalyst with enhanced visible light photoactivity for Rhodamine B degradation

    Science.gov (United States)

    Zhang, Liping; Wang, Guohong; Xiong, Zhenzhong; Tang, Hua; Jiang, Chuanjia

    2018-04-01

    A combined hydrothermal-calcination approach is developed to synthesize hierarchical β-Bi2O3/g-C3N4 direct Z-scheme photocatalyst with enhanced visible light photoactivity for Rhodamine B (RhB) degradation. First, Bi2O2CO3 microflowers were hydrothermally prepared using Bi(NO3)3·5H2O as feedstocks, and then a series of β-Bi2O3/g-C3N4 direct Z-scheme photocatalysts were synthesized via a facile calcination method using Bi2O2CO3 and g-C3N4 as precursors. The samples were systematically characterized by various characterization technologies including X-ray diffraction, scanning and transmission electron microscopes, Fourier transform infrared spectroscopy and N2 absorption-desorption equipment. It was found that the g-C3N4 content in the precursors played a key role in affecting the photocatalytic activity of the final products. The β-Bi2O3/g-C3N4 heterojunction exhibited higher photocatalytic activity than single active components (β-Bi2O3 and g-C3N4), indicating the presence of a synergistic effect between two active components in β-Bi2O3/g-C3N4 heterojunction. Among all as-prepared catalysts, the 70 wt.% g-C3N4/Bi2O2CO3 exhibits the highest activity for RhB degradation, and the apparent reaction rate constant k (42.2 × 10-3 min-1) is 3.1 and 1.7 times as high as that of pure β-Bi2O3 (13.5 × 10-3 min-1) and g-C3N4 (25.2 × 10-3 min-1), respectively. The enhanced photocatalytic performance of β-Bi2O3/g-C3N4 heterostructure photocatalysts is mainly due to the high surface area, closely contacted interfaces between the β-Bi2O3 and g-C3N4 component, and the formation of direct Z-scheme structure in the β-Bi2O3/g-C3N4 composites.

  10. Rate control scheme for consistent video quality in scalable video codec.

    Science.gov (United States)

    Seo, Chan-Won; Han, Jong-Ki; Nguyen, Truong Q

    2011-08-01

    Multimedia data delivered to mobile devices over wireless channels or the Internet are complicated by bandwidth fluctuation and the variety of mobile devices. Scalable video coding has been developed as an extension of H.264/AVC to solve this problem. Since scalable video codec provides various scalabilities to adapt the bitstream for the channel conditions and terminal types, scalable codec is one of the useful codecs for wired or wireless multimedia communication systems, such as IPTV and streaming services. In such scalable multimedia communication systems, video quality fluctuation degrades the visual perception significantly. It is important to efficiently use the target bits in order to maintain a consistent video quality or achieve a small distortion variation throughout the whole video sequence. The scheme proposed in this paper provides a useful function to control video quality in applications supporting scalability, whereas conventional schemes have been proposed to control video quality in the H.264 and MPEG-4 systems. The proposed algorithm decides the quantization parameter of the enhancement layer to maintain a consistent video quality throughout the entire sequence. The video quality of the enhancement layer is controlled based on a closed-form formula which utilizes the residual data and quantization error of the base layer. The simulation results show that the proposed algorithm controls the frame quality of the enhancement layer in a simple operation, where the parameter decision algorithm is applied to each frame.

  11. Switched-based interference reduction scheme for open-access overlaid cellular networks

    KAUST Repository

    Radaydeh, Redha Mahmoud Mesleh

    2012-06-01

    Femtocells have been proposed to enhance the spatial coverage and system capacity of existing cellular networks. However, this technology may result in significant performance loss due to the increase in co-channel interference, particularly when coordination between access points is infeasible. This paper targets interference management in such overlaid networks. It is assumed that the femtocells employ the open-access strategy to reduce cross-tier interference, and can share resources concurrently. It is also assumed that each end user (EU) can access one channel at a time, and transfer limited feedback. To reduce the effect of co-tier interference in the absence of the desired EU channel state information (CSI) at the serving access point as well as coordination between active access points, a switched scheme based on the interference levels associated with available channels is proposed. Through the analysis, the scheme modes of operation in under-loaded and over-loaded channels are studied, from which the statistics of the resulting interference power are quantified. The impact of the proposed scheme on the received desired power is thoroughly discussed. In addition, the effect of the switching threshold on the achieved performance of the desired EU is investigated. The results clarify that the proposed scheme can improve the performance while reducing the number of examined channels and feedback load. © 2012 IEEE.

  12. Anomaly Detection for Internet of Vehicles: A Trust Management Scheme with Affinity Propagation

    Directory of Open Access Journals (Sweden)

    Shu Yang

    2016-01-01

    Full Text Available Anomaly detection is critical for intelligent vehicle (IV collaboration. Forming clusters/platoons, IVs can work together to accomplish complex jobs that they are unable to perform individually. To improve security and efficiency of Internet of Vehicles, IVs’ anomaly detection has been extensively studied and a number of trust-based approaches have been proposed. However, most of these proposals either pay little attention to leader-based detection algorithm or ignore the utility of networked Roadside-Units (RSUs. In this paper, we introduce a trust-based anomaly detection scheme for IVs, where some malicious or incapable vehicles are existing on roads. The proposed scheme works by allowing IVs to detect abnormal vehicles, communicate with each other, and finally converge to some trustworthy cluster heads (CHs. Periodically, the CHs take responsibility for intracluster trust management. Moreover, the scheme is enhanced with a distributed supervising mechanism and a central reputation arbitrator to assure robustness and fairness in detecting process. The simulation results show that our scheme can achieve a low detection failure rate below 1%, demonstrating its ability to detect and filter the abnormal vehicles.

  13. A Fairness-Based Access Control Scheme to Optimize IPTV Fast Channel Changing

    Directory of Open Access Journals (Sweden)

    Junyu Lai

    2014-01-01

    Full Text Available IPTV services are typically featured with a longer channel changing delay compared to the conventional TV systems. The major contributor to this lies in the time spent on intraframe (I-frame acquisition during channel changing. Currently, most widely adopted fast channel changing (FCC methods rely on promptly transmitting to the client (conducting the channel changing a retained I-frame of the targeted channel as a separate unicasting stream. However, this I-frame acceleration mechanism has an inherent scalability problem due to the explosions of channel changing requests during commercial breaks. In this paper, we propose a fairness-based admission control (FAC scheme for the original I-frame acceleration mechanism to enhance its scalability by decreasing the bandwidth demands. Based on the channel changing history of every client, the FAC scheme can intelligently decide whether or not to conduct the I-frame acceleration for each channel change request. Comprehensive simulation experiments demonstrate the potential of our proposed FAC scheme to effectively optimize the scalability of the I-frame acceleration mechanism, particularly in commercial breaks. Meanwhile, the FAC scheme only slightly increases the average channel changing delay by temporarily disabling FCC (i.e., I-frame acceleration for the clients who are addicted to frequent channel zapping.

  14. A Safety Enhancement Broadcasting Scheme Based on Context Sensing in VANETs

    Directory of Open Access Journals (Sweden)

    Chen Chen

    2016-01-01

    Full Text Available The broadcasting plays a vital role for context awareness in VANETs (Vehicular Ad Hoc Networks whose primary goal is to improve the driving safety depending on effective information exchanging. In this paper, based on the LQG (linear quadratic Gaussian optimal control theory, a broadcasting control scheme named LQG-CCA is proposed to improve the network throughput thus increasing the opportunities for the safety-related events to be successfully handled. By predicting the network throughput with the Kalman filter model, our LQG model is envisioned to minimize the difference between the predicted and expected throughput through the adjustment of CCA (Clear Channel Assessment sensing threshold. Numerical results show that our proposed model can significantly improve the network performance in terms of average throughput, average End-to-End delay, and average packets delivery ratio compared with a highly cited work D-FPAV and a latest published model APPR.

  15. Decentralising Zimbabwe’s water management: The case of Guyu-Chelesa irrigation scheme

    Science.gov (United States)

    Tambudzai, Rashirayi; Everisto, Mapedza; Gideon, Zhou

    Smallholder irrigation schemes are largely supply driven such that they exclude the beneficiaries on the management decisions and the choice of the irrigation schemes that would best suit their local needs. It is against this background that the decentralisation framework and the Dublin Principles on Integrated Water Resource Management (IWRM) emphasise the need for a participatory approach to water management. The Zimbabwean government has gone a step further in decentralising the management of irrigation schemes, that is promoting farmer managed irrigation schemes so as to ensure effective management of scarce community based land and water resources. The study set to investigate the way in which the Guyu-Chelesa irrigation scheme is managed with specific emphasis on the role of the Irrigation Management Committee (IMC), the level of accountability and the powers devolved to the IMC. Merrey’s 2008 critique of IWRM also informs this study which views irrigation as going beyond infrastructure by looking at how institutions and decision making processes play out at various levels including at the irrigation scheme level. The study was positioned on the hypothesis that ‘decentralised or autonomous irrigation management enhances the sustainability and effectiveness of irrigation schemes’. To validate or falsify the stated hypothesis, data was gathered using desk research in the form of reviewing articles, documents from within the scheme and field research in the form of questionnaire surveys, key informant interviews and field observation. The Statistical Package for Social Sciences was used to analyse data quantitatively, whilst content analysis was utilised to analyse qualitative data whereby data was analysed thematically. Comparative analysis was carried out as Guyu-Chelesa irrigation scheme was compared with other smallholder irrigation scheme’s experiences within Zimbabwe and the Sub Saharan African region at large. The findings were that whilst the

  16. Energy Aware Routing Schemes in Solar PoweredWireless Sensor Networks

    KAUST Repository

    Dehwah, Ahmad H.

    2016-10-01

    Wireless sensor networks enable inexpensive distributed monitoring systems that are the backbone of smart cities. In this dissertation, we are interested in wireless sensor networks for traffic monitoring and an emergency flood detection to improve the safety of future cities. To achieve real-time traffic monitoring and emergency flood detection, the system has to be continually operational. Accordingly, an energy source is needed to ensure energy availability at all times. The sun provides for the most inexpensive source of energy, and therefore the energy is provided here by a solar panel working in conjunction with a rechargeable battery. Unlike batteries, solar energy fluctuates spatially and temporally due to the panel orientation, seasonal variation and node location, particularly in cities where buildings cast shadows. Especially, it becomes scarce whenever floods are likely to occur, as the weather tends to be cloudy at such times when the emergency detection system is most needed. These considerations lead to the need for the optimization of the energy of the sensor network, to maximize its sensing performance. In this dissertation, we address the challenges associated with long term outdoor deployments along with providing some solutions to overcome part of these challenges. We then introduce the energy optimization problem, as a distributed greedy approach. Motivated by the flood sensing application, our objective is to maximize the energy margin in the solar powered network at the onset of the high rain event, to maximize the network lifetime. The decentralized scheme will achieve this by optimizing the energy over a time horizon T, taking into account the available and predicted energy over the entire routing path. Having a good energy forecasting scheme can significantly enhance the energy optimization in WSN. Thus, this dissertation proposes a new energy forecasting scheme that is compatible with the platform’s capabilities. This proposed

  17. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees.

    Science.gov (United States)

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-09-10

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one.

  18. Facile synthesis of Z-scheme graphitic-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} nanocomposite for enhanced visible photocatalytic properties

    Energy Technology Data Exchange (ETDEWEB)

    Lv, Jiali [College of Physics and Electronic Information, Huaibei Normal University, Huaibei 235000 (China); Dai, Kai, E-mail: daikai940@chnu.edu.cn [College of Physics and Electronic Information, Huaibei Normal University, Huaibei 235000 (China); Zhang, Jinfeng; Geng, Lei [College of Physics and Electronic Information, Huaibei Normal University, Huaibei 235000 (China); Liang, Changhao, E-mail: chliang@issp.ac.cn [College of Physics and Electronic Information, Huaibei Normal University, Huaibei 235000 (China); Key Laboratory of Materials Physics and Anhui Key Laboratory of Nanomaterials and Nanotechnology, Institute of Solid State Physics, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031 (China); Liu, Qiangchun; Zhu, Guangping; Chen, Chen [College of Physics and Electronic Information, Huaibei Normal University, Huaibei 235000 (China)

    2015-12-15

    Graphical abstract: - Highlights: • g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} nanocomposite photocatalyst was prepared. • g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} as a typical Z-scheme photocatalyst was proved. • g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} showed long reusable life with irradiation of LED light. - Abstract: The band engineering of visible-light-driven photocatalysts is a promising route for harnessing of effective solar energy to perform high chemical reactions and to treat environmental pollution. In this study, two narrow band gap semiconductor nanomaterials, graphitic carbon nitride (g-C{sub 3}N{sub 4}) and Bi{sub 2}MoO{sub 6}, were selected and coupled to form series of g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} photocatalysts. Their structure, light absorption wavelength range, charge transport properties and energy level were investigated. Through perfect manipulation of their composition, enhanced photocatalytic activity of the Z-scheme g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} photocatalysts with efficient reduction of recombination of photogenerated electrons and holes was achieved. The optimized Z-scheme g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} photocatalysts with 25 wt%g-C{sub 3}N{sub 4} showed apparent pseudo-first-order rate constant k{sub app} as high as 0.0688 min{sup −1}, which was 4.8 times and 8.2 times higher than that of g-C{sub 3}N{sub 4} and Bi{sub 2}MoO{sub 6} photocatalyst, respectively.

  19. Breaking a chaos-based secure communication scheme designed by an improved modulation method

    Energy Technology Data Exchange (ETDEWEB)

    Li Shujun [Department of Electronic Engineering, City University of Hong Kong, Kowloon, Hong Kong (China)]. E-mail: hooklee@mail.com; Alvarez, Gonzalo [Instituto de Fisica Aplicada, Consejo Superior de Investigaciones Cientificas, Serrano 144-28006 Madrid (Spain); Chen Guanrong [Department of Electronic Engineering, City University of Hong Kong, Kowloon, Hong Kong (China)

    2005-07-01

    Recently Bu and Wang [Bu S, Wang B-H. Chaos, Solitons and Fractals 2004;19(4):919-24] proposed a simple modulation method aiming to improve the security of chaos-based secure communications against return-map-based attacks. Soon this modulation method was independently cryptanalyzed by Chee et al. [Chee CY, Xu D, Bishop SR. Chaos, Solitons and Fractals 2004;21(5):1129-34], Wu et al. [Wu X, Hu H, Zhang B. Chaos, Solitons and Fractals 2004;22(2):367-73], and Alvarez et al. [Alvarez G, Montoya F, Romera M, Pastor G. Chaos, Solitons and Fractals, in press, arXiv:nlin/0406065] via different attacks. As an enhancement to the Bu-Wang method, an improving scheme was suggested by Wu et al. by removing the relationship between the modulating function and the zero-points. The present paper points out that the improved scheme proposed by Wu et al. is still insecure against a new attack. Compared with the existing attacks, the proposed attack is more powerful and can also break the original Bu-Wang scheme. Furthermore, it is pointed out that the security of the modulation-based schemes proposed by Wu et al. is not so satisfactory from a pure cryptographical point of view. The synchronization performance of this class of modulation-based schemes is also discussed.

  20. Breaking a chaos-based secure communication scheme designed by an improved modulation method

    International Nuclear Information System (INIS)

    Li Shujun; Alvarez, Gonzalo; Chen Guanrong

    2005-01-01

    Recently Bu and Wang [Bu S, Wang B-H. Chaos, Solitons and Fractals 2004;19(4):919-24] proposed a simple modulation method aiming to improve the security of chaos-based secure communications against return-map-based attacks. Soon this modulation method was independently cryptanalyzed by Chee et al. [Chee CY, Xu D, Bishop SR. Chaos, Solitons and Fractals 2004;21(5):1129-34], Wu et al. [Wu X, Hu H, Zhang B. Chaos, Solitons and Fractals 2004;22(2):367-73], and Alvarez et al. [Alvarez G, Montoya F, Romera M, Pastor G. Chaos, Solitons and Fractals, in press, arXiv:nlin/0406065] via different attacks. As an enhancement to the Bu-Wang method, an improving scheme was suggested by Wu et al. by removing the relationship between the modulating function and the zero-points. The present paper points out that the improved scheme proposed by Wu et al. is still insecure against a new attack. Compared with the existing attacks, the proposed attack is more powerful and can also break the original Bu-Wang scheme. Furthermore, it is pointed out that the security of the modulation-based schemes proposed by Wu et al. is not so satisfactory from a pure cryptographical point of view. The synchronization performance of this class of modulation-based schemes is also discussed

  1. Enhanced nonlinearity interval mapping scheme for high-performance simulation-optimization of watershed-scale BMP placement

    Science.gov (United States)

    Zou, Rui; Riverson, John; Liu, Yong; Murphy, Ryan; Sim, Youn

    2015-03-01

    Integrated continuous simulation-optimization models can be effective predictors of a process-based responses for cost-benefit optimization of best management practices (BMPs) selection and placement. However, practical application of simulation-optimization model is computationally prohibitive for large-scale systems. This study proposes an enhanced Nonlinearity Interval Mapping Scheme (NIMS) to solve large-scale watershed simulation-optimization problems several orders of magnitude faster than other commonly used algorithms. An efficient interval response coefficient (IRC) derivation method was incorporated into the NIMS framework to overcome a computational bottleneck. The proposed algorithm was evaluated using a case study watershed in the Los Angeles County Flood Control District. Using a continuous simulation watershed/stream-transport model, Loading Simulation Program in C++ (LSPC), three nested in-stream compliance points (CP)—each with multiple Total Maximum Daily Loads (TMDL) targets—were selected to derive optimal treatment levels for each of the 28 subwatersheds, so that the TMDL targets at all the CP were met with the lowest possible BMP implementation cost. Genetic Algorithm (GA) and NIMS were both applied and compared. The results showed that the NIMS took 11 iterations (about 11 min) to complete with the resulting optimal solution having a total cost of 67.2 million, while each of the multiple GA executions took 21-38 days to reach near optimal solutions. The best solution obtained among all the GA executions compared had a minimized cost of 67.7 million—marginally higher, but approximately equal to that of the NIMS solution. The results highlight the utility for decision making in large-scale watershed simulation-optimization formulations.

  2. Is MGNREG Scheme complementary to fishing activities? A study on some selected states of India

    Directory of Open Access Journals (Sweden)

    Chiranjib Neogi

    2016-01-01

    Full Text Available Freshwater fish output is taken as a proxy variable for empirical assessment of indirect benefits in terms of enhanced quantity of freshwater fish (output cultivation. It is not unlikely to assess empirically the productivity of subsidized public scheme when rural development or rural asset generations are underlined in the said scheme, MGNREG Act, 2005. Rainwater harvesting is a major component part of the scheme since about 49.5 per cent of the total fund is already utilized on water conservation and obviously it has an impact on the cultivation of freshwater fish output. Time series data on annual expenditure on MGNREG and corresponding freshwater fish output at the state level are taken during the period 2006-07 to 2013-14 for 16 major Indian states. Fixed effect model and random effect models are being applied and the Hausman specification test suggests that fixed effect model is more appropriate than random effect model. Significant differences among the intercepts of the selected states are revealed as per F test. The results of fixed effect panel regression establish that fish output is enhanced by 0.000257 thousand tones or 0.26 tones if MGNREG expenditure rises by one crore or 10 million rupees.

  3. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  4. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  5. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  6. A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane

    Science.gov (United States)

    Zhao, Liang; Adhikari, Avishek; Sakurai, Kouichi

    Watermarking is one of the most effective techniques for copyright protection and information hiding. It can be applied in many fields of our society. Nowadays, some image scrambling schemes are used as one part of the watermarking algorithm to enhance the security. Therefore, how to select an image scrambling scheme and what kind of the image scrambling scheme may be used for watermarking are the key problems. Evaluation method of the image scrambling schemes can be seen as a useful test tool for showing the property or flaw of the image scrambling method. In this paper, a new scrambling evaluation system based on spatial distribution entropy and centroid difference of bit-plane is presented to obtain the scrambling degree of image scrambling schemes. Our scheme is illustrated and justified through computer simulations. The experimental results show (in Figs. 6 and 7) that for the general gray-scale image, the evaluation degree of the corresponding cipher image for the first 4 significant bit-planes selection is nearly the same as that for the 8 bit-planes selection. That is why, instead of taking 8 bit-planes of a gray-scale image, it is sufficient to take only the first 4 significant bit-planes for the experiment to find the scrambling degree. This 50% reduction in the computational cost makes our scheme efficient.

  7. Power Enhancement of Partial Shaded PV Array by Optimizing the Electrical Connection of Module

    Directory of Open Access Journals (Sweden)

    Wang Mengyao

    2015-01-01

    Full Text Available The maximum output power (Pmax generated from photovoltaic (PV array will be apparently reduced if the array is partially shaded. In order to enhance Pmax generated from partial shaded PV array, several interconnection schemes of array are proposed. Among these schemes, the totally cross tied (TCT scheme and the recently proposed static scheme are widely discussed. It was reported that Pmax produced with static scheme is equal to the TCT scheme even under worst conditions. However, in these simulations the illumination of every single module is assumed to be uniform, but in urban environments the illumination of modules on the edge of shadow is more likely to be non-uniform. In this paper, first, a comprehensive circuit-level simulation, which is implemented in PSpice, has been done to investigate performance of PV array with both TCT scheme and static scheme under different partial shading conditions. And the results show that Pmax generated from static scheme is higher than that form TCT scheme if the illumination of every single module is uniform, however if some modules are partially shaded, the Pmax with static scheme is more likely less than that with TCT scheme. Then, the electrical connection of a module is improved for the purpose of enhancing Pmax under partial shading conditions in which some modules in the array are partially shaded. And the simulation results show that Pmax is apparently increased by employing the improved modules.

  8. A Trust-Based Adaptive Probability Marking and Storage Traceback Scheme for WSNs

    Science.gov (United States)

    Liu, Anfeng; Liu, Xiao; Long, Jun

    2016-01-01

    Security is a pivotal issue for wireless sensor networks (WSNs), which are emerging as a promising platform that enables a wide range of military, scientific, industrial and commercial applications. Traceback, a key cyber-forensics technology, can play an important role in tracing and locating a malicious source to guarantee cybersecurity. In this work a trust-based adaptive probability marking and storage (TAPMS) traceback scheme is proposed to enhance security for WSNs. In a TAPMS scheme, the marking probability is adaptively adjusted according to the security requirements of the network and can substantially reduce the number of marking tuples and improve network lifetime. More importantly, a high trust node is selected to store marking tuples, which can avoid the problem of marking information being lost. Experimental results show that the total number of marking tuples can be reduced in a TAPMS scheme, thus improving network lifetime. At the same time, since the marking tuples are stored in high trust nodes, storage reliability can be guaranteed, and the traceback time can be reduced by more than 80%. PMID:27043566

  9. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  10. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  11. Code-Hopping Based Transmission Scheme for Wireless Physical-Layer Security

    Directory of Open Access Journals (Sweden)

    Liuguo Yin

    2018-01-01

    Full Text Available Due to the broadcast and time-varying natures of wireless channels, traditional communication systems that provide data encryption at the application layer suffer many challenges such as error diffusion. In this paper, we propose a code-hopping based secrecy transmission scheme that uses dynamic nonsystematic low-density parity-check (LDPC codes and automatic repeat-request (ARQ mechanism to jointly encode and encrypt source messages at the physical layer. In this scheme, secret keys at the transmitter and the legitimate receiver are generated dynamically upon the source messages that have been transmitted successfully. During the transmission, each source message is jointly encoded and encrypted by a parity-check matrix, which is dynamically selected from a set of LDPC matrices based on the shared dynamic secret key. As for the eavesdropper (Eve, the uncorrectable decoding errors prevent her from generating the same secret key as the legitimate parties. Thus she cannot select the correct LDPC matrix to recover the source message. We demonstrate that our scheme can be compatible with traditional cryptosystems and enhance the security without sacrificing the error-correction performance. Numerical results show that the bit error rate (BER of Eve approaches 0.5 as the number of transmitted source messages increases and the security gap of the system is small.

  12. Diffraction and correlations at the LHC: definitions and observables

    International Nuclear Information System (INIS)

    Khoze, V.A.; Krauss, F.; Martin, A.D.; Zapp, K.C.; Ryskin, M.G.

    2010-01-01

    We note that the definition of diffractive events is a matter of convention. We discuss two possible ''definitions'': one based on unitarity and the other on Large Rapidity Gaps (LRG) or Pomeron exchange. LRG can also arise from fluctuations and we quantify this effect and some of the related uncertainties. We find care must be taken in extracting the Pomeron contribution from LRG events. We show that long-range correlations in multiplicities can arise from the same multi-Pomeron diagrams that are responsible for LRG events, and we explain how early LHC data can illuminate our understanding of 'soft' interactions. (orig.)

  13. Reggeon field theory at D = 2 in two-loop approximation

    International Nuclear Information System (INIS)

    Eremyan, Sh.S.; Nazaryan, A.E.

    1982-01-01

    A general method of constructing an explicit representation is developed for the pomeron propagator in the presence of additional parameters, such as the pomeron production threshold xi 0 , momentum transfer K vector or the intercept shift delta 0 . The method is shown to be applicable in both one-loop and two-loop approximations. The obtained general formulae allow to consider the pomeron propagator in both asymptotic region and the region of the perturbation theory applicability. Besides, they provide the smooth matching of both these regions. The observed values are calculated, and the results connected with asymptotically high energies are discussed

  14. Personalization, Self-Advocacy and Inclusion: An Evaluation of Parent-Initiated Supported Living Schemes for People with Intellectual and Developmental Disabilities in the Netherlands

    Science.gov (United States)

    Reindl, Marie-Sol; Waltz, Mitzi; Schippers, Alice

    2016-01-01

    This study focused on parent-initiated supported living schemes in the South of the Netherlands and the ability of these living schemes to enhance participation, choice, autonomy and self-advocacy for people with intellectual or developmental disabilities through personalized planning, support and care. Based on in-depth interviews with tenants,…

  15. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  16. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  17. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  18. Novel medical image enhancement algorithms

    Science.gov (United States)

    Agaian, Sos; McClendon, Stephen A.

    2010-01-01

    In this paper, we present two novel medical image enhancement algorithms. The first, a global image enhancement algorithm, utilizes an alpha-trimmed mean filter as its backbone to sharpen images. The second algorithm uses a cascaded unsharp masking technique to separate the high frequency components of an image in order for them to be enhanced using a modified adaptive contrast enhancement algorithm. Experimental results from enhancing electron microscopy, radiological, CT scan and MRI scan images, using the MATLAB environment, are then compared to the original images as well as other enhancement methods, such as histogram equalization and two forms of adaptive contrast enhancement. An image processing scheme for electron microscopy images of Purkinje cells will also be implemented and utilized as a comparison tool to evaluate the performance of our algorithm.

  19. Coding Scheme for Assessment of Students’ Explanations and Predictions

    Directory of Open Access Journals (Sweden)

    Mihael Gojkošek

    2017-04-01

    Full Text Available In the process of analyzing students’ explanations and predictions for interaction between brightness enhancement film and beam of white light, a need for objective and reliable assessment instrumentarose. Consequently, we developed a codingscheme that was mostly inspired by the rubrics for self-assessment of scientific abilities. In the paper we present the grading categories that were integrated in the coding scheme, and descriptions of criteria used for evaluation of students work. We report the results of reliability analysis of new assessment tool and present some examples of its application.

  20. A hybrid-drive nonisobaric-ignition scheme for inertial confinement fusion

    Energy Technology Data Exchange (ETDEWEB)

    He, X. T., E-mail: xthe@iapcm.ac.cn [Institute of Applied Physics and Computational Mathematics, P. O. Box 8009, Beijing 100094 (China); Center for Applied Physics and Technology, HEDPS, Peking University, Beijing 100871 (China); IFSA Collaborative Innovation Center of MoE, Shanghai Jiao-Tong University, Shanghai 200240 (China); Institute of Fusion Theory and Simulation, Zhejiang University, Hangzhou 310027 (China); Li, J. W.; Wang, L. F.; Liu, J.; Lan, K.; Ye, W. H. [Institute of Applied Physics and Computational Mathematics, P. O. Box 8009, Beijing 100094 (China); Center for Applied Physics and Technology, HEDPS, Peking University, Beijing 100871 (China); IFSA Collaborative Innovation Center of MoE, Shanghai Jiao-Tong University, Shanghai 200240 (China); Fan, Z. F.; Wu, J. F. [Institute of Applied Physics and Computational Mathematics, P. O. Box 8009, Beijing 100094 (China)

    2016-08-15

    A new hybrid-drive (HD) nonisobaric ignition scheme of inertial confinement fusion (ICF) is proposed, in which a HD pressure to drive implosion dynamics increases via increasing density rather than temperature in the conventional indirect drive (ID) and direct drive (DD) approaches. In this HD (combination of ID and DD) scheme, an assembled target of a spherical hohlraum and a layered deuterium-tritium capsule inside is used. The ID lasers first drive the shock to perform a spherical symmetry implosion and produce a large-scale corona plasma. Then, the DD lasers, whose critical surface in ID corona plasma is far from the radiation ablation front, drive a supersonic electron thermal wave, which slows down to a high-pressure electron compression wave, like a snowplow, piling up the corona plasma into high density and forming a HD pressurized plateau with a large width. The HD pressure is several times the conventional ID and DD ablation pressure and launches an enhanced precursor shock and a continuous compression wave, which give rise to the HD capsule implosion dynamics in a large implosion velocity. The hydrodynamic instabilities at imploding capsule interfaces are suppressed, and the continuous HD compression wave provides main pdV work large enough to hotspot, resulting in the HD nonisobaric ignition. The ignition condition and target design based on this scheme are given theoretically and by numerical simulations. It shows that the novel scheme can significantly suppress implosion asymmetry and hydrodynamic instabilities of current isobaric hotspot ignition design, and a high-gain ICF is promising.

  1. Privacy-Enhanced and Multifunctional Health Data Aggregation under Differential Privacy Guarantees

    Science.gov (United States)

    Ren, Hao; Li, Hongwei; Liang, Xiaohui; He, Shibo; Dai, Yuanshun; Zhao, Lian

    2016-01-01

    With the rapid growth of the health data scale, the limited storage and computation resources of wireless body area sensor networks (WBANs) is becoming a barrier to their development. Therefore, outsourcing the encrypted health data to the cloud has been an appealing strategy. However, date aggregation will become difficult. Some recently-proposed schemes try to address this problem. However, there are still some functions and privacy issues that are not discussed. In this paper, we propose a privacy-enhanced and multifunctional health data aggregation scheme (PMHA-DP) under differential privacy. Specifically, we achieve a new aggregation function, weighted average (WAAS), and design a privacy-enhanced aggregation scheme (PAAS) to protect the aggregated data from cloud servers. Besides, a histogram aggregation scheme with high accuracy is proposed. PMHA-DP supports fault tolerance while preserving data privacy. The performance evaluation shows that the proposal leads to less communication overhead than the existing one. PMID:27626417

  2. An Enhanced LVRT Scheme for DFIG-based WECSs under Both Balanced and Unbalanced Grid Voltage Sags

    DEFF Research Database (Denmark)

    Mohammadi, Jafar; Afsharnia, Saeed; Ebrahimzadeh, Esmaeil

    2017-01-01

    reactive power into the grid. The passive compensator is based on a three-phase stator damping resistor (SDR) located in series with the stator windings. The proposed scheme decreases the negative effects of grid voltage sags in the DFIG system including the rotor over-currents, electromagnetic torque...

  3. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Science.gov (United States)

    Jung, Jaewook; Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  4. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System.

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    Full Text Available Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency.

  5. An Improved and Secure Anonymous Biometric-Based User Authentication with Key Agreement Scheme for the Integrated EPR Information System

    Science.gov (United States)

    Kang, Dongwoo; Lee, Donghoon; Won, Dongho

    2017-01-01

    Nowadays, many hospitals and medical institutes employ an authentication protocol within electronic patient records (EPR) services in order to provide protected electronic transactions in e-medicine systems. In order to establish efficient and robust health care services, numerous studies have been carried out on authentication protocols. Recently, Li et al. proposed a user authenticated key agreement scheme according to EPR information systems, arguing that their scheme is able to resist various types of attacks and preserve diverse security properties. However, this scheme possesses critical vulnerabilities. First, the scheme cannot prevent off-line password guessing attacks and server spoofing attack, and cannot preserve user identity. Second, there is no password verification process with the failure to identify the correct password at the beginning of the login phase. Third, the mechanism of password change is incompetent, in that it induces inefficient communication in communicating with the server to change a user password. Therefore, we suggest an upgraded version of the user authenticated key agreement scheme that provides enhanced security. Our security and performance analysis shows that compared to other related schemes, our scheme not only improves the security level, but also ensures efficiency. PMID:28046075

  6. Development of knowledgebase system for assisting signal validation scheme design

    International Nuclear Information System (INIS)

    Kitamura, M.; Baba, T.; Washio, T.; Sugiyama, K.

    1987-01-01

    The purpose of this study is to develop a knowledgebase system to be used as a tool for designing signal validation schemes. The outputs from the signal validation scheme can be used as; (1) auxiliary signals for detecting sensor failures, (2) inputs to advanced instrumentation such as disturbance analysis and diagnosis system or safety parameter display system, and (3) inputs to digital control systems. Conventional signal validation techniques such as comparison of redundant sensors, limit checking, and calibration tests have been employed in nuclear power plants. However, these techniques have serious drawbacks, e.g. needs for extra sensors, vulnerability to common mode failures, limited applicability to continuous monitoring, etc. To alleviate these difficulties, a new signal validation technique has been developed by using the methods called analytic redundancy and parity space. Although the new technique has been proved feasible as far as preliminary tests are concerned, further developments should be made in order to enhance its practical applicability

  7. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  8. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  9. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  10. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  11. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  12. Preliminary Study of 1D Thermal-Hydraulic System Analysis Code Using the Higher-Order Numerical Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Won Woong; Lee, Jeong Ik [KAIST, Daejeon (Korea, Republic of)

    2016-05-15

    The existing nuclear system analysis codes such as RELAP5, TRAC, MARS and SPACE use the first-order numerical scheme in both space and time discretization. However, the first-order scheme is highly diffusive and less accurate due to the first order of truncation error. So, the numerical diffusion problem which makes the gradients to be smooth in the regions where the gradients should be steep can occur during the analysis, which often predicts less conservatively than the reality. Therefore, the first-order scheme is not always useful in many applications such as boron solute transport. RELAP7 which is an advanced nuclear reactor system safety analysis code using the second-order numerical scheme in temporal and spatial discretization is being developed by INL (Idaho National Laboratory) since 2011. Therefore, for better predictive performance of the safety of nuclear reactor systems, more accurate nuclear reactor system analysis code is needed for Korea too to follow the global trend of nuclear safety analysis. Thus, this study will evaluate the feasibility of applying the higher-order numerical scheme to the next generation nuclear system analysis code to provide the basis for the better nuclear system analysis code development. The accuracy is enhanced in the spatial second-order scheme and the numerical diffusion problem is alleviated while indicates significantly lower maximum Courant limit and the numerical dispersion issue which produces spurious oscillation and non-physical results in the higher-order scheme. If the spatial scheme is the first order scheme then the temporal second-order scheme provides almost the same result with the temporal firstorder scheme. However, when the temporal second order scheme and the spatial second-order scheme are applied together, the numerical dispersion can occur more severely. For the more in-depth study, the verification and validation of the NTS code built in MATLAB will be conducted further and expanded to handle two

  13. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  14. Improving TCP Performance over Wireless Ad Hoc Networks with Busy Tone Assisted Scheme

    Directory of Open Access Journals (Sweden)

    Cai Lin

    2006-01-01

    Full Text Available It is well known that transmission control protocol (TCP performance degrades severely in IEEE 802.11-based wireless ad hoc networks. We first identify two critical issues leading to the TCP performance degradation: (1 unreliable broadcast, since broadcast frames are transmitted without the request-to-send and clear-to-send (RTS/CTS dialog and Data/ACK handshake, so they are vulnerable to the hidden terminal problem; and (2 false link failure which occurs when a node cannot successfully transmit data temporarily due to medium contention. We then propose a scheme to use a narrow-bandwidth, out-of-band busy tone channel to make reservation for broadcast and link error detection frames only. The proposed scheme is simple and power efficient, because only the sender needs to transmit two short messages in the busy tone channel before sending broadcast or link error detection frames in the data channel. Analytical results show that the proposed scheme can dramatically reduce the collision probability of broadcast and link error detection frames. Extensive simulations with different network topologies further demonstrate that the proposed scheme can improve TCP throughput by 23% to 150%, depending on user mobility, and effectively enhance both short-term and long-term fairness among coexisting TCP flows in multihop wireless ad hoc networks.

  15. Efficient multichannel acoustic echo cancellation using constrained tap selection schemes in the subband domain

    Science.gov (United States)

    Desiraju, Naveen Kumar; Doclo, Simon; Wolff, Tobias

    2017-12-01

    Acoustic echo cancellation (AEC) is a key speech enhancement technology in speech communication and voice-enabled devices. AEC systems employ adaptive filters to estimate the acoustic echo paths between the loudspeakers and the microphone(s). In applications involving surround sound, the computational complexity of an AEC system may become demanding due to the multiple loudspeaker channels and the necessity of using long filters in reverberant environments. In order to reduce the computational complexity, the approach of partially updating the AEC filters is considered in this paper. In particular, we investigate tap selection schemes which exploit the sparsity present in the loudspeaker channels for partially updating subband AEC filters. The potential for exploiting signal sparsity across three dimensions, namely time, frequency, and channels, is analyzed. A thorough analysis of different state-of-the-art tap selection schemes is performed and insights about their limitations are gained. A novel tap selection scheme is proposed which overcomes these limitations by exploiting signal sparsity while not ignoring any filters for update in the different subbands and channels. Extensive simulation results using both artificial as well as real-world multichannel signals show that the proposed tap selection scheme outperforms state-of-the-art tap selection schemes in terms of echo cancellation performance. In addition, it yields almost identical echo cancellation performance as compared to updating all filter taps at a significantly reduced computational cost.

  16. Diffraction: what do we know; what can we learn

    International Nuclear Information System (INIS)

    Randa, J.

    1983-05-01

    High energy diffractive scattering is reviewed. We first summarize experimental results and information gleaned from geometric and optical models. We then discuss dynamics from the perspectives of hadron structure and Pomeron structure. Particular emphasis is placed on investigating hadron structure using a simple model of the Pomeron. 58 references

  17. Counter-Based Broadcast Scheme Considering Reachability, Network Density, and Energy Efficiency for Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Ji-Young; Seo, Dong-Yoon; Lee, Jung-Ryun

    2018-01-04

    A wireless sensor network (WSN) is emerging as an innovative method for gathering information that will significantly improve the reliability and efficiency of infrastructure systems. Broadcast is a common method to disseminate information in WSNs. A variety of counter-based broadcast schemes have been proposed to mitigate the broadcast-storm problems, using the count threshold value and a random access delay. However, because of the limited propagation of the broadcast-message, there exists a trade-off in a sense that redundant retransmissions of the broadcast-message become low and energy efficiency of a node is enhanced, but reachability become low. Therefore, it is necessary to study an efficient counter-based broadcast scheme that can dynamically adjust the random access delay and count threshold value to ensure high reachability, low redundant of broadcast-messages, and low energy consumption of nodes. Thus, in this paper, we first measure the additional coverage provided by a node that receives the same broadcast-message from two neighbor nodes, in order to achieve high reachability with low redundant retransmissions of broadcast-messages. Second, we propose a new counter-based broadcast scheme considering the size of the additional coverage area, distance between the node and the broadcasting node, remaining battery of the node, and variations of the node density. Finally, we evaluate performance of the proposed scheme compared with the existing counter-based broadcast schemes. Simulation results show that the proposed scheme outperforms the existing schemes in terms of saved rebroadcasts, reachability, and total energy consumption.

  18. An Enhanced Reservation-Based MAC Protocol for IEEE 802.15.4 Networks

    Science.gov (United States)

    Afonso, José A.; Silva, Helder D.; Macedo, Pedro; Rocha, Luis A.

    2011-01-01

    The IEEE 802.15.4 Medium Access Control (MAC) protocol is an enabling standard for wireless sensor networks. In order to support applications requiring dedicated bandwidth or bounded delay, it provides a reservation-based scheme named Guaranteed Time Slot (GTS). However, the GTS scheme presents some drawbacks, such as inefficient bandwidth utilization and support to a maximum of only seven devices. This paper presents eLPRT (enhanced Low Power Real Time), a new reservation-based MAC protocol that introduces several performance enhancing features in comparison to the GTS scheme. This MAC protocol builds on top of LPRT (Low Power Real Time) and includes various mechanisms designed to increase data transmission reliability against channel errors, improve bandwidth utilization and increase the number of supported devices. A motion capture system based on inertial and magnetic sensors has been used to validate the protocol. The effectiveness of the performance enhancements introduced by each of the new features is demonstrated through the provision of both simulation and experimental results. PMID:22163826

  19. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  20. Two-level schemes for the advection equation

    Science.gov (United States)

    Vabishchevich, Petr N.

    2018-06-01

    The advection equation is the basis for mathematical models of continuum mechanics. In the approximate solution of nonstationary problems it is necessary to inherit main properties of the conservatism and monotonicity of the solution. In this paper, the advection equation is written in the symmetric form, where the advection operator is the half-sum of advection operators in conservative (divergent) and non-conservative (characteristic) forms. The advection operator is skew-symmetric. Standard finite element approximations in space are used. The standard explicit two-level scheme for the advection equation is absolutely unstable. New conditionally stable regularized schemes are constructed, on the basis of the general theory of stability (well-posedness) of operator-difference schemes, the stability conditions of the explicit Lax-Wendroff scheme are established. Unconditionally stable and conservative schemes are implicit schemes of the second (Crank-Nicolson scheme) and fourth order. The conditionally stable implicit Lax-Wendroff scheme is constructed. The accuracy of the investigated explicit and implicit two-level schemes for an approximate solution of the advection equation is illustrated by the numerical results of a model two-dimensional problem.

  1. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  2. A magnet lattice for a tau-charm factory suitable for both standard scheme and monochromatization scheme

    International Nuclear Information System (INIS)

    Beloshitsky, P.

    1992-06-01

    A versatile magnet lattice for a tau-charm factory is considered in this report. The main feature of this lattice is the possibility to use it for both standard flat beam scheme and beam monochromatization scheme. The detailed description of the lattice is given. The restrictions following the compatibility of both schemes are discussed

  3. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  4. Improved Association and Disassociation Scheme for Enhanced WLAN Handover and VHO

    Directory of Open Access Journals (Sweden)

    Sungjin Shin

    2016-01-01

    Full Text Available The number of mobile devices and wireless connections is significantly increasing. Among many wireless protocol types, wireless local area networks (WLANs are expected to support a significant number of devices. Due to this reason, effective and efficient handover (HO and vertical handover (VHO support for WLAN mobile devices is important. A significant improvement in quality of service (QoS can be obtained by reducing the association and disassociation interruption time for user equipment (UE servicing real-time applications during WLAN HO and VHO operations. Based on this focus, this paper investigates the problem of using only the received signal strength indicator (RSSI in HO and VHO decisions, which is what the current IEEE 802.11 based WLAN systems use. Experimental results presented in this paper demonstrate that only using the RSSI results in significant interruption time during HO to another WLAN access point (AP or to a cellular base station during VHO. Therefore, in this paper, an improved association and disassociation scheme that can reduce the data interruption time (DIT and improve the throughput performance is proposed.

  5. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  6. Overlap function and Regge cut in a self-consistent multi-Regge model

    International Nuclear Information System (INIS)

    Banerjee, H.; Mallik, S.

    1977-01-01

    A self-consistent multi-Regge model with unit intercept for the input trajectory is presented. Violation of unitarity is avoided in the model by assuming the vanishing of the pomeron-pomeron-hadron vertex, as the mass of either pomeron tends to zero. The model yields an output Regge pole in the inelastic overlap function which for t>0 lies on the r.h.s. of the moving branch point in the complex J-plane, but for t<0 moves to unphysical sheets. The leading Regge-cut contribution to the forward diffraction amplitude can be negative, so that the total cross section predicted by the model attains a limiting value from below

  7. Overlap function and Regge cut in a self-consistent multi-Regge model

    Energy Technology Data Exchange (ETDEWEB)

    Banerjee, H [Saha Inst. of Nuclear Physics, Calcutta (India); Mallik, S [Bern Univ. (Switzerland). Inst. fuer Theoretische Physik

    1977-04-21

    A self-consistent multi-Regge model with unit intercept for the input trajectory is presented. Violation of unitarity is avoided in the model by assuming the vanishing of the pomeron-pomeron-hadron vertex, as the mass of either pomeron tends to zero. The model yields an output Regge pole in the inelastic overlap function which for t>0 lies on the r.h.s. of the moving branch point in the complex J-plane, but for t<0 moves to unphysical sheets. The leading Regge-cut contribution to the forward diffraction amplitude can be negative, so that the total cross section predicted by the model attains a limiting value from below.

  8. The Performance-based Funding Scheme of Universities

    Directory of Open Access Journals (Sweden)

    Juha KETTUNEN

    2016-05-01

    Full Text Available The purpose of this study is to analyse the effectiveness of the performance-based funding scheme of the Finnish universities that was adopted at the beginning of 2013. The political decision-makers expect that the funding scheme will create incentives for the universities to improve performance, but these funding schemes have largely failed in many other countries, primarily because public funding is only a small share of the total funding of universities. This study is interesting because Finnish universities have no tuition fees, unlike in many other countries, and the state allocates funding based on the objectives achieved. The empirical evidence of the graduation rates indicates that graduation rates increased when a new scheme was adopted, especially among male students, who have more room for improvement than female students. The new performance-based funding scheme allocates the funding according to the output-based indicators and limits the scope of strategic planning and the autonomy of the university. The performance-based funding scheme is transformed to the strategy map of the balanced scorecard. The new funding scheme steers universities in many respects but leaves the research and teaching skills to the discretion of the universities. The new scheme has also diminished the importance of the performance agreements between the university and the Ministry. The scheme increases the incentives for universities to improve the processes and structures in order to attain as much public funding as possible. It is optimal for the central administration of the university to allocate resources to faculties and other organisational units following the criteria of the performance-based funding scheme. The new funding scheme has made the universities compete with each other, because the total funding to the universities is allocated to each university according to the funding scheme. There is a tendency that the funding schemes are occasionally

  9. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  10. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  11. Transverse velocity modulator and generator schemes based on non-collinear radiation and electron beams

    CERN Document Server

    Varfolomeev, A A

    2000-01-01

    New non-collinear schemes are suggested for transverse velocity modulation of electron beams and for the generation of coherent spontaneous radiation by these transversely modulated beams. It is shown that due to the non-collinearity some orders of magnitude enhancement can be achieved for the coherent spontaneous radiation (CSR) power at both the fundamental and harmonic frequencies.

  12. Light quarks and small X physics

    International Nuclear Information System (INIS)

    White, A.R.

    1992-01-01

    The significance of the low k perpendicular part of the Lipatov equation for the QCD soft Pomeron is discussed. It is then argued that light quarks are essential for the emergence of confinement and a Pomeron with the right physical properties. The implications for small x parton distributions are considered

  13. Jet inclusive cross sections

    International Nuclear Information System (INIS)

    Del Duca, V.

    1992-11-01

    Minijet production in jet inclusive cross sections at hadron colliders, with large rapidity intervals between the tagged jets, is evaluated by using the BFKL pomeron. We describe the jet inclusive cross section for an arbitrary number of tagged jets, and show that it behaves like a system of coupled pomerons

  14. Security Analysis and Improvement of 'a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System'.

    Directory of Open Access Journals (Sweden)

    S K Hafizul Islam

    Full Text Available Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.'s scheme for integrated electronic patient record (EPR information system, which has been analyzed in this study. We have found that Wen's scheme still has the following inefficiencies: (1 the correctness of identity and password are not verified during the login and password change phases; (2 it is vulnerable to impersonation attack and privileged-insider attack; (3 it is designed without the revocation of lost/stolen smart card; (4 the explicit key confirmation and the no key control properties are absent, and (5 user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature.

  15. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  16. Delay-Aware Program Codes Dissemination Scheme in Internet of Everything

    Directory of Open Access Journals (Sweden)

    Yixuan Xu

    2016-01-01

    Full Text Available Due to recent advancements in big data, connection technologies, and smart devices, our environment is transforming into an “Internet of Everything” (IoE environment. These smart devices can obtain new or special functions by reprogramming: upgrade their soft systems through receiving new version of program codes. However, bulk codes dissemination suffers from large delay, energy consumption, and number of retransmissions because of the unreliability of wireless links. In this paper, a delay-aware program dissemination (DAPD scheme is proposed to disseminate program codes with fast, reliable, and energy-efficient style. We observe that although total energy is limited in wireless sensor network, there exists residual energy in nodes deployed far from the base station. Therefore, DAPD scheme improves the performance of bulk codes dissemination through the following two aspects. (1 Due to the fact that a high transmitting power can significantly improve the quality of wireless links, transmitting power of sensors with more residual energy is enhanced to improve link quality. (2 Due to the fact that performance of correlated dissemination tends to degrade in a highly dynamic environment, link correlation is autonomously updated in DAPD during codes dissemination to maintain improvements brought by correlated dissemination. Theoretical analysis and experimental results show that, compared with previous work, DAPD scheme improves the dissemination performance in terms of completion time, transmission cost, and the efficiency of energy utilization.

  17. Analysis and performance assessment of a fragment retransmission scheme for energy efficient IEEE 802.11 WLANs.

    Science.gov (United States)

    Mafole, Prosper; Aritsugi, Masayoshi

    2016-01-01

    Backoff-free fragment retransmission (BFFR) scheme enhances the performance of legacy MAC layer fragmentation by eliminating contention overhead. The eliminated overhead is the result of backoff executed before a retransmission attempt is made when fragment transmission failure occurs within a fragment burst. This paper provides a mathematical analysis of BFFR energy efficiency and further assesses, by means of simulations, the energy efficiency, throughput and delay obtained when BFFR is used. The validity of the new scheme is evaluated in different scenarios namely, constant bit rate traffic, realistic bursty internet traffic, node mobility, rigid and elastic flows and their combinations at different traffic loads. We also evaluate and discuss the impact of BFFR on MAC fairness when the number of nodes is varied from 4 to 10. It is shown that BFFR has advantages over legacy MAC fragmentation scheme in all the scenarios.

  18. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  19. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  20. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  1. Software enhancements and modifications to Program FDTD executable on the Cray X-MP computer

    Energy Technology Data Exchange (ETDEWEB)

    Stringer, J.C.

    1987-09-04

    This report summarizes enhancements and modifications to PROGRAM FDTD executable on the Cray X-MP computer system. Specifically, the tasks defined and performed under this effort are revision of the material encoding/decoding scheme to allow material type specification on an individual cell basis; modification of the I/O buffering scheme to maximize the use of available central memory and minimize the number of physical I/O accesses; user interface enhancements. Provide enhanced input/output features for greater flexibility; increased modularity. Divide the code into additional modules for ease of maintenance and future enhancements; and assist in the conversion and testing of FDTD to Floating Point Systems scientific computers and associated peripheral devices.

  2. Student’s scheme in solving mathematics problems

    Science.gov (United States)

    Setyaningsih, Nining; Juniati, Dwi; Suwarsono

    2018-03-01

    The purpose of this study was to investigate students’ scheme in solving mathematics problems. Scheme are data structures for representing the concepts stored in memory. In this study, we used it in solving mathematics problems, especially ratio and proportion topics. Scheme is related to problem solving that assumes that a system is developed in the human mind by acquiring a structure in which problem solving procedures are integrated with some concepts. The data were collected by interview and students’ written works. The results of this study revealed are students’ scheme in solving the problem of ratio and proportion as follows: (1) the content scheme, where students can describe the selected components of the problem according to their prior knowledge, (2) the formal scheme, where students can explain in construct a mental model based on components that have been selected from the problem and can use existing schemes to build planning steps, create something that will be used to solve problems and (3) the language scheme, where students can identify terms, or symbols of the components of the problem.Therefore, by using the different strategies to solve the problems, the students’ scheme in solving the ratio and proportion problems will also differ.

  3. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  4. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  5. Differential evolution optimization combined with chaotic sequences for image contrast enhancement

    Energy Technology Data Exchange (ETDEWEB)

    Santos Coelho, Leandro dos [Industrial and Systems Engineering Graduate Program, LAS/PPGEPS, Pontifical Catholic University of Parana, PUCPR Imaculada Conceicao, 1155, 80215-901 Curitiba, Parana (Brazil)], E-mail: leandro.coelho@pucpr.br; Sauer, Joao Guilherme [Industrial and Systems Engineering Graduate Program, LAS/PPGEPS, Pontifical Catholic University of Parana, PUCPR Imaculada Conceicao, 1155, 80215-901 Curitiba, Parana (Brazil)], E-mail: joao.sauer@gmail.com; Rudek, Marcelo [Industrial and Systems Engineering Graduate Program, LAS/PPGEPS, Pontifical Catholic University of Parana, PUCPR Imaculada Conceicao, 1155, 80215-901 Curitiba, Parana (Brazil)], E-mail: marcelo.rudek@pucpr.br

    2009-10-15

    Evolutionary Algorithms (EAs) are stochastic and robust meta-heuristics of evolutionary computation field useful to solve optimization problems in image processing applications. Recently, as special mechanism to avoid being trapped in local minimum, the ergodicity property of chaotic sequences has been used in various designs of EAs. Three differential evolution approaches based on chaotic sequences using logistic equation for image enhancement process are proposed in this paper. Differential evolution is a simple yet powerful evolutionary optimization algorithm that has been successfully used in solving continuous problems. The proposed chaotic differential evolution schemes have fast convergence rate but also maintain the diversity of the population so as to escape from local optima. In this paper, the image contrast enhancement is approached as a constrained nonlinear optimization problem. The objective of the proposed chaotic differential evolution schemes is to maximize the fitness criterion in order to enhance the contrast and detail in the image by adapting the parameters using a contrast enhancement technique. The proposed chaotic differential evolution schemes are compared with classical differential evolution to two testing images. Simulation results on three images show that the application of chaotic sequences instead of random sequences is a possible strategy to improve the performance of classical differential evolution optimization algorithm.

  6. Digital chaos-masked optical encryption scheme enhanced by two-dimensional key space

    Science.gov (United States)

    Liu, Ling; Xiao, Shilin; Zhang, Lu; Bi, Meihua; Zhang, Yunhao; Fang, Jiafei; Hu, Weisheng

    2017-09-01

    A digital chaos-masked optical encryption scheme is proposed and demonstrated. The transmitted signal is completely masked by interference chaotic noise in both bandwidth and amplitude with analog method via dual-drive Mach-Zehnder modulator (DDMZM), making the encrypted signal analog, noise-like and unrecoverable by post-processing techniques. The decryption process requires precise matches of both the amplitude and phase between the cancellation and interference chaotic noises, which provide a large two-dimensional key space with the help of optical interference cancellation technology. For 10-Gb/s 16-quadrature amplitude modulation (QAM) orthogonal frequency division multiplexing (OFDM) signal over the maximum transmission distance of 80 km without dispersion compensation or inline amplifier, the tolerable mismatch ranges of amplitude and phase/delay at the forward error correction (FEC) threshold of 3.8×10-3 are 0.44 dB and 0.08 ns respectively.

  7. The Swiss agri-environment scheme enhances pollinator diversity and plant reproductive succes in nearby intensively managed farmland

    NARCIS (Netherlands)

    Albrecht, M.; Duelli, P.; Müller, C.; Kleijn, D.; Schmid, B.

    2007-01-01

    1. Agri-environment schemes attempt to counteract the loss of biodiversity and associated ecosystem services such as pollination and natural pest control in agro-ecosystems. However, only a few studies have evaluated whether these attempts are successful. 2. We studied the effects of managing

  8. Optical Code-Division Multiple-Access and Wavelength Division Multiplexing: Hybrid Scheme Review

    OpenAIRE

    P. Susthitha Menon; Sahbudin Shaari; Isaac A.M. Ashour; Hesham A. Bakarman

    2012-01-01

    Problem statement: Hybrid Optical Code-Division Multiple-Access (OCDMA) and Wavelength-Division Multiplexing (WDM) have flourished as successful schemes for expanding the transmission capacity as well as enhancing the security for OCDMA. However, a comprehensive review related to this hybrid system are lacking currently. Approach: The purpose of this paper is to review the literature on OCDMA-WDM overlay systems, including our hybrid approach of one-dimensional coding of SAC OCDMA with WDM si...

  9. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  10. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  11. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  12. A Novel Prioritization Scheme to Improve QoS in IEEE 802.11e Networks

    Directory of Open Access Journals (Sweden)

    Navid Tadayon

    2010-01-01

    Full Text Available IEEE 802.11 WLAN utilizes a distributed function at its MAC layer, namely, DCF to access the wireless medium. Due to its distributed nature, DCF is able to guarantee working stability in a wireless medium while maintaining the assembling and maintenance cost in a low level. However, DCF is inefficient in dealing with real-time traffics due to its incapability on providing QoS. IEEE 802.11e was introduced as a supplementary standard to cope with this problem. This standard introduces an Enhanced Distributed Coordination Function (EDCF that works based on diff-Serve model and can serve multiple classes of traffics (by using different prioritizations schemes. With the emergence of new time-sensitive applications, EDCF has proved to be yet inefficient in dealing with these kinds of traffics because it could not provide network with well-differentiated QoS. In this study, we propose a novel prioritization scheme to improve QoS level in IEEE 802.11e network. In this scheme, we replace Uniform PDF with Gamma PDF, which has salient differentiating properties. We investigate the suitability and superiority of this scheme on furnishing network with well-differentiated QoS using probabilistic analysis. We strengthen our claims by extensive simulation runs.

  13. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  14. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  15. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  16. Hard Diffraction - from Blois 1985 to 2005

    Energy Technology Data Exchange (ETDEWEB)

    Gunnar, Ingelman [Uppsala Univ., High Energy Physics (Sweden)

    2005-07-01

    The idea of diffractive processes with a hard scale involved, to resolve the underlying parton dynamics, was presented at the first Blois conference in 1985 and experimentally verified a few years later. Today hard diffraction is an attractive research field with high-quality data and new theoretical models. The trend from Regge-based pomeron models to QCD-based parton level models has given insights on QCD dynamics involving perturbative gluon exchange mechanisms. In the new QCD-based models, the pomeron is not part of the proton wave function, but diffraction is an effect of the scattering process. Models based on interactions with a colour background field provide an interesting approach which avoids conceptual problems of pomeron-based models, such as the pomeron flux, and provide a basis for common theoretical framework for all final states, diffractive gap events as well as non-diffractive events. Finally, the new process of gaps between jets provides strong evidence for the BFKL dynamics as predicted since long by QCD, but so far hard to establish experimentally.

  17. Cluster formulation in the dual topological unitarization

    International Nuclear Information System (INIS)

    Hossain, M.

    1979-02-01

    The work of Chiu, Hossain, and Tow is generalized by incorporating the no double counting condition and the t/sub min/ effect in the integral equations for the Reggeon and the Pomeron. The relation between the no double counting condition and the average cluster separation is derived, and a test is proposed to determine the correct counting. It is shown that the t/sub min/ effect is quite important in determining the Regge parameters. The model predicts a relation between five physical quantities: the Pomeron intercept (α/sub p/ 0 ) and slope (α/sub p/'), the magnitude (k) and the exponential dependence (b) of the triple-Regge vertex, and the ratio of Pomeron to Reggeon residues (c) at t = 0. The solutions obtained are well within the range of acceptable values. A reasonable solution is, for example, α/sub p/ 0 = .92, α/sub p/' = .2, b = 1.6, k = 12.9, and c = 0.91. It is found that cuts are present in both the Reggeon and the Pomeron amplitudes, and their contributions are small compared to the leading poles. 27 references

  18. Diffractive production in deep inelastic scattering and hadronic interactions

    International Nuclear Information System (INIS)

    Kaidalow, A.

    1996-01-01

    Diffractive processes in hadronic interactions are considered and important role of multi-Pomeron exchanges is emphasized. It is argued that in deep inelastic scattering these contributions are much less important and energy behavior of structure functions at Q 2 ≥ 1 GeV 2 is determined mostly by bare Pomeron intercept. It is shown that the model based on these ideas is in a perfect agreement with recent results from HERA. Diffractive production in DIS is discussed and theoretical predictions for the structure function of the Pomeron are compared with experimental observations. It is emphasized that both quarks and gluons in the Pomeron have hard distributions. Shadowing corrections to structure function of a nucleon are calculated and found to small in the region of x > 10 -4 . A good agreement with experimental data on the shadowing of structure functions of nuclei is obtained. Energy dependence for the cross sections of the diffractive production of vector mesons by real and virtual photons is calculated in the same approach and is found to be in an excellent agreement with experiment. (author)

  19. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  20. Security Analysis and Improvement of ‘a More Secure Anonymous User Authentication Scheme for the Integrated EPR Information System’

    Science.gov (United States)

    Islam, SK Hafizul; Khan, Muhammad Khurram; Li, Xiong

    2015-01-01

    Over the past few years, secure and privacy-preserving user authentication scheme has become an integral part of the applications of the healthcare systems. Recently, Wen has designed an improved user authentication system over the Lee et al.’s scheme for integrated electronic patient record (EPR) information system, which has been analyzed in this study. We have found that Wen’s scheme still has the following inefficiencies: (1) the correctness of identity and password are not verified during the login and password change phases; (2) it is vulnerable to impersonation attack and privileged-insider attack; (3) it is designed without the revocation of lost/stolen smart card; (4) the explicit key confirmation and the no key control properties are absent, and (5) user cannot update his/her password without the help of server and secure channel. Then we aimed to propose an enhanced two-factor user authentication system based on the intractable assumption of the quadratic residue problem (QRP) in the multiplicative group. Our scheme bears more securities and functionalities than other schemes found in the literature. PMID:26263401

  1. Gluon exchange in elastic hadron scattering

    International Nuclear Information System (INIS)

    Jenkovszky, L.L.; Paccanoni, F.; Chikovani, Z.E.

    1991-01-01

    It is generally accepted that the Pomeron, which determines the long-range component of the strong interaction, corresponds to exchange of gluons with the corresponding quantum numbers (the minimum number of such gluons is two). The C-odd partner of the Pomeron, the odderon, corresponds to exchange of an odd number of gluons (three or more). By means of a model of the nonperturbative gluon propagator, restrictions are obtained on the parameters of two-gluon (Pomeron) and three-gluon (odderon) exchange in hadron scattering. In the framework of this model an interpretation is proposed for the various asymptotic regimes in the behavior of the total cross section and of the differential cross section of elastic scattering at high energies

  2. A Novel Image Encryption Scheme Based on Self-Synchronous Chaotic Stream Cipher and Wavelet Transform

    Directory of Open Access Journals (Sweden)

    Chunlei Fan

    2018-06-01

    Full Text Available In this paper, a novel image encryption scheme is proposed for the secure transmission of image data. A self-synchronous chaotic stream cipher is designed with the purpose of resisting active attack and ensures the limited error propagation of image data. Two-dimensional discrete wavelet transform and Arnold mapping are used to scramble the pixel value of the original image. A four-dimensional hyperchaotic system with four positive Lyapunov exponents serve as the chaotic sequence generator of the self-synchronous stream cipher in order to enhance the security and complexity of the image encryption system. Finally, the simulation experiment results show that this image encryption scheme is both reliable and secure.

  3. Forward Physics at the LHC

    CERN Document Server

    Martin, A D; Khoze, V A

    2009-01-01

    We review two inter-related topics. First, we consider the behaviour of "soft" scattering observables, such as sigma_{tot}, dsigma_{el}/dt, dsigma_{SD}/dtdM^2, particle multiplicities etc., at high-energy proton-(anti)proton colliders. We emphasize the sizeable effects of absorption on high-energy `soft' processes, and, hence, the necessity to include multi-Pomeron-Pomeron interactions in the usual multi-channel eikonal description. We describe a multi-component model which has been tuned to the available data for soft processes in the CERN-ISR to Tevatron energy range, and which therefore allows predictions to be made for `soft' observables at the LHC. The second topic concerns the calculation of the rate of exclusive processes of the form pp --> p+A+p at high energy colliders, where A is a heavy system. In particular, we discuss the survival probability of the rapidity gaps (denoted by the + signs) to both eikonal and enhanced soft rescattering effects. At the LHC energy, the most topical case is when A is ...

  4. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  5. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  6. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  7. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  8. New mitigation schemes of the ablative Rayleigh-Taylor instability

    International Nuclear Information System (INIS)

    Azechi, H.; Shiraga, H.; Nakai, M.; Shigemori, K.; Fujioka, S.; Sakaiya, T.; Tamari, Y.; Ohtani, K.; Watari, T.; Murakami, M.; Sunahara, A.; Nagatomo, H.; Nishihara, K.; Miyanaga, N.; Izawa, Y.; Ohnishi, N.

    2005-01-01

    The Rayleigh-Taylor (RT) instability with material ablation through the unstable interface is the key physics that determines success or failure of inertial fusion energy (IFE) generation, as the RT instability potentially quenches ignition and burn by disintegrating the IFE target. We present two suppression schemes of the RT growth without significant degradation of the target density. The first scheme is to generate double ablation structure in high-Z doped plastic targets. In addition to the electron ablation surface, a new ablation surface is created by x-ray radiation from the high-Z ions. Contrary to the previous thought, the electron ablation surface is almost completely stabilized by extremely high flow velocity. On the other hand, the RT instability on the radiative ablation surface is significantly moderated. The second is to enhance the nonlocal nature of the electron heat transport by illuminating the target with long wavelength laser light, whereas the high ablation pressure is generated by irradiating short wavelength laser light. The significant suppression of the RT instability may increase the possibility of impact ignition which uses a high velocity fuel colliding with a preformed main fuel. (author)

  9. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  10. Fabrication of graphene oxide enwrapped Z-scheme Ag{sub 2}SO{sub 3}/AgBr nanoparticles with enhanced visible-light photocatalysis

    Energy Technology Data Exchange (ETDEWEB)

    Wan, Yujuan; Liang, Chunyan; Xia, Yue, E-mail: xiayue_chem@126.com; Huang, Wei; Li, Zelin

    2017-02-28

    Highlights: • A novel GO/Ag{sub 2}SO{sub 3}/AgBr composite was prepared via a solution method. • It showed enhanced photocatalytic performance to degrade dyes under visible light irradiation. • Its photocatalytic ability was effectively maintained for 4 cycles without sacrificial reagents. - Abstract: A novel graphene oxide (GO) enwrapped Ag{sub 2}SO{sub 3}/AgBr (GO/Ag{sub 2}SO{sub 3}/AgBr) composite was fabricated through a facile solution approach via electrostatic interaction and precipitation transformation reaction for the first time. The results of XRD, Raman, SEM, TEM and XPS confirmed the structure, morphology and composition of the GO/Ag{sub 2}SO{sub 3}/AgBr composite very well. The Ag{sub 2}SO{sub 3}/AgBr nanoparticles were found to be encapsulated by GO sheets. The photocatalytic activity of the composite was investigated by the degradation of methyl orange (MO), rhodamine B (RhB) and methylene blue (MB) in water under visible light. The incorporation of GO sheets not only significantly enhanced the photocatalytic activity but also improved the reusability of Ag{sub 2}SO{sub 3}/AgBr nanoparticles. The photocatalytic ability of GO/Ag{sub 2}SO{sub 3}/AgBr can be maintained at a high level for 4 times cycle experiments. The trapping experiments confirmed that holes and superoxide ion radicals were the main active species responsible for the degradation reaction. A plasmonic Z-scheme photocatalytic mechanism was proposed to illustrate the possible transferred and separated behavior of electron-hole pairs among Ag, Ag{sub 2}SO{sub 3}, AgBr and GO quaternary system under visible light irradiation.

  11. Broadband sensitivity enhancement of detuned dual-recycled Michelson interferometers with EPR entanglement

    Science.gov (United States)

    Brown, Daniel D.; Miao, Haixing; Collins, Chris; Mow-Lowry, Conor; Töyrä, Daniel; Freise, Andreas

    2017-09-01

    We demonstrate the applicability of the EPR entanglement squeezing scheme for enhancing the shot-noise-limited sensitivity of detuned dual-recycled Michelson interferometers. In particular, this scheme is applied to the GEO600 interferometer. The effect of losses throughout the interferometer, arm length asymmetries, and imperfect separation of the signal and idler beams is considered.

  12. Comparison in Schemes for Simulating Depositional Growth of Ice Crystal between Theoretical and Laboratory Data

    Science.gov (United States)

    Zhai, Guoqing; Li, Xiaofan

    2015-04-01

    The Bergeron-Findeisen process has been simulated using the parameterization scheme for the depositional growth of ice crystal with the temperature-dependent theoretically predicted parameters in the past decades. Recently, Westbrook and Heymsfield (2011) calculated these parameters using the laboratory data from Takahashi and Fukuta (1988) and Takahashi et al. (1991) and found significant differences between the two parameter sets. There are two schemes that parameterize the depositional growth of ice crystal: Hsie et al. (1980), Krueger et al. (1995) and Zeng et al. (2008). In this study, we conducted three pairs of sensitivity experiments using three parameterization schemes and the two parameter sets. The pre-summer torrential rainfall event is chosen as the simulated rainfall case in this study. The analysis of root-mean-squared difference and correlation coefficient between the simulation and observation of surface rain rate shows that the experiment with the Krueger scheme and the Takahashi laboratory-derived parameters produces the best rain-rate simulation. The mean simulated rain rates are higher than the mean observational rain rate. The calculations of 5-day and model domain mean rain rates reveal that the three schemes with Takahashi laboratory-derived parameters tend to reduce the mean rain rate. The Krueger scheme together with the Takahashi laboratory-derived parameters generate the closest mean rain rate to the mean observational rain rate. The decrease in the mean rain rate caused by the Takahashi laboratory-derived parameters in the experiment with the Krueger scheme is associated with the reductions in the mean net condensation and the mean hydrometeor loss. These reductions correspond to the suppressed mean infrared radiative cooling due to the enhanced cloud ice and snow in the upper troposphere.

  13. The Australian Managed Entry Scheme: Are We Getting it Right?

    Science.gov (United States)

    Tuffaha, Haitham W; Scuffham, Paul A

    2018-05-01

    In 2010, the Australian Government introduced the managed entry scheme (MES) to improve patient access to subsidised drugs on the Pharmaceutical Benefits Scheme and enhance the quality of evidence provided to decision makers. The aim of this paper was to critically review the Australian MES experience. We performed a comprehensive review of publicly available Pharmaceutical Benefits Advisory Committee online documents from January 2010 to July 2017. Relevant information on each MES agreement was systematically extracted, including its rationale, the conditions that guided its implementation and its policy outcomes. We identified 11 drugs where an MES was considered. Most of the identified drugs (75%) were antineoplastic agents and the main uncertainty was the overall survival benefit. More than half of the MES proposals were made by sponsors and most of the schemes were considered after previous rejected/deferred submissions for reimbursement. An MES was not established in 8 of 11 drugs (73%) despite the high evidence uncertainty. Nevertheless, six of these eight drugs were listed after the sponsors reduced their prices. Three MESs were established and implemented by Deeds of Agreement. The three cases were concluded and the required data were submitted within the agreed time frames. The need for feasibility and value of an MES should be carefully considered by stakeholders before embarking on such an agreement. It is essential to engage major stakeholders, including patient representatives, in this process. The conditions governing MESs should be clear, transparent and balanced to address the expectations of various stakeholders.

  14. A fast resonance interference treatment scheme with subgroup method

    International Nuclear Information System (INIS)

    Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.

    2015-01-01

    A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)

  15. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  16. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  17. A Security Scheme of 5G Ultradense Network Based on the Implicit Certificate

    Directory of Open Access Journals (Sweden)

    Zhonglin Chen

    2018-01-01

    Full Text Available The ultradense network (UDN is one of the most promising technologies in the fifth generation (5G to address the network system capacity issue. It can enhance spatial reuse through the flexible, intensive deployment of small base stations. A universal 5G UDN architecture is necessary to realize the autonomous and dynamic deployment of small base stations. However, the security of the 5G UDN is still in its infancy, and the data communication security among the network entities is facing new challenges. In this paper, we proposed a new security based on implicit certificate (IC scheme; the scheme solves the security problem among the access points (APs in a dynamic APs group (APG and between the AP and user equipment (UE. We present each phase regarding how two network entities obtain the Elliptic Curve Qu-Vanstone (ECQV implicit certificate scheme, verify each other’s identity, and share keys in an UDN. Finally, we extensively analyze our lightweight security communication model in terms of security and performance. The simulation on network bandwidth evaluation is also conducted to prove the efficiency of the solution.

  18. Dual-recycled cavity-enhanced Michelson interferometer for gravitational-wave detection.

    Science.gov (United States)

    Müller, Guido; Delker, Tom; Tanner, David B; Reitze, David

    2003-03-01

    The baseline design for an Advanced Laser Interferometer Gravitational-Wave Observatory (Advanced LIGO) is a dual-recycled Michelson interferometer with cavities in each of the Michelson interferometer arms. We describe one possible length-sensing and control scheme for such a dual-recycled, cavity-enhanced Michelson interferometer. We discuss the principles of this scheme and derive the first-order sensing signals. We also present a successful experimental verification of our length-sensing system using a prototype tabletop interferometer. Our results demonstrate the robustness of the scheme against deviations from the idealized design. We also identify potential weaknesses and discuss possible improvements. These results as well as other benchtop experiments that we present form the basis for a sensing and control scheme for Advanced LIGO.

  19. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  20. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  1. Enhancement tuning and control for high dynamic range images in multi-scale locally adaptive contrast enhancement algorithms

    Science.gov (United States)

    Cvetkovic, Sascha D.; Schirris, Johan; de With, Peter H. N.

    2009-01-01

    For real-time imaging in surveillance applications, visibility of details is of primary importance to ensure customer confidence. If we display High Dynamic-Range (HDR) scenes whose contrast spans four or more orders of magnitude on a conventional monitor without additional processing, results are unacceptable. Compression of the dynamic range is therefore a compulsory part of any high-end video processing chain because standard monitors are inherently Low- Dynamic Range (LDR) devices with maximally two orders of display dynamic range. In real-time camera processing, many complex scenes are improved with local contrast enhancements, bringing details to the best possible visibility. In this paper, we show how a multi-scale high-frequency enhancement scheme, in which gain is a non-linear function of the detail energy, can be used for the dynamic range compression of HDR real-time video camera signals. We also show the connection of our enhancement scheme to the processing way of the Human Visual System (HVS). Our algorithm simultaneously controls perceived sharpness, ringing ("halo") artifacts (contrast) and noise, resulting in a good balance between visibility of details and non-disturbance of artifacts. The overall quality enhancement, suitable for both HDR and LDR scenes, is based on a careful selection of the filter types for the multi-band decomposition and a detailed analysis of the signal per frequency band.

  2. An Empirical Study on User-oriented Association Analysis of Library Classification Schemes

    Directory of Open Access Journals (Sweden)

    Hsiao-Tieh Pu

    2002-12-01

    Full Text Available Library classification schemes are mostly organized based on disciplines with a hierarchical structure. From the user point of view, some highly related yet non-hierarchical classes may not be easy to perceive in these schemes. This paper is to discover hidden associations between classes by analyzing users’ usage of library collections. The proposed approach employs collaborative filtering techniques to discover associated classes based on the circulation patterns of similar users. Many associated classes scattered across different subject hierarchies could be discovered from the circulation patterns of similar users. The obtained association norms between classes were found to be useful in understanding users' subject preferences for a given class. Classification schemes can, therefore, be made more adaptable to changes of users and the uses of different library collections. There are implications for applications in information organization and retrieval as well. For example, catalogers could refer to the ranked associated classes when they perform multi-classification, and users could also browse the associated classes for related subjects in an enhanced OPAC system. In future research, more empirical studies will be needed to validate the findings, and methods for obtaining user-oriented associations can still be improved.[Article content in Chinese

  3. Effects induced by ICRF waves on various confinement schemes in Tore Supra

    International Nuclear Information System (INIS)

    Saoutic, B.

    1995-01-01

    The 1993-94 experimental campaign has seen a significant increase of the application of waves in the ion cyclotron range of frequency on Tore Supra. Ion cyclotron resonant heating has been applied to plasmas with strongly radiating layers, pellet-enhanced performance and lower hybrid enhanced performance. Initial experiments on direct coupling of the fast magnetosonic wave to the electrons have demonstrated coupling up to 5 MW to the plasma and have demonstrated an efficient electron heating in these discharges. A significant bootstrap current fraction is observed. This heating scheme leads to a stationary improvement in energy confinement, with implications for the Rebut-Lallia-Watkins local transport model. Finally, preliminary experiments on antenna phasing have shown clear evidence of fast wave current drive. (author) 25 refs.; 9 figs

  4. Linking renewable energy CDM projects and TGC schemes: An analysis of different options

    International Nuclear Information System (INIS)

    Del Rio, Pablo

    2006-01-01

    Renewable energy CDM (RE-CDM) projects encourage cost-effective GHG mitigation and enhanced sustainable development opportunities for the host countries. CERs from CDM projects include the value of the former benefits (i.e., 'climate change benefits'), whereas the second can be given value through the issuing and trading of tradable green certificates (TGCs). Countries could agree to trade these TGCs, leading to additional revenues for the investors in renewable energy projects and, therefore, further encouraging the deployment of CDM projects, currently facing significant barriers. However, the design of a combination of CDM projects and TGC schemes raises several conflicting issues and leads to trade-offs. This paper analyses these issues, identifies the alternatives that may exist to link TGC schemes with RE-CDM projects and analyses the impacts of those options on different variables and actors

  5. Linking renewable energy CDM projects and TGC schemes: An analysis of different options

    Energy Technology Data Exchange (ETDEWEB)

    Del Rio, Pablo [Department of Economics and Business, Facultad de Ciencias Juridicas y Sociales, Universidad de Castilla-La Mancha, C/ Cobertizo de S. Pedro Martir s/n., Toledo-45071 (Spain)]. E-mail: pablo.rio@uclm.es

    2006-11-15

    Renewable energy CDM (RE-CDM) projects encourage cost-effective GHG mitigation and enhanced sustainable development opportunities for the host countries. CERs from CDM projects include the value of the former benefits (i.e., 'climate change benefits'), whereas the second can be given value through the issuing and trading of tradable green certificates (TGCs). Countries could agree to trade these TGCs, leading to additional revenues for the investors in renewable energy projects and, therefore, further encouraging the deployment of CDM projects, currently facing significant barriers. However, the design of a combination of CDM projects and TGC schemes raises several conflicting issues and leads to trade-offs. This paper analyses these issues, identifies the alternatives that may exist to link TGC schemes with RE-CDM projects and analyses the impacts of those options on different variables and actors.

  6. LDPC-PPM Coding Scheme for Optical Communication

    Science.gov (United States)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  7. Multidimensional flux-limited advection schemes

    International Nuclear Information System (INIS)

    Thuburn, J.

    1996-01-01

    A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion

  8. Research Progress in Carbon Dioxide Storage and Enhanced Oil Recovery

    Science.gov (United States)

    Wang, Keliang; Wang, Gang; Lu, Chunjing

    2018-02-01

    With the rapid development of global economy, human beings have become highly dependent upon fossil fuel such as coal and petroleum. Much fossil fuel is consumed in industrial production and human life. As a result, carbon dioxide emissions have been increasing, and the greenhouse effects thereby generated are posing serious threats to environment of the earth. These years, increasing average global temperature, frequent extreme weather events and climatic changes cause material disasters to the world. After scientists’ long-term research, ample evidences have proven that emissions of greenhouse gas like carbon dioxide have brought about tremendous changes to global climate. To really reduce carbon dioxide emissions, governments of different countries and international organizations have invested much money and human resources in performing research related to carbon dioxide emissions. Manual underground carbon dioxide storage and carbon dioxide-enhanced oil recovery are schemes with great potential and prospect for reducing carbon dioxide emissions. Compared with other schemes for reducing carbon dioxide emissions, aforementioned two schemes exhibit high storage capacity and yield considerable economic benefits, so they have become research focuses for reducing carbon dioxide emissions. This paper introduces the research progress in underground carbon dioxide storage and enhanced oil recovery, pointing out the significance and necessity of carbon dioxide-driven enhanced oil recovery.

  9. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  10. A two layer chaotic encryption scheme of secure image transmission for DCT precoded OFDM-VLC transmission

    Science.gov (United States)

    Wang, Zhongpeng; Chen, Fangni; Qiu, Weiwei; Chen, Shoufa; Ren, Dongxiao

    2018-03-01

    In this paper, a two-layer image encryption scheme for a discrete cosine transform (DCT) precoded orthogonal frequency division multiplexing (OFDM) visible light communication (VLC) system is proposed. Firstly, in the proposed scheme the transmitted image is first encrypted by a chaos scrambling sequence,which is generated from the hybrid 4-D hyper- and Arnold map in the upper-layer. After that, the encrypted image is converted into digital QAM modulation signal, which is re-encrypted by chaos scrambling sequence based on Arnold map in physical layer to further enhance the security of the transmitted image. Moreover, DCT precoding is employed to improve BER performance of the proposed system and reduce the PAPR of OFDM signal. The BER and PAPR performances of the proposed system are evaluated by simulation experiments. The experiment results show that the proposed two-layer chaos scrambling schemes achieve image secure transmission for image-based OFDM VLC. Furthermore, DCT precoding can reduce the PAPR and improve the BER performance of OFDM-based VLC.

  11. Scheme for radiography/tomography with a low-brilliance neutron source at the CPHS

    International Nuclear Information System (INIS)

    Huang Zhifeng; Xiao Yongshun; Zhang Ran; Li Yuanji; Han Xiaoxue; Shao Beibei; Wang Xuewu; Wei Jie; Loong, C.-K.

    2011-01-01

    A cold neutron radiography/tomography instrument was designed and will soon undergo construction at the Compact Pulsed Hadron Source (CPHS) of Tsinghua University, China. In this paper, we report the physical design of the instrument and propose a scheme to implement several techniques at a later phase to enhance the utilization of the flux on larger samples. This includes code-aperture, grating-based imaging, prompt gamma-ray analysis and 3D emission CT.

  12. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  13. Error forecasting schemes of error correction at receiver

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-08-01

    To combat error in computer communication networks, ARQ (Automatic Repeat Request) techniques are used. Recently Chakraborty has proposed a simple technique called the packet combining scheme in which error is corrected at the receiver from the erroneous copies. Packet Combining (PC) scheme fails: (i) when bit error locations in erroneous copies are the same and (ii) when multiple bit errors occur. Both these have been addressed recently by two schemes known as Packet Reversed Packet Combining (PRPC) Scheme, and Modified Packet Combining (MPC) Scheme respectively. In the letter, two error forecasting correction schemes are reported, which in combination with PRPC offer higher throughput. (author)

  14. Effective Scheme of Channel Tracking and Estimation for Mobile WiMAX DL-PUSC System

    Directory of Open Access Journals (Sweden)

    Phuong Thi Thu Pham

    2010-01-01

    Full Text Available This paper introduces an effective joint scheme of channel estimation and tracking for downlink partial usage of subchannel (DL-PUSC mode of mobile WiMAX system. Based on the pilot pattern of this particular system, some channel estimation methods including conventional interpolations and a more favorable least-squares line fitting (LSLF technique are comparatively studied. Besides, channel estimation performance can be remarkably improved by taking advantage of channel tracking derived from the preamble symbol. System performances in terms of packet error rate (PER and user link throughput are investigated in various channels adopted from the well-known ITU models for mobile environments. Simulation results show a significant performance enhancement when the proposed joint scheme is utilized, at least 5 dB, compared to only commonly used channel estimation approaches.

  15. A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety.

    Science.gov (United States)

    Jin, Chunhua; Xu, Chunxiang; Zhang, Xiaojun; Li, Fagen

    2016-01-01

    Patient medication safety is an important issue in patient medication systems. In order to prevent medication errors, integrating Radio Frequency Identification (RFID) technology into automated patient medication systems is required in hospitals. Based on RFID technology, such systems can provide medical evidence for patients' prescriptions and medicine doses, etc. Due to the mutual authentication between the medication server and the tag, RFID authentication scheme is the best choice for automated patient medication systems. In this paper, we present a RFID mutual authentication scheme based on elliptic curve cryptography (ECC) to enhance patient medication safety. Our scheme can achieve security requirements and overcome various attacks existing in other schemes. In addition, our scheme has better performance in terms of computational cost and communication overhead. Therefore, the proposed scheme is well suitable for patient medication systems.

  16. Estimating plume dispersion: a comparison of several sigma schemes

    International Nuclear Information System (INIS)

    Irwin, J.S.

    1983-01-01

    The lateral and vertical Gaussian plume dispersion parameters are estimated and compared with field tracer data collected at 11 sites. The dispersion parameter schemes used in this analysis include Cramer's scheme, suggested for tall stack dispersion estimates, Draxler's scheme, suggested for elevated and surface releases, Pasquill's scheme, suggested for interim use in dispersion estimates, and the Pasquill--Gifford scheme using Turner's technique for assigning stability categories. The schemes suggested by Cramer, Draxler and Pasquill estimate the dispersion parameters using onsite measurements of the vertical and lateral wind-velocity variances at the effective release height. The performances of these schemes in estimating the dispersion parameters are compared with that of the Pasquill--Gifford scheme, using the Prairie Grass and Karlsruhe data. For these two experiments, the estimates of the dispersion parameters using Draxler's scheme correlate better with the measurements than did estimates using the Pasquill--Gifford scheme. Comparison of the dispersion parameter estimates with the measurement suggests that Draxler's scheme for characterizing the dispersion results in the smallest mean fractional error in the estimated dispersion parameters and the smallest variance of the fractional errors

  17. The governance challenge for implementing effective market-based climate policies: A case study of The New South Wales Greenhouse Gas Reduction Scheme

    International Nuclear Information System (INIS)

    Passey, Robert; MacGill, Iain; Outhred, Hugh

    2008-01-01

    The New South Wales (NSW) Greenhouse Gas Reduction Scheme (GGAS) in Australia is a baseline and credit emissions trading scheme with the stated aim of reducing the per-capita greenhouse emissions associated with electricity consumption in the state of NSW. Here we provide a detailed assessment of the GGAS design and operation, with a particular emphasis on its effectiveness in delivering physical emissions reductions that would not have occurred in its absence. We find that a number of design features mean a significant proportion of the tradeable 'abatement' certificates are unlikely to correspond to the claimed emissions reductions. While some of these adverse design choices might be corrected, others would seem inherent to the underlying scheme design. Our analysis highlights the major governance challenges with emissions trading approaches and hence the importance of good policy implementation processes including the need for separation of powers through a scheme development process that involves design, assessment and revision. These GGAS lessons would seem relevant for governance with all emissions trading schemes, and has particular implications for cap and trade schemes that incorporate baseline and credit offset schemes, as well as to the 'White Certificate' schemes increasingly being seen as a means of fostering enhanced end-use energy efficiency

  18. Cost-based droop scheme for DC microgrid

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang

    2014-01-01

    voltage level, less on optimized operation and control of generation sources. The latter theme is perused in this paper, where cost-based droop scheme is proposed for distributed generators (DGs) in DC microgrids. Unlike traditional proportional power sharing based droop scheme, the proposed scheme......-connected operation. Most importantly, the proposed scheme can reduce overall total generation cost in DC microgrids without centralized controller and communication links. The performance of the proposed scheme has been verified under different load conditions.......DC microgrids are gaining interest due to higher efficiencies of DC distribution compared with AC. The benefits of DC systems have been widely researched for data centers, IT facilities and residential applications. The research focus, however, has been more on system architecture and optimal...

  19. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  20. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  1. An improved current control scheme for grid-connected DG unit based distribution system harmonic compensation

    DEFF Research Database (Denmark)

    He, Jinwei; Wei Li, Yun; Wang, Xiongfei

    2013-01-01

    In order to utilize DG unit interfacing converters to actively compensate distribution system harmonics, this paper proposes an enhanced current control approach. It seamlessly integrates system harmonic mitigation capabilities with the primary DG power generation function. As the proposed current...... controller has two well decoupled control branches to independently control fundamental and harmonic DG currents, phase-locked loops (PLL) and system harmonic component extractions can be avoided during system harmonic compensation. Moreover, a closed-loop power control scheme is also employed to derive...... the fundamental current reference. The proposed power control scheme effectively eliminates the impacts of steady-state fundamental current tracking errors in the DG units. Thus, an accurate power control is realized even when the harmonic compensation functions are activated. Experimental results from a single...

  2. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  3. Speckle Reduction and Structure Enhancement by Multichannel Median Boosted Anisotropic Diffusion

    Directory of Open Access Journals (Sweden)

    Yang Zhi

    2004-01-01

    Full Text Available We propose a new approach to reduce speckle noise and enhance structures in speckle-corrupted images. It utilizes a median-anisotropic diffusion compound scheme. The median-filter-based reaction term acts as a guided energy source to boost the structures in the image being processed. In addition, it regularizes the diffusion equation to ensure the existence and uniqueness of a solution. We also introduce a decimation and back reconstruction scheme to further enhance the processing result. Before the iteration of the diffusion process, the image is decimated and a subpixel shifted image set is formed. This allows a multichannel parallel diffusion iteration, and more importantly, the speckle noise is broken into impulsive or salt-pepper noise, which is easy to remove by median filtering. The advantage of the proposed technique is clear when it is compared to other diffusion algorithms and the well-known adaptive weighted median filtering (AWMF scheme in both simulation and real medical ultrasound images.

  4. Security analysis and improvements of arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Zou Xiangfu; Qiu Daowen

    2010-01-01

    A digital signature is a mathematical scheme for demonstrating the authenticity of a digital message or document. For signing quantum messages, some arbitrated quantum signature (AQS) schemes have been proposed. It was claimed that these AQS schemes could guarantee unconditional security. However, we show that they can be repudiated by the receiver Bob. To conquer this shortcoming, we construct an AQS scheme using a public board. The AQS scheme not only avoids being disavowed by the receiver but also preserves all merits in the existing schemes. Furthermore, we discover that entanglement is not necessary while all these existing AQS schemes depend on entanglement. Therefore, we present another AQS scheme without utilizing entangled states in the signing phase and the verifying phase. This scheme has three advantages: it does not utilize entangled states and it preserves all merits in the existing schemes; the signature can avoid being disavowed by the receiver; and it provides a higher efficiency in transmission and reduces the complexity of implementation.

  5. Bit-level quantum color image encryption scheme with quantum cross-exchange operation and hyper-chaotic system

    Science.gov (United States)

    Zhou, Nanrun; Chen, Weiwei; Yan, Xinyu; Wang, Yunqian

    2018-06-01

    In order to obtain higher encryption efficiency, a bit-level quantum color image encryption scheme by exploiting quantum cross-exchange operation and a 5D hyper-chaotic system is designed. Additionally, to enhance the scrambling effect, the quantum channel swapping operation is employed to swap the gray values of corresponding pixels. The proposed color image encryption algorithm has larger key space and higher security since the 5D hyper-chaotic system has more complex dynamic behavior, better randomness and unpredictability than those based on low-dimensional hyper-chaotic systems. Simulations and theoretical analyses demonstrate that the presented bit-level quantum color image encryption scheme outperforms its classical counterparts in efficiency and security.

  6. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  7. Improvement of a Quantum Proxy Blind Signature Scheme

    Science.gov (United States)

    Zhang, Jia-Lei; Zhang, Jian-Zhong; Xie, Shu-Cui

    2018-06-01

    Improvement of a quantum proxy blind signature scheme is proposed in this paper. Six-qubit entangled state functions as quantum channel. In our scheme, a trust party Trent is introduced so as to avoid David's dishonest behavior. The receiver David verifies the signature with the help of Trent in our scheme. The scheme uses the physical characteristics of quantum mechanics to implement message blinding, delegation, signature and verification. Security analysis proves that our scheme has the properties of undeniability, unforgeability, anonymity and can resist some common attacks.

  8. A group signature scheme based on quantum teleportation

    International Nuclear Information System (INIS)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu

    2010-01-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  9. A group signature scheme based on quantum teleportation

    Energy Technology Data Exchange (ETDEWEB)

    Wen Xiaojun; Tian Yuan; Ji Liping; Niu Xiamu, E-mail: wxjun36@gmail.co [Information Countermeasure Technique Research Institute, Harbin Institute of Technology, Harbin 150001 (China)

    2010-05-01

    In this paper, we present a group signature scheme using quantum teleportation. Different from classical group signature and current quantum signature schemes, which could only deliver either group signature or unconditional security, our scheme guarantees both by adopting quantum key preparation, quantum encryption algorithm and quantum teleportation. Security analysis proved that our scheme has the characteristics of group signature, non-counterfeit, non-disavowal, blindness and traceability. Our quantum group signature scheme has a foreseeable application in the e-payment system, e-government, e-business, etc.

  10. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  11. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  12. Scheme-Independent Predictions in QCD: Commensurate Scale Relations and Physical Renormalization Schemes

    International Nuclear Information System (INIS)

    Brodsky, Stanley J.

    1998-01-01

    Commensurate scale relations are perturbative QCD predictions which relate observable to observable at fixed relative scale, such as the ''generalized Crewther relation'', which connects the Bjorken and Gross-Llewellyn Smith deep inelastic scattering sum rules to measurements of the e + e - annihilation cross section. All non-conformal effects are absorbed by fixing the ratio of the respective momentum transfer and energy scales. In the case of fixed-point theories, commensurate scale relations relate both the ratio of couplings and the ratio of scales as the fixed point is approached. The relations between the observables are independent of the choice of intermediate renormalization scheme or other theoretical conventions. Commensurate scale relations also provide an extension of the standard minimal subtraction scheme, which is analytic in the quark masses, has non-ambiguous scale-setting properties, and inherits the physical properties of the effective charge α V (Q 2 ) defined from the heavy quark potential. The application of the analytic scheme to the calculation of quark-mass-dependent QCD corrections to the Z width is also reviewed

  13. Quantum attack-resistent certificateless multi-receiver signcryption scheme.

    Directory of Open Access Journals (Sweden)

    Huixian Li

    Full Text Available The existing certificateless signcryption schemes were designed mainly based on the traditional public key cryptography, in which the security relies on the hard problems, such as factor decomposition and discrete logarithm. However, these problems will be easily solved by the quantum computing. So the existing certificateless signcryption schemes are vulnerable to the quantum attack. Multivariate public key cryptography (MPKC, which can resist the quantum attack, is one of the alternative solutions to guarantee the security of communications in the post-quantum age. Motivated by these concerns, we proposed a new construction of the certificateless multi-receiver signcryption scheme (CLMSC based on MPKC. The new scheme inherits the security of MPKC, which can withstand the quantum attack. Multivariate quadratic polynomial operations, which have lower computation complexity than bilinear pairing operations, are employed in signcrypting a message for a certain number of receivers in our scheme. Security analysis shows that our scheme is a secure MPKC-based scheme. We proved its security under the hardness of the Multivariate Quadratic (MQ problem and its unforgeability under the Isomorphism of Polynomials (IP assumption in the random oracle model. The analysis results show that our scheme also has the security properties of non-repudiation, perfect forward secrecy, perfect backward secrecy and public verifiability. Compared with the existing schemes in terms of computation complexity and ciphertext length, our scheme is more efficient, which makes it suitable for terminals with low computation capacity like smart cards.

  14. EM Simulation Accuracy Enhancement for Broadband Modeling of On-Wafer Passive Components

    DEFF Research Database (Denmark)

    Johansen, Tom Keinicke; Jiang, Chenhui; Hadziabdic, Dzenan

    2007-01-01

    This paper describes methods for accuracy enhancement in broadband modeling of on-wafer passive components using electromagnetic (EM) simulation. It is shown that standard excitation schemes for integrated component simulation leads to poor correlation with on-wafer measurements beyond the lower...... GHz frequency range. We show that this is due to parasitic effects and higher-order modes caused by the excitation schemes. We propose a simple equivalent circuit for the parasitic effects in the well-known ground ring excitation scheme. An extended L-2L calibration method is shown to improve...

  15. Birkhoffian Symplectic Scheme for a Quantum System

    International Nuclear Information System (INIS)

    Su Hongling

    2010-01-01

    In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)

  16. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  17. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  18. Time-and-ID-Based Proxy Reencryption Scheme

    Directory of Open Access Journals (Sweden)

    Kambombo Mtonga

    2014-01-01

    Full Text Available Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE. We prove that our scheme is semantically secure in the standard model.

  19. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  20. Theoretical scheme of thermal-light many-ghost imaging by Nth-order intensity correlation

    International Nuclear Information System (INIS)

    Liu Yingchuan; Kuang Leman

    2011-01-01

    In this paper, we propose a theoretical scheme of many-ghost imaging in terms of Nth-order correlated thermal light. We obtain the Gaussian thin lens equations in the many-ghost imaging protocol. We show that it is possible to produce N-1 ghost images of an object at different places in a nonlocal fashion by means of a higher order correlated imaging process with an Nth-order correlated thermal source and correlation measurements. We investigate the visibility of the ghost images in the scheme and obtain the upper bounds of the visibility for the Nth-order correlated thermal-light ghost imaging. It is found that the visibility of the ghost images can be dramatically enhanced when the order of correlation becomes larger. It is pointed out that the many-ghost imaging phenomenon is an observable physical effect induced by higher order coherence or higher order correlations of optical fields.

  1. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Kai-Wen Hu

    2008-04-01

    Full Text Available With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  2. A Mobility-Aware Link Enhancement Mechanism for Vehicular Ad Hoc Networks

    Directory of Open Access Journals (Sweden)

    Huang Chenn-Jung

    2008-01-01

    Full Text Available Abstract With the growth up of internet in mobile commerce, researchers have reproduced various mobile applications that vary from entertainment and commercial services to diagnostic and safety tools. Mobility management has widely been recognized as one of the most challenging problems for seamless access to wireless networks. In this paper, a novel link enhancement mechanism is proposed to deal with mobility management problem in vehicular ad hoc networks. Two machine learning techniques, namely, particle swarm optimization and fuzzy logic systems, are incorporated into the proposed schemes to enhance the accuracy of prediction of link break and congestion occurrence. The experimental results verify the effectiveness and feasibility of the proposed schemes.

  3. A New Adaptive Hungarian Mating Scheme in Genetic Algorithms

    Directory of Open Access Journals (Sweden)

    Chanju Jung

    2016-01-01

    Full Text Available In genetic algorithms, selection or mating scheme is one of the important operations. In this paper, we suggest an adaptive mating scheme using previously suggested Hungarian mating schemes. Hungarian mating schemes consist of maximizing the sum of mating distances, minimizing the sum, and random matching. We propose an algorithm to elect one of these Hungarian mating schemes. Every mated pair of solutions has to vote for the next generation mating scheme. The distance between parents and the distance between parent and offspring are considered when they vote. Well-known combinatorial optimization problems, the traveling salesperson problem, and the graph bisection problem are used for the test bed of our method. Our adaptive strategy showed better results than not only pure and previous hybrid schemes but also existing distance-based mating schemes.

  4. QoE Guarantee Scheme Based on Cooperative Cognitive Cloud and Opportunistic Weight Particle Swarm

    Directory of Open Access Journals (Sweden)

    Weihang Shi

    2015-01-01

    Full Text Available It is well known that the Internet application of cloud services may be affected by the inefficiency of cloud computing and inaccurate evaluation of quality of experience (QoE seriously. In our paper, based on construction algorithms of cooperative cognitive cloud platform and optimization algorithm of opportunities weight particle swarm clustering, the QoE guarantee mechanism was proposed. The mechanism, through the sending users of requests and the cognitive neighbor users’ cooperation, combined the cooperation of subcloud platforms and constructed the optimal cloud platform with the different service. At the same time, the particle swarm optimization algorithm could be enhanced dynamically according to all kinds of opportunity request weight, which could optimize the cooperative cognitive cloud platform. Finally, the QoE guarantee scheme was proposed with the opportunity weight particle swarm optimization algorithm and collaborative cognitive cloud platform. The experimental results show that the proposed mechanism compared is superior to the QoE guarantee scheme based on cooperative cloud and QoE guarantee scheme based on particle swarm optimization, compared with optimization fitness and high cloud computing service execution efficiency and high throughput performance advantages.

  5. Quantum Communication Scheme Using Non-symmetric Quantum Channel

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Zhonghua; Song Heshan

    2008-01-01

    A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel

  6. A universal encoding scheme for MIMO transmission using a single active element for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama; Papadias, C.B.; Kalis, A.

    2009-01-01

    A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO sys...

  7. Natural Resource Management Schemes as Entry Points for Integrated Landscape Approaches: Evidence from Ghana and Burkina Faso.

    Science.gov (United States)

    Foli, Samson; Ros-Tonen, Mirjam A F; Reed, James; Sunderland, Terry

    2017-04-20

    In recognition of the failures of sectoral approaches to overcome global challenges of biodiversity loss, climate change, food insecurity and poverty, scientific discourse on biodiversity conservation and sustainable development is shifting towards integrated landscape governance arrangements. Current landscape initiatives however very much depend on external actors and funding, raising the question of whether, and how, and under what conditions, locally embedded resource management schemes can serve as entry points for the implementation of integrated landscape approaches. This paper assesses the entry point potential for three established natural resource management schemes in West Africa that target landscape degradation with involvement of local communities: the Chantier d'Aménagement Forestier scheme encompassing forest management sites across Burkina Faso and the Modified Taungya System and community wildlife resource management initiatives in Ghana. Based on a review of the current literature, we analyze the extent to which design principles that define a landscape approach apply to these schemes. We found that the CREMA meets most of the desired criteria, but that its scale may be too limited to guarantee effective landscape governance, hence requiring upscaling. Conversely, the other two initiatives are strongly lacking in their design principles on fundamental components regarding integrated approaches, continual learning, and capacity building. Monitoring and evaluation bodies and participatory learning and negotiation platforms could enhance the schemes' alignment with integrated landscape approaches.

  8. Exclusive J/ψ and Υ hadroproduction and the QCD odderon

    International Nuclear Information System (INIS)

    Bzdak, A.; Cudell, J.R.

    2007-02-01

    We study pp and p anti p collisions which lead to the exclusive production of J/ψ or Υ from the pomeron.odderon and the pomeron.photon fusion. We calculate scattering amplitudes of these processes in the lowest order approximation and in the framework of k perpendicular to -factorization. We present estimates of cross sections for the kinematic conditions of the Tevatron and of the LHC. (orig.)

  9. Dynamical realization of breaking of exchanged degeneracy and violation of Zweig's rule

    International Nuclear Information System (INIS)

    Pinsky, S.S.; Snider, D.R.

    1975-08-01

    A multiperipheral model that implements part of the Veneziano topological expansion and in which the cylinder correction breaks exchange degeneracy and produces Zweig's rule violation as well as a Pomeron above one is presented. In the negative charge conjugation channel the model is identical to the 0 meson model of Freund and Nambu if continued to a spin one pole on the daughter of the Pomeron

  10. Diffraction theory in QCD and beyond

    International Nuclear Information System (INIS)

    White, A.R.

    1987-01-01

    A study of the Pomeron in QCD is briefly outlined. Implications for the production of W + W - and Z 0 Z 0 pairs are described and the possibility that the electroweak scale is a major strong-interaction threshold discussed. The application of Pomeron phase-transition theory to SU(5) dynamical symmetry breaking is suggested and the related ''strong-interaction'' properties of the photon briefly mentioned

  11. TVD schemes in one and two space dimensions

    International Nuclear Information System (INIS)

    Leveque, R.J.; Goodman, J.B.; New York Univ., NY)

    1985-01-01

    The recent development of schemes which are second order accurate in smooth regions has made it possible to overcome certain difficulties which used to arise in numerical computations of discontinuous solutions of conservation laws. The present investigation is concerned with scalar conservation laws, taking into account the employment of total variation diminishing (TVD) schemes. The concept of a TVD scheme was introduced by Harten et al. (1976). Harten et al. first constructed schemes which are simultaneously TVD and second order accurate on smooth solutions. In the present paper, a summary is provided of recently conducted work in this area. Attention is given to TVD schemes in two space dimensions, a second order accurate TVD scheme in one dimension, and the entropy condition and spreading of rarefaction waves. 19 references

  12. Schemes for fibre-based entanglement generation in the telecom band

    International Nuclear Information System (INIS)

    Chen, Jun; Lee, Kim Fook; Li Xiaoying; Voss, Paul L; Kumar, Prem

    2007-01-01

    We investigate schemes for generating polarization-entangled photon pairs in standard optical fibres. The advantages of a double-loop scheme are explored through comparison with two other schemes, namely, the Sagnac-loop scheme and the counter-propagating scheme. Experimental measurements with the double-loop scheme verify the predicted advantages

  13. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  14. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  15. Experimental research of UWB over fiber system employing 128-QAM and ISFA-optimized scheme

    Science.gov (United States)

    He, Jing; Xiang, Changqing; Long, Fengting; Chen, Zuo

    2018-05-01

    In this paper, an optimized intra-symbol frequency-domain averaging (ISFA) scheme is proposed and experimentally demonstrated in intensity-modulation and direct-detection (IMDD) multiband orthogonal frequency division multiplexing (MB-OFDM) ultra-wideband over fiber (UWBoF) system. According to the channel responses of three MB-OFDM UWB sub-bands, the optimal ISFA window size for each sub-band is investigated. After 60-km standard single mode fiber (SSMF) transmission, the experimental results show that, at the bit error rate (BER) of 3.8 × 10-3, the receiver sensitivity of 128-quadrature amplitude modulation (QAM) can be improved by 1.9 dB using the proposed enhanced ISFA combined with training sequence (TS)-based channel estimation scheme, compared with the conventional TS-based channel estimation. Moreover, the spectral efficiency (SE) is up to 5.39 bit/s/Hz.

  16. Persistent RCSMA: A MAC Protocol for a Distributed Cooperative ARQ Scheme in Wireless Networks

    Directory of Open Access Journals (Sweden)

    J. Alonso-Zárate

    2008-05-01

    Full Text Available The persistent relay carrier sensing multiple access (PRCSMA protocol is presented in this paper as a novel medium access control (MAC protocol that allows for the execution of a distributed cooperative automatic retransmission request (ARQ scheme in IEEE 802.11 wireless networks. The underlying idea of the PRCSMA protocol is to modify the basic rules of the IEEE 802.11 MAC protocol to execute a distributed cooperative ARQ scheme in wireless networks in order to enhance their performance and to extend coverage. A closed formulation of the distributed cooperative ARQ average packet transmission delay in a saturated network is derived in the paper. The analytical equations are then used to evaluate the performance of the protocol under different network configurations. Both the accuracy of the analysis and the performance evaluation of the protocol are supported and validated through computer simulations.

  17. Optimization of the sampling scheme for maps of physical and chemical properties estimated by kriging

    Directory of Open Access Journals (Sweden)

    Gener Tadeu Pereira

    2013-10-01

    Full Text Available The sampling scheme is essential in the investigation of the spatial variability of soil properties in Soil Science studies. The high costs of sampling schemes optimized with additional sampling points for each physical and chemical soil property, prevent their use in precision agriculture. The purpose of this study was to obtain an optimal sampling scheme for physical and chemical property sets and investigate its effect on the quality of soil sampling. Soil was sampled on a 42-ha area, with 206 geo-referenced points arranged in a regular grid spaced 50 m from each other, in a depth range of 0.00-0.20 m. In order to obtain an optimal sampling scheme for every physical and chemical property, a sample grid, a medium-scale variogram and the extended Spatial Simulated Annealing (SSA method were used to minimize kriging variance. The optimization procedure was validated by constructing maps of relative improvement comparing the sample configuration before and after the process. A greater concentration of recommended points in specific areas (NW-SE direction was observed, which also reflects a greater estimate variance at these locations. The addition of optimal samples, for specific regions, increased the accuracy up to 2 % for chemical and 1 % for physical properties. The use of a sample grid and medium-scale variogram, as previous information for the conception of additional sampling schemes, was very promising to determine the locations of these additional points for all physical and chemical soil properties, enhancing the accuracy of kriging estimates of the physical-chemical properties.

  18. Computing with high-resolution upwind schemes for hyperbolic equations

    International Nuclear Information System (INIS)

    Chakravarthy, S.R.; Osher, S.; California Univ., Los Angeles)

    1985-01-01

    Computational aspects of modern high-resolution upwind finite-difference schemes for hyperbolic systems of conservation laws are examined. An operational unification is demonstrated for constructing a wide class of flux-difference-split and flux-split schemes based on the design principles underlying total variation diminishing (TVD) schemes. Consideration is also given to TVD scheme design by preprocessing, the extension of preprocessing and postprocessing approaches to general control volumes, the removal of expansion shocks and glitches, relaxation methods for implicit TVD schemes, and a new family of high-accuracy TVD schemes. 21 references

  19. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  20. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)