WorldWideScience

Sample records for enhanced pomeron scheme

  1. Rapidity gap survival in enhanced Pomeron scheme

    Energy Technology Data Exchange (ETDEWEB)

    Ostapchenko, Sergey [Frankfurt Institute for Advanced Studies, Frankfurt am Main (Germany); Moscow State University, D.V. Skobeltsyn Institute of Nuclear Physics, Moscow (Russian Federation); Bleicher, Marcus [Frankfurt Institute for Advanced Studies, Frankfurt am Main (Germany); Goethe-Universitat, Institute for Theoretical Physics, Frankfurt am Main (Germany)

    2018-01-15

    We apply the phenomenological Reggeon field theory framework to investigate rapidity gap survival (RGS) probability for diffractive dijet production in proton-proton collisions. In particular, we study in some detail rapidity gap suppression due to elastic rescatterings of intermediate partons in the underlying parton cascades, described by enhanced (Pomeron-Pomeron interaction) diagrams. We demonstrate that such contributions play a subdominant role, compared to the usual, so-called ''eikonal'', rapidity gap suppression due to elastic rescatterings of constituent partons of the colliding protons. On the other hand, the overall RGS factor proves to be sensitive to color fluctuations in the proton. Hence, experimental data on diffractive dijet production can be used to constrain the respective model approaches. (orig.)

  2. Reggeon, Pomeron and annihilation processes in the dual unitarization scheme

    International Nuclear Information System (INIS)

    Dias de Deus, J.

    1976-07-01

    In the framework of the dual unitarization scheme the connection between particle production in processes dominated by Reggeon, Pomeron and Annihilation diagrams is discussed and critical tests of the scheme are suggested. The simple relation for average multiplicities anti nsup(R) = 1/2 anti nsup(P) = 1/3 anti nsup(A) and other relations for inclusive cross-sections and higher moments of the particle distribution are shown to be in reasonable agreement with data. (author)

  3. Pomeron physics

    International Nuclear Information System (INIS)

    Fujisaki, H.

    1986-01-01

    Our discussion is primarily confined to the asymptopia. From the phenomenological point of view, diffraction at presently available high energies can be reasonably well described in terms of the bare simplepole pomeron with the intercept at t=O slightly above unity. From the theoretical point of view, however, the self-consistent explanation of diffraction at the asymptopia inevitably necessitates the clothed physical pomeron with the unit intercept at t=O. The bare pomeron is built up from the normal reggeon through dual topological unitarization. Comparitively, the clothed physical pomeron is generated by multidiffractive unitarization of the bare pomeron. The clothed pomeron is often referred to as the geometrical pomeron (GP). The GP is universal in the sense that the asymptotic behaviour of the clothed pomeron is independent of the fine details of dynamics building up and unitarizing the bare pomeron. All unusual features of the physical pomeron are commonly inherent in universality of the GP which plays the role of the most typical guiding principle in pomeron physics. If the GP parmeterization is continued in t to beyond the lowest threshold, however, t-channel unitarity is seriously violated because of the hard branching nature. It is then of importance to investigate whether or not the GP universality is self-consistently guaranteed not only from the s-channel point of view but also from the t-channel point of view, and how the universal GP dynamically affects normal reggeons through the repeated pomeron exchange. Solutions to these key questions are summarized after geometrodynamical parts of a series of our works on pomeron physics is discussed

  4. The flavoring of the pomeron

    International Nuclear Information System (INIS)

    Dash, J.W.; Manesis, E.K.

    1977-03-01

    A theoretical review and a detailed phenomenological description of the 'flavoring' of the bare Pomeron pole at t=0 (i.e. the non-diffractive renormalization of its multiperipheral unitarity sum by strange quarks, charmed quarks, diquarks,...) are presented. From an 'unflavored' intercept α=0.85 to a 'flavored' intercept α approximately 1.08, probably close to the bare intercept of the Reggeon Field Theory. NN, πN, and KN total cross sections and real to imaginary amplitude ratios are treated. No oscillations are observed. Particular attention is paid to 2 sigmasub(KN) - sigmasub(πN) which rises monotonically. A closely related combination of inelastic diffraction cross sections is presented which decreases monotonically, indicating that vacuum amplitudes are not simply the sum of a Pomeron pole and an ideally mixed f. In fact it is argued that a Pomeron +f structure is neither compatible with flavoring nor with schemes in which flavoring is somehow absorbed away. In contrast, flavoring is required for consistency with experiment by the Chew-Rosenzweig hypothesis of the Pomeron-f identity. A description of flavoring threshold effects on the Reggeon Field Theory at current energies is presented

  5. Soft and hard pomerons

    International Nuclear Information System (INIS)

    Maor, Uri; Tel Aviv Univ.

    1995-09-01

    The role of s-channel unitarity screening corrections, calculated in the eikonal approximation, is investigated for soft Pomeron exchange responsible for elastic and diffractive hadron scattering in the high energy limit. We examine the differences between our results and those obtained from the supercritical Pomeron-Regge model with no such corrections. It is shown that screening saturation is attained at different scales for different channels. We then proceed to discuss the new HERA data on hard (PQCD) Pomeron diffractive channels and discuss the relationship between the soft and hard Pomerons and the relevance of our analysis to this problem. (author). 18 refs, 9 figs, 1 tab

  6. Introduction to the pomerons

    International Nuclear Information System (INIS)

    Kwiecinski, J.

    1996-11-01

    Elements of the pomerons phenomenology within the Regge pole exchange picture are recalled. This includes discussion of the high energy behaviour of total cross-sections, the triple pomerons limit of the diffractive dissociation and the single particle distribution in the central region. The BFKL pomerons and QCD expectation for the small x behaviour of the deep inelastic scattering structure functions are discussed. The detailed measurements of the the hadronic final state in deep inelastic scattering at small x probing the QCD pomerons are described. The deep inelastic diffraction is also discussed. (author). 69 refs

  7. Hadronic total cross sections: which pomeron do they prefer

    International Nuclear Information System (INIS)

    Kobylinsky, N.A.; Kosenko, A.I.; Martynov, E.S.; Timokhin, V.V.

    1985-01-01

    All data on nucleon-nucleon and meson-nucleon total cross sections are analyzed in a scheme with varying pomeron shape and standard form of secondary reggeons. Two solutions are found which result in essentially different asymptotic behaviour, but describe equally well the data at energies attained. Two theoretical possibilities for the pomeron are discussed: the dipole and the froissaron

  8. Confinement and the Pomeron

    International Nuclear Information System (INIS)

    White, A.R.

    1989-01-01

    The importance of confinement for obtaining a unitary high-energy limit for QCD is discussed. ''Minijets'' are argued to build up non-unitary behavior endash when k T > Λ is imposed. For minijets to mix with low k T Pomeron Field Theory describing confinement, and give consistent asymptotic behavior, new ''quarks'' must enter the theory above the minijet transverse momentum scale. The Critical Pomeron is the resulting high-energy limit. 22 refs

  9. Probing the Pomeron

    International Nuclear Information System (INIS)

    Albrow, M.; Donnachie, A.; Geist, W.; Landshoff, P.; Schlein, P.

    1986-01-01

    The authors present the results from experiments on elastic pp scattering at s=52.8 GeV and panti p scattering at s=52.6 GeV and s=546 GeV. All results show a dip in the differential cross section which is interpreted as resulting from Pomerons. (HSI).

  10. The Phenomenological Pomeron. What is it?

    International Nuclear Information System (INIS)

    Donnachie, A.

    1994-01-01

    The standard phenomenology of the soft pomeron is recalled. The evidence for the soft pomeron having a well-defined Parton content is outlined. The role of the pomeron in deep inelastic scattering at small x is discussed, and it is suggested that the standard phenomenology is incompatible with the HERA data. It is shown how minijets can be included naturally as part of the soft pomeron, and that they do not contribute separately to total cross sections

  11. Soft Pomeron in Holographic QCD

    CERN Document Server

    Ballon-Bayona, Alfonso; Costa, Miguel S; Djurić, Marko

    2016-01-01

    We study the graviton Regge trajectory in Holographic QCD as a model for high energy scattering processes dominated by soft pomeron exchange. This is done by considering spin J fields from the closed string sector that are dual to glueball states of even spin and parity. In particular, we construct a model that governs the analytic continuation of the spin J field equation to the region of real J < 2, which includes the scattering domain of negative Maldelstam variable t. The model leads to approximately linear Regge trajectories and is compatible with the measured values of 1.08 for the intercept and 0.25 GeV$^{-2}$ for the slope of the soft pomeron. The intercept of the secondary pomeron trajectory is in the same region of the subleading trajectories, made of mesons, proposed by Donnachie and Landshoff, and should therefore be taken into account.

  12. The supercritical pomeron in QCD

    International Nuclear Information System (INIS)

    White, A. R.

    1998-01-01

    Deep-inelastic diffractive scaling violations have provided fundamental insight into the QCD pomeron, suggesting a single gluon inner structure rather than that of a perturbative two-gluon bound state. This talk outlines a derivation of a high-energy, transverse momentum cut-off, confining solution of QCD. The pomeron, in first approximation, is a single reggeized gluon plus a ''wee parton'' component that compensates for the color and particle properties of the gluon. This solution corresponds to a super-critical phase of Reggeon Field Theory

  13. The soft pomeron and HERA

    International Nuclear Information System (INIS)

    Donnachie, A.; Landshoff, P.V.

    1996-01-01

    The standard phenomenology of the soft pomeron in hadron-hadron interactions is recalled briefly. The model is confronted with the HERA data for the total photoproduction cross section, deep inelastic scattering, diffractive vector meson photoproduction and diffractive electroproduction of vector mesons. Although much of the data can be explained by the model, there are some aspects of the HERA data which require a more rapid variation with energy than can be incorporated. It is argued that the perturbative (BFKL) pomeron cannot give a sufficiently large contribution to explain these observations. Possible non-perturbative solutions to this problem are indicated. (author)

  14. The soft pomeron and HERA

    International Nuclear Information System (INIS)

    Donnachie, A.; Landshoff, P.V.

    1996-01-01

    The standard phenomenology of the soft pomeron in hadron-hadron interactions is recalled briefly. The model is confronted with the HERA data for the total photoproduction cross section, deep inelastic scattering, diffractive vector meson photoproduction and diffractive electroproduction of vector mesons. Although much of the data can be explained by the model, there are some aspects of the HERA data which require a more rapid variation with energy than can be incorporated. It is argued that the perturbative (BFKL) pomeron cannot give a sufficiently large contribution to explain these observations. Possible nonperturbative solutions to this problem are indicated. (author)

  15. Color, flavor, duality, and the Pomeron

    International Nuclear Information System (INIS)

    Dash, J.W.

    1980-01-01

    At Nsub(c)/Nsub(f) = infinitely such that quark loops are absent the Harari-Freund (HF) P+f model of diffraction can be motivated through the identification Pomeron approx. glueball, f approx. leading planar trajectory. At Nsub(c) = 3, the presence of confinement-related mass scales introduced by quark loops is a basic complication that can easily change this situation to, e.g. a dominant P - f identity structure. Aurenche and Gonzales Mestres (AGM) have argued that diffraction is essentially identical at Nsub(c)/Nsub(f) = infinitely and at Nsub(c) = 3. They further claim to have generated the HF scheme directly at Nsub(c) = 3 through the novel mechanism of a multiperipheral iteration of daughters that becomes the P. We respond to these arguments. We give a general qualitative discussion of changes expected in the Nsub(c)/Nsub(f) = infinitely to Nsub(c) = 3 transition. Important hadron scattering quantities like particle multiplicities are very different in dynamics dominated by glue and at Nsub(c) = 3, unlike other quantities like resonance width to mass ratio. We argue that the weak coupling disal model is not a reliable guide to Nsub(c) = 3 dynamics. We criticize AGM's 'daughter generated Pomeron' and we close with a brief summary of other attempts to generate the P + f model. (orig./HSI)

  16. A Traffic Restriction Scheme for Enhancing Carpooling

    Directory of Open Access Journals (Sweden)

    Dong Ding

    2017-01-01

    Full Text Available For the purpose of alleviating traffic congestion, this paper proposes a scheme to encourage travelers to carpool by traffic restriction. By a variational inequity we describe travelers’ mode (solo driving and carpooling and route choice under user equilibrium principle in the context of fixed demand and detect the performance of a simple network with various restriction links, restriction proportions, and carpooling costs. Then the optimal traffic restriction scheme aiming at minimal total travel cost is designed through a bilevel program and applied to a Sioux Fall network example with genetic algorithm. According to various requirements, optimal restriction regions and proportions for restricted automobiles are captured. From the results it is found that traffic restriction scheme is possible to enhance carpooling and alleviate congestion. However, higher carpooling demand is not always helpful to the whole network. The topology of network, OD demand, and carpooling cost are included in the factors influencing the performance of the traffic system.

  17. The soft pomeron and QCD

    International Nuclear Information System (INIS)

    Donnachie, A.

    1996-01-01

    The standard phenomenology of the soft pomeron in hadron-hadron interactions is recalled briefly. The model is confronted with the HERA data for the total photoproduction cross section, deep inelastic scattering, diffractive vector meson photoproduction and diffractive electroproduction of vector mesons. The standard phenomenology is incompatible with some aspects of the HERA data which require a more rapid variation with energy than can be incorporated. Possible solutions to this problem are indicated. (author)

  18. Preasymptotical corrections to the pomeron exchange

    International Nuclear Information System (INIS)

    Volkovitskij, P.E.

    1985-01-01

    IN the frame of quark-gluon model for strong interactions, based on the topological expansion and string model, the planar diagrams are connected with Regge poles and the cylinder diagrams correspond to the pomeron. In earlier works it was shown that in this approach strong exchange degeneracy has to take place. This fact in the case of the pomeron with intercept αsub(D)(O)>1 is in disagreement with experiment. In the present paper the preasymptotical corrections to the pomeron exchange are calculated. It is shown that these corrections remove the dissagreement

  19. Summing pomeron loops in the dipole approach

    International Nuclear Information System (INIS)

    Levin, E.; Miller, J.; Prygarin, A.

    2008-01-01

    In this paper, we argue that in the kinematic range given by 1 S 2 ) S Y S ) , we can reduce the pomeron calculus to the exchange of non-interacting pomerons, with the renormalised amplitude of their interaction with the target. Therefore, the summation of the pomeron loops can be performed using the improved Mueller, Patel, Salam and Iancu approximation, and this leads to the geometrical scaling solution. This solution, is found for the simplified BFKL kernel. We reproduce the findings of Hatta and Mueller, that there are overlapping singularities. We suggest a way of dealing with these singularities

  20. Soft pomeron and lower-trajectory intercepts

    International Nuclear Information System (INIS)

    Cudell, J.R.; Kang, K.

    1999-01-01

    We present a preliminary report on the determination of the intercepts and couplings of the soft pomeron and of the p/ω and f/a trajectories from the largest data set available for all total cross sections and real parts of the hadronic amplitudes. Factorization is reasonably satisfied by the pomeron couplings, which allows us to make predictions on γγ and γp total cross sections. In addition we show that these data cannot discriminate between fits based on a simple Regge pomeron-pole and on an asymptotic log 2 s-type behaviour, implying that the effect of unitarization is negligible. Also we examine the range of validity in energy of the fit, and the bounds that these data lace on the odderon and on the hard pomeron. (author)

  1. Pomeron-Quark Coupling from Charge Conjugation Invariance

    International Nuclear Information System (INIS)

    Zhou Lijuan; Wu Qing; Ma Weixing; Gu Yunting

    2006-01-01

    Based on the charge conjugation invariance and the vacuum property of the Pomeron, we point out that the commonly used vector vertex of the Pomeron coupling to quark is incorrect since it contradicts with the Pomeron property. We also claim that the soft Pomeron could be a tensor glueball ξ(2230) with quantum numbers I G J PC = 0 + 2 ++ and total decay width Γ tot ≅100 MeV, which lies on the soft Pomeron trajectory α p = 1.08+0.20t. Therefore, the coupling vertex of the soft Pomeron to quark should be tensorial which is invariant under the charge conjugation and can explain why the inadequate vector coupling, γ μ , of the soft Pomeron to quark is successful in dealing with Pomeron physics.

  2. Geometrical scaling and the real part of the Pomeron

    International Nuclear Information System (INIS)

    Dias de Deus, J.

    1975-07-01

    Consequences of the hypothesis of geometrical scaling of the inelastic overlap function applied to the Pomeron amplitude are discussed. From analiticity and crossing symmetry some predictions are given for the asymptotic real part of the Pomeron. (author)

  3. Pomeron fusion and central η and η' meson production

    International Nuclear Information System (INIS)

    Kochelev, N.I.; Morii, T.; Vinnikov, A.V.

    1999-01-01

    The contribution of pomeron fusion to the cross section of η and η ' productions in double-diffractive scattering has been calculated within the Donnachie-Landshoff model of pomeron. It is shown that the double pomeron exchange mechanism does not explain the full set of the recent data of WA102 Collaboration, though it might not be inconsistent with η ' productions

  4. Four-pomeron couplings in cut reggeon field theory

    International Nuclear Information System (INIS)

    Grassberger, P.

    1980-01-01

    Four-pomeron cutting rules are studied in cut reggeon field theory (CRFT). Without any microscopic model, CRFT allows for three different 4-pomeron couplings. Demanding that CRFT is interpretable as a Markov process, only one of these couplings remains. The cutting rules for the 4-pomeron vertex thus become unique, disagreeing with those found in weak coupling diameter 3 theory. (orig.)

  5. Hadron Spectroscopy in Double Pomeron Exchange Experiments

    Energy Technology Data Exchange (ETDEWEB)

    Albrow, Michael [Fermilab

    2016-11-15

    Central exclusive production in hadron-hadron collisions at high energies, for example p + p -> p + X + p, where the "+" represents a large rapidity gap, is a valuable process for spectroscopy of mesonic states X. At collider energies the gaps can be large enough to be dominated by pomeron exchange, and then the quantum numbers of the state X are restricted. Isoscalar JPC = 0++ and 2++ mesons are selected, and our understanding of these spectra is incomplete. In particular, soft pomeron exchanges favor gluon-dominated states such as glueballs, which are expected in QCD but not yet well established. I will review some published data.

  6. Diffusion corrections to the hard pomeron

    CERN Document Server

    Ciafaloni, Marcello; Müller, A H; Ciafaloni, Marcello; Taiuti, Martina

    2001-01-01

    The high-energy behaviour of two-scale hard processes is investigated in the framework of small-x models with running coupling, having the Airy diffusion model as prototype. We show that, in some intermediate high-energy regime, the perturbative hard Pomeron exponent determines the energy dependence, and we prove that diffusion corrections have the form hinted at before in particular cases. We also discuss the breakdown of such regime at very large energies, and the onset of the non-perturbative Pomeron behaviour.

  7. The relation between the pomeron intercept and the triple-pomeron coupling

    International Nuclear Information System (INIS)

    Kopeliovich, B.Z.; Lapidus, L.I.

    1978-01-01

    It is shown in the parton model (PM) that the pomeron intercept αsub(P)(0)=1 + Δ and the triple-pomeron coupling lambda are strongly correlated: Δ = lambda. For this reason the critical behaviour in the reggeon field theory is impossible. In the supercritical case PM allows one to distinguish between the conditions of validity of the Amati and Cardy approaches

  8. Pomeron calculus in zero transverse dimensions: Summation of pomeron loops and generating functional for multiparticle production processes

    International Nuclear Information System (INIS)

    Levin, E.; Prygarin, A.

    2008-01-01

    In this paper we address two problems in pomeron calculus in zero transverse dimensions: the summation of the pomeron loops and the calculation of the processes of multiparticle generation. We introduce a new generating functional for these processes and obtain the evolution equation for it. We argue that in the kinematic range given by 1 2 ) S Y S ), we can reduce the pomeron calculus to the exchange of non-interacting pomerons with the renormalized amplitude of their interaction with the target. Therefore, the summation of the pomeron loops can be performed using the Mueller-Patel-Salam-Iancu approximation. (orig.)

  9. Flavor and baryon quantum numbers and their nondiffractive renormalizations of the Pomeron

    International Nuclear Information System (INIS)

    Dash, J.W.; Jones, S.T.; Manesis, E.K.

    1978-01-01

    We present a theoretical review and a detailed phonomenological description of the ''flavoring'' of the bare Pomeron pole at t = 0 (i.e., the nondiffractive renormalization of its multiperipheral unitarity sum by strange quarks, charmed quarks, diquarks,...) from an ''unflavored'' intercept alpha-circumflex = 0.85 to a ''flavored'' intercept α approx. = 1.08. Experimentally, flavoring effects seem to converge rapidly; hence this number is probably close to the bare intercept of the Reggeon field theory. We treat NN, πN, and KN total cross sections and real to imaginary amplitude ratios. We do not observe oscillations. We pay particular attention to 2sigma/sub K/N - sigma/sub piN/ which rises monotonically. We present a closely related combination of inelastic diffraction cross sections which decreases monotonically, indicating that vacuum amplitudes are not simply the sum of a Pomeron pole and an ideally mixed f. In fact we argue that a Pomeron + f structure is neither compatible with flavoring nor with schemes in which flavoring is somehow absorbed away. In contrast, flavoring is required for consistency with experiment by the Chew-Rosenzweig hypothesis of the Pomeron-f identity. We close with a description of flavoring threshold effects on the Reggeon field theory at current energies

  10. Soft pomerons and the forward LHC data

    Science.gov (United States)

    Broilo, M.; Luna, E. G. S.; Menon, M. J.

    2018-06-01

    Recent data from LHC13 by the TOTEM Collaboration on σtot and ρ have indicated disagreement with all the Pomeron model predictions by the COMPETE Collaboration (2002). On the other hand, as recently demonstrated by Martynov and Nicolescu (MN), the new σtot datum and the unexpected decrease in the ρ value are well described by the maximal Odderon dominance at the highest energies. Here, we discuss the applicability of Pomeron dominance through fits to the most complete set of forward data from pp and p bar p scattering. We consider an analytic parameterization for σtot (s) consisting of non-degenerated Regge trajectories for even and odd amplitudes (as in the MN analysis) and two Pomeron components associated with double and triple poles in the complex angular momentum plane. The ρ parameter is analytically determined by means of dispersion relations. We carry out fits to pp and p bar p data on σtot and ρ in the interval 5 GeV-13 TeV (as in the MN analysis). Two novel aspects of our analysis are: (1) the dataset comprises all the accelerator data below 7 TeV and we consider three independent ensembles by adding: either only the TOTEM data (as in the MN analysis), or only the ATLAS data, or both sets; (2) in the data reductions to each ensemble, uncertainty regions are evaluated through error propagation from the fit parameters, with 90% CL. We argument that, within the uncertainties, this analytic model corresponding to soft Pomeron dominance, does not seem to be excluded by the complete set of experimental data presently available.

  11. The hard gluon component of the QCD Pomeron

    International Nuclear Information System (INIS)

    White, A.R.

    1996-01-01

    The authors argue that deep-inelastic diffractive scaling provides fundamental insight into the QCD Pomeron. The logarithmic scaling violations seen experimentally are in conflict with the scale-invariance of the BFKL Pomeron and with phenomenological two-gluon models. Instead the Pomeron appears as a single gluon at short-distances, indicating the appearance of a Super-Critical phase of Reggeon Field Theory. That the color compensation takes place at a longer distance is consistent with the Pomeron carrying odd color charge parity

  12. Intermediate mass distribution of the dual resonance pomeron

    International Nuclear Information System (INIS)

    Chiu, C.B.; Matsuda, S.

    1978-01-01

    The intermediate mass distribution of the dual resonance pomeron is determined at the one-loop level and it is shown that the mass distribution obtained is remarkably similar to a suitably defined mass distribution in the dual multiperipheral model. Thus it is suggestive to identify the intermediate states of the dual resonance pomeron with multiperipheral processes. (Auth.)

  13. Pomeron models and exchange degeneracy of the Regge trajectories

    International Nuclear Information System (INIS)

    Kontros, J.; Kontros, K.; Lengyel, A.

    2000-01-01

    Two models for the Pomeron, supplemented by exchange-degenerate sub-leading Regge trajectories, are fitted to the forward scattering data for a number of reactions. By considering new Pomeron models, we extend the recent results of the COMPAS group, being consistent with our predecessors

  14. One-Particle Inclusive Distribution in the Unitarized Pomeron Models

    CERN Document Server

    Alkin, A; Romanets, E; Pauk, V

    2010-01-01

    It is shown that starting from the pomeron contribution with intercept P (0) > 1 one can obtain in a quasi-eikonal approach inclusive cross section which is similar to contribution of triple pole (at t = 0) pomeron. Generalizing this analogy we consider tripole and dipole pomeron contributions to inclusive cross section. They lead to hni / ln3 s (tripole) or hni / ln2 s (dipole) and describe well the data on charged hadron distributions in ¯pp. Predictions of one particle pt and rapidity distributions for LHC energies are given.

  15. Double Pomeron Exchange from the ISR to the SSC

    International Nuclear Information System (INIS)

    Albrow, M.G.

    1989-01-01

    After a general introduction to Double Pomeron Exchange I show how the existence of the process was demonstrated at the CERN Intersecting Storage Rings and discuss its value there as a spectroscopic tool in meson/glueball studies. At higher collision energies as now available at the Super Proton Synchrotron and Fermilab pp-bar Colliders it would be very interesting to study hard processes in Double Pomeron Exchange and investigate Pomeron structure. The still higher Large Hadron Collider and Superconducting Super Collider energies extend the range of this physics dramatically, possibly into the electroweak sector. (author)

  16. The Pomeron: yesterday, today and tomorrow

    International Nuclear Information System (INIS)

    Levin, E.; Petersburg Nuclear Physics Institute, St Petersburg

    1995-03-01

    These lectures are a review of the main ideas and approaches to the Pomeron structure. They intend to give a brief review of the Reggeon Calculus, which was the first attempt to build the effective theory of the strong interaction at high energy. In spite of the fact that this approach turns out to be inconsistent and in lectures we show why, the Reggeon approach was and is the main source of the terminology and phenomenology for high energy soft interactions. The detail description of the QCD approach to high energy interaction. They try to combine the rigorous approach in perturbative QCD with more simple, intuitive guess based on general properties of QCD to clarify our expectations and predictions. (author). 52 refs, 36 figs, 1 tab

  17. The Pomeron: yesterday, today and tomorrow

    Energy Technology Data Exchange (ETDEWEB)

    Levin, E [Centro Brasileiro de Pesquisas Fisicas (CBPF), Rio de Janeiro, RJ (Brazil); [Petersburg Nuclear Physics Institute, St Petersburg (Russian Federation). Theory Dept.

    1995-03-01

    These lectures are a review of the main ideas and approaches to the Pomeron structure. They intend to give a brief review of the Reggeon Calculus, which was the first attempt to build the effective theory of the strong interaction at high energy. In spite of the fact that this approach turns out to be inconsistent and in lectures we show why, the Reggeon approach was and is the main source of the terminology and phenomenology for high energy soft interactions. The detail description of the QCD approach to high energy interaction. They try to combine the rigorous approach in perturbative QCD with more simple, intuitive guess based on general properties of QCD to clarify our expectations and predictions. (author). 52 refs, 36 figs, 1 tab.

  18. Building up reggeons and the pomeron from duality and unitarity

    International Nuclear Information System (INIS)

    Sakai, N.

    1975-07-01

    The subject is treated under the following headings: duality; unitarity; duality and unitarity; 1/N expansion; Reggeon bootstrap; Pomeron equation; triple Pomeron. The results are summarized: (1) combining duality with unitarity, powerful constraints are obtained; (2) many phenomenological successes have been obtained since some practical methods of calculation were devised; and (3) even the complete unitarization is hopeful; 1/N expansion may be useful for this purpose. (author)

  19. On a possible test of the hard-Pomeron theory

    International Nuclear Information System (INIS)

    Ioffe, B.L.

    1992-01-01

    In the last few years there have been discussions of the fact that the Pomeron-the Regge pole responsible for high-energy scattering-has in reality a double role: a soft Pomeron built of multiperipheral hadron exchange and a hard Pomeron described by gluon exchanges in QCD. Recently, Bjorken emphasized the need to distinguish these two forms of the Pomeron. The question arises of whether it is possible to distinguish the hard and soft Pomeron experimentally. According to the hard-Pomeron concept, the hadron-hadron total cross section is determined by the imaginary part of the forward scattering amplitude corresponding to two-gluon exchange with ladder corrections. This mechanism dominates in the case of scattering of particles built from heavy quarks (a good example is γγ scattering) and also in the case of virtual-particle scattering (for example, virtual photons, where quark pairs must also be included in the ladder). These processes are hard (γ virt γ virt scattering) or impossible (γγ scattering) to observe experimentally. Bjorken suggested another process whose cross section is determined by hard-Pomeron exchange - double diffractional hadron-hadron (e.g., pp) scattering at high energies with jet production in the projectile and target fragmentation regions. If the momentum transfer from the projectile to the target is in the intermediate region, |t|∼1 GeV, and events are selected with a rapidity gap in the rapidity distribution of produced particles between the two fragmentation regions, then, according to Bjorken, a process determined by the hard Pomeron will be observed. The author addresses this proposal

  20. The triple-pomeron regime and structure function of the pomeron in diffractive deep inelastic scattering at very small x

    International Nuclear Information System (INIS)

    Nikolaev, N.N.; Zakharov, B.G.

    1994-01-01

    We develop the novel description of diffractive deep inelastic scattering based on the technique of lightcone wave functions of multiparton Fock states of the photon. The technique takes advantage of the exact diagonalization of the diffractive S-matrix in the dipole-cross section representation. In this paper we derive properties of the diffractive dissociation of virtual photons in the triple-pomeron regime. We demonstrate that the photon-pomeron interactions can be described by the partonic structure function, which satisfies the conventional GLDAP evolution equations. We identify the valence and sea (anti) quark and the valence gluon structure functions of the pomeron. We show how the gluon structure of the pomeron can be described by the constituent gluon wave function. We derive the leading unitarization correction to the rising structure functions at small x and conclude that the unitarized structure function satisfies the linear GLDAP evolution equations. This result holds even when the multipomeron exchanges are included. (orig.)

  1. Reggeon field theory for large Pomeron loops

    Energy Technology Data Exchange (ETDEWEB)

    Altinoluk, Tolga [Departamento de Física de Partículas and IGFAE, Universidade de Santiago de Compostela,E-15782 Santiago de Compostela, Galicia (Spain); Kovner, Alex [Physics Department, University of Connecticut,2152 Hillside road, Storrs, CT 06269 (United States); Levin, Eugene [Departamento de Física, Universidad Técnica Federico Santa María, and Centro Científico-Tecnolgico de Valparaíso,Avda. España 1680, Casilla 110-V, Valparaíso (Chile); Department of Particle Physics, Tel Aviv University,Tel Aviv 69978 (Israel); Lublinsky, Michael [Physics Department, Ben-Gurion University of the Negev,Beer Sheva 84105 (Israel)

    2014-04-10

    We analyze the range of applicability of the high energy Reggeon Field Theory H{sub RFT} derived in http://dx.doi.org/10.1088/1126-6708/2009/03/109. We show that this theory is valid as long as at any intermediate value of rapidity η throughout the evolution at least one of the colliding objects is dilute. Importantly, at some values of η the dilute object could be the projectile, while at others it could be the target, so that H{sub RFT} does not reduce to either H{sub JIMWLK} or H{sub KLWMIJ}. When both objects are dense, corrections to the evolution not accounted for in http://dx.doi.org/10.1088/1126-6708/2009/03/109 become important. The same limitation applies to other approaches to high energy evolution available today, such as for example (http://dx.doi.org/10.1103/PhysRevD.78.054019; http://dx.doi.org/10.1103/PhysRevD.78.054020 and http://dx.doi.org/10.1016/S0370-2693(00)00571-2; http://dx.doi.org/10.1140/epjc/s2003-01565-9; http://dx.doi.org/10.1016/j.physletb.2005.10.054). We also show that, in its regime of applicability H{sub RFT} can be simplified. We derive the simpler version of H{sub RFT} and in the large N{sub c} limit rewrite it in terms of the Reggeon creation and annihilation operators. The resulting H{sub RFT} is explicitly self dual and provides the generalization of the Pomeron calculus developed in (http://dx.doi.org/10.1016/S0370-2693(00)00571-2; http://dx.doi.org/10.1140/epjc/s2003-01565-9; http://dx.doi.org/10.1016/j.physletb.2005.10.054) by including higher Reggeons in the evolution. It is applicable for description of ‘large’ Pomeron loops, namely Reggeon graphs where all the splittings occur close in rapidity to one dilute object (projectile), while all the merging close to the other one (target). Additionally we derive, in the same regime expressions for single and double inclusive gluon production (where the gluons are not separated by a large rapidity interval) in terms of the Reggeon degrees of freedom.

  2. Reggeon field theory for large Pomeron loops

    International Nuclear Information System (INIS)

    Altinoluk, Tolga; Kovner, Alex; Levin, Eugene; Lublinsky, Michael

    2014-01-01

    We analyze the range of applicability of the high energy Reggeon Field Theory H RFT derived in http://dx.doi.org/10.1088/1126-6708/2009/03/109. We show that this theory is valid as long as at any intermediate value of rapidity η throughout the evolution at least one of the colliding objects is dilute. Importantly, at some values of η the dilute object could be the projectile, while at others it could be the target, so that H RFT does not reduce to either H JIMWLK or H KLWMIJ . When both objects are dense, corrections to the evolution not accounted for in http://dx.doi.org/10.1088/1126-6708/2009/03/109 become important. The same limitation applies to other approaches to high energy evolution available today, such as for example (http://dx.doi.org/10.1103/PhysRevD.78.054019; http://dx.doi.org/10.1103/PhysRevD.78.054020 and http://dx.doi.org/10.1016/S0370-2693(00)00571-2; http://dx.doi.org/10.1140/epjc/s2003-01565-9; http://dx.doi.org/10.1016/j.physletb.2005.10.054). We also show that, in its regime of applicability H RFT can be simplified. We derive the simpler version of H RFT and in the large N c limit rewrite it in terms of the Reggeon creation and annihilation operators. The resulting H RFT is explicitly self dual and provides the generalization of the Pomeron calculus developed in (http://dx.doi.org/10.1016/S0370-2693(00)00571-2; http://dx.doi.org/10.1140/epjc/s2003-01565-9; http://dx.doi.org/10.1016/j.physletb.2005.10.054) by including higher Reggeons in the evolution. It is applicable for description of ‘large’ Pomeron loops, namely Reggeon graphs where all the splittings occur close in rapidity to one dilute object (projectile), while all the merging close to the other one (target). Additionally we derive, in the same regime expressions for single and double inclusive gluon production (where the gluons are not separated by a large rapidity interval) in terms of the Reggeon degrees of freedom

  3. Enhanced arbitrated quantum signature scheme using Bell states

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Shang Tao

    2014-01-01

    We investigate the existing arbitrated quantum signature schemes as well as their cryptanalysis, including intercept-resend attack and denial-of-service attack. By exploring the loopholes of these schemes, a malicious signatory may successfully disavow signed messages, or the receiver may actively negate the signature from the signatory without being detected. By modifying the existing schemes, we develop counter-measures to these attacks using Bell states. The newly proposed scheme puts forward the security of arbitrated quantum signature. Furthermore, several valuable topics are also presented for further research of the quantum signature scheme

  4. The meson and the baryon in the one-loop dual model of the pomeron

    International Nuclear Information System (INIS)

    Pennington, M.R.; Gula, A.

    1975-01-01

    In the lowest order dual loop perturbation theory the crossing and factorisation properties of the pomeron are considered. It is shown that the baryon loop is the necessary complement of the single crossed meson loop in building the low-energy pomeron. Recent experimental indications that in this energy region the pomeron is different in MM, MB and BB processes are naturally explained. (Auth.)

  5. Pomeron in perturbative QCD - its elementary theory and possible phenomenology at HERA

    International Nuclear Information System (INIS)

    Kwiecinski, J.

    1992-04-01

    Theoretical ideas concerning the Pomeron in perturbative QCD are reviewed. The Lipatov equation with asymptotic freedom effects taken into account is recalled and the corresponding spectrum of eigenvalues controlling the bare Pomeron intercept analysed. Possible phenomenological implications of the perturbative QCD Pomeron for deep inelastic scattering at the HERA ep collider are briefly discussed. 9 figs., 49 refs. (author)

  6. The BFKL pomeron calculus in the dipole approach

    International Nuclear Information System (INIS)

    Kozlov, M.; Levin, E.; Prygarin, A.

    2007-01-01

    In this paper we continue to pursue a goal of finding an effective theory for high energy interaction in QCD based on the colour dipole approach, for which the BFKL pomeron calculus gives a low energy limit. The key problem, that we try to solve in this paper is the probabilistic interpretation of the BFKL pomeron calculus in terms of the colourless dipoles and their interactions. We demonstrate that the BFKL pomeron calculus has two equivalent descriptions: (i) one is the generating functional which gives a clear probabilistic interpretation of the processes of high energy scattering and also provides a Hamiltonian-like description of the system of interacting dipoles; (ii) the second is the Langevin equation with a specific noise term which is rather complicated. We found that at high energies this Langevin equation can be reduced to the Langevin equation for directed percolation in the momentum space if the impact parameter is large, namely, b1/k, where k is the transverse momentum of a dipole. Unfortunately, this simplified form of Langevin equation is not applicable for summation of pomeron loops, where one integrates over all possible values of impact parameter. We show that the BFKL pomeron calculus with two vertices (splitting P->P+P and merging P+P->P of pomerons) can be interpreted as a system of colourless dipoles with two processes: the decay of one dipole into two and the merging of two dipoles into one dipole. However, a number of assumptions we have to make on the way to simplify the noise term in the Langevin equation and/or to apply the probabilistic interpretation, therefore, we can consider both of these approaches in the present form only as the QCD motivated models

  7. Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment

    Directory of Open Access Journals (Sweden)

    Sang-Soo Yeo

    2014-01-01

    Full Text Available This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.

  8. Double Pomeron Exchange: from the ISR to the LHC

    CERN Document Server

    Albrow, Michael

    2011-01-01

    I discuss Double Pomeron Exchange processes from their first observation at the CERN Intersecting Storage Rings, focusing on glueball searches, through the observations of exclusive chi_c, photon-photon, and di-jets at the Tevatron, to prospects at the LHC for exclusive Higgs boson production.

  9. Probing the pomeron structure with quasi-real photons

    International Nuclear Information System (INIS)

    Arteaga-Romero, N.; Kessler, P.

    1986-03-01

    Following a recent suggestion of Ingelman and Schlein, we here consider the possibility of probing the gluonic structure of the pomeron with quasi-real photons, i.e. in reactions e p → e p + 2 jets + X taking place at an ep collider such as HERA

  10. Soft and hard pomerons: Is there a distinction?

    International Nuclear Information System (INIS)

    Bjorken, J.D.

    1991-07-01

    One of the big unsolved problems of QCD remains the problem of the Pomeron: what is the relation of high energy elastic and diffractive phenomena to the underlying theory? This is not a subject in which I have actively worked. But my interest in it has in this year increased greatly. The reason has to do with ideas for experimentation at SSC/LHC which either directly address the problem or which require the understanding of strong-interaction diffractive phenomena as backgrounds for discovery-physics processes involving electroweak boson exchanges. I will in this talk omit these motivations, which can be found elsewhere, and instead concentrate on some personal veiwpoints regarding the Pomeron which may or may not be conventional. The main question has to do with the distinction between the original, old-fashioned ''soft'' Pomeron of the 1960s, built out of multiperipheral hadron-exchanges, and the more modern perturbative-QCD ''hard'' Pomeron, built out of multiperipheral gluon exchanges. The perspective I offer comes mainly from two sources: one is heavy-flavor physics, and the other is the Manohar-Georgi view of constituent quark physics. 27 refs., 5 figs

  11. Heterotic Pomeron: high energy hadronic collisions in QCD

    International Nuclear Information System (INIS)

    Chung-I Tan

    1993-01-01

    A unified treatment of high energy collisions in QCD is presented. Using a probabilistic approach, both perturbative (hard) and non-perturbative (soft) components are incorporated in a consistent fashion, leading to a ''Heterotic Pomeron''. As a Regge trajectory, it is non linear, approaching 1 in the limit t → -∞. 2 tabs., 9 refs

  12. Global mechanisms for sustaining and enhancing PES schemes

    International Nuclear Information System (INIS)

    Farley, Josh; Moulaert, Azur; Lee, Dan; Krause, Abby; Aquino, Andre; Daniels, Amy

    2010-01-01

    An international payment for ecosystem service (IPES) schemes may be one of the only mechanisms available to stimulate the provision of vital non-marketed ecosystem services at the global level, as those nations that benefit from global ecosystem services (GES) cannot readily force other sovereign nations to provide them. Currently, international trade offers trillions of dollars in incentives for countries to convert natural capital into marketable goods and services, and few payments to entice countries to conserve natural capital in order to sustain critical non-marketed ecosystem services. We examine the biophysical characteristics of climate change and biodiversity to understand the obstacles to developing effective IPES schemes. We find that none of the existing schemes for providing GES are adequate, given the scale of the problem. A cap and auction scheme for CO 2 emissions among wealthy nations could fund IPES and simultaneously deter carbon emissions. To disburse funds, we should adapt Brazil's ICMS ecologico, and apportion available funds to targeted countries in proportion to how well they meet specific criteria designed to measure the provision of GES. Individual countries can then develop their own policies for increasing provision of these services, ensured of compensation if they do so. Indirect IPES should include funding for freely available technologies that protect or provide GES, such as the low carbon energy alternatives that will be essential for curbing climate change. Markets rely on the price mechanism to generate profits, which rations technology to those who can afford it, reducing adoption rates, innovation and total value. (author)

  13. Assessment of Growth Enhancement Support Scheme among Rice ...

    African Journals Online (AJOL)

    USER

    result of the findings showed that the scheme had very low performance indices in ... direct fertilizer purchase and distribution, and introduce an alternative system of distribution ... effective delivery of yield-increasing farm input (FRN, 2013). ..... telecommunications service providers, making it difficult to get their packages.

  14. Enhancing privacy of users in eID schemes

    NARCIS (Netherlands)

    Shrishak, Kris; Erkin, Z.; Schaar, Remco

    2016-01-01

    In todays world transactions are increasingly being performed over the internetbut require identication of users as in face-to-face transactions. In order to facilitate eGovernance as well as other eCommerce services Electronic Identiation(eID) schemes, which intend to provide unique and reliable

  15. An enhanced biometric authentication scheme for telecare medicine information systems with nonce using chaotic hash function.

    Science.gov (United States)

    Das, Ashok Kumar; Goswami, Adrijit

    2014-06-01

    Recently, Awasthi and Srivastava proposed a novel biometric remote user authentication scheme for the telecare medicine information system (TMIS) with nonce. Their scheme is very efficient as it is based on efficient chaotic one-way hash function and bitwise XOR operations. In this paper, we first analyze Awasthi-Srivastava's scheme and then show that their scheme has several drawbacks: (1) incorrect password change phase, (2) fails to preserve user anonymity property, (3) fails to establish a secret session key beween a legal user and the server, (4) fails to protect strong replay attack, and (5) lacks rigorous formal security analysis. We then a propose a novel and secure biometric-based remote user authentication scheme in order to withstand the security flaw found in Awasthi-Srivastava's scheme and enhance the features required for an idle user authentication scheme. Through the rigorous informal and formal security analysis, we show that our scheme is secure against possible known attacks. In addition, we simulate our scheme for the formal security verification using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool and show that our scheme is secure against passive and active attacks, including the replay and man-in-the-middle attacks. Our scheme is also efficient as compared to Awasthi-Srivastava's scheme.

  16. Enhancing Community Detection By Affinity-based Edge Weighting Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Yoo, Andy [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Sanders, Geoffrey [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Henson, Van [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States); Vassilevski, Panayot [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2015-10-05

    Community detection refers to an important graph analytics problem of finding a set of densely-connected subgraphs in a graph and has gained a great deal of interest recently. The performance of current community detection algorithms is limited by an inherent constraint of unweighted graphs that offer very little information on their internal community structures. In this paper, we propose a new scheme to address this issue that weights the edges in a given graph based on recently proposed vertex affinity. The vertex affinity quantifies the proximity between two vertices in terms of their clustering strength, and therefore, it is ideal for graph analytics applications such as community detection. We also demonstrate that the affinity-based edge weighting scheme can improve the performance of community detection algorithms significantly.

  17. Global Mechanisms for Sustaining and Enhancing PES Schemes

    OpenAIRE

    Farley, Josh; Aquino, Andre; Daniels, Amy; Moulaert, Azur; Lee, Dan; Krause, Abby

    2010-01-01

    An international payment for ecosystem service (IPES) schemes may be one of the only mechanisms available to stimulate the provision of vital non-marketed ecosystem services at the global level, as those nations that benefit from global ecosystem services (GES) cannot readily force other sovereign nations to provide them. Currently, international trade offers trillions of dollars in incentives for countries to convert natural capital into marketable goods and services, and few payments to ent...

  18. Advanced Reactive Power Reserve Management Scheme to Enhance LVRT Capability

    Directory of Open Access Journals (Sweden)

    Hwanik Lee

    2017-10-01

    Full Text Available Abstract: To increase the utilization of wind power in the power system, grid integration standards have been proposed for the stable integration of large-scale wind power plants. In particular, fault-ride-through capability, especially Low-Voltage-Ride-Through (LVRT, has been emphasized, as it is related to tripping in wind farms. Therefore, this paper proposes the Wind power plant applicable-Effective Reactive power Reserve (Wa-ERPR, which combines both wind power plants and conventional generators at the Point of Interconnection (POI. The reactive power capability of the doubly-fed induction generator wind farm was considered to compute the total Wa-ERPR at the POI with reactive power capability of existing generators. By using the Wa-ERPR management algorithm, in case of a violation of the LVRT standards, the amount of reactive power compensation is computed using the Wa-ERPR management scheme. The proposed scheme calculates the Wa-ERPR and computes the required reactive power, reflecting the change of the system topology pre- and post-contingency, to satisfy the LVRT criterion when LVRT regulation is not satisfied at the POI. The static synchronous compensator (STATCOM with the capacity corresponding to calculated amount of reactive power through the Wa-ERPR management scheme is applied to the POI. Therefore, it is confirmed that the wind power plant satisfies the LVRT criteria by securing the appropriate reactive power at the POI, by applying of the proposed algorithm.

  19. Unitarization of pomeron and Regge phenomenology of deep inelastic scattering.

    Energy Technology Data Exchange (ETDEWEB)

    Martynov, E S

    1994-12-31

    Using conventional Regge approach we consider unitarization of supercritical pomeron in DIS and then describe the total photon-proton cross-section and the proton structure functions in the region W{sup 2} = Q{sup 2}(1/x-1) + m{sup 2} {>=} 9 GeV{sup 2}, including the small-x data from HERA. (author). 15 refs., 1 tab., 15 figs.

  20. Di-jet production by double pomeron exchange in CDF

    International Nuclear Information System (INIS)

    Albrow, M.G.

    1998-05-01

    We have studied events with a high-x F antiproton and two central jets with E T > 7 GeV in CDF, in p anti p collisions at √s = 1800 GeV. We find an excess of events with a rapidity gap at least 3.5 units wide in the proton direction, which we interpret as di-jet production in double pomeron exchange events

  1. J/Ψ and φ Electro-production in Pomeron Exchange Model

    International Nuclear Information System (INIS)

    Liu Baorong; Tan Zhenqiang; Gu Yunting; He Xiaorong; Zhou Lijuan; Ma Weixing

    2007-01-01

    Based on Pomeron exchange model, J/Ψ and φ production in electro-proton interaction are investigated with both linear and non-linear Pomeron trajectory. The experimental differential cross sections measured as a function of the kinematic variable Q 2 ,W and t are reproduced successfully in the model. Our conclusions are that the Pomeron exchange model is a successful description of J/Ψ and φ electro-productions on the proton, and that the linear trajectory is a good approximation to non-linearity of the Pomeron trajectory.

  2. The Pomeron and hadrons through infra-red analysis of QCD

    International Nuclear Information System (INIS)

    White, A.R.

    1981-01-01

    Infra-red analysis of QCD in the Regge limit is argued to lead to confinement with chiral symmetry breaking. The resulting Pomeron depends strongly on the centre of the gauge group with SU(3) colour producing uniquely the experimentally observed even signature, factorizing, Pomeron. The critical Pomeron (asymptotic rising cross-sections) occurs when QCD is saturated with quarks. New calculations are reviewed showing strong evidence for the emergence of the critical Pomeron diffraction peak at present accelerator energies. This leads to exciting predictions for diffraction scattering at p antip collider energies which could become the most precise experimental confirmation of QCD

  3. Experimental evidence for a vector-like behaviour of Pomeron exchange

    CERN Document Server

    Barberis, D.; Close, F.E.; Danielsen, K.M.; Donskov, S.V.; Earl, B.C.; Evans, D.; French, B.R.; Hino, T.; Inaba, S.; Jacholkowski, A.; Jacobsen, T.; Khaustov, G.V.; Kinson, J.B.; Kirk, A.; Kondashov, A.A.; Lednev, A.A.; Lenti, V.; Minashvili, I.; Peigneux, J.P.; Romanovsky, V.; Russakovich, N.; Semenov, A.; Shagin, P.M.; Shimizu, H.; Singovsky, A.V.; Sobol, A.; Stassinaki, M.; Stroot, J.P.; Takamatsu, K.; Tsuru, T.; Villalobos Baillie, O.; Votruba, M.F.; Yasu, Y.

    1999-01-01

    Evidence is presented that the Pomeron act as a non-conserved vector current. A study has been made of the azimuthal angle phi, which is defined as the angle between the pT vectors of the two outgoing protons, in the reaction pp -> pp(X0) for those resonances (X0) which are compatible with being produced by double Pomeron exchange. These distributions have been compared with a model which describes the Pomeron as a non-conserved vector current and a qualitative agreement is found. In addition, when one of the particles exchanged is known to have spin 0, namely pi-Pomeron exchange, the phi distribution is flat.

  4. Helicity in proton–proton elastic scattering and the spin structure of the pomeron

    Directory of Open Access Journals (Sweden)

    Carlo Ewerz

    2016-12-01

    Full Text Available We discuss different models for the spin structure of the nonperturbative pomeron: scalar, vector, and rank-2 symmetric tensor. The ratio of single-helicity-flip to helicity-conserving amplitudes in polarised high-energy proton–proton elastic scattering, known as the complex r5 parameter, is calculated for these models. We compare our results to experimental data from the STAR experiment. We show that the spin-0 (scalar pomeron model is clearly excluded by the data, while the vector pomeron is inconsistent with the rules of quantum field theory. The tensor pomeron is found to be perfectly consistent with the STAR data.

  5. An enhanced biometric-based authentication scheme for telecare medicine information systems using elliptic curve cryptosystem.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2015-03-01

    The telecare medical information systems (TMISs) enable patients to conveniently enjoy telecare services at home. The protection of patient's privacy is a key issue due to the openness of communication environment. Authentication as a typical approach is adopted to guarantee confidential and authorized interaction between the patient and remote server. In order to achieve the goals, numerous remote authentication schemes based on cryptography have been presented. Recently, Arshad et al. (J Med Syst 38(12): 2014) presented a secure and efficient three-factor authenticated key exchange scheme to remedy the weaknesses of Tan et al.'s scheme (J Med Syst 38(3): 2014). In this paper, we found that once a successful off-line password attack that results in an adversary could impersonate any user of the system in Arshad et al.'s scheme. In order to thwart these security attacks, an enhanced biometric and smart card based remote authentication scheme for TMISs is proposed. In addition, the BAN logic is applied to demonstrate the completeness of the enhanced scheme. Security and performance analyses show that our enhanced scheme satisfies more security properties and less computational cost compared with previously proposed schemes.

  6. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  7. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  8. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  9. A critical Pomeron-s view of the total and triple-Regge inclusive cross-sections

    International Nuclear Information System (INIS)

    Della Selva, A.; Masperi, L.; Ungkitchanukit, A.; Roberto, V.

    1977-04-01

    An investigation of the total and triple Regge inclusive cross-sections is carried out using a critical pomeron in the framework of reggeon field theory with thresholds. For a model with P and the conventional P' and ω poles, the rise of the total cross-section cannot be accounted for. However, in a model with a single dual-unitarization type vacuum singularity and the ω pole, the data can be adequately described

  10. Security enhanced anonymous multiserver authenticated key agreement scheme using smart cards and biometrics.

    Science.gov (United States)

    Choi, Younsung; Nam, Junghyun; Lee, Donghoon; Kim, Jiye; Jung, Jaewook; Won, Dongho

    2014-01-01

    An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user's biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen's scheme.

  11. Security Enhanced Anonymous Multiserver Authenticated Key Agreement Scheme Using Smart Cards and Biometrics

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    2014-01-01

    Full Text Available An anonymous user authentication scheme allows a user, who wants to access a remote application server, to achieve mutual authentication and session key establishment with the server in an anonymous manner. To enhance the security of such authentication schemes, recent researches combined user’s biometrics with a password. However, these authentication schemes are designed for single server environment. So when a user wants to access different application servers, the user has to register many times. To solve this problem, Chuang and Chen proposed an anonymous multiserver authenticated key agreement scheme using smart cards together with passwords and biometrics. Chuang and Chen claimed that their scheme not only supports multiple servers but also achieves various security requirements. However, we show that this scheme is vulnerable to a masquerade attack, a smart card attack, a user impersonation attack, and a DoS attack and does not achieve perfect forward secrecy. We also propose a security enhanced anonymous multiserver authenticated key agreement scheme which addresses all the weaknesses identified in Chuang and Chen’s scheme.

  12. Security enhancement of a biometric based authentication scheme for telecare medicine information systems with nonce.

    Science.gov (United States)

    Mishra, Dheerendra; Mukhopadhyay, Sourav; Kumari, Saru; Khan, Muhammad Khurram; Chaturvedi, Ankita

    2014-05-01

    Telecare medicine information systems (TMIS) present the platform to deliver clinical service door to door. The technological advances in mobile computing are enhancing the quality of healthcare and a user can access these services using its mobile device. However, user and Telecare system communicate via public channels in these online services which increase the security risk. Therefore, it is required to ensure that only authorized user is accessing the system and user is interacting with the correct system. The mutual authentication provides the way to achieve this. Although existing schemes are either vulnerable to attacks or they have higher computational cost while an scalable authentication scheme for mobile devices should be secure and efficient. Recently, Awasthi and Srivastava presented a biometric based authentication scheme for TMIS with nonce. Their scheme only requires the computation of the hash and XOR functions.pagebreak Thus, this scheme fits for TMIS. However, we observe that Awasthi and Srivastava's scheme does not achieve efficient password change phase. Moreover, their scheme does not resist off-line password guessing attack. Further, we propose an improvement of Awasthi and Srivastava's scheme with the aim to remove the drawbacks of their scheme.

  13. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-01

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes. PMID:29324719

  14. An Enhanced Secure Identity-Based Certificateless Public Key Authentication Scheme for Vehicular Sensor Networks.

    Science.gov (United States)

    Li, Congcong; Zhang, Xi; Wang, Haiping; Li, Dongfeng

    2018-01-11

    Vehicular sensor networks have been widely applied in intelligent traffic systems in recent years. Because of the specificity of vehicular sensor networks, they require an enhanced, secure and efficient authentication scheme. Existing authentication protocols are vulnerable to some problems, such as a high computational overhead with certificate distribution and revocation, strong reliance on tamper-proof devices, limited scalability when building many secure channels, and an inability to detect hardware tampering attacks. In this paper, an improved authentication scheme using certificateless public key cryptography is proposed to address these problems. A security analysis of our scheme shows that our protocol provides an enhanced secure anonymous authentication, which is resilient against major security threats. Furthermore, the proposed scheme reduces the incidence of node compromise and replication attacks. The scheme also provides a malicious-node detection and warning mechanism, which can quickly identify compromised static nodes and immediately alert the administrative department. With performance evaluations, the scheme can obtain better trade-offs between security and efficiency than the well-known available schemes.

  15. The gauge properties of the dual model pomeron-reggeon vertex their derivation and their consequences

    CERN Document Server

    Brink, L; Scherk, J

    1973-01-01

    Study of the non-planar orientable single dual loop diagrams in 26 space-time dimensions has revealed an infinite positive-definite spectrum of 'pomeron' intermediate states which couple to reggeons via a bilinear pomeron-reggeon vertex operator. General algebraic techniques are developed to derive the behaviour of this vertex with respect to the Visasoro gauge operators. A reflection and transmission behaviour is found, reminiscent of the behaviour of a wave incident at the interface between two different media (in this case reggeonic and pomeronic). These gauge properties are such as to guarantee the desired 'good properties', namely completeness of the transverse reggeon states when coupled between physical reggeon states on one side, and on the other side, either physical pomeron states or else physical reggeon states created via an intermediate pomeron. This is yet another example of the amazing and gratifying self-consistency of the dual model with respect to duality, transversality and unitarity. (13 r...

  16. QCD-motivated Pomeron and diffractive hadronic cross sections at high energies

    International Nuclear Information System (INIS)

    Anisovich, V.V.; Dakhno, L.G.; Nikonov, V.A.

    1996-01-01

    The cross sections for soft diffractive processes in pp (or p-barp) and πp collisions are calculated by using the QCD-motivated Pomeron. Unitarization of the s-channel amplitude is performed in the eikonal approximation. Color screening is taken into account in the quark structure of hadrons. The resulting description of diffractive processes leads to the parameters of the bare Pomeron P that are close to the corresponding parameters of the Lipatov Pomeron. The parameters of the bare Pomeron and three-reggeon block PGG (G is a reggeized gluon) are fixed by fitting data at moderately high energies. Predictions for ultrahigh energies are made. The intercept for the bare Pomeron is obtained. It is consistent with data on deep-inelastic scattering at small x

  17. Semantically Enhanced Online Configuration of Feedback Control Schemes.

    Science.gov (United States)

    Milis, Georgios M; Panayiotou, Christos G; Polycarpou, Marios M

    2018-03-01

    Recent progress toward the realization of the "Internet of Things" has improved the ability of physical and soft/cyber entities to operate effectively within large-scale, heterogeneous systems. It is important that such capacity be accompanied by feedback control capabilities sufficient to ensure that the overall systems behave according to their specifications and meet their functional objectives. To achieve this, such systems require new architectures that facilitate the online deployment, composition, interoperability, and scalability of control system components. Most current control systems lack scalability and interoperability because their design is based on a fixed configuration of specific components, with knowledge of their individual characteristics only implicitly passed through the design. This paper addresses the need for flexibility when replacing components or installing new components, which might occur when an existing component is upgraded or when a new application requires a new component, without the need to readjust or redesign the overall system. A semantically enhanced feedback control architecture is introduced for a class of systems, aimed at accommodating new components into a closed-loop control framework by exploiting the semantic inference capabilities of an ontology-based knowledge model. This architecture supports continuous operation of the control system, a crucial property for large-scale systems for which interruptions have negative impact on key performance metrics that may include human comfort and welfare or economy costs. A case-study example from the smart buildings domain is used to illustrate the proposed architecture and semantic inference mechanisms.

  18. Bounds on the pomeron intercept from accelerator data

    International Nuclear Information System (INIS)

    Luna, E.G.S.; Menon, M.J.

    2002-01-01

    Taking into account the discrepancies in the pp and p-bar p total cross section data at √8 = 1.8 TeV, we estimate upper and lower bounds for the soft pomeron intercept. We make use of the Donnachie-Landshoff parameterization for the total cross section and derivative analyticity relations in order to calculate the ρ parameter. Individual and global fits to these quantities and tests with the subtraction constant allow to infer α IP (0) = 1.092 as upper bound and α IP (0) = 1.077 as lower bound. (author)

  19. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Chenyu Wang

    2017-12-01

    Full Text Available As an essential part of Internet of Things (IoT, wireless sensor networks (WSNs have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows–Abadi–Needham (BAN logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  20. An Enhanced Three-Factor User Authentication Scheme Using Elliptic Curve Cryptosystem for Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Chenyu; Xu, Guoai; Sun, Jing

    2017-12-19

    As an essential part of Internet of Things (IoT), wireless sensor networks (WSNs) have touched every aspect of our lives, such as health monitoring, environmental monitoring and traffic monitoring. However, due to its openness, wireless sensor networks are vulnerable to various security threats. User authentication, as the first fundamental step to protect systems from various attacks, has attracted much attention. Numerous user authentication protocols armed with formal proof are springing up. Recently, two biometric-based schemes were proposed with confidence to be resistant to the known attacks including offline dictionary attack, impersonation attack and so on. However, after a scrutinization of these two schemes, we found them not secure enough as claimed, and then demonstrated that these schemes suffer from various attacks, such as offline dictionary attack, impersonation attack, no user anonymity, no forward secrecy, etc. Furthermore, we proposed an enhanced scheme to overcome the identified weaknesses, and proved its security via Burrows-Abadi-Needham (BAN) logic and the heuristic analysis. Finally, we compared our scheme with other related schemes, and the results showed the superiority of our scheme.

  1. The gold flashlight: Coherent photons (and Pomerons) at RHIC

    International Nuclear Information System (INIS)

    Klein, S.; Scannapieco, E.

    1997-06-01

    The Relativistic Heavy Ion Collider (RHIC) will be the first heavy ion accelerator energetic enough to produce hadronic final states via coherent γγ, γP, and PP interactions. Because the photon flux scales as Z 2 , up to an energy of about γℎc/R ∼ 3 GeV/c, the γγ interaction rates are large. RHIC γP interactions test how Pomerons couple to nuclei and measure how different vector mesons, including the J/ψ, interact with nuclear matter. PP collisions can probe Pomeron couplings. Because these collisions can involve identical initial states, for identical final states, the γγ, γP, and PP channels may interfere, producing new effects. The authors review the physics of these interactions and discuss how these signals can be detected experimentally, in the context of the STAR detector. Signals can be separated from backgrounds by using isolation cuts (rapidity gaps) and p perpendicular. The authors present Monte Carlo studies of different backgrounds, showing that representative signals can be extracted with good rates and signal to noise ratios

  2. Analytic multi-Regge theory and the pomeron in QCD. 1

    International Nuclear Information System (INIS)

    White, A.R.

    1991-01-01

    This paper reports on the formalism of analytic multi-Regge theory developed as a basis for the study of abstract critical and super-critical pomeron high-energy behavior and for related studies of the Regge behavior of spontaneously broken gauge theories and the pomeron in QCD. Asymptotic domains of analyticity for multiparticle amplitudes are shown to follow from properties of field theory and S-matrix theory. General asymptotic dispersion relations are then derived for such amplitudes in which the spectral components are described by the graphical formalism of hexagraphs. Further consequences are distinct Sommerfeld-Watson representations for each hexagraph spectral component, together with a complete set of angular momentum plane unitarity equations which control the form of all multi-Regge amplitudes. Because of this constraint of reggeon unitarity the critical pomeron solution of the reggeon field theory gives the only known non-trivial unitary high-energy S-matrix. By exploiting the full structure of multi-Regge amplitudes as the pomeron becomes super-critical, one can study the simultaneous modification of hadrons and the pomeron. The result is a completely consistent description of the super-critical pomeron appearing in hadron scattering. Reggeon unitarity is satisfied in the super-critical phase by the appearance of a massive gluon (Reggeized vector particle) coupling pair-wise to the pomeron

  3. Harvested Energy Prediction Schemes for Wireless Sensor Networks: Performance Evaluation and Enhancements

    Directory of Open Access Journals (Sweden)

    Muhammad

    2017-01-01

    Full Text Available We review harvested energy prediction schemes to be used in wireless sensor networks and explore the relative merits of landmark solutions. We propose enhancements to the well-known Profile-Energy (Pro-Energy model, the so-called Improved Profile-Energy (IPro-Energy, and compare its performance with Accurate Solar Irradiance Prediction Model (ASIM, Pro-Energy, and Weather Conditioned Moving Average (WCMA. The performance metrics considered are the prediction accuracy and the execution time which measure the implementation complexity. In addition, the effectiveness of the considered models, when integrated in an energy management scheme, is also investigated in terms of the achieved throughput and the energy consumption. Both solar irradiance and wind power datasets are used for the evaluation study. Our results indicate that the proposed IPro-Energy scheme outperforms the other candidate models in terms of the prediction accuracy achieved by up to 78% for short term predictions and 50% for medium term prediction horizons. For long term predictions, its prediction accuracy is comparable to the Pro-Energy model but outperforms the other models by up to 64%. In addition, the IPro scheme is able to achieve the highest throughput when integrated in the developed energy management scheme. Finally, the ASIM scheme reports the smallest implementation complexity.

  4. ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Science.gov (United States)

    You, Ilsun; Lee, Jong-Hyouk; Sakurai, Kouichi; Hori, Yoshiaki

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  5. Diffusion into infrared and unitarization of the Balitskii-Fadin-Kuraev-Lipatov Pomeron

    International Nuclear Information System (INIS)

    Golec-Biernat, K.; Motyka, L.; Stasto, A.M.

    2002-01-01

    The Balitskii-Fadin-Kuraev-Lipatov (BFKL) Pomeron in perturbative QCD is plagued by the lack of unitarity and diffusion into the infrared region of gluon virtualities. These two problems are intimately related. We perform numerical studies of the evolution equation proposed by Balitskii and Kovchegov which unitarizes the BFKL Pomeron. We show how diffusion into the infrared region is suppressed due to the emergence of a saturation scale and scaling behavior. We study the universality of this phenomenon as well as its dependence on subleading corrections to the BFKL Pomeron such as the running coupling and kinematic constraint. These corrections are very important for phenomenological applications

  6. Prompt photon production in double-Pomeron-exchange events at the LHC

    Energy Technology Data Exchange (ETDEWEB)

    Kohara, A.K., E-mail: kendi@if.ufrj.br [Centre de Physique Théorique, École Polytechnique, CNRS, Université Paris-Saclay, F-91128 Palaiseau (France); Instituto de Física – Universidade Federal do Rio de Janeiro, C.P. 68528, Rio de Janeiro 21945-970, RJ (Brazil); Marquet, C., E-mail: cyrille.marquet@polytechnique.edu [Centre de Physique Théorique, École Polytechnique, CNRS, Université Paris-Saclay, F-91128 Palaiseau (France)

    2016-06-10

    Within the resolved Pomeron model of hard diffractive scattering, we compute prompt photon production in double-Pomeron-exchange events in proton–proton collisions. Using specific kinematical constraints chosen according to the acceptances of the forward proton detectors of experiments at the Large Hadron Collider, we provide estimates for inclusive and isolated photon production. This is done using the JetPhox program. We find that next-to-leading order corrections to the hard process are important and must be included in order to correctly constrain the quark and gluon content of the Pomeron from such processes at the LHC.

  7. Prompt photon production in double-Pomeron-exchange events at the LHC

    International Nuclear Information System (INIS)

    Kohara, A.K.; Marquet, C.

    2016-01-01

    Within the resolved Pomeron model of hard diffractive scattering, we compute prompt photon production in double-Pomeron-exchange events in proton–proton collisions. Using specific kinematical constraints chosen according to the acceptances of the forward proton detectors of experiments at the Large Hadron Collider, we provide estimates for inclusive and isolated photon production. This is done using the JetPhox program. We find that next-to-leading order corrections to the hard process are important and must be included in order to correctly constrain the quark and gluon content of the Pomeron from such processes at the LHC.

  8. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks.

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-12-08

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie-Hellman problem.

  9. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Science.gov (United States)

    Zhou, Yousheng; Zhao, Xiaofeng; Jiang, Yi; Shang, Fengjun; Deng, Shaojiang; Wang, Xiaojun

    2017-01-01

    Vehicle sensor networks (VSNs) are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM) for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem. PMID:29292792

  10. An Enhanced Privacy-Preserving Authentication Scheme for Vehicle Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yousheng Zhou

    2017-12-01

    Full Text Available Vehicle sensor networks (VSNs are ushering in a promising future by enabling more intelligent transportation systems and providing a more efficient driving experience. However, because of their inherent openness, VSNs are subject to a large number of potential security threats. Although various authentication schemes have been proposed for addressing security problems, they are not suitable for VSN applications because of their high computation and communication costs. Chuang and Lee have developed a trust-extended authentication mechanism (TEAM for vehicle-to-vehicle communication using a transitive trust relationship, which they claim can resist various attacks. However, it fails to counter internal attacks because of the utilization of a shared secret key. In this paper, to eliminate the vulnerability of TEAM, an enhanced privacy-preserving authentication scheme for VSNs is constructed. The security of our proposed scheme is proven under the random oracle model based on the assumption of the computational Diffie–Hellman problem.

  11. Quark loops and spin-flip effects in pomeron exchange

    International Nuclear Information System (INIS)

    Goloskokov, S.V.

    1991-01-01

    On the basis of QCD at large distances with taking account of some nonperturbative properties of the theory, the possibility of spin-flip effects in high energy hadron processes at fixed momenta transfer is investigated. It is shown that the diagrams with the quark loops in QCD at large distances may lead to the spin-flip amplitude growing as s for s→∞, t-fixed. The confirmation of this result is obtained by calculations of the nonleading contributions from quark loops in t-channel exchange in QED up to the end. Physical mechanisms leading to that behaviour of the spin-flip amplitude is discussed. So we conclude that the pomeron has a complicated spin structure. (orig.)

  12. Pomeron-Odderon interference effects in electroproduction of two pions

    CERN Document Server

    Hägler, P; Szymanowski, L; Teryaev, O V

    2002-01-01

    We study Pomeron-Odderon interference effects giving rise to charge and single-spin asymmetries in diffractive electroproduction of a pi sup + pi sup - pair. We calculate these asymmetries, originating from both longitudinal and transverse polarizations of the virtual photon, in the framework of QCD and in the Born approximation, in a kinematical domain accessible to HERA experiments. We predict a sizable charge asymmetry with a characteristic dependence on the invariant mass of the pi sup + pi sup - pair, which makes this observable very important for establishing the magnitude of the Odderon exchange in hard processes. The single-spin asymmetry turns out to be rather small. We briefly discuss future improvements of our calculations and their possible effects on the results. (orig.)

  13. QCD Reggeon field theory for every day: Pomeron loops included

    International Nuclear Information System (INIS)

    Altinoluk, Tolga; Kovner, Alex; Peressutti, Javier; Lublinsky, Michael

    2009-01-01

    We derive the evolution equation for hadronic scattering amplitude at high energy. Our derivation includes the nonlinear effects of finite partonic density in the hadronic wave function as well as the effect of multiple scatterings for scattering on dense hadronic target. It thus includes Pomeron loops. It is based on the evolution of the hadronic wave function derived in /cite{foam}. The kernel of the evolution equation defines the second quantized Hamiltonian of the QCD Reggeon Field Theory, H RFT beyond the limits considered so far. The two previously known limits of the evolution: dilute target (JIMWLK limit) and dilute projectile (KLWMIJ limit) are recovered directly from our final result. The Hamiltonian H RFT is applicable for the evolution of scattering amplitude for arbitrarily dense hadronic projectiles/targets - from 'dipole-dipole' to 'nucleus-nucleus' scattering processes.

  14. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy.

    Science.gov (United States)

    Qiu, Shuming; Xu, Guoai; Ahmad, Haseeb; Guo, Yanhui

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash's scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash's protocol. We point out that Farash's protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.'s scheme. We prove that the proposed protocol not only overcomes the issues in Farash's scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure.

  15. Interference mitigation enhancement of switched-based scheme in over-loaded femtocells

    KAUST Repository

    Gaaloul, Fakhreddine

    2012-06-01

    This paper proposes adequate methods to improve the interference mitigation capability of a recently investigated switched-based interference reduction scheme in short-range open-access and over-loaded femtocells. It is assumed that the available orthogonal channels for the femtocell network are distributed among operating access points in close vicinity, where each of which knows its allocated channels a priori. For the case when the feedback links are capacity-limited and the available channels can be universally shared and simultaneously used, the paper presents enhanced schemes to identify a channel to serve the desired scheduled user by maintaining the interference power level within a tolerable range. They attempt to either complement the switched-based scheme by minimum interference channel selection or adopt different interference thresholds on available channels, while aiming to reduce the channels examination load. The performance of the proposed schemes is quantified and then compared with those of the single-threshold switched-based scheme via numerical and simulation results. © 2012 IEEE.

  16. An enhanced password authentication scheme for session initiation protocol with perfect forward secrecy

    Science.gov (United States)

    2018-01-01

    The Session Initiation Protocol (SIP) is an extensive and esteemed communication protocol employed to regulate signaling as well as for controlling multimedia communication sessions. Recently, Kumari et al. proposed an improved smart card based authentication scheme for SIP based on Farash’s scheme. Farash claimed that his protocol is resistant against various known attacks. But, we observe some accountable flaws in Farash’s protocol. We point out that Farash’s protocol is prone to key-compromise impersonation attack and is unable to provide pre-verification in the smart card, efficient password change and perfect forward secrecy. To overcome these limitations, in this paper we present an enhanced authentication mechanism based on Kumari et al.’s scheme. We prove that the proposed protocol not only overcomes the issues in Farash’s scheme, but it can also resist against all known attacks. We also provide the security analysis of the proposed scheme with the help of widespread AVISPA (Automated Validation of Internet Security Protocols and Applications) software. At last, comparing with the earlier proposals in terms of security and efficiency, we conclude that the proposed protocol is efficient and more secure. PMID:29547619

  17. Unequal Probability Marking Approach to Enhance Security of Traceback Scheme in Tree-Based WSNs.

    Science.gov (United States)

    Huang, Changqin; Ma, Ming; Liu, Xiao; Liu, Anfeng; Zuo, Zhengbang

    2017-06-17

    Fog (from core to edge) computing is a newly emerging computing platform, which utilizes a large number of network devices at the edge of a network to provide ubiquitous computing, thus having great development potential. However, the issue of security poses an important challenge for fog computing. In particular, the Internet of Things (IoT) that constitutes the fog computing platform is crucial for preserving the security of a huge number of wireless sensors, which are vulnerable to attack. In this paper, a new unequal probability marking approach is proposed to enhance the security performance of logging and migration traceback (LM) schemes in tree-based wireless sensor networks (WSNs). The main contribution of this paper is to overcome the deficiency of the LM scheme that has a higher network lifetime and large storage space. In the unequal probability marking logging and migration (UPLM) scheme of this paper, different marking probabilities are adopted for different nodes according to their distances to the sink. A large marking probability is assigned to nodes in remote areas (areas at a long distance from the sink), while a small marking probability is applied to nodes in nearby area (areas at a short distance from the sink). This reduces the consumption of storage and energy in addition to enhancing the security performance, lifetime, and storage capacity. Marking information will be migrated to nodes at a longer distance from the sink for increasing the amount of stored marking information, thus enhancing the security performance in the process of migration. The experimental simulation shows that for general tree-based WSNs, the UPLM scheme proposed in this paper can store 1.12-1.28 times the amount of stored marking information that the equal probability marking approach achieves, and has 1.15-1.26 times the storage utilization efficiency compared with other schemes.

  18. Photon and pomeron-induced production of dijets in pp, pA and AA collisions

    Energy Technology Data Exchange (ETDEWEB)

    Basso, E. [Universidade Federal da Grande Dourados (UFGD), Faculdade de Ciencias Exatas e Tecnologias, Dourados, MS (Brazil); Goncalves, V.P. [Universidade Federal de Pelotas (UFPel), Instituto de Fisica e Matematica, Pelotas, RS (Brazil); Kohara, A.K. [Universidade Federal do Rio de Janeiro (UFRJ), Instituto de Fisica, Rio de Janeiro, RJ (Brazil); Centro Brasileiro de Pesquisas Fisicas (CBPF), Rio de Janeiro, RJ (Brazil); Rangel, M.S. [Universidade Federal do Rio de Janeiro (UFRJ), Instituto de Fisica, Rio de Janeiro, RJ (Brazil)

    2017-09-15

    In this paper we present a detailed comparison of the dijet production by photon-photon, photon-pomeron and pomeron-pomeron interactions in pp, pA and AA collisions at the LHC energy. The transverse momentum, pseudo-rapidity and angular dependencies of the cross sections are calculated at LHC energy using the Forward Physics Monte Carlo (FPMC), which allows one to obtain realistic predictions for the dijet production with two leading intact hadrons. We see that the γIP channel is dominant at forward rapidities in pp collisions and in the full kinematical range in the nuclear collisions of heavy nuclei. Our results indicate that the analysis of dijet production at the LHC can be useful to test the resolved pomeron model as well as to constrain the magnitude of the absorption effects. (orig.)

  19. Security analysis and enhancements of an effective biometric-based remote user authentication scheme using smart cards.

    Science.gov (United States)

    An, Younghwa

    2012-01-01

    Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das's authentication scheme, and we have shown that Das's authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das's authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  20. Security Analysis and Enhancements of an Effective Biometric-Based Remote User Authentication Scheme Using Smart Cards

    Directory of Open Access Journals (Sweden)

    Younghwa An

    2012-01-01

    Full Text Available Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Das’s authentication scheme, and we have shown that Das’s authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Das’s authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server.

  1. A model for soft high-energy scattering: Tensor pomeron and vector odderon

    Energy Technology Data Exchange (ETDEWEB)

    Ewerz, Carlo, E-mail: C.Ewerz@thphys.uni-heidelberg.de [Institut für Theoretische Physik, Universität Heidelberg, Philosophenweg 16, D-69120 Heidelberg (Germany); ExtreMe Matter Institute EMMI, GSI Helmholtzzentrum für Schwerionenforschung, Planckstraße 1, D-64291 Darmstadt (Germany); Maniatis, Markos, E-mail: mmaniatis@ubiobio.cl [Departamento de Ciencias Básicas, Universidad del Bío-Bío, Avda. Andrés Bello s/n, Casilla 447, Chillán 3780000 (Chile); Nachtmann, Otto, E-mail: O.Nachtmann@thphys.uni-heidelberg.de [Institut für Theoretische Physik, Universität Heidelberg, Philosophenweg 16, D-69120 Heidelberg (Germany)

    2014-03-15

    A model for soft high-energy scattering is developed. The model is formulated in terms of effective propagators and vertices for the exchange objects: the pomeron, the odderon, and the reggeons. The vertices are required to respect standard rules of QFT. The propagators are constructed taking into account the crossing properties of amplitudes in QFT and the power-law ansätze from the Regge model. We propose to describe the pomeron as an effective spin 2 exchange. This tensor pomeron gives, at high energies, the same results for the pp and pp{sup -bar} elastic amplitudes as the standard Donnachie–Landshoff pomeron. But with our tensor pomeron it is much more natural to write down effective vertices of all kinds which respect the rules of QFT. This is particularly clear for the coupling of the pomeron to particles carrying spin, for instance vector mesons. We describe the odderon as an effective vector exchange. We emphasise that with a tensor pomeron and a vector odderon the corresponding charge-conjugation relations are automatically fulfilled. We compare the model to some experimental data, in particular to data for the total cross sections, in order to determine the model parameters. The model should provide a starting point for a general framework for describing soft high-energy reactions. It should give to experimentalists an easily manageable tool for calculating amplitudes for such reactions and for obtaining predictions which can be compared in detail with data. -- Highlights: •A general model for soft high-energy hadron scattering is developed. •The pomeron is described as effective tensor exchange. •Explicit expressions for effective reggeon–particle vertices are given. •Reggeon–particle and particle–particle vertices are related. •All vertices respect the standard C parity and crossing rules of QFT.

  2. Hadronic total cross-sections: separation of pomeron and proper reggeon components

    International Nuclear Information System (INIS)

    Kobylinskij, N.A.; Kosenko, A.I.; Martynov, E.S.; Timokhin, V.V.

    1985-01-01

    All the data on nucleon-nucleon and meson-nucleon total cross sections are analyzed to distinguish the contributions of rho, A 2 and ω reggeons and to separate the two vacuum components - the pomeron and the f-reggeon ones. The ranges of the f-reggeon parameters when the pomeron shape varies over a wide region are determined. It is established that the f-reggeon intercept is much higher than was previously thought

  3. A note on the BFKL Pomeron and the 'Hot Spot' cross section

    International Nuclear Information System (INIS)

    Bartels, J.; Lotter, H.

    1993-03-01

    We comment on the numerical calculation of the Lipatov Pomeron in the measurement of 'Hot Spots' in deep inelastic scattering. We illustrate that previous analytic estimates based upon the leading term in the Lipatov equation are accurate within 20%. We present evidence that numerical calculations should be done with a fixed α s . The use of a running α s appears as an unnecessary complication. We argue that at low Q 2 the BFKL Pomeron requires higher order corrections. (orig.)

  4. A Novel Magnetic Actuation Scheme to Disaggregate Nanoparticles and Enhance Passage across the Blood–Brain Barrier

    Directory of Open Access Journals (Sweden)

    Ali Kafash Hoshiar

    2017-12-01

    Full Text Available The blood–brain barrier (BBB hinders drug delivery to the brain. Despite various efforts to develop preprogramed actuation schemes for magnetic drug delivery, the unmodeled aggregation phenomenon limits drug delivery performance. This paper proposes a novel scheme with an aggregation model for a feed-forward magnetic actuation design. A simulation platform for aggregated particle delivery is developed and an actuation scheme is proposed to deliver aggregated magnetic nanoparticles (MNPs using a discontinuous asymmetrical magnetic actuation. The experimental results with a Y-shaped channel indicated the success of the proposed scheme in steering and disaggregation. The delivery performance of the developed scheme was examined using a realistic, three-dimensional (3D vessel simulation. Furthermore, the proposed scheme enhanced the transport and uptake of MNPs across the BBB in mice. The scheme presented here facilitates the passage of particles across the BBB to the brain using an electromagnetic actuation scheme.

  5. Studies of the Triple Pomeron Vertex in perturbative QCD and its applications in phenomenology

    International Nuclear Information System (INIS)

    Kutak, K.

    2006-12-01

    We study the properties of the Triple Pomeron Vertex in the perturbative QCD using the twist expansion method. Such analysis allows us to find the momenta configurations preferred by the vertex. When the momentum transfer is zero, the dominant contribution in the limit when N c →∞ comes from anticollinear pole. This is in agreement with result obtained without expanding, but by direct averaging of the Triple Pomeron Vertex over angles. Resulting theta functions show that the anticollinear configuration is optimal for the vertex. In the finite N c case the collinear term also contributes. Using the Triple Pomeron Vertex we construct a pomeron loop and we also consider four gluon propagation between two Triple Pomeron Vertices. We apply the Triple Pomeron Vertex to construct the Hamiltonian from which we derive the Balitsky-Kovchegov equation for an unintegrated gluon density. In order to apply this equation to phenomenology, we apply the Kwiecinski-Martin-Stasto model for higher order corrections to a linear part of the Balitsky-Kovchegov equation. We introduce the definition of the saturation scale which reflects properties of this equation. Finally, we use it for computation of observables, such as the F 2 structure function and diffractive Higgs boson production cross section. The impact of screening corrections on F 2 is negligible, but those effects turn out to be significant for diffractive Higgs boson production at LHC

  6. Studies of the Triple PomeronVertex in perturbative QCD and its applications in phenomenology

    Energy Technology Data Exchange (ETDEWEB)

    Kutak, K.

    2006-12-15

    We study the properties of the Triple Pomeron Vertex in the perturbative QCD using the twist expansion method. Such analysis allows us to find the momenta configurations preferred by the vertex. When the momentum transfer is zero, the dominant contribution in the limit when N{sub c}{yields}{infinity} comes from anticollinear pole. This is in agreement with result obtained without expanding, but by direct averaging of the Triple Pomeron Vertex over angles. Resulting theta functions show that the anticollinear configuration is optimal for the vertex. In the finite N{sub c} case the collinear term also contributes. Using the Triple Pomeron Vertex we construct a pomeron loop and we also consider four gluon propagation between two Triple Pomeron Vertices. We apply the Triple Pomeron Vertex to construct the Hamiltonian from which we derive the Balitsky-Kovchegov equation for an unintegrated gluon density. In order to apply this equation to phenomenology, we apply the Kwiecinski-Martin-Stasto model for higher order corrections to a linear part of the Balitsky-Kovchegov equation. We introduce the definition of the saturation scale which reflects properties of this equation. Finally, we use it for computation of observables, such as the F{sub 2} structure function and diffractive Higgs boson production cross section. The impact of screening corrections on F{sub 2} is negligible, but those effects turn out to be significant for diffractive Higgs boson production at LHC.

  7. Diffractive hard photoproduction at HERA and evidence for the gluon content of the pomeron

    International Nuclear Information System (INIS)

    Derrick, M.; Krakauer, D.; Magill, S.

    1995-01-01

    Inclusive jet cross sections for events with a large rapidity gap with respect to the proton direction from the reaction ep→jet+X with quasi-real photons have been measured with the ZEUS detector. The cross sections refer to jets with transverse energies E T jet >8 GeV. The data show the characteristics of a diffractive process mediated by pomeron exchange. Assuming that the events are due to the exchange of a pomeron with partonic structure, the quark and gluon content of the pomeron is probed at a scale ∼(E T jet ) 2 . A comparison of the measurements with model predictions based on QCD plus Regge phenomenology requires a contribution of partons with a hard momentum density in the pomeron. A combined analysis of the jet cross sections and recent ZEUS measurements of the diffractive structure function in deep inelastic scattering gives the first experimental evidence for the gluon content of the pomeron in diffractive hard scattering processes. The data indicate that between 30% and 80% of the momentum of the pomeron carried by partons is due to hard gluons. (orig.)

  8. Information-Aided Smart Schemes for Vehicle Flow Detection Enhancements of Traffic Microwave Radar Detectors

    Directory of Open Access Journals (Sweden)

    Tan-Jan Ho

    2016-07-01

    Full Text Available For satisfactory traffic management of an intelligent transport system, it is vital that traffic microwave radar detectors (TMRDs can provide real-time traffic information with high accuracy. In this study, we develop several information-aided smart schemes for traffic detection improvements of TMRDs in multiple-lane environments. Specifically, we select appropriate thresholds not only for removing noise from fast Fourier transforms (FFTs of regional lane contexts but also for reducing FFT side lobes within each lane. The resulting FFTs of reflected vehicle signals and those of clutter are distinguishable. We exploit FFT and lane-/or time stamp-related information for developing smart schemes, which mitigate adverse effects of lane-crossing FFT side lobes of a vehicle signal. As such, the proposed schemes can enhance the detection accuracy of both lane vehicle flow and directional traffic volume. On-site experimental results demonstrate the advantages and feasibility of the proposed methods, and suggest the best smart scheme.

  9. Dispersion tolerance enhancement using an improved offset-QAM OFDM scheme.

    Science.gov (United States)

    Zhao, Jian; Townsend, Paul D

    2015-06-29

    Discrete-Fourier transform (DFT) based offset quadrature amplitude modulation (offset-QAM) orthogonal frequency division multiplexing (OFDM) without cyclic prefix (CP) was shown to offer a dispersion tolerance the same as that of conventional OFDM with ~20% CP overhead. In this paper, we analytically study the fundamental mechanism limiting the dispersion tolerance of this conventional scheme. It is found that the signal and the crosstalk from adjacent subcarriers, which are orthogonal with π/2 phase difference at back to back, can be in-phase when the dispersion increases to a certain value. We propose a novel scheme to overcome this limitation and significantly improve the dispersion tolerance to that of one subcarrier. Simulations show that the proposed scheme can support a 224-Gb/s polarization-division-multiplexed offset-4QAM OFDM signal over 160,000 ps/nm without any CP under 128 subcarriers, and this tolerance scales with the square of the number of subcarriers. It is also shown that this scheme exhibits advantages of greatly enhanced spectral efficiency, larger dispersion tolerance, and/or reduced complexity compared to the conventional CP-OFDM and reduced-guard-interval OFDM using frequency domain equalization.

  10. Enhanced signaling scheme with admission control in the hybrid optical wireless (HOW) networks

    DEFF Research Database (Denmark)

    Yan, Ying; Yu, Hao; Wessing, Henrik

    2009-01-01

    that it can support stringent Quality of Service (QoS) requirements. In this paper, we describe and evaluate a resource management framework designed for the HOW networks. There are two parts in the resource management framework The first part is the Enhanced MPCP (E-MPCP) scheme aiming at improving signaling...... dropping probability depend on several factors. These factors include the frame duration, the traffic load and the total number of shared users. The results also highlight that our proposed system achieves significant improvements over the traditional approach in terms of user QoS guarantee and network...

  11. The practical Pomeron for high energy proton collimation

    Science.gov (United States)

    Appleby, R. B.; Barlow, R. J.; Molson, J. G.; Serluca, M.; Toader, A.

    2016-10-01

    We present a model which describes proton scattering data from ISR to Tevatron energies, and which can be applied to collimation in high energy accelerators, such as the LHC and FCC. Collimators remove beam halo particles, so that they do not impinge on vulnerable regions of the machine, such as the superconducting magnets and the experimental areas. In simulating the effect of the collimator jaws it is crucial to model the scattering of protons at small momentum transfer t, as these protons can subsequently survive several turns of the ring before being lost. At high energies these soft processes are well described by Pomeron exchange models. We study the behaviour of elastic and single-diffractive dissociation cross sections over a wide range of energy, and show that the model can be used as a global description of the wide variety of high energy elastic and diffractive data presently available. In particular it models low mass diffraction dissociation, where a rich resonance structure is present, and thus predicts the differential and integrated cross sections in the kinematical range appropriate to the LHC. We incorporate the physics of this model into the beam tracking code MERLIN and use it to simulate the resulting loss maps of the beam halo lost in the collimators in the LHC.

  12. The practical Pomeron for high energy proton collimation

    Energy Technology Data Exchange (ETDEWEB)

    Appleby, R.B. [University of Manchester, The Cockcroft Institute, Manchester (United Kingdom); Barlow, R.J.; Toader, A. [The University of Huddersfield, Huddersfield (United Kingdom); Molson, J.G. [Univ. Paris-Sud, CNRS/IN2P3, Universite Paris-Saclay, LAL, Orsay (France); Serluca, M. [CERN, Geneva (Switzerland)

    2016-10-15

    We present a model which describes proton scattering data from ISR to Tevatron energies, and which can be applied to collimation in high energy accelerators, such as the LHC and FCC. Collimators remove beam halo particles, so that they do not impinge on vulnerable regions of the machine, such as the superconducting magnets and the experimental areas. In simulating the effect of the collimator jaws it is crucial to model the scattering of protons at small momentum transfer t, as these protons can subsequently survive several turns of the ring before being lost. At high energies these soft processes are well described by Pomeron exchange models. We study the behaviour of elastic and single-diffractive dissociation cross sections over a wide range of energy, and show that the model can be used as a global description of the wide variety of high energy elastic and diffractive data presently available. In particular it models low mass diffraction dissociation, where a rich resonance structure is present, and thus predicts the differential and integrated cross sections in the kinematical range appropriate to the LHC. We incorporate the physics of this model into the beam tracking code MERLIN and use it to simulate the resulting loss maps of the beam halo lost in the collimators in the LHC. (orig.)

  13. Optimized spectroscopic scheme for enhanced precision CO measurements with applications to urban source attribution

    Science.gov (United States)

    Nottrott, A.; Hoffnagle, J.; Farinas, A.; Rella, C.

    2014-12-01

    Carbon monoxide (CO) is an urban pollutant generated by internal combustion engines which contributes to the formation of ground level ozone (smog). CO is also an excellent tracer for emissions from mobile combustion sources. In this work we present an optimized spectroscopic sampling scheme that enables enhanced precision CO measurements. The scheme was implemented on the Picarro G2401 Cavity Ring-Down Spectroscopy (CRDS) analyzer which measures CO2, CO, CH4 and H2O at 0.2 Hz. The optimized scheme improved the raw precision of CO measurements by 40% from 5 ppb to 3 ppb. Correlations of measured CO2, CO, CH4 and H2O from an urban tower were partitioned by wind direction and combined with a concentration footprint model for source attribution. The application of a concentration footprint for source attribution has several advantages. The upwind extent of the concentration footprint for a given sensor is much larger than the flux footprint. Measurements of mean concentration at the sensor location can be used to estimate source strength from a concentration footprint, while measurements of the vertical concentration flux are necessary to determine source strength from the flux footprint. Direct measurement of vertical concentration flux requires high frequency temporal sampling and increases the cost and complexity of the measurement system.

  14. Enhanced efficiency of plasma acceleration in the laser-induced cavity pressure acceleration scheme

    International Nuclear Information System (INIS)

    Badziak, J; Rosiński, M; Jabłoński, S; Pisarczyk, T; Chodukowski, T; Parys, P; Rączka, P; Krousky, E; Ullschmied, J; Liska, R; Kucharik, M

    2015-01-01

    Among various methods for the acceleration of dense plasmas the mechanism called laser-induced cavity pressure acceleration (LICPA) is capable of achieving the highest energetic efficiency. In the LICPA scheme, a projectile placed in a cavity is accelerated along a guiding channel by the laser-induced thermal plasma pressure or by the radiation pressure of an intense laser radiation trapped in the cavity. This arrangement leads to a significant enhancement of the hydrodynamic or electromagnetic forces driving the projectile, relative to standard laser acceleration schemes. The aim of this paper is to review recent experimental and numerical works on LICPA with the emphasis on the acceleration of heavy plasma macroparticles and dense ion beams. The main experimental part concerns the research carried out at the kilojoule sub-nanosecond PALS laser facility in Prague. Our measurements performed at this facility, supported by advanced two-dimensional hydrodynamic simulations, have demonstrated that the LICPA accelerator working in the long-pulse hydrodynamic regime can be a highly efficient tool for the acceleration of heavy plasma macroparticles to hyper-velocities and the generation of ultra-high-pressure (>100 Mbar) shocks through the collision of the macroparticle with a solid target. The energetic efficiency of the macroparticle acceleration and the shock generation has been found to be significantly higher than that for other laser-based methods used so far. Using particle-in-cell simulations it is shown that the LICPA scheme is highly efficient also in the short-pulse high-intensity regime and, in particular, may be used for production of intense ion beams of multi-MeV to GeV ion energies with the energetic efficiency of tens of per cent, much higher than for conventional laser acceleration schemes. (paper)

  15. An Enhanced Power Sharing Scheme for Voltage unbalance and harmonics compensation in an islanded AC microgrid

    DEFF Research Database (Denmark)

    Han, Yang; Shen, Pan; Zhao, Xin

    2016-01-01

    In this paper, an enhanced hierarchical control structure with multiple current loop damping schemes for voltage unbalance and harmonics compensation in ac islanded microgrid is proposed to address unequal power sharing problems. The distributed generation (DG) is properly controlled to autonomou......In this paper, an enhanced hierarchical control structure with multiple current loop damping schemes for voltage unbalance and harmonics compensation in ac islanded microgrid is proposed to address unequal power sharing problems. The distributed generation (DG) is properly controlled...... to autonomously compensate voltage unbalance and harmonics while sharing the compensation effort for the real power, reactive power, unbalance and harmonic powers. The proposed control system of the microgrid mainly consists of the positive sequence real and reactive power droop controllers, voltage and current......) technique is adopted to send the compensation command of the secondary control and auxiliary control from the microgrid control center (MGCC) to the local controllers of DG unit. Finally, the hardware-in-the-loop (HIL) results using dSPACE 1006 platform are presented to demonstrate the effectiveness...

  16. Enhanced finite difference scheme for the neutron diffusion equation using the importance function

    International Nuclear Information System (INIS)

    Vagheian, Mehran; Vosoughi, Naser; Gharib, Morteza

    2016-01-01

    Highlights: • An enhanced finite difference scheme for the neutron diffusion equation is proposed. • A seven-step algorithm is considered based on the importance function. • Mesh points are distributed through entire reactor core with respect to the importance function. • The results all proved that the proposed algorithm is highly efficient. - Abstract: Mesh point positions in Finite Difference Method (FDM) of discretization for the neutron diffusion equation can remarkably affect the averaged neutron fluxes as well as the effective multiplication factor. In this study, by aid of improving the mesh point positions, an enhanced finite difference scheme for the neutron diffusion equation is proposed based on the neutron importance function. In order to determine the neutron importance function, the adjoint (backward) neutron diffusion calculations are performed in the same procedure as for the forward calculations. Considering the neutron importance function, the mesh points can be improved through the entire reactor core. Accordingly, in regions with greater neutron importance, density of mesh elements is higher than that in regions with less importance. The forward calculations are then performed for both of the uniform and improved non-uniform mesh point distributions and the results (the neutron fluxes along with the corresponding eigenvalues) for the two cases are compared with each other. The results are benchmarked against the reference values (with fine meshes) for Kang and Rod Bundle BWR benchmark problems. These benchmark cases revealed that the improved non-uniform mesh point distribution is highly efficient.

  17. Langevin equation in effective theory of interacting QCD pomerons in the limit of large Nc

    International Nuclear Information System (INIS)

    Bondarenko, S.

    2007-01-01

    Effective field theory of interacting BFKL pomerons is investigated and Langevin equation for the theory, which arises after the introduction of additional auxiliary field, is obtained. The Langevin equations are considered for the case of interacting BFKL pomerons with both splitting and merging vertexes and for the interaction which includes additional 'toy' four pomeron interaction vertex. In the latest case an analogy with the Regge field theory in zero dimensions (RFT-0) was used in order to obtain this 'toy' vertex, which coincided with the four point function of two-dimensional conformal field theory obtained in [G.P. Korchemsky, Nucl. Phys. B 550 (1999) 397]. The comparison between the Langevin equations obtained in the frameworks of dipole and RFT approaches is performed, the interpretation of results is given and possible application of obtained equations is discussed

  18. Heavy quark production in photon-Pomeron interactions at high energies

    Energy Technology Data Exchange (ETDEWEB)

    Machado, M. M. [Instituto Federal de Ciencia, Educacao e Tecnologia Farroupilha, Campus Sao Borja, Rua Otaviano Castilho Mendes, 355, CEP 97670-000, Sao Borja, RS (Brazil); Goncalves, V. P. [Instituto de Fisica e Matematica - IFM, Universidade Federal de Pelotas, Caixa Postal 354, CEP 96010-900, RS (Brazil)

    2013-03-25

    The diffractive heavy quark cross sections are estimated considering photon-Pomeron interactions in hadron - hadron at RHIC, Tevatron, and CERN LHC energies. We assume the validity of the hard diffractive factorization and calculate the charm and bottom total cross sections and rapidity distributions using the diffractive parton distribution functions of the Pomeron obtained by the H1 Collaboration at DESY-HERA. Such processes are sensitive to the gluon content of the Pomeron at high energies and are a good place to constrain the behavior of this distribution. We also compare our predictions with those obtained using the dipole model, and verify that these processes are a good test of the different mechanisms for heavy quarks diffractive production at hadron colliders.

  19. Reggeon calculus as a low-order perturbation theory for the Pomeron

    International Nuclear Information System (INIS)

    DeTar, C.

    1975-01-01

    We review the foundations of the Gribov Reggeon calculus with an emphasis on the relationship between the energy-plane and J-plane descriptions of the diagrams of the calculus. The question of the ''large-rapidity-gap cutoff'' for the Pomeron and the problem of signature are treated in more detail than in the traditional approach to the calculus. Except for some slight differences, the main results agree with Gribov's original formulation. We advocate the use of the Reggeon calculus as a refinement on the contemporary ''two-component'' model for the Pomeron and collect some formulas useful for phenomenological applications

  20. The γ*γ* total cross section and the BFKL pomeron at e+e-colliders

    International Nuclear Information System (INIS)

    Bartels, J.

    1996-08-01

    We present a numerical estimate of the γ*γ* total cross section at LEP and at the designed e + e - next linear collider (NLC), based upon the BFKL Pomeron. We find for the linear collider that the event rate is substantial provided electrons scattered under small angles can be detected, and a measurement of this cross section provides an excellent test of the BFKL Pomeron. For LEP, although the number of events is substantially smaller, and initial study of this process is feasible. (orig.)

  1. An Efficient Scheduling Scheme to Enhance the Capacity of VoIP Services in Evolved UTRA Uplink

    Directory of Open Access Journals (Sweden)

    Kim Yong-Seok

    2008-01-01

    Full Text Available An efficient scheduling scheme is proposed to increase the available capacity of VoIP services over evolved UTRA uplink. On top of the advantages of persistent scheduling, the proposed scheme adaptively share the resources of two VoIP users to get early-termination gain of dynamic scheduler. Through system-level simulations, the performance of the proposed algorithm is evaluated in terms of the capacity enhancement of VoIP services. Comparisons with the original persistent scheduling and the HSUPA scheduler reveal that the proposed scheme increases the capacity of VoIP services up to 20%.

  2. Real and imaginary parts of hadronic amplitudes, diffractive contributions and the Chew-Rosenzweig pomeron

    International Nuclear Information System (INIS)

    Chiu, C.B.; Tow, D.M.

    1978-01-01

    It is shown that when the f' and the diffractive elastic (and quasi-elastic) contributions are included within the Chew-Rosenzweig type solution for the pomeron, one can explain reasonably well the π and 2K - π total cross sections as well as the ratios of the real over imaginary parts of the forward π and K amplitudes. (Auth.)

  3. A momentum space analysis of the Triple Pomeron Vertex in pQCD

    International Nuclear Information System (INIS)

    Bartels, J.

    2007-10-01

    We study properties of the momentum space Triple Pomeron Vertex in perturbative QCD. Particular attention is given to the collinear limit where transverse momenta on one side of the vertex are much larger than on the other side. We also comment on the kernels in nonlinear evolution equations. (orig.)

  4. An application of the Dipole Pomeron model to the pion-proton elastic scattering

    International Nuclear Information System (INIS)

    Covolan, R.J.M.; Leite, E.E.; Montanha, J.; Soares, M.S.

    1994-01-01

    The Pomeron model is applied to the pion-proton elastic scattering aiming to describe the total and differential cross sections and the ρ ratio between the scattering amplitude real and imaginary parts. It is also discussed how far the present available experimental results lead to the necessity of adopting a (α 0 > 1) supercritical trajectory. (author). 3 refs., 4 figs

  5. A momentum space analysis of the Triple Pomeron Vertex in pQCD

    Energy Technology Data Exchange (ETDEWEB)

    Bartels, J. [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Kutak, K. [Deutsches Elektronen-Synchrotron (DESY), Hamburg (Germany)]|[Instytut Fizyki Jadrowej Polskiej Akademii Nauk, Krakow (Poland)

    2007-10-15

    We study properties of the momentum space Triple Pomeron Vertex in perturbative QCD. Particular attention is given to the collinear limit where transverse momenta on one side of the vertex are much larger than on the other side. We also comment on the kernels in nonlinear evolution equations. (orig.)

  6. Interference mitigation enhancement of switched-based scheme in over-loaded femtocells

    KAUST Repository

    Gaaloul, Fakhreddine; Radaydeh, Redha Mahmoud Mesleh; Alouini, Mohamed-Slim

    2012-01-01

    -based scheme by minimum interference channel selection or adopt different interference thresholds on available channels, while aiming to reduce the channels examination load. The performance of the proposed schemes is quantified and then compared with those

  7. Efficient and Security Enhanced Anonymous Authentication with Key Agreement Scheme in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Moon, Jongho; Lee, Donghoon; Won, Dongho

    2017-03-21

    At present, users can utilize an authenticated key agreement protocol in a Wireless Sensor Network (WSN) to securely obtain desired information, and numerous studies have investigated authentication techniques to construct efficient, robust WSNs. Chang et al. recently presented an authenticated key agreement mechanism for WSNs and claimed that their authentication mechanism can both prevent various types of attacks, as well as preserve security properties. However, we have discovered that Chang et al's method possesses some security weaknesses. First, their mechanism cannot guarantee protection against a password guessing attack, user impersonation attack or session key compromise. Second, the mechanism results in a high load on the gateway node because the gateway node should always maintain the verifier tables. Third, there is no session key verification process in the authentication phase. To this end, we describe how the previously-stated weaknesses occur and propose a security-enhanced version for WSNs. We present a detailed analysis of the security and performance of our authenticated key agreement mechanism, which not only enhances security compared to that of related schemes, but also takes efficiency into consideration.

  8. Non-planar corrections to the Pomeron and reggeons in the dual unitarity scheme

    International Nuclear Information System (INIS)

    Uschersohn, J.

    1976-03-01

    A special class of non-planar diagrams is studied, those in which the produced clusters are crossed. Insertion of these diagrams in the reggeon propagators accounts for exchange degeneracy breaking. The even signature reggeons get their intercept promoted to a larger value, while the odd signature ones are left unchanged. (author)

  9. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  10. Numerical investigation of complex flooding schemes for surfactant polymer based enhanced oil recovery

    Science.gov (United States)

    Dutta, Sourav; Daripa, Prabir

    2015-11-01

    Surfactant-polymer flooding is a widely used method of chemical enhanced oil recovery (EOR) in which an array of complex fluids containing suitable and varying amounts of surfactant or polymer or both mixed with water is injected into the reservoir. This is an example of multiphase, multicomponent and multiphysics porous media flow which is characterized by the spontaneous formation of complex viscous fingering patterns and is modeled by a system of strongly coupled nonlinear partial differential equations with appropriate initial and boundary conditions. Here we propose and discuss a modern, hybrid method based on a combination of a discontinuous, multiscale finite element formulation and the method of characteristics to accurately solve the system. Several types of flooding schemes and rheological properties of the injected fluids are used to numerically study the effectiveness of various injection policies in minimizing the viscous fingering and maximizing oil recovery. Numerical simulations are also performed to investigate the effect of various other physical and model parameters such as heterogeneity, relative permeability and residual saturation on the quantities of interest like cumulative oil recovery, sweep efficiency, fingering intensity to name a few. Supported by the grant NPRP 08-777-1-141 from the Qatar National Research Fund (a member of The Qatar Foundation).

  11. Longitudinal impedance and wake from XFEL undulators. Impact on current-enhanced SASE schemes

    Energy Technology Data Exchange (ETDEWEB)

    Geloni, G.; Saldin, E.; Schneidmiller, E.; Yurkov, M.

    2007-06-15

    In this article we derive longitudinal impedance and wake function for an undulator setup with arbitrary undulator parameter, taking into account a finite transverse size of the electron bunch. Earlier studies considered a line density-distribution of electrons instead. We focus our attention on the long-wavelength asymptote (compared with resonance wavelength), at large distance of the electron bunch from the undulator entrance compared to the overtaking length, and for large vacuumchamber size compared to the typical transverse size of the field. These restrictions define a parameter region of interest for practical applications. We calculate a closed expression for impedance and wake function that may be evaluated numerically in the most general case. Such expression allows us to derive an analytical solution for a Gaussian transverse and longitudinal bunch shape. Finally, we study the feasibility of current-enhanced SASE schemes (ESASE) recently proposed for LCLS, that fall well-within our approximations. Numerical estimations presented in this paper indicate that impedance-induced energy spread is sufficient to seriously degrade the FEL performance. Our conclusion is in contrast with results in literature, where wake calculations for the LCLS case are given in free-space, as if the presence of the undulator were negligible. (orig.)

  12. An Enhanced Three-Level Voltage Switching State Scheme for Direct Torque Controlled Open End Winding Induction Motor

    Science.gov (United States)

    Kunisetti, V. Praveen Kumar; Thippiripati, Vinay Kumar

    2018-01-01

    Open End Winding Induction Motors (OEWIM) are popular for electric vehicles, ship propulsion applications due to less DC link voltage. Electric vehicles, ship propulsions require ripple free torque. In this article, an enhanced three-level voltage switching state scheme for direct torque controlled OEWIM drive is implemented to reduce torque and flux ripples. The limitations of conventional Direct Torque Control (DTC) are: possible problems during low speeds and starting, it operates with variable switching frequency due to hysteresis controllers and produces higher torque and flux ripple. The proposed DTC scheme can abate the problems of conventional DTC with an enhanced voltage switching state scheme. The three-level inversion was obtained by operating inverters with equal DC-link voltages and it produces 18 voltage space vectors. These 18 vectors are divided into low and high frequencies of operation based on rotor speed. The hardware results prove the validity of proposed DTC scheme during steady-state and transients. From simulation and experimental results, proposed DTC scheme gives less torque and flux ripples on comparison to two-level DTC. The proposed DTC is implemented using dSPACE DS-1104 control board interface with MATLAB/SIMULINK-RTI model.

  13. Novel scheme for enhancement of fault ride-through capability of doubly fed induction generator based wind farms

    International Nuclear Information System (INIS)

    Vinothkumar, K.; Selvan, M.P.

    2011-01-01

    Research highlights: → Proposed Fault ride-through (FRT) scheme for DFIG is aimed at energy conservation. → The input mechanical energy is stored during fault and utilized at fault clearance. → Enhanced Rotor speed stability of DFIG. → Reduced Reactive power requirement and rapid voltage recovery at fault clearance. → Improved post fault performance of DFIG at fault clearance. -- Abstract: Enhancement of fault ride-through (FRT) capability and subsequent improvement of rotor speed stability of wind farms equipped with doubly fed induction generator (DFIG) is the objective of this paper. The objective is achieved by employing a novel FRT scheme with suitable control strategy. The proposed FRT scheme, which is connected between the rotor circuit and dc link capacitor in parallel with Rotor Side Converter, consists of an uncontrolled rectifier, two sets of IGBT switches, a diode and an inductor. In this scheme, the input mechanical energy of the wind turbine during grid fault is stored and utilized at the moment of fault clearance, instead of being dissipated in the resistors of the crowbar circuit as in the existing FRT schemes. Consequently, torque balance between the electrical and mechanical quantities is achieved and hence the rotor speed deviation and electromagnetic torque fluctuations are reduced. This results in reduced reactive power requirement and rapid reestablishment of terminal voltage on fault clearance. Furthermore, the stored electromagnetic energy in the inductor is transferred into the dc link capacitor on fault clearance and hence the grid side converter is relieved from charging the dc link capacitor, which is very crucial at this moment, and this converter can be utilized to its full capacity for rapid restoration of terminal voltage and normal operation of DFIG. Extensive simulation study carried out employing PSCAD/EMTDC software vividly demonstrates the potential capabilities of the proposed scheme in enhancing the performance of

  14. Novel scheme for enhancement of fault ride-through capability of doubly fed induction generator based wind farms

    Energy Technology Data Exchange (ETDEWEB)

    Vinothkumar, K. [Department of Electrical and Electronics Engineering, National Institute of Technology, Tiruchirappalli, Tamilnadu 620015 (India); Selvan, M.P., E-mail: selvanmp@nitt.ed [Department of Electrical and Electronics Engineering, National Institute of Technology, Tiruchirappalli, Tamilnadu 620015 (India)

    2011-07-15

    Research highlights: {yields} Proposed Fault ride-through (FRT) scheme for DFIG is aimed at energy conservation. {yields} The input mechanical energy is stored during fault and utilized at fault clearance. {yields} Enhanced Rotor speed stability of DFIG. {yields} Reduced Reactive power requirement and rapid voltage recovery at fault clearance. {yields} Improved post fault performance of DFIG at fault clearance. -- Abstract: Enhancement of fault ride-through (FRT) capability and subsequent improvement of rotor speed stability of wind farms equipped with doubly fed induction generator (DFIG) is the objective of this paper. The objective is achieved by employing a novel FRT scheme with suitable control strategy. The proposed FRT scheme, which is connected between the rotor circuit and dc link capacitor in parallel with Rotor Side Converter, consists of an uncontrolled rectifier, two sets of IGBT switches, a diode and an inductor. In this scheme, the input mechanical energy of the wind turbine during grid fault is stored and utilized at the moment of fault clearance, instead of being dissipated in the resistors of the crowbar circuit as in the existing FRT schemes. Consequently, torque balance between the electrical and mechanical quantities is achieved and hence the rotor speed deviation and electromagnetic torque fluctuations are reduced. This results in reduced reactive power requirement and rapid reestablishment of terminal voltage on fault clearance. Furthermore, the stored electromagnetic energy in the inductor is transferred into the dc link capacitor on fault clearance and hence the grid side converter is relieved from charging the dc link capacitor, which is very crucial at this moment, and this converter can be utilized to its full capacity for rapid restoration of terminal voltage and normal operation of DFIG. Extensive simulation study carried out employing PSCAD/EMTDC software vividly demonstrates the potential capabilities of the proposed scheme in

  15. The two-component non-perturbative pomeron and the G-Universality

    Energy Technology Data Exchange (ETDEWEB)

    Nicolescu, Basarab E-mail: nicolesc@in2p3.fr

    2001-04-01

    In this communication we present a generalization of the Donnachie-Landshoff model inspired by the recent discovery of a 2-component Pomeron in LLA-QCD by Bartels, Lipatov and Vacca. In particular, we explore a new property, not present in the usual Regge theory - the G-Universality - which signifies the independence of one of the Pomeron components on the nature of the initial and final hadrons. The best description of the p-barp, pp, {pi}{sup {+-}}p, K{sup {+-}}p, {gamma}{gamma} and {gamma}p forward data is obtained when G-universality is imposed. Moreover, the ln{sup 2}s behaviour of the hadron amplitude, first established by Heisenberg, is clearly favoured by the data.

  16. Forward gluon production in hadron-hadron scattering with Pomeron loops

    International Nuclear Information System (INIS)

    Iancu, E.

    2006-01-01

    We discuss new physical phenomena expected in particle production in hadron-hadron collisions at high energy, as a consequence of Pomerons loop effects in the evolution equations for the Color Glass Condensate. We focus on gluon production in asymmetric, 'dilute-dense', collisions: a dilute projectile scatters off a dense hadronic target, whose gluon distribution is highly evolved. This situation is representative for particle production in proton-proton collisions at forward rapidities (say, at LHC) and admits a dipole factorization similar to that of deep inelastic scattering (DIS). We show that at sufficiently large forward rapidities, where the Pomerons loop effects become important in the evolution of the target wavefunction, gluon production is dominated by 'black spots' (saturated gluon configurations) up to very large values of the transverse momentum, well above the average saturation momentum in the target. In this regime, the produced gluon spectrum exhibits diffusive scaling, so like DIS at sufficiently high energy. (authors)

  17. Dipole pomeron and. pi. /sup -/p elastic scattering at high energies

    Energy Technology Data Exchange (ETDEWEB)

    Fazal-E-Aleem (Panjab Univ., Lahore (Pakistan). Physics Dept.)

    1982-10-16

    The differential cross-sections for high-energy ..pi../sup -/p elastic scattering showing structure near -t=4 (GeV/c)/sup 2/ for psub(L)=50 and 200 GeV/c together with total cross-sections for 50<=psub(L)<=370 GeV/c, and with -t extending up to 11 (GeV/c)/sup 2/ have been fitted by using a dipole pomeron model.

  18. Efficient Hybrid Watermarking Scheme for Security and Transmission Bit Rate Enhancement of 3D Color-Plus-Depth Video Communication

    Science.gov (United States)

    El-Shafai, W.; El-Rabaie, S.; El-Halawany, M.; Abd El-Samie, F. E.

    2018-03-01

    Three-Dimensional Video-plus-Depth (3DV + D) comprises diverse video streams captured by different cameras around an object. Therefore, there is a great need to fulfill efficient compression to transmit and store the 3DV + D content in compressed form to attain future resource bounds whilst preserving a decisive reception quality. Also, the security of the transmitted 3DV + D is a critical issue for protecting its copyright content. This paper proposes an efficient hybrid watermarking scheme for securing the 3DV + D transmission, which is the homomorphic transform based Singular Value Decomposition (SVD) in Discrete Wavelet Transform (DWT) domain. The objective of the proposed watermarking scheme is to increase the immunity of the watermarked 3DV + D to attacks and achieve adequate perceptual quality. Moreover, the proposed watermarking scheme reduces the transmission-bandwidth requirements for transmitting the color-plus-depth 3DV over limited-bandwidth wireless networks through embedding the depth frames into the color frames of the transmitted 3DV + D. Thus, it saves the transmission bit rate and subsequently it enhances the channel bandwidth-efficiency. The performance of the proposed watermarking scheme is compared with those of the state-of-the-art hybrid watermarking schemes. The comparisons depend on both the subjective visual results and the objective results; the Peak Signal-to-Noise Ratio (PSNR) of the watermarked frames and the Normalized Correlation (NC) of the extracted watermark frames. Extensive simulation results on standard 3DV + D sequences have been conducted in the presence of attacks. The obtained results confirm that the proposed hybrid watermarking scheme is robust in the presence of attacks. It achieves not only very good perceptual quality with appreciated PSNR values and saving in the transmission bit rate, but also high correlation coefficient values in the presence of attacks compared to the existing hybrid watermarking schemes.

  19. Cooperation schemes for rate enhancement in detect-and-forward relay channels

    KAUST Repository

    Benjillali, Mustapha; Szczeciński, Leszek L.; Alouini, Mohamed-Slim

    2010-01-01

    an adaptive cooperation scheme based on the maximization of the information rate at the destination which needs to observe only the average signal-to-noise ratios of direct and relaying links. ©2010 IEEE.

  20. Enhanced Security and Pairing-free Handover Authentication Scheme for Mobile Wireless Networks

    Science.gov (United States)

    Chen, Rui; Shu, Guangqiang; Chen, Peng; Zhang, Lijun

    2017-10-01

    With the widely deployment of mobile wireless networks, we aim to propose a secure and seamless handover authentication scheme that allows users to roam freely in wireless networks without worrying about security and privacy issues. Given the open characteristic of wireless networks, safety and efficiency should be considered seriously. Several previous protocols are designed based on a bilinear pairing mapping, which is time-consuming and inefficient work, as well as unsuitable for practical situations. To address these issues, we designed a new pairing-free handover authentication scheme for mobile wireless networks. This scheme is an effective improvement of the protocol by Xu et al., which is suffer from the mobile node impersonation attack. Security analysis and simulation experiment indicate that the proposed protocol has many excellent security properties when compared with other recent similar handover schemes, such as mutual authentication and resistance to known network threats, as well as requiring lower computation and communication cost.

  1. Cooperation schemes for rate enhancement in detect-and-forward relay channels

    KAUST Repository

    Benjillali, Mustapha

    2010-05-01

    To improve the spectral efficiency of "Detect-and-Forward" (DetF) half-duplex relaying in fading channels, we propose a cooperation scheme where the relay uses a modulation whose order is higher than the one at the source. In a new common framework, we show that the proposed scheme offers considerable gains - in terms of achievable information rates - compared to the conventional DetF relaying schemes for both orthogonal and non-orthogonal source/relay cooperation. This allows us to propose an adaptive cooperation scheme based on the maximization of the information rate at the destination which needs to observe only the average signal-to-noise ratios of direct and relaying links. ©2010 IEEE.

  2. A Fine-Grained and Privacy-Preserving Query Scheme for Fog Computing-Enhanced Location-Based Service.

    Science.gov (United States)

    Yang, Xue; Yin, Fan; Tang, Xiaohu

    2017-07-11

    Location-based services (LBS), as one of the most popular location-awareness applications, has been further developed to achieve low-latency with the assistance of fog computing. However, privacy issues remain a research challenge in the context of fog computing. Therefore, in this paper, we present a fine-grained and privacy-preserving query scheme for fog computing-enhanced location-based services, hereafter referred to as FGPQ. In particular, mobile users can obtain the fine-grained searching result satisfying not only the given spatial range but also the searching content. Detailed privacy analysis shows that our proposed scheme indeed achieves the privacy preservation for the LBS provider and mobile users. In addition, extensive performance analyses and experiments demonstrate that the FGPQ scheme can significantly reduce computational and communication overheads and ensure the low-latency, which outperforms existing state-of-the art schemes. Hence, our proposed scheme is more suitable for real-time LBS searching.

  3. The BFKL Pomeron with running coupling constant: how much of its hard nature survives?

    International Nuclear Information System (INIS)

    Haakman, L.P.A.; Kancheli, O.V.; Koch, J.H.

    1998-01-01

    We discuss the BFKL equation with a running gauge coupling and identify in its solutions the contributions originating from different transverse momentum scales. We show that for a running coupling constant the distribution of the gluons making up the BFKL pomeron shifts to smaller transverse momenta so that the dominant part of pomeron can have a non-perturbative origin. It is demonstrated how this soft physics enters into the BFKL solution through the boundary condition. We consider twokinematical regimes leading to different behaviour of the rapidity andtransverse momentum dependence of the gluon distribution. In the diffusion approximation to the BFKL kernel with running α s , we find a sequence of poles which replaces the cut for fixed α s . The second regime corresponds to the singular part of the kernel, which gives the dominant contribution in the limit of very large transverse momenta. Finally, a simple more general picture is obtained for the QCD pomeron in hard processes: it is of soft, non-perturbative nature, but has hard ends of DGLAP type. (orig.)

  4. Enhancing the Statistical Filtering Scheme to Detect False Negative Attacks in Sensor Networks

    Directory of Open Access Journals (Sweden)

    Muhammad Akram

    2017-06-01

    Full Text Available In this paper, we present a technique that detects both false positive and false negative attacks in statistical filtering-based wireless sensor networks. In statistical filtering scheme, legitimate reports are repeatedly verified en route before they reach the base station, which causes heavy energy consumption. While the original statistical filtering scheme detects only false reports, our proposed method promises to detect both attacks.

  5. Novel security enhancement technique against eavesdropper for OCDMA system using 2-D modulation format with code switching scheme

    Science.gov (United States)

    Singh, Simranjit; Kaur, Ramandeep; Singh, Amanvir; Kaler, R. S.

    2015-03-01

    In this paper, security of the spectrally encoded-optical code division multiplexed access (OCDMA) system is enhanced by using 2-D (orthogonal) modulation technique. This is an effective approach for simultaneous improvement of the system capacity and security. Also, the results show that the hybrid modulation technique proved to be a better option to enhance the data confidentiality at higher data rates using minimum utilization of bandwidth in a multiuser environment. Further, the proposed system performance is compared with the current state-of-the-art OCDMA schemes.

  6. Direct Z-scheme TiO2/CdS hierarchical photocatalyst for enhanced photocatalytic H2-production activity

    Science.gov (United States)

    Meng, Aiyun; Zhu, Bicheng; Zhong, Bo; Zhang, Liuyang; Cheng, Bei

    2017-11-01

    Photocatalytic H2 evolution, which utilizes solar energy via water splitting, is a promising route to deal with concerns about energy and environment. Herein, a direct Z-scheme TiO2/CdS binary hierarchical photocatalyst was fabricated via a successive ionic layer adsorption and reaction (SILAR) technique, and photocatalytic H2 production was measured afterwards. The as-prepared TiO2/CdS hybrid photocatalyst exhibited noticeably promoted photocatalytic H2-production activity of 51.4 μmol h-1. The enhancement of photocatalytic activity was ascribed to the hierarchical structure, as well as the efficient charge separation and migration from TiO2 nanosheets to CdS nanoparticles (NPs) at their tight contact interfaces. Moreover, the direct Z-scheme photocatalytic reaction mechanism was demonstrated to elucidate the improved photocatalytic performance of TiO2/CdS composite photocatalyst. The photoluminescence (PL) analysis of hydroxyl radicals were conducted to provide clues for the direct Z-scheme mechanism. This work provides a facile route for the construction of redox mediator-free Z-scheme photocatalytic system for photocatalytic water splitting.

  7. An Enhanced Dual Droop Control Scheme for Resilient Active Power Sharing among Paralleled Two-Stage Converters

    DEFF Research Database (Denmark)

    Liu, Hongpeng; Yang, Yongheng; Wang, Xiongfei

    2017-01-01

    Traditional droop-controlled system has assumed that generators can always generate the powers demanded from them. This is true with conventional sources, where fuel supplies are usually planned in advance. For renewable sources, it may also be possible if energy storage is available. Energy...... storage, usually as batteries, may however be expensive, depending on its planned capacity. Renewable sources are therefore sometimes installed as non-dispatch-able sources without storage. This may not be viable for remote grids, where renewable sources may be the only or major type of sources. In those...... cases, traditional droop scheme may not work well when its demanded power cannot be met by some renewable sources due to intermittency. When that happens, the system may become unstable with some sources progressively brought out of generation. To avoid such occurrence, an enhanced dual droop scheme...

  8. Enhancing deep convolutional neural network scheme for breast cancer diagnosis with unlabeled data.

    Science.gov (United States)

    Sun, Wenqing; Tseng, Tzu-Liang Bill; Zhang, Jianying; Qian, Wei

    2017-04-01

    In this study we developed a graph based semi-supervised learning (SSL) scheme using deep convolutional neural network (CNN) for breast cancer diagnosis. CNN usually needs a large amount of labeled data for training and fine tuning the parameters, and our proposed scheme only requires a small portion of labeled data in training set. Four modules were included in the diagnosis system: data weighing, feature selection, dividing co-training data labeling, and CNN. 3158 region of interests (ROIs) with each containing a mass extracted from 1874 pairs of mammogram images were used for this study. Among them 100 ROIs were treated as labeled data while the rest were treated as unlabeled. The area under the curve (AUC) observed in our study was 0.8818, and the accuracy of CNN is 0.8243 using the mixed labeled and unlabeled data. Copyright © 2016. Published by Elsevier Ltd.

  9. Adaptive Duty-Cycling to Enhance Topology Control Schemes in Wireless Sensor Networks

    OpenAIRE

    Cha, Myungsu; Kim, Mihui; Kim, Dongsoo S.; Choo, Hyunseung

    2014-01-01

    To prolong the network lifetime, various scheduling approaches that schedule wireless devices of nodes to switch between active and sleep states have been studied. Topology control schemes are one of the scheduling approaches that can extend the network lifetime and reduce the additional communication delays at the same time. However, they do not guarantee that all nodes have the same lifetime. They reduce the network coverage and prevent seamless communications. This paper proposes an adapti...

  10. Fused man-machine classification schemes to enhance diagnosis of breast microcalcifications

    Science.gov (United States)

    Andreadis, Ioannis; Sevastianos, Chatzistergos; George, Spyrou; Konstantina, Nikita

    2017-11-01

    Computer aided diagnosis (CAD x ) approaches are developed towards the effective discrimination between benign and malignant clusters of microcalcifications. Different sources of information are exploited, such as features extracted from the image analysis of the region of interest, features related to the location of the cluster inside the breast, age of the patient and descriptors provided by the radiologists while performing their diagnostic task. A series of different CAD x schemes are implemented, each of which uses a different category of features and adopts a variety of machine learning algorithms and alternative image processing techniques. A novel framework is introduced where these independent diagnostic components are properly combined according to features critical to a radiologist in an attempt to identify the most appropriate CAD x schemes for the case under consideration. An open access database (Digital Database of Screening Mammography (DDSM)) has been elaborated to construct a large dataset with cases of varying subtlety, in order to ensure the development of schemes with high generalization ability, as well as extensive evaluation of their performance. The obtained results indicate that the proposed framework succeeds in improving the diagnostic procedure, as the achieved overall classification performance outperforms all the independent single diagnostic components, as well as the radiologists that assessed the same cases, in terms of accuracy, sensitivity, specificity and area under the curve following receiver operating characteristic analysis.

  11. Fused man-machine classification schemes to enhance diagnosis of breast microcalcifications

    International Nuclear Information System (INIS)

    Andreadis, Ioannis; Sevastianos, Chatzistergos; Konstantina, Nikita; George, Spyrou

    2017-01-01

    Computer aided diagnosis (CAD x ) approaches are developed towards the effective discrimination between benign and malignant clusters of microcalcifications. Different sources of information are exploited, such as features extracted from the image analysis of the region of interest, features related to the location of the cluster inside the breast, age of the patient and descriptors provided by the radiologists while performing their diagnostic task. A series of different CAD x schemes are implemented, each of which uses a different category of features and adopts a variety of machine learning algorithms and alternative image processing techniques. A novel framework is introduced where these independent diagnostic components are properly combined according to features critical to a radiologist in an attempt to identify the most appropriate CAD x schemes for the case under consideration. An open access database (Digital Database of Screening Mammography (DDSM)) has been elaborated to construct a large dataset with cases of varying subtlety, in order to ensure the development of schemes with high generalization ability, as well as extensive evaluation of their performance. The obtained results indicate that the proposed framework succeeds in improving the diagnostic procedure, as the achieved overall classification performance outperforms all the independent single diagnostic components, as well as the radiologists that assessed the same cases, in terms of accuracy, sensitivity, specificity and area under the curve following receiver operating characteristic analysis. (paper)

  12. QCD Pomeron in γγ and γ*γ* collisions

    International Nuclear Information System (INIS)

    Kwiecinski, J.; Motyka, L.

    1999-01-01

    Full text: The reaction γγ → J/ΨJ/Ψ is discussed assuming dominance of the QCD BFKL pomeron exchange. We give prediction for the cross-section of this process for LEP2 and TESLA energies. We solve the BFKL equation in the non-forward configuration taking into account dominant non-leading effects which come from the requirement that the virtuality of the exchanged gluons along the gluon ladder is controlled by their transverse momentum squared. We compare our results with those corresponding to the simple two gluon exchange mechanism and with the BFKL pomeron exchange in the leading logarithmic approximation. The BFKL effects are found to generate a steeper t-dependence than the two gluon exchange. The cross-section is found to increase with increasing CM energy W as (W 2 ) 2λ . The parameter λ is slowly varying with W and takes the values λ ∼ 0.23 - 0.28. The magnitude of the total cross-section for the process γγ → J/ΨJ/Ψ is found to increase from 4 to 26 pb within the energy range accessible at LEP2. The magnitude of the total cross-section for the process e + e - → e + e - J/ΨJ/Ψ with antitagged e + and e - is estimated to be around 0.1 pb at LEP2. We analysed the BFKL pomeron contribution to the γ * γ * collision at high energy incorporating the dominant non-leading effects. We confronted our results with the recent preliminary data from LEP for two tagged leptons and gave predictions for the future linear colliders. (authors)

  13. Gaps between jets in double-Pomeron-exchange processes at the LHC

    CERN Document Server

    Marquet, C; Trzebinski, M; Zlebcik, R

    2013-01-01

    The possibility to measure jet-gap-jet final states in double-Pomeron-exchange events at the LHC is presented. In the context of the ATLAS experiment with additional forward physics detectors, cross sections for different experimental settings and gap definitions are estimated. This is done in the framework of the Forward Physics Monte Carlo interfaced with a perturbative QCD model that successfully reproduces standard jet-gap-jet cross sections at the Tevatron. The extrapolation to LHC energies follows from the Balitsky-Fadin-Kuraev-Lipatov dynamics, implemented in the model at next-to-leading logarithmic accuracy.

  14. Around the laboratories: CERN Peering into the Pomeron; New CP-violation experiment

    Energy Technology Data Exchange (ETDEWEB)

    Anon.

    1992-03-15

    Pomeron Jets - narrow clusters of particles produced in violent collisions - provide a very effective window on the elusive interactions of the quarks and gluons hidden deep inside strongly interacting particles. Predictions of jet production in proton-antiproton collisions depend on knowing the detailed inner structure of the proton, obtained from deep-inelastic lepton-proton interactions. Such predictions agree well with measurements by the big experiments at the CERN and Fermilab proton-antiproton colliders. However there is very little sensitivity to that 'soft' part of the proton structure carrying only a small fraction of the total momentum (called small x in the trade)

  15. Pomeron Odderon interference in production of pi-pi pairs at LHC

    International Nuclear Information System (INIS)

    Wallon, S.; Pire, B.; Schwennsen, F.; Szymanowski, L.

    2009-01-01

    The experimental evidence for Odderon exchange processes is still weak. In this talk, we will show that the Odderon could be observed by interference effects with the Pomeron in charge asymmetries in the production of two pion pairs. After discussing the theoretical framework for our calculation based on high energy factorization and the necessary phenomenological input, the calculation of the charge asymmetry and its result will be presented. We will conclude with a discussion of experimental rates to be expected in ultra-peripheral collisions at the LHC. (author)

  16. Running coupling and pomeron loop effects on inclusive and diffractive DIS cross sections

    Energy Technology Data Exchange (ETDEWEB)

    Ducati, M.B. Gay [Universidade Federal do Rio Grande do Sul, Instituto de Fisica, Porto Alegre (Brazil); CERN, PH-TH, Geneva (Switzerland); Oliveira, E.G. de [Universidade de Sao Paulo, Instituto de Fisica, Sao Paulo (Brazil); Santana Amaral, J.T. de [Universidade Federal de Pelotas, Instituto de Fisica e Matematica, Pelotas (Brazil)

    2012-11-15

    Within the framework of a (1+1)-dimensional model which mimics high-energy QCD, we study the behavior of the cross sections for inclusive and diffractive deep inelastic {gamma} {sup *} h scattering cross sections. We analyze the cases of both fixed and running coupling within the mean-field approximation, in which the evolution of the scattering amplitude is described by the Balitsky-Kovchegov equation, and also through the pomeron loop equations, which include in the evolution the gluon number fluctuations. In the diffractive case, similarly to the inclusive one, suppression of the diffusive scaling, as a consequence of the inclusion of the running of the coupling, is observed. (orig.)

  17. Running coupling and pomeron loop effects on inclusive and diffractive DIS cross sections

    International Nuclear Information System (INIS)

    Ducati, M.B. Gay; Oliveira, E.G. de; Santana Amaral, J.T. de

    2012-01-01

    Within the framework of a (1+1)-dimensional model which mimics high-energy QCD, we study the behavior of the cross sections for inclusive and diffractive deep inelastic γ * h scattering cross sections. We analyze the cases of both fixed and running coupling within the mean-field approximation, in which the evolution of the scattering amplitude is described by the Balitsky-Kovchegov equation, and also through the pomeron loop equations, which include in the evolution the gluon number fluctuations. In the diffractive case, similarly to the inclusive one, suppression of the diffusive scaling, as a consequence of the inclusion of the running of the coupling, is observed. (orig.)

  18. Around the laboratories: CERN Peering into the Pomeron; New CP-violation experiment

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    Pomeron Jets - narrow clusters of particles produced in violent collisions - provide a very effective window on the elusive interactions of the quarks and gluons hidden deep inside strongly interacting particles. Predictions of jet production in proton-antiproton collisions depend on knowing the detailed inner structure of the proton, obtained from deep-inelastic lepton-proton interactions. Such predictions agree well with measurements by the big experiments at the CERN and Fermilab proton-antiproton colliders. However there is very little sensitivity to that 'soft' part of the proton structure carrying only a small fraction of the total momentum (called small x in the trade)

  19. Running coupling and pomeron loop effects on inclusive and diffractive DIS cross sections

    CERN Document Server

    Gay Ducati, M.B.; de Santana Amaral, J.T.

    2012-01-01

    Within the framework of a (1+1)--dimensional model which mimics high energy QCD, we study the behavior of the cross sections for inclusive and diffractive deep inelastic $\\gamma^*h$ scattering cross sections. We analyze the cases of both fixed and running coupling within the mean field approximation, in which the evolution of the scattering amplitude is described by the Balitsky-Kovchegov equation, and also through the pomeron loop equations, which include in the evolution the gluon number fluctuations. In the diffractive case, similarly to the inclusive one, the suppression of the diffusive scaling, as a consequence of the inclusion of the running of the coupling, is observed.

  20. The perturbative (QCD) Pomeron and Odderon in the photon initiated reactions

    International Nuclear Information System (INIS)

    Ginzburg, I.F.

    1992-07-01

    The cross sections of neutral meson M production in the exclusive γγ → MM', γq → Mq or semiexclusive γγ → MX processes (two or three gluon exchange) in the semihard region s≥|t|>1 GeV 2 , μ 2 ≤M X 2 <|t| are calculated. The relation of investigated processes to the problem of the perturbative Pomeron and Odderon is discussed. The possibility of measurements is also discussed. (author) 23 refs.; 3 figs

  1. Segmentation Scheme for Safety Enhancement of Engineered Safety Features Component Control System

    International Nuclear Information System (INIS)

    Lee, Sangseok; Sohn, Kwangyoung; Lee, Junku; Park, Geunok

    2013-01-01

    Common Caused Failure (CCF) or undetectable failure would adversely impact safety functions of ESF-CCS in the existing nuclear power plants. We propose the segmentation scheme to solve these problems. Main function assignment to segments in the proposed segmentation scheme is based on functional dependency and critical function success path by using the dependency depth matrix. The segment has functional independence and physical isolation. The segmentation structure is that prohibit failure propagation to others from undetectable failures. Therefore, the segmentation system structure has robustness to undetectable failures. The segmentation system structure has functional diversity. The specific function in the segment defected by CCF, the specific function could be maintained by diverse control function that assigned to other segments. Device level control signals and system level control signals are separated and also control signal and status signals are separated due to signal transmission paths are allocated independently based on signal type. In this kind of design, single device failure or failures on signal path in the channel couldn't result in the loss of all segmented functions simultaneously. Thus the proposed segmentation function is the design scheme that improves availability of safety functions. In conventional ESF-CCS, the single controller generates the signal to control the multiple safety functions, and the reliability is achieved by multiplication within the channel. This design has a drawback causing the loss of multiple functions due to the CCF (Common Cause Failure) and single failure Heterogeneous controller guarantees the diversity ensuring the execution of safety functions against the CCF and single failure, but requiring a lot of resources like manpower and cost. The segmentation technology based on the compartmentalization and functional diversification decreases the CCF and single failure nonetheless the identical types of controllers

  2. Segmentation Scheme for Safety Enhancement of Engineered Safety Features Component Control System

    Energy Technology Data Exchange (ETDEWEB)

    Lee, Sangseok; Sohn, Kwangyoung [Korea Reliability Technology and System, Daejeon (Korea, Republic of); Lee, Junku; Park, Geunok [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2013-05-15

    Common Caused Failure (CCF) or undetectable failure would adversely impact safety functions of ESF-CCS in the existing nuclear power plants. We propose the segmentation scheme to solve these problems. Main function assignment to segments in the proposed segmentation scheme is based on functional dependency and critical function success path by using the dependency depth matrix. The segment has functional independence and physical isolation. The segmentation structure is that prohibit failure propagation to others from undetectable failures. Therefore, the segmentation system structure has robustness to undetectable failures. The segmentation system structure has functional diversity. The specific function in the segment defected by CCF, the specific function could be maintained by diverse control function that assigned to other segments. Device level control signals and system level control signals are separated and also control signal and status signals are separated due to signal transmission paths are allocated independently based on signal type. In this kind of design, single device failure or failures on signal path in the channel couldn't result in the loss of all segmented functions simultaneously. Thus the proposed segmentation function is the design scheme that improves availability of safety functions. In conventional ESF-CCS, the single controller generates the signal to control the multiple safety functions, and the reliability is achieved by multiplication within the channel. This design has a drawback causing the loss of multiple functions due to the CCF (Common Cause Failure) and single failure Heterogeneous controller guarantees the diversity ensuring the execution of safety functions against the CCF and single failure, but requiring a lot of resources like manpower and cost. The segmentation technology based on the compartmentalization and functional diversification decreases the CCF and single failure nonetheless the identical types of

  3. New PDE-based methods for image enhancement using SOM and Bayesian inference in various discretization schemes

    International Nuclear Information System (INIS)

    Karras, D A; Mertzios, G B

    2009-01-01

    A novel approach is presented in this paper for improving anisotropic diffusion PDE models, based on the Perona–Malik equation. A solution is proposed from an engineering perspective to adaptively estimate the parameters of the regularizing function in this equation. The goal of such a new adaptive diffusion scheme is to better preserve edges when the anisotropic diffusion PDE models are applied to image enhancement tasks. The proposed adaptive parameter estimation in the anisotropic diffusion PDE model involves self-organizing maps and Bayesian inference to define edge probabilities accurately. The proposed modifications attempt to capture not only simple edges but also difficult textural edges and incorporate their probability in the anisotropic diffusion model. In the context of the application of PDE models to image processing such adaptive schemes are closely related to the discrete image representation problem and the investigation of more suitable discretization algorithms using constraints derived from image processing theory. The proposed adaptive anisotropic diffusion model illustrates these concepts when it is numerically approximated by various discretization schemes in a database of magnetic resonance images (MRI), where it is shown to be efficient in image filtering and restoration applications

  4. A Safety Enhancement Broadcasting Scheme Based on Context Sensing in VANETs

    Directory of Open Access Journals (Sweden)

    Chen Chen

    2016-01-01

    Full Text Available The broadcasting plays a vital role for context awareness in VANETs (Vehicular Ad Hoc Networks whose primary goal is to improve the driving safety depending on effective information exchanging. In this paper, based on the LQG (linear quadratic Gaussian optimal control theory, a broadcasting control scheme named LQG-CCA is proposed to improve the network throughput thus increasing the opportunities for the safety-related events to be successfully handled. By predicting the network throughput with the Kalman filter model, our LQG model is envisioned to minimize the difference between the predicted and expected throughput through the adjustment of CCA (Clear Channel Assessment sensing threshold. Numerical results show that our proposed model can significantly improve the network performance in terms of average throughput, average End-to-End delay, and average packets delivery ratio compared with a highly cited work D-FPAV and a latest published model APPR.

  5. Enhanced hole boring with two-color relativistic laser pulses in the fast ignition scheme

    Energy Technology Data Exchange (ETDEWEB)

    Yu, Changhai; Tian, Ye; Li, Wentao; Wang, Wentao; Zhang, Zhijun; Qi, Rong; Wang, Cheng [State Key Laboratory of High Field Laser Physics, Shanghai Institute of Optics and Fine Mechanics, Chinese Academy of Sciences, Shanghai 201800 (China); Deng, Aihua, E-mail: aihuadeng1985@gmail.com [Department of Physics and Astronomy, University of California, Los Angeles, California 90095 (United States); Liu, Jiansheng, E-mail: michaeljs-liu@siom.ac.cn [State Key Laboratory of High Field Laser Physics, Shanghai Institute of Optics and Fine Mechanics, Chinese Academy of Sciences, Shanghai 201800 (China); Collaborative Innovation Center of IFSA (CICIFSA), Shanghai Jiao Tong University, Shanghai 200240 (China)

    2016-08-15

    A scheme of using two-color laser pulses for hole boring into overdense plasma as well as energy transfer into electron and ion beams has been studied using particle-in-cell simulations. Following an ultra-short ultra-intense hole-boring laser pulse with a short central wavelength in extreme ultra-violet range, the main infrared driving laser pulse can be guided in the hollow channel preformed by the former laser and propagate much deeper into an overdense plasma, as compared to the case using the infrared laser only. In addition to efficiently transferring the main driving laser energy into energetic electrons and ions generation deep inside the overdense plasma, the ion beam divergence can be greatly reduced. The results might be beneficial for the fast ignition concept of inertial confinement fusion.

  6. Digital chaos-masked optical encryption scheme enhanced by two-dimensional key space

    Science.gov (United States)

    Liu, Ling; Xiao, Shilin; Zhang, Lu; Bi, Meihua; Zhang, Yunhao; Fang, Jiafei; Hu, Weisheng

    2017-09-01

    A digital chaos-masked optical encryption scheme is proposed and demonstrated. The transmitted signal is completely masked by interference chaotic noise in both bandwidth and amplitude with analog method via dual-drive Mach-Zehnder modulator (DDMZM), making the encrypted signal analog, noise-like and unrecoverable by post-processing techniques. The decryption process requires precise matches of both the amplitude and phase between the cancellation and interference chaotic noises, which provide a large two-dimensional key space with the help of optical interference cancellation technology. For 10-Gb/s 16-quadrature amplitude modulation (QAM) orthogonal frequency division multiplexing (OFDM) signal over the maximum transmission distance of 80 km without dispersion compensation or inline amplifier, the tolerable mismatch ranges of amplitude and phase/delay at the forward error correction (FEC) threshold of 3.8×10-3 are 0.44 dB and 0.08 ns respectively.

  7. Forward gluon production in hadron-hadron scattering with Pomeron loops

    Energy Technology Data Exchange (ETDEWEB)

    Iancu, E. [CEA Saclay, Service de Physique Th orique (DSM/SPhT), Unite de recherche associ e au CNRS (URA D2306), 91 - Gif-sur-Yvette (France). Direction des Sciences de la Matiere; Marquet, C.; Soyez, G. [CEA Saclay, Service de Physique Th orique (DSM/SPhT), Unite de recherche associ e au CNRS (URA D2306), 91 - Gif-sur-Yvette (France). Direction des Sciences de la Matiere; Liege Univ., Fundamental Theoretical Physics Group (Belgium)

    2006-07-01

    We discuss new physical phenomena expected in particle production in hadron-hadron collisions at high energy, as a consequence of Pomerons loop effects in the evolution equations for the Color Glass Condensate. We focus on gluon production in asymmetric, 'dilute-dense', collisions: a dilute projectile scatters off a dense hadronic target, whose gluon distribution is highly evolved. This situation is representative for particle production in proton-proton collisions at forward rapidities (say, at LHC) and admits a dipole factorization similar to that of deep inelastic scattering (DIS). We show that at sufficiently large forward rapidities, where the Pomerons loop effects become important in the evolution of the target wavefunction, gluon production is dominated by 'black spots' (saturated gluon configurations) up to very large values of the transverse momentum, well above the average saturation momentum in the target. In this regime, the produced gluon spectrum exhibits diffusive scaling, so like DIS at sufficiently high energy. (authors)

  8. An Enhanced Islanding Microgrid Reactive Power, Imbalance Power, and Harmonic Power Sharing Scheme

    DEFF Research Database (Denmark)

    He, Jinwei; Lin, Yun Wei; Blaabjerg, Frede

    2015-01-01

    To address inaccurate power sharing problems in autonomous islanding microgrids, an enhanced droop control method through online virtual impedance adjustment is proposed. First, a term associated with DG reactive power, imbalance power, or harmonic power is added to the conventional real power...

  9. An islanding microgrid reactive power sharing scheme enhanced by programmed virtual impedances

    DEFF Research Database (Denmark)

    He, Jinwei; Li, Yun Wei; Guerrero, Josep M.

    2012-01-01

    harmonic currents. With the knowledge of feeder impedances, reactive power sharing performance can be enhanced by the regulation of DG unit output virtual impedance. The proposed method realizes accurate real and reactive power sharing in proportion to DG unit rated power. Simulated and experimental...

  10. Improved Association and Disassociation Scheme for Enhanced WLAN Handover and VHO

    Directory of Open Access Journals (Sweden)

    Sungjin Shin

    2016-01-01

    Full Text Available The number of mobile devices and wireless connections is significantly increasing. Among many wireless protocol types, wireless local area networks (WLANs are expected to support a significant number of devices. Due to this reason, effective and efficient handover (HO and vertical handover (VHO support for WLAN mobile devices is important. A significant improvement in quality of service (QoS can be obtained by reducing the association and disassociation interruption time for user equipment (UE servicing real-time applications during WLAN HO and VHO operations. Based on this focus, this paper investigates the problem of using only the received signal strength indicator (RSSI in HO and VHO decisions, which is what the current IEEE 802.11 based WLAN systems use. Experimental results presented in this paper demonstrate that only using the RSSI results in significant interruption time during HO to another WLAN access point (AP or to a cellular base station during VHO. Therefore, in this paper, an improved association and disassociation scheme that can reduce the data interruption time (DIT and improve the throughput performance is proposed.

  11. Prediction Schemes to Enhance the Routing Process in Geographical GPSR Ad Hoc Protocol

    Directory of Open Access Journals (Sweden)

    Raed Saqour

    2007-01-01

    Full Text Available Geographical routing protocols have received a serious attention due to more advantages they have in comparison to the conventional routing protocols. They require information about the physical position of nodes needed to be available. Commonly, each node determines its own position through the use of Global Positioning System (GPS or some other type of positioning service. Greedy Perimeter Stateless Routing (GPSR protocol, which is one of geographical routing protocols, limits the forwarding decision of the packet based on the node's own position, the destination's position and the position of the forwarding node's neighbors. Location information has some inaccuracy depending on the localization system and the environment exists in. This paper aims to study the impact of mobility metrics (beacon interval, and node speed on introducing location information error in GPSR protocol using different mobility models. The effect of these metrics is identified in GPSR as Neighbor Break Link (NBL problem. Based on simulation analysis, mobility prediction schemes are proposed to migrate the observed problem.

  12. Brightness-preserving fuzzy contrast enhancement scheme for the detection and classification of diabetic retinopathy disease.

    Science.gov (United States)

    Datta, Niladri Sekhar; Dutta, Himadri Sekhar; Majumder, Koushik

    2016-01-01

    The contrast enhancement of retinal image plays a vital role for the detection of microaneurysms (MAs), which are an early sign of diabetic retinopathy disease. A retinal image contrast enhancement method has been presented to improve the MA detection technique. The success rate on low-contrast noisy retinal image analysis shows the importance of the proposed method. Overall, 587 retinal input images are tested for performance analysis. The average sensitivity and specificity are obtained as 95.94% and 99.21%, respectively. The area under curve is found as 0.932 for the receiver operating characteristics analysis. The classifications of diabetic retinopathy disease are also performed here. The experimental results show that the overall MA detection method performs better than the current state-of-the-art MA detection algorithms.

  13. Toward enhanced learning of science: An educational scheme for informal science institutions

    Science.gov (United States)

    Suzuki, Midori

    Current educational operation for informal science institutions tend to be based on the staff's experience and intuition rather than on educational theories or research findings. This status study sought research evidence for an educational scheme to give informal science institutions. Evidence for this scheme came from surveys to determine specific circumstances of educational operations and visitor behaviors. The Provus discrepancy model, seeking gaps between the actual and desired states, guided this investigation of how informal science education institution staff view the nature and status of educational operations. Another investigation sought visitors' views of the effectiveness of the main idea for exhibit understanding (n=68 for each group of with the main idea and without the main idea), effective labels (n=68), expectations toward on-site lessons(n=22 and 65 for student groups, and n=2 for teachers), and possibilities for assessments of museum operations. Institutional data were collected via a web portal, with a separate site created for administrators (n=41), exhibit developers (n=21), and program planners (n=35). The survey asked about actual and desired states in terms of goals and roles of staff, contents of exhibits and programs, assessment, and professional development. The four visitor surveys were administered individually at the North Carolina Museum of Natural Sciences. The institutional survey found that most institutions focus on attitudinal reinforcement rather than visitor learning, do not overtly value research or long-term assessment, and value partnerships with K-12 schools more than other groups. It is also clarified that the staff do not have a clear vision of the nature or function of an operations manuals. Large gaps were found between the actual and desired states in terms of assessment (administrators, exhibit developers, and program planners), professional development (exhibit developers and program planners), and partnerships

  14. Enhanced machine learning scheme for energy efficient resource allocation in 5G heterogeneous cloud radio access networks

    KAUST Repository

    Alqerm, Ismail

    2018-02-15

    Heterogeneous cloud radio access networks (H-CRAN) is a new trend of 5G that aims to leverage the heterogeneous and cloud radio access networks advantages. Low power remote radio heads (RRHs) are exploited to provide high data rates for users with high quality of service requirements (QoS), while high power macro base stations (BSs) are deployed for coverage maintenance and low QoS users support. However, the inter-tier interference between the macro BS and RRHs and energy efficiency are critical challenges that accompany resource allocation in H-CRAN. Therefore, we propose a centralized resource allocation scheme using online learning, which guarantees interference mitigation and maximizes energy efficiency while maintaining QoS requirements for all users. To foster the performance of such scheme with a model-free learning, we consider users\\' priority in resource blocks (RBs) allocation and compact state representation based learning methodology to enhance the learning process. Simulation results confirm that the proposed resource allocation solution can mitigate interference, increase energy and spectral efficiencies significantly, and maintain users\\' QoS requirements.

  15. Structure of Z-scheme CdS/CQDs/BiOCl heterojunction with enhanced photocatalytic activity for environmental pollutant elimination

    Science.gov (United States)

    Pan, Jinbo; Liu, Jianjun; Zuo, Shengli; Khan, Usman Ali; Yu, Yingchun; Li, Baoshan

    2018-06-01

    Z-scheme CdS/CQDs/BiOCl heterojunction was synthesized by a facile region-selective deposition process. Owing to the electronegativity of the groups on the surface of Carbon Quantum Dots (CQDs), they can be sandwiched between CdS and BiOCl, based on the stepwise region-selective deposition process. The samples were systematically characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), high resolution TEM (HRTEM), X-ray photoelectron spectroscopy (XPS), UV-vis diffuse reflectance spectroscopy (UV-vis DRS), photoelectrochemical measurements and photoluminescence (PL). The results indicate that CQDs with size of 2-5 nm and CdS nanoparticles with size of 5-10 nm dispersed uniformly on the surface of cuboid BiOCl nanosheets. The photocatalytic performance tests reveal that the CdS/CQDs/BiOCl heterojunction exhibits much higher photocatalytic activity than that of BiOCl, CdS/BiOCl and CQDs/BiOCl for Rhodamine B (RhB) and phenol photodegradation under visible and UV light illumination, respectively. The enhanced photocatalytic performance should be attributed to the Z-scheme structure of CdS/CQDs/BiOCl, which not only improves visible light absorption and the migration efficiency of the photogenerated electron-holes but also keeps high redox ability of CdS/CQDs/BiOCl composite.

  16. Generalized Encoding CRDSA: Maximizing Throughput in Enhanced Random Access Schemes for Satellite

    Directory of Open Access Journals (Sweden)

    Manlio Bacco

    2014-12-01

    Full Text Available This work starts from the analysis of the literature about the Random Access protocols with contention resolution, such as Contention Resolution Diversity Slotted Aloha (CRDSA, and introduces a possible enhancement, named Generalized Encoding Contention Resolution Diversity Slotted Aloha (GE-CRDSA. The GE-CRDSA aims at improving the aggregated throughput when the system load is less than 50%, playing on the opportunity of transmitting an optimal combination of information and parity packets frame by frame. This paper shows the improvement in terms of throughput, by performing traffic estimation and adaptive choice of information and parity rates, when a satellite network undergoes a variable traffic load profile.

  17. A new reconfiguration scheme for voltage stability enhancement of radial distribution systems

    International Nuclear Information System (INIS)

    Arun, M.; Aravindhababu, P.

    2009-01-01

    Network reconfiguration is an operation problem, which entails altering the topological structure of the distribution feeders by rearranging the status of switches in order to obtain an optimal configuration in order to minimise the system losses. This paper presents a new reconfiguration algorithm that enhances voltage stability and improves the voltage profile besides minimising losses without incurring any additional cost for installation of capacitors, tap changing transformers and related switching equipment in the distribution system. Test results on a 69 node distribution system reveal the superiority of this algorithm.

  18. Control Strategies for Islanded Microgrid using Enhanced Hierarchical Control Structure with Multiple Current-Loop Damping Schemes

    DEFF Research Database (Denmark)

    Han, Yang; Shen, Pan; Zhao, Xin

    2017-01-01

    In this paper, the modeling, controller design, and stability analysis of the islanded microgrid (MG) using enhanced hierarchical control structure with multiple current loop damping schemes is proposed. The islanded MG is consisted of the parallel-connected voltage source inverters using LCL...... output filters, and the proposed control structure includes: the primary control with additional phase-shift loop, the secondary control for voltage amplitude and frequency restoration, the virtual impedance loops which contains virtual positive- and negative-sequence impedance loops at fundamental...... frequency, and virtual variable harmonic impedance loop at harmonic frequencies, and the inner voltage and current loop controllers. A small-signal model for the primary and secondary controls with additional phase-shift loop is presented, which shows an over-damped feature from eigenvalue analysis...

  19. An Islanding Microgrid Power Sharing Approach Using Enhanced Virtual Impedance Control Scheme

    DEFF Research Database (Denmark)

    He, Jinwei; Li, Yun Wei; Guerrero, Josep M.

    2013-01-01

    In order to address the load sharing problem in islanding microgrids, this paper proposes an enhanced distributed generation (DG) unit virtual impedance control approach. The proposed method can realize accurate regulation of DG unit equivalent impedance at both fundamental and selected harmonic...... and PCC harmonic voltage compensation are achieved without using any fundamental and harmonic components extractions. Experimental results from a scaled single-phase microgrid prototype are provided to validate the feasibility of the proposed virtual impedance control approach....... frequencies. In contrast to conventional virtual impedance control methods, where only a line current feed-forward term is added to the DG voltage reference, the proposed virtual impedance at fundamental and harmonic frequencies is regulated using DG line current and point of common coupling (PCC) voltage...

  20. A Dynamic Reallocation Based Window Access Scheme for Enhancing QoS of Vehicular Ad-hoc Networks (VANETs

    Directory of Open Access Journals (Sweden)

    Md. Amirul Islam

    2018-01-01

    Full Text Available This article proposes a new MAC scheme for Vehicle-to-Infrastructure (V2I communications that dynamically reallocates unused TDMA slots. By maintaining a balanced waiting time, the proposed TDMA based scheduling scheme allocates TDMA slots in a rational way to minimize merging and one-hop neighboring collision. The proposed scheme ensures dynamic reallocation of unused slots by using “time slot reassignment” mechanism. The scheme has been simulated in VEINS framework of OMNET++ network simulator and its performance has been compared with other conventional protocols. Experimental results show that our scheme performs better than existing schemes in terms of successfully transmitted data packets.

  1. 'Students-as-partners' scheme enhances postgraduate students' employability skills while addressing gaps in bioinformatics education.

    Science.gov (United States)

    Mello, Luciane V; Tregilgas, Luke; Cowley, Gwen; Gupta, Anshul; Makki, Fatima; Jhutty, Anjeet; Shanmugasundram, Achchuthan

    2017-01-01

    Teaching bioinformatics is a longstanding challenge for educators who need to demonstrate to students how skills developed in the classroom may be applied to real world research. This study employed an action research methodology which utilised student-staff partnership and peer-learning. It was centred on the experiences of peer-facilitators, students who had previously taken a postgraduate bioinformatics module, and had applied knowledge and skills gained from it to their own research. It aimed to demonstrate to peer-receivers, current students, how bioinformatics could be used in their own research while developing peer-facilitators' teaching and mentoring skills. This student-centred approach was well received by the peer-receivers, who claimed to have gained improved understanding of bioinformatics and its relevance to research. Equally, peer-facilitators also developed a better understanding of the subject and appreciated that the activity was a rare and invaluable opportunity to develop their teaching and mentoring skills, enhancing their employability.

  2. An enhanced forest classification scheme for modeling vegetation-climate interactions based on national forest inventory data

    Science.gov (United States)

    Majasalmi, Titta; Eisner, Stephanie; Astrup, Rasmus; Fridman, Jonas; Bright, Ryan M.

    2018-01-01

    Forest management affects the distribution of tree species and the age class of a forest, shaping its overall structure and functioning and in turn the surface-atmosphere exchanges of mass, energy, and momentum. In order to attribute climate effects to anthropogenic activities like forest management, good accounts of forest structure are necessary. Here, using Fennoscandia as a case study, we make use of Fennoscandic National Forest Inventory (NFI) data to systematically classify forest cover into groups of similar aboveground forest structure. An enhanced forest classification scheme and related lookup table (LUT) of key forest structural attributes (i.e., maximum growing season leaf area index (LAImax), basal-area-weighted mean tree height, tree crown length, and total stem volume) was developed, and the classification was applied for multisource NFI (MS-NFI) maps from Norway, Sweden, and Finland. To provide a complete surface representation, our product was integrated with the European Space Agency Climate Change Initiative Land Cover (ESA CCI LC) map of present day land cover (v.2.0.7). Comparison of the ESA LC and our enhanced LC products (https://doi.org/10.21350/7zZEy5w3) showed that forest extent notably (κ = 0.55, accuracy 0.64) differed between the two products. To demonstrate the potential of our enhanced LC product to improve the description of the maximum growing season LAI (LAImax) of managed forests in Fennoscandia, we compared our LAImax map with reference LAImax maps created using the ESA LC product (and related cross-walking table) and PFT-dependent LAImax values used in three leading land models. Comparison of the LAImax maps showed that our product provides a spatially more realistic description of LAImax in managed Fennoscandian forests compared to reference maps. This study presents an approach to account for the transient nature of forest structural attributes due to human intervention in different land models.

  3. Reggeon, Pomeron and Glueball, Odderon-Hadron-Hadron Interaction at High Energies--From Regge Theory to Quantum Chromodynamics

    Institute of Scientific and Technical Information of China (English)

    XIONG Wen-Yuan; HU Zhao-Hui; WANG Xin-Wen; ZHOU Li-Juan; XIA Li-Xin; MA Wei-Xing

    2008-01-01

    Based on analysis of scattering matrix S, and its properties such as analyticity, unitarity, Lorentz invariance, and crossing symmetry relation, the Regge theory was proposed to describe hadron-hadron scattering at high energies before the advent of QCD, and correspondingly a Reggeon concept was born as a mediator of strongly interaction. This theory serves as a successful approach and has explained a great number of experimental data successfully, which proves that the Regge theory can be regarded as a basic theory of hadron interaction at high energies and its validity in many applications. However, as new experimental data come out, we have some difficulties in explaining the data. The new experimental total cross section violates the predictions of Regge theory, which shows that Regge formalism is limited in its applications to high energy data. To understand new experimental measurements, a new exchange theory was consequently born and its mediator is called Pomeron, which has vacuum quantum numbers. The new theory named as Pomeron exchange theory which reproduces the new experimental data of diffractive processes successfully. There are two exchange mediators: Reggeon and Pomeron. Reggeon exchange theory can only produce data at the relatively lower energy region, while Pomeron exchange theory fits the data only at higher-energy region, separately. In order to explain the data in the whole energy region, we propose a Reggeon-Pomeron model to describe high-energy hadron-hadron scattering and other diffractive processes. Although the Reggeon-Pomeron model is successful in describing high-energy hadron-hadron interaction in the whole energy region, it is a phenomenological model After the advent of QCD, people try to reveal the mystery of the phenomenological theory from QCD since hadron-hadron processes is a strong interaction, which is believed to be described by QCD. According to this point of view, we study the QCD nature of Reggeon and Pomeron. We claim

  4. Heavy quark-antiquark pair production by double pomeron exchange in pp and AA collisions on the CMS

    International Nuclear Information System (INIS)

    Agababyan, N.M.; Ajrapetyan, M.G.; Galoyan, A.S.; Zarubin, P.I.; Malakhov, A.I.; Melkumov, G.L.; Chatrchyan, S.A.; Enkovskij, L.L.

    1998-01-01

    Events in hadronic and nuclear collisions, which contain a central dijet system together with the two quasi-elastically scattered beam particles are usually described by double pomeron scattering. We investigate these processes for central production of heavy quark-antiquark pairs on the LHC by using the CMS detector. The total and differential cross sections with the formation of cc bar and bb bar pairs for various interactions assumed to a realization on the LHC are evaluated. It is especially marked that this process can be used for investigations of various aspects of low-x physics, for instance, for a research of the gluon and quark distributions in the pomerons, the factorization hypothesis, coherent interaction of nuclei, nuclei shadowing and so on

  5. One-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures for enhanced hydrogen generation

    Energy Technology Data Exchange (ETDEWEB)

    Gao, Hongqing [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Zhang, Peng, E-mail: Zhangp@zzu.edu.cn [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Hu, Junhua, E-mail: Hujh@zzu.edu.cn [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Pan, Jimin [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); Fan, Jiajie [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Shao, Guosheng [School of Materials Science and Engineering, Zhengzhou University, Zhengzhou 450001 (China); State Centre for International Cooperation on Designer Low-carbon and Environmental Materials (SCICDLCEM), Zhengzhou University, Zhengzhou 450001, Henan (China); Institute for Renewable Energy and Environmental Technologies, University of Bolton, Bolton BL35AB (United Kingdom)

    2017-01-01

    Graphical abstract: We reported one-dimensional solid-state Z-scheme photosynthetic heterojunction system with Pt nanoparticle as an electron collector and WO{sub 3} as a hole collector, leading to effective charge separation. - Highlights: • The composite nanofibers were fabricated by facile electrospinning technique. • The composite nanofibers exhibited enhanced activity for H{sub 2} evolution. • Enhanced activity is due to the formation of Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterojunction. - Abstract: One-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures were fabricated by integrating a facile electrospinning technique and subsequent annealing in air. X-ray diffraction, scanning electron microscopy, transmission electron microscopy, X-ray photoelectron spectroscopy and UV–vis diffuse reflectance spectroscopy, were used to characterize the as-fabricated samples. The results showed that the H{sub 2}-generation of the as-fabricated one-dimensional Z-scheme TiO{sub 2}/WO{sub 3}/Pt heterostructures (S2) was greatly enhanced compared with pure TiO{sub 2} nanofibers (S0) and TiO{sub 2}/WO{sub 3} nanofibers (S1). The enhanced photocatalyst activities were mainly attributed to the solid-state Z-scheme photosynthetic heterojunction system with Pt nanoparticle as an electron collector and WO{sub 3} as a hole collector, leading to effective charge separation on these semiconductors, which were evidenced by electrochemical impedance spectroscopy (EIS) and photocurrent analysis.

  6. Enhanced nonlinearity interval mapping scheme for high-performance simulation-optimization of watershed-scale BMP placement

    Science.gov (United States)

    Zou, Rui; Riverson, John; Liu, Yong; Murphy, Ryan; Sim, Youn

    2015-03-01

    Integrated continuous simulation-optimization models can be effective predictors of a process-based responses for cost-benefit optimization of best management practices (BMPs) selection and placement. However, practical application of simulation-optimization model is computationally prohibitive for large-scale systems. This study proposes an enhanced Nonlinearity Interval Mapping Scheme (NIMS) to solve large-scale watershed simulation-optimization problems several orders of magnitude faster than other commonly used algorithms. An efficient interval response coefficient (IRC) derivation method was incorporated into the NIMS framework to overcome a computational bottleneck. The proposed algorithm was evaluated using a case study watershed in the Los Angeles County Flood Control District. Using a continuous simulation watershed/stream-transport model, Loading Simulation Program in C++ (LSPC), three nested in-stream compliance points (CP)—each with multiple Total Maximum Daily Loads (TMDL) targets—were selected to derive optimal treatment levels for each of the 28 subwatersheds, so that the TMDL targets at all the CP were met with the lowest possible BMP implementation cost. Genetic Algorithm (GA) and NIMS were both applied and compared. The results showed that the NIMS took 11 iterations (about 11 min) to complete with the resulting optimal solution having a total cost of 67.2 million, while each of the multiple GA executions took 21-38 days to reach near optimal solutions. The best solution obtained among all the GA executions compared had a minimized cost of 67.7 million—marginally higher, but approximately equal to that of the NIMS solution. The results highlight the utility for decision making in large-scale watershed simulation-optimization formulations.

  7. Improving Rydberg Excitations within Time-Dependent Density Functional Theory with Generalized Gradient Approximations: The Exchange-Enhancement-for-Large-Gradient Scheme.

    Science.gov (United States)

    Li, Shaohong L; Truhlar, Donald G

    2015-07-14

    Time-dependent density functional theory (TDDFT) with conventional local and hybrid functionals such as the local and hybrid generalized gradient approximations (GGA) seriously underestimates the excitation energies of Rydberg states, which limits its usefulness for applications such as spectroscopy and photochemistry. We present here a scheme that modifies the exchange-enhancement factor to improve GGA functionals for Rydberg excitations within the TDDFT framework while retaining their accuracy for valence excitations and for the thermochemical energetics calculated by ground-state density functional theory. The scheme is applied to a popular hybrid GGA functional and tested on data sets of valence and Rydberg excitations and atomization energies, and the results are encouraging. The scheme is simple and flexible. It can be used to correct existing functionals, and it can also be used as a strategy for the development of new functionals.

  8. arXiv Leading Pomeron Contributions and the TOTEM Data at 13 TeV

    CERN Document Server

    Broilo, M.; Menon, M.J.

    The recent data by the TOTEM Collaboration on $\\sigma_{tot}$ and $\\rho$ at 13 TeV, have shown agreement with a leading Odderon contribution at the highest energies, as demonstrated in the very recent analysis by Martynov and Nicolescu (MN). In order to investigate the same dataset by means of Pomeron dominance, we introduce a general class of forward scattering amplitude, with leading contributions even under crossing, associated with simple, double and triple poles in the complex angular momentum plane. For the lower energy region, we consider the usual non-degenerated Regge trajectories, with even and odd symmetry. The analytic connection between $\\sigma_{tot}$ and $\\rho$ is obtained by means of dispersion relations and we carry out fits to $pp$ and $\\bar{p}p$ data in the interval $\\sqrt{s}=5$ GeV - 13 TeV; following MN we consider only the TOTEM data at the LHC energy region. From the fits, we conclude that the general analytic model, as well as some particular cases representing standard parameterizations...

  9. A Hierarchical Z-Scheme α-Fe2 O3 /g-C3 N4 Hybrid for Enhanced Photocatalytic CO2 Reduction.

    Science.gov (United States)

    Jiang, Zhifeng; Wan, Weiming; Li, Huaming; Yuan, Shouqi; Zhao, Huijun; Wong, Po Keung

    2018-03-01

    The challenge in the artificial photosynthesis of fossil resources from CO 2 by utilizing solar energy is to achieve stable photocatalysts with effective CO 2 adsorption capacity and high charge-separation efficiency. A hierarchical direct Z-scheme system consisting of urchin-like hematite and carbon nitride provides an enhanced photocatalytic activity of reduction of CO 2 to CO, yielding a CO evolution rate of 27.2 µmol g -1 h -1 without cocatalyst and sacrifice reagent, which is >2.2 times higher than that produced by g-C 3 N 4 alone (10.3 µmol g -1 h -1 ). The enhanced photocatalytic activity of the Z-scheme hybrid material can be ascribed to its unique characteristics to accelerate the reduction process, including: (i) 3D hierarchical structure of urchin-like hematite and preferable basic sites which promotes the CO 2 adsorption, and (ii) the unique Z-scheme feature efficiently promotes the separation of the electron-hole pairs and enhances the reducibility of electrons in the conduction band of the g-C 3 N 4 . The origin of such an obvious advantage of the hierarchical Z-scheme is not only explained based on the experimental data but also investigated by modeling CO 2 adsorption and CO adsorption on the three different atomic-scale surfaces via density functional theory calculation. The study creates new opportunities for hierarchical hematite and other metal-oxide-based Z-scheme system for solar fuel generation. © 2018 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  10. EFFECTIVENESS OF E-WALLET PRACTICE IN GRASSROOTS AGRICULTURAL SERVICES DELIVERY IN NIGERIA - A CASE STUDY OF KWARA STATE GROWTH ENHANCEMENT SUPPORT SCHEME

    OpenAIRE

    Grace Modupe ADEBO

    2014-01-01

    This study assesses the effectiveness of the usages of mobile phone-based innovations to reaching small scale farmers in Nigeria using Kwara State growth enhancement support scheme as a case study. Two hundred farmers were randomly selected from four local government areas in the state. A structured interview schedule was used for eliciting information from them. The study revealed that 53.5, 51.0 & 87.2 percents of the respondents’ respectively benefited from improved seeds o...

  11. A Key Pre-Distribution Scheme Based on µ-PBIBD for Enhancing Resilience in Wireless Sensor Networks.

    Science.gov (United States)

    Yuan, Qi; Ma, Chunguang; Yu, Haitao; Bian, Xuefen

    2018-05-12

    Many key pre-distribution (KPD) schemes based on combinatorial design were proposed for secure communication of wireless sensor networks (WSNs). Due to complexity of constructing the combinatorial design, it is infeasible to generate key rings using the corresponding combinatorial design in large scale deployment of WSNs. In this paper, we present a definition of new combinatorial design, termed “µ-partially balanced incomplete block design (µ-PBIBD)”, which is a refinement of partially balanced incomplete block design (PBIBD), and then describe a 2-D construction of µ-PBIBD which is mapped to KPD in WSNs. Our approach is of simple construction which provides a strong key connectivity and a poor network resilience. To improve the network resilience of KPD based on 2-D µ-PBIBD, we propose a KPD scheme based on 3-D Ex-µ-PBIBD which is a construction of µ-PBIBD from 2-D space to 3-D space. Ex-µ-PBIBD KPD scheme improves network scalability and resilience while has better key connectivity. Theoretical analysis and comparison with the related schemes show that key pre-distribution scheme based on Ex-µ-PBIBD provides high network resilience and better key scalability, while it achieves a trade-off between network resilience and network connectivity.

  12. The high energy behavior of QCD. The effective action and the triple-Pomeron-vertex

    Energy Technology Data Exchange (ETDEWEB)

    Hentschinski, Martin

    2009-07-15

    We study integrations over light-cone momenta in the high energy effective action of QCD. After a brief review of the effective action, we arrive on a regularization mechanism from matching of effective action diagrams with QCD diagrams, which we apply to a re-derivation of the reggeized gluon and of the BFKL-equation. We study consequences of the proposed regularization on the analytic structure of 2{yields}3 and 2{yields}4 production amplitudes in the Multi-Regge-Kinematics. We derive a certain part of the 1-loop corrections to the production vertex and demonstrate that they yield the on-set of corrections demanded by the Steinmann-relations. The Reggeon-Particle-2-Reggeon vertex is determined and applied to the construction of various signature configurations of the production amplitudes. We extend the proposed regularization method to states of three and four reggeized gluons and propose a supplement to the effective Lagrangian. We derive vertices for the 1-3 and 2-4 reggeized-gluon-transition inside the elastic amplitude and verify that signature conservation is obeyed. Integral equations for the state of three and four reggeized gluons are formulated and shown to be in accordance with a result by Bartels and Wuesthoff. In a second part we investigate the high-energy behavior of QCD for different surface topologies of color graphs. After a brief review of the planar limit (bootstrap and gluon reggeization) and of the cylinder topology (BFKL) we investigate the 3{yields}3 scattering in the triple Regge limit which belongs to the pair-of-pants topology. We re-derive the triple Pomeron vertex function and show that it belongs to a specific set of graphs in color space which we identify as the analog of the Mandelstam diagram. We then extend the study to the high-energy behavior of N=4 SYM where we find a new class of color graphs not present in QCD. (orig.)

  13. The high energy behavior of QCD. The effective action and the triple-Pomeron-vertex

    International Nuclear Information System (INIS)

    Hentschinski, Martin

    2009-07-01

    We study integrations over light-cone momenta in the high energy effective action of QCD. After a brief review of the effective action, we arrive on a regularization mechanism from matching of effective action diagrams with QCD diagrams, which we apply to a re-derivation of the reggeized gluon and of the BFKL-equation. We study consequences of the proposed regularization on the analytic structure of 2→3 and 2→4 production amplitudes in the Multi-Regge-Kinematics. We derive a certain part of the 1-loop corrections to the production vertex and demonstrate that they yield the on-set of corrections demanded by the Steinmann-relations. The Reggeon-Particle-2-Reggeon vertex is determined and applied to the construction of various signature configurations of the production amplitudes. We extend the proposed regularization method to states of three and four reggeized gluons and propose a supplement to the effective Lagrangian. We derive vertices for the 1-3 and 2-4 reggeized-gluon-transition inside the elastic amplitude and verify that signature conservation is obeyed. Integral equations for the state of three and four reggeized gluons are formulated and shown to be in accordance with a result by Bartels and Wuesthoff. In a second part we investigate the high-energy behavior of QCD for different surface topologies of color graphs. After a brief review of the planar limit (bootstrap and gluon reggeization) and of the cylinder topology (BFKL) we investigate the 3→3 scattering in the triple Regge limit which belongs to the pair-of-pants topology. We re-derive the triple Pomeron vertex function and show that it belongs to a specific set of graphs in color space which we identify as the analog of the Mandelstam diagram. We then extend the study to the high-energy behavior of N=4 SYM where we find a new class of color graphs not present in QCD. (orig.)

  14. The Swiss agri-environment scheme enhances pollinator diversity and plant reproductive succes in nearby intensively managed farmland

    NARCIS (Netherlands)

    Albrecht, M.; Duelli, P.; Müller, C.; Kleijn, D.; Schmid, B.

    2007-01-01

    1. Agri-environment schemes attempt to counteract the loss of biodiversity and associated ecosystem services such as pollination and natural pest control in agro-ecosystems. However, only a few studies have evaluated whether these attempts are successful. 2. We studied the effects of managing

  15. An Enhanced LVRT Scheme for DFIG-based WECSs under Both Balanced and Unbalanced Grid Voltage Sags

    DEFF Research Database (Denmark)

    Mohammadi, Jafar; Afsharnia, Saeed; Ebrahimzadeh, Esmaeil

    2017-01-01

    reactive power into the grid. The passive compensator is based on a three-phase stator damping resistor (SDR) located in series with the stator windings. The proposed scheme decreases the negative effects of grid voltage sags in the DFIG system including the rotor over-currents, electromagnetic torque...

  16. A plate-on-plate sandwiched Z-scheme heterojunction photocatalyst: BiOBr-Bi{sub 2}MoO{sub 6} with enhanced photocatalytic performance

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Shengyao [College of Science, Huazhong Agricultural University, Wuhan 430070 (China); Key Laboratory of Environment Correlative Dietology, Ministry of Education, Wuhan 430070 (China); Yang, Xianglong; Zhang, Xuehao; Ding, Xing; Yang, Zixin [College of Science, Huazhong Agricultural University, Wuhan 430070 (China); Dai, Ke [College of Resources and Environment, Huazhong Agricultural University, Wuhan 430070 (China); Chen, Hao, E-mail: hchenhao@mail.hzau.edu.cn [College of Science, Huazhong Agricultural University, Wuhan 430070 (China); Key Laboratory of Environment Correlative Dietology, Ministry of Education, Wuhan 430070 (China)

    2017-01-01

    Highlights: • A visible light heterojunction photocatalyst of BiOBr-Bi{sub 2}MoO{sub 6} was simply synthesized. • Carriers transferred efficiently in sandwiched layers causing an enhance activity. • A possible direct Z-scheme charge transfer mechanism of BiOBr-Bi2MoO6 is proposed. - Abstract: In this study, a direct Z-scheme heterojunction BiOBr-Bi{sub 2}MoO{sub 6} with greatly enhanced visible light photocatalytic performance was fabricated via a two-step coprecipitation method. It was indicated that a plate-on-plate heterojunctions be present between BiOBr and Bi{sub 2}MoO{sub 6} through different characterization techniques including X-ray powder diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), UV–vis diffuse reflectance spectroscopy (DRS) and photoelectrochemical measurements. The crystal structure and morphology analysis revealed that the heterointerface in BiOBr-Bi{sub 2}MoO{sub 6} occurred mainly on the (001) facets of BiOBr and (001) facets of Bi{sub 2}MoO{sub 6}. The photocatalytic activity of the BiOBr-Bi{sub 2}MoO{sub 6} was investigated by degradation of RhB and about 66.7% total organic carbon (TOC) could be removed. Ciprofloxacin (CIP) was employed to rule out the photosensitization. It was implied that the higher activity of BiOBr-Bi{sub 2}MoO{sub 6} could be attribute to the strong redox ability in the Z-scheme system, which was subsequently confirmed by photoluminescence spectroscopy (PL) and active spices trapping experiments. This study provides a promising platform for Z-scheme heterojunction constructing and also sheds light on highly efficient visible-light-driven photocatalysts designing.

  17. Rational construction of Z-scheme Ag_2CrO_4/g-C_3N_4 composites with enhanced visible-light photocatalytic activity

    International Nuclear Information System (INIS)

    Luo, Jin; Zhou, Xiaosong; Ma, Lin; Xu, Xuyao

    2016-01-01

    Highlights: • Novel visible-light driven Ag_2CrO_4/g-C_3N_4 composites were synthesized. • Ag_2CrO_4/g-C_3N_4 exhibited enhanced visible-light photocatalytic activity. • The reasons for the enhanced photocatalytic activity were revealed. - Abstract: Novel visible-light driven Z-scheme Ag_2CrO_4/g-C_3N_4 composites with different contents of Ag_2CrO_4 were fabricated by a facile chemical precipitation method and characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), X-ray photoelectron spectroscopy (XPS), UV–vis diffuse reflectance spectroscopy (UV-vis DRS), photoluminescence (PL) spectroscopy and photoelectrochemical measurements. Compared with individual g-C_3N_4 and Ag_2CrO_4, the Ag_2CrO_4/g-C_3N_4 composites displayed much larger photocatalytic activities for the photocatalytic degradation of methyl orange (MO) solution at room temperature under visible light irradiation (λ > 420 nm). Importantly, the optimum photodegradation rate constant of the Ag_2CrO_4/g-C_3N_4 composite at a theoretical weight content of 8.0% Ag_2CrO_4 for the photodegradation of MO was 0.0068 min"−"1, which was 5.7 and 4.3 times higher than that of pure g-C_3N_4 and Ag_2CrO_4, respectively. Such enormous enhancement in photocatalytic performance was predominantly ascribed to the efficient separation and transfer of photogenerated electrons and holes at the Ag_2CrO_4/g-C_3N_4 interface imparted through the Z-scheme electron transfer. Furthermore, radical trap experiments depicted that both the holes and superoxide radical anions were thought to dominate oxidative species of the Ag_2CrO_4/g-C_3N_4 composite for MO degradation under visible light irradiation. Ultimately, a tentative Z-scheme photodegradation mechanism was proposed. This work may be useful for the rational design of new types of Z-scheme photocatalysts and provide some illuminate insights into the Z-scheme transfer mechanism for application in energy

  18. Enhancing of chemical compound and drug name recognition using representative tag scheme and fine-grained tokenization.

    Science.gov (United States)

    Dai, Hong-Jie; Lai, Po-Ting; Chang, Yung-Chun; Tsai, Richard Tzong-Han

    2015-01-01

    The functions of chemical compounds and drugs that affect biological processes and their particular effect on the onset and treatment of diseases have attracted increasing interest with the advancement of research in the life sciences. To extract knowledge from the extensive literatures on such compounds and drugs, the organizers of BioCreative IV administered the CHEMical Compound and Drug Named Entity Recognition (CHEMDNER) task to establish a standard dataset for evaluating state-of-the-art chemical entity recognition methods. This study introduces the approach of our CHEMDNER system. Instead of emphasizing the development of novel feature sets for machine learning, this study investigates the effect of various tag schemes on the recognition of the names of chemicals and drugs by using conditional random fields. Experiments were conducted using combinations of different tokenization strategies and tag schemes to investigate the effects of tag set selection and tokenization method on the CHEMDNER task. This study presents the performance of CHEMDNER of three more representative tag schemes-IOBE, IOBES, and IOB12E-when applied to a widely utilized IOB tag set and combined with the coarse-/fine-grained tokenization methods. The experimental results thus reveal that the fine-grained tokenization strategy performance best in terms of precision, recall and F-scores when the IOBES tag set was utilized. The IOBES model with fine-grained tokenization yielded the best-F-scores in the six chemical entity categories other than the "Multiple" entity category. Nonetheless, no significant improvement was observed when a more representative tag schemes was used with the coarse or fine-grained tokenization rules. The best F-scores that were achieved using the developed system on the test dataset of the CHEMDNER task were 0.833 and 0.815 for the chemical documents indexing and the chemical entity mention recognition tasks, respectively. The results herein highlight the importance

  19. Fabrication of Z-scheme Ag3PO4/MoS2 composites with enhanced photocatalytic activity and stability for organic pollutant degradation

    International Nuclear Information System (INIS)

    Zhu, Chaosheng; Zhang, Lu; Jiang, Bo; Zheng, Jingtang; Hu, Ping; Li, Sujuan; Wu, Mingbo; Wu, Wenting

    2016-01-01

    Highlights: • Ag 3 PO 4 /MoS 2 composite photocatalysts were prepared by precipitation method. • The composites showed enhanced visible-light photocatalytic activity. • The photocorrosion of Ag 3 PO 4 was inhibited due to the introduction of MoS 2 . • Z-scheme mechanism was proposed to explain the enhanced photoactivity. - Abstract: In this study, highly efficient visible-light-driven Ag 3 PO 4 /MoS 2 composite photocatalysts with different weight ratios of MoS 2 were prepared via the ethanol-water mixed solvents precipitation method and characterized by ICP, XRD, HRTEM, FE-SEM, BET, XPS, UV–vis DRS and PL analysis. Under visible-light irradiation, Ag 3 PO 4 /MoS 2 composites exhibit excellent photocatalytic activity towards the degradation of organic pollutants in aqueous solution. The optimal composite with 0.648 wt% MoS 2 content exhibits the highest photocatalytic activity, which can degrade almost all MB under visible-light irradiation within 60 min. Recycling experiments confirmed that the Ag 3 PO 4 /MoS 2 catalysts had superior cycle performance and stability. The photocatalytic activity enhancement of Ag 3 PO 4 /MoS 2 photocatalysts can be mainly ascribed to the efficient separation of photogenerated charge carriers and the stronger oxidation and reduction ability through a Z-scheme system composed of Ag 3 PO 4 , Ag and MoS 2 , in which Ag particles act as the charge separation center. The high photocatalytic stability is due to the successful inhibition of the photocorrosion of Ag 3 PO 4 by transferring the photogenerated electrons of Ag 3 PO 4 to MoS 2 . The evidence of the Z-scheme photocatalytic mechanism of the composite photocatalysts could be obtained from the active species trapping experiments and the photoluminescence technique.

  20. Peer teaching and information retrieval: the role of the NICE Evidence search student champion scheme in enhancing students' confidence.

    Science.gov (United States)

    Sbaffi, Laura; Hallsworth, Elaine; Weist, Anne

    2018-03-01

    This research reports on the NICE Evidence search (ES) student champion scheme (SCS) first five years of activity (2011-2016) in terms of its impact on health care undergraduate students' information search skills and search confidence. A review of students' evaluation of the scheme was carried out to chart the changes in attitude towards NICE Evidence search as an online health care information source and to monitor students' approach to information seeking. This study is based on the results of questionnaires distributed to students before and after attending a training session on NICE Evidence search delivered by their own peers. The exercise was implemented in health related universities in England over a period of five consecutive academic years. (i) Students' search confidence improved considerably after the training; (ii) ES was perceived as being an increasingly useful resource of evidence based information for their studies; (iii) the training helped students develop discerning search skills and use evidence based information sources more consistently and critically. The NICE SCS improves confidence in approaching information tasks amongst health care undergraduate students. Future developments could involve offering the training at the onset of a course of study and adopting online delivery formats to expand its geographical reach. © 2018 Health Libraries Group.

  1. Room-temperature in situ fabrication of Bi2O3/g-C3N4 direct Z-scheme photocatalyst with enhanced photocatalytic activity

    Science.gov (United States)

    He, Rongan; Zhou, Jiaqian; Fu, Huiqing; Zhang, Shiying; Jiang, Chuanjia

    2018-02-01

    Constructing direct Z-scheme heterojunction is an effective approach to separating photogenerated charge carriers and improving the activity of semiconductor photocatalysts. Herein, a composite of bismuth(III) oxide (Bi2O3) and graphitic carbon nitride (g-C3N4) was in situ fabricated at room temperature by photoreductive deposition of Bi3+ and subsequent air-oxidation of the resultant metallic Bi. Quantum-sized ω-Bi2O3 nanoparticles approximately 6 nm in diameter were uniformly distributed on the surface of mesoporous g-C3N4. The as-prepared Bi2O3/g-C3N4 composite exhibited higher photocatalytic activity than pure Bi2O3 and g-C3N4 for photocatalytic degradation of phenol under visible light. Reactive species trapping experiments revealed that superoxide radicals and photogenerated holes played important roles in the photocatalytic degradation of phenol. The enhanced photocatalytic activity, identification of reactive species and higher rate of charge carrier recombination (as indicated by stronger photoluminescence intensity) collectively suggest that the charge migration within the Bi2O3/g-C3N4 composite followed a Z-scheme mechanism. Photogenerated electrons on the conduction band of Bi2O3 migrate to the valence band of g-C3N4 and combine with photogenerated holes therein. At the cost of these less reactive charge carriers, the Z-scheme heterojunction enables efficient charge separation, while preserving the photogenerated electrons and holes with stronger redox abilities, which is beneficial for enhanced photocatalytic activity.

  2. Fabrication of Z-scheme plasmonic photocatalyst Ag@AgBr/g-C3N4 with enhanced visible-light photocatalytic activity

    International Nuclear Information System (INIS)

    Yang, Yuxin; Guo, Wan; Guo, Yingna; Zhao, Yahui; Yuan, Xing; Guo, Yihang

    2014-01-01

    Graphical abstract: - Highlights: • Z-scheme plasmonic photocatalyst of Ag@AgBr/g-C 3 N 4 is prepared for the first time. • Ag@AgBr/g-C 3 N 4 shows enhanced visible-light photocatalytic activity. • Photocatalytic mechanism based on the experimental results is revealed. • Photocatalytic degradation pathway of MO is put forward. - Abstract: A series of Ag@AgBr grafted graphitic carbon nitride (Ag@AgBr/g-C 3 N 4 ) plasmonic photocatalysts are fabricated through photoreducing AgBr/g-C 3 N 4 hybrids prepared by deposition–precipitation method. The phase and chemical structures, electronic and optical properties as well as morphologies of Ag@AgBr/g-C 3 N 4 heterostructures are well-characterized. Subsequently, the photocatalytic activity of Ag@AgBr/g-C 3 N 4 is evaluated by the degradation of methyl orange (MO) and rhodamin B (RB) under visible-light irradiation. The enhanced photocatalytic activity of Ag@AgBr/g-C 3 N 4 compared with g-C 3 N 4 and Ag@AgBr is obtained and explained in terms of the efficient visible-light utilization efficiency as well as the construction of Z-scheme, which keeps photogenerated electrons and holes with high reduction and oxidation capability, evidenced by photoelectrochemical tests and free radical and hole scavenging experiments. Based on the intermediates identified in the reaction system, the photocatalytic degradation pathway of MO is put forward

  3. Combined FVTD/PSTD Schemes with Enhanced Spectral Accuracy for the Design of Large-Scale EMC Applications

    Directory of Open Access Journals (Sweden)

    N. V. Kantartzis

    2012-10-01

    Full Text Available A generalized conformal time-domain method with adjustable spectral accuracy is introduced in this paper for the consistent analysis of large-scale electromagnetic compatibility problems. The novel 3-D hybrid schemes blend a stencil-optimized finite-volume time-domain and a multimodal Fourier-Chebyshev pseudo-spectral time-domain algorithm that split the overall space into smaller and flexible areas. A key asset is that both techniques are updated independently and interconnected by robust boundary conditions. Also, combining a family of spatial derivative approximators with controllable precision in general curvilinear coordinates, the proposed method launches a conformal field flux formulation to derive electromagnetic quantities in regions with fine details. For advanced grid reliability at dissimilar media interfaces, dispersion-reduced adaptive operators, which assign the proper weights to each spatial increment, are developed. So, the resulting discretization yields highly rigorous and computationally affordable simulations, devoid of lattice errors. Numerical results, addressing detailed comparisons of various realistic applications with reference or measurement data verify our methodology and reveal its significant applicability.

  4. Hybrid monitoring scheme for end-to-end performance enhancement of multicast-based real-time media

    Science.gov (United States)

    Park, Ju-Won; Kim, JongWon

    2004-10-01

    As real-time media applications based on IP multicast networks spread widely, end-to-end QoS (quality of service) provisioning for these applications have become very important. To guarantee the end-to-end QoS of multi-party media applications, it is essential to monitor the time-varying status of both network metrics (i.e., delay, jitter and loss) and system metrics (i.e., CPU and memory utilization). In this paper, targeting the multicast-enabled AG (Access Grid) a next-generation group collaboration tool based on multi-party media services, the applicability of hybrid monitoring scheme that combines active and passive monitoring is investigated. The active monitoring measures network-layer metrics (i.e., network condition) with probe packets while the passive monitoring checks both application-layer metrics (i.e., user traffic condition by analyzing RTCP packets) and system metrics. By comparing these hybrid results, we attempt to pinpoint the causes of performance degradation and explore corresponding reactions to improve the end-to-end performance. The experimental results show that the proposed hybrid monitoring can provide useful information to coordinate the performance improvement of multi-party real-time media applications.

  5. Enhancement of DRPE performance with a novel scheme based on new RAC: Principle, security analysis and FPGA implementation

    Science.gov (United States)

    Neji, N.; Jridi, M.; Alfalou, A.; Masmoudi, N.

    2016-02-01

    The double random phase encryption (DRPE) method is a well-known all-optical architecture which has many advantages especially in terms of encryption efficiency. However, the method presents some vulnerabilities against attacks and requires a large quantity of information to encode the complex output plane. In this paper, we present an innovative hybrid technique to enhance the performance of DRPE method in terms of compression and encryption. An optimized simultaneous compression and encryption method is applied simultaneously on the real and imaginary components of the DRPE output plane. The compression and encryption technique consists in using an innovative randomized arithmetic coder (RAC) that can well compress the DRPE output planes and at the same time enhance the encryption. The RAC is obtained by an appropriate selection of some conditions in the binary arithmetic coding (BAC) process and by using a pseudo-random number to encrypt the corresponding outputs. The proposed technique has the capabilities to process video content and to be standard compliant with modern video coding standards such as H264 and HEVC. Simulations demonstrate that the proposed crypto-compression system has presented the drawbacks of the DRPE method. The cryptographic properties of DRPE have been enhanced while a compression rate of one-sixth can be achieved. FPGA implementation results show the high performance of the proposed method in terms of maximum operating frequency, hardware occupation, and dynamic power consumption.

  6. Enhancing the Extreme Climate Index (ECI) to monitor climate extremes for an index-based insurance scheme across Africa

    Science.gov (United States)

    Helmschrot, J.; Malherbe, J.; Chamunorwa, M.; Muthige, M.; Petitta, M.; Calmanti, S.; Cucchi, M.; Syroka, J.; Iyahen, E.; Engelbrecht, F.

    2017-12-01

    Climate services are a key component of National Adaptation Plan (NAP) processes, which require the analysis of current climate conditions, future climate change scenarios and the identification of adaptation strategies, including the capacity to finance and implement effective adaptation options. The Extreme Climate Facility (XCF) proposed by the African Risk Capacity (ARC) developed a climate index insurance scheme, which is based on the Extreme Climate Index (ECI): an objective, multi-hazard index capable of tracking changes in the frequency or magnitude of extreme weather events, thus indicating possible shifts to a new climate regime in various regions. The main hazards covered by ECI are extreme dry, wet and heat events, with the possibility of adding other region-specific risk events. The ECI is standardized across broad geographical regions, so that extreme events occurring under different climatic regimes in Africa can be compared. Initially developed by an Italian company specialized in Climate Services, research is now conducted at the CSIR and SASSCAL, to verify and further develop the ECI for application in southern African countries, through a project initiated by the World Food Programme (WFP) and ARC. The paper will present findings on the most appropriate definitions of extremely wet and dry conditions in Africa, in terms of their impact across a multitude of sub-regional climates of the African continent. Findings of a verification analysis of the ECI, as determined through vegetation monitoring data and the SASSCAL weather station network will be discussed. Changes in the ECI under climate change will subsequently be projected, using detailed regional projections generated by the CSIR and through the Coordinated Regional Downscaling Experiment (CORDEX). This work will be concluded by the development of a web-based climate service informing African Stakeholders on climate extremes.

  7. Performance enhancement of successive interference cancellation scheme based on spectral amplitude coding for optical code-division multiple-access systems using Hadamard codes

    Science.gov (United States)

    Eltaif, Tawfig; Shalaby, Hossam M. H.; Shaari, Sahbudin; Hamarsheh, Mohammad M. N.

    2009-04-01

    A successive interference cancellation scheme is applied to optical code-division multiple-access (OCDMA) systems with spectral amplitude coding (SAC). A detailed analysis of this system, with Hadamard codes used as signature sequences, is presented. The system can easily remove the effect of the strongest signal at each stage of the cancellation process. In addition, simulation of the prose system is performed in order to validate the theoretical results. The system shows a small bit error rate at a large number of active users compared to the SAC OCDMA system. Our results reveal that the proposed system is efficient in eliminating the effect of the multiple-user interference and in the enhancement of the overall performance.

  8. Facile preparation of Z-scheme WO{sub 3}/g-C{sub 3}N{sub 4} composite photocatalyst with enhanced photocatalytic performance under visible light

    Energy Technology Data Exchange (ETDEWEB)

    Cui, Lifeng, E-mail: lifeng.cui@gmail.com [School of Chemistry and Environmental Engineering, Dongguan University of Technology, Guangdong 523808 (China); Ding, Xiang; Wang, Yangang; Shi, Huancong; Huang, Lihua; Zuo, Yuanhui [Department of Environmental Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093 (China); Kang, Shifei, E-mail: sfkang@usst.edu.cn [Department of Environmental Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093 (China)

    2017-01-01

    Highlights: • WO{sub 3}/g-C{sub 3}N{sub 4} composites were synthesized through a facile mixing-and-heating method. • The composite showed improved visible light response. • The composite showed high activity for MB degradation. • Z-scheme charge carrier transfer pathways in the composite are proposed. - Abstract: Visible-light-driven WO{sub 3}/g-C{sub 3}N{sub 4} composites photocatalysts were synthesized via a facile one-step simultaneously heating procedure with urea as the main precursor. These prepared catalyst samples were characterized by X-ray diffraction (XRD), thermogravimetric analysis (TG), transmission electron microscopy (TEM), N{sub 2} adsorption, ultraviolet-visible diffuse reflection spectroscopy (UV–vis), X-ray photoelectron spectroscopy (XPS), photoluminescence (PL) and electrochemical impedance spectroscopy (EIS). The photocatalytic activity of the WO{sub 3}/g-C{sub 3}N{sub 4} composites was evaluated by the photo-degradation of Rhodamine B (RhB) under visible light irradiation. The results indicated that the composites with 25 wt.% WO{sub 3} content exhibited highest photocatalytic activity compared to pure WO{sub 3}, bare g-C{sub 3}N{sub 4} and other WO{sub 3}/g-C{sub 3}N{sub 4} composites. The favorable photocatalytic activity of WO{sub 3}/g-C{sub 3}N{sub 4} composites was mainly attributed to the excellent surface properties, enhanced visible-light absorption and the desirable band positions. A possible Z-scheme photocatalytic mechanism was proposed based on structure and electrochemical characterizations results, which can well explain the enhanced migration rate of photogenerated electrons and holes in WO{sub 3}/g-C{sub 3}N{sub 4} heterojunctions.

  9. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  10. Enhancing the water management schemes of H08 global hydrological model to attribute human water use to six major water sources

    Science.gov (United States)

    Hanasaki, N.; Yoshikawa, S.; Pokhrel, Y. N.; Kanae, S.

    2017-12-01

    Humans abstract water from various sources to sustain their livelihood and society. Some global hydrological models (GHMs) include explicit schemes of human water management, but the representation and performance of these schemes remain limited. We substantially enhanced the human water management schemes of the H08 GHM by incorporating the latest data and techniques. The model enables us to estimate water abstraction from six major water sources, namely, river flow regulated by global reservoirs (i.e., reservoirs regulating the flow of the world's major rivers), aqueduct water transfer, local reservoirs, seawater desalination, renewable groundwater, and nonrenewable groundwater. All the interactions were simulated in a single computer program and the water balance was always strictly closed at any place and time during the simulation period. Using this model, we first conducted a historical global hydrological simulation at a spatial resolution of 0.5 x 0.5 degree to specify the sources of water for humanity. The results indicated that, in 2000, of the 3628 km3yr-1 global freshwater requirement, 2839 km3yr-1 was taken from surface water and 789 km3yr-1 from groundwater. Streamflow, aqueduct water transfer, local reservoirs, and seawater desalination accounted for 1786, 199, 106, and 1.8 km3yr-1 of the surface water, respectively. The remaining 747 km3yr-1 freshwater requirement was unmet, or surface water was not available when and where it was needed in our simulation. Renewable and nonrenewable groundwater accounted for 607 and 182 km3yr-1 of the groundwater total, respectively. Second, we evaluated the water stress using our simulations and contrasted it with earlier global assessments based on empirical water scarcity indicators, namely, the Withdrawal to Availability ratio and the Falkenmark index (annual renewable water resources per capita). We found that inclusion of water infrastructures in our model diminished water stress in some parts of the world, on

  11. ‘Students-as-partners’ scheme enhances postgraduate students’ employability skills while addressing gaps in bioinformatics education

    Science.gov (United States)

    Mello, Luciane V.; Tregilgas, Luke; Cowley, Gwen; Gupta, Anshul; Makki, Fatima; Jhutty, Anjeet; Shanmugasundram, Achchuthan

    2017-01-01

    Abstract Teaching bioinformatics is a longstanding challenge for educators who need to demonstrate to students how skills developed in the classroom may be applied to real world research. This study employed an action research methodology which utilised student–staff partnership and peer-learning. It was centred on the experiences of peer-facilitators, students who had previously taken a postgraduate bioinformatics module, and had applied knowledge and skills gained from it to their own research. It aimed to demonstrate to peer-receivers, current students, how bioinformatics could be used in their own research while developing peer-facilitators’ teaching and mentoring skills. This student-centred approach was well received by the peer-receivers, who claimed to have gained improved understanding of bioinformatics and its relevance to research. Equally, peer-facilitators also developed a better understanding of the subject and appreciated that the activity was a rare and invaluable opportunity to develop their teaching and mentoring skills, enhancing their employability. PMID:29098185

  12. Construction of Z-scheme Ag{sub 2}CO{sub 3}/N-doped graphene photocatalysts with enhanced visible-light photocatalytic activity by tuning the nitrogen species

    Energy Technology Data Exchange (ETDEWEB)

    Song, Shaoqing [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Key Laboratory of Radioactive Geology and Exploration Technology Fundamental Science for National Defense, East China Institute of Technology, Nanchang, Jiangxi Province 330013 (China); Meng, Aiyun [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Jiang, Shujuan [Key Laboratory of Radioactive Geology and Exploration Technology Fundamental Science for National Defense, East China Institute of Technology, Nanchang, Jiangxi Province 330013 (China); Cheng, Bei [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Jiang, Chuanjia, E-mail: jiangcj2016@yahoo.com [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China)

    2017-02-28

    Highlights: • Z-scheme photocatalyst composed of Ag{sub 2}CO{sub 3} and N-doped graphene (NG). • Pyridinic nitrogen species of NG spontaneously promoted plasmonic Ag formation. • Graphitic N of NG facilitated the Z-scheme transfer option and O{sub 2} adsorption. • Z-scheme Ag{sub 2}CO{sub 3}-NG showed high photocatalytic performance. - Abstract: Semiconductor-based photocatalysis has great potential in various environmental and energy applications, and Z-scheme photocatalysts have many advantages over single-component photocatalysts. The construction of a highly efficient Z-scheme photocatalytic system depends on the geometric structure arrangement, microscopic and crystalline form of the stoichiometric species, and it has not been elucidated whether the Z-scheme photocatalysts can be designed by tuning the electronic structures of cocatalysts alone. Here, using N-doped graphene (NG) as cocatalyst, we successfully constructed Z-scheme Ag{sub 2}CO{sub 3}-NG photocatalysts with enhanced activity for the photooxidative degradation of phenol pollutant. It was found that the pyridinic nitrogen species (N{sub p}) of NG could spontaneously reduce Ag{sup +} to produce plasmonic Ag nanoparticles on Ag{sub 2}CO{sub 3}-NG, while the efficiency of the photogenerated charge separation, Z-scheme transfer option, and O{sub 2} adsorption were promoted by the graphitic nitrogen species (N{sub g}). Therefore, the as-designed Z-scheme Ag{sub 2}CO{sub 3}-NG photocatalysts showed much higher activity than Ag{sub 2}CO{sub 3} and its composites with graphene oxide (GO) or reduced GO as cocatalysts in the photocatalytic degradation of phenol. Hence, our results provide a new strategy for exploring advanced Z-scheme photocatalysts with NG as cocatalyst by rationally tuning the N{sub p} and N{sub g} species.

  13. An oxygen-vacancy-rich Z-scheme g-C3N4/Pd/TiO2 heterostructure for enhanced visible light photocatalytic performance

    Science.gov (United States)

    Guo, Yanru; Xiao, Limin; Zhang, Min; Li, Qiuye; Yang, Jianjun

    2018-05-01

    An oxygen-vacancy-rich Z-scheme g-C3N4/Pd/TiO2 ternary nanocomposite was fabricated using nanotubular titanic acid as precursors via a simple photo-deposition of Pd nanoparticles and calcination process. The prepared nanocomposites were investigated by X-ray diffraction, transmission electron microscopy, X-ray photoelectron spectroscopy, and UV-visible diffuse reflectance spectroscopy, respectively. For g-C3N4/TiO2 binary nanocomposites, at the optimal content of g-C3N4 (2%), the apparent photocatalytic activity of 2%g-C3N4/TiO2 was 9 times higher than that of pure TiO2 under visible-light illumination. After deposition of Pd (1 wt%) at the contact interface between g-C3N4 and TiO2, the 2%g-C3N4/Pd/TiO2 ternary nanocomposites demonstrated the highest visible-light-driven photocatalytic activity for the degradation of gaseous propylene, which was 16- and 2-fold higher activities than pure TiO2 and 2%g-C3N4/TiO2, respectively. The mechanism for the enhanced photocatalytic performance of the g-C3N4/Pd/TiO2 photo-catalyst is proposed to be based on the efficient separation of photo-generated electron-hole pairs through Z-scheme system, in which uniform dispersity of Pd nanoparticles at contact interface between g-C3N4 and TiO2 and oxygen vacancies promote charge separation.

  14. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  15. Cryptanalysis and Enhancement of Anonymity Preserving Remote User Mutual Authentication and Session Key Agreement Scheme for E-Health Care Systems.

    Science.gov (United States)

    Amin, Ruhul; Islam, S K Hafizul; Biswas, G P; Khan, Muhammad Khurram; Li, Xiong

    2015-11-01

    The E-health care systems employ IT infrastructure for maximizing health care resources utilization as well as providing flexible opportunities to the remote patient. Therefore, transmission of medical data over any public networks is necessary in health care system. Note that patient authentication including secure data transmission in e-health care system is critical issue. Although several user authentication schemes for accessing remote services are available, their security analysis show that none of them are free from relevant security attacks. We reviewed Das et al.'s scheme and demonstrated their scheme lacks proper protection against several security attacks such as user anonymity, off-line password guessing attack, smart card theft attack, user impersonation attack, server impersonation attack, session key discloser attack. In order to overcome the mentioned security pitfalls, this paper proposes an anonymity preserving remote patient authentication scheme usable in E-health care systems. We then validated the security of the proposed scheme using BAN logic that ensures secure mutual authentication and session key agreement. We also presented the experimental results of the proposed scheme using AVISPA software and the results ensure that our scheme is secure under OFMC and CL-AtSe models. Moreover, resilience of relevant security attacks has been proved through both formal and informal security analysis. The performance analysis and comparison with other schemes are also made, and it has been found that the proposed scheme overcomes the security drawbacks of the Das et al.'s scheme and additionally achieves extra security requirements.

  16. Fabrication of graphene oxide enwrapped Z-scheme Ag{sub 2}SO{sub 3}/AgBr nanoparticles with enhanced visible-light photocatalysis

    Energy Technology Data Exchange (ETDEWEB)

    Wan, Yujuan; Liang, Chunyan; Xia, Yue, E-mail: xiayue_chem@126.com; Huang, Wei; Li, Zelin

    2017-02-28

    Highlights: • A novel GO/Ag{sub 2}SO{sub 3}/AgBr composite was prepared via a solution method. • It showed enhanced photocatalytic performance to degrade dyes under visible light irradiation. • Its photocatalytic ability was effectively maintained for 4 cycles without sacrificial reagents. - Abstract: A novel graphene oxide (GO) enwrapped Ag{sub 2}SO{sub 3}/AgBr (GO/Ag{sub 2}SO{sub 3}/AgBr) composite was fabricated through a facile solution approach via electrostatic interaction and precipitation transformation reaction for the first time. The results of XRD, Raman, SEM, TEM and XPS confirmed the structure, morphology and composition of the GO/Ag{sub 2}SO{sub 3}/AgBr composite very well. The Ag{sub 2}SO{sub 3}/AgBr nanoparticles were found to be encapsulated by GO sheets. The photocatalytic activity of the composite was investigated by the degradation of methyl orange (MO), rhodamine B (RhB) and methylene blue (MB) in water under visible light. The incorporation of GO sheets not only significantly enhanced the photocatalytic activity but also improved the reusability of Ag{sub 2}SO{sub 3}/AgBr nanoparticles. The photocatalytic ability of GO/Ag{sub 2}SO{sub 3}/AgBr can be maintained at a high level for 4 times cycle experiments. The trapping experiments confirmed that holes and superoxide ion radicals were the main active species responsible for the degradation reaction. A plasmonic Z-scheme photocatalytic mechanism was proposed to illustrate the possible transferred and separated behavior of electron-hole pairs among Ag, Ag{sub 2}SO{sub 3}, AgBr and GO quaternary system under visible light irradiation.

  17. Double dissociation in the reaction K-p→K-π+π-Nπ+ at 14.3GeV/c and pomeron factorisation

    International Nuclear Information System (INIS)

    Denegri, D.; Pons, Y.; Borg, A.; Spiro, M.; Paler, K.; Tovey, S.; Combes, C.; Shah, T.P.

    1975-01-01

    Evidence for the double dissociation process K - p→QN*1/2→(antikaon neutral* π - ) (nπ + ) at 14.3GeV/c is presented. The cross section for this process is of the order of 10μb. The production differential cross section is steep, as typical of diffractive processes, and exhibits a strong correlation between the production slope and the dissociation system mass. The mass variation of the differential cross section slope and the total cross section of the double dissociation component are consistent with the factorisable Pomeron exchange model predictions [fr

  18. The SITLESS project: exercise referral schemes enhanced by self-management strategies to battle sedentary behaviour in older adults: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Giné-Garriga, Maria; Coll-Planas, Laura; Guerra, Míriam; Domingo, Àlex; Roqué, Marta; Caserotti, Paolo; Denkinger, Michael; Rothenbacher, Dietrich; Tully, Mark A; Kee, Frank; McIntosh, Emma; Martín-Borràs, Carme; Oviedo, Guillermo R; Jerez-Roig, Javier; Santiago, Marta; Sansano, Oriol; Varela, Guillermo; Skjødt, Mathias; Wirth, Katharina; Dallmeier, Dhayana; Klenk, Jochen; Wilson, Jason J; Blackburn, Nicole E; Deidda, Manuela; Lefebvre, Guillaume; González, Denise; Salvà, Antoni

    2017-05-18

    Older adults are the fastest growing segment of the world's population. Recent evidence indicates that excessive sitting time is harmful to health, independent of meeting the recommended moderate to vigorous physical activity (PA) guidelines. The SITLESS project aims to determine whether exercise referral schemes (ERS) can be enhanced by self-management strategies (SMSs) to reduce sedentary behaviour (SB), increase PA and improve health, quality of life and function in the long term, as well as psychosocial outcomes in community-dwelling older European citizens from four countries, within a three-armed pragmatic randomised controlled trial, compared with ERS alone and also with general recommendations about PA. A total of 1338 older adults will be included in this study, recruited from four European countries through different existing primary prevention pathways. Participants will be randomly allocated into an ERS of 16 weeks (32 sessions, 45-60 min per session), ERS enhanced by seven sessions of SMSs and four telephone prompts, or a control group. Outcomes will be assessed at baseline, month 4 (end of ERS intervention), month 16 (12 months post intervention) and month 22 (18 months post intervention). Primary outcomes will include measures of SB (time spent sedentary) and PA (counts per minute). Secondary outcomes will include muscle and physical function, health economics' related outcomes, anthropometry, quality of life, social networks, anxiety and depressive symptoms, disability, fear of falling, executive function and fatigue. A process evaluation will be conducted throughout the trial. The full analysis set will follow an intention-to-treat principle and will include all randomised participants for whom a baseline assessment is conducted. The study hypothesis will be tested with mixed linear models with repeated measures, to assess changes in the main outcomes (SB and PA) over time (baseline to month 22) and between study arms. The findings of this

  19. Highly enhanced photocatalytic degradation of methylene blue over the indirect all-solid-state Z-scheme g-C{sub 3}N{sub 4}-RGO-TiO{sub 2} nanoheterojunctions

    Energy Technology Data Exchange (ETDEWEB)

    Wu, Fangjun [College of Materials and Energy, South China Agricultural University, Guangzhou 510642 (China); Li, Xin [College of Materials and Energy, South China Agricultural University, Guangzhou 510642 (China); Institute of New Energy and New Materials, Key Laboratory of Energy Plants Resource and Utilization, Ministry of Agriculture, South China Agricultural University, Guangzhou 510642 (China); College of Forestry and Landscape Architecture, South China Agricultural University, Guangzhou 510642 (China); Liu, Wei, E-mail: wlscau@163.com [College of Materials and Energy, South China Agricultural University, Guangzhou 510642 (China); Zhang, Shuting [College of Materials and Energy, South China Agricultural University, Guangzhou 510642 (China)

    2017-05-31

    Highlights: • The indirect Z-scheme g-C{sub 3}N{sub 4}-RGO-TiO{sub 2} photocatalysts were successfully fabricated. • A 3.2-fold activity enhancement was achieved by inserting RGO into g-C{sub 3}N{sub 4}- TiO{sub 2}. • The indirect Z-scheme mechanism was verified by PL spectra and radical trapping. • The multi-functional roles of RGO in enhancing photodegradation were revealed. - Abstract: In the present research work, the ternary indirect all-solid-state Z-scheme nanoheterojunctions, graphitic-C{sub 3}N{sub 4}/reduced graphene oxide/anatase TiO{sub 2} (g-C{sub 3}N{sub 4}-RGO-TiO{sub 2}) with highly enhanced photocatalytic performance were successfully prepared via a simple liquid-precipitation strategy. The photocatalytic activities of indirect all-solid-state Z-scheme g-C{sub 3}N{sub 4}-RGO-TiO{sub 2} nanoheterojunctions were evaluated by the degradation of methylene blue (MB). The results showed that the introduction of RGO as an interfacial mediator into direct Z-scheme g-C{sub 3}N{sub 4}-TiO{sub 2} nanocomposites can remarkably enhance their photocatalytic activities. The as-obtained indirect all-solid-state Z-scheme g-C{sub 3}N{sub 4}-RGO-TiO{sub 2} nanoheterojunctions, with the optimal loading amount of 10 wt% RGO, exhibited the highest rate towards the photocatalytic degradation of MB under simulated solar light irradiation. The degradation kinetics of MB can be described by the apparent first-order kinetics model. The highest degradation rate constant of 0.0137 min{sup −1} is about 4.7 and 3.2 times greater than those of the pure g-C{sub 3}N{sub 4} (0.0029 min{sup −1}) and direct Z-scheme g-C{sub 3}N{sub 4}-TiO{sub 2} (0.0043 min{sup −1}), respectively. An indirect all-solid-state Z-scheme charge-separation mechanism was proposed based on the photoluminescence spectra and the trapping experiment procedure of the photo-generated active species. It was believed that the indirect all-solid-state Z-scheme charge separation mechanism in g-C{sub 3}N

  20. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  1. Dual unitarization scheme with several trajectories

    International Nuclear Information System (INIS)

    Chaichiam, M.; Hayashi, M.

    1977-12-01

    Consequences of bootstrap with several input Regge trajectories are investigated. We find that in a formal treatment of bootstrap the consistency requires the intercept of output Pomeron pole in the one-dimensional case to be larger than one: αsub(B)(0) > 1, a situation reminiscent of the one in the Reggeon field theory. Symmetry breakings of the Pomeron couplings are derived. These couplings coincide with those of the f-dominated Pomeron model of Carlitz-Green-Zee in the approximation, when in the unitarity loops only highest Regge trajectories are included. The case when all possible trajectories are exchanged is also discussed. Predictions of dual unitary model for the slopes of differential cross section for diffractive scattering are made which differ from the ones of the CGZ model. Comparison with the experimentally available data is done. (author)

  2. Z-Scheme NiTiO 3 /g-C 3 N 4 Heterojunctions with Enhanced Photoelectrochemical and Photocatalytic Performances under Visible LED Light Irradiation

    Energy Technology Data Exchange (ETDEWEB)

    Huang, Zhenyu [School; Zeng, Xiaoqiao [Chemical; Li, Kai [School; Gao, Shanmin [School; Wang, Qingyao [School; Lu, Jun [Chemical

    2017-11-14

    Direct Z-scheme NiTiO3/g-C3N4 heterojunctions were successfully assembled by using simple calcination method and the photoelectrochemical and photocatalytic performance were investigated by light emitting diode (LED). The photoanode composed by the heterojunction with about 50 wt% NiTiO3 content exhibits the best photoelectrochemical activity with photoconversion efficiency up to 0.066%, which is 4.4 and 3.13 times larger than NiTiO3 or g-C3N4. The remarkably enhanced photoelectrochemical and photocatalytic activity of the heterojunction can be due to the efficiently photogenerated electron-hole separation by a Z-scheme mechanism.

  3. Fabrication of a direct Z-scheme type WO{sub 3}/Ag{sub 3}PO{sub 4} composite photocatalyst with enhanced visible-light photocatalytic performances

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Jinsuo, E-mail: lujinsuo@xauat.edu.cn [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an 710055 (China); Wang, Yujing [School of Materials and Chemical Engineering, Xi’an Technological University, Xi’an, Shaanxi 710032 (China); Liu, Fei [School of Environmental and Municipal Engineering, Xi’an University of Architecture and Technology, Xi’an 710055 (China); Zhang, Liang [College of Sciences, Xi’an University of Architecture and Technology, Xi’an 710055 (China); Chai, Shouning, E-mail: s.n.chai@xauat.edu.cn [College of Sciences, Xi’an University of Architecture and Technology, Xi’an 710055 (China)

    2017-01-30

    Highlights: • A solid direct Z-scheme type photocatalyst WO{sub 3}/Ag{sub 3}PO{sub 4} was synthesized. • The WO{sub 3}/Ag{sub 3}PO{sub 4} composite showed enhanced photocatalytic activity and stability. • Nearly complete removal of organic dyes was achieved in a short time. • The reasonable Z-scheme mechanism of WO{sub 3}/Ag{sub 3}PO{sub 4} composite was proposed. - Abstract: A direct Z-scheme type photocatalyst WO{sub 3}/Ag{sub 3}PO{sub 4} composite (molar ration 1:1, 1W/1Ag) was prepared by hydrothermal method. The 1W/1Ag was characterized by scanning electron microscopy (SEM), X-ray powder diffraction (XRD), UV–vis diffuse reflection spectroscopy (DRS), X-ray photoelectron spectroscopy (XPS), and photoluminescence emission spectroscopy (PL) etc. technologies. The photocatalytic performances were evaluated by degradation of methylene blue (MB) and methyl orange (MO), and their removal rates were up to 95% after 60 min and 90% after 180 min, respectively. The prepared 1W/1Ag exhibits a much higher photocatalytic activity than pure Ag{sub 3}PO{sub 4} and pure WO{sub 3} under visible light irradiation. The apparent rate constants of MB and MO degradation on 1W/1Ag are about 2.4 and 2.5 times that of pure Ag{sub 3}PO{sub 4}, respectively. The enhanced performance of the 1W/1Ag is attributed to a synergistic effect including relatively high surface area, strong light absorption, matched energy band structure, and the improved separation of photogenerated charge carriers between the two components. A reasonable Z-scheme mechanism referring to directed migration of photoinduced carriers was proposed. Thus, it can be suggested that the 1W/1Ag can serve as a promising photocatalyst for environmental purification and clean energy utilization.

  4. Enhanced photocatalytic performances and magnetic recovery capacity of visible-light-driven Z-scheme ZnFe2O4/AgBr/Ag photocatalyst

    Science.gov (United States)

    He, Jie; Cheng, Yahui; Wang, Tianzhao; Feng, Deqiang; Zheng, Lingcheng; Shao, Dawei; Wang, Weichao; Wang, Weihua; Lu, Feng; Dong, Hong; Zheng, Rongkun; Liu, Hui

    2018-05-01

    High efficiency, high stability and easy recovery are three key factors for practical photocatalysts. Z-scheme heterostructure is one of the most promising photocatalytic systems to meet all above requirements. However, efficient Z-scheme photocatalysts which could absorb visible light are still few and difficult to implement at present. In this work, the composite photocatalysts ZnFe2O4/AgBr/Ag were prepared through a two-step method. A ∼92% photodegradation rate on methyl orange was observed within 30 min under visible light, which is much better than that of individual ZnFe2O4 or AgBr/Ag. The stability was also greatly improved compared with AgBr/Ag. The increased performance is resulted from the suitable band alignment of ZnFe2O4 and AgBr, and it is defined as Z-scheme mechanism which was demonstrated by detecting active species and electrochemical impedance spectroscopy. Besides, ZnFe2O4/AgBr/Ag is ferromagnetic and can be recycled by magnet. These results show that ZnFe2O4/AgBr/Ag is a potential magnetically recyclable photocatalyst which can be driven by visible light.

  5. Development and evaluation of a computer-aided diagnostic scheme for lung nodule detection in chest radiographs by means of two-stage nodule enhancement with support vector classification

    International Nuclear Information System (INIS)

    Chen Sheng; Suzuki, Kenji; MacMahon, Heber

    2011-01-01

    Purpose: To develop a computer-aided detection (CADe) scheme for nodules in chest radiographs (CXRs) with a high sensitivity and a low false-positive (FP) rate. Methods: The authors developed a CADe scheme consisting of five major steps, which were developed for improving the overall performance of CADe schemes. First, to segment the lung fields accurately, the authors developed a multisegment active shape model. Then, a two-stage nodule-enhancement technique was developed for improving the conspicuity of nodules. Initial nodule candidates were detected and segmented by using the clustering watershed algorithm. Thirty-one shape-, gray-level-, surface-, and gradient-based features were extracted from each segmented candidate for determining the feature space, including one of the new features based on the Canny edge detector to eliminate a major FP source caused by rib crossings. Finally, a nonlinear support vector machine (SVM) with a Gaussian kernel was employed for classification of the nodule candidates. Results: To evaluate and compare the scheme to other published CADe schemes, the authors used a publicly available database containing 140 nodules in 140 CXRs and 93 normal CXRs. The CADe scheme based on the SVM classifier achieved sensitivities of 78.6% (110/140) and 71.4% (100/140) with averages of 5.0 (1165/233) FPs/image and 2.0 (466/233) FPs/image, respectively, in a leave-one-out cross-validation test, whereas the CADe scheme based on a linear discriminant analysis classifier had a sensitivity of 60.7% (85/140) at an FP rate of 5.0 FPs/image. For nodules classified as ''very subtle'' and ''extremely subtle,'' a sensitivity of 57.1% (24/42) was achieved at an FP rate of 5.0 FPs/image. When the authors used a database developed at the University of Chicago, the sensitivities was 83.3% (40/48) and 77.1% (37/48) at an FP rate of 5.0 (240/48) FPs/image and 2.0 (96/48) FPs /image, respectively. Conclusions: These results compare favorably to those described for

  6. Rational construction of Z-scheme Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composites with enhanced visible-light photocatalytic activity

    Energy Technology Data Exchange (ETDEWEB)

    Luo, Jin, E-mail: lj328520504@126.com; Zhou, Xiaosong; Ma, Lin; Xu, Xuyao

    2016-12-30

    Highlights: • Novel visible-light driven Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composites were synthesized. • Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} exhibited enhanced visible-light photocatalytic activity. • The reasons for the enhanced photocatalytic activity were revealed. - Abstract: Novel visible-light driven Z-scheme Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composites with different contents of Ag{sub 2}CrO{sub 4} were fabricated by a facile chemical precipitation method and characterized by X-ray diffraction (XRD), scanning electron microscopy (SEM), transmission electron microscopy (TEM), X-ray photoelectron spectroscopy (XPS), UV–vis diffuse reflectance spectroscopy (UV-vis DRS), photoluminescence (PL) spectroscopy and photoelectrochemical measurements. Compared with individual g-C{sub 3}N{sub 4} and Ag{sub 2}CrO{sub 4}, the Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composites displayed much larger photocatalytic activities for the photocatalytic degradation of methyl orange (MO) solution at room temperature under visible light irradiation (λ > 420 nm). Importantly, the optimum photodegradation rate constant of the Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composite at a theoretical weight content of 8.0% Ag{sub 2}CrO{sub 4} for the photodegradation of MO was 0.0068 min{sup −1}, which was 5.7 and 4.3 times higher than that of pure g-C{sub 3}N{sub 4} and Ag{sub 2}CrO{sub 4}, respectively. Such enormous enhancement in photocatalytic performance was predominantly ascribed to the efficient separation and transfer of photogenerated electrons and holes at the Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} interface imparted through the Z-scheme electron transfer. Furthermore, radical trap experiments depicted that both the holes and superoxide radical anions were thought to dominate oxidative species of the Ag{sub 2}CrO{sub 4}/g-C{sub 3}N{sub 4} composite for MO degradation under visible light irradiation. Ultimately, a tentative Z-scheme photodegradation mechanism

  7. The Heidelberg pomeron

    Energy Technology Data Exchange (ETDEWEB)

    Pirner, H.J. [Heidelberg Univ., Institute of Theoretical Physics (Germany)

    2005-07-01

    In this work we develop a model combining perturbative and non-perturbative QCD to compute high-energy reactions of hadrons and photons with special emphasis on saturation effects that manifest the S-matrix unitarity. Aiming at a unified description of hadron-hadron, photon-hadron and photon-photon reactions involving real or virtual photons as well, we follow the functional integral approach to high-energy scattering in the eikonal approximation, in which the S-matrix element factorizes into the universal correlation of 2 light-like Wegner-Wilson loops S{sub DD} and reaction-specific light-cone wave functions. The light-like Wegner-Wilson loops describe color-dipoles given by the quark and anti-quark in the meson or photon and in a simplified picture by a quark and diquark in the baryon. Consequently, hadrons and photons are described as color-dipoles with size and orientation determined by appropriate light-cone wave functions. Thus, the loop-loop correlation function S{sub DD} is the basis for our unified description. We compute the T-matrix in a functional integral approach developed for parton-parton scattering in the eikonal approximation. There is a good agreement between the computed total cross-sections and the experimental data collected from accelerators and cosmic rays for pp, pp-bar, {pi}{sup {+-}}p, K{sup {+-}}p, {gamma}p and {gamma}{gamma} scattering. The prediction for the total pp cross-section at LHC ({radical}s = 14 TeV) is {sigma}(tot){sub pp} = 114,2 mb.

  8. Double diffractive dissociation in the reaction K-p→K-π+π-nπ+ at 14.3 GeV/c and pomeron factorisation

    International Nuclear Information System (INIS)

    Denegri, D.; Pons, Y.; Borg, A.; Spiro, M.; Paler, K.; Tovey, S.; Comber, C.; Shah, T.P.

    1975-01-01

    Evidence is presented for the double dissociation process K - p→QN*sub(1/2)→(anti K* 0 π - ) (nπ + ) at 14.3GeV/c. The cross section for the process is of the order of 10 μb. The production differential cross section is steep (for near-threshold excitation masses), as typical of diffractive processes, and exhibits a strong correlation between the production slope and the masses of the dissociated systems. The spin-parity composition and states of the two dissociation systems closely resemble those found in single dissociation, indicating that a common diffraction-like mechanism is responsible for both processes. The mass variations of the differential cross-section slope, the decay angular correlations and the total cross section of the double dissociation component are consistent with the predictions of a factorisable pomeron exchange model. (Auth.)

  9. Restored symmetries, quark puzzle, and the Pomeron as a Josephson current. [Clustering effects, quantum supercurrents, cross sections, phase transitions, narrowing gap mechanism

    Energy Technology Data Exchange (ETDEWEB)

    Mendes, R V [Instituto de Fisica e Matematica, Lisbon (Portugal)

    1976-07-01

    A special type of symmetry is studied, wherein manifest invariance is restored by direct integration over a set of spontaneously broken ground states. In addition to invariant states and multiplets these symmetry realizations are shown to lead, in general, to clustering effects and quantum supercurrents. A systematic exploration of these symmetry realizations is proposed, mostly in physical situations where it has so far been believed that the only consequences of the symmetry are invariant states and multiplets. An application of these ideas to the quark system yields a possible explanation for the unobservability of free quarks and an interpretation of the Pomeron as a generalized Josephson current. Furthermore, the 'narrowing gap mechanism' suggests an explanation for the behavior of the e/sup +/ e/sup -/ ..-->.. hadrons cross section and a speculation on an approaching phase transition in hadronic production and the observation of free quarks.

  10. Highly efficient direct Z-scheme WO3/CdS-diethylenetriamine photocatalyst and its enhanced photocatalytic H2 evolution under visible light irradiation

    Science.gov (United States)

    Hu, Taiping; Li, Pengfei; Zhang, Jinfeng; Liang, Changhao; Dai, Kai

    2018-06-01

    Cadmium sulfide (CdS) has demonstrated great promise in artificial photocataytic hydrogen (H2) production. However, the serious photocorrosion hinders its effective interaction and real-life application. In this work, a typical direct Z-scheme WO3/CdS-diethylenetriamine (CdS-DETA) composite has been designed via facile in-situ solvothermal method, which exhibits excellent H2 production properties in visible light region. In this system, the inorganic-organic CdS-DETA nanobelts (NBs) possess enough active sites and large surface area for the encouraging nanojunction structure information. Furthermore, we also systematically calculated energy band structure and investigated charge transfer of the WO3/CdS-DETA by PL and photocurrent test, the results demonstrated that the suitable band gap matching between CdS-DETA and WO3 and high redox potential improve the separation of photogenerated holes and electrons, restraining intrinsic photocorrosion of CdS as well as improving the photocatalytic activity. 5%WO3/CdS-DETA presented the most outstanding H2 evolution rate (15522 μmol g-1 h-1), which is twice higher than that of pure CdS-DETA. WO3/CdS-DETA composites also presented high stability after three recycle H2 production experiment. Finally, direct Z-scheme photocatalytic mechanism is calculated.

  11. A QoS Enhancement Scheme through Joint Control of Clear Channel Assessment Threshold and Contending Window for IEEE 802.11e Broadcasting

    Directory of Open Access Journals (Sweden)

    Chen Chen

    2017-01-01

    Full Text Available In a WLAN, when a great many nodes coexist, the network may readily be congested, thus causing packets dropping and network performance degradation. To solve this issue, a lot of schemes have been proposed. However, most of the previous works attempt to avoid the possible channel congestion by controlling the packets generation rate and/or transmitting power of nodes, while the effects of Clear Channel Assessment (CCA threshold are not well examined. In our paper, a Joint CCA threshold and contending window control algorithm (JCCA is proposed to avoid channel congestion or reduce the congestion probability of broadcasting in an IEEE 802.11e network. Both the network conditions and the priorities of messages are taken into account to improve the broadcasting performance in our paper. According to the simulation results, it can be concluded that our scheme can significantly increase the network throughput as well as packets delivery ratio and reduce the packet transmission delay compared to the IEEE 802.11e and Adaptive Carrier Sensing-Based MAC Designs (ACSBM protocol.

  12. A solar PV augmented hybrid scheme for enhanced wind power generation through improved control strategy for grid connected doubly fed induction generator

    Directory of Open Access Journals (Sweden)

    Adikanda Parida

    2016-12-01

    Full Text Available In this paper, a wind power generation scheme using a grid connected doubly fed induction generator (DFIG augmented with solar PV has been proposed. A reactive power-based rotor speed and position estimation technique with reduced machine parameter sensitivity is also proposed to improve the performance of the DFIG controller. The estimation algorithm is based on model reference adaptive system (MRAS, which uses the air gap reactive power as the adjustable variable. The overall generation reliability of the wind energy conversion system can be considerably improved as both solar and wind energy can supplement each other during lean periods of either of the sources. The rotor-side DC-link voltage and active power generation at the stator terminals of the DFIG are maintained constant with minimum storage battery capacity using single converter arrangement without grid-side converter (GSC. The proposed scheme has been simulated and experimentally validated with a practical 2.5 kW DFIG using dSPACE CP1104 module which produced satisfactory results.

  13. Self-assembled hierarchical direct Z-scheme g-C3N4/ZnO microspheres with enhanced photocatalytic CO2 reduction performance

    Science.gov (United States)

    Nie, Ning; Zhang, Liuyang; Fu, Junwei; Cheng, Bei; Yu, Jiaguo

    2018-05-01

    Photocatalytic reduction of CO2 into hydrocarbon fuels has been regarded as a promising approach to ease the greenhouse effect and the energy shortage. Herein, an electrostatic self-assembly method was exploited to prepare g-C3N4/ZnO composite microsphere. This method simply utilized the opposite surface charge of each component, achieving a hierarchical structure with intimate contact between them. A much improved photocatalytic CO2 reduction activity was attained. The CH3OH production rate was 1.32 μmol h-1 g-1, which was 2.1 and 4.1 times more than that of the pristine ZnO and g-C3N4, respectively. This facile design bestowed the g-C3N4/ZnO composite an extended light adsorption caused by multi-light scattering effect. It also guaranteed the uniform distribution of g-C3N4 nanosheets on the surface of ZnO microspheres, maximizing their advantage and synergistic effect. Most importantly, the preeminent performance was proposed and validated based on the direct Z-scheme. The recombination rate was considerably suppressed. This work features the meliority of constructing hierarchical direct Z-scheme structures in photocatalytic CO2 reduction reactions.

  14. Insight into synergistically enhanced adsorption and visible light photocatalytic performance of Z-scheme heterojunction of SrTiO{sub 3}(La,Cr)-decorated WO{sub 3} nanosheets

    Energy Technology Data Exchange (ETDEWEB)

    Liu, Xin; Jiang, Junzhe; Jia, Yushuai, E-mail: ysjia@jxnu.edu.cn; Qiu, Jinmin; Xia, Tonglin; Zhang, Yuhong; Li, Yuqin; Chen, Xiangshu, E-mail: cxs66cn@jxnu.edu.cn

    2017-08-01

    Highlights: • Fabrication of SrTiO{sub 3}(La,Cr)/WO{sub 3} heterojunction with well-defined morphology. • Synergistic effect of adsorption and photocatalytic elimination for methylene blue. • Adsorption kinetics and isotherm were investigated in detail. • Negative zeta potential and large surface area result in high adsorption capacity. • A novel Z-scheme mechanism for the enhanced photocatalytic activity is proposed. - Abstract: The efficient treatment of dye wastewater has been a hot topic of environment field. The integration of adsorption and photocatalytic degradation via fabrication of bi-component heterojunction photocatalyst is considered as a facile and effective strategy to enhance the dye elimination efficiency. In this report, a Z-scheme heterojunction material, SrTiO{sub 3}(La,Cr)/WO{sub 3} with bifunction of adsorption and photocatalysis was successfully synthesized for efficient removal of methylene blue (MB) under visible light irradiation. The morphology and microstructure characterization demonstrates that the SrTiO{sub 3}(La,Cr) nanoparticles are uniformly decorated on the WO{sub 3} nanosheets, forming an intimate heterojunction interface. MB degradation results indicate that the removal efficiency by the synergistic adsorption-photocatalysis process is greatly improved compared to pure WO{sub 3} and SrTiO{sub 3}(La,Cr) with the adsorption and photocatalytic activity closely related to the composition of the material. The possible mechanism for the enhanced photocatalytic activity could be ascribed to the formation of a Z-scheme heterojunction system based on active species trapping experiments. Furthermore, the investigations of adsorption kinetics and isotherm show that the adsorption process follows pseudo-second-order kinetic model and Langmuir isotherm, respectively. Due to the synergistic advantages of negative zeta potential, large surface area and accelerated separation of photogenerated carriers driven by Z-scheme

  15. A solar-thermal energy harvesting scheme: enhanced heat capacity of molten HITEC salt mixed with Sn/SiO(x) core-shell nanoparticles.

    Science.gov (United States)

    Lai, Chih-Chung; Chang, Wen-Chih; Hu, Wen-Liang; Wang, Zhiming M; Lu, Ming-Chang; Chueh, Yu-Lun

    2014-05-07

    We demonstrated enhanced solar-thermal storage by releasing the latent heat of Sn/SiO(x) core-shell nanoparticles (NPs) embedded in a eutectic salt. The microstructures and chemical compositions of Sn/SiO(x) core-shell NPs were characterized. In situ heating XRD provides dynamic crystalline information about the Sn/SiO(x) core-shell NPs during cyclic heating processes. The latent heat of ∼29 J g(-1) for Sn/SiO(x) core-shell NPs was measured, and 30% enhanced heat capacity was achieved from 1.57 to 2.03 J g(-1) K(-1) for the HITEC solar salt without and with, respectively, a mixture of 5% Sn/SiO(x) core-shell NPs. In addition, an endurance cycle test was performed to prove a stable operation in practical applications. The approach provides a method to enhance energy storage in solar-thermal power plants.

  16. Fabrication and photocatalytic activity enhanced mechanism of direct Z-scheme g-C{sub 3}N{sub 4}/Ag{sub 2}WO{sub 4} photocatalyst

    Energy Technology Data Exchange (ETDEWEB)

    Zhu, Bicheng [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Department of Science and Environmental Studies The Hong Kong Institute of Education, Tai Po, N.T., Hong Kong (China); Xia, Pengfei; Li, Yao [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Ho, Wingkei, E-mail: keithho@ied.edu.hk [Department of Science and Environmental Studies The Hong Kong Institute of Education, Tai Po, N.T., Hong Kong (China); Yu, Jiaguo, E-mail: jiaguoyu@yahoo.com [State Key Laboratory of Advanced Technology for Materials Synthesis and Processing, Wuhan University of Technology, Wuhan 430070 (China); Department of Physics, Faculty of Science, King Abdulaziz University, Jeddah 21589 (Saudi Arabia)

    2017-01-01

    Highlights: • g-C{sub 3}N{sub 4} acted as a support for the in situ growth of β-Ag{sub 2}WO{sub 4}. • g-C{sub 3}N{sub 4} nanosheets inhibited the phase transformation of β-Ag{sub 2}WO{sub 4} to α-Ag{sub 2}WO{sub 4}. • g-C{sub 3}N{sub 4}/Ag{sub 2}WO{sub 4} exhibited a superior photocatalytic activity. • A direct Z-scheme photocatalytic mechanism could explain activity enhancement. - Abstract: Herein, a direct Z-scheme graphitic carbon nitride (g-C{sub 3}N{sub 4})/silver tungstate (Ag{sub 2}WO{sub 4}) photocatalyst was prepared by a facile in situ precipitation method using g-C{sub 3}N{sub 4} as a support and silver nitrate as a precursor. X-ray diffraction, Fourier transform infrared spectroscopy, X-ray photoelectron spectroscopy, transmission electron microscopy, and elemental mapping demonstrated that β-Ag{sub 2}WO{sub 4} nanoparticles were evenly distributed on the surface of g-C{sub 3}N{sub 4} nanosheets, which acted as a support for the nucleation and growth of β-Ag{sub 2}WO{sub 4} and inhibited the phase transformation of metastable β-Ag{sub 2}WO{sub 4} to stable α-Ag{sub 2}WO{sub 4}. Photocatalytic experiments indicated that the g-C{sub 3}N{sub 4}/Ag{sub 2}WO{sub 4} nanocomposite photocatalyst displayed a better photocatalytic activity than pure g-C{sub 3}N{sub 4} and Ag{sub 2}WO{sub 4} toward the degradation of methyl orange. The enhanced photocatalytic performance of g-C{sub 3}N{sub 4}/Ag{sub 2}WO{sub 4} could be well explained by a direct Z-scheme photocatalytic mechanism. This mechanism was related to the efficient space separation of photogenerated electron–hole pairs and the great oxidation and reduction capabilities of the g-C{sub 3}N{sub 4}/Ag{sub 2}WO{sub 4} system. This work provided new insights into the design and fabrication of g-C{sub 3}N{sub 4}-based direct Z-scheme photocatalysts.

  17. Enhanced visible light activity on direct contact Z-scheme g-C{sub 3}N{sub 4}-TiO{sub 2} photocatalyst

    Energy Technology Data Exchange (ETDEWEB)

    Li, Juan [National & Local Joint Engineering Research Center for Applied Technology of Hybrid Nanomaterials, Henan University, Kaifeng, 475004 (China); Collaborative Innovation Center of Nano Functional Materials and Applications of Henan Province, Henan University, Kaifeng, 475004 (China); College of Chemistry and Chemical Engineering, Henan University, Kaifeng, 475004 (China); Zhang, Min [National & Local Joint Engineering Research Center for Applied Technology of Hybrid Nanomaterials, Henan University, Kaifeng, 475004 (China); Collaborative Innovation Center of Nano Functional Materials and Applications of Henan Province, Henan University, Kaifeng, 475004 (China); Li, Qiuye, E-mail: qiuyeli@henu.edu.cn [National & Local Joint Engineering Research Center for Applied Technology of Hybrid Nanomaterials, Henan University, Kaifeng, 475004 (China); Collaborative Innovation Center of Nano Functional Materials and Applications of Henan Province, Henan University, Kaifeng, 475004 (China); Yang, Jianjun, E-mail: yangjianjun@henu.edu.cn [National & Local Joint Engineering Research Center for Applied Technology of Hybrid Nanomaterials, Henan University, Kaifeng, 475004 (China); Collaborative Innovation Center of Nano Functional Materials and Applications of Henan Province, Henan University, Kaifeng, 475004 (China)

    2017-01-01

    Highlights: • The g-C{sub 3}N{sub 4}-TiO{sub 2} composites were obtained by simple solid state sintering. • The composites were direct contact Z-scheme without an electron mediator. • TiO{sub 2} with large amount of SETOV was obtained by dehydration of NTA. - Abstract: Direct contact Z-scheme g-C{sub 3}N{sub 4}-TiO{sub 2} nanocomposites without an electron mediator are prepared via simple annealing the mixture of bulk g-C{sub 3}N{sub 4} and nanotube titanic acid (NTA) in air at 600 °C for 2 h. In the process of annealing, the bulk g-C{sub 3}N{sub 4} transformed to ultra-thin g-C{sub 3}N{sub 4} nanosheets, and NTA converted to a novel anatase TiO{sub 2}, then the two components formed a close interaction. The XPS result reveals that some amount of nitrogen is doped into this novel-TiO{sub 2}, and g-C{sub 3}N{sub 4} nanosheets exist in the composites. The results of XRD, TEM and TG indicate that the thickness of g-C{sub 3}N{sub 4} nanosheets is very thin. The ESR spectrum shows the existence of Ti{sup 3+} and single-electron-trapped oxygen vacancy in the 30%g-C{sub 3}N{sub 4}-TiO{sub 2} composites. In photocatalytic activity test, the 30%g-C{sub 3}N{sub 4}-TiO{sub 2} nanocomposites showed an excellent photo-oxidation activity of propylene under visible light irradiation (λ≥ 420 nm), and the removal efficiency of propylene reached as high as 56.6%, and the activity kept nearly 82% after four consecutive recycles. Photoluminescence (PL) result using terephthalic acid (TA) as a probe molecule indicated that the g-C{sub 3}N{sub 4}-TiO{sub 2} nanocomposites displayed a Z-sheme photocatalytic reaction system and this should be the main reason for the high photocatalytic activity. A possible photocatalytic mechanism was proposed on the basis of PL result and transient photocurrent-time curves.

  18. Limnimeter and rain gauge FDI in sewer networks using an interval parity equations based detection approach and an enhanced isolation scheme

    OpenAIRE

    Puig Cayuela, Vicenç; Blesa Izquierdo, Joaquim

    2013-01-01

    In this paper, a methodology for limnimeter and rain-gauge fault detection and isolation (FDI) in sewer networks is presented. The proposed model based FDI approach uses interval parity equations for fault detection in order to enhance robustness against modelling errors and noise. They both are assumed unknown but bounded, following the so-called interval (or set-membership) approach. On the other hand, fault isolation relies on an algorithm that reasons using several fault signature matrice...

  19. Facile synthesis of Z-scheme graphitic-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} nanocomposite for enhanced visible photocatalytic properties

    Energy Technology Data Exchange (ETDEWEB)

    Lv, Jiali [College of Physics and Electronic Information, Huaibei Normal University, Huaibei 235000 (China); Dai, Kai, E-mail: daikai940@chnu.edu.cn [College of Physics and Electronic Information, Huaibei Normal University, Huaibei 235000 (China); Zhang, Jinfeng; Geng, Lei [College of Physics and Electronic Information, Huaibei Normal University, Huaibei 235000 (China); Liang, Changhao, E-mail: chliang@issp.ac.cn [College of Physics and Electronic Information, Huaibei Normal University, Huaibei 235000 (China); Key Laboratory of Materials Physics and Anhui Key Laboratory of Nanomaterials and Nanotechnology, Institute of Solid State Physics, Hefei Institutes of Physical Science, Chinese Academy of Sciences, Hefei 230031 (China); Liu, Qiangchun; Zhu, Guangping; Chen, Chen [College of Physics and Electronic Information, Huaibei Normal University, Huaibei 235000 (China)

    2015-12-15

    Graphical abstract: - Highlights: • g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} nanocomposite photocatalyst was prepared. • g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} as a typical Z-scheme photocatalyst was proved. • g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} showed long reusable life with irradiation of LED light. - Abstract: The band engineering of visible-light-driven photocatalysts is a promising route for harnessing of effective solar energy to perform high chemical reactions and to treat environmental pollution. In this study, two narrow band gap semiconductor nanomaterials, graphitic carbon nitride (g-C{sub 3}N{sub 4}) and Bi{sub 2}MoO{sub 6}, were selected and coupled to form series of g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} photocatalysts. Their structure, light absorption wavelength range, charge transport properties and energy level were investigated. Through perfect manipulation of their composition, enhanced photocatalytic activity of the Z-scheme g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} photocatalysts with efficient reduction of recombination of photogenerated electrons and holes was achieved. The optimized Z-scheme g-C{sub 3}N{sub 4}/Bi{sub 2}MoO{sub 6} photocatalysts with 25 wt%g-C{sub 3}N{sub 4} showed apparent pseudo-first-order rate constant k{sub app} as high as 0.0688 min{sup −1}, which was 4.8 times and 8.2 times higher than that of g-C{sub 3}N{sub 4} and Bi{sub 2}MoO{sub 6} photocatalyst, respectively.

  20. Enhanced performance of direct Z-scheme CuS-WO 3 system towards photocatalytic decomposition of organic pollutants under visible light

    Energy Technology Data Exchange (ETDEWEB)

    Song, Chundong; Wang, Xiang; Zhang, Jing; Chen, Xuebing; Li, Can

    2017-12-01

    CuS-WO3 composites were synthesized by an in situ solution method at low temperature. The crystalline phase, morphology, particle size, and the optical properties of CuS-WO3 samples were characterized by XRD, SEM, XPS, and UV–vis diffuse reflectance spectra. CuS-WO3 composites showed much higher activity for photocatalytic degradation of RhB as compared with WO3 and CuS. The degradation rate constant over 1 wt% CuS-WO3 catalyst was 4.4 times and 9.2 times higher than that of WO3 and CuS, respectively. It is found that holes (h+) and superoxide radical anions (O2-) are the dominant reactive species by using methanol, disodium ethylenediaminetetraacetate (EDTA) and ascorbic acid as scavengers. Band structure analysis shows that bottom of CB of WO3 is very similar with and higher (ca. 0.01 eV) than the top of VB of CuS. The results of PL showed that the similarity renders the recombination between photogenerated holes on the VB of CuS and photogenerated electrons on the CB of WO3 possible and easy, forming a direct Z-scheme in CuS-WO3. This result in that more electrons in the CB of CuS and holes in the VB of WO3 survived, and then participated in the photocatalytic degradation of RhB, showing an increased activity.

  1. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  2. Fabrication of flower-like direct Z-scheme β-Bi2O3/g-C3N4 photocatalyst with enhanced visible light photoactivity for Rhodamine B degradation

    Science.gov (United States)

    Zhang, Liping; Wang, Guohong; Xiong, Zhenzhong; Tang, Hua; Jiang, Chuanjia

    2018-04-01

    A combined hydrothermal-calcination approach is developed to synthesize hierarchical β-Bi2O3/g-C3N4 direct Z-scheme photocatalyst with enhanced visible light photoactivity for Rhodamine B (RhB) degradation. First, Bi2O2CO3 microflowers were hydrothermally prepared using Bi(NO3)3·5H2O as feedstocks, and then a series of β-Bi2O3/g-C3N4 direct Z-scheme photocatalysts were synthesized via a facile calcination method using Bi2O2CO3 and g-C3N4 as precursors. The samples were systematically characterized by various characterization technologies including X-ray diffraction, scanning and transmission electron microscopes, Fourier transform infrared spectroscopy and N2 absorption-desorption equipment. It was found that the g-C3N4 content in the precursors played a key role in affecting the photocatalytic activity of the final products. The β-Bi2O3/g-C3N4 heterojunction exhibited higher photocatalytic activity than single active components (β-Bi2O3 and g-C3N4), indicating the presence of a synergistic effect between two active components in β-Bi2O3/g-C3N4 heterojunction. Among all as-prepared catalysts, the 70 wt.% g-C3N4/Bi2O2CO3 exhibits the highest activity for RhB degradation, and the apparent reaction rate constant k (42.2 × 10-3 min-1) is 3.1 and 1.7 times as high as that of pure β-Bi2O3 (13.5 × 10-3 min-1) and g-C3N4 (25.2 × 10-3 min-1), respectively. The enhanced photocatalytic performance of β-Bi2O3/g-C3N4 heterostructure photocatalysts is mainly due to the high surface area, closely contacted interfaces between the β-Bi2O3 and g-C3N4 component, and the formation of direct Z-scheme structure in the β-Bi2O3/g-C3N4 composites.

  3. A Genetic Algorithm Based Optimization Scheme To Find The Best Set Of Design Parameters To Enhance The Performance Of An Automobile Radiator

    Directory of Open Access Journals (Sweden)

    G.Chaitanya

    2013-12-01

    Full Text Available The present work aims at maximizing the overall heat transfer rate of an automobile radiator using Genetic Algorithm approach. The design specifications and empirical data pertaining to a rally car radiator obtained from literature are considered in the present work. The mathematical function describing the objective for the problem is formulated using the radiator core design equations and heat transfer relations governing the radiator. The overall heat transfer rate obtained from the present optimization technique is found to be 9.48 percent higher compared to the empirical value present in the literature. Also, the enhancement in the overall heat transfer rate is achieved with a marginal reduction in the radiator dimensions indicating better spacing ratio compared to the existing design.

  4. Enhancing pairwise state-transition weights: A new weighting scheme in simulated tempering that can minimize transition time between a pair of conformational states

    Science.gov (United States)

    Qiao, Qin; Zhang, Hou-Dao; Huang, Xuhui

    2016-04-01

    Simulated tempering (ST) is a widely used enhancing sampling method for Molecular Dynamics simulations. As one expanded ensemble method, ST is a combination of canonical ensembles at different temperatures and the acceptance probability of cross-temperature transitions is determined by both the temperature difference and the weights of each temperature. One popular way to obtain the weights is to adopt the free energy of each canonical ensemble, which achieves uniform sampling among temperature space. However, this uniform distribution in temperature space may not be optimal since high temperatures do not always speed up the conformational transitions of interest, as anti-Arrhenius kinetics are prevalent in protein and RNA folding. Here, we propose a new method: Enhancing Pairwise State-transition Weights (EPSW), to obtain the optimal weights by minimizing the round-trip time for transitions among different metastable states at the temperature of interest in ST. The novelty of the EPSW algorithm lies in explicitly considering the kinetics of conformation transitions when optimizing the weights of different temperatures. We further demonstrate the power of EPSW in three different systems: a simple two-temperature model, a two-dimensional model for protein folding with anti-Arrhenius kinetics, and the alanine dipeptide. The results from these three systems showed that the new algorithm can substantially accelerate the transitions between conformational states of interest in the ST expanded ensemble and further facilitate the convergence of thermodynamics compared to the widely used free energy weights. We anticipate that this algorithm is particularly useful for studying functional conformational changes of biological systems where the initial and final states are often known from structural biology experiments.

  5. Enhancing pairwise state-transition weights: A new weighting scheme in simulated tempering that can minimize transition time between a pair of conformational states

    International Nuclear Information System (INIS)

    Qiao, Qin; Zhang, Hou-Dao; Huang, Xuhui

    2016-01-01

    Simulated tempering (ST) is a widely used enhancing sampling method for Molecular Dynamics simulations. As one expanded ensemble method, ST is a combination of canonical ensembles at different temperatures and the acceptance probability of cross-temperature transitions is determined by both the temperature difference and the weights of each temperature. One popular way to obtain the weights is to adopt the free energy of each canonical ensemble, which achieves uniform sampling among temperature space. However, this uniform distribution in temperature space may not be optimal since high temperatures do not always speed up the conformational transitions of interest, as anti-Arrhenius kinetics are prevalent in protein and RNA folding. Here, we propose a new method: Enhancing Pairwise State-transition Weights (EPSW), to obtain the optimal weights by minimizing the round-trip time for transitions among different metastable states at the temperature of interest in ST. The novelty of the EPSW algorithm lies in explicitly considering the kinetics of conformation transitions when optimizing the weights of different temperatures. We further demonstrate the power of EPSW in three different systems: a simple two-temperature model, a two-dimensional model for protein folding with anti-Arrhenius kinetics, and the alanine dipeptide. The results from these three systems showed that the new algorithm can substantially accelerate the transitions between conformational states of interest in the ST expanded ensemble and further facilitate the convergence of thermodynamics compared to the widely used free energy weights. We anticipate that this algorithm is particularly useful for studying functional conformational changes of biological systems where the initial and final states are often known from structural biology experiments.

  6. Enhancing pairwise state-transition weights: A new weighting scheme in simulated tempering that can minimize transition time between a pair of conformational states

    Energy Technology Data Exchange (ETDEWEB)

    Qiao, Qin, E-mail: qqiao@ust.hk; Zhang, Hou-Dao [Department of Chemistry, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon (Hong Kong); Huang, Xuhui, E-mail: xuhuihuang@ust.hk [Department of Chemistry, Division of Biomedical Engineering, Center of Systems Biology and Human Health, The Hong Kong University of Science and Technology, Clear Water Bay, Kowloon (Hong Kong); The HKUST Shenzhen Research Institute, Shenzhen (China)

    2016-04-21

    Simulated tempering (ST) is a widely used enhancing sampling method for Molecular Dynamics simulations. As one expanded ensemble method, ST is a combination of canonical ensembles at different temperatures and the acceptance probability of cross-temperature transitions is determined by both the temperature difference and the weights of each temperature. One popular way to obtain the weights is to adopt the free energy of each canonical ensemble, which achieves uniform sampling among temperature space. However, this uniform distribution in temperature space may not be optimal since high temperatures do not always speed up the conformational transitions of interest, as anti-Arrhenius kinetics are prevalent in protein and RNA folding. Here, we propose a new method: Enhancing Pairwise State-transition Weights (EPSW), to obtain the optimal weights by minimizing the round-trip time for transitions among different metastable states at the temperature of interest in ST. The novelty of the EPSW algorithm lies in explicitly considering the kinetics of conformation transitions when optimizing the weights of different temperatures. We further demonstrate the power of EPSW in three different systems: a simple two-temperature model, a two-dimensional model for protein folding with anti-Arrhenius kinetics, and the alanine dipeptide. The results from these three systems showed that the new algorithm can substantially accelerate the transitions between conformational states of interest in the ST expanded ensemble and further facilitate the convergence of thermodynamics compared to the widely used free energy weights. We anticipate that this algorithm is particularly useful for studying functional conformational changes of biological systems where the initial and final states are often known from structural biology experiments.

  7. A Simple Power Management Scheme with Enhanced Stability for a Solar PV/Wind/Fuel Cell/Grid Fed Hybrid Power Supply Designed for Industrial Loads

    Directory of Open Access Journals (Sweden)

    S. Saravanan

    2014-01-01

    Full Text Available This paper proposes a new power conditioner topology with an intelligent power management controller that integrates multiple renewable energy sources such as solar energy, wind energy, and fuel cell energy with battery and AC grid supply as backup to make the best use of their operating characteristics with better reliability than that could be obtained by single renewable energy source based power supply. The proposed embedded controller is programmed to perform MPPT for solar PV panel and WTG, SOC estimation and battery, maintaining a constant voltage at PCC and power flow control by regulating the reference currents of the controller in an instantaneous basis. The instantaneous variation in reference currents of the controller enhances the controller response as it accommodates the effect of continuously varying solar insolation and wind speed in the power management. It also prioritizes the sources for consumption to achieve maximum usage of green energy than grid energy. The simulation results of the proposed power management system with real-time solar radiation and wind velocity data collected from solar centre, KEC, and experimental results for a sporadically varying load demand are presented in this paper and the results are encouraging from reliability and stability perspectives.

  8. Fuzzy Logic-based Intelligent Scheme for Enhancing QoS of Vertical Handover Decision in Vehicular Ad-hoc Networks

    Science.gov (United States)

    Azzali, F.; Ghazali, O.; Omar, M. H.

    2017-08-01

    The design of next generation networks in various technologies under the “Anywhere, Anytime” paradigm offers seamless connectivity across different coverage. A conventional algorithm such as RSSThreshold algorithm, that only uses the received strength signal (RSS) as a metric, will decrease handover performance regarding handover latency, delay, packet loss, and handover failure probability. Moreover, the RSS-based algorithm is only suitable for horizontal handover decision to examine the quality of service (QoS) compared to the vertical handover decision in advanced technologies. In the next generation network, vertical handover can be started based on the user’s convenience or choice rather than connectivity reasons. This study proposes a vertical handover decision algorithm that uses a Fuzzy Logic (FL) algorithm, to increase QoS performance in heterogeneous vehicular ad-hoc networks (VANET). The study uses network simulator 2.29 (NS 2.29) along with the mobility traffic network and generator to implement simulation scenarios and topologies. This helps the simulation to achieve a realistic VANET mobility scenario. The required analysis on the performance of QoS in the vertical handover can thus be conducted. The proposed Fuzzy Logic algorithm shows improvement over the conventional algorithm (RSSThreshold) in the average percentage of handover QoS whereby it achieves 20%, 21% and 13% improvement on handover latency, delay, and packet loss respectively. This is achieved through triggering a process in layer two and three that enhances the handover performance.

  9. Control scheme towards enhancing power quality and operational efficiency of single-phase two-stage grid-connected photovoltaic systems

    Directory of Open Access Journals (Sweden)

    Mahmoud Salem

    2015-12-01

    Full Text Available Achieving high reliable grid-connected photovoltaic (PV systems with high power quality and high operation efficiency is highly required for distributed generation units. A double grid-frequency voltage ripple is found on the dc-link voltage in single-phase photovoltaic grid-connected systems due to the unbalance of the instantaneous dc input and ac output powers. This voltage ripple has undesirable effects on the power quality and operational efficiency of the whole system. Harmonic distortion in the injected current to the grid is one of the problems caused by this double grid-frequency voltage ripple. The double grid frequency ripple propagates to the PV voltage and current which disturb the extracted maximum power from the PV array. This paper introduces intelligent solutions towards mitigate the side effects of the double grid-frequency voltage ripple on the transferred power quality and the operational efficiency of single-phase two-stage grid-connected PV system. The proposed system has three control loops: MPPT control loop, dc-link voltage control loop and inverter current control loop. Solutions are introduced for all the three control loops in the system. The current controller cancels the dc-link voltage effect on the total harmonic distortion of the output current. The dc-link voltage controller is designed to generate a ripple free reference current signal that leads to enhance the quality of the output power. Also a modified MPPT controller is proposed to optimize the extracted power from the PV array. Simulation results show that higher injected power quality is achieved and higher efficiency of the overall system is realized.

  10. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  11. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  12. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  13. An authentication scheme for secure access to healthcare services.

    Science.gov (United States)

    Khan, Muhammad Khurram; Kumari, Saru

    2013-08-01

    Last few decades have witnessed boom in the development of information and communication technologies. Health-sector has also been benefitted with this advancement. To ensure secure access to healthcare services some user authentication mechanisms have been proposed. In 2012, Wei et al. proposed a user authentication scheme for telecare medical information system (TMIS). Recently, Zhu pointed out offline password guessing attack on Wei et al.'s scheme and proposed an improved scheme. In this article, we analyze both of these schemes for their effectiveness in TMIS. We show that Wei et al.'s scheme and its improvement proposed by Zhu fail to achieve some important characteristics necessary for secure user authentication. We find that security problems of Wei et al.'s scheme stick with Zhu's scheme; like undetectable online password guessing attack, inefficacy of password change phase, traceability of user's stolen/lost smart card and denial-of-service threat. We also identify that Wei et al.'s scheme lacks forward secrecy and Zhu's scheme lacks session key between user and healthcare server. We therefore propose an authentication scheme for TMIS with forward secrecy which preserves the confidentiality of air messages even if master secret key of healthcare server is compromised. Our scheme retains advantages of Wei et al.'s scheme and Zhu's scheme, and offers additional security. The security analysis and comparison results show the enhanced suitability of our scheme for TMIS.

  14. Enhancing Cooperative Loan Scheme Through Automated Loan ...

    African Journals Online (AJOL)

    2013-03-01

    Mar 1, 2013 ... Financial transactions through manual system of operation .... Integrated Financial Accounting. The accounting processes for loans are supported within Loans ... principal and interest, and print checks, payment receipts, or ...

  15. Enhancing Cooperative Loan Scheme Through Automated Loan ...

    African Journals Online (AJOL)

    Journal Home > Vol 6, No 1 (2013) > ... The concept of automation has been variously applied in most computing fields. ... competent capabilities to eliminate data inconsistency and redundancy as well as ensuring data integrity and security, ...

  16. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  17. Clocking Scheme for Switched-Capacitor Circuits

    DEFF Research Database (Denmark)

    Steensgaard-Madsen, Jesper

    1998-01-01

    A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed.......A novel clocking scheme for switched-capacitor (SC) circuits is presented. It can enhance the understanding of SC circuits and the errors caused by MOSFET (MOS) switches. Charge errors, and techniques to make SC circuits less sensitive to them are discussed....

  18. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  19. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  20. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  1. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  2. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  3. Enhanced

    Directory of Open Access Journals (Sweden)

    Martin I. Bayala

    2014-06-01

    Full Text Available Land Surface Temperature (LST is a key parameter in the energy balance model. However, the spatial resolution of the retrieved LST from sensors with high temporal resolution is not accurate enough to be used in local-scale studies. To explore the LST–Normalised Difference Vegetation Index relationship potential and obtain thermal images with high spatial resolution, six enhanced image sharpening techniques were assessed: the disaggregation procedure for radiometric surface temperatures (TsHARP, the Dry Edge Quadratic Function, the Difference of Edges (Ts∗DL and three models supported by the relationship of surface temperature and water stress of vegetation (Normalised Difference Water Index, Normalised Difference Infrared Index and Soil wetness index. Energy Balance Station data and in situ measurements were used to validate the enhanced LST images over a mixed agricultural landscape in the sub-humid Pampean Region of Argentina (PRA, during 2006–2010. Landsat Thematic Mapper (TM and Moderate Resolution Imaging Spectroradiometer (EOS-MODIS thermal datasets were assessed for different spatial resolutions (e.g., 960, 720 and 240 m and the performances were compared with global and local TsHARP procedures. Results suggest that the Ts∗DL technique is the most adequate for simulating LST to high spatial resolution over the heterogeneous landscape of a sub-humid region, showing an average root mean square error of less than 1 K.

  4. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  5. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  6. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  7. Conformal Symmetry as a Template:Commensurate Scale Relations and Physical Renormalization Schemes

    International Nuclear Information System (INIS)

    Brodsky, Stanley J.

    1999-01-01

    Commensurate scale relations are perturbative QCD predictions which relate observable to observable at fixed relative scale, such as the ''generalized Crewther relation'', which connects the Bjorken and Gross-Llewellyn Smith deep inelastic scattering sum rules to measurements of the e + e - annihilation cross section. We show how conformal symmetry provides a template for such QCD predictions, providing relations between observables which are present even in theories which are not scale invariant. All non-conformal effects are absorbed by fixing the ratio of the respective momentum transfer and energy scales. In the case of fixed-point theories, commensurate scale relations relate both the ratio of couplings and the ratio of scales as the fixed point is approached. In the case of the α V scheme defined from heavy quark interactions, virtual corrections due to fermion pairs are analytically incorporated into the Gell-Mann Low function, thus avoiding the problem of explicitly computing and resuming quark mass corrections related to the running of the coupling. Applications to the decay width of the Z boson, the BFKL pomeron, and virtual photon scattering are discussed

  8. Secure and Efficient Anonymous Authentication Scheme in Global Mobility Networks

    Directory of Open Access Journals (Sweden)

    Jun-Sub Kim

    2013-01-01

    Full Text Available In 2012, Mun et al. pointed out that Wu et al.’s scheme failed to achieve user anonymity and perfect forward secrecy and disclosed the passwords of legitimate users. And they proposed a new enhancement for anonymous authentication scheme. However, their proposed scheme has vulnerabilities that are susceptible to replay attack and man-in-the-middle attack. It also incurs a high overhead in the database. In this paper, we examine the vulnerabilities in the existing schemes and the computational overhead incurred in the database. We then propose a secure and efficient anonymous authentication scheme for roaming service in global mobility network. Our proposed scheme is secure against various attacks, provides mutual authentication and session key establishment, and incurs less computational overhead in the database than Mun et al.'s scheme.

  9. Analysis and improvement for the performance of Baptista's cryptographic scheme

    International Nuclear Information System (INIS)

    Wei Jun; Liao Xiaofeng; Wong, K.W.; Zhou Tsing; Deng Yigui

    2006-01-01

    Based on Baptista's chaotic cryptosystem, we propose a secure and robust chaotic cryptographic scheme after investigating the problems found in this cryptosystem as well as its variants. In this proposed scheme, a subkey array generated from the key and the plaintext is adopted to enhance the security. Some methods are introduced to increase the efficiency. Theoretical analyses and numerical simulations indicate that the proposed scheme is secure and efficient for practical use

  10. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  11. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  12. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  13. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  14. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  15. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  16. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  17. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  18. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  19. Robust and Efficient Authentication Scheme for Session Initiation Protocol

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2015-01-01

    Full Text Available The session initiation protocol (SIP is a powerful application-layer protocol which is used as a signaling one for establishing, modifying, and terminating sessions among participants. Authentication is becoming an increasingly crucial issue when a user asks to access SIP services. Hitherto, many authentication schemes have been proposed to enhance the security of SIP. In 2014, Arshad and Nikooghadam proposed an enhanced authentication and key agreement scheme for SIP and claimed that their scheme could withstand various attacks. However, in this paper, we show that Arshad and Nikooghadam’s authentication scheme is still susceptible to key-compromise impersonation and trace attacks and does not provide proper mutual authentication. To conquer the flaws, we propose a secure and efficient ECC-based authentication scheme for SIP. Through the informal and formal security analyses, we demonstrate that our scheme is resilient to possible known attacks including the attacks found in Arshad et al.’s scheme. In addition, the performance analysis shows that our scheme has similar or better efficiency in comparison with other existing ECC-based authentication schemes for SIP.

  20. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  1. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  2. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  3. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  4. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  5. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  6. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  7. Investigation of a monochromator scheme for SPEAR

    International Nuclear Information System (INIS)

    Wille, K.; Chao, A.W.

    1984-08-01

    The possibility of mono-chromatizing SPEAR for the purpose of increasing the hadronic event rate at the narrow resonances was investigated. By using two pairs of electostatic skew quads in monochromator scheme it is found that the event rate can be increased by a factor of 2 for the mini beta optics assuming the luminosity is kept unchanged. An attempt to increase this enhancement factor by major rearrangements of the ring magnets has encountered serious optical difficulties; although enhancement factor of 8 seems possible in principle, this alternative is not recommended

  8. Understanding security failures of two authentication and key agreement schemes for telecare medicine information systems.

    Science.gov (United States)

    Mishra, Dheerendra

    2015-03-01

    Smart card based authentication and key agreement schemes for telecare medicine information systems (TMIS) enable doctors, nurses, patients and health visitors to use smart cards for secure login to medical information systems. In recent years, several authentication and key agreement schemes have been proposed to present secure and efficient solution for TMIS. Most of the existing authentication schemes for TMIS have either higher computation overhead or are vulnerable to attacks. To reduce the computational overhead and enhance the security, Lee recently proposed an authentication and key agreement scheme using chaotic maps for TMIS. Xu et al. also proposed a password based authentication and key agreement scheme for TMIS using elliptic curve cryptography. Both the schemes provide better efficiency from the conventional public key cryptography based schemes. These schemes are important as they present an efficient solution for TMIS. We analyze the security of both Lee's scheme and Xu et al.'s schemes. Unfortunately, we identify that both the schemes are vulnerable to denial of service attack. To understand the security failures of these cryptographic schemes which are the key of patching existing schemes and designing future schemes, we demonstrate the security loopholes of Lee's scheme and Xu et al.'s scheme in this paper.

  9. Nonclassical lightstates in optical communication schemes

    International Nuclear Information System (INIS)

    Mattle, K. U.

    1997-11-01

    The present thesis is a result in theoretical and experimental work on quant information and quant communication. The first part describes a new high intense source for polarization entangled photon pairs. The high quality of the source is clearly demonstrated by violating a Bell-inequality in less than 5 minutes with 100 standard deviations. This new source is a genius tool for new experiments in the field of fundamental physics as well as applied physics. The next chapter shows an experimental implementation of an optical dense quantum coding scheme. The combination of Bell-state generation and analysis of this entangled states leads to a new nonclassical communication scheme, where the channel capacity is enhanced. A single two state photon can be used for coding and decoding 1.58 bit instead of 1 bit for classical two state systems. The following chapter discusses two photon interference effects for two independent light sources. In an experiment two independent fluorescence pulses show this kind of interference effects. The fifth chapter describes 3-photon interference effects. This nonclassical interference effect is the elementary process for the quantum teleportation scheme. In this scheme an unknown particle state is transmitted from A to B without sending the particle itself. (author)

  10. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  11. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  12. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  13. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  14. CGC/saturation approach for high energy soft interactions: 'soft' Pomeron structure and v{sub n} in hadron and nucleus collisions from Bose-Einstein correlations

    Energy Technology Data Exchange (ETDEWEB)

    Gotsman, E.; Maor, U. [Tel Aviv University, Department of Particle Physics School of Physics and Astronomy, Raymond and Beverly Sackler Faculty of Exact Science, Tel Aviv (Israel); Levin, E. [Tel Aviv University, Department of Particle Physics School of Physics and Astronomy, Raymond and Beverly Sackler Faculty of Exact Science, Tel Aviv (Israel); Universidad Tecnica Federico Santa Maria and Centro Cientifico-Tecnologico de Valparaiso, Departemento de Fisica, Valparaiso (Chile)

    2016-11-15

    In the framework of our model of soft interactions at high energy based on the CGC/saturation approach, we show that Bose-Einstein correlations of identical gluons lead to large values of v{sub n}. We demonstrate how three dimensional scales of high energy interactions, hadron radius, typical size of the wave function in diffractive production of small masses (size of the constituent quark), and the saturation momentum, influence the values of BE correlations, and in particular, the values of v{sub n}. Our calculation shows that the structure of the 'dressed' Pomeron leads to values of v{sub n} which are close to experimental values for proton-proton scattering, 20 % smaller than the observed values for proton-lead collisions and close to lead-lead collisions for 0-10 % centrality. Bearing this result in mind, we conclude that it is premature to consider that the appearance of long range rapidity azimuthal correlations are due only to the hydrodynamical behaviour of the quark-gluon plasma. (orig.)

  15. Update schemes of multi-velocity floor field cellular automaton for pedestrian dynamics

    Science.gov (United States)

    Luo, Lin; Fu, Zhijian; Cheng, Han; Yang, Lizhong

    2018-02-01

    Modeling pedestrian movement is an interesting problem both in statistical physics and in computational physics. Update schemes of cellular automaton (CA) models for pedestrian dynamics govern the schedule of pedestrian movement. Usually, different update schemes make the models behave in different ways, which should be carefully recalibrated. Thus, in this paper, we investigated the influence of four different update schemes, namely parallel/synchronous scheme, random scheme, order-sequential scheme and shuffled scheme, on pedestrian dynamics. The multi-velocity floor field cellular automaton (FFCA) considering the changes of pedestrians' moving properties along walking paths and heterogeneity of pedestrians' walking abilities was used. As for parallel scheme only, the collisions detection and resolution should be considered, resulting in a great difference from any other update schemes. For pedestrian evacuation, the evacuation time is enlarged, and the difference in pedestrians' walking abilities is better reflected, under parallel scheme. In face of a bottleneck, for example a exit, using a parallel scheme leads to a longer congestion period and a more dispersive density distribution. The exit flow and the space-time distribution of density and velocity have significant discrepancies under four different update schemes when we simulate pedestrian flow with high desired velocity. Update schemes may have no influence on pedestrians in simulation to create tendency to follow others, but sequential and shuffled update scheme may enhance the effect of pedestrians' familiarity with environments.

  16. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.

  17. Good governance for pension schemes

    CERN Document Server

    Thornton, Paul

    2011-01-01

    Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.

  18. Optimum RA reactor fuelling scheme

    International Nuclear Information System (INIS)

    Strugar, P.; Nikolic, V.

    1965-10-01

    Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr

  19. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  20. A robust anonymous biometric-based remote user authentication scheme using smart cards

    Directory of Open Access Journals (Sweden)

    Ashok Kumar Das

    2015-04-01

    Full Text Available Several biometric-based remote user authentication schemes using smart cards have been proposed in the literature in order to improve the security weaknesses in user authentication system. In 2012, An proposed an enhanced biometric-based remote user authentication scheme using smart cards. It was claimed that the proposed scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. In this paper, we first analyze the security of An’s scheme and we show that this scheme has three serious security flaws in the design of the scheme: (i flaw in user’s biometric verification during the login phase, (ii flaw in user’s password verification during the login and authentication phases, and (iii flaw in user’s password change locally at any time by the user. Due to these security flaws, An’s scheme cannot support mutual authentication between the user and the server. Further, we show that An’s scheme cannot prevent insider attack. In order to remedy the security weaknesses found in An’s scheme, we propose a new robust and secure anonymous biometric-based remote user authentication scheme using smart cards. Through the informal and formal security analysis, we show that our scheme is secure against all possible known attacks including the attacks found in An’s scheme. The simulation results of our scheme using the widely-accepted AVISPA (Automated Validation of Internet Security Protocols and Applications tool ensure that our scheme is secure against passive and active attacks. In addition, our scheme is also comparable in terms of the communication and computational overheads with An’s scheme and other related existing schemes. As a result, our scheme is more appropriate for practical applications compared to other approaches.

  1. Numerical schemes for explosion hazards

    International Nuclear Information System (INIS)

    Therme, Nicolas

    2015-01-01

    In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called

  2. Efficient Scheme for Chemical Flooding Simulation

    Directory of Open Access Journals (Sweden)

    Braconnier Benjamin

    2014-07-01

    Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].

  3. Breeding schemes in reindeer husbandry

    Directory of Open Access Journals (Sweden)

    Lars Rönnegård

    2003-04-01

    Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.

  4. Asynchronous Channel-Hopping Scheme under Jamming Attacks

    Directory of Open Access Journals (Sweden)

    Yongchul Kim

    2018-01-01

    Full Text Available Cognitive radio networks (CRNs are considered an attractive technology to mitigate inefficiency in the usage of licensed spectrum. CRNs allow the secondary users (SUs to access the unused licensed spectrum and use a blind rendezvous process to establish communication links between SUs. In particular, quorum-based channel-hopping (CH schemes have been studied recently to provide guaranteed blind rendezvous in decentralized CRNs without using global time synchronization. However, these schemes remain vulnerable to jamming attacks. In this paper, we first analyze the limitations of quorum-based rendezvous schemes called asynchronous channel hopping (ACH. Then, we introduce a novel sequence sensing jamming attack (SSJA model in which a sophisticated jammer can dramatically reduce the rendezvous success rates of ACH schemes. In addition, we propose a fast and robust asynchronous rendezvous scheme (FRARS that can significantly enhance robustness under jamming attacks. Our numerical results demonstrate that the performance of the proposed scheme vastly outperforms the ACH scheme when there are security concerns about a sequence sensing jammer.

  5. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  6. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Directory of Open Access Journals (Sweden)

    Hakjun Lee

    Full Text Available With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  7. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim

    2012-01-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  8. Nonlinear secret image sharing scheme.

    Science.gov (United States)

    Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young

    2014-01-01

    Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.

  9. Multiuser switched diversity scheduling schemes

    KAUST Repository

    Shaqfeh, Mohammad

    2012-09-01

    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.

  10. Electrical Injection Schemes for Nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2014-01-01

    Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....

  11. Signal multiplexing scheme for LINAC

    International Nuclear Information System (INIS)

    Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra

    2004-01-01

    For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)

  12. Capacity-achieving CPM schemes

    OpenAIRE

    Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido

    2008-01-01

    The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...

  13. Anticollusion Attack Noninteractive Security Hierarchical Key Agreement Scheme in WHMS

    Directory of Open Access Journals (Sweden)

    Kefei Mao

    2016-01-01

    Full Text Available Wireless Health Monitoring Systems (WHMS have potential to change the way of health care and bring numbers of benefits to patients, physicians, hospitals, and society. However, there are crucial barriers not only to transmit the biometric information but also to protect the privacy and security of the patients’ information. The key agreement between two entities is an essential cryptography operation to clear the barriers. In particular, the noninteractive hierarchical key agreement scheme becomes an attractive direction in WHMS because each sensor node or gateway has limited resources and power. Recently, a noninteractive hierarchical key agreement scheme has been proposed by Kim for WHMS. However, we show that Kim’s cryptographic scheme is vulnerable to the collusion attack if the physicians can be corrupted. Obviously, it is a more practical security condition. Therefore, we proposed an improved key agreement scheme against the attack. Security proof, security analysis, and experimental results demonstrate that our proposed scheme gains enhanced security and more efficiency than Kim’s previous scheme while inheriting its qualities of one-round communication and security properties.

  14. On 165Ho level scheme

    International Nuclear Information System (INIS)

    Ardisson, Claire; Ardisson, Gerard.

    1976-01-01

    A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr

  15. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping

    2014-01-01

    the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost

  16. Homogenization scheme for acoustic metamaterials

    KAUST Repository

    Yang, Min

    2014-02-26

    We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.

  17. New practicable Siberian Snake schemes

    International Nuclear Information System (INIS)

    Steffen, K.

    1983-07-01

    Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)

  18. Nonlinear Secret Image Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Sang-Ho Shin

    2014-01-01

    efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2⁡m bit-per-pixel (bpp, respectively.

  19. A secure communication scheme using projective chaos synchronization

    International Nuclear Information System (INIS)

    Li Zhigang; Xu Daolin

    2004-01-01

    Most secure communication schemes using chaotic dynamics are based on identical synchronization. In this paper, we show the possibility of secure communication using projective synchronization (PS). The unpredictability of the scaling factor in projective synchronization can additionally enhance the security of communication. It is also showed that the scaling factor can be employed to improve the robustness against noise contamination. The feasibility of the communication scheme in high-dimensional chaotic systems, such as the hyperchaotic Roessler system, is demonstrated. Numerical results show the success in transmitting a sound signal through chaotic systems

  20. Interference-aware random beam selection schemes for spectrum sharing systems

    KAUST Repository

    Abdallah, Mohamed; Qaraqe, Khalid; Alouini, Mohamed-Slim

    2012-01-01

    users. In this work, we develop interference-aware random beam selection schemes that provide enhanced performance for the secondary network under the condition that the interference observed by the receivers of the primary network is below a

  1. Support Schemes and Ownership Structures

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana

    , Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...

  2. [PICS: pharmaceutical inspection cooperation scheme].

    Science.gov (United States)

    Morénas, J

    2009-01-01

    The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.

  3. Project financing renewable energy schemes

    International Nuclear Information System (INIS)

    Brandler, A.

    1993-01-01

    The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)

  4. Network Regulation and Support Schemes

    DEFF Research Database (Denmark)

    Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik

    2009-01-01

    -in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...

  5. Distance labeling schemes for trees

    DEFF Research Database (Denmark)

    Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben

    2016-01-01

    We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...

  6. Small-scale classification schemes

    DEFF Research Database (Denmark)

    Hertzum, Morten

    2004-01-01

    Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...

  7. Cambridge community Optometry Glaucoma Scheme.

    Science.gov (United States)

    Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R

    2015-04-01

    With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.

  8. New schemes for particle accelerators

    International Nuclear Information System (INIS)

    Nishida, Y.

    1985-01-01

    In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here

  9. Modeling and Simulation of Handover Scheme in Integrated EPON-WiMAX Networks

    DEFF Research Database (Denmark)

    Yan, Ying; Dittmann, Lars

    2011-01-01

    In this paper, we tackle the seamless handover problem in integrated optical wireless networks. Our model applies for the convergence network of EPON and WiMAX and a mobilityaware signaling protocol is proposed. The proposed handover scheme, Integrated Mobility Management Scheme (IMMS), is assisted...... by enhancing the traditional MPCP signaling protocol, which cooperatively collects mobility information from the front-end wireless network and makes centralized bandwidth allocation decisions in the backhaul optical network. The integrated network architecture and the joint handover scheme are simulated using...... OPNET modeler. Results show validation of the protocol, i.e., integrated handover scheme gains better network performances....

  10. A Novel Two-Stage Dynamic Spectrum Sharing Scheme in Cognitive Radio Networks

    Institute of Scientific and Technical Information of China (English)

    Guodong Zhang; Wei Heng; Tian Liang; Chao Meng; Jinming Hu

    2016-01-01

    In order to enhance the efficiency of spectrum utilization and reduce communication overhead in spectrum sharing process,we propose a two-stage dynamic spectrum sharing scheme in which cooperative and noncooperative modes are analyzed in both stages.In particular,the existence and the uniqueness of Nash Equilibrium (NE) strategies for noncooperative mode are proved.In addition,a distributed iterative algorithm is proposed to obtain the optimal solutions of the scheme.Simulation studies are carried out to show the performance comparison between two modes as well as the system revenue improvement of the proposed scheme compared with a conventional scheme without a virtual price control factor.

  11. A Memory Efficient Network Encryption Scheme

    Science.gov (United States)

    El-Fotouh, Mohamed Abo; Diepold, Klaus

    In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.

  12. An Arbitrated Quantum Signature Scheme without Entanglement*

    International Nuclear Information System (INIS)

    Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun

    2017-01-01

    Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)

  13. Discretisation Schemes for Level Sets of Planar Gaussian Fields

    Science.gov (United States)

    Beliaev, D.; Muirhead, S.

    2018-01-01

    Smooth random Gaussian functions play an important role in mathematical physics, a main example being the random plane wave model conjectured by Berry to give a universal description of high-energy eigenfunctions of the Laplacian on generic compact manifolds. Our work is motivated by questions about the geometry of such random functions, in particular relating to the structure of their nodal and level sets. We study four discretisation schemes that extract information about level sets of planar Gaussian fields. Each scheme recovers information up to a different level of precision, and each requires a maximum mesh-size in order to be valid with high probability. The first two schemes are generalisations and enhancements of similar schemes that have appeared in the literature (Beffara and Gayet in Publ Math IHES, 2017. https://doi.org/10.1007/s10240-017-0093-0; Mischaikow and Wanner in Ann Appl Probab 17:980-1018, 2007); these give complete topological information about the level sets on either a local or global scale. As an application, we improve the results in Beffara and Gayet (2017) on Russo-Seymour-Welsh estimates for the nodal set of positively-correlated planar Gaussian fields. The third and fourth schemes are, to the best of our knowledge, completely new. The third scheme is specific to the nodal set of the random plane wave, and provides global topological information about the nodal set up to `visible ambiguities'. The fourth scheme gives a way to approximate the mean number of excursion domains of planar Gaussian fields.

  14. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  15. Investigation of optimal photoionization schemes for Sm by multi-step resonance ionization

    International Nuclear Information System (INIS)

    Cha, H.; Song, K.; Lee, J.

    1997-01-01

    Excited states of Sm atoms are investigated by using multi-color resonance enhanced multiphoton ionization spectroscopy. Among the ionization signals one observed at 577.86 nm is regarded as the most efficient excited state if an 1-color 3-photon scheme is applied. Meanwhile an observed level located at 587.42 nm is regarded as the most efficient state if one uses a 2-color scheme. For 2-color scheme a level located at 573.50 nm from this first excited state is one of the best second excited state for the optimal photoionization scheme. Based on this ionization scheme various concentrations of standard solutions for samarium are determined. The minimum amount of sample which can be detected by a 2-color scheme is determined as 200 fg. The detection sensitivity is limited mainly due to the pollution of the graphite atomizer. copyright 1997 American Institute of Physics

  16. Institutional analysis of incentive schemes for ecosystem service provision - a comparative study across four European countries

    DEFF Research Database (Denmark)

    Prokofieva, Irina; Górriz, Elena; Boon, Tove Enggrob

    2014-01-01

    Incentive schemes and payments for ecosystem services attract increasing attention as a means for aligning the interests of landowners and society by remunerating forest owners for the goods and services their forests produce. As incentive schemes expand around the world, questions related...... and Italy. The analysed schemes are predominantly aimed at enhancing biodiversity and improving recreation. One of the schemes is also related to preserving a variety of forest ecosystem services from forest fires. The incentive schemes are studied following a framework for the institutional analysis of PES...... developed by Prokofieva and Gorriz (Prokofieva, I. and Gorriz, E. 2013: Institutional analysis of incentives for the provision of forest goods and services: an assessment of incentive schemes in Catalonia (North-East Spain), Forest Policy and Economics, 37, 104-114.). We focus on actor and institutional...

  17. An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungyoung Lee

    2011-12-01

    Full Text Available In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO clustering scheme and traditional multihop Single-Input-Single-Output (SISO routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.

  18. Decoupling schemes for the SSC Collider

    International Nuclear Information System (INIS)

    Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.

    1993-05-01

    A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper

  19. Renormalization scheme-invariant perturbation theory

    International Nuclear Information System (INIS)

    Dhar, A.

    1983-01-01

    A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)

  20. Wireless Broadband Access and Accounting Schemes

    Institute of Scientific and Technical Information of China (English)

    2003-01-01

    In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.

  1. Tightly Secure Signatures From Lossy Identification Schemes

    OpenAIRE

    Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi

    2015-01-01

    International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...

  2. Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation

    Directory of Open Access Journals (Sweden)

    Xia Chen

    2008-05-01

    Full Text Available Relay-based transmission can over the benefits in terms of coverage extension as well as throughput improvement if compared to conventional direct transmission. In a relay enhanced cellular (REC network, where multiple mobile terminals act as relaying nodes (RNs, multiuser diversity gain can be exploited. We propose an efficient relaying scheme, referred to as Broadcast Reserved Opportunity Assisted Diversity (BROAD for the REC networks. Unlike the conventional Induced Multiuser Diversity Relaying (IMDR scheme, our scheme acquires channel quality information (CQI in which the destined node (DN sends pilots on a reserved radio resource. The BROAD scheme can significantly decrease the signaling overhead among the mobile RNs while achieving the same multiuser diversity as the conventional IMDR scheme. In addition, an alternative version of the BROAD scheme, named as A-BROAD scheme, is proposed also, in which the candidate RN(s feed back partial or full CQI to the base station (BS for further scheduling purpose. The A-BROAD scheme achieves a higher throughput than the BROAD scheme at the cost of extra signalling overhead. The theoretical analysis given in this paper demonstrates the feasibility of the schemes in terms of their multiuser diversity gains in a REC network.

  3. Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme

    Science.gov (United States)

    Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook

    1995-01-01

    Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.

  4. A new iterative speech enhancement scheme based on Kalman filtering

    DEFF Research Database (Denmark)

    Li, Chunjian; Andersen, Søren Vang

    2005-01-01

    for a high temporal resolution estimation of this variance. A Local Variance Estimator based on a Prediction Error Kalman Filter is designed for this high temporal resolution variance estimation. To achieve fast convergence and avoid local maxima of the likelihood function, a Weighted Power Spectral....... Performance comparison shows significant improvement over the baseline EM algorithm in terms of three objective measures. Listening test indicates an improvement in subjective quality due to a significant reduction of musical noise compared to the baseline EM algorithm....

  5. PLS-based memory control scheme for enhanced process monitoring

    KAUST Repository

    Harrou, Fouzi

    2017-01-20

    Fault detection is important for safe operation of various modern engineering systems. Partial least square (PLS) has been widely used in monitoring highly correlated process variables. Conventional PLS-based methods, nevertheless, often fail to detect incipient faults. In this paper, we develop new PLS-based monitoring chart, combining PLS with multivariate memory control chart, the multivariate exponentially weighted moving average (MEWMA) monitoring chart. The MEWMA are sensitive to incipient faults in the process mean, which significantly improves the performance of PLS methods and widen their applicability in practice. Using simulated distillation column data, we demonstrate that the proposed PLS-based MEWMA control chart is more effective in detecting incipient fault in the mean of the multivariate process variables, and outperform the conventional PLS-based monitoring charts.

  6. Enhanced solar energy collection in porphyrin based photoconversion schemes

    Science.gov (United States)

    Gust, D.; Moore, T. A.

    1983-02-01

    A series of carotenoporphyrins whose conformations varied from folded (with the carotenoid (PI)-electron system stacked over that of the porphyrin) to extended (with the two chromophores widely separated) were studied. The conformations were determined by high resolution proton NMR studies. Laser flash spectroscopy revealed triplet energy transfer from porphyrin to carotenoid. Three distinct pathways for such transfer were discovered: (1) static through space transfer which does not require significant intramolecular motions; (2) dynamic through space transfer mediated by intramolecular motions; (3) triplet transfer mediated by the chemical bonds joining the chromophores. pulse radiolysis and fluorescence quenching of these ethers and related carotenoporphyrins revealed electron transfer in the systems. It is demonstrated that the natural carotenoid functions of photoprotection from singlet oxygen damage and antenna function can be mimicked by synthetic molecules, and therefore, in principle can be applied to artificial solar energy conversion systems.

  7. An Enhanced Control Scheme for Uninterruptible Power Supply

    DEFF Research Database (Denmark)

    Lu, Jinghang; Savaghebi, Mehdi; Wei, Baoze

    2017-01-01

    To address the active power feeding issue in the parallel Uninterruptible Power Supply (UPS) system, a DC-link Voltage Protection (DCVP) control strategy is proposed in this paper. The proposed control method only relies on local load information, which increases the system reliability...... and robustness. Moreover, virtual resistance based regulation strategies are proposed for solving the active power sharing imbalance caused by the active power feeding and harmonic power sharing imbalanced caused by the line resistance mismatching. In addition, an anti-windup based consensus distributed...

  8. PLS-based memory control scheme for enhanced process monitoring

    KAUST Repository

    Harrou, Fouzi; Sun, Ying

    2017-01-01

    Fault detection is important for safe operation of various modern engineering systems. Partial least square (PLS) has been widely used in monitoring highly correlated process variables. Conventional PLS-based methods, nevertheless, often fail

  9. Optimal Sales Schemes for Network Goods

    DEFF Research Database (Denmark)

    Parakhonyak, Alexei; Vikander, Nick

    consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...

  10. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  11. Arbitrated quantum signature scheme with message recovery

    International Nuclear Information System (INIS)

    Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin

    2004-01-01

    Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission

  12. REMINDER: Saved Leave Scheme (SLS)

    CERN Multimedia

    2003-01-01

    Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...

  13. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  14. Labeling schemes for bounded degree graphs

    DEFF Research Database (Denmark)

    Adjiashvili, David; Rotbart, Noy Galil

    2014-01-01

    We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...

  15. Distributed multi-agent scheme for reactive power management with renewable energy

    International Nuclear Information System (INIS)

    Rahman, M.S.; Mahmud, M.A.; Pota, H.R.; Hossain, M.J.

    2014-01-01

    Highlights: • A distributed multi-agent scheme is proposed to enhance the dynamic voltage stability. • A control agent is designed where control actions are performed through PI controller. • Proposed scheme is compared with the conventional approach with DSTATCOM. • Proposed scheme adapts the capability of estimation and control under various operating conditions. - Abstract: This paper presents a new distributed multi-agent scheme for reactive power management in smart coordinated distribution networks with renewable energy sources (RESs) to enhance the dynamic voltage stability, which is mainly based on controlling distributed static synchronous compensators (DSTATCOMs). The proposed control scheme is incorporated in a multi-agent framework where the intelligent agents simultaneously coordinate with each other and represent various physical models to provide information and energy flow among different physical processes. The reactive power is estimated from the topology of distribution networks and with this information, necessary control actions are performed through the proposed proportional integral (PI) controller. The performance of the proposed scheme is evaluated on a 8-bus distribution network under various operating conditions. The performance of the proposed scheme is validated through simulation results and these results are compared to that of conventional PI-based DSTATCOM control scheme. From simulation results, it is found that the distributed MAS provides excellence performance for improving voltage profiles by managing reactive power in a smarter way

  16. Fragment separator momentum compression schemes

    Energy Technology Data Exchange (ETDEWEB)

    Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)

    2011-07-21

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  17. Fragment separator momentum compression schemes

    International Nuclear Information System (INIS)

    Bandura, Laura; Erdelyi, Bela; Hausmann, Marc; Kubo, Toshiyuki; Nolen, Jerry; Portillo, Mauricio; Sherrill, Bradley M.

    2011-01-01

    We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.

  18. Electrical injection schemes for nanolasers

    DEFF Research Database (Denmark)

    Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten

    2013-01-01

    The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...

  19. Scheme of thinking quantum systems

    International Nuclear Information System (INIS)

    Yukalov, V I; Sornette, D

    2009-01-01

    A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field

  20. Yellow light for green scheme

    International Nuclear Information System (INIS)

    Morch, Stein

    2004-01-01

    The article asserts that there could be an investment boom for wind, hydro and bio power in a common Norwegian-Swedish market scheme for green certificates. The Swedish authorities are ready, and the Norwegian government is preparing a report to the Norwegian Parliament. What are the ambitions of Norway, and will hydro power be included? A green certificate market common to more countries have never before been established and requires the solution of many challenging problems. In Sweden, certificate support is expected to promote primarily bioenergy, wind power and small-scale hydro power. In Norway there is an evident potential for wind power, and more hydro power can be developed if desired

  1. Pomeranchuk conjecture and symmetry schemes

    Energy Technology Data Exchange (ETDEWEB)

    Galindo, A.; Morales, A.; Ruegg, H. [Junta de Energia Nuclear, Madrid (Spain); European Organization for Nuclear Research, Geneva (Switzerland); University of Geneva, Geneva (Switzerland)

    1963-01-15

    Pomeranchuk has conjectured that the cross-sections for charge-exchange processes vanish asymptotically as the energy tends to infinity. (By ''charge'' it is meant any internal quantum number, like electric charge, hypercharge, .. . ). It has been stated by several people that this conjecture implies equalities among the total cross-sections whenever any symmetry scheme is invoked for the strong interactions. But to our knowledge no explicit general proof of this statement has been given so far. We want to give this proof for any compact Lie group. We also prove, under certain assumptions, that the equality of the total cross-sections implies that s{sup -l} times the charge-exchange forward scattering absorptive amplitudes tend to zero as s -> ∞.

  2. Matroids and quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Sarvepalli, Pradeep; Raussendorf, Robert

    2010-01-01

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  3. Power adaptive multi-filter carrierless amplitude and phase access scheme for visible light communication network

    Science.gov (United States)

    Li, Wei; Huang, Zhitong; Li, Haoyue; Ji, Yuefeng

    2018-04-01

    Visible light communication (VLC) is a promising candidate for short-range broadband access due to its integration of advantages for both optical communication and wireless communication, whereas multi-user access is a key problem because of the intra-cell and inter-cell interferences. In addition, the non-flat channel effect results in higher losses for users in high frequency bands, which leads to unfair qualities. To solve those issues, we propose a power adaptive multi-filter carrierless amplitude and phase access (PA-MF-CAPA) scheme, and in the first step of this scheme, the MF-CAPA scheme utilizing multiple filters as different CAP dimensions is used to realize multi-user access. The character of orthogonality among the filters in different dimensions can mitigate the effect of intra-cell and inter-cell interferences. Moreover, the MF-CAPA scheme provides different channels modulated on the same frequency bands, which further increases the transmission rate. Then, the power adaptive procedure based on MF-CAPA scheme is presented to realize quality fairness. As demonstrated in our experiments, the MF-CAPA scheme yields an improved throughput compared with multi-band CAP access scheme, and the PA-MF-CAPA scheme enhances the quality fairness and further improves the throughput compared with the MF-CAPA scheme.

  4. Quality of Recovery Evaluation of the Protection Schemes for Fiber-Wireless Access Networks

    Science.gov (United States)

    Fu, Minglei; Chai, Zhicheng; Le, Zichun

    2016-03-01

    With the rapid development of fiber-wireless (FiWi) access network, the protection schemes have got more and more attention due to the risk of huge data loss when failures occur. However, there are few studies on the performance evaluation of the FiWi protection schemes by the unified evaluation criterion. In this paper, quality of recovery (QoR) method was adopted to evaluate the performance of three typical protection schemes (MPMC scheme, OBOF scheme and RPMF scheme) against the segment-level failure in FiWi access network. The QoR models of the three schemes were derived in terms of availability, quality of backup path, recovery time and redundancy. To compare the performance of the three protection schemes comprehensively, five different classes of network services such as emergency service, prioritized elastic service, conversational service, etc. were utilized by means of assigning different QoR weights. Simulation results showed that, for the most service cases, RPMF scheme was proved to be the best solution to enhance the survivability when planning the FiWi access network.

  5. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  6. A Secure Trust Establishment Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Farruh Ishmanov

    2014-01-01

    Full Text Available Trust establishment is an important tool to improve cooperation and enhance security in wireless sensor networks. The core of trust establishment is trust estimation. If a trust estimation method is not robust against attack and misbehavior, the trust values produced will be meaningless, and system performance will be degraded. We present a novel trust estimation method that is robust against on-off attacks and persistent malicious behavior. Moreover, in order to aggregate recommendations securely, we propose using a modified one-step M-estimator scheme. The novelty of the proposed scheme arises from combining past misbehavior with current status in a comprehensive way. Specifically, we introduce an aggregated misbehavior component in trust estimation, which assists in detecting an on-off attack and persistent malicious behavior. In order to determine the current status of the node, we employ previous trust values and current measured misbehavior components. These components are combined to obtain a robust trust value. Theoretical analyses and evaluation results show that our scheme performs better than other trust schemes in terms of detecting an on-off attack and persistent misbehavior.

  7. Evolution of the Z-scheme of photosynthesis: a perspective.

    Science.gov (United States)

    Govindjee; Shevela, Dmitriy; Björn, Lars Olof

    2017-09-01

    The concept of the Z-scheme of oxygenic photosynthesis is in all the textbooks. However, its evolution is not. We focus here mainly on some of the history of its biophysical aspects. We have arbitrarily divided here the 1941-2016 period into three sub-periods: (a) Origin of the concept of two light reactions: first hinted at, in 1941, by James Franck and Karl Herzfeld; described and explained, in 1945, by Eugene Rabinowitch; and a clear hypothesis, given in 1956 by Rabinowitch, of the then available cytochrome experiments: one light oxidizing it and another reducing it; (b) Experimental discovery of the two light reactions and two pigment systems and the Z-scheme of photosynthesis: Robert Emerson's discovery, in 1957, of enhancement in photosynthesis when two light beams (one in the far-red region, and the other of shorter wavelengths) are given together than when given separately; and the 1960 scheme of Robin Hill & Fay Bendall; and (c) Evolution of the many versions of the Z-Scheme: Louis Duysens and Jan Amesz's 1961 experiments on oxidation and reduction of cytochrome f by two different wavelengths of light, followed by the work of many others for more than 50 years.

  8. Fast rerouting schemes for protected mobile IP over MPLS networks

    Science.gov (United States)

    Wen, Chih-Chao; Chang, Sheng-Yi; Chen, Huan; Chen, Kim-Joan

    2005-10-01

    Fast rerouting is a critical traffic engineering operation in the MPLS networks. To implement the Mobile IP service over the MPLS network, one can collaborate with the fast rerouting operation to enhance the availability and survivability. MPLS can protect critical LSP tunnel between Home Agent (HA) and Foreign Agent (FA) using the fast rerouting scheme. In this paper, we propose a simple but efficient algorithm to address the triangle routing problem for the Mobile IP over the MPLS networks. We consider this routing issue as a link weighting and capacity assignment (LW-CA) problem. The derived solution is used to plan the fast restoration mechanism to protect the link or node failure. In this paper, we first model the LW-CA problem as a mixed integer optimization problem. Our goal is to minimize the call blocking probability on the most congested working truck for the mobile IP connections. Many existing network topologies are used to evaluate the performance of our scheme. Results show that our proposed scheme can obtain the best performance in terms of the smallest blocking probability compared to other schemes.

  9. Impact of improved operation and maintenance on cohesive sediment transport in Gezira Scheme, Sudan

    NARCIS (Netherlands)

    Osman, I.S.E.

    2015-01-01

    Summary

    Efficient operation and maintenance of irrigation schemes are needed for improving the hydraulic performance of the canals, enhancing the crop yields and insuring sustainable production. There is a great need to enhance the researches and for a variety of tools such as

  10. How can conceptual schemes change teaching?

    Science.gov (United States)

    Wickman, Per-Olof

    2012-03-01

    Lundqvist, Almqvist and Östman describe a teacher's manner of teaching and the possible consequences it may have for students' meaning making. In doing this the article examines a teacher's classroom practice by systematizing the teacher's transactions with the students in terms of certain conceptual schemes, namely the epistemological moves, educational philosophies and the selective traditions of this practice. In connection to their study one may ask how conceptual schemes could change teaching. This article examines how the relationship of the conceptual schemes produced by educational researchers to educational praxis has developed from the middle of the last century to today. The relationship is described as having been transformed in three steps: (1) teacher deficit and social engineering, where conceptual schemes are little acknowledged, (2) reflecting practitioners, where conceptual schemes are mangled through teacher practice to aid the choices of already knowledgeable teachers, and (3) the mangling of the conceptual schemes by researchers through practice with the purpose of revising theory.

  11. On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems.

    Science.gov (United States)

    Arshad, Hamed; Teymoori, Vahid; Nikooghadam, Morteza; Abbassi, Hassan

    2015-08-01

    Telecare medicine information systems (TMISs) aim to deliver appropriate healthcare services in an efficient and secure manner to patients. A secure mechanism for authentication and key agreement is required to provide proper security in these systems. Recently, Bin Muhaya demonstrated some security weaknesses of Zhu's authentication and key agreement scheme and proposed a security enhanced authentication and key agreement scheme for TMISs. However, we show that Bin Muhaya's scheme is vulnerable to off-line password guessing attacks and does not provide perfect forward secrecy. Furthermore, in order to overcome the mentioned weaknesses, we propose a new two-factor anonymous authentication and key agreement scheme using the elliptic curve cryptosystem. Security and performance analyses demonstrate that the proposed scheme not only overcomes the weaknesses of Bin Muhaya's scheme, but also is about 2.73 times faster than Bin Muhaya's scheme.

  12. Resonance ionization scheme development for europium

    Energy Technology Data Exchange (ETDEWEB)

    Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)

    2017-11-15

    Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.

  13. Secure RAID Schemes for Distributed Storage

    OpenAIRE

    Huang, Wentao; Bruck, Jehoshua

    2016-01-01

    We propose secure RAID, i.e., low-complexity schemes to store information in a distributed manner that is resilient to node failures and resistant to node eavesdropping. We generalize the concept of systematic encoding to secure RAID and show that systematic schemes have significant advantages in the efficiencies of encoding, decoding and random access. For the practical high rate regime, we construct three XOR-based systematic secure RAID schemes with optimal or almost optimal encoding and ...

  14. Improved Seasonal Prediction of European Summer Temperatures With New Five-Layer Soil-Hydrology Scheme

    Science.gov (United States)

    Bunzel, Felix; Müller, Wolfgang A.; Dobrynin, Mikhail; Fröhlich, Kristina; Hagemann, Stefan; Pohlmann, Holger; Stacke, Tobias; Baehr, Johanna

    2018-01-01

    We evaluate the impact of a new five-layer soil-hydrology scheme on seasonal hindcast skill of 2 m temperatures over Europe obtained with the Max Planck Institute Earth System Model (MPI-ESM). Assimilation experiments from 1981 to 2010 and 10-member seasonal hindcasts initialized on 1 May each year are performed with MPI-ESM in two soil configurations, one using a bucket scheme and one a new five-layer soil-hydrology scheme. We find the seasonal hindcast skill for European summer temperatures to improve with the five-layer scheme compared to the bucket scheme and investigate possible causes for these improvements. First, improved indirect soil moisture assimilation allows for enhanced soil moisture-temperature feedbacks in the hindcasts. Additionally, this leads to improved prediction of anomalies in the 500 hPa geopotential height surface, reflecting more realistic atmospheric circulation patterns over Europe.

  15. TE/TM scheme for computation of electromagnetic fields in accelerators

    International Nuclear Information System (INIS)

    Zagorodnov, Igor; Weiland, Thomas

    2005-01-01

    We propose a new two-level economical conservative scheme for short-range wake field calculation in three dimensions. The scheme does not have dispersion in the longitudinal direction and is staircase free (second order convergent). Unlike the finite-difference time domain method (FDTD), it is based on a TE/TM like splitting of the field components in time. Additionally, it uses an enhanced alternating direction splitting of the transverse space operator that makes the scheme computationally as effective as the conventional FDTD method. Unlike the FDTD ADI and low-order Strang methods, the splitting error in our scheme is only of fourth order. As numerical examples show, the new scheme is much more accurate on the long-time scale than the conventional FDTD approach

  16. Optimal Scheme Selection of Agricultural Production Structure Adjustment - Based on DEA Model; Punjab (Pakistan)

    Institute of Scientific and Technical Information of China (English)

    Zeeshan Ahmad; Meng Jun; Muhammad Abdullah; Mazhar Nadeem Ishaq; Majid Lateef; Imran Khan

    2015-01-01

    This paper used the modern evaluation method of DEA (Data Envelopment Analysis) to assess the comparative efficiency and then on the basis of this among multiple schemes chose the optimal scheme of agricultural production structure adjustment. Based on the results of DEA model, we dissected scale advantages of each discretionary scheme or plan. We examined scale advantages of each discretionary scheme, tested profoundly a definitive purpose behind not-DEA efficient, which elucidated the system and methodology to enhance these discretionary plans. At the end, another method had been proposed to rank and select the optimal scheme. The research was important to guide the practice if the modification of agricultural production industrial structure was carried on.

  17. A new access scheme in OFDMA systems

    Institute of Scientific and Technical Information of China (English)

    GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping

    2006-01-01

    This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.

  18. A Spatial Domain Quantum Watermarking Scheme

    International Nuclear Information System (INIS)

    Wei Zhan-Hong; Chen Xiu-Bo; Niu Xin-Xin; Yang Yi-Xian; Xu Shu-Jiang

    2016-01-01

    This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. (paper)

  19. Quantum signature scheme for known quantum messages

    International Nuclear Information System (INIS)

    Kim, Taewan; Lee, Hyang-Sook

    2015-01-01

    When we want to sign a quantum message that we create, we can use arbitrated quantum signature schemes which are possible to sign for not only known quantum messages but also unknown quantum messages. However, since the arbitrated quantum signature schemes need the help of a trusted arbitrator in each verification of the signature, it is known that the schemes are not convenient in practical use. If we consider only known quantum messages such as the above situation, there can exist a quantum signature scheme with more efficient structure. In this paper, we present a new quantum signature scheme for known quantum messages without the help of an arbitrator. Differing from arbitrated quantum signature schemes based on the quantum one-time pad with the symmetric key, since our scheme is based on quantum public-key cryptosystems, the validity of the signature can be verified by a receiver without the help of an arbitrator. Moreover, we show that our scheme provides the functions of quantum message integrity, user authentication and non-repudiation of the origin as in digital signature schemes. (paper)

  20. Evaluation of frame aggregation schemes for the p-persistent based next generation WLANS

    Science.gov (United States)

    Ahmad, Ashar; Anna, Kiran; Bassiouni, Mostafa A.

    2010-04-01

    The next Generation IEEE 802.11n is designed to improve the throughput of the existing standard 802.11. It aims to achieve this by increasing the data rate from 54 Mbps to 600 Mbps with the help of physical layer enhancements. Therefore, the Medium Access Layer (MAC) requires improvements to fully utilize the capabilities of the enhanced 802.11n physical layer. In this paper, we present the performance evaluation results of two frame aggregation schemes viz., MAC Protocol Data Unit Aggregation (A-MPDU) and MAC Service Data Unit Aggregation (A-MSDU) and study their performance impact when the two schemes are incorporated in a p-persistent based 802.11n. The simulation results have shown that the two schemes achieve consistent performance improvement over the standard non-aggregation scheme.

  1. Computerized calculation scheme for toric intraocular lenses.

    Science.gov (United States)

    Langenbucher, Achim; Seitz, Berthold

    2004-06-01

    While a number of intraocular lens (IOL) power prediction formulae are well established for determination of spherical lenses, no common strategy has been published for the computation of toric IOLs. The purpose of this study is to describe a paraxial computing scheme for tracing an axial pencil of rays through the 'optical system eye' containing astigmatic refractive surfaces with their axes at random. The capabilities of this computing scheme are demonstrated with clinical examples. Based on a schematic model eye with spherocylindric surfaces, we use two alternative notations for description of vergences or prescriptions: (1) standard notation (refraction in both cardinal meridians and axis), and (2) component notation (spherical equivalent and cylindric component in 0 degrees and 45 degrees. Refractive surfaces are added to the vergence in component notation, whereas the transformation of the vergence through media is performed in the standard notation for both cardinal meridians. For calculation of the toric lens implant, a pencil of rays is traced through the spectacle and the cornea to the estimated lens position as well as backwards from the retina to the estimated lens position. For calculation of residual spectacle refraction, a pencil of rays is traced backwards from the retina through the toric lens implant and the cornea to the spectacle plane. In example 1 we calculate a 'thin toric lens' for compensation of a corneal astigmatism to achieve a spherical target refraction. In example 2 we compute a 'thick toric lens', which has to compensate for an oblique corneal astigmatism and rotate the spectacle cylinder to the against the rule position to enhance near vision. In example 3 we estimate the residual refraction at the corneal plane after implantation of a thick toric lens, when the cylinder of the lens implant is compensating the corneal cylinder in part and the axis of implantation is not fully aligned with the axis of the corneal astigmatism. This

  2. Green frame aggregation scheme for Wi-Fi networks

    KAUST Repository

    Alaslani, Maha S.

    2015-07-01

    Frame aggregation is a major enhancement in the IEEE 802.11 family to boost the network performance. The increasing awareness about energy efficiency motivates the re-think of frame aggregation design. In this paper, we propose a novel Green Frame Aggregation (GFA) scheduling scheme that optimizes the aggregate size based on channel quality in order to minimize the consumed energy. GFA selects an optimal sub-frame size that satisfies the loss constraint for real-time applications as well as the energy budget of the ideal channel. This scheme is implemented and evaluated using a testbed deployment. The experimental analysis shows that GFA outperforms the conventional frame aggregation methodology in terms of energy efficiency by about 6x in the presence of severe interference conditions. Moreover, GFA outperforms the static frame sizing method in terms of network goodput while maintaining the same end-to-end latency.

  3. Development of knowledgebase system for assisting signal validation scheme design

    International Nuclear Information System (INIS)

    Kitamura, M.; Baba, T.; Washio, T.; Sugiyama, K.

    1987-01-01

    The purpose of this study is to develop a knowledgebase system to be used as a tool for designing signal validation schemes. The outputs from the signal validation scheme can be used as; (1) auxiliary signals for detecting sensor failures, (2) inputs to advanced instrumentation such as disturbance analysis and diagnosis system or safety parameter display system, and (3) inputs to digital control systems. Conventional signal validation techniques such as comparison of redundant sensors, limit checking, and calibration tests have been employed in nuclear power plants. However, these techniques have serious drawbacks, e.g. needs for extra sensors, vulnerability to common mode failures, limited applicability to continuous monitoring, etc. To alleviate these difficulties, a new signal validation technique has been developed by using the methods called analytic redundancy and parity space. Although the new technique has been proved feasible as far as preliminary tests are concerned, further developments should be made in order to enhance its practical applicability

  4. Knowledge-Based Trajectory Error Pattern Method Applied to an Active Force Control Scheme

    Directory of Open Access Journals (Sweden)

    Endra Pitowarno, Musa Mailah, Hishamuddin Jamaluddin

    2012-08-01

    Full Text Available The active force control (AFC method is known as a robust control scheme that dramatically enhances the performance of a robot arm particularly in compensating the disturbance effects. The main task of the AFC method is to estimate the inertia matrix in the feedback loop to provide the correct (motor torque required to cancel out these disturbances. Several intelligent control schemes have already been introduced to enhance the estimation methods of acquiring the inertia matrix such as those using neural network, iterative learning and fuzzy logic. In this paper, we propose an alternative scheme called Knowledge-Based Trajectory Error Pattern Method (KBTEPM to suppress the trajectory track error of the AFC scheme. The knowledge is developed from the trajectory track error characteristic based on the previous experimental results of the crude approximation method. It produces a unique, new and desirable error pattern when a trajectory command is forced. An experimental study was performed using simulation work on the AFC scheme with KBTEPM applied to a two-planar manipulator in which a set of rule-based algorithm is derived. A number of previous AFC schemes are also reviewed as benchmark. The simulation results show that the AFC-KBTEPM scheme successfully reduces the trajectory track error significantly even in the presence of the introduced disturbances.Key Words:  Active force control, estimated inertia matrix, robot arm, trajectory error pattern, knowledge-based.

  5. An image encryption scheme based on the MLNCML system using DNA sequences

    Science.gov (United States)

    Zhang, Ying-Qian; Wang, Xing-Yuan; Liu, Jia; Chi, Ze-Lin

    2016-07-01

    We propose a new image scheme based on the spatiotemporal chaos of the Mixed Linear-Nonlinear Coupled Map Lattices (MLNCML). This spatiotemporal chaotic system has more cryptographic features in dynamics than the system of Coupled Map Lattices (CML). In the proposed scheme, we employ the strategy of DNA computing and one time pad encryption policy, which can enhance the sensitivity to the plaintext and resist differential attack, brute-force attack, statistical attack and plaintext attack. Simulation results and theoretical analysis indicate that the proposed scheme has superior high security.

  6. Anonymous Credential Schemes with Encrypted Attributes

    NARCIS (Netherlands)

    Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.

    2011-01-01

    In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted

  7. Community healthcare financing scheme: findings among residents ...

    African Journals Online (AJOL)

    ... none were active participants as 2(0.6%) were indifferent. There was a statistically significant relationship, Fischers <0.0001 between sex and the scheme's knowledge. Conclusion: Knowledge of the scheme was poor among majority of the respondents and none were active participants. Bribery and corruption was the ...

  8. Improved Load Shedding Scheme considering Distributed Generation

    DEFF Research Database (Denmark)

    Das, Kaushik; Nitsas, Antonios; Altin, Müfit

    2017-01-01

    With high penetration of distributed generation (DG), the conventional under-frequency load shedding (UFLS) face many challenges and may not perform as expected. This article proposes new UFLS schemes, which are designed to overcome the shortcomings of traditional load shedding scheme...

  9. A generalized scheme for designing multistable continuous ...

    Indian Academy of Sciences (India)

    In this paper, a generalized scheme is proposed for designing multistable continuous dynamical systems. The scheme is based on the concept of partial synchronization of states and the concept of constants of motion. The most important observation is that by coupling two mdimensional dynamical systems, multistable ...

  10. Consolidation of the health insurance scheme

    CERN Document Server

    Association du personnel

    2009-01-01

    In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).

  11. A hierarchical classification scheme of psoriasis images

    DEFF Research Database (Denmark)

    Maletti, Gabriela Mariel; Ersbøll, Bjarne Kjær

    2003-01-01

    A two-stage hierarchical classification scheme of psoriasis lesion images is proposed. These images are basically composed of three classes: normal skin, lesion and background. The scheme combines conventional tools to separate the skin from the background in the first stage, and the lesion from...

  12. Privacy Preserving Mapping Schemes Supporting Comparison

    NARCIS (Netherlands)

    Tang, Qiang

    2010-01-01

    To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >

  13. Mixed ultrasoft/norm-conserved pseudopotential scheme

    DEFF Research Database (Denmark)

    Stokbro, Kurt

    1996-01-01

    A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...

  14. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model

    Directory of Open Access Journals (Sweden)

    Guomin Zhou

    2017-01-01

    Full Text Available Digital signature schemes with additional properties have broad applications, such as in protecting the identity of signers allowing a signer to anonymously sign a message in a group of signers (also known as a ring. While these number-theoretic problems are still secure at the time of this research, the situation could change with advances in quantum computing. There is a pressing need to design PKC schemes that are secure against quantum attacks. In this paper, we propose a novel code-based threshold ring signature scheme with a leader-participant model. A leader is appointed, who chooses some shared parameters for other signers to participate in the signing process. This leader-participant model enhances the performance because every participant including the leader could execute the decoding algorithm (as a part of signing process upon receiving the shared parameters from the leader. The time complexity of our scheme is close to Courtois et al.’s (2001 scheme. The latter is often used as a basis to construct other types of code-based signature schemes. Moreover, as a threshold ring signature scheme, our scheme is as efficient as the normal code-based ring signature.

  15. An efficient and secure dynamic ID-based authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Chen, Hung-Ming; Lo, Jung-Wen; Yeh, Chang-Kuo

    2012-12-01

    The rapidly increased availability of always-on broadband telecommunication environments and lower-cost vital signs monitoring devices bring the advantages of telemedicine directly into the patient's home. Hence, the control of access to remote medical servers' resources has become a crucial challenge. A secure authentication scheme between the medical server and remote users is therefore needed to safeguard data integrity, confidentiality and to ensure availability. Recently, many authentication schemes that use low-cost mobile devices have been proposed to meet these requirements. In contrast to previous schemes, Khan et al. proposed a dynamic ID-based remote user authentication scheme that reduces computational complexity and includes features such as a provision for the revocation of lost or stolen smart cards and a time expiry check for the authentication process. However, Khan et al.'s scheme has some security drawbacks. To remedy theses, this study proposes an enhanced authentication scheme that overcomes the weaknesses inherent in Khan et al.'s scheme and demonstrated this scheme is more secure and robust for use in a telecare medical information system.

  16. Labelling schemes: From a consumer perspective

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2000-01-01

    Labelling of food products attracts a lot of political attention these days. As a result of a number of food scandals, most European countries have acknowledged the need for more information and better protection of consumers. Labelling schemes are one way of informing and guiding consumers....... However, initiatives in relation to labelling schemes seldom take their point of departure in consumers' needs and expectations; and in many cases, the schemes are defined by the institutions guaranteeing the label. It is therefore interesting to study how consumers actually value labelling schemes....... A recent MAPP study has investigated the value consumers attach the Government-controlled labels 'Ø-mærket' and 'Den Blå Lup' and the private supermarket label 'Mesterhakket' when they purchase minced meat. The results reveal four consumer segments that use labelling schemes for food products very...

  17. Birkhoffian Symplectic Scheme for a Quantum System

    International Nuclear Information System (INIS)

    Su Hongling

    2010-01-01

    In this paper, a classical system of ordinary differential equations is built to describe a kind of n-dimensional quantum systems. The absorption spectrum and the density of the states for the system are defined from the points of quantum view and classical view. From the Birkhoffian form of the equations, a Birkhoffian symplectic scheme is derived for solving n-dimensional equations by using the generating function method. Besides the Birkhoffian structure-preserving, the new scheme is proven to preserve the discrete local energy conservation law of the system with zero vector f. Some numerical experiments for a 3-dimensional example show that the new scheme can simulate the general Birkhoffian system better than the implicit midpoint scheme, which is well known to be symplectic scheme for Hamiltonian system. (general)

  18. Autonomous droop scheme with reduced generation cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede

    2013-01-01

    Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....

  19. Exact analysis of Packet Reversed Packet Combining Scheme and Modified Packet Combining Scheme; and a combined scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-07-01

    Packet combining scheme is a well defined simple error correction scheme for the detection and correction of errors at the receiver. Although it permits a higher throughput when compared to other basic ARQ protocols, packet combining (PC) scheme fails to correct errors when errors occur in the same bit locations of copies. In a previous work, a scheme known as Packet Reversed Packet Combining (PRPC) Scheme that will correct errors which occur at the same bit location of erroneous copies, was studied however PRPC does not handle a situation where a packet has more than 1 error bit. The Modified Packet Combining (MPC) Scheme that can correct double or higher bit errors was studied elsewhere. Both PRPC and MPC schemes are believed to offer higher throughput in previous studies, however neither adequate investigation nor exact analysis was done to substantiate this claim of higher throughput. In this work, an exact analysis of both PRPC and MPC is carried out and the results reported. A combined protocol (PRPC and MPC) is proposed and the analysis shows that it is capable of offering even higher throughput and better error correction capability at high bit error rate (BER) and larger packet size. (author)

  20. Analysis of central and upwind compact schemes

    International Nuclear Information System (INIS)

    Sengupta, T.K.; Ganeriwal, G.; De, S.

    2003-01-01

    Central and upwind compact schemes for spatial discretization have been analyzed with respect to accuracy in spectral space, numerical stability and dispersion relation preservation. A von Neumann matrix spectral analysis is developed here to analyze spatial discretization schemes for any explicit and implicit schemes to investigate the full domain simultaneously. This allows one to evaluate various boundary closures and their effects on the domain interior. The same method can be used for stability analysis performed for the semi-discrete initial boundary value problems (IBVP). This analysis tells one about the stability for every resolved length scale. Some well-known compact schemes that were found to be G-K-S and time stable are shown here to be unstable for selective length scales by this analysis. This is attributed to boundary closure and we suggest special boundary treatment to remove this shortcoming. To demonstrate the asymptotic stability of the resultant schemes, numerical solution of the wave equation is compared with analytical solution. Furthermore, some of these schemes are used to solve two-dimensional Navier-Stokes equation and a computational acoustic problem to check their ability to solve problems for long time. It is found that those schemes, that were found unstable for the wave equation, are unsuitable for solving incompressible Navier-Stokes equation. In contrast, the proposed compact schemes with improved boundary closure and an explicit higher-order upwind scheme produced correct results. The numerical solution for the acoustic problem is compared with the exact solution and the quality of the match shows that the used compact scheme has the requisite DRP property

  1. Enhanced Near-cloak by FSH Lining

    OpenAIRE

    Liu, Hongyu; Sun, Hongpeng

    2011-01-01

    We consider regularized approximate cloaking for the Helmholtz equation. Various cloaking schemes have been recently proposed and extensively investigated. The existing cloaking schemes in literature are (optimally) within $|\\ln\\rho|^{-1}$ in 2D and $\\rho$ in 3D of the perfect cloaking, where $\\rho$ denotes the regularization parameter. In this work, we develop a cloaking scheme with a well-designed lossy layer right outside the cloaked region that can produce significantly enhanced near-cloa...

  2. Baryon exchange effects in dual unitarisation

    International Nuclear Information System (INIS)

    Hong-Mo, C.; Tsun, T.S.

    1976-05-01

    The effects of baryon exchanges in the renormalisation of Regge trajectories are studied in the dual unitarisation scheme. The main results are that: (i) the Pomeron is boosted above α = 1, giving rising total cross sections beyond baryon-antibaryon thresholds, and (ii) the ω-trajectory remains approximately at α = .5 but acquires a sizeable admixture of the exotic antiq antiq qq state, which enhances its coupling to baryons. There are in addition a number of other interesting predictions. (author)

  3. Symmetric weak ternary quantum homomorphic encryption schemes

    Science.gov (United States)

    Wang, Yuqi; She, Kun; Luo, Qingbin; Yang, Fan; Zhao, Chao

    2016-03-01

    Based on a ternary quantum logic circuit, four symmetric weak ternary quantum homomorphic encryption (QHE) schemes were proposed. First, for a one-qutrit rotation gate, a QHE scheme was constructed. Second, in view of the synthesis of a general 3 × 3 unitary transformation, another one-qutrit QHE scheme was proposed. Third, according to the one-qutrit scheme, the two-qutrit QHE scheme about generalized controlled X (GCX(m,n)) gate was constructed and further generalized to the n-qutrit unitary matrix case. Finally, the security of these schemes was analyzed in two respects. It can be concluded that the attacker can correctly guess the encryption key with a maximum probability pk = 1/33n, thus it can better protect the privacy of users’ data. Moreover, these schemes can be well integrated into the future quantum remote server architecture, and thus the computational security of the users’ private quantum information can be well protected in a distributed computing environment.

  4. Ponzi scheme diffusion in complex networks

    Science.gov (United States)

    Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue

    2017-08-01

    Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.

  5. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  6. Coding Scheme for Assessment of Students’ Explanations and Predictions

    Directory of Open Access Journals (Sweden)

    Mihael Gojkošek

    2017-04-01

    Full Text Available In the process of analyzing students’ explanations and predictions for interaction between brightness enhancement film and beam of white light, a need for objective and reliable assessment instrumentarose. Consequently, we developed a codingscheme that was mostly inspired by the rubrics for self-assessment of scientific abilities. In the paper we present the grading categories that were integrated in the coding scheme, and descriptions of criteria used for evaluation of students work. We report the results of reliability analysis of new assessment tool and present some examples of its application.

  7. Multidimensional flux-limited advection schemes

    International Nuclear Information System (INIS)

    Thuburn, J.

    1996-01-01

    A general method for building multidimensional shape preserving advection schemes using flux limiters is presented. The method works for advected passive scalars in either compressible or incompressible flow and on arbitrary grids. With a minor modification it can be applied to the equation for fluid density. Schemes using the simplest form of the flux limiter can cause distortion of the advected profile, particularly sideways spreading, depending on the orientation of the flow relative to the grid. This is partly because the simple limiter is too restrictive. However, some straightforward refinements lead to a shape-preserving scheme that gives satisfactory results, with negligible grid-flow angle-dependent distortion

  8. Finite-volume scheme for anisotropic diffusion

    Energy Technology Data Exchange (ETDEWEB)

    Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)

    2016-02-01

    In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.

  9. Vector domain decomposition schemes for parabolic equations

    Science.gov (United States)

    Vabishchevich, P. N.

    2017-09-01

    A new class of domain decomposition schemes for finding approximate solutions of timedependent problems for partial differential equations is proposed and studied. A boundary value problem for a second-order parabolic equation is used as a model problem. The general approach to the construction of domain decomposition schemes is based on partition of unity. Specifically, a vector problem is set up for solving problems in individual subdomains. Stability conditions for vector regionally additive schemes of first- and second-order accuracy are obtained.

  10. The new WAGR data acquisition scheme

    International Nuclear Information System (INIS)

    Ellis, W.E.; Leng, J.H.; Smith, I.C.; Smith, M.R.

    1976-06-01

    The existing WAGR data acquisition equipment was inadequate to meet the requirements introduced by the installation of two additional experimental loops and was in any case due for replacement. A completely new scheme was planned and implemented based on mini-computers, which while preserving all the useful features of the old scheme provided additional flexibility and improved data display. Both the initial objectives of the design and the final implementation are discussed without introducing detailed descriptions of hardware or the programming techniques employed. Although the scheme solves a specific problem the general principles are more widely applicable and could readily be adapted to other data checking and display problems. (author)

  11. Kinematic reversal schemes for the geomagnetic dipole.

    Science.gov (United States)

    Levy, E. H.

    1972-01-01

    Fluctuations in the distribution of cyclonic convective cells, in the earth's core, can reverse the sign of the geomagnetic field. Two kinematic reversal schemes are discussed. In the first scheme, a field maintained by cyclones concentrated at low latitude is reversed by a burst of cyclones at high latitude. Conversely, in the second scheme, a field maintained predominantly by cyclones in high latitudes is reversed by a fluctuation consisting of a burst of cyclonic convection at low latitude. The precise fluid motions which produce the geomagnetic field are not known. However, it appears that, whatever the details are, a fluctuation in the distribution of cyclonic cells over latitude can cause a geomagnetic reversal.

  12. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  13. Cognitive radio networks dynamic resource allocation schemes

    CERN Document Server

    Wang, Shaowei

    2014-01-01

    This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off

  14. Algebraic K-theory of generalized schemes

    DEFF Research Database (Denmark)

    Anevski, Stella Victoria Desiree

    and geometry over the field with one element. It also permits the construction of important Arakelov theoretical objects, such as the completion \\Spec Z of Spec Z. In this thesis, we prove a projective bundle theorem for the eld with one element and compute the Chow rings of the generalized schemes Sp\\ec ZN......Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry......, appearing in the construction of \\Spec Z....

  15. The Australian Managed Entry Scheme: Are We Getting it Right?

    Science.gov (United States)

    Tuffaha, Haitham W; Scuffham, Paul A

    2018-05-01

    In 2010, the Australian Government introduced the managed entry scheme (MES) to improve patient access to subsidised drugs on the Pharmaceutical Benefits Scheme and enhance the quality of evidence provided to decision makers. The aim of this paper was to critically review the Australian MES experience. We performed a comprehensive review of publicly available Pharmaceutical Benefits Advisory Committee online documents from January 2010 to July 2017. Relevant information on each MES agreement was systematically extracted, including its rationale, the conditions that guided its implementation and its policy outcomes. We identified 11 drugs where an MES was considered. Most of the identified drugs (75%) were antineoplastic agents and the main uncertainty was the overall survival benefit. More than half of the MES proposals were made by sponsors and most of the schemes were considered after previous rejected/deferred submissions for reimbursement. An MES was not established in 8 of 11 drugs (73%) despite the high evidence uncertainty. Nevertheless, six of these eight drugs were listed after the sponsors reduced their prices. Three MESs were established and implemented by Deeds of Agreement. The three cases were concluded and the required data were submitted within the agreed time frames. The need for feasibility and value of an MES should be carefully considered by stakeholders before embarking on such an agreement. It is essential to engage major stakeholders, including patient representatives, in this process. The conditions governing MESs should be clear, transparent and balanced to address the expectations of various stakeholders.

  16. Automated image enhancement using power law transformations

    Indian Academy of Sciences (India)

    We propose a scheme for automating power law transformations which are used for image enhancement. The scheme we propose does not require the user to choose the exponent in the power law transformation. This method works well for images having poor contrast, especially to those images in which the peaks ...

  17. A survey of Strong Convergent Schemes for the Simulation of ...

    African Journals Online (AJOL)

    We considered strong convergent stochastic schemes for the simulation of stochastic differential equations. The stochastic Taylor's expansion, which is the main tool used for the derivation of strong convergent schemes; the Euler Maruyama, Milstein scheme, stochastic multistep schemes, Implicit and Explicit schemes were ...

  18. Setting aside transactions from pyramid schemes as impeachable ...

    African Journals Online (AJOL)

    These schemes, which are often referred to as pyramid or Ponzi schemes, are unsustainable operations and give rise to problems in the law of insolvency. Investors in these schemes are often left empty-handed upon the scheme's eventual collapse and insolvency. Investors who received pay-outs from the scheme find ...

  19. Betatron tune correction schemes in nuclotron

    International Nuclear Information System (INIS)

    Shchepunov, V.A.

    1992-01-01

    Algorithms of the betatron tune corrections in Nuclotron with sextupolar and octupolar magnets are considered. Second order effects caused by chromaticity correctors are taken into account and sextupolar compensation schemes are proposed to suppress them. 6 refs.; 1 tab

  20. A Directed Signature Scheme and its Applications

    OpenAIRE

    Lal, Sunder; Kumar, Manoj

    2004-01-01

    This paper presents a directed signature scheme with the property that the signature can be verified only with the help of signer or signature receiver. We also propose its applications to share verification of signatures and to threshold cryptosystems.

  1. ONU Power Saving Scheme for EPON System

    Science.gov (United States)

    Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki

    PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.

  2. Nigeria's first national social protection scheme | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2017-06-14

    Jun 14, 2017 ... Women and children at an IDP Camp in DRC ... The cash transfer was provided through the Nigerian Ekiti State Social Security Scheme, ... national policy conference to discuss the findings with media and policy stakeholders.

  3. Verifiable Secret Redistribution for Threshold Sharing Schemes

    National Research Council Canada - National Science Library

    Wong, Theodore M; Wang, Chenxi; Wing, Jeannette M

    2002-01-01

    .... Our protocol guards against dynamic adversaries. We observe that existing protocols either cannot be readily extended to allow redistribution between different threshold schemes, or have vulnerabilities that allow faulty old shareholders...

  4. Boson expansion theory in the seniority scheme

    International Nuclear Information System (INIS)

    Tamura, T.; Li, C.; Pedrocchi, V.G.

    1985-01-01

    A boson expansion formalism in the seniority scheme is presented and its relation with number-conserving quasiparticle calculations is elucidated. Accuracy and convergence are demonstrated numerically. A comparative discussion with other related approaches is given

  5. Designing optimal sampling schemes for field visits

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2008-10-01

    Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...

  6. Comparable Encryption Scheme over Encrypted Cloud Data in Internet of Everything

    Directory of Open Access Journals (Sweden)

    Qian Meng

    2017-01-01

    Full Text Available User authentication has been widely deployed to prevent unauthorized access in the new era of Internet of Everything (IOE. When user passes the legal authentication, he/she can do series of operations in database. We mainly concern issues of data security and comparable queries over ciphertexts in IOE. In traditional database, a Short Comparable Encryption (SCE scheme has been widely used by authorized users to conduct comparable queries over ciphertexts, but existing SCE schemes still incur high storage and computational overhead as well as economic burden. In this paper, we first propose a basic Short Comparable Encryption scheme based on sliding window method (SCESW, which can significantly reduce computational and storage burden as well as enhance work efficiency. Unfortunately, as the cloud service provider is a semitrusted third party, public auditing mechanism needs to be furnished to protect data integrity. To further protect data integrity and reduce management overhead, we present an enhanced SCESW scheme based on position-aware Merkle tree, namely, PT-SCESW. Security analysis proves that PT-SCESW and SCESW schemes can guarantee completeness and weak indistinguishability in standard model. Performance evaluation indicates that PT-SCESW scheme is efficient and feasible in practical applications, especially for smarter and smaller computing devices in IOE.

  7. Secret Sharing Schemes and Advanced Encryption Standard

    Science.gov (United States)

    2015-09-01

    25 4.7 Computational Example . . . . . . . . . . . . . . . . . . . . . 26 5 Side-Channel Effect on Advanced Encryption Standard ( AES ) 31...improvements, and to build upon them to discuss the side-channel effects on the Advanced Encryption Standard ( AES ). The following questions are asked...secret sharing scheme? • Can the improvements to the current secret sharing scheme prove to be beneficial in strengthening/weakening AES encryption

  8. Cost Comparison Among Provable Data Possession Schemes

    Science.gov (United States)

    2016-03-01

    of Acronyms and Abbreviations AE authenticated encryption AWS Amazon Web Services CIO Chief Information Officer DISA Defense Information Systems Agency...the number of possible challenges, H be a cryptographic hash function, AE be an authenticated encryption scheme, f be a keyed pseudo-random function...key kenc R←− Kenc for symmetric encryption scheme Enc, and a random HMAC key kmac R←− Kmac. The secret key is sk = 〈kenc, kmac〉 and public key is pk

  9. A Classification Scheme for Production System Processes

    DEFF Research Database (Denmark)

    Sørensen, Daniel Grud Hellerup; Brunø, Thomas Ditlev; Nielsen, Kjeld

    2018-01-01

    Manufacturing companies often have difficulties developing production platforms, partly due to the complexity of many production systems and difficulty determining which processes constitute a platform. Understanding production processes is an important step to identifying candidate processes...... for a production platform based on existing production systems. Reviewing a number of existing classifications and taxonomies, a consolidated classification scheme for processes in production of discrete products has been outlined. The classification scheme helps ensure consistency during mapping of existing...

  10. A scheme for the hadron spectrum

    International Nuclear Information System (INIS)

    Hoyer, P.

    1978-03-01

    A theoretically self-consistent dual scheme is proposed for the hadron spectrum, which follows naturally from basic requirements and phenomenology. All resonance properties and couplings are calculable in terms of a limited number of input parameters. A first application to ππ→ππ explains the linear trajectory and small daughter couplings. The Zweig rule and the decoupling of baryonium from mesons are expected to be consequences of the scheme. (Auth.)

  11. A Practical Voter-Verifiable Election Scheme.

    OpenAIRE

    Chaum, D; Ryan, PYA; Schneider, SA

    2005-01-01

    We present an election scheme designed to allow voters to verify that their vote is accurately included in the count. The scheme provides a high degree of transparency whilst ensuring the secrecy of votes. Assurance is derived from close auditing of all the steps of the vote recording and counting process with minimal dependence on the system components. Thus, assurance arises from verification of the election rather than having to place trust in the correct behaviour of components of the vot...

  12. Sellafield site (including Drigg) emergency scheme manual

    International Nuclear Information System (INIS)

    1987-02-01

    This Emergency Scheme defines the organisation and procedures available should there be an accident at the Sellafield Site which results in, or may result in, the release of radioactive material, or the generation of a high radiation field, which might present a hazard to employees and/or the general public. This manual covers the general principles of the total emergency scheme and those detailed procedures which are not specific to any single department. (U.K.)

  13. Signature scheme based on bilinear pairs

    Science.gov (United States)

    Tong, Rui Y.; Geng, Yong J.

    2013-03-01

    An identity-based signature scheme is proposed by using bilinear pairs technology. The scheme uses user's identity information as public key such as email address, IP address, telephone number so that it erases the cost of forming and managing public key infrastructure and avoids the problem of user private generating center generating forgery signature by using CL-PKC framework to generate user's private key.

  14. An Optimization Scheme for ProdMod

    International Nuclear Information System (INIS)

    Gregory, M.V.

    1999-01-01

    A general purpose dynamic optimization scheme has been devised in conjunction with the ProdMod simulator. The optimization scheme is suitable for the Savannah River Site (SRS) High Level Waste (HLW) complex operations, and able to handle different types of optimizations such as linear, nonlinear, etc. The optimization is performed in the stand-alone FORTRAN based optimization deliver, while the optimizer is interfaced with the ProdMod simulator for flow of information between the two

  15. Employee-referral schemes and discrimination law

    OpenAIRE

    Connolly, M.

    2015-01-01

    Employee-referral schemes (‘introduce a friend’) are in common usage in recruitment. They carry a potential to discriminate by perpetuating an already unbalanced workforce (say, by gender and ethnicity). With this, or course, comes the risk of litigation and bad publicity as well as any inherent inefficiencies associated with discrimination. This article is threefold. First, it examines the present state of the law. Second, it is based on a survey of employers who use these schemes. Third, it...

  16. Basis scheme of personnel training system

    International Nuclear Information System (INIS)

    Rerucha, F.; Odehnal, J.

    1998-01-01

    Basic scheme of the training system for NPP personnel of CEZ-EDU personnel training system is described in detail. This includes: specific training both basic and periodic, and professional training meaning specialized and continuous training. The following schemes are shown: licence acquisition and authorisation for PWR-440 Control Room Personnel; upgrade training for job positions of Control Room personnel; maintaining and refresh training; module training for certificate acquisition of servicing shift and operating personnel

  17. Navigators’ Behavior in Traffic Separation Schemes

    Directory of Open Access Journals (Sweden)

    Zbigniew Pietrzykowski

    2015-03-01

    Full Text Available One of the areas of decision support in the navigational ship conduct process is a Traffic Separation Scheme. TSSs are established in areas with high traffic density, often near the shore and in port approaches. The main purpose of these schemes is to improve maritime safety by channeling vessel traffic into streams. Traffic regulations as well as ships behavior in real conditions in chosen TSSs have been analyzed in order to develop decision support algorithms.

  18. A Classification Scheme for Literary Characters

    Directory of Open Access Journals (Sweden)

    Matthew Berry

    2017-10-01

    Full Text Available There is no established classification scheme for literary characters in narrative theory short of generic categories like protagonist vs. antagonist or round vs. flat. This is so despite the ubiquity of stock characters that recur across media, cultures, and historical time periods. We present here a proposal of a systematic psychological scheme for classifying characters from the literary and dramatic fields based on a modification of the Thomas-Kilmann (TK Conflict Mode Instrument used in applied studies of personality. The TK scheme classifies personality along the two orthogonal dimensions of assertiveness and cooperativeness. To examine the validity of a modified version of this scheme, we had 142 participants provide personality ratings for 40 characters using two of the Big Five personality traits as well as assertiveness and cooperativeness from the TK scheme. The results showed that assertiveness and cooperativeness were orthogonal dimensions, thereby supporting the validity of using a modified version of TK’s two-dimensional scheme for classifying characters.

  19. Canonical, stable, general mapping using context schemes.

    Science.gov (United States)

    Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict

    2015-11-15

    Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  20. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  1. Efficient multiparty quantum-secret-sharing schemes

    International Nuclear Information System (INIS)

    Xiao Li; Deng Fuguo; Long Guilu; Pan Jianwei

    2004-01-01

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information

  2. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  3. Effect of synthetic jet modulation schemes on the reduction of a laminar separation bubble

    Science.gov (United States)

    Seo, J. H.; Cadieux, F.; Mittal, R.; Deem, E.; Cattafesta, L.

    2018-03-01

    The response of a laminar separation bubble to synthetic jet forcing with various modulation schemes is investigated via direct numerical simulations. A simple sinusoidal waveform is considered as a reference case, and various amplitude modulation schemes, including the square-wave "burst" modulation, are employed in the simulations. The results indicate that burst modulation is less effective at reducing the length of the flow separation than the sinusoidal forcing primarily because burst modulation is associated with a broad spectrum of input frequencies that are higher than the target frequency for the flow control. It is found that such high-frequency forcing delays vortex roll-up and promotes vortex pairing and merging, which have an adverse effect on reducing the separation bubble length. A commonly used amplitude modulation scheme is also found to have reduced effectiveness due to its spectral content. A new amplitude modulation scheme which is tailored to impart more energy at the target frequency is proposed and shown to be more effective than the other modulation schemes. Experimental measurements confirm that modulation schemes can be preserved through the actuator and used to enhance the energy content at the target modulation frequency. The present study therefore suggests that the effectiveness of synthetic jet-based flow control could be improved by carefully designing the spectral content of the modulation scheme.

  4. Multiple image encryption scheme based on pixel exchange operation and vector decomposition

    Science.gov (United States)

    Xiong, Y.; Quan, C.; Tay, C. J.

    2018-02-01

    We propose a new multiple image encryption scheme based on a pixel exchange operation and a basic vector decomposition in Fourier domain. In this algorithm, original images are imported via a pixel exchange operator, from which scrambled images and pixel position matrices are obtained. Scrambled images encrypted into phase information are imported using the proposed algorithm and phase keys are obtained from the difference between scrambled images and synthesized vectors in a charge-coupled device (CCD) plane. The final synthesized vector is used as an input in a random phase encoding (DRPE) scheme. In the proposed encryption scheme, pixel position matrices and phase keys serve as additional private keys to enhance the security of the cryptosystem which is based on a 4-f system. Numerical simulations are presented to demonstrate the feasibility and robustness of the proposed encryption scheme.

  5. Cryptanalysis and Improvement of the Robust and Blind Watermarking Scheme for Dual Color Image

    Directory of Open Access Journals (Sweden)

    Hai Nan

    2015-01-01

    Full Text Available With more color images being widely used on the Internet, the research on embedding color watermark image into color host image has been receiving more attention. Recently, Su et al. have proposed a robust and blind watermarking scheme for dual color image, in which the main innovation is the using of two-level DCT. However, it has been demonstrated in this paper that the original scheme in Su’s study is not secure and can be attacked by our proposed method. In addition, some errors in the original scheme have been pointed out. Also, an improvement measure is presented to enhance the security of the original watermarking scheme. The proposed method has been confirmed by both theoretical analysis and experimental results.

  6. A new two-code keying scheme for SAC-OCDMA systems enabling bipolar encoding

    Science.gov (United States)

    Al-Khafaji, Hamza M. R.; Ngah, Razali; Aljunid, S. A.; Rahman, T. A.

    2015-03-01

    In this paper, we propose a new two-code keying scheme for enabling bipolar encoding in a high-rate spectral-amplitude coding optical code-division multiple-access (SAC-OCDMA) system. The mathematical formulations are derived for the signal-to-noise ratio and bit-error rate (BER) of SAC-OCDMA system based on the suggested scheme using multi-diagonal (MD) code. Performance analyses are assessed considering the effects of phase-induced intensity noise, as well as shot and thermal noises in photodetectors. The numerical results demonstrated that the proposed scheme exhibits an enhanced BER performance compared to the existing unipolar encoding with direct detection technique. Furthermore, the performance improvement afforded by this scheme is verified using simulation experiments.

  7. An Efficient Offloading Scheme For MEC System Considering Delay and Energy Consumption

    Science.gov (United States)

    Sun, Yanhua; Hao, Zhe; Zhang, Yanhua

    2018-01-01

    With the increasing numbers of mobile devices, mobile edge computing (MEC) which provides cloud computing capabilities proximate to mobile devices in 5G networks has been envisioned as a promising paradigm to enhance users experience. In this paper, we investigate a joint consideration of delay and energy consumption offloading scheme (JCDE) for MEC system in 5G heterogeneous networks. An optimization is formulated to minimize the delay as well as energy consumption of the offloading system, which the delay and energy consumption of transmitting and calculating tasks are taken into account. We adopt an iterative greedy algorithm to solve the optimization problem. Furthermore, simulations were carried out to validate the utility and effectiveness of our proposed scheme. The effect of parameter variations on the system is analysed as well. Numerical results demonstrate delay and energy efficiency promotion of our proposed scheme compared with another paper’s scheme.

  8. East Asian winter monsoon forecasting schemes based on the NCEP's climate forecast system

    Science.gov (United States)

    Tian, Baoqiang; Fan, Ke; Yang, Hongqing

    2017-12-01

    The East Asian winter monsoon (EAWM) is the major climate system in the Northern Hemisphere during boreal winter. In this study, we developed two schemes to improve the forecasting skill of the interannual variability of the EAWM index (EAWMI) using the interannual increment prediction method, also known as the DY method. First, we found that version 2 of the NCEP's Climate Forecast System (CFSv2) showed higher skill in predicting the EAWMI in DY form than not. So, based on the advantage of the DY method, Scheme-I was obtained by adding the EAWMI DY predicted by CFSv2 to the observed EAWMI in the previous year. This scheme showed higher forecasting skill than CFSv2. Specifically, during 1983-2016, the temporal correlation coefficient between the Scheme-I-predicted and observed EAWMI was 0.47, exceeding the 99% significance level, with the root-mean-square error (RMSE) decreased by 12%. The autumn Arctic sea ice and North Pacific sea surface temperature (SST) are two important external forcing factors for the interannual variability of the EAWM. Therefore, a second (hybrid) prediction scheme, Scheme-II, was also developed. This scheme not only involved the EAWMI DY of CFSv2, but also the sea-ice concentration (SIC) observed the previous autumn in the Laptev and East Siberian seas and the temporal coefficients of the third mode of the North Pacific SST in DY form. We found that a negative SIC anomaly in the preceding autumn over the Laptev and the East Siberian seas could lead to a significant enhancement of the Aleutian low and East Asian westerly jet in the following winter. However, the intensity of the winter Siberian high was mainly affected by the third mode of the North Pacific autumn SST. Scheme-I and Scheme-II also showed higher predictive ability for the EAWMI in negative anomaly years compared to CFSv2. More importantly, the improvement in the prediction skill of the EAWMI by the new schemes, especially for Scheme-II, could enhance the forecasting skill of

  9. Developing benefit schemes and financial compensation measures for fishermen impacted by marine renewable energy projects

    International Nuclear Information System (INIS)

    Reilly, Kieran; O’Hagan, Anne Marie; Dalton, Gordon

    2016-01-01

    Commercial fishermen are arguably the stakeholder group most likely to be directly impacted by the expansion of the marine renewable energy (MRE) sector. The potential opposition of fishermen may hinder the development of MRE projects and the provision of benefit schemes could to enhance acceptance. Benefit schemes refer to additional voluntary measures that are provided by a developer to local stakeholders. The aim of this study is to explore the issue of the provision of benefit packages to local fishing communities and financial compensation measures for fishermen who may be impacted by MRE projects. Semi-structured interviews were conducted with fourteen fishermen from three separate case study sites around the island of Ireland where MRE projects were being developed. In addition, ten company fisheries liaison officers (CFLOs) who have worked on MRE projects in the UK and Ireland were also interviewed. The interviews were analysed under the headings of local employment, benefits in kind, compensation and community funds and ownership of projects. Analysis shows that there is uncertainty among fishermen over whether they would benefit or gain employment from MRE. Provision of re-training schemes and preferential hiring practices could be used by MRE developers to reduce this uncertainty. There was also agreement between fishermen and CFLOs on the need for the provision of an evidence-base and a standard approach for the calculation of disruption payments. A formal structure for the provision of benefit schemes for fishermen would be useful. Furthermore, schemes that provide a range of benefits to fishermen and other stakeholders over the lifetime of a MRE project are more likely to be successful at enhancing acceptance. - Highlights: • There is uncertainty among fishermen over benefits from MRE projects. • Re-training is required for fishermen to avail of employment opportunities. • Evidence-base is required for calculation of disruption payments.

  10. Security scheme in IMDD-OFDM-PON system with the chaotic pilot interval and scrambling

    Science.gov (United States)

    Chen, Qianghua; Bi, Meihua; Fu, Xiaosong; Lu, Yang; Zeng, Ran; Yang, Guowei; Yang, Xuelin; Xiao, Shilin

    2018-01-01

    In this paper, a random chaotic pilot interval and permutations scheme without any requirement of redundant sideband information is firstly proposed for the physical layer security-enhanced intensity modulation direct detection orthogonal frequency division multiplexing passive optical network (IMDD-OFDM-PON) system. With the help of the position feature of inserting the pilot, a simple logistic chaos map is used to generate the random pilot interval and scramble the chaotic subcarrier allocation of each column pilot data for improving the physical layer confidentiality. Due to the dynamic chaotic permutations of pilot data, the enhanced key space of ∼103303 is achieved in OFDM-PON. Moreover, the transmission experiment of 10-Gb/s 16-QAM encrypted OFDM data is successfully demonstrated over 20-km single-mode fiber, which indicates that the proposed scheme not only improves the system security, but also can achieve the same performance as in the common IMDD-OFDM-PON system without encryption scheme.

  11. Financial incentive schemes in primary care

    Directory of Open Access Journals (Sweden)

    Gillam S

    2015-09-01

    Full Text Available Stephen Gillam Department of Public Health and Primary Care, Institute of Public Health, University of Cambridge, Cambridge, UK Abstract: Pay-for-performance (P4P schemes have become increasingly common in primary care, and this article reviews their impact. It is based primarily on existing systematic reviews. The evidence suggests that P4P schemes can change health professionals' behavior and improve recorded disease management of those clinical processes that are incentivized. P4P may narrow inequalities in performance comparing deprived with nondeprived areas. However, such schemes have unintended consequences. Whether P4P improves the patient experience, the outcomes of care or population health is less clear. These practical uncertainties mirror the ethical concerns of many clinicians that a reductionist approach to managing markers of chronic disease runs counter to the humanitarian values of family practice. The variation in P4P schemes between countries reflects different historical and organizational contexts. With so much uncertainty regarding the effects of P4P, policy makers are well advised to proceed carefully with the implementation of such schemes until and unless clearer evidence for their cost–benefit emerges. Keywords: financial incentives, pay for performance, quality improvement, primary care

  12. Short-Term Saved Leave Scheme

    CERN Multimedia

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new implementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme a...

  13. Short-Term Saved Leave Scheme

    CERN Multimedia

    HR Department

    2007-01-01

    As announced at the meeting of the Standing Concertation Committee (SCC) on 26 June 2007 and in http://Bulletin No. 28/2007, the existing Saved Leave Scheme will be discontinued as of 31 December 2007. Staff participating in the Scheme will shortly receive a contract amendment stipulating the end of financial contributions compensated by save leave. Leave already accumulated on saved leave accounts can continue to be taken in accordance with the rules applicable to the current scheme. A new system of saved leave will enter into force on 1 January 2008 and will be the subject of a new im-plementation procedure entitled "Short-term saved leave scheme" dated 1 January 2008. At its meeting on 4 December 2007, the SCC agreed to recommend the Director-General to approve this procedure, which can be consulted on the HR Department’s website at the following address: https://cern.ch/hr-services/services-Ben/sls_shortterm.asp All staff wishing to participate in the new scheme ...

  14. PPM-based relay communication schemes for wireless body area networks

    NARCIS (Netherlands)

    Zhang, P.; Willems, F.M.J.; Huang, Li

    2012-01-01

    This paper investigates cooperative communication schemes based on a single relay with pulse-position modulation (PPM) signaling, for enhancing energy efficiency of wireless body area networks (WBANs) in noncoherent channel settings. We explore cooperation between the source and the relay such that

  15. Transverse velocity modulator and generator schemes based on non-collinear radiation and electron beams

    CERN Document Server

    Varfolomeev, A A

    2000-01-01

    New non-collinear schemes are suggested for transverse velocity modulation of electron beams and for the generation of coherent spontaneous radiation by these transversely modulated beams. It is shown that due to the non-collinearity some orders of magnitude enhancement can be achieved for the coherent spontaneous radiation (CSR) power at both the fundamental and harmonic frequencies.

  16. A fast resonance interference treatment scheme with subgroup method

    International Nuclear Information System (INIS)

    Cao, L.; He, Q.; Wu, H.; Zu, T.; Shen, W.

    2015-01-01

    A fast Resonance Interference Factor (RIF) scheme is proposed to treat the resonance interference effects between different resonance nuclides. This scheme utilizes the conventional subgroup method to evaluate the self-shielded cross sections of the dominant resonance nuclide in the heterogeneous system and the hyper-fine energy group method to represent the resonance interference effects in a simplified homogeneous model. In this paper, the newly implemented scheme is compared to the background iteration scheme, the Resonance Nuclide Group (RNG) scheme and the conventional RIF scheme. The numerical results show that the errors of the effective self-shielded cross sections are significantly reduced by the fast RIF scheme compared with the background iteration scheme and the RNG scheme. Besides, the fast RIF scheme consumes less computation time than the conventional RIF schemes. The speed-up ratio is ~4.5 for MOX pin cell problems. (author)

  17. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks.

    Science.gov (United States)

    Jung, Jaewook; Kim, Jiye; Choi, Younsung; Won, Dongho

    2016-08-16

    In wireless sensor networks (WSNs), a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.'s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.'s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  18. Provable Secure and Efficient Digital Rights Management Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography

    Directory of Open Access Journals (Sweden)

    Yuanyuan Zhang

    2015-01-01

    Full Text Available Since the concept of ubiquitous computing is firstly proposed by Mark Weiser, its connotation has been extending and expanding by many scholars. In pervasive computing application environment, many kinds of small devices containing smart cart are used to communicate with others. In 2013, Yang et al. proposed an enhanced authentication scheme using smart card for digital rights management. They demonstrated that their scheme is secure enough. However, Mishra et al. pointed out that Yang et al.’s scheme suffers from the password guessing attack and the denial of service attack. Moreover, they also demonstrated that Yang et al.’s scheme is not efficient enough when the user inputs an incorrect password. In this paper, we analyze Yang et al.’s scheme again, and find that their scheme is vulnerable to the session key attack. And, there are some mistakes in their scheme. To surmount the weakness of Yang et al.’s scheme, we propose a more efficient and provable secure digital rights management authentication scheme using smart card based on elliptic curve cryptography.

  19. An Anonymous User Authentication and Key Agreement Scheme Based on a Symmetric Cryptosystem in Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Jaewook Jung

    2016-08-01

    Full Text Available In wireless sensor networks (WSNs, a registered user can login to the network and use a user authentication protocol to access data collected from the sensor nodes. Since WSNs are typically deployed in unattended environments and sensor nodes have limited resources, many researchers have made considerable efforts to design a secure and efficient user authentication process. Recently, Chen et al. proposed a secure user authentication scheme using symmetric key techniques for WSNs. They claim that their scheme assures high efficiency and security against different types of attacks. After careful analysis, however, we find that Chen et al.’s scheme is still vulnerable to smart card loss attack and is susceptible to denial of service attack, since it is invalid for verification to simply compare an entered ID and a stored ID in smart card. In addition, we also observe that their scheme cannot preserve user anonymity. Furthermore, their scheme cannot quickly detect an incorrect password during login phase, and this flaw wastes both communication and computational overheads. In this paper, we describe how these attacks work, and propose an enhanced anonymous user authentication and key agreement scheme based on a symmetric cryptosystem in WSNs to address all of the aforementioned vulnerabilities in Chen et al.’s scheme. Our analysis shows that the proposed scheme improves the level of security, and is also more efficient relative to other related schemes.

  20. How update schemes influence crowd simulations

    International Nuclear Information System (INIS)

    Seitz, Michael J; Köster, Gerta

    2014-01-01

    Time discretization is a key modeling aspect of dynamic computer simulations. In current pedestrian motion models based on discrete events, e.g. cellular automata and the Optimal Steps Model, fixed-order sequential updates and shuffle updates are prevalent. We propose to use event-driven updates that process events in the order they occur, and thus better match natural movement. In addition, we present a parallel update with collision detection and resolution for situations where computational speed is crucial. Two simulation studies serve to demonstrate the practical impact of the choice of update scheme. Not only do density-speed relations differ, but there is a statistically significant effect on evacuation times. Fixed-order sequential and random shuffle updates with a short update period come close to event-driven updates. The parallel update scheme overestimates evacuation times. All schemes can be employed for arbitrary simulation models with discrete events, such as car traffic or animal behavior. (paper)

  1. Asynchronous discrete event schemes for PDEs

    Science.gov (United States)

    Stone, D.; Geiger, S.; Lord, G. J.

    2017-08-01

    A new class of asynchronous discrete-event simulation schemes for advection-diffusion-reaction equations is introduced, based on the principle of allowing quanta of mass to pass through faces of a (regular, structured) Cartesian finite volume grid. The timescales of these events are linked to the flux on the face. The resulting schemes are self-adaptive, and local in both time and space. Experiments are performed on realistic physical systems related to porous media flow applications, including a large 3D advection diffusion equation and advection diffusion reaction systems. The results are compared to highly accurate reference solutions where the temporal evolution is computed with exponential integrator schemes using the same finite volume discretisation. This allows a reliable estimation of the solution error. Our results indicate a first order convergence of the error as a control parameter is decreased, and we outline a framework for analysis.

  2. An adaptive Cartesian control scheme for manipulators

    Science.gov (United States)

    Seraji, H.

    1987-01-01

    A adaptive control scheme for direct control of manipulator end-effectors to achieve trajectory tracking in Cartesian space is developed. The control structure is obtained from linear multivariable theory and is composed of simple feedforward and feedback controllers and an auxiliary input. The direct adaptation laws are derived from model reference adaptive control theory and are not based on parameter estimation of the robot model. The utilization of feedforward control and the inclusion of auxiliary input are novel features of the present scheme and result in improved dynamic performance over existing adaptive control schemes. The adaptive controller does not require the complex mathematical model of the robot dynamics or any knowledge of the robot parameters or the payload, and is computationally fast for online implementation with high sampling rates.

  3. Quantum Watermarking Scheme Based on INEQR

    Science.gov (United States)

    Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou

    2018-04-01

    Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.

  4. Improvement of One Quantum Encryption Scheme

    Science.gov (United States)

    Cao, Zhengjun; Liu, Lihua

    2012-01-01

    Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.

  5. A universal encoding scheme for MIMO transmission using a single active element for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama; Papadias, C.B.; Kalis, A.

    2009-01-01

    A universal scheme for encoding multiple symbol streams using a single driven element (and consequently a single radio frequency (RF) frontend) surrounded by parasitic elements (PE) loaded with variable reactive loads, is proposed in this paper. The proposed scheme is based on creating a MIMO sys...

  6. A simple angular transmit diversity scheme using a single RF frontend for PSK modulation schemes

    DEFF Research Database (Denmark)

    Alrabadi, Osama Nafeth Saleem; Papadias, Constantinos B.; Kalis, Antonis

    2009-01-01

    array (SPA) with a single transceiver, and an array area of 0.0625 square wavelengths. The scheme which requires no channel state information (CSI) at the transmitter, provides mainly a diversity gain to combat against multipath fading. The performance/capacity of the proposed diversity scheme...

  7. Carbon trading: Current schemes and future developments

    International Nuclear Information System (INIS)

    Perdan, Slobodan; Azapagic, Adisa

    2011-01-01

    This paper looks at the greenhouse gas (GHG) emissions trading schemes and examines the prospects of carbon trading. The first part of the paper gives an overview of several mandatory GHG trading schemes around the world. The second part focuses on the future trends in carbon trading. It argues that the emergence of new schemes, a gradual enlargement of the current ones, and willingness to link existing and planned schemes seem to point towards geographical, temporal and sectoral expansion of emissions trading. However, such expansion would need to overcome some considerable technical and non-technical obstacles. Linking of the current and emerging trading schemes requires not only considerable technical fixes and harmonisation of different trading systems, but also necessitates clear regulatory and policy signals, continuing political support and a more stable economic environment. Currently, the latter factors are missing. The global economic turmoil and its repercussions for the carbon market, a lack of the international deal on climate change defining the Post-Kyoto commitments, and unfavourable policy shifts in some countries, cast serious doubts on the expansion of emissions trading and indicate that carbon trading enters an uncertain period. - Highlights: → The paper provides an extensive overview of mandatory emissions trading schemes around the world. → Geographical, temporal and sectoral expansion of emissions trading are identified as future trends. → The expansion requires considerable technical fixes and harmonisation of different trading systems. → Clear policy signals, political support and a stable economic environment are needed for the expansion. → A lack of the post-Kyoto commitments and unfavourable policy shifts indicate an uncertain future for carbon trading.

  8. Pressure correction schemes for compressible flows

    International Nuclear Information System (INIS)

    Kheriji, W.

    2011-01-01

    This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)

  9. EPU correction scheme study at the CLS

    Energy Technology Data Exchange (ETDEWEB)

    Bertwistle, Drew, E-mail: drew.bertwistle@lightsource.ca; Baribeau, C.; Dallin, L.; Chen, S.; Vogt, J.; Wurtz, W. [Canadian Light Source Inc. 44 Innovation Boulevard, Saskatoon, SK S7N 2V3 (Canada)

    2016-07-27

    The Canadian Light Source (CLS) Quantum Materials Spectroscopy Center (QMSC) beamline will employ a novel double period (55 mm, 180 mm) elliptically polarizing undulator (EPU) to produce photons of arbitrary polarization in the soft X-ray regime. The long period and high field of the 180 mm period EPU will have a strong dynamic focusing effect on the storage ring electron beam. We have considered two partial correction schemes, a 4 m long planar array of BESSY-II style current strips, and soft iron L-shims. In this paper we briefly consider the implementation of these correction schemes.

  10. Verification of an objective analysis scheme

    International Nuclear Information System (INIS)

    Cats, G.J.; Haan, B.J. de; Hafkenscheid, L.M.

    1987-01-01

    An intermittent data assimilation scheme has been used to produce wind and precipitation fields during the 10 days after the explosion at the Chernobyl nuclear power plant on 25 April 1986. The wind fields are analyses, the precipitation fields have been generated by the forecast model part of the scheme. The precipitation fields are of fair quality. The quality of the wind fields has been monitored by the ensuing trajectories. These were found to describe the arrival times of radioactive air in good agreement with most observational data, taken all over Europe. The wind analyses are therefore considered to be reliable. 25 refs.; 13 figs

  11. Optimal powering schemes for legged robotics

    Science.gov (United States)

    Muench, Paul; Bednarz, David; Czerniak, Gregory P.; Cheok, Ka C.

    2010-04-01

    Legged Robots have tremendous mobility, but they can also be very inefficient. These inefficiencies can be due to suboptimal control schemes, among other things. If your goal is to get from point A to point B in the least amount of time, your control scheme will be different from if your goal is to get there using the least amount of energy. In this paper, we seek a balance between these extremes by looking at both efficiency and speed. We model a walking robot as a rimless wheel, and, using Pontryagin's Maximum Principle (PMP), we find an "on-off" control for the model, and describe the switching curve between these control extremes.

  12. System Protection Schemes in Eastern Denmark

    DEFF Research Database (Denmark)

    Rasmussen, Joana

    outages in the southern part of the 132-kV system introduce further stress in the power system, eventually leading to a voltage collapse. The local System Protection Scheme against voltage collapse is designed as a response-based scheme, which is dependent on local indication of reactive and active power...... effective measures, because they are associated with large reactive power losses in the transmission system. Ordered reduction of wind generation is considered an effective measure to maintain voltage stability in the system. Reactive power in the system is released due to tripping of a significant amount...... system. In that way, the power system capability could be extended beyond normal limits....

  13. Group Buying Schemes : A Sustainable Business Model?

    OpenAIRE

    Köpp, Sebastian; Mukhachou, Aliaksei; Schwaninger, Markus

    2013-01-01

    Die Autoren gehen der Frage nach, ob "Group Buying Schemes" wie beispielsweise von den Unternehmen Groupon und Dein Deal angeboten, ein nachhaltiges Geschäftsmodell sind. Anhand der Fallstudie Groupon wird mit einem System Dynamics Modell festgestellt, dass das Geschäftsmodell geändert werden muss, wenn die Unternehmung auf Dauer lebensfähig sein soll. The authors examine if group buying schemes are a sustainable business model. By means of the Groupon case study and using a System Dynami...

  14. New Imaging Operation Scheme at VLTI

    Science.gov (United States)

    Haubois, Xavier

    2018-04-01

    After PIONIER and GRAVITY, MATISSE will soon complete the set of 4 telescope beam combiners at VLTI. Together with recent developments in the image reconstruction algorithms, the VLTI aims to develop its operation scheme to allow optimized and adaptive UV plane coverage. The combination of spectro-imaging instruments, optimized operation framework and image reconstruction algorithms should lead to an increase of the reliability and quantity of the interferometric images. In this contribution, I will present the status of this new scheme as well as possible synergies with other instruments.

  15. Hilbert schemes of points and Heisenberg algebras

    International Nuclear Information System (INIS)

    Ellingsrud, G.; Goettsche, L.

    2000-01-01

    Let X [n] be the Hilbert scheme of n points on a smooth projective surface X over the complex numbers. In these lectures we describe the action of the Heisenberg algebra on the direct sum of the cohomologies of all the X [n] , which has been constructed by Nakajima. In the second half of the lectures we study the relation of the Heisenberg algebra action and the ring structures of the cohomologies of the X [n] , following recent work of Lehn. In particular we study the Chern and Segre classes of tautological vector bundles on the Hilbert schemes X [n] . (author)

  16. Security problem on arbitrated quantum signature schemes

    International Nuclear Information System (INIS)

    Choi, Jeong Woon; Chang, Ku-Young; Hong, Dowon

    2011-01-01

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  17. Optimal sampling schemes applied in geology

    CSIR Research Space (South Africa)

    Debba, Pravesh

    2010-05-01

    Full Text Available Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology UP 2010 2 / 47 Outline 1 Introduction to hyperspectral remote... sensing 2 Objective of Study 1 3 Study Area 4 Data used 5 Methodology 6 Results 7 Background and Research Question for Study 2 8 Study Area and Data 9 Methodology 10 Results 11 Conclusions Debba (CSIR) Optimal Sampling Schemes applied in Geology...

  18. Quadratically convergent MCSCF scheme using Fock operators

    International Nuclear Information System (INIS)

    Das, G.

    1981-01-01

    A quadratically convergent formulation of the MCSCF method using Fock operators is presented. Among its advantages the present formulation is quadratically convergent unlike the earlier ones based on Fock operators. In contrast to other quadratically convergent schemes as well as the one based on generalized Brillouin's theorem, this method leads easily to a hybrid scheme where the weakly coupled orbitals (such as the core) are handled purely by Fock equations, while the rest of the orbitals are treated by a quadratically convergent approach with a truncated virtual space obtained by the use of the corresponding Fock equations

  19. Security problem on arbitrated quantum signature schemes

    Energy Technology Data Exchange (ETDEWEB)

    Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

    2011-12-15

    Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

  20. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Qiuhua Wang

    2017-02-01

    Full Text Available Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  1. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks.

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-06-08

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas's currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  2. Security analysis and improvement of a privacy authentication scheme for telecare medical information systems.

    Science.gov (United States)

    Wu, Fan; Xu, Lili

    2013-08-01

    Nowadays, patients can gain many kinds of medical service on line via Telecare Medical Information Systems(TMIS) due to the fast development of computer technology. So security of communication through network between the users and the server is very significant. Authentication plays an important part to protect information from being attacked by malicious attackers. Recently, Jiang et al. proposed a privacy enhanced scheme for TMIS using smart cards and claimed their scheme was better than Chen et al.'s. However, we have showed that Jiang et al.'s scheme has the weakness of ID uselessness and is vulnerable to off-line password guessing attack and user impersonation attack if an attacker compromises the legal user's smart card. Also, it can't resist DoS attack in two cases: after a successful impersonation attack and wrong password input in Password change phase. Then we propose an improved mutual authentication scheme used for a telecare medical information system. Remote monitoring, checking patients' past medical history record and medical consultant can be applied in the system where information transmits via Internet. Finally, our analysis indicates that the suggested scheme overcomes the disadvantages of Jiang et al.'s scheme and is practical for TMIS.

  3. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Science.gov (United States)

    Lu, Yanrong; Li, Lixiang; Peng, Haipeng; Yang, Yixian

    2016-01-01

    WSNs (Wireless sensor networks) are nowadays viewed as a vital portion of the IoTs (Internet of Things). Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement) enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham) logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications) to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs. PMID:27338382

  4. An Energy Efficient Mutual Authentication and Key Agreement Scheme Preserving Anonymity for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Yanrong Lu

    2016-06-01

    Full Text Available WSNs (Wireless sensor networks are nowadays viewed as a vital portion of the IoTs (Internet of Things. Security is a significant issue in WSNs, especially in resource-constrained environments. AKA (Authentication and key agreement enhances the security of WSNs against adversaries attempting to get sensitive sensor data. Various AKA schemes have been developed for verifying the legitimate users of a WSN. Firstly, we scrutinize Amin-Biswas’s currently scheme and demonstrate the major security loopholes in their works. Next, we propose a lightweight AKA scheme, using symmetric key cryptography based on smart card, which is resilient against all well known security attacks. Furthermore, we prove the scheme accomplishes mutual handshake and session key agreement property securely between the participates involved under BAN (Burrows, Abadi and Needham logic. Moreover, formal security analysis and simulations are also conducted using AVISPA(Automated Validation of Internet Security Protocols and Applications to show that our scheme is secure against active and passive attacks. Additionally, performance analysis shows that our proposed scheme is secure and efficient to apply for resource-constrained WSNs.

  5. A Novel Physical Layer Assisted Authentication Scheme for Mobile Wireless Sensor Networks.

    Science.gov (United States)

    Wang, Qiuhua

    2017-02-04

    Physical-layer authentication can address physical layer vulnerabilities and security threats in wireless sensor networks, and has been considered as an effective complementary enhancement to existing upper-layer authentication mechanisms. In this paper, to advance the existing research and improve the authentication performance, we propose a novel physical layer assisted authentication scheme for mobile wireless sensor networks. In our proposed scheme, we explore the reciprocity and spatial uncorrelation of the wireless channel to verify the identities of involved transmitting users and decide whether all data frames are from the same sender. In our proposed scheme, a new method is developed for the legitimate users to compare their received signal strength (RSS) records, which avoids the information from being disclosed to the adversary. Our proposed scheme can detect the spoofing attack even in a high dynamic environment. We evaluate our scheme through experiments under indoor and outdoor environments. Experiment results show that our proposed scheme is more efficient and achieves a higher detection rate as well as keeping a lower false alarm rate.

  6. Analysis of Program Obfuscation Schemes with Variable Encoding Technique

    Science.gov (United States)

    Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi

    Program analysis techniques have improved steadily over the past several decades, and software obfuscation schemes have come to be used in many commercial programs. A software obfuscation scheme transforms an original program or a binary file into an obfuscated program that is more complicated and difficult to analyze, while preserving its functionality. However, the security of obfuscation schemes has not been properly evaluated. In this paper, we analyze obfuscation schemes in order to clarify the advantages of our scheme, the XOR-encoding scheme. First, we more clearly define five types of attack models that we defined previously, and define quantitative resistance to these attacks. Then, we compare the security, functionality and efficiency of three obfuscation schemes with encoding variables: (1) Sato et al.'s scheme with linear transformation, (2) our previous scheme with affine transformation, and (3) the XOR-encoding scheme. We show that the XOR-encoding scheme is superior with regard to the following two points: (1) the XOR-encoding scheme is more secure against a data-dependency attack and a brute force attack than our previous scheme, and is as secure against an information-collecting attack and an inverse transformation attack as our previous scheme, (2) the XOR-encoding scheme does not restrict the calculable ranges of programs and the loss of efficiency is less than in our previous scheme.

  7. Investigation of schemes for incorporating generator Q limits in the ...

    Indian Academy of Sciences (India)

    Handling generator Q limits is one such important feature needed in any practical load flow method. This paper presents a comprehensive investigation of two classes of schemes intended to handle this aspect i.e. the bus type switching scheme and the sensitivity scheme. We propose two new sensitivity based schemes ...

  8. The bare parameters of Gribov's Langrangian are understood and determined

    International Nuclear Information System (INIS)

    Bishari, M.

    1977-01-01

    In the context of the ''1/N Dual Unitarization'' scheme, an explicit dynamical study of the triple bare pomeron mechanism which governs the interaction term in Gribov's Lagrangian is presented. Together with the previously established bare pomeron slope and intercept, controlling respectively, the kinetic and mass terms in Gribov's Lagrangian, this work demonstrates the viability of the ''1/N Dual Unitarization'' approach for a field theory of interaction bare pomerons. (author)

  9. Sliding Mode Extremum Seeking Control Scheme Based on PSO for Maximum Power Point Tracking in Photovoltaic Systems

    Directory of Open Access Journals (Sweden)

    Her-Terng Yau

    2013-01-01

    Full Text Available An extremum seeking control (ESC scheme is proposed for maximum power point tracking (MPPT in photovoltaic power generation systems. The robustness of the proposed scheme toward irradiance changes is enhanced by implementing the ESC scheme using a sliding mode control (SMC law. In the proposed approach, the chattering phenomenon caused by high frequency switching is suppressed by means of a sliding layer concept. Moreover, in implementing the proposed controller, the optimal value of the gain constant is determined using a particle swarm optimization (PSO algorithm. The experimental and simulation results show that the proposed PSO-based sliding mode ESC (SMESC control scheme yields a better transient response, steady-state stability, and robustness than traditional MPPT schemes based on gradient detection methods.

  10. Sources of funding for community schemes

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1999-11-01

    There is an increasing level of interest amongst community groups in the UK to become involved in the development of renewable energy schemes. Often however these community groups have only limited funds of their own, so any additional funds that can be identified to help fund their renewable energy scheme can be very useful. There are a range of funding sources available that provide grants or loans for which community groups are eligible to apply. Few of these funding sources are targeted towards renewable energy specifically, nevertheless the funds may be applicable to renewable energy schemes under appropriate circumstances. To date, however, few of these funds have been accessed by community groups for renewable energy initiatives. One of the reasons for this low take-up of funds on offer could be that the funding sources may be difficult and time-consuming to identify, especially where the energy component of the fund is not readily apparent. This directory draws together details about many of the principal funding sources available in the UK that may consider providing funds to community groups wanting to develop a renewable energy scheme. (author)

  11. The QKD network: model and routing scheme

    Science.gov (United States)

    Yang, Chao; Zhang, Hongqi; Su, Jinhai

    2017-11-01

    Quantum key distribution (QKD) technology can establish unconditional secure keys between two communicating parties. Although this technology has some inherent constraints, such as the distance and point-to-point mode limits, building a QKD network with multiple point-to-point QKD devices can overcome these constraints. Considering the development level of current technology, the trust relaying QKD network is the first choice to build a practical QKD network. However, the previous research didn't address a routing method on the trust relaying QKD network in detail. This paper focuses on the routing issues, builds a model of the trust relaying QKD network for easily analysing and understanding this network, and proposes a dynamical routing scheme for this network. From the viewpoint of designing a dynamical routing scheme in classical network, the proposed scheme consists of three components: a Hello protocol helping share the network topology information, a routing algorithm to select a set of suitable paths and establish the routing table and a link state update mechanism helping keep the routing table newly. Experiments and evaluation demonstrates the validity and effectiveness of the proposed routing scheme.

  12. SYNTHESIS OF VISCOELASTIC MATERIAL MODELS (SCHEMES

    Directory of Open Access Journals (Sweden)

    V. Bogomolov

    2014-10-01

    Full Text Available The principles of structural viscoelastic schemes construction for materials with linear viscoelastic properties in accordance with the given experimental data on creep tests are analyzed. It is shown that there can be only four types of materials with linear visco-elastic properties.

  13. BPHZL-subtraction scheme and axial gauges

    Energy Technology Data Exchange (ETDEWEB)

    Kreuzer, M.; Rebhan, A.; Schweda, M.; Piguet, O.

    1986-03-27

    The application of the BPHZL subtraction scheme to Yang-Mills theories in axial gauges is presented. In the auxillary mass formulation we show the validity of the convergence theorems for subtracted momentum space integrals, and we give the integral formulae necessary for one-loop calculations. (orig.).

  14. The data cyclotron query processing scheme

    NARCIS (Netherlands)

    R.A. Goncalves (Romulo); M.L. Kersten (Martin)

    2010-01-01

    htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot

  15. THE DEVELOPMENT OF FREE PRIMARY EDUCATION SCHEME ...

    African Journals Online (AJOL)

    user

    Education scheme in Western Region and marked a radical departure from the hitherto ... academic symposia, lectures, debates, reputable journals and standard .... Enrolment in Primary Schools in the Western Region by Sex, 1953 – 1960. Year Boys .... “Possibly no single decision of the decade prior to independence had.

  16. High Order Semi-Lagrangian Advection Scheme

    Science.gov (United States)

    Malaga, Carlos; Mandujano, Francisco; Becerra, Julian

    2014-11-01

    In most fluid phenomena, advection plays an important roll. A numerical scheme capable of making quantitative predictions and simulations must compute correctly the advection terms appearing in the equations governing fluid flow. Here we present a high order forward semi-Lagrangian numerical scheme specifically tailored to compute material derivatives. The scheme relies on the geometrical interpretation of material derivatives to compute the time evolution of fields on grids that deform with the material fluid domain, an interpolating procedure of arbitrary order that preserves the moments of the interpolated distributions, and a nonlinear mapping strategy to perform interpolations between undeformed and deformed grids. Additionally, a discontinuity criterion was implemented to deal with discontinuous fields and shocks. Tests of pure advection, shock formation and nonlinear phenomena are presented to show performance and convergence of the scheme. The high computational cost is considerably reduced when implemented on massively parallel architectures found in graphic cards. The authors acknowledge funding from Fondo Sectorial CONACYT-SENER Grant Number 42536 (DGAJ-SPI-34-170412-217).

  17. An HFB scheme in natural orbitals

    International Nuclear Information System (INIS)

    Reinhard, P.G.; Rutz, K.; Maruhn, J.A.

    1997-01-01

    We present a formulation of the Hartree-Fock-Bogoliubov (HFB) equations which solves the problem directly in the basis of natural orbitals. This provides a very efficient scheme which is particularly suited for large scale calculations on coordinate-space grids. (orig.)

  18. A classification scheme for LWR fuel assemblies

    Energy Technology Data Exchange (ETDEWEB)

    Moore, R.S.; Williamson, D.A.; Notz, K.J.

    1988-11-01

    With over 100 light water nuclear reactors operating nationwide, representing designs by four primary vendors, and with reload fuel manufactured by these vendors and additional suppliers, a wide variety of fuel assembly types are in existence. At Oak Ridge National Laboratory, both the Systems Integration Program and the Characteristics Data Base project required a classification scheme for these fuels. This scheme can be applied to other areas and is expected to be of value to many Office of Civilian Radioactive Waste Management programs. To develop the classification scheme, extensive information on the fuel assemblies that have been and are being manufactured by the various nuclear fuel vendors was compiled, reviewed, and evaluated. It was determined that it is possible to characterize assemblies in a systematic manner, using a combination of physical factors. A two-stage scheme was developed consisting of 79 assembly types, which are grouped into 22 assembly classes. The assembly classes are determined by the general design of the reactor cores in which the assemblies are, or were, used. The general BWR and PWR classes are divided differently but both are based on reactor core configuration. 2 refs., 15 tabs.

  19. The EU Greenhouse Gas Emissions Trading Scheme

    NARCIS (Netherlands)

    Woerdman, Edwin; Woerdman, Edwin; Roggenkamp, Martha; Holwerda, Marijn

    2015-01-01

    This chapter explains how greenhouse gas emissions trading works, provides the essentials of the Directive on the European Union Emissions Trading Scheme (EU ETS) and summarizes the main implementation problems of the EU ETS. In addition, a law and economics approach is used to discuss the dilemmas

  20. Study of 228Ac decay scheme

    International Nuclear Information System (INIS)

    Pinto, H.V.

    1976-02-01

    Calibration in energy and efficiency of the system used. Obtainement of singles gamma ray spectra of low and high energy. Reduction of the data obtained in the spectrometer by means of computer: localization and determination of the areas of the peaks, also the analysis of the shape of the peaks for identification of doublets. Checking of the decay scheme [pt