Milgram, A
2011-02-21
This comment addresses critics on the claimed stability of solution to the accelerated-predator-satiety Lotka-Volterra predator-prey problem, proposed by Dubey al. (2010. A solution to the accelerated-predator-satiety Lotka-Volterra predator-prey problem using Boubaker polynomial expansion scheme. Journal of Theoretical Biology 264, 154-160). Critics are based on incompatibilities between the claimed asymptotic behavior and the presumed Malthusian growth of prey population in absence of predator. Copyright Â© 2010 Elsevier Ltd. All rights reserved.
Luigi Vecchione
2015-07-01
Full Text Available One of the most important issues in biomass biocatalytic gasification is the correct prediction of gasification products, with particular attention to the Topping Atmosphere Residues (TARs. In this work, performedwithin the European 7FP UNIfHY project, we develops and validate experimentally a model which is able of predicting the outputs,including TARs, of a steam-fluidized bed biomass gasifier. Pine wood was chosen as biomass feedstock: the products obtained in pyrolysis tests are the relevant model input. Hydrodynamics and chemical properties of the reacting system are considered: the hydrodynamic approach is based on the two phase theory of fluidization, meanwhile the chemical model is based on the kinetic equations for the heterogeneous and homogenous reactions. The derived differentials equations for the gasifier at steady state were implemented MATLAB. Solution was consecutively carried out using the Boubaker Polynomials Expansion Scheme by varying steam/biomass ratio (0.5-1 and operating temperature (750-850°C.The comparison between models and experimental results showed that the model is able of predicting gas mole fractions and production rate including most of the representative TARs compounds
Xu, Yan; Lei, Huo; Dong, Hong; Zhang, Liping; Qin, Qionglian; Gao, Jianmei; Zou, Yunlian; Yan, Xinmin
2009-09-01
Previous studies found that the forkhead transcription factor 2 (FOXL2) gene mutations are responsible for both types of blepharophimosis-ptosis-epicanthus inversus syndrome (BPES) but have not established any systematic statistic model for the complex and even contradictory results about genotype-phenotype correlations between them. This study is aimed to find possible mutations of FOXL2 gene in a Chinese family with type II BPES by using DNA sequencing and to further clarify genotype-phenotype correlations between FOXL2 mutations and BPES by using a systematic statistical method, namely Multifactor Dimensionality Reduction (MDR). A novel mutation (g.933_965dup) which could result in an expansion of the polyalanine (polyAla) tract was detected in all patients of this family. MDR analysis for intragenic mutations of FOXL2 gene reported in previous BPES studies indicated that the mutations which led to much stronger disturbance of amino acid sequence were responsible for more type I BPES, while other kinds of mutation were responsible for more type II BPES. In conclusion, the present study found a novel FOXL2 gene mutation in a Chinese BPES family and a new general genotype-phenotype correlation tendency between FOXL2 intragenic mutations and BPES, both of which expanded the knowledge about FOXL2 gene and BPES.
Using the Zeldovich dynamics to test expansion schemes
Valageas, Patrick
2007-01-01
We apply to the simple case of the Zeldovich dynamics various expansion schemes which may be used to study gravitational clustering. Using the well-known exact solution of the Zeldovich dynamics we can compare in details the predictions of these various perturbative methods with the exact non-linear result. We find that most systematic expansions fail to recover the decay of the response function into the highly non-linear regime. ``Linear methods'' lead to increasingly fast growth in the highly non-linear regime for higher orders, except for Pade approximants which give a bounded response at any order. ``Non-linear methods'' manage to obtain some damping at one-loop order but they fail at higher orders. We note that, although it recovers the exact Gaussian damping, a resummation performed in the high-k limit is not well justified as the generation of non-linear power does not originate from a finite range of wavenumbers (hence there is no simple separation of scales). No method is able to recover the relaxat...
Cures for the Expansion Shock and the Shock Instability of the Roe Scheme
Li, Xue-song; Gu, Chun-wei
2016-01-01
A common defect of the Roe scheme is the production of non-physical expansion shock and shock instability. An improved method with several advantages was presented to suppress the shock instability. However, this method cannot prevent expansion shock and is incompatible with the traditional curing method for expansion shock. Therefore, the traditional curing mechanism is analyzed. The discussion explains the effectiveness of the traditional curing method and identifies several defects, one of which leads to incompatibility between curing the shock instability and expansion shock. Consequently, a new improved Roe scheme is proposed in this study. This scheme is concise, easy to implement, low computational cost, and robust. More importantly, the scheme can simultaneously cure the shock instability and expansion shock without additional costs.
Comparison among Magnus/Floquet/Fer expansion schemes in solid-state NMR
Takegoshi, K.; Miyazawa, Norihiro; Sharma, Kshama; Madhu, P. K.
2015-04-01
We here revisit expansion schemes used in nuclear magnetic resonance (NMR) for the calculation of effective Hamiltonians and propagators, namely, Magnus, Floquet, and Fer expansions. While all the expansion schemes are powerful methods there are subtle differences among them. To understand the differences, we performed explicit calculation for heteronuclear dipolar decoupling, cross-polarization, and rotary-resonance experiments in solid-state NMR. As the propagator from the Fer expansion takes the form of a product of sub-propagators, it enables us to appreciate effects of time-evolution under Hamiltonians with different orders separately. While 0th-order average Hamiltonian is the same for the three expansion schemes with the three cases examined, there is a case that the 2nd-order term for the Magnus/Floquet expansion is different from that obtained with the Fer expansion. The difference arises due to the separation of the 0th-order term in the Fer expansion. The separation enables us to appreciate time-evolution under the 0th-order average Hamiltonian, however, for that purpose, we use a so-called left-running Fer expansion. Comparison between the left-running Fer expansion and the Magnus expansion indicates that the sign of the odd orders in Magnus may better be reversed if one would like to consider its effect in order.
Comparison among Magnus/Floquet/Fer expansion schemes in solid-state NMR
Takegoshi, K., E-mail: takeyan@kuchem.kyoto-u.ac.jp; Miyazawa, Norihiro [Division of Chemistry, Graduate School of Science, Kyoto University, 606-8502 Kyoto (Japan); Sharma, Kshama [TIFR Centre for Interdisciplinary Sciences, 21 Brundavan Colony, Narsingi, Hyderabad 500 075 (India); Madhu, P. K. [TIFR Centre for Interdisciplinary Sciences, 21 Brundavan Colony, Narsingi, Hyderabad 500 075 (India); Department of Chemical Sciences, Tata Institute of Fundamental Research, Homi Bhabha Road, Colaba, Mumbai 400 005 (India)
2015-04-07
We here revisit expansion schemes used in nuclear magnetic resonance (NMR) for the calculation of effective Hamiltonians and propagators, namely, Magnus, Floquet, and Fer expansions. While all the expansion schemes are powerful methods there are subtle differences among them. To understand the differences, we performed explicit calculation for heteronuclear dipolar decoupling, cross-polarization, and rotary-resonance experiments in solid-state NMR. As the propagator from the Fer expansion takes the form of a product of sub-propagators, it enables us to appreciate effects of time-evolution under Hamiltonians with different orders separately. While 0th-order average Hamiltonian is the same for the three expansion schemes with the three cases examined, there is a case that the 2nd-order term for the Magnus/Floquet expansion is different from that obtained with the Fer expansion. The difference arises due to the separation of the 0th-order term in the Fer expansion. The separation enables us to appreciate time-evolution under the 0th-order average Hamiltonian, however, for that purpose, we use a so-called left-running Fer expansion. Comparison between the left-running Fer expansion and the Magnus expansion indicates that the sign of the odd orders in Magnus may better be reversed if one would like to consider its effect in order.
Expansion schemes for gravitational clustering: computing two-point and three-point functions
Valageas, P
2007-01-01
We describe various expansion schemes that can be used to study gravitational clustering. Obtained from the equations of motion or their path-integral formulation, they provide several perturbative expansions that are organized in different fashion or involve different partial resummations. We focus on the two-point and three-point correlation functions, but these methods also apply to all higher-order correlation and response functions. We present the general formalism, which holds for the gravitational dynamics as well as for similar models, such as the Zeldovich dynamics, that obey similar hydrodynamical equations of motion with a quadratic nonlinearity. We give our explicit analytical results up to one-loop order for the simpler Zeldovich dynamics. For the gravitational dynamics, we compare our one-loop numerical results with numerical simulations. We check that the standard perturbation theory is recovered from the path integral by expanding over Feynman's diagrams. However, the latter expansion is organ...
FOXL2 copy number changes in the molecular pathogenesis of BPES: unique cohort of 17 deletions.
D'haene, B; Nevado, J; Pugeat, M; Pierquin, G; Lowry, R B; Reardon, W; Delicado, A; García-Miñaur, S; Palomares, M; Courtens, W; Stefanova, M; Wallace, S; Watkins, W; Shelling, A N; Wieczorek, D; Veitia, R A; De Paepe, A; Lapunzina, P; De Baere, E
2010-05-01
Blepharophimosis Syndrome (BPES) is an autosomal dominant developmental disorder of the eyelids with or without ovarian dysfunction caused by FOXL2 mutations. Overall, FOXL2deletions represent 12% of all genetic defects in BPES. Here, we have identified and characterized 16 new and one known FOXL2 deletion combining multiplex ligation-dependent probe amplification (MLPA), custom-made quantitative PCR (qPCR) and/or microarray-based copy number screening. The deletion breakpoints could be localized for 13 out of 17 deletions. The deletion size is highly variable (29.8 kb - 11.5 Mb), indicating absence of a recombination hotspot. Although the heterogeneity of their size and breakpoints is not reflected in the uniform BPES phenotype, there is considerable phenotypic variability regarding associated clinical findings including psychomotor retardation (8/17), microcephaly (6/17), and subtle skeletal features (2/17). In addition, in all females in whom ovarian function could be assessed, FOXL2 deletions proved to be associated with variable degrees of ovarian dysfunction. In conclusion, we present the largest series of BPES patients with FOXL2 deletions and standardized phenotyping reported so far. Our genotype-phenotype data can be useful for providing a prognosis (i.e. occurrence of associated features) in newborns with BPES carrying a FOXL2 deletion.
The Hamiltonian approach to Yang-Mills (2+1): Expansion scheme and corrections to string tension
Karabali, Dimitra, E-mail: dimitra.karabali@lehman.cuny.ed [Department of Physics and Astronomy, Lehman College of the CUNY, Bronx, NY 10468 (United States); Nair, V.P., E-mail: vpn@sci.ccny.cuny.ed [Physics Department, City College of the CUNY, New York, NY 10031 (United States); Yelnikov, Alexandr, E-mail: yelnikov@yahoo.co [Physics Department, City College of the CUNY, New York, NY 10031 (United States)
2010-01-11
We carry out further analysis of the Hamiltonian approach to Yang-Mills theory in 2+1 dimensions which helps to place the calculation of the vacuum wave function and the string tension in the context of a systematic expansion scheme. The solution of the Schroedinger equation is carried out recursively. The computation of correlators is re-expressed in terms of a two-dimensional chiral boson theory. The effective action for this theory is calculated to first order in our expansion scheme and to the fourth order in a kinematic expansion parameter. The resulting corrections to the string tension are shown to be very small, in the range -0.3% to -2.8%, moving our prediction closer to the recent lattice estimates.
Ryttov, T A
2016-01-01
We consider an asymptotically free vectorial gauge theory, with gauge group $G$ and $N_f$ fermions in a representation $R$ of $G$, having an infrared (IR) zero in the beta function at $\\alpha_{IR}$. We present general formulas for scheme-independent series expansions of quantities, evaluated at $\\alpha_{IR}$, as powers of an $N_f$-dependent expansion parameter, $\\Delta_f$. First, we apply these to calculate the derivative $d\\beta/d\\alpha$ evaluated at $\\alpha_{IR}$, denoted $\\beta'_{IR}$, which is equal to the anomalous dimension of the ${\\rm Tr}(F_{\\mu\
N.M. Kokitsu-Nakata
1998-06-01
Full Text Available We have evaluated a girl and a boy with the blepharophimosis, ptosis and epicanthus inversus syndrome (BPES. The girl presented cleft palate and the boy showed cleft lip and palate as additional clinical signs. Both showed familial recurrence in fourth and third generations, respectively. The other family members also presented blepharophimosis, ptosis, and epicanthus inversus, but without lip and palatal involvement. There were no additional clinical signs nor infertility in these patients. To our knowledge this is the first instance of cleft lip and palate reported as additional signs of the BPES syndrome.Os autores descrevem uma menina e um menino com a síndrome de blefarofimose, ptose e epicanto inverso (BPES. A menina apresentou fissura de palato e o menino mostrou fissura de lábio e palato como sinais clínicos adicionais. Ambos mostraram recorrência familial em quatro e três gerações, respectivamente. Outros membros de ambas as famílias apresentaram também blefarofimose, ptose e epicanto inverso, mas sem envolvimento de lábio e palato. Não existem sinais clínicos adicionais nem infertilidade nestes pacientes. De acordo com o nosso conhecimento, este é o primeiro relato de fissura de lábio e palato registrada como sinal adicional na síndrome BPES.
Damgård, Ivan Bjerre; Nielsen, Jesper Buus
2002-01-01
Canetti and Fischlin have recently proposed the security notion universal composability for commitment schemes and provided two examples. This new notion is very strong. It guarantees that security is maintained even when an unbounded number of copies of the scheme are running concurrently, also...
Damgård, Ivan Bjerre; Nielsen, Jesper Buus
2002-01-01
Canetti and Fischlin have recently proposed the security notion universal composability for commitment schemes and provided two examples. This new notion is very strong. It guarantees that security is maintained even when an unbounded number of copies of the scheme are running concurrently, also...... it guarantees non-malleability, resilience to selective decommitment, and security against adaptive adversaries. Both of their schemes uses (k) bits to commit to one bit and can be based on the existence of trapdoor commitments and non-malleable encryption. We present new universally composable commitment...
Hu, Kainan; Geng, Shaojuan
2016-01-01
A new lattice Boltzmann scheme associated with flexible specific heat ratio is proposed. The new free degree is introduced via the internal energy associated with the internal structure. The evolution equation of the distribution function is reduced to two evolution equations. One is connected to the density and velocity, the other is of the energy. A two-dimensional lattice Boltzmann model and a three-dimensional lattice Boltzmann model are derived via the Hermite expansion. The two lattice Boltzmann models are applied to simulating the shock tube of one dimension. Good agreement between the numerical results and the analytical solutions are obtained.
Design and Implementation of Secure Area Expansion Scheme for Public Wireless LAN Services
Watanabe, Ryu; Tanaka, Toshiaki
scheme during the initial setup phase on mobile nodes for the service. The proposed scheme also considers the protection of user privacy. Accordingly, none of the user nodes has to reveal their unique and persistent information to other nodes. Instead of using such information, temporary values are sent by an AP to mobile nodes and used for secure ad-hoc routing operations. Therefore, our proposed scheme prevents tracking by malicious parties by avoiding the use of unique information. Moreover, a test bed was also implemented based on the proposal and an evaluation was carried out in order to confirm performance. In addition, the authors describe a countermeasure against denial of service (DoS) attacks based on the approach to privacy protection described in our proposal.
Approximation for Transient of Nonlinear Circuits Using RHPM and BPES Methods
H. Vazquez-Leal
2013-01-01
Full Text Available The microelectronics area constantly demands better and improved circuit simulation tools. Therefore, in this paper, rational homotopy perturbation method and Boubaker Polynomials Expansion Scheme are applied to a differential equation from a nonlinear circuit. Comparing the results obtained by both techniques revealed that they are effective and convenient.
Hu, Kainan; Geng, Shaojuan
2016-01-01
A decoupled scheme based on the Hermite expansion to construct lattice Boltzmann models for the compressible Navier-Stokes equations with arbitrary specific heat ratio is proposed. The local equilibrium distribution function including the rotational velocity of particle is decoupled into two parts, i.e. the local equilibrium distribution function of the translational velocity of particle and that of the rotational velocity of particle. From these two local equilibrium functions, two lattice Boltzmann models are derived via the Hermite expansion, namely one is in relation to the translational velocity and the other is connected with the rotational velocity. Accordingly, the distribution function is also decoupled. After this, the evolution equation is decoupled into the evolution equation of the translational velocity and that of the rotational velocity. The two evolution equations evolve separately. The lattice Boltzmann models used in the scheme proposed by this work are constructed via the Hermite expansion...
Yang, Zheng; Yan, Fang; Pei, Shi-Lun; Chen, Yuan; Li, Zhi-hui; Geng, Hui-Ping
2014-01-01
For the injector Scheme-I test stand of the China-ADS, a beam with the maximum power of 100 kW will be produced and transported to the beam dump. At the beam dump, the beam power will be converted to thermal load and brought away by the cooling water. Two measures are taken to deal with the huge power density at the target. One is to enlarge the contact area between the beam and the target, and this is to be accomplished by expanding the beam profile at the target and using two copper plates each having a 20o inclination angle relative to the beam direction. The other is to produce more homogenous beam profile at the target to minimize the maximum power density. Here the beam dump line is designed to meet the requirement of beam expansion and homogenization, and the step-like field magnets are employed for the beam spot homogenization. The simulations results including space charge effects and errors show that the beam line can meet the requirements very well at the three different energies (3.2 MeV, 5 MeV an...
Yang, Lei; Yan, Hongyong; Liu, Hong
2017-03-01
Implicit staggered-grid finite-difference (ISFD) scheme is competitive for its great accuracy and stability, whereas its coefficients are conventionally determined by the Taylor-series expansion (TE) method, leading to a loss in numerical precision. In this paper, we modify the TE method using the minimax approximation (MA), and propose a new optimal ISFD scheme based on the modified TE (MTE) with MA method. The new ISFD scheme takes the advantage of the TE method that guarantees great accuracy at small wavenumbers, and keeps the property of the MA method that keeps the numerical errors within a limited bound at the same time. Thus, it leads to great accuracy for numerical solution of the wave equations. We derive the optimal ISFD coefficients by applying the new method to the construction of the objective function, and using a Remez algorithm to minimize its maximum. Numerical analysis is made in comparison with the conventional TE-based ISFD scheme, indicating that the MTE-based ISFD scheme with appropriate parameters can widen the wavenumber range with high accuracy, and achieve greater precision than the conventional ISFD scheme. The numerical modeling results also demonstrate that the MTE-based ISFD scheme performs well in elastic wave simulation, and is more efficient than the conventional ISFD scheme for elastic modeling.
Hu, Kainan; Zhang, Hongwu; Geng, Shaojuan
2016-10-01
A decoupled scheme based on the Hermite expansion to construct lattice Boltzmann models for the compressible Navier-Stokes equations with arbitrary specific heat ratio is proposed. The local equilibrium distribution function including the rotational velocity of particle is decoupled into two parts, i.e., the local equilibrium distribution function of the translational velocity of particle and that of the rotational velocity of particle. From these two local equilibrium functions, two lattice Boltzmann models are derived via the Hermite expansion, namely one is in relation to the translational velocity and the other is connected with the rotational velocity. Accordingly, the distribution function is also decoupled. After this, the evolution equation is decoupled into the evolution equation of the translational velocity and that of the rotational velocity. The two evolution equations evolve separately. The lattice Boltzmann models used in the scheme proposed by this work are constructed via the Hermite expansion, so it is easy to construct new schemes of higher-order accuracy. To validate the proposed scheme, a one-dimensional shock tube simulation is performed. The numerical results agree with the analytical solutions very well.
Hu, Kainan; Zhang, Hongwu; Geng, Shaojuan
2016-10-01
A decoupled scheme based on the Hermite expansion to construct lattice Boltzmann models for the compressible Navier-Stokes equations with arbitrary specific heat ratio is proposed. The local equilibrium distribution function including the rotational velocity of particle is decoupled into two parts, i.e., the local equilibrium distribution function of the translational velocity of particle and that of the rotational velocity of particle. From these two local equilibrium functions, two lattice Boltzmann models are derived via the Hermite expansion, namely one is in relation to the translational velocity and the other is connected with the rotational velocity. Accordingly, the distribution function is also decoupled. After this, the evolution equation is decoupled into the evolution equation of the translational velocity and that of the rotational velocity. The two evolution equations evolve separately. The lattice Boltzmann models used in the scheme proposed by this work are constructed via the Hermite expansion, so it is easy to construct new schemes of higher-order accuracy. To validate the proposed scheme, a one-dimensional shock tube simulation is performed. The numerical results agree with the analytical solutions very well.
Hayami, Masao [Department of Chemistry and Biochemistry, School of Advanced Science and Engineering, Waseda University, Tokyo 169-8555 (Japan); Seino, Junji [Research Institute for Science and Engineering, Waseda University, Tokyo 169-8555 (Japan); Nakai, Hiromi, E-mail: nakai@waseda.jp [Department of Chemistry and Biochemistry, School of Advanced Science and Engineering, Waseda University, Tokyo 169-8555 (Japan); Research Institute for Science and Engineering, Waseda University, Tokyo 169-8555 (Japan); CREST, Japan Science and Technology Agency, Saitama 332-0012 (Japan); Elements Strategy Initiative for Catalysts and Batteries (ESICB), Kyoto University, Katsura, Kyoto 615-8520 (Japan)
2015-05-28
An efficient algorithm for the rapid evaluation of electron repulsion integrals is proposed. The present method, denoted by accompanying coordinate expansion and transferred recurrence relation (ACE-TRR), is constructed using a transfer relation scheme based on the accompanying coordinate expansion and recurrence relation method. Furthermore, the ACE-TRR algorithm is extended for the general-contraction basis sets. Numerical assessments clarify the efficiency of the ACE-TRR method for the systems including heavy elements, whose orbitals have long contractions and high angular momenta, such as f- and g-orbitals.
Yan, Hongyong; Yang, Lei; Li, Xiang-Yang
2016-12-01
High-order staggered-grid finite-difference (SFD) schemes have been universally used to improve the accuracy of wave equation modeling. However, the high-order SFD coefficients on spatial derivatives are usually determined by the Taylor-series expansion (TE) method, which just leads to great accuracy at small wavenumbers for wave equation modeling. Some conventional optimization methods can achieve high accuracy at large wavenumbers, but they hardly guarantee the small numerical dispersion error at small wavenumbers. In this paper, we develop new optimal explicit SFD (ESFD) and implicit SFD (ISFD) schemes for wave equation modeling. We first derive the optimal ESFD and ISFD coefficients for the first-order spatial derivatives by applying the combination of the TE and the sampling approximation to the dispersion relation, and then analyze their numerical accuracy. Finally, we perform elastic wave modeling with the ESFD and ISFD schemes based on the TE method and the optimal method, respectively. When the appropriate number and interval for the sampling points are chosen, these optimal schemes have extremely high accuracy at small wavenumbers, and can also guarantee small numerical dispersion error at large wavenumbers. Numerical accuracy analyses and modeling results demonstrate the optimal ESFD and ISFD schemes can efficiently suppress the numerical dispersion and significantly improve the modeling accuracy compared to the TE-based ESFD and ISFD schemes.
Buchmüller, O L; Buchmueller, Oliver; Flaecher, Henning
2006-01-01
We present a fit to moment measurements of inclusive distributions in B->Xc lv and B->Xs gamma decays to extract values for the CKM matrix element |Vcb|, the b- and c- quark masses, and higher order parameters that appear in the Heavy Quark Expansion. The fit is carried out using theoretical calculations in the kinetic scheme and includes moment measurements of the BaBar, Belle, CDF, CLEO and DELPHI collaborations where correlation matrices have been published. We also derive values for the heavy quark distribution function parameters $m_b$ and $\\mu_{\\pi}^2$ in different theoretical schemes that can be used as input for the evaluation of the associated theory error on |Vub|.
Zhang, Lei; Wang, Yi; Yao, Zhu-Jun; Wang, Shaozhong; Yu, Zhi-Xiang
2015-10-21
In classical transition state theory, a transition state is connected to its reactant(s) and product(s). Recently, chemists found that reaction pathways may bifurcate after a transition state, leading to two or more sets of products. The product distribution for such a reaction containing a bifurcating potential energy surface (bPES) is usually determined by the shape of the bPES and dynamic factors. However, if the bPES leads to two intermediates (other than two products), which then undergo further transformations to give different final products, what factors control the selectivity is still not fully examined. This missing link in transition state theory is founded in the present study. Aiming to develop new methods for the synthesis of azocinoindole derivatives, we found that 2-propargyl-β-tetrahydrocarbolines can undergo ring expansion and spirocyclization under gold catalysis. DFT study revealed that the reaction starts with the intramolecular cyclization of the gold-activated 2-propargyl-β-tetrahydrocarboline with a bPES. The cyclization intermediates can not only interconvert into each other via a [1,5]-alkenyl shift, but also undergo ring expansion (through fragmentation/protodeauration mechanism) or spirocyclization (through deprotonation/protodeauration mechanism). Detailed analysis of the complex PESs for substrates with different substituents indicated that the reaction selectivity is under dynamic control if the interconversion of the intermediates is slower than the ring expansion and spirocyclization processes. Otherwise, the chemical outcome is under typical kinetic control and determined by the relative preference of ring expansion versus spirocyclization pathways. The present study may enrich chemist's understanding of the determinants for selectivities on bPESs.
陈迟
2015-01-01
Due to the pressure of environmental protection and development of enterprise, a copper factory needs to complete the relocation and expansion in the next few years. The present situation of the electrolysis plant and the background of electrolysis industry are introduced. The technology of the three schemes are compared. The investment and operating costs of the three schemes are estimated. The results show that the technology of large plate stainless steel cathode electrolysis with both sides parallel flow is advanced, the investment and operation cost is low. It is a recommended plan for the relocation and expansion project. And also, the scheme conforms to China's copper industry policy, which is innovation driven, energy saving and environmental.%由于环保的压力和企业发展的需要,某铜冶炼厂需在近几年内完成搬迁扩建.介绍了某铜冶炼厂电解车间的现状和电解行业背景,比较了三种方案的工艺技术,估算了三种方案的投资和运行成本.结果表明,大极板、双向平行流、不锈钢阴极电解方案工艺技术先进,投资和运行成本低,是搬迁扩建工程的推荐方案,符合我国铜冶炼行业创新驱动、节能环保的产业政策.
Fridjine, S.; Amlouk, M.
In this study, we define a synthetic parameter: optothermal expansivity as a quantitative guide to evaluating and optimizing both the thermal and the optical performance of PV-T functional materials. The definition of this parameter, ψAB (Amlouk-Boubaker parameter), takes into account the thermal diffusivity and the optical effective absorptivity of the material. The values of this parameter, which seems to be a characteristic one, correspond to the total volume that contains a fixed amount of heat per unit time (m3 s-1) and can be considered as a 3D velocity of the transmitted heat inside the material. As the PV-T combined devices need to have simultaneous optical and thermal efficiency, we try to investigate some recently proposed materials (β-SnS2, In2S3, ZnS1-xSex|0 ≤xabacus.
On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
Wang Daoshun
2010-01-01
Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.
de Ru, M H; Gille, J J P; Nieuwint, A W M; Bijlsma, J B; van der Blij, J F; van Hagen, J M
2005-08-15
We present a boy with blepharophimosis, ptosis, epicanthus inversus, microcephaly, mild mental retardation, and growth delay. Chromosomal analysis revealed a male karyotype with an interstitial deletion in the long arm of chromosome 3. DNA-analysis showed that the deletion is of maternal origin and encompasses the region between markers D3S1535 and D3S1593. The deletion contains not only the FOXL2 gene, but also the gene encoding ataxia-telangiectasia and Rad3-related protein (ATR). Mutations in FOXL2 have been shown to cause blepharophimosis-ptosis-epicanthus inversus syndrome (BPES). ATR has been identified as a candidate gene for Seckel syndrome, an autosomal recessive syndrome that comprises growth retardation, microcephaly, and mental retardation. We hypothesize that our patient has a contiguous gene syndrome and that the non-BPES-associated abnormalities (microcephaly, mild mental retardation, and growth delay) are the result of the deletion of the maternal ATR gene. However, it has not yet been excluded that haploinsufficiency of some other gene in this region plays a role. Copyright 2005 Wiley-Liss, Inc.
Operator product expansion algebra
Holland, Jan [CPHT, Ecole Polytechnique, Paris-Palaiseau (France)
2014-07-01
The Operator Product Expansion (OPE) is a theoretical tool for studying the short distance behaviour of products of local quantum fields. Over the past 40 years, the OPE has not only found widespread computational application in high-energy physics, but, on a more conceptual level, it also encodes fundamental information on algebraic structures underlying quantum field theories. I review new insights into the status and properties of the OPE within Euclidean perturbation theory, addressing in particular the topics of convergence and ''factorisation'' of the expansion. Further, I present a formula for the ''deformation'' of the OPE algebra caused by a quartic interaction. This formula can be used to set up a novel iterative scheme for the perturbative computation of OPE coefficients, based solely on the zeroth order coefficients (and renormalisation conditions) as initial input.
van Leeuwen, Theo
2013-01-01
This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....
1970-10-01
sale: is disributici is unlimited = F’)RIWRD Seior Ignacio Soto, Rrecutive President, Instituto Mexicano del Cementc y Concreto , invited Mr. Bryant... Concreto , a.c., Kwidco, D. F., Mexico. Based on info.mation largely obtained from ACT Committee 223, Expansive ’ement. Concretes, ACI Journal, August 1Q70
Modified Mean-Pyramid Coding Scheme
Cheung, Kar-Ming; Romer, Richard
1996-01-01
Modified mean-pyramid coding scheme requires transmission of slightly fewer data. Data-expansion factor reduced from 1/3 to 1/12. Schemes for progressive transmission of image data transmitted in sequence of frames in such way coarse version of image reconstructed after receipt of first frame and increasingly refined version of image reconstructed after receipt of each subsequent frame.
Modified Mean-Pyramid Coding Scheme
Cheung, Kar-Ming; Romer, Richard
1996-01-01
Modified mean-pyramid coding scheme requires transmission of slightly fewer data. Data-expansion factor reduced from 1/3 to 1/12. Schemes for progressive transmission of image data transmitted in sequence of frames in such way coarse version of image reconstructed after receipt of first frame and increasingly refined version of image reconstructed after receipt of each subsequent frame.
Probabilistic Visual Secret Sharing Schemes for Gray-scale images and Color images
Wang, Dao-Shun; Li, Xiaobo
2007-01-01
Visual secrete sharing (VSS) is an encryption technique that utilizes human visual system in the recovering of the secret image and it does not require any complex calculation. Pixel expansion has been a major issue of VSS schemes. A number of probabilistic VSS schemes with minimum pixel expansion have been proposed for binary secret images. This paper presents a general probabilistic (k, n)-VSS scheme for gray-scale images and another scheme for color images. With our schemes, the pixel expansion can be set to a user-defined value. When this value is 1, there is no pixel expansion at all. The quality of reconstructed secret images, measured by Average Relative Difference, is equivalent to Relative Difference of existing deterministic schemes. Previous probabilistic VSS schemes for black-and-white images with respect to pixel expansion can be viewed as special cases of the schemes proposed here
李林; 洪佩琳; 薛开平; 唐浩
2012-01-01
In Long Term Evolution (LTE) heterogeneous networks, the gap between the power of Macro base station and Pico base station makes some users access to Macrocell even if they are closer to Picocell. Under this circumstance, Picocell may suffer severe uplink interference which could not be accurately identified under current schemes. Range Expansion (RE) could mitigate the uplink interference problem. However, it may bring new downlink interference at the same time. This paper proposes an Uplink Interference Identification and Coordination scheme based on Range Expansion (UIICRE) with theoretical analysis. UIICRE could identify the uplink interference sources and their interference strength, and then coordinate the interference according to the identification results. Simulation results show that UIICRE could promote UE's uplink SINR under the condition that its downlink SINR would not be severely affected.%在LTE (Long Term Evolution)异构网络中,由于宏基站(Macro)与微微(Pico)基站的发射功率相差较大,一些离Pico基站较近的用户因为接收到的宏基站下行信号质量好于Pico基站而选择接入宏小区.然而,因为这些用户距离Pico基站较近,因此上行通信会对Pico基站产生严重的上行干扰.小区覆盖增强(Range Expansion,RE)技术能够减少此类干扰,但同时又可能引入新的下行干扰.该文提出一种基于RE技术的上行干扰识别与协调机制(UIICRE),能够准确识别上行干扰源及其强度,并进行相应的干扰协调处理.仿真结果表明,该文提出的方案能够解决Pico小区的上行干扰问题,提升用户的上行通信质量,并保证用户下行通信质量不受影响.
Cycle expansions with pruned orbits have branch points
Mainieri, R
1994-01-01
Cycle expansions are an efficient scheme for computing the properties of chaotic systems. When enumerating the orbits for a cycle expansion not all orbits that one would expect at first are present --- some are pruned. This pruning leads to convergence difficulties when computing properties of chaotic systems. In numerical schemes, I show that pruning reduces the number of reliable eigenvalues when diagonalizing quantum mechanical operators, and that pruning slows down the convergence rate of cycle expansion calculations. I then exactly solve a diffusion model that displays chaos and show that its cycle expansion develops a branch point.
Multi-Seed Key Distribution Scheme Test
XIE Yumin; SHI Feng; MING Yang; Muhammad Kamran; YANG Xiaoxu
2006-01-01
The key problem of securing multicast is to generate, distribute and update Session Encryption Key(SEK). Polynomial expansion with multi-seed(MPE) scheme is an approach which is based on Polynomial expansion(PE) scheme and overcomes PE's shortage. Its operation is demonstrated by using multi-seed, the group member is partitioned to many subgroups. While updating the SEK, computation is needed only in one of subgroups, the other of them will use the computation history to update their SEK. The key problems to design a MPE scheme application includes to find a feasible one way function as well as to generate a Strict Prime Number(SPN). Those technologies with multi-seed and computation history concepts make MPE as a good choice in practical applications. A prototype test system is designed and solutions of all above mentioned problems are included in this proposed paper.
Query Expansion Using SNOMED-CT and Weighing Schemes
2014-11-01
recommend using the full capacity of the different Ontology that they used such as MeSH. Martinez et al. [2] from University of Melbourne, Australia and...for the first query. Query #1 58-year-old woman with hypertension and obesity presents with exercise-related episodic chest pain radiating to the...were then included with the original query as following. Query#1.0 <Summary>58-year-old woman with hypertension and obesity presents with exercise
The $\\hbar$ Expansion in Quantum Field Theory
Brodsky, Stanley J.; /SLAC /Southern Denmark U., CP3-Origins; Hoyer, Paul; /Southern Denmark U., CP3-Origins /Helsinki U. /Helsinki Inst. of Phys.
2010-10-27
We show how expansions in powers of Planck's constant {h_bar} = h = 2{pi} can give new insights into perturbative and nonperturbative properties of quantum field theories. Since {h_bar} is a fundamental parameter, exact Lorentz invariance and gauge invariance are maintained at each order of the expansion. The physics of the {h_bar} expansion depends on the scheme; i.e., different expansions are obtained depending on which quantities (momenta, couplings and masses) are assumed to be independent of {h_bar}. We show that if the coupling and mass parameters appearing in the Lagrangian density are taken to be independent of {h_bar}, then each loop in perturbation theory brings a factor of {h_bar}. In the case of quantum electrodynamics, this scheme implies that the classical charge e, as well as the fine structure constant are linear in {h_bar}. The connection between the number of loops and factors of {h_bar} is more subtle for bound states since the binding energies and bound-state momenta themselves scale with {h_bar}. The {h_bar} expansion allows one to identify equal-time relativistic bound states in QED and QCD which are of lowest order in {h_bar} and transform dynamically under Lorentz boosts. The possibility to use retarded propagators at the Born level gives valence-like wave-functions which implicitly describe the sea constituents of the bound states normally present in its Fock state representation.
Lower Bound for Visual Cryptography Schemes
Cheraghi, Abbas
2007-01-01
For a given visual cryptography scheme, it is possible to present a basis matrices for it and most of constructions are based on basis matrices. In this paper we introduce a lower bound for the pixel expansion of visual cryptography schemes with basis matrices. To make the main theorem more flexible, we will introduce a lower bound based on induced matchings of hypergraph of qualified sets. As an application, we present an algebraic proof for the fact that the pixel expansion of basis matrices of any $k$ out of $k$ scheme is at least $2^{k-1}$. In the sequel, we present a lower bound for the pixel expansion of a given graph access structure in term of maximum number of edges in an induced matching. Finally, we show that the minimum pixel expansion of basis matrices of graph access structure $P_n$ is exactly $\\lceil \\frac{n+1}{2}\\rceil$ and this shows the lower bound mentioned in the main theorem is sharp.
Pamplona, Djenane C; Velloso, Raquel Q; Radwanski, Henrique N
2014-01-01
This article discusses skin expansion without considering cellular growth of the skin. An in vivo analysis was carried out that involved expansion at three different sites on one patient, allowing for the observation of the relaxation process. Those measurements were used to characterize the human skin of the thorax during the surgical process of skin expansion. A comparison between the in vivo results and the numerical finite elements model of the expansion was used to identify the material elastic parameters of the skin of the thorax of that patient. Delfino's constitutive equation was chosen to model the in vivo results. The skin is considered to be an isotropic, homogeneous, hyperelastic, and incompressible membrane. When the skin is extended, such as with expanders, the collagen fibers are also extended and cause stiffening in the skin, which results in increasing resistance to expansion or further stretching. We observed this phenomenon as an increase in the parameters as subsequent expansions continued. The number and shape of the skin expanders used in expansions were also studied, both mathematically and experimentally. The choice of the site where the expansion should be performed is discussed to enlighten problems that can lead to frustrated skin expansions. These results are very encouraging and provide insight into our understanding of the behavior of stretched skin by expansion. To our knowledge, this study has provided results that considerably improve our understanding of the behavior of human skin under expansion.
Fast algorithms for Quadrature by Expansion I: Globally valid expansions
Rachh, Manas; Klöckner, Andreas; O'Neil, Michael
2017-09-01
The use of integral equation methods for the efficient numerical solution of PDE boundary value problems requires two main tools: quadrature rules for the evaluation of layer potential integral operators with singular kernels, and fast algorithms for solving the resulting dense linear systems. Classically, these tools were developed separately. In this work, we present a unified numerical scheme based on coupling Quadrature by Expansion, a recent quadrature method, to a customized Fast Multipole Method (FMM) for the Helmholtz equation in two dimensions. The method allows the evaluation of layer potentials in linear-time complexity, anywhere in space, with a uniform, user-chosen level of accuracy as a black-box computational method. Providing this capability requires geometric and algorithmic considerations beyond the needs of standard FMMs as well as careful consideration of the accuracy of multipole translations. We illustrate the speed and accuracy of our method with various numerical examples.
Generalized Group Signature Scheme
无
2001-01-01
The concept of generalized group signature scheme will bepresent. Based on the generalized secret sharing scheme proposed by Lin and Ha rn, a non-interactive approach is designed for realizing such generalized group signature scheme. Using the new scheme, the authorized subsets of the group in w hich the group member can cooperate to produce the valid signature for any messa ge can be randomly specified
Chu, Chunlei
2009-01-01
We present two Lax‐Wendroff type high‐order time stepping schemes and apply them to solving the 3D elastic wave equation. The proposed schemes have the same format as the Taylor series expansion based schemes, only with modified temporal extrapolation coefficients. We demonstrate by both theoretical analysis and numerical examples that the modified schemes significantly improve the stability conditions.
Sman, van der R.G.M.
2006-01-01
In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the
Nørmark, Kurt
2010-01-01
A Scheme representation of Standard MIDI Files is proposed. The Scheme expressions are defined and constrained by an XML-language, which in the starting point is inspired by a MIDI XML event language made by the MIDI Manufactures Association. The representation of Standard MIDI Files in Scheme ma...
Nørmark, Kurt
2010-01-01
A Scheme representation of Standard MIDI Files is proposed. The Scheme expressions are defined and constrained by an XML-language, which in the starting point is inspired by a MIDI XML event language made by the MIDI Manufactures Association. The representation of Standard MIDI Files in Scheme ma...
Scheme Program Documentation Tools
Nørmark, Kurt
2004-01-01
This paper describes and discusses two different Scheme documentation tools. The first is SchemeDoc, which is intended for documentation of the interfaces of Scheme libraries (APIs). The second is the Scheme Elucidator, which is for internal documentation of Scheme programs. Although the tools...... are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...
Convertible Proxy Signcryption Scheme
李继国; 李建中; 曹珍富; 张亦辰
2004-01-01
In 1996, Mambo et al introduced the concept of proxy signature. However, proxy signature can only provide the delegated authenticity and cannot provide confidentiality. Recently, Gamage et al and Chan and Wei proposed different proxy signcryption schemes respectively, which extended the concept of proxy signature.However, only the specified receiver can decrypt and verify the validity of proxy signcryption in their schemes.To protect the receiver' s benefit in case of a later dispute, Wu and Hsu proposed a convertible authenticated encryption scheme, which carn enable the receiver to convert signature into an ordinary one that can be verified by anyone. Based on Wu and Hsu' s scheme and improved Kim' s scheme, we propose a convertible proxy signcryption scheme. The security of the proposed scheme is based on the intractability of reversing the one-way hash function and solving the discrete logarithm problem. The proposed scheme can satisfy all properties of strong proxy signature and withstand the public key substitution attack and does not use secure channel. In addition, the proposed scheme can be extended to convertible threshold proxy signcryption scheme.
On a realization of $\\{\\beta\\}$-expansion in QCD
Mikhailov, S V
2016-01-01
We suggest a simple algebraic approach to fix the elements of the $\\{ \\beta \\}$-expansion for renormalization group invariant quantities, which uses additional degrees of freedom. The approach is discussed in detail for N$^2$LO calculations in QCD with the MSSM gluino -- an additional degree of freedom. We derive the formulae of the $\\{ \\beta \\}$-expansion for the nonsinglet Adler $D$-function and Bjorken polarized sum rules in the actual N$^3$LO within this quantum field theory scheme with the MSSM gluino and the scheme with the second additional degree of freedom.
Difference Schemes and Applications
2015-02-06
of the shallow water equations that is well suited for complex geometries and moving boundaries. Another (similar) regularization of...the solid wall extrapolation followed by the interpolation in the phase space (by solving the Riemann problem between the internal cell averages and...scheme. This Godunov-type scheme enjoys all major advantages of Riemann -problem-solver-free, non-oscillatory central schemes and, at the same time, have
Efficient Threshold Signature Scheme
Sattar J Aboud
2012-01-01
Full Text Available In this paper, we introduce a new threshold signature RSA-typed scheme. The proposed scheme has the characteristics of un-forgeable and robustness in random oracle model. Also, signature generation and verification is entirely non-interactive. In addition, the length of the entity signature participate is restricted by a steady times of the length of the RSA signature modulus. Also, the signing process of the proposed scheme is more efficient in terms of time complexity and interaction.
Stateless Transitive Signature Schemes
MA Chun-guang; CAI Man-chun; YANG Yi-xian
2004-01-01
A new practical method is introduced to transform the stateful transitive signature scheme to stateless one without the loss of security. According to the approach, two concrete stateless transitive signature schemes based on Factoring and RSA are presented respectively. Under the assumption of the hardness of factoring and one-more- RSA-inversion problem, both two schemes are secure under the adaptive chosen-message attacks in random oracle model.
Barrera, G D [Departamento de QuImica, Universidad Nacional de la Patagonia SJB, Ciudad Universitaria, 9000 Comodoro Rivadavia (Argentina); Bruno, J A O [Universidad de Buenos Aires, Facultad de Ciencias Exactas y Naturales, Departamento de QuImica Inorganica, AnalItica y QuImica FIsica, Pabellon 2, Ciudad Universitaria, 1428 Buenos Aires (Argentina); Barron, T H K [School of Chemistry, University of Bristol, Cantock' s Close, Bristol BS8 1TS (United Kingdom); Allan, N L [School of Chemistry, University of Bristol, Cantock' s Close, Bristol BS8 1TS (United Kingdom)
2005-02-02
There has been substantial renewed interest in negative thermal expansion following the discovery that cubic ZrW{sub 2}O{sub 8} contracts over a temperature range in excess of 1000 K. Substances of many different kinds show negative thermal expansion, especially at low temperatures. In this article we review the underlying thermodynamics, emphasizing the roles of thermal stress and elasticity. We also discuss vibrational and non-vibrational mechanisms operating on the atomic scale that are responsible for negative expansion, both isotropic and anisotropic, in a wide range of materials. (topical review)
Fakhruddin, Hasan
1993-01-01
Describes a paradox in the equation for thermal expansion. If the calculations for heating a rod and subsequently cooling a rod are determined, the new length of the cool rod is shorter than expected. (PR)
Wick's theorem and reconstruction schemes for reduced density matrices
CHEN Feiwu
2006-01-01
We first obtained a closed form of the Wick's theorem expressed in Grassman wedge product, which is similar to a binomial expansion. With this new expansion, new reconstruction schemes for reduced density matrices are derived rigorously. The higher order reduced density matrices are systematically decomposed into a sum of the lower order reduced density matrices which could be used to solve the contracted Schr(o)dinger equation.
Multiresolution signal decomposition schemes
J. Goutsias (John); H.J.A.M. Heijmans (Henk)
1998-01-01
textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis
Multiresolution signal decomposition schemes
Goutsias, J.; Heijmans, H.J.A.M.
1998-01-01
[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis and synthes
Mananga, Eugene Stephane
2013-01-01
This work presents the possibility of applying the Floquet-Magnus expansion and the Fer expansion approaches to the most useful interactions known in solid-state nuclear magnetic resonance using the magic-echo scheme. The results of the effective Hamiltonians of these theories and average Hamiltonian theory are presented.
Application of ADER Scheme in MHD Simulation
ZHANG Yanyan; FENG Xueshang; JIANG Chaowei; ZHOU Yufen
2012-01-01
The Arbitrary accuracy Derivatives Riemann problem method（ADER） scheme is a new high order numerical scheme based on the concept of finite volume integration,and it is very easy to be extended up to any order of space and time accuracy by using a Taylor time expansion at the cell interface position.So far the approach has been applied successfully to flow mechanics problems.Our objective here is to carry out the extension of multidimensional ADER schemes to multidimensional MHD systems of conservation laws by calculating several MHD problems in one and two dimensions： （ⅰ） Brio-Wu shock tube problem,（ⅱ） Dai-Woodward shock tube problem,（ⅲ） Orszag-Tang MHD vortex problem.The numerical results prove that the ADER scheme possesses the ability to solve MHD problem,remains high order accuracy both in space and time,keeps precise in capturing the shock.Meanwhile,the compared tests show that the ADER scheme can restrain the oscillation and obtain the high order non-oscillatory result.
Composite asymptotic expansions
Fruchard, Augustin
2013-01-01
The purpose of these lecture notes is to develop a theory of asymptotic expansions for functions involving two variables, while at the same time using functions involving one variable and functions of the quotient of these two variables. Such composite asymptotic expansions (CAsEs) are particularly well-suited to describing solutions of singularly perturbed ordinary differential equations near turning points. CAsEs imply inner and outer expansions near turning points. Thus our approach is closely related to the method of matched asymptotic expansions. CAsEs offer two unique advantages, however. First, they provide uniform expansions near a turning point and away from it. Second, a Gevrey version of CAsEs is available and detailed in the lecture notes. Three problems are presented in which CAsEs are useful. The first application concerns canard solutions near a multiple turning point. The second application concerns so-called non-smooth or angular canard solutions. Finally an Ackerberg-O’Malley resonance pro...
Al-saggaf, Alawi A
2008-01-01
This paper attempt has been made to explain a fuzzy commitment scheme. In the conventional Commitment schemes, both committed string m and valid opening key are required to enable the sender to prove the commitment. However there could be many instances where the transmission involves noise or minor errors arising purely because of the factors over which neither the sender nor the receiver have any control. The fuzzy commitment scheme presented in this paper is to accept the opening key that is close to the original one in suitable distance metric, but not necessarily identical. The concept itself is illustrated with the help of simple situation.
Novel Foraminal Expansion Technique
Senturk, Salim; Ciplak, Mert; Oktenoglu, Tunc; Sasani, Mehdi; Egemen, Emrah; Yaman, Onur; Suzer, Tuncer
2016-01-01
The technique we describe was developed for cervical foraminal stenosis for cases in which a keyhole foraminotomy would not be effective. Many cervical stenosis cases are so severe that keyhole foraminotomy is not successful. However, the technique outlined in this study provides adequate enlargement of an entire cervical foraminal diameter. This study reports on a novel foraminal expansion technique. Linear drilling was performed in the middle of the facet joint. A small bone graft was placed between the divided lateral masses after distraction. A lateral mass stabilization was performed with screws and rods following the expansion procedure. A cervical foramen was linearly drilled medially to laterally, then expanded with small bone grafts, and a lateral mass instrumentation was added with surgery. The patient was well after the surgery. The novel foraminal expansion is an effective surgical method for severe foraminal stenosis. PMID:27559460
Top-quark pair production in a running mass scheme
Dowling, M. [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Moch, S. [Deutsches Elektronen-Synchrotron (DESY), Zeuthen (Germany); Hamburg Univ. (Germany). II. Inst. fuer Theoretische Physik
2013-11-15
Between the Tevatron and LHC, top-quark physics is now becoming an area for precision physics. This has lead to an increase in theoretical activity to match the experimental accuracy of top anti-top production. We discuss the difficulty in properly defining the top-quark mass as measured by experiments and present results for differential distributions of top-quark pair production in a running mass scheme. The use of such a scheme shows better convergence in the perturbative expansion and improves the scale dependence as opposed to the typical on-shell scheme.
Shift visual cryptography scheme of two secret images
无
2003-01-01
A new visual cryptography scheme of two secret images, which is named the shift visual cryptography of two secret images, is given. The compound function family of a general construction model is also introduced. The uniqueness and validity of this model are proved, and the minimum rows and columns for realizing the scheme are obtained. Compared with visual cryptography of one secret image, the shift visual cryptography scheme can share two secret images with the same size of pixels expansion without losing the contrast. It has randomness and various forms, and furthermore, we can also visually recover two secret images even if the two shares are different in form and color.
Steppe expansion in Patagonia?
Veblen, Thomas T.; Markgraf, Vera
1988-11-01
Westward expansion of the Patagonian steppe and retrocession of Andean forests due to increasing aridity over the past one or two millennia has been a persistent theme in the ecological and paleoecological literature for at least half a century. New evidence from pollen profiles, tree-ring analysis, vegetation structure, and photographic and documentary historical sources does not show the expansion of the steppe. Instead, over the past century trees have invaded the steppe as a consequence mainly of human-induced changes in the fire regime, and trees have regenerated in forest areas that were heavily burnt at the onset of European colonization.
Massimo Giovannini
2015-06-01
Full Text Available Cosmological singularities are often discussed by means of a gradient expansion that can also describe, during a quasi-de Sitter phase, the progressive suppression of curvature inhomogeneities. While the inflationary event horizon is being formed the two mentioned regimes coexist and a uniform expansion can be conceived and applied to the evolution of spatial gradients across the protoinflationary boundary. It is argued that conventional arguments addressing the preinflationary initial conditions are necessary but generally not sufficient to guarantee a homogeneous onset of the conventional inflationary stage.
Giovannini, Massimo, E-mail: massimo.giovannini@cern.ch [Department of Physics, Theory Division, CERN, 1211 Geneva 23 (Switzerland); INFN, Section of Milan-Bicocca, 20126 Milan (Italy)
2015-06-30
Cosmological singularities are often discussed by means of a gradient expansion that can also describe, during a quasi-de Sitter phase, the progressive suppression of curvature inhomogeneities. While the inflationary event horizon is being formed the two mentioned regimes coexist and a uniform expansion can be conceived and applied to the evolution of spatial gradients across the protoinflationary boundary. It is argued that conventional arguments addressing the preinflationary initial conditions are necessary but generally not sufficient to guarantee a homogeneous onset of the conventional inflationary stage.
Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela
2013-01-01
Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...... of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit...
Willcock, J J; Lumsdaine, A; Quinlan, D J
2008-08-19
Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.
Associativity of the operator product expansion
Holland, Jan
2015-01-01
We consider a recursive scheme for defining the coefficients in the operator product expansion (OPE) of an arbitrary number of composite operators in the context of perturbative, Euclidean quantum field theory in four dimensions. Our iterative scheme is consistent with previous definitions of OPE coefficients via the flow equation method, or methods based on Feynman diagrams. It allows us to prove that a strong version of the "associativity" condition holds for the OPE to arbitrary orders in perturbation theory. Such a condition was previously proposed in an axiomatic setting in [1] and has interesting conceptual consequences: 1) One can characterise perturbations of quantum field theories abstractly in a sort of "Hochschild-like" cohomology setting, 2) one can prove a "coherence theorem" analogous to that in an ordinary algebra: The OPE coefficients for a product of two composite operators uniquely determine those for $n$ composite operators. We concretely prove our main results for the Euclidean $\\varphi^4_...
Sectoral and regional expansion of emissions trading
Boehringer, Christoph; Bouwe, Dijkstra; Rosendahl, Knut Einar
2011-07-01
We consider an international emissions trading scheme with partial sectoral and regional coverage. Sectoral and regional expansion of the trading scheme is beneficial in aggregate, but not necessarily for individual countries. We simulate international CO{sub 2} emission quota markets using marginal abatement cost functions and the Copenhagen 2020 climate policy targets for selected countries that strategically allocate emissions in a bid to manipulate the quota price. Quota exporters and importers generally have conflicting interests about admitting more countries to the trading coalition, and our results indicate that some countries may lose substantially when the coalition expands in terms of new countries. For a given coalition, expanding sectoral coverage makes most countries better off, but some countries (notably the USA and Russia) may lose out due to loss of strategic advantages. In general, exporters tend to have stronger strategic power than importers.(Author)
Fast algorithms for spherical harmonic expansions, III
Tygert, Mark
2009-01-01
We accelerate the computation of spherical harmonic transforms, using what is known as the butterfly scheme. This provides a convenient alternative to the approach taken in the second paper from this series on "Fast algorithms for spherical harmonic expansions." The requisite precomputations become manageable when organized as a "depth-first traversal" of the program's control-flow graph, rather than as the perhaps more natural "breadth-first traversal" that processes one-by-one each level of the multilevel procedure. We illustrate the results via several numerical examples.
Experimental Study and Design of Balloon expandable Endovascular Stent Expansion
WANG Yue-xuan; YI Hong; NI Zhong-hua
2005-01-01
The application background and experimental research overview of medical endovascular stent are presented. Based on the analytical comparison of the current research achievements, the life cycle of medical endovascular stent is pointed out and the characteristics of stent expansion in the life cycle are emphasized on.The experimental scheme of in vitro stent expansion based on the machine vision technology in LabVIEW is presented. The selection and usage of the chosen component devices and design of measurement program for experiment are expatiated. A special drug-loading stent was expanded on the assembled platform of selected equipments and experimental results were analyzed. The experimental scheme presented in the paper provides powerful experimental support for the optimization of stent design and computer simulation of stent expansion by the finite element analysis.
For the Long Island, New Jersey, and southern New England region, one facet of marsh drowning as a result of accelerated sea level rise is the expansion of salt marsh ponds and pannes. Over the past century, marsh ponds and pannes have formed and expanded in areas of poor drainag...
Kowalski, Emmanuel
2010-01-01
This is a survey report for the Bourbaki Seminar (Exp. no. 1028, November 2010) concerning sieve and expanders, in particular the recent works of Bourgain, Gamburd and Sarnak introducing "sieve in orbits", and the related developments concerning expansion properties of Cayley graphs of finite linear groups.
Physics suggests that the interplay of momentum, continuity, and geometry in outward radial flow must produce density and concomitant pressure reductions. In other words, this flow is intrinsically auto-expansive. It has been proposed that this process is the key to understanding...
Multi secret image color visual cryptography schemes for general access structures
无
2006-01-01
In the proposed visual cryptography schemes for general access structures, the single secret image black-and-white visual cryptography schemes with meaningful shares have been constructed, in which the shares are innocent looking images. The meaningful shares have not been realized in single secret image color schemes; neither have the multi secret images color schemes. In this paper, the multi secret images color visual cryptography schemes for general access structures with meaningful shares are constructed by the method of matrix concatenation, the pixel expansion is obtained, and the validity of the scheme is proven. In our scheme, the different combination of meaningful color shares can be used to recover distinct color secret images. The multi secret images black-and-white visual cryptography scheme is a special case of our color scheme.
DING XIU-HUAN; FU ZHI-GUO; ZHANG SHU-GONG
2009-01-01
This paper proposes an XTR version of the Kurosawa-Desmedt scheme. Our scheme is secure against adaptive choeen-ciphertext attack under the XTR version of the Decisional Diffie-Hellman assumption in the standard model. Comparing efficiency between the Kurosawa-Desmedt scheme and the proposed XTR-Kurosawa-Desmedt scheme, we find that the proposed scheme is more efficient than the Kurosawa-Desmedt scheme both in communication and computation without compromising security.
DIFFERENCE SCHEMES BASING ON COEFFICIENT APPROXIMATION
MOU Zong-ze; LONG Yong-xing; QU Wen-xiao
2005-01-01
In respect of variable coefficient differential equations, the equations of coefficient function approximation were more accurate than the coefficient to be frozen as a constant in every discrete subinterval. Usually, the difference schemes constructed based on Taylor expansion approximation of the solution do not suit the solution with sharp function.Introducing into local bases to be combined with coefficient function approximation, the difference can well depict more complex physical phenomena, for example, boundary layer as well as high oscillatory, with sharp behavior. The numerical test shows the method is more effective than the traditional one.
Juhl, Hans Jørn; Stacey, Julia
2001-01-01
It is usual practice to evaluate the success of a labelling scheme by looking at the awareness percentage, but in many cases this is not sufficient. The awareness percentage gives no indication of which of the consumer segments that are aware of and use labelling schemes and which do not. In the ......It is usual practice to evaluate the success of a labelling scheme by looking at the awareness percentage, but in many cases this is not sufficient. The awareness percentage gives no indication of which of the consumer segments that are aware of and use labelling schemes and which do not....... In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...
Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.
2014-07-25
This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.
Towards Symbolic Encryption Schemes
Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik
2012-01-01
Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......, namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....
Bigravity from gradient expansion
Yamashita, Yasuho [Yukawa Institute for Theoretical Physics, Kyoto University,606-8502, Kyoto (Japan); Tanaka, Takahiro [Yukawa Institute for Theoretical Physics, Kyoto University,606-8502, Kyoto (Japan); Department of Physics, Kyoto University,606-8502, Kyoto (Japan)
2016-05-04
We discuss how the ghost-free bigravity coupled with a single scalar field can be derived from a braneworld setup. We consider DGP two-brane model without radion stabilization. The bulk configuration is solved for given boundary metrics, and it is substituted back into the action to obtain the effective four-dimensional action. In order to obtain the ghost-free bigravity, we consider the gradient expansion in which the brane separation is supposed to be sufficiently small so that two boundary metrics are almost identical. The obtained effective theory is shown to be ghost free as expected, however, the interaction between two gravitons takes the Fierz-Pauli form at the leading order of the gradient expansion, even though we do not use the approximation of linear perturbation. We also find that the radion remains as a scalar field in the four-dimensional effective theory, but its coupling to the metrics is non-trivial.
Expansion coding: Achieving the capacity of an AEN channel
Koyluoglu, O Ozan; Si, Hongbo; Vishwanath, Sriram
2012-01-01
A general method of coding over expansions is proposed, which allows one to reduce the highly non-trivial problem of coding over continuous channels to a much simpler discrete ones. More specifically, the focus is on the additive exponential noise (AEN) channel, for which the (binary) expansion of the (exponential) noise random variable is considered. It is shown that each of the random variables in the expansion corresponds to independent Bernoulli random variables. Thus, each of the expansion levels (of the underlying channel) corresponds to a binary symmetric channel (BSC), and the coding problem is reduced to coding over these parallel channels while satisfying the channel input constraint. This optimization formulation is stated as the achievable rate result, for which a specific choice of input distribution is shown to achieve a rate which is arbitrarily close to the channel capacity in the high SNR regime. Remarkably, the scheme allows for low-complexity capacity-achieving codes for AEN channels, using...
2006-01-01
We study the question of ``how robust are the known lower bounds of labeling schemes when one increases the number of consulted labels''. Let $f$ be a function on pairs of vertices. An $f$-labeling scheme for a family of graphs $\\cF$ labels the vertices of all graphs in $\\cF$ such that for every graph $G\\in\\cF$ and every two vertices $u,v\\in G$, the value $f(u,v)$ can be inferred by merely inspecting the labels of $u$ and $v$. This paper introduces a natural generalization: the notion of $f$-...
Alternative health insurance schemes
Keiding, Hans; Hansen, Bodil O.
2002-01-01
In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...
Thermal expansion of glassy polymers.
Davy, K W; Braden, M
1992-01-01
The thermal expansion of a number of glassy polymers of interest in dentistry has been studied using a quartz dilatometer. In some cases, the expansion was linear and therefore the coefficient of thermal expansion readily determined. Other polymers exhibited non-linear behaviour and values appropriate to different temperature ranges are quoted. The linear coefficient of thermal expansion was, to a first approximation, a function of both the molar volume and van der Waal's volume of the repeating unit.
An Integral Formalism for the Construction of Scheme Transformations in Quantum Field Theory
Choi, Gongjun
2016-01-01
We present an integral formalism for constructing scheme transformations in a quantum field theory. We apply this to generate several new useful scheme transformations. A comparative analysis is given of these scheme transformations in terms of their series expansion coefficients and their resultant effect on the interaction coupling, in particular at a zero of the beta function away from the origin in coupling-constant space.
A modified symplectic PRK scheme for seismic wave modeling
Liu, Shaolin; Yang, Dinghui; Ma, Jian
2017-02-01
A new scheme for the temporal discretization of the seismic wave equation is constructed based on symplectic geometric theory and a modified strategy. The ordinary differential equation in terms of time, which is obtained after spatial discretization via the spectral-element method, is transformed into a Hamiltonian system. A symplectic partitioned Runge-Kutta (PRK) scheme is used to solve the Hamiltonian system. A term related to the multiplication of the spatial discretization operator with the seismic wave velocity vector is added into the symplectic PRK scheme to create a modified symplectic PRK scheme. The symplectic coefficients of the new scheme are determined via Taylor series expansion. The positive coefficients of the scheme indicate that its long-term computational capability is more powerful than that of conventional symplectic schemes. An exhaustive theoretical analysis reveals that the new scheme is highly stable and has low numerical dispersion. The results of three numerical experiments demonstrate the high efficiency of this method for seismic wave modeling.
A Threshold Scheme under Peer-to-Peer Network
XIE Yumin; SHI Feng; MING Yang; MUHAMMAD Kamran; XU Jianqiang
2006-01-01
Resource sharing among peers is one of important application in Peer-to-Peer(P2P) network. Inexistence of server makes P2P network to be a less trustable tool for property owners to distribute their resource. In order to protect intelligent property, reputation management strategy is adopted in many P2P network. As long as a P2P network reputation strategy is confirmed, application designer can employ a special detailed distribution scheme to fulfill content distribution within the net. Shmir (k,n) threshold scheme, for example, is an encryption scheme to enhance the distribution security of this kind of design. (k*,n) threshold scheme is a new tool similar to Shmir scheme is proposed in this paper. The new scheme based on polynomial expansion and its security is decided by the one way function used in the secret distribution procedure. The scheme efficiency and its features as well as comparison between new and Shmir scheme are also discussed in this paper.
Operator product expansion algebra
Holland, Jan [School of Mathematics, Cardiff University, Senghennydd Rd, Cardiff CF24 4AG (United Kingdom); Hollands, Stefan [School of Mathematics, Cardiff University, Senghennydd Rd, Cardiff CF24 4AG (United Kingdom); Institut für Theoretische Physik, Universität Leipzig, Brüderstr. 16, Leipzig, D-04103 (Germany)
2013-07-15
We establish conceptually important properties of the operator product expansion (OPE) in the context of perturbative, Euclidean φ{sup 4}-quantum field theory. First, we demonstrate, generalizing earlier results and techniques of hep-th/1105.3375, that the 3-point OPE,
Testing Machine for Expansive Mortar
Silva, Romulo Augusto Ventura
2011-01-01
The correct evaluation of a material property is fundamental to, on their application; they met all expectations that were designed for. In development of an expansive cement for ornamental rocks purpose, was denoted the absence of methodologies and equipments to evaluate the expansive pressure and temperature of expansive cement during their expansive process, having that data collected in a static state of the specimen. In that paper, is described equipment designed for evaluation of pressure and temperature of expansive cements applied to ornamental rocks.
Engineering Properties of Expansive Soil
DAI Shaobin; SONG Minghai; HUANG Jun
2005-01-01
The components of expansive soil were analyzed with EDAX, and it is shown that the main contents of expansive soil in the northern Hubei have some significant effects on engineering properties of expansive soil. Furthermore, the soil modified by lime has an obvious increase of Ca2+ and an improvement of connections between granules so as to reduce the expansibility and contractility of soil. And it also has a better effect on the modified expansive soil than the one modified by pulverized fuel ash.
Plasma heating via adiabatic magnetic compression-expansion cycle
Avinash, K.; Sengupta, M.; Ganesh, R.
2016-06-01
Heating of collisionless plasmas in closed adiabatic magnetic cycle comprising of a quasi static compression followed by a non quasi static constrained expansion against a constant external pressure is proposed. Thermodynamic constraints are derived to show that the plasma always gains heat in cycles having at least one non quasi static process. The turbulent relaxation of the plasma to the equilibrium state at the end of the non quasi static expansion is discussed and verified via 1D Particle in Cell (PIC) simulations. Applications of this scheme to heating plasmas in open configurations (mirror machines) and closed configurations (tokamak, reverse field pinche) are discussed.
Merchant electricity transmission expansion: A European case study
Kristiansen, T. [RBS Sempra Commodities, 155 Bishopsgate, London EC2M3TZ (United Kingdom); Rosellon, J. [Centro de Investigacion y Docencia Economicas (CIDE), Division de Economia, Carretera Mexico-Toluca 3655, Lomas de Santa Fe, 01210 Mexico D.F. (Mexico); German Institute for Economic Research (DIW Berlin), Mohrenstrasse 58, 10117, Berlin (Germany)
2010-10-15
We apply a merchant transmission model to the trilateral market coupling (TLC) arrangement among the Netherlands, Belgium and France as an example, and note that it could further be applied to other market splitting or coupling of Europe's different national power markets. In this merchant framework the system operator allocates financial transmission rights (FTRs) to investors in transmission expansion based upon their preferences, and revenue adequacy. The independent system operator (ISO) preserves some proxy FTRs to manage potential negative externalities that may result from expansion projects. This scheme could help European market coupling arrangements attract additional investment. (author)
Optimized difference schemes for multidimensional hyperbolic partial differential equations
Adrian Sescu
2009-04-01
Full Text Available In numerical solutions to hyperbolic partial differential equations in multidimensions, in addition to dispersion and dissipation errors, there is a grid-related error (referred to as isotropy error or numerical anisotropy that affects the directional dependence of the wave propagation. Difference schemes are mostly analyzed and optimized in one dimension, wherein the anisotropy correction may not be effective enough. In this work, optimized multidimensional difference schemes with arbitrary order of accuracy are designed to have improved isotropy compared to conventional schemes. The derivation is performed based on Taylor series expansion and Fourier analysis. The schemes are restricted to equally-spaced Cartesian grids, so the generalized curvilinear transformation method and Cartesian grid methods are good candidates.
ZHANG Suying; DENG Zichen
2005-01-01
Based on Magnus or Fer expansion for solving linear differential equation and operator semi-group theory, Lie group integration methods for general nonlinear dynamic equation are studied. Approximate schemes of Magnus type of 4th, 6th and 8th order are constructed which involve only 1, 4 and 10 different commutators, and the time-symmetry properties of the schemes are proved. In the meantime, the integration methods based on Fer expansion are presented. Then by connecting the Fer expansion methods with Magnus expansion methods some techniques are given to simplify the construction of Fer expansion methods. Furthermore time-symmetric integrators of Fer type are constructed. These methods belong to the category of geometric integration methods and can preserve many qualitative properties of the original dynamic system.
Conformal expansions and renormalons
Gardi, E; Gardi, Einan; Grunberg, Georges
2001-01-01
The large-order behaviour of QCD is dominated by renormalons. On the other hand renormalons do not occur in conformal theories, such as the one describing the infrared fixed-point of QCD at small beta_0 (the Banks--Zaks limit). Since the fixed-point has a perturbative realization, all-order perturbative relations exist between the conformal coefficients, which are renormalon-free, and the standard perturbative coefficients, which contain renormalons. Therefore, an explicit cancellation of renormalons should occur in these relations. The absence of renormalons in the conformal limit can thus be seen as a constraint on the structure of the QCD perturbative expansion. We show that the conformal constraint is non-trivial: a generic model for the large-order behaviour violates it. We also analyse a specific example, based on a renormalon-type integral over the two-loop running-coupling, where the required cancellation does occur.
Optical imaging. Expansion microscopy.
Chen, Fei; Tillberg, Paul W; Boyden, Edward S
2015-01-30
In optical microscopy, fine structural details are resolved by using refraction to magnify images of a specimen. We discovered that by synthesizing a swellable polymer network within a specimen, it can be physically expanded, resulting in physical magnification. By covalently anchoring specific labels located within the specimen directly to the polymer network, labels spaced closer than the optical diffraction limit can be isotropically separated and optically resolved, a process we call expansion microscopy (ExM). Thus, this process can be used to perform scalable superresolution microscopy with diffraction-limited microscopes. We demonstrate ExM with apparent ~70-nanometer lateral resolution in both cultured cells and brain tissue, performing three-color superresolution imaging of ~10(7) cubic micrometers of the mouse hippocampus with a conventional confocal microscope.
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG; Chun-xiao WANG; Zhen-hua LIU
2016-01-01
Using lattice basis delegation in a fi xed dimension, we propose an efficient lattice-based hierarchical identity based encryption (HIBE) scheme in the standard model whose public key size is only (dm2+mn) log q bits and whose message-ciphertext expansion factor is only log q, where d is the maximum hierarchical depth and (n,m,q) are public parameters. In our construction, a novel public key assignment rule is used to averagely assign one random and public matrix to two identity bits, which implies that d random public matrices are enough to build the proposed HIBE scheme in the standard model, compared with the case in which 2d such public matrices are needed in the scheme proposed at Crypto 2010 whose public key size is (2dm2+mn+m) log q. To reduce the message-ciphertext expansion factor of the proposed scheme to log q, the encryption algorithm of this scheme is built based on Gentry’s encryption scheme, by which m2 bits of plaintext are encrypted into m2 log q bits of ciphertext by a one time encryption operation. Hence, the presented scheme has some advantages with respect to not only the public key size but also the message-ciphertext expansion factor. Based on the hardness of the learning with errors problem, we demonstrate that the scheme is secure under selective identity and chosen plaintext attacks.
A New Deferred Sentencing Scheme
N. K. Chakravarti
1968-10-01
Full Text Available A new deferred sentencing scheme resembling double sampling scheme has been suggested from viewpoint of operational and administrative. It is recommended particularly when the inspection is destructive. The O.C. curves of the scheme for two sample sizes of 5 and 10 have been given.
Bonus schemes and trading activity
Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.
2014-01-01
Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of
Bonus Schemes and Trading Activity
Pikulina, E.S.; Renneboog, L.D.R.; Ter Horst, J.R.; Tobler, P.N.
2013-01-01
Abstract: Little is known about how different bonus schemes affect traders’ propensity to trade and which bonus schemes improve traders’ performance. We study the effects of linear versus threshold (convex) bonus schemes on traders’ behavior. Traders purchase and sell shares in an experimental stock
Bonus schemes and trading activity
Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.
2014-01-01
Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of
Two Improved Digital Signature Schemes
无
2001-01-01
In this paper, two improved digital signature schemes are presented based on the design of directed signaturescheme [3]. The peculiarity of the system is that only if the scheme is specific recipient, the signature is authenticated.Since the scheme adds the screen of some information parameters, the difficulty of deciphered keys and the security ofdigital signature system are increased.
CONSIDERATIONS CONCERNING GUARANTEE SCHEMES
EMILIA CLIPICI
2013-05-01
Full Text Available When a large withdrawal from banks occurs, customers withdraw their deposits, so banks are likely to go bankrupt because of liquidity problems. There are several mechanisms that allow the banking system to avoid the phenomenon of massive withdrawals from banks. The most effective one is the deposit insurance. The deposit insurance is seen primarily as a means of protecting depositors of credit institutions, and secondly as a means of ensuring the stability of the banking system. This article described deposit guarantee scheme in Romania and other country.
Burial Ground Expansion Hydrogeologic Characterization
Gaughan , T.F.
1999-02-26
Sirrine Environmental Consultants provided technical oversight of the installation of eighteen groundwater monitoring wells and six exploratory borings around the location of the Burial Ground Expansion.
Foundation and generalization of the expansion by regions
Jantzen, Bernd
2011-01-01
The "expansion by regions" is a method of asymptotic expansion developed by Beneke and Smirnov in 1997. It expands the integrand according to the scaling prescriptions of a set of regions and integrates all expanded terms over the whole integration domain. This method has been applied successfully to many complicated loop integrals, but a general proof for its correctness has still been missing. This paper shows how the expansion by regions manages to reproduce the exact result correctly in an expanded form and clarifies the conditions on the choice and completeness of the considered regions. A generalized expression for the full result is presented that involves additional overlap contributions. These extra pieces normally yield scaleless integrals which are consistently set to zero, but they may be needed depending on the choice of the regularization scheme. While the main proofs and formulae are presented in a general and concise form, a large portion of the paper is filled with simple, pedagogical one-loo...
COMPUTATIONAL ANALYSIS OF PARTICULATE FLOW IN EXPANSION CHANNEL
Nor Azwadi Che Sidik
2013-01-01
Full Text Available Computational prediction of fluid-solid particle interaction in an expansion horizontal channel with wide range of Reynolds numbers. Lagrangian-Lagrangian numerical technique to predict the movement of solid particle. The method is based on mesocale scheme of lattice Boltzmann method for prediction of fluid dynamics and second Newtonâs law for the dynamics of solid particles. The flow behaviour at the downstream of the expansion channel is critically dependence on the Reynolds number of the flow. The removal percentage of the contaminant critically dependence on the flow structure donwstream of the expansion channel. The strength of recirculation region plays significant role due to the step in the cavity.
Secure mediated certificateless signature scheme
YANG Chen; MA Wen-ping; WANG Xin-mei
2007-01-01
Ju et al proposed a certificateless signature scheme with instantaneous revocation by introducing security mediator (SEM) mechanism. This article presents a detailed cryptoanalysis of this scheme and shows that, in their proposed scheme, once a valid signature has been produced, the signer can recover his private key information and the instantaneous revocation property will be damaged. Furthermore, an improved mediated signature scheme, which can eliminate these disadvantages, is proposed, and security proof of the improved scheme under elliptic curve factorization problem (ECFP) assumption and bilinear computational diffie-hellman problem (BCDH) assumption is also proposed.
Ackerman, Margareta; Lopez-Ortiz, Alejandro
2011-01-01
Over the last fifteen years, web searching has seen tremendous improvements. Starting from a nearly random collection of matching pages in 1995, today, search engines tend to satisfy the user's informational need on well-formulated queries. One of the main remaining challenges is to satisfy the users' needs when they provide a poorly formulated query. When the pages matching the user's original keywords are judged to be unsatisfactory, query expansion techniques are used to alter the result set. These techniques find keywords that are similar to the keywords given by the user, which are then appended to the original query leading to a perturbation of the result set. However, when the original query is sufficiently ill-posed, the user's informational need is best met using entirely different keywords, and a small perturbation of the original result set is bound to fail. We propose a novel approach that is not based on the keywords of the original query. We intentionally seek out orthogonal queries, which are r...
Lattice harmonics expansion revisited
Kontrym-Sznajd, G.; Holas, A.
2017-04-01
The main subject of the work is to provide the most effective way of determining the expansion of some quantities into orthogonal polynomials, when these quantities are known only along some limited number of sampling directions. By comparing the commonly used Houston method with the method based on the orthogonality relation, some relationships, which define the applicability and correctness of these methods, are demonstrated. They are verified for various sets of sampling directions applicable for expanding quantities having the full symmetry of the Brillouin zone of cubic and non-cubic lattices. All results clearly show that the Houston method is always better than the orthogonality-relation one. For the cubic symmetry we present a few sets of special directions (SDs) showing how their construction and, next, a proper application depend on the choice of various sets of lattice harmonics. SDs are important mainly for experimentalists who want to reconstruct anisotropic quantities from their measurements, performed at a limited number of sampling directions.
Renormalized Wick expansion for a modified PQCD
de Oca, Alejandro Cabo Montes
2007-01-01
The renormalization scheme for the Wick expansion of a modified version of the perturbative QCD introduced in previous works is discussed. Massless QCD is considered, by implementing the usual multiplicative scaling of the gluon and quark wave functions and vertices. However, also massive quark and gluon counter-terms are allowed in this mass less theory since the condensates are expected to generate masses. A natural set of expansion parameters of the physical quantities is introduced: the coupling itself and to masses $m_q$ and $m_g$ associated to quarks and gluons respectively. This procedure allows to implement a dimensional transmutation effect through these new mass scales. A general expression for the new generating functional in terms of the mass parameters $m_q$ and $m_g$ is obtained in terms of integrals over arbitrary but constant gluon or quark fields in each case. Further, the one loop potential, is evaluated in more detail in the case when only the quark condensate is retained. This lowest order...
Renormalized Wick expansion for a modified PQCD
Cabo Montes de Oca, Alejandro [Instituto de Cibernetica, Matematica y Fisica, Group of Theoretical Physics, Vedado, La Habana (Cuba); Abdus Salam International Centre for Theoretical Physics, Trieste (Italy)
2008-05-15
The renormalization scheme for the Wick expansion of a modified version of the perturbative QCD introduced in previous works is discussed. Massless QCD is considered by implementing the usual multiplicative scaling of the gluon and quark wave functions and vertices. However, also massive quark and gluon counterterms are allowed in this massless theory since the condensates are expected to generate masses. A natural set of expansion parameters of the physical quantities is introduced: the coupling itself and the two masses m{sub q} and m{sub g} associated to quarks and gluons, respectively. This procedure allows one to implement a dimensional transmutation effect through these new mass scales. A general expression for the new generating functional in terms of the mass parameters m{sub q} and m{sub g} is obtained in terms of integrals over arbitrary but constant gluon or quark fields in each case. Further, the one loop potential is evaluated in more detail in the case when only the quark condensate is retained. This lowest order result again indicates the dynamical generation of quark condensates in the vacuum. (orig.)
Isotropic Negative Thermal Expansion Metamaterials.
Wu, Lingling; Li, Bo; Zhou, Ji
2016-07-13
Negative thermal expansion materials are important and desirable in science and engineering applications. However, natural materials with isotropic negative thermal expansion are rare and usually unsatisfied in performance. Here, we propose a novel method to achieve two- and three-dimensional negative thermal expansion metamaterials via antichiral structures. The two-dimensional metamaterial is constructed with unit cells that combine bimaterial strips and antichiral structures, while the three-dimensional metamaterial is fabricated by a multimaterial 3D printing process. Both experimental and simulation results display isotropic negative thermal expansion property of the samples. The effective coefficient of negative thermal expansion of the proposed models is demonstrated to be dependent on the difference between the thermal expansion coefficient of the component materials, as well as on the circular node radius and the ligament length in the antichiral structures. The measured value of the linear negative thermal expansion coefficient of the three-dimensional sample is among the largest achieved in experiments to date. Our findings provide an easy and practical approach to obtaining materials with tunable negative thermal expansion on any scale.
Geng, Huiping
2016-11-01
CEPC was proposed as an electron and positron collider ring with a circumference of 50-100 km to study the Higgs boson. Since the proposal was made, the lattice design for CEPC has been carried out and a preliminary conceptual design report has been written at the end of 2014. In this paper, we will describe the principles of pretzel scheme design, which is one of most important issues in CEPC lattice design. Then, we will show the modification of the lattice based on the lattice design shown in the Pre-CDR. The latest pretzel orbit design result will also be shown. The issues remained to be solved in the present design will be discussed and a brief summary will be given at the end.
On genus expansion of superpolynomials
Mironov, A; Sleptsov, A; Smirnov, A
2013-01-01
Recently it was shown that the (Ooguri-Vafa) generating function of HOMFLY polynomials is the Hurwitz partition function, i.e. that the dependence of the HOMFLY polynomials on representation is naturally captured by symmetric group characters (cut-and-join eigenvalues). The genus expansion and expansion through Vassiliev invariants explicitly demonstrate this phenomenon. In the present letter we claim that the superpolynomials are not functions of such a type: symmetric group characters do not provide an adequate linear basis for their expansions. Deformation to superpolynomials is, however, straightforward in the multiplicative basis:the Casimir operators are beta-deformed to Hamiltonians of the Calogero-Moser-Sutherland system. Applying this trick to the genus and Vassiliev expansions, we observe that the deformation is rather straightforward only for the thin knots. Beyond this family additional algebraically independent terms appear in the Vassiliev and genus expansions. This can suggest that the superpol...
Numerical simulation of stratified shear flow using a higher order Taylor series expansion method
Iwashige, Kengo; Ikeda, Takashi [Hitachi, Ltd. (Japan)
1995-09-01
A higher order Taylor series expansion method is applied to two-dimensional numerical simulation of stratified shear flow. In the present study, central difference scheme-like method is adopted for an even expansion order, and upwind difference scheme-like method is adopted for an odd order, and the expansion order is variable. To evaluate the effects of expansion order upon the numerical results, a stratified shear flow test in a rectangular channel (Reynolds number = 1.7x10{sup 4}) is carried out, and the numerical velocity and temperature fields are compared with experimental results measured by laser Doppler velocimetry thermocouples. The results confirm that the higher and odd order methods can simulate mean velocity distributions, root-mean-square velocity fluctuations, Reynolds stress, temperature distributions, and root-mean-square temperature fluctuations.
Fujisaka, H; Eckhardt, B; Fujisaka, Hirokazu; Shigematsu, Hideto; Eckhardt, Bruno
1993-01-01
Abstract: A new expansion scheme to evaluate the eigenvalues of the generalized evolution operator (Frobenius-Perron operator) $H_{q}$ relevant to the fluctuation spectrum and poles of the order-$q$ power spectrum is proposed. The ``partition function'' is computed in terms of unstable periodic orbits and then used in a finite pole approximation of the continued fraction expansion for the evolution operator. A solvable example is presented and the approximate and exact results are compared; good agreement is found.
Improved Ternary Subdivision Interpolation Scheme
WANG Huawei; QIN Kaihuai
2005-01-01
An improved ternary subdivision interpolation scheme was developed for computer graphics applications that can manipulate open control polygons unlike the previous ternary scheme, with the resulting curve proved to be still C2-continuous. Parameterizations of the limit curve near the two endpoints are given with expressions for the boundary derivatives. The split joint problem is handled with the interpolating ternary subdivision scheme. The improved scheme can be used for modeling interpolation curves in computer aided geometric design systems, and provides a method for joining two limit curves of interpolating ternary subdivisions.
Formal Verification of NTRUEncrypt Scheme
Gholam Reza Moghissi
2016-04-01
Full Text Available In this paper we explore a mechanized verification of the NTRUEncrypt scheme, with the formal proof system Isabelle/HOL. More precisely, the functional correctness of this algorithm, in its reduced form, is formally verified with computer support. We show that this scheme is correct what is a necessary condition for the usefulness of any cryptographic encryption scheme. Besides, we present a convenient and application specific formalization of the NTRUEncrypt scheme in the Isabelle/HOL system that can be used in further study around the functional and security analysis of NTRUEncrypt family.
Thermal Expansion of Polyurethane Foam
Lerch, Bradley A.; Sullivan, Roy M.
2006-01-01
Closed cell foams are often used for thermal insulation. In the case of the Space Shuttle, the External Tank uses several thermal protection systems to maintain the temperature of the cryogenic fuels. A few of these systems are polyurethane, closed cell foams. In an attempt to better understand the foam behavior on the tank, we are in the process of developing and improving thermal-mechanical models for the foams. These models will start at the microstructural level and progress to the overall structural behavior of the foams on the tank. One of the key properties for model characterization and verification is thermal expansion. Since the foam is not a material, but a structure, the modeling of the expansion is complex. It is also exacerbated by the anisoptropy of the material. During the spraying and foaming process, the cells become elongated in the rise direction and this imparts different properties in the rise direction than in the transverse directions. Our approach is to treat the foam as a two part structure consisting of the polymeric cell structure and the gas inside the cells. The polymeric skeleton has a thermal expansion of its own which is derived from the basic polymer chemistry. However, a major contributor to the thermal expansion is the volume change associated with the gas inside of the closed cells. As this gas expands it exerts pressure on the cell walls and changes the shape and size of the cells. The amount that this occurs depends on the elastic and viscoplastic properties of the polymer skeleton. The more compliant the polymeric skeleton, the more influence the gas pressure has on the expansion. An additional influence on the expansion process is that the polymeric skeleton begins to breakdown at elevated temperatures and releases additional gas species into the cell interiors, adding to the gas pressure. The fact that this is such a complex process makes thermal expansion ideal for testing the models. This report focuses on the thermal
AUTISTIC CHILDREN PROTECTION SCHEME
Dragan LUKIC
1998-09-01
Full Text Available The present article sets forth the theoretical grounds which make the basis for the organizational scheme of the autistic persons social protection. This protection consists of the below listed forms of work:· Health service with the role of an early detection and participation in the creation of rehabilitation programs;· Social protection with its programs of work from the diagnostics where the defectologist makes a team together with the physician and the psychologists to the systems of rehabilitation institutions where the defectologist’s is the main responsibility.The present article underlines two facts, namely:· that an autistic person requires to be followed and every spare moment used to promote and advance the activities the doer commenced himself instead of having him carry out the programs which are beyond his internal motivations and which he finds emotionally inaccessible;· that and form of work organization with autistic persons must subordinate its administrative part to the basic professional requirements this kind of disorder (handicap sets in front of each professional.
An Analysis of Scheme Transformations in the Vicinity of an Infrared Fixed Point
Ryttov, Thomas A
2012-01-01
We give a detailed analysis of the effects of scheme transformations in the vicinity of an exact or approximate infrared fixed point in an asymptotically free gauge theory with fermions. We list necessary conditions that such transformations must obey and show that, although these can easily be satisfied in the vicinity of an ultraviolet fixed point, they constitute significant restrictions on scheme transformations at an infrared fixed point. We construct acceptable scheme transformations and use these to study the scheme-dependence of an infrared fixed point, making comparison with our previous three-loop and four-loop calculations of the location of this point in the $\\bar{MS}$ scheme. We also use an illustrative hypothetical exact $\\beta$ function to investigate how accurately analyses of finite-order series expansions probe an infrared fixed point and the effect of a scheme transformation on these. Some implications of our work are discussed.
An Analysis of Scheme Transformations in the Vicinity of an Infrared Fixed Point
Ryttov, Thomas; Shrock, Robert
2012-01-01
We give a detailed analysis of the effects of scheme transformations in the vicinity of an exact or approximate infrared fixed point in an asymptotically free gauge theory with fermions. We list necessary conditions that such transformations must obey and show that, although these can easily...... be satisfied in the vicinity of an ultraviolet fixed point, they constitute significant restrictions on scheme transformations at an infrared fixed point. We construct acceptable scheme transformations and use these to study the scheme-dependence of an infrared fixed point, making comparison with our previous...... three-loop and four-loop calculations of the location of this point in the $\\bar{MS}$ scheme. We also use an illustrative hypothetical exact $\\beta$ function to investigate how accurately analyses of finite-order series expansions probe an infrared fixed point and the effect of a scheme transformation...
Gradient expansion for anisotropic hydrodynamics
Florkowski, Wojciech; Ryblewski, Radoslaw; Spaliński, Michał
2016-12-01
We compute the gradient expansion for anisotropic hydrodynamics. The results are compared with the corresponding expansion of the underlying kinetic-theory model with the collision term treated in the relaxation time approximation. We find that a recent formulation of anisotropic hydrodynamics based on an anisotropic matching principle yields the first three terms of the gradient expansion in agreement with those obtained for the kinetic theory. This gives further support for this particular hydrodynamic model as a good approximation of the kinetic-theory approach. We further find that the gradient expansion of anisotropic hydrodynamics is an asymptotic series, and the singularities of the analytic continuation of its Borel transform indicate the presence of nonhydrodynamic modes.
Gradient expansion for anisotropic hydrodynamics
Florkowski, Wojciech; Spaliński, Michał
2016-01-01
We compute the gradient expansion for anisotropic hydrodynamics. The results are compared with the corresponding expansion of the underlying kinetic-theory model with the collision term treated in the relaxation time approximation. We find that a recent formulation of anisotropic hydrodynamics based on an anisotropic matching principle yields the first three terms of the gradient expansion in agreement with those obtained for the kinetic theory. This gives further support for this particular hydrodynamic model as a good approximation of the kinetic-theory approach. We further find that the gradient expansion of anisotropic hydrodynamics is an asymptotic series, and the singularities of the analytic continuation of its Borel transform indicate the presence of non-hydrodynamic modes.
Introduction of the Floquet-Magnus expansion in solid-state nuclear magnetic resonance spectroscopy.
Mananga, Eugène S; Charpentier, Thibault
2011-07-28
In this article, we present an alternative expansion scheme called Floquet-Magnus expansion (FME) used to solve a time-dependent linear differential equation which is a central problem in quantum physics in general and solid-state nuclear magnetic resonance (NMR) in particular. The commonly used methods to treat theoretical problems in solid-state NMR are the average Hamiltonian theory (AHT) and the Floquet theory (FT), which have been successful for designing sophisticated pulse sequences and understanding of different experiments. To the best of our knowledge, this is the first report of the FME scheme in the context of solid state NMR and we compare this approach with other series expansions. We present a modified FME scheme highlighting the importance of the (time-periodic) boundary conditions. This modified scheme greatly simplifies the calculation of higher order terms and shown to be equivalent to the Floquet theory (single or multimode time-dependence) but allows one to derive the effective Hamiltonian in the Hilbert space. Basic applications of the FME scheme are described and compared to previous treatments based on AHT, FT, and static perturbation theory. We discuss also the convergence aspects of the three schemes (AHT, FT, and FME) and present the relevant references.
Strategic Complexity and Global Expansion
Oladottir, Asta Dis; Hobdari, Bersant; Papanastassiou, Marina
2012-01-01
The purpose of this paper is to analyse the determinants of global expansion strategies of newcomer Multinational Corporations (MNCs) by focusing on Iceland, Israel and Ireland. We argue that newcomer MNCs from small open economies pursue complex global expansion strategies (CGES). We distinguish....... The empirical evidence suggests that newcomer MNCs move away from simplistic dualities in the formulation of their strategic choices towards more complex options as a means of maintaining and enhancing their global competitiveness....
Chaotic communication scheme with multiplication
Bobreshov, A. M.; Karavaev, A. A.
2007-05-01
A new scheme of data transmission with nonlinear admixing is described, in which the two mutually inverse operations (multiplication and division) ensure multiplicative mixing of the informative and chaotic signals that provides a potentially higher degree of security. A special feature of the proposed scheme is the absence of limitations (related to the division by zero) imposed on the types of informative signals.
Homographic scheme for Riccati equation
Dubois, François
2011-01-01
In this paper we present a numerical scheme for the resolution of matrix Riccati equation, usualy used in control problems. The scheme is unconditionnaly stable and the solution is definite positive at each time step of the resolution. We prove the convergence in the scalar case and present several numerical experiments for classical test cases.
Differential operators and automorphism schemes
无
2010-01-01
The ring of global differential operators of a variety is in closed and deep relation with its automorphism scheme.This relation can be applied to the study of homogeneous schemes,giving some criteria of homogeneity,a generalization of Serre-Lang theorem,and some consequences about abelian varieties.
The Occupational Pension Schemes Survey 2006
Sarah Levy; David Miller
2008-01-01
Presents findings on the number of schemes, their membership and contributions to schemes by employers and employeesThis article presents findings on the number of occupational pension schemes in 2006, their membership and contributions to schemes by employers and employees. It is based on the Occupational Pension Schemes Annual Report (2006 edition). The findings distinguish between public and private sector schemes and include breakdowns by scheme status (open, closed, frozen or winding up)...
Expansion Nets and Expansion Processes of Elementary Net Systems
曹存根
1995-01-01
Occurrence nets are insufficient to precisely describe executions of elementary net systems with contacts.Traditionally,S-complementation is used for removal of contacts from the systems.Although the main behavior and properties of the original elementary net systems are preserved during S-complementation,their topologies may be changed greatly.This paper introduces a new kind of nets-expansion nets-for representing behavior of elementary net systems.As shown in the paper,expansion nets are natural as well as sufficient for describing the precise behavior of elementary net systems with or without contactks.
Reed's Conjecture on hole expansions
Fouquet, Jean-Luc
2012-01-01
In 1998, Reed conjectured that for any graph $G$, $\\chi(G) \\leq \\lceil \\frac{\\omega(G) + \\Delta(G)+1}{2}\\rceil$, where $\\chi(G)$, $\\omega(G)$, and $\\Delta(G)$ respectively denote the chromatic number, the clique number and the maximum degree of $G$. In this paper, we study this conjecture for some {\\em expansions} of graphs, that is graphs obtained with the well known operation {\\em composition} of graphs. We prove that Reed's Conjecture holds for expansions of bipartite graphs, for expansions of odd holes where the minimum chromatic number of the components is even, when some component of the expansion has chromatic number 1 or when a component induces a bipartite graph. Moreover, Reed's Conjecture holds if all components have the same chromatic number, if the components have chromatic number at most 4 and when the odd hole has length 5. Finally, when $G$ is an odd hole expansion, we prove $\\chi(G)\\leq\\lceil\\frac{\\omega(G)+\\Delta(G)+1}{2}\\rceil+1$.
Schemes for Deterministic Polynomial Factoring
Ivanyos, Gábor; Saxena, Nitin
2008-01-01
In this work we relate the deterministic complexity of factoring polynomials (over finite fields) to certain combinatorial objects we call m-schemes. We extend the known conditional deterministic subexponential time polynomial factoring algorithm for finite fields to get an underlying m-scheme. We demonstrate how the properties of m-schemes relate to improvements in the deterministic complexity of factoring polynomials over finite fields assuming the generalized Riemann Hypothesis (GRH). In particular, we give the first deterministic polynomial time algorithm (assuming GRH) to find a nontrivial factor of a polynomial of prime degree n where (n-1) is a smooth number.
Coordinated renewable energy support schemes
Morthorst, P.E.; Jensen, S.G.
2006-01-01
This paper illustrates the effect that can be observed when support schemes for renewable energy are regionalised. Two theoretical examples are used to explain interactive effects on, e.g., the price of power, conditions for conventional power producers, and changes in import and export of power...... RES-E support schemes already has a common liberalised power market. In this case the introduction of a common support scheme for renewable technologies will lead to more efficient sitings of renewable plants, improving economic and environmental performance of the total power system...
Provable Secure Identity Based Generalized Signcryption Scheme
Yu, Gang; Shen, Yong; Han, Wenbao
2010-01-01
According to actual needs, generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of the new scheme in this complete model. Comparing with existing identity based generalized signcryption, the new scheme has less implementation complexity. Moreover, the new scheme has comparable computation complexity with the existing normal signcryption schemes.
QingdongCAI
1999-01-01
A new technique in the formulation of numerical scheme for hyperbolic equation is developed.It is different from the classical FD and FE methods.We begin with the algebraic equations with some undefined parameters,and get the difference equation through Taylor-series expansion.When the parameters in the partial difference equation are defined,the equation is what the scheme will simulated.The numerical example of the viscous BUrgers equation shows the validity of the scheme.This method deals with the numerical viscosity and dispersion exactly ,giving a preliminary explanation to some problems that the CFD face now.
Exponential renormalisation. II. Bogoliubov's R-operation and momentum subtraction schemes
Ebrahimi-Fard, Kurusch [Instituto de Ciencias Matematicas, C/ Nicolas Cabrera, no. 13-15, 28049 Madrid (Spain); Patras, Frederic [Laboratoire J.-A. Dieudonne UMR 6621, CNRS, Parc Valrose, 06108 Nice Cedex 02 (France)
2012-08-15
This article aims at advancing the recently introduced exponential method for renormalisation in perturbative quantum field theory. It is shown that this new procedure provides a meaningful recursive scheme in the context of the algebraic and group theoretical approach to renormalisation. In particular, we describe in detail a Hopf algebraic formulation of Bogoliubov's classical R-operation and counterterm recursion in the context of momentum subtraction schemes. This approach allows us to propose an algebraic classification of different subtraction schemes. Our results shed light on the peculiar algebraic role played by the degrees of Taylor jet expansions, especially the notion of minimal subtraction and oversubtractions.
EXPANSION OF STEP-TRANSITION OPERATOR OF MULTI-STEP METHOD AND ITS APPLICATIONS (II)
Yi-fa Tang
2002-01-01
We give some formulae for calculation of the expansions for (1) composition of step-transition operators (STO) of any two difference schemes (DS) for ODE's, (2) inverse operator of STO of any DS, and (3) conjugate operator of STO of any DS.
Thermal Expansion of Hafnium Carbide
Grisaffe, Salvatore J.
1960-01-01
Since hafnium carbide (HfC) has a melting point of 7029 deg. F, it may have many high-temperature applications. A literature search uncovered very little information about the properties of HfC, and so a program was initiated at the Lewis Research Center to determine some of the physical properties of this material. This note presents the results of the thermal expansion investigation. The thermal-expansion measurements were made with a Gaertner dilatation interferometer calibrated to an accuracy of +/- 1 deg. F. This device indicates expansion by the movement of fringes produced by the cancellation and reinforcement of fixed wave-length light rays which are reflected from the surfaces of two parallel quartz glass disks. The test specimens which separate these disks are three small cones, each approximately 0.20 in. high.
Low thermal expansion glass ceramics
1995-01-01
This book is one of a series reporting on international research and development activities conducted by the Schott group of companies With the series, Schott aims to provide an overview of its activities for scientists, engineers, and managers from all branches of industry worldwide where glasses and glass ceramics are of interest Each volume begins with a chapter providing a general idea of the current problems, results, and trends relating to the subjects treated This volume describes the fundamental principles, the manufacturing process, and applications of low thermal expansion glass ceramics The composition, structure, and stability of polycrystalline materials having a low thermal expansion are described, and it is shown how low thermal expansion glass ceramics can be manufactured from appropriately chosen glass compositions Examples illustrate the formation of this type of glass ceramic by utilizing normal production processes together with controlled crystallization Thus glass ceramics with thermal c...
Low Thermal Expansion Glass Ceramics
Bach, Hans
2005-01-01
This book appears in the authoritative series reporting the international research and development activities conducted by the Schott group of companies. This series provides an overview of Schott's activities for scientists, engineers, and managers from all branches of industry worldwide in which glasses and glass ceramics are of interest. Each volume begins with a chapter providing a general idea of the current problems, results, and trends relating to the subjects treated. This new extended edition describes the fundamental principles, the manufacturing process, and applications of low thermal expansion glass ceramics. The composition, structure, and stability of polycrystalline materials having a low thermal expansion are described, and it is shown how low thermal expansion glass ceramics can be manufactured from appropriately chosen glass compositions. Examples illustrate the formation of this type of glass ceramic by utilizing normal production processes together with controlled crystallization. Thus g...
A Novel Pilot Expansion Approach for MIMO Channel Estimation
Ming Fei SIYAU
2015-05-01
Full Text Available A training-based MIMO channel estimation scheme is presented to operate in severe frequency and time selective fading channels. Besides the new pilot bits designed from the ‘Paley-Hadamard’ matrix to exploit its orthogonal and ‘Toeplitz-like’ structures and minimising its pilot length, a novel pilot expansion technique is proposed to estimate the length of the channel impulse response, by flexibly extending its pilot length as required in order to capture the number of multipath existed within the MIMO channel. The pilot expansion can also help to deduce the initial channel variation and its Doppler rate which can be subsequently applied for MIMO channel tracking using decision feedback Kalman filter during the data payload.
Determination of effective thermal expansion coefficients of unidirectional fibrous nanocomposites
Dai, Ming; Schiavone, Peter; Gao, Cun-Fa
2016-10-01
We present an efficient numerical scheme (based on complex variable techniques) to calculate the effective thermal expansion coefficients of a composite containing unidirectional periodic fibers. Moreover, the mechanical behavior of the fibers incorporates interface effects allowing the ensuing analytical model of the composite to accommodate deformations at the nanoscale. The resulting `nanocomposite' is subjected to a uniform temperature variation which leads to periodic deformations within the plane perpendicular to the fibers and uniform deformations along the direction of the fibers. These deformation fields are determined by analyzing a representative unit cell of the composite subsequently leading to the corresponding effective thermal expansion coefficients. Numerical results are illustrated via several physical examples. We find that the influence of interface effects on the effective thermal expansion coefficients (in particular that corresponding to the transverse direction in the plane perpendicular to the fibers) decays rapidly as the fibers become harder. In addition, by comparing the results obtained here with those from effective medium theories, we show that the latter may induce significant errors in the determination of the effective transverse thermal expansion coefficient when the fibers are much softer than the matrix and the fiber volume fraction is relatively high.
Foundation and generalization of the expansion by regions
Jantzen, Bernd
2011-12-01
The "expansion by regions" is a method of asymptotic expansion developed by Beneke and Smirnov in 1997. It expands the integrand according to the scaling prescriptions of a set of regions and integrates all expanded terms over the whole integration domain. This method has been applied successfully to many complicated loop integrals, but a general proof for its correctness has still been missing. This paper shows how the expansion by regions manages to reproduce the exact result correctly in an expanded form and clarifies the conditions on the choice and completeness of the considered regions. A generalized expression for the full result is presented that involves additional overlap contributions. These extra pieces normally yield scaleless integrals which are consistently set to zero, but they may be needed depending on the choice of the regularization scheme. While the main proofs and formulae are presented in a general and concise form, a large portion of the paper is filled with simple, pedagogical one-loop examples which illustrate the peculiarities of the expansion by regions, explain its application and show how to evaluate contributions within this method.
Energy efficient perlite expansion process
Jenkins, K.L.
1982-08-31
A thermally efficient process for the expansion of perlite ore is described. The inlet port and burner of a perlite expansion chamber (Preferably a vertical expander) are enclosed such that no ambient air can enter the chamber. Air and fuel are metered to the burner with the amount of air being controlled such that the fuel/air premix contains at least enough air to start and maintain minimum combustion, but not enough to provide stoichiometric combustion. At a point immediately above the burner, additional air is metered into an insulated enclosure surrounding the expansion chamber where it is preheated by the heat passing through the chamber walls. This preheated additional air is then circulated back to the burner where it provides the remainder of the air needed for combustion, normally full combustion. Flow of the burner fuel/air premix and the preheated additional air is controlled so as to maintain a long luminous flame throughout a substantial portion of the expansion chamber and also to form a moving laminar layer of air on the inner surface of the expansion chamber. Preferably the burner is a delayed mixing gas burner which materially aids in the generation of the long luminous flame. The long luminous flame and the laminar layer of air at the chamber wall eliminate hot spots in the expansion chamber, result in relatively low and uniform temperature gradients across the chamber, significantly reduce the amount of fuel consumed per unit of perlite expanded, increase the yield of expanded perlite and prevent the formation of a layer of perlite sinter on the walls of the chamber.
Underground hydro scheme for Ullapool
无
2002-01-01
Scoltish and Southern Energy has awarded a contract for a new hydropower plant Scotland, the company's first hydro project since the 1960s. The S6 million scheme will be built by Miller Civil Engineering Services Ltd.
Rotbart, Noy Galil
evaluation of fully dynamic labeling schemes. Due to a connection between adjacency labeling schemes and the graph theoretical study of induced universal graphs, we study these in depth and show novel results for bounded degree graphs and power-law graphs. We also survey and make progress on the related......With ever increasing size of graphs, many distributed graph systems emerged to store, preprocess and analyze them. While such systems ease up congestion on servers, they incur certain penalties compared to centralized data structure. First, the total storage required to store a graph...... in a distributed fashion increases. Second, attempting to answer queries on vertices of a graph stored in a distributed fashion can be significantly more complicated. In order to lay theoretical foundations to the first penalty mentioned a large body of work concentrated on labeling schemes. A labeling scheme...
Capacity-achieving CPM schemes
Perotti, Alberto; Benedetto, Sergio; Montorsi, Guido
2008-01-01
The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The so obtained schemes are cascaded with an outer serially-concatenated convolutional code to form a pragmatic coded-modulation system. The resulting schemes exhibit performance very close to the CPM capacity without requiring iterations between the outer decoder and the CPM demodulator. As a result, the receiver exhibits reduced complexity and increased flexibility due to the separation of the demodulation and decoding functions.
Good governance for pension schemes
Thornton, Paul
2011-01-01
Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.
A Novel Iris Segmentation Scheme
Chen-Chung Liu
2014-01-01
Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.
Bearing-Mounting Concept Accommodates Thermal Expansion
Nespodzany, Robert; Davis, Toren S.
1995-01-01
Pins or splines allow radial expansion without slippage. Design concept for mounting rotary bearing accommodates differential thermal expansion between bearing and any structure(s) to which bearing connected. Prevents buildup of thermal stresses by allowing thermal expansion to occur freely but accommodating expansion in such way not to introduce looseness. Pin-in-slot configuration also maintains concentricity.
Properties of Ettringite Type Expansive Agent
无
2001-01-01
By employing different forms and amounts of materials,many kinds of ettringite type expansive agents had been prepared.The relationship between the compositions and properties of expansive agents was analyzed.The design methods of expansive agent have been put forward according to the property requirement of expansive concrete.
18 CFR 154.309 - Incremental expansions.
2010-04-01
... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Incremental expansions... Changes § 154.309 Incremental expansions. (a) For every expansion for which incremental rates are charged... incremental facilities to be rolled-in to the pipeline's rates. For every expansion that has an at-risk...
Caloric Curves and Nuclear Expansion
Natowitz, J B; Ma, Y; Murray, M; Qin, L; Shlomo, S; Wada, R; Wang, J
2002-01-01
Nuclear caloric curves have been analyzed using an expanding Fermi gas hypothesis to extract average nuclear densities. In this approach the observed flattening of the caloric curves reflects progressively increasing expansion with increasing excitation energy. This expansion results in a corresponding decrease in the density and Fermi energy of the excited system. For nuclei of medium to heavy mass apparent densities $~0.3\\rho_0$ are reached at the higher excitation energies. The average densities derived in this manner are in good agreement with those derived using other, more complicated, techniques.
Multipole Expansion in Generalized Electrodynamics
Bonin, C A; Ortega, P H
2016-01-01
In this article we study some classical aspects of Podolsky Electrodynamics in the static regime. We develop the multipole expansion for the theory in both the electrostatic and the magnetostatic cases. We also address the problem of consistently truncating the infinite series associated with the several kinds of multipoles, yielding approximations for the static Podolskian electromagnetic field to any degree of precision required. Moreover, we apply the general theory of multipole expansion to some specific physical problems. In those problems we identify the first terms of the series with the monopole, dipole and quadrupole terms in the generalized theory. We also propose a situation in which Podolsky theory can be experimentally tested.
Thermal Expansion of Irradiated Polytetrafluoroethylene
Subrahmanyam, HN; Subramanyam, SV
1987-01-01
The thermal expansion coefficient of gamma-irradiated Polytetrafluoroethylene (PTFE) has been measured in the temperature range 80-340 K by using a three-terminal capacitance technique. The samples are irradiated in air at room temperature with gamma rays from a $Co^{60}$ source at a dose rate of 0.26 Mrad/h. The change in crystallinity is measured by an x-ray technique. The expansion coefficient is found to increase with radiation dose below 140 K owing to the predominant effect of degradati...
An arbitrated quantum signature scheme
Zeng, G; Zeng, Guihua; Keitel, Christoph H.
2002-01-01
The general principle for a quantum signature scheme is proposed and investigated based on ideas from classical signature schemes and quantum cryptography. The suggested algorithm is implemented by a symmetrical quantum key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and relies on the availability of an arbitrator. We can guarantee the unconditional security of the algorithm, mostly due to the correlation of the GHZ triplet states and the use of quantum one-time pads.
Breeding schemes in reindeer husbandry
Lars Rönnegård
2003-04-01
Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.
Efficient Reversible Watermarking Using Differential Expansible Integer Wavelet Transform
Sanjay Patel
2016-07-01
Full Text Available Digital watermarking has been utilized widely to claim the ownership and to protect images from alternation. Reversible watermarking is having great importance as it provided original image and the embedded logo without any loss. This paper proposed reversible watermarking algorithm using integer wavelet transform to satisfy the reversibility requirement. Further difference expansion based lifting scheme is used to make algorithm fast. To show the robustness of algorithm, various attacks like noise, rotating/scaling an image and filtering to the watermarked image is employed. The extraction of original image against such attacks is quantified in terms of peak signal to noise ratio (PSNR
Removable Type Expansion Bolt Innovative Design
Wang, Feng-Lan; Zhang, Bo; Gao, Bo; Liu, Yan-Xin; Gao, Bo
2016-05-01
Expansion bolt is a kind of the most common things in our daily life. Currently, there are many kinds of expansion bolts in the market. However, they have some shortcomings that mainly contain underuse and unremovement but our innovation of design makes up for these shortcomings very well. Principle of working follows this: expansion tube is fixed outside of bolt, steel balls and expansion covers are fixed inside. Meanwhile, the steel balls have 120° with each other. When using it ,expansion cover is moved in the direction of its internal part. So the front part of expansion bolt cover is increasingly becoming big and steel halls is moved outside. Only in this way can it be fixed that steel balls make expansion tube expand. When removing them, expansion bolt is moved outside. So the front part of expansion bolt cover is gradually becoming small and steel balls moves inside, after expansion tube shrinks, we can detach them.
The Thermal Expansion Of Feldspars
Hovis, G. L.; Medford, A.; Conlon, M.
2009-12-01
Hovis and others (1) investigated the thermal expansion of natural and synthetic AlSi3 feldspars and demonstrated that the coefficient of thermal expansion (α) decreases significantly, and linearly, with increasing room-temperature volume (VRT). In all such feldspars, therefore, chemical expansion limits thermal expansion. The scope of this work now has been broadened to include plagioclase and Ba-K feldspar crystalline solutions. X-ray powder diffraction data have been collected between room temperature and 925 °C on six plagioclase specimens ranging in composition from anorthite to oligoclase. When combined with thermal expansion data for albite (2,3,4) a steep linear trend of α as a function of VRT emerges, reflecting how small changes in composition dramatically affect expansion behavior. The thermal expansion data for five synthetic Ba-K feldspars ranging in composition from 20 to 100 mole percent celsian, combined with data for pure K-feldspar (3,4), show α-VRT relationships similar in nature to the plagioclase series, but with a slope and intercept different from the latter. Taken as a group all Al2Si2 feldspars, including anorthite and celsian from the present study along with Sr- (5) and Pb-feldspar (6) from other workers, show very limited thermal expansion that, unlike AlSi3 feldspars, has little dependence on the divalent-ion (or M-) site occupant. This apparently is due to the necessitated alternation of Al and Si in the tetrahedral sites of these minerals (7), which in turn locks the tetrahedral framework and makes the M-site occupant nearly irrelevant to expansion behavior. Indeed, in feldspar series with coupled chemical substitution it is the change away from a 1:1 Al:Si ratio that gives feldspars greater freedom to expand. Overall, the relationships among α, chemical composition, and room-temperature volume provide useful predictive tools for estimating feldspar thermal expansion and give insight into the controls of expansion behavior in
A robust WENO scheme for nonlinear waves in a moving reference frame
Kontos, Stavros; Bingham, Harry B.; Lindberg, Ole
2016-01-01
the linear WENO weights based on a Taylor series expansion is introduced. A simplified smoothness indicator is proposed and is shown to perform well. The scheme is combined with high-order explicit Runge-Kutta time integration and a dissipative Lax-Friedrichs-type flux to solve for nonlinear wave propagation...
Extended Analytic Device Optimization Employing Asymptotic Expansion
Mackey, Jonathan; Sehirlioglu, Alp; Dynsys, Fred
2013-01-01
Analytic optimization of a thermoelectric junction often introduces several simplifying assumptionsincluding constant material properties, fixed known hot and cold shoe temperatures, and thermallyinsulated leg sides. In fact all of these simplifications will have an effect on device performance,ranging from negligible to significant depending on conditions. Numerical methods, such as FiniteElement Analysis or iterative techniques, are often used to perform more detailed analysis andaccount for these simplifications. While numerical methods may stand as a suitable solution scheme,they are weak in gaining physical understanding and only serve to optimize through iterativesearching techniques. Analytic and asymptotic expansion techniques can be used to solve thegoverning system of thermoelectric differential equations with fewer or less severe assumptionsthan the classic case. Analytic methods can provide meaningful closed form solutions and generatebetter physical understanding of the conditions for when simplifying assumptions may be valid.In obtaining the analytic solutions a set of dimensionless parameters, which characterize allthermoelectric couples, is formulated and provide the limiting cases for validating assumptions.Presentation includes optimization of both classic rectangular couples as well as practically andtheoretically interesting cylindrical couples using optimization parameters physically meaningful toa cylindrical couple. Solutions incorporate the physical behavior for i) thermal resistance of hot andcold shoes, ii) variable material properties with temperature, and iii) lateral heat transfer through legsides.
High Capacity Reversible Watermarking for Audio by Histogram Shifting and Predicted Error Expansion
Fei Wang
2014-01-01
Full Text Available Being reversible, the watermarking information embedded in audio signals can be extracted while the original audio data can achieve lossless recovery. Currently, the few reversible audio watermarking algorithms are confronted with following problems: relatively low SNR (signal-to-noise of embedded audio; a large amount of auxiliary embedded location information; and the absence of accurate capacity control capability. In this paper, we present a novel reversible audio watermarking scheme based on improved prediction error expansion and histogram shifting. First, we use differential evolution algorithm to optimize prediction coefficients and then apply prediction error expansion to output stego data. Second, in order to reduce location map bits length, we introduced histogram shifting scheme. Meanwhile, the prediction error modification threshold according to a given embedding capacity can be computed by our proposed scheme. Experiments show that this algorithm improves the SNR of embedded audio signals and embedding capacity, drastically reduces location map bits length, and enhances capacity control capability.
Halving the dimension of a single image to be encrypted optically to avoid data expansion
Yi, Jiawang; Tan, Guanzheng
2016-06-01
When directly applying optical transforms, such as fractional Fourier transform (FrFT), to a single image or real image (input image), the resulting image will become complex-valued, which leads to the doubling of data volume. This data expansion problem can be found in many existing single-image optical encryption schemes. We propose a folding technique to offset the data expansion by constructing a complex input image of half size. And we devise an optical single-image encryption scheme based on double FrFTs, in which this technique together with compressed sensing can bring about the possible maximum compression of encrypted images. Moreover, the chaos-based random circular shift for scrambling is introduced to enhance security. The chaotic random signum matrix is also tried as the measurement matrix, and it displays a good performance. Simulation results demonstrate the validity and security of the proposed scheme.
High capacity reversible watermarking for audio by histogram shifting and predicted error expansion.
Wang, Fei; Xie, Zhaoxin; Chen, Zuo
2014-01-01
Being reversible, the watermarking information embedded in audio signals can be extracted while the original audio data can achieve lossless recovery. Currently, the few reversible audio watermarking algorithms are confronted with following problems: relatively low SNR (signal-to-noise) of embedded audio; a large amount of auxiliary embedded location information; and the absence of accurate capacity control capability. In this paper, we present a novel reversible audio watermarking scheme based on improved prediction error expansion and histogram shifting. First, we use differential evolution algorithm to optimize prediction coefficients and then apply prediction error expansion to output stego data. Second, in order to reduce location map bits length, we introduced histogram shifting scheme. Meanwhile, the prediction error modification threshold according to a given embedding capacity can be computed by our proposed scheme. Experiments show that this algorithm improves the SNR of embedded audio signals and embedding capacity, drastically reduces location map bits length, and enhances capacity control capability.
Histone deacetylase complexes promote trinucleotide repeat expansions.
Kim Debacker
2012-02-01
Full Text Available Expansions of DNA trinucleotide repeats cause at least 17 inherited neurodegenerative diseases, such as Huntington's disease. Expansions can occur at frequencies approaching 100% in affected families and in transgenic mice, suggesting that specific cellular proteins actively promote (favor expansions. The inference is that expansions arise due to the presence of these promoting proteins, not their absence, and that interfering with these proteins can suppress expansions. The goal of this study was to identify novel factors that promote expansions. We discovered that specific histone deacetylase complexes (HDACs promote CTG•CAG repeat expansions in budding yeast and human cells. Mutation or inhibition of yeast Rpd3L or Hda1 suppressed up to 90% of expansions. In cultured human astrocytes, expansions were suppressed by 75% upon inhibition or knockdown of HDAC3, whereas siRNA against the histone acetyltransferases CBP/p300 stimulated expansions. Genetic and molecular analysis both indicated that HDACs act at a distance from the triplet repeat to promote expansions. Expansion assays with nuclease mutants indicated that Sae2 is one of the relevant factors regulated by Rpd3L and Hda1. The causal relationship between HDACs and expansions indicates that HDACs can promote mutagenesis at some DNA sequences. This relationship further implies that HDAC3 inhibitors being tested for relief of expansion-associated gene silencing may also suppress somatic expansions that contribute to disease progression.
Regulation of gas infrastructure expansion
De Joode, J.
2012-01-01
The topic of this dissertation is the regulation of gas infrastructure expansion in the European Union (EU). While the gas market has been liberalised, the gas infrastructure has largely remained in the regulated domain. However, not necessarily all gas infrastructure facilities – such as gas storag
On persistently positively expansive maps
Alexander Arbieto
2010-06-01
Full Text Available In this paper, we prove that any C¹-persistently positively expansive map is expanding. This improves a result due to Sakai (Sakai 2004.Neste artigo, mostramos que todo mapa C¹-persistentemente positivamente expansivo e expansor. Isto melhora um resultado devido a Sakai (Sakai 2004.
Liflyand, E.
2012-01-01
We study an extension to Fourier transforms of the old problem on absolute convergence of the re-expansion in the sine (cosine) Fourier series of an absolutely convergent cosine (sine) Fourier series. The results are obtained by revealing certain relations between the Fourier transforms and their Hilbert transforms.
Large N Expansion. Vector Models
Nissimov, E; Nissimov, Emil; Pacheva, Svetlana
2006-01-01
Preliminary version of a contribution to the "Quantum Field Theory. Non-Perturbative QFT" topical area of "Modern Encyclopedia of Mathematical Physics" (SELECTA), eds. Aref'eva I, and Sternheimer D, Springer (2007). Consists of two parts - "main article" (Large N Expansion. Vector Models) and a "brief article" (BPHZL Renormalization).
Provable Secure Identity Based Generalized Signcryption Scheme
Yu, Gang; Ma, Xiaoxiao; Shen, Yong; Han, Wenbao
2010-01-01
According to actual needs, generalized signcryption scheme can flexibly work as an encryption scheme, a signature scheme or a signcryption scheme. In this paper, firstly, we give a security model for identity based generalized signcryption which is more complete than existing model. Secondly, we propose an identity based generalized signcryption scheme. Thirdly, we give the security proof of the new scheme in this complete model. Comparing with existing identity based generalized signcryption...
Effective Expansion: Balance between Shrinkage and Hygroscopic Expansion.
Suiter, E A; Watson, L E; Tantbirojn, D; Lou, J S B; Versluis, A
2016-05-01
The purpose of this study was to investigate the relationship between hygroscopic expansion and polymerization shrinkage for compensation of polymerization shrinkage stresses in a restored tooth. One resin-modified glass-ionomer (RMGI) (Ketac Nano, 3M ESPE), 2 compomers (Dyract, Dentsply; Compoglass, Ivoclar), and a universal resin-based composite (Esthet•X HD, Dentsply) were tested. Volumetric change after polymerization ("total shrinkage") and during 4 wk of water storage at 37°C was measured using an optical method (n= 10). Post-gel shrinkage was measured during polymerization using a strain gauge method (n= 10). Extracted human molars with large mesio-occluso-distal slot preparations were restored with the tested restorative materials. Tooth surfaces at baseline (preparation), after restoration, and during 4 wk of 37°C water storage were scanned with an optical scanner to determine cuspal flexure (n= 8). Occlusal interface integrity was measured using dye penetration. Data were analyzed using analysis of variance and post hoc tests (significance level 0.05). All tested materials shrunk after polymerization. RMGI had the highest total shrinkage (4.65%) but lowest post-gel shrinkage (0.35%). Shrinkage values dropped significantly during storage in water but had not completely compensated polymerization shrinkage after 4 wk. All restored teeth initially exhibited inward (negative) cuspal flexure due to polymerization shrinkage. Cuspal flexure with the RMGI restoration was significantly less (-6.4 µm) than with the other materials (-12.1 to -14.1 µm). After 1 d, cuspal flexure reversed to +5.0 µm cuspal expansion with the RMGI and increased to +9.3 µm at 4 wk. After 4 wk, hygroscopic expansion compensated cuspal flexure in a compomer (Compoglass) and reduced flexure with Dyract and resin-based composite. Marginal integrity (93.7% intact restoration wall) was best for the Compoglass restorations and lowest (73.1%) for the RMGI restorations. Hygroscopic
GPGPU for orbital function evaluation with a new updating scheme
Uejima, Yutaka
2012-01-01
We accelerated an {\\it ab-initio} QMC electronic structure calculation by using GPGPU. The bottleneck of the calculation for extended solid systems is replaced by CUDA-GPGPU subroutine kernels which build up spline basis set expansions of electronic orbital functions at each Monte Carlo step. We achieved 30.8 times faster evaluation for the bottleneck, confirmed on the simulation of TiO$_2$ solid with 1,536 electrons. To achieve better performance in GPGPU we propose a new updating scheme for Monte Carlo sampling, quasi-simultaneous updating, which is in between the configuration-by-configuration updating and the widely-used particle-by-particle one. The energy deviation caused both by the single precision treatment and the new updating scheme is found to be within the accuracy required in the calculation, $\\sim 10^{-3}$ hartree per primitive cell.
GPGPU for orbital function evaluation with a new updating scheme.
Uejima, Yutaka; Maezono, Ryo
2013-01-15
We have accelerated an ab initio quantum Monte Carlo electronic structure calculation using general purpose computing on graphical processing units (GPGPU). The part of the code causing the bottleneck for extended systems is replaced by Compute Unified Device Architecture-GPGPU subroutine kernels which build up spline basis set expansions of electronic orbital functions at each Monte Carlo step. We have achieved a speedup of a factor of 30 for the bottleneck for a simulation of solid TiO(2) with 1536 electrons. To improve the performance with GPGPU we propose a new updating scheme for Monte Carlo sampling, quasi-simultaneous updating, which is intermediate between configuration-by-configuration updating and the widely used particle-by-particle updating. The error in the energy due to by the single precision treatment and the new updating scheme is found to be within the required accuracy of ~10(-3) hartree per primitive cell.
State-of-the-Art Visual Cryptography Schemes
Mahmoud E. Hodeish
2014-03-01
Full Text Available Visual Cryptography (VC is recent technology used to the strengthen security of many applications in various fields. It allows visual information like printed text, handwritten notes, and images to be encrypted by dividing it into shares. The most important characteristic of VCS is that one can visually decrypted the secret image by stacking shares without computation. The current paper aims at introducing a descriptive review for VC, which covering the "state-of-the-art" concept, and classification of schemes. In this paper, we have classified the VC schemes and provide some interpretation on the base of some various measures such as pixel expansion, share generated, format of secret image and number of secret image, which actually deemed as valuable contribution in the field of VC studies
Region Incrementing Visual Cryptography Scheme with Same Contrast
LI Shundong; LI Jiliang; WANG Daoshun
2016-01-01
In binary Region increm enting visual cryptography schemes (RIVCSs), the secrets of multi-ple secrecy regions can be gradually revealed by hu-man visual system. A characteristic of the existing binary RIVCSs different from traditional binary Visual cryptog-raphy schemes (VCSs) is that, the contrasts for different revealed regions are different while traditional binary VCSs have same contrast. To keep the quality (contrast) of re-covered image compatible with the traditional VCS, we use integer linear programming to design a binary (k,n)-RIVCS with same contrast for all secrecy regions in this paper. Experimental results demonstrate that our method is feasible and effective. The trade-off is that our schem e involves a larger pixel expansion.
Hybrid mathematical and rule-based system for transmission network planning in open access schemes
Kandil, M. S. [Electrical Department, Mansura University, (Egypt); EI-Debeiky, S. M. [Electrical Department, Ain Shams University, (Egypt); Hasanien, N. E. [Egyptian Electricity Authority, Studies and Researches Department, (Egypt)
2001-09-01
The paper presents a planning methodology using an application of a mathematical and a rule-based expert system (ES) to expand the transmission network in open access schemes. In this methodology, the ES suggests a realistic set of generation additions with proper economic signals to the participants, before proceeding with the transmission expansion. A feasible list of transmission alternatives is then assumed to accommodate the proposals for generation. A mathematical method is performed based on marginal cost allocation to optimise the location for the new generation and its transmission expansion scheme simultaneously for each alternative. The optimum alternative, which minimises the overall system's cost function and satisfies the future demand under different operating conditions, is obtained. The ES interacts with the power system planning tools to produce the optimum expansion plan. A practical application is given to demonstrate the effectiveness of the developed prototype system. (Author)
Multiuser switched diversity scheduling schemes
Shaqfeh, Mohammad
2012-09-01
Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.
Optimal probabilistic dense coding schemes
Kögler, Roger A.; Neves, Leonardo
2017-04-01
Dense coding with non-maximally entangled states has been investigated in many different scenarios. We revisit this problem for protocols adopting the standard encoding scheme. In this case, the set of possible classical messages cannot be perfectly distinguished due to the non-orthogonality of the quantum states carrying them. So far, the decoding process has been approached in two ways: (i) The message is always inferred, but with an associated (minimum) error; (ii) the message is inferred without error, but only sometimes; in case of failure, nothing else is done. Here, we generalize on these approaches and propose novel optimal probabilistic decoding schemes. The first uses quantum-state separation to increase the distinguishability of the messages with an optimal success probability. This scheme is shown to include (i) and (ii) as special cases and continuously interpolate between them, which enables the decoder to trade-off between the level of confidence desired to identify the received messages and the success probability for doing so. The second scheme, called multistage decoding, applies only for qudits ( d-level quantum systems with d>2) and consists of further attempts in the state identification process in case of failure in the first one. We show that this scheme is advantageous over (ii) as it increases the mutual information between the sender and receiver.
Energy partitioning schemes: a dilemma.
Mayer, I
2007-01-01
Two closely related energy partitioning schemes, in which the total energy is presented as a sum of atomic and diatomic contributions by using the "atomic decomposition of identity", are compared on the example of N,N-dimethylformamide, a simple but chemically rich molecule. Both schemes account for different intramolecular interactions, for instance they identify the weak C-H...O intramolecular interactions, but give completely different numbers. (The energy decomposition scheme based on the virial theorem is also considered.) The comparison of the two schemes resulted in a dilemma which is especially striking when these schemes are applied for molecules distorted from their equilibrium structures: one either gets numbers which are "on the chemical scale" and have quite appealing values at the equilibrium molecular geometries, but exhibiting a counter-intuitive distance dependence (the two-center energy components increase in absolute value with the increase of the interatomic distances)--or numbers with too large absolute values but "correct" distance behaviour. The problem is connected with the quick decay of the diatomic kinetic energy components.
An adjoint-based scheme for eigenvalue error improvement
Merton, S.R.; Smedley-Stevenson, R.P., E-mail: Simon.Merton@awe.co.uk, E-mail: Richard.Smedley-Stevenson@awe.co.uk [AWE plc, Berkshire (United Kingdom); Pain, C.C.; El-Sheikh, A.H.; Buchan, A.G., E-mail: c.pain@imperial.ac.uk, E-mail: a.el-sheikh@imperial.ac.uk, E-mail: andrew.buchan@imperial.ac.uk [Department of Earth Science and Engineering, Imperial College, London (United Kingdom)
2011-07-01
A scheme for improving the accuracy and reducing the error in eigenvalue calculations is presented. Using a rst order Taylor series expansion of both the eigenvalue solution and the residual of the governing equation, an approximation to the error in the eigenvalue is derived. This is done using a convolution of the equation residual and adjoint solution, which is calculated in-line with the primal solution. A defect correction on the solution is then performed in which the approximation to the error is used to apply a correction to the eigenvalue. The method is shown to dramatically improve convergence of the eigenvalue. The equation for the eigenvalue is shown to simplify when certain normalizations are applied to the eigenvector. Two such normalizations are considered; the rst of these is a fission-source type of normalisation and the second is an eigenvector normalisation. Results are demonstrated on a number of demanding elliptic problems using continuous Galerkin weighted nite elements. Moreover, the correction scheme may also be applied to hyperbolic problems and arbitrary discretization. This is not limited to spatial corrections and may be used throughout the phase space of the discrete equation. The applied correction not only improves fidelity of the calculation, it allows assessment of the reliability of numerical schemes to be made and could be used to guide mesh adaption algorithms or to automate mesh generation schemes. (author)
Distance labeling schemes for trees
Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben
2016-01-01
We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta......(log(n)) bits for constant ε> 0. (1 + ε)-stretch labeling schemes with polylogarithmic label size have previously been established for doubling dimension graphs by Talwar [Talwar, STOC, 2004]. In addition, we present matching upper and lower bounds for distance labeling for caterpillars, showing that labels...
Electrical Injection Schemes for Nanolasers
Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten
2014-01-01
Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....
Small-scale classification schemes
Hertzum, Morten
2004-01-01
. While coordination mechanisms focus on how classification schemes enable cooperation among people pursuing a common goal, boundary objects embrace the implicit consequences of classification schemes in situations involving conflicting goals. Moreover, the requirements specification focused on functional...... requirements and provided little information about why these requirements were considered relevant. This stands in contrast to the discussions at the project meetings where the software engineers made frequent use of both abstract goal descriptions and concrete examples to make sense of the requirements....... This difference between the written requirements specification and the oral discussions at the meetings may help explain software engineers general preference for people, rather than documents, as their information sources....
Exponential Expansion in Evolutionary Economics
Frederiksen, Peter; Jagtfelt, Tue
2013-01-01
concepts are described in detail. Taken together it provides the rudimentary aspects of an economic system within an analytical perspective. It is argued that the main dynamic processes of the evolutionary perspective can be reduced to these four concepts. The model and concepts are evaluated in the light...... of Thomas Kuhn’s notion of scientific paradigms and criteria for a good theory (1977, 1996). The paper thus aims to augment and assimilate the fragmented and scattered body of concepts presently residing within the field of evolutionary economics, by presenting an intuitive framework, applicable within...... to this problem is proposed in the form of a model of exponential expansion. The model outlines the overall structure and function of the economy as exponential expansion. The pictographic model describes four axiomatic concepts and their exponential nature. The interactive, directional, emerging and expanding...
Multiscale expansions in discrete world
Ömer Ünsal; Filiz Taşcan; Mehmet Naci Özer
2014-07-01
In this paper, we show the attainability of KdV equation from some types of nonlinear Schrödinger equation by using multiscale expansions discretely. The power of this manageable method is confirmed by applying it to two selected nonlinear Schrödinger evolution equations. This approach can also be applied to other nonlinear discrete evolution equations. All the computations have been made with Maple computer packet program.
College Expansion and Curriculum Choice
Kaganovich, Michael; Su, Xuejuan
2012-01-01
This paper analyzes the impact of college enrollment expansion on student academic achievements and labor market outcomes in the context of competition among colleges. When public policies promote “access” to college education, colleges adjust their curricula: Less selective public colleges adopt a less demanding curriculum in order to accommodate the influx of less able students. As we argue in the paper, this adjustment benefits low-ability college students at the expense of those of medium...
RELIABILITY OF LENTICULAR EXPANSION COMPENSATORS
Gabriel BURLACU,
2011-11-01
Full Text Available Axial lenticular compensators are made to take over the longitudinal heat expansion, shock , vibration and noise, made elastic connections for piping systems. In order to have a long life for installations it is necessary that all elements, including lenticular compensators, have a good reliability. This desire can be did by technology of manufactoring and assembly of compensators, the material for lenses and by maintenance.of compensator
Topological expansion and boundary conditions
Eynard, Bertrand
2008-01-01
In this article, we compute the topological expansion of all possible mixed-traces in a hermitian two matrix model. In other words we give a recipe to compute the number of discrete surfaces of given genus, carrying an Ising model, and with all possible given boundary conditions. The method is recursive, and amounts to recursively cutting surfaces along interfaces. The result is best represented in a diagrammatic way, and is thus rather simple to use.
Loss of solution in the symmetry improved Phi-derivable expansion scheme
Markó, Gergely; Szép, Zsolt
2016-01-01
We consider the two-loop Phi-derivable approximation for the O(2)-symmetric scalar model, augmented by the symmetry improvement introduced in [A. Pilaftsis and D. Teresi, Nucl. Phys. B874, 594 (2013)], which enforces Goldstone's theorem in the broken phase. Although the corresponding equations admit a solution in the presence of a large enough infrared (IR) regulating scale, we argue that, for smooth ultraviolet (UV) regulators, the solution is lost when the IR scale becomes small enough. Infrared regular solutions exist for certain non-analytic UV regulators, but we argue that these solutions are artifacts which should disappear when the sensitivity to the UV regulator is removed by a renormalization procedure. The loss of solution is observed both at zero and at finite temperature, although it is simpler to identify in the latter case. We also comment on possible ways to cure this problem.
B. Kafash
2014-04-01
Full Text Available In this paper, we present a computational method for solving optimal control problems and the controlled Duffing oscillator. This method is based on state parametrization. In fact, the state variable is approximated by Boubaker polynomials with unknown coefficients. The equation of motion, performance index and boundary conditions are converted into some algebraic equations. Thus, an optimal control problem converts to a optimization problem, which can then be solved easily. By this method, the numerical value of the performance index is obtained. Also, the control and state variables can be approximated as functions of time. Convergence of the algorithms is proved. Numerical results are given for several test examples to demonstrate the applicability and efficiency of the method.
Lohmeyer, Manfred
2004-01-01
The propagation of guided and nonconfined optical waves at fixed frequency through dielectric structures with piecewise constant, rectangular permittivity is considered in two spatial dimensions. Bidirectional versions of eigenmodes, computed for sequences of multilayer slab waveguides, constitute t
Lohmeyer, Manfred; Honsa, R.; Richter, L.
2003-01-01
Superpositions of two perpendicularly oriented bidirectional eigenmode propagation (BEP) fields, composed of basis modes that satisfy Dirichlet boundary conditions, can establish rigorous semianalytical solutions for problems of 2-D fixed-frequency wave propagation on unbounded, cross-shaped domains
Multiple scattering expansion with distortion
Tandy, P. C.; Thaler, R. M.
1980-12-01
A multiple scattering description of elastic scattering is formulated in terms of impulsive scatterings from single target nucleons and pairs of target nucleons. In this description, distortion effects on the projectile from the residual medium are also described by multiple scattering in terms of the same single and pair amplitudes. At the level of single scattering, this procedure yields the first order optical potential result of Kerman, McManus, and Thaler. When scattering from both single nucleons and pairs of nucleons is included, the method leads to a one-body integral equation which requires the physical projectile-nucleon and projectile-pair transition amplitudes as input. This input is similar, but not exactly equivalent to that required by the spectator expansion for the optical potential truncated at second order. A principal advantage of the present formulation is that there need be no explicit dependence upon the projection operator Q which projects off the target ground state. This feature introduces a scaling which appears to be a direct extension of the first order Kerman, McManus, and Thaler type of scaling. We follow up suggestions arising in the foregoing to show that the exact optical potential to second order in the spectator expansion can also be cast into a form having no explicit dependence upon Q, and requiring physical projectile-nucleon and projectile-pair transition amplitudes as input. NUCLEAR REACTIONS Multiple scattering from single nucleons, pairs of nucleons in nucleus. Distortion from residual medium. Optical potential. spectator expansion.
Urban underground network expansion planning
Bozic, Z. [Sinclair Knight Merz Pty Ltd., Perth (Australia); Hobson, E. [HI Consulting Services Pty Ltd., Adelaide (Australia)
1997-03-01
The authors describe a three step approach to expansion planning of high voltage (HV) urban underground distribution networks. Although the techniques are specifically oriented to underground systems, they are equally applicable to overhead system design. The fundamental engineering problem is how to connect individual high voltage to low voltage substations (HV/LV SS) and zone HV SS into a future urban underground network. The problem is to rearrange the HV network to minimise the cost of expansion subject to provision of an alternative supply, specified load transfer among the neighbouring zone SS, and other general planning constraints such as feeder capacity, voltage regulation, operational requirements and losses. A review of the current state of the art of distribution expansion planning is provided. The normal manual approach is discussed together with more recent research into computer methods. Three lines of computer research are identified and classified as radially constrained, security constrained and utilisation of travelling salesman/vehicle routing problem algorithms (TSP/VRP). The TSP/VRP line of research has been extended here to produce practical techniques for the assistance of network planners. (Author)
2013-06-17
... Federal Register (77 FR 43047, 07/23/12) and the application has been processed pursuant to the FTZ Act... Foreign-Trade Zones Board Reorganization/Expansion of Foreign-Trade Zone 104; (Expansion of Service Area and Expansion of Zone); Under Alternative Site Framework, Savannah, Georgia Pursuant to its...
Efficient adaptive fuzzy control scheme
Papp, Z.; Driessen, B.J.F.
1995-01-01
The paper presents an adaptive nonlinear (state-) feedback control structure, where the nonlinearities are implemented as smooth fuzzy mappings defined as rule sets. The fine tuning and adaption of the controller is realized by an indirect adaptive scheme, which modifies the parameters of the fuzzy
Homogenization scheme for acoustic metamaterials
Yang, Min
2014-02-26
We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.
Distance labeling schemes for trees
Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben;
2016-01-01
We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoill...
Distance labeling schemes for trees
Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben
2016-01-01
variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...
Quantum group blind signature scheme without entanglement
Xu, Rui; Huang, Liusheng; Yang, Wei; He, Libao
2011-07-01
In this paper we propose a quantum group blind signature scheme designed for distributed e-voting system. Our scheme combines the properties of group signature and blind signature to provide anonymity of voters in an e-voting system. The unconditional security of our scheme is ensured by quantum mechanics. Without employing entanglement, the proposed scheme is easier to be realized comparing with other quantum signature schemes.
Fair Electronic Payment Scheme Based on DSA
WANG Shao-bin; HONG Fan; ZHU Xian
2005-01-01
We present a multi-signature scheme based on DSA and describes a fair electronic payment scheme based on improved DSA signatures. The scheme makes both sides in equal positions during the course of electronic transaction. A Trusted Third Party (TTP) is involved in the scheme to guarantee the fairness of the scheme for both sides. However, only during the course of registration and dispute resolution will TTP be needed. TTP is not needed during the normal payment stage.
Thermal expansion of ceramics around room temperature
橋本, 忍; 安達, 信泰; 太田, 敏孝; 宮崎, 英敏; ハシモト, シノブ; アダチ, ノブヤス; オオタ, トシタカ; Hashimoto, Shinobu; Adachi, Nobuyasu; Ota, Toshitaka
2010-01-01
Thermal expansion of some ceramics, polymers and metals was measured by dilatometer around room temperature (from -140℃to +200℃), and compared with thermal expansion in the high temperature region. The CTE (coefficient of thermal expansion)of almost ceramics changed drastically between room temperature and high temperature region. On the other hand, the CTE ofmetals did not change between room temperature and high temperature region. The difference on thermal expansion betweenceramics and met...
Using the Chebychev expansion in quantum transport calculations
Popescu, Bogdan; Rahman, Hasan; Kleinekathöfer, Ulrich, E-mail: u.kleinekathoefer@jacobs-university.de [Department of Physics and Earth Sciences, Jacobs University Bremen, Campus Ring 1, 28759 Bremen (Germany)
2015-04-21
Irradiation by laser pulses and a fluctuating surrounding liquid environment can, for example, lead to time-dependent effects in the transport through molecular junctions. From the theoretical point of view, time-dependent theories of quantum transport are still challenging. In one of these existing transport theories, the energy-dependent coupling between molecule and leads is decomposed into Lorentzian functions. This trick has successfully been combined with quantum master approaches, hierarchical formalisms, and non-equilibrium Green’s functions. The drawback of this approach is, however, its serious limitation to certain forms of the molecule-lead coupling and to higher temperatures. Tian and Chen [J. Chem. Phys. 137, 204114 (2012)] recently employed a Chebychev expansion to circumvent some of these latter problems. Here, we report on a similar approach also based on the Chebychev expansion but leading to a different set of coupled differential equations using the fact that a derivative of a zeroth-order Bessel function can again be given in terms of Bessel functions. Test calculations show the excellent numerical accuracy and stability of the presented formalism. The time span for which this Chebychev expansion scheme is valid without any restrictions on the form of the spectral density or temperature can be determined a priori.
Using the Chebychev expansion in quantum transport calculations.
Popescu, Bogdan; Rahman, Hasan; Kleinekathöfer, Ulrich
2015-04-21
Irradiation by laser pulses and a fluctuating surrounding liquid environment can, for example, lead to time-dependent effects in the transport through molecular junctions. From the theoretical point of view, time-dependent theories of quantum transport are still challenging. In one of these existing transport theories, the energy-dependent coupling between molecule and leads is decomposed into Lorentzian functions. This trick has successfully been combined with quantum master approaches, hierarchical formalisms, and non-equilibrium Green's functions. The drawback of this approach is, however, its serious limitation to certain forms of the molecule-lead coupling and to higher temperatures. Tian and Chen [J. Chem. Phys. 137, 204114 (2012)] recently employed a Chebychev expansion to circumvent some of these latter problems. Here, we report on a similar approach also based on the Chebychev expansion but leading to a different set of coupled differential equations using the fact that a derivative of a zeroth-order Bessel function can again be given in terms of Bessel functions. Test calculations show the excellent numerical accuracy and stability of the presented formalism. The time span for which this Chebychev expansion scheme is valid without any restrictions on the form of the spectral density or temperature can be determined a priori.
Stochastic Neural Field Theory and the System-Size Expansion
Bressloff, Paul C.
2010-01-01
We analyze a master equation formulation of stochastic neurodynamics for a network of synaptically coupled homogeneous neuronal populations each consisting of N identical neurons. The state of the network is specified by the fraction of active or spiking neurons in each population, and transition rates are chosen so that in the thermodynamic or deterministic limit (N → ∞) we recover standard activity-based or voltage-based rate models. We derive the lowest order corrections to these rate equations for large but finite N using two different approximation schemes, one based on the Van Kampen system-size expansion and the other based on path integral methods. Both methods yield the same series expansion of the moment equations, which at O(1/N) can be truncated to form a closed system of equations for the first-and second-order moments. Taking a continuum limit of the moment equations while keeping the system size N fixed generates a system of integrodifferential equations for the mean and covariance of the corresponding stochastic neural field model. We also show how the path integral approach can be used to study large deviation or rare event statistics underlying escape from the basin of attraction of a stable fixed point of the mean-field dynamics; such an analysis is not possible using the system-size expansion since the latter cannot accurately determine exponentially small transitions. © by SIAM.
Bobev, Svilen; Williams, Darrick J.; Thompson, J.D.; Sarrao, J L
2004-01-01
Thermal expansion and magnetic susceptibility measurements as a function of temperature are reported for YbGaGe. Despite the fact that this material has been claimed to show zero thermal expansion over a wide temperature range, we observe thermal expansion typical of metals and Pauli paramagnetic behavior, which perhaps indicates strong sample dependence in this system.
Multiplier theorems for special Hermite expansions on
张震球; 郑维行
2000-01-01
The weak type (1,1) estimate for special Hermite expansions on Cn is proved by using the Calderon-Zygmund decomposition. Then the multiplier theorem in Lp(1 < p < ω ) is obtained. The special Hermite expansions in twisted Hardy space are also considered. As an application, the multipli-ers for a certain kind of Laguerre expansions are given in Lp space.
An All-Orders Derivative Expansion
Dunne, Gerald(Department of Physics, University of Connecticut, Storrs, CT, 06269, U.S.A.)
1996-01-01
We evaluate the exact $QED_{2+1}$ effective action for fermions in the presence of a family of static but spatially inhomogeneous magnetic field profiles. This exact result yields an all-orders derivative expansion of the effective action, and indicates that the derivative expansion is an asymptotic, rather than a convergent, expansion.
Quantum fields and "Big Rip" expansion singularities
Calderon, H; Calderon, Hector; Hiscock, William A.
2005-01-01
The effects of quantized conformally invariant massless fields on the evolution of cosmological models containing a ``Big Rip'' future expansion singularity are examined. Quantized scalar, spinor, and vector fields are found to strengthen the accelerating expansion of such models as they approach the expansion singularity.
Hormonal and electrolyte responses to acute isohemic volume expansion in unanesthetized rats
Chenault, V. M.; Morris, M.; Lynch, C. D.; Maultsby, S. J.; Hutchins, P. M.
1993-01-01
This study was undertaken to explore the time course of the metabolic response to isohemic blood volume expansion (30%) in normotensive, unanesthetized Sprague-Dawley rats. Whole blood, drawn from a femoral artery catheter of conscious donor rats, was infused into the jugular vein of recipient rats. Blood samples were drawn from a carotid artery of recipient rats at time points beginning immediately post-volume expansion (IPVE) up through 5 days post-volume expansion (PVE). To characterize the attendant compensatory mechanisms, the plasma concentrations of electrolytes and fluid regulatory hormones were determined. Hematocrit began to raise IPVE and was significantly elevated above control IPVE 20, 30, 40, 60, and 90 min, and 2, 4, 6, 8, 12, and 24 hr PVE. Consistent with our current understanding of the hormonal response to excess volume, atrial natriuretic factor was significantly increased above the prevolume expansion (control) values 0-30 min PVE. Surprisingly, plasma aldosterone levels were significantly increased above control at 20 and 30 min and 6 hr PVE, whereas plasma renin activity was significantly decreased 30-40 min PVE. Plasma sodium was not changed from control values except for a significant increase at 6 hr post-volume expansion. Plasma potassium, osmolality, and arginine vasopressin levels were not altered by the volume expansion. These studies delineate the physiologic time scheme operative in the regulation of fluid volume during acute ischemic volume expansion.
Expansion of protein domain repeats.
Asa K Björklund
2006-08-01
Full Text Available Many proteins, especially in eukaryotes, contain tandem repeats of several domains from the same family. These repeats have a variety of binding properties and are involved in protein-protein interactions as well as binding to other ligands such as DNA and RNA. The rapid expansion of protein domain repeats is assumed to have evolved through internal tandem duplications. However, the exact mechanisms behind these tandem duplications are not well-understood. Here, we have studied the evolution, function, protein structure, gene structure, and phylogenetic distribution of domain repeats. For this purpose we have assigned Pfam-A domain families to 24 proteomes with more sensitive domain assignments in the repeat regions. These assignments confirmed previous findings that eukaryotes, and in particular vertebrates, contain a much higher fraction of proteins with repeats compared with prokaryotes. The internal sequence similarity in each protein revealed that the domain repeats are often expanded through duplications of several domains at a time, while the duplication of one domain is less common. Many of the repeats appear to have been duplicated in the middle of the repeat region. This is in strong contrast to the evolution of other proteins that mainly works through additions of single domains at either terminus. Further, we found that some domain families show distinct duplication patterns, e.g., nebulin domains have mainly been expanded with a unit of seven domains at a time, while duplications of other domain families involve varying numbers of domains. Finally, no common mechanism for the expansion of all repeats could be detected. We found that the duplication patterns show no dependence on the size of the domains. Further, repeat expansion in some families can possibly be explained by shuffling of exons. However, exon shuffling could not have created all repeats.
Gravitational entropy of cosmic expansion
Sussman, Roberto A
2014-01-01
We apply a recent proposal to define "gravitational entropy" to the expansion of cosmic voids within the framework of non-perturbative General Relativity. By considering CDM void configurations compatible with basic observational constraints, we show that this entropy grows from post-inflationary conditions towards a final asymptotic value in a late time fully non-linear regime described by the Lemaitre-Tolman-Bondi (LTB) dust models. A qualitatively analogous behavior occurs if we assume a positive cosmological constant consistent with a $\\Lambda$-CDM background model. However, the $\\Lambda$ term introduces a significant suppression of entropy growth with the terminal equilibrium value reached at a much faster rate.
Contribution of thermal expansion and
O.I.Pursky
2007-01-01
Full Text Available A theoretical model is developed to describe the experimental results obtained for the isobaric thermal conductivity of rare gas solids (RGS. The isobaric thermal conductivity of RGS has been analysed within Debye approximation with regard to the effect of thermal expansion. The suggested model takes into consideration the fact that thermal conductivity is determined by U-processes while above the phonon mobility edge it is determined by "diffusive" modes migrating randomly from site to site. The mobility edge ω0 is determined from the condition that the phonon mean-free path restricted by the U-processes cannot be smaller than half of the phonon wavelength.
Cosmic Growth and Expansion Conjoined
Linder, Eric V
2016-01-01
Cosmological measurements of both the expansion history and growth history have matured, and the two together provide an important test of general relativity. We consider their joint evolutionary track, showing that this has advantages in distinguishing cosmologies relative to considering them individually or at isolated redshifts. In particular, the joint comparison relaxes the shape degeneracy that makes $f\\sigma_8(z)$ curves difficult to separate from the overall growth amplitude. The conjoined method further helps visualization of which combinations of redshift ranges provide the clearest discrimination. We examine standard dark energy cosmologies, modified gravity, and "stuttering" growth, each showing distinct signatures.
WEIGHTED COMPACT SCHEME FOR SHOCK CAPTURING
无
2001-01-01
A new class of finite difference schemes--the weighted compact schemes are proposed. According to the idea of the WENO schemes, the weighted compact scheme is constructed by a combination of the approximations of derivatives on candidate stencils with properly assigned weights so that the non-oscillatory property is achieved when discontinuities appear. The primitive function reconstruction method of ENO schemes is applied to obtain the conservative form of the weighted compact scheme. This new scheme not only preserves the characteristic of standard compact schemes and achieves high order accuracy and high resolution using a compact stencil,but also can accurately capture shock waves and discontinuities without oscillation, Numerical examples show that the new scheme is very promising and successful.``
Digital expansions with negative real bases
Steiner, Wolfgang
2011-01-01
Similarly to Parry's characterization of $\\beta$-expansions of real numbers in real bases $\\beta > 1$, Ito and Sadahiro characterized digital expansions in negative bases, by the expansions of the endpoints of the fundamental interval. Parry also described the possible expansions of 1 in base $\\beta > 1$. In the same vein, we characterize the sequences that occur as $(-\\beta)$-expansion of $\\frac{-\\beta}{\\beta+1}$ for some $\\beta > 1$. These sequences also describe the itineraries of 1 by linear mod one transformations with negative slope.
Dual Watermarking Scheme with Encryption
Dhanalakshmi, R
2010-01-01
Digital Watermarking is used for copyright protection and authentication. In the proposed system, a Dual Watermarking Scheme based on DWT SVD with chaos encryption algorithm, will be developed to improve the robustness and protection along with security. DWT and SVD have been used as a mathematical tool to embed watermark in the image. Two watermarks are embedded in the host image. The secondary is embedded into primary watermark and the resultant watermarked image is encrypted using chaos based logistic map. This provides an efficient and secure way for image encryption and transmission. The watermarked image is decrypted and a reliable watermark extraction scheme is developed for the extraction of the primary as well as secondary watermark from the distorted image.
Ion Polarization Scheme for MEIC
Kondratenko, A M; Filatov, Yu N; Derbenev, Ya S; Lin, F; Morozov, V S; Zhang, Y
2016-01-01
The choice of a figure 8 shape for the booster and collider rings of MEIC opens wide possibilities for preservation of the ion polarization during beam acceleration as well as for control of the polarization at the collider's interaction points. As in the case of accelerators with Siberian snakes, the spin tune is energy independent but is equal to zero instead of one half. The figure-8 topology eliminates the effect of arcs on the spin motion. There appears a unique opportunity to control the polarization of any particle species including deuterons, using longitudinal fields of small integrated strength (weak solenoids). Contrary to existing schemes, using weak solenoids in figure-8 colliders, one can control the polarization at the interaction points without essentially any effect on the beam's orbital characteristics. A universal scheme for control of the polarization using weak solenoids provides an elegant solution to the problem of ion acceleration completely eliminating resonant beam depolarization. It...
Wrong way recollement for schemes
Jorgensen, Peter
2005-01-01
A recollement of triangulated categories makes it possible to view one such category as being glued together from two others. The prototypical example is that D(X), a suitable derived category of sheaves on the topological space X, has a recollement in terms of D(Z) and D(U) when Z is a closed subset of X and U is the open complement. This note gives a different, "wrong way" recollement in the scheme case.
Parabolic sheaves on logarithmic schemes
Borne, Niels; Vistoli, Angelo
2010-01-01
We show how the natural context for the definition of parabolic sheaves on a scheme is that of logarithmic geometry. The key point is a reformulation of the concept of logarithmic structure in the language of symmetric monoidal categories, which might be of independent interest. Our main result states that parabolic sheaves can be interpreted as quasi-coherent sheaves on certain stacks of roots.
Gyrification from constrained cortical expansion
Tallinen, Tuomas; Biggins, John S; Mahadevan, L
2015-01-01
The exterior of the mammalian brain - the cerebral cortex - has a conserved layered structure whose thickness varies little across species. However, selection pressures over evolutionary time scales have led to cortices that have a large surface area to volume ratio in some organisms, with the result that the brain is strongly convoluted into sulci and gyri. Here we show that the gyrification can arise as a nonlinear consequence of a simple mechanical instability driven by tangential expansion of the gray matter constrained by the white matter. A physical mimic of the process using a layered swelling gel captures the essence of the mechanism, and numerical simulations of the brain treated as a soft solid lead to the formation of cusped sulci and smooth gyri similar to those in the brain. The resulting gyrification patterns are a function of relative cortical expansion and relative thickness (compared with brain size), and are consistent with observations of a wide range of brains, ranging from smooth to highl...
Primordial vorticity and gradient expansion
Giovannini, Massimo; Rezaei, Zahra
2012-02-01
The evolution equations of the vorticities of the electrons, ions and photons in a pre-decoupling plasma are derived, in a fully inhomogeneous geometry, by combining the general relativistic gradient expansion and the drift approximation within the Adler-Misner-Deser decomposition. The vorticity transfer between the different species is discussed in this novel framework and a set of general conservation laws, connecting the vorticities of the three-component plasma with the magnetic field intensity, is derived. After demonstrating that a source of large-scale vorticity resides in the spatial gradients of the geometry and of the electromagnetic sources, the total vorticity is estimated to lowest order in the spatial gradients and by enforcing the validity of the momentum constraint. By acknowledging the current bounds on the tensor to scalar ratio in the (minimal) tensor extension of the ΛCDM paradigm, the maximal comoving magnetic field induced by the total vorticity turns out to be, at most, of the order of 10-37 G over the typical comoving scales ranging between 1 and 10 Mpc. While the obtained results seem to be irrelevant for seeding a reasonable galactic dynamo action, they demonstrate how the proposed fully inhomogeneous treatment can be used for the systematic scrutiny of pre-decoupling plasmas beyond the conventional perturbative expansions.
Imagination as expansion of experience.
Zittoun, Tania; Cerchia, Frédéric
2013-09-01
This paper proposes a developmental view on imagination: from this perspective, imagination can be seen as triggered by some disrupting event, which generates a disjunction from the person's unfolding experience of the "real" world, and as unfolding as a loop, which eventually comes back to the actual experience. Examining recent and classical theorization of imagination in psychology, the paper opposes a deficitary view of imagination to an expansive notion of imagination. The paper explores Piaget, Vygotsky, Harris and Pelaprat & Cole consider: 1) What does provoke a "rupture" or disjunction? 2) What are the psychological processes involved in the imaginary loop? 3) What nourishes such processes? 4) What are the consequences of such imaginary loop, or what does it enable doing? The paper proposes to adopt an expansive view of imagination, as Vygotsky proposed-a perspective that has been under-explored empirically since his seminal work. To stimulate such sociocultural psychology of imagination, two empirical examples are provided, one showing how children make sense of metaphor in an experimental setting, the other showing a young person using a novel met at school as symbolic resource.
Evolutionary expansion of the Monogenea.
Kearn, G C
1994-12-01
The evolutionary expansion of the monogeneans has taken place in parallel with the diversification of the fish-like vertebrates. In this article the main trends in monogenean evolution are traced from a hypothetical skin-parasitic ancestor on early vertebrates. Special consideration is given to the following topics: early divergence between skin feeders and blood feeders; diversification and specialization of the haptor for attachment to skin; transfer from host to host, viviparity and the success of the gyrodactylids; predation on skin parasites and camouflage; colonization of the buccal and branchial cavities; diversification and specialization of the haptor for attachment to the gills; phoresy in gill parasites; the development of endoparasitism and the origin of the cestodes; the success of dactylogyroidean gill parasites; the uniqueness of the polyopisthocotyleans; ovoviviparity and the colonization of the tetrapods. Host specificity has been the guiding force of coevolution between monogeneans and their vertebrate hosts, but the establishment of monogeneans on unrelated hosts sharing the same environment (host-switching) may have been underestimated. Host-switching has provided significant opportunities for evolutionary change of direction and is probably responsible for the establishment of monogeneans on cephalopod molluscs, on the hippopotamus and possibly on chelonians. There are indications that host-switching may be more common in monogeneans that spread by direct transfer of adults/juveniles from host to host. A limitation on the further expansion of monogeneans is the need for water for the dispersal of the infective larva (oncomiracidium).
Mohammad Al-Fayoumi
2010-05-01
Full Text Available E-payment is now one of the most central research areas in e-commerce, mainly regarding online and offline payment scenarios. Customers are generally passive in e-commerce transaction. Relied on a blind signature, this paper introduces an e-payment protocol, in which customers have more initiative, and can terminate the transaction before possible cheats, its security is enhanced. Moreover, the cost of workers and communications falls down considerably while the cost of trusted authority and protecting information is increased. As there is no trusted authority in the proposed scheme, network overcrowding and conspiracy problems can be avoided. Furthermore, the protocol satisfies fairness and non-repudiation. This helps merchant and bank to speed up the financial transaction process and to give user instant services at any time. Also, in this paper, we will discuss an important e-payment protocol namely pay-word scheme and examine its advantages and limitations, which encourages the authors to improve the scheme that keeps all characteristics intact without compromise of the security robustness. The suggested protocol employs the idea of blind signature with the thought of hash chain. We will compare the proposed protocol with pay-word protocol and demonstrate that the proposed protocol offers more security and efficiency, which makes the protocol workable for real world services.
Cambridge community Optometry Glaucoma Scheme.
Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R
2015-04-01
With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.
A biometric signcryption scheme without bilinear pairing
Wang, Mingwen; Ren, Zhiyuan; Cai, Jun; Zheng, Wentao
2013-03-01
How to apply the entropy in biometrics into the encryption and remote authentication schemes to simplify the management of keys is a hot research area. Utilizing Dodis's fuzzy extractor method and Liu's original signcryption scheme, a biometric identity based signcryption scheme is proposed in this paper. The proposed scheme is more efficient than most of the previous proposed biometric signcryption schemes for that it does not need bilinear pairing computation and modular exponentiation computation which is time consuming largely. The analysis results show that under the CDH and DL hard problem assumption, the proposed scheme has the features of confidentiality and unforgeability simultaneously.
Nonmonotonic Recursive Polynomial Expansions for Linear Scaling Calculation of the Density Matrix.
Rubensson, Emanuel H
2011-05-10
As it stands, density matrix purification is a powerful tool for linear scaling electronic structure calculations. The convergence is rapid and depends only weakly on the band gap. However, as will be shown in this letter, there is room for improvements. The key is to allow for nonmonotonicity in the recursive polynomial expansion. On the basis of this idea, new purification schemes are proposed that require only half the number of matrix-matrix multiplications compared to previous schemes. The speedup is essentially independent of the location of the chemical potential and increases with decreasing band gap.
(N, N Secret Color Image Sharing Scheme with Dynamic Group
Mohamed Fathimal. P
2015-06-01
Full Text Available In recent years, secure information sharing has become a top requirement for many applications such as banking and military. Secret Sharing is an effective method to improve security of data. Secret Sharing helps to avoid storing data at a single point through dividing and distributing "shares" of secrets and recovering it later with no loss of original quality. This paper proposes a new Secret Sharing scheme for secure transmission of color images. The key features of this scheme are better visual quality of the recovered image with no pixel expansion, eliminating half toning of color images, eliminating the need for code book to decrypt images since reconstruction is done through XOR ing of all images and non-requirement of regeneration of shares for addition or deletion of users leading to less computational complexity. Besides these advantages, this scheme also helps to renew shares periodically and is highly beneficial in applications where data has to be stored securely in a database.
Complex absorbing potential based Lorentzian fitting scheme and time dependent quantum transport
Xie, Hang, E-mail: xiehanggm@gmail.com; Kwok, Yanho; Chen, GuanHua, E-mail: ghc@everest.hku.hk [Department of Chemistry, The University of Hong Kong, Pokfulam (Hong Kong); Jiang, Feng [Department of Physics, Shanghai University of Electric Power, Shanghai (China); Zheng, Xiao [Hefei National Laboratory for Physical Sciences at the Microscale, University of Science and Technology of China, Hefei (China)
2014-10-28
Based on the complex absorbing potential (CAP) method, a Lorentzian expansion scheme is developed to express the self-energy. The CAP-based Lorentzian expansion of self-energy is employed to solve efficiently the Liouville-von Neumann equation of one-electron density matrix. The resulting method is applicable for both tight-binding and first-principles models and is used to simulate the transient currents through graphene nanoribbons and a benzene molecule sandwiched between two carbon-atom chains.
Complex absorbing potential based Lorentzian fitting scheme and time dependent quantum transport.
Xie, Hang; Kwok, Yanho; Jiang, Feng; Zheng, Xiao; Chen, GuanHua
2014-10-28
Based on the complex absorbing potential (CAP) method, a Lorentzian expansion scheme is developed to express the self-energy. The CAP-based Lorentzian expansion of self-energy is employed to solve efficiently the Liouville-von Neumann equation of one-electron density matrix. The resulting method is applicable for both tight-binding and first-principles models and is used to simulate the transient currents through graphene nanoribbons and a benzene molecule sandwiched between two carbon-atom chains.
Algebraic K-theory of generalized schemes
Anevski, Stella Victoria Desiree
Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry...
Wireless Broadband Access and Accounting Schemes
无
2003-01-01
In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.
Elliptic Curve Blind Digital Signature Schemes
YOULin; YANGYixian; WENQiaoyan
2003-01-01
Blind signature schemes are important cryptographic protocols in guaranteeing the privacy or anonymity of the users.Three new blind signature schemes and their corresponding generalizations are pro-posed. Moreover, their securities are simply analyzed.
Algebraic K-theory of generalized schemes
Anevski, Stella Victoria Desiree
Nikolai Durov has developed a generalization of conventional scheme theory in which commutative algebraic monads replace commutative unital rings as the basic algebraic objects. The resulting geometry is expressive enough to encompass conventional scheme theory, tropical algebraic geometry...
Secret sharing scheme with inherited characteristic
Ye Zhenjun; Meng Fanzhen
2006-01-01
To assure the shareholders can look for their "legal" attorneys to renew the secret, once the secret sharing scheme is initialized, a secret sharing scheme with inherited characteristic is constructed. In this scheme, each shareholder can produce a new share by his algorithm, which is equivalent to the primary one. Together with other shares, the primary secret can be renewed. Since this scheme is constructed not by replacing the primary share with a new share produced by the dealer in his primitive secret sharing scheme, so no matter how much shares the shareholder produces, these shares can not be gathered together to renew the secret in this scheme. Compared with the existing secret sharing schemes, this scheme provides more agility for the shareholders by investing each of them a function but not affect its security.
A Milstein-type scheme without Levy area terms for SDEs driven by fractional Brownian motion
Deya, Aurélien; Tindel, Samy
2010-01-01
In this article, we study the numerical approximation of stochastic differential equations driven by a multidimensional fractional Brownian motion (fBm) with Hurst parameter greater than 1/3. We introduce an implementable scheme for these equations, which is based on a second order Taylor expansion, where the usual Levy area terms are replaced by products of increments of the driving fBm. The convergence of our scheme is shown by means of a combination of rough paths techniques and error bounds for the discretisation of the Levy area terms.
The DSUBm approximation scheme for the coupled cluster method and applications to quantum magnets
R.F. Bishop
2009-01-01
Full Text Available A new approximate scheme, DSUBm, is described for the coupled cluster method. We apply it to two well-studied (spin-1/2 Heisenberg antiferromagnet spin-lattice models, namely: the XXZ and the XY models on the square lattice in two dimensions. Results are obtained in each case for the ground-state energy, the sublattice magnetization and the quantum critical point. They are in good agreement with those from such alternative methods as spin-wave theory, series expansions, exact diagonalization techniques, quantum Monte Carlo methods and those from the CCM using the LSUBm scheme.
High-order Lagrangian cell-centered conservative scheme on unstructured meshes
葛全文
2014-01-01
A high-order Lagrangian cell-centered conservative gas dynamics scheme is presented on unstructured meshes. A high-order piecewise pressure of the cell is intro-duced. With the high-order piecewise pressure of the cell, the high-order spatial discretiza-tion fluxes are constructed. The time discretization of the spatial fluxes is performed by means of the Taylor expansions of the spatial discretization fluxes. The vertex velocities are evaluated in a consistent manner due to an original solver located at the nodes by means of momentum conservation. Many numerical tests are presented to demonstrate the robustness and the accuracy of the scheme.
Distributed Multipolar Expansion Approach to Calculation of Excitation Energy Transfer Couplings.
Błasiak, Bartosz; Maj, Michał; Cho, Minhaeng; Góra, Robert W
2015-07-14
We propose a new approach for estimating the electrostatic part of the excitation energy transfer (EET) coupling between electronically excited chromophores based on the transition density-derived cumulative atomic multipole moments (TrCAMM). In this approach, the transition potential of a chromophore is expressed in terms of truncated distributed multipolar expansion and analytical formulas for the TrCAMMs are derived. The accuracy and computational feasibility of the proposed approach is tested against the exact Coulombic couplings, and various multipole expansion truncation schemes are analyzed. The results of preliminary calculations show that the TrCAMM approach is capable of reproducing the exact Coulombic EET couplings accurately and efficiently and is superior to other widely used schemes: the transition charges from electrostatic potential (TrESP) and the transition density cube (TDC) method.
On the Equisummability of Hermite and Fourier Expansions
E K Narayanan; S Thangavelu
2001-02-01
We prove an equisummability result for the Fourier expansions and Hermite expansions as well as special Hermite expansions. We also prove the uniform boundedness of the Bochner-Riesz means associated to the Hermite expansions for polyradial functions.
NUMERICAL COMPUTATIONS OF CO-EXISTING SUPER-CRITICAL AND SUB-CRITICAL FLOWS BASED UPON CRD SCHEMES
Horie, Katsuya; Okamura, Seiji; Kobayashi, Yusuke; Hyodo, Makoto; Hida, Yoshihisa; Nishimoto, Naoshi; Mori, Akio
Stream flows in steep gradient bed form complicating flow configurations, where co-exist super-critical and sub-critical flows. Computing numerically such flows are the key to successful river management. This study applied CRD schemes to 1D and 2D stream flow computations and proposed genuine ways to eliminate expansion shock waves. Through various cases of computing stream flows conducted, CRD schemes showed that i) conservativeness of discharge and accuracy of four significant figures are ensured, ii) artificial viscosity is not explicitly used for computational stabilization, and thus iii) 1D and 2D computations based upon CRD schemes are applicable to evaluating complicating stream flows for river management.
Shrub expansion in SW Greenland
Jørgensen, Rasmus Halfdan
to increasing shrub cover. Despite this, there is only limited experimental evidence that growth of the species responds to warming. Plant populations in fragmented and isolated locations could face problems adapting to a warming climate due to limited genetic variation and restricted migration from southern...... of firewood collection. A delayed reaction to the ending of the little ice age cannot be excluded, but seems rather unlikely considering other studies from Greenland. Effects of global warming in SW Greenland must be studied over even longer time periods than the 120 years of the current study. To answer......Arctic regions have experienced higher temperatures in recent decades, and the warming trend is projected to continue in the coming years. Arctic ecosystems are considered to be particularly vulnerable to climate change. Expansion of shrubs has been observed widely in tundra areas across the Arctic...
Bilinear Expansion For Redistribution Functions
Harutyunian, Haik; Alecian, Georges; Khachatryan, Knarik; Vardanyan, Ani
2016-11-01
We suggest here a method for construction of a bilinear expansion for an angle-averaged redistribution function. This function describes the elementary act of a photon scattering by a model two-level atom with the upper level broadened due to radiation damping. An eigenvalue and eigenvector determination problem is formulated and the relevant matrices are found analytically. Numerical procedures for their computations are elaborated as well. A simple method for the numerical calculations accuracy evaluation is suggested. It is shown that a family of redistribution functions describing the light scattering process within the spectral line frequencies can be constructed if the eigenvalue problem for the considered function is solved. It becomes possible if the eigenvalues and eigenvectors with the appropriate basic functions are used. The Voigt function and its derivatives used as basic functions are studied in detail as well.
Accelerating Expansion of the Universe
Chakraborty, Writambhara
2011-01-01
This thesis concentrates on the accelerated expansion of the Universe recently explored by measurements of redshift and luminosity-distance relations of type Ia Supernovae. We have considered a model of the universe filled with modified Chaplygin gas and barotropic fluid. The role of dynamical cosmological constant has been explored with Modified Chaplygin Gas as the background fluid. Various phenomenological models for \\Lambda have been studied in presence of the gravitational constant G to be constant or time dependent. A new form of the well known Chaplygin gas model has been presented by introducing inhomogeneity in the EOS. This model explains w=-1 crossing. An interaction of this model with the scalar field has also been investigated through a phenomenological coupling function. Tachyonic field has been depicted as dark energy model to represent the present acceleration of the Universe. A mixture of the tachyonic fluid has been considered with Generalized Chaplygin Gas to show the role of the later as a...
Asymptotic expansions in nonlinear rotordynamics
Day, William B.
1987-01-01
This paper is an examination of special nonlinearities of the Jeffcott equations in rotordynamics. The immediate application of this analysis is directed toward understanding the excessive vibrations recorded in the LOX pump of the SSME during hot-firing ground testing. Deadband, side force, and rubbing are three possible sources of inducing nonlinearity in the Jeffcott equations. The present analysis initially reduces these problems to the same mathematical description. A special frequency, named the nonlinear natural frequency, is defined and used to develop the solutions of the nonlinear Jeffcott equations as singular asymptotic expansions. This nonlinear natural frequency, which is the ratio of the cross-stiffness and the damping, plays a major role in determining response frequencies.
Linear multi-secret sharing schemes
XIAO Liangliang; LIU Mulan
2005-01-01
In this paper the linear multi-secret sharing schemes are studied by using monotone span programs. A relation between computing monotone Boolean functions by using monotone span programs and realizing multi-access structures by using linear multisecret sharing schemes is shown. Furthermore, the concept of optimal linear multi-secret sharing scheme is presented and the several schemes are proved to be optimal.
Improvement of publicly verifiable authenticated encryption scheme
LEI Fei-yu; CHEN Wen; MA Chang-she; CHEN Ke-fei
2007-01-01
A weakness of unforgeability is found in Ma and Chen scheme, and the root cause is the susceptive linear design in the scheme. In order to avoid the weakness and susceptive linear design, an improvement by means of two mechanisms including quadratic residue and composite discrete logarithm is proposed, which can defeat the forgery attacks in Ma and Chen scheme. The new scheme remains good confidentiality, public verifiability and efficiency.
A massive momentum-subtraction scheme
Boyle, Peter; Khamseh, Ava
2016-01-01
A new renormalization scheme is defined for fermion bilinears in QCD at non vanishing quark masses. This new scheme, denoted RI/mSMOM, preserves the benefits of the nonexceptional momenta introduced in the RI/SMOM scheme, and allows a definition of renormalized composite fields away from the chiral limit. Some properties of the scheme are investigated by performing explicit one-loop computation in dimensional regularization.
MIRD radionuclide data and decay schemes
Eckerman, Keith F
2007-01-01
For all physicians, scientists, and physicists working in the nuclear medicine field, the MIRD: Radionuclide Data and Decay Schemes updated edition is an essential sourcebook for radiation dosimetry and understanding the properties of radionuclides. Includes CD Table of Contents Decay schemes listed by atomic number Radioactive decay processes Serial decay schemes Decay schemes and decay tables This essential reference for nuclear medicine physicians, scientists and physicists also includes a CD with tabulations of the radionuclide data necessary for dosimetry calculations.
Shahnam Javadi
2013-07-01
Full Text Available In this paper, the $(G'/G$-expansion method is applied to solve a biological reaction-convection-diffusion model arising in mathematical biology. Exact traveling wave solutions are obtained by this method. This scheme can be applied to a wide class of nonlinear partial differential equations.
Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme
Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook
1995-01-01
Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.
Population Monotonic Path Schemes for Simple Games
Ciftci, B.B.; Borm, P.E.M.; Hamers, H.J.M.
2006-01-01
A path scheme for a simple game is composed of a path, i.e., a sequence of coalitions that is formed during the coalition formation process and a scheme, i.e., a payoff vector for each coalition in the path.A path scheme is called population monotonic if a player's payoff does not decrease as the pa
A new semi-Lagrangian difference scheme
季仲贞; 陈嘉滨
2001-01-01
A new completely energy-conserving semi-Lagrangian scheme is constructed. The numerical solution of shallow water equation shows that this conservative scheme preserves the total energy in twelve significant digits, while the traditional scheme does only in five significant digits.
Arbitrated quantum signature scheme with message recovery
Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin
2004-02-16
Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission.
Quantum Signature Scheme with Weak Arbitrator
Luo, Ming-Xing; Chen, Xiu-Bo; Yun, Deng; Yang, Yi-Xian
2012-07-01
In this paper, we propose one quantum signature scheme with a weak arbitrator to sign classical messages. This scheme can preserve the merits in the original arbitrated scheme with some entanglement resources, and provide a higher efficiency in transmission and reduction the complexity of implementation. The arbitrator is costless and only involved in the disagreement case.
Current terminology and diagnostic classification schemes.
Okeson, J P
1997-01-01
This article reviews the current terminology and classification schemes available for temporomandibular disorders. The origin of each term is presented, and the classification schemes that have been offered for temporomandibular disorders are briefly reviewed. Several important classifications are presented in more detail, with mention of advantages and disadvantages. Final recommendations are provided for future direction in the area of classification schemes.
A Model of Hierarchical Key Assignment Scheme
ZHANG Zhigang; ZHAO Jing; XU Maozhi
2006-01-01
A model of the hierarchical key assignment scheme is approached in this paper, which can be used with any cryptography algorithm. Besides, the optimal dynamic control property of a hierarchical key assignment scheme will be defined in this paper. Also, our scheme model will meet this property.
Support Schemes and Ownership Structures
Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana
In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... for promoting combined heat and power and energy from renewable sources. These Directives are to be implemented at the national level by the Member States. Section 3 conceptually presents the spectrum of national support schemes, ranging from investment support to market‐based operational support. The choice...
Banks, Tom; Torres, T. J.
2012-10-01
We summarize recent work in which we attempt to make consistent models of LHC physics, from the Pyramid Scheme. The models share much with the NMSSM, in particular, enhanced tree level contributions to the Higgs mass and a preference for small tan β. There are three different singlet fields, and a new strongly coupled gauge theory, so the constraints of perturbative unification are quite different. We outline our general approach to the model, which contains a Kähler potential for three of the low energy fields, which is hard to calculate. Detailed calculations, based on approximations to the Kähler potential, will be presented in a future publication.
Pressurized electrolysis stack with thermal expansion capability
Bourgeois, Richard Scott
2015-07-14
The present techniques provide systems and methods for mounting an electrolyzer stack in an outer shell so as to allow for differential thermal expansion of the electrolyzer stack and shell. Generally, an electrolyzer stack may be formed from a material with a high coefficient of thermal expansion, while the shell may be formed from a material having a lower coefficient of thermal expansion. The differences between the coefficients of thermal expansion may lead to damage to the electrolyzer stack as the shell may restrain the thermal expansion of the electrolyzer stack. To allow for the differences in thermal expansion, the electrolyzer stack may be mounted within the shell leaving a space between the electrolyzer stack and shell. The space between the electrolyzer stack and the shell may be filled with a non-conductive fluid to further equalize pressure inside and outside of the electrolyzer stack.
Novel thermal expansion of lead titanate
XING Xianran; DENG Jinxia; CHEN Jun; LIU Guirong
2003-01-01
Lattice parameters of lead titanate were precisely re-determined in the ternperature range of-150-950℃ by high precision XRPD measurements. It was clarified that there was no any evidence for a new phase transition at low temperatures. Tetragonal distortion strain decreases with temperature increasing. A novel thermal expansion was observed, positive thermal expansion from-150℃ to room temperature (RT) and above 490℃, and the negative thermal expansion in the temperature range of RT-490℃. A big jump of thermal expansion coefficient is attributed to the tetragonal-cubic phase transition. A rationalization for the negative thermal expansion of PbTiO3 is due to the decrease of anion-anion repulsion as polyhedra become more regular at heating. The mechanisms of positive and negative thermal expansions were elucidated as the same nature in the homogenous tetragonal phase at present case.
Anomalous thermal expansion in $\\alpha$-titanium
Souvatzis, P.; O. Eriksson; M. I. Katsnelson
2007-01-01
We provide a complete quantitative explanation for the anisotropic thermal expansion of hcp Ti at low temperature. The observed negative thermal expansion along the c-axis is reproduced theoretically by means of a parameter free theory which involves both the electron and phonon contributions to the free energy. The thermal expansion of titanium is calculated and found to be negative along the c-axis for temperatures below $\\sim$ 170 K, in good agreement with observations. We have identified ...
Hydration and Thermal Expansion in Anatase Nanoparticles.
Zhu, He; Li, Qiang; Ren, Yang; Fan, Longlong; Chen, Jun; Deng, Jinxia; Xing, Xianran
2016-08-01
A tunable thermal expansion is reported in nanosized anatase by taking advantage of surface hydration. The coefficient of thermal expansion of 4 nm TiO2 along a-axis is negative with a hydrated surface and is positive without a hydrated surface. High-energy synchrotron X-ray pair distribution function analysis combined with ab initio calculations on the specific hydrated surface are carried out to reveal the local structure distortion that is responsible for the unusual negative thermal expansion.
Hydration and Thermal Expansion in Anatase Nanoparticles
Zhu, He [Department of Physical Chemistry, University of Science and Technology Beijing, Beijing 100083 China; Li, Qiang [Department of Physical Chemistry, University of Science and Technology Beijing, Beijing 100083 China; Ren, Yang [Argonne National Laboratory, X-Ray Science Division, Argonne IL 60439 USA; Fan, Longlong [Department of Physical Chemistry, University of Science and Technology Beijing, Beijing 100083 China; Chen, Jun [Department of Physical Chemistry, University of Science and Technology Beijing, Beijing 100083 China; Deng, Jinxia [Department of Physical Chemistry, University of Science and Technology Beijing, Beijing 100083 China; Xing, Xianran [Department of Physical Chemistry, University of Science and Technology Beijing, Beijing 100083 China
2016-06-06
A tunable thermal expansion is reported in nanosized anatase by taking advantage of surface hydration. The coefficient of thermal expansion of 4 nm TiO2 along a-axis is negative with a hydrated surface and is positive without a hydrated surface. High-energy synchrotron X-ray pair distribution function analysis combined with ab initio calculations on the specific hydrated surface are carried out to reveal the local structure distortion that is responsible for the unusual negative thermal expansion.
GAUSSIAN WHITE NOISE CALCULUS OF GENERALIZED EXPANSION
陈泽乾
2002-01-01
A new framework of Gaussian white noise calculus is established, in line with generalized expansion in [3, 4, 7]. A suitable frame of Fock expansion is presented on Gaussian generalized expansion functionals being introduced here, which provides the integral kernel operator decomposition of the second quantization of Koopman operators for chaotic dynamical systems, in terms of annihilation operators (e)t and its dual, creation operators (e)*t.
Access Authentication Scheme Based on Authorized Certificate in Wireless Mesh Networks
Liangyu Luan
2014-01-01
Full Text Available The main benefits of the access authentication in IEEE 802.11s are both easy administration of the subscribers and compatibility with IEEE 802.11i. However, there still exist some shortcomings, such as worse authentication delay, suffering from intermediate attack, lower expansibility and the inequality among users. In order to overcome these shortcomings, a zone-based hierarchical topology structure, virtual certification authority (CA, off-line CA, authorized certificates and authorized keys are used in the access authentication scheme proposed in this paper. Qualitative analysis and simulation show that the access authentication scheme would improve authentication of the 802.11s in authentication latency, security, expansibility and the inequality in users.
Structure and thermal expansion of liquid bismuth
Mudry S.
2015-12-01
Full Text Available Experimental structural data for liquid Bi were used for estimation of the main structure parameters as well as the thermal expansion coefficient both in supercooled and superheated temperature ranges. It was shown that the equilibrium melt had a positive thermal expansion coefficient within a temperature range upon melting and a negative one at higher temperatures. The former was related to structure changes upon melting, whereas the latter with topologic disordering upon further heating. It was found that the superheated melt had a negative thermal expansion coefficient. The results obtained from structural data were compared with the thermal expansion coefficient calculated from the data of density for liquid Bi.
TAYLOR EXPANSION METHOD FOR NONLINEAR EVOLUTION EQUATIONS
HE Yin-nian
2005-01-01
A new numerical method of integrating the nonlinear evolution equations, namely the Taylor expansion method, was presented. The standard Galerkin method can be viewed as the 0-th order Taylor expansion method; while the nonlinear Galerkin method can be viewed as the 1-st order modified Taylor expansion method. Moreover, the existence of the numerical solution and its convergence rate were proven. Finally, a concrete example,namely, the two-dimensional Navier-Stokes equations with a non slip boundary condition,was provided. The result is that the higher order Taylor expansion method is of the higher convergence rate under some assumptions about the regularity of the solution.
Reine, Simen; Tellgren, Erik; Helgaker, Trygve
2007-09-14
Utilizing the fact that solid-harmonic combinations of Cartesian and Hermite Gaussian atomic orbitals are identical, a new scheme for the evaluation of molecular integrals over solid-harmonic atomic orbitals is presented, where the integration is carried out over Hermite rather than Cartesian atomic orbitals. Since Hermite Gaussians are defined as derivatives of spherical Gaussians, the corresponding molecular integrals become the derivatives of integrals over spherical Gaussians, whose transformation to the solid-harmonic basis is performed in the same manner as for integrals over Cartesian Gaussians, using the same expansion coefficients. The presented solid-harmonic Hermite scheme simplifies the evaluation of derivative molecular integrals, since differentiation by nuclear coordinates merely increments the Hermite quantum numbers, thereby providing a unified scheme for undifferentiated and differentiated four-center molecular integrals. For two- and three-center two-electron integrals, the solid-harmonic Hermite scheme is particularly efficient, significantly reducing the cost relative to the Cartesian scheme.
A. Boulahia
2014-01-01
Full Text Available Work performed in this study concerns mainly the analysis and the wisely use of TVD type schemes (total variation diminishing for numerical simulation of reactive flows, these schemes are first presented in scalar equation. Their extension to Euler equations for a reactive gas mixture is conducted through the approximate extended solver of Riemann problem. A comparative study of specific variants of TVD schemes has been made in the case of one-dimensional unsteady flow for an inert and reactive gas mixture, which represents the classical instance of a shock tube. The purpose of this investigation is to highlight the general behaviour (order of accuracy and performance of TVD schemes with various flux limiters for the simulation of reactive flows and in particular, to make possible the capture of the shock wave together with waves expansion for choosing the appropriate scheme to apply eventually in simulation of hypersonic viscous flow in chemical non equilibrium.
LIN Jian-guo; XIE Zhi-hua; ZHOU Jun-tao
2007-01-01
Based on the successive iteration in the Taylor series expansion method, a three-point explicit compact difference scheme with arbitrary order of accuracy is derived in this paper. Numerical characteristics of the scheme are studied by the Fourier analysis.Unlike the conventional compact difference schemes which need to solve the equation to obtain the unknown derivatives in each node, the proposed scheme is explicit and can achieve arbitrary order of accuracy in space. Application examples for the convectiondiffusion problem with a sharp front gradient and the typical lid-driven cavity flow are given. It is found that the proposed compact scheme is not only simple to implement and economical to use, but also is effective to simulate the convection-dominated problem and obtain high-order accurate solution in coarse grid systems.
Modeling dynamical scalarization with a resummed post-Newtonian expansion
Sennett, Noah
2016-01-01
Despite stringent constraints set by astrophysical observations, there remain viable scalar-tensor theories that could be distinguished from general relativity with gravitational-wave detectors. A promising signal predicted in these alternative theories is dynamical scalarization, which can dramatically affect the evolution of neutron-star binaries near merger. Motivated by the successful treatment of spontaneous scalarization, we develop a formalism that partially resums the post-Newtonian expansion to capture dynamical scalarization in a mathematically consistent manner. We calculate the post-Newtonian order corrections to the equations of motion and scalar mass of a binary system. Through comparison with quasi-equilibrium configuration calculations, we verify that this new approximation scheme can accurately predict the onset and magnitude of dynamical scalarization.
A nonlinear analytic function expansion nodal method for transient calculations
Joo, Han Gyn; Park, Sang Yoon; Cho, Byung Oh; Zee, Sung Quun [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)
1998-12-31
The nonlinear analytic function expansion nodal (AFEN) method is applied to the solution of the time-dependent neutron diffusion equation. Since the AFEN method requires both the particular solution and the homogeneous solution to the transient fixed source problem, the derivation of the solution method is focused on finding the particular solution efficiently. To avoid complicated particular solutions, the source distribution is approximated by quadratic polynomials and the transient source is constructed such that the error due to the quadratic approximation is minimized, In addition, this paper presents a new two-node solution scheme that is derived by imposing the constraint of current continuity at the interface corner points. The method is verified through a series of application to the NEACRP PWR rod ejection benchmark problems. 6 refs., 2 figs., 1 tab. (Author)
Local-prediction-based difference expansion reversible watermarking.
Dragoi, Ioan-Catalin; Coltuc, Dinu
2014-04-01
This paper investigates the use of local prediction in difference expansion reversible watermarking. For each pixel, a least square predictor is computed on a square block centered on the pixel and the corresponding prediction error is expanded. The same predictor is recovered at detection without any additional information. The proposed local prediction is general and it applies regardless of the predictor order or the prediction context. For the particular cases of least square predictors with the same context as the median edge detector, gradient-adjusted predictor or the simple rhombus neighborhood, the local prediction-based reversible watermarking clearly outperforms the state-of-the-art schemes based on the classical counterparts. Experimental results are provided.
REMINDER: Saved Leave Scheme (SLS)
2003-01-01
Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...
Pseudorandomness of Camellia-Like Scheme
Wen-Ling Wu
2006-01-01
Luby and Rackoff idealized DES by replacing each round function with one large random function. In this paper, the author idealizes Camellia by replacing each S-box with one small random function, which is named Camellialike scheme. It is then proved that five-round Camellia-like scheme is pseudorandom and eight-round Camellia-like scheme is super-pseudorandom for adaptive adversaries. Further the paper considers more efficient construction of Camellia-like scheme, and discusses how to construct pseudorandom Camellia-like scheme from less random functions.
Modification of QUICK scheme by skew points
Mirzaei, M.; Mohammadi, R.; Malekzadeh, M. [K.N. Toosi Univ. of Technology, Aerospace Engineering Dept., Tehran (Iran, Islamic Republic of)]. E-mail: Mirzaei@kntu.ac.ir
2005-07-01
This paper presents a new method for convective flux approximation based on inclusions of skew points. The scheme uses the truncated terms of QUICK scheme and with the aid of an equation extracted from momentum equations, the skew points will appear in the convective flux formula. The results show that the presented scheme has better accuracy than the other schemes. Diffusion fluxes are approximated using power law scheme and for evaluation of the performance of the presented method several test cases were carried out and the results are compared with the results of other numerical works and experimental data. (author)
A Provably Secure Asynchronous Proactive RSA Scheme
ZHANG Rui-shan; LI Qiang; CHEN Ke-fei
2005-01-01
The drawback of the first asynchronous proactive RSA scheme presented by Zhou in 2001, is that the se curity definition and security proof do not follow the approach of provable security. This paper presented a provably secure asynchronous proactive RSA scheme, which includes three protocols: initial key distribution protocol,signature generation protocol and share refreshing protocol. Taken these protocols together, a complete provably secure proactive RSA scheme was obtained. And the efficiency of the scheme is approximate to that of the scheme of Zhou.
Hash function based secret sharing scheme designs
Chum, Chi Sing
2011-01-01
Secret sharing schemes create an effective method to safeguard a secret by dividing it among several participants. By using hash functions and the herding hashes technique, we first set up a (t+1, n) threshold scheme which is perfect and ideal, and then extend it to schemes for any general access structure. The schemes can be further set up as proactive or verifiable if necessary. The setup and recovery of the secret is efficient due to the fast calculation of the hash function. The proposed scheme is flexible because of the use of existing hash functions.
A New Signature Scheme with Shared Verification
JIA Xiao-yun; LUO Shou-shan; YUAN Chao-wei
2006-01-01
With expanding user demands, digital signature techniques are also being expanded greatly, from single signature and single verification techniques to techniques supporting multi-users. This paper presents a new digital signature scheme vith shared verification based on the fiat-shamir signature scheme. This scheme is suitable not only for digital signatures of one public key, but also for situations where multiple public keys are required. In addition, the scheme can resist all kinds of collusion, making it more practicable and safer. Additionally it is more efficient than other schemes.
Colluding attacks on a group signature scheme
无
2005-01-01
Xie and Yu (2005) proposed a group signature scheme and claimed that it is the most efficient group signature scheme so far and secure. In this paper, we show that two dishonest group members can collude to launch two attacks on the scheme. In the first attack they can derive the group secret key and then generate untraceable group signatures. In the second attack, they can impersonate other group members once they see their signatures. Therefore we conclude that the signature scheme is not secure.We show that some parameters should be carefully selected in the scheme to resist our attacks.
Nonrepudiable Proxy Multi-Signature Scheme
LI JiGuo(李继国); CAO ZhenFu(曹珍富); ZHANG YiChen(张亦辰)
2003-01-01
The concept of proxy signature introduced by Mambo, Usuda, and Okamotoallows a designated person, called a proxy signer, to sign on behalf of an original signer. However,most existing proxy signature schemes do not support nonrepudiation. In this paper, two securenonrepudiable proxy multi-signature schemes are proposed that overcome disadvantages of theexisting schemes. The proposed schemes can withstand public key substitution attack. In addition,the new schemes have some other advantages such as proxy signature key generation and updatingusing insecure channels. This approach can also be applied to other ElGamal-like proxy signatureschemes.
Transmission expansion cost allocation based on cooperative game theory for congestion relief
Erli, Ge; Takahasi, Kazuhiro; Kurihara, Ikuo [Central Research Inst. of Electric Power Industry, Tokyo (Japan); Luonan Chen [Osaka Sangyo Univ., Osaka (Japan)
2005-01-01
In conventional power systems, upstream and downstream of power were distinct. However, due to the competition, power injection and sink can appear at unexpected locations, and cost sharing for such a new power system configuration must be considered. This paper proposes a scheme for transmission expansion cost allocation among electric market participants by using Core and Nucleolus concepts of game theory, which are developed particularly for the transmission users. A solution of the n-person cooperative game is adopted to distribute the line transmission expansion cost among the players. Congestion is assumed to be the transmission constraint, and expansion of transmission line is expected to relieve transmission congestion. A case study is illustrated to demonstrate the proposed method. (Author)
Hybrid Transmission Scheme for MIMO Relay Channels
Guangming Xu
2009-11-01
Full Text Available To improve the achievable rate for the MIMO channels, we propose a hybrid transmission (HT scheme that mixes half-duplex decode-and-forward cooperative relaying transmission （DFRH）with direct transmission (DT. In the HT scheme, the source message is divided into two parts: one is transmitted by DFRH scheme and another is transmitted by DT scheme. Precoding and decoding are considered to convert the original MIMO relay channel into several parallel subchannels so that resource allocation can be easily performed. We focus on the spatial subchannel and power allocation problem. The objective of this problem is to maximize the total achievable rate under the constraints of joint total transmission power. Simulation results show that significant capacity gain can be achieved by the HT scheme compared to the DT scheme and the pure DFRH scheme.
High-Order Energy Stable WENO Schemes
Yamaleev, Nail K.; Carpenter, Mark H.
2008-01-01
A new third-order Energy Stable Weighted Essentially NonOscillatory (ESWENO) finite difference scheme for scalar and vector linear hyperbolic equations with piecewise continuous initial conditions is developed. The new scheme is proven to be stable in the energy norm for both continuous and discontinuous solutions. In contrast to the existing high-resolution shock-capturing schemes, no assumption that the reconstruction should be total variation bounded (TVB) is explicitly required to prove stability of the new scheme. A rigorous truncation error analysis is presented showing that the accuracy of the 3rd-order ESWENO scheme is drastically improved if the tuning parameters of the weight functions satisfy certain criteria. Numerical results show that the new ESWENO scheme is stable and significantly outperforms the conventional third-order WENO finite difference scheme of Jiang and Shu in terms of accuracy, while providing essentially nonoscillatory solutions near strong discontinuities.
Vignola, Emanuele; Steinmann, Stephan N.; Vandegehuchte, Bart D.; Curulla, Daniel; Stamatakis, Michail; Sautet, Philippe
2017-08-01
The accurate description of the energy of adsorbate layers is crucial for the understanding of chemistry at interfaces. For heterogeneous catalysis, not only the interaction of the adsorbate with the surface but also the adsorbate-adsorbate lateral interactions significantly affect the activation energies of reactions. Modeling the interactions of the adsorbates with the catalyst surface and with each other can be efficiently achieved in the cluster expansion Hamiltonian formalism, which has recently been implemented in a graph-theoretical kinetic Monte Carlo (kMC) scheme to describe multi-dentate species. Automating the development of the cluster expansion Hamiltonians for catalytic systems is challenging and requires the mapping of adsorbate configurations for extended adsorbates onto a graphical lattice. The current work adopts machine learning methods to reach this goal. Clusters are automatically detected based on formalized, but intuitive chemical concepts. The corresponding energy coefficients for the cluster expansion are calculated by an inversion scheme. The potential of this method is demonstrated for the example of ethylene adsorption on Pd(111), for which we propose several expansions, depending on the graphical lattice. It turns out that for this system, the best description is obtained as a combination of single molecule patterns and a few coupling terms accounting for lateral interactions.
Compressive sampling of polynomial chaos expansions: Convergence analysis and sampling strategies
Hampton, Jerrad; Doostan, Alireza, E-mail: alireza.doostan@colorado.edu
2015-01-01
Sampling orthogonal polynomial bases via Monte Carlo is of interest for uncertainty quantification of models with random inputs, using Polynomial Chaos (PC) expansions. It is known that bounding a probabilistic parameter, referred to as coherence, yields a bound on the number of samples necessary to identify coefficients in a sparse PC expansion via solution to an ℓ{sub 1}-minimization problem. Utilizing results for orthogonal polynomials, we bound the coherence parameter for polynomials of Hermite and Legendre type under their respective natural sampling distribution. In both polynomial bases we identify an importance sampling distribution which yields a bound with weaker dependence on the order of the approximation. For more general orthonormal bases, we propose the coherence-optimal sampling: a Markov Chain Monte Carlo sampling, which directly uses the basis functions under consideration to achieve a statistical optimality among all sampling schemes with identical support. We demonstrate these different sampling strategies numerically in both high-order and high-dimensional, manufactured PC expansions. In addition, the quality of each sampling method is compared in the identification of solutions to two differential equations, one with a high-dimensional random input and the other with a high-order PC expansion. In both cases, the coherence-optimal sampling scheme leads to similar or considerably improved accuracy.
Magnetic Clouds: Global and local expansion
Gulisano, Adriana; Demoulin, Pascal; Soledad Nakwacki, Ms Maria; Dasso, Sergio; Emilia Ruiz, Maria
Magnetic clouds (MCs) are magnetized objects forming flux ropes, which are expelled from the Sun and travel through the heliosphere, transporting important amounts of energy, mass, magnetic flux, and magnetic helicity from the Sun to the interplanetary medium. To know the detailed dynamical evolution of MCs is very useful to improve the knowledge of solar processes, for instance from linking a transient solar source with its interplanetary manifestation. During its travel, and mainly due to the decrease of the total (magnetic plus thermal) pressure in the surrounding solar wind, MCs are objects in expansion. However, the detailed magnetic structure and the dynamical evolution of MCs is still not fully known. Even the identification of their boundaries is an open question in some cases. In a previous work we have shown that from onepoint observations of the bulk velocity profile, it is possible to infer the 'local' expansion rate for a given MC, i.e., the expansion rate while the MC is observed by the spacecraft. By the another hand, and from the comparison of sizes for different MCs observed at different heliodistances, it is possible to quantify an 'average' expansion law (i.e., a global expansion). In this work, in order to study the variability of the 'local' expansion with respect to the 'average' expansion of MCs during their travel, we present results and a comparison between both approaches. We make a detailed study of one-point observations (magnetic and bulk velocity) using a set of MCs and we get the 'local' expansion rate for each studied event. We compare the obtained 'local' expansion rates with the 'average' expansion law, and also with the expansion rates for the stationary solar wind.
Primordial vorticity and gradient expansion
Giovannini, Massimo
2012-01-01
The evolution equations of the vorticities of the electrons, ions and photons in a pre-decoupling plasma are derived, in a fully inhomogeneous geometry, by combining the general relativistic gradient expansion and the drift approximation within the Adler-Misner-Deser decomposition. The vorticity transfer between the different species is discussed in this novel framework and a set of general conservation laws, connecting the vorticities of the three-component plasma with the magnetic field intensity, is derived. After demonstrating that a source of large-scale vorticity resides in the spatial gradients of the geometry and of the electromagnetic sources, the total vorticity is estimated to lowest order in the spatial gradients and by enforcing the validity of the momentum constraint. By acknowledging the current bounds on the tensor to scalar ratio in the (minimal) tensor extension of the $\\Lambda$CDM paradigm the maximal comoving magnetic field induced by the total vorticity turns out to be, at most, of the or...
Xingjun Lv
2011-11-01
Full Text Available In this paper, a novel kind of method to monitor corrosion expansion of steel rebars in steel reinforced concrete structures named fiber optic coil winding method is proposed, discussed and tested. It is based on the fiber optical Brillouin sensing technique. Firstly, a strain calibration experiment is designed and conducted to obtain the strain coefficient of single mode fiber optics. Results have shown that there is a good linear relationship between Brillouin frequency and applied strain. Then, three kinds of novel fiber optical Brillouin corrosion expansion sensors with different fiber optic coil winding packaging schemes are designed. Sensors were embedded into concrete specimens to monitor expansion strain caused by steel rebar corrosion, and their performance was studied in a designed electrochemical corrosion acceleration experiment. Experimental results have shown that expansion strain along the fiber optic coil winding area can be detected and measured by the three kinds of sensors with different measurement range during development the corrosion. With the assumption of uniform corrosion, diameters of corrosion steel rebars were obtained using calculated average strains. A maximum expansion strain of 6,738 με was monitored. Furthermore, the uniform corrosion analysis model was established and the evaluation formula to evaluate mass loss rate of steel rebar under a given corrosion rust expansion rate was derived. The research has shown that three kinds of Brillouin sensors can be used to monitor the steel rebar corrosion expansion of reinforced concrete structures with good sensitivity, accuracy and monitoring range, and can be applied to monitor different levels of corrosion. By means of this kind of monitoring technique, quantitative corrosion expansion monitoring can be carried out, with the virtues of long durability, real-time monitoring and quasi-distribution monitoring.
Zhao, Xuefeng; Gong, Peng; Qiao, Guofu; Lu, Jie; Lv, Xingjun; Ou, Jinping
2011-01-01
In this paper, a novel kind of method to monitor corrosion expansion of steel rebars in steel reinforced concrete structures named fiber optic coil winding method is proposed, discussed and tested. It is based on the fiber optical Brillouin sensing technique. Firstly, a strain calibration experiment is designed and conducted to obtain the strain coefficient of single mode fiber optics. Results have shown that there is a good linear relationship between Brillouin frequency and applied strain. Then, three kinds of novel fiber optical Brillouin corrosion expansion sensors with different fiber optic coil winding packaging schemes are designed. Sensors were embedded into concrete specimens to monitor expansion strain caused by steel rebar corrosion, and their performance was studied in a designed electrochemical corrosion acceleration experiment. Experimental results have shown that expansion strain along the fiber optic coil winding area can be detected and measured by the three kinds of sensors with different measurement range during development the corrosion. With the assumption of uniform corrosion, diameters of corrosion steel rebars were obtained using calculated average strains. A maximum expansion strain of 6,738 με was monitored. Furthermore, the uniform corrosion analysis model was established and the evaluation formula to evaluate mass loss rate of steel rebar under a given corrosion rust expansion rate was derived. The research has shown that three kinds of Brillouin sensors can be used to monitor the steel rebar corrosion expansion of reinforced concrete structures with good sensitivity, accuracy and monitoring range, and can be applied to monitor different levels of corrosion. By means of this kind of monitoring technique, quantitative corrosion expansion monitoring can be carried out, with the virtues of long durability, real-time monitoring and quasi-distribution monitoring.
Negative thermal expansion materials: technological key for control of thermal expansion
Koshi Takenaka
2012-01-01
Most materials expand upon heating. However, although rare, some materials contract upon heating. Such negative thermal expansion (NTE) materials have enormous industrial merit because they can control the thermal expansion of materials. Recent progress in materials research enables us to obtain materials exhibiting negative coefficients of linear thermal expansion over −30 ppm K−1. Such giant NTE is opening a new phase of control of thermal expansion in composites. Specifically examining pra...
Non-integer expansion embedding techniques for reversible image watermarking
Xiang, Shijun; Wang, Yi
2015-12-01
This work aims at reducing the embedding distortion of prediction-error expansion (PE)-based reversible watermarking. In the classical PE embedding method proposed by Thodi and Rodriguez, the predicted value is rounded to integer number for integer prediction-error expansion (IPE) embedding. The rounding operation makes a constraint on a predictor's performance. In this paper, we propose a non-integer PE (NIPE) embedding approach, which can proceed non-integer prediction errors for embedding data into an audio or image file by only expanding integer element of a prediction error while keeping its fractional element unchanged. The advantage of the NIPE embedding technique is that the NIPE technique can really bring a predictor into full play by estimating a sample/pixel in a noncausal way in a single pass since there is no rounding operation. A new noncausal image prediction method to estimate a pixel with four immediate pixels in a single pass is included in the proposed scheme. The proposed noncausal image predictor can provide better performance than Sachnev et al.'s noncausal double-set prediction method (where data prediction in two passes brings a distortion problem due to the fact that half of the pixels were predicted with the watermarked pixels). In comparison with existing several state-of-the-art works, experimental results have shown that the NIPE technique with the new noncausal prediction strategy can reduce the embedding distortion for the same embedding payload.
A Time Marching Scheme for Solving Volume Integral Equations on Nonlinear Scatterers
Bagci, Hakan
2015-01-07
Transient electromagnetic field interactions on inhomogeneous penetrable scatterers can be analyzed by solving time domain volume integral equations (TDVIEs). TDVIEs are oftentimes solved using marchingon-in-time (MOT) schemes. Unlike finite difference and finite element schemes, MOT-TDVIE solvers require discretization of only the scatterers, do not call for artificial absorbing boundary conditions, and are more robust to numerical phase dispersion. On the other hand, their computational cost is high, they suffer from late-time instabilities, and their implicit nature makes incorporation of nonlinear constitutive relations more difficult. Development of plane-wave time-domain (PWTD) and FFT-based schemes has significantly reduced the computational cost of the MOT-TDVIE solvers. Additionally, latetime instability problem has been alleviated for all practical purposes with the development of accurate integration schemes and specially designed temporal basis functions. Addressing the third challenge is the topic of this presentation. I will talk about an explicit MOT scheme developed for solving the TDVIE on scatterers with nonlinear material properties. The proposed scheme separately discretizes the TDVIE and the nonlinear constitutive relation between electric field intensity and flux density. The unknown field intensity and flux density are expanded using half and full Schaubert-Wilton-Glisson (SWG) basis functions in space and polynomial temporal interpolators in time. The resulting coupled system of the discretized TDVIE and constitutive relation is integrated in time using an explicit P E(CE) m scheme to yield the unknown expansion coefficients. Explicitness of time marching allows for straightforward incorporation of the nonlinearity as a function evaluation on the right hand side of the coupled system of equations. Consequently, the resulting MOT scheme does not call for a Newton-like nonlinear solver. Numerical examples, which demonstrate the applicability
A novel scheme for making cheap electricity with nuclear energy
Pettibone, J.S.
1991-04-01
Nuclear fuels should produce cheaper electricity than coal, considering their high specific energy and low cost. To exploit these properties, the scheme proposed here replaces the expensive reactor/steam-turbine system with an engine in which the expansion of a gas heated by a nuclear explosion raises a mass of liquid, thereby producing stored hydraulic energy. This energy could be converted to electricity by hydroelectric generation with water as the working fluid or by magnetohydrodynamic (MHD) generation with molten metal. A rough cost analysis suggests the hydroelectric system could reduce the present cost of electricity by two-thirds, and the MHD system by even more. Such cheap power would make feasible large-scale electrolysis to produce hydrogen and other fuels and chemical raw materials. 2 refs., 1 fig.
Novel scheme for making cheap electricity with nuclear energy
Pettibone, J.A.
1979-08-24
Nuclear fuels should produce cheaper electricity than coal, considering their high specific energy and low cost. To exploit these properties, the scheme proposed here replaces the expensive reactor/steam-turbine system with an engine in which the expansion of a gas heated by a nuclear explosion raises a mass of liquid, thereby producing stored hydraulic energy. This energy could be converted to electricity by hydroelectric generation with water as the working fluid or by magnetohydrodynamic (MHD) generation with molten metal. A rough cost analysis suggests the hydroelectric system could reduce the present cost of electricity by two-thirds, and the MHD system by even more. Such cheap power would make feasible large-scale electrolysis to produce hydrogen and other fuels and chemical raw materials.
The Expansion Postponement in Pure Type Systems
宋方敏
1997-01-01
The expansion postponement problem in Pure Type Systems is an open problem raised by R.Pollack in 1992.In this paper,the author presents a set of necessary and sufficient conditions for this problem and a set of sufficient conditions for it.The author also gives some properties for pure typ systems without the expansion rule.
Multipole expansion method for supernova neutrino oscillations
Duan, Huaiyu; Shalgar, Shashank, E-mail: duan@unm.edu, E-mail: shashankshalgar@unm.edu [Department of Physics and Astronomy, University of New Mexico, Albuquerque, NM 87131 (United States)
2014-10-01
We demonstrate a multipole expansion method to calculate collective neutrino oscillations in supernovae using the neutrino bulb model. We show that it is much more efficient to solve multi-angle neutrino oscillations in multipole basis than in angle basis. The multipole expansion method also provides interesting insights into multi-angle calculations that were accomplished previously in angle basis.
Finnish Higher Education Expansion and Regional Policy
Saarivirta, Toni
2010-01-01
This paper concentrates on the expansion of Finnish higher education between the 1960s and 1970s, exposes its background in the light of the policy decisions that were made, compares the unique features of this expansion with those of certain other countries, discusses the impact of the controlled "top down" governance of higher…
Flash Expansion Threshold in Whirligig Swarms.
William L Romey
Full Text Available In the selfish herd hypothesis, prey animals move toward each other to avoid the likelihood of being selected by a predator. However, many grouped animals move away from each other the moment before a predator attacks. Very little is known about this phenomenon, called flash expansion, such as whether it is triggered by one individual or a threshold and how information is transferred between group members. We performed a controlled experiment with whirligig beetles in which the ratio of sighted to unsighted individuals was systematically varied and emergent flash expansion was measured. Specifically, we examined: the percentage of individuals in a group that startled, the resulting group area, and the longevity of the flash expansion. We found that one or two sighted beetles in a group of 24 was not enough to cause a flash expansion after a predator stimulus, but four sighted beetles usually initiated a flash expansion. Also, the more beetles that were sighted the larger the resulting group area and the longer duration of the flash expansion. We conclude that flash expansion is best described as a threshold event whose adaptive value is to prevent energetically costly false alarms while quickly mobilizing an emergent predator avoidance response. This is one of the first controlled experiments of flash expansion, an important emergent property that has applications to understanding collective motion in swarms, schools, flocks, and human crowds. Also, our study is a convincing demonstration of social contagion, how the actions of one individual can pass through a group.
A reduced volumetric expansion factor plot
Hendricks, R. C.
1979-01-01
A reduced volumetric expansion factor plot has been constructed for simple fluids which is suitable for engineering computations in heat transfer. Volumetric expansion factors have been found useful in correlating heat transfer data over a wide range of operating conditions including liquids, gases and the near critical region.
Earnings Returns to the British Education Expansion
Devereux, Paul J.; Fan, Wen
2011-01-01
We study the effects of the large expansion in British educational attainment that took place for cohorts born between 1970 and 1975. Using the Quarterly Labour Force Survey, we find that the expansion caused men to increase education by about a year on average and gain about 8% higher wages; women obtained a slightly greater increase in education…
The heavy quark expansion of QCD
Falk, A.F. [Johns Hopkins Univ., Baltimore, MD (United States). Dept. of Physics and Astronomy
1997-06-01
These lectures contain an elementary introduction to heavy quark symmetry and the heavy quark expansion. Applications such as the expansion of heavy meson decay constants and the treatment of inclusive and exclusive semileptonic B decays are included. Heavy hadron production via nonperturbative fragmentation processes is also discussed. 54 refs., 7 figs.
Expansion techniques for collisionless stellar dynamical simulations
Meiron, Yohai [Kavli Institute for Astronomy and Astrophysics at Peking University, Beijing 100871 (China); Li, Baile; Holley-Bockelmann, Kelly [Department of Physics and Astronomy, Vanderbilt University, Nashville, TN 37235 (United States); Spurzem, Rainer, E-mail: ymeiron@pku.edu.cn [National Astronomical Observatories of China, Chinese Academy of Sciences, Beijing 100012 (China)
2014-09-10
We present graphics processing unit (GPU) implementations of two fast force calculation methods based on series expansions of the Poisson equation. One method is the self-consistent field (SCF) method, which is a Fourier-like expansion of the density field in some basis set; the other method is the multipole expansion (MEX) method, which is a Taylor-like expansion of the Green's function. MEX, which has been advocated in the past, has not gained as much popularity as SCF. Both are particle-field methods and optimized for collisionless galactic dynamics, but while SCF is a 'pure' expansion, MEX is an expansion in just the angular part; thus, MEX is capable of capturing radial structure easily, while SCF needs a large number of radial terms. We show that despite the expansion bias, these methods are more accurate than direct techniques for the same number of particles. The performance of our GPU code, which we call ETICS, is profiled and compared to a CPU implementation. On the tested GPU hardware, a full force calculation for one million particles took ∼0.1 s (depending on expansion cutoff), making simulations with as many as 10{sup 8} particles fast for a comparatively small number of nodes.
CONCEPT OF TISSUE EXPANSION IN RECONSTRUCTIVE SURGERY
Sheeja Rajan
2015-01-01
Full Text Available BACKGROUND: Tissue expansion is a unique reconstructive option in the armamentarium of a reconstructive surgeon whereby skin and soft tissues of our body can be stretched to large dimensions for wound coverage. The basis for such stretch ability lies in the inherent viscoelastic properties of skin. AIMS: This paper explores the prospects of using tissue expanders to reconstruct defects arising due to a kaleidoscope of pathological conditions including burns scars, post traumatic scars, congenital anomalies like hairy nevus, involutional scars in haemangioma as well as in post mastectomy breast reconstruction . MATERIALS AND METHODS: Our experience with tissue expansion in 14 patients over 24 months is presented. Tissue expanders made of silicone in sizes from 100 - 250ml, of round, rectangular or croissant (crescent shapes have been used. Areas expanded include scalp, forehead, neck, abdomen and forearm. Multiple expanders have been used when possible. Average expansion time was 8 - 12 weeks and the expanded tissue was transferred as advancement flaps. RESULTS AND CONCLUSIONS: Tissue expansion was successfully completed in 13 patients. Expansion had to be aborted in 1 paediatric patient undergoing neck expansion due to infection. Implant failure occurred in 1 patient during serial expansion. Nevertheless, in our experience tissue expan sion is an invaluable reconstructive tool to give excellent donor tissue with colour and texture match in countless situations demanding aesthetic and functional reconstruction. KEYWORDS: Burns scars, Reconstruction, Tissue expansion .
Virial expansion coefficients in the harmonic approximation
R. Armstrong, J.; Zinner, Nikolaj Thomas; V. Fedorov, D.
2012-01-01
The virial expansion method is applied within a harmonic approximation to an interacting N-body system of identical fermions. We compute the canonical partition functions for two and three particles to get the two lowest orders in the expansion. The energy spectrum is carefully interpolated...
Perturbative expansion of Chern-Simons theory
SAWON, Justin
2005-01-01
An overview of the perturbative expansion of the Chern--Simons path integral is given. The main goal is to describe how trivalent graphs appear: as they already occur in the perturbative expansion of an analogous finite-dimensional integral, we discuss this case in detail.
Scheme of thinking quantum systems
Yukalov, V I
2009-01-01
A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.
Electrical injection schemes for nanolasers
Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten
2013-01-01
The performance of injection schemes among recently demonstrated electrically pumped photonic crystal nanolasers has been investigated numerically. The computation has been carried out at room temperature using a commercial semiconductor simulation software. For the simulations two electrical...... of 3 InGaAsP QWs on an InP substrate has been chosen for the modeling. In the simulations the main focus is on the electrical and optical properties of the nanolasers i.e. electrical resistance, threshold voltage, threshold current and wallplug efficiency. In the current flow evaluation the lowest...... threshold current has been achieved with the lateral electrical injection through the BH; while the lowest resistance has been obtained from the current post structure even though this model shows a higher current threshold because of the lack of carrier confinement. Final scope of the simulations...
Fragment separator momentum compression schemes
Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)
2011-07-21
We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.
Fragment separator momentum compression schemes.
Bandura, L.; Erdelyi, B.; Hausmann, M.; Kubo, T.; Nolen, J.; Portillo, M.; Sherrill, B.M. (Physics); (MSU); (Northern Illinois Univ.); (RIKEN)
2011-07-21
We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.
Network Regulation and Support Schemes
Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik
2009-01-01
-in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular......, it will be shown that there frequently exists a trade-off between the creation of incentives for distributed generators and for distribution system operators to facilitate the integration of distributed generation. Secondly, the interaction of these policy dimensions is analyzed, including case studies based...
Scheme of thinking quantum systems
Yukalov, V. I.; Sornette, D.
2009-11-01
A general approach describing quantum decision procedures is developed. The approach can be applied to quantum information processing, quantum computing, creation of artificial quantum intelligence, as well as to analyzing decision processes of human decision makers. Our basic point is to consider an active quantum system possessing its own strategic state. Processing information by such a system is analogous to the cognitive processes associated to decision making by humans. The algebra of probability operators, associated with the possible options available to the decision maker, plays the role of the algebra of observables in quantum theory of measurements. A scheme is advanced for a practical realization of decision procedures by thinking quantum systems. Such thinking quantum systems can be realized by using spin lattices, systems of magnetic molecules, cold atoms trapped in optical lattices, ensembles of quantum dots, or multilevel atomic systems interacting with electromagnetic field.
Network Regulation and Support Schemes
Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik
2009-01-01
-in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular......, it will be shown that there frequently exists a trade-off between the creation of incentives for distributed generators and for distribution system operators to facilitate the integration of distributed generation. Secondly, the interaction of these policy dimensions is analyzed, including case studies based...
Uncertainty evaluation of the thermal expansion of simulated fuel
Park, Chang Je; Kang, Kweon Ho; Song, Kee Chan [Korea Atomic Energy Research Institute, 150 Dukjin-dong, Yuseung-gu, Daejon 305-353 (Korea, Republic of)
2006-08-15
Thermal expansions of simulated fuel (SS1) are measured by using a dilatometer (DIL402C) from room temperature to 1900K. The main procedure of an uncertainty evaluation was followed by the strategy of the UO{sub 2} fuel. There exist uncertainties in the measurement, which should be quantified based on statistics. Referring to the ISO (International Organization for Standardization) guide, the uncertainties of the thermal expansion are quantified in three parts: the initial length, the length variation, and the system calibration factor. Each part is divided into two types. The A type uncertainty is derived from the statistical iterative measurement of an uncertainty and the B type uncertainty comes from a non-statistical uncertainty including a calibration and test reports. For the uncertainty evaluation, the digital calipers had been calibrated by the KOLAS (Korea Laboratory Accreditation Scheme) to obtain not only the calibration values but also the type B uncertainty. The whole system, the dilatometer (DIL402C), is composed of many complex sub-systems and in fact it is difficult to consider all the uncertainties of sub-systems. Thus, a calibration of the system was performed with a standard material (Al{sub 2}O{sub 3}), which is provided by NETZSCH. From the above standard uncertainties, the combined standard uncertainties were calculated by using the law of a propagation of an uncertainty. Finally, the expanded uncertainty was calculated by using the effective degree of freedom and the t-distribution for a given confidence level. The uncertainty of the thermal expansion for a simulated fuel was also compared with those of UO{sub 2} fuel. (author)
Improvement of Some Proxy Signature Schemes
LIJiguo; LIANGZhenghe; ZHUYuelong; HANGYichen
2005-01-01
In 1996, Mambo et al. introduced the concept of proxy signature. Proxy signature can be applied to mobile agent, e-vote etc. Recently, Sun and Hsieh showed that Lee et al's strong proxy signature scheme and its application to multi-proxy signature scheme, Shum and Wei's privacy-protected strong proxy signature scheme, and Park and Lee's nominative proxy signature scheme were all insecure against the original signer's forgery attack. In this paper, we show those proxy signature schemes don't withstand public key substitution attack and give some slight but important modifications for those proxy signature schemes such that the resulting schemes are secure against the original signer's forgery attack and public key substitution attack. In addition, we show that Park and Lee's nominative proxy signature scheme don't satisfy strong nonrepudiation and strong identifiability. Improved schemes satisfy all properties of strong proxy signature scheme, and doesn't use secure channel between the original signer and the proxy signer.
Development of Soda Residue Concrete Expansion Agent
WANG Bao-min; WANG Li-jiu; M F Mohd Zain; F C Lai
2003-01-01
A new type of concrete expansion agent has been successfully developed for the first time in the world by utilizing an industrial waste residue-soda residue and an industrial wasteliquor.Adding 3%-6% of the agent into Portland cement enables a shrinkage-compensating concrete to be prepared.Mortar and concrete containing this expansion agent have better shrinkage-compensating and mechanical properties.The raw materials component,production process,technical properties,micro-analysis of mortar made with this expansion agent,mechanism of expansion and research results are described in this article.The experimental results show that the new type of concrete expansion agent accords with the standard and its main mineral component is xCaO-ySO3-zAl2O3.
Business information query expansion through semantic network
Gong, Zhiguo; Muyeba, Maybin; Guo, Jingzhi
2010-02-01
In this article, we propose a method for business information query expansions. In our approach, hypernym/hyponymy and synonym relations in WordNet are used as the basic expansion rules. Then we use WordNet Lexical Chains and WordNet semantic similarity to assign terms in the same query into different groups with respect to their semantic similarities. For each group, we expand the highest terms in the WordNet hierarchies with hypernym and synonym, the lowest terms with hyponym and synonym and all other terms with only synonym. In this way, the contradictory caused by full expansion can be well controlled. Furthermore, we use collection-related term semantic network to further improve the expansion performance. And our experiment reveals that our solution for query expansion can improve the query performance dramatically.
Maxwell superalgebras and Abelian semigroup expansion
Concha, P.K.; Rodríguez, E.K. [Departamento de Física, Universidad de Concepción, Casilla 160-C, Concepción (Chile); Dipartimento di Scienza Applicata e Tecnologia (DISAT), Politecnico di Torino, Corso Duca degli Abruzzi 24, 10129 Torino (Italy); Istituto Nazionale di Fisica Nucleare (INFN), Sezione di Torino, Via Pietro Giuria, 1, 10125 Torino (Italy)
2014-09-15
The Abelian semigroup expansion is a powerful and simple method to derive new Lie algebras from a given one. Recently it was shown that the S-expansion of so(3,2) leads us to the Maxwell algebra M. In this paper we extend this result to superalgebras, by proving that different choices of abelian semigroups S lead to interesting D=4 Maxwell Superalgebras. In particular, the minimal Maxwell superalgebra sM and the N-extended Maxwell superalgebra sM{sup (N)} recently found by the Maurer–Cartan expansion procedure, are derived alternatively as an S-expansion of osp(4|N). Moreover, we show that new minimal Maxwell superalgebras type sM{sub m+2} and their N-extended generalization can be obtained using the S-expansion procedure.
Maxwell superalgebras and Abelian semigroup expansion
P.K. Concha
2014-09-01
Full Text Available The Abelian semigroup expansion is a powerful and simple method to derive new Lie algebras from a given one. Recently it was shown that the S-expansion of so(3,2 leads us to the Maxwell algebra M. In this paper we extend this result to superalgebras, by proving that different choices of abelian semigroups S lead to interesting D=4 Maxwell Superalgebras. In particular, the minimal Maxwell superalgebra sM and the N-extended Maxwell superalgebra sM(N recently found by the Maurer–Cartan expansion procedure, are derived alternatively as an S-expansion of osp(4|N. Moreover, we show that new minimal Maxwell superalgebras type sMm+2 and their N-extended generalization can be obtained using the S-expansion procedure.
Kasun Bandara,Atul Sewaiwar,; Yeon-Ho Chung
2015-01-01
Orthogonal frequency division multiplexing (OFDM) produces a high peak-to-average power ratio (PAPR) that ad-versely affects high-speed OFDM data transmission. In order to reduce the high PAPR, an efficient nonlinear companding trans-form (NCT) function is proposed. With the proposed NCT function, the compression and expansion weights can be applied indepen-dently with suitably chosen function parameter values. As a re-sult, the proposed function can easily maintain the average signal power approximately unchanged during the companding process. In this regard, the proposed function is superior to previously pro-posed schemes. Also, the simulations show the outstanding PAPR reduction performance of the proposed function. It is demonstrated that the proposed scheme performs wel with nonlinear transmitter amplifiers and delivers superior error performance, compared with error function and exponential function based schemes.
Two-out-of-two color matching based visual cryptography schemes.
Machizaud, Jacques; Fournel, Thierry
2012-09-24
Visual cryptography which consists in sharing a secret message between transparencies has been extended to color prints. In this paper, we propose a new visual cryptography scheme based on color matching. The stacked printed media reveal a uniformly colored message decoded by the human visual system. In contrast with the previous color visual cryptography schemes, the proposed one enables to share images without pixel expansion and to detect a forgery as the color of the message is kept secret. In order to correctly print the colors on the media and to increase the security of the scheme, we use spectral models developed for color reproduction describing printed colors from an optical point of view.
Rapid Parameterization Schemes for Aircraft Shape Optimization
Li, Wu
2012-01-01
A rapid shape parameterization tool called PROTEUS is developed for aircraft shape optimization. This tool can be applied directly to any aircraft geometry that has been defined in PLOT3D format, with the restriction that each aircraft component must be defined by only one data block. PROTEUS has eight types of parameterization schemes: planform, wing surface, twist, body surface, body scaling, body camber line, shifting/scaling, and linear morphing. These parametric schemes can be applied to two types of components: wing-type surfaces (e.g., wing, canard, horizontal tail, vertical tail, and pylon) and body-type surfaces (e.g., fuselage, pod, and nacelle). These schemes permit the easy setup of commonly used shape modification methods, and each customized parametric scheme can be applied to the same type of component for any configuration. This paper explains the mathematics for these parametric schemes and uses two supersonic configurations to demonstrate the application of these schemes.
On Optimal Designs of Some Censoring Schemes
Dr. Adnan Mohammad Awad
2016-03-01
Full Text Available The main objective of this paper is to explore suitability of some entropy-information measures for introducing a new optimality censoring criterion and to apply it to some censoring schemes from some underlying life-time models. In addition, the paper investigates four related issues namely; the effect of the parameter of parent distribution on optimal scheme, equivalence of schemes based on Shannon and Awad sup-entropy measures, the conjecture that the optimal scheme is one stage scheme, and a conjecture by Cramer and Bagh (2011 about Shannon minimum and maximum schemes when parent distribution is reflected power. Guidelines for designing an optimal censoring plane are reported together with theoretical and numerical results and illustrations.
A Signature Scheme with Non-Repudiation
XIN Xiangjun; GUO Xiaoli; XIAO Guozhen
2006-01-01
Based on the Schnorr signature scheme, a new signature scheme with non-repudiation is proposed. In this scheme, only the signer and the designated receiver can verify the signature signed by the signer, and if necessary, both the signer and the designated receiver can prove and show the validity of the signature signed by the signer. The proof of the validity of the signature is noninteractive and transferable. To verify and prove the validity of the signature, the signer and the nominated receiver needn't store extra information besides the signature. At the same time, neither the signer nor the designated receiver can deny a valid signature signed. Then, there is no repudiation in this new signature scheme. According to the security analysis of this scheme, it is found the proposed scheme is secure against existential forgery on adaptive chosen message attack.
An adaptive nonlinear solution scheme for reservoir simulation
Lett, G.S. [Scientific Software - Intercomp, Inc., Denver, CO (United States)
1996-12-31
Numerical reservoir simulation involves solving large, nonlinear systems of PDE with strongly discontinuous coefficients. Because of the large demands on computer memory and CPU, most users must perform simulations on very coarse grids. The average properties of the fluids and rocks must be estimated on these grids. These coarse grid {open_quotes}effective{close_quotes} properties are costly to determine, and risky to use, since their optimal values depend on the fluid flow being simulated. Thus, they must be found by trial-and-error techniques, and the more coarse the grid, the poorer the results. This paper describes a numerical reservoir simulator which accepts fine scale properties and automatically generates multiple levels of coarse grid rock and fluid properties. The fine grid properties and the coarse grid simulation results are used to estimate discretization errors with multilevel error expansions. These expansions are local, and identify areas requiring local grid refinement. These refinements are added adoptively by the simulator, and the resulting composite grid equations are solved by a nonlinear Fast Adaptive Composite (FAC) Grid method, with a damped Newton algorithm being used on each local grid. The nonsymmetric linear system of equations resulting from Newton`s method are in turn solved by a preconditioned Conjugate Gradients-like algorithm. The scheme is demonstrated by performing fine and coarse grid simulations of several multiphase reservoirs from around the world.
Multi-object quantum traveling ballot scheme
Yuan Li; Guihua Zeng
2009-01-01
Based on quantum mechanics, a traveling ballot scheme with anonymity and secrecy is introduced to realize voting. By searching the objects in large amount of data bases, every voter may cast votes to his desired candidates. Therefore, the proposed scheme may be applied to voting with a great deal of candidates, such as network voting and so on. The security analysis of the present scheme is also performed.
SYNCHRONIZATION RECOVERY SCHEME IN WATERMARKING DETECTION
Xiao Weiwei; Zhang Li; Ji Zhen; Zhang Jihong
2003-01-01
Most proposed digital watermarking algorithms are sensitive to geometric attacksbecause the synchronization information of watermark embedding and detection is destroyed. Inthis letter a novel synchronization recovery scheme based on image normalization is proposed. Thepresented scheme does not require the original image and can be applied to various watermarksystems. A wavelet-based watermarking scheme is proposed as an example and experimentalresults show that it is robust to geometric attacks.
Blind Signature Scheme Based on Chebyshev Polynomials
Maheswara Rao Valluri
2011-12-01
Full Text Available A blind signature scheme is a cryptographic protocol to obtain a valid signature for a message from a signer such that signer’s view of the protocol can’t be linked to the resulting message signature pair. This paper presents blind signature scheme using Chebyshev polynomials. The security of the given scheme depends upon the intractability of the integer factorization problem and discrete logarithms ofChebyshev polynomials.
Blind Signature Scheme Based on Chebyshev Polynomials
Maheswara Rao Valluri
2011-01-01
A blind signature scheme is a cryptographic protocol to obtain a valid signature for a message from a signer such that signer’s view of the protocol can’t be linked to the resulting message signature pair. This paper presents blind signature scheme using Chebyshev polynomials. The security of the given scheme depends upon the intractability of the integer factorization problem and discrete logarithms ofChebyshev polynomials.
Pyramid Schemes on the Tibetan Plateau
Devin Gonier; Rgyal yum sgrol ma
2012-01-01
The unique features of pyramid schemes and certain underlying causes for their development on the Tibetan Plateau are analyzed. Research was conducted by analyzing 521 surveys, allowing estimation of pyramid scheme activity on the Plateau and an identification of related cultural and social specificities. Firsthand accounts were collected revealing details of personal involvement. Survey data and similarities in the accounts were studied to suggest how involvement in pyramid schemes might be ...
Resonance ionization scheme development for europium
Chrysalidis, K; Fedosseev, V N; Marsh, B A; Naubereit, P; Rothe, S; Seiffert, C; Kron, T; Wendt, K
2017-01-01
Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.
Signcryption scheme based on schnorr digital signature
Savu, Laura
2012-01-01
This article presents a new signcryption scheme which is based on the Schnorr digital signature algorithm. The new scheme represents my personal contribution to signcryption area. I have been implemented the algorithm in a program and here are provided the steps of the algorithm, the results and some examples. The paper also contains the presentation of the original Signcryption scheme, based on ElGamal digital signature and discusses the practical applications of Signcryption in real life.
SIGNCRYPTION BASED ON DIFFERENT DIGITAL SIGNATURE SCHEMES
Adrian Atanasiu; Laura Savu
2012-01-01
This article presents two new signcryption schemes. The first one is based on Schnorr digital signature algorithm and the second one is using Proxy Signature scheme introduced by Mambo. Schnorr Signcryption has been implemented in a program and here are provided the steps of the algorithm, the results and some examples. The Mambo’s Proxy Signature is adapted for Shortened Digital Signature Standard, being part of a new Proxy Signcryption scheme.
Resonance ionization scheme development for europium
Chrysalidis, K., E-mail: katerina.chrysalidis@cern.ch; Goodacre, T. Day; Fedosseev, V. N.; Marsh, B. A. [CERN (Switzerland); Naubereit, P. [Johannes Gutenberg-Universität, Institiut für Physik (Germany); Rothe, S.; Seiffert, C. [CERN (Switzerland); Kron, T.; Wendt, K. [Johannes Gutenberg-Universität, Institiut für Physik (Germany)
2017-11-15
Odd-parity autoionizing states of europium have been investigated by resonance ionization spectroscopy via two-step, two-resonance excitations. The aim of this work was to establish ionization schemes specifically suited for europium ion beam production using the ISOLDE Resonance Ionization Laser Ion Source (RILIS). 13 new RILIS-compatible ionization schemes are proposed. The scheme development was the first application of the Photo Ionization Spectroscopy Apparatus (PISA) which has recently been integrated into the RILIS setup.
General Compact Labeling Schemes for Dynamic Trees
2006-01-01
Let $F$ be a function on pairs of vertices. An {\\em $F$- labeling scheme} is composed of a {\\em marker} algorithm for labeling the vertices of a graph with short labels, coupled with a {\\em decoder} algorithm allowing one to compute $F(u,v)$ of any two vertices $u$ and $v$ directly from their labels. As applications for labeling schemes concern mainly large and dynamically changing networks, it is of interest to study {\\em distributed dynamic} labeling schemes. This paper investigates labelin...
Shrinkage and Expansive Strain of Concrete with Fly Ash and Expansive Agent
GAO Peiwei; LU Xiaolin; TANG Mingshu
2009-01-01
The effects of fly ash and MgO-type expansive agent on the shrinkage and expan-sive strain of concrete with high magnesia cement were investigated. The results show that high volumes of fly ash may reduce the shrinkage strain of concrete and inhibit the expansive strain of concrete with MgO-type expansive agent, but can not eliminate the shrinkage of concrete. MgO-type expansive agent may produce expansive strain and compensate the shrinkage strain of concrete, re-lieve the cracking risk, but the hydration product of magnesia tends to get together in paste and pro-duce expansive cracking of concrete with high magnesia content according to SEM observation.
Optimizing Decision Tree Attack on CAS Scheme
PERKOVIC, T.
2016-05-01
Full Text Available In this paper we show a successful side-channel timing attack on a well-known high-complexity cognitive authentication (CAS scheme. We exploit the weakness of CAS scheme that comes from the asymmetry of the virtual interface and graphical layout which results in nonuniform human behavior during the login procedure, leading to detectable variations in user's response times. We optimized a well-known probabilistic decision tree attack on CAS scheme by introducing this timing information into the attack. We show that the developed classifier could be used to significantly reduce the number of login sessions required to break the CAS scheme.
Key Predistribution Schemes for Distributed Sensor Networks
Bose, Mausumi; Mukerjee, Rahul
2011-01-01
Key predistribution schemes for distributed sensor networks have received significant attention in the recent literature. In this paper we propose a new construction method for these schemes based on combinations of duals of standard block designs. Our method is a broad spectrum one which works for any intersection threshold. By varying the initial designs, we can generate various schemes and this makes the method quite flexible. We also obtain explicit algebraic expressions for the metrics for local connectivity and resiliency. These schemes are quite efficient with regard to connectivity and resiliency and at the same time they allow a straightforward shared-key discovery.
A new access scheme in OFDMA systems
GU Xue-lin; YAN Wei; TIAN Hui; ZHANG Ping
2006-01-01
This article presents a dynamic random access scheme for orthogonal frequency division multiple access (OFDMA) systems. The key features of the proposed scheme are:it is a combination of both the distributed and the centralized schemes, it can accommodate several delay sensitivity classes,and it can adjust the number of random access channels in a media access control (MAC) frame and the access probability according to the outcome of Mobile Terminals access attempts in previous MAC frames. For floating populated packet-based networks, the proposed scheme possibly leads to high average user satisfaction.
Efficient Certificateless Signcryption Scheme from Weil Pairing
Gang Yu
2011-08-01
Full Text Available Certificateless signcryption has both the advantage of certificateless public key cryptography, which overcome the escrow problem inherited from identity based cryptography without the use of certificates as in traditional public key cryptography, and signcryption which can fulfill both the functions of signature and encryption in a logical signal step. In this paper, we explicit the security model for certificateless signcryption and propose an efficient certificateless signcryption scheme from Weil pairings. The new scheme not only can be proved to be secure in our model but also can simultaneously provide public verifiability and forward security. Furthermore, compared with existing schemes, the new scheme is more efficient.
Hybrid scheme for Brownian semistationary processes
Bennedsen, Mikkel; Lunde, Asger; Pakkanen, Mikko S.
the asymptotics of the mean square error of the hybrid scheme and we observe that the scheme leads to a substantial improvement of accuracy compared to the ordinary forward Riemann-sum scheme, while having the same computational complexity. We exemplify the use of the hybrid scheme by two numerical experiments......, where we examine the finite-sample properties of an estimator of the roughness parameter of a Brownian semistationary process and study Monte Carlo option pricing in the rough Bergomi model of Bayer et al. (2015), respectively....
An Improved Proxy Multi-Signature Scheme
GU Li-ze; ZHANG Sheng; YANG Yi-xian
2005-01-01
Based on the Kim-like's proxy multi-signature scheme[1],an improved proxy multi-signature scheme is proposed.The new scheme overcomes the two problems in the Kim-like's proxy multi-signature scheme:(1)Security issue(every original signer can forge a valid proxy multi-signature for any message);(2)Efficiency issue(both the size of the proxy multi-signature and the efficiency of signature checking are dependent on the number of the original signers).
Expansion Techniques for Collisionless Stellar Dynamical Simulations
Meiron, Yohai; Holley-Bockelmann, Kelly; Spurzem, Rainer
2014-01-01
We present GPU implementations of two fast force calculation methods, based on series expansions of the Poisson equation. One is the Self-Consistent Field (SCF) method, which is a Fourier-like expansion of the density field in some basis set; the other is the Multipole Expansion (MEX) method, which is a Taylor-like expansion of the Green's function. MEX, which has been advocated in the past, has not gained as much popularity as SCF. Both are particle-field method and optimized for collisionless galactic dynamics, but while SCF is a "pure" expansion, MEX is an expansion in just the angular part; it is thus capable of capturing radial structure easily, where SCF needs a large number of radial terms. We show that despite the expansion bias, these methods are more accurate than direct techniques for the same number of particles. The performance of our GPU code, which we call ETICS, is profiled and compared to a CPU implementation. On the tested GPU hardware, a full force calculation for one million particles took...
Giant negative thermal expansion in magnetic nanocrystals.
Zheng, X G; Kubozono, H; Yamada, H; Kato, K; Ishiwata, Y; Xu, C N
2008-12-01
Most solids expand when they are heated, but a property known as negative thermal expansion has been observed in a number of materials, including the oxide ZrW2O8 (ref. 1) and the framework material ZnxCd1-x(CN)2 (refs 2,3). This unusual behaviour can be understood in terms of low-energy phonons, while the colossal values of both positive and negative thermal expansion recently observed in another framework material, Ag3[Co(CN)6], have been explained in terms of the geometric flexibility of its metal-cyanide-metal linkages. Thermal expansion can also be stopped in some magnetic transition metal alloys below their magnetic ordering temperature, a phenomenon known as the Invar effect, and the possibility of exploiting materials with tuneable positive or negative thermal expansion in industrial applications has led to intense interest in both the Invar effect and negative thermal expansion. Here we report the results of thermal expansion experiments on three magnetic nanocrystals-CuO, MnF2 and NiO-and find evidence for negative thermal expansion in both CuO and MnF2 below their magnetic ordering temperatures, but not in NiO. Larger particles of CuO and MnF2 also show prominent magnetostriction (that is, they change shape in response to an applied magnetic field), which results in significantly reduced thermal expansion below their magnetic ordering temperatures; this behaviour is not observed in NiO. We propose that the negative thermal expansion effect in CuO (which is four times larger than that observed in ZrW2O8) and MnF2 is a general property of nanoparticles in which there is strong coupling between magnetism and the crystal lattice.
Critical exponents from large mass expansion
Yamada, Hirofumi
2014-01-01
We perform estimation of critical exponents via large mass expansion under crucial help of delta-expansion. We address to the three dimensional Ising model at high temperature and estimate omega, the correction-to-scaling exponent, nu, eta and gamma in unbiased and self-contained manner. The results read at the highest 25th order expansion omega=0.8002, nu=0.6295, eta=0.0369 and gamma=1.2357. Estimation biased by omega=0.84(4) is also performed and proved to be in agreement with the summary of recent literatures.
ON CONVERGENCE OF WAVELET PACKET EXPANSIONS
Morten Nielsen
2002-01-01
It is well known that the-Walsh-Fourier expansion of a function from the block space ([0, 1 ) ), 1 ＜q≤∞, converges pointwise a.e. We prove that the same result is true for the expansion of a function from in certain periodixed smooth periodic non-stationary wavelet packets bases based on the Haar filters. We also consider wavelet packets based on the Shannon filters and show that the expansion of Lp-functions, 1＜p＜∞, converges in norm and pointwise almost everywhere.
Extrudate Expansion Modelling through Dimensional Analysis Method
A new model framework is proposed to correlate extrudate expansion and extrusion operation parameters for a food extrusion cooking process through dimensional analysis principle, i.e. Buckingham pi theorem. Three dimensionless groups, i.e. energy, water content and temperature, are suggested...... to describe the extrudates expansion. From the three dimensionless groups, an equation with three experimentally determined parameters is derived to express the extrudate expansion. The model is evaluated with whole wheat flour and aquatic feed extrusion experimental data. The average deviations...
Does cosmological expansion affect local physics?
Giulini, Domenico
2013-01-01
In this contribution I wish to address the question whether, and how, the global cosmological expansion influences local physics. I argue that a pseudo Newtonian picture can be quite accurate if ``expansion'' is taken to be an attribute of the inertial structure rather than of ``space'' in some substantivalist sense. This contradicts the often-heard suggestion to imagine cosmological expansion as that of ``space itself''. Regarding General Relativity, I emphasise the need for proper geometric characterisations in order to meaningfully compare localised systems in different spacetimes, like black holes in static and expanding environments. Examples of this sort are discussed in some detail to clearly map out the problems.
Some Improved Nonperturbative Bounds for Fermionic Expansions
Lohmann, Martin, E-mail: marlohmann@gmail.com [Universita di Roma Tre, Dipartimento di Matematica (Italy)
2016-06-15
We reconsider the Gram-Hadamard bound as it is used in constructive quantum field theory and many body physics to prove convergence of Fermionic perturbative expansions. Our approach uses a recursion for the amplitudes of the expansion, discovered in a model problem by Djokic (2013). It explains the standard way to bound the expansion from a new point of view, and for some of the amplitudes provides new bounds, which avoid the use of Fourier transform, and are therefore superior to the standard bounds for models like the cold interacting Fermi gas.
Hubble expansion is not a velocity
Ma, Yin-Zhe; Zhang, Shuang-Nan
2016-11-01
In this paper, we clarify the difference between the Hubble expansion and the Doppler shift pedagogically and illustrate both physically and mathematically why the Hubble expansion cannot be regarded as a velocity. Therefore, we suggest to replace the misleading word ‘recession velocity’ to be ‘Hubble recession’ to describe the cosmic expansion. We further derive how the peculiar velocity of a galaxy is related to its observed redshift and proper distance, which has practical use in the galaxy redshift and distance surveys.
Surgically assisted rapid maxillary expansion in adults.
Pogrel, M A; Kaban, L B; Vargervik, K; Baumrind, S
1992-01-01
Twelve adults with maxillary width discrepancy of greater than 5 mm were treated by surgically assisted rapid maxillary expansion. The procedure consisted of bilateral zygomatic buttress and midpalatal osteotomies combined with the use of a tooth-borne orthopedic device postoperatively. Mean palatal expansion of 7.5 mm (range of 6 to 13 mm), measured in the first molar region, was achieved within 3 weeks in all patients. Expansion remained stable during the 12-month study period, with a mean relapse for the entire group of 0.88 +/- 0.48 mm. Morbidity was limited to mild postoperative discomfort. The results of this preliminary study indicated that surgically assisted rapid maxillary expansion is a safe, simple, and reliable procedure for achieving a permanent increase in skeletal maxillary width in adults. Further study is necessary to document the three-dimensional movements of the maxillary segments and long-term stability of the skeletal and dental changes.
High Falls generation station expansion approvals process
Litschko, C. [Lakeland Holding, Bracebridge, ON (Canada)
2005-07-01
Lakeland Holding Ltd. is the parent company for Lakeland Power Distribution Ltd., Bracebridge Generation Ltd., and Lakeland Energy Ltd. This PowerPoint presentation highlighted the High Falls generation expansion process. During construction of the High Falls plant, a concrete foundation was built beside the plant for future expansion. The expansion process involves building a 1,500 kilowatt generator to supply electricity to as many as 1600 households. The presentation described the context and background for the expansion and presented information on the water power generation plants. It presented site specifications as well as the approvals process by which final approval was granted in 2004. Observations and lessons learned from the approval process were identified. figs.
Origami Metamaterials for Tunable Thermal Expansion.
Boatti, Elisa; Vasios, Nikolaos; Bertoldi, Katia
2017-07-01
Materials with engineered thermal expansion, capable of achieving targeted area/volume changes in response to variations in temperature, are important for a number of aerospace, optical, energy, and microelectronic applications. While most of the proposed structures with engineered coefficient of thermal expansion consist of bi-material 2D or 3D lattices, here it is shown that origami metamaterials also provide a platform for the design of systems with a wide range of thermal expansion coefficients. Experiments and simulations are combined to demonstrate that by tuning the geometrical parameters of the origami structure and the arrangement of plates and creases, an extremely broad range of thermal expansion coefficients can be obtained. Differently from all previously reported systems, the proposed structure is tunable in situ and nonporous. © 2017 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
An effective theory of accelerated expansion
Jimenez, Raul; Verde, Licia
2011-01-01
We work out an effective theory of accelerated expansion to describe general phenomena of inflation and acceleration (dark energy) in the Universe. Our aim is to determine from theoretical grounds, in a physically-motivated and model independent way, which and how many (free) parameters are needed to broadly capture the physics of a theory describing cosmic acceleration. Our goal is to make as much as possible transparent the physical interpretation of the parameters describing the expansion. We show that, at leading order, there are five independent parameters, of which one can be constrained via general relativity tests. The other four parameters need to be determined by observing and measuring the cosmic expansion rate only, H(z). Therefore we suggest that future cosmology surveys focus on obtaining an accurate as possible measurement of $H(z)$ to constrain the nature of accelerated expansion (dark energy and/or inflation).
Collisional and collisionless expansion of Yukawa balls.
Piel, Alexander; Goree, John A
2013-12-01
The expansion of Yukawa balls is studied by means of molecular dynamics simulations of collisionless and collisional situations. High computation speed was achieved by using the parallel computing power of graphics processing units. When the radius of the Yukawa ball is large compared to the shielding length, the expansion process starts with the blow-off of the outermost layer. A rarefactive wave subsequently propagates radially inward at the speed of longitudinal phonons. This mechanism is fundamentally different from Coulomb explosions, which employ a self-similar expansion of the entire system. In the collisionless limit, the outer layers carry away most of the available energy. The simulations are compared with analytical estimates. In the collisional case, the expansion process can be described by a nonlinear diffusion equation that is a special case of the porous medium equation.
On Learning Ring-Sum-Expansions
Fischer, Paul; Simon, H. -U.
1992-01-01
The problem of learning ring-sum-expansions from examples is studied. Ring-sum-expansions (RSE) are representations of Boolean functions over the base {#123;small infinum, (+), 1}#125;, which reflect arithmetic operations in GF(2). k-RSE is the class of ring-sum-expansions containing only monomials...... of a 2-CNF and a 1-DNF. Finally the paper presents learning (on-line prediction) algorithms for k-RSE that are optimal with respect to the sample size (worst case mistake bound)...... of length at most k:. term-RSE is the class of ring-sum-expansions having at most I: monomials. It is shown that k-RSE, k>or=1, is learnable while k-term-RSE, k>2, is not learnable if RPnot=NP. Without using a complexity-theoretical hypothesis, it is proven that k-RSE, k>or=1, and k-term-RSE, k>or=2 cannot...
Sampling scheme optimization from hyperspectral data
Debba, P.
2006-01-01
This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized
Anonymous Credential Schemes with Encrypted Attributes
Guajardo Merchan, J.; Mennink, B.; Schoenmakers, B.
2011-01-01
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attribu
Mixed ultrasoft/norm-conserved pseudopotential scheme
Stokbro, Kurt
1996-01-01
A variant of the Vanderbilt ultrasoft pseudopotential scheme, where the norm conservation is released for only one or a few angular channels, is presented. Within this scheme some difficulties of the truly ultrasoft pseudopotentials are overcome without sacrificing the pseudopotential softness. (...
Finite volume renormalization scheme for fermionic operators
Monahan, Christopher; Orginos, Kostas [JLAB
2013-11-01
We propose a new finite volume renormalization scheme. Our scheme is based on the Gradient Flow applied to both fermion and gauge fields and, much like the Schr\\"odinger functional method, allows for a nonperturbative determination of the scale dependence of operators using a step-scaling approach. We give some preliminary results for the pseudo-scalar density in the quenched approximation.
Nonstandard finite difference schemes for differential equations
Mohammad Mehdizadeh Khalsaraei
2014-12-01
Full Text Available In this paper, the reorganization of the denominator of the discrete derivative and nonlocal approximation of nonlinear terms are used in the design of nonstandard finite difference schemes (NSFDs. Numerical examples confirming then efficiency of schemes, for some differential equations are provided. In order to illustrate the accuracy of the new NSFDs, the numerical results are compared with standard methods.
Consolidation of the health insurance scheme
Association du personnel
2009-01-01
In the last issue of Echo, we highlighted CERN’s obligation to guarantee a social security scheme for all employees, pensioners and their families. In that issue we talked about the first component: pensions. This time we shall discuss the other component: the CERN Health Insurance Scheme (CHIS).
Unconditionnally stable scheme for Riccati equation
Dubois, François; 10.1051/proc:2000003
2011-01-01
We present a numerical scheme for the resolution of matrix Riccati equation used in control problems. The scheme is unconditionnally stable and the solution is definite positive at each time step of the resolution. We prove the convergence in the scalar case and present several numerical experiments for classical test cases.
A New Public-Key Encryption Scheme
Hai-Bo Tian; Xi Sun; Yu-Min Wang
2007-01-01
This paper proposes a new public-key encryption scheme which removes one element from the public-key tuple of the original Cramer-Shoup scheme.As a result, a ciphertext is not a quadruple but a triple at the cost of a strong assumption,the third version of knowledge of exponent assumption (KEA3).Under assumptions of KEA3, a decision Diffie-Hellman (DDH) and a variant of target collision resistance (TCRv), the new scheme is proved secure against indistinguishable adaptive chosen ciphertext attack (IND-CCA2).This scheme is as efficient as Damgard ElGamal (DEG) scheme when it makes use of a well-known algorithm for product of exponentiations.The DEG scheme is recently proved IND-CCA1 secure by Bellare and Palacio in ASIACRYPT 2004 under another strong assumption.In addition to our IND-CCA2 secured scheme, we also believe that the security proof procedure itself provides a well insight for ElGamal-based encryption schemes which are secure in real world.
Novel Link Adaptation Schemes for OFDM System
LEI Ming; CAI Peng; XU Yue-shan; ZHANG Ping
2003-01-01
Orthogonal Frequency Division Multiplexing (OFDM) is the most promising technique supporting the high data rate transmission. The combination of the link adaptation and OFDM can further increase the spectral efficiency. In this paper, we put forward two link adaptation schemes for OFDM system which have the advantages of both flexibility and practicability. Both of the two novel link adaptation schemes are based on the iterative mechanism to allocate the bit and power to subcarriers according to their channel gains and noisy levels which are assumed to be already known at the transmitter. The candidate modulation modes are determined freely before the link adaptation schemes are performed. The distinction between the two novel link adaptation schemes is that in the novel scheme A, the modulation mode is upgraded to the neighboring higher-order mode, while in the novel scheme B the modulation is upgraded to the genuine optimal mode. Therefore, the novel scheme A has the advantage of lower complexity and the novel scheme B has the advantage of higher spectral efficiency.
Sampling scheme optimization from hyperspectral data
Debba, P.
2006-01-01
This thesis presents statistical sampling scheme optimization for geo-environ-menta] purposes on the basis of hyperspectral data. It integrates derived products of the hyperspectral remote sensing data into individual sampling schemes. Five different issues are being dealt with.First, the optimized
Phase calibration scheme for a ``T'' array
Ramesh, R.; Subramanian, K. R.; Sastry, Ch. V.
1999-10-01
A calibration scheme based on closure and redundancy techniques is described for correcting the phase errors in the complex visibilities observed with a T-shaped radio interferometer array. Practical details of the scheme are illustrated with reference to the Gauribidanur radioheliograph (GRH).
Privacy Preserving Mapping Schemes Supporting Comparison
Tang, Qiang
2010-01-01
To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the $<, =, >$ re
Privacy Preserving Mapping Schemes Supporting Comparison
Tang, Qiang
2010-01-01
To cater to the privacy requirements in cloud computing, we introduce a new primitive, namely Privacy Preserving Mapping (PPM) schemes supporting comparison. An PPM scheme enables a user to map data items into images in such a way that, with a set of images, any entity can determine the <, =, >
Modeling Students' Mathematics Using Steffe's Fraction Schemes
Norton, Anderson H.; McCloskey, Andrea V.
2008-01-01
Each year, more teachers learn about the successful intervention program known as Math Recovery (USMRC 2008; Wright 2003). The program uses Steffe's whole-number schemes to model, understand, and support children's development of whole-number reasoning. Readers are probably less familiar with Steffe's fraction schemes, which have proven similarly…
A Secure Threshold Group Signature Scheme
Wang Xiaoming; Fu Fangwei
2003-01-01
The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack
Cornering (3+1) sterile neutrino schemes
Maltoni, M; Valle, José W F
2001-01-01
Using the most recent atmospheric neutrino data, as well as short-baseline and tritium $\\beta$-decay data we show that (3+1) sterile neutrino schemes are severely disfavored, in contrast to the theoretically favored (2+2) schemes.
Fuel Thermal Expansion (FTHEXP). [BWR; PWR
Reymann, G. A.
1978-07-01
A model is presented which deals with dimensional changes in LWR fuel pellets caused by changes in temperature. It is capable of dealing with any combination of UO/sub 2/ and PuO/sub 2/ in solid, liquid or mixed phase states, and includes expansion due to the solid-liquid phase change. The function FTHEXP models fuel thermal expansion as a function of temperature, fraction of PuO/sub 2/, and the fraction of fuel which is molten.
Thermal expansion coefficient of binary semiconductors
Kumar, V.; Sastry, B.S.R. [Indian School of Mines, Dhanbad (India). Dept. of Electronics and Instrumentation
2001-07-01
The linear thermal expansion coefficient of tetrahedrally coordinated A{sup II}B{sup VI} and A{sup III}B{sup V} semiconductors has been calculated using plasmon energy data. A simple relation between the bond length and plasmon energy has been derived. The calculated values of thermal expansion coefficient and bond length have been compared with the experimental values and the values reported by different workers. An excellent experiment has been obtained between them. (orig.)
Cluster expansion in the canonical ensemble
Pulvirenti, Elena
2011-01-01
We consider a system of particles confined in a box $\\La\\subset\\R^d$ interacting via a tempered and stable pair potential. We prove the validity of the cluster expansion for the canonical partition function in the high temperature - low density regime. The convergence is uniform in the volume and in the thermodynamic limit it reproduces Mayer's virial expansion providing an alternative and more direct derivation which avoids the deep combinatorial issues present in the original proof.
Index calculation by means of harmonic expansion
Imamura, Yosuke
2015-01-01
We review derivation of superconformal indices by means of supersymmetric localization and spherical harmonic expansion for 3d N=2, 4d N=1, and 6d N=(1,0) supersymmetric gauge theories. We demonstrate calculation of indices for vector multiplets in each dimensions by analysing energy eigenmodes in S^pxR. For the 6d index we consider the perturbative contribution only. We put focus on technical details of harmonic expansion rather than physical applications.
Optimized $\\delta$ expansion for relativistic nuclear models
Krein, G I; Peres-Menezes, D; Nielsen, M; Pinto, M B
1998-01-01
The optimized $\\delta$-expansion is a nonperturbative approach for field theoretic models which combines the techniques of perturbation theory and the variational principle. This technique is discussed in the $\\lambda \\phi^4$ model and then implemented in the Walecka model for the equation of state of nuclear matter. The results obtained with the $\\delta$ expansion are compared with those obtained with the traditional mean field, relativistic Hartree and Hartree-Fock approximations.
On storm weakening during substorm expansion phase
G. L. Siscoe
Full Text Available Iyemori and Rao recently presented evidence that the strength of a magnetic storm, as measured by -Dst, weakens, or its rate of growth slows, during the substorm expansion phase. Yet the expansion phase is known to inject energetic particles into the ring current, which should strengthen the storm. We propose to reconcile these apparently contradictory results by combining the virial theorem and a principle of energy partitioning between energy storage elements in a system with dissipation. As applied to the unloading description of the substorm expansion phase, the virial theorem states that -Dst is proportional to the sum of the total magnetic energy and twice the total kinetic energy in the magnetosphere including the tail. Thus if expansion phase involves converting magnetic energy stored in the tail into kinetic energy stored in the ring current, a drop in -Dst during expansion phase requires that less than half the drop in magnetic energy goes into the ring current, the rest going into the ionosphere. Indeed Weiss et al., have estimated that the energy dissipated in the ionosphere during expansion phase is twice that injected into the ring current. This conclusion is also consistent with the mentioned energy partitioning principle, which requires that more energy be dissipated than transferred between storage elements. While Iyemori and Rao's observations seem to contradict the hypothesis that storms consist at least in part of a sum of substorms, this mode of description might nonetheless be preserved by including the substorm's growth-phase contribution. Then the change in storm strength measured from before the growth phase to after the expansion phase is positive, even though the expansion phase alone makes a negative contribution.
Expansion of Bubbles in Inflationary Universe
Mohazzab, M.; Jabbari, M. M. Sheikh; Salehi, H.
1995-01-01
We show that particle production during the expansion of bubbles of true vacuum in the sea of false vacuum is possible and calculate the resulting rate. As a result the nucleated bubbles cannot expand due to the transfer of false vacuum energy to the created particles inside the bubbles. Therefore all the inflationary models dealing with the nucleation and expansion of the bubbles (including extended inflation) may not be viable.
Expansion of bubbles in inflationary universe
Mohazzab, M
1995-01-01
We show that particle production during the expansion of bubbles of true vacuum in the sea of false vacuum is possible and calculate the resulting rate. As a result the nucleated bubbles cannot expand due to the transfer of false vacuum energy to the created particles inside the bubbles. Therefore all the inflationary models dealing with the nucleation and expansion of the bubbles (including extended inflation) may not be viable.
Thermal Expansion Coefficients of Thin Crystal Films
无
2005-01-01
The formulas for atomic displacements and Hamiltonian of a thin crystal film in phonon occupation number representation are obtained with the aid of Green's function theory. On the basis of these results, the formulas for thermal expansion coefficients of the thin crystal film are derived with the perturbation theory, and the numerical calculations are carried out. The results show that the thinner films have larger thermal expansion coefficients.
Fixed Point Theorems for Times Reasonable Expansive Mapping
Chen Chunfang
2008-01-01
Full Text Available Abstract Based on previous notions of expansive mapping, times reasonable expansive mapping is defined. The existence of fixed point for times reasonable expansive mapping is discussed and some new results are obtained.
ZHAO HaiBo; WANG XiuMing
2008-01-01
In this paper, an optimized staggered variable-grid finite-difference (FD) method is developed in veloc-ity-stress elastic wave equations. On the basis of the dispersion-relation-preserving (DRP), a fourth-order finite-difference operator on non-uniform grids is constructed. The proposed algorithm is a continuous variable-grid method. It does not need interpolations for the field variables between re-gions with the fine spacing and the coarse one. The accuracy of the optimized scheme has been veri-fied with an analytical solution and a regular staggered-grid FD method for the eighth order accuracy in space. The comparisons of the proposed scheme with the variable-grid FD method based on Taylor series expansion are made. It is demonstrated that this optimized scheme has less dispersion errors than that with Taylor's series expansion. Thus, the proposed scheme uses coarser grids in numerical simulations than that constructed by the Taylor's series expansion. Finally, the capability of the opti-mized FD is demonstrated for a complex cross-well acoustic simulation. The numerical experiment shows that this method greatly saves storage requirements and computational time, and is stable.
Autonomous droop scheme with reduced generation cost
Nutkani, Inam Ullah; Loh, Poh Chiang; Blaabjerg, Frede
2013-01-01
Droop scheme has been widely applied to the control of Distributed Generators (DGs) in microgrids for proportional power sharing based on their ratings. For standalone microgrid, where centralized management system is not viable, the proportional power sharing based droop might not suit well since...... DGs are usually of different types unlike synchronous generators. This paper presents an autonomous droop scheme that takes into consideration the operating cost, efficiency and emission penalty of each DG since all these factors directly or indirectly contributes to the Total Generation Cost (TGC......) of the overall microgrid. Comparing it with the traditional scheme, the proposed scheme has retained its simplicity, which certainly is a feature preferred by the industry. The overall performance of the proposed scheme has been verified through simulation and experiment....
Two level scheme solvers for nuclear spectroscopy
Jansson, Kaj; DiJulio, Douglas; Cederkäll, Joakim
2011-10-01
A program for building level schemes from γ-spectroscopy coincidence data has been developed. The scheme builder was equipped with two different algorithms: a statistical one based on the Metropolis method and a more logical one, called REMP (REcurse, Merge and Permute), developed from scratch. These two methods are compared both on ideal cases and on experimental γ-ray data sets. The REMP algorithm is based on coincidences and transition energies. Using correct and complete coincidence data, it has solved approximately half a million schemes without failures. Also, for incomplete data and data with minor errors, the algorithm produces consistent sub-schemes when it is not possible to obtain a complete scheme from the provided data.
An Efficient Forward Secure Signature Scheme
YU Jia; KONG Fan-yu; LI Da-xing
2006-01-01
A new efficient forward secure signature scheme based on bilinear pairings is presented in this paper.Each complexity of key generation, key update, signing and verifying algorithms in this scheme is O(1) in terms of the total number of time periods T. Because a new structure in node secret key storage and a unique strategy in key update are employed, the signing and verifying costs don't grow when T increases. At the same time, the key generation and key update algorithms are efficiently constructed thanks to using the pre-order traversal technique of binary trees. Compared with other schemes based on bilinear pairings, the signature size in this scheme is very short, which doesn't change with T increasing. The scheme is forward secure in random oracle model assuming CDH problem is hard.
A DRM Scheme Using File Physical Information
Cheng Qu
2015-05-01
Full Text Available A digital file has both the content and physical information, however the latter was not fully made use of in previous digital rights management (DRM systems. This paper introduces the idea of making use of file physical information to improve the system security and provides a scheme based on this idea to resist the replay attack in DRM systems. In our scheme, compared to commonly used schemes, we remove the dependency on continuous online connection from the client-side to the server-side or the usage of tamper-proof hardware, such as Trusted Platform Module (TPM. The scheme is appropriate for offline digital content usage. Primary experiments demonstrate that our scheme is secure enough to be put into practice use.
Comparison among sea surface roughness schemes
无
2005-01-01
Based on the measurements from the US National Data Buoy Center 3-m discus buoy site No.44004 (38.5°N, 70.47°W) from January 1 to March 31 of 2003, with the COARE algorithm (Version 3.0), the results from four parameterization schemes developed recently for sea surface aerodynamic roughness length were compared with each other. Calculations of frictional speed u*, drag coefficient Cd and wind stress τ indicate that the calculated frictional velocities from the four schemes (8.50%-16.20%, the normalized standard error estimate, or NSEE), the computed drag coefficients and wind stress (respectively 15.08%-28.67% and 17.26%-50.59% NSEE) are reasonable. Schemes YT96 and GW03 are consistent. The O02 scheme gives overestimated values for u* and Cd. Schemes TY01 and GW03 display discontinuous characteristics in handling young wave data.
A novel key management scheme using biometrics
Sui, Yan; Yang, Kai; Du, Yingzi; Orr, Scott; Zou, Xukai
2010-04-01
Key management is one of the most important issues in cryptographic systems. Several important challenges in such a context are represented by secure and efficient key generation, key distribution, as well as key revocation. Addressing such challenges requires a comprehensive solution which is robust, secure and efficient. Compared to traditional key management schemes, key management using biometrics requires the presence of the user, which can reduce fraud and protect the key better. In this paper, we propose a novel key management scheme using iris based biometrics. Our newly proposed scheme outperforms traditional key management schemes as well as some existing key-binding biometric schemes in terms of security, diversity and/or efficiency.
Expansive Soil Crack Depth under Cumulative Damage
Bei-xiao Shi
2014-01-01
Full Text Available The crack developing depth is a key problem to slope stability of the expansive soil and its project governance and the crack appears under the roles of dry-wet cycle and gradually develops. It is believed from the analysis that, because of its own cohesion, the expansive soil will have a certain amount of deformation under pulling stress but without cracks. The soil body will crack only when the deformation exceeds the ultimate tensile strain that causes cracks. And it is also believed that, due to the combined effect of various environmental factors, particularly changes of the internal water content, the inherent basic physical properties of expansive soil are weakened, and irreversible cumulative damages are eventually formed, resulting in the development of expansive soil cracks in depth. Starting from the perspective of volumetric strain that is caused by water loss, considering the influences of water loss rate and dry-wet cycle on crack developing depth, the crack developing depth calculation model which considers the water loss rate and the cumulative damages is established. Both the proposal of water loss rate and the application of cumulative damage theory to the expansive soil crack development problems try to avoid difficulties in matrix suction measurement, which will surely play a good role in promoting and improving the research of unsaturated expansive soil.
Thermal expansion of doped lanthanum gallates
K T Jacob; S Jain; V S Saji; P V K Srikanth
2010-08-01
Thermal expansion of several compositions of Sr and Mg-doped LaGaO3 including an -site deficient composition (La0.9Sr0.1)0.98(Ga0.8Mg0.2)O2.821 were measured in the temperature range from 298 to 1273 K. The effect of doping on thermal expansion was studied by varying the composition at one site of the perovskite structure (either or ), while keeping the composition at the other site invariant. Thermal expansion varied nonlinearly with temperature and exhibited an inflexion between 550 and 620 K, probably related to the change in crystal structure from orthorhombic to rhombohedral. The dependence of average thermal expansion coefficient (av) on the dopant concentration on either or site of the perovskite structure was found to be linear, when the composition at the other site was kept constant. Mg doping on the -site had a greater effect on the average thermal expansion coefficient than Sr doping on the -site. Cation deficiency at the -site decreases thermal expansion when compositions at both sites are held constant.
Runtong Zhang
2015-01-01
Full Text Available Wireless sensor network (WSN, which has broad application prospects, consists of small nodes with sensing, computation, and communications capabilities. IPv6 is used over low power WPAN (wireless personal area network which is run by 6LoWPAN technology on the LoWPAN devices. In order to establish seamless connection of two heterogeneous networks, that is, WSN and IPv6 network, this paper proposes an improved energy conservation and interconnection scheme (ECIS based on the analysis of the current schemes. Detailed design of each functional component in the new scheme is proposed, and an expansion of the SSCS module in NS2 802.15.4 simulator is examined. Comprehensive experiments on the simulation platform show that the newly proposed scheme is advantageous over existing results.
Park, Ju Yeop; In, Wang Kee; Chun, Tae Hyun; Oh, Dong Seok [Korea Atomic Energy Research Institute, Taejeon (Korea)
2000-02-01
The development of orthogonal 2-dimensional numerical code is made. The present code contains 9 kinds of turbulence models that are widely used. They include a standard k-{epsilon} model and 8 kinds of low Reynolds number ones. They also include 6 kinds of numerical schemes including 5 kinds of low order schemes and 1 kind of high order scheme such as QUICK. To verify the present numerical code, pipe flow, channel flow and expansion pipe flow are solved by this code with various options of turbulence models and numerical schemes and the calculated outputs are compared to experimental data. Furthermore, the discretization error that originates from the use of standard k-{epsilon} turbulence model with wall function is much more diminished by introducing a new grid system than a conventional one in the present code. 23 refs., 58 figs., 6 tabs. (Author)
Nonperturbative linked-cluster expansions in long-range ordered quantum systems
Ixert, Dominik; Schmidt, Kai Phillip
2016-11-01
We introduce a generic scheme to perform nonperturbative linked cluster expansions in long-range ordered quantum phases. Clusters are considered to be surrounded by an ordered reference state leading to effective edge fields in the exact diagonalization on clusters, which break the associated symmetry of the ordered phase. Two approaches, based either on a self-consistent solution of the order parameter or on minimal sensitivity with respect to the ground-state energy per site, are formulated to find the optimal edge field in each NLCE order. Furthermore, we investigate the scaling behavior of the NLCE data sequences towards the infinite-order limit. We apply our scheme to gapped and gapless ordered phases of XXZ Heisenberg models on various lattices and for spins 1/2 and 1 using several types of cluster expansions ranging from a full-graph decomposition, rectangular clusters, up to more symmetric square clusters. It is found that the inclusion of edge fields allows to regularize nonperturbative linked-cluster expansions in ordered phases yielding convergent data sequences. This includes the long-range spin-ordered ground state of the spin-1/2 and spin-1 Heisenberg model on the square and triangular lattice as well as the trimerized valence bond crystal of the spin-1 Heisenberg model on the kagome lattice.
Rapid expansion method (REM) for time‐stepping in reverse time migration (RTM)
Pestana, Reynam C.
2009-01-01
We show that the wave equation solution using a conventional finite‐difference scheme, derived commonly by the Taylor series approach, can be derived directly from the rapid expansion method (REM). After some mathematical manipulation we consider an analytical approximation for the Bessel function where we assume that the time step is sufficiently small. From this derivation we find that if we consider only the first two Chebyshev polynomials terms in the rapid expansion method we can obtain the second order time finite‐difference scheme that is frequently used in more conventional finite‐difference implementations. We then show that if we use more terms from the REM we can obtain a more accurate time integration of the wave field. Consequently, we have demonstrated that the REM is more accurate than the usual finite‐difference schemes and it provides a wave equation solution which allows us to march in large time steps without numerical dispersion and is numerically stable. We illustrate the method with post and pre stack migration results.
Numerical experiment of anharmonic oscillators by using the symplectic scheme-shooting method
无
2002-01-01
Symplectic scheme-shooting method (SSSM) is applied to solve the energy eigenvalues of anharmonic oscillators characterized by the potentials V(x)=λx4 and V(x)=(1/2)x2+λx2α with α=2,3,4 and doubly anharmonic oscillators characterized by the potentials V(x)=(1/2)x2+λ1x4+λ2x6, and a high order symplectic scheme tailored to the "time"-dependent Hamiltonian function is presented. The numerical results illustrate that the energy eigenvalues of anharmonic oscillators with the symplectic scheme-shooting method are in good agreement with the numerical accurate ones obtained from the non-perturbative method by using an appropriately scaled basis for the expansion of each eigenfunction; and the energy eigenvalues of doubly anharmonic oscillators with the sympolectic scheme-shooting method are in good agreement with the exact ones and are better than the results obtained from the four-term asymptotic series. Therefore, the symplectic scheme-shooting method, which is very simple and is easy to grasp, is a good numerical algorithm.
Negative thermal expansion materials: technological key for control of thermal expansion.
Takenaka, Koshi
2012-02-01
Most materials expand upon heating. However, although rare, some materials contract upon heating. Such negative thermal expansion (NTE) materials have enormous industrial merit because they can control the thermal expansion of materials. Recent progress in materials research enables us to obtain materials exhibiting negative coefficients of linear thermal expansion over -30 ppm K(-1). Such giant NTE is opening a new phase of control of thermal expansion in composites. Specifically examining practical aspects, this review briefly summarizes materials and mechanisms of NTE as well as composites containing NTE materials, based mainly on activities of the last decade.
Secure Electronic Cash Scheme with Anonymity Revocation
Baoyuan Kang
2016-01-01
Full Text Available In a popular electronic cash scheme, there are three participants: the bank, the customer, and the merchant. First, a customer opens an account in a bank. Then, he withdraws an e-cash from his account and pays it to a merchant. After checking the electronic cash’s validity, the merchant accepts it and deposits it to the bank. There are a number of requirements for an electronic cash scheme, such as, anonymity, unforgeability, unreusability, divisibility, transferability, and portability. Anonymity property of electronic cash schemes can ensure the privacy of payers. However, this anonymity property is easily abused by criminals. In 2011, Chen et al. proposed a novel electronic cash system with trustee-based anonymity revocation from pairing. On demand, the trustee can disclose the identity for e-cash. But, in this paper we point out that Chen et al.’s scheme is subjected to some drawbacks. To contribute secure electronic cash schemes, we propose a new offline electronic cash scheme with anonymity revocation. We also provide the formally security proofs of the unlinkability and unforgeability. Furthermore, the proposed scheme ensures the property of avoiding merchant frauds.
Ponzi scheme diffusion in complex networks
Zhu, Anding; Fu, Peihua; Zhang, Qinghe; Chen, Zhenyue
2017-08-01
Ponzi schemes taking the form of Internet-based financial schemes have been negatively affecting China's economy for the last two years. Because there is currently a lack of modeling research on Ponzi scheme diffusion within social networks yet, we develop a potential-investor-divestor (PID) model to investigate the diffusion dynamics of Ponzi scheme in both homogeneous and inhomogeneous networks. Our simulation study of artificial and real Facebook social networks shows that the structure of investor networks does indeed affect the characteristics of dynamics. Both the average degree of distribution and the power-law degree of distribution will reduce the spreading critical threshold and will speed up the rate of diffusion. A high speed of diffusion is the key to alleviating the interest burden and improving the financial outcomes for the Ponzi scheme operator. The zero-crossing point of fund flux function we introduce proves to be a feasible index for reflecting the fast-worsening situation of fiscal instability and predicting the forthcoming collapse. The faster the scheme diffuses, the higher a peak it will reach and the sooner it will collapse. We should keep a vigilant eye on the harm of Ponzi scheme diffusion through modern social networks.
A Spatial Domain Quantum Watermarking Scheme
Wei, Zhan-Hong; Chen, Xiu-Bo; Xu, Shu-Jiang; Niu, Xin-Xin; Yang, Yi-Xian
2016-07-01
This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity. Supported by the National Natural Science Foundation of China under Grant Nos. 61272514, 61170272, 61373131, 61121061, 61411146001, the program for New Century Excellent Talents under Grant No. NCET-13-0681, the National Development Foundation for Cryptological Research (Grant No. MMJJ201401012) and the Fok Ying Tung Education Foundation under Grant No. 131067, and the Shandong Provincial Natural Science Foundation of China under Grant No. ZR2013FM025
Exploiting Same Scale Similarity in Fisher's Scheme
ZHAO Yao
2001-01-01
The method proposed by Y. Fisher is the most popular fractal image coding scheme. In his scheme, domain blocks are constrained to be twice as large as range blocks in order to ensure the convergence of the iterative decoding stage. However,this constraint has limited the fractal encoder to exploit the self-similarity of the original image. In order to overcome the shortcoming, a novel scheme using same-sized range and domain blocks is proposed in the paper. Experimental results show the improvements in compression performance.
Mission Mangalam scheme: Ex ploring the opportunities.
Dr. Pallavi A. Upadhyay*,
2015-01-01
Full Text Available Background Mission Mangalam has been launched by the Gujarat Government in 2010.It is an integrated poverty alleviation approach and an initiative to empower women. Mission Mangalam is helping women to earn their livelihood and to become independent. These Sakhimandals are linked to banks to fulfill the requirement of fund. Sakhimandals get financial assistance from banks. Some of the core benefits of the scheme can be linked with the health sector as well; Objectives (1 To review the scheme of Mission Mangalam (2 To explore the possibility of health linkage with the scheme (3 To study the perception of beneficiaries and their socio- demographic profile; Methodology: A cross sectional study. Samplesize-152 women members of Sakhimandals in Saraspur ward. Health of all the members of Mandals of Saraspur was checked by the Ahmedabad Municipal Corporation. Women of Sakhimandals were interviewed to understand their perception about the scheme as well as about any other health benefit they have experienced for themselves or their family members. 3 Additionally, Community based survey of 50 BPL families was carried out to assess the proportion of families covered under the scheme of Mission Mangalam. Results: Mean age of these women (n=152 was 31.81 years with SD=6.74. Education of maximum number 71(47% of women was up to secondary. Mean income was 5460 Rs/month with SD=1840 .Mean of number of family members is 5.4. 109 (72% women are residing in chali area. 98(64% women were told about this scheme by social worker, others were told about the scheme by her friend or UCD official. Paired t test was carried out to find increase in Hb levels of the beneficiary women. It was found to be significant (p=0.007, t=15.64. Age of women is associated with habit to save money. (p=0.003. There are only 22 (44% out of 50 families visited, who have at least one member enrolled under the scheme. More stringent efforts for universal coverage have to be made by
A SUBDIVISION SCHEME FOR VOLUMETRIC MODELS
GhulamMustafa; LiuXuefeng
2005-01-01
In this paper, a subdivision scheme which generalizes a surface scheme in previous papers to volume meshes is designed. The scheme exhibits significant control over shrink-age/size of volumetric models. It also has the ability to conveniently incorporate boundaries and creases into a smooth limit shape of models. The method presented here is much simpler and easier as compared to MacCracken and Joy's. This method makes no restrictions on the local topology of meshes. Particularly, it can be applied without any change to meshes of nonmanifold topology.
Consistency of non-minimal renormalisation schemes
Jack, I
2016-01-01
Non-minimal renormalisation schemes such as the momentum subtraction scheme (MOM) have frequently been used for physical computations. The consistency of such a scheme relies on the existence of a coupling redefinition linking it to MSbar. We discuss the implementation of this procedure in detail for a general theory and show how to construct the relevant redefinition up to three-loop order, for the case of a general theory of fermions and scalars in four dimensions and a general scalar theory in six dimensions.
Optimal Sales Schemes for Network Goods
Parakhonyak, Alexei; Vikander, Nick
This paper examines the optimal sequencing of sales in the presence of network externalities. A firm sells a good to a group of consumers whose payoff from buying is increasing in total quantity sold. The firm selects the order to serve consumers so as to maximize expected sales. It can serve all...... consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...
Chaotic cryptographic scheme and its randomness evaluation
Stoyanov, B. P.
2012-10-01
We propose a new cryptographic scheme based on the Lorenz chaos attractor and 32 bit bent Boolean function. We evaluated the keystream generated by the scheme with batteries of the NIST statistical tests. We also applied a number of statistical analysis techniques, such as calculating histograms, correlations between two adjacent pixels, information entropy, and differential resistance, all refer to images encrypted by the proposed system. The results of the analysis show that the new cryptographic scheme ensures a secure way for sending digital data with potential applications in real-time image encryption.
EFFICIENT IMAGE TRANSMISSION SCHEME IN FMT SYSTEM
Qi Zhongrui; Gao Zhenming
2005-01-01
An efficient image transmission scheme is proposed based on byte partition and adaptive sub-channel distribution technique in Filtered MultiTone (FMT) system over frequency selective slow fading channel. According to the simulation results and analysis of a typical image with matlab, improvement in Peak Signal to Noise Ratio (PSNR) of the received image and low complexity for equalization is demonstrated remarkably. Comparing with no adaptive and no actual channel equalization scheme, the proposed scheme saves over 6 dB when PSNR=40 dB.
Improved Quantum Signature Scheme with Weak Arbitrator
Su, Qi; Li, Wen-Min
2013-09-01
In this paper, we find a man-in-the-middle attack on the quantum signature scheme with a weak arbitrator (Luo et al., Int. J. Theor. Phys., 51:2135, 2012). In that scheme, the authors proposed a quantum signature based on quantum one way function which contains both verifying the signer phase and verifying the signed message phase. However, after our analysis we will show that Eve can adopt different strategies in respective phases to forge the signature without being detected. Then we present an improved scheme to increase the security.
Practical Coding Schemes for Cognitive Overlay Radios
Kurniawan, Ernest; Rini, Stefano
2012-01-01
We develop practical coding schemes for the cognitive overlay radios as modeled by the cognitive interference channel, a variation of the classical two user interference channel where one of the transmitters has knowledge of both messages. Inspired by information theoretical results, we develop a coding strategy for each of the three parameter regimes where capacity is known. A key feature of the capacity achieving schemes in these regimes is the joint decoding of both users' codewords, which we accomplish by performing a posteriori probability calculation over a combined trellis. The schemes are shown to perform close to the capacity limit with low error rate.
Cognitive radio networks dynamic resource allocation schemes
Wang, Shaowei
2014-01-01
This SpringerBrief presents a survey of dynamic resource allocation schemes in Cognitive Radio (CR) Systems, focusing on the spectral-efficiency and energy-efficiency in wireless networks. It also introduces a variety of dynamic resource allocation schemes for CR networks and provides a concise introduction of the landscape of CR technology. The author covers in detail the dynamic resource allocation problem for the motivations and challenges in CR systems. The Spectral- and Energy-Efficient resource allocation schemes are comprehensively investigated, including new insights into the trade-off
Finite-volume scheme for anisotropic diffusion
Es, Bram van, E-mail: bramiozo@gmail.com [Centrum Wiskunde & Informatica, P.O. Box 94079, 1090GB Amsterdam (Netherlands); FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands); Koren, Barry [Eindhoven University of Technology (Netherlands); Blank, Hugo J. de [FOM Institute DIFFER, Dutch Institute for Fundamental Energy Research, The Netherlands" 1 (Netherlands)
2016-02-01
In this paper, we apply a special finite-volume scheme, limited to smooth temperature distributions and Cartesian grids, to test the importance of connectivity of the finite volumes. The area of application is nuclear fusion plasma with field line aligned temperature gradients and extreme anisotropy. We apply the scheme to the anisotropic heat-conduction equation, and compare its results with those of existing finite-volume schemes for anisotropic diffusion. Also, we introduce a general model adaptation of the steady diffusion equation for extremely anisotropic diffusion problems with closed field lines.
An Optimal Labeling Scheme for Ancestry Queries
2009-01-01
An ancestry labeling scheme assigns labels (bit strings) to the nodes of rooted trees such that ancestry queries between any two nodes in a tree can be answered merely by looking at their corresponding labels. The quality of an ancestry labeling scheme is measured by its label size, that is the maximal number of bits in a label of a tree node. In addition to its theoretical appeal, the design of efficient ancestry labeling schemes is motivated by applications in web search engines. For this p...
Preliminary thermal expansion screening data for tuffs
Lappin, A.R.
1980-03-01
A major variable in evaluating the potential of silicic tuffs for use in geologic disposal of heat-producing nuclear wastes is thermal expansion. Results of ambient-pressure linear expansion measurements on a group of tuffs that vary treatly in porosity and mineralogy are presente here. Thermal expansion of devitrified welded tuffs is generally linear with increasing temperature and independent of both porosity and heating rate. Mineralogic factors affecting behavior of these tuffs are limited to the presence or absence of cristobalite and altered biotite. The presence of cristobalite results in markedly nonlinear expansion above 200{sup 0}C. If biotite in biotite-hearing rocks alters even slightly to expandable clays, the behavior of these tuffs near the boiling point of water can be dominated by contraction of the expandable phase. Expansion of both high- and low-porosity tuffs containing hydrated silicic glass and/or expandable clays is complex. The behavior of these rocks appears to be completely dominated by dehydration of hydrous phases and, hence, should be critically dependent on fluid pressure. Valid extrapolation of the ambient-pressure results presented here to depths of interest for construction of a nuclear-waste repository will depend on a good understanding of the interaction of dehydration rates and fluid pressures, and of the effects of both micro- and macrofractures on the response of tuff masss.
Expansion Under Climate Change: The Genetic Consequences.
Garnier, Jimmy; Lewis, Mark A
2016-11-01
Range expansion and range shifts are crucial population responses to climate change. Genetic consequences are not well understood but are clearly coupled to ecological dynamics that, in turn, are driven by shifting climate conditions. We model a population with a deterministic reaction-diffusion model coupled to a heterogeneous environment that develops in time due to climate change. We decompose the resulting travelling wave solution into neutral genetic components to analyse the spatio-temporal dynamics of its genetic structure. Our analysis shows that range expansions and range shifts under slow climate change preserve genetic diversity. This is because slow climate change creates range boundaries that promote spatial mixing of genetic components. Mathematically, the mixing leads to so-called pushed travelling wave solutions. This mixing phenomenon is not seen in spatially homogeneous environments, where range expansion reduces genetic diversity through gene surfing arising from pulled travelling wave solutions. However, the preservation of diversity is diminished when climate change occurs too quickly. Using diversity indices, we show that fast expansions and range shifts erode genetic diversity more than slow range expansions and range shifts. Our study provides analytical insight into the dynamics of travelling wave solutions in heterogeneous environments.
Mananga, Eugene S.; Reid, Alicia E.
2013-01-01
This paper presents a study of finite pulse widths for the BABA pulse sequence using the Floquet-Magnus expansion (FME) approach. In the FME scheme, the first order ? is identical to its counterparts in average Hamiltonian theory (AHT) and Floquet theory (FT). However, the timing part in the FME approach is introduced via the ? function not present in other schemes. This function provides an easy way for evaluating the spin evolution during the time in between' through the Magnus expansion of the operator connected to the timing part of the evolution. The evaluation of ? is particularly useful for the analysis of the non-stroboscopic evolution. Here, the importance of the boundary conditions, which provide a natural choice of ? , is ignored. This work uses the ? function to compare the efficiency of the BABA pulse sequence with ? and the BABA pulse sequence with finite pulses. Calculations of ? and ? are presented.
DEVELOPMENT AND APPLICATIONS OF WENO SCHEMES IN CONTINUUM PHYSICS
无
2001-01-01
This paper briefly presents the general ideas of high order accurate weighted essentially non-oscillatory (WENO) schemes, and describes the similarities and differences of the two classes of WENO schemes: finite volume schemes and finite difference schemes. We also briefly mention a recent development of WENO schemes,namely an adaptive approach within the finite difference framework using smooth time dependent curvilinear coordinates.``
SUPPLEMENT AND IMPROVEMENT OF HOLLY-PREISSMANN SCHEME
XIE Zuo-tao; ZHANG Xiao-feng; TAN Guang-ming
2004-01-01
Using the undetermined coefficient method, Holly-Preissmann scheme is improved effectively. The scheme with the minus velocity is added, and a new conservative scheme is also presented on the basis of original scheme. The simulations of the new scheme accord with the exact result, which enhances its applicability in the engineering.
Liu, Chaoyang; Wang, Zhenguo; Wang, Hongbo; Sun, Mingbo
2016-12-01
Mixing characteristics of a transverse jet injection into supersonic crossflows through an expansion plate are investigated using large eddy simulation (LES), where the expansion effects on the mixing are analyzed emphatically by comparing to the flat-plate counterpart. An adaptive central-upwind weighted essentially non-oscillatory (WENO) scheme along with multi-threaded and multi-process MPI/OpenMP parallel is adopted to improve the accuracy and efficiency of the calculations. Progressive mesh refinement study is performed to assess the grid resolution and solution convergence. Statistic results obtained are compared to the experimental data and recently performed classical numerical simulation, which validates the reliability of the present LES codes. Firstly, the jet mixing mechanisms in the flowfield with expansion plate are revealed. It indicates that the large-scale vortices in the windward side of jet plume induced by Kelvin-Helmholtz (K-H) instability contribute to the mixing in the near-field, while the entrainment by the counter-rotating vortices and molecular diffusion dominate the mixing process in the far-field. Furthermore, the effects of wall expansion on the flow and mixing characteristics are discussed. The boundary layer across the expansion corner is relaminarized and the profiles of streamwise velocity are distinctly changed. Then the separation region ahead of jet plume is more close to the wall, and the breaking process of large-scale vortices in the windward side of jet plume starts earlier. However, the favorable pressure gradient generated by wall expansion reduces the mixing efficiency and brings a greater total pressure loss.
[Forum on tissue expansion. Expansion of the scalp. Surgical techniques and clinical applications].
Foyatier, J L; Delay, E; Comparin, J P; Latarjet, J; Masson, C L
1993-02-01
Repair of all forms of alopecia is one of the principal applications of scalp expansion. The authors have inserted 400 expansion prostheses, including 20 in the scalp. The surgical technique, choice of material and various types of flaps are described and illustrated by clinical cases of extensive alopecia.
Influence of MgO-type Expansive Agent Hydration Behaviors on Expansive Properties of Concrete
LU Xiaolin; GENG Fei; ZHANG Hongbo; CHEN Xiong
2011-01-01
The hydration behaviors and expansive properties of MgO-type expansive agent curing at different temperatures and environment were investigated. When the curing temperatures changed from 25℃ to 50 ℃, the conductivities of MgO samples increased from 40 to 80 μ s/cm,and the hydrations of MgO were quickened up obviously. Through SEM observation, the hydration product of MgO cured at 50 ℃ for 28 day was about 2-3 μ m in length. The expansion of pastes with 5% of the MgO-type expansive agent was from 0.36% to 1.01% when the curing temperature changed from 25℃ to 50 ℃. When 8% of the MgO-type expansive agent was added, the early shrinkage of concrete was reduced. The expansion ratio increased with the curing temperature, and the expansive cracking of concrete with MgO-type expansive agent might be decreased by blending fly ash.
Torsion-free Sheaves and ACM Schemes
Greco, S; Spreafico, M L
2012-01-01
In this paper we study short exact sequences $ 0 \\to \\mathcal P \\to \\mathcal N \\to \\ii_D(k) \\to 0 $ with $ \\mathcal P, \\mathcal N $ torsion--free sheaves and $ D $ closed projective scheme. This is a classical way to construct and study projective schemes (e.g. see \\cite{hart-1974}, \\cite{hart-2}, \\cite{mdp}, \\cite{serre-1960}). In particular, we give homological conditions on $ \\mathcal P $ and $ \\mathcal N $ that force $ D $ to be ACM, without constrains on its codimension. As last result, we prove that if $ \\mathcal N $ is a higher syzygy sheaf of an ACM scheme $ X,$ the scheme $ D $ we get contains $ X.$
High order compact schemes for gradient approximation
无
2010-01-01
In this paper, we propose three gradient recovery schemes of higher order for the linear interpolation. The first one is a weighted averaging method based on the gradients of the linear interpolation on the uniform mesh, the second is a geometric averaging method constructed from the gradients of two cubic interpolation on macro element, and the last one is a local least square method on the nodal patch with cubic polynomials. We prove that these schemes can approximate the gradient of the exact solution on the symmetry points with fourth order. In particular, for the uniform mesh, we show that these three schemes are the same on the considered points. The last scheme is more robust in general meshes. Consequently, we obtain the superconvergence results of the recovered gradient by using the aforementioned results and the supercloseness between the finite element solution and the linear interpolation of the exact solution. Finally, we provide several numerical experiments to illustrate the theoretical results.
The Effective Key Length of Watermarking Schemes
Bas, Patrick
2012-01-01
Whereas the embedding distortion, the payload and the robustness of digital watermarking schemes are well understood, the notion of security is still not completely well defined. The approach proposed in the last five years is too theoretical and solely considers the embedding process, which is half of the watermarking scheme. This paper proposes a new measurement of watermarking security, called the effective key length, which captures the difficulty for the adversary to get access to the watermarking channel. This new methodology is applied to additive spread spectrum schemes where theoretical and practical computations of the effective key length are proposed. It shows that these schemes are not secure as soon as the adversary gets observations in the Known Message Attack context.
Designing optimal sampling schemes for field visits
Debba, Pravesh
2008-10-01
Full Text Available This is a presentation of a statistical method for deriving optimal spatial sampling schemes. The research focuses on ground verification of minerals derived from hyperspectral data. Spectral angle mapper (SAM) and spectral feature fitting (SFF...
Efficient Identity Based Public Verifiable Signcryption Scheme
Kushwah, Prashant
2011-01-01
Signcryption is a cryptographic primitive which performs encryption and signature in a single logical step. In conventional signcryption only receiver of the signcrypted text can verify the authenticity of the origin i.e. signature of the sender on the message after decrypting the cipher text. In public verifiable signcryption scheme anyone can verify the authenticity of the origin who can access the signcrypted text i.e. signature of the sender on the cipher text. Public verifiable signcryption scheme in which the receiver can convince a third party, by providing additional information other than his private key along with the signcryption is called third party verifiable signcryption schemes. In this paper we proposed an efficient identity based public verifiable signcryption scheme with third party verification and proved its security in the random oracle model.
Lifting scheme of symmetric tight wavelets frames
ZHUANG BoJin; YUAN WeiTao; PENG LiZhong
2008-01-01
This paper proposes a method to realize the lifting scheme of tight frame wavelet filters. As for 4-channel tight frame wavelet filter, the tight frame transforms' ma-trix is 2×4, but the lifting scheme transforms' matrix must be 4×4. And in the case of 3-channel tight frame wavelet filter, the transforms' matrix is 2×3, but the lifting scheme transforms' matrix must be 3×3. In order to solve this problem, we intro-duce two concepts: transferred polyphase matrix for 4-channel filters and trans-ferred unitary matrix for 3-channel filters. The transferred polyphase matrix is sym-metric/antisymmetric. Thus, we use this advantage to realize the lifting scheme.
Asymmetric Watermarking Scheme Based on Correlation Testing
Rinaldi Munir
2007-06-01
Full Text Available Abstract Asymmetric watermarking is the second generation of watermarking scheme which uses different keys for embedding and detecting watermark. Key for embedding is private or secret, but key for detecting can be available publicly and everyone who has the key can detect watermark Watermark detection does not need to be original multimedia data. Detection of watermark is realized using correlation test between public key and multimedia data received. In most of schemes, private key is the watermark itself; public key is public watermark which correlates to the private watermark This paper presents concept of asymmetric watermarking scheme that based on correlation test and reviews some schemes of asymmetric watermarking that have been proposed by researchers. Keywords: asymmetric watermarking, private key, public key, watermark., multimeelia,:correlation.
A lightweight authentication scheme with user untraceability
Kuo-Hui YEH
2015-01-01
With the rapid growth of electronic commerce and associated demands on variants of Internet based applications, application systems providing network resources and business services are in high demand around the world. To guarantee ro-bust security and computational efficiency for service retrieval, a variety of authentication schemes have been proposed. How-ever, most of these schemes have been found to be lacking when subject to a formal security analysis. Recently, Changet al. (2014) introduced a formally provable secure authentication protocol with the property of user-untraceability. Unfortunately, based on our analysis, the proposed scheme fails to provide the property of user-untraceability as claimed, and is insecure against user impersonation attack, server counterfeit attack, and man-in-the-middle attack. In this paper, we demonstrate the details of these malicious attacks. A security enhanced authentication scheme is proposed to eliminate all identified weaknesses.
An efficient medical image compression scheme.
Li, Xiaofeng; Shen, Yi; Ma, Jiachen
2005-01-01
In this paper, a fast lossless compression scheme is presented for the medical image. This scheme consists of two stages. In the first stage, a Differential Pulse Code Modulation (DPCM) is used to decorrelate the raw image data, therefore increasing the compressibility of the medical image. In the second stage, an effective scheme based on the Huffman coding method is developed to encode the residual image. This newly proposed scheme could reduce the cost for the Huffman coding table while achieving high compression ratio. With this algorithm, a compression ratio higher than that of the lossless JPEG method for image can be obtained. At the same time, this method is quicker than the lossless JPEG2000. In other words, the newly proposed algorithm provides a good means for lossless medical image compression.
The Dewey Decimal Scheme and Mathematics
Donovan, Peter W.; And Others
1973-01-01
This essay criticizes the mathematical schedules of the 18th edition of the Dewey Decimal Classification Scheme and offers two alternatives suitable for college libraries that use this system. (Authors)
ONU Power Saving Scheme for EPON System
Mukai, Hiroaki; Tano, Fumihiko; Tanaka, Masaki; Kozaki, Seiji; Yamanaka, Hideaki
PON (Passive Optical Network) achieves FTTH (Fiber To The Home) economically, by sharing an optical fiber among plural subscribers. Recently, global climate change has been recognized as a serious near term problem. Power saving techniques for electronic devices are important. In PON system, the ONU (Optical Network Unit) power saving scheme has been studied and defined in XG-PON. In this paper, we propose an ONU power saving scheme for EPON. Then, we present an analysis of the power reduction effect and the data transmission delay caused by the ONU power saving scheme. According to the analysis, we propose an efficient provisioning method for the ONU power saving scheme which is applicable to both of XG-PON and EPON.
Certificateless universal designated verifier signature schemes
无
2007-01-01
Universal designated verifier signature schemes allows a signature holder to designate the signature to a desire designated verifier, in such a way that only designated verifier can verify this signature, but is unable to convince anyone else of this fact.The previous constructions of universal designated verifier signature rely on the underlying public key infrastructure, that needs both signers and verifiers to verify the authenticity of the public keys, and hence, the certificates are required.This article presents the first model and construction of the certificateless universal designated verifier signature scheme, in which the certificates are not needed.The proposed scheme satisfies all the requirements of the universal designated verifier signature in the certificateless system.Security proofs are provided for the scheme based on the random oracle model, assuming that the Bilinear diffie-hellman (BDH) problem is hard to solve.
Broadcast encryption schemes based on RSA
MU Ning-bo; HU Yu-pu; OU Hai-wen
2009-01-01
Three broadcast schemes for small receiver set using the property of RSA modulus are presented. They can solve the problem of data redundancy when the size of receiver set is small. In the proposed schemes, the center uses one key to encrypt the message and can revoke authorization conveniently. Every authorized user only needs to store one decryption key of a constant size. Among these three schemes, the first one has indistinguishability against adaptive chosen ciphertext attack (IND-CCA2) secure, and any collusion of authorized users cannot produce a new decryption key but the sizes of encryption modulus and ciphertext are linear in the number of receivers. In the second scheme, the size of ciphertext is half of the first one and any two authorized users can produce a new decryption key, but the center can identify them using the traitor tracing algorithm. The third one is the most efficient but the center cannot identify the traitors exactly.
A New Efficient Mobile Micropayment Scheme
FU Xiong; YANG Zong-kai; LANG Wei-min; TAN Yun-meng
2004-01-01
This paper proposes a micropayment scheme designed for GSM mobile scenario, where the overload of computation, storage and communication for mobile phone is reduced by directing operations normally performed by the mobile user to the static portion of the network in view of its limited capability. Messages which received and sent during the payment are very simple and public key infrastructure is not needed, which reduces delay and removes the possibility of incomplete payment due to communications failures. Furthermore, all the information related to payment is encrypted by a shared symmetric key in our scheme, so the privacy of the mobile user is protected and the security of information is guaranteed. Compared with other mobile micropayment schemes in existence, no public-key operation is required, which minimizes the computation and storage overhead dramatically. In addition, restricted anonymous is also provided in our scheme.
Thermal expansion in lead zirconate titanate
无
2002-01-01
The volume anomalies with temperature variations in tin-modified lead zirconate titanate ceramics are investigated. Experimental results show that the volume changes are related to the phase transitions induced with temperature. The magnitude and orientation of crystal volume changes are dependent on the particular phase transition. When antiferroelectrics is transformed to ferroelectrics or paraelectrics the volume expands. Oppositely when ferroelectrics is transformed to antiferroelectrics or paraelectrics the volume contracts. In the transition of antiferroelectric orthorhombic structure to tetragonal structure or ferroelectric low-temperature rhombohedral structure to high-tem- perature rhombohedral structure, there are also revealed apparent anomalies in the curves of thermal expansion. Among them, the volume strain caused by the transition between antiferroelectrics and ferroelectrics is the biggest in magnitude, and the linear expansion dL/L0 and the expansion coefficient (dL/L0)/dT can reach 2.810?3 and 7.5 × 10?4 K?1 respectively.
Spectator expansion in multiple scattering theory
Siciliano, E.R.; Thaler, R.M.
1977-10-01
A finite expansion for the scattering of a structureless projectile from a complex target of A particles is presented. This development is given as a spectator expansion, in the sense that the first term represents the scattering of the projectile from single target constitutent particles, with all other target particles playing a passive role (i.e., acting as spectators). Similarly, the second term represents the scattering from pairs of target particles with (A-2) spectators, and so on. It is demonstrated that such expansions, one of which has been obtained previously as a resummation of the multiple scattering series, are very general in nature and obtain under circumstances for which the standard multiple scattering treatment is not valid.
Radial expansion for spinning conformal blocks
Costa, Miguel; Hansen, Tobias; Penedones, João; Trevisani, Emilio
2016-01-01
This paper develops a method to compute any bosonic conformal block as a series expansion in the optimal radial coordinate introduced by Hogervorst and Rychkov. The method reduces to the known result when the external operators are all the same scalar operator, but it allows to compute conformal blocks for external operators with spin. Moreover, we explain how to write closed form recursion relations for the coefficients of the expansions. We study three examples of four point functions in detail: one vector and three scalars; two vectors and two scalars; two spin 2 tensors and two scalars. Finally, for the case of two external vectors, we also provide a more efficient way to generate the series expansion using the analytic structure of the blocks as a function of the scaling dimension of the exchanged operator.
Does cosmological expansion affect local physics?
Giulini, Domenico
2014-05-01
In this contribution I wish to address the question whether, and how, the global cosmological expansion influences local physics, like particle orbits and black hole geometries. Regarding the former I argue that a pseudo Newtonian picture can be quite accurate if "expansion" is taken to be an attribute of the inertial structure rather than of "space" in some substantivalist sense. This contradicts the often-heard suggestion to imagine cosmological expansion as that of "space itself". Regarding isolated objects in full General Relativity, like black holes, I emphasise the need for proper geometric characterisations in order to meaningfully compare them in different spacetimes, like static and expanding ones. Examples are discussed in some detail to clearly map out the problems. A slightly extended version of this contribution may be found at philsci-archive.pitt.edu/10033.
A meaningful expansion around detailed balance
Colangeli, Matteo; Wynants, Bram
2011-01-01
We consider Markovian dynamics modeling open mesoscopic systems which are driven away from detailed balance by a nonconservative force. A systematic expansion is obtained of the stationary distribution around an equilibrium reference, in orders of the nonequilibrium forcing. The first order around equilibrium has been known since the work of McLennan (1959), and involves the transient irreversible entropy flux. The expansion generalizes the McLennan formula to higher orders, complementing the entropy flux with the dynamical activity. The latter is more kinetic than thermodynamic and is a possible realization of Landauer's insight (1975) that, for nonequilibrium, the relative occupation of states also depends on the noise along possible escape routes. In that way nonlinear response around equilibrium can be meaningfully discussed in terms of two main quantities only, the entropy flux and the dynamical activity. The expansion makes mathematical sense as shown in the simplest cases from exponential ergodicity.
Towards finite density QCD with Taylor expansions
Karsch, Frithjof; Wagner, Mathias; Wambach, Jochen
2011-01-01
We analyze general convergence properties of the Taylor expansion of observables to finite chemical potential in the framework of an effective 2+1 flavor Polyakov-quark-meson model. To compute the required higher order coefficients a novel technique based on algorithmic differentiation has been developed. Results for thermodynamic observables as well as the phase structure obtained through the series expansion up to 24th order are compared to the full model solution at finite chemical potential. The available higher order coefficients also allow for resummations, e.g. Pade series, which improve the convergence behavior. In view of our results we discuss the prospects for locating the QCD phase boundary and a possible critical endpoint with the Taylor expansion method.
Cosmological Constant, Quintessence and Expansive Nondecelerative Universe
Sima, J; Sima, Jozef; Sukenik, Miroslav
2001-01-01
Recent observations of the Universe have led to a conclusion suppressing an up-to-now supposed deceleration of the Universe caused by attractive gravitational forces. Contrary, there is a renaissance of the cosmological member lambda and introduction of enigmatic repulsive dark energy in attempts to rationalize a would-be acceleration of the Universe expansion. It is documented that the model of Expansive Nondecelerative Universe is capable to offer acceptable answers to the questions on the Universe expansion, state equations of the Universe, the parameter omega, the cosmological member lambda without any necessity to introduce new strange kinds of matter or energy being in accord with the fundamental conservation laws and generally accepted parameters of the Universe.
MODIFIED PERIODONTAL EXPLORER FOR EXPANSION SCREW ACTIVATION
Srinivasan
2012-08-01
Full Text Available INTRODUCTION: Accidents with expansion screw activation keys are r eported in the literature 1,2 . A simple method to prevent such accident is to use a modified periodontal explorer as a key for expansion screw activation. A no.17 per iodontal explorer (fig 1 is cut at its first terminal bend (fig 2. The second section is bent m ore vertically to the long axis of the shaft (fig 3. This part which is tapered and stiff enough to ac tivate the screw is tried extra orally into the screw. It is further trimmed in such a way that onl y a mm of instrument can project through the screw hole (fig 4. Now a safe key for activating t he maxillary expansion screw is ready to use (fig 5. Once the patient’s parent or guardian succes sfully repeat the activation procedure in office, the instrument can be given to them for hom e use
Graphite thermal expansion reference for high temperature
Gaal, P. S.
1974-01-01
The design requirements of the aerospace and high-temperature nuclear reactor industries necessitate reliable thermal expansion data for graphite and other carbonaceous materials. The feasibility of an acceptable reference for calibration of expansion measuring systems that operate in carbon-rich atmospheres at temperatures ranging to 2500 C is the prime subject of this work. Present-day graphite technology provides acceptable materials for stable, reproducible references, as reflected by some of the candidate materials. The repeatability for a single specimen in a given expansion measuring system was found to be plus or minus 1%, while the combined results of several tests made on a number of samples fell within a plus or minus 2.5% band.
Bond return predictability in expansions and recessions
Engsted, Tom; Møller, Stig Vinther; Jensen, Magnus David Sander
We document that over the period 1953-2011 US bond returns are predictable in expansionary periods but unpredictable during recessions. This result holds in both in-sample and out-of-sample analyses and using both univariate regressions and combination forecasting techniques. A simulation study...... shows that our tests have power to reject unpredictability in both expansions and recessions. To judge the economic significance of the results we compute utility gains for a meanvariance investor who takes the predictability patterns into account and show that utility gains are positive in expansions...... but negative in recessions. The results are also consistent with tests showing that the expectations hypothesis of the term structure holds in recessions but not in expansions. However, the results for bonds are in sharp contrast to results for stocks showing that stock returns are predictable in recessions...
A fast integral equation method for solid particles in viscous flow using quadrature by expansion
Klinteberg, Ludvig af
2016-01-01
Boundary integral methods are advantageous when simulating viscous flow around rigid particles, due to the reduction in number of unknowns and straightforward handling of the geometry. In this work we present a fast and accurate framework for simulating spheroids in periodic Stokes flow, which is based on the completed double layer boundary integral formulation. The framework implements a new method known as quadrature by expansion (QBX), which uses surrogate local expansions of the layer potential to evaluate it to very high accuracy both on and off the particle surfaces. This quadrature method is accelerated through a newly developed precomputation scheme. The long range interactions are computed using the spectral Ewald (SE) fast summation method, which after integration with QBX allows the resulting system to be solved in M log M time, where M is the number of particles. This framework is suitable for simulations of large particle systems, and can be used for studying e.g. porous media models.
Exact Stochastic Unraveling of an Optical Coherence Dynamics by Cumulant Expansion
Olsina, Jan; Kreisbeck, Christoph; Mancal, Tomas
2013-01-01
A numerically exact Monte Carlo scheme for calculation of open quantum system dynamics is proposed and implemented. Time evolution of an optically excited Frenkel exciton dimer representing a molecular aggregate interacting with its environment is investigated. The method is based on a Monte-Carlo summation of a perturbation expansion with respect to the resonance coupling between the excited states of the molecules which is mapped on a sum over trajectories in Liouville space of the system. The trajectories are weighted by a complex decoherence factors based on second cumulant expansion of the environmental evolution. The method can be used with an arbitrary environment characterized by a general correlation function, and it is exact for Gaussian environments. We calculate the evolution of the optical coherences and linear absorption spectrum, and compare them with the predictions of the standard simulation methods.
Approximate expressions for the period of a simple pendulum using a Taylor series expansion
Belendez, Augusto; Marquez, Andres; Ortuno, Manuel; Gallego, Sergi [Departamento de Fisica, IngenierIa de Sistemas y TeorIa de la Senal, Universidad de Alicante, Apartado 99, E-03080 Alicante (Spain); Arribas, Enrique, E-mail: a.belendez@ua.es [Departamento de Fisica Aplicada, Escuela Superior de IngenierIa Informatica, Universidad de Castilla-La Mancha, Avda de Espana, s/n, E-02071 Albacete (Spain)
2011-09-15
An approximate scheme for obtaining the period of a simple pendulum for large-amplitude oscillations is analysed and discussed. When students express the exact frequency or the period of a simple pendulum as a function of the oscillation amplitude, and they are told to expand this function in a Taylor series, they always do so using the oscillation amplitude as the variable, without considering that if they change the variable (in this paper to the new variable m), a different Taylor series expansion may be performed which is in addition more accurate than previously published ones. Students tend to believe that there is one and only one way of performing a Taylor series expansion of a specific function. The approximate analytical formula for the period is obtained by means of a Taylor expansion of the exact frequency taking into account the Kidd-Fogg formula for the period. This approach based on the Taylor expansion of the frequency about a suitable value converges quickly even for large amplitudes. We believe that this method may be very useful for teaching undergraduate courses on classical mechanics and helping students understand nonlinear oscillations of a simple pendulum.
Flow equations and the strong-coupling expansion for the Hubbard model
Stein, Jürgen
1997-07-01
Applying the method of continuous unitary transformations to a class of Hubbard models, we reexamine the derivation of the t/U expansion for the strong-coupling case. The flow equations for the coupling parameters of the higher order effective interactions can be solved exactly, resulting in a systematic expansion of the Hamiltonian in powers of t/U, valid for any lattice in arbitrary dimension and for general band filling. The expansion ensures a correct treatment of the operator products generated by the transformation, and only involves the explicit recursive calculation of numerical coefficients. This scheme provides a unifying framework to study the strong-coupling expansion for the Hubbard model, which clarifies and circumvents several difficulties inherent to earlier approaches. Our results are compared with those of other methods, and it is shown that the freedom in the choice of the unitary transformation that eliminates interactions between different Hubbard bands can affect the effective Hamiltonian only at order t 3/U2 or higher.
Readout scheme of the upgraded ALICE TPC
Appelshaeuser, Harald; Ivanov, Marian; Lippmann, Christian; Wiechula, Jens
2016-01-01
In this document, we present the updated readout scheme for the ALICE TPC Upgrade. Two major design changes are implemented with respect to the concept that was presented in the TPC Upgrade Technical Design Report: – The SAMPA front-end ASIC will be used in direct readout mode. – The ADC sampling frequency will be reduced from 10 to 5 MHz. The main results from simulations and a description of the new readout scheme is outlined.
Problems of robustness for universal coding schemes
V'yugin, V. V.
2008-01-01
The Lempel-Ziv universal coding scheme is asymptotically optimal for the class of all stationary ergodic sources. A problem of robustness of this property under small violations of ergodicity is studied. A notion of deficiency of algorithmic randomness is used as a measure of disagreement between data sequence and probability measure. We prove that universal compressing schemes from a large class are non-robust in the following sense: if the randomness deficiency grows arbitrarily slowly on i...
Binary Schemes of Vapor Bubble Growth
Zudin, Yu. B.
2015-05-01
A problem on spherically symmetric growth of a vapor bubble in an infi nite volume of a uniformly superheated liquid is considered. A description of the limiting schemes of bubble growth is presented. A binary inertial-thermal bubble growth scheme characterized by such specifi c features as the "three quarters" growth law and the effect of "pressure blocking" in a vapor phase is considered.
Advanced switching schemes in a Stark decelerator
Zhang, Dongdong; Meijer, Gerard
2015-01-01
We revisit the operation of the Stark decelerator and present a new, optimized operation scheme, which substantially improves the efficiency of the decelerator at both low and high final velocities, relevant for trapping experiments and collision experiments, respectively. Both experimental and simulation results show that this new mode of operation outperforms the schemes which have hitherto been in use. This new mode of operation could potentially be extended to other deceleration techniques.
Field sampling scheme optimization using simulated annealing
Debba, Pravesh
2010-10-01
Full Text Available to derive optimal sampling schemes. 2. Hyperspectral remote sensing In the study of electro-magnetic physics, when energy in the form of light interacts with a material, part of the energy at certain wavelength is absorbed, transmitted, emitted... in order to derive optimal sampling schemes. 2. Hyperspectral remote sensing In the study of electro-magnetic physics, when energy in the form of light interacts with a material, part of the energy at certain wavelength is absorbed, transmitted, emitted...
Composite centered schemes for multidimensional conservation laws
Liska, R. [Czech Technical Univ., Prague (Czech Republic). Faculty of Nuclear Sciences and Physical Engineering; Wendroff, B. [Los Alamos National Lab., NM (United States)
1998-05-08
The oscillations of a centered second order finite difference scheme and the excessive diffusion of a first order centered scheme can be overcome by global composition of the two, that is by performing cycles consisting of several time steps of the second order method followed by one step of the diffusive method. The authors show the effectiveness of this approach on some test problems in two and three dimensions.
Renormalization Scheme Dependence and Renormalization Group Summation
McKeon, D G C
2016-01-01
We consider logarithmic contributions to the free energy, instanton effective action and Laplace sum rules in QCD that are a consequence of radiative corrections. Upon summing these contributions by using the renormalization group, all dependence on the renormalization scale parameter mu cancels. The renormalization scheme dependence in these processes is examined, and a renormalization scheme is found in which the effect of higher order radiative corrections is absorbed by the behaviour of the running coupling.
Accuracy property of certain hyperbolic difference schemes
Hicks, D.L.; Madsen, M.M.
1976-12-01
An accuracy property called the CFL1 property is shared by several successful difference schemes. It appears to be a property at least as important as the property of higher-order accuracy for hyperbolic difference schemes when weak solutions (e.g., shocks) are sought. Investigation of this property leads to suggestions of ways to improve the accuracy in such wavecodes as WONDY, CHARTD, and THREEDY. 10 figures.
Toric varieties, monoid schemes and $cdh$ descent
Cortiñas, Guillermo; Walker, Mark E; Weibel, Charles A
2011-01-01
We give conditions for the Mayer-Vietoris property to hold for the algebraic K-theory of blow-up squares of toric varieties in any characteristic, using the theory of monoid schemes. These conditions are used to relate algebraic K-theory to topological cyclic homology in characteristic p. To achieve our goals, we develop for monoid schemes many notions from classical algebraic geometry, such as separated and proper maps.
GROUP VELOCITY CONTROL SCHEME WITH LOW DISSIPATION
无
2000-01-01
In order to prevent smearing the discontinuity, a modified term is added to the third order Upwind Compact Difference scheme to lower the dissipation error. Moreover, the dispersion error is controled to hold back the non-physical oscillation by means of the group velocity control. The scheme is used to simulate the interactions of shock-density stratified interface and the disturbed interface developing to vortex rollers. Numerical results are satisfactory.
Electronic Payment Scheme to Prevent the Treachery
FAN Kai; ZHANG Jun; KOU Weidong; XIAO Guozhen
2006-01-01
Treachery is one of the restrictions to the development of electronic commerce. To prevent the treachery from the participants in electronic commerce, in this paper a secure electronic payment scheme is proposed and its security is analyzed. This scheme can prevent the treachery only with the aid of an un-trusted third party. It is very simple and it also improves the security and provides the non-repudiation, accountability, fairness and privacy.
From greedy to lazy expansions and their driving dynamics
Dajani, K.; Kraaikamp, C.
2001-01-01
In this paper we study the ergodic properties of non-greedy series expansions to non-integer bases β > 1. It is shown that the so-called 'lazy' expansion is isomorphic to the 'greedy' expansion. Furthermore, a class of expansions to base β > 1, β =2 Z, 'in between' the lazy and the greedy
Necessary and Sufficient Conditions for Expansions of Wilson Type
Kun Chuan WANG
2008-01-01
We consider expansions of the type arising from Wilson bases.We characterize such expansions for L2(R).As an application,we see that such an expansion must be orthonormal,in contrast to the case of wavelet expansions generated by translations and dilation.
Simplification of the unified gas kinetic scheme
Chen, Songze; Guo, Zhaoli; Xu, Kun
2016-08-01
The unified gas kinetic scheme (UGKS) is an asymptotic preserving (AP) scheme for kinetic equations. It is superior for transition flow simulation and has been validated in the past years. However, compared to the well-known discrete ordinate method (DOM), which is a classical numerical method solving the kinetic equations, the UGKS needs more computational resources. In this study, we propose a simplification of the unified gas kinetic scheme. It allows almost identical numerical cost as the DOM, but predicts numerical results as accurate as the UGKS. In the simplified scheme, the numerical flux for the velocity distribution function and the numerical flux for the macroscopic conservative quantities are evaluated separately. The equilibrium part of the UGKS flux is calculated by analytical solution instead of the numerical quadrature in velocity space. The simplification is equivalent to a flux hybridization of the gas kinetic scheme for the Navier-Stokes (NS) equations and the conventional discrete ordinate method. Several simplification strategies are tested, through which we can identify the key ingredient of the Navier-Stokes asymptotic preserving property. Numerical tests show that, as long as the collision effect is built into the macroscopic numerical flux, the numerical scheme is Navier-Stokes asymptotic preserving, regardless the accuracy of the microscopic numerical flux for the velocity distribution function.
Expansive mortar-induced ocular injury.
Balasubramanya, Ramamurthy; Rani, Alka; Sangwan, Virender S
2006-12-01
We describe here a case of bilateral chemical injury (with an expansive mortar which is being used in recent times to cut the rocks). On examination limbal ischemia was more in the left eye (9 clock hours) than the right eye (2 clock hours). The case was managed by bilateral removal of foreign bodies, along with conjunctival resection and amniotic membrane transplantation in the left eye. At six-month follow-up, patient had best corrected visual acuity of 20/30 and 20/60 in the right and left eyes respectively. Since this being an occupational hazard, proper eye protection gear should be used by persons using this expansive mortar.
Expansion Coefficient on Oxides and Oxide Ceramics.
1986-05-01
Ferroelectrics )," Ph.D. thesis submitted to the Indian Institute of Science, Bangalore- 12, (1969). 29. B. Alefeld. "The Change of Lattice Parameters of...Kamenetskii. "Anomalous Thermal Expansion of ZrO2 and HfO2 Over the Range 20-1200 0 C," Soy. Phy.-Cryst., 14 (1970) pp. 696-99. 89. A. K. Sreedhar. "Thermal...D. Gac. "Axial and Linear Thermal Expansion of ZrO 2 and HfO2 ," Am. Ceram. Soc. RuZl. 60(4) (1981), pp. 504-506. 167. R. Ruh, G. W. Hollenberg, E
Experimental Tests of Local Cosmological Expansion Rates
Widom, A; Srivastava, Y
2015-01-01
Cosmological expansion on a local scale is usually neglected in part due to its smallness, and in part due to components of bound systems (especially those bound by non-gravitational forces such as atoms and nuclei) not following the geodesics of the cosmological metric. However, it is interesting to ask whether or not experimental tests of cosmological expansion on a local scale (well within our own galaxy) might be experimentally accessible in some manner. We point out, using the Pioneer satellites as an example, that current satellite technology allows for this possibility within time scales of less than one human lifetime.
The replication of expansive production knowledge
Wæhrens, Brian Vejrum; Yang, Cheng; Madsen, Erik Skov
2012-01-01
. Design/methodology/approach – Two case studies are introduced. Empirical data were collected over a period of two years based on interviews and participating observations. Findings – The findings show that (1) knowledge transfer within the replication of a production line is a stepwise expansive process......Purpose – With the aim to support offshore production line replication, this paper specifically aims to explore the use of templates and principles to transfer expansive productive knowledge embedded in a production line and understand the contingencies that influence the mix of these approaches...... and principles to transfer productive knowledge in a specific context, which, in this paper, is a production line....
Expansion of the whole wheat flour extrusion
Cheng, Hongyuan; Friis, Alan
2008-01-01
A new model framework is proposed to describe the expansion of extrudates with extruder operating conditions based on dimensional analysis principle. The Buckingham pi dimensional analysis method is applied to form the basic structure of the model from extrusion process operational parameters. Us....... Using the Central Composite Design (CCD) method, whole wheat flour was processed in a twin-screw extruder with 16 trials. The proposed model can well correlate the expansion of the 16 trials using 3 regression parameters. The average deviation of the correlation is 5.9%....
On the Expansions in Spin Foam Cosmology
Hellmann, Frank
2011-01-01
We discuss the expansions used in spin foam cosmology. We point out that already at the one vertex level arbitrarily complicated amplitudes contribute, and discuss the geometric asymptotics of the five simplest ones. We discuss what type of consistency conditions would be required to control the expan- sion. We show that the factorisation of the amplitude originally considered is best interpreted in topological terms. We then consider the next higher term in the graph expansion. We demonstrate the tension between the truncation to small graphs and going to the homogeneous sector, and conclude that it is necessary to truncate the dynamics as well.
Air expansion in the water rocket
Romanelli, Alejandro; Madina, Federico González
2012-01-01
We study the thermodynamics of the water rocket in the thrust phase, taking into account the expansion of the air with water vapor, vapor condensation and the energy taken from the environment. We set up a simple experimental device with a stationary bottle and verified that the gas expansion in the bottle is well approximated by a polytropic process $PV^\\beta$= constant, where the parameter $\\beta$ depends on the initial conditions. We find an analytical expression for $\\beta $ that only depends on the thermodynamic initial conditions and is in good agreement with the experimental results.
Geometrization of spin systems using cycle expansions
Mainieri, R
1995-01-01
It is shown that a spin system with long range interactions can be converted into a chaotic dynamical system that is differentiable and low-dimensional. The thermodynamic limit of the spin system is then equivalent to studying the long term behavior of the dynamical system. Cycle expansions of chaotic systems (expansion of the Fredholm determinant) are then used to study the thermodynamic limit. By considering the smooth dynamical system, it is possible to converge to the thermodynamic limit faster than with transfer matrices.
Strategic Expansion Models in Academic Radiology.
Natesan, Rajni; Yang, Wei T; Tannir, Habib; Parikh, Jay
2016-03-01
In response to economic pressures, academic institutions in the United States and their radiology practices, are expanding into the community to build a larger network, thereby driving growth and achieving economies of scale. These economies of scale are being achieved variously via brick-and-mortar construction, community practice acquisition, and partnership-based network expansion. We describe and compare these three expansion models within a 4-part framework of: (1) upfront investment; (2) profitability impact; (3) brand impact; and (4) risk of execution.
The Monetary Policy – Restrictive or Expansive?
Adam Szafarczyk
2007-10-01
Full Text Available The monetary policy plays an important role in macroeconomic policy of government. There is a question concerning type of this policy expansive or restrictive (easy or tidy monetary policy. Unfortunately, we have a lot of criteria. Each of them gives us other answer. So due to equitation of Irving Fisher we have dominantly expansive monetary policy. This same situation exists when we use nominal value of rediscount interest rate of central bank. Opposite result appears when we use real value of this interest rate or level of obligatory reserve. Taking under consideration liquidity on money market we know, that level of interest rate is too high.
Expansion of the whole wheat flour extrusion
Cheng, Hongyuan; Friis, Alan
2008-01-01
A new model framework is proposed to describe the expansion of extrudates with extruder operating conditions based on dimensional analysis principle. The Buckingham pi dimensional analysis method is applied to form the basic structure of the model from extrusion process operational parameters....... Using the Central Composite Design (CCD) method, whole wheat flour was processed in a twin-screw extruder with 16 trials. The proposed model can well correlate the expansion of the 16 trials using 3 regression parameters. The average deviation of the correlation is 5.9%....
Asymptotic expansions for the Gaussian unitary ensemble
Haagerup, Uffe; Thorbjørnsen, Steen
2012-01-01
Let g : R ¿ C be a C8-function with all derivatives bounded and let trn denote the normalized trace on the n × n matrices. In Ref. 3 Ercolani and McLaughlin established asymptotic expansions of the mean value ¿{trn(g(Xn))} for a rather general class of random matrices Xn, including the Gaussian...... Unitary Ensemble (GUE). Using an analytical approach, we provide in the present paper an alternative proof of this asymptotic expansion in the GUE case. Specifically we derive for a random matrix Xn that where k is an arbitrary positive integer. Considered as mappings of g, we determine the coefficients...
Monde, Aniket D.; Chakraborty, Prodyut R.
2017-10-01
Volumetric expansion and shrinkage due to different densities of solid and liquid phases are common phenomena during solidification process. Simple analytical models addressing effect of volumetric expansion/shrinkage during solidification are rarely found. The few existing 1-D solidification models are valid only for semi-infinite domain with limitations of their application for finite domain size. The focus of the present work is to develop a 1-D semi-analytical solidification model addressing effects of volumetric expansion/shrinkage in a finite domain. The proposed semi-analytical scheme involves finding simultaneous solution of transient 1-D heat diffusion equations at solid and liquid domain coupled at the interface by Stefan condition. The change of the total domain length during solidification due to volumetric expansion/shrinkage is addressed by using mass conservation. For validation of the proposed model, solidification of water in a finite domain is studied without considering volumetric expansion/shrinkage effect and results are compared with those obtained from existing enthalpy updating based numerical model. After validation, case studies pertaining to volumetric expansion and shrinkage are performed considering solidification of water and paraffin respectively and physically consistent results are obtained. The study is relevant for understanding unidirectional crystal growth under the effect of controlled boundary condition.
FINITE VOLUME METHOD FOR SIMULATION OF VISCOELASTIC FLOW THROUGH A EXPANSION CHANNEL
FU Chun-quan; JIANG Hai-mei; YIN Hong-jun; SU Yu-chi; ZENG Ye-ming
2009-01-01
A finite volume method for the numerical solution of viscoelastic flows is given. The flow of a differential Upper-Convected Maxwell (UCM) fluid through an abrupt expansion has been chosen as a prototype example. The conservation and constitutive equations are solved using the Finite Volume Method (FVM) in a staggered grid with an upwind scheme for the viscoelastic stresses and a hybrid scheme for the velocities. An enhanced-in-speed pressure-correction algorithm is used and a method for handling the source term in the momentum equations is employed. Improved accuracy is achieved by a special discretization of the boundary conditions. Stable solutions are obtained for higher Weissenberg number (We), further extending the range of simulations with the FVM. Numerical results show the viscoelasticity of polymer solutions is the main factor influencing the sweep efficiency.
Exact Stochastic Unraveling of an Optical Coherence Dynamics by Cumulant Expansion
Olsina, Jan; Kramer, Tobias; Kreisbeck, Christoph
2014-01-01
for harmonic environments, and it can be used with arbitrary temperature. Time evolution of an optically excited Frenkel exciton dimer representing a molecular exciton interacting with a charge transfer state is calculated by the proposed method. We calculate the evolution of the optical coherence elements......A numerically exact Monte Carlo scheme for calculation of open quantum system dynamics is proposed and implemented. The method consists of a Monte Carlo summation of a perturbation expansion in terms of trajectories in Liouville phase-space with respect to the coupling between the excited states...
Analysis of Natural Convection in an Elliptical Cavity,Using a Dini Expansion
Y.Mochimaru
1998-01-01
Analyzed is natural transient convection followed by steady-state convection in an elliptical cavity heated from below,using a spectral finite difference scheme in terms of a Dini expansion.The major or minor axis of the elliptic section of the Cavity is assumed to be placed horizontally.As a thermal boundary condition,Dirichlet or Neumann condition is specifice.Not only for nearly pure-heat conduction case at low Grashof numbers but also for strong convection flow with cellular patterns at larger Grashof numbers are found to be attained at least for some combination of Prandtl numbers and geometrical parameters.
A numerical study of planar and axially-symmetric sudden expansion flows
Napolitano, M.; Cinnella, P.
The present study is concerned with the numerical prediction of planar and axially symmetric sudden expansion flows, using the Navier-Stokes as well as the boundary-layer equations. The vorticity/steam-function Navier-Stokes equations are solved by means of a robust multigrid block-line-Gauss-Seidel method. The corresponding boundary-layer equations are solved at every longitudinal station by means of an incremental block-implicit scheme, using the Newton method combined with a deferred correction strategy to achieve fast convergence on the nonlinear terms. Accurate solutions are obtained.
Applying the Density Matrix Expansion with Coordinate-Space Chiral Interactions
Dyhdalo, A; Furnstahl, R J
2016-01-01
We apply the density matrix expansion (DME) at Hartree-Fock level with long-range chiral effective field theory interactions defined in coordinate space up to next-to-next-to-leading order. We consider chiral potentials both with and without explicit Delta isobars. The challenging algebra associated with applying the DME to three-nucleon forces is tamed using a new organization scheme, which will also facilitate generalizations. We include local regulators on the interactions to mitigate the effects of singular potentials on the DME couplings and simplify the optimization of generalized Skyrme-like functionals.
A NEW SCHEME BASED ON THE MI SCHEME AND ITS ANALYSIS
Jiao Luyao; Li Yifa; Qiao Shuaiting
2013-01-01
This article aims at designing a new Multivariate Quadratic (MQ) public-key scheme to avoid the linearization attack and differential attack against the Matsumoto-Imai (MI) scheme.Based on the original scheme,our new scheme,named the Multi-layer MI (MMI) scheme,has a structure of multi-layer central map.Firstly,this article introduces the MI scheme and describes linearization attack and differential attack; then prescribes the designation of MMI in detail,and proves that MMI can resist both linearization attack and differential attack.Besides,this article also proves that MMI can resist recent eXtended Linearization (XL)-like methods.In the end,this article concludes that MMI also maintains the efficiency of MI.
Principles of Thermal Expansion in Feldspars
Hovis, Guy; Medford, Aaron; Conlon, Maricate; Tether, Allison; Romanoski, Anthony
2010-05-01
Following the recent thermal expansion work of Hovis et al. (1) on AlSi3 feldspars, we have investigated the thermal expansion of plagioclase, Ba-K, and Ca-K feldspar crystalline solutions. X-ray powder diffraction data were collected between room temperature and 925 °C on six natural plagioclase specimens ranging in composition from anorthite to oligoclase, the K-exchanged equivalents of these plagioclase specimens, and five synthetic Ba-K feldspars with compositions ranging from 25 to 99 mol % BaAl2Si2O8. The resulting thermal expansion coefficients (α) for volume have been combined with earlier results for end-member Na- and K-feldspars (2,3). Unlike AlSi3 feldspars, Al2Si2 feldspars, including anorthite and celsian from the present study plus Sr- and Pb-feldspar from other workers (4,5), show essentially constant and very limited thermal expansion, regardless of divalent cation size. In the context of structures where the Lowenstein rule (6) requires Al and Si to alternate among tetrahedra, the proximity of bridging Al-O-Si oxygen ions to divalent neighbors (ranging from 0 to 2) produces short Ca-O (or Ba-O) bonds (7,8) that apparently are the result of local charge-balance requirements (9). Gibbs et al. (10) suggest that short bonds such as these have a partially covalent character. This in turn stiffens the structure. Thus, for feldspar series with coupled substitution the change away from a purely divalent M-site occupant gives the substituting (less strongly bonded) monovalent cations increasingly greater influence on thermal expansion. Overall, then, thermal expansion in the feldspar system is well represented on a plot of α against room-temperature volume, where one sees a quadrilateral bounded by data for (A) AlSi3 feldspars whose expansion behavior is controlled largely by the size of the monovalent alkali-site occupant, (B) Al2Si2 feldspars whose expansion is uniformly limited by partially-covalent bonds between divalent M-site occupants and
Truncated correlation hierarchy schemes for driven-dissipative multimode quantum systems
Casteels, Wim; Boité, Alexandre Le; Storme, Florent; Ciuti, Cristiano
2016-01-01
We present a method to describe driven-dissipative multi-mode systems by considering a truncated hierarchy of equations for the correlation functions. We consider two hierarchy truncation schemes with a global cutoff on the correlation order, which is the sum of the exponents of the operators involved in the correlation functions: a 'hard' cutoff corresponding to an expansion around the vacuum, which applies to a regime where the number of excitations per site is small; a 'soft' cutoff which corresponds to an expansion around coherent states, which can be applied for large excitation numbers per site. This approach is applied to describe the bunching-antibunching transition in the driven-dissipative Bose-Hubbard model for photonic systems. The results have been successfully benchmarked by comparison with calculations based on the corner-space renormalization method in 1D and 2D systems. The regime of validity and strengths of the present truncation methods are critically discussed.
Cryptanalysis and Improvement of Piveteau Signature Scheme with Message Recovery
李子臣; 成军祥; 戴一奇
2003-01-01
Piveteau signature scheme allows message recovery but the methodology differs from that of the Nyberg-Rueppel schemes. This paper analyzes the security of the Piveteau scheme by designing some attacks. Two improved methods to Piveteau signature scheme and Nyberg-Rueppel schemes were developed to avoid these weaknesses. Analyses of the security of the improved schemes prove that the improved methods can effectively handle the attacks proposed in this paper.
Analysis and Improvement of Authenticatable Ring Signcryption Scheme
LI Fa-gen; Shirase Masaaki; Takagi Tsuyoshi
2008-01-01
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore,we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme.The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme.We then prove that the improved scheme satisfies confidentiality,unforgeability,anonymity and authenticatability.
Reconciling threshold and subthreshold expansions for pion-nucleon scattering
Siemens, D; Epelbaum, E; Hoferichter, M; Krebs, H; Kubis, B; Meißner, U -G
2016-01-01
Heavy-baryon chiral perturbation theory (ChPT) at one loop fails in relating the pion-nucleon amplitude in the physical region and for subthreshold kinematics due to loop effects enhanced by large low-energy constants. Studying the chiral convergence of threshold and subthreshold parameters up to fourth order in the small-scale expansion, we address the question to what extent this tension can be mitigated by including the $\\Delta(1232)$ as an explicit degree of freedom and/or using a covariant formulation of baryon ChPT. We find that the inclusion of the $\\Delta$ indeed reduces the low-energy constants to more natural values and thereby improves consistency between threshold and subthreshold kinematics. In addition, even in the $\\Delta$-less theory the resummation of $1/m_N$ corrections in the covariant scheme improves the results markedly over the heavy-baryon formulation, in line with previous observations in the single-baryon sector of ChPT that so far have evaded a profound theoretical explanation.
Adaptive sparse grid expansions of the vibrational Hamiltonian.
Strobusch, D; Scheurer, Ch
2014-02-21
The vibrational Hamiltonian involves two high dimensional operators, the kinetic energy operator (KEO), and the potential energy surface (PES). Both must be approximated for systems involving more than a few atoms. Adaptive approximation schemes are not only superior to truncated Taylor or many-body expansions (MBE), they also allow for error estimates, and thus operators of predefined precision. To this end, modified sparse grids (SG) are developed that can be combined with adaptive MBEs. This MBE/SG hybrid approach yields a unified, fully adaptive representation of the KEO and the PES. Refinement criteria, based on the vibrational self-consistent field (VSCF) and vibrational configuration interaction (VCI) methods, are presented. The combination of the adaptive MBE/SG approach and the VSCF plus VCI methods yields a black box like procedure to compute accurate vibrational spectra. This is demonstrated on a test set of molecules, comprising water, formaldehyde, methanimine, and ethylene. The test set is first employed to prove convergence for semi-empirical PM3-PESs and subsequently to compute accurate vibrational spectra from CCSD(T)-PESs that agree well with experimental values.
Adaptive sparse grid expansions of the vibrational Hamiltonian
Strobusch, D.; Scheurer, Ch., E-mail: christoph.scheurer@ch.tum.de [Lehrstuhl für Theoretische Chemie, Technische Universität München, Lichtenbergstraße 4, 85748 Garching (Germany)
2014-02-21
The vibrational Hamiltonian involves two high dimensional operators, the kinetic energy operator (KEO), and the potential energy surface (PES). Both must be approximated for systems involving more than a few atoms. Adaptive approximation schemes are not only superior to truncated Taylor or many-body expansions (MBE), they also allow for error estimates, and thus operators of predefined precision. To this end, modified sparse grids (SG) are developed that can be combined with adaptive MBEs. This MBE/SG hybrid approach yields a unified, fully adaptive representation of the KEO and the PES. Refinement criteria, based on the vibrational self-consistent field (VSCF) and vibrational configuration interaction (VCI) methods, are presented. The combination of the adaptive MBE/SG approach and the VSCF plus VCI methods yields a black box like procedure to compute accurate vibrational spectra. This is demonstrated on a test set of molecules, comprising water, formaldehyde, methanimine, and ethylene. The test set is first employed to prove convergence for semi-empirical PM3-PESs and subsequently to compute accurate vibrational spectra from CCSD(T)-PESs that agree well with experimental values.
Bali, Gunnar S; Pineda, Antonio; Torrero, Christian
2013-01-01
We determine the infinite volume coefficients of the perturbative expansions of the self-energies of static sources in the fundamental and adjoint representations in SU(3) gluodynamics to order \\alpha^{20} in the strong coupling parameter \\alpha. We use numerical stochastic perturbation theory, where we employ a new second order integrator and twisted boundary conditions. The expansions are obtained in lattice regularization with the Wilson action and two different discretizations of the covariant time derivative within the Polyakov loop. Overall, we obtain four different perturbative series. For all of them the high order coefficients display the factorial growth predicted by the conjectured renormalon picture, based on the operator product expansion. This enables us to determine the normalization constants of the leading infrared renormalons of heavy quark and heavy gluino pole masses and to translate these into the modified minimal subtraction scheme (MS). We also estimate the four-loop \\beta-function coef...
Thermal expansion anomaly regulated by entropy.
Liu, Zi-Kui; Wang, Yi; Shang, ShunLi
2014-11-13
Thermal expansion, defined as the temperature dependence of volume under constant pressure, is a common phenomenon in nature and originates from anharmonic lattice dynamics. However, it has been poorly understood how thermal expansion can show anomalies such as colossal positive, zero, or negative thermal expansion (CPTE, ZTE, or NTE), especially in quantitative terms. Here we show that changes in configurational entropy due to metastable micro(scopic)states can lead to quantitative prediction of these anomalies. We integrate the Maxwell relation, statistic mechanics, and first-principles calculations to demonstrate that when the entropy is increased by pressure, NTE occurs such as in Invar alloy (Fe3Pt, for example), silicon, ice, and water, and when the entropy is decreased dramatically by pressure, CPTE is expected such as in anti-Invar cerium, ice and water. Our findings provide a theoretic framework to understand and predict a broad range of anomalies in nature in addition to thermal expansion, which may include gigantic electrocaloric and electromechanical responses, anomalously reduced thermal conductivity, and spin distributions.