DEFF Research Database (Denmark)
Hansen, Elo Harald; Miró, Manuel; Long, Xiangbao
2006-01-01
The determination of trace level concentrations of elements, such as metal species, in complex matrices by atomic absorption or emission spectrometric methods often require appropriate pretreatments comprising separation of the analyte from interfering constituents and analyte preconcentration...... are presented as based on the exploitation of micro-sequential injection (μSI-LOV) using hydrophobic as well as hydrophilic bead materials. The examples given comprise the presentation of a universal approach for SPE-assays, front-end speciation of Cr(III) and Cr(VI) in a fully automated and enclosed set...
Spatiotemporal Fractionation Schemes for Irradiating Large Cerebral Arteriovenous Malformations
Energy Technology Data Exchange (ETDEWEB)
Unkelbach, Jan, E-mail: junkelbach@mgh.harvard.edu [Department of Radiation Oncology, Massachusetts General Hospital, Boston, Massachusetts (United States); Bussière, Marc R. [Department of Radiation Oncology, Massachusetts General Hospital, Boston, Massachusetts (United States); Chapman, Paul H. [Department of Neurosurgery, Massachusetts General Hospital, Boston, Massachusetts (United States); Loeffler, Jay S.; Shih, Helen A. [Department of Radiation Oncology, Massachusetts General Hospital, Boston, Massachusetts (United States)
2016-07-01
Purpose: To optimally exploit fractionation effects in the context of radiosurgery treatments of large cerebral arteriovenous malformations (AVMs). In current practice, fractionated treatments divide the dose evenly into several fractions, which generally leads to low obliteration rates. In this work, we investigate the potential benefit of delivering distinct dose distributions in different fractions. Methods and Materials: Five patients with large cerebral AVMs were reviewed and replanned for intensity modulated arc therapy delivered with conventional photon beams. Treatment plans allowing for different dose distributions in all fractions were obtained by performing treatment plan optimization based on the cumulative biologically effective dose delivered at the end of treatment. Results: We show that distinct treatment plans can be designed for different fractions, such that high single-fraction doses are delivered to complementary parts of the AVM. All plans create a similar dose bath in the surrounding normal brain and thereby exploit the fractionation effect. This partial hypofractionation in the AVM along with fractionation in normal brain achieves a net improvement of the therapeutic ratio. We show that a biological dose reduction of approximately 10% in the healthy brain can be achieved compared with reference treatment schedules that deliver the same dose distribution in all fractions. Conclusions: Boosting complementary parts of the target volume in different fractions may provide a therapeutic advantage in fractionated radiosurgery treatments of large cerebral AVMs. The strategy allows for a mean dose reduction in normal brain that may be valuable for a patient population with an otherwise normal life expectancy.
A Quantitative Analysis of Children's Splitting Operations and Fraction Schemes
Norton, Anderson; Wilkins, Jesse L. M.
2009-01-01
Teaching experiments with pairs of children have generated several hypotheses about students' construction of fractions. For example, Steffe (2004) hypothesized that robust conceptions of improper fractions depends on the development of a splitting operation. Results from teaching experiments that rely on scheme theory and Steffe's hierarchy of…
Membrane filtration of olive mill wastewater and exploitation of its fractions.
Paraskeva, C A; Papadakis, V G; Kanellopoulou, D G; Koutsoukos, P G; Angelopoulos, K C
2007-04-01
Olive mill wastewater (OMW) produced from small units scattered in rural areas of Southern Europe is a major source of pollution of surface and subsurface water. In the present work, a treatment scheme based on physical separation methods is presented. The investigation was carried out using a pilot-plant unit equipped with ultrafiltration, nanofiltration, and reverse osmosis membranes. Approximately 80% of the total volume of wastewater treated by the membrane units was sufficiently cleaned to meet the standards for irrigation water. The concentrated fractions collected in the treatment concentrates were characterized by high organic load and high content of phenolic compounds. The concentrates were tested in hydroponic systems to examine their toxicity towards undesired herbs. The calculations of the cost of the overall process showed that fixed and operational costs could be recovered from the exploitation of OMW byproducts as water for irrigation and/or as bioherbicides.
Designing synchronization schemes for chaotic fractional-order unified systems
International Nuclear Information System (INIS)
Wang Junwei; Zhang Yanbin
2006-01-01
Synchronization in chaotic fractional-order differential systems is studied both theoretically and numerically. Two schemes are designed to achieve chaos synchronization of so-called unified chaotic systems and the corresponding numerical algorithms are established. Some sufficient conditions on synchronization are also derived based on the Laplace transformation theory. Computer simulations are used for demonstration
Validating a Written Instrument for Assessing Students' Fractions Schemes and
Wilkins, Jesse L. M.; Norton, Anderson; Boyce, Steven J.
2013-01-01
Previous research has documented schemes and operations that undergird students' understanding of fractions. This prior research was based, in large part, on small-group teaching experiments. However, written assessments are needed in order for teachers and researchers to assess students' ways of operating on a whole-class scale. In this study,…
Universal block diagram based modeling and simulation schemes for fractional-order control systems.
Bai, Lu; Xue, Dingyü
2017-05-08
Universal block diagram based schemes are proposed for modeling and simulating the fractional-order control systems in this paper. A fractional operator block in Simulink is designed to evaluate the fractional-order derivative and integral. Based on the block, the fractional-order control systems with zero initial conditions can be modeled conveniently. For modeling the system with nonzero initial conditions, the auxiliary signal is constructed in the compensation scheme. Since the compensation scheme is very complicated, therefore the integrator chain scheme is further proposed to simplify the modeling procedures. The accuracy and effectiveness of the schemes are assessed in the examples, the computation results testify the block diagram scheme is efficient for all Caputo fractional-order ordinary differential equations (FODEs) of any complexity, including the implicit Caputo FODEs. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.
Radiation therapy of malignant melanomas: an evaluation of clinically used fractionation schemes
International Nuclear Information System (INIS)
Strauss, A.; Dritschilo, A.; Nathanson, L.; Piro, A.J.
1981-01-01
To assess the importance of radiation dose fraction size in the treatment of malignant melanomas, the records of 48 patients (83 sites) treated at Tufts-New England Medical Center from 1971 to 1979 have been retrospectively reviewed. During this period, the dose fractionation schemes evolved from standard fraction size to large-dose techniques. Radiation fraction size was observed to be the major factor in the clinical response of melanoma. Fractions of 600-800 rad resulted in the best overall response (80%). The rapid fractionation scheme of 800-400-400 rad on successive days resulted in intermediate response (58%) and may be useful for the palliative treatment of selected patients
Ford, Neville J.; Connolly, Joseph A.
2009-07-01
We give a comparison of the efficiency of three alternative decomposition schemes for the approximate solution of multi-term fractional differential equations using the Caputo form of the fractional derivative. The schemes we compare are based on conversion of the original problem into a system of equations. We review alternative approaches and consider how the most appropriate numerical scheme may be chosen to solve a particular equation.
Accelerated Simplified Swarm Optimization with Exploitation Search Scheme for Data Clustering.
Directory of Open Access Journals (Sweden)
Wei-Chang Yeh
Full Text Available Data clustering is commonly employed in many disciplines. The aim of clustering is to partition a set of data into clusters, in which objects within the same cluster are similar and dissimilar to other objects that belong to different clusters. Over the past decade, the evolutionary algorithm has been commonly used to solve clustering problems. This study presents a novel algorithm based on simplified swarm optimization, an emerging population-based stochastic optimization approach with the advantages of simplicity, efficiency, and flexibility. This approach combines variable vibrating search (VVS and rapid centralized strategy (RCS in dealing with clustering problem. VVS is an exploitation search scheme that can refine the quality of solutions by searching the extreme points nearby the global best position. RCS is developed to accelerate the convergence rate of the algorithm by using the arithmetic average. To empirically evaluate the performance of the proposed algorithm, experiments are examined using 12 benchmark datasets, and corresponding results are compared with recent works. Results of statistical analysis indicate that the proposed algorithm is competitive in terms of the quality of solutions.
SOLVING FRACTIONAL-ORDER COMPETITIVE LOTKA-VOLTERRA MODEL BY NSFD SCHEMES
Directory of Open Access Journals (Sweden)
S.ZIBAEI
2016-12-01
Full Text Available In this paper, we introduce fractional-order into a model competitive Lotka- Volterra prey-predator system. We will discuss the stability analysis of this fractional system. The non-standard nite difference (NSFD scheme is implemented to study the dynamic behaviors in the fractional-order Lotka-Volterra system. Proposed non-standard numerical scheme is compared with the forward Euler and fourth order Runge-Kutta methods. Numerical results show that the NSFD approach is easy and accurate for implementing when applied to fractional-order Lotka-Volterra model.
A recursion relation for coefficients of fractional parentage in the seniority scheme
International Nuclear Information System (INIS)
Evans, T.
1985-01-01
A recursion relations for coefficients as fractional parentage in the seniority scheme are discussed. Determinated dependence of recursion relations from the particle number permit to evaluate matrix elements of creation and annihilation operators for fermions or bosons. 10 refs. (author)
Radiation therapy of malignant melanomas: an evaluation of clinically used fractionation schemes
International Nuclear Information System (INIS)
Strauss, A.; Dritschilo, A.; Nathanson, L.; Piro, A.J.
1981-01-01
To assess the importance of radiation dose fraction size in the treatment of malignant melanomas, the records of 48 patients (83 sites) treated at Tufts-New England Medical Center from 1971 to 1979 have been retrospectively reviewed. During this period, the dose fractionation schemes evolved from standard fraction size to large-dose techniques. Radiation fraction size was observed to be the major factor in the clinical response of melanoma. Fractions of 600 to 800 rad resulted in the best overall response (80%). The rapid fractionation scheme of 800 to 400 to 400 rad on successive days resulted in intermediate response (58%) and may be useful for the palliative treatment of selected patients
Discrete maximal regularity of time-stepping schemes for fractional evolution equations.
Jin, Bangti; Li, Buyang; Zhou, Zhi
2018-01-01
In this work, we establish the maximal [Formula: see text]-regularity for several time stepping schemes for a fractional evolution model, which involves a fractional derivative of order [Formula: see text], [Formula: see text], in time. These schemes include convolution quadratures generated by backward Euler method and second-order backward difference formula, the L1 scheme, explicit Euler method and a fractional variant of the Crank-Nicolson method. The main tools for the analysis include operator-valued Fourier multiplier theorem due to Weis (Math Ann 319:735-758, 2001. doi:10.1007/PL00004457) and its discrete analogue due to Blunck (Stud Math 146:157-176, 2001. doi:10.4064/sm146-2-3). These results generalize the corresponding results for parabolic problems.
Chao, Luo
2015-11-01
In this paper, a novel digital secure communication scheme is firstly proposed. Different from the usual secure communication schemes based on chaotic synchronization, the proposed scheme employs asynchronous communication which avoids the weakness of synchronous systems and is susceptible to environmental interference. Moreover, as to the transmission errors and data loss in the process of communication, the proposed scheme has the ability to be error-checking and error-correcting in real time. In order to guarantee security, the fractional-order complex chaotic system with the shifting of order is utilized to modulate the transmitted signal, which has high nonlinearity and complexity in both frequency and time domains. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the scheme.
Directory of Open Access Journals (Sweden)
Hua Wang
2016-01-01
Full Text Available This paper proposes a new fractional-order approach for synchronization of a class of fractional-order chaotic systems in the presence of model uncertainties and external disturbances. A simple but practical method to synchronize many familiar fractional-order chaotic systems has been put forward. A new theorem is proposed for a class of cascade fractional-order systems and it is applied in chaos synchronization. Combined with the fact that the states of the fractional chaotic systems are bounded, many coupled items can be taken as zero items. Then, the whole system can be simplified greatly and a simpler controller can be derived. Finally, the validity of the presented scheme is illustrated by numerical simulations of the fractional-order unified system.
3D positioning scheme exploiting nano-scale IR-UWB orthogonal pulses
Directory of Open Access Journals (Sweden)
Kim Nammoon
2011-01-01
Full Text Available Abstract In these days, the development of positioning technology for realizing ubiquitous environments has become one of the most important issues. The Global Positioning System (GPS is a well-known positioning scheme, but it is not suitable for positioning in in-door/building environments because it is difficult to maintain line-of-sight condition between satellites and a GPS receiver. To such problem, various positioning methods such as RFID, WLAN, ZigBee, and Bluetooth have been developed for indoor positioning scheme. However, the majority of positioning schemes are focused on the two-dimension positioning even though three-dimension (3D positioning information is more useful especially in indoor applications, such as smart space, U-health service, context aware service, etc. In this paper, a 3D positioning system based on mutually orthogonal nano-scale impulse radio ultra-wideband (IR-UWB signals and cross array antenna is proposed. The proposed scheme uses nano-scale IR-UWB signals providing fine time resolution and high-resolution multiple signal specification algorithm for the time-of-arrival and the angle-of-arrival estimation. The performance is evaluated over various IEEE 802.15.4a channel models, and simulation results show the effectiveness of proposed scheme.
3D positioning scheme exploiting nano-scale IR-UWB orthogonal pulses.
Kim, Nammoon; Kim, Youngok
2011-10-04
In these days, the development of positioning technology for realizing ubiquitous environments has become one of the most important issues. The Global Positioning System (GPS) is a well-known positioning scheme, but it is not suitable for positioning in in-door/building environments because it is difficult to maintain line-of-sight condition between satellites and a GPS receiver. To such problem, various positioning methods such as RFID, WLAN, ZigBee, and Bluetooth have been developed for indoor positioning scheme. However, the majority of positioning schemes are focused on the two-dimension positioning even though three-dimension (3D) positioning information is more useful especially in indoor applications, such as smart space, U-health service, context aware service, etc. In this paper, a 3D positioning system based on mutually orthogonal nano-scale impulse radio ultra-wideband (IR-UWB) signals and cross array antenna is proposed. The proposed scheme uses nano-scale IR-UWB signals providing fine time resolution and high-resolution multiple signal specification algorithm for the time-of-arrival and the angle-of-arrival estimation. The performance is evaluated over various IEEE 802.15.4a channel models, and simulation results show the effectiveness of proposed scheme.
DEFF Research Database (Denmark)
Hansen, Elo Harald
Determination of low or trace-level amounts of metals by electrothermal atomic absorption spectrometry (ETAAS) often requires the use of suitable preconcentration and/or separation procedures in order to attain the necessary sensitivity and selectivity. Such schemes are advantageously executed...... by superior performance and versatility. In fact, two approaches are conceivable: The analyte-loaded ion-exchange beads might either be transported directly into the graphite tube where they are pyrolized and the measurand is atomized and quantified; or the loaded beads can be eluted and the eluate forwarded...
International Nuclear Information System (INIS)
Kaprealian, Tania; Weinberg, Vivian; Speight, Joycelyn L.; Gottschalk, Alexander R.; Roach, Mack; Shinohara, Katsuto; Hsu, I.-Chow
2012-01-01
Purpose: This is a retrospective study comparing our experience with high-dose-rate (HDR) brachytherapy boost for prostate cancer, using two different fractionation schemes, 600 cGy × 3 fractions (patient group 1) and 950 cGy × 2 fractions (patient group 2). Methods and Materials: A total of 165 patients were treated for prostate cancer using external beam radiation therapy up to a dose of 45 Gy, followed by an HDR brachytherapy prostate radiation boost. Between July 1997 and Nov 1999, 64 patients were treated with an HDR boost of 600 cGy × 3 fractions; and between June 2000 and Nov 2005, 101 patients were treated with an HDR boost of 950 cGy × 2 fractions. All but 9 patients had at least one of the following risk features: pretreatment prostate-specific antigen (PSA) level >10, a Gleason score ≥7, and/or clinical stage T3 disease. Results: Median follow-up was 105 months for group 1 and 43 months for group 2. Patients in group 2 had a greater number of high-risk features than group 1 (p = 0.02). Adjusted for comparable follow-up, there was no difference in biochemical no-evidence-of-disease (bNED) rate between the two fractionation scheme approaches, with 5-year Kaplan-Meier estimates of 93.5% in group 1 and 87.3% in group 2 (p = 0.19). The 5-year estimates of progression-free survival were 86% for group 1 and 83% for group 2 (p = 0.53). Among high-risk patients, there were no differences in bNED or PFS rate due to fractionation. Conclusions: Results were excellent for both groups. Adjusted for comparable follow-up, no differences were found between groups.
Lanzas, C; Broderick, G A; Fox, D G
2008-12-01
Adequate predictions of rumen-degradable protein (RDP) and rumen-undegradable protein (RUP) supplies are necessary to optimize performance while minimizing losses of excess nitrogen (N). The objectives of this study were to evaluate the original Cornell Net Carbohydrate Protein System (CNCPS) protein fractionation scheme and to develop and evaluate alternatives designed to improve its adequacy in predicting RDP and RUP. The CNCPS version 5 fractionates CP into 5 fractions based on solubility in protein precipitant agents, buffers, and detergent solutions: A represents the soluble nonprotein N, B1 is the soluble true protein, B2 represents protein with intermediate rates of degradation, B3 is the CP insoluble in neutral detergent solution but soluble in acid detergent solution, and C is the unavailable N. Model predictions were evaluated with studies that measured N flow data at the omasum. The N fractionation scheme in version 5 of the CNCPS explained 78% of the variation in RDP with a root mean square prediction error (RMSPE) of 275 g/d, and 51% of the RUP variation with RMSPE of 248 g/d. Neutral detergent insoluble CP flows were overpredicted with a mean bias of 128 g/d (40% of the observed mean). The greatest improvements in the accuracy of RDP and RUP predictions were obtained with the following 2 alternative schemes. Alternative 1 used the inhibitory in vitro system to measure the fractional rate of degradation for the insoluble protein fraction in which A = nonprotein N, B1 = true soluble protein, B2 = insoluble protein, C = unavailable protein (RDP: R(2) = 0.84 and RMSPE = 167 g/d; RUP: R(2) = 0.61 and RMSPE = 209 g/d), whereas alternative 2 redefined A and B1 fractions as the non-amino-N and amino-N in the soluble fraction respectively (RDP: R(2) = 0.79 with RMSPE = 195 g/d and RUP: R(2) = 0.54 with RMSPE = 225 g/d). We concluded that implementing alternative 1 or 2 will improve the accuracy of predicting RDP and RUP within the CNCPS framework.
Liu, Dian; Steingoetter, Andreas; Curcic, Jelena; Kozerke, Sebastian
2018-01-01
To investigate and exploit the effect of intravoxel off-resonance compartments in the triple-echo steady-state (TESS) sequence without fat suppression for T 2 mapping and to leverage the results for fat fraction quantification. In multicompartment tissue, where at least one compartment is excited off-resonance, the total signal exhibits periodic modulations as a function of echo time (TE). Simulated multicompartment TESS signals were synthesized at various TEs. Fat emulsion phantoms were prepared and scanned at the same TE combinations using TESS. In vivo knee data were obtained with TESS to validate the simulations. The multicompartment effect was exploited for fat fraction quantification in the stomach by acquiring TESS signals at two TE combinations. Simulated and measured multicompartment signal intensities were in good agreement. Multicompartment effects caused erroneous T 2 offsets, even at low water-fat ratios. The choice of TE caused T 2 variations of as much as 28% in cartilage. The feasibility of fat fraction quantification to monitor the decrease of fat content in the stomach during digestion is demonstrated. Intravoxel off-resonance compartments are a confounding factor for T 2 quantification using TESS, causing errors that are dependent on the TE. At the same time, off-resonance effects may allow for efficient fat fraction mapping using steady-state imaging. Magn Reson Med 79:423-429, 2018. © 2017 International Society for Magnetic Resonance in Medicine. © 2017 International Society for Magnetic Resonance in Medicine.
Belazi, Akram; Abd El-Latif, Ahmed A.; Diaconu, Adrian-Viorel; Rhouma, Rhouma; Belghith, Safya
2017-01-01
In this paper, a new chaos-based partial image encryption scheme based on Substitution-boxes (S-box) constructed by chaotic system and Linear Fractional Transform (LFT) is proposed. It encrypts only the requisite parts of the sensitive information in Lifting-Wavelet Transform (LWT) frequency domain based on hybrid of chaotic maps and a new S-box. In the proposed encryption scheme, the characteristics of confusion and diffusion are accomplished in three phases: block permutation, substitution, and diffusion. Then, we used dynamic keys instead of fixed keys used in other approaches, to control the encryption process and make any attack impossible. The new S-box was constructed by mixing of chaotic map and LFT to insure the high confidentiality in the inner encryption of the proposed approach. In addition, the hybrid compound of S-box and chaotic systems strengthened the whole encryption performance and enlarged the key space required to resist the brute force attacks. Extensive experiments were conducted to evaluate the security and efficiency of the proposed approach. In comparison with previous schemes, the proposed cryptosystem scheme showed high performances and great potential for prominent prevalence in cryptographic applications.
The Quasar Fraction in Low-Frequency Selected Complete Samples and Implications for Unified Schemes
Willott, Chris J.; Rawlings, Steve; Blundell, Katherine M.; Lacy, Mark
2000-01-01
Low-frequency radio surveys are ideal for selecting orientation-independent samples of extragalactic sources because the sample members are selected by virtue of their isotropic steep-spectrum extended emission. We use the new 7C Redshift Survey along with the brighter 3CRR and 6C samples to investigate the fraction of objects with observed broad emission lines - the 'quasar fraction' - as a function of redshift and of radio and narrow emission line luminosity. We find that the quasar fraction is more strongly dependent upon luminosity (both narrow line and radio) than it is on redshift. Above a narrow [OII] emission line luminosity of log(base 10) (L(sub [OII])/W) approximately > 35 [or radio luminosity log(base 10) (L(sub 151)/ W/Hz.sr) approximately > 26.5], the quasar fraction is virtually independent of redshift and luminosity; this is consistent with a simple unified scheme with an obscuring torus with a half-opening angle theta(sub trans) approximately equal 53 deg. For objects with less luminous narrow lines, the quasar fraction is lower. We show that this is not due to the difficulty of detecting lower-luminosity broad emission lines in a less luminous, but otherwise similar, quasar population. We discuss evidence which supports at least two probable physical causes for the drop in quasar fraction at low luminosity: (i) a gradual decrease in theta(sub trans) and/or a gradual increase in the fraction of lightly-reddened (0 approximately quasar luminosity; and (ii) the emergence of a distinct second population of low luminosity radio sources which, like M8T, lack a well-fed quasar nucleus and may well lack a thick obscuring torus.
Lv, M.; Li, C.; Lu, H.; Yang, K.; Chen, Y.
2017-12-01
The parameterization of vegetation cover fraction (VCF) is an important component of land surface models. This paper investigates the impacts of three VCF parameterization schemes on land surface temperature (LST) simulation by the Common Land Model (CoLM) in the Tibetan Plateau (TP). The first scheme is a simple land cover (LC) based method; the second one is based on remote sensing observation (hereafter named as RNVCF) , in which multi-year climatology VCFs is derived from Moderate-resolution Imaging Spectroradiometer (MODIS) NDVI (Normalized Difference Vegetation Index); the third VCF parameterization scheme derives VCF from the LAI simulated by LSM and clump index at every model time step (hereafter named as SMVCF). Simulated land surface temperature(LST) and soil temperature by CoLM with three VCF parameterization schemes were evaluated by using satellite LST observation and in situ soil temperature observation, respectively, during the period of 2010 to 2013. The comparison against MODIS Aqua LST indicates that (1) CTL produces large biases for both four seasons in early afternoon (about 13:30, local solar time), while the mean bias in spring reach to 12.14K; (2) RNVCF and SMVCF reduce the mean bias significantly, especially in spring as such reduce is about 6.5K. Surface soil temperature observed at 5 cm depth from three soil moisture and temperature monitoring networks is also employed to assess the skill of three VCF schemes. The three networks, crossing TP from West to East, have different climate and vegetation conditions. In the Ngari network, located in the Western TP with an arid climate, there are not obvious differences among three schemes. In Naqu network, located in central TP with a semi-arid climate condition, CTL shows a severe overestimates (12.1 K), but such overestimations can be reduced by 79% by RNVCF and 87% by SMVCF. In the third humid network (Maqu in eastern TP), CoLM performs similar to Naqu. However, at both Naqu and Maqu networks
Ullah, Asmat; Chen, Wen; Khan, Mushtaq Ahmad
2017-07-01
This paper introduces a fractional order total variation (FOTV) based model with three different weights in the fractional order derivative definition for multiplicative noise removal purpose. The fractional-order Euler Lagrange equation which is a highly non-linear partial differential equation (PDE) is obtained by the minimization of the energy functional for image restoration. Two numerical schemes namely an iterative scheme based on the dual theory and majorization- minimization algorithm (MMA) are used. To improve the restoration results, we opt for an adaptive parameter selection procedure for the proposed model by applying the trial and error method. We report numerical simulations which show the validity and state of the art performance of the fractional-order model in visual improvement as well as an increase in the peak signal to noise ratio comparing to corresponding methods. Numerical experiments also demonstrate that MMAbased methodology is slightly better than that of an iterative scheme.
Progress Toward Steady State Tokamak Operation Exploiting the high bootstrap current fraction regime
Ren, Q.
2015-11-01
Recent DIII-D experiments have advanced the normalized fusion performance of the high bootstrap current fraction tokamak regime toward reactor-relevant steady state operation. The experiments, conducted by a joint team of researchers from the DIII-D and EAST tokamaks, developed a fully noninductive scenario that could be extended on EAST to a demonstration of long pulse steady-state tokamak operation. Fully noninductive plasmas with extremely high values of the poloidal beta, βp >= 4 , have been sustained at βT >= 2 % for long durations with excellent energy confinement quality (H98y,2 >= 1 . 5) and internal transport barriers (ITBs) generated at large minor radius (>= 0 . 6) in all channels (Te, Ti, ne, VTf). Large bootstrap fraction (fBS ~ 80 %) has been obtained with high βp. ITBs have been shown to be compatible with steady state operation. Because of the unusually large ITB radius, normalized pressure is not limited to low βN values by internal ITB-driven modes. βN up to ~4.3 has been obtained by optimizing the plasma-wall distance. The scenario is robust against several variations, including replacing some on-axis with off-axis neutral beam injection (NBI), adding electron cyclotron (EC) heating, and reducing the NBI torque by a factor of 2. This latter observation is particularly promising for extension of the scenario to EAST, where maximum power is obtained with balanced NBI injection, and to a reactor, expected to have low rotation. However, modeling of this regime has provided new challenges to state-of-the-art modeling capabilities: quasilinear models can dramatically underpredict the electron transport, and the Sauter bootstrap current can be insufficient. The analysis shows first-principle NEO is in good agreement with experiments for the bootstrap current calculation and ETG modes with a larger saturated amplitude or EM modes may provide the missing electron transport. Work supported in part by the US DOE under DE-FC02-04ER54698, DE-AC52-07NA
International Nuclear Information System (INIS)
Zhang Li-Min; Sun Ke-Hui; Liu Wen-Hao; He Shao-Bo
2017-01-01
In this paper, Adomian decomposition method (ADM) with high accuracy and fast convergence is introduced to solve the fractional-order piecewise-linear (PWL) hyperchaotic system. Based on the obtained hyperchaotic sequences, a novel color image encryption algorithm is proposed by employing a hybrid model of bidirectional circular permutation and DNA masking. In this scheme, the pixel positions of image are scrambled by circular permutation, and the pixel values are substituted by DNA sequence operations. In the DNA sequence operations, addition and substraction operations are performed according to traditional addition and subtraction in the binary, and two rounds of addition rules are used to encrypt the pixel values. The simulation results and security analysis show that the hyperchaotic map is suitable for image encryption, and the proposed encryption algorithm has good encryption effect and strong key sensitivity. It can resist brute-force attack, statistical attack, differential attack, known-plaintext, and chosen-plaintext attacks. (paper)
Energy Technology Data Exchange (ETDEWEB)
Legros, E.
2002-12-01
New developments are expected on the prolific bloc 17 of the Angola offshore. Among the tenth of discoveries that followed the discovery of the Girassol giant field, TotalFinaElf initially selected the Dalia field, for which engineering studies started in December 2000. However, it is still not excluded that the development of the Rosa-Lirio field will start first. This article describes the specific characteristics of this field and the solutions proposed for its exploitation. (J.S.)
Energy Technology Data Exchange (ETDEWEB)
Angstmann, C.N.; Donnelly, I.C. [School of Mathematics and Statistics, UNSW Australia, Sydney NSW 2052 (Australia); Henry, B.I., E-mail: B.Henry@unsw.edu.au [School of Mathematics and Statistics, UNSW Australia, Sydney NSW 2052 (Australia); Jacobs, B.A. [School of Computer Science and Applied Mathematics, University of the Witwatersrand, Johannesburg, Private Bag 3, Wits 2050 (South Africa); DST–NRF Centre of Excellence in Mathematical and Statistical Sciences (CoE-MaSS) (South Africa); Langlands, T.A.M. [Department of Mathematics and Computing, University of Southern Queensland, Toowoomba QLD 4350 (Australia); Nichols, J.A. [School of Mathematics and Statistics, UNSW Australia, Sydney NSW 2052 (Australia)
2016-02-15
We have introduced a new explicit numerical method, based on a discrete stochastic process, for solving a class of fractional partial differential equations that model reaction subdiffusion. The scheme is derived from the master equations for the evolution of the probability density of a sum of discrete time random walks. We show that the diffusion limit of the master equations recovers the fractional partial differential equation of interest. This limiting procedure guarantees the consistency of the numerical scheme. The positivity of the solution and stability results are simply obtained, provided that the underlying process is well posed. We also show that the method can be applied to standard reaction–diffusion equations. This work highlights the broader applicability of using discrete stochastic processes to provide numerical schemes for partial differential equations, including fractional partial differential equations.
Directory of Open Access Journals (Sweden)
Yongkai An
2015-07-01
Full Text Available This paper introduces a surrogate model to identify an optimal exploitation scheme, while the western Jilin province was selected as the study area. A numerical simulation model of groundwater flow was established first, and four exploitation wells were set in the Tongyu county and Qian Gorlos county respectively so as to supply water to Daan county. Second, the Latin Hypercube Sampling (LHS method was used to collect data in the feasible region for input variables. A surrogate model of the numerical simulation model of groundwater flow was developed using the regression kriging method. An optimization model was established to search an optimal groundwater exploitation scheme using the minimum average drawdown of groundwater table and the minimum cost of groundwater exploitation as multi-objective functions. Finally, the surrogate model was invoked by the optimization model in the process of solving the optimization problem. Results show that the relative error and root mean square error of the groundwater table drawdown between the simulation model and the surrogate model for 10 validation samples are both lower than 5%, which is a high approximation accuracy. The contrast between the surrogate-based simulation optimization model and the conventional simulation optimization model for solving the same optimization problem, shows the former only needs 5.5 hours, and the latter needs 25 days. The above results indicate that the surrogate model developed in this study could not only considerably reduce the computational burden of the simulation optimization process, but also maintain high computational accuracy. This can thus provide an effective method for identifying an optimal groundwater exploitation scheme quickly and accurately.
A new color image encryption scheme using CML and a fractional-order chaotic system.
Directory of Open Access Journals (Sweden)
Xiangjun Wu
Full Text Available The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks.
An Efficient Implicit FEM Scheme for Fractional-in-Space Reaction-Diffusion Equations
Burrage, Kevin
2012-01-01
Fractional differential equations are becoming increasingly used as a modelling tool for processes associated with anomalous diffusion or spatial heterogeneity. However, the presence of a fractional differential operator causes memory (time fractional) or nonlocality (space fractional) issues that impose a number of computational constraints. In this paper we develop efficient, scalable techniques for solving fractional-in-space reaction diffusion equations using the finite element method on both structured and unstructured grids via robust techniques for computing the fractional power of a matrix times a vector. Our approach is show-cased by solving the fractional Fisher and fractional Allen-Cahn reaction-diffusion equations in two and three spatial dimensions, and analyzing the speed of the traveling wave and size of the interface in terms of the fractional power of the underlying Laplacian operator. © 2012 Society for Industrial and Applied Mathematics.
An Efficient Implicit FEM Scheme for Fractional-in-Space Reaction-Diffusion Equations
Burrage, Kevin; Hale, Nicholas; Kay, David
2012-01-01
Fractional differential equations are becoming increasingly used as a modelling tool for processes associated with anomalous diffusion or spatial heterogeneity. However, the presence of a fractional differential operator causes memory (time
Ben-Romdhane, Hajer; Krichen, Saoussen; Alba, Enrique
2017-05-01
Optimisation in changing environments is a challenging research topic since many real-world problems are inherently dynamic. Inspired by the natural evolution process, evolutionary algorithms (EAs) are among the most successful and promising approaches that have addressed dynamic optimisation problems. However, managing the exploration/exploitation trade-off in EAs is still a prevalent issue, and this is due to the difficulties associated with the control and measurement of such a behaviour. The proposal of this paper is to achieve a balance between exploration and exploitation in an explicit manner. The idea is to use two equally sized populations: the first one performs exploration while the second one is responsible for exploitation. These tasks are alternated from one generation to the next one in a regular pattern, so as to obtain a balanced search engine. Besides, we reinforce the ability of our algorithm to quickly adapt after cnhanges by means of a memory of past solutions. Such a combination aims to restrain the premature convergence, to broaden the search area, and to speed up the optimisation. We show through computational experiments, and based on a series of dynamic problems and many performance measures, that our approach improves the performance of EAs and outperforms competing algorithms.
International Nuclear Information System (INIS)
Markandeya, S.G.
2013-01-01
BARC has been responsible to establish indigenously designed state-of-the-art electron accelerator facilities at its Electron Beam Centre at Kharghar, Navi Mumbai. The centre offers two versatile machines namely, (i) 3 MeV, 30 kW Parallel Coupled Self Capacitance type Multiplier (Dynamitron) DC accelerator and (ii) 10 MeV, 10 kW RF Electron Linac. While these machines are being used by scientists and engineers from within DAE, there is tremendous scope for exploiting their use by researchers in the country for basic research as well as by technologists and entrepreneurs for exploiting its potential for industrial applications. However, due to lack of adequate information about the facilities and due to paucity of research funds for the academia in the country, there is always a gap which researchers seldom look forward to be filled up appropriately. The present talk will give a glimpse of some opportunities to exploit the facilities at EBC, Kharghar for variety of applications followed by a brief presentation on provisions under BRNS to carry out sponsored research activities for basic research as well as for technology development for the industrial applications. (author)
Directory of Open Access Journals (Sweden)
Sheraz Aslam
2017-12-01
Full Text Available The smart grid plays a vital role in decreasing electricity cost through Demand Side Management (DSM. Smart homes, a part of the smart grid, contribute greatly to minimizing electricity consumption cost via scheduling home appliances. However, user waiting time increases due to the scheduling of home appliances. This scheduling problem is the motivation to find an optimal solution that could minimize the electricity cost and Peak to Average Ratio (PAR with minimum user waiting time. There are many studies on Home Energy Management (HEM for cost minimization and peak load reduction. However, none of the systems gave sufficient attention to tackle multiple parameters (i.e., electricity cost and peak load reduction at the same time as user waiting time was minimum for residential consumers with multiple homes. Hence, in this work, we propose an efficient HEM scheme using the well-known meta-heuristic Genetic Algorithm (GA, the recently developed Cuckoo Search Optimization Algorithm (CSOA and the Crow Search Algorithm (CSA, which can be used for electricity cost and peak load alleviation with minimum user waiting time. The integration of a smart Electricity Storage System (ESS is also taken into account for more efficient operation of the Home Energy Management System (HEMS. Furthermore, we took the real-time electricity consumption pattern for every residence, i.e., every home has its own living pattern. The proposed scheme is implemented in a smart building; comprised of thirty smart homes (apartments, Real-Time Pricing (RTP and Critical Peak Pricing (CPP signals are examined in terms of electricity cost estimation for both a single smart home and a smart building. In addition, feasible regions are presented for single and multiple smart homes, which show the relationship among the electricity cost, electricity consumption and user waiting time. Experimental results demonstrate the effectiveness of our proposed scheme for single and multiple smart
International Nuclear Information System (INIS)
Saha Ray, S.; Patra, A.
2012-01-01
Highlights: ► In this paper fractional neutron point kinetic equation has been analyzed. ► The numerical solution for fractional neutron point kinetic equation is obtained. ► Explicit Finite Difference Method has been applied. ► Supercritical reactivity, critical reactivity and subcritical reactivity analyzed. ► Comparison between fractional and classical neutron density is presented. - Abstract: In the present article, a numerical procedure to efficiently calculate the solution for fractional point kinetics equation in nuclear reactor dynamics is investigated. The Explicit Finite Difference Method is applied to solve the fractional neutron point kinetic equation with the Grunwald–Letnikov (GL) definition (). Fractional Neutron Point Kinetic Model has been analyzed for the dynamic behavior of the neutron motion in which the relaxation time associated with a variation in the neutron flux involves a fractional order acting as exponent of the relaxation time, to obtain the best operation of a nuclear reactor dynamics. Results for neutron dynamic behavior for subcritical reactivity, supercritical reactivity and critical reactivity and also for different values of fractional order have been presented and compared with the classical neutron point kinetic (NPK) equation as well as the results obtained by the learned researchers .
A study on the potential of cell kinetically directed fractionation schemes in radiotherapy
International Nuclear Information System (INIS)
Oostrum, I.E.A. van.
1990-01-01
In this thesis, the phenomenon of radiation-induced synchronization of cells into the radiosensitive G 2 phase of the cell cycle and the exploitation of this phenomenon to enhance the efficacy of frationated radiotherapy was investigated. A nude mouse model was used to investigate the cell kinetics of 6 human xenotransplanted tumours before and after irradiation. In the second part of the investigation it was tested whether split dose irradiation intervals, based on cell kinetic data of the tumours (i.e. timing of maximal accumulation of cells in G 2 ) would result in an enhanced response compared with those at non optimal intervals (author), 297 refs.; 35 figs.; 25 tabs
Improved Fractional Order VSS Inc-Cond MPPT Algorithm for Photovoltaic Scheme
Directory of Open Access Journals (Sweden)
R. Arulmurugan
2014-01-01
Full Text Available Nowadays a hot topic among the research community is the harnessing energy from the free sunlight which is abundant and pollution-free. The availability of cheap solar photovoltaic (PV modules has to harvest solar energy with better efficiency. The nature of solar modules is nonlinear and therefore the proper impedance matching is essential. The proper impedance matching ensures the extraction of the maximum power from solar PV module. Maximum power point tracking (MPPT algorithm is acting as a significant part in solar power generating system because it varies in the output power from a PV generating set for various climatic conditions. This paper suggested a new improved work for MPPT of PV energy system by using the optimized novel improved fractional order variable step size (FOVSS incremental conductance (Inc-Cond algorithm. The new proposed controller combines the merits of both improved fractional order (FO and variable step size (VSS Inc-Cond which is well suitable for design control and execution. The suggested controller results in attaining the desired transient reaction under changing operating points. MATLAB simulation effort shows MPPT controller and a DC to DC Luo converter feeding a battery load is achieved. The laboratory experimental results demonstrate that the new proposed MPPT controller in the photovoltaic generating system is valid.
Aubry, R.; Oñate, E.; Idelsohn, S. R.
2006-09-01
The method presented in Aubry et al. (Comput Struc 83:1459-1475, 2005) for the solution of an incompressible viscous fluid flow with heat transfer using a fully Lagrangian description of motion is extended to three dimensions (3D) with particular emphasis on mass conservation. A modified fractional step (FS) based on the pressure Schur complement (Turek 1999), and related to the class of algebraic splittings Quarteroni et al. (Comput Methods Appl Mech Eng 188:505-526, 2000), is used and a new advantage of the splittings of the equations compared with the classical FS is highlighted for free surface problems. The temperature is semi-coupled with the displacement, which is the main variable in a Lagrangian description. Comparisons for various mesh Reynolds numbers are performed with the classical FS, an algebraic splitting and a monolithic solution, in order to illustrate the behaviour of the Uzawa operator and the mass conservation. As the classical fractional step is equivalent to one iteration of the Uzawa algorithm performed with a standard Laplacian as a preconditioner, it will behave well only in a Reynold mesh number domain where the preconditioner is efficient. Numerical results are provided to assess the superiority of the modified algebraic splitting to the classical FS.
DEFF Research Database (Denmark)
Buanuam, Janya; Miró, Manuel; Hansen, Elo Harald
2006-01-01
Sequential injection microcolumn extraction (SI-MCE) based on the implementation of a soil containing microcartridge as external reactor in a sequential injection network is, for the first time, proposed for dynamic fractionation of macronutrients in environmental solids, as exemplified by the pa......Sequential injection microcolumn extraction (SI-MCE) based on the implementation of a soil containing microcartridge as external reactor in a sequential injection network is, for the first time, proposed for dynamic fractionation of macronutrients in environmental solids, as exemplified...... by the partitioning of inorganic phosphorous in agricultural soils. The on-line fractionation method capitalises on the accurate metering and sequential exposure of the various extractants to the solid sample by application of programmable flow as precisely coordinated by a syringe pump. Three different soil phase...... associations for phosphorus, that is, exchangeable, Al- and Fe-bound and Ca-bound fractions, were elucidated by accommodation in the flow manifold of the 3 steps of the Hietjles-Litjkema (HL) scheme involving the use of 1.0 M NH4Cl, 0.1 M NaOH and 0.5 M HCl, respectively, as sequential leaching reagents...
International Nuclear Information System (INIS)
Manning, Matthew A.; Arthur, Douglas W.; Schmidt-Ullrich, Rupert K.; Arnfield, Mark R.; Amir, Cyrus; Zwicker, Robert D.
2000-01-01
brachytherapy provides a convenient outpatient method for boosting the lumpectomy cavity following conventional whole breast irradiation without overdosing normal tissues. The fractionation scheme of 15 Gy in 6 fractions over 3 days is well tolerated. The volume of tissue removed from the breast at lumpectomy appears to dominate cosmetic outcome in this group of patients.
Mori, Masanobu; Nakano, Koji; Sasaki, Masaya; Shinozaki, Haruka; Suzuki, Shiho; Okawara, Chitose; Miró, Manuel; Itabashi, Hideyuki
2016-02-01
A dynamic flow-through microcolumn extraction system based on extractant re-circulation is herein proposed as a novel analytical approach for simplification of bioaccessibility tests of trace elements in sediments. On-line metal leaching is undertaken in the format of all injection (AI) analysis, which is a sequel of flow injection analysis, but involving extraction under steady-state conditions. The minimum circulation times and flow rates required to determine the maximum bioaccessible pools of target metals (viz., Cu, Zn, Cd, and Pb) from lake and river sediment samples were estimated using Tessier's sequential extraction scheme and an acid single extraction test. The on-line AIA method was successfully validated by mass balance studies of CRM and real sediment samples. Tessier's test in on-line AI format demonstrated to be carried out by one third of extraction time (6h against more than 17 h by the conventional method), with better analytical precision (15% by the conventional method) and significant decrease in blank readouts as compared with the manual batch counterpart. Copyright © 2015 Elsevier B.V. All rights reserved.
Energy Technology Data Exchange (ETDEWEB)
Sugano, Yasutaka [Graduate School of Health Sciences, Hokkaido University, Kita-12, Nishi-5, Kita-ku, Sapporo, Hokkaido 060-0812 (Japan); Mizuta, Masahiro [Laboratory of Advanced Data Science, Information Initiative Center, Hokkaido University, Kita-11, Nishi-5, Kita-ku, Sapporo, Hokkaido 060-0811 (Japan); Takao, Seishin; Shirato, Hiroki; Sutherland, Kenneth L. [Department of Radiation Medicine, Graduate School of Medicine, Hokkaido University, Kita-15, Nishi-5, Kita-ku, Sapporo, Hokkaido 060-8638 (Japan); Date, Hiroyuki, E-mail: date@hs.hokudai.ac.jp [Faculty of Health Sciences, Hokkaido University, Kita-12, Nishi-5, Kita-ku, Sapporo, Hokkaido 060-0812 (Japan)
2015-11-15
Purpose: Radiotherapy of solid tumors has been performed with various fractionation regimens such as multi- and hypofractionations. However, the ability to optimize the fractionation regimen considering the physical dose distribution remains insufficient. This study aims to optimize the fractionation regimen, in which the authors propose a graphical method for selecting the optimal number of fractions (n) and dose per fraction (d) based on dose–volume histograms for tumor and normal tissues of organs around the tumor. Methods: Modified linear-quadratic models were employed to estimate the radiation effects on the tumor and an organ at risk (OAR), where the repopulation of the tumor cells and the linearity of the dose-response curve in the high dose range of the surviving fraction were considered. The minimization problem for the damage effect on the OAR was solved under the constraint that the radiation effect on the tumor is fixed by a graphical method. Here, the damage effect on the OAR was estimated based on the dose–volume histogram. Results: It was found that the optimization of fractionation scheme incorporating the dose–volume histogram is possible by employing appropriate cell surviving models. The graphical method considering the repopulation of tumor cells and a rectilinear response in the high dose range enables them to derive the optimal number of fractions and dose per fraction. For example, in the treatment of prostate cancer, the optimal fractionation was suggested to lie in the range of 8–32 fractions with a daily dose of 2.2–6.3 Gy. Conclusions: It is possible to optimize the number of fractions and dose per fraction based on the physical dose distribution (i.e., dose–volume histogram) by the graphical method considering the effects on tumor and OARs around the tumor. This method may stipulate a new guideline to optimize the fractionation regimen for physics-guided fractionation.
International Nuclear Information System (INIS)
Goyal, Sharad; Daroui, Parima; Khan, Atif J; Kearney, Thomas; Kirstein, Laurie; Haffty, Bruce G
2013-01-01
The aim of this study was to report 3-year outcomes of toxicity, cosmesis, and local control using a once daily fractionation scheme (49.95 Gy in 3.33 Gy once daily fractions) for accelerated partial breast irradiation (APBI) using three-dimensional conformal radiotherapy (3D-CRT). Between July 2008 and August 2010, women aged ≥40 years with ductal carcinoma in situ or node-negative invasive breast cancer ≤3 cm in diameter, treated with breast-conserving surgery achieving negative margins, were accrued to a prospective study. Women were treated with APBI using 3–5 photon beams, delivering 49.95 Gy over 15 once daily fractions over 3 weeks. Patients were assessed for toxicities, cosmesis, and local control rates before APBI and at specified time points. Thirty-four patients (mean age 60 years) with Tis 0 (n = 9) and T1N0 (n = 25) breast cancer were treated and followed up for an average of 39 months. Only 3% (1/34) patients experienced a grade 3 subcutaneous fibrosis and breast edema and 97% of the patients had good/excellent cosmetic outcome at 3 years. The 3-year rate of ipsilateral breast tumor recurrence (IBTR) was 0% while the rate of contralateral breast events was 6%. The 3-year disease-free survival (DFS), overall survival (OS), and breast cancer-specific survival (BCSS) was 94%, 100%, and 100%, respectively. Our novel accelerated partial breast fractionation scheme of 15 once daily fractions of 3.33 Gy (49.95 Gy total) is a remarkably well-tolerated regimen of 3D-CRT-based APBI. A larger cohort of patients is needed to further ascertain the toxicity of this accelerated partial breast regimen
Lang, Jun
2012-01-30
In this paper, we propose a novel secure image sharing scheme based on Shamir's three-pass protocol and the multiple-parameter fractional Fourier transform (MPFRFT), which can safely exchange information with no advance distribution of either secret keys or public keys between users. The image is encrypted directly by the MPFRFT spectrum without the use of phase keys, and information can be shared by transmitting the encrypted image (or message) three times between users. Numerical simulation results are given to verify the performance of the proposed algorithm.
International Nuclear Information System (INIS)
Graham, P.H.; Morris, W. J.; Pickles, T.P.; Graham, P.H.
1997-01-01
A retrospective review of 173 men with clinical stage B2-C prostate cancer treated by small-volume arc radiotherapy to 5200 cGy in 16 fractions over 4 weeks was undertaken. At 5 years, clinical local failure rates were 14% for stage B2 and 18% for stage C. Five-year survival rates were 81 and 61%, respectively. No discernible differences were detected between a policy of encompassing the planning target volume by the 90% or 95% isodose. The limitations of this retrospective evidence and that of the literature are discussed. In the context of resource limitations affecting radiation oncology, prospective assessment of this technique is required to determine the true outcome. (authors)
DEFF Research Database (Denmark)
Agarwala, Rina
2016-01-01
This article examines how self-employed workers are organizing in the garments and waste collection industries in India. Although the question of who is profiting from self-employed workers’ labor is complex, the cases outlined in this paper highlight telling instances of how some self......-employed workers are organizing as workers. They are fighting labor exploitation by redefining the concept to include additional exploitation axes (from the state and middle class) and forms (including sexual). In doing so, they are redefining potential solutions, including identities and material benefits, to fit...... their unique needs. By expanding the category of “workers” beyond those defined by a narrow focus on a standard employer-employee relationship, these movements are also fighting exclusion from earlier labor protections by increasing the number of entitled beneficiaries. These struggles provide an important...
Pinty, B.; Clerici, M.; Andredakis, I.; Kaminski, T.; Taberner, M.; Verstraete, M. M.; Gobron, N.; Plummer, S.; Widlowski, J.-L.
2011-05-01
The two-stream model parameters and associated uncertainties retrieved by inversion against MODIS broadband visible and near-infrared white sky surface albedos were discussed in a companion paper. The present paper concentrates on the partitioning of the solar radiation fluxes delivered by the Joint Research Centre Two-stream Inversion Package (JRC-TIP). The estimation of the various flux fractions related to the vegetation and the background layers separately capitalizes on the probability density functions of the model parameters discussed in the companion paper. The propagation of uncertainties from the observations to the model parameters is achieved via the Hessian of the cost function and yields a covariance matrix of posterior parameter uncertainties. This matrix is propagated to the radiation fluxes via the model's Jacobian matrix of first derivatives. Results exhibit a rather good spatiotemporal consistency given that the prior values on the model parameters are not specified as a function of land cover type and/or vegetation phenological states. A specific investigation based on a scenario imposing stringent conditions of leaf absorbing and scattering properties highlights the impact of such constraints that are, as a matter of fact, currently adopted in vegetation index approaches. Special attention is also given to snow-covered and snow-contaminated areas since these regions encompass significant reflectance changes that strongly affect land surface processes. A definite asset of the JRC-TIP lies in its capability to control and ultimately relax a number of assumptions that are often implicit in traditional approaches. These features greatly help us understand the discrepancies between the different data sets of land surface properties and fluxes that are currently available. Through a series of selected examples, the inverse procedure implemented in the JRC-TIP is shown to be robust, reliable, and compliant with large-scale processing requirements
On the Exploitation of Sensitivity Derivatives for Improving Sampling Methods
Cao, Yanzhao; Hussaini, M. Yousuff; Zang, Thomas A.
2003-01-01
Many application codes, such as finite-element structural analyses and computational fluid dynamics codes, are capable of producing many sensitivity derivatives at a small fraction of the cost of the underlying analysis. This paper describes a simple variance reduction method that exploits such inexpensive sensitivity derivatives to increase the accuracy of sampling methods. Three examples, including a finite-element structural analysis of an aircraft wing, are provided that illustrate an order of magnitude improvement in accuracy for both Monte Carlo and stratified sampling schemes.
International Nuclear Information System (INIS)
Wang Chongjong; Wan Leung, Stephen; Chen Huichun; Sun Limin; Fang Fumin; Changchien Chanchao; Huang Engyen; Wu Jiaming; Chen Chuhnchih
1997-01-01
Purpose: To report the treatment results and rectal/bladder complications of cervical carcinoma radically treated with high-dose-rate intracavitary brachytherapy (HDR-IC). The current policy of using three-fraction scheme was examined. Methods and Materials: Between November 1987 and August 1990, 173 patients with cervical carcinoma were treated with curative-intent radiation therapy. Whole pelvic irradiation was administered with 10-MV X ray. Dose to the central cervix was 40-44 Gy in 20-22 fractions, following by pelvic wall boost 6-14 Gy in three to seven fractions with central shielding. 60 Co sources were used for HDR-IC, and 7.2 Gy was given to Point A for three applications, 1-2 weeks apart. Duration of follow-up was 5-7.8 years. Results: Twenty-eight patients (16%) developed central-regional recurrences. Overall 5-year actuarial pelvic control rate was 83%. By stage, 5-year actuarial pelvic control rates were 94%, 87%, and 72% for Stages IB + IIA, IIB + IIIA, and IIIB + IVA, respectively. Thirty-one patients (18%) developed distant metastasis. Overall 5-year actuarial survival rate was 58%. By stage, 5-year actuarial survival rates were 79%, 59%, and 41% for Stages IB + IIA, IIB + IIIA, and IIIB + IVA, respectively. Sixty-six (38%) and 19 patients (11%) developed rectal and bladder complications, respectively. For rectal complication, the overall actuarial rate was 38% at 5 years. By grade, 5-year actuarial rectal complication rates were 24%, 15%, 4%, and 3% for Grades 1-4, respectively. Overall prevalence of rectal complications was 37% and 14% at 2 and 5 years, respectively. Prevalence of low-grade rectal complication (Grades 1 and 2) was dominant at 2 years (30%), but declined to 8% at 5 years. Prevalence of high-grade, severe rectal complication (Grades 3 and 4) remained steady at 2 and 5 years (7% and 6%, respectively). Five-year actuarial bladder complication was 9%. Five-year prevalence of bladder complication was 2%. Conclusion: Using a three-fraction
Stein, Derek R; Hu, Xiaojie; McCorrister, Stuart J; Westmacott, Garrett R; Plummer, Francis A; Ball, Terry B; Carpenter, Michael S
2013-10-01
MS/MS is the technology of choice for analyzing complex protein mixtures. However, due to the intrinsic complexity and dynamic range present in higher eukaryotic proteomes, prefractionation is an important step to maximize the number of proteins identified. Off-gel IEF (OG-IEF) and high pH RP (Hp-RP) column chromatography have both been successfully utilized as a first-dimension peptide separation technique in shotgun proteomic experiments. Here, a direct comparison of the two methodologies was performed on ex vivo peripheral blood mononuclear cell lysate. In 12-fraction replicate analysis, Hp-RP resulted in more peptides and proteins identified than OG-IEF fractionation. Distributions of peptide pIs and hydropathy did not reveal any appreciable bias in either technique. Resolution, defined here as the ability to limit a specific peptide to one particular fraction, was significantly better for Hp-RP. This leads to a more uniform distribution of total and unique peptides for Hp-RP across all fractions collected. These results suggest that fractionation by Hp-RP over OG-IEF is the better choice for typical complex proteome analysis. © 2013 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.
Directory of Open Access Journals (Sweden)
Kari Heiskanen
2012-10-01
Full Text Available In this research article the sustainability of different practices to collect the metal fraction of household waste in the Helsinki metropolitan area, Finland is examined. The study is carried out by calculating and comparing the greenhouse gas reduction potential of optional practices for collecting the metal fraction of household waste in the Helsinki metropolitan area, Finland. In order to locate the greenhouse gas reduction potential of the separate collection of the metallic fraction of municipal solid waste (MSW collected from residential sources, a comparative carbon footprint analysis using Life Cycle Assessment (LCA on six different waste management scenarios is carried out. The modeled system consisted of a waste collection system, transportation, and different waste management alternatives, including on-site separation, separation at the waste management facility as well as metallurgical recovery of separated scrap. The results show that, in terms of greenhouse gas emissions, separate collection and recycling of the metallic fraction of solid MSW at residential properties is the preferable option compared to a scenario with no source sorting and incineration of everything. According to this research scenario where the metal fraction of solid household waste was not source-separated or collected separately have clearly higher greenhouse gas emissions compared to all the other scenarios with separate collection for metals. In addition, metal recycling by regional collection points has considerably lower greenhouse gas emission potential than metal recycling by collection directly from residential properties.
Energy Technology Data Exchange (ETDEWEB)
Guillerme, F.; Clavier, J.B.; Guihard, S.; Schumacher, C.; Nehme-Schuster, H.; Ben Abdelghani, M.; Noel, G. [Centre Paul-Strauss, Strasbourg (France); Kurtz, J.E.; Brigand, C. [Hopitaux universitaires, Strasbourg (France)
2011-10-15
Based on results obtained on 177 patients older than 65 and suffering from T3-4 rectum cancer, and treated either according to a conventional scheme (45 to 50,4 Gy by 1,8 to 2 Gy fractions) or according to a fractionated scheme (39 Gy by 3 Gy fractions), the authors report the comparison of these both methods in terms of toxicity, delay between end of radiotherapy and surgery), histological response, global survival. The hypo-fractionated treatment allows the treatment duration to be reduced, is therefore less constraining and seems more suitable for elderly people. Short communication
Ding, Xiaoshuai; Cao, Jinde; Zhao, Xuan; Alsaadi, Fuad E
2017-08-01
This paper is concerned with the drive-response synchronization for a class of fractional-order bidirectional associative memory neural networks with time delays, as well as in the presence of discontinuous activation functions. The global existence of solution under the framework of Filippov for such networks is firstly obtained based on the fixed-point theorem for condensing map. Then the state feedback and impulsive controllers are, respectively, designed to ensure the Mittag-Leffler synchronization of these neural networks and two new synchronization criteria are obtained, which are expressed in terms of a fractional comparison principle and Razumikhin techniques. Numerical simulations are presented to validate the proposed methodologies.
Hybrid flux splitting schemes for numerical resolution of two-phase flows
Energy Technology Data Exchange (ETDEWEB)
Flaatten, Tore
2003-07-01
This thesis deals with the construction of numerical schemes for approximating. solutions to a hyperbolic two-phase flow model. Numerical schemes for hyperbolic models are commonly divided in two main classes: Flux Vector Splitting (FVS) schemes which are based on scalar computations and Flux Difference Splitting (FDS) schemes which are based on matrix computations. FVS schemes are more efficient than FDS schemes, but FDS schemes are more accurate. The canonical FDS schemes are the approximate Riemann solvers which are based on a local decomposition of the system into its full wave structure. In this thesis the mathematical structure of the model is exploited to construct a class of hybrid FVS/FDS schemes, denoted as Mixture Flux (MF) schemes. This approach is based on a splitting of the system in two components associated with the pressure and volume fraction variables respectively, and builds upon hybrid FVS/FDS schemes previously developed for one-phase flow models. Through analysis and numerical experiments it is demonstrated that the MF approach provides several desirable features, including (1) Improved efficiency compared to standard approximate Riemann solvers, (2) Robustness under stiff conditions, (3) Accuracy on linear and nonlinear phenomena. In particular it is demonstrated that the framework allows for an efficient weakly implicit implementation, focusing on an accurate resolution of slow transients relevant for the petroleum industry. (author)
Directory of Open Access Journals (Sweden)
Paul McLaughlin
2008-11-01
Full Text Available Philosophical inquiry into exploitation has two major deficiencies to date: it assumes that exploitation is wrong by definition; and it pays too much attention to the Marxian account of exploitation. Two senses of exploitation should be distinguished: the ‘moral’ or pejorative sense and the ‘non-moral’ or ‘non-prejudicial’ sense. By demonstrating the conceptual inadequacy of exploitation as defined in the first sense, and by defining exploitation adequately in the latter sense, we seek to demonstrate the moral complexity of exploitation. We contend, moreover, that moral evaluation of exploitation is only possible once we abandon a strictly Marxian framework and attempt, in the long run, to develop an integral ethic along Godwinian lines.
Energy Technology Data Exchange (ETDEWEB)
Verma, Vivek [Department of Radiation Oncology, University of Nebraska Medical Center, Omaha, Nebraska (United States); Shostrom, Valerie K. [Department of Biostatistics, College of Public Health, University of Nebraska Medical Center, Omaha, Nebraska (United States); Zhen, Weining; Zhang, Mutian [Department of Radiation Oncology, University of Nebraska Medical Center, Omaha, Nebraska (United States); Braunstein, Steve E. [Department of Radiation Oncology, University of California, San Francisco, San Francisco, California (United States); Holland, John [Department of Radiation Medicine, Oregon Health & Science University, Portland, Oregon (United States); Hallemeier, Christopher L. [Department of Radiation Oncology, Mayo Clinic, Rochester, Minnesota (United States); Harkenrider, Matthew M. [Department of Radiation Oncology, Loyola University Stritch School of Medicine, Maywood, Illinois (United States); Iskhanian, Adrian [Department of Radiation Oncology, University of Miami Sylvester Comprehensive Cancer Center, Miami, Florida (United States); Jabbour, Salma K. [Department of Radiation Oncology, Rutgers Cancer Institute of New Jersey, Rutgers University, New Brunswick, New Jersey (United States); Attia, Albert [Department of Radiation Oncology, Vanderbilt University School of Medicine, Nashville, Tennessee (United States); Lee, Percy [Department of Radiation Oncology, David Geffen School of Medicine at UCLA, Los Angeles, California (United States); Wang, Kyle [Department of Radiation Oncology, University of North Carolina School of Medicine, Chapel Hill, North Carolina (United States); Decker, Roy H. [Department of Therapeutic Radiology, Yale University School of Medicine, New Haven, Connecticut (United States); McGarry, Ronald C. [Department of Radiation Oncology, University of Kentucky, Lexington, Kentucky (United States); Simone, Charles B., E-mail: charlessimone@umm.edu [Department of Radiation Oncology, University of Maryland Medical Center, Baltimore, Maryland (United States)
2017-03-15
Purpose: To describe the impact of fractionation scheme and tumor location on toxicities in stereotactic body radiation therapy (SBRT) for ≥5-cm non-small cell lung cancer (NSCLC), as part of a multi-institutional analysis. Methods: Patients with primary ≥5-cm N0 M0 NSCLC who underwent ≤5-fraction SBRT were examined across multiple high-volume SBRT centers. Collected data included clinical/treatment parameters; toxicities were prospectively assessed at each institution according to the Common Terminology Criteria for Adverse Events. Patients treated daily were compared with those treated every other day (QOD)/other nondaily regimens. Stratification between central and peripheral tumors was also performed. Results: Ninety-two patients from 12 institutions were evaluated (2004-2016), with median follow-up of 12 months. In total there were 23 (25%) and 6 (7%) grade ≥2 and grade ≥3 toxicities, respectively. Grades 2 and 3 pulmonary toxicities occurred in 9% and 4%, respectively; 1 patient treated daily experienced grade 5 radiation pneumonitis. Of the entire cohort, 46 patients underwent daily SBRT, and 46 received QOD (n=40)/other nondaily (n=6) regimens. Clinical/treatment parameters were similar between groups; the QOD/other group was more likely to receive 3-/4-fraction schemas. Patients treated QOD/other experienced significantly fewer grade ≥2 toxicities as compared with daily treatment (7% vs 43%, P<.001). Patients treated daily also had higher rates of grade ≥2 pulmonary toxicities (P=.014). Patients with peripheral tumors (n=66) were more likely to receive 3-/4-fraction regimens than those with central tumors (n=26). No significant differences in grade ≥2 toxicities were identified according to tumor location (P>.05). Conclusions: From this multi-institutional study, toxicity of SBRT for ≥5-cm lesions is acceptable, and daily treatment was associated with a higher rate of toxicities.
Energy Technology Data Exchange (ETDEWEB)
Al Darouich, T.
2005-07-15
The thermal evolution of reservoir oils is controlled by the kinetics of cracking reactions. The present work is concerned with the study of the thermal stability of the light aromatic components (C{sub 6}-C{sub 14}) of crude oils under geological conditions. The aim is to predict this stability through a mode l derived from laboratory pyrolyses. The light cut < 250 deg. C of Safaniya crude oil, corresponding to the C{sub 15} components, was obtained by fractionated distillation; pure aromatic fraction was then separated by liquid chromatography. Detailed molecular characterisation of the aromatic fraction was acquired using HPLC, GC and GC/MS. Then, quantified individual aromatic compounds were lumped into six molecular classes: BTXN, methyl-aromatics, alkyl-aromatics, naphthenic-aromatics, indene and sulphur - containing aromatics. Pyrolyses of the aromatic fraction were performed in gold tubes at 100 bars and different temperature/time conditions in a wide range (1 to 93%) of global conversion. Pyrolysis effluents were analysed and lumped into classes. The pyrolysis data were used to elaborate a semi - empirical kinetic scheme of 13 stoichiometric reactions for the primary and secondary cracking of the unstable classes. The scheme kinetic parameters were first estimated, and then numerically optimised, with the constraints of mass balance and hydrogen conservation. A set of pyrolysis experiments was performed at 375 deg.C under high pressures: 400, 800 and 1200 bars. Increasing slowing down in conversion rate with increasing pressure was thus observed compared to experiments at 100 bars. A slight selective effect of pressure on the different aromatic classes of the charge and on the product distribution was evidenced. The extrapolation of the kinetic model to the conditions of Elgin Field (North Sea) showed that pressure effect should shift the thermal cracking of light aromatics to higher temperatures by almost 8 deg. C. (author)
Particle Simulation of Fractional Diffusion Equations
Allouch, Samer
2017-07-12
This work explores different particle-based approaches to the simulation of one-dimensional fractional subdiffusion equations in unbounded domains. We rely on smooth particle approximations, and consider four methods for estimating the fractional diffusion term. The first method is based on direct differentiation of the particle representation, it follows the Riesz definition of the fractional derivative and results in a non-conservative scheme. The other three methods follow the particle strength exchange (PSE) methodology and are by construction conservative, in the sense that the total particle strength is time invariant. The first PSE algorithm is based on using direct differentiation to estimate the fractional diffusion flux, and exploiting the resulting estimates in an integral representation of the divergence operator. Meanwhile, the second one relies on the regularized Riesz representation of the fractional diffusion term to derive a suitable interaction formula acting directly on the particle representation of the diffusing field. A third PSE construction is considered that exploits the Green\\'s function of the fractional diffusion equation. The performance of all four approaches is assessed for the case of a one-dimensional diffusion equation with constant diffusivity. This enables us to take advantage of known analytical solutions, and consequently conduct a detailed analysis of the performance of the methods. This includes a quantitative study of the various sources of error, namely filtering, quadrature, domain truncation, and time integration, as well as a space and time self-convergence analysis. These analyses are conducted for different values of the order of the fractional derivatives, and computational experiences are used to gain insight that can be used for generalization of the present constructions.
Particle Simulation of Fractional Diffusion Equations
Allouch, Samer; Lucchesi, Marco; Maî tre, O. P. Le; Mustapha, K. A.; Knio, Omar
2017-01-01
This work explores different particle-based approaches to the simulation of one-dimensional fractional subdiffusion equations in unbounded domains. We rely on smooth particle approximations, and consider four methods for estimating the fractional diffusion term. The first method is based on direct differentiation of the particle representation, it follows the Riesz definition of the fractional derivative and results in a non-conservative scheme. The other three methods follow the particle strength exchange (PSE) methodology and are by construction conservative, in the sense that the total particle strength is time invariant. The first PSE algorithm is based on using direct differentiation to estimate the fractional diffusion flux, and exploiting the resulting estimates in an integral representation of the divergence operator. Meanwhile, the second one relies on the regularized Riesz representation of the fractional diffusion term to derive a suitable interaction formula acting directly on the particle representation of the diffusing field. A third PSE construction is considered that exploits the Green's function of the fractional diffusion equation. The performance of all four approaches is assessed for the case of a one-dimensional diffusion equation with constant diffusivity. This enables us to take advantage of known analytical solutions, and consequently conduct a detailed analysis of the performance of the methods. This includes a quantitative study of the various sources of error, namely filtering, quadrature, domain truncation, and time integration, as well as a space and time self-convergence analysis. These analyses are conducted for different values of the order of the fractional derivatives, and computational experiences are used to gain insight that can be used for generalization of the present constructions.
Verma, Vivek; Shostrom, Valerie K; Zhen, Weining; Zhang, Mutian; Braunstein, Steve E; Holland, John; Hallemeier, Christopher L; Harkenrider, Matthew M; Iskhanian, Adrian; Jabbour, Salma K; Attia, Albert; Lee, Percy; Wang, Kyle; Decker, Roy H; McGarry, Ronald C; Simone, Charles B
2017-03-15
To describe the impact of fractionation scheme and tumor location on toxicities in stereotactic body radiation therapy (SBRT) for ≥5-cm non-small cell lung cancer (NSCLC), as part of a multi-institutional analysis. Patients with primary ≥5-cm N0 M0 NSCLC who underwent ≤5-fraction SBRT were examined across multiple high-volume SBRT centers. Collected data included clinical/treatment parameters; toxicities were prospectively assessed at each institution according to the Common Terminology Criteria for Adverse Events. Patients treated daily were compared with those treated every other day (QOD)/other nondaily regimens. Stratification between central and peripheral tumors was also performed. Ninety-two patients from 12 institutions were evaluated (2004-2016), with median follow-up of 12 months. In total there were 23 (25%) and 6 (7%) grade ≥2 and grade ≥3 toxicities, respectively. Grades 2 and 3 pulmonary toxicities occurred in 9% and 4%, respectively; 1 patient treated daily experienced grade 5 radiation pneumonitis. Of the entire cohort, 46 patients underwent daily SBRT, and 46 received QOD (n=40)/other nondaily (n=6) regimens. Clinical/treatment parameters were similar between groups; the QOD/other group was more likely to receive 3-/4-fraction schemas. Patients treated QOD/other experienced significantly fewer grade ≥2 toxicities as compared with daily treatment (7% vs 43%, Plocation (P>.05). From this multi-institutional study, toxicity of SBRT for ≥5-cm lesions is acceptable, and daily treatment was associated with a higher rate of toxicities. Copyright © 2016 Elsevier Inc. All rights reserved.
Wahl, Niklas; Hennig, Philipp; Wieser, Hans-Peter; Bangert, Mark
2018-04-01
reduced fraction number and/or for more robust treatment plans. By explicit consideration of fractionation effects during planning, we demonstrate that it is possible to exploit this trade-off during optimization. APM optimization considering the fraction number reduced the dose in organs at risk compared to conventional probabilistic optimization neglecting the fraction number. APM enables computationally efficient incorporation of fractionation effects in probabilistic uncertainty analysis and probabilistic treatment plan optimization. The consideration of the fractionation scheme in probabilistic treatment planning reveals the trade-off between number of fractions, nominal dose, and treatment plan robustness. © 2018 American Association of Physicists in Medicine.
Καπίρης, Σταμάτης; Kapiris, Stamatis
2017-01-01
Exploit kits have become one of the most widespread and destructive threat that Internet users face on a daily basis. Since the first actor, which has been categorized as exploit kit, namely MPack, appeared in 2006, we have seen a new era on exploit kit variants compromising popular websites, infecting hosts and delivering destructive malware, following an exponentially evolvement to date. With the growing threat landscape, large enterprises to domestic networks, have starte...
Exploitability Assessment with TEASER
2017-05-01
for architectural neutral taint analysis on top of LLVM and QEMU. POC Proof of Concept : Demonstration of an exploit on a program . vii RCE Remote Code...bug with a Proof of Concept (POC), or input to a program demonstrating the ability to use a bug to exploit the application, to demonstrate the...often leads to either computationally difficult constraint solving problems or taint explosion. Given the computational difficulty of exploit
Anthropology of sexual exploitation
Directory of Open Access Journals (Sweden)
Lalić Velibor
2009-01-01
Full Text Available In this paper, the authors observe sexual exploitation from an anthropological perspective. They analyze the rational, ethical, emotional and mythological dimensions of human sexuality. Consequently, after setting the phenomenon in a social and historical context, sexual exploitation is closely observed in the contemporary age. Based on thoughts of relevant thinkers, they make the conclusion that the elimination of sexual exploitation is not an utterly legal issue, but political and economical issues as well. Namely, legal norms are not sufficient to overcome sexual exploitation, but, political and economical relationships in contemporary societies, which will be based on sincere equal opportunities must be established.
Ferguson, B.
2016-01-01
According to some accounts of exploitation, most notably Ruth Sample's (2003) degradation-based account and Robert Goodin's (1987) vulnerability-based account, exploitation occurs when an advantaged party fails to constrain their advantage in light of another's disadvantage, regardless of the cause
EXPLOITATION OF GRANITE BOULDER
Directory of Open Access Journals (Sweden)
Ivan Cotman
1994-12-01
Full Text Available The processes of forming, petrography, features, properties and exploitation of granite boulders are described. The directional drilling and black powder blasting is the succesful method in exploitation of granite boulders (boulder technology (the paper is published in Croatian.
Poverty-Exploitation-Alienation.
Bronfenbrenner, Martin
1980-01-01
Illustrates how knowledge derived from the discipline of economics can be used to help shed light on social problems such as poverty, exploitation, and alienation, and can help decision makers form policy to minimize these and similar problems. (DB)
International Nuclear Information System (INIS)
Boeheim, C.
1990-03-01
The Stanford Linear Accelerator Center has recently completed a conversion to IBM's VM/XA SP Release 2 operating system. The primary physics application had been constrained by the previous 16 megabyte memory limit. Work is underway to enable this application to exploit the new features of VM/XA. This paper presents a brief tutorial on how to convert an application to exploit VM/XA and discusses some of the SLAC experiences in doing so. 13 figs
The data cyclotron query processing scheme
R.A. Goncalves (Romulo); M.L. Kersten (Martin)
2010-01-01
htmlabstractDistributed database systems exploit static workload characteristics to steer data fragmentation and data allocation schemes. However, the grand challenge of distributed query processing is to come up with a self-organizing architecture, which exploits all resources to manage the hot
DEFF Research Database (Denmark)
van Leeuwen, Theo
2013-01-01
This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....
Dissemination and Exploitation Strategy
DEFF Research Database (Denmark)
Badger, Merete; Monaco, Lucio; Fransson, Torsten
of Technology in Sweden, Politecnico di Torino in Italy, and Eindhoven University of Technology in the Netherlands. The project is partially funded by the European Commission under the 7th Framework Programme (project no. RI-283746). This report describes the final dissemination and exploitation strategy...... for project Virtual Campus Hub. A preliminary dissemination and exploitation plan was setup early in the project as described in the deliverable D6.1 Dissemination strategy paper - preliminary version. The plan has been revised on a monthly basis during the project’s lifecycle in connection with the virtual...
J.K. Hoogland (Jiri); C.D.D. Neumann
2000-01-01
textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing
Energy Technology Data Exchange (ETDEWEB)
Auberdiac, P.; Cartier, L.; Malkoun, N.; Chauleur, C.; De Laroche, G.; Magne, N. [Departement de radiotherapie, institut de cancerologie de la Loire, 108 bis, avenue Albert-Raimond, BP 60008, 42271 Saint-Priest-en-Jarez cedex (France); Chargari, C. [Service d' oncologie radiotherapie, hopital d' instruction des armees du Val-de-Grace, 74, boulevard de Port-Royal, 75230 Paris cedex 5 (France); Melis, A.; Jacquin, J.P. [Departement d' oncologie medicale, institut de cancerologie de la Loire, 108 bis, avenue Albert-Raimond, BP 60008, 42271 Saint-Priest-en-Jarez cedex (France)
2011-12-15
Normo-fractionated radiotherapy is standard for adjuvant management of patients treated with breast conservative surgery for breast cancer. However, many elderly patients are not eligible to such strategy, either because of concurrent diseases, or because the tumor is inoperable. Several protocols of exclusive radiotherapy have been reported in the literature, frequently using hypo-fractionated radiotherapy and endocrine therapy. We report a case of a patient treated with exclusive endocrine and radiotherapy and address the state of the art on hypo-fractionated schemes for the management of elderly breast cancer patients. While hypo-fractionated radiotherapy does not compromise the oncologic or cosmetic outcome, there is no prospective data that assesses the place of radiotherapy for the exclusive treatment of elderly patients. This strategy should be further assessed in clinical randomized trial. (authors)
Hacking the art of exploitation
Erickson, Jon
2003-01-01
A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
Nanostructured Basaltfiberconcrete Exploitational Characteristics
Saraykina, K. A.; Shamanov, V. A.
2017-11-01
The article demonstrates that the mass use of basalt fiber concrete (BFC) is constrained by insufficient study of their durability and serviceability in a variety of environments. This research is aimed at the study of the basalt fiber corrosion processes in the cement stone of BFC, the control of the new products structure formation in order to protect the reinforcing fiber from alkaline destruction and thereby improve the exploitational characteristics of the composite. The research result revealed that the modification of basaltfiber concrete by the dispersion of MWNTs contributes to the directional formation of new products in the cement matrix. The HAM additive in basaltfiberconcrete provides for the binding of portlandite to low-basic calcium hydroaluminosilicates, thus reducing the aggressive effect of the cement environment on the reinforcing fibers properties. The complex modification of BFC with nanostructured additives provides for an increase in its durability and exploitational properties (strength, frost resistance and water resistance) due to basalt fiber protection from alkali corrosion on account of the compacting of the contact zone “basalt fiber - cement stone” and designing of the new products structure and morphology of cement matrix over the fiber surface.
Exploitation by Economic Necessity
Directory of Open Access Journals (Sweden)
Kristian F. Braekkan
2015-10-01
Full Text Available This study develops and tests a model that proposes economic necessity moderates the relationship between psychological contract violations (PCVs and organizational commitment and trust in the employing organization among non-unionized manufacturing workers (N = 226. Moderated regression analyses revealed that there was a significant interaction between PCV and economic necessity in predicting both outcomes. Specifically, the findings indicated that individuals experiencing high PCV and high economic necessity did not decrease their organizational commitment like their counterparts who endorsed lower economic necessity. They did, however, experience significantly decreased trust in their employer. The findings suggest that individuals who are forced to sell their labor power and obtain what they need through the market are more likely to continue to be exploited by their employer, as they have no other options than to continue the relationship. The importance of the findings is discussed, and recommendations for future research are provided.
Exploitative Learning by Exporting
DEFF Research Database (Denmark)
Golovko, Elena; Lopes Bento, Cindy; Sofka, Wolfgang
Decisions on entering foreign markets are among the most challenging but also potentially rewarding strategy choices managers can make. In this study, we examine the effect of export entry on the firm investment decisions in two activities associated with learning about new technologies...... and learning about new markets ? R&D investments and marketing investments, in search of novel insights into the content and process underlying learning by exporting. We draw from organizational learning theory for predicting changes in both R&D and marketing investment patterns that accompany firm entry......, it is predominantly the marketing-related investment decisions associated with starting to export that lead to increases in firm productivity. We conclude that learning-by-exporting might be more properly characterized as ?learning about and exploiting new markets? rather than ?learning about new technologies...
Learning Metasploit exploitation and development
Balapure, Aditya
2013-01-01
A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits.This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level.Prior experience exploiting basic st
Optimal Resource Allocation for NOMA-TDMA Scheme with α-Fairness in Industrial Internet of Things.
Sun, Yanjing; Guo, Yiyu; Li, Song; Wu, Dapeng; Wang, Bin
2018-05-15
In this paper, a joint non-orthogonal multiple access and time division multiple access (NOMA-TDMA) scheme is proposed in Industrial Internet of Things (IIoT), which allowed multiple sensors to transmit in the same time-frequency resource block using NOMA. The user scheduling, time slot allocation, and power control are jointly optimized in order to maximize the system α -fair utility under transmit power constraint and minimum rate constraint. The optimization problem is nonconvex because of the fractional objective function and the nonconvex constraints. To deal with the original problem, we firstly convert the objective function in the optimization problem into a difference of two convex functions (D.C.) form, and then propose a NOMA-TDMA-DC algorithm to exploit the global optimum. Numerical results show that the NOMA-TDMA scheme significantly outperforms the traditional orthogonal multiple access scheme in terms of both spectral efficiency and user fairness.
Efficient Depth Map Compression Exploiting Segmented Color Data
DEFF Research Database (Denmark)
Milani, Simone; Zanuttigh, Pietro; Zamarin, Marco
2011-01-01
performances is still an open research issue. This paper presents a novel compression scheme that exploits a segmentation of the color data to predict the shape of the different surfaces in the depth map. Then each segment is approximated with a parameterized plane. In case the approximation is sufficiently...
Maria Klimikova
2010-01-01
Understanding the reasons of the present financial problems lies In understanding the substance of fractional reserve banking. The substance of fractional banking is in lending more money than the bankers have. Banking of partial reserves is an alternative form which links deposit banking and credit banking. Fractional banking is causing many unfavorable economic impacts in the worldwide system, specifically an inflation.
Additive operator-difference schemes splitting schemes
Vabishchevich, Petr N
2013-01-01
Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy
Povstenko, Yuriy
2015-01-01
This book is devoted to fractional thermoelasticity, i.e. thermoelasticity based on the heat conduction equation with differential operators of fractional order. Readers will discover how time-fractional differential operators describe memory effects and space-fractional differential operators deal with the long-range interaction. Fractional calculus, generalized Fourier law, axisymmetric and central symmetric problems and many relevant equations are featured in the book. The latest developments in the field are included and the reader is brought up to date with current research. The book contains a large number of figures, to show the characteristic features of temperature and stress distributions and to represent the whole spectrum of order of fractional operators. This work presents a picture of the state-of-the-art of fractional thermoelasticity and is suitable for specialists in applied mathematics, physics, geophysics, elasticity, thermoelasticity and engineering sciences. Corresponding sections of ...
Profits and Exploitation: A Reappraisal
Yoshihara, Naoki; Veneziani, Roberto
2011-01-01
This paper provides a mathematical analysis of the Marxian theory of the exploitation of labour in general equilibrium models. The two main definitions of Marxian exploitation in the literature, proposed by Morishima (1974) and Roemer (1982), respectively, are analysed in the context of general convex economies. It is shown that, contrary to the received view, in general these definitions do not preserve the so-called Fundamental Marxian Theorem (FMT), which states that the exploitation of la...
DEFF Research Database (Denmark)
Petersen, Roongrat; Hou, Xiaolin; Hansen, Elo Harald
2008-01-01
A dynamic extraction system exploiting sequential injection (SI) for sequential extractions incorporating a specially designed extraction column is developed to fractionate radionuclides in environmental solid samples such as soils and sediments. The extraction column can contain a large amount...... of soil sample (up to 5 g), and under optimal operational conditions it does not give rise to creation of back pressure. Attention has been placed on studies of the readsorption problems during sequential extraction using a modified Standards, Measurements and Testing (SM&T) scheme with 4-step sequential...
van der Neut, Wendy
2014-01-01
This thesis is about so-‐called consensual exploitative transactions: transactions to which all parties agree voluntarily, and which are beneficial for all parties, but which are still widely considered exploitative, and for that reason legally restricted in many countries. The thesis asks two main questions: 1. What is wrong with consensual exploitation? 2.What implications does the answer to this question have for the legal restriction of consensual transactions ...
Hypo fractionated prostate treatment by volumearcotherapy modulated
International Nuclear Information System (INIS)
Clemente Gutierrez, F.; Perez Vara, C.; Prieto Villacorta, M.
2013-01-01
Several studies have been proposed over the years schemes of hypo-fractionated treatment for prostate cancer. Such schemes have been designed in order to increase local control of the disease and reduce complications. They are in addition a clear improvement from the point of view logistical and organizational for treatment centres and the patient. the hypo-fractionated treatments are possible because the ratio a/b for prostate carcinoma is comparable, and even below, the surrounding healthy tissues. This work presents the scheme adopted in our Center for the hypo-fractionated treatment of the cancer of prostate by arco therapy volumetric modulated. (Author)
DEFF Research Database (Denmark)
Wagner, Stephan; Legros, Samuel; Löschner, Katrin
2015-01-01
content by asymmetric flow-field flow fractionation coupled to a multi-angle light scattering detector and an inductively coupled plasma mass spectrometer. Following the proposed generic procedure SiO2-ENPs were separated from a tomato soup. Two potential sample preparation methods were tested these being...... quality criteria for method development is urgently needed for standardized and systematic development of procedures for separation of ENPs from a complex matrix. The chosen analytical technique was shown to be suitable for detecting SiO2-ENPs in a complex food matrix like tomato soup and may therefore...
International Nuclear Information System (INIS)
Saminadayar, L.
2001-01-01
20 years ago fractional charges were imagined to explain values of conductivity in some materials. Recent experiments have proved the existence of charges whose value is the third of the electron charge. This article presents the experimental facts that have led theorists to predict the existence of fractional charges from the motion of quasi-particles in a linear chain of poly-acetylene to the quantum Hall effect. According to the latest theories, fractional charges are neither bosons nor fermions but anyons, they are submitted to an exclusive principle that is less stringent than that for fermions. (A.C.)
Rational Exploitation and Utilizing of Groundwater in Jiangsu Coastal Area
Kang, B.; Lin, X.
2017-12-01
Jiangsu coastal area is located in the southeast coast of China, where is a new industrial base and an important coastal and Land Resources Development Zone of China. In the areas with strong human exploitation activities, regional groundwater evolution is obviously affected by human activities. In order to solve the environmental geological problems caused by groundwater exploitation fundamentally, we must find out the forming conditions of regional groundwater hydrodynamic field, and the impact of human activities on groundwater hydrodynamic field evolution and hydrogeochemical evolition. Based on these results, scientific management and reasonable exploitation of the regional groundwater resources can be provided for the utilization. Taking the coastal area of Jiangsu as the research area, we investigate and analyze of the regional hydrogeological conditions. The numerical simulation model of groundwater flow was established according to the water power, chemical and isotopic methods, the conditions of water flow and the influence of hydrodynamic field on the water chemical field. We predict the evolution of regional groundwater dynamics under the influence of human activities and climate change and evaluate the influence of groundwater dynamic field evolution on the environmental geological problems caused by groundwater exploitation under various conditions. We get the following conclusions: Three groundwater exploitation optimal schemes were established. The groundwater salinization was taken as the primary control condition. The substitution model was proposed to model groundwater exploitation and water level changes by BP network method.Then genetic algorithm was used to solve the optimization solution. Three groundwater exploitation optimal schemes were submit to local water resource management. The first sheme was used to solve the groundwater salinization problem. The second sheme focused on dual water supply. The third sheme concerned on emergency water
International Nuclear Information System (INIS)
Jackiw, R.; Massachusetts Inst. of Tech., Cambridge; Massachusetts Inst. of Tech., Cambridge
1984-01-01
The theory of fermion fractionization due to topologically generated fermion ground states is presented. Applications to one-dimensional conductors, to the MIT bag, and to the Hall effect are reviewed. (author)
Evaluating Maximum Wind Energy Exploitation in Active Distribution Networks
DEFF Research Database (Denmark)
Siano, Pierluigi; Chen, Peiyuan; Chen, Zhe
2010-01-01
The increased spreading of distributed and renewable generation requires moving towards active management of distribution networks. In this paper, in order to evaluate maximum wind energy exploitation in active distribution networks, a method based on a multi-period optimal power flow (OPF......) analysis is proposed. Active network management schemes such as coordinated voltage control, energy curtailment and power factor control are integrated in the method in order to investigate their impacts on the maximization of wind energy exploitation. Some case studies, using real data from a Danish...... distribution system, confirmed the effectiveness of the proposed method in evaluating the optimal applications of active management schemes to increase wind energy harvesting without costly network reinforcement for the connection of wind generation....
Zhou, Ping; Bai, Rongji
2014-01-01
Based on a new stability result of equilibrium point in nonlinear fractional-order systems for fractional-order lying in 1 < q < 2, one adaptive synchronization approach is established. The adaptive synchronization for the fractional-order Lorenz chaotic system with fractional-order 1 < q < 2 is considered. Numerical simulations show the validity and feasibility of the proposed scheme. PMID:25247207
One Adaptive Synchronization Approach for Fractional-Order Chaotic System with Fractional-Order 1
Directory of Open Access Journals (Sweden)
Ping Zhou
2014-01-01
Full Text Available Based on a new stability result of equilibrium point in nonlinear fractional-order systems for fractional-order lying in 1fractional-order Lorenz chaotic system with fractional-order 1
scheme.
Bhattacharyya, Sonalee; Namakshi, Nama; Zunker, Christina; Warshauer, Hiroko K.; Warshauer, Max
2016-01-01
Making math more engaging for students is a challenge that every teacher faces on a daily basis. These authors write that they are constantly searching for rich problem-solving tasks that cover the necessary content, develop critical-thinking skills, and engage student interest. The Mystery Fraction activity provided here focuses on a key number…
Fraction Reduction through Continued Fractions
Carley, Holly
2011-01-01
This article presents a method of reducing fractions without factoring. The ideas presented may be useful as a project for motivated students in an undergraduate number theory course. The discussion is related to the Euclidean Algorithm and its variations may lead to projects or early examples involving efficiency of an algorithm.
Sman, van der R.G.M.
2006-01-01
In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the
Teotihuacan, tepeapulco, and obsidian exploitation.
Charlton, T H
1978-06-16
Current cultural ecological models of the development of civilization in central Mexico emphasize the role of subsistence production techniques and organization. The recent use of established and productive archeological surface survey techniques along natural corridors of communication between favorable niches for cultural development within the Central Mexican symbiotic region resulted in the location of sites that indicate an early development of a decentralized resource exploitation, manufacturing, and exchange network. The association of the development of this system with Teotihuacán indicates the importance such nonsubsistence production and exchange had in the evolution of this first central Mexican civilization. The later expansion of Teotihuacán into more distant areas of Mesoamerica was based on this resource exploitation model. Later civilizations centered at Tula and Tenochtitlán also used such a model in their expansion.
Network exploitation using WAMI tracks
Rimey, Ray; Record, Jim; Keefe, Dan; Kennedy, Levi; Cramer, Chris
2011-06-01
Creating and exploiting network models from wide area motion imagery (WAMI) is an important task for intelligence analysis. Tracks of entities observed moving in the WAMI sensor data are extracted, then large numbers of tracks are studied over long time intervals to determine specific locations that are visited (e.g., buildings in an urban environment), what locations are related to other locations, and the function of each location. This paper describes several parts of the network detection/exploitation problem, and summarizes a solution technique for each: (a) Detecting nodes; (b) Detecting links between known nodes; (c) Node attributes to characterize a node; (d) Link attributes to characterize each link; (e) Link structure inferred from node attributes and vice versa; and (f) Decomposing a detected network into smaller networks. Experimental results are presented for each solution technique, and those are used to discuss issues for each problem part and its solution technique.
Cancelable remote quantum fingerprint templates protection scheme
International Nuclear Information System (INIS)
Liao Qin; Guo Ying; Huang Duan
2017-01-01
With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)
Estimating plume dispersion: a comparison of several sigma schemes
International Nuclear Information System (INIS)
Irwin, J.S.
1983-01-01
The lateral and vertical Gaussian plume dispersion parameters are estimated and compared with field tracer data collected at 11 sites. The dispersion parameter schemes used in this analysis include Cramer's scheme, suggested for tall stack dispersion estimates, Draxler's scheme, suggested for elevated and surface releases, Pasquill's scheme, suggested for interim use in dispersion estimates, and the Pasquill--Gifford scheme using Turner's technique for assigning stability categories. The schemes suggested by Cramer, Draxler and Pasquill estimate the dispersion parameters using onsite measurements of the vertical and lateral wind-velocity variances at the effective release height. The performances of these schemes in estimating the dispersion parameters are compared with that of the Pasquill--Gifford scheme, using the Prairie Grass and Karlsruhe data. For these two experiments, the estimates of the dispersion parameters using Draxler's scheme correlate better with the measurements than did estimates using the Pasquill--Gifford scheme. Comparison of the dispersion parameter estimates with the measurement suggests that Draxler's scheme for characterizing the dispersion results in the smallest mean fractional error in the estimated dispersion parameters and the smallest variance of the fractional errors
The ESA Geohazard Exploitation Platform
Bally, Philippe; Laur, Henri; Mathieu, Pierre-Philippe; Pinto, Salvatore
2015-04-01
Earthquakes represent one of the world's most significant hazards in terms both of loss of life and damages. In the first decade of the 21st century, earthquakes accounted for 60 percent of fatalities from natural disasters, according to the United Nations International Strategy for Disaster Reduction (UNISDR). To support mitigation activities designed to assess and reduce risks and improve response in emergency situations, satellite EO can be used to provide a broad range of geo-information services. This includes for instance crustal block boundary mapping to better characterize active faults, strain rate mapping to assess how rapidly faults are deforming, soil vulnerability mapping to help estimate how the soil is behaving in reaction to seismic phenomena, geo-information to assess the extent and intensity of the earthquake impact on man-made structures and formulate assumptions on the evolution of the seismic sequence, i.e. where local aftershocks or future main shocks (on nearby faults) are most likely to occur. In May 2012, the European Space Agency and the GEO Secretariat convened the International Forum on Satellite EO for Geohazards now known as the Santorini Conference. The event was the continuation of a series of international workshops such as those organized by the Geohazards Theme of the Integrated Global Observing Strategy Partnership. In Santorini the seismic community has set out a vision of the EO contribution to an operational global seismic risk program, which lead to the Geohazard Supersites and Natural Laboratories (GSNL) initiative. The initial contribution of ESA to suuport the GSNL was the first Supersites Exploitation Platform (SSEP) system in the framework of Grid Processing On Demand (GPOD), now followed by the Geohazard Exploitation Platform (GEP). In this presentation, we will describe the contribution of the GEP for exploiting satellite EO for geohazard risk assessment. It is supporting the GEO Supersites and has been further
Scheme Program Documentation Tools
DEFF Research Database (Denmark)
Nørmark, Kurt
2004-01-01
are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....
International Nuclear Information System (INIS)
Zhang, Xiao; Wei, Chaozhen; Liu, Yingming; Luo, Maokang
2014-01-01
In this paper we use Dirac function to construct a fractional operator called fractional corresponding operator, which is the general form of momentum corresponding operator. Then we give a judging theorem for this operator and with this judging theorem we prove that R–L, G–L, Caputo, Riesz fractional derivative operator and fractional derivative operator based on generalized functions, which are the most popular ones, coincide with the fractional corresponding operator. As a typical application, we use the fractional corresponding operator to construct a new fractional quantization scheme and then derive a uniform fractional Schrödinger equation in form. Additionally, we find that the five forms of fractional Schrödinger equation belong to the particular cases. As another main result of this paper, we use fractional corresponding operator to generalize fractional quantization scheme by using Lévy path integral and use it to derive the corresponding general form of fractional Schrödinger equation, which consequently proves that these two quantization schemes are equivalent. Meanwhile, relations between the theory in fractional quantum mechanics and that in classic quantum mechanics are also discussed. As a physical example, we consider a particle in an infinite potential well. We give its wave functions and energy spectrums in two ways and find that both results are the same
Prospects of geothermal resource exploitation
International Nuclear Information System (INIS)
Bourrelier, P.H.; Cornet, F.; Fouillac, C.
1994-01-01
The use of geothermal energy to generate electricity has only occurred during the past 50 years by drilling wells in aquifers close to magmas and producing either dry steam or hot water. The world's production of electricity from geothermal energy is over 6000 MWe and is still growing. The direct use of geothermal energy for major urban communities has been developed recently by exploitation of aquifers in sedimentary basins under large towns. Scaling up the extraction of heat implies the exploitation of larger and better located fields requiring an appropriate method of extraction; the objective of present attempts in USA, Japan and Europe is to create heat exchangers by the circulation of water between several deep wells. Two field categories are considered: the extension of classical geothermal fields beyond the aquifer areas, and areas favoured by both a high geothermal gradient, fractures inducing a natural permeability at large scale, and good commercial prospects (such as in the Rhenan Graben). Hot dry rocks concept has gained a large interest. 1 fig., 5 tabs., 11 refs
A new measure of interpersonal exploitativeness
Directory of Open Access Journals (Sweden)
Amy B. Brunell
2013-05-01
Full Text Available Measures of exploitativeness evidence problems with validity and reliability. The present set of studies assessed a new measure (the Interpersonal Exploitativeness Scale that defines exploitativeness in terms of reciprocity. In Studies 1 and 2, 33 items were administered to participants. Exploratory and Confirmatory Factor Analysis demonstrated that a single factor consisting of six items adequately assess interpersonal exploitativeness. Study 3 results revealed that the Interpersonal Exploitativeness Scale was positively associated with normal narcissism, pathological narcissism, psychological entitlement, and negative reciprocity and negatively correlated with positive reciprocity. In Study 4, participants competed in a commons dilemma. Those who scored higher on the Interpersonal Exploitativeness Scale were more likely to harvest a greater share of resources over time, even while controlling for other relevant variables, such as entitlement. Together, these studies show the Interpersonal Exploitativeness Scale to be a valid and reliable measure of interpersonal exploitativeness. The authors discuss the implications of these studies.
Multiresolution signal decomposition schemes
J. Goutsias (John); H.J.A.M. Heijmans (Henk)
1998-01-01
textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis
International Nuclear Information System (INIS)
Turner, R.E.
1984-01-01
A search was made for fractional charges of the form Z plus two-thirds e, where Z is an integer. It was assumed that the charges exist in natural form bound with other fractional charges in neutral molecules. It was further assumed that these neutral molecules are present in air. Two concentration schemes were employed. One sample was derived from the waste gases from a xenon distillation plant. This assumes that high mass, low vapor pressure components of air are concentrated along with the xenon. The second sample involved ionizing air, allowing a brief recombination period, and then collecting residual ions on the surface of titanium discs. Both samples were analyzed at the University of Rochester in a system using a tandem Van de Graff to accelerate particles through an essentially electrostatic beam handling system. The detector system employed both a Time of Flight and an energy-sensitive gas ionization detector. In the most sensitive mode of analysis, a gas absorber was inserted in the beam path to block the intense background. The presence of an absorber limited the search to highly penetrating particles. Effectively, this limited the search to particles with low Z and masses greater than roughly fifty GeV. The final sensitivities attained were on the order of 1 x 10 -20 for the ionized air sample and 1 x 10 -21 for the gas sample. A discussion of the caveats that could reduce the actual level of sensitivity is included
Exploitation in International Paid Surrogacy Arrangements
Wilkinson, Stephen
2015-01-01
Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate probl...
Directory of Open Access Journals (Sweden)
R. Sitharthan
2016-09-01
Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.
The exploitation argument against commercial surrogacy.
Wilkinson, Stephen
2003-04-01
This paper discusses the exploitation argument against commercial surrogacy: the claim that commercial surrogacy is morally objectionable because it is exploitative. The following questions are addressed. First, what exactly does the exploitation argument amount to? Second, is commercial surrogacy in fact exploitative? Third, if it were exploitative, would this provide a sufficient reason to prohibit (or otherwise legislatively discourage) it? The focus throughout is on the exploitation of paid surrogates, although it is noted that other parties (e.g. 'commissioning parents') may also be the victims of exploitation. It is argued that there are good reasons for believing that commercial surrogacy is often exploitative. However, even if we accept this, the exploitation argument for prohibiting (or otherwise legislatively discouraging) commercial surrogacy remains quite weak. One reason for this is that prohibition may well 'backfire' and lead to potential surrogates having to do other things that are more exploitative and/or more harmful than paid surrogacy. It is concluded therefore that those who oppose exploitation should (rather than attempting to stop particular practices like commercial surrogacy) concentrate on: (a) improving the conditions under which paid surrogates 'work'; and (b) changing the background conditions (in particular, the unequal distribution of power and wealth) which generate exploitative relationships.
Cryptanalysis of a computer cryptography scheme based on a filter bank
International Nuclear Information System (INIS)
Arroyo, David; Li Chengqing; Li Shujun; Alvarez, Gonzalo
2009-01-01
This paper analyzes the security of a recently-proposed signal encryption scheme based on a filter bank. A very critical weakness of this new signal encryption procedure is exploited in order to successfully recover the associated secret key.
Adaptive multi-objective Optimization scheme for cognitive radio resource management
Alqerm, Ismail; Shihada, Basem
2014-01-01
configuration by exploiting optimization and machine learning techniques. In this paper, we propose an Adaptive Multi-objective Optimization Scheme (AMOS) for cognitive radio resource management to improve spectrum operation and network performance
A quantum-mechanics molecular-mechanics scheme for extended systems.
Hunt, Diego; Sanchez, Veronica M; Scherlis, Damián A
2016-08-24
We introduce and discuss a hybrid quantum-mechanics molecular-mechanics (QM-MM) approach for Car-Parrinello DFT simulations with pseudopotentials and planewaves basis, designed for the treatment of periodic systems. In this implementation the MM atoms are considered as additional QM ions having fractional charges of either sign, which provides conceptual and computational simplicity by exploiting the machinery already existing in planewave codes to deal with electrostatics in periodic boundary conditions. With this strategy, both the QM and MM regions are contained in the same supercell, which determines the periodicity for the whole system. Thus, while this method is not meant to compete with non-periodic QM-MM schemes able to handle extremely large but finite MM regions, it is shown that for periodic systems of a few hundred atoms, our approach provides substantial savings in computational times by treating classically a fraction of the particles. The performance and accuracy of the method is assessed through the study of energetic, structural, and dynamical aspects of the water dimer and of the aqueous bulk phase. Finally, the QM-MM scheme is applied to the computation of the vibrational spectra of water layers adsorbed at the TiO2 anatase (1 0 1) solid-liquid interface. This investigation suggests that the inclusion of a second monolayer of H2O molecules is sufficient to induce on the first adsorbed layer, a vibrational dynamics similar to that taking place in the presence of an aqueous environment. The present QM-MM scheme appears as a very interesting tool to efficiently perform molecular dynamics simulations of complex condensed matter systems, from solutions to nanoconfined fluids to different kind of interfaces.
A quantum-mechanics molecular-mechanics scheme for extended systems
International Nuclear Information System (INIS)
Hunt, Diego; Scherlis, Damián A; Sanchez, Veronica M
2016-01-01
We introduce and discuss a hybrid quantum-mechanics molecular-mechanics (QM-MM) approach for Car–Parrinello DFT simulations with pseudopotentials and planewaves basis, designed for the treatment of periodic systems. In this implementation the MM atoms are considered as additional QM ions having fractional charges of either sign, which provides conceptual and computational simplicity by exploiting the machinery already existing in planewave codes to deal with electrostatics in periodic boundary conditions. With this strategy, both the QM and MM regions are contained in the same supercell, which determines the periodicity for the whole system. Thus, while this method is not meant to compete with non-periodic QM-MM schemes able to handle extremely large but finite MM regions, it is shown that for periodic systems of a few hundred atoms, our approach provides substantial savings in computational times by treating classically a fraction of the particles. The performance and accuracy of the method is assessed through the study of energetic, structural, and dynamical aspects of the water dimer and of the aqueous bulk phase. Finally, the QM-MM scheme is applied to the computation of the vibrational spectra of water layers adsorbed at the TiO 2 anatase (1 0 1) solid–liquid interface. This investigation suggests that the inclusion of a second monolayer of H 2 O molecules is sufficient to induce on the first adsorbed layer, a vibrational dynamics similar to that taking place in the presence of an aqueous environment. The present QM-MM scheme appears as a very interesting tool to efficiently perform molecular dynamics simulations of complex condensed matter systems, from solutions to nanoconfined fluids to different kind of interfaces. (paper)
Remarks for one-dimensional fractional equations
Directory of Open Access Journals (Sweden)
Massimiliano Ferrara
2014-01-01
Full Text Available In this paper we study a class of one-dimensional Dirichlet boundary value problems involving the Caputo fractional derivatives. The existence of infinitely many solutions for this equations is obtained by exploiting a recent abstract result. Concrete examples of applications are presented.
The Exploitation of Evolving Resources
McGlade, Jacqueline; Law, Richard
1993-01-01
The impact of man on the biosphere is profound. Quite apart from our capacity to destroy natural ecosystems and to drive species to extinction, we mould the evolution of the survivors by the selection pressures we apply to them. This has implications for the continued health of our natural biological resources and for the way in which we seek to optimise yield from those resources. Of these biological resources, fish stocks are particularly important to mankind as a source of protein. On a global basis, fish stocks provide the major source of protein for human consumption from natural ecosystems, amounting to some seventy million tonnes in 1970. Although fisheries management has been extensively developed over the last century, it has not hitherto considered the evolutionary consequences of fishing activity. While this omission may not have been serious in the past, the ever increasing intensity of exploitation and the deteriorating health of fish stocks has generated an urgent need for a better understanding...
Swedish mines. Underground exploitation methods
International Nuclear Information System (INIS)
Paucard, A.
1960-01-01
Between 1949 and 1957, 10 engineers of the Mining research and exploitation department of the CEA visited 17 Swedish mines during 5 field trips. This paper presents a compilation of the information gathered during these field trips concerning the different underground mining techniques used in Swedish iron mines: mining with backfilling (Central Sweden and Boliden mines); mining without backfilling (mines of the polar circle area). The following techniques are described successively: pillar drawing and backfilled slices (Ammeberg, Falun, Garpenberg, Boliden group), sub-level pillar drawing (Grangesberg, Bloettberget, Haeksberg), empty room and sub-level pillar drawing (Bodas, Haksberg, Stripa, Bastkarn), storage chamber pillar drawing (Bodas, Haeksberg, Bastkarn), and pillar drawing by block caving (ldkerberget). Reprint of a paper published in Revue de l'Industrie Minerale, vol. 41, no. 12, 1959 [fr
Exploiting social evolution in biofilms
DEFF Research Database (Denmark)
Boyle, Kerry E; Heilmann, Silja; van Ditmarsch, Dave
2013-01-01
Bacteria are highly social organisms that communicate via signaling molecules, move collectively over surfaces and make biofilm communities. Nonetheless, our main line of defense against pathogenic bacteria consists of antibiotics-drugs that target individual-level traits of bacterial cells...... and thus, regrettably, select for resistance against their own action. A possible solution lies in targeting the mechanisms by which bacteria interact with each other within biofilms. The emerging field of microbial social evolution combines molecular microbiology with evolutionary theory to dissect...... the molecular mechanisms and the evolutionary pressures underpinning bacterial sociality. This exciting new research can ultimately lead to new therapies against biofilm infections that exploit evolutionary cheating or the trade-off between biofilm formation and dispersal....
Energy for lunar resource exploitation
Glaser, Peter E.
1992-02-01
Humanity stands at the threshold of exploiting the known lunar resources that have opened up with the access to space. America's role in the future exploitation of space, and specifically of lunar resources, may well determine the level of achievement in technology development and global economic competition. Space activities during the coming decades will significantly influence the events on Earth. The 'shifting of history's tectonic plates' is a process that will be hastened by the increasingly insistent demands for higher living standards of the exponentially growing global population. Key to the achievement of a peaceful world in the 21st century, will be the development of a mix of energy resources at a societally acceptable and affordable cost within a realistic planning horizon. This must be the theme for the globally applicable energy sources that are compatible with the Earth's ecology. It is in this context that lunar resources development should be a primary goal for science missions to the Moon, and for establishing an expanding human presence. The economic viability and commercial business potential of mining, extracting, manufacturing, and transporting lunar resource based materials to Earth, Earth orbits, and to undertake macroengineering projects on the Moon remains to be demonstrated. These extensive activities will be supportive of the realization of the potential of space energy sources for use on Earth. These may include generating electricity for use on Earth based on beaming power from Earth orbits and from the Moon to the Earth, and for the production of helium 3 as a fuel for advanced fusion reactors.
A simple scheme for injection and extraction in compact rings
International Nuclear Information System (INIS)
Xu, H. S.; Huang, W. H.; Tang, C. X.
2014-01-01
There has been great interest in building compact synchrotrons for various applications, for example, inverse Compton scattering X-ray sources. However, the beam injection and extraction in compact rings require careful design for the lack of space. In this paper, we propose a simple combined injection-extraction scheme exploiting the fringe field of existing dipole magnets instead of additional septum magnets. This scheme is illustrated by using the 4.8 m ring proposed for Tsinghua Thomson scattering X-ray source as an example. Particle tracking is applied to demonstrate the validity of this scheme
Performance comparison of binary modulation schemes for visible light communication
Park, Kihong
2015-09-11
In this paper, we investigate the power spectral density of several binary modulation schemes including variable on-off keying, variable pulse position modulation, and pulse dual slope modulation which were previously proposed for visible light communication with dimming control. We also propose a novel slope-based modulation called differential chip slope modulation (DCSM) and develop a chip-based hard-decision receiver to demodulate the resulting signal, detect the chip sequence, and decode the input bit sequence. We show that the DCSM scheme can exploit spectrum density more efficiently than the reference schemes while providing an error rate performance comparable to them. © 2015 IEEE.
Fractional vector calculus for fractional advection dispersion
Meerschaert, Mark M.; Mortensen, Jeff; Wheatcraft, Stephen W.
2006-07-01
We develop the basic tools of fractional vector calculus including a fractional derivative version of the gradient, divergence, and curl, and a fractional divergence theorem and Stokes theorem. These basic tools are then applied to provide a physical explanation for the fractional advection-dispersion equation for flow in heterogeneous porous media.
The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE
DEFF Research Database (Denmark)
Khovratovich, Dmitry; Rechberger, Christian
2014-01-01
We show how to produce a forged (ciphertext, tag) pair for the scheme ALE with data and time complexity of 2102 ALE encryptions of short messages and the same number of authentication attempts. We use a differential attack based on a local collision, which exploits the availability of extracted...
Threshold Signature Schemes Application
Directory of Open Access Journals (Sweden)
Anastasiya Victorovna Beresneva
2015-10-01
Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.
Fractional Schroedinger equation
International Nuclear Information System (INIS)
Laskin, Nick
2002-01-01
Some properties of the fractional Schroedinger equation are studied. We prove the Hermiticity of the fractional Hamilton operator and establish the parity conservation law for fractional quantum mechanics. As physical applications of the fractional Schroedinger equation we find the energy spectra of a hydrogenlike atom (fractional 'Bohr atom') and of a fractional oscillator in the semiclassical approximation. An equation for the fractional probability current density is developed and discussed. We also discuss the relationships between the fractional and standard Schroedinger equations
Bergstra, Jan A.
2015-01-01
In the context of an involutive meadow a precise definition of fractions is formulated and on that basis formal definitions of various classes of fractions are given. The definitions follow the fractions as terms paradigm. That paradigm is compared with two competing paradigms for storytelling on fractions: fractions as values and fractions as pairs.
DEFF Research Database (Denmark)
Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela
2013-01-01
of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...
Energy Technology Data Exchange (ETDEWEB)
Willcock, J J; Lumsdaine, A; Quinlan, D J
2008-08-19
Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.
Analytical Approach to Space- and Time-Fractional Burgers Equations
International Nuclear Information System (INIS)
Yıldırım, Ahmet; Mohyud-Din, Syed Tauseef
2010-01-01
A scheme is developed to study numerical solution of the space- and time-fractional Burgers equations under initial conditions by the homotopy analysis method. The fractional derivatives are considered in the Caputo sense. The solutions are given in the form of series with easily computable terms. Numerical solutions are calculated for the fractional Burgers equation to show the nature of solution as the fractional derivative parameter is changed
Evaluating statistical cloud schemes
Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix
2015-01-01
Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...
Gamma spectrometry; level schemes
International Nuclear Information System (INIS)
Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.
1977-01-01
The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr
International Nuclear Information System (INIS)
2002-04-01
This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)
Exploiting Symmetry on Parallel Architectures.
Stiller, Lewis Benjamin
1995-01-01
This thesis describes techniques for the design of parallel programs that solve well-structured problems with inherent symmetry. Part I demonstrates the reduction of such problems to generalized matrix multiplication by a group-equivariant matrix. Fast techniques for this multiplication are described, including factorization, orbit decomposition, and Fourier transforms over finite groups. Our algorithms entail interaction between two symmetry groups: one arising at the software level from the problem's symmetry and the other arising at the hardware level from the processors' communication network. Part II illustrates the applicability of our symmetry -exploitation techniques by presenting a series of case studies of the design and implementation of parallel programs. First, a parallel program that solves chess endgames by factorization of an associated dihedral group-equivariant matrix is described. This code runs faster than previous serial programs, and discovered it a number of results. Second, parallel algorithms for Fourier transforms for finite groups are developed, and preliminary parallel implementations for group transforms of dihedral and of symmetric groups are described. Applications in learning, vision, pattern recognition, and statistics are proposed. Third, parallel implementations solving several computational science problems are described, including the direct n-body problem, convolutions arising from molecular biology, and some communication primitives such as broadcast and reduce. Some of our implementations ran orders of magnitude faster than previous techniques, and were used in the investigation of various physical phenomena.
Two questions about surrogacy and exploitation.
Wertheimer, Alan
1992-01-01
In this article I will consider two related questions about surrogacy and exploitation: (1) Is surrogacy exploitative? (2) If surrogacy is exploitative, what is the moral force of this exploitation? Briefly stated, I shall argue that whether surrogacy is exploitative depends on whether exploitation must be harmful to the exploited party or whether (as I think) there can be mutually advantageous exploitation. It also depends on some facts about surrogacy about which we have little reliable evidence and on our philosophical view on what counts as a harm to the surrogate. Our answer to the second question will turn in part on the account of exploitation we invoke in answering the first question and in part on the way in which we resolve some other questions about the justification of state interference. I shall suggest, however, that if surrogacy is a form of voluntary and mutually advantageous exploitation, then there is a strong presumption that surrogacy contracts should be permitted and even enforceable, although that presumption may be overridden on other grounds.
Adaptive control and synchronization of a fractional-order chaotic ...
Indian Academy of Sciences (India)
Fractional order; adaptive scheme; control; synchronization. ... College of Physics and Electronics, Hunan Institute of Science and Technology, ... of Information and Communication Engineering, Hunan Institute of Science and Technology, ...
On the Froehlich decomposition and the condensate fraction in He II
International Nuclear Information System (INIS)
Ghassib, H.B.; Sridhar, R.
1983-09-01
The method of extracting the Bose-Einstein condensate fraction in He II within the Froehlich decomposition scheme is revisited. A new simple formula for determining this fraction is derived. Possible experimental and theoretical implications are discussed. (author)
Radiation environmental impact assessment of copper exploitation
International Nuclear Information System (INIS)
Fan Guang; Wen Zhijian
2010-01-01
The radiation environmental impact of mineral exploitation on the surrounding environment has become a public concern. This paper presents the radiation environmental impact assessment of copper exploitation. Based on the project description and detailed investigations of surrounding environment, systematic radiation environmental impacts have been identified. The environmental impacts are assessed during both construction and operation phase. The environmental protection measures have also been proposed. The related conclusion and measures can play an active role in copper exploitation and environmental protection. (authors)
Exploitation and exploration dynamics in recessionary times
Walrave, B.
2012-01-01
Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting existing resources. As such, firms possessing the ability to simultaneously perform exploitative and explorative initiatives are more resilient. In this respect, the performance implications of balancing ...
Generalized time fractional IHCP with Caputo fractional derivatives
International Nuclear Information System (INIS)
Murio, D A; MejIa, C E
2008-01-01
The numerical solution of the generalized time fractional inverse heat conduction problem (GTFIHCP) on a finite slab is investigated in the presence of measured (noisy) data when the time fractional derivative is interpreted in the sense of Caputo. The GTFIHCP involves the simultaneous identification of the heat flux and temperature transient functions at one of the boundaries of the finite slab together with the initial condition of the original direct problem from noisy Cauchy data at a discrete set of points on the opposite (active) boundary. A finite difference space marching scheme with adaptive regularization, using trigonometric mollification techniques and generalized cross validation is introduced. Error estimates for the numerical solution of the mollified problem and numerical examples are provided.
Fractional Vector Calculus and Fractional Special Function
Li, Ming-Fan; Ren, Ji-Rong; Zhu, Tao
2010-01-01
Fractional vector calculus is discussed in the spherical coordinate framework. A variation of the Legendre equation and fractional Bessel equation are solved by series expansion and numerically. Finally, we generalize the hypergeometric functions.
The come-back of hypo fractionation?
International Nuclear Information System (INIS)
Cosset, J.M.
2005-01-01
Hypo-fractionation (i.e. the use of fewer higher fractional doses than usual) is not a new concept. It had actually been proposed in the early year of Radiotherapy by the German and Austrian specialists. In the seventy's, supported by the - wrong - hypotheses which gave birth to the NSD (Nominal Standard Dose), hypo-fractionation reappears. The consequential increase of late complications which was observed led the radiation oncologists to give up again using large doses per fraction, except for a few specific situations, such as palliative treatments. We are recently facing a new 'come-back' of hypo-fractionation, in particular for breast and prostate cancers. In the case of breast cancer, the aim is clearly to look for more 'convenience' for both the patients and the physicians, proposing shorter irradiation schedules including a lesser number of fractions. Some 'modestly' hypo-fractionated schemes have been proposed and used, without apparently altering the efficacy/toxicity ratio, but these results have been seriously questioned. As for prostate cancer, the situation is different, since in that case new radiobiological data are at the origin of the newly proposed hypo-fractionation schedules. A number of papers actually strongly suggested that the fractionation sensitivity of prostate cancer could be higher than the one of the tissues responsible for late toxicity (i.e the exact opposite of the classical dogma). Based on those data, several hypo-fractionated schemes have been proposed, with a few preliminary results looking similar to the ones obtained by the classical schedules. However, no randomized study is available so far, and a few recent radiobiological data are now questioning the new dogma of the high fractionation sensitivity of prostate cancer. For those two - frequent - cancers, it seems therefore that prudence should prevail before altering classical irradiation schedules which have proven their efficacy, while staying open to new concepts and
Scheme for analysis of oily waters
Energy Technology Data Exchange (ETDEWEB)
Lysyj, I.; Rushworth, R.; Melvold, R.; Russell, E.C.
1980-01-01
A scheme is described for gross and detailed chemical characterization of oily waters. Total, suspended, and dissolved organic content and hydrocarbon levels of the sample are determined. Volatile and water-soluble fractions are characterized in greater detail. Lower aliphatic and aromatic hydrocarbons are separated from the water by nitrogen sparging and are collected in an activated carbon absorption column. They are then extracted into carbon disulfide and analyzed gas chromatographically. The water-soluble fraction is extracted into chloroform or adsorbed on Amberlite XAD type of resin. Class characterization of this fraction is performed using the HPLC procedure. GC-MS-C is used for detailed analysis. The methodology was used for studying the effectiveness of bilge and ballast water treatments.
Towards Symbolic Encryption Schemes
DEFF Research Database (Denmark)
Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik
2012-01-01
, namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....
Energy Technology Data Exchange (ETDEWEB)
Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.
2014-07-25
This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.
New analytic unitarization schemes
International Nuclear Information System (INIS)
Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.
2009-01-01
We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.
The economics of exploiting gas hydrates
International Nuclear Information System (INIS)
Döpke, Lena-Katharina; Requate, Till
2014-01-01
We investigate the optimal exploitation of methane hydrates, a recent discovery of methane resources under the sea floor, mainly located along the continental margins. Combustion of methane (releasing CO2) and leakage through blow-outs (releasing CH4) contribute to the accumulation of greenhouse gases. A second externality arises since removing solid gas hydrates from the sea bottom destabilizes continental margins and thus increases the risk of marine earthquakes. We show that in such a model three regimes can occur: i) resource exploitation will be stopped in finite time, and some of the resource will stay in situ, ii) the resource will be used up completely in finite time, and iii) the resource will be exhausted in infinite time. We also show how to internalize the externalities by policy instruments. - Highlights: • We set up a model of optimal has hydrate exploitation • We incorporate to types of damages: contribution to global warming and geo-hazards • We characterize optimal exploitation paths and study decentralization with an exploitation tax. • Three regimes can occur: • i) exploitation in finite time and some of the stock remaining in situ, • ii) exploitation in finite time and the resource will be exhausted, • iii) exploitation and exhaustion in infinite time
Exploitation and exploration dynamics in recessionary times
Walrave, B.
2012-01-01
Firm performance largely depends on the ability to adapt to, and exploit, changes in the business environment. That is, firms should maintain ecological fitness by reconfiguring their resource base to cope with emerging threats and explore new opportunities, while at the same time exploiting
Packaging of Sin Goods - Commitment or Exploitation?
DEFF Research Database (Denmark)
Nafziger, Julia
to such self-control problems, and possibly exploit them, by offering different package sizes. In a competitive market, either one or three (small, medium and large) packages are offered. In contrast to common intuition, the large, and not the small package is a commitment device. The latter serves to exploit...
SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...
African Journals Online (AJOL)
Allaiac
sexual exploitation of children by peacekeepers is particularly insidious. ... sexual exploitation and abuse should involve an understanding of the social .... The charges of sexual misconduct, and the consequent media exposure, have ..... awareness programmes such as video tapes, lectures and training manuals, designed.
Exploration, Exploitation, and Organizational Coordination Mechanisms
Directory of Open Access Journals (Sweden)
Silvio Popadiuk
2016-03-01
Full Text Available This paper presents an empirical relationship among exploration, exploitation, and organizational coordination mechanisms, classified as the centralization of decision-making, formalization, and connectedness. In order to analyze the findings of this survey, we used two techniques: Principal Component Analysis (PCA and Partial Least Squares Path Modeling (PLS-PM. Our analysis was supported by 249 answers from managers of companies located in Brazil (convenience sampling. Contrary to expectations, centralization and exploitation were negatively associated. Our data supports the research hypothesis that formalization is positively associated with exploitation. Although the relationship between formalization and exploration were significant, the result is contrary to the research hypothesis that we made. The relationships among connectedness and exploitation, and connectedness and exploration were both positive and significant. This relationship means that the more connectedness increases, the higher the likelihood of exploitation and exploration.
Investigating students’ failure in fractional concept construction
Kurniawan, Henry; Sutawidjaja, Akbar; Rahman As’ari, Abdur; Muksar, Makbul; Setiawan, Iwan
2018-04-01
Failure is a failure to achieve goals. This failure occurs because a larger scheme integrates the schemes in mind that are related to the problem at hand. These schemes are integrated so that they are interconnected to form new structures. This new scheme structure is used to interpret the problems at hand. This research is a qualitative research done to trace student’s failure which happened in fractional concept construction. Subjects in this study as many as 2 students selected from 15 students with the consideration of these students meet the criteria that have been set into two groups that fail in solving the problem. Both groups, namely group 1 is a search group for the failure of students of S1 subject and group 2 is a search group for the failure of students of S2 subject.
Indian Academy of Sciences (India)
Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...
Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.
2012-01-01
Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free
Alternative reprocessing schemes evaluation
International Nuclear Information System (INIS)
1979-02-01
This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented
Introduction to association schemes
Seidel, J.J.
1991-01-01
The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs
Reaction schemes of immunoanalysis
International Nuclear Information System (INIS)
Delaage, M.; Barbet, J.
1991-01-01
The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr
Alternative health insurance schemes
DEFF Research Database (Denmark)
Keiding, Hans; Hansen, Bodil O.
2002-01-01
In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...
Laskin, Nick
2018-01-01
Fractional quantum mechanics is a recently emerged and rapidly developing field of quantum physics. This is the first monograph on fundamentals and physical applications of fractional quantum mechanics, written by its founder. The fractional Schrödinger equation and the fractional path integral are new fundamental physical concepts introduced and elaborated in the book. The fractional Schrödinger equation is a manifestation of fractional quantum mechanics. The fractional path integral is a new mathematical tool based on integration over Lévy flights. The fractional path integral method enhances the well-known Feynman path integral framework. Related topics covered in the text include time fractional quantum mechanics, fractional statistical mechanics, fractional classical mechanics and the α-stable Lévy random process. The book is well-suited for theorists, pure and applied mathematicians, solid-state physicists, chemists, and others working with the Schrödinger equation, the path integral technique...
New Trends in Flow Injection Analysis: Exploitation of Sequential and Lab-on-Valve Schemes
DEFF Research Database (Denmark)
Hansen, Elo Harald
has appeared, that is, the Lab-on-Valve (LOV) approach, the conceptual basis of which is to incorporate all the necessary unit operational manipulations required, and, when possible, even the detection device into a single small integrated microconduit, or “laboratory”, placed atop a selection valve...... sensitivity and selectivity. Either in order to separate/preconcentrate the analyte material, or because of the presence of potentially interfering matrix constituents. Such pretreatments are advantageously performed in FIA/SIA/LOV manifolds, where all appropriate unit operations can be effected under...
Exploiting Multimodal Biometrics in E-Privacy Scheme for Electronic Health Records
Omotosho, Adebayo; Adegbola, Omotanwa; Adelakin, Barakat; Adelakun, Adeyemi; Emuoyibofarhe, Justice
2015-01-01
Existing approaches to protect the privacy of Electronic Health Records are either insufficient for existing medical laws or they are too restrictive in their usage. For example, smart card-based encryption systems require the patient to be always present to authorize access to medical records. Questionnaires were administered by 50 medical practitioners to identify and categorize different Electronic Health Records attributes. The system was implemented using multi biometrics of patients to ...
Fractional vector calculus and fractional Maxwell's equations
International Nuclear Information System (INIS)
Tarasov, Vasily E.
2008-01-01
The theory of derivatives and integrals of non-integer order goes back to Leibniz, Liouville, Grunwald, Letnikov and Riemann. The history of fractional vector calculus (FVC) has only 10 years. The main approaches to formulate a FVC, which are used in the physics during the past few years, will be briefly described in this paper. We solve some problems of consistent formulations of FVC by using a fractional generalization of the Fundamental Theorem of Calculus. We define the differential and integral vector operations. The fractional Green's, Stokes' and Gauss's theorems are formulated. The proofs of these theorems are realized for simplest regions. A fractional generalization of exterior differential calculus of differential forms is discussed. Fractional nonlocal Maxwell's equations and the corresponding fractional wave equations are considered
Herbivory eliminates fitness costs of mutualism exploiters.
Simonsen, Anna K; Stinchcombe, John R
2014-04-01
A common empirical observation in mutualistic interactions is the persistence of variation in partner quality and, in particular, the persistence of exploitative phenotypes. For mutualisms between hosts and symbionts, most mutualism theory assumes that exploiters always impose fitness costs on their host. We exposed legume hosts to mutualistic (nitrogen-fixing) and exploitative (non-nitrogen-fixing) symbiotic rhizobia in field conditions, and manipulated the presence or absence of insect herbivory to determine if the costly fitness effects of exploitative rhizobia are context-dependent. Exploitative rhizobia predictably reduced host fitness when herbivores were excluded. However, insects caused greater damage on hosts associating with mutualistic rhizobia, as a consequence of feeding preferences related to leaf nitrogen content, resulting in the elimination of fitness costs imposed on hosts by exploitative rhizobia. Our experiment shows that herbivory is potentially an important factor in influencing the evolutionary dynamic between legumes and rhizobia. Partner choice and host sanctioning are theoretically predicted to stabilize mutualisms by reducing the frequency of exploitative symbionts. We argue that herbivore pressure may actually weaken selection on choice and sanction mechanisms, thus providing one explanation of why host-based discrimination mechanisms may not be completely effective in eliminating nonbeneficial partners. © 2014 The Authors. New Phytologist © 2014 New Phytologist Trust.
Fractional statistics and fractional quantized Hall effect
International Nuclear Information System (INIS)
Tao, R.; Wu, Y.S.
1985-01-01
The authors suggest that the origin of the odd-denominator rule observed in the fractional quantized Hall effect (FQHE) may lie in fractional statistics which govern quasiparticles in FQHE. A theorem concerning statistics of clusters of quasiparticles implies that fractional statistics do not allow coexistence of a large number of quasiparticles at fillings with an even denominator. Thus, no Hall plateau can be formed at these fillings, regardless of the presence of an energy gap. 15 references
Pressure correction schemes for compressible flows
International Nuclear Information System (INIS)
Kheriji, W.
2011-01-01
This thesis is concerned with the development of semi-implicit fractional step schemes, for the compressible Navier-Stokes equations; these schemes are part of the class of the pressure correction methods. The chosen spatial discretization is staggered: non conforming mixed finite elements (Crouzeix-Raviart or Rannacher-Turek) or the classic MA C scheme. An upwind finite volume discretization of the mass balance guarantees the positivity of the density. The positivity of the internal energy is obtained by discretizing the internal energy balance by an upwind finite volume scheme and b y coupling the discrete internal energy balance with the pressure correction step. A special finite volume discretization on dual cells is performed for the convection term in the momentum balance equation, and a renormalisation step for the pressure is added to the algorithm; this ensures the control in time of the integral of the total energy over the domain. All these a priori estimates imply the existence of a discrete solution by a topological degree argument. The application of this scheme to Euler equations raises an additional difficulty. Indeed, obtaining correct shocks requires the scheme to be consistent with the total energy balance, property which we obtain as follows. First of all, a local discrete kinetic energy balance is established; it contains source terms winch we somehow compensate in the internal energy balance. The kinetic and internal energy equations are associated with the dual and primal meshes respectively, and thus cannot be added to obtain a total energy balance; its continuous counterpart is however recovered at the limit: if we suppose that a sequence of discrete solutions converges when the space and time steps tend to 0, we indeed show, in 1D at least, that the limit satisfies a weak form of the equation. These theoretical results are comforted by numerical tests. Similar results are obtained for the baro-tropic Navier-Stokes equations. (author)
A subgrid parameterization scheme for precipitation
Directory of Open Access Journals (Sweden)
S. Turner
2012-04-01
Full Text Available With increasing computing power, the horizontal resolution of numerical weather prediction (NWP models is improving and today reaches 1 to 5 km. Nevertheless, clouds and precipitation formation are still subgrid scale processes for most cloud types, such as cumulus and stratocumulus. Subgrid scale parameterizations for water vapor condensation have been in use for many years and are based on a prescribed probability density function (PDF of relative humidity spatial variability within the model grid box, thus providing a diagnosis of the cloud fraction. A similar scheme is developed and tested here. It is based on a prescribed PDF of cloud water variability and a threshold value of liquid water content for droplet collection to derive a rain fraction within the model grid. Precipitation of rainwater raises additional concerns relative to the overlap of cloud and rain fractions, however. The scheme is developed following an analysis of data collected during field campaigns in stratocumulus (DYCOMS-II and fair weather cumulus (RICO and tested in a 1-D framework against large eddy simulations of these observed cases. The new parameterization is then implemented in a 3-D NWP model with a horizontal resolution of 2.5 km to simulate real cases of precipitating cloud systems over France.
On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme
Directory of Open Access Journals (Sweden)
Wang Daoshun
2010-01-01
Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.
Initialized Fractional Calculus
Lorenzo, Carl F.; Hartley, Tom T.
2000-01-01
This paper demonstrates the need for a nonconstant initialization for the fractional calculus and establishes a basic definition set for the initialized fractional differintegral. This definition set allows the formalization of an initialized fractional calculus. Two basis calculi are considered; the Riemann-Liouville and the Grunwald fractional calculi. Two forms of initialization, terminal and side are developed.
Exploiting PV technology for basic need provision in Nigeria
International Nuclear Information System (INIS)
Gyoh, L.; Gyoh, S.
2004-01-01
Transitional economies are confronted with ever declining standard of living and low per capita income. Development institutions around the world have come to realize the strategic importance of Sustainable Energy as a Basic Need in the development process. Despite the efforts made by emerging democracies to eradicate poverty, there are still millions of people without access to electricity. Unreliable energy supply currently presents a constant obstacle to many poverty alleviation programmes. Against this background, some states government in Nigeria are exploiting the unique advantage offered by PV technology in the provision of Basic Needs. This study appraises some of the scheme in which the authors have been heavily involved with. This paper identifies some of the strategic policies that might accelerate the successful implementation of PV technology as a poverty alleviation tool in terms of electricity provision in transitional economies. (authors)
Selectively strippable paint schemes
Stein, R.; Thumm, D.; Blackford, Roger W.
1993-03-01
In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.
Energy Technology Data Exchange (ETDEWEB)
Sabzikar, Farzad, E-mail: sabzika2@stt.msu.edu [Department of Statistics and Probability, Michigan State University, East Lansing, MI 48823 (United States); Meerschaert, Mark M., E-mail: mcubed@stt.msu.edu [Department of Statistics and Probability, Michigan State University, East Lansing, MI 48823 (United States); Chen, Jinghua, E-mail: cjhdzdz@163.com [School of Sciences, Jimei University, Xiamen, Fujian, 361021 (China)
2015-07-15
Fractional derivatives and integrals are convolutions with a power law. Multiplying by an exponential factor leads to tempered fractional derivatives and integrals. Tempered fractional diffusion equations, where the usual second derivative in space is replaced by a tempered fractional derivative, govern the limits of random walk models with an exponentially tempered power law jump distribution. The limiting tempered stable probability densities exhibit semi-heavy tails, which are commonly observed in finance. Tempered power law waiting times lead to tempered fractional time derivatives, which have proven useful in geophysics. The tempered fractional derivative or integral of a Brownian motion, called a tempered fractional Brownian motion, can exhibit semi-long range dependence. The increments of this process, called tempered fractional Gaussian noise, provide a useful new stochastic model for wind speed data. A tempered fractional difference forms the basis for numerical methods to solve tempered fractional diffusion equations, and it also provides a useful new correlation model in time series.
Sabzikar, Farzad; Meerschaert, Mark M.; Chen, Jinghua
2015-07-01
Fractional derivatives and integrals are convolutions with a power law. Multiplying by an exponential factor leads to tempered fractional derivatives and integrals. Tempered fractional diffusion equations, where the usual second derivative in space is replaced by a tempered fractional derivative, govern the limits of random walk models with an exponentially tempered power law jump distribution. The limiting tempered stable probability densities exhibit semi-heavy tails, which are commonly observed in finance. Tempered power law waiting times lead to tempered fractional time derivatives, which have proven useful in geophysics. The tempered fractional derivative or integral of a Brownian motion, called a tempered fractional Brownian motion, can exhibit semi-long range dependence. The increments of this process, called tempered fractional Gaussian noise, provide a useful new stochastic model for wind speed data. A tempered fractional difference forms the basis for numerical methods to solve tempered fractional diffusion equations, and it also provides a useful new correlation model in time series.
International Nuclear Information System (INIS)
Sabzikar, Farzad; Meerschaert, Mark M.; Chen, Jinghua
2015-01-01
Fractional derivatives and integrals are convolutions with a power law. Multiplying by an exponential factor leads to tempered fractional derivatives and integrals. Tempered fractional diffusion equations, where the usual second derivative in space is replaced by a tempered fractional derivative, govern the limits of random walk models with an exponentially tempered power law jump distribution. The limiting tempered stable probability densities exhibit semi-heavy tails, which are commonly observed in finance. Tempered power law waiting times lead to tempered fractional time derivatives, which have proven useful in geophysics. The tempered fractional derivative or integral of a Brownian motion, called a tempered fractional Brownian motion, can exhibit semi-long range dependence. The increments of this process, called tempered fractional Gaussian noise, provide a useful new stochastic model for wind speed data. A tempered fractional difference forms the basis for numerical methods to solve tempered fractional diffusion equations, and it also provides a useful new correlation model in time series
Scalable Nonlinear Compact Schemes
Energy Technology Data Exchange (ETDEWEB)
Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)
2014-04-01
In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.
A joint asymmetric watermarking and image encryption scheme
Boato, G.; Conotter, V.; De Natale, F. G. B.; Fontanari, C.
2008-02-01
Here we introduce a novel watermarking paradigm designed to be both asymmetric, i.e., involving a private key for embedding and a public key for detection, and commutative with a suitable encryption scheme, allowing both to cipher watermarked data and to mark encrypted data without interphering with the detection process. In order to demonstrate the effectiveness of the above principles, we present an explicit example where the watermarking part, based on elementary linear algebra, and the encryption part, exploiting a secret random permutation, are integrated in a commutative scheme.
Peat exploitation - Environment. Effects and measures
International Nuclear Information System (INIS)
Stenbeck, G.
1996-01-01
This report gives a detailed description of the influence of peat exploitation on the land-, water- and atmospheric environments. Proposals for mitigatory measures to minimize damage to the environment are also given
SEXUAL EXPLOITATION AND ABUSE BY UN PEACEKEEPERS ...
African Journals Online (AJOL)
Allaiac
from sexual exploitation and sexual abuse (ST/SGB/2003/13) (UN, Secretary .... In addition, in most situations, UN personnel have enjoyed immunity from local .... 9 Official UN statistics show a higher incidence of allegations reported against.
Exploitation of linkage learning in evolutionary algorithms
Chen, Ying-ping
2010-01-01
The exploitation of linkage learning is enhancing the performance of evolutionary algorithms. This monograph examines recent progress in linkage learning, with a series of focused technical chapters that cover developments and trends in the field.
Exploitative and Deceptive Resource Acquisition Strategies
Directory of Open Access Journals (Sweden)
Joshua J. Reynolds
2015-07-01
Full Text Available Life history strategy (LHS and life history contingencies (LHCs should theoretically influence the use of exploitative and deceptive resource acquisition strategies. However, little research has been done in this area. The purpose of the present work was to create measures of exploitative strategies and test the predictions of life history theory. Pilot studies developed and validated a behavioral measure of cheating called the Dot Game. The role of individual LHS and LHCs (manipulated via validated story primes on cheating was investigated in Study 1. Studies 2a through 2c were conducted to develop and validate a self-report measure called the Exploitative and Deceptive Resource Acquisition Strategy Scale (EDRASS. Finally, Study 3 investigated life history and EDRASS. Results indicated that while LHS influences exploitative strategies, life history contingences had little effect. Implications of these findings are discussed.
Organ sales: exploitative at any price?
Lawlor, Rob
2014-05-01
In many cases, claims that a transaction is exploitative will focus on the details of the transaction, such as the price paid or conditions. For example, in a claim that a worker is exploited, the grounds for the claim are usually that the pay is not sufficient or the working conditions too dangerous. In some cases, however, the claim that a transaction is exploitative is not seen to rely on these finer details. Many, for example, claim that organ sales would be exploitative, in a way that doesn't seem to depend on the details. This article considers, but ultimately rejects, a number of arguments which could be used to defend this sort of claim. © 2012 John Wiley & Sons Ltd.
Higher fractions theory of fractional hall effect
International Nuclear Information System (INIS)
Kostadinov, I.Z.; Popov, V.N.
1985-07-01
A theory of fractional quantum Hall effect is generalized to higher fractions. N-particle model interaction is used and the gap is expressed through n-particles wave function. The excitation spectrum in general and the mean field critical behaviour are determined. The Hall conductivity is calculated from first principles. (author)
A Theory of Exploitative Child Labor
Carol Ann Rogers; Kenneth A. Swinnerton
2003-01-01
Child labor laws should aim to protect children who work, instead of trying to remove children from work. In this paper, we identify an instance when the risk of exploitation lowers the expected bene…t of child labor to the child,and therefore suppresses child labor force participation. Targeted legal intervention that lowers or removes the risk of exploitation raises child participation in the labor market, child welfare, and overall societal welfare. Targeting on child labor more broadly ma...
Energy Technology Data Exchange (ETDEWEB)
Mavroidis, Panayiotis, E-mail: mavroidis@uthscsa.edu [Department of Radiation Oncology, University of Texas Health Sciences Center, San Antonio, Texas (United States); Department of Medical Radiation Physics, Karolinska Institutet and Stockholm University, Stockholm (Sweden); Milickovic, Natasa [Department of Medical Physics and Engineering, Strahlenklinik, Klinikum Offenbach GmbH, Offenbach (Germany); Cruz, Wilbert F. [Department of Radiation Oncology, University of Texas Health Sciences Center, San Antonio, Texas (United States); Tselis, Nikolaos [Strahlenklinik, Klinikum Offenbach GmbH, Offenbach (Germany); Karabis, Andreas [Pi-Medical Ltd., Athens (Greece); Stathakis, Sotirios; Papanikolaou, Nikos [Department of Radiation Oncology, University of Texas Health Sciences Center, San Antonio, Texas (United States); Zamboglou, Nikolaos [Strahlenklinik, Klinikum Offenbach GmbH, Offenbach (Germany); Baltas, Dimos [Department of Medical Physics and Engineering, Strahlenklinik, Klinikum Offenbach GmbH, Offenbach (Germany); Nuclear and Particle Physics Section, Physics Department, University of Athens, Athens (Greece)
2014-01-01
Purpose: The aim of the present study was the investigation of different fractionation schemes to estimate their clinical impact. For this purpose, widely applied radiobiological models and dosimetric measures were used to associate their results with clinical findings. Methods and Materials: The dose distributions of 12 clinical high-dose-rate brachytherapy implants for prostate were evaluated in relation to different fractionation schemes. The fractionation schemes compared were: (1) 1 fraction of 20 Gy; (2) 2 fractions of 14 Gy; (3) 3 fractions of 11 Gy; and (4) 4 fractions of 9.5 Gy. The clinical effectiveness of the different fractionation schemes was estimated through the complication-free tumor control probability (P{sub +}), the biologically effective uniform dose, and the generalized equivalent uniform dose index. Results: For the different fractionation schemes, the tumor control probabilities were 98.5% in 1 × 20 Gy, 98.6% in 2 × 14 Gy, 97.5% in 3 × 11 Gy, and 97.8% in 4 × 9.5 Gy. The corresponding P{sub +} values were 88.8% in 1 × 20 Gy, 83.9% in 2 × 14 Gy, 86.0% in 3 × 11 Gy, and 82.3% in 4 × 9.5 Gy. With use of the fractionation scheme 4 × 9.5 Gy as reference, the isoeffective schemes regarding tumor control for 1, 2, and 3 fractions were 1 × 19.68 Gy, 2 × 13.75 Gy, and 3 × 11.05 Gy. The optimum fractionation schemes for 1, 2, 3, and 4 fractions were 1 × 19.16 Gy with a P{sub +} of 91.8%, 2 × 13.2 Gy with a P{sub +} of 89.6%, 3 × 10.6 Gy with a P{sub +} of 88.4%, and 4 × 9.02 Gy with a P{sub +} of 86.9%. Conclusions: Among the fractionation schemes 1 × 20 Gy, 2 × 14 Gy, 3 × 11 Gy, and 4 × 9.5 Gy, the first scheme was more effective in terms of P{sub +}. After performance of a radiobiological optimization, it was shown that a single fraction of 19.2 to 19.7 Gy (average 19.5 Gy) should produce at least the same benefit as that given by the 4 × 9.5 Gy scheme, and it should reduce the expected total complication probability by
DEFF Research Database (Denmark)
Bugge, Katrine Østergaard; Steinocher, Helena; Brooks, Andrew J.
2015-01-01
-labeled protein. In this work, we have exploited the hydrophobic nature of membrane proteins to develop a simple and efficient production scheme for isotope-labeled single-pass transmembrane domains (TMDs) with or without intrinsically disordered regions. We have evaluated the applicability and limitations...... of the strategy using seven membrane protein variants that differ in their overall hydrophobicity and length and show a recovery for suitable variants of >70%. The developed production scheme is cost-efficient and easy to implement and has the potential to facilitate an increase in the number of structures...
Managing the Innovators for Exploration and Exploitation
Directory of Open Access Journals (Sweden)
C. Annique UN
2007-09-01
Full Text Available I analyze how to manage employees to achieve a balance between exploration and exploitation in large established firms. Previous studies suggest that, although firms need to undertake both exploration and exploitation simultaneously, this is difficult either because of the scarcity of resources or because of the incompatibility of these two processes. Proposed solutions have been ambidexterity, punctuated equilibrium or specialization. I suggest another method: managing employees. Specifically, I argue that using the so-called “innovative” system of human resource management practices, consisting of team-based incentive system, team-based job design, and job rotation, enables the firm to undertake exploration and exploitation simultaneously because it provides the psychological safety for people to explore new knowledge to make novel products and develops employees to have the perspective-taking capability that enables the integration of knowledge cross-functionally for efficiency. Using the so-called “traditional” system of human resource management practices, consisting of individual-based incentive system, individual-based job design, and no job rotation, has limited impact on either exploration or exploitation because it does not create the psychological safety for people to explore new knowledge and does not develop the perspective-taking capability needed for exploitation. Moreover, mixing practices from both systems is better than only using the traditional system in achieving exploration or exploitation, but less effective than only using the innovative system as the mix of practices can create inconsistent expectations on employees.
Exploiting GPUs in Virtual Machine for BioCloud
Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon
2013-01-01
Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment. PMID:23710465
Exploiting GPUs in Virtual Machine for BioCloud
Directory of Open Access Journals (Sweden)
Heeseung Jo
2013-01-01
Full Text Available Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.
Exploiting GPUs in virtual machine for BioCloud.
Jo, Heeseung; Jeong, Jinkyu; Lee, Myoungho; Choi, Dong Hoon
2013-01-01
Recently, biological applications start to be reimplemented into the applications which exploit many cores of GPUs for better computation performance. Therefore, by providing virtualized GPUs to VMs in cloud computing environment, many biological applications will willingly move into cloud environment to enhance their computation performance and utilize infinite cloud computing resource while reducing expenses for computations. In this paper, we propose a BioCloud system architecture that enables VMs to use GPUs in cloud environment. Because much of the previous research has focused on the sharing mechanism of GPUs among VMs, they cannot achieve enough performance for biological applications of which computation throughput is more crucial rather than sharing. The proposed system exploits the pass-through mode of PCI express (PCI-E) channel. By making each VM be able to access underlying GPUs directly, applications can show almost the same performance as when those are in native environment. In addition, our scheme multiplexes GPUs by using hot plug-in/out device features of PCI-E channel. By adding or removing GPUs in each VM in on-demand manner, VMs in the same physical host can time-share their GPUs. We implemented the proposed system using the Xen VMM and NVIDIA GPUs and showed that our prototype is highly effective for biological GPU applications in cloud environment.
Hypo fractionated radiotherapy in advanced lung cancer
International Nuclear Information System (INIS)
Andrade Carvalho, Heloisa de; Saito, Newton Heitetsu; Gomes, Herbeni Cardoso; Aguilar, Patricia Bailao; Nadalin, Wladimir
1996-01-01
Patients with advanced lung cancers have bad prognosis and, many times, are submitted to prolonged and not always efficient treatments. We present a study where 51 patients were treated with hypo fractionated radiotherapy, based on two distinct schemes, according to the performance status and social conditions of each patient: continuous treatment: 30 Gy, 10 fractions of 3 Gy, 5 days/week (37 cases); weekly treatment: 30 Gy, 6 fractions of 5 Gy, once a week (14 cases). Symptoms relief and impact in survival were evaluated. In both groups, we observed improvement of symptoms in about 70% of the occurrences with a medium survival of three months. We conclude that hypo fractionation is an effective palliative treatment for lung cancers, in patients with short life-expectancy and must be considered as a option in advanced cases, in patients with short life-expectancy that deserve some kind of treatment. (author). 37 refs., 2 tabs
Numerical Schemes for Rough Parabolic Equations
Energy Technology Data Exchange (ETDEWEB)
Deya, Aurelien, E-mail: deya@iecn.u-nancy.fr [Universite de Nancy 1, Institut Elie Cartan Nancy (France)
2012-04-15
This paper is devoted to the study of numerical approximation schemes for a class of parabolic equations on (0,1) perturbed by a non-linear rough signal. It is the continuation of Deya (Electron. J. Probab. 16:1489-1518, 2011) and Deya et al. (Probab. Theory Relat. Fields, to appear), where the existence and uniqueness of a solution has been established. The approach combines rough paths methods with standard considerations on discretizing stochastic PDEs. The results apply to a geometric 2-rough path, which covers the case of the multidimensional fractional Brownian motion with Hurst index H>1/3.
Yasas, F M
1977-01-01
In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.
Bonus schemes and trading activity
Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.
2014-01-01
Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of
DEFF Research Database (Denmark)
Juhl, Hans Jørn; Stacey, Julia
2001-01-01
. In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...
International Nuclear Information System (INIS)
Grashilin, V.A.; Karyshev, Yu.Ya.
1982-01-01
A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given
Moghaderi, Hamid; Dehghan, Mehdi; Donatelli, Marco; Mazza, Mariarosa
2017-12-01
Fractional diffusion equations (FDEs) are a mathematical tool used for describing some special diffusion phenomena arising in many different applications like porous media and computational finance. In this paper, we focus on a two-dimensional space-FDE problem discretized by means of a second order finite difference scheme obtained as combination of the Crank-Nicolson scheme and the so-called weighted and shifted Grünwald formula. By fully exploiting the Toeplitz-like structure of the resulting linear system, we provide a detailed spectral analysis of the coefficient matrix at each time step, both in the case of constant and variable diffusion coefficients. Such a spectral analysis has a very crucial role, since it can be used for designing fast and robust iterative solvers. In particular, we employ the obtained spectral information to define a Galerkin multigrid method based on the classical linear interpolation as grid transfer operator and damped-Jacobi as smoother, and to prove the linear convergence rate of the corresponding two-grid method. The theoretical analysis suggests that the proposed grid transfer operator is strong enough for working also with the V-cycle method and the geometric multigrid. On this basis, we introduce two computationally favourable variants of the proposed multigrid method and we use them as preconditioners for Krylov methods. Several numerical results confirm that the resulting preconditioning strategies still keep a linear convergence rate.
Electricity storage using a thermal storage scheme
Energy Technology Data Exchange (ETDEWEB)
White, Alexander, E-mail: ajw36@cam.ac.uk [Hopkinson Laboratory, Cambridge University Engineering Department, Trumpington Street, Cambridge. CB2 1PZ (United Kingdom)
2015-01-22
The increasing use of renewable energy technologies for electricity generation, many of which have an unpredictably intermittent nature, will inevitably lead to a greater demand for large-scale electricity storage schemes. For example, the expanding fraction of electricity produced by wind turbines will require either backup or storage capacity to cover extended periods of wind lull. This paper describes a recently proposed storage scheme, referred to here as Pumped Thermal Storage (PTS), and which is based on “sensible heat” storage in large thermal reservoirs. During the charging phase, the system effectively operates as a high temperature-ratio heat pump, extracting heat from a cold reservoir and delivering heat to a hot one. In the discharge phase the processes are reversed and it operates as a heat engine. The round-trip efficiency is limited only by process irreversibilities (as opposed to Second Law limitations on the coefficient of performance and the thermal efficiency of the heat pump and heat engine respectively). PTS is currently being developed in both France and England. In both cases, the schemes operate on the Joule-Brayton (gas turbine) cycle, using argon as the working fluid. However, the French scheme proposes the use of turbomachinery for compression and expansion, whereas for that being developed in England reciprocating devices are proposed. The current paper focuses on the impact of the various process irreversibilities on the thermodynamic round-trip efficiency of the scheme. Consideration is given to compression and expansion losses and pressure losses (in pipe-work, valves and thermal reservoirs); heat transfer related irreversibility in the thermal reservoirs is discussed but not included in the analysis. Results are presented demonstrating how the various loss parameters and operating conditions influence the overall performance.
Exploitation of Labour and Exploitation of Commodities: a “New Interpretation”
Veneziani, Roberto; Yoshihara, Naoki
2011-01-01
In the standard Okishio-Morishima approach, the existence of profits is proved to be equivalent to the exploitation of labour. Yet, it can also be proved that the existence of profits is equivalent to the ‘exploitation’ of any good. Labour and commodity exploitation are just different numerical representations of the productiveness of the economy. This paper presents an alternative approach to exploitation theory which is related to the New Interpretation (Duménil 1980; Foley 1982). In this a...
Impulsive synchronisation of a class of fractional-order hyperchaotic systems
International Nuclear Information System (INIS)
Wang Xing-Yuan; Zhang Yong-Lei; Lin Da; Zhang Na
2011-01-01
In this paper, an impulsive synchronisation scheme for a class of fractional-order hyperchaotic systems is proposed. The sufficient conditions of a class of integral-order hyperchaotic systems' impulsive synchronisation are illustrated. Furthermore, we apply the sufficient conditions to a class of fractional-order hyperchaotic systems and well achieve impulsive synchronisation of these fractional-order hyperchaotic systems, thereby extending the applicable scope of impulsive synchronisation. Numerical simulations further demonstrate the feasibility and effectiveness of the proposed scheme. (general)
Asphalt chemical fractionation
International Nuclear Information System (INIS)
Obando P, Klever N.
1998-01-01
Asphalt fractionation were carried out in the Esmeraldas Oil Refinery using n-pentane, SiO 2 and different mixture of benzene- methane. The fractions obtained were analyzed by Fourier's Transformed Infrared Spectrophotometry (FTIR)
Exploitation in International Paid Surrogacy Arrangements
Wilkinson, Stephen
2015-01-01
Abstract Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly‐paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty. PMID:27471338
Exploitation in International Paid Surrogacy Arrangements.
Wilkinson, Stephen
2016-05-01
Many critics have suggested that international paid surrogacy is exploitative. Taking such concerns as its starting point, this article asks: (1) how defensible is the claim that international paid surrogacy is exploitative and what could be done to make it less exploitative? (2) In the light of the answer to (1), how strong is the case for prohibiting it? Exploitation could in principle be dealt with by improving surrogates' pay and conditions. However, doing so may exacerbate problems with consent. Foremost amongst these is the argument that surrogates from economically disadvantaged countries cannot validly consent because their background circumstances are coercive. Several versions of this argument are examined and I conclude that at least one has some merit. The article's overall conclusion is that while ethically there is something to be concerned about, paid surrogacy is in no worse a position than many other exploitative commercial transactions which take place against a backdrop of global inequality and constrained options, such as poorly-paid and dangerous construction work. Hence, there is little reason to single surrogacy out for special condemnation. On a policy level, the case for prohibiting international commercial surrogacy is weak, despite legitimate concerns about consent and background poverty.
Packet reversed packet combining scheme
International Nuclear Information System (INIS)
Bhunia, C.T.
2006-07-01
The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)
International Nuclear Information System (INIS)
Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu
2014-01-01
We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)
Wilson expansion in the minimal subtraction scheme
International Nuclear Information System (INIS)
Smirnov, V.A.
1989-01-01
The small distance expansion of the product of composite fields is constructed for an arbitrary renormalization procedure of the type of minimal subtraction scheme. Coefficient functions of the expansion are expressed explicitly through the Green functions of composite fields. The expansion has the explicity finite form: the ultraviolet (UV) divergences of the coefficient functions and composite fields are removed by the initial renormalization procedure while the infrared (IR) divergences in massless diagrams with nonvanishing contribution into the coefficient functions are removed by the R-operation which is the IR part of the R-operation. The latter is the generalization of the dimensional renormalization in the case when both UV and IR divergences are present. To derive the expansion, a ''pre-subtracting operator'' is introduced and formulas of the counter-term technique are exploited
Tunable fractional-order Fourier transformer
International Nuclear Information System (INIS)
Malyutin, A A
2006-01-01
A fractional two-dimensional Fourier transformer whose orders are tuned by means of optical quadrupoles is described. It is shown that in the optical scheme considered, the Fourier-transform order a element of [0,1] in one of the mutually orthogonal planes corresponds to the transform order (2-a) in another plane, i.e., to inversion and inverse Fourier transform of the order a. (laser modes and beams)
Smarandache Continued Fractions
Ibstedt, H.
2001-01-01
The theory of general continued fractions is developed to the extent required in order to calculate Smarandache continued fractions to a given number of decimal places. Proof is given for the fact that Smarandache general continued fractions built with positive integer Smarandache sequences baving only a finite number of terms equal to 1 is convergent. A few numerical results are given.
Oil exploitation and the environmental Kuznets curve
International Nuclear Information System (INIS)
Esmaeili, Abdoulkarim; Abdollahzadeh, Negar
2009-01-01
This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)
Oil exploitation and the environmental Kuznets curve
Energy Technology Data Exchange (ETDEWEB)
Esmaeili, Abdoulkarim; Abdollahzadeh, Negar [Department of Agricultural Economics, College of Agriculture, Shiraz University, Shiraz, Fars (Iran)
2009-01-15
This study refers to a panel estimation of an environmental Kuznets curve (EKC) for oil to determine the factors most affecting oil exploitation in 38 oil-producing countries during 1990-2000. Control variables such as oil reserves, oil price, population, political rights, and the Gini index were used to determine its contribution to the main EKC model. The empirical results fully support the existence of an EKC for oil exploitation. Furthermore, the result indicates that the proved oil reserves has a significant and positive role in oil production, but oil price and population do not significantly affect crude oil production. Also, increased freedoms and a better income distribution will reduce the rate of oil exploitation. Thus, policies aiming at enhancing democratic society and better income distribution would be more compatible with sustainability. (author)
Rethinking exploitation: a process-centered account.
Jansen, Lynn A; Wall, Steven
2013-12-01
Exploitation has become an important topic in recent discussions of biomedical and research ethics. This is due in no small measure to the influence of Alan Wertheimer's path-breaking work on the subject. This paper presents some objections to Wertheimer's account of the concept. The objections attempt to show that his account places too much emphasis on outcome-based considerations and too little on process-based considerations. Building on these objections, the paper develops an alternative process-centered account of the concept. This alternative account of exploitation takes as its point of departure the broadly Kantian notion that it is wrong to use another as an instrument for the advancement of one's own ends. It sharpens this slippery notion and adds a number of refinements to it. The paper concludes by arguing that process-centered accounts of exploitation better illuminate the ethical challenges posed by research on human subjects than outcome-centered accounts.
Shale gas exploitation: Status, problems and prospect
Directory of Open Access Journals (Sweden)
Shiqian Wang
2018-02-01
Full Text Available Over the past five years, great progress has been made in shale gas exploitation, which has become the most driving force for global gas output growth. Hydrocarbon extraction from shale helps drive the USA on the road to energy independence. Besides, shale oil & gas production has been kept in a sustained growth by continuous improvement in drilling efficiency and well productivity in the case of tumbling oil prices and rig counts. Shale gas reserves and production have been in a rapid growth in China owing to the Lower Paleozoic Wufeng and Longmaxi shale gas exploitation in the Sichuan Basin, which has become an important sector for the future increment of gas reserves and output in China. However, substantial progress has been made neither in non-marine shale gas exploitation as previously expected nor in the broad complicated tectonic areas in South China for which a considerable investment was made. Analysis of the basic situation and issues in domestic shale gas development shows that shale gas exploitation prospects are constrained by many problems in terms of resources endowment, horizontal well fracturing technology, etc. especially in non-marine shale deposits and complicated tectonic areas in South China where hot shales are widely distributed but geological structures are found severely deformed and over matured. Discussion on the prospects shows that the sustained and steady growth in shale gas reserves and production capacity in the coming years lies in the discovery and supersession of new shale plays in addition to Wufeng and Longmaxi shale plays, and that a technological breakthrough in ultra-high-pressure and ultra-deep (over 3500 m buried in the Sichuan Basin marine shale gas exploitation is the key and hope. Keywords: Shale gas, Exploitation, Marine facies, Hot shale, Resource endowment, Sichuan Basin, South China, Complicated tectonic area, Gas play
Cognitive Aware Interference Mitigation Scheme for LTE Femtocells
Alqerm, Ismail
2015-04-21
Femto-cells deployment in today’s cellular networks came into practice to fulfill the increasing demand for data services. However, interference to other femto and macro-cells users remains an unresolved challenge. In this paper, we propose an interference mitigation scheme to control the cross-tier interference caused by femto-cells to the macro users and the co-tier interference among femtocells. Cognitive radio spectrum sensing capability is utilized to determine the non-occupied channels or the ones that cause minimal interference to the macro users. An awareness based channel allocation scheme is developed with the assistance of the graph-coloring algorithm to assign channels to the femto-cells base stations with power optimization, minimal interference, maximum throughput, and maximum spectrum efficiency. In addition, the scheme exploits negotiation capability to match traffic load and QoS with the channel capacity, and to maintain efficient utilization of the available channels.
Shamim, Atif
2011-03-01
For the first time, a generalized Smith chart is introduced here to represent fractional order circuit elements. It is shown that the standard Smith chart is a special case of the generalized fractional order Smith chart. With illustrations drawn for both the conventional integer based lumped elements and the fractional elements, a graphical technique supported by the analytical method is presented to plot impedances on the fractional Smith chart. The concept is then applied towards impedance matching networks, where the fractional approach proves to be much more versatile and results in a single element matching network for a complex load as compared to the two elements in the conventional approach. © 2010 IEEE.
Characteristic of student’s false concessive failure on fractions concept
Kurniawan, H.; Sutawidjaja, A.; As’ari, A. R.; Muksar, M.
2018-03-01
False concessive failure of students is students construction failure in achieving goals, where the process is false, the results obtained is true. This failure occurs because the schemes are not connected to each other, so it cannot form a new scheme. This research is a qualitative research that aim to describe the characteristics of students' false concessive failure on fractional concepts. This fractional concept is a fraction of the same part of the whole. To be able to solve the concept of this fraction, students must possess the concept of partition, the concept of addition and the concept of multiplication of the fraction.
Distributed public key schemes secure against continual leakage
DEFF Research Database (Denmark)
Akavia, Adi; Goldwasser, Shafi; Hazay, Carmit
2012-01-01
-secure against continual memory leakage. Our DPKE scheme also implies a secure storage system on leaky devices, where a value s can be secretely stored on devices that continually leak information about their internal state to an external attacker. The devices go through a periodic refresh protocol......In this work we study distributed public key schemes secure against continual memory leakage. The secret key will be shared among two computing devices communicating over a public channel, and the decryption operation will be computed by a simple 2-party protocol between the devices. Similarly...... against continual memory leakage, under the Bilinear Decisional Diffie-Hellman and $2$-linear assumptions. Our schemes have the following properties: 1. Our DPKE and DIBE schemes tolerate leakage at all times, including during refresh. During refresh the tolerated leakage is a (1/2-o (1),1)-fraction...
Dey, Aloke
2009-01-01
A one-stop reference to fractional factorials and related orthogonal arrays.Presenting one of the most dynamic areas of statistical research, this book offers a systematic, rigorous, and up-to-date treatment of fractional factorial designs and related combinatorial mathematics. Leading statisticians Aloke Dey and Rahul Mukerjee consolidate vast amounts of material from the professional literature--expertly weaving fractional replication, orthogonal arrays, and optimality aspects. They develop the basic theory of fractional factorials using the calculus of factorial arrangements, thereby providing a unified approach to the study of fractional factorial plans. An indispensable guide for statisticians in research and industry as well as for graduate students, Fractional Factorial Plans features: * Construction procedures of symmetric and asymmetric orthogonal arrays. * Many up-to-date research results on nonexistence. * A chapter on optimal fractional factorials not based on orthogonal arrays. * Trend-free plans...
Fractional Dynamics and Control
Machado, José; Luo, Albert
2012-01-01
Fractional Dynamics and Control provides a comprehensive overview of recent advances in the areas of nonlinear dynamics, vibration and control with analytical, numerical, and experimental results. This book provides an overview of recent discoveries in fractional control, delves into fractional variational principles and differential equations, and applies advanced techniques in fractional calculus to solving complicated mathematical and physical problems.Finally, this book also discusses the role that fractional order modeling can play in complex systems for engineering and science. Discusses how fractional dynamics and control can be used to solve nonlinear science and complexity issues Shows how fractional differential equations and models can be used to solve turbulence and wave equations in mechanics and gravity theories and Schrodinger’s equation Presents factional relaxation modeling of dielectric materials and wave equations for dielectrics Develops new methods for control and synchronization of...
Energy-Efficient Data Gathering Scheme Based on Broadcast Transmissions in Wireless Sensor Networks
Directory of Open Access Journals (Sweden)
Soobin Lee
2013-01-01
previous works have proposed ideas that reduce the energy consumption of the network by exploiting the spatial correlation between sensed information. In this paper, we propose a distributed data compression framework that exploits the broadcasting characteristic of the wireless medium to improve energy efficiency. We analyze the performance of the proposed framework numerically and compare it with the performance of previous works using simulation. The proposed scheme performs better when the sensing information is correlated.
Electronically Tunable Fully Integrated Fractional-Order Resonator
Tsirimokou, Georgia
2017-03-20
A fully integrated implementation of a parallel fractional-order resonator which employs together a fractional order capacitor and a fractional-order inductor is proposed in this paper. The design utilizes current-controlled Operational Transconductance Amplifiers as building blocks, designed and fabricated in AMS 0:35m CMOS process, and based on a second-order approximation of a fractional-order differentiator/ integrator magnitude optimized in the range 10Hz–700Hz. An attractive benefit of the proposed scheme is its electronic tuning capability.
Finite element method for time-space-fractional Schrodinger equation
Directory of Open Access Journals (Sweden)
Xiaogang Zhu
2017-07-01
Full Text Available In this article, we develop a fully discrete finite element method for the nonlinear Schrodinger equation (NLS with time- and space-fractional derivatives. The time-fractional derivative is described in Caputo's sense and the space-fractional derivative in Riesz's sense. Its stability is well derived; the convergent estimate is discussed by an orthogonal operator. We also extend the method to the two-dimensional time-space-fractional NLS and to avoid the iterative solvers at each time step, a linearized scheme is further conducted. Several numerical examples are implemented finally, which confirm the theoretical results as well as illustrate the accuracy of our methods.
Electronically Tunable Fully Integrated Fractional-Order Resonator
Tsirimokou, Georgia; Psychalinos, Costas; Elwakil, Ahmed S.; Salama, Khaled N.
2017-01-01
A fully integrated implementation of a parallel fractional-order resonator which employs together a fractional order capacitor and a fractional-order inductor is proposed in this paper. The design utilizes current-controlled Operational Transconductance Amplifiers as building blocks, designed and fabricated in AMS 0:35m CMOS process, and based on a second-order approximation of a fractional-order differentiator/ integrator magnitude optimized in the range 10Hz–700Hz. An attractive benefit of the proposed scheme is its electronic tuning capability.
Special Semaphore Scheme for UHF Spacecraft Communications
Butman, Stanley; Satorius, Edgar; Ilott, Peter
2006-01-01
A semaphore scheme has been devised to satisfy a requirement to enable ultrahigh- frequency (UHF) radio communication between a spacecraft descending from orbit to a landing on Mars and a spacecraft, in orbit about Mars, that relays communications between Earth and the lander spacecraft. There are also two subsidiary requirements: (1) to use UHF transceivers, built and qualified for operation aboard the spacecraft that operate with residual-carrier binary phase-shift-keying (BPSK) modulation at a selectable data rate of 8, 32, 128, or 256 kb/s; and (2) to enable low-rate signaling even when received signals become so weak as to prevent communication at the minimum BPSK rate of 8 kHz. The scheme involves exploitation of Manchester encoding, which is used in conjunction with residual-carrier modulation to aid the carrier-tracking loop. By choosing various sequences of 1s, 0s, or 1s alternating with 0s to be fed to the residual-carrier modulator, one would cause the modulator to generate sidebands at a fundamental frequency of 4 or 8 kHz and harmonics thereof. These sidebands would constitute the desired semaphores. In reception, the semaphores would be detected by a software demodulator.
On the dynamics of exploited fish populations
National Research Council Canada - National Science Library
Beverton, R. J. H; Holt, Sidney J
1993-01-01
...-brooding cichlids, and viviparity in many sharks and toothcarps. Moreover, fish are of considerable importance to the survival of the human species in the form of nutritious, delicious and diverse food. Rational exploitation and management of our global stocks of fishes must rely upon a detailed and precise insight of their biology. The...
Child Exploitation: Some Pieces of the Puzzle.
Rohlader, Dorothy
The report addresses the status in North Carolina and in the nation of child exploitation. Legislative and judicial backgrounds of child pornography and child prostitution are reviewed, and difficulties in obtaining statistical data are noted. Law enforcement issues in pornography are cited, and suggestions for further legislation regarding child…
Exploiting a natural auxotrophy for genetic selection.
Ramage, Elizabeth; Gallagher, Larry; Manoil, Colin
2012-08-01
We exploited the natural histidine auxotrophy of Francisella species to develop hisD (encodes histidinol dehydrogenase) as a positive selection marker. A shuttle plasmid (pBR103) carrying Escherichia coli hisD and designed for cloning of PCR fragments replicated in both attenuated and highly virulent Francisella strains. During this work, we formulated a simplified defined growth medium for Francisella novicida.
Growth, Mortality and Exploitation Rates of Sarotherodon ...
African Journals Online (AJOL)
Evans
ABSTRACT. Sarotherodon melanotheron population of Dominli Lagoon in the Western Region of Ghana was studied for its growth and mortality parameters as well as exploitation rate. The study generally aimed at providing basic information necessary for the assessment and management of the fish stock in the lagoon.
Economic factors of vulnerability trade and exploitation
Allodi, L.
2017-01-01
Cybercrime markets support the development and diffusion of new attack technologies, vulnerability exploits, and malware. Whereas the revenue streams of cyber attackers have been studied multiple times in the literature, no quantitative account currently exists on the economics of attack acquisition
Exploiting indigenous knowledge in the environmental conservation ...
African Journals Online (AJOL)
... of agriculture and reared livestock (especially goats). Over several years, they developed sustainable and effective exploitation mechanisms of the existing biodiversity resources to satisfy their individual needs and those of their societies in general. Journal of Language, Technology and Entrepreneurship in Africa Vol.
Exploiting citation contexts for physics retrieval
DEFF Research Database (Denmark)
Dabrowska, Anna; Larsen, Birger
2015-01-01
The text surrounding citations within scientific papers may contain terms that usefully describe cited documents and can benefit retrieval. We present a preliminary study that investigates appending ci- tation contexts from citing documents to cited documents in the iSearch test collection. We ex...... in a large collection of physics papers, paving the way for future research that exploits citation contexts for retrieval....
Modified Aggressive Packet Combining Scheme
International Nuclear Information System (INIS)
Bhunia, C.T.
2010-06-01
In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)
Transmission usage cost allocation schemes
International Nuclear Information System (INIS)
Abou El Ela, A.A.; El-Sehiemy, R.A.
2009-01-01
This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)
Dividing Fractions: A Pedagogical Technique
Lewis, Robert
2016-01-01
When dividing one fraction by a second fraction, invert, that is, flip the second fraction, then multiply it by the first fraction. To multiply fractions, simply multiply across the denominators, and multiply across the numerators to get the resultant fraction. So by inverting the division of fractions it is turned into an easy multiplication of…
Dissemination and Exploitation: Project Goals beyond Science
Hamann, Kristin; Reitz, Anja
2017-04-01
Dissemination and Exploitation are essential parts of public funded projects. In Horizon 2020 a plan for the exploitation and dissemination of results (PEDR) is a requirement. The plan should contain a clear vision on the objectives of the project in relation to actions for dissemination and potential exploitation of the project results. The actions follow the basic idea to spread the knowledge and results gathered within the project and face the challenge of how to bring the results into potentially relevant policy circle and how they impact the market. The plan follows the purpose to assess the impact of the project and to address various target groups who are interested in the project results. Simply put, dissemination concentrates on the transfer of knowledge and exploitation on the commercialization of the project. Beyond the question of the measurability of project`s impact, strategies within science marketing can serve purposes beyond internal and external communication. Accordingly, project managers are facing the challenge to implement a dissemination and exploitation strategy that ideally supports the identification of all partners with the project and matches the current discourse of the project`s content within the society, politics and economy. A consolidated plan might unite all projects partners under a central idea and supports the identification with the project beyond the individual research questions. Which applications, strategies and methods can be used to bring forward a PEDR that accompanies a project successfully and allows a comprehensive assessment of the project afterwards? Which hurdles might project managers experience in the dissemination process and which tasks should be fulfilled by the project manager?
Trolling may intensify exploitation in crappie fisheries
Meals, K. O.; Dunn, A. W.; Miranda, Leandro E.
2012-01-01
In some parts of the USA, anglers targeting crappies Pomoxis spp. are transitioning from mostly stationary angling with a single pole around submerged structures to using multiple poles while drifting with the wind or under power. This shift in fishing methods could result in a change in catch efficiency, possibly increasing exploitation rates to levels that would be of concern to managers. We studied the catch statistics of anglers fishing while trolling with multiple poles (trollers) and those fishing with single poles (polers) in Mississippi reservoirs. Specifically, we tested whether (1) various catch statistics differed between trollers and polers, (2) catch rates of trollers were related to the number of poles fished, and (3) trollers could raise exploitation rates to potentially unsustainable levels. Results showed that participation in the crappie fisheries was about equally split between polers and trollers. In spring, 90% of crappie anglers were polers; in summer, 85% of crappie anglers were trollers. The size of harvested crappies was similar for the two angler groups, but the catch per hour was almost three times higher for trollers than for polers. Catch rates by trollers were directly correlated to the number of poles fished, although the relationship flattened as the number of poles increased. The average harvest rate for one troller fishing with three poles was similar to the harvest rate obtained by one poler. Simulations predicted that at the existing mix of about 50% polers and 50% trollers and with no restrictions on the number of poles used by trollers, exploitation of crappies is about 1.3 times higher than that in a polers-only fishery; under a scenario in which 100% of crappie anglers were trollers, exploitation was forecasted to increase to about 1.7 times the polers-only rate. The efficiency of trolling for crappies should be of concern to fishery managers because crappie fisheries are mostly consumptive and may increase exploitation
Efficient Scheme for Chemical Flooding Simulation
Directory of Open Access Journals (Sweden)
Braconnier Benjamin
2014-07-01
Full Text Available In this paper, we investigate an efficient implicit scheme for the numerical simulation of chemical enhanced oil recovery technique for oil fields. For the sake of brevity, we only focus on flows with polymer to describe the physical and numerical models. In this framework, we consider a black oil model upgraded with the polymer modeling. We assume the polymer only transported in the water phase or adsorbed on the rock following a Langmuir isotherm. The polymer reduces the water phase mobility which can change drastically the behavior of water oil interfaces. Then, we propose a fractional step technique to resolve implicitly the system. The first step is devoted to the resolution of the black oil subsystem and the second to the polymer mass conservation. In such a way, jacobian matrices coming from the implicit formulation have a moderate size and preserve solvers efficiency. Nevertheless, the coupling between the black-oil subsystem and the polymer is not fully resolved. For efficiency and accuracy comparison, we propose an explicit scheme for the polymer for which large time step is prohibited due to its CFL (Courant-Friedrichs-Levy criterion and consequently approximates accurately the coupling. Numerical experiments with polymer are simulated : a core flood, a 5-spot reservoir with surfactant and ions and a 3D real case. Comparisons are performed between the polymer explicit and implicit scheme. They prove that our polymer implicit scheme is efficient, robust and resolves accurately the coupling physics. The development and the simulations have been performed with the software PumaFlow [PumaFlow (2013 Reference manual, release V600, Beicip Franlab].
Viviane Scherenberg; Gerd Glaeske
2009-01-01
Aim - Bonus schemes within German statutory health insurance (GKV) use monetary incentives to promote health-conscious behaviour, particularly amongst risk groups. The idea is to exploit a latent potential for participation in money-saving preventive measures. First studies suggest that incidental effects (good risks) are more common than prevention effects. The purpose of the article is to present factors contributing to the successfulness of incentive schemes. Methods - To outline the findi...
Designing an Efficient Retransmission Scheme for Wireless LANs: Theory and Implementation
Koutsonikolas, Dimitrios; Wang, Chih-Chun; Hu, Y Charlie; Shroff, Ness
2010-01-01
Network coding is known to benefit the downlink retransmissions by the AP in a wireless LAN from exploiriting overhearing at the client nodes. However, designing an efficient and practical retransmission scheme remains a challange. We present an (asymptotically) optimal scheme, ECR, for reduing the downlink retransmissions by the AP in a wireless LAN from exploiting overhearing at the client nodes. The design of ECR, consisting of three components: batch-based operations, a systematic pha...
Adapting IMRT delivery fraction-by-fraction to cater for variable intrafraction motion
International Nuclear Information System (INIS)
Webb, S
2008-01-01
This paper presents a technique for coping with variable intrafraction organ motion when delivering intensity-modulated radiation therapy (IMRT). The strategy is an adaptive delivery in which the fluence delivered up to a particular fraction is subtracted from the required total-course planned fluence to create an adapted residual fluence for the next fraction. This requires that the fluence already delivered can be computed, knowing the intrafraction motion during each fraction. If the adaptation is unconstrained, as would be required for perfect delivery of the planned fluence, then the individual fractional fluences would become unphysical, with both negative components and spikes. Hence it is argued that constraints must be applied; first, positivity constraints and second, constraints to limit fluence spikes. Additionally, it is shown to be helpful to constrain other quantities which are explained. The power of the strategy is that it adapts to the (potentially variable) moving geometry during each fraction. It is not a perfect delivery but it is always better than making no adaptation. The fractionated nature of radiation therapy is thus exploited to advantage. The fluence adaptation method does not require re-planning at each fraction but this imposes limitations which are stated. The fuller theory of dose adaptation is also developed for intrafraction motion. The method is complementary to other adaptive strategies recently discussed with respect to interfraction motion
Fractional distillation of oil
Energy Technology Data Exchange (ETDEWEB)
Jones, L D
1931-10-31
A method of dividing oil into lubricating oil fractions without substantial cracking by introducing the oil in a heated state into a fractionating column from which oil fractions having different boiling points are withdrawn at different levels, while reflux liquid is supplied to the top of the column, and additional heat is introduced into the column by contacting with the oil therein a heated fluid of higher monlecular weight than water and less susceptible to thermal decomposition than is the highest boiling oil fraction resulting from the distillation, or of which any products produced by thermal decomposition will not occur in the highest boiling distillate withdrawn from the column.
Intelligence, mapping, and geospatial exploitation system (IMAGES)
Moellman, Dennis E.; Cain, Joel M.
1998-08-01
This paper provides further detail to one facet of the battlespace visualization concept described in last year's paper Battlespace Situation Awareness for Force XXI. It focuses on the National Imagery and Mapping Agency (NIMA) goal to 'provide customers seamless access to tailorable imagery, imagery intelligence, and geospatial information.' This paper describes Intelligence, Mapping, and Geospatial Exploitation System (IMAGES), an exploitation element capable of CONUS baseplant operations or field deployment to provide NIMA geospatial information collaboratively into a reconnaissance, surveillance, and target acquisition (RSTA) environment through the United States Imagery and Geospatial Information System (USIGS). In a baseplant CONUS setting IMAGES could be used to produce foundation data to support mission planning. In the field it could be directly associated with a tactical sensor receiver or ground station (e.g. UAV or UGV) to provide near real-time and mission specific RSTA to support mission execution. This paper provides IMAGES functional level design; describes the technologies, their interactions and interdependencies; and presents a notional operational scenario to illustrate the system flexibility. Using as a system backbone an intelligent software agent technology, called Open Agent ArchitectureTM (OAATM), IMAGES combines multimodal data entry, natural language understanding, and perceptual and evidential reasoning for system management. Configured to be DII COE compliant, it would utilize, to the extent possible, COTS applications software for data management, processing, fusion, exploitation, and reporting. It would also be modular, scaleable, and reconfigurable. This paper describes how the OAATM achieves data synchronization and enables the necessary level of information to be rapidly available to various command echelons for making informed decisions. The reasoning component will provide for the best information to be developed in the timeline
A Comprehensive Study of Data Collection Schemes Using Mobile Sinks in Wireless Sensor Networks
Khan, Abdul Waheed; Abdullah, Abdul Hanan; Anisi, Mohammad Hossein; Bangash, Javed Iqbal
2014-01-01
Recently sink mobility has been exploited in numerous schemes to prolong the lifetime of wireless sensor networks (WSNs). Contrary to traditional WSNs where sensory data from sensor field is ultimately sent to a static sink, mobile sink-based approaches alleviate energy-holes issues thereby facilitating balanced energy consumption among nodes. In mobility scenarios, nodes need to keep track of the latest location of mobile sinks for data delivery. However, frequent propagation of sink topological updates undermines the energy conservation goal and therefore should be controlled. Furthermore, controlled propagation of sinks' topological updates affects the performance of routing strategies thereby increasing data delivery latency and reducing packet delivery ratios. This paper presents a taxonomy of various data collection/dissemination schemes that exploit sink mobility. Based on how sink mobility is exploited in the sensor field, we classify existing schemes into three classes, namely path constrained, path unconstrained, and controlled sink mobility-based schemes. We also organize existing schemes based on their primary goals and provide a comparative study to aid readers in selecting the appropriate scheme in accordance with their particular intended applications and network dynamics. Finally, we conclude our discussion with the identification of some unresolved issues in pursuit of data delivery to a mobile sink. PMID:24504107
Image encryption based on a delayed fractional-order chaotic logistic system
International Nuclear Information System (INIS)
Wang Zhen; Li Ning; Huang Xia; Song Xiao-Na
2012-01-01
A new image encryption scheme is proposed based on a delayed fractional-order chaotic logistic system. In the process of generating a key stream, the time-varying delay and fractional derivative are embedded in the proposed scheme to improve the security. Such a scheme is described in detail with security analyses including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. Experimental results show that the newly proposed image encryption scheme possesses high security. (general)
Image encryption based on a delayed fractional-order chaotic logistic system
Wang, Zhen; Huang, Xia; Li, Ning; Song, Xiao-Na
2012-05-01
A new image encryption scheme is proposed based on a delayed fractional-order chaotic logistic system. In the process of generating a key stream, the time-varying delay and fractional derivative are embedded in the proposed scheme to improve the security. Such a scheme is described in detail with security analyses including correlation analysis, information entropy analysis, run statistic analysis, mean-variance gray value analysis, and key sensitivity analysis. Experimental results show that the newly proposed image encryption scheme possesses high security.
Energy Technology Data Exchange (ETDEWEB)
Clemente Gutierrez, F.; Perez Vara, C.; Prieto Villacorta, M.
2013-07-01
Several studies have been proposed over the years schemes of hypo-fractionated treatment for prostate cancer. Such schemes have been designed in order to increase local control of the disease and reduce complications. They are in addition a clear improvement from the point of view logistical and organizational for treatment centres and the patient. the hypo-fractionated treatments are possible because the ratio a/b for prostate carcinoma is comparable, and even below, the surrounding healthy tissues. This work presents the scheme adopted in our Center for the hypo-fractionated treatment of the cancer of prostate by arco therapy volumetric modulated. (Author)
Sustainable exploitation and management of aquatic resources
DEFF Research Database (Denmark)
Neuenfeldt, Stefan; Köster, Fritz
2014-01-01
DTU Aqua conducts research, provides advice,educates at university level and contributes toinnovation in sustainable exploitation andmanagement of aquatic resources. The vision of DTUAqua is to enable ecologically and economicallysustainable exploitation of aquatic resourcesapplying an integrated...... management. Marineecosystems aims at understanding the mechanisms that govern the interaction between individuals,species and populations in an ecosystem enabling us to determine the stability and flexibility of theecosystem.Marine living resources looks at the sustainable utilization of fish and shellfish...... stocks.Ecosystem effects expands from the ecosystem approach to fisheries management to an integratedapproach where other human activities are taken into consideration. Fisheries management developsmethods, models and tools for predicting and evaluating the effects of management measures andregulations...
Exploiting HRM in support of lean manufacturing
DEFF Research Database (Denmark)
Jørgensen, Frances; Matthiesen, Rikke
The purpose of this paper is to investigate the ways in HRM practices are-and could potentially be-exploited to support lean manufacturing in practice. First, a review of the pertinent literature regarding HRM, SHRM, and lean manufacturing is presented to provide an understanding of the mechanisms...... by which HRM practices could, theoretically, be used to support a lean implementation. Data presented in the paper are derived from 1) a longitudinal case study on lean implementation and 2) from managers currently involved with lean manufacturing in a second company. The relevant literature and the data...... depicting the potential role in supporting HRM/lean integrated practices. The analysis of the model with respect to the theoretical background emphasizes a number of areas in which HRM could be more fully exploited in order to more successfully support lean implementation, for example, by stressing HRM...
Exploiting Non-Markovianity for Quantum Control.
Reich, Daniel M; Katz, Nadav; Koch, Christiane P
2015-07-22
Quantum technology, exploiting entanglement and the wave nature of matter, relies on the ability to accurately control quantum systems. Quantum control is often compromised by the interaction of the system with its environment since this causes loss of amplitude and phase. However, when the dynamics of the open quantum system is non-Markovian, amplitude and phase flow not only from the system into the environment but also back. Interaction with the environment is then not necessarily detrimental. We show that the back-flow of amplitude and phase can be exploited to carry out quantum control tasks that could not be realized if the system was isolated. The control is facilitated by a few strongly coupled, sufficiently isolated environmental modes. Our paradigmatic example considers a weakly anharmonic ladder with resonant amplitude control only, restricting realizable operations to SO(N). The coupling to the environment, when harnessed with optimization techniques, allows for full SU(N) controllability.
Exploiting Quantum Resonance to Solve Combinatorial Problems
Zak, Michail; Fijany, Amir
2006-01-01
Quantum resonance would be exploited in a proposed quantum-computing approach to the solution of combinatorial optimization problems. In quantum computing in general, one takes advantage of the fact that an algorithm cannot be decoupled from the physical effects available to implement it. Prior approaches to quantum computing have involved exploitation of only a subset of known quantum physical effects, notably including parallelism and entanglement, but not including resonance. In the proposed approach, one would utilize the combinatorial properties of tensor-product decomposability of unitary evolution of many-particle quantum systems for physically simulating solutions to NP-complete problems (a class of problems that are intractable with respect to classical methods of computation). In this approach, reinforcement and selection of a desired solution would be executed by means of quantum resonance. Classes of NP-complete problems that are important in practice and could be solved by the proposed approach include planning, scheduling, search, and optimal design.
Coordinated renewable energy support schemes
DEFF Research Database (Denmark)
Morthorst, P.E.; Jensen, S.G.
2006-01-01
. The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...
CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...
African Journals Online (AJOL)
This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...
Exploiting Inhibitory Siglecs to Combat Food Allergies
2017-10-01
AWARD NUMBER: W81XWH-16-1-0302 TITLE: Exploiting Inhibitory Siglecs to Combat Food Allergies PRINCIPAL INVESTIGATOR: Michael Kulis, Ph.D...CONTRACTING ORGANIZATION: University of North Carolina at Chapel Hill Chapel Hill, NC 27599 REPORT DATES: October 2017 TYPE OF REPORT: Annual PREPARED FOR...Department of Defense, Washington Headquarters Services , Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite
Dandruff: The most commercially exploited skin disease
Directory of Open Access Journals (Sweden)
Ranganathan S
2010-01-01
Full Text Available The article discuss in detail about the prevalence, pathophysiology, clinical manifestations of dandruff including the etio-pathology. The article also discusses in detail about various treatment methods available for dandruff. The status of dandruff being amphibious - a disease/disorder, and relatively less medical intervention is sought after for the treatment, dandruff is the most commercially exploited skin and scalp disorder/disease by personal care industries.
Exploiting partial knowledge for efficient model analysis
Macedo, Nuno; Cunha, Alcino; Pessoa, Eduardo José Dias
2017-01-01
The advancement of constraint solvers and model checkers has enabled the effective analysis of high-level formal specification languages. However, these typically handle a specification in an opaque manner, amalgamating all its constraints in a single monolithic verification task, which often proves to be a performance bottleneck. This paper addresses this issue by proposing a solving strategy that exploits user-provided partial knowledge, namely by assigning symbolic bounds to the problem’s ...
Amplifiers Exploiting Thermal Noise Canceling: A Review
Klumperink, Eric A.M.; Bruccoleri, Federico; Stroet, Peter; Nauta, Bram
2004-01-01
Wide-band LNAs suffer from a fundamental trade-off between noise figure NF and source impedance matching, which limits NF to values typically above 3dB. Recently, a feed-forward noise canceling technique has been proposed to break this trade-off. This paper reviews the principle of the technique and its key properties. Although the technique has been applied to wideband CMOS LNAs, it can just as well be implemented exploiting transconductance elements realized with oth...
Exploiting thesauri knowledge in medical guideline formalization
Serban, R.C.; ten Teije, A.C.M.
2009-01-01
Objectives: As in software product lifecycle, the effort spent in maintaining medical knowl edge in guidelines can be reduced, if modularization, formalization and tracking of domain knowledge are employed across the guideline development phases. Methods: We propose to exploit and combine knowledge templates with medical background knowledge from existing thesauri in order to produce reusable building blocks used in guideline development. These tem- plates enable easier guideline formalizatio...
Exploitation as the Unequal Exchange of Labour : An Axiomatic Approach
Yoshihara, Naoki; Veneziani, Roberto
2009-01-01
In subsistence economies with general convex technology and rational optimising agents, a new, axiomatic approach is developed, which allows an explicit analysis of the core positive and normative intuitions behind the concept of exploitation. Three main new axioms, called Labour Exploitation in Subsistence Economies , Relational Exploitation , and Feasibility of Non-Exploitation , are presented and it is proved that they uniquely characterise a definition of exploitation conceptually related...
Security option file - Exploitation (DOS-Expl)
International Nuclear Information System (INIS)
2016-01-01
This document aims at presenting functions performed by Cigeo during its exploitation phase, its main technical and security options which are envisaged with respect to different types of internal or external risks, and a first assessment of its impact on mankind and on the environment during its exploitation in normal operation as well as in incidental or accidental situations. A first volume addresses security principles, approach and management in relationship with the legal and regulatory framework. The second volume presents input data related to waste parcels and used for the installation sizing and operation, the main site characteristics, the main technical options regarding structures and equipment, and the main options regarding exploitation (parcel management, organisational and human aspects, and effluent management). The third volume describes how parcel are processed from their arrival to their setting in storage compartment, an inventory of internal and external risks, and a first assessment of consequences of scenarios on mankind and on the environment. The fourth volume presents options and operations which are envisaged regarding Cigeo closure, and inventory of associated risks
Fractional Poisson process (II)
International Nuclear Information System (INIS)
Wang Xiaotian; Wen Zhixiong; Zhang Shiying
2006-01-01
In this paper, we propose a stochastic process W H (t)(H-bar (12,1)) which we call fractional Poisson process. The process W H (t) is self-similar in wide sense, displays long range dependence, and has more fatter tail than Gaussian process. In addition, it converges to fractional Brownian motion in distribution
Wilkerson, Trena L.; Bryan, Tommy; Curry, Jane
2012-01-01
This article describes how using candy bars as models gives sixth-grade students a taste for learning to represent fractions whose denominators are factors of twelve. Using paper models of the candy bars, students explored and compared fractions. They noticed fewer different representations for one-third than for one-half. The authors conclude…
Can Kindergartners Do Fractions?
Cwikla, Julie
2014-01-01
Mathematics professor Julie Cwikla decided that she needed to investigate young children's understandings and see what precurricular partitioning notions young minds bring to the fraction table. Cwikla realized that only a handful of studies have examined how preschool-age and early elementary school-age students solve fraction problems (Empson…
Diaz, Victor Alfonzo; Giusti, Andrea
2018-03-01
The aim of this paper is to present a simple generalization of bosonic string theory in the framework of the theory of fractional variational problems. Specifically, we present a fractional extension of the Polyakov action, for which we compute the general form of the equations of motion and discuss the connection between the new fractional action and a generalization the Nambu-Goto action. Consequently, we analyze the symmetries of the modified Polyakov action and try to fix the gauge, following the classical procedures. Then we solve the equations of motion in a simplified setting. Finally, we present a Hamiltonian description of the classical fractional bosonic string and introduce the fractional light-cone gauge. It is important to remark that, throughout the whole paper, we thoroughly discuss how to recover the known results as an "integer" limit of the presented model.
Physical renormalization schemes and asymptotic safety in quantum gravity
Falls, Kevin
2017-12-01
The methods of the renormalization group and the ɛ -expansion are applied to quantum gravity revealing the existence of an asymptotically safe fixed point in spacetime dimensions higher than two. To facilitate this, physical renormalization schemes are exploited where the renormalization group flow equations take a form which is independent of the parameterisation of the physical degrees of freedom (i.e. the gauge fixing condition and the choice of field variables). Instead the flow equation depends on the anomalous dimensions of reference observables. In the presence of spacetime boundaries we find that the required balance between the Einstein-Hilbert action and Gibbons-Hawking-York boundary term is preserved by the beta functions. Exploiting the ɛ -expansion near two dimensions we consider Einstein gravity coupled to matter. Scheme independence is generically obscured by the loop-expansion due to breaking of two-dimensional Weyl invariance. In schemes which preserve two-dimensional Weyl invariance we avoid the loop expansion and find a unique ultraviolet (UV) fixed point. At this fixed point the anomalous dimensions are large and one must resum all loop orders to obtain the critical exponents. Performing the resummation a set of universal scaling dimensions are found. These scaling dimensions show that only a finite number of matter interactions are relevant. This is a strong indication that quantum gravity is renormalizable.
Energy harvesting schemes for building interior environment monitoring
Zylka, Pawel; Pociecha, Dominik
2016-11-01
A vision to supply microelectronic devices without batteries making them perpetual or extending time of service in battery-oriented mobile supply schemes is the driving force of the research related to ambient energy harvesting. Energy harnessing aims thus at extracting energy from various ambient energy "pools", which generally are cost- or powerineffective to be scaled up for full-size, power-plant energy generation schemes supplying energy in electric form. These include - but are not limited to - waste heat, electromagnetic hum, vibrations, or human-generated power in addition to traditional renewable energy resources like water flow, tidal and wind energy or sun radiation which can also be exploited at the miniature scale by energy scavengers. However, in case of taking advantage of energy harvesting strategies to power up sensors monitoring environment inside buildings adaptable energy sources are restrained to only some which additionally are limited in spatial and temporal accessibility as well as available power. The paper explores experimentally an energy harvesting scheme exploiting human kinesis applicable in indoor environment for supplying a wireless indoor micro-system, monitoring ambient air properties (pressure, humidity and temperature).
Broadcast Reserved Opportunity Assisted Diversity Relaying Scheme and Its Performance Evaluation
Directory of Open Access Journals (Sweden)
Xia Chen
2008-05-01
Full Text Available Relay-based transmission can over the benefits in terms of coverage extension as well as throughput improvement if compared to conventional direct transmission. In a relay enhanced cellular (REC network, where multiple mobile terminals act as relaying nodes (RNs, multiuser diversity gain can be exploited. We propose an efficient relaying scheme, referred to as Broadcast Reserved Opportunity Assisted Diversity (BROAD for the REC networks. Unlike the conventional Induced Multiuser Diversity Relaying (IMDR scheme, our scheme acquires channel quality information (CQI in which the destined node (DN sends pilots on a reserved radio resource. The BROAD scheme can significantly decrease the signaling overhead among the mobile RNs while achieving the same multiuser diversity as the conventional IMDR scheme. In addition, an alternative version of the BROAD scheme, named as A-BROAD scheme, is proposed also, in which the candidate RN(s feed back partial or full CQI to the base station (BS for further scheduling purpose. The A-BROAD scheme achieves a higher throughput than the BROAD scheme at the cost of extra signalling overhead. The theoretical analysis given in this paper demonstrates the feasibility of the schemes in terms of their multiuser diversity gains in a REC network.
Self-match based on polling scheme for passive optical network monitoring
Zhang, Xuan; Guo, Hao; Jia, Xinhong; Liao, Qinghua
2018-06-01
We propose a self-match based on polling scheme for passive optical network monitoring. Each end-user is equipped with an optical matcher that exploits only the specific length patchcord and two different fiber Bragg gratings with 100% reflectivity. The simple and low-cost scheme can greatly simplify the final recognition processing of the network link status and reduce the sensitivity of the photodetector. We analyze the time-domain relation between reflected pulses and establish the calculation model to evaluate the false alarm rate. The feasibility of the proposed scheme and the validity of the time-domain relation analysis are experimentally demonstrated.
Directory of Open Access Journals (Sweden)
Baogui Xin
2012-01-01
Full Text Available Based on linear feedback control technique, a projective synchronization scheme of N-dimensional chaotic fractional-order systems is proposed, which consists of master and slave fractional-order financial systems coupled by linear state error variables. It is shown that the slave system can be projectively synchronized with the master system constructed by state transformation. Based on the stability theory of linear fractional order systems, a suitable controller for achieving synchronization is designed. The given scheme is applied to achieve projective synchronization of chaotic fractional-order financial systems. Numerical simulations are given to verify the effectiveness of the proposed projective synchronization scheme.
Mustapha, K.
2017-06-03
Anomalous diffusion is a phenomenon that cannot be modeled accurately by second-order diffusion equations, but is better described by fractional diffusion models. The nonlocal nature of the fractional diffusion operators makes substantially more difficult the mathematical analysis of these models and the establishment of suitable numerical schemes. This paper proposes and analyzes the first finite difference method for solving {\\\\em variable-coefficient} fractional differential equations, with two-sided fractional derivatives, in one-dimensional space. The proposed scheme combines first-order forward and backward Euler methods for approximating the left-sided fractional derivative when the right-sided fractional derivative is approximated by two consecutive applications of the first-order backward Euler method. Our finite difference scheme reduces to the standard second-order central difference scheme in the absence of fractional derivatives. The existence and uniqueness of the solution for the proposed scheme are proved, and truncation errors of order $h$ are demonstrated, where $h$ denotes the maximum space step size. The numerical tests illustrate the global $O(h)$ accuracy of our scheme, except for nonsmooth cases which, as expected, have deteriorated convergence rates.
Mustapha, K.; Furati, K.; Knio, Omar; Maitre, O. Le
2017-01-01
Anomalous diffusion is a phenomenon that cannot be modeled accurately by second-order diffusion equations, but is better described by fractional diffusion models. The nonlocal nature of the fractional diffusion operators makes substantially more difficult the mathematical analysis of these models and the establishment of suitable numerical schemes. This paper proposes and analyzes the first finite difference method for solving {\\em variable-coefficient} fractional differential equations, with two-sided fractional derivatives, in one-dimensional space. The proposed scheme combines first-order forward and backward Euler methods for approximating the left-sided fractional derivative when the right-sided fractional derivative is approximated by two consecutive applications of the first-order backward Euler method. Our finite difference scheme reduces to the standard second-order central difference scheme in the absence of fractional derivatives. The existence and uniqueness of the solution for the proposed scheme are proved, and truncation errors of order $h$ are demonstrated, where $h$ denotes the maximum space step size. The numerical tests illustrate the global $O(h)$ accuracy of our scheme, except for nonsmooth cases which, as expected, have deteriorated convergence rates.
Cosimulation of electromagnetics-circuit systems exploiting DGTD and MNA
Li, Ping
2014-06-01
A hybrid electromagnetics (EM)-circuit simulator exploiting the discontinuous Galerkin time domain (DGTD) method and the modified nodal analysis (MNA) algorithm is developed for analyzing hybrid distributive and nonlinear multiport lumped circuit systems. The computational domain is split into two subsystems. One is the EM subsystem that is analyzed by DGTD, while the other is the circuit subsystem that is solved by the MNA method. The coupling between the EM and circuit subsystems is enforced at the lumped port where related field and circuit unknowns are coupled via the use of numerical flux, port voltages, and current sources. Since the spatial operations of DGTD are localized, thanks to the use of numerical flux, coupling matrices between EM and circuit subsystems are small and are directly inverted. To handle nonlinear devices within the circuit subsystem, the standard Newton-Raphson method is applied to the nonlinear coupling matrix system. In addition, a local time-stepping scheme is applied to improve the efficiency of the hybrid solver. Numerical examples including single and multiport linear/nonlinear circuit networks are presented to validate the proposed solver. © 2014 IEEE.
Exploiting nonlinear dynamics in a coupled-core fluxgate magnetometer
International Nuclear Information System (INIS)
Bulsara, Adi R; In, Visarath; Kho, Andy; Longhini, Patrick; Neff, Joe; Anderson, Gregory; Obra, Christopher; Palacios, Antonio; Baglio, Salvatore; Ando, Bruno
2008-01-01
Unforced bistable dynamical systems having dynamics of the general form τ F x-dot (t)=-∇ x U(x) cannot oscillate (i.e. switch between their stable attractors). However, a number of such systems subject to carefully crafted coupling schemes have been shown to exhibit oscillatory behavior under carefully chosen operating conditions. This behavior, in turn, affords a new mechanism for the detection and quantification of target signals having magnitude far smaller than the energy barrier height in the potential energy function U(x) for a single (uncoupled) element. The coupling-induced oscillations are a feature that appears to be universal in systems described by bi- or multi-stable potential energy functions U(x), and are being exploited in a new class of dynamical sensors being developed by us. In this work we describe one of these devices, a coupled-core fluxgate magnetometer (CCFM), whose operation is underpinned by this dynamic behavior. We provide an overview of the underlying dynamics and, also, quantify the performance of our test device; in particular, we provide a quantitative performance comparison to a conventional (single-core) fluxgate magnetometer via a 'resolution' parameter that embodies the device sensitivity (the slope of its input–output transfer characteristic) as well as the noise floor
Synchronization of a new fractional-order hyperchaotic system
International Nuclear Information System (INIS)
Wu Xiangjun; Lu Hongtao; Shen Shilei
2009-01-01
In this letter, a new fractional-order hyperchaotic system is proposed. By utilizing the fractional calculus theory and computer simulations, it is found that hyperchaos exists in the new fractional-order four-dimensional system with order less than 4. The lowest order to have hyperchaos in this system is 2.88. The results are validated by the existence of two positive Lyapunov exponents. Using the pole placement technique, a nonlinear state observer is designed to synchronize a class of nonlinear fractional-order systems. The observer method is used to synchronize two identical fractional-order hyperchaotic systems. In addition, the active control technique is applied to synchronize the new fractional-order hyperchaotic system and the fractional-order Chen hyperchaotic system. The two schemes, based on the stability theory of the fractional-order system, are rather simple, theoretically rigorous and convenient to realize synchronization. They do not require the computation of the conditional Lyapunov exponents. Numerical results are performed to verify the effectiveness of the proposed synchronization schemes.
hybrid modulation scheme fo rid modulation scheme fo dulation
African Journals Online (AJOL)
eobe
control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.
On CSM classes via Chern-Fulton classes of f-schemes
Fullwood, James; Wang, Dongxu
2015-01-01
The Chern-Fulton class is a generalization of Chern class to the realm of arbitrary embeddable schemes. While Chern-Fulton classes are sensitive to non-reduced scheme structure, they are not sensitive to possible singularities of the underlying support, thus at first glance are not interesting from a singularity theory viewpoint. However, we introduce a class of formal objects which we think of as `fractional schemes', or f-schemes for short, and then show that when one broadens the domain of...
Exploiting Multi-user Diversity and Multi-hop Diversity in Dual-hop Broadcast Channels
Zafar, Ammar
2013-05-21
We propose joint user-and-hop scheduling over dual-hop block-fading broadcast channels in order to exploit multi-user diversity gains and multi-hop diversity gains all together. To achieve this objective, the first and second hops are scheduled opportunistically based on the channel state information. The joint scheduling problem is formulated as maximizing the weighted sum of the long term achievable rates of the users under a stability constraint, which means that in the long term the rate received by the relay should equal the rate transmitted by it, in addition to power constraints. We show that this problem is equivalent to a single-hop broadcast channel by treating the source as a virtual user with an optimal weight that maintains the stability constraint. We show how to obtain the source weight either off-line based on channel statistics or on real-time based on channel measurements. Furthermore, we consider special cases including the maximum sum-rate scheduler and the proportional fair scheduler. We also show how to extend the scheme into one that allows multiple user scheduling via superposition coding with successive decoding. Numerical results demonstrate that our proposed joint scheduling scheme enlarges the rate region as compared to scheduling schemes that exploit the diversity gains partially.
Yang, Yuli
2011-07-01
In addressing the issue of achieving high throughput in half-duplex relay channels, we exploit a concept of information-guided transmission for the network consisting of a source node, a destination node, and multiple half-duplex relay nodes. For further benefiting from multiple relay nodes, the relay-selection patterns are defined as the arbitrary combinations of given relay nodes. By exploiting the difference among the spatial channels states, in each relay-help transmission additional information to be forwarded is mapped onto the index of the active relay-selection pattern besides the basic information mapped onto the traditional constellation, which is forwarded by the relay node(s) in the active relay-selection pattern, so as to enhance the relay throughtput. With iterative decoding, the destination node can achieve a robust detection by decoupling the signals forwarded in different ways. We investigate the proposed scheme considering "decode-and-forward" protocol and establish its achievable transmission rate. The analytical results on capacity behaviors prove the efficiency of the proposed scheme by showing that it achieves better capacity performance than the conventional scheme. © 2011 IEEE.
Directory of Open Access Journals (Sweden)
Ye Shuiming
2009-01-01
Full Text Available Distributed video coding (DVC is a video coding paradigm allowing low complexity encoding for emerging applications such as wireless video surveillance. Side information (SI generation is a key function in the DVC decoder, and plays a key-role in determining the performance of the codec. This paper proposes an improved SI generation for DVC, which exploits both spatial and temporal correlations in the sequences. Partially decoded Wyner-Ziv (WZ frames, based on initial SI by motion compensated temporal interpolation, are exploited to improve the performance of the whole SI generation. More specifically, an enhanced temporal frame interpolation is proposed, including motion vector refinement and smoothing, optimal compensation mode selection, and a new matching criterion for motion estimation. The improved SI technique is also applied to a new hybrid spatial and temporal error concealment scheme to conceal errors in WZ frames. Simulation results show that the proposed scheme can achieve up to 1.0 dB improvement in rate distortion performance in WZ frames for video with high motion, when compared to state-of-the-art DVC. In addition, both the objective and perceptual qualities of the corrupted sequences are significantly improved by the proposed hybrid error concealment scheme, outperforming both spatial and temporal concealments alone.
International Nuclear Information System (INIS)
Yang, W.F.; Yuan, S.G.; Fang, K.M.; Shen, S.F.; Mou, W.T.; Zhang, X.Q.; Li, Z.Q.
1997-01-01
By bombarding the natural thorium targets with 14 MeV neutrons, 229 Ra was produced through the reaction 232 Th(n,α) 229 Ra. The radium activities were separated from the irradiated targets by coprecipitation with the BaCl 2 . A total of 18 new weak γ rays with energies of 14.5, 15.6, 18.8, 21.8, 22.5, 44.0, 47.5, 55.0, 63.0, 69.6, 93.6, 94.1, 98.5, 102.2, 104.5, 106.1, 161.1, and 171.5 keV which could be assigned to the decay of 229 Ra were observed in the isolated radium fractions employing high resolution HPGe detectors and γ(X)-γ coincidence methods. A decay scheme of 229 Ra based on these observations is proposed. (orig.). With 2 figs
Auction dynamics: A volume constrained MBO scheme
Jacobs, Matt; Merkurjev, Ekaterina; Esedoǧlu, Selim
2018-02-01
We show how auction algorithms, originally developed for the assignment problem, can be utilized in Merriman, Bence, and Osher's threshold dynamics scheme to simulate multi-phase motion by mean curvature in the presence of equality and inequality volume constraints on the individual phases. The resulting algorithms are highly efficient and robust, and can be used in simulations ranging from minimal partition problems in Euclidean space to semi-supervised machine learning via clustering on graphs. In the case of the latter application, numerous experimental results on benchmark machine learning datasets show that our approach exceeds the performance of current state-of-the-art methods, while requiring a fraction of the computation time.
Hypericin photocytotoxicyty followed after fractionated light irradiation
International Nuclear Information System (INIS)
Sackova, V.; Kulikova, L.; Mikes, J.; Kleban, J.; Fedorocko, P.
2006-01-01
The present study demonstrates the in vitro effect of hypericin-mediated photodynamic therapy with fractionated light delivery. Cells were photosensitized with unequal light fractions separated by dark intervals (1 h, 6 h). The changes in survival, apoptosis and cell cycle were compared on HT-29 cells irradiated with a single light dose (12 J/cm 2 ) to the fractionated light delivery (1+11 J/cm 2 ) 24 h and 48 h after photodynamic treatment. It was found that a fractionated light regime with a longer dark period resulted in a decrease of hypericin photo-cytotoxicity. Cell survival was higher after light sensitization with a 6 h dark interval. DNA fragmentation occurred after a single light dose application, but in contrast no apoptotic DNA formation was detected with a 6 h dark pause. After fractionation the percentage of cells in G 1 phase of the cell cycle was increased, while the proportion of cells in the G 2 phase decreased as compared to a single light dose application i. e. both percentage of cells in G 1 and G 2 phase of cell cycle were near control levels. We presume that the longer dark interval after the irradiation of cells by first light dose makes them to resistant to the effect of the second illumination. These findings confirm that the light application scheme together with other photodynamic protocol components is crucial for the photo-cytotoxicity of hypericin. (authors)
Generalized Combination Complex Synchronization for Fractional-Order Chaotic Complex Systems
Directory of Open Access Journals (Sweden)
Cuimei Jiang
2015-07-01
Full Text Available Based on two fractional-order chaotic complex drive systems and one fractional-order chaotic complex response system with different dimensions, we propose generalized combination complex synchronization. In this new synchronization scheme, there are two complex scaling matrices that are non-square matrices. On the basis of the stability theory of fractional-order linear systems, we design a general controller via active control. Additionally, by virtue of two complex scaling matrices, generalized combination complex synchronization between fractional-order chaotic complex systems and real systems is investigated. Finally, three typical examples are given to demonstrate the effectiveness and feasibility of the schemes.
A scheme comparison of Autler-Townes based slow light in inhomogeneously broadened quantum dot media
DEFF Research Database (Denmark)
Hansen, Per Lunnemann; Mørk, Jesper
2010-01-01
We propose a method to achieve significant optical signal delays exploiting the effect of Autler–Townes splitting (ATS) in an inhomogeneously broadened quantum dot medium. The absorption and slowdown effects are compared for three schemes i.e., Ξ, V, and Λ, corresponding to different excitation c...
Fractional Order Generalized Information
Directory of Open Access Journals (Sweden)
José Tenreiro Machado
2014-04-01
Full Text Available This paper formulates a novel expression for entropy inspired in the properties of Fractional Calculus. The characteristics of the generalized fractional entropy are tested both in standard probability distributions and real world data series. The results reveal that tuning the fractional order allow an high sensitivity to the signal evolution, which is useful in describing the dynamics of complex systems. The concepts are also extended to relative distances and tested with several sets of data, confirming the goodness of the generalization.
Fractional finite Fourier transform.
Khare, Kedar; George, Nicholas
2004-07-01
We show that a fractional version of the finite Fourier transform may be defined by using prolate spheroidal wave functions of order zero. The transform is linear and additive in its index and asymptotically goes over to Namias's definition of the fractional Fourier transform. As a special case of this definition, it is shown that the finite Fourier transform may be inverted by using information over a finite range of frequencies in Fourier space, the inversion being sensitive to noise. Numerical illustrations for both forward (fractional) and inverse finite transforms are provided.
Social Trust and Fractionalization:
DEFF Research Database (Denmark)
Bjørnskov, Christian
2008-01-01
This paper takes a closer look at the importance of fractionalization for the creation of social trust. It first argues that the determinants of trust can be divided into two categories: those affecting individuals' trust radii and those affecting social polarization. A series of estimates using...... a much larger country sample than in previous literature confirms that fractionalization in the form of income inequality and political diversity adversely affects social trust while ethnic diversity does not. However, these effects differ systematically across countries, questioning standard...... interpretations of the influence of fractionalization on trust....
Entrapment and Enmeshment Schemes Used by Sex Traffickers.
Reid, Joan A
2016-09-01
Emerging research suggests that sex traffickers/pimps control the majority of trafficked girls in the United States. The youthfulness of these victims and their lack of psychosocial maturity severely diminish their ability to detect exploitative motives or withstand manipulation of traffickers. A review of 43 cases of sexually exploited girls involving non-relative traffickers and 10 semi-structured interviews with social service providers revealed numerous scripts and schemes used by sex traffickers to entrap and entangle victims including boyfriend/lover scripts, ruses involving debt bondage, friendship or faux-family scripts, threats of forced abortion or to take away children, and coerced co-offending. These findings inform potential prevention efforts and highlight the need for multi-systemic, victim-centered approaches to intervention. © The Author(s) 2014.
Cloud Based Earth Observation Data Exploitation Platforms
Romeo, A.; Pinto, S.; Loekken, S.; Marin, A.
2017-12-01
In the last few years data produced daily by several private and public Earth Observation (EO) satellites reached the order of tens of Terabytes, representing for scientists and commercial application developers both a big opportunity for their exploitation and a challenge for their management. New IT technologies, such as Big Data and cloud computing, enable the creation of web-accessible data exploitation platforms, which offer to scientists and application developers the means to access and use EO data in a quick and cost effective way. RHEA Group is particularly active in this sector, supporting the European Space Agency (ESA) in the Exploitation Platforms (EP) initiative, developing technology to build multi cloud platforms for the processing and analysis of Earth Observation data, and collaborating with larger European initiatives such as the European Plate Observing System (EPOS) and the European Open Science Cloud (EOSC). An EP is a virtual workspace, providing a user community with access to (i) large volume of data, (ii) algorithm development and integration environment, (iii) processing software and services (e.g. toolboxes, visualization routines), (iv) computing resources, (v) collaboration tools (e.g. forums, wiki, etc.). When an EP is dedicated to a specific Theme, it becomes a Thematic Exploitation Platform (TEP). Currently, ESA has seven TEPs in a pre-operational phase dedicated to geo-hazards monitoring and prevention, costal zones, forestry areas, hydrology, polar regions, urban areas and food security. On the technology development side, solutions like the multi cloud EO data processing platform provides the technology to integrate ICT resources and EO data from different vendors in a single platform. In particular it offers (i) Multi-cloud data discovery, (ii) Multi-cloud data management and access and (iii) Multi-cloud application deployment. This platform has been demonstrated with the EGI Federated Cloud, Innovation Platform Testbed Poland
Heisenberg's heirs exploit loopholes in his law
International Nuclear Information System (INIS)
Taubes, G.
1994-01-01
This article describes research into Heisenberg's Uncertainty Principle. Loopholes in the principle have led to a series of experiments using sophisticated optical techniques to extract information from a quantum system without disturbing the variable being measured. The experiments are based on a technique called back-action evasion, which exploits the possibility of channeling all the uncertainty generated by measuring one quantum variable (e.g. laser beam intensity) onto a related variable known as the conjugate observable (beam phase). These experiments and others are described
Liposomal cancer therapy: exploiting tumor characteristics
DEFF Research Database (Denmark)
Kaasgaard, Thomas; Andresen, Thomas Lars
2010-01-01
an overview of current strategies for improving the different stages of liposomal cancer therapy, which involve transporting drug-loaded liposomes through the bloodstream, increasing tumor accumulation, and improving drug release and cancer cell uptake after accumulation at the tumor target site. What...... the reader will gain: The review focuses on strategies that exploit characteristic features of solid tumors, such as abnormal vasculature, overexpression of receptors and enzymes, as well as acidic and thiolytic characteristics of the tumor microenvironment. Take home message: It is concluded that the design...
Pilot plant for exploitation of geothermal waters
Directory of Open Access Journals (Sweden)
Stojiljković Dragan T.
2006-01-01
Full Text Available In Sijarinska spa, there are some 15 mineral and thermomineral springs, that are already being used for therapeutic purposes. For the exploitation of heat energy boring B-4 is very interesting. It is a boring of a closed type, with the water temperature of about 78°C and a flow rate of about 33 l/s. Waters with the flow rate of about 6 l/s are currently used for heating of the Gejzer hotel, and waters of the flow rate of about 0,121 l/s for the pilot drying plant. The paper presents this pilot plant. .
Exploiting Redundancy in an OFDM SDR Receiver
Directory of Open Access Journals (Sweden)
Tomas Palenik
2009-01-01
Full Text Available Common OFDM system contains redundancy necessary to mitigate interblock interference and allows computationally effective single-tap frequency domain equalization in receiver. Assuming the system implements an outer error correcting code and channel state information is available in the receiver, we show that it is possible to understand the cyclic prefix insertion as a weak inner ECC encoding and exploit the introduced redundancy to slightly improve error performance of such a system. In this paper, an easy way to implement modification to an existing SDR OFDM receiver is presented. This modification enables the utilization of prefix redundancy, while preserving full compatibility with existing OFDM-based communication standards.
Geothermal resources: exploration and exploitation. A bibliography
Energy Technology Data Exchange (ETDEWEB)
1976-07-01
This comprehensive bibliography contains 5476 citations of foreign and domestic research reports, journal articles, patents, conference proceedings, and books concerned with the exploration and exploitation of geothermal resources. The coverage dates back as far as useful references could be obtained and extends through June 1976. References are arranged in broad subject categories and are made up of complete bibliographic citations. These are followed by a listing of subject descriptors used to describe the subject content of each reference. Four indexes are included: Corporate, Personal Author, Subject, and Report Number. Also included is a list of journals from which articles were selected. (LBS)
Algorithms exploiting ultrasonic sensors for subject classification
Desai, Sachi; Quoraishee, Shafik
2009-09-01
Proposed here is a series of techniques exploiting micro-Doppler ultrasonic sensors capable of characterizing various detected mammalian targets based on their physiological movements captured a series of robust features. Employed is a combination of unique and conventional digital signal processing techniques arranged in such a manner they become capable of classifying a series of walkers. These processes for feature extraction develops a robust feature space capable of providing discrimination of various movements generated from bipeds and quadrupeds and further subdivided into large or small. These movements can be exploited to provide specific information of a given signature dividing it in a series of subset signatures exploiting wavelets to generate start/stop times. After viewing a series spectrograms of the signature we are able to see distinct differences and utilizing kurtosis, we generate an envelope detector capable of isolating each of the corresponding step cycles generated during a walk. The walk cycle is defined as one complete sequence of walking/running from the foot pushing off the ground and concluding when returning to the ground. This time information segments the events that are readily seen in the spectrogram but obstructed in the temporal domain into individual walk sequences. This walking sequence is then subsequently translated into a three dimensional waterfall plot defining the expected energy value associated with the motion at particular instance of time and frequency. The value is capable of being repeatable for each particular class and employable to discriminate the events. Highly reliable classification is realized exploiting a classifier trained on a candidate sample space derived from the associated gyrations created by motion from actors of interest. The classifier developed herein provides a capability to classify events as an adult humans, children humans, horses, and dogs at potentially high rates based on the tested sample
Caratelli, Diego; Mescia, Luciano; Bia, Pietro; Stukach, Oleg V.
2016-01-01
A novel finite-difference time-domain algorithm for modeling ultrawideband electromagnetic pulse propagation in arbitrary multirelaxed dispersive media is presented. The proposed scheme is based on a general, yet computationally efficient, series representation of the fractional derivative operators
Numerical solution for multi-term fractional (arbitrary) orders differential equations
El-Sayed, A. M. A.; El-Mesiry, A. E. M.; El-Saka, H. A. A.
2004-01-01
Our main concern here is to give a numerical scheme to solve a nonlinear multi-term fractional (arbitrary) orders differential equation. Some results concerning the existence and uniqueness have been also obtained.
International Nuclear Information System (INIS)
Wang Chao; Liu Jian-Wei; Liu Xiao; Shang Tao
2013-01-01
A novel deterministic secure quantum communication (DSQC) scheme is presented based on Einstein-Podolsky-Rosen (EPR) pairs and single photons in this study. In this scheme, the secret message can be encoded directly on the first particles of the prepared Bell states by simple unitary operations and decoded by performing the Bell-basis measurement after the additional classic information is exchanged. In addition, the strategy with two-step transmission of quantum data blocks and the technique of decoy-particle checking both are exploited to guarantee the security of the communication. Compared with some previous DSQC schemes, this scheme not only has a higher resource capacity, intrinsic efficiency and total efficiency, but also is more realizable in practical applications. Security analysis shows that the proposed scheme is unconditionally secure against various attacks over an ideal quantum channel and still conditionally robust over a noisy and lossy quantum channel. (general)
FRACTIONS: CONCEPTUAL AND DIDACTIC ASPECTS
Directory of Open Access Journals (Sweden)
Sead Rešić
2016-09-01
Full Text Available Fractions represent the manner of writing parts of whole numbers (integers. Rules for operations with fractions differ from rules for operations with integers. Students face difficulties in understanding fractions, especially operations with fractions. These difficulties are well known in didactics of Mathematics throughout the world and there is a lot of research regarding problems in learning about fractions. Methods for facilitating understanding fractions have been discovered, which are essentially related to visualizing operations with fractions.
Good governance for pension schemes
Thornton, Paul
2011-01-01
Regulatory and market developments have transformed the way in which UK private sector pension schemes operate. This has increased demands on trustees and advisors and the trusteeship governance model must evolve in order to remain fit for purpose. This volume brings together leading practitioners to provide an overview of what today constitutes good governance for pension schemes, from both a legal and a practical perspective. It provides the reader with an appreciation of the distinctive characteristics of UK occupational pension schemes, how they sit within the capital markets and their social and fiduciary responsibilities. Providing a holistic analysis of pension risk, both from the trustee and the corporate perspective, the essays cover the crucial role of the employer covenant, financing and investment risk, developments in longevity risk hedging and insurance de-risking, and best practice scheme administration.
Optimum RA reactor fuelling scheme
International Nuclear Information System (INIS)
Strugar, P.; Nikolic, V.
1965-10-01
Ideal reactor refueling scheme can be achieved only by continuous fuel elements movement in the core, which is not possible, and thus approximations are applied. One of the possible approximations is discontinuous movement of fuel elements groups in radial direction. This enables higher burnup especially if axial exchange is possible. Analysis of refueling schemes in the RA reactor core and schemes with mixing the fresh and used fuel elements show that 30% higher burnup can be achieved by applying mixing, and even 40% if reactivity due to decrease in experimental space is taken into account. Up to now, mean burnup of 4400 MWd/t has been achieved, and the proposed fueling scheme with reduction of experimental space could achieve mean burnup of 6300 MWd/t which means about 25 Mwd/t per fuel channel [sr
A Novel Iris Segmentation Scheme
Directory of Open Access Journals (Sweden)
Chen-Chung Liu
2014-01-01
Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.
Fractional Stochastic Field Theory
Honkonen, Juha
2018-02-01
Models describing evolution of physical, chemical, biological, social and financial processes are often formulated as differential equations with the understanding that they are large-scale equations for averages of quantities describing intrinsically random processes. Explicit account of randomness may lead to significant changes in the asymptotic behaviour (anomalous scaling) in such models especially in low spatial dimensions, which in many cases may be captured with the use of the renormalization group. Anomalous scaling and memory effects may also be introduced with the use of fractional derivatives and fractional noise. Construction of renormalized stochastic field theory with fractional derivatives and fractional noise in the underlying stochastic differential equations and master equations and the interplay between fluctuation-induced and built-in anomalous scaling behaviour is reviewed and discussed.
Goodrich, Christopher
2015-01-01
This text provides the first comprehensive treatment of the discrete fractional calculus. Experienced researchers will find the text useful as a reference for discrete fractional calculus and topics of current interest. Students who are interested in learning about discrete fractional calculus will find this text to provide a useful starting point. Several exercises are offered at the end of each chapter and select answers have been provided at the end of the book. The presentation of the content is designed to give ample flexibility for potential use in a myriad of courses and for independent study. The novel approach taken by the authors includes a simultaneous treatment of the fractional- and integer-order difference calculus (on a variety of time scales, including both the usual forward and backwards difference operators). The reader will acquire a solid foundation in the classical topics of the discrete calculus while being introduced to exciting recent developments, bringing them to the frontiers of the...
Shamim, Atif; Radwan, Ahmed Gomaa; Salama, Khaled N.
2011-01-01
matching networks, where the fractional approach proves to be much more versatile and results in a single element matching network for a complex load as compared to the two elements in the conventional approach. © 2010 IEEE.
Fractional diffusion models of nonlocal transport
International Nuclear Information System (INIS)
Castillo-Negrete, D. del
2006-01-01
A class of nonlocal models based on the use of fractional derivatives (FDs) is proposed to describe nondiffusive transport in magnetically confined plasmas. FDs are integro-differential operators that incorporate in a unified framework asymmetric non-Fickian transport, non-Markovian ('memory') effects, and nondiffusive scaling. To overcome the limitations of fractional models in unbounded domains, we use regularized FDs that allow the incorporation of finite-size domain effects, boundary conditions, and variable diffusivities. We present an α-weighted explicit/implicit numerical integration scheme based on the Grunwald-Letnikov representation of the regularized fractional diffusion operator in flux conserving form. In sharp contrast with the standard diffusive model, the strong nonlocality of fractional diffusion leads to a linear in time response for a decaying pulse at short times. In addition, an anomalous fractional pinch is observed, accompanied by the development of an uphill transport region where the 'effective' diffusivity becomes negative. The fractional flux is in general asymmetric and, for steady states, it has a negative (toward the core) component that enhances confinement and a positive component that increases toward the edge and leads to poor confinement. The model exhibits the characteristic anomalous scaling of the confinement time, τ, with the system's size, L, τ∼L α , of low-confinement mode plasma where 1<α<2 is the order of the FD operator. Numerical solutions of the model with an off-axis source show that the fractional inward transport gives rise to profile peaking reminiscent of what is observed in tokamak discharges with auxiliary off-axis heating. Also, cold-pulse perturbations to steady sates in the model exhibit fast, nondiffusive propagation phenomena that resemble perturbative experiments
Numerical schemes for explosion hazards
International Nuclear Information System (INIS)
Therme, Nicolas
2015-01-01
In nuclear facilities, internal or external explosions can cause confinement breaches and radioactive materials release in the environment. Hence, modeling such phenomena is crucial for safety matters. Blast waves resulting from explosions are modeled by the system of Euler equations for compressible flows, whereas Navier-Stokes equations with reactive source terms and level set techniques are used to simulate the propagation of flame front during the deflagration phase. The purpose of this thesis is to contribute to the creation of efficient numerical schemes to solve these complex models. The work presented here focuses on two major aspects: first, the development of consistent schemes for the Euler equations, then the buildup of reliable schemes for the front propagation. In both cases, explicit in time schemes are used, but we also introduce a pressure correction scheme for the Euler equations. Staggered discretization is used in space. It is based on the internal energy formulation of the Euler system, which insures its positivity and avoids tedious discretization of the total energy over staggered grids. A discrete kinetic energy balance is derived from the scheme and a source term is added in the discrete internal energy balance equation to preserve the exact total energy balance at the limit. High order methods of MUSCL type are used in the discrete convective operators, based solely on material velocity. They lead to positivity of density and internal energy under CFL conditions. This ensures that the total energy cannot grow and we can furthermore derive a discrete entropy inequality. Under stability assumptions of the discrete L8 and BV norms of the scheme's solutions one can prove that a sequence of converging discrete solutions necessarily converges towards the weak solution of the Euler system. Besides it satisfies a weak entropy inequality at the limit. Concerning the front propagation, we transform the flame front evolution equation (the so called
Breeding schemes in reindeer husbandry
Directory of Open Access Journals (Sweden)
Lars Rönnegård
2003-04-01
Full Text Available The objective of the paper was to investigate annual genetic gain from selection (G, and the influence of selection on the inbreeding effective population size (Ne, for different possible breeding schemes within a reindeer herding district. The breeding schemes were analysed for different proportions of the population within a herding district included in the selection programme. Two different breeding schemes were analysed: an open nucleus scheme where males mix and mate between owner flocks, and a closed nucleus scheme where the males in non-selected owner flocks are culled to maximise G in the whole population. The theory of expected long-term genetic contributions was used and maternal effects were included in the analyses. Realistic parameter values were used for the population, modelled with 5000 reindeer in the population and a sex ratio of 14 adult females per male. The standard deviation of calf weights was 4.1 kg. Four different situations were explored and the results showed: 1. When the population was randomly culled, Ne equalled 2400. 2. When the whole population was selected on calf weights, Ne equalled 1700 and the total annual genetic gain (direct + maternal in calf weight was 0.42 kg. 3. For the open nucleus scheme, G increased monotonically from 0 to 0.42 kg as the proportion of the population included in the selection programme increased from 0 to 1.0, and Ne decreased correspondingly from 2400 to 1700. 4. In the closed nucleus scheme the lowest value of Ne was 1300. For a given proportion of the population included in the selection programme, the difference in G between a closed nucleus scheme and an open one was up to 0.13 kg. We conclude that for mass selection based on calf weights in herding districts with 2000 animals or more, there are no risks of inbreeding effects caused by selection.
Desiraju, Naveen Kumar; Doclo, Simon; Wolff, Tobias
2017-12-01
Acoustic echo cancellation (AEC) is a key speech enhancement technology in speech communication and voice-enabled devices. AEC systems employ adaptive filters to estimate the acoustic echo paths between the loudspeakers and the microphone(s). In applications involving surround sound, the computational complexity of an AEC system may become demanding due to the multiple loudspeaker channels and the necessity of using long filters in reverberant environments. In order to reduce the computational complexity, the approach of partially updating the AEC filters is considered in this paper. In particular, we investigate tap selection schemes which exploit the sparsity present in the loudspeaker channels for partially updating subband AEC filters. The potential for exploiting signal sparsity across three dimensions, namely time, frequency, and channels, is analyzed. A thorough analysis of different state-of-the-art tap selection schemes is performed and insights about their limitations are gained. A novel tap selection scheme is proposed which overcomes these limitations by exploiting signal sparsity while not ignoring any filters for update in the different subbands and channels. Extensive simulation results using both artificial as well as real-world multichannel signals show that the proposed tap selection scheme outperforms state-of-the-art tap selection schemes in terms of echo cancellation performance. In addition, it yields almost identical echo cancellation performance as compared to updating all filter taps at a significantly reduced computational cost.
Intracellular Cadmium Isotope Fractionation
Horner, T. J.; Lee, R. B.; Henderson, G. M.; Rickaby, R. E.
2011-12-01
Recent stable isotope studies into the biological utilization of transition metals (e.g. Cu, Fe, Zn, Cd) suggest several stepwise cellular processes can fractionate isotopes in both culture and nature. However, the determination of fractionation factors is often unsatisfactory, as significant variability can exist - even between different organisms with the same cellular functions. Thus, it has not been possible to adequately understand the source and mechanisms of metal isotopic fractionation. In order to address this problem, we investigated the biological fractionation of Cd isotopes within genetically-modified bacteria (E. coli). There is currently only one known biological use or requirement of Cd, a Cd/Zn carbonic anhydrase (CdCA, from the marine diatom T. weissfloggii), which we introduce into the E. coli genome. We have also developed a cleaning procedure that allows for the treating of bacteria so as to study the isotopic composition of different cellular components. We find that whole cells always exhibit a preference for uptake of the lighter isotopes of Cd. Notably, whole cells appear to have a similar Cd isotopic composition regardless of the expression of CdCA within the E. coli. However, isotopic fractionation can occur within the genetically modified E. coli during Cd use, such that Cd bound in CdCA can display a distinct isotopic composition compared to the cell as a whole. Thus, the externally observed fractionation is independent of the internal uses of Cd, with the largest Cd isotope fractionation occurring during cross-membrane transport. A general implication of these experiments is that trace metal isotopic fractionation most likely reflects metal transport into biological cells (either actively or passively), rather than relating to expression of specific physiological function and genetic expression of different metalloenzymes.
Competing Discourses about Youth Sexual Exploitation in Canadian News Media.
Saewyc, Elizabeth M; Miller, Bonnie B; Rivers, Robert; Matthews, Jennifer; Hilario, Carla; Hirakata, Pam
2013-10-01
Media holds the power to create, maintain, or break down stigmatizing attitudes, which affect policies, funding, and services. To understand how Canadian news media depicts the commercial sexual exploitation of children and youth, we examined 835 Canadian newspaper articles from 1989-2008 using a mixed methods critical discourse analysis approach, comparing representations to existing research about sexually exploited youth. Despite research evidence that equal rates of boys and girls experience exploitation, Canadian news media depicted exploited youth predominantly as heterosexual girls, and described them alternately as victims or workers in a trade, often both in the same story. News media mentioned exploiters far less often than victims, and portrayed them almost exclusively as male, most often called 'customers' or 'consumers,' and occasionally 'predators'; in contrast, research has documented the majority of sexually exploited boys report female exploiters. Few news stories over the past two decades portrayed the diversity of victims, perpetrators, and venues of exploitation reported in research. The focus on victims but not exploiters helps perpetuate stereotypes of sexual exploitation as business or a 'victimless crime,' maintains the status quo, and blurs responsibility for protecting youth under the UN Convention on the Rights of the Child. Health care providers and researchers can be advocates for accuracy in media coverage about sexual exploitation; news reporters and editors should focus on exploiters more than victims, draw on existing research evidence to avoid perpetuating stereotypes, and use accurate terms, such as commercial sexual exploitation, rather than terms related to business or trade.
Genomics-Assisted Exploitation of Heterosis in Perennial Ryegrass (Lolium perenne L.)
DEFF Research Database (Denmark)
Islam, Md. Shofiqul
ryegrass for the development of improved varieties. During his PhD studies, Mohammad Shofiqul Islam studied the feasibility of developing novel hybrid breeding schemes based on cytoplasmic male sterility (CMS) systems in perennial ryegrass. He successfully completed the assembly and annotation of a male......-fertile perennial ryegrass mitochondrial genome, and identified candidate genes responsible for the CMS phenotype by comparing male-fertile and male-sterile mitochondrial genomes. His findings constitute a good basis for continuing research to produce hybrid grass varieties to address the future needs......, breeding activities have been carried out to improve the population and develop synthetic varieties. This does not fully exploit the potential of heterosis, however. Hybrid breeding is an alternative strategy and provides opportunities to fully exploit the genetically available heterosis in perennial...
Fractional laser skin resurfacing.
Alexiades-Armenakas, Macrene R; Dover, Jeffrey S; Arndt, Kenneth A
2012-11-01
Laser skin resurfacing (LSR) has evolved over the past 2 decades from traditional ablative to fractional nonablative and fractional ablative resurfacing. Traditional ablative LSR was highly effective in reducing rhytides, photoaging, and acne scarring but was associated with significant side effects and complications. In contrast, nonablative LSR was very safe but failed to deliver consistent clinical improvement. Fractional LSR has achieved the middle ground; it combined the efficacy of traditional LSR with the safety of nonablative modalities. The first fractional laser was a nonablative erbium-doped yttrium aluminum garnet (Er:YAG) laser that produced microscopic columns of thermal injury in the epidermis and upper dermis. Heralding an entirely new concept of laser energy delivery, it delivered the laser beam in microarrays. It resulted in microscopic columns of treated tissue and intervening areas of untreated skin, which yielded rapid reepithelialization. Fractional delivery was quickly applied to ablative wavelengths such as carbon dioxide, Er:YAG, and yttrium scandium gallium garnet (2,790 nm), providing more significant clinical outcomes. Adjustable laser parameters, including power, pitch, dwell time, and spot density, allowed for precise determination of percent surface area, affected penetration depth, and clinical recovery time and efficacy. Fractional LSR has been a significant advance to the laser field, striking the balance between safety and efficacy.
Function projective lag synchronization of fractional-order chaotic systems
International Nuclear Information System (INIS)
Wang Sha; Yu Yong-Guang; Wang Hu; Rahmani Ahmed
2014-01-01
Function projective lag synchronization of different structural fractional-order chaotic systems is investigated. It is shown that the slave system can be synchronized with the past states of the driver up to a scaling function matrix. According to the stability theorem of linear fractional-order systems, a nonlinear fractional-order controller is designed for the synchronization of systems with the same and different dimensions. Especially, for two different dimensional systems, the synchronization is achieved in both reduced and increased dimensions. Three kinds of numerical examples are presented to illustrate the effectiveness of the scheme. (general)
An integration scheme for stiff solid-gas reactor models
Directory of Open Access Journals (Sweden)
Bjarne A. Foss
2001-04-01
Full Text Available Many dynamic models encounter numerical integration problems because of a large span in the dynamic modes. In this paper we develop a numerical integration scheme for systems that include a gas phase, and solid and liquid phases, such as a gas-solid reactor. The method is based on neglecting fast dynamic modes and exploiting the structure of the algebraic equations. The integration method is suitable for a large class of industrially relevant systems. The methodology has proven remarkably efficient. It has in practice performed excellent and been a key factor for the success of the industrial simulator for electrochemical furnaces for ferro-alloy production.
ROUNDTABLE - SESSION 2 EXPLOITATION, CONSERVATION AND LEGISLATION
Directory of Open Access Journals (Sweden)
EDSMAN L.
2004-01-01
Full Text Available The link between socioeconomics and conservation and the role of legislation in conservation work was discussed in the group with participants from nine European countries. Interest and knowledge among the general public, stakeholders and managers is the key to successful conservation of native crayfish species. Exploitation and conservation do not necessarily exclude each other. A controlled fishery, where it can be sustained, may be an essential tool for conservation by increasing the general awareness and involving more people in the task of protecting the native crayfish species. This strategy is mainly possible for the noble crayfish in the northern part of its distribution, where strong traditions connected to crayfish also exist. A balance between utilisation and overexploitation has to be found and local guidelines for sustainable exploitation produced. Media, the Internet and educational material aimed at schools and stakeholders are excellent ways of reaching a wide audience with information. Universal objectives, rules and regulations at the European level are desirable and the noble crayfish and the stone crayfish should be included in Annex II of the Habitat Directive. Based on this framework detailed regulations are best worked out at the national level, considering the specific crayfish situation in the country. Information about the legislation, the purpose of the legislation and the consequences when not obeying it should be distributed. Stricter regulation of the trade with live alien crayfish is vital because of the associated risk of introducing new diseases and species.
Uncovering Indicators of Commercial Sexual Exploitation.
Bounds, Dawn; Delaney, Kathleen R; Julion, Wrenetha; Breitenstein, Susan
2017-07-01
It is estimated that annually 100,000 to 300,000 youth are at risk for sex trafficking; a commercial sex act induced by force, fraud, or coercion, or any such act where the person induced to perform such an act is younger than 18 years of age. Increasingly, such transactions are occurring online via Internet-based sites that serve the commercial sex industry. Commercial sex transactions involving trafficking are illegal; thus, Internet discussions between those involved must be veiled. Even so, transactions around sex trafficking do occur. Within these transactions are innuendos that provide one avenue for detecting potential activity. The purpose of this study is to identify linguistic indicators of potential commercial sexual exploitation within the online comments of men posted on an Internet site. Six hundred sixty-six posts from five Midwest cities and 363 unique members were analyzed via content analysis. Three main indicators were found: the presence of youth or desire for youthfulness, presence of pimps, and awareness of vulnerability. These findings begin a much-needed dialogue on uncovering online risks of commercial sexual exploitation and support the need for further research on Internet indicators of sex trafficking.
Large size space construction for space exploitation
Kondyurin, Alexey
2016-07-01
Space exploitation is impossible without large space structures. We need to make sufficient large volume of pressurized protecting frames for crew, passengers, space processing equipment, & etc. We have to be unlimited in space. Now the size and mass of space constructions are limited by possibility of a launch vehicle. It limits our future in exploitation of space by humans and in development of space industry. Large-size space construction can be made with using of the curing technology of the fibers-filled composites and a reactionable matrix applied directly in free space. For curing the fabric impregnated with a liquid matrix (prepreg) is prepared in terrestrial conditions and shipped in a container to orbit. In due time the prepreg is unfolded by inflating. After polymerization reaction, the durable construction can be fitted out with air, apparatus and life support systems. Our experimental studies of the curing processes in the simulated free space environment showed that the curing of composite in free space is possible. The large-size space construction can be developed. A project of space station, Moon base, Mars base, mining station, interplanet space ship, telecommunication station, space observatory, space factory, antenna dish, radiation shield, solar sail is proposed and overviewed. The study was supported by Humboldt Foundation, ESA (contract 17083/03/NL/SFe), NASA program of the stratospheric balloons and RFBR grants (05-08-18277, 12-08-00970 and 14-08-96011).
PROBA-V Mission Exploitation Platform
Directory of Open Access Journals (Sweden)
Erwin Goor
2016-07-01
Full Text Available As an extension of the PROBA-Vegetation (PROBA-V user segment, the European Space Agency (ESA, de Vlaamse Instelling voor Technologisch Onderzoek (VITO, and partners TRASYS and Spacebel developed an operational Mission Exploitation Platform (MEP to drastically improve the exploitation of the PROBA-V Earth Observation (EO data archive, the archive from the historical SPOT-VEGETATION mission, and derived products by researchers, service providers, and thematic users. The analysis of the time series of data (petabyte range is addressed, as well as the large scale on-demand processing of the complete archive, including near real-time data. The platform consists of a private cloud environment, a Hadoop-based processing environment and a data manager. Several applications are released to the users, e.g., a full resolution viewing service, a time series viewer, pre-defined on-demand processing chains, and virtual machines with powerful tools and access to the data. After an initial release in January 2016 a research platform was deployed gradually, allowing users to design, debug, and test applications on the platform. From the PROBA-V MEP, access to, e.g., Sentinel-2 and Sentinel-3 data will be addressed as well.
Design of Provider-Provisioned Website Protection Scheme against Malware Distribution
Yagi, Takeshi; Tanimoto, Naoto; Hariu, Takeo; Itoh, Mitsutaka
Vulnerabilities in web applications expose computer networks to security threats, and many websites are used by attackers as hopping sites to attack other websites and user terminals. These incidents prevent service providers from constructing secure networking environments. To protect websites from attacks exploiting vulnerabilities in web applications, service providers use web application firewalls (WAFs). WAFs filter accesses from attackers by using signatures, which are generated based on the exploit codes of previous attacks. However, WAFs cannot filter unknown attacks because the signatures cannot reflect new types of attacks. In service provider environments, the number of exploit codes has recently increased rapidly because of the spread of vulnerable web applications that have been developed through cloud computing. Thus, generating signatures for all exploit codes is difficult. To solve these problems, our proposed scheme detects and filters malware downloads that are sent from websites which have already received exploit codes. In addition, to collect information for detecting malware downloads, web honeypots, which automatically extract the communication records of exploit codes, are used. According to the results of experiments using a prototype, our scheme can filter attacks automatically so that service providers can provide secure and cost-effective network environments.
A Hybrid Data Compression Scheme for Improved VNC
Directory of Open Access Journals (Sweden)
Xiaozheng (Jane Zhang
2007-04-01
Full Text Available Virtual Network Computing (VNC has emerged as a promising technology in distributed computing environment since its invention in the late nineties. Successful application of VNC requires rapid data transfer from one machine to another over a TCP/IP network connection. However transfer of screen data consumes much network bandwidth and current data encoding schemes for VNC are far from being ideal. This paper seeks to improve screen data compression techniques to enable VNC over slow connections and present a reasonable speed and image quality. In this paper, a hybrid technique is proposed for improving coding efficiency. The algorithm first divides a screen image into pre-defined regions and applies encoding schemes to each area according to the region characteristics. Second, correlation of screen data in consecutive frames is exploited where multiple occurrences of similar image contents are detected. The improved results are demonstrated in a dynamic environment with various screen image types and desktop manipulation.
Adaptive nonseparable vector lifting scheme for digital holographic data compression.
Xing, Yafei; Kaaniche, Mounir; Pesquet-Popescu, Béatrice; Dufaux, Frédéric
2015-01-01
Holographic data play a crucial role in recent three-dimensional imaging as well as microscopic applications. As a result, huge amounts of storage capacity will be involved for this kind of data. Therefore, it becomes necessary to develop efficient hologram compression schemes for storage and transmission purposes. In this paper, we focus on the shifted distance information, obtained by the phase-shifting algorithm, where two sets of difference data need to be encoded. More precisely, a nonseparable vector lifting scheme is investigated in order to exploit the two-dimensional characteristics of the holographic contents. Simulations performed on different digital holograms have shown the effectiveness of the proposed method in terms of bitrate saving and quality of object reconstruction.
zero day exploits and national readiness for cyber-warfare
African Journals Online (AJOL)
HOD
A zero day vulnerability is an unknown exploit that divulges security flaws in software before such a flaw is publicly ... Keywords: exploits, zero day, vulnerability, cyberspace, cyber-warfare. 1. ..... industries and companies across the globe. The.
Jain, Sonal
2018-01-01
In this paper, we aim to use the alternative numerical scheme given by Gnitchogna and Atangana for solving partial differential equations with integer and non-integer differential operators. We applied this method to fractional diffusion model and fractional Buckmaster models with non-local fading memory. The method yields a powerful numerical algorithm for fractional order derivative to implement. Also we present in detail the stability analysis of the numerical method for solving the diffusion equation. This proof shows that this method is very stable and also converges very quickly to exact solution and finally some numerical simulation is presented.
Viability of exploiting L-shell fluorescence for X-ray polarimetry
Energy Technology Data Exchange (ETDEWEB)
Weisskopf, M C; Elsner, R F; Ramsey, B D [National Aeronautics and Space Administration, Huntsville, AL (USA). Space Sciences Lab.; Sutherland, P G [McMaster Univ., Hamilton, Ontario (Canada). Dept. of Physics
1985-05-15
It has been suggested that one may build an X-ray polarimeter by exploiting the polarization dependence of the angular distribution of L-shell fluorescence photons. In this paper we examine, theoretically, the sensitivity of this approach to polarimetry. We apply our calculations to several detection schemes using imaging proportional counters that would have direct application in X-ray astronomy. We find, however, that the sensitivity of this method for measuring X-ray polarization is too low to be of use for other than laboratory applications.
On the viability of exploiting L-shell fluorescence for X-ray polarimetry
Energy Technology Data Exchange (ETDEWEB)
Weisskopf, M C; Elsner, R F; Ramsey, B D; Sutherland, P G
1985-05-15
It has been suggested that one may build an X-ray polarimeter by exploiting the polarization dependence of the angular distribution of L-shell fluorescence photons. In this paper we examine, theoretically, the sensitivity of this approach to polarimetry. We apply our calculations to several detection schemes using imaging proportional counters that would have direct application in X-ray astronomy. We find, however, that the sensitivity of this method for measuring X-ray polarization is too low to be of use for other than laboratory applications. (orig.).
Ashyralyev, Allaberen; Cakir, Zafer
2016-08-01
In this work, we investigate initial-boundary value problems for fractional parabolic equations with the Neumann boundary condition. Stability estimates for the solution of this problem are established. Difference schemes for approximate solution of initial-boundary value problem are constructed. Furthermore, we give theorem on coercive stability estimates for the solution of the difference schemes.
Stable multi-domain spectral penalty methods for fractional partial differential equations
Xu, Qinwu; Hesthaven, Jan S.
2014-01-01
We propose stable multi-domain spectral penalty methods suitable for solving fractional partial differential equations with fractional derivatives of any order. First, a high order discretization is proposed to approximate fractional derivatives of any order on any given grids based on orthogonal polynomials. The approximation order is analyzed and verified through numerical examples. Based on the discrete fractional derivative, we introduce stable multi-domain spectral penalty methods for solving fractional advection and diffusion equations. The equations are discretized in each sub-domain separately and the global schemes are obtained by weakly imposed boundary and interface conditions through a penalty term. Stability of the schemes are analyzed and numerical examples based on both uniform and nonuniform grids are considered to highlight the flexibility and high accuracy of the proposed schemes.
Series expansion in fractional calculus and fractional differential equations
Li, Ming-Fan; Ren, Ji-Rong; Zhu, Tao
2009-01-01
Fractional calculus is the calculus of differentiation and integration of non-integer orders. In a recently paper (Annals of Physics 323 (2008) 2756-2778), the Fundamental Theorem of Fractional Calculus is highlighted. Based on this theorem, in this paper we introduce fractional series expansion method to fractional calculus. We define a kind of fractional Taylor series of an infinitely fractionally-differentiable function. Further, based on our definition we generalize hypergeometric functio...
The Theory of Exploitation as the Unequal Exchange of Labour
Veneziani, Roberto; Yoshihara, Naoki
2016-01-01
This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...
The theory of exploitation as the unequal exchange of labour
Veneziani, Roberto; Yoshihara, Naoki
2017-01-01
This paper analyses the normative and positive foundations of the theory of exploitation as the unequal exchange of labour (UEL). The key intuitions behind all of the main approaches to UEL exploitation are explicitly analysed as a series of formal claims in a general economic environment. It is then argued that these intuitions can be captured by one fundamental axiom - called Labour Exploitation - which defines the basic domain of all UEL exploitation forms and identifies the formal and the...
Amato, Ernesto; Italiano, Antonio; Baldari, Sergio
2014-01-01
We developed a general model for the calculation of absorbed fractions in ellipsoidal volumes of soft tissue uniformly filled with alpha, beta and gamma emitting radionuclides. The approach exploited Monte Carlo simulations with the Geant4 code to determine absorbed fractions in ellipsoids characterized by a wide range of dimensions and ellipticities, for monoenergetic emissions of each radiation type. The so-obtained absorbed fractions were put in an analytical relationship with the 'general...
Total exploitation of an ornamental granite quarry
Directory of Open Access Journals (Sweden)
Taboada, J.
2005-09-01
Full Text Available In this paper we propose a methodology to estimate the recovery percentage for each of the products which can be obtained from the exploitation of an ornamental granite quarry: block, semiblock, masonry-transverse stone, and the smaller materials that can be used to obtain construction aggregates. This methodology ensures that quarry exploitation is exhaustive, thereby minimising the production of spoils and the consequent negative impact on the environment. The analysis is based on a detailed and exhaustive compilation of discontinuity data from the research fronts, which are then interpreted statistically and projected over the three weakness planes that are a particular feature of ornamental granite deposits. Using this information, and bearing in mind the minimum commercially viable sizes for each kind of granite, the corresponding recovery rates are calculated for each material in each plane. The results are then integrated using spatial techniques, and the result is an evaluation of quarry contents with a view to total exploitation. This methodology was applied to a quarry in the opening phase in order to carry out an a priori assessment of the economic feasibility of the quarry.
En este trabajo se propone una metodología para estimar el porcentaje de recuperación de cada uno de los productos que se pueden obtener en la explotación de una cantera de granito ornamental: bloque, semibloque, manpostería y per piaños, y material restante destinado a la obtención de áridos. De esta manera se logra un aprovechamiento integral de la cantera, evitándose la generación de estériles y el subsiguiente impacto ambiental producido por éstos. La metodología de análisis se basa en la recopilación detallada y exhaustiva de datos de discontinuidades en los frentes de investigación, que se interpretan estadísticamente y se proyectan sobre los tres planos de debilidad propios del granito ornamental. Con esta información, y las
Study of the AC machines winding having fractional q
Bespalov, V. Y.; Sidorov, A. O.
2018-02-01
The winding schemes with a fractional numbers of slots per pole and phase q have been known and used for a long time. However, in the literature on the low-noise machines design there are not recommended to use. Nevertheless, fractional q windings have been realized in many applications of special AC electrical machines, allowing to improve their performance, including vibroacoustic one. This paper deals with harmonic analysis of windings having integer and fractional q in permanent magnet synchronous motors, a comparison of their characteristics is performed, frequencies of subharmonics are revealed. Optimal winding pitch design is found giving reduce the amplitudes of subharmonics. Distribution factors for subharmonics, fractional and high-order harmonics are calculated, results analysis is represented, allowing for giving recommendations how to calculate distribution factors for different harmonics when q is fractional.
Fractional-Order Control of Pneumatic Position Servosystems
Directory of Open Access Journals (Sweden)
Cao Junyi
2011-01-01
Full Text Available A fractional-order control strategy for pneumatic position servosystem is presented in this paper. The idea of the fractional calculus application to control theory was introduced in many works, and its advantages were proved. However, the realization of fractional-order controllers for pneumatic position servosystems has not been investigated. Based on the relationship between the pressure in cylinder and the rate of mass flow into the cylinder, the dynamic model of pneumatic position servo system is established. The fractional-order controller for pneumatic position servo and its implementation in industrial computer is designed. The experiments with fractional-order controller are carried out under various conditions, which include sine position signal with different frequency and amplitude, step position signal, and variety inertial load. The results show the effectiveness of the proposed scheme and verify their fine control performance for pneumatic position servo system.
Fractional Delayer Utilizing Hermite Interpolation with Caratheodory Representation
Directory of Open Access Journals (Sweden)
Qiang DU
2018-04-01
Full Text Available Fractional delay is indispensable for many sorts of circuits and signal processing applications. Fractional delay filter (FDF utilizing Hermite interpolation with an analog differentiator is a straightforward way to delay discrete signals. This method has a low time-domain error, but a complicated sampling module than the Shannon sampling scheme. A simplified scheme, which is based on Shannon sampling and utilizing Hermite interpolation with a digital differentiator, will lead a much higher time-domain error when the signal frequency approaches the Nyquist rate. In this letter, we propose a novel fractional delayer utilizing Hermite interpolation with Caratheodory representation. The samples of differential signal are obtained by Caratheodory representation from the samples of the original signal only. So, only one sampler is needed and the sampling module is simple. Simulation results for four types of signals demonstrate that the proposed method has significantly higher interpolation accuracy than Hermite interpolation with digital differentiator.
Algebraic quantization, good operators and fractional quantum numbers
International Nuclear Information System (INIS)
Aldaya, V.; Calixto, M.; Guerrero, J.
1996-01-01
The problems arising when quantizing systems with periodic boundary conditions are analysed, in an algebraic (group-) quantization scheme, and the failure of the Ehrenfest theorem is clarified in terms of the already defined notion of good (and bad) operators. The analysis of constrained Heisenberg-Weyl groups according to this quantization scheme reveals the possibility for quantum operators without classical analogue and for new quantum (fractional) numbers extending those allowed for Chern classes in traditional Geometric Quantization. This study is illustrated with the examples of the free particle on the circumference and the charged particle in a homogeneous magnetic field on the torus, both examples featuring anomalous operators, non-equivalent quantization and the latter, fractional quantum numbers. These provide the rationale behind flux quantization in superconducting rings and Fractional Quantum Hall Effect, respectively. (orig.)
Environmental effects of geothermal energy exploitation
Energy Technology Data Exchange (ETDEWEB)
Nakamura, H [Japan Metals and Chemicals Co., Ltd., Japan
1975-01-01
The environmental effects of geothermal power generation which cause air and water pollution and destruction of natural areas are reviewed. The production of steam and hot water affect existing hot springs sources and can cause ground subsidence. Harmful gas can be released onto the atmosphere from fumarolic gas and hot springs. Hydrothermal geothermal fields occasionally contain harmful substances such as arsenic in the hot water. Serious environmental effects can result from geothermal exploitation activities such as the felling of trees for road construction, well drilling, and plant construction. Once geothermal power generation has begun, the release of H/sub 2/S into the atmosphere and the reinjection of hot water are conducted continuously and sufficient countermeasures can be taken. One problem is the effects of plant construction and operation on natural parks. It is important to reach a compromise between development and protection of natural senic areas. Two figures, two tables, and 13 references are provided.
CHARACTERISTICS OF HYDROCARBON EXPLOITATION IN ARCTIC CIRCLE
Directory of Open Access Journals (Sweden)
Vanja Lež
2013-12-01
Full Text Available The existence of large quantities of hydrocarbons is supposed within the Arctic Circle. Assumed quantities are 25% of the total undiscovered hydrocarbon reserves on Earth, mostly natural gas. Over 500 major and minor gas accumulations within the Arctic Circle were discovered so far, but apart from Snøhvit gas field, there is no commercial exploitation of natural gas from these fields. Arctic gas projects are complicated, technically hard to accomplish, and pose a great threat to the return of investment, safety of people and equipment and for the ecosystem. Russia is a country that is closest to the realization of the Arctic gas projects that are based on the giant gas fields. The most extreme weather conditions in the seas around Greenland are the reason why this Arctic region is the least explored and furthest from the realization of any gas project (the paper is published in Croatian .
Protocol to Exploit Waiting Resources for UASNs
Directory of Open Access Journals (Sweden)
Li-Ling Hung
2016-03-01
Full Text Available The transmission speed of acoustic waves in water is much slower than that of radio waves in terrestrial wireless sensor networks. Thus, the propagation delay in underwater acoustic sensor networks (UASN is much greater. Longer propagation delay leads to complicated communication and collision problems. To solve collision problems, some studies have proposed waiting mechanisms; however, long waiting mechanisms result in low bandwidth utilization. To improve throughput, this study proposes a slotted medium access control protocol to enhance bandwidth utilization in UASNs. The proposed mechanism increases communication by exploiting temporal and spatial resources that are typically idle in order to protect communication against interference. By reducing wait time, network performance and energy consumption can be improved. A performance evaluation demonstrates that when the data packets are large or sensor deployment is dense, the energy consumption of proposed protocol is less than that of existing protocols as well as the throughput is higher than that of existing protocols.
Exploitation of heterogeneous resources for ATLAS Computing
Chudoba, Jiri; The ATLAS collaboration
2018-01-01
LHC experiments require significant computational resources for Monte Carlo simulations and real data processing and the ATLAS experiment is not an exception. In 2017, ATLAS exploited steadily almost 3M HS06 units, which corresponds to about 300 000 standard CPU cores. The total disk and tape capacity managed by the Rucio data management system exceeded 350 PB. Resources are provided mostly by Grid computing centers distributed in geographically separated locations and connected by the Grid middleware. The ATLAS collaboration developed several systems to manage computational jobs, data files and network transfers. ATLAS solutions for job and data management (PanDA and Rucio) were generalized and now are used also by other collaborations. More components are needed to include new resources such as private and public clouds, volunteers' desktop computers and primarily supercomputers in major HPC centers. Workflows and data flows significantly differ for these less traditional resources and extensive software re...
Geometric saliency to characterize radar exploitation performance
Nolan, Adam; Keserich, Brad; Lingg, Andrew; Goley, Steve
2014-06-01
Based on the fundamental scattering mechanisms of facetized computer-aided design (CAD) models, we are able to define expected contributions (EC) to the radar signature. The net result of this analysis is the prediction of the salient aspects and contributing vehicle morphology based on the aspect. Although this approach does not provide the fidelity of an asymptotic electromagnetic (EM) simulation, it does provide very fast estimates of the unique scattering that can be consumed by a signature exploitation algorithm. The speed of this approach is particularly relevant when considering the high dimensionality of target configuration variability due to articulating parts which are computationally burdensome to predict. The key scattering phenomena considered in this work are the specular response from a single bounce interaction with surfaces and dihedral response formed between the ground plane and vehicle. Results of this analysis are demonstrated for a set of civilian target models.
Exploitation and use of coal field gas
Energy Technology Data Exchange (ETDEWEB)
Wang, K; Li, Z; Sun, Q
1982-04-25
There are slightly more than 440 mine shafts in the world from which gas is pumped at the same time coal is being mined, the volume pumped being 3.125 billion cubic meters. All the countries of the world today widely use gas as a fuel and as a raw material for the chemical industry. In China 40 percent of the total number of mine shafts are high gas mine shafts. In China, gas is used largely as fuel by the people, to fire boilers, to make formaldehyde, and to make carbon ink. Prospects are good for the exploitation of mine shaft gas that is produced in association with coal. Mine shaft gas is a top quality energy source with an extraction life that is longer than coals. (DP)
Summary of radiation protection in exploitation
International Nuclear Information System (INIS)
Garcier, Yves; Guers, Rene; Bidard, Francoise; Colson, Philippe; Gonin, Michele; Delabre, Herve; Hemidy, Pierre-Yves; Corgnet, Bruno; Perrin, Marie-Claire; Phan Hoang, Long; Abela, Gonzague; Crepieux, Virginie; Guyot, Pierre; Haranger, Didier; Warembourg, Philippe
2004-01-01
This document proposes a large and detailed overview of notions and practices regarding radiation protection in relationship with an NPP exploitation framework. It presents the main notions: matter structure, radioactivity, interactions between matter and radiations, types of ionizing radiation, magnitudes and measurement units, exposure modes, main principles of radiation protection, means of protection against internal and external exposures. The second part proposes an overview of the origin of radiological risks in a nuclear power plant. This origin can be found in fission products, activation products, actinides, designed protections, or circuit contaminations. These radiological risks are more precisely identified and described in terms of detection and prevention (internal exposure risk, contamination risk, iodine-related risk, alpha radiation-related risk, access to the reactor building). The next part addresses the medical and radiological follow-up of exposed workers by a special medical control, by an individual exposure control, by a specific control of female personnel, and by attention to exceptional exposures. Measurement means are presented (detection principles, installation continuous control, workspaces control, personnel contamination control, follow-up of individual dose) as well as collective and individual protection means. The management of radiation protection is addressed through a presentation of decision and management structures for radiation protection, and of EDF objectives and ambitions in this domain. The organization of radiation protection during exploitation is described: responsibilities for radiation protection in a nuclear power station, requirements for workers, preparation of interventions in controlled zone, work execution in controlled zone, zone controls and radiological cleanness of installations. The two last chapters address issues and practices of radiation protection in the case of deconstruction or dismantling, and
Multiuser switched diversity scheduling schemes
Shaqfeh, Mohammad; Alnuweiri, Hussein M.; Alouini, Mohamed-Slim
2012-01-01
Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.
Nonlinear secret image sharing scheme.
Shin, Sang-Ho; Lee, Gil-Je; Yoo, Kee-Young
2014-01-01
Over the past decade, most of secret image sharing schemes have been proposed by using Shamir's technique. It is based on a linear combination polynomial arithmetic. Although Shamir's technique based secret image sharing schemes are efficient and scalable for various environments, there exists a security threat such as Tompa-Woll attack. Renvall and Ding proposed a new secret sharing technique based on nonlinear combination polynomial arithmetic in order to solve this threat. It is hard to apply to the secret image sharing. In this paper, we propose a (t, n)-threshold nonlinear secret image sharing scheme with steganography concept. In order to achieve a suitable and secure secret image sharing scheme, we adapt a modified LSB embedding technique with XOR Boolean algebra operation, define a new variable m, and change a range of prime p in sharing procedure. In order to evaluate efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB) and 1.74t⌈log2 m⌉ bit-per-pixel (bpp), respectively.
Multiuser switched diversity scheduling schemes
Shaqfeh, Mohammad
2012-09-01
Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions. © 2012 IEEE.
FRACTIONS: CONCEPTUAL AND DIDACTIC ASPECTS
Sead Rešić; Ismet Botonjić; Maid Omerović
2016-01-01
Fractions represent the manner of writing parts of whole numbers (integers). Rules for operations with fractions differ from rules for operations with integers. Students face difficulties in understanding fractions, especially operations with fractions. These difficulties are well known in didactics of Mathematics throughout the world and there is a lot of research regarding problems in learning about fractions. Methods for facilitating understanding fractions have been discovered...
Biswas, Karabi; Caponetto, Riccardo; Mendes Lopes, António; Tenreiro Machado, José António
2017-01-01
This book focuses on two specific areas related to fractional order systems – the realization of physical devices characterized by non-integer order impedance, usually called fractional-order elements (FOEs); and the characterization of vegetable tissues via electrical impedance spectroscopy (EIS) – and provides readers with new tools for designing new types of integrated circuits. The majority of the book addresses FOEs. The interest in these topics is related to the need to produce “analogue” electronic devices characterized by non-integer order impedance, and to the characterization of natural phenomena, which are systems with memory or aftereffects and for which the fractional-order calculus tool is the ideal choice for analysis. FOEs represent the building blocks for designing and realizing analogue integrated electronic circuits, which the authors believe hold the potential for a wealth of mass-market applications. The freedom to choose either an integer- or non-integer-order analogue integrator...
The Quasi-Electron Shell Structure of the Fractional Quantum Hall Effect
Haxton, Wick; Haxton, Daniel
2015-04-01
The fractional quantum Hall effect (FQHE) formulated on a sphere resembles the nuclear shell model, with the desired translationally invariant states having total angular momentum zero. This property was exploited by Ginocchio and Haxton (GH) to derive a new set of scalar operators and a first-Landau-level representation of the full set of hierarchy states (fillings 1/3, 2/5, 3/7, etc.), with overlaps identical to those of Jain, who used unphysical higher Landau levels excitations followed by numerical projection. We demonstrate that the GH operators produce an appealing description of the FQHE as shells filled by non-interacting quasi-electrons, or composite fermions. These are explicitly constructed, and their planar forms are also found. The evolution of the shells and their quasi-electrons is quite unusual. The connections with electron correlations and Laughlin's variational arguments are described. We discuss how ``new states'' found experimentally at fillings such as 4/11 and 5/13 fit into this scheme. Work support in part by the US DOE Offices of Nuclear Physics and Basic Energy Sciences.
Screening for Proteolytic Activities in Snake Venom by Means of a Multiplexing ESI-MS Assay Scheme
Liesener, A.; Perchuc, Anna-Maria; Schöni, Reto; Wilmer, Marianne; Karst, U.
2005-01-01
A multiplexed mass spectrometry based assay scheme for the simultaneous determination of five different substrate/product pairs was developed as a tool for screening of proteolytic activities in snake venom fractions from Bothrops moojeni. The assay scheme was employed in the functional
A positive and entropy-satisfying finite volume scheme for the Baer–Nunziato model
Energy Technology Data Exchange (ETDEWEB)
Coquel, Frédéric, E-mail: frederic.coquel@cmap.polytechnique.fr [CMAP, École Polytechnique CNRS, UMR 7641, Route de Saclay, F-91128 Palaiseau cedex (France); Hérard, Jean-Marc, E-mail: jean-marc.herard@edf.fr [EDF-R& D, Département MFEE, 6 Quai Watier, F-78401 Chatou Cedex (France); Saleh, Khaled, E-mail: saleh@math.univ-lyon1.fr [Université de Lyon, CNRS UMR 5208, Université Lyon 1, Institut Camille Jordan, 43 bd 11 novembre 1918, F-69622 Villeurbanne cedex (France)
2017-02-01
We present a relaxation scheme for approximating the entropy dissipating weak solutions of the Baer–Nunziato two-phase flow model. This relaxation scheme is straightforwardly obtained as an extension of the relaxation scheme designed in for the isentropic Baer–Nunziato model and consequently inherits its main properties. To our knowledge, this is the only existing scheme for which the approximated phase fractions, phase densities and phase internal energies are proven to remain positive without any restrictive condition other than a classical fully computable CFL condition. For ideal gas and stiffened gas equations of state, real values of the phasic speeds of sound are also proven to be maintained by the numerical scheme. It is also the only scheme for which a discrete entropy inequality is proven, under a CFL condition derived from the natural sub-characteristic condition associated with the relaxation approximation. This last property, which ensures the non-linear stability of the numerical method, is satisfied for any admissible equation of state. We provide a numerical study for the convergence of the approximate solutions towards some exact Riemann solutions. The numerical simulations show that the relaxation scheme compares well with two of the most popular existing schemes available for the Baer–Nunziato model, namely Schwendeman–Wahle–Kapila's Godunov-type scheme and Tokareva–Toro's HLLC scheme . The relaxation scheme also shows a higher precision and a lower computational cost (for comparable accuracy) than a standard numerical scheme used in the nuclear industry, namely Rusanov's scheme. Finally, we assess the good behavior of the scheme when approximating vanishing phase solutions.
A positive and entropy-satisfying finite volume scheme for the Baer-Nunziato model
Coquel, Frédéric; Hérard, Jean-Marc; Saleh, Khaled
2017-02-01
We present a relaxation scheme for approximating the entropy dissipating weak solutions of the Baer-Nunziato two-phase flow model. This relaxation scheme is straightforwardly obtained as an extension of the relaxation scheme designed in [16] for the isentropic Baer-Nunziato model and consequently inherits its main properties. To our knowledge, this is the only existing scheme for which the approximated phase fractions, phase densities and phase internal energies are proven to remain positive without any restrictive condition other than a classical fully computable CFL condition. For ideal gas and stiffened gas equations of state, real values of the phasic speeds of sound are also proven to be maintained by the numerical scheme. It is also the only scheme for which a discrete entropy inequality is proven, under a CFL condition derived from the natural sub-characteristic condition associated with the relaxation approximation. This last property, which ensures the non-linear stability of the numerical method, is satisfied for any admissible equation of state. We provide a numerical study for the convergence of the approximate solutions towards some exact Riemann solutions. The numerical simulations show that the relaxation scheme compares well with two of the most popular existing schemes available for the Baer-Nunziato model, namely Schwendeman-Wahle-Kapila's Godunov-type scheme [39] and Tokareva-Toro's HLLC scheme [44]. The relaxation scheme also shows a higher precision and a lower computational cost (for comparable accuracy) than a standard numerical scheme used in the nuclear industry, namely Rusanov's scheme. Finally, we assess the good behavior of the scheme when approximating vanishing phase solutions.
Electrical Injection Schemes for Nanolasers
DEFF Research Database (Denmark)
Lupi, Alexandra; Chung, Il-Sug; Yvind, Kresten
2014-01-01
Three electrical injection schemes based on recently demonstrated electrically pumped photonic crystal nanolasers have been numerically investigated: 1) a vertical p-i-n junction through a post structure; 2) a lateral p-i-n junction with a homostructure; and 3) a lateral p-i-n junction....... For this analysis, the properties of different schemes, i.e., electrical resistance, threshold voltage, threshold current, and internal efficiency as energy requirements for optical interconnects are compared and the physics behind the differences is discussed....
Signal multiplexing scheme for LINAC
International Nuclear Information System (INIS)
Sujo, C.I.; Mohan, Shyam; Joshi, Gopal; Singh, S.K.; Karande, Jitendra
2004-01-01
For the proper operation of the LINAC some signals, RF (radio frequency) as well as LF (low frequency) have to be available at the Master Control Station (MCS). These signals are needed to control, calibrate and characterize the RF fields in the resonators. This can be achieved by proper multiplexing of various signals locally and then routing the selected signals to the MCS. A multiplexing scheme has been designed and implemented, which will allow the signals from the selected cavity to the MCS. High isolation between channels and low insertion loss for a given signal are important issues while selecting the multiplexing scheme. (author)
Capacity-achieving CPM schemes
Perotti, Alberto; Tarable, Alberto; Benedetto, Sergio; Montorsi, Guido
2008-01-01
The pragmatic approach to coded continuous-phase modulation (CPM) is proposed as a capacity-achieving low-complexity alternative to the serially-concatenated CPM (SC-CPM) coding scheme. In this paper, we first perform a selection of the best spectrally-efficient CPM modulations to be embedded into SC-CPM schemes. Then, we consider the pragmatic capacity (a.k.a. BICM capacity) of CPM modulations and optimize it through a careful design of the mapping between input bits and CPM waveforms. The s...
Fractional neutron point kinetics equations for nuclear reactor dynamics
International Nuclear Information System (INIS)
Espinosa-Paredes, Gilberto; Polo-Labarrios, Marco-A.; Espinosa-Martinez, Erick-G.; Valle-Gallegos, Edmundo del
2011-01-01
The fractional point-neutron kinetics model for the dynamic behavior in a nuclear reactor is derived and analyzed in this paper. The fractional model retains the main dynamic characteristics of the neutron motion in which the relaxation time associated with a rapid variation in the neutron flux contains a fractional order, acting as exponent of the relaxation time, to obtain the best representation of a nuclear reactor dynamics. The physical interpretation of the fractional order is related with non-Fickian effects from the neutron diffusion equation point of view. The numerical approximation to the solution of the fractional neutron point kinetics model, which can be represented as a multi-term high-order linear fractional differential equation, is calculated by reducing the problem to a system of ordinary and fractional differential equations. The numerical stability of the fractional scheme is investigated in this work. Results for neutron dynamic behavior for both positive and negative reactivity and for different values of fractional order are shown and compared with the classic neutron point kinetic equations. Additionally, a related review with the neutron point kinetics equations is presented, which encompasses papers written in English about this research topic (as well as some books and technical reports) published since 1940 up to 2010.
Fractional gradient and its application to the fractional advection equation
D'Ovidio, M.; Garra, R.
2013-01-01
In this paper we provide a definition of fractional gradient operators, related to directional derivatives. We develop a fractional vector calculus, providing a probabilistic interpretation and mathematical tools to treat multidimensional fractional differential equations. A first application is discussed in relation to the d-dimensional fractional advection-dispersion equation. We also study the connection with multidimensional L\\'evy processes.
Deficiencies of the cryptography based on multiple-parameter fractional Fourier transform.
Ran, Qiwen; Zhang, Haiying; Zhang, Jin; Tan, Liying; Ma, Jing
2009-06-01
Methods of image encryption based on fractional Fourier transform have an incipient flaw in security. We show that the schemes have the deficiency that one group of encryption keys has many groups of keys to decrypt the encrypted image correctly for several reasons. In some schemes, many factors result in the deficiencies, such as the encryption scheme based on multiple-parameter fractional Fourier transform [Opt. Lett.33, 581 (2008)]. A modified method is proposed to avoid all the deficiencies. Security and reliability are greatly improved without increasing the complexity of the encryption process. (c) 2009 Optical Society of America.
Vinogradova, Natalya; Blaine, Larry
2013-01-01
Almost everyone loves chocolate. However, the same cannot be said about fractions, which are loved by markedly fewer. Middle school students tend to view them with wary respect, but little affection. The authors attempt to sweeten the subject by describing a type of game involving division of chocolate bars. The activity they describe provides a…
Fermion Number Fractionization
Indian Academy of Sciences (India)
Srimath
1 . In tro d u ctio n. T he N obel P rize in C hem istry for the year 2000 w as aw arded to A lan J H ... soliton, the ground state of the ferm ion-soliton system can have ..... probability density,in a heuristic w ay that a fractional ferm ion num ber m ay ...
Momentum fractionation on superstrata
International Nuclear Information System (INIS)
Bena, Iosif; Martinec, Emil; Turton, David; Warner, Nicholas P.
2016-01-01
Superstrata are bound states in string theory that carry D1, D5, and momentum charges, and whose supergravity descriptions are parameterized by arbitrary functions of (at least) two variables. In the D1-D5 CFT, typical three-charge states reside in high-degree twisted sectors, and their momentum charge is carried by modes that individually have fractional momentum. Understanding this momentum fractionation holographically is crucial for understanding typical black-hole microstates in this system. We use solution-generating techniques to add momentum to a multi-wound supertube and thereby construct the first examples of asymptotically-flat superstrata. The resulting supergravity solutions are horizonless and smooth up to well-understood orbifold singularities. Upon taking the AdS_3 decoupling limit, our solutions are dual to CFT states with momentum fractionation. We give a precise proposal for these dual CFT states. Our construction establishes the very nontrivial fact that large classes of CFT states with momentum fractionation can be realized in the bulk as smooth horizonless supergravity solutions.
Fractional Differential Equation
Directory of Open Access Journals (Sweden)
Moustafa El-Shahed
2007-01-01
where 2<α<3 is a real number and D0+α is the standard Riemann-Liouville fractional derivative. Our analysis relies on Krasnoselskiis fixed point theorem of cone preserving operators. An example is also given to illustrate the main results.
Vapor liquid fraction determination
International Nuclear Information System (INIS)
1980-01-01
This invention describes a method of measuring liquid and vapor fractions in a non-homogeneous fluid flowing through an elongate conduit, such as may be required with boiling water, non-boiling turbulent flows, fluidized bed experiments, water-gas mixing analysis, and nuclear plant cooling. (UK)
Brewing with fractionated barley
Donkelaar, van L.H.G.
2016-01-01
Brewing with fractionated barley
Beer is a globally consumed beverage, which is produced from malted barley, water, hops and yeast. In recent years, the use of unmalted barley and exogenous enzymes have become more popular because they enable simpler processing and reduced environmental
Fractionation and rectification apparatus
Energy Technology Data Exchange (ETDEWEB)
Sauerwald, A
1932-05-25
Fractionation and rectifying apparatus with a distillation vessel and a stirring tube, drainage tubes leading from its coils to a central collecting tube, the drainage tubes being somewhat parallel and attached to the outer half of the stirring tube and partly on the inner half of the central collecting tube, whereby distillation and rectification can be effected in a single apparatus.
International Nuclear Information System (INIS)
Innes, W.; Klein, S.; Perl, M.; Price, J.C.
1982-06-01
A device to search for fractional charge in matter is described. The sample is coupled to a low-noise amplifier by a periodically varying capacitor and the resulting signal is synchronously detected. The varying capacitor is constructed as a rapidly spinning wheel. Samples of any material in volumes of up to 0.05 ml may be searched in less than an hour
Proba-V Mission Exploitation Platform
Goor, E.
2017-12-01
VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (an EC Copernicus contributing mission) EO-data archive, the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers (e.g. the EC Copernicus Global Land Service) and end-users. The analysis of time series of data (PB range) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. New features are still developed, but the platform is yet fully operational since November 2016 and offers A time series viewer (browser web client and API), showing the evolution of Proba-V bands and derived vegetation parameters for any country, region, pixel or polygon defined by the user. Full-resolution viewing services for the complete data archive. On-demand processing chains on a powerfull Hadoop/Spark backend. Virtual Machines can be requested by users with access to the complete data archive mentioned above and pre-configured tools to work with this data, e.g. various toolboxes and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. Jupyter Notebooks is available with some examples python and R projects worked out to show the potential of the data. Today the platform is already used by several international third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. From the Proba-V MEP, access to other data sources such as Sentinel-2 and landsat data is also addressed. Selected components of the MEP are also deployed on public cloud infrastructures in various R&D projects. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to
Mission Exploitation Platform PROBA-V
Goor, Erwin
2016-04-01
VITO and partners developed an end-to-end solution to drastically improve the exploitation of the PROBA-V EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data. From November 2015 an operational Mission Exploitation Platform (MEP) PROBA-V, as an ESA pathfinder project, will be gradually deployed at the VITO data center with direct access to the complete data archive. Several applications will be released to the users, e.g. - A time series viewer, showing the evolution of PROBA-V bands and derived vegetation parameters for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains e.g. for the calculation of N-daily composites. - A Virtual Machine will be provided with access to the data archive and tools to work with this data, e.g. various toolboxes and support for R and Python. After an initial release in January 2016, a research platform will gradually be deployed allowing users to design, debug and test applications on the platform. From the MEP PROBA-V, access to Sentinel-2 and landsat data will be addressed as well, e.g. to support the Cal/Val activities of the users. Users can make use of powerful Web based tools and can self-manage virtual machines to perform their work on the infrastructure at VITO with access to the complete data archive. To realise this, private cloud technology (openStack) is used and a distributed processing environment is built based on Hadoop. The Hadoop ecosystem offers a lot of technologies (Spark, Yarn, Accumulo, etc.) which we integrate with several open-source components. The impact of this MEP on the user community will be high and will completely change the way of working with the data and hence open the large time series to a larger
DNA evidence of bowhead whale exploitation by Greenlandic Paleo-Inuit 4,000 years ago
Seersholm, Frederik Valeur; Pedersen, Mikkel Winther; Søe, Martin Jensen; Shokry, Hussein; Mak, Sarah Siu Tze; Ruter, Anthony; Raghavan, Maanasa; Fitzhugh, William; Kjær, Kurt H.; Willerslev, Eske; Meldgaard, Morten; Kapel, Christian M. O.; Hansen, Anders Johannes
2016-11-01
The demographic history of Greenland is characterized by recurrent migrations and extinctions since the first humans arrived 4,500 years ago. Our current understanding of these extinct cultures relies primarily on preserved fossils found in their archaeological deposits, which hold valuable information on past subsistence practices. However, some exploited taxa, though economically important, comprise only a small fraction of these sub-fossil assemblages. Here we reconstruct a comprehensive record of past subsistence economies in Greenland by sequencing ancient DNA from four well-described midden deposits. Our results confirm that the species found in the fossil record, like harp seal and ringed seal, were a vital part of Inuit subsistence, but also add a new dimension with evidence that caribou, walrus and whale species played a more prominent role for the survival of Paleo-Inuit cultures than previously reported. Most notably, we report evidence of bowhead whale exploitation by the Saqqaq culture 4,000 years ago.
Fractionation and protraction for radiotherapy of prostate carcinoma
International Nuclear Information System (INIS)
Brenner, David J.; Hall, Eric J.
1999-01-01
Purpose: To investigate whether current fractionation and brachytherapy protraction schemes for the treatment of prostatic cancer with radiation are optimal, or could be improved. Methods and Materials: We analyzed two mature data sets on radiotherapeutic tumor control for prostate cancer, one using EBRT and the other permanent seed implants, to extract the sensitivity to changes in fractionation of prostatic tumors. The standard linear-quadratic model was used for the analysis. Results: Prostatic cancers appear significantly more sensitive to changes in fractionation than most other cancers. The estimated α/β value is 1.5 Gy [0.8, 2.2]. This result is not too surprising as there is a documented relationship between cellular proliferative status and sensitivity to changes in fractionation, and prostatic tumors contain exceptionally low proportions of proliferating cells. Conclusions: High dose rate (HDR) brachytherapy would be a highly appropriate modality for treating prostate cancer. Appropriately designed HDR brachytherapy regimens would be expected to be as efficacious as low dose rate, but with added advantages of logistic convenience and more reliable dose distributions. Similarly, external beam treatments for prostate cancer can be designed using larger doses per fraction; appropriately designed hypofractionation schemes would be expected to maintain current levels of tumor control and late sequelae, but with reduced acute morbidity, together with the logistic and financial advantages of fewer numbers of fractions
International Nuclear Information System (INIS)
Ardisson, Claire; Ardisson, Gerard.
1976-01-01
A 165 Ho level scheme was constructed which led to the interpretation of sixty γ rays belonging to the decay of 165 Dy. A new 702.9keV level was identified to be the 5/2 - member of the 1/2 ) 7541{ Nilsson orbit. )] [fr
Homogenization scheme for acoustic metamaterials
Yang, Min; Ma, Guancong; Wu, Ying; Yang, Zhiyu; Sheng, Ping
2014-01-01
the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost
Homogenization scheme for acoustic metamaterials
Yang, Min
2014-02-26
We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial\\'s structural unit cell with a piece of homogenized material. From the Green\\'s theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme\\'s validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.
New practicable Siberian Snake schemes
International Nuclear Information System (INIS)
Steffen, K.
1983-07-01
Siberian Snake schemes can be inserted in ring accelerators for making the spin tune almost independent of energy. Two such schemes are here suggested which lend particularly well to practical application over a wide energy range. Being composed of horizontal and vertical bending magnets, the proposed snakes are designed to have a small maximum beam excursion in one plane. By applying in this plane a bending correction that varies with energy, they can be operated at fixed geometry in the other plane where most of the bending occurs, thus avoiding complicated magnet motion or excessively large magnet apertures that would otherwise be needed for large energy variations. The first of the proposed schemes employs a pair of standard-type Siberian Snakes, i.e. of the usual 1st and 2nd kind which rotate the spin about the longitudinal and the transverse horizontal axis, respectively. The second scheme employs a pair of novel-type snakes which rotate the spin about either one of the horizontal axes that are at 45 0 to the beam direction. In obvious reference to these axes, they are called left-pointed and right-pointed snakes. (orig.)
Nonlinear Secret Image Sharing Scheme
Directory of Open Access Journals (Sweden)
Sang-Ho Shin
2014-01-01
efficiency and security of proposed scheme, we use the embedding capacity and PSNR. As a result of it, average value of PSNR and embedding capacity are 44.78 (dB and 1.74tlog2m bit-per-pixel (bpp, respectively.
Relationship between exploitation, oscillation, MSY and extinction.
Ghosh, Bapan; Kar, T K; Legovic, T
2014-10-01
We give answers to two important problems arising in current fisheries: (i) how maximum sustainable yield (MSY) policy is influenced by the initial population level, and (ii) how harvesting, oscillation and MSY are related to each other in prey-predator systems. To examine the impact of initial population on exploitation, we analyze a single species model with strong Allee effect. It is found that even when the MSY exists, the dynamic solution may not converge to the equilibrium stock if the initial population level is higher but near the critical threshold level. In a prey-predator system with Allee effect in the prey species, the initial population does not have such important impact neither on MSY nor on maximum sustainable total yield (MSTY). However, harvesting the top predator may cause extinction of all species if odd number of trophic levels exist in the ecosystem. With regard to the second problem, we study two prey-predator models and establish that increasing harvesting effort either on prey, predator or both prey and predator destroys previously existing oscillation. Moreover, equilibrium stock both at MSY and MSTY level is stable. We also discuss the validity of found results to other prey-predator systems. Copyright © 2014 Elsevier Inc. All rights reserved.
Exploiting Virtualization and Cloud Computing in ATLAS
International Nuclear Information System (INIS)
Harald Barreiro Megino, Fernando; Van der Ster, Daniel; Benjamin, Doug; De, Kaushik; Gable, Ian; Paterson, Michael; Taylor, Ryan; Hendrix, Val; Vitillo, Roberto A; Panitkin, Sergey; De Silva, Asoka; Walker, Rod
2012-01-01
The ATLAS Computing Model was designed around the concept of grid computing; since the start of data-taking, this model has proven very successful in the federated operation of more than one hundred Worldwide LHC Computing Grid (WLCG) sites for offline data distribution, storage, processing and analysis. However, new paradigms in computing, namely virtualization and cloud computing, present improved strategies for managing and provisioning IT resources that could allow ATLAS to more flexibly adapt and scale its storage and processing workloads on varied underlying resources. In particular, ATLAS is developing a “grid-of-clouds” infrastructure in order to utilize WLCG sites that make resources available via a cloud API. This work will present the current status of the Virtualization and Cloud Computing R and D project in ATLAS Distributed Computing. First, strategies for deploying PanDA queues on cloud sites will be discussed, including the introduction of a “cloud factory” for managing cloud VM instances. Next, performance results when running on virtualized/cloud resources at CERN LxCloud, StratusLab, and elsewhere will be presented. Finally, we will present the ATLAS strategies for exploiting cloud-based storage, including remote XROOTD access to input data, management of EC2-based files, and the deployment of cloud-resident LCG storage elements.
Exploiting intrinsic fluctuations to identify model parameters.
Zimmer, Christoph; Sahle, Sven; Pahle, Jürgen
2015-04-01
Parameterisation of kinetic models plays a central role in computational systems biology. Besides the lack of experimental data of high enough quality, some of the biggest challenges here are identification issues. Model parameters can be structurally non-identifiable because of functional relationships. Noise in measured data is usually considered to be a nuisance for parameter estimation. However, it turns out that intrinsic fluctuations in particle numbers can make parameters identifiable that were previously non-identifiable. The authors present a method to identify model parameters that are structurally non-identifiable in a deterministic framework. The method takes time course recordings of biochemical systems in steady state or transient state as input. Often a functional relationship between parameters presents itself by a one-dimensional manifold in parameter space containing parameter sets of optimal goodness. Although the system's behaviour cannot be distinguished on this manifold in a deterministic framework it might be distinguishable in a stochastic modelling framework. Their method exploits this by using an objective function that includes a measure for fluctuations in particle numbers. They show on three example models, immigration-death, gene expression and Epo-EpoReceptor interaction, that this resolves the non-identifiability even in the case of measurement noise with known amplitude. The method is applied to partially observed recordings of biochemical systems with measurement noise. It is simple to implement and it is usually very fast to compute. This optimisation can be realised in a classical or Bayesian fashion.
Fostering the Exploitation of Open Educational Resources
Directory of Open Access Journals (Sweden)
Thomas Richter
2014-07-01
Full Text Available The central concept behind Open Educational Resources (OER is opening up the access to educational resources for stakeholders who are not the usual target user group. This concept must be perceived as innovative because it describes a general economic and social paradigm shift: Education, which formerly was limited to a specific group of learners, now, is promoted as a public good. However, despite very good intentions, internationally agreed quality standards, and the availability of the required technological infrastructure, the critical threshold is not yet met. Due to several reasons, the usefulness of OER is often limited to the originally targeted context. Questions arise if the existing quality standards for Technology Enhanced Learning (TEL actually meet the specific requirements within the OER value chain, if the existing quality standards are applicable to OER in a meaningful way, and under which conditions related standards generally could support the exploitation of OER.We analyze quality standards for TEL and contrast the life cycle model of commercial learning resources against the life cycle model of OER. We investigate special demands on quality from the context of OER and, taking the former results into account, derive emergent quality criteria for OER. The paper concludes with recommendations for the design of OER and a future standard development.
Exploiting Genetic Interference for Antiviral Therapy.
Directory of Open Access Journals (Sweden)
Elizabeth J Tanner
2016-05-01
Full Text Available Rapidly evolving viruses are a major threat to human health. Such viruses are often highly pathogenic (e.g., influenza virus, HIV, Ebola virus and routinely circumvent therapeutic intervention through mutational escape. Error-prone genome replication generates heterogeneous viral populations that rapidly adapt to new selection pressures, leading to resistance that emerges with treatment. However, population heterogeneity bears a cost: when multiple viral variants replicate within a cell, they can potentially interfere with each other, lowering viral fitness. This genetic interference can be exploited for antiviral strategies, either by taking advantage of a virus's inherent genetic diversity or through generating de novo interference by engineering a competing genome. Here, we discuss two such antiviral strategies, dominant drug targeting and therapeutic interfering particles. Both strategies harness the power of genetic interference to surmount two particularly vexing obstacles-the evolution of drug resistance and targeting therapy to high-risk populations-both of which impede treatment in resource-poor settings.
Radiation protection in exploitation of uranium ores
International Nuclear Information System (INIS)
Pavlov, I.V.; Shalaev, I.L.
1976-01-01
The results are analyzed of the study of the radiation conditions in uranium mines, design and testing of protection means, improvement of methods and equipment for the dosimetric control in different countries since 1968 to 1975. There are outlined radiation hazards and their role in the formation of the radiation situation in mines, dispersive composition of aerosols of short-living daughter products of Rn(DPR) in the mine atmosphere. Among means of the radiation protection the following are dealt with: ventilation including the calculation of air requirements, design of ventilation systems, ventilation practices in working mines; lowering of the release of radon into the mine atmosphere by isolating non-exploited pits, application of gas-proof covers to cofferdams in faces of jointing zones, intensification of mining works in dangerous zones. Methods of air cleaning to remove Rn are suggested in brief. Apparatus are described for the individual control of the level of latent energy in the zone of miners' respiration: track dosimeters, thermoluminescent crystalls (TLC), photographic films, semiconductor systems and biophysical methods of the control for uranium mines. The efficient use of existing protection means provides the normal radiation situation in mines without significant additional investments
Accelerating Large Data Analysis By Exploiting Regularities
Moran, Patrick J.; Ellsworth, David
2003-01-01
We present techniques for discovering and exploiting regularity in large curvilinear data sets. The data can be based on a single mesh or a mesh composed of multiple submeshes (also known as zones). Multi-zone data are typical to Computational Fluid Dynamics (CFD) simulations. Regularities include axis-aligned rectilinear and cylindrical meshes as well as cases where one zone is equivalent to a rigid-body transformation of another. Our algorithms can also discover rigid-body motion of meshes in time-series data. Next, we describe a data model where we can utilize the results from the discovery process in order to accelerate large data visualizations. Where possible, we replace general curvilinear zones with rectilinear or cylindrical zones. In rigid-body motion cases we replace a time-series of meshes with a transformed mesh object where a reference mesh is dynamically transformed based on a given time value in order to satisfy geometry requests, on demand. The data model enables us to make these substitutions and dynamic transformations transparently with respect to the visualization algorithms. We present results with large data sets where we combine our mesh replacement and transformation techniques with out-of-core paging in order to achieve significant speed-ups in analysis.
zero day exploits and national readiness for cyber-warfare
African Journals Online (AJOL)
HOD
... and impact metrics [7]. Mobile device ... possible abuse of these assets, services rendered and the technology .... rate of industrialization and automation, creates an environment of .... schemes, web service security, data encryption schemes ...
Xing, Yanyuan; Yan, Yubin
2018-03-01
Gao et al. [11] (2014) introduced a numerical scheme to approximate the Caputo fractional derivative with the convergence rate O (k 3 - α), 0 equation is sufficiently smooth, Lv and Xu [20] (2016) proved by using energy method that the corresponding numerical method for solving time fractional partial differential equation has the convergence rate O (k 3 - α), 0 equation has low regularity and in this case the numerical method fails to have the convergence rate O (k 3 - α), 0 quadratic interpolation polynomials. Based on this scheme, we introduce a time discretization scheme to approximate the time fractional partial differential equation and show by using Laplace transform methods that the time discretization scheme has the convergence rate O (k 3 - α), 0 0 for smooth and nonsmooth data in both homogeneous and inhomogeneous cases. Numerical examples are given to show that the theoretical results are consistent with the numerical results.
-Dimensional Fractional Lagrange's Inversion Theorem
Directory of Open Access Journals (Sweden)
F. A. Abd El-Salam
2013-01-01
Full Text Available Using Riemann-Liouville fractional differential operator, a fractional extension of the Lagrange inversion theorem and related formulas are developed. The required basic definitions, lemmas, and theorems in the fractional calculus are presented. A fractional form of Lagrange's expansion for one implicitly defined independent variable is obtained. Then, a fractional version of Lagrange's expansion in more than one unknown function is generalized. For extending the treatment in higher dimensions, some relevant vectors and tensors definitions and notations are presented. A fractional Taylor expansion of a function of -dimensional polyadics is derived. A fractional -dimensional Lagrange inversion theorem is proved.
Gauge invariant fractional electromagnetic fields
International Nuclear Information System (INIS)
Lazo, Matheus Jatkoske
2011-01-01
Fractional derivatives and integrations of non-integers orders was introduced more than three centuries ago but only recently gained more attention due to its application on nonlocal phenomenas. In this context, several formulations of fractional electromagnetic fields was proposed, but all these theories suffer from the absence of an effective fractional vector calculus, and in general are non-causal or spatially asymmetric. In order to deal with these difficulties, we propose a spatially symmetric and causal gauge invariant fractional electromagnetic field from a Lagrangian formulation. From our fractional Maxwell's fields arose a definition for the fractional gradient, divergent and curl operators. -- Highlights: → We propose a fractional Lagrangian formulation for fractional Maxwell's fields. → We obtain gauge invariant fractional electromagnetic fields. → Our generalized fractional Maxwell's field is spatially symmetrical. → We discuss the non-causality of the theory.
Gauge invariant fractional electromagnetic fields
Energy Technology Data Exchange (ETDEWEB)
Lazo, Matheus Jatkoske, E-mail: matheuslazo@furg.br [Instituto de Matematica, Estatistica e Fisica - FURG, Rio Grande, RS (Brazil)
2011-09-26
Fractional derivatives and integrations of non-integers orders was introduced more than three centuries ago but only recently gained more attention due to its application on nonlocal phenomenas. In this context, several formulations of fractional electromagnetic fields was proposed, but all these theories suffer from the absence of an effective fractional vector calculus, and in general are non-causal or spatially asymmetric. In order to deal with these difficulties, we propose a spatially symmetric and causal gauge invariant fractional electromagnetic field from a Lagrangian formulation. From our fractional Maxwell's fields arose a definition for the fractional gradient, divergent and curl operators. -- Highlights: → We propose a fractional Lagrangian formulation for fractional Maxwell's fields. → We obtain gauge invariant fractional electromagnetic fields. → Our generalized fractional Maxwell's field is spatially symmetrical. → We discuss the non-causality of the theory.
On matrix fractional differential equations
Directory of Open Access Journals (Sweden)
Adem Kılıçman
2017-01-01
Full Text Available The aim of this article is to study the matrix fractional differential equations and to find the exact solution for system of matrix fractional differential equations in terms of Riemann–Liouville using Laplace transform method and convolution product to the Riemann–Liouville fractional of matrices. Also, we show the theorem of non-homogeneous matrix fractional partial differential equation with some illustrative examples to demonstrate the effectiveness of the new methodology. The main objective of this article is to discuss the Laplace transform method based on operational matrices of fractional derivatives for solving several kinds of linear fractional differential equations. Moreover, we present the operational matrices of fractional derivatives with Laplace transform in many applications of various engineering systems as control system. We present the analytical technique for solving fractional-order, multi-term fractional differential equation. In other words, we propose an efficient algorithm for solving fractional matrix equation.
Perturbation of Fractional Multi-Agent Systems in Cloud Entropy Computing
Directory of Open Access Journals (Sweden)
Rabha W. Ibrahim
2016-01-01
Full Text Available A perturbed multi-agent system is a scheme self-possessed of multiple networking agents within a location. This scheme can be used to discuss problems that are impossible or difficult for a specific agent to solve. Intelligence cloud entropy management systems involve functions, methods, procedural approaches, and algorithms. In this study, we introduce a new perturbed algorithm based on the fractional Poisson process. The discrete dynamics are suggested by using fractional entropy and fractional type Tsallis entropy. Moreover, we study the algorithm stability.
A Fully Discrete Galerkin Method for a Nonlinear Space-Fractional Diffusion Equation
Directory of Open Access Journals (Sweden)
Yunying Zheng
2011-01-01
Full Text Available The spatial transport process in fractal media is generally anomalous. The space-fractional advection-diffusion equation can be used to characterize such a process. In this paper, a fully discrete scheme is given for a type of nonlinear space-fractional anomalous advection-diffusion equation. In the spatial direction, we use the finite element method, and in the temporal direction, we use the modified Crank-Nicolson approximation. Here the fractional derivative indicates the Caputo derivative. The error estimate for the fully discrete scheme is derived. And the numerical examples are also included which are in line with the theoretical analysis.
A 3D Fractional-Order Chaotic System with Only One Stable Equilibrium and Controlling Chaos
Directory of Open Access Journals (Sweden)
Shiyun Shen
2017-01-01
Full Text Available One 3D fractional-order chaotic system with only one locally asymptotically stable equilibrium is reported. To verify the chaoticity, the maximum Lyapunov exponent (MAXLE with respect to the fractional-order and chaotic attractors are obtained by numerical calculation for this system. Furthermore, by linear scalar controller consisting of a single state variable, one control scheme for stabilization of the 3D fractional-order chaotic system is suggested. The numerical simulations show the feasibility of the control scheme.
A blind video watermarking scheme resistant to rotation and collusion attacks
Directory of Open Access Journals (Sweden)
Amlan Karmakar
2016-04-01
Full Text Available In this paper, Discrete Cosine Transform (DCT based blind video watermarking algorithm is proposed, which is perceptually invisible and robust against rotation and collusion attacks. To make the scheme resistant against rotation, watermark is embedded within the square blocks, placed on the middle position of every luminance channel. Then Zernike moments of those square blocks are calculated. The rotation invariance property of the Complex Zernike moments is exploited to predict the rotation angle of the video at the time of extraction of watermark bits. To make the scheme robust against collusion, design of the scheme is done in such a way that the embedding blocks will vary for the successive frames of the video. A Pseudo Random Number (PRN generator and a permutation vector are used to achieve the goal. The experimental results show that the scheme is robust against conventional video attacks, rotation attack and collusion attacks.
An information-guided channel-hopping scheme for block-fading channels with estimation errors
Yang, Yuli
2010-12-01
Information-guided channel-hopping technique employing multiple transmit antennas was previously proposed for supporting high data rate transmission over fading channels. This scheme achieves higher data rates than some mature schemes, such as the well-known cyclic transmit antenna selection and space-time block coding, by exploiting the independence character of multiple channels, which effectively results in having an additional information transmitting channel. Moreover, maximum likelihood decoding may be performed by simply decoupling the signals conveyed by the different mapping methods. In this paper, we investigate the achievable spectral efficiency of this scheme in the case of having channel estimation errors, with optimum pilot overhead for minimum meansquare error channel estimation, when transmitting over blockfading channels. Our numerical results further substantiate the robustness of the presented scheme, even with imperfect channel state information. ©2010 IEEE.
A New Fractional-Order Chaotic Complex System and Its Antisynchronization
Directory of Open Access Journals (Sweden)
Cuimei Jiang
2014-01-01
with phase portraits, bifurcation diagrams, the histories, and the largest Lyapunov exponents. And we find that chaos exists in this system with orders less than 5 by numerical simulation. Additionally, antisynchronization of different fractional-order chaotic complex systems is considered based on the stability theory of fractional-order systems. This new system and the fractional-order complex Lorenz system can achieve antisynchronization. Corresponding numerical simulations show the effectiveness and feasibility of the scheme.
The Local Fractional Bootstrap
DEFF Research Database (Denmark)
Bennedsen, Mikkel; Hounyo, Ulrich; Lunde, Asger
We introduce a bootstrap procedure for high-frequency statistics of Brownian semistationary processes. More specifically, we focus on a hypothesis test on the roughness of sample paths of Brownian semistationary processes, which uses an estimator based on a ratio of realized power variations. Our...... new resampling method, the local fractional bootstrap, relies on simulating an auxiliary fractional Brownian motion that mimics the fine properties of high frequency differences of the Brownian semistationary process under the null hypothesis. We prove the first order validity of the bootstrap method...... and in simulations we observe that the bootstrap-based hypothesis test provides considerable finite-sample improvements over an existing test that is based on a central limit theorem. This is important when studying the roughness properties of time series data; we illustrate this by applying the bootstrap method...
Fractionalization and Entrepreneurial Activities
Awaworyi Churchill, Sefa
2015-01-01
The vast majority of the literature on ethnicity and entrepreneurship focuses on the construct of ethnic entrepreneurship. However, very little is known about how ethnic heterogeneity affects entrepreneurship. This study attempts to fill the gap, and thus examines the effect of ethnic heterogeneity on entrepreneurial activities in a cross-section of 90 countries. Using indices of ethnic and linguistic fractionalization, we show that ethnic heterogeneity negatively influences entrepreneurship....
Main principles of developing exploitation models of semiconductor devices
Gradoboev, A. V.; Simonova, A. V.
2018-05-01
The paper represents primary tasks, solutions of which allow to develop the exploitation modes of semiconductor devices taking into account complex and combined influence of ionizing irradiation and operation factors. The structure of the exploitation model of the semiconductor device is presented, which is based on radiation and reliability models. Furthermore, it was shown that the exploitation model should take into account complex and combine influence of various ionizing irradiation types and operation factors. The algorithm of developing the exploitation model of the semiconductor devices is proposed. The possibility of creating the radiation model of Schottky barrier diode, Schottky field-effect transistor and Gunn diode is shown based on the available experimental data. The basic exploitation model of IR-LEDs based upon double AlGaAs heterostructures is represented. The practical application of the exploitation models will allow to output the electronic products with guaranteed operational properties.
Transnational gestational surrogacy: does it have to be exploitative?
Kirby, Jeffrey
2014-01-01
This article explores the controversial practice of transnational gestational surrogacy and poses a provocative question: Does it have to be exploitative? Various existing models of exploitation are considered and a novel exploitation-evaluation heuristic is introduced to assist in the analysis of the potentially exploitative dimensions/elements of complex health-related practices. On the basis of application of the heuristic, I conclude that transnational gestational surrogacy, as currently practiced in low-income country settings (such as rural, western India), is exploitative of surrogate women. Arising out of consideration of the heuristic's exploitation conditions, a set of public education and enabled choice, enhanced protections, and empowerment reforms to transnational gestational surrogacy practice is proposed that, if incorporated into a national regulatory framework and actualized within a low income country, could possibly render such practice nonexploitative.
Proba-V Mission Exploitation Platform
Goor, Erwin; Dries, Jeroen
2017-04-01
VITO and partners developed the Proba-V Mission Exploitation Platform (MEP) as an end-to-end solution to drastically improve the exploitation of the Proba-V (a Copernicus contributing mission) EO-data archive (http://proba-v.vgt.vito.be/), the past mission SPOT-VEGETATION and derived vegetation parameters by researchers, service providers and end-users. The analysis of time series of data (+1PB) is addressed, as well as the large scale on-demand processing of near real-time data on a powerful and scalable processing environment. Furthermore data from the Copernicus Global Land Service is in scope of the platform. From November 2015 an operational Proba-V MEP environment, as an ESA operation service, is gradually deployed at the VITO data center with direct access to the complete data archive. Since autumn 2016 the platform is operational and yet several applications are released to the users, e.g. - A time series viewer, showing the evolution of Proba-V bands and derived vegetation parameters from the Copernicus Global Land Service for any area of interest. - Full-resolution viewing services for the complete data archive. - On-demand processing chains on a powerfull Hadoop/Spark backend e.g. for the calculation of N-daily composites. - Virtual Machines can be provided with access to the data archive and tools to work with this data, e.g. various toolboxes (GDAL, QGIS, GrassGIS, SNAP toolbox, …) and support for R and Python. This allows users to immediately work with the data without having to install tools or download data, but as well to design, debug and test applications on the platform. - A prototype of jupyter Notebooks is available with some examples worked out to show the potential of the data. Today the platform is used by several third party projects to perform R&D activities on the data, and to develop/host data analysis toolboxes. In parallel the platform is further improved and extended. From the MEP PROBA-V, access to Sentinel-2 and landsat data will
Exploiting Untapped Information Resources in Earth Science
Ramachandran, R.; Fox, P. A.; Kempler, S.; Maskey, M.
2015-12-01
One of the continuing challenges in any Earth science investigation is the amount of time and effort required for data preparation before analysis can begin. Current Earth science data and information systems have their own shortcomings. For example, the current data search systems are designed with the assumption that researchers find data primarily by metadata searches on instrument or geophysical keywords, assuming that users have sufficient knowledge of the domain vocabulary to be able to effectively utilize the search catalogs. These systems lack support for new or interdisciplinary researchers who may be unfamiliar with the domain vocabulary or the breadth of relevant data available. There is clearly a need to innovate and evolve current data and information systems in order to improve data discovery and exploration capabilities to substantially reduce the data preparation time and effort. We assert that Earth science metadata assets are dark resources, information resources that organizations collect, process, and store for regular business or operational activities but fail to utilize for other purposes. The challenge for any organization is to recognize, identify and effectively utilize the dark data stores in their institutional repositories to better serve their stakeholders. NASA Earth science metadata catalogs contain dark resources consisting of structured information, free form descriptions of data and pre-generated images. With the addition of emerging semantic technologies, such catalogs can be fully utilized beyond their original design intent of supporting current search functionality. In this presentation, we will describe our approach of exploiting these information resources to provide novel data discovery and exploration pathways to science and education communities
Postural Hand Synergies during Environmental Constraint Exploitation
Directory of Open Access Journals (Sweden)
Cosimo Della Santina
2017-08-01
Full Text Available Humans are able to intuitively exploit the shape of an object and environmental constraints to achieve stable grasps and perform dexterous manipulations. In doing that, a vast range of kinematic strategies can be observed. However, in this work we formulate the hypothesis that such ability can be described in terms of a synergistic behavior in the generation of hand postures, i.e., using a reduced set of commonly used kinematic patterns. This is in analogy with previous studies showing the presence of such behavior in different tasks, such as grasping. We investigated this hypothesis in experiments performed by six subjects, who were asked to grasp objects from a flat surface. We quantitatively characterized hand posture behavior from a kinematic perspective, i.e., the hand joint angles, in both pre-shaping and during the interaction with the environment. To determine the role of tactile feedback, we repeated the same experiments but with subjects wearing a rigid shell on the fingertips to reduce cutaneous afferent inputs. Results show the persistence of at least two postural synergies in all the considered experimental conditions and phases. Tactile impairment does not alter significantly the first two synergies, and contact with the environment generates a change only for higher order Principal Components. A good match also arises between the first synergy found in our analysis and the first synergy of grasping as quantified by previous work. The present study is motivated by the interest of learning from the human example, extracting lessons that can be applied in robot design and control. Thus, we conclude with a discussion on implications for robotics of our findings.
Exploiting core knowledge for visual object recognition.
Schurgin, Mark W; Flombaum, Jonathan I
2017-03-01
Humans recognize thousands of objects, and with relative tolerance to variable retinal inputs. The acquisition of this ability is not fully understood, and it remains an area in which artificial systems have yet to surpass people. We sought to investigate the memory process that supports object recognition. Specifically, we investigated the association of inputs that co-occur over short periods of time. We tested the hypothesis that human perception exploits expectations about object kinematics to limit the scope of association to inputs that are likely to have the same token as a source. In several experiments we exposed participants to images of objects, and we then tested recognition sensitivity. Using motion, we manipulated whether successive encounters with an image took place through kinematics that implied the same or a different token as the source of those encounters. Images were injected with noise, or shown at varying orientations, and we included 2 manipulations of motion kinematics. Across all experiments, memory performance was better for images that had been previously encountered with kinematics that implied a single token. A model-based analysis similarly showed greater memory strength when images were shown via kinematics that implied a single token. These results suggest that constraints from physics are built into the mechanisms that support memory about objects. Such constraints-often characterized as 'Core Knowledge'-are known to support perception and cognition broadly, even in young infants. But they have never been considered as a mechanism for memory with respect to recognition. (PsycINFO Database Record (c) 2017 APA, all rights reserved).
Fractional Number Operator and Associated Fractional Diffusion Equations
Rguigui, Hafedh
2018-03-01
In this paper, we study the fractional number operator as an analog of the finite-dimensional fractional Laplacian. An important relation with the Ornstein-Uhlenbeck process is given. Using a semigroup approach, the solution of the Cauchy problem associated to the fractional number operator is presented. By means of the Mittag-Leffler function and the Laplace transform, we give the solution of the Caputo time fractional diffusion equation and Riemann-Liouville time fractional diffusion equation in infinite dimensions associated to the fractional number operator.
Thermal Property Engineering: Exploiting the Properties of Ceramic Nanocomposites
2018-03-01
ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the Properties of Ceramic...return it to the originator. ARL-TR-8308 ● MAR 2018 US Army Research Laboratory Thermal Property Engineering : Exploiting the...2015 – Dec 31 2017 4. TITLE AND SUBTITLE Thermal Property Engineering : Exploiting the Properties of Ceramic Nanocomposites 5a. CONTRACT NUMBER 5b
CAC DPLB MCN: A Distributed Load Balancing Scheme in Multimedia Mobile Cellular Networks
Directory of Open Access Journals (Sweden)
Sharma Abhijit
2016-11-01
Full Text Available The problem of non-uniform traffic demand in different cells of a cellular network may lead to a gross imbalance in the system performance. Thus, the users in hot cells may suffer from low throughput. In this paper, an effective and simple load balancing scheme CAC_DPLB_MCN is proposed that can effectively reduce the overall call blocking. This model considers dealing with multi-media traffic as well as time-varying geographical traffic distribution. The proposed scheme uses the concept of cell-tiering thereby creating fractional frequency reuse environment. A message exchange based distributed scheme instead of centralized one is used which help the proposed scheme be implemented in a multiple hot cell environment also. Furthermore, concept of dynamic pricing is used to serve the best interest of the users as well as for the service providers. The performance of the proposed scheme is compared with two other existing schemes in terms of call blocking probability and bandwidth utilization. Simulation results show that the proposed scheme can reduce the call blocking significantly in highly congested cell with highest bandwidth utilization. Use of dynamic pricing also makes the scheme useful to increase revenue of the service providers in contrast with compared schemes.
Cognitive Aware Interference Mitigation Scheme for OFDMA Femtocells
Alqerm, Ismail
2015-04-09
Femto-cells deployment in today’s cellular networks came into practice to fulfill the increasing demand for data services. It also extends the coverage in the indoor areas. However, interference to other femto and macro-cells users remains an unresolved challenge. In this paper, we propose an interference mitigation scheme to control the cross-tier interference caused by femto-cells to the macro users and the co-tier interference among femtocells. Cognitive radio spectrum sensing capability is utilized to determine the non-occupied channels or the ones that cause minimal interference to the macro users. An awareness based channel allocation scheme is developed with the assistance of the graph-coloring algorithm to assign channels to the femto-cells base stations with power optimization, minimal interference, maximum throughput, and maximum spectrum efficiency. In addition, the scheme exploits negotiation capability to match traffic load and QoS with the channel, and to maintain efficient utilization of the available channels.
Support Schemes and Ownership Structures
DEFF Research Database (Denmark)
Ropenus, Stephanie; Schröder, Sascha Thorsten; Costa, Ana
, Denmark, France and Portugal. Another crucial aspect for the diffusion of the mCHP technology is possible ownership structures. These may range from full consumer ownership to ownership by utilities and energy service companies, which is discussed in Section 6. Finally, a conclusion (Section 7) wraps up......In recent years, fuel cell based micro‐combined heat and power has received increasing attention due to its potential contribution to energy savings, efficiency gains, customer proximity and flexibility in operation and capacity size. The FC4Home project assesses technical and economic aspects...... of support scheme simultaneously affects risk and technological development, which is the focus of Section 4. Subsequent to this conceptual overview, Section 5 takes a glance at the national application of support schemes for mCHP in practice, notably in the three country cases of the FC4Home project...
[PICS: pharmaceutical inspection cooperation scheme].
Morénas, J
2009-01-01
The pharmaceutical inspection cooperation scheme (PICS) is a structure containing 34 participating authorities located worldwide (October 2008). It has been created in 1995 on the basis of the pharmaceutical inspection convention (PIC) settled by the European free trade association (EFTA) in1970. This scheme has different goals as to be an international recognised body in the field of good manufacturing practices (GMP), for training inspectors (by the way of an annual seminar and experts circles related notably to active pharmaceutical ingredients [API], quality risk management, computerized systems, useful for the writing of inspection's aide-memoires). PICS is also leading to high standards for GMP inspectorates (through regular crossed audits) and being a room for exchanges on technical matters between inspectors but also between inspectors and pharmaceutical industry.
Project financing renewable energy schemes
International Nuclear Information System (INIS)
Brandler, A.
1993-01-01
The viability of many Renewable Energy projects is critically dependent upon the ability of these projects to secure the necessary financing on acceptable terms. The principal objective of the study was to provide an overview to project developers of project financing techniques and the conditions under which project finance for Renewable Energy schemes could be raised, focussing on the potential sources of finance, the typical project financing structures that could be utilised for Renewable Energy schemes and the risk/return and security requirements of lenders, investors and other potential sources of financing. A second objective is to describe the appropriate strategy and tactics for developers to adopt in approaching the financing markets for such projects. (author)
Network Regulation and Support Schemes
DEFF Research Database (Denmark)
Ropenus, Stephanie; Schröder, Sascha Thorsten; Jacobsen, Henrik
2009-01-01
-in tariffs to market-based quota systems, and network regulation approaches, comprising rate-of-return and incentive regulation. National regulation and the vertical structure of the electricity sector shape the incentives of market agents, notably of distributed generators and network operators......At present, there exists no explicit European policy framework on distributed generation. Various Directives encompass distributed generation; inherently, their implementation is to the discretion of the Member States. The latter have adopted different kinds of support schemes, ranging from feed....... This article seeks to investigate the interactions between the policy dimensions of support schemes and network regulation and how they affect the deployment of distributed generation. Firstly, a conceptual analysis examines how the incentives of the different market agents are affected. In particular...
Distance labeling schemes for trees
DEFF Research Database (Denmark)
Alstrup, Stephen; Gørtz, Inge Li; Bistrup Halvorsen, Esben
2016-01-01
We consider distance labeling schemes for trees: given a tree with n nodes, label the nodes with binary strings such that, given the labels of any two nodes, one can determine, by looking only at the labels, the distance in the tree between the two nodes. A lower bound by Gavoille et al. [Gavoille...... variants such as, for example, small distances in trees [Alstrup et al., SODA, 2003]. We improve the known upper and lower bounds of exact distance labeling by showing that 1/4 log2(n) bits are needed and that 1/2 log2(n) bits are sufficient. We also give (1 + ε)-stretch labeling schemes using Theta...
Small-scale classification schemes
DEFF Research Database (Denmark)
Hertzum, Morten
2004-01-01
Small-scale classification schemes are used extensively in the coordination of cooperative work. This study investigates the creation and use of a classification scheme for handling the system requirements during the redevelopment of a nation-wide information system. This requirements...... classification inherited a lot of its structure from the existing system and rendered requirements that transcended the framework laid out by the existing system almost invisible. As a result, the requirements classification became a defining element of the requirements-engineering process, though its main...... effects remained largely implicit. The requirements classification contributed to constraining the requirements-engineering process by supporting the software engineers in maintaining some level of control over the process. This way, the requirements classification provided the software engineers...
Energy Technology Data Exchange (ETDEWEB)
Wiggenraad, R.; Verbeek-de Kanter, A.; Mast, M. [Radiotherapy Centre West, The Hague (Netherlands); Molenaar, R. [Diaconessenhuis, Leiden (Netherlands). Dept. of Neurology; Lycklama a Nijeholt, G. [Medical Centre Haagladen, The Hague (Netherlands). Dept. of Radiology; Vecht, C. [Medical Centre Haagladen, The Hague (Netherlands). Dept. of Neurology; Struikmans, H. [Radiotherapy Centre West, The Hague (Netherlands); Leiden Univ. Medical Centre (Netherlands). Dept. of Radiotherapy; Kal, H.B.
2012-08-15
Purpose: The 1-year local control rates after single-fraction stereotactic radiotherapy (SRT) for brain metastases > 3 cm diameter are less than 70%, but with fractionated SRT (FSRT) higher local control rates have been reported. The purpose of this study was to compare our treatment results with SRT and FSRT for large brain metastases. Materials and methods: In two consecutive periods, 41 patients with 46 brain metastases received SRT with 1 fraction of 15 Gy, while 51 patients with 65 brain metastases received FSRT with 3 fractions of 8 Gy. We included patients with brain metastases with a planning target volume of > 13 cm{sup 3} or metastases in the brainstem. Results: The minimum follow-up of patients still alive was 22 months. Comparing 1 fraction of 15 Gy with 3 fractions of 8 Gy, the 1-year rates of freedom from any local progression (54% and 61%, p = 0.93) and pseudo progression (85% and 75%, p = 0.25) were not significantly different. Overall survival rates were also not different. Conclusion: The 1-year local progression and pseudo progression rates after 1 fraction of 15 Gy or 3 fractions of 8 Gy for large brain metastases and metastases in the brainstem are similar. For better local control rates, FSRT schemes with a higher biological equivalent dose may be necessary. (orig.)
International Nuclear Information System (INIS)
Wiggenraad, R.; Verbeek-de Kanter, A.; Mast, M.; Molenaar, R.; Lycklama a Nijeholt, G.; Vecht, C.; Struikmans, H.; Leiden Univ. Medical Centre; Kal, H.B.
2012-01-01
Purpose: The 1-year local control rates after single-fraction stereotactic radiotherapy (SRT) for brain metastases > 3 cm diameter are less than 70%, but with fractionated SRT (FSRT) higher local control rates have been reported. The purpose of this study was to compare our treatment results with SRT and FSRT for large brain metastases. Materials and methods: In two consecutive periods, 41 patients with 46 brain metastases received SRT with 1 fraction of 15 Gy, while 51 patients with 65 brain metastases received FSRT with 3 fractions of 8 Gy. We included patients with brain metastases with a planning target volume of > 13 cm 3 or metastases in the brainstem. Results: The minimum follow-up of patients still alive was 22 months. Comparing 1 fraction of 15 Gy with 3 fractions of 8 Gy, the 1-year rates of freedom from any local progression (54% and 61%, p = 0.93) and pseudo progression (85% and 75%, p = 0.25) were not significantly different. Overall survival rates were also not different. Conclusion: The 1-year local progression and pseudo progression rates after 1 fraction of 15 Gy or 3 fractions of 8 Gy for large brain metastases and metastases in the brainstem are similar. For better local control rates, FSRT schemes with a higher biological equivalent dose may be necessary. (orig.)
Cambridge community Optometry Glaucoma Scheme.
Keenan, Jonathan; Shahid, Humma; Bourne, Rupert R; White, Andrew J; Martin, Keith R
2015-04-01
With a higher life expectancy, there is an increased demand for hospital glaucoma services in the United Kingdom. The Cambridge community Optometry Glaucoma Scheme (COGS) was initiated in 2010, where new referrals for suspected glaucoma are evaluated by community optometrists with a special interest in glaucoma, with virtual electronic review and validation by a consultant ophthalmologist with special interest in glaucoma. 1733 patients were evaluated by this scheme between 2010 and 2013. Clinical assessment is performed by the optometrist at a remote site. Goldmann applanation tonometry, pachymetry, monoscopic colour optic disc photographs and automated Humphrey visual field testing are performed. A clinical decision is made as to whether a patient has glaucoma or is a suspect, and referred on or discharged as a false positive referral. The clinical findings, optic disc photographs and visual field test results are transmitted electronically for virtual review by a consultant ophthalmologist. The number of false positive referrals from initial referral into the scheme. Of the patients, 46.6% were discharged at assessment and a further 5.7% were discharged following virtual review. Of the patients initially discharged, 2.8% were recalled following virtual review. Following assessment at the hospital, a further 10.5% were discharged after a single visit. The COGS community-based glaucoma screening programme is a safe and effective way of evaluating glaucoma referrals in the community and reducing false-positive referrals for glaucoma into the hospital system. © 2014 Royal Australian and New Zealand College of Ophthalmologists.
New schemes for particle accelerators
International Nuclear Information System (INIS)
Nishida, Y.
1985-01-01
In the present paper, the authors propose new schemes for realizing the v/sub p/xB accelerator, by using no plasma system for producing the strong longitudinal waves. The first method is to use a grating for obtaining extended interaction of an electron beam moving along the grating surface with light beam incident also along the surface. Here, the light beam propagates obliquely to the grating grooves for producing strong electric field, and the electron beam propagates in parallel to the light beam. The static magnetic field is applied perpendicularly to the grating surface. In the present system, the beam interacts synchronously with the p-polarized wave which has the electric field be parallel to the grating surface. Another conventional scheme is to use a delay circuit. Here, the light beam propagates obliquely between a pair of array of conductor fins or slots. The phase velocity of the spatial harmonics in the y-direction (right angle to the array of slots) is slower than the speed of light. With the aid of powerful laser light or microwave source, it should be possible to miniaturise linacs by using the v/sub p/xB effect and schemes proposed here
Inclusive B-meson hadroproduction in the general-mass variable-flavor-number scheme
Energy Technology Data Exchange (ETDEWEB)
Kniehl, B.A.; Kramer, G. [Hamburg Univ. (Germany). 2. Inst. fuer Theoretische Physik; Schienbein, I. [Universite Joseph Fourier, Grenoble (France). Lab. de Physique Subatomique et de Cosmologie]|[CNRS/IN2P3, Inst. National Polytechnique de Grenoble (France); Spiesberger, H. [Johannes Gutenberg Univ., Mainz (Germany). Inst. fuer Physik
2007-05-15
We calculate the cross section for the inclusive hadroproduction of B mesons as a function of transverse momentum p{sub T} at next-to-leading order (NLO) in the general- mass variable-flavor-number scheme using realistic non-perturbative fragmentation functions that are obtained through a global fit to e{sup +}e{sup -} data from CERN LEP1 and SLAC SLC exploiting their universality and scaling violations. We find good agreement with recent p anti p data taken by the CDF Collaboration in run II at the Fermilab Tevatron. We also present comparisons with NLO results obtained in two other schemes. (orig.)
A Memory Efficient Network Encryption Scheme
El-Fotouh, Mohamed Abo; Diepold, Klaus
In this paper, we studied the two widely used encryption schemes in network applications. Shortcomings have been found in both schemes, as these schemes consume either more memory to gain high throughput or low memory with low throughput. The need has aroused for a scheme that has low memory requirements and in the same time possesses high speed, as the number of the internet users increases each day. We used the SSM model [1], to construct an encryption scheme based on the AES. The proposed scheme possesses high throughput together with low memory requirements.
An Arbitrated Quantum Signature Scheme without Entanglement*
International Nuclear Information System (INIS)
Li Hui-Ran; Luo Ming-Xing; Peng Dai-Yuan; Wang Xiao-Jun
2017-01-01
Several quantum signature schemes are recently proposed to realize secure signatures of quantum or classical messages. Arbitrated quantum signature as one nontrivial scheme has attracted great interests because of its usefulness and efficiency. Unfortunately, previous schemes cannot against Trojan horse attack and DoS attack and lack of the unforgeability and the non-repudiation. In this paper, we propose an improved arbitrated quantum signature to address these secure issues with the honesty arbitrator. Our scheme takes use of qubit states not entanglements. More importantly, the qubit scheme can achieve the unforgeability and the non-repudiation. Our scheme is also secure for other known quantum attacks . (paper)
Innovative ICF scheme-impact fast ignition
International Nuclear Information System (INIS)
Murakami, M.; Nagatomo, H.; Sakaiya, T.; Karasik, M.; Gardner, J.; Bates, J.
2007-01-01
A totally new ignition scheme for ICF, impact fast ignition (IFI), is proposed [1], in which the compressed DT main fuel is to be ignited by impact collision of another fraction of separately imploded DT fuel, which is accelerated in the hollow conical target. Two-dimensional hydrodynamic simulation results in full geometry are presented, in which some key physical parameters for the impact shell dynamics such as 10 8 cm/s of the implosion velocity, 200- 300 g/cm 3 of the compressed density, and the converted temperature beyond 5 keV are demonstrated. As the first step toward the proof-of-principle of IFI, we have conducted preliminary experiments under the operation of GEKKO XII/HYPER laser system to achieve a hyper-velocity of the order of 108 cm/s. As a result we have observed a highest velocity, 6.5 x 10 7 cm/s, ever achieved. Furthermore, we have also done the first integrated experiments using the target and observed substantial amount of neutron yields. Reference: [1] M. Murakami and Nagatomo, Nucl. Instrum. Meth. Phys. Res. A 544(2005) 67
Gauge invariant fractional electromagnetic fields
Lazo, Matheus Jatkoske
2011-09-01
Fractional derivatives and integrations of non-integers orders was introduced more than three centuries ago but only recently gained more attention due to its application on nonlocal phenomenas. In this context, several formulations of fractional electromagnetic fields was proposed, but all these theories suffer from the absence of an effective fractional vector calculus, and in general are non-causal or spatially asymmetric. In order to deal with these difficulties, we propose a spatially symmetric and causal gauge invariant fractional electromagnetic field from a Lagrangian formulation. From our fractional Maxwell's fields arose a definition for the fractional gradient, divergent and curl operators.
Carbon-13 isotopic composition of distillation fractions of some Egyptian crude oils
International Nuclear Information System (INIS)
Aly, A.I.M.; Hamza, M.S.; Abd Elsamie, S.G.
1991-01-01
13 C/ 13 C ratios were determined for some crude oil fields in the Gulf of Suez and Western Desert provinces. The crude oil was subjected to distillation at atmospheric pressure and subsequently under vacuum. Distillation fractions were collected at 25 degree C intervals. Carbon-13 content of these distillation fractions showed some differences in the degree of isotopic fractionation. The results were interpreted in view of the age of the source rocks and the degree of maturation process. The carbon-13 content of distillation fractions may be helpful in revealing petroleum mechanisms which can be exploited in exploration.4 fig
Zeng, Shengda; Migórski, Stanisław
2018-03-01
In this paper a class of elliptic hemivariational inequalities involving the time-fractional order integral operator is investigated. Exploiting the Rothe method and using the surjectivity of multivalued pseudomonotone operators, a result on existence of solution to the problem is established. Then, this abstract result is applied to provide a theorem on the weak solvability of a fractional viscoelastic contact problem. The process is quasistatic and the constitutive relation is modeled with the fractional Kelvin-Voigt law. The friction and contact conditions are described by the Clarke generalized gradient of nonconvex and nonsmooth functionals. The variational formulation of this problem leads to a fractional hemivariational inequality.
Liu, W.; Wang, H.; Liu, D.; Miu, Y.
2018-05-01
Precise geometric parameters are essential to ensure the positioning accuracy for space optical cameras. However, state-of-the-art onorbit calibration method inevitably suffers from long update cycle and poor timeliness performance. To this end, in this paper we exploit the optical auto-collimation principle and propose a real-time onboard calibration scheme for monitoring key geometric parameters. Specifically, in the proposed scheme, auto-collimation devices are first designed by installing collimated light sources, area-array CCDs, and prisms inside the satellite payload system. Through utilizing those devices, the changes in the geometric parameters are elegantly converted into changes in the spot image positions. The variation of geometric parameters can be derived via extracting and processing the spot images. An experimental platform is then set up to verify the feasibility and analyze the precision index of the proposed scheme. The experiment results demonstrate that it is feasible to apply the optical auto-collimation principle for real-time onboard monitoring.
Compress compound images in H.264/MPGE-4 AVC by exploiting spatial correlation.
Lan, Cuiling; Shi, Guangming; Wu, Feng
2010-04-01
Compound images are a combination of text, graphics and natural image. They present strong anisotropic features, especially on the text and graphics parts. These anisotropic features often render conventional compression inefficient. Thus, this paper proposes a novel coding scheme from the H.264 intraframe coding. In the scheme, two new intramodes are developed to better exploit spatial correlation in compound images. The first is the residual scalar quantization (RSQ) mode, where intrapredicted residues are directly quantized and coded without transform. The second is the base colors and index map (BCIM) mode that can be viewed as an adaptive color quantization. In this mode, an image block is represented by several representative colors, referred to as base colors, and an index map to compress. Every block selects its coding mode from two new modes and the previous intramodes in H.264 by rate-distortion optimization (RDO). Experimental results show that the proposed scheme improves the coding efficiency even more than 10 dB at most bit rates for compound images and keeps a comparable efficient performance to H.264 for natural images.
Exploiting the Capture Effect to Enhance RACH Performance in Cellular-Based M2M Communications
Directory of Open Access Journals (Sweden)
Jonghun Kim
2017-09-01
Full Text Available Cellular-based machine-to-machine (M2M communication is expected to facilitate services for the Internet of Things (IoT. However, because cellular networks are designed for human users, they have some limitations. Random access channel (RACH congestion caused by massive access from M2M devices is one of the biggest factors hindering cellular-based M2M services because the RACH congestion causes random access (RA throughput degradation and connection failures to the devices. In this paper, we show the possibility exploiting the capture effects, which have been known to have a positive impact on the wireless network system, on RA procedure for improving the RA performance of M2M devices. For this purpose, we analyze an RA procedure using a capture model. Through this analysis, we examine the effects of capture on RA performance and propose an Msg3 power-ramping (Msg3 PR scheme to increase the capture probability (thereby increasing the RA success probability even when severe RACH congestion problem occurs. The proposed analysis models are validated using simulations. The results show that the proposed scheme, with proper parameters, further improves the RA throughput and reduces the connection failure probability, by slightly increasing the energy consumption. Finally, we demonstrate the effects of coexistence with other RA-related schemes through simulation results.
Exploiting Laboratory and Heliophysics Plasma Synergies
Directory of Open Access Journals (Sweden)
Jill Dahlburg
2010-05-01
Full Text Available Recent advances in space-based heliospheric observations, laboratory experimentation, and plasma simulation codes are creating an exciting new cross-disciplinary opportunity for understanding fast energy release and transport mechanisms in heliophysics and laboratory plasma dynamics, which had not been previously accessible. This article provides an overview of some new observational, experimental, and computational assets, and discusses current and near-term activities towards exploitation of synergies involving those assets. This overview does not claim to be comprehensive, but instead covers mainly activities closely associated with the authors’ interests and reearch. Heliospheric observations reviewed include the Sun Earth Connection Coronal and Heliospheric Investigation (SECCHI on the National Aeronautics and Space Administration (NASA Solar Terrestrial Relations Observatory (STEREO mission, the first instrument to provide remote sensing imagery observations with spatial continuity extending from the Sun to the Earth, and the Extreme-ultraviolet Imaging Spectrometer (EIS on the Japanese Hinode spacecraft that is measuring spectroscopically physical parameters of the solar atmosphere towards obtaining plasma temperatures, densities, and mass motions. The Solar Dynamics Observatory (SDO and the upcoming Solar Orbiter with the Heliospheric Imager (SoloHI on-board will also be discussed. Laboratory plasma experiments surveyed include the line-tied magnetic reconnection experiments at University of Wisconsin (relevant to coronal heating magnetic flux tube observations and simulations, and a dynamo facility under construction there; the Space Plasma Simulation Chamber at the Naval Research Laboratory that currently produces plasmas scalable to ionospheric and magnetospheric conditions and in the future also will be suited to study the physics of the solar corona; the Versatile Toroidal Facility at the Massachusetts Institute of Technology that
The Extended Fractional Subequation Method for Nonlinear Fractional Differential Equations
Zhao, Jianping; Tang, Bo; Kumar, Sunil; Hou, Yanren
2012-01-01
An extended fractional subequation method is proposed for solving fractional differential equations by introducing a new general ansätz and Bäcklund transformation of the fractional Riccati equation with known solutions. Being concise and straightforward, this method is applied to the space-time fractional coupled Burgers’ equations and coupled MKdV equations. As a result, many exact solutions are obtained. It is shown that the considered method provides a very effective, convenient, and powe...
Simulated population responses of common carp to commercial exploitation
Energy Technology Data Exchange (ETDEWEB)
Weber, Michael J.; Hennen, Matthew J.; Brown, Michael L.
2011-12-01
Common carp Cyprinus carpio is a widespread invasive species that can become highly abundant and impose deleterious ecosystem effects. Thus, aquatic resource managers are interested in controlling common carp populations. Control of invasive common carp populations is difficult, due in part to the inherent uncertainty of how populations respond to exploitation. To understand how common carp populations respond to exploitation, we evaluated common carp population dynamics (recruitment, growth, and mortality) in three natural lakes in eastern South Dakota. Common carp exhibited similar population dynamics across these three systems that were characterized by consistent recruitment (ages 3 to 15 years present), fast growth (K = 0.37 to 0.59), and low mortality (A = 1 to 7%). We then modeled the effects of commercial exploitation on size structure, abundance, and egg production to determine its utility as a management tool to control populations. All three populations responded similarly to exploitation simulations with a 575-mm length restriction, representing commercial gear selectivity. Simulated common carp size structure modestly declined (9 to 37%) in all simulations. Abundance of common carp declined dramatically (28 to 56%) at low levels of exploitation (0 to 20%) but exploitation >40% had little additive effect and populations were only reduced by 49 to 79% despite high exploitation (>90%). Maximum lifetime egg production was reduced from 77 to 89% at a moderate level of exploitation (40%), indicating the potential for recruitment overfishing. Exploitation further reduced common carp size structure, abundance, and egg production when simulations were not size selective. Our results provide insights to how common carp populations may respond to exploitation. Although commercial exploitation may be able to partially control populations, an integrated removal approach that removes all sizes of common carp has a greater chance of controlling population abundance
Functional Fractional Calculus
Das, Shantanu
2011-01-01
When a new extraordinary and outstanding theory is stated, it has to face criticism and skeptism, because it is beyond the usual concept. The fractional calculus though not new, was not discussed or developed for a long time, particularly for lack of its application to real life problems. It is extraordinary because it does not deal with 'ordinary' differential calculus. It is outstanding because it can now be applied to situations where existing theories fail to give satisfactory results. In this book not only mathematical abstractions are discussed in a lucid manner, with physical mathematic
Andreasen, Niels; Bjerregaard, Mads; Lund, Jonas; Olsen, Ove Bitsch; Rasmussen, Andreas Dalgas
2012-01-01
Projektet er bygget op omkring kritisk realisme, som er det gennemgående videnskabelige fundament til undersøgelsen af hvilke strukturelle grunde der er til finansiel ustabilitet i Danmark. Projektet går i dybden med Fractional Reserve Banking og incitamentsstrukturen i banksystemet. Vi bevæger os både på det makro- og mikroøkonomiske niveau i analysen. På makro niveau bruger vi den østrigske skole om konjunktur teori (The Positive Theory of the Cycle). På mikro niveau arbejder vi med princip...
Farrugia, Albert; Evers, Theo; Falcou, Pierre-Francois; Burnouf, Thierry; Amorim, Luiz; Thomas, Sylvia
2009-04-01
Procurement and processing of human plasma for fractionation of therapeutic proteins or biological medicines used in clinical practice is a multi-billion dollar international trade. Together the private sector and public sector (non-profit) provide large amounts of safe and effective therapeutic plasma proteins needed worldwide. The principal therapeutic proteins produced by the dichotomous industry include gamma globulins or immunoglobulins (including pathogen-specific hyperimmune globulins, such as hepatitis B immune globulins) albumin, factor VIII and Factor IX concentrates. Viral inactivation, principally by solvent detergent and other processes, has proven highly effective in preventing transmission of enveloped viruses, viz. HBV, HIV, and HCV.
Yau, Wei-Chuen; Phan, Raphael C-W
2013-12-01
Many authentication schemes have been proposed for telecare medicine information systems (TMIS) to ensure the privacy, integrity, and availability of patient records. These schemes are crucial for TMIS systems because otherwise patients' medical records become susceptible to tampering thus hampering diagnosis or private medical conditions of patients could be disclosed to parties who do not have a right to access such information. Very recently, Hao et al. proposed a chaotic map-based authentication scheme for telecare medicine information systems in a recent issue of Journal of Medical Systems. They claimed that the authentication scheme can withstand various attacks and it is secure to be used in TMIS. In this paper, we show that this authentication scheme is vulnerable to key-compromise impersonation attacks, off-line password guessing attacks upon compromising of a smart card, and parallel session attacks. We also exploit weaknesses in the password change phase of the scheme to mount a denial-of-service attack. Our results show that this scheme cannot be used to provide security in a telecare medicine information system.
Why and how to compensate living organ donors: ethical implications of the new Australian scheme.
Giubilini, Alberto
2015-05-01
The Australian Federal Government has announced a two-year trial scheme to compensate living organ donors. The compensation will be the equivalent of six weeks paid leave at the rate of the national minimum wage. In this article I analyse the ethics of compensating living organ donors taking the Australian scheme as a reference point. Considering the long waiting lists for organ transplantations and the related costs on the healthcare system of treating patients waiting for an organ, the 1.3 million AUD the Australian Government has committed might represent a very worthwhile investment. I argue that a scheme like the Australian one is sufficiently well designed to avoid all the ethical problems traditionally associated with attaching a monetary value to the human body or to parts of it, namely commodification, inducement, exploitation, and equality issues. Therefore, I suggest that the Australian scheme, if cost-effective, should represent a model for other countries to follow. Nonetheless, although I endorse this scheme, I will also argue that this kind of scheme raises issues of justice in regard to the distribution of organs. Thus, I propose that other policies would be needed to supplement the scheme in order to guarantee not only a higher number of organs available, but also a fair distribution. © 2014 John Wiley & Sons Ltd.
Numerical simulation of fractional Cable equation of spiny neuronal dendrites
Directory of Open Access Journals (Sweden)
N.H. Sweilam
2014-03-01
Full Text Available In this article, numerical study for the fractional Cable equation which is fundamental equations for modeling neuronal dynamics is introduced by using weighted average of finite difference methods. The stability analysis of the proposed methods is given by a recently proposed procedure similar to the standard John von Neumann stability analysis. A simple and an accurate stability criterion valid for different discretization schemes of the fractional derivative and arbitrary weight factor is introduced and checked numerically. Numerical results, figures, and comparisons have been presented to confirm the theoretical results and efficiency of the proposed method.
Exploiting for medical and biological applications
Giano, Michael C.
Biotherapeutics are an emerging class of drug composed of molecules ranging in sizes from peptides to large proteins. Due to their poor stability and mucosal membrane permeability, biotherapeutics are administered by a parenteral method (i.e., syringe, intravenous or intramuscular). Therapeutics delivered systemically often experience short half-lives. While, local administration may involve invasive surgical procedures and suffer from poor retention at the site of application. To compensate, the patient receives frequent doses of highly concentrated therapeutic. Unfortunately, the off-target side effects and discomfort associated with multiple injections results in poor patient compliance. Therefore, new delivery methods which can improve therapeutic retention, reduce the frequency of administration and may aid in decreasing the off-target side effects is a necessity. Hydrogels are a class of biomaterials that are gaining interests for tissue engineering and drug delivery applications. Hydrogel materials are defined as porous, 3-dimensional networks that are primarily composed of water. Generally, they are mechanically rigid, cytocompatible and easily chemically functionalized. Collectively, these properties make hydrogels fantastic candidates to perform as drug delivery depots. Current hydrogel delivery systems physically entrap the target therapeutic which is then subsequently released over time at the site of administration. The swelling and degradation of the material effect the diffusion of the therapy from the hydrogel, and therefore should be controlled. Although these strategies provide some regulation over therapeutic release, full control of the delivery is not achieved. Newer approaches are focused on designing hydrogels that exploit known interactions, covalently attach the therapy or respond to an external stimulus in an effort to gain improved control over the therapy's release. Unfortunately, the biotherapeutic is typically required to be chemically
Tegotae-based decentralised control scheme for autonomous gait transition of snake-like robots.
Kano, Takeshi; Yoshizawa, Ryo; Ishiguro, Akio
2017-08-04
Snakes change their locomotion patterns in response to the environment. This ability is a motivation for developing snake-like robots with highly adaptive functionality. In this study, a decentralised control scheme of snake-like robots that exhibited autonomous gait transition (i.e. the transition between concertina locomotion in narrow aisles and scaffold-based locomotion on unstructured terrains) was developed. Additionally, the control scheme was validated via simulations. A key insight revealed is that these locomotion patterns were not preprogrammed but emerged by exploiting Tegotae, a concept that describes the extent to which a perceived reaction matches a generated action. Unlike local reflexive mechanisms proposed previously, the Tegotae-based feedback mechanism enabled the robot to 'selectively' exploit environments beneficial for propulsion, and generated reasonable locomotion patterns. It is expected that the results of this study can form the basis to design robots that can work under unpredictable and unstructured environments.
Advances in robust fractional control
Padula, Fabrizio
2015-01-01
This monograph presents design methodologies for (robust) fractional control systems. It shows the reader how to take advantage of the superior flexibility of fractional control systems compared with integer-order systems in achieving more challenging control requirements. There is a high degree of current interest in fractional systems and fractional control arising from both academia and industry and readers from both milieux are catered to in the text. Different design approaches having in common a trade-off between robustness and performance of the control system are considered explicitly. The text generalizes methodologies, techniques and theoretical results that have been successfully applied in classical (integer) control to the fractional case. The first part of Advances in Robust Fractional Control is the more industrially-oriented. It focuses on the design of fractional controllers for integer processes. In particular, it considers fractional-order proportional-integral-derivative controllers, becau...
Early Sexual Exploitation as an Influence in Prostitution.
Silbert, Mimi H.; Pines, Ayala M.
1983-01-01
Surveyed 200 female street prostitutes to determine whether they were sexually exploited during childhood. Results showed 60 percent of the subjects were sexually exploited. The few girls who discussed their abuse with others were met with shame and most often inaction. Only 10 percent were abused by strangers. (JAC)
A Descriptive Study on Sexually Exploited Children in Residential Treatment
Twill, Sarah E.; Green, Denise M.; Traylor, Amy
2010-01-01
Sexual exploitation and prostitution of children and adolescents is a multibillion dollar industry in the United States (Estes and Weiner in "Medical, legal & social science aspects of child sexual exploitation: A comprehensive review of pornography, prostitution, and internet crimes, vol I," G.W. Medical Publishing, Inc, St Louis,…
Exploiting opportunities at all cost? Entrepreneurial intent and externalities
Urbig, D.; Weitzel, G.U.; Rosenkranz, S.; van Witteloostuijn, A.
2011-01-01
they exploit welfare-enhancing opportunities as it is assumed in several normative models? Do we need to prevent potential entrepreneurs from being destructive or are there intrinsic limits to harm others? We experimentally investigate how people with different entrepreneurial intent exploit risky
Exploitation program of ''Adamow'' quarry up to 2015
International Nuclear Information System (INIS)
Hadlaw, A.
1994-01-01
The brown coal deposits exploited by the quarry ''Adamow'' located in Central Poland are shortly described and the prognosis of their exploitation up to 2015 is given. The basis data on the perspective deposits in the quarry's area are also presented. All deposits are shown on the map. 3 ills, 2 tabs
Panel discussion on exploitation of geothermal resources in thermal zones
Energy Technology Data Exchange (ETDEWEB)
Viramonte, J G; Mange, J; Stefani, G
1978-03-01
The topics discussed include the major known geothermal resources, varying ways of exploiting geothermal resources, technical and economic difficulties in the exploitation, the place of geothermal energy in the total energy policy of a given country, advanced exploration techniques, and indications of needed areas of study. The panelists represented most of the South American countries, Mexico, and Italy. (JSR)
Decoupling schemes for the SSC Collider
International Nuclear Information System (INIS)
Cai, Y.; Bourianoff, G.; Cole, B.; Meinke, R.; Peterson, J.; Pilat, F.; Stampke, S.; Syphers, M.; Talman, R.
1993-05-01
A decoupling system is designed for the SSC Collider. This system can accommodate three decoupling schemes by using 44 skew quadrupoles in the different configurations. Several decoupling schemes are studied and compared in this paper
Renormalization scheme-invariant perturbation theory
International Nuclear Information System (INIS)
Dhar, A.
1983-01-01
A complete solution to the problem of the renormalization scheme dependence of perturbative approximants to physical quantities is presented. An equation is derived which determines any physical quantity implicitly as a function of only scheme independent variables. (orig.)
Wireless Broadband Access and Accounting Schemes
Institute of Scientific and Technical Information of China (English)
无
2003-01-01
In this paper, we propose two wireless broadband access and accounting schemes. In both schemes, the accounting system adopts RADIUS protocol, but the access system adopts SSH and SSL protocols respectively.
Fractional Reserve in Banking System
Valkonen, Maria
2016-01-01
This thesis is aimed to provide understanding of the role of the fractional reserve in the mod-ern banking system worldwide and particularly in Finland. The fractional reserve banking is used worldwide, but the benefits of this system are very disputable. On the one hand, experts say that the fractional reserve is a necessary instrument for the normal business and profit making. On the other hand, sceptics openly criticize the fractional reserve system and blame it for fiat money (money n...
On matrix fractional differential equations
Adem Kılıçman; Wasan Ajeel Ahmood
2017-01-01
The aim of this article is to study the matrix fractional differential equations and to find the exact solution for system of matrix fractional differential equations in terms of Riemann–Liouville using Laplace transform method and convolution product to the Riemann–Liouville fractional of matrices. Also, we show the theorem of non-homogeneous matrix fractional partial differential equation with some illustrative examples to demonstrate the effectiveness of the new methodology. The main objec...
[Ecotourism exploitation model in Bita Lake Natural Reserve of Yunnan].
Yang, G; Wang, Y; Zhong, L
2000-12-01
Bita lake provincial natural reserve is located in Shangri-La region of North-western Yunnan, and was set as a demonstrating area for ecotourism exploitation in 1998. After a year's exploitation construction and half a year's operation as a branch of the 99' Kunming International Horticulture Exposition to accept tourists, it was proved that the ecotourism demonstrating area attained four integrated functions of ecotourism, i.e., tourism, protection, poverty clearing and environment education. Five exploitation and management models including function zoned exploitation model, featured tourism communication model signs system designing model, local Tibetan family reception model and environmental monitoring model, were also successful, which were demonstrated and spreaded to the whole province. Bita lake provincial natural reserve could be a good sample for the ecotourism exploitation natural reserves of the whole country.
Use of Monomer Fraction Data in the Parametrization of Association Theories
DEFF Research Database (Denmark)
Kontogeorgis, Georgios; Tsivintzelis, Ioannis; von Solms, Nicolas
2010-01-01
the monomer fraction of hydrogen bonding compounds and their mixtures. Monomer fraction data are obtained from spectroscopic measurements and they are available for a few compounds such as pure water and alcohols as well as for some alcohol–alkane and similar mixtures. These data are useful...... “improved” model parameters can be obtained if monomer fraction data are included in the parameter estimation together with vapor pressures and liquid densities. The expression “improved” implies parameters which can represent several pure compound properties as well as monomer fraction data for pure......, liquid densities and monomer fractions of water and alcohols. The 4C scheme is the best choice for water, while for methanol there is small difference between the 2B and 3B association schemes....
Tightly Secure Signatures From Lossy Identification Schemes
Abdalla , Michel; Fouque , Pierre-Alain; Lyubashevsky , Vadim; Tibouchi , Mehdi
2015-01-01
International audience; In this paper, we present three digital signature schemes with tight security reductions in the random oracle model. Our first signature scheme is a particularly efficient version of the short exponent discrete log-based scheme of Girault et al. (J Cryptol 19(4):463–487, 2006). Our scheme has a tight reduction to the decisional short discrete logarithm problem, while still maintaining the non-tight reduction to the computational version of the problem upon which the or...
On the welfare properties of fractional reserve banking
Sanches, Daniel R.
2015-01-01
Supersedes Working Paper 13-32/R. Monetary economists have long recognized a tension between the benefits of fractional reserve banking, such as the ability to undertake more profitable (long-term) investment opportunities, and the difficulties associated with it, such as the risk of in-solvency for each bank and the associated losses to bank liability holders. I show that a specific banking arrangement (a joint-liability scheme) provides an effective mechanism for ensuring the ex-post transf...
Fractional Hopfield Neural Networks: Fractional Dynamic Associative Recurrent Neural Networks.
Pu, Yi-Fei; Yi, Zhang; Zhou, Ji-Liu
2017-10-01
This paper mainly discusses a novel conceptual framework: fractional Hopfield neural networks (FHNN). As is commonly known, fractional calculus has been incorporated into artificial neural networks, mainly because of its long-term memory and nonlocality. Some researchers have made interesting attempts at fractional neural networks and gained competitive advantages over integer-order neural networks. Therefore, it is naturally makes one ponder how to generalize the first-order Hopfield neural networks to the fractional-order ones, and how to implement FHNN by means of fractional calculus. We propose to introduce a novel mathematical method: fractional calculus to implement FHNN. First, we implement fractor in the form of an analog circuit. Second, we implement FHNN by utilizing fractor and the fractional steepest descent approach, construct its Lyapunov function, and further analyze its attractors. Third, we perform experiments to analyze the stability and convergence of FHNN, and further discuss its applications to the defense against chip cloning attacks for anticounterfeiting. The main contribution of our work is to propose FHNN in the form of an analog circuit by utilizing a fractor and the fractional steepest descent approach, construct its Lyapunov function, prove its Lyapunov stability, analyze its attractors, and apply FHNN to the defense against chip cloning attacks for anticounterfeiting. A significant advantage of FHNN is that its attractors essentially relate to the neuron's fractional order. FHNN possesses the fractional-order-stability and fractional-order-sensitivity characteristics.
The random continued fraction transformation
Kalle, Charlene; Kempton, Tom; Verbitskiy, Evgeny
2017-03-01
We introduce a random dynamical system related to continued fraction expansions. It uses random combinations of the Gauss map and the Rényi (or backwards) continued fraction map. We explore the continued fraction expansions that this system produces, as well as the dynamical properties of the system.
How Weird Are Weird Fractions?
Stuffelbeam, Ryan
2013-01-01
A positive rational is a weird fraction if its value is unchanged by an illegitimate, digit-based reduction. In this article, we prove that each weird fraction is uniquely weird and initiate a discussion of the prevalence of weird fractions.
Do Children Understand Fraction Addition?
Braithwaite, David W.; Tian, Jing; Siegler, Robert S.
2017-01-01
Many children fail to master fraction arithmetic even after years of instruction. A recent theory of fraction arithmetic (Braithwaite, Pyke, & Siegler, in press) hypothesized that this poor learning of fraction arithmetic procedures reflects poor conceptual understanding of them. To test this hypothesis, we performed three experiments…
On fractional Fourier transform moments
Alieva, T.; Bastiaans, M.J.
2000-01-01
Based on the relation between the ambiguity function represented in a quasi-polar coordinate system and the fractional power spectra, the fractional Fourier transform moments are introduced. Important equalities for the global second-order fractional Fourier transform moments are derived and their
Fractional dynamic calculus and fractional dynamic equations on time scales
Georgiev, Svetlin G
2018-01-01
Pedagogically organized, this monograph introduces fractional calculus and fractional dynamic equations on time scales in relation to mathematical physics applications and problems. Beginning with the definitions of forward and backward jump operators, the book builds from Stefan Hilger’s basic theories on time scales and examines recent developments within the field of fractional calculus and fractional equations. Useful tools are provided for solving differential and integral equations as well as various problems involving special functions of mathematical physics and their extensions and generalizations in one and more variables. Much discussion is devoted to Riemann-Liouville fractional dynamic equations and Caputo fractional dynamic equations. Intended for use in the field and designed for students without an extensive mathematical background, this book is suitable for graduate courses and researchers looking for an introduction to fractional dynamic calculus and equations on time scales. .
Robust fast controller design via nonlinear fractional differential equations.
Zhou, Xi; Wei, Yiheng; Liang, Shu; Wang, Yong
2017-07-01
A new method for linear system controller design is proposed whereby the closed-loop system achieves both robustness and fast response. The robustness performance considered here means the damping ratio of closed-loop system can keep its desired value under system parameter perturbation, while the fast response, represented by rise time of system output, can be improved by tuning the controller parameter. We exploit techniques from both the nonlinear systems control and the fractional order systems control to derive a novel nonlinear fractional order controller. For theoretical analysis of the closed-loop system performance, two comparison theorems are developed for a class of fractional differential equations. Moreover, the rise time of the closed-loop system can be estimated, which facilitates our controller design to satisfy the fast response performance and maintain the robustness. Finally, numerical examples are given to illustrate the effectiveness of our methods. Copyright © 2017 ISA. Published by Elsevier Ltd. All rights reserved.
Comparative study of numerical schemes of TVD3, UNO3-ACM and optimized compact scheme
Lee, Duck-Joo; Hwang, Chang-Jeon; Ko, Duck-Kon; Kim, Jae-Wook
1995-01-01
Three different schemes are employed to solve the benchmark problem. The first one is a conventional TVD-MUSCL (Monotone Upwind Schemes for Conservation Laws) scheme. The second scheme is a UNO3-ACM (Uniformly Non-Oscillatory Artificial Compression Method) scheme. The third scheme is an optimized compact finite difference scheme modified by us: the 4th order Runge Kutta time stepping, the 4th order pentadiagonal compact spatial discretization with the maximum resolution characteristics. The problems of category 1 are solved by using the second (UNO3-ACM) and third (Optimized Compact) schemes. The problems of category 2 are solved by using the first (TVD3) and second (UNO3-ACM) schemes. The problem of category 5 is solved by using the first (TVD3) scheme. It can be concluded from the present calculations that the Optimized Compact scheme and the UN03-ACM show good resolutions for category 1 and category 2 respectively.
Optimal Sales Schemes for Network Goods
DEFF Research Database (Denmark)
Parakhonyak, Alexei; Vikander, Nick
consumers simultaneously, serve them all sequentially, or employ any intermediate scheme. We show that the optimal sales scheme is purely sequential, where each consumer observes all previous sales before choosing whether to buy himself. A sequential scheme maximizes the amount of information available...
THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES
African Journals Online (AJOL)
PUBLICATIONS1
ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.
Arbitrated quantum signature scheme with message recovery
International Nuclear Information System (INIS)
Lee, Hwayean; Hong, Changho; Kim, Hyunsang; Lim, Jongin; Yang, Hyung Jin
2004-01-01
Two quantum signature schemes with message recovery relying on the availability of an arbitrator are proposed. One scheme uses a public board and the other does not. However both schemes provide confidentiality of the message and a higher efficiency in transmission
Radionuclide fractionation in a forest soil profile
International Nuclear Information System (INIS)
Rigol, A.; Vidal, M.; Rauret, G.
1996-01-01
Two alternative approaches, a sequential extraction scheme and the calculation of the variation of the distribution coefficient of radiocaesium in different K-Ca N H 4 scenarios, were used to study the behaviour and fractionation of this radionuclide in a forest soil profile. The first approach was applied to samples originating from an experiment in which the original L(litter) layer was replaced by an L layer contaminated with a radioactive aerosol, allowing a downward migration of radiocaesium. The samples belonged to different stages after the contamination. The second approach was applied to samples contaminated with soluble radiocaesium. The results indicate that the mineral matter seems to govern the behaviour of radiocaesium in case of direct condensed deposition or when radiocaesium is released from structural components of the organic matter phase. (author). 16 refs., 2 figs., 1 tab
Analysis of the Properties of Current Penalty Schemes for Violations of Antitrust Law
Motchenkova, E.; Kort, P.M.
2004-01-01
The main feature of the penalty schemes described in current sentencing guidelines is that the fine is based on the accumulated gains from cartel or price-fixing activities for the firm.These gains are usually difficult to estimate, but they can be approximated by a fraction of the turnover.The
Nuclear Reactor Component Code CUPID-I: Numerical Scheme and Preliminary Assessment Results
International Nuclear Information System (INIS)
Cho, Hyoung Kyu; Jeong, Jae Jun; Park, Ik Kyu; Kim, Jong Tae; Yoon, Han Young
2007-12-01
A component scale thermal hydraulic analysis code, CUPID (Component Unstructured Program for Interfacial Dynamics), is being developed for the analysis of components of a nuclear reactor, such as reactor vessel, steam generator, containment, etc. It adopted three-dimensional, transient, two phase and three-field model. In order to develop the numerical schemes for the three-field model, various numerical schemes have been examined including the SMAC, semi-implicit ICE, SIMPLE, Row Scheme and so on. Among them, the ICE scheme for the three-field model was presented in the present report. The CUPID code is utilizing unstructured mesh for the simulation of complicated geometries of the nuclear reactor components. The conventional ICE scheme that was applied to RELAP5 and COBRA-TF, therefore, were modified for the application to the unstructured mesh. Preliminary calculations for the unstructured semi-implicit ICE scheme have been conducted for a verification of the numerical method from a qualitative point of view. The preliminary calculation results showed that the present numerical scheme is robust and efficient for the prediction of phase changes and flow transitions due to a boiling and a flashing. These calculation results also showed the strong coupling between the pressure and void fraction changes. Thus, it is believed that the semi-implicit ICE scheme can be utilized for transient two-phase flows in a component of a nuclear reactor
Nuclear Reactor Component Code CUPID-I: Numerical Scheme and Preliminary Assessment Results
Energy Technology Data Exchange (ETDEWEB)
Cho, Hyoung Kyu; Jeong, Jae Jun; Park, Ik Kyu; Kim, Jong Tae; Yoon, Han Young
2007-12-15
A component scale thermal hydraulic analysis code, CUPID (Component Unstructured Program for Interfacial Dynamics), is being developed for the analysis of components of a nuclear reactor, such as reactor vessel, steam generator, containment, etc. It adopted three-dimensional, transient, two phase and three-field model. In order to develop the numerical schemes for the three-field model, various numerical schemes have been examined including the SMAC, semi-implicit ICE, SIMPLE, Row Scheme and so on. Among them, the ICE scheme for the three-field model was presented in the present report. The CUPID code is utilizing unstructured mesh for the simulation of complicated geometries of the nuclear reactor components. The conventional ICE scheme that was applied to RELAP5 and COBRA-TF, therefore, were modified for the application to the unstructured mesh. Preliminary calculations for the unstructured semi-implicit ICE scheme have been conducted for a verification of the numerical method from a qualitative point of view. The preliminary calculation results showed that the present numerical scheme is robust and efficient for the prediction of phase changes and flow transitions due to a boiling and a flashing. These calculation results also showed the strong coupling between the pressure and void fraction changes. Thus, it is believed that the semi-implicit ICE scheme can be utilized for transient two-phase flows in a component of a nuclear reactor.
Building fast well-balanced two-stage numerical schemes for a model of two-phase flows
Thanh, Mai Duc
2014-06-01
We present a set of well-balanced two-stage schemes for an isentropic model of two-phase flows arisen from the modeling of deflagration-to-detonation transition in granular materials. The first stage is to absorb the source term in nonconservative form into equilibria. Then in the second stage, these equilibria will be composed into a numerical flux formed by using a convex combination of the numerical flux of a stable Lax-Friedrichs-type scheme and the one of a higher-order Richtmyer-type scheme. Numerical schemes constructed in such a way are expected to get the interesting property: they are fast and stable. Tests show that the method works out until the parameter takes on the value CFL, and so any value of the parameter between zero and this value is expected to work as well. All the schemes in this family are shown to capture stationary waves and preserves the positivity of the volume fractions. The special values of the parameter 0,1/2,1/(1+CFL), and CFL in this family define the Lax-Friedrichs-type, FAST1, FAST2, and FAST3 schemes, respectively. These schemes are shown to give a desirable accuracy. The errors and the CPU time of these schemes and the Roe-type scheme are calculated and compared. The constructed schemes are shown to be well-balanced and faster than the Roe-type scheme.
Nonhomogeneous fractional Poisson processes
Energy Technology Data Exchange (ETDEWEB)
Wang Xiaotian [School of Management, Tianjin University, Tianjin 300072 (China)]. E-mail: swa001@126.com; Zhang Shiying [School of Management, Tianjin University, Tianjin 300072 (China); Fan Shen [Computer and Information School, Zhejiang Wanli University, Ningbo 315100 (China)
2007-01-15
In this paper, we propose a class of non-Gaussian stationary increment processes, named nonhomogeneous fractional Poisson processes W{sub H}{sup (j)}(t), which permit the study of the effects of long-range dependance in a large number of fields including quantum physics and finance. The processes W{sub H}{sup (j)}(t) are self-similar in a wide sense, exhibit more fatter tail than Gaussian processes, and converge to the Gaussian processes in distribution in some cases. In addition, we also show that the intensity function {lambda}(t) strongly influences the existence of the highest finite moment of W{sub H}{sup (j)}(t) and the behaviour of the tail probability of W{sub H}{sup (j)}(t)
Nonhomogeneous fractional Poisson processes
International Nuclear Information System (INIS)
Wang Xiaotian; Zhang Shiying; Fan Shen
2007-01-01
In this paper, we propose a class of non-Gaussian stationary increment processes, named nonhomogeneous fractional Poisson processes W H (j) (t), which permit the study of the effects of long-range dependance in a large number of fields including quantum physics and finance. The processes W H (j) (t) are self-similar in a wide sense, exhibit more fatter tail than Gaussian processes, and converge to the Gaussian processes in distribution in some cases. In addition, we also show that the intensity function λ(t) strongly influences the existence of the highest finite moment of W H (j) (t) and the behaviour of the tail probability of W H (j) (t)
Membrane Assisted Enzyme Fractionation
DEFF Research Database (Denmark)
Yuan, Linfeng
to the variation in size of the proteins and a reasonable separation factor can be observed only when the size difference is in the order of 10 or more. This is partly caused by concentration polarization and membrane fouling which hinders an effective separation of the proteins. Application of an electric field...... across the porous membrane has been demonstrated to be an effective way to reduce concentration polarization and membrane fouling. In addition, this technique can also be used to separate the proteins based on difference in charge, which to some extent overcome the limitations of size difference...... of proteins on the basis of their charge, degree of hydrophobicity, affinity or size. Adequate purity is often not achieved unless several purification steps are combined thereby increasing cost and reducing product yield. Conventional fractionation of proteins using ultrafiltration membranes is limited...
Fraction Reduction in Membrane Systems
Directory of Open Access Journals (Sweden)
Ping Guo
2014-01-01
Full Text Available Fraction reduction is a basic computation for rational numbers. P system is a new computing model, while the current methods for fraction reductions are not available in these systems. In this paper, we propose a method of fraction reduction and discuss how to carry it out in cell-like P systems with the membrane structure and the rules with priority designed. During the application of fraction reduction rules, synchronization is guaranteed by arranging some special objects in these rules. Our work contributes to performing the rational computation in P systems since the rational operands can be given in the form of fraction.
Thermochemical transformations of anthracite fractions
Energy Technology Data Exchange (ETDEWEB)
Belkina, T.V.; Privalov, V.E.; Stepanenko, atM.A.
1979-08-01
Research on the nature of thermochemical transformations of anthracite fractions and the possibility of increasing their activity and identifying conditions for their use in the electrode pitch process is described. From research done on different anthracite fractions processed at varying temperatures it was concluded that accumulations of condensates from heating anthracite fractions occur significantly slower in comparison with pitch. As a result the electrode pitch process is prolonged. Thermal treatment of an anthracite fraction causes the formation and accumulation of condensates and promotes thermochemical transformations. Lastly, the use of thermally treated anthracite fractions apparently intensifies the electrode pitch process and improves its quality. (16 refs.) (In Russian)
REMINDER: Saved Leave Scheme (SLS)
2003-01-01
Transfer of leave to saved leave accounts Under the provisions of the voluntary saved leave scheme (SLS), a maximum total of 10 days'* annual and compensatory leave (excluding saved leave accumulated in accordance with the provisions of Administrative Circular No 22B) can be transferred to the saved leave account at the end of the leave year (30 September). We remind you that unused leave of all those taking part in the saved leave scheme at the closure of the leave year accounts is transferred automatically to the saved leave account on that date. Therefore, staff members have no administrative steps to take. In addition, the transfer, which eliminates the risk of omitting to request leave transfers and rules out calculation errors in transfer requests, will be clearly shown in the list of leave transactions that can be consulted in EDH from October 2003 onwards. Furthermore, this automatic leave transfer optimizes staff members' chances of benefiting from a saved leave bonus provided that they ar...
Toward lattice fractional vector calculus
Tarasov, Vasily E.
2014-09-01
An analog of fractional vector calculus for physical lattice models is suggested. We use an approach based on the models of three-dimensional lattices with long-range inter-particle interactions. The lattice analogs of fractional partial derivatives are represented by kernels of lattice long-range interactions, where the Fourier series transformations of these kernels have a power-law form with respect to wave vector components. In the continuum limit, these lattice partial derivatives give derivatives of non-integer order with respect to coordinates. In the three-dimensional description of the non-local continuum, the fractional differential operators have the form of fractional partial derivatives of the Riesz type. As examples of the applications of the suggested lattice fractional vector calculus, we give lattice models with long-range interactions for the fractional Maxwell equations of non-local continuous media and for the fractional generalization of the Mindlin and Aifantis continuum models of gradient elasticity.
Quantum Secure Communication Scheme with W State
International Nuclear Information System (INIS)
Wang Jian; Zhang Quan; Tang Chaojng
2007-01-01
We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.
Labeling schemes for bounded degree graphs
DEFF Research Database (Denmark)
Adjiashvili, David; Rotbart, Noy Galil
2014-01-01
We investigate adjacency labeling schemes for graphs of bounded degree Δ = O(1). In particular, we present an optimal (up to an additive constant) log n + O(1) adjacency labeling scheme for bounded degree trees. The latter scheme is derived from a labeling scheme for bounded degree outerplanar...... graphs. Our results complement a similar bound recently obtained for bounded depth trees [Fraigniaud and Korman, SODA 2010], and may provide new insights for closing the long standing gap for adjacency in trees [Alstrup and Rauhe, FOCS 2002]. We also provide improved labeling schemes for bounded degree...
A novel scheme for making cheap electricity with nuclear energy
International Nuclear Information System (INIS)
Pettibone, J.S.
1991-04-01
Nuclear fuels should produce cheaper electricity than coal, considering their high specific energy and low cost. To exploit these properties, the scheme proposed here replaces the expensive reactor/steam-turbine system with an engine in which the expansion of a gas heated by a nuclear explosion raises a mass of liquid, thereby producing stored hydraulic energy. This energy could be converted to electricity by hydroelectric generation with water as the working fluid or by magnetohydrodynamic (MHD) generation with molten metal. A rough cost analysis suggests the hydroelectric system could reduce the present cost of electricity by two-thirds, and the MHD system by even more. Such cheap power would make feasible large-scale electrolysis to produce hydrogen and other fuels and chemical raw materials. 2 refs., 1 fig
Sparse Parallel MRI Based on Accelerated Operator Splitting Schemes.
Cai, Nian; Xie, Weisi; Su, Zhenghang; Wang, Shanshan; Liang, Dong
2016-01-01
Recently, the sparsity which is implicit in MR images has been successfully exploited for fast MR imaging with incomplete acquisitions. In this paper, two novel algorithms are proposed to solve the sparse parallel MR imaging problem, which consists of l 1 regularization and fidelity terms. The two algorithms combine forward-backward operator splitting and Barzilai-Borwein schemes. Theoretically, the presented algorithms overcome the nondifferentiable property in l 1 regularization term. Meanwhile, they are able to treat a general matrix operator that may not be diagonalized by fast Fourier transform and to ensure that a well-conditioned optimization system of equations is simply solved. In addition, we build connections between the proposed algorithms and the state-of-the-art existing methods and prove their convergence with a constant stepsize in Appendix. Numerical results and comparisons with the advanced methods demonstrate the efficiency of proposed algorithms.
Adaptive Decision-Making Scheme for Cognitive Radio Networks
Alqerm, Ismail
2014-05-01
Radio resource management becomes an important aspect of the current wireless networks because of spectrum scarcity and applications heterogeneity. Cognitive radio is a potential candidate for resource management because of its capability to satisfy the growing wireless demand and improve network efficiency. Decision-making is the main function of the radio resources management process as it determines the radio parameters that control the use of these resources. In this paper, we propose an adaptive decision-making scheme (ADMS) for radio resources management of different types of network applications including: power consuming, emergency, multimedia, and spectrum sharing. ADMS exploits genetic algorithm (GA) as an optimization tool for decision-making. It consists of the several objective functions for the decision-making process such as minimizing power consumption, packet error rate (PER), delay, and interference. On the other hand, maximizing throughput and spectral efficiency. Simulation results and test bed evaluation demonstrate ADMS functionality and efficiency.
Let's Exploit Available Knowledge on Vegetation Fluorescence
Magnani, Federico; Raddi, Sabrina; Mohammed, Gina; Middleton, Elizabeth M.
2014-01-01
The potential to measure vegetation fluorescence from space (1) and to derive from it direct information on the gross primary productivity (GPP) of terrestrial ecosystems is probably the most thrilling development in remote sensing and global ecology of recent years, as it moves Earth observation techniques from the detection of canopy biophysics (e.g., fraction of absorbed radiation) and biochemistry (chlorophyll and nitrogen content) to the realm of ecosystem function. The existence of a functional relationship between fluorescence and photosynthesis has been elucidated over the last decade by several laboratories, notably as part of the preliminary studies of the European Space Agency Fluorescence Explorer (FLEX) Earth Explorer Mission. The empirical observation presented by Guanter et al. (2) of a linear relationship between fluorescence radiance and GPP, however, provides the first experimental confirmation of the feasibility of the approach— already thoroughly tested at leaf level—at the desired scale, despite the confounding effects associated with the satellite detection of such a faint signal. A word of clarification is needed here. The use of fluorescence as a probe of leaf photochemistry has been a staple of plant ecophysiology for decades, rooted in a sound understanding of photosynthetic energy dissipation. However, most past studies had to rely for the interpretation of results on active (pulse-saturated) techniques, making them unsuitable for remote-sensing applications. Over recent years, however, novel process based models have been developed for the interpretation of steady-state, solar-induced fluorescence at the leaf to canopy scale (3). We are therefore in a position to move beyond the mere empirical observation of an association between GPP and fluorescence radiance. In particular, Guanter et al. (2) base their analysis on the assumption of a constant ratio between photosynthetic and fluorescence light use efficiencies (equation 3 in ref
Rationalising predictors of child sexual exploitation and sex-trading.
Klatt, Thimna; Cavner, Della; Egan, Vincent
2014-02-01
Although there is evidence for specific risk factors leading to child sexual exploitation and prostitution, these influences overlap and have rarely been examined concurrently. The present study examined case files for 175 young persons who attended a voluntary organization in Leicester, United Kingdom, which supports people who are sexually exploited or at risk of sexual exploitation. Based on the case files, the presence or absence of known risk factors for becoming a sex worker was coded. Data were analyzed using t-test, logistic regression, and smallest space analysis. Users of the voluntary organization's services who had been sexually exploited exhibited a significantly greater number of risk factors than service users who had not been victims of sexual exploitation. The logistic regression produced a significant model fit. However, of the 14 potential predictors--many of which were associated with each other--only four variables significantly predicted actual sexual exploitation: running away, poverty, drug and/or alcohol use, and having friends or family members in prostitution. Surprisingly, running away was found to significantly decrease the odds of becoming involved in sexual exploitation. Smallest space analysis of the data revealed 5 clusters of risk factors. Two of the clusters, which reflected a desperation and need construct and immature or out-of-control lifestyles, were significantly associated with sexual exploitation. Our research suggests that some risk factors (e.g. physical and emotional abuse, early delinquency, and homelessness) for becoming involved in sexual exploitation are common but are part of the problematic milieu of the individuals affected and not directly associated with sex trading itself. Our results also indicate that it is important to engage with the families and associates of young persons at risk of becoming (or remaining) a sex worker if one wants to reduce the numbers of persons who engage in this activity. Copyright
Energy Technology Data Exchange (ETDEWEB)
Henderson-Sellers, A. (Macquarie Univ., North Ryde, New South Wales (Australia))
1993-02-01
Land-surface schemes developed for incorporation into global climate models include parameterizations that are not yet fully validated and depend upon the specification of a large (20-50) number of ecological and soil parameters, the values of which are not yet well known. There are two methods of investigating the sensitivity of a land-surface scheme to prescribed values: simple one-at-a-time changes or factorial experiments. Factorial experiments offer information about interactions between parameters and are thus a more powerful tool. Here the results of a suite of factorial experiments are reported. These are designed (i) to illustrate the usefulness of this methodology and (ii) to identify factors important to the performance of complex land-surface schemes. The Biosphere-Atmosphere Transfer Scheme (BATS) is used and its sensitivity is considered (a) to prescribed ecological and soil parameters and (b) to atmospheric forcing used in the off-line tests undertaken. Results indicate that the most important atmospheric forcings are mean monthly temperature and the interaction between mean monthly temperature and total monthly precipitation, although fractional cloudiness and other parameters are also important. The most important ecological parameters are vegetation roughness length, soil porosity, and a factor describing the sensitivity of the stomatal resistance of vegetation to the amount of photosynthetically active solar radiation and, to a lesser extent, soil and vegetation albedos. Two-factor interactions including vegetation roughness length are more important than many of the 23 specified single factors. The results of factorial sensitivity experiments such as these could form the basis for intercomparison of land-surface parameterization schemes and for field experiments and satellite-based observation programs aimed at improving evaluation of important parameters.
Synchronization and an application of a novel fractional order King Cobra chaotic system
Energy Technology Data Exchange (ETDEWEB)
Muthukumar, P., E-mail: muthukumardgl@gmail.com; Balasubramaniam, P., E-mail: balugru@gmail.com [Department of Mathematics, Gandhigram Rural Institute‐Deemed University, Gandhigram 624 302, Tamilnadu (India); Ratnavelu, K., E-mail: kuru052001@gmail.com [Faculty of Science, Institute of Mathematical Sciences, University of Malaya, 50603 Kuala Lumpur (Malaysia)
2014-09-01
In this paper, we design a new three dimensional King Cobra face shaped fractional order chaotic system. The multi-scale synchronization scheme of two fractional order chaotic systems is described. The necessary conditions for the multi-scale synchronization of two identical fractional order King Cobra chaotic systems are derived through feedback control. A new cryptosystem is proposed for an image encryption and decryption by using synchronized fractional order King Cobra chaotic systems with the supports of multiple cryptographic assumptions. The security of the proposed cryptosystem is analyzed by the well known algebraic attacks. Numerical simulations are given to show the effectiveness of the proposed theoretical results.
Meaning, function and methods of the recultivation in mining exploitation
Dambov, Risto; Ljatifi, Ejup
2015-01-01
With the exploitation of mineral resources is performed degradation and deformation of the relief and the general part of surface of the Earth's crust. Depending on the type of open pit mine, this degradation can be expressed to a lesser or greater extent, and sometimes in several square kilometers. The exploitation of mineral resources is with unbreakable link with the environment. Very often it is said that mining is „enemy No. 1“ for environment. With exploitation comes to degradation of h...
The possibilities of exploitation of Serbian thermomineral waters
International Nuclear Information System (INIS)
Jovanovic, L.
2002-01-01
Global ecological problem of petrol resources deficit caused an intensive search of alternative energy sources. Deficit of conventional energy fluids in Yugoslavia requires serious efforts to create a program of alternative energy sources exploitation. Geothermal energy represents an important energetic source for the countries with poor energy resources. Geothermal energy can become the basis for economic development. At present these geothermal resources are not being exploited in Yugoslavia. The possibilities of effective exploitation of thermal and thermomineral water resources in Yugoslavia are presented in this paper
Imouraren mining exploitation : Complementary studies Synthetic report Volum B - Mines
International Nuclear Information System (INIS)
1980-01-01
The object of the current study is to determine the main technical characteristics of the reference project of a mine that can supply the necessary ore quantity at a production of 3000 tonnes uranium per year, along 10 years. The project is one of the possible solutions for exploiting the mine. The current study permits to establish : investment and functioning cost estimation, overall project of the mining exploitation program, necessary strength estimation, average ore grades evaluation and variations of these grades, utilities needs, production vizing program, main exploitation methods and necessary materials. Reference project study of the mine serves as base to the economics studies and studies optimization [fr
Misonidazole in fractionated radiotherapy: are many small fractions best
International Nuclear Information System (INIS)
Denekamp, J.; McNally, N.J.; Fowler, J.F.; Joiner, M.C.
1980-01-01
The largest sensitizing effect is always demonstrated with six fractions, each given with 2 g/m 2 of misonidazole. In the absence of reoxygenation a sensitizer enhancement ratio of 1.7 is predicted, but this falls to 1.1-1.2 if extensive reoxygenation occurs. Less sensitization is observed with 30 fractions, each with 0.4 g/m 2 of drug. However, for clinical use, the important question is which treatment kills the maximum number of tumour cells. Many of the simulations predict a marked disadvantage of reducing the fraction number for X rays alone. The circumstances in which this disadvantage is offset by the large Sensitizer enhancement ratio values with a six-fraction schedule are few. The model calculations suggest that many small fractions, each with a low drug dose, are safest unless the clinician has some prior knowledge that a change in fraction number is not disadvantageous. (author)
Error Analysis of a Finite Element Method for the Space-Fractional Parabolic Equation
Jin, Bangti; Lazarov, Raytcho; Pasciak, Joseph; Zhou, Zhi
2014-01-01
© 2014 Society for Industrial and Applied Mathematics We consider an initial boundary value problem for a one-dimensional fractional-order parabolic equation with a space fractional derivative of Riemann-Liouville type and order α ∈ (1, 2). We study a spatial semidiscrete scheme using the standard Galerkin finite element method with piecewise linear finite elements, as well as fully discrete schemes based on the backward Euler method and the Crank-Nicolson method. Error estimates in the L2(D)- and Hα/2 (D)-norm are derived for the semidiscrete scheme and in the L2(D)-norm for the fully discrete schemes. These estimates cover both smooth and nonsmooth initial data and are expressed directly in terms of the smoothness of the initial data. Extensive numerical results are presented to illustrate the theoretical results.
On the optimum joint decoding capacity of wyner circular GCMAC by exploiting hadamard inequality
Shakir, Muhammad
2010-09-01
This paper presents an original expression of the theoretical upper bound for the optimum joint decoding capacity of Wyner Circular Gaussian Cellular Multiple Access Channel (C-GCMAC). This upper bound is a novel application of the Hadamard inequality established by exploiting the Hadamard operation between the channel fading (G) and channel slow gain (Ω) matrices. This paper demonstrates that the theoretical upper bound converges to the actual capacity for negligible channel slow gain among the mobile terminals and the base stations for the entire range of Signal to Noise Ratios (SNRs). The behaviour of the theoretical bound is critically observed when the intercell and the intra-cell time sharing schemes are employed. © 2010 IEEE.
Price Sensitivity of Demand for Prescription Drugs: Exploiting a Regression Kink Design
DEFF Research Database (Denmark)
Simonsen, Marianne; Skipper, Lars; Skipper, Niels
This paper investigates price sensitivity of demand for prescription drugs using drug purchase records for at 20% random sample of the Danish population. We identify price responsiveness by exploiting exogenous variation in prices caused by kinked reimbursement schemes and implement a regression ...... education and income are, however, more responsive to the price. Also, essential drugs that prevent deterioration in health and prolong life have lower associated average price sensitivity....... kink design. Thus, within a unifying framework we uncover price sensitivity for different subpopulations and types of drugs. The results suggest low average price responsiveness with corresponding price elasticities ranging from -0.08 to -0.25, implying that demand is inelastic. Individuals with lower...
Fractional statistics and fractional quantized Hall effect. Revision
International Nuclear Information System (INIS)
Tao, R.; Wu, Y.S.
1984-01-01
We suggest that the origin of the odd denominator rule observed in the fractional quantized Hall effect (FQHE) may lie in fractional statistics which governs quasiparticles in FQHE. A theorem concerning statistics of clusters of quasiparticles implies that fractional statistics does not allow coexistence of a large number of quasiparticles at fillings with an even denominator. Thus no Hall plateau can be formed at these fillings, regardless of the presence of an energy gap. 15 references
Metal fractionation of atmospheric aerosols via sequential chemical extraction: a review
Energy Technology Data Exchange (ETDEWEB)
Smichowski, Patricia; Gomez, Dario [Unidad de Actividad Quimica, Comision Nacional de Energia Atomica, San Martin (Argentina); Polla, Griselda [Unidad de Actividad Fisica, Comision Nacional de Energia Atomica, San Martin (Argentina)
2005-01-01
This review surveys schemes used to sequentially chemically fractionate metals and metalloids present in airborne particulate matter. It focuses mainly on sequential chemical fractionation schemes published over the last 15 years. These schemes have been classified into five main categories: (1) based on Tessier's procedure, (2) based on Chester's procedure, (3) based on Zatka's procedure, (4) based on BCR procedure, and (5) other procedures. The operational characteristics as well as the state of the art in metal fractionation of airborne particulate matter, fly ashes and workroom aerosols, in terms of applications, optimizations and innovations, are also described. Many references to other works in this area are provided. (orig.)
International Nuclear Information System (INIS)
Stolyarova, T.V.; Skobel'tsyna, E.S.; Grinberg, S.M.; Kruglikov, I.L.; Korotaev, G.K.; Tepelina, O.M.; Il'ina, T.I.
1982-01-01
The effect of low-molecular fraction of thymus humoral factor on blood formation in mice irradiated at 4 Gy was studied. It is shown that injection of low-molecular fraction of thymus hymoral factor to irradiated animals affects proliferative processes in spleen and bone marrow, however the degree of the effect depends on the injection scheme of the preparation. Application of mathematical planning methods of the experiment enables to analyze various injection schemes of low-molecular fraction of thymus humoral factor on the investigated indices. The optimal scheme of preparation injection is determined: 1st injection with the dose of 10 mkg/kg following 4 hour after irradiation, 2d injection - with the same dose in 7-21 days
Fractionation of Pb and Cu in the fine fraction (landfill.
Kaczala, Fabio; Orupõld, Kaja; Augustsson, Anna; Burlakovs, Juris; Hogland, Marika; Bhatnagar, Amit; Hogland, William
2017-11-01
The fractionation of metals in the fine fraction (landfill was carried out to evaluate the metal (Pb and Cu) contents and their potential towards not only mobility but also possibilities of recovery/extraction. The fractionation followed the BCR (Community Bureau of Reference) sequential extraction, and the exchangeable (F1), reducible (F2), oxidizable (F3) and residual fractions were determined. The results showed that Pb was highly associated with the reducible (F2) and oxidizable (F3) fractions, suggesting the potential mobility of this metal mainly when in contact with oxygen, despite the low association with the exchangeable fraction (F1). Cu has also shown the potential for mobility when in contact with oxygen, since high associations with the oxidizable fraction (F3) were observed. On the other hand, the mobility of metals in excavated waste can be seen as beneficial considering the circular economy and recovery of such valuables back into the economy. To conclude, not only the total concentration of metals but also a better understanding of fractionation and in which form metals are bound is very important to bring information on how to manage the fine fraction from excavated waste both in terms of environmental impacts and also recovery of such valuables in the economy.
Fractional variational calculus in terms of Riesz fractional derivatives
International Nuclear Information System (INIS)
Agrawal, O P
2007-01-01
This paper presents extensions of traditional calculus of variations for systems containing Riesz fractional derivatives (RFDs). Specifically, we present generalized Euler-Lagrange equations and the transversality conditions for fractional variational problems (FVPs) defined in terms of RFDs. We consider two problems, a simple FVP and an FVP of Lagrange. Results of the first problem are extended to problems containing multiple fractional derivatives, functions and parameters, and to unspecified boundary conditions. For the second problem, we present Lagrange-type multiplier rules. For both problems, we develop the Euler-Lagrange-type necessary conditions which must be satisfied for the given functional to be extremum. Problems are considered to demonstrate applications of the formulations. Explicitly, we introduce fractional momenta, fractional Hamiltonian, fractional Hamilton equations of motion, fractional field theory and fractional optimal control. The formulations presented and the resulting equations are similar to the formulations for FVPs given in Agrawal (2002 J. Math. Anal. Appl. 272 368, 2006 J. Phys. A: Math. Gen. 39 10375) and to those that appear in the field of classical calculus of variations. These formulations are simple and can be extended to other problems in the field of fractional calculus of variations
A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach
Directory of Open Access Journals (Sweden)
Qiao Liu
2017-01-01
Full Text Available Security issue has been considered as one of the most pivotal aspects for the fifth-generation mobile network (5G due to the increasing demands of security service as well as the growing occurrence of security threat. In this paper, instead of focusing on the security architecture in the upper layer, we investigate the secure transmission for a basic channel model in a heterogeneous network, that is, two-way relay channels. By exploiting the properties of the transmission medium in the physical layer, we propose a novel secure scheme for the aforementioned channel mode. With precoding design, the proposed scheme is able to achieve a high transmission efficiency as well as security. Two different approaches have been introduced: information theoretical approach and physical layer encryption approach. We show that our scheme is secure under three different adversarial models: (1 untrusted relay attack model, (2 trusted relay with eavesdropper attack model, and (3 untrusted relay with eavesdroppers attack model. We also derive the secrecy capacity of the two different approaches under the three attacks. Finally, we conduct three simulations of our proposed scheme. The simulation results agree with the theoretical analysis illustrating that our proposed scheme could achieve a better performance than the existing schemes.
Programming scheme based optimization of hybrid 4T-2R OxRAM NVSRAM
Majumdar, Swatilekha; Kingra, Sandeep Kaur; Suri, Manan
2017-09-01
In this paper, we present a novel single-cycle programming scheme for 4T-2R NVSRAM, exploiting pulse engineered input signals. OxRAM devices based on 3 nm thick bi-layer active switching oxide and 90 nm CMOS technology node were used for all simulations. The cell design is implemented for real-time non-volatility rather than last-bit, or power-down non-volatility. Detailed analysis of the proposed single-cycle, parallel RRAM device programming scheme is presented in comparison to the two-cycle sequential RRAM programming used for similar 4T-2R NVSRAM bit-cells. The proposed single-cycle programming scheme coupled with the 4T-2R architecture leads to several benefits such as- possibility of unconventional transistor sizing, 50% lower latency, 20% improvement in SNM and ∼20× reduced energy requirements, when compared against two-cycle programming approach.
An adaptive scaling and biasing scheme for OFDM-based visible light communication systems.
Wang, Zhaocheng; Wang, Qi; Chen, Sheng; Hanzo, Lajos
2014-05-19
Orthogonal frequency-division multiplexing (OFDM) has been widely used in visible light communication systems to achieve high-rate data transmission. Due to the nonlinear transfer characteristics of light emitting diodes (LEDs) and owing the high peak-to-average-power ratio of OFDM signals, the transmitted signal has to be scaled and biased before modulating the LEDs. In this contribution, an adaptive scaling and biasing scheme is proposed for OFDM-based visible light communication systems, which fully exploits the dynamic range of the LEDs and improves the achievable system performance. Specifically, the proposed scheme calculates near-optimal scaling and biasing factors for each specific OFDM symbol according to the distribution of the signals, which strikes an attractive trade-off between the effective signal power and the clipping-distortion power. Our simulation results demonstrate that the proposed scheme significantly improves the performance without changing the LED's emitted power, while maintaining the same receiver structure.
Fragment separator momentum compression schemes
Energy Technology Data Exchange (ETDEWEB)
Bandura, Laura, E-mail: bandura@anl.gov [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Erdelyi, Bela [Argonne National Laboratory, Argonne, IL 60439 (United States); Northern Illinois University, DeKalb, IL 60115 (United States); Hausmann, Marc [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Kubo, Toshiyuki [RIKEN Nishina Center, RIKEN, Wako (Japan); Nolen, Jerry [Argonne National Laboratory, Argonne, IL 60439 (United States); Portillo, Mauricio [Facility for Rare Isotope Beams (FRIB), 1 Cyclotron, East Lansing, MI 48824-1321 (United States); Sherrill, Bradley M. [National Superconducting Cyclotron Lab, Michigan State University, 1 Cyclotron, East Lansing, MI 48824-1321 (United States)
2011-07-21
We present a scheme to use a fragment separator and profiled energy degraders to transfer longitudinal phase space into transverse phase space while maintaining achromatic beam transport. The first order beam optics theory of the method is presented and the consequent enlargement of the transverse phase space is discussed. An interesting consequence of the technique is that the first order mass resolving power of the system is determined by the first dispersive section up to the energy degrader, independent of whether or not momentum compression is used. The fragment separator at the Facility for Rare Isotope Beams is a specific application of this technique and is described along with simulations by the code COSY INFINITY.